text
stringlengths
174
640k
id
stringlengths
47
47
dump
stringclasses
17 values
url
stringlengths
14
1.94k
file_path
stringlengths
125
142
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
43
156k
score
float64
2.52
5.34
int_score
int64
3
5
Starting points: Living with HIV So you found out that you’re HIV positive. The first thing you need to know is that these days most people with HIV live long and healthy lives, thanks to huge improvements in treatment and care. Even so, finding out you have HIV can be stressful. No matter how much good news there is, you still have to work through the shock and other emotions you might be feeling, at your own pace, in your own way. Right now, you may want to know everything there is to know about HIV. On the other hand, learning more may be the last thing you want to do! Let’s take it one step at a time. You don’t need to become a medical expert; just knowing some of the basics about HIV can help you a lot. Understanding more about your condition will allow you to take charge of your health. And it can help you work with your doctor. What is HIV? HIV is a virus that weakens your immune system, your body’s built-in defence against disease. HIV (which stands for human immunodeficiency virus) attacks your immune system. If your immune system gets too weak, you can get very sick from other infections. But just because you have HIV does not mean you will get sick. Most people with HIV can stay healthy and live a long, full life if they get proper care and treatment. How can I stay healthy with HIV? 1) Get a good doctor. Try to find a doctor who has experience treating people living with HIV. You’ll also want a doctor you can talk to openly and honestly. Your doctor will likely suggest a complete medical checkup. Other health conditions (such as hepatitis, sexually transmitted infections (STIs), tuberculosis (TB), diabetes and heart conditions) can affect your care, so it’s a good idea to get tested for these as well. 2) Talk to your doctor about HIV drugs (also called HIV medications or HIV treatment). Today’s HIV drugs are easier to take than older ones, and they can help you stay healthy for many years. Effective treatment also lowers your chance of passing HIV to others. 3) Take care of your mental and emotional health. Stress, depression and anxiety often go hand-in-hand with finding out you have HIV. Sometimes drugs and alcohol do too. There’s no shame in any of this. Talking to your doctor, a counsellor, a therapist or a friend helps many people deal with the news. Some people also use mind–body practices, such as yoga, meditation or Tai Chi, to help relieve their stress. 4) Eat well (include a good-quality daily multivitamin and mineral supplement if you can). 6) Get enough rest. 7) If you’re a smoker, try to quit smoking, or smoke less. Talk to you doctor, nurse or pharmacist about ways to help you quit smoking. 8) Try to reduce or stop using drugs, alcohol or other substances that could be harmful to your health. 9) You may also want to try complementary therapies, such as acupuncture, massage and naturopathy, along with the care you get from your doctor. When you’re HIV positive, regular visits to your doctor will help you stay on top of your health. As part of your regular checkups, your doctor will recommend blood tests to monitor your health. Two of the most important tests check your CD4 count and your viral load. What is a “CD4 count”? Your CD4 count tells you how your immune system is doing. The higher the number, the better. CD4 cells are the “bosses” of the immune system. They lead the fight against invading germs and viruses. Your CD4 count tells you how many CD4 cells you have in a cubic millimetre (mm3) of blood. A “normal” CD4 count is anywhere from 500 to 1,200. When you received your diagnosis, your CD4 count may have been normal or it may have been below normal. Even if it was below normal, that may be OK in the short term. But a count of 350 or lower means a greater risk of getting sick. CD4 counts usually rise once you start HIV treatment, and many people on HIV treatment have normal CD4 counts. What is “viral load”? Your viral load tells you how much HIV is in a millilitre of blood. The lower your viral load, the better. If you are on HIV treatment and the treatment is working, your viral load will fall to a level too low for a test to detect. When you have an “undetectable” viral load, it does not mean that you’re cured or that the HIV is gone, but it does mean that the HIV is under control. It also greatly lowers the risk of passing HIV to someone else. When should I start treatment? There is no cure for HIV, but treatment helps you stay healthy by stopping HIV from multiplying in your body. Your immune system can then stay strong (or get stronger if it was weakened when you were diagnosed). HIV treatment can also help prevent other health problems. What’s more, having an undetectable viral load greatly lowers the risk of passing HIV to someone else. Doctors who specialize in HIV usually talk about HIV treatment soon after diagnosis. Experts now think that starting treatment early is better for long-term health. Research suggests that people who start treatment soon after diagnosis and get good care can expect to live a near-normal lifespan. You need to take HIV drugs every day as prescribed by your doctor. If not, the virus in your body can develop resistance and the drugs will stop working. If this happens, you’ll have to change your drugs, which may leave fewer options for the future. Newer HIV drugs are more tolerable than older drugs, but some may still cause side effects. These often go away after a few weeks. Your doctor, nurse or pharmacist can help you learn how to cope with side effects. If the side effects make it difficult to keep taking your drugs, your doctor might be able to recommend other drugs that would be easier for you to take. Talk to your doctor about when is the best time for you to start treatment. Starting is a big step, but you are not alone. Your doctor, nurse, pharmacist or staff at your local community-based HIV organization can give you information and support. What about other infections? If HIV is not treated, your immune system eventually becomes weakened and other kinds of serious infections, called opportunistic infections, can develop. Maybe you found out you have HIV because you were sick with such an infection. By keeping your immune system strong, you’ll be better able to fight off infections. There are also other kinds of infections. Some are passed through sex without a condom—for example, syphilis and gonorrhea. Some are passed when sharing needles and other equipment to inject drugs. And some infections, such as hepatitis B and C, can be passed through sex without a condom or sharing drug use equipment. To learn more about how to prevent these infections, talk to your doctor, nurse, staff at your local community-based HIV organization or CATIE (1-800-263-1638). Who should I tell I’m HIV positive? Telling someone that you’re HIV positive can be stressful. You may not be sure who you can trust or how a person will react. But it can also be isolating to keep it a secret. To help you decide who to tell, ask yourself: Who can I trust to listen and not judge me? Who can I rely on to give me the support I need and deserve? Who will respect my privacy? Most of the time, telling someone (disclosing) you have HIV is your decision. You don’t have to tell your family or friends, although if you think they might be supportive it could help you. In most cases you don’t have to tell your landlord, employer, coworkers or school. You do not have to tell your dentist or other healthcare workers, but if they know, they might be able to provide you with better care. The law is different when it comes to sex. In Canada you can be charged with a serious crime if you do not tell your sexual partner about your HIV status before having certain kinds of sex. The law may evolve, but at the time of publication, it suggests you have a legal duty to tell your sexual partner about your HIV status before having: - Sex without a condom regardless of your viral load (this includes vaginal, frontal* or anal sex) - Sex with a condom if your viral load is higher than low (this includes vaginal, frontal or anal sex) However, you do not have a legal duty to disclose before sex if you both use a condom AND have a low viral load (at least before vaginal sex). There’s a lot to know and think about when it comes to disclosing your HIV status. Talk to a staff member at your local community-based HIV organization or the Canadian HIV/AIDS Legal Network (www.aidslaw.ca or 416-595-1666). If you need legal advice, talk to a lawyer. The Canadian HIV/AIDS Legal Network may be able to refer you to a lawyer. Talking to another HIV-positive person can also be helpful. If you don’t know another HIV-positive person, contact CATIE or your local community-based HIV organization and ask if they can connect you to an individual or group. There is, of course, plenty more to learn and plenty more to do. But knowing the basics about HIV can help you tackle what comes next. For now, it’s a good idea to learn enough so you feel comfortable and can be involved in your own care. As far as “next steps” go, let’s break them down into a few main areas: Keep yourself healthy. Learn how you can take control of your health, from eating well to managing your stress. Protect yourself from other infections by getting vaccines, practising safer sex and (if you use drugs) safer drug use. Learn about HIV drugs and talk to your doctor about your options so that you can make choices that are right for you. Learn how HIV is transmitted so you know how to avoid passing the virus to other people. Condoms, HIV treatment and treating STIs are just some of the ways you can lower the risk of passing on HIV during sex. If you use street drugs, don’t share drug use equipment. Get connected. Find out about services for people with HIV in your area. Services for people with HIV are in a variety of community organizations. For some organizations HIV is their main focus. These are often called AIDS service organizations or ASOs. In other places, HIV services are part of a larger organization. If you picked up this brochure at a community-based HIV organization, talk to someone there. These places offer support and information and can help connect you with other people living with HIV. Talking to someone who has HIV can be a great way to deal with the stress of living with the virus. To find a community-based HIV organization near you: But before you get into all of that, you’re totally allowed to take a break. Go ahead, grab some popcorn and a good movie. And know that there are people and resources out there to support you as you learn to live long and well with HIV. Acknowledgements and credits This publication, originally developed by the Toronto People With AIDS Foundation, has been adapted and printed in partnership with CATIE. Decisions about particular medical treatments should always be made in consultation with a qualified medical practitioner knowledgeable about HIV-related illness and the treatments in question. Toronto People With AIDS Foundation and CATIE provide information resources to help people living with HIV who wish to manage their own healthcare in partnership with their care providers. Information accessed through or published or provided by Toronto People With AIDS Foundation and CATIE, however, is not to be considered medical advice. Toronto People With AIDS Foundation and CATIE endeavour to provide the most up-to-date and accurate information at the time of publication. Users relying solely on this information do so entirely at their own risk. Any opinions expressed herein may not reflect the policies or opinions of Toronto People With AIDS Foundation and CATIE or any partners or funders. Information on safer drug use is presented as a public health service to help people make healthier choices to reduce the spread of HIV, viral hepatitis and other infections. It is not intended to encourage or promote the use or possession of illegal drugs. © 2015 Toronto People With AIDS Foundation and CATIE.
<urn:uuid:de97a102-f98d-4bd8-b691-ea24e81b9b2c>
CC-MAIN-2017-26
http://catie.ca/en/practical-guides/starting-points
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323870.46/warc/CC-MAIN-20170629051817-20170629071817-00434.warc.gz
en
0.95336
2,676
2.875
3
In Titanic, a movie directed by James Cameron, Jack and Rose try to survive in the freezing Atlantic water after the Titanic sinks to await rescue. Jack and Rose attempt to float atop a floating piece of door or headboard after the ship sinks, but Jack soon gives up. Audiences believe he stops trying to climb aboard the door because it keeps tipping over and if he kept trying he and Rose both would have been able to fit. In fact, there is reason to believe both Jack and Rose could have fit on the door: However, Cameron (and MythBusters agrees) that buoyant forces prevented Jack from sitting with Rose on the floating door. For my calculations, I assume that the door is of uniform shape 2m x 1m x .15m and that it is made of oak (density = 770 kg/m3). The buoyant force on the door is: FB = ρFgV FB = (1000kg/m3)(9.8 m/s2)(2m*1m*.15m) FB = 2940N If both Jack and Rose successfully got on top of the door, they would still end up in the water because their force pushing down on the door would outweigh the buoyant force necessary for keeping the door afloat: FJ+R = mg FJ+R = (57kg + 77kg)(9.8) + Fgdoor FJ+R = 1313N + ρv FJ+R = 1313N + (770 kg/m3)(.3m3)(9.8) FJ+R = 1313N + 2264N FJ+R = 3577N Therefore, Jack allowed Rose to lay by herself and she was able to survive because her force was less than the buoyant force: FR = (57kg)(9.8) + 2264N FR = 2822N If Rose had somehow died before this scene and Jack had come across this door in the water, he still would have not been able to keep it afloat, based on the calculations below. So if Jack would have died either way, at least he saved one life! FJ = (77kg)(9.8) + 2264N FJ = 3019N What type of wood would have allowed Jack and Rose to float together on the raft? FJ+R < 2940N Fwood < 1627N Ρwood < 553 kg/m3 Therefore, from the chart listed on http://www.engineeringtoolbox.com/wood-density-d_40.html, eligible woods that James Cameron could have used to keep Jack from dying could have included: Agba, Black Ash, Aspen, Balsa, Bamboo, Butternut, Western Red Cedar, Cottonwood, Cypress, Douglass Fir, Gaboon, Red Gum, Western Hemlock, Juniper, Obeche, Corsican Pine, Radiata Pine, Scots Pine, White Pine, Yellow Pine, American Redwood, European Redwood, Spruce, Canadian Spruce, Norwegian Spruce, Sitka Spruce, Western White Spruce, and Claro Walnut – they all have densities less than 553 kg/m3.
<urn:uuid:3eb4bfb9-a647-40a4-95aa-04bb77f2ef4b>
CC-MAIN-2017-26
http://colgatephys111.blogspot.com/2012/11/could-jack-have-lived.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323870.46/warc/CC-MAIN-20170629051817-20170629071817-00434.warc.gz
en
0.951477
686
3.703125
4
They’re happy to see you when you get home, love you unconditionally and make you get up from the couch to take a walk. And there’s a growing body of evidence that pets can lower your risk of heart disease, too, the American Heart Association says. The group says there’s now enough evidence that pets are heart-healthy to justify an official statement summing up the evidence. “The most data and the best data were on dog ownership,” said Dr. Glenn Levine of Baylor College of Medicine in Houston, who led the committee that wrote the statement. “In no way are we discounting or dissing cats or other pets,” Levine added hastily. The committee went through all the evidence linking pet ownership with lowered risk of heart disease. There’s plenty of it: - Dog owners exercise more than people who don’t have dogs and they’re 54 percent more likely to get recommended levels of daily exercise. - Stroking a pet can lower your blood pressure. Several studies show pet owners in general have lower blood pressure than people without pets. - Pet owners can handle stress better -- even when their pets aren’t around. Only one study’s been done to the “gold standard" of scientific rigor – a so-called randomized study. In that one, researchers found a group of 30 people with borderline high blood pressure who were about to adopt dogs from a shelter, and persuaded half of them to hold off. Those allowed to adopt dogs right away had lower blood pressure two and five months later than those who agreed to wait. "Interestingly, at later follow-up, after all study participants had adopted dogs, systolic blood pressure was found to be similarly lowered in the deferred-adoption group as well," the committee wrote in the report. More study is needed to show precisely why pets lower blood pressure and improve the ability to handle heart-harming stress hormones, such as cortisol. It’s also possible, says Levine, that other factors are involved. Any pet owner can testify that animals drag in a lot of dirt -- and touching and breathing in dirt, pollen and other allergens could reduce levels of a compound called C-reactive protein, which rises when there is inflammation in the body and is strongly linked to heart disease. Or, it could be something simple. “Perhaps when owns a pet one tends to be happier,” said Levine, himself a dog owner. Pet owners might be more likely to take their medications and eat healthier meals, he said. Despite the evidence, the group doesn’t yet recommend that people adopt pets simply to lower their risk of heart disease. “We did not want people to see this article and just go out and adopt or rescue or buy a dog …while they continue to just sit on the couch and smoke cigarettes,” Levine said. “The primary reason to adopt a pet would be to give the pet a loving home and to derive a measure of enjoyment from taking care of a pet.” And although dog owners are far more likely to get out and exercise with their pets than, say, a snake owner, Levine said any pet can be helpful. “Several studies demonstrated beneficial effects on these parameters associated with goat, fish, chimpanzee, and snake ownership,’ the statement reads. “One experiment even demonstrated a benefit on cardiovascular stress responses with ‘virtual’ animals, which were presented in the form of video recordings.”
<urn:uuid:8f516d0a-1ad2-4b51-8d3b-a00affb6cdbc>
CC-MAIN-2017-26
http://www.today.com/health/pets-might-lower-your-heart-disease-risk-experts-say-1C9866275
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323870.46/warc/CC-MAIN-20170629051817-20170629071817-00434.warc.gz
en
0.964982
735
2.734375
3
Learn all about Oscillators and sound generation from synthesist Marc Doty and support the educational activities of the Bob Moog Foundation all at the same time... This second course in the 6-part series on the Foundation Of Synthesis is all about Oscillators. Bob Moog Foundation lead educator, Marc Doty, introduces you to the basic concepts of sound generation and waveforms. You’ll see and hear these waveforms in action as Marc brings out his arsenal of "collector” synths and explains the details of what made these famous analog and digital instruments tick! Get ready to modulate! First you’ll learn about modulating wave shapes via pulse and wave-shape modulation techniques. You’ll see LFO and FM modulation in action on the classic ARP 2600. Then Marc dives into the digital domain with a look at some classic hardware and software digital synths (Ensoniq & Reason) with their digital oscillators, wave tables and more. Throughout this series, Marc demonstrates the science of sound with informative animations and hands-on demonstrations of his collection of classic synths from many different designers! It’s great to see how these fantastic instruments deploy their unique sonic technologies. Bob Moog was an early pioneer and inventor of voltage controlled analog synthesizers. He revolutionized the music industry and his ideas, inventions and musical instruments have dominated the sound of music for more than 30 years. Aside from being an innovator, Dr. Bob was an outspoken advocate of education. The Bob Moog Foundation, created by his daughter, Michelle Moog-Kousa, continues his legacy with Dr. Bob's SoundSchool, the preservation of his inventions and the development of the Moogseum – the only museum of its kind dedicated to the advancement of sonic education. We hope you will help support the BMF's efforts by watching these courses with the knowledge that a large portion of the proceeds go to support their awesome efforts!
<urn:uuid:0df536cd-c075-437d-a1c0-3b1303ee3aa2>
CC-MAIN-2017-26
https://audioz.me/news/download_ask_video_the_foundation_of_synthesis_102_the_oscillator_tutorial/2012-11-21-2220
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320130.7/warc/CC-MAIN-20170623184505-20170623204505-00154.warc.gz
en
0.940694
402
2.609375
3
You are using an outdated browser. Please upgrade your browser to improve your experience. What are Ovarian Cysts? In many cases, having an ovarian cyst is normal. The cysts in the ovary come from the roughly 150 follicles (fluid sacs) inside the ovary that develop each month. Normally, only one of these follicles develops fully and releases an egg at the time of ovulation. The mature follicle becomes what doctors call the corpus luteum. It lasts until menstruation when it gradually diminishes. If a follicle fails to fully discharge the egg, it can become a cyst that can grow, put pressure on the surrounding tissue and, in some cases, burst and bleed. Functional cysts are normal and follow the menstrual cycle. There are two types of functional cysts: • Follicular cysts occur when the pituitary gland fails to produce its surge of luteinizing hormone (LH), which normally activates the release of the follicle’s egg. Instead the follicle grows into a cyst. Follicular cysts rarely cause pain and most often disappear on their own within a few menstrual cycles. • Corpus luteum cyst. Once the follicle has released its egg, the mature follicle produces estrogen and progesterone. This follicle is called the corpus luteum. In instances when the follicle fills with fluid (such as blood), other internal bleeding and sharp pain in the pelvic area can result. Non-functional cysts are a result of problems in ovulation and are not considered normal. What are the symptoms of ovarian cysts? While functional cysts come and go with the menstrual cycle, non-functional cysts on the ovaries persist and can cause symptoms related to it. One such symptom is pain in the pelvis that usually occurs on the side of the cyst. It is generally a dull pain that can suddenly become extremely sharp and overwhelming in its strength. This happens when the cyst bursts, releasing fluid and blood into the pelvic cavity. The pain can be brief, lasting only a few minutes, or can last up to several days. Bleeding or spotting may occur with these cysts. In some cases, the doctor will detect an elevated testosterone level but this is not consistent. What are the causes of ovarian cysts? Doctors don’t know the exact cause of ovarian cysts. They are felt by some doctors to be related to emotional trauma or to chronic ongoing stress. Problems with hormone imbalances involving the hypothalamus and/or the pituitary gland may cause these cysts to proliferate. Dominance of testosterone and estrogen is also believed to be a contributing factor. Remember, Traditional Medical Approach: There is no good medical way to shrink ovarian cysts. Doctors treat the pain and give antibiotics if infection in a cyst is suspected. Cysts that don’t resolve on their own can be treated by aspirating (sucking out) the cyst or removal of the cyst and possibly some ovarian tissue. A complete hysterectomy might be indicated if cysts have been excessive, painful and if a woman doesn’t desire a pregnancy. This does not correct the underlying problem and should only be done as a last resort. Other treatment from conventional doctors may consist of watchful waiting. In this case the patient has follow up examinations and possible follow up pelvic ultrasounds to see if the cyst has changed in size. Birth control pills may also be recommended to reduce the chance of new cysts starting, but in my opinion this does not help balance your hormones. Surgery is another option that conventional practitioners use if the cyst becomes too large. Cystectomy is a procedure that removes the cysts without removing the ovary. Remember the ovaries produce estrogen and progesterone, so I always like to see these left in if at all possible. If a cystic mass is cancerous, however, your doctor will advise a hysterectomy to remove both ovaries and your uterus. Please read about hysterectomies and make sure you are informed of all the side effects. If you experience severe or spasmodic pain in your lower abdomen, accompanied by fever and vomiting, see your doctor. If you have signs and symptoms of shock such as cold, clammy skin, rapid breathing, and lightheadedness or weakness, this may indicate an emergency and require immediate medical attention. Functional Medicine Approaches: First, it is very important to get a baseline on your hormone levels. If there is an elevation of testosterone, then there are several ways to decrease this naturally. The beauty of doing an expanded female hormone panel (e FHP) on cycling women is because we will be able to collect 11 saliva samples over the month throughout your cycle. This will then be graphed out so we can see exactly when the hormones are out of sync or in excess in relationship to one another. This is much better than taking a blood test of your hormones on one particular day. The blood test information is useful but not as detailed as the eFHP and gives us a much better picture of how to properly balance your chemistry.
<urn:uuid:b82a347e-5e00-4e52-b749-e21fc4b8cecf>
CC-MAIN-2017-26
http://balancingyourchemistry.com/womens-health/ovarian-cysts.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320263.78/warc/CC-MAIN-20170624133941-20170624153941-00234.warc.gz
en
0.924092
1,073
3.828125
4
Omega-3 fatty acid is key to a healthy diet, but Americans get far too little of it. There are many food sources rich in omega-3; fish, nuts, seeds, etc., but the average American diet is not high in any of those foods. Not eating foods high in omega-3 is the obvious part of the problem though, another factor may actually come from a very unlikely source. Have you ever wondered what the difference between grass fed cows and corn fed cows was? "We've come to think of "corn-fed" as some kind of old-fashioned virtue, which it may well be when you're referring to Midwestern children, but feeding large quantities of corn to cows for the greater part of their lives is a practice neither particularly old nor virtuous. Its chief advantage is that cows fed corn, a compact source of caloric energy, get fat quickly; their flesh also marbles well, giving it a taste and texture American consumers have come to like. Yet this corn-fed meat is demonstrably less healthy for us, since it contains more saturated fat and less omega-3 fatty acids than the meat of animals fed grass. A growing body of research suggests that many of the health problems associated with eating beef are really problems with con-fed beef." The Omnivore's Dilemma by Michael Pollan
<urn:uuid:39ad17e0-59fa-4c30-8b49-6a39e1a93365>
CC-MAIN-2017-26
http://cookingallergyfree.blogspot.com/2009/03/corn-fed-cowsnot-healthy-choice.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320263.78/warc/CC-MAIN-20170624133941-20170624153941-00234.warc.gz
en
0.975568
273
2.765625
3
When you browse Internet, you always write alphanumeric address in the address bar. You write these type of addresses because these are easy to remember. The main point is that any server address is in the form of IP address. Then there arises the need of translating these alphanumeric addresses in the IP addresses. Here comes the role of DNS Server. DNS Server does the task of translating the alphanumeric address into the IP address. This server is required when you write any website address in the address bar or you click on any link. Before the installation of DNS Server, you should have the information about your domain name, the IP address and host name of each server for which you want to provide name resolution. If you want to configure your computer as a DNS Server, then the following conditions should be fulfilled: Your operating system should be configured in the correct way. DNS service is based on the correct configuration of the operating system and its services, in case you are using the Windows Server 2003 family. You have to allocate the available disk space. All the existing disk volumes should use the NTFS file system. If you want to install DNS Server, then follow these steps: Click on the Start, click on Control Panel and then click on the Add or Remove Programs. After this, click on Add/Remove Windows Components. Then open the Windows Components Wizard. In the Components, pick out the Networking Services check box and then click on the Details. In the Subcomponents of Networking Services, pick out the Domain Name System (DNS) check box, click on OK and then click on the Next. If you are prompted, then type the full path of the distribution files and then click on OK. In this way DNS Server will be installed on your system.
<urn:uuid:56b5453d-f11f-4509-bd4e-23837fa7a887>
CC-MAIN-2017-26
http://wireless-network-support.blogspot.ca/2010/01/installation-of-dns-server-in-windows.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320263.78/warc/CC-MAIN-20170624133941-20170624153941-00234.warc.gz
en
0.892056
363
3.21875
3
The Australian population based on July 2013 estimated 22,262,501 peoples with age structure as follows: In Australia, around one in five adults with diabetes do not know they have the condition, a new report from the Australian Bureau of Statistics (ABS) shows. From survey, around four per cent of Australian adults have been told they have diabetes. The survey also showed that obesity was a major risk factor for other chronic health conditions, such as diabetes and liver disease. In 2011–12, obese adults were seven times more likely to have diabetes and four times more likely to have signs of liver disease than normal weight or underweight adults. Eastern teachings should be understood as part of general knowledges to improve human life quality. The challenge is most of these 'energy teachings' are not supported by science yet. Basically, every human being has their own natural metabolism which can be divided into two main processes, physical body and etheric body. Scientist do the research on the physical body side and on the other side eastern teachings are more focus on the non-physical area - meta physics, or also known as 'mind and spirit'. Hopefully, one day we can combine both of these knowledges to improve human life quality in general. Merpati Putih teachings can be accepted easily, it does not belong to any faith, sects or certain belief system. The core practice is the combination of physical and etheric body energy development. Immediate and visible results. The method can be explained in such away as common sense, not a "magic" thing. Merpati Putih, is respectfully supported and utilised by Indonesia's army special forses (Kopasus) and police special forces (Dansus88). The programs focuses on Object Detection and Vibration Awareness courses. If you watch this video or most Merpati Putih videos on youtube you will see MP students shows breaking the metals stuff. Breaking stuff is not Merpati Putih goal. It is only our tools to measure the student inner power / energy development level.
<urn:uuid:a5567677-3866-488a-9afb-ca486638edbf>
CC-MAIN-2017-26
http://www.merpatiputih.com.au/blog/why-merpati-putih/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320869.68/warc/CC-MAIN-20170626221252-20170627001252-00474.warc.gz
en
0.9503
423
2.703125
3
Arts & Crafts Submitted by: masamom Create a refreshing watermelon slice, which can be used as decoration for summer parties. 24 - 60 months 1 - 8 tots - Paper plate - Green construction paper - Washable red paint - Washable black paint - Glue stick - Cotton swabs - Cut a paper plate in half. - Paint paper plate half red. Allow to dry at least 20 minutes. - While paint dries, tear green construction paper into small pieces. - Once red paint is dry, glue torn green paper around edge of plate to create watermelon rind. - Dip cotton swab in black paint. Dot cotton swab on red to create watermelon seeds. - Let dry completely. - Cognitive development » Approaches to learning » Cooperation - Fine motor skills » In-hand manipulation
<urn:uuid:2765e9d7-05ab-436f-8e3b-61ade5de6e67>
CC-MAIN-2017-26
http://zuzutot.com/activity/6951/wacky+watermelon
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320869.68/warc/CC-MAIN-20170626221252-20170627001252-00474.warc.gz
en
0.718761
185
2.78125
3
Sunday, July 8, 2012 We’ve gone on at great lengths discussing the dangers of genetic modification. Monsanto’s GMO corn has been linked to weight gain and organ function disruption, while GMO crops and pesticides destroy our farmland and environment. According to the Alliance of Natural Health, the grandchildren of rats fed GMO corn were born sterile. GMO is just one of those things to avoid, but with our own government in bed with Monsanto, it’s not easily done. Monsanto has recently launched a proverbial war against the open labeling of genetically modified foods, and only through activism and awareness can it be overcome. The People Versus GMO In February of this year, Vermont contemplated the Right to Know Genetically Engineered Food Act. The proposed bill prohibits GMO food producers from using keywords like “natural,” “naturally made,” “naturally grown,” and “all natural” to describe GMO ingredients and products. In the same month, the National Conference of State Legislatures reported that nearly 20 states were considering similar programs. Public surveys and studies also show a whopping 90 percent of the U.S. in favor of such practices. In theory, this should make California’s GMO labeling initiative, which would require all foods within the state made with GM ingredients to carry a label stating so, a shoo-in. But let’s not get so hasty. Leaders in the disinformation campaign launched against the labeling initiative cry out that it would be—like the infamous Proposition 65, “The Safe Drinking Water and Toxic Enforcement Act of 1986”—a way for bounty-hunting trial lawyers to file suits against even natural food companies for supposedly selling products containing undisclosed GMOs. Of course, GMO’s ally StopCostlyFoodLabeling.com receives funding from the Council for Biotechnology Information. It should be no surprise that the likes of Monsanto and Dow count themselves members of the said organization. More Efficient than Prop 65 James C. Cooper, PhD in economics from Emory University, dismisses the comparison between California’s initiative and Proposition 65. In his report, he delineates the key differences between the two programs: - The Label GMO initiative allows producers 7 years to reduce GMO exposure of products from under 5 percent to zero. - Producers are immune from suit if they can provide a statement from their supplier or an independent organization that the food is certified organic and/or GMO-free. - Producers have 30 days to rectify violations with no liability. - Whereas plaintiffs keep “bounties” of 25 percent of civil penalties in Prop 65, the labeling initiative provides none. It hasn’t been long since the Food and Drug Administration deleted 1 million signatures and comments from the “Just Label It” campaign calling for the labeling of GM foods, even after 55 politicians offered support for the initiative. It only shows that the fight against GMOs won’t be easy (or cheap). Still, it’s worth fighting. Originally appeared at Natural Society.
<urn:uuid:86522e01-88fa-41ae-946c-e47b77f6490b>
CC-MAIN-2017-26
https://www.infowars.com/monsanto-launches-massive-campaign-to-stop-gmo-labeling/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320869.68/warc/CC-MAIN-20170626221252-20170627001252-00474.warc.gz
en
0.937617
637
2.546875
3
'Ember days (corruption from Lat. Quatuor Tempora, four times) are the days at the beginning of the seasons ordered by the Church as days of fast and abstinence. They were definitely arranged and prescribed for the entire Church by Pope Gregory VII (1073-1085) for the Wednesday, Friday, and Saturday after 13 December (S. Lucia), after Ash Wednesday, after Whitsunday, and after 14 September (Exaltation of the Cross). The purpose of their introduction, besides the general one intended by all prayer and fasting, was to thank God for the gifts of nature, to teach men to make use of them in moderation, and to assist the needy. The immediate occasion was the practice of the heathens of Rome. The Romans were originally given to agriculture, and their native gods belonged to the same class. At the beginning of the time for seeding and harvesting religious ceremonies were performed to implore the help of their deities: in June for a bountiful harvest, in September for a rich vintage, and in December for the seeding; hence their feriae sementivae, feriae messis, and feri vindimiales. The Church, when converting heathen nations, has always tried to sanctify any practices which could be utilized for a good purpose. At first the Church in Rome had fasts in June, September, and December; the exact days were not fixed but were announced by the priests. The "Liber Pontificalis" ascribes to Pope Callistus (217-222) a law ordering: the fast, but probably it is older. Leo the Great (440-461) considers it an Apostolic institution. When the fourth season was added cannot be ascertained, but Gelasius (492-496) speaks of all four. This pope also permitted the conferring of priesthood and deaconship on the Saturdays of ember week--these were formerly given only at Easter. Before Gelasius the ember days were known only in Rome, but after his time their observance spread. They were brought into England by St. Augustine; into Gaul and Germany by the Carlovingians. Spain adopted them with the Roman Liturgy in the eleventh century. They were introduced by St. Charles Borromeo into Milan. The Eastern Church does not know them. The present Roman Missal, in the formulary for the Ember days, retains in part the old practice of lessons from Scripture in addition to the ordinary two: for the Wednesdays three, for the Saturdays six, and seven for the Saturday in December. Some of these lessons contain promises of a bountiful harvest for those that serve God.'
<urn:uuid:a90bf4f7-53c0-49fc-9949-2b241ff45966>
CC-MAIN-2017-26
http://casasantalidia.blogspot.com/2012/05/whit-embertide.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00554.warc.gz
en
0.976468
549
3.015625
3
What is a priority species? A priority species is one that is particularly threatened in terms of the species' long-term survival. All priority species have been selected through rigorous scientific analysis, and most represent a broad array of other birds and wildlife that use the same habitat type. Conservation focused on priority species is almost always focused on priority habitats as well. Audubon has identified 32 priority-bird species within the Atlantic Flyway, 6 of which call Pickering Creek home for a portion of the year. Little Blue Heron
<urn:uuid:c5124bb8-c76c-4e93-967c-2cfef115b352>
CC-MAIN-2017-26
http://pickeringcreek.audubon.org/conservation-0/priority-bird-species-pickering-creek
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00554.warc.gz
en
0.910602
107
3.34375
3
Increase efficiency by reducing hull resistance There are several types of resistance (or drag) when a yacht moves through waves. The total resistance is made up of four components that vary according to the speed of the vessel. At lower speeds, frictional resistance comprises more than 75 per cent of the total picture, with wave making and eddy resistance comprising most of the remainder. Wave making is the curl size and characteristics of the water as it leaves the hull, while eddies are low pressure swirls or vortices appearing behind protrusions in the hull below the waterline. Air resistance makes up the last part of the picture, but in most slow-speed cases it rarely rises above three per cent. At higher speeds the picture changes. At a displacement hulls maximum speed, wave making is the largest component of the hull drag and may be up to 80 per cent of the total. Frictional drag has decreased, but eddy making and air resistance are higher. When a boat is on plane, the hull is supported by dynamic lift. In this mode the struts, shafts, and propellers may comprise up to 70 per cent of the total resistance, with the hull and air resistance making up the remainder. Because wave making drag is reduced for long thin structures, hulls that have longer waterlines as a percentage of their overall length (such as axe or reverse bowed vessels) will go faster with less power than will shorter, beamier hulls with flared bows. Plus, of course, the longer a hull is, the greater its top speed in the displacement mode according to Froudes law which states that displacement speed is directly proportional to the square root of the waterline length, or (1.34 x vLWL). Because of overhangs, this number if often expanded to 1.5 x vLWL. The only time a displacement yacht will exceed this figure is when it is powering down the back of a wave and gravity might temporarily accelerate it. When a vessels bow drives into a head sea it can do two things: go through the wave or over it. Flared bows are designed to go over the wave, but in order to do so, they need additional engine power to first drive the yacht up the face of the wave and then over it. Wave piercing bows tend to go through the wave and usually have the main deck located high enough that the crest of the wave will not climb upwards onto the deck. Originally published: MegaYachts volume 14: Concept Design Construction (2013)
<urn:uuid:e039f473-a583-40d0-9b11-56588c552364>
CC-MAIN-2017-26
http://www.boatinternational.com/yachts/yacht-design/increase-efficiency-by-reducing-hull-resistance--635
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00554.warc.gz
en
0.934951
519
2.984375
3
First patient in diabetes trial no longer needs insulin therapy. In a new clinical trial to observe a new method of injecting islet cells into a patient with Type 1 diabetes, doctors from the University of Miami’s Diabetes Research Institute have confirmed that their first trial patient no longer needs insulin therapy. Wendy Peacock, their first patient, has been giving herself insulin injections and following a strict daily schedule to take care of her diabetes since she was diagnosed with Type 1 diabetes at 17. Now 43, Peacock has undergone the surgery in this new trial and no longer needs injections because her body is producing insulin naturally. Since the minimally-invasive procedure in August 2015, she also no longer has the dietary restrictions that coincide with having Type 1 diabetes. Type 1 diabetes is caused by the body’s own immune system, which is supposed to attack harmful bacteria and viruses, and instead attacks insulin-producing cells, or islet cells, that work in the pancreas. Once too many islet cells are destroyed, the body will produce little to no insulin, which is needed to decrease the amount of sugar in the body’s bloodstream. The insulin allows the sugar to enter into cells rather than stay in the bloodstream, but if all of the sugar remains in the bloodstream, it can cause life-threatening complications. In this new diabetes trial, doctors have formed a new method of injecting the islet cells into the body. Instead of injecting them into the liver, which has been done in previous experiments and proven effective for a certain period of time, the doctors inject the cells into the omentum to create a more permanent solution. The omentum is a tissue that wraps around the abdominal organs, and the cells are delivered into this tissue with a biodegradable scaffolding. The scaffold is produced by mixing the patient’s own blood with thrombin, which is a chemical used in surgeries to control bleeding. Thrombin and the blood form a gel-like substance that sticks to the omentum and keeps the islet cells, normally at risk for being rejected or dying, in place. As the gel absorbs into the body, the islets receive oxygen and nutrients necessary for them to start doing their job of producing insulin. Anti-rejection therapy is used with all of the current patients for this trial so that the body accepts the islets in the long term. This clinical trial is one part of a broader goal to create a BioHub, which is a bioengineered “mini” organ that is meant to mimic the functions of the body’s pancreas in order to effectively cure diabetes. While this is still not a cure, this is a huge step in the right direction for those living with Type 1 diabetes. Dr. Camillo Ricordi, the director of the DRI and a professor of biomedical engineering, microbiology, and immunology at the University of Miami, said of Peacock, “She is like a nondiabetic person but she requires antirejection drugs. When you can do it without antisuppression, then it’s a cure.” As for Peacock, she is still processing what life without diabetes is like. She said, “As any type 1 knows, you live on a very structured schedule. I do a mental checklist every day in my head — glucose tabs, food, glucometer, etc. — and then I stop and say, ‘WOW! I don’t have to plan that anymore.’ It’s surreal to me. I’m still processing the fact that I’m not taking insulin anymore.” What do you think about this new trial’s results? Comment your thoughts below and share this article! This article (First Patient In Diabetes Trial Is Now Diabetes-Free) is free and open source. You have permission to republish this article under a Creative Commons license with attribution to the author and TrueActivist.com
<urn:uuid:83b7b2cd-52f3-4849-b0de-f4554da6ca1c>
CC-MAIN-2017-26
http://www.trueactivist.com/first-patient-in-diabetes-trial-is-now-diabetes-free/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00554.warc.gz
en
0.938354
831
3
3
Meaning of double time - the fastest rate of marching troops, a slow jog in which 180 paces, each of 3 ft. (0.9 m), are taken in a minute. - a slow run by troops in step. - a rate of overtime pay that is twice the regular wage rate. Pronunciation: (dub'ul tīm"), [key] — v., -timed, -tim•ing. - to cause to move in double time: Double-time the troops to the mess hall. - to move in double-time. - double time (Thesaurus)
<urn:uuid:fe3e7020-6dc8-41d8-adf2-f60f6b47af5a>
CC-MAIN-2017-26
https://www.infoplease.com/dictionary/doubletime
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00554.warc.gz
en
0.866257
133
2.53125
3
There are three main types of passes in the game of volleyball: bump, set and spike. Each team is allowed a maximum of three hits before they have to send the ball back over the net. A team will typically try to fulfil the passing strategy of bump-set-spike, although a block is an additional move in volleyball also used alongside the others as a defensive mechanism. The bump is the basic pass in volleyball. It is used when receiving a serve or reacting to an opponent’s attack. The player should be holding his arms away from the body at a 90-degree angle with his hands together. Knees should be bent. The ball comes in contact with the lower forearms just above the wrist. After contact, the arms should point toward the target. Over-swinging the arms is a common mistake when perfecting the bump, as is contacting the ball with the wrists or hands. The first bump of a volley should be aimed at a setter so he can "set" up the volleyball for the spike. A set is typically a front-line pass, or a move done by players who are positioned near the net. Knees should be bent and hands extended 4 to 6 inches above the head. The fingers should be spread to imitate the shape of the ball; make a triangle with the thumbs and first fingers. The ball will make contact with the fingers right above the hairline. Then the arms are extended in the direction the player wishes the ball to go. Freeze the motion when the arms are fully extended. This pass must be done with coordination to avoid “holding” the ball. The ball cannot come to rest at any point during a volley. The spike is an intense move in volleyball involving a player who is near the net. The purpose is to send the ball over the net and toward the floor so the opposing team has no time to save it before it touches the ground. The player should approach with two preparatory steps before a jump. The jump is straight up; the elbow should be raised level with the shoulder. The forearm should be up with the hand near the head in an open and relaxed position. Contact with the volleyball is made with the palm of the hand. The elbow should swing forward and the player should apply force. Follow-through with the motion is critical to strength and speed. It is illegal to hit the ball with a closed fist, and players should avoid a "shot-put" or "tennis serve" action, according to Volleyball World Wide. A block is a defensive move used when the other team attempts to spike the ball. The player must be right next to the net and jump at the same time—or moments after—the opposing player, to successfully block a spike. Hands are used to extend the height of the net, and fingers should be in a spread about the width of the ball. Arms are locked and when possible, players should try to reach slightly over the net with their hands to send the ball back on the opponents’ side. Touching the net is illegal and will end the volley. When blocking, it is essential that the body be square with the net; players positioned along the net often stand with their hands up and ready to block an attack.
<urn:uuid:133154e1-55d8-47c0-a481-507085190ec4>
CC-MAIN-2017-26
http://www.ehow.co.uk/list_6745901_types-passes-volleyball_.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323680.18/warc/CC-MAIN-20170628120308-20170628140308-00634.warc.gz
en
0.959781
666
3.765625
4
Los Angeles DNA Evidence Lawyer Television crime dramas would have us believe that every criminal case is solved through the use of DNA evidence. In real life, DNA, while helpful to exonerate or convict a defendant at times, is rarely the deciding factor in most criminal cases. DNA evidence is not absolute. A slow, cumbersome process, DNA testing's accuracy is dependent upon the reliability of those conducting the test and the procedures used in the testing, meaning a skilled defense attorney can often times bring the validity of a DNA test into question during the trial as a defense strategy. Just What is DNA and How is it Used in Providing Evidence of a Crime? DNA is the acronym that stands for Deoxyribonucleic Acid. It is a substance which exists in the individual cells of every living organism, including humans. Seen as a strand when examined under a microscope, DNA carries the chemical code for the make-up of a person. Scientists can pinpoint the codes for such things as eye color, hair color, and other genetic traits, making DNA testing a handy piece of evidence for prosecutors and defense attorneys alike to use in the prosecution or defense of clients. In the case of DNA chemical testing, the test focuses on a particular section of DNA, the short tandem repeat (STR) because this particular section of a DNA strand varies widely from person to person, making it easy to test. To a layperson, DNA looks like a ladder that is twisted over and over again with each crossbar of the ladder representing something called a locus. Each crossbar or locus have something called an allele on it which contains a single genetic trait (say the trait for brown eyes). The DNA testing that criminal investigators use doesn't test what an actual alleles does, but instead the test looks for a comparison of a particular allele and compares a sampling from a crime scene with that of a suspect to determine a match or not. The more loci that are tested, the more accurate the DNA chemical test is. Most crime lab tests for 18 to 19 matching loci among a sample taken from a crime scene and a reference sample taken from a suspect to consider the samples a match. Challenges to DNA Evidence that Defense Attorneys Might Use to Defend your Criminal Charge Defenses that are typically used against a DNA test during a criminal trial are those that challenge the process used in the collection of the DNA sample from a crime scene and the chain of custody during the time the sample was transported to the lab. In addition, a defense attorney may also challenge the procedures of the lab that did the testing. If DNA is contaminated during any step of the process, the results can be erroneous or ambiguous, particularly with the sample contains DNA from more than one person. Thus, many times DNA evidence is considered to be too controversial to be of use to the prosecution, giving a good defense lawyer more ammunition to protect his or her client. R.J. Manuelian is experienced in Defense of Criminal Charges Based on DNA Evidence If you have been charged with a crime and the prosecution plans to use DNA evidence, you need to hire a defense attorney with experience handling DNA cases. R.J. Manuelian is a Los Angeles criminal defense attorney with the technological knowledge and experience to represent those whose criminal case is based on DNA evidence. He'll carefully examine the evidence, challenge any challengeable aspects of the DNA testing, and provide you with a solid defense strategy for your particular case. Contact R.J. today for a free consultation regarding your DNA case.
<urn:uuid:2cdd0337-15dc-46d9-9c20-18266caafa9c>
CC-MAIN-2017-26
http://www.manuelianlawfirm.com/specific-legal-matters-los-angeles/dna-evidence-lawyer/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323680.18/warc/CC-MAIN-20170628120308-20170628140308-00634.warc.gz
en
0.948976
716
2.734375
3
October 26 is World Obesity Day. As I said in my last post, obesity cannot be taken lightly at all. There are many causes that could lead to it, and there are many solutions. At CODS, our first step is to understand why the patient is obese. It is important to remember, and state here, that most people come to us after they have exhausted a number of options. So it’s imperative that we examine and understand the case thoroughly. Obesity can be caused by hereditary or genetic factors; by hormonal imbalances; or by poor lifestyle choices such as an unhealthy diet and sedentary routines. Obesity can lead to a number of medical conditions such as: Raised pressure in the brain Obstructive sleep apnea Gastro-esophageal reflux disease Irregular menstrual Periods High incidence of infertility in women Decreased sperm count in men Stress urinary incontinence Swelling of the legs Type II diabetes Dyslipaedemia (high cholesterol, triglycerides, LDL ) High uric acid levels (gout ) 20% higher risk of breast and uterine cancer in females and 8% higher risk of prostrate and colon cancer in males Depression and psychosocial exile The good news, though, is that with the medical advances that have been made and the rate at which our knowledge is updated, obese patients can be helped in several ways. At CODS, for example, we have non-surgical methods such as nutritional counselling, exercise and bioentric intragastric balloon. Bariatric surgery also has many variations, and we choose what suits each patient depending on their unique case history. Here’s a wonderful infographic that tells you what you can do to start becoming and stay healthy.
<urn:uuid:f696f936-fb26-4f41-9d28-883dc1a01de8>
CC-MAIN-2017-26
http://blog.codsindia.com/this-is-serious/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323889.3/warc/CC-MAIN-20170629070237-20170629090237-00714.warc.gz
en
0.936736
377
2.671875
3
The following videos serve as an introduction to using OrcaFlex (an OrcaFlex Tutorial) as a tool for static and dynamic mooring analysis of a pontoon barge system in a mild environment in relatively shallow (64 feet) water depth in a bay. A quick explanation of modeling simple multi-component mooring lines is given. It is also explained how pontoons can be modeled with pipe elements permitting hydrodynamic motion response to be simulated in the time domain using Morison Equation analysis entirely within OrcaFlex. Hydrodynamic analysis results are shown for critical mooring line tensions using both static and dynamic mooring analysis options. Wind loads, current loads and wave loads are applied progressively to demonstrate the relative importance of each load component. The comparison of static and dynamic mooring line loads is seen in the above OrcaFlex Tutorial videos produced by Stewart Technology Associates. www.stewart-usa.com
<urn:uuid:411856e1-e9a1-43d2-b69c-e6ccdd0ba005>
CC-MAIN-2017-26
http://stewart-usa.com/portfolio/orcaflex-tutorial-flupsy-mooring-analysis-example/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323889.3/warc/CC-MAIN-20170629070237-20170629090237-00714.warc.gz
en
0.866745
198
2.515625
3
Many eukaryotic proteins that are known or supposed to bind single-stranded RNA contain one or more copies of a putative RNA-binding domain of about 90 amino acids [1,2]. This domain is known as the RNA recognition motif (RRM). This region has been found in the following proteins: ** Heterogeneous nuclear ribonucleoproteins ** - hnRNP A1 (helix destabilizing protein) (twice). - hnRNP A2/B1 (twice). - hnRNP C (C1/C2) (once). - hnRNP E (UP2) (at least once). - hnRNP G (once). ** Small nuclear ribonucleoproteins ** - U1 snRNP 70 Kd (once). - U1 snRNP A (once). - U2 snRNP B'' (once). ** Pre-RNA and mRNA associated proteins ** - Protein synthesis initiation factor 4B (eIF-4B) , a protein essential for the binding of mRNA to ribosomes (once). - Nucleolin (4 times). - Yeast single-stranded nucleic acid-binding protein (gene SSB1) (once). - Yeast protein NSR1 (twice). NSR1 is involved in pre-rRNA processing; it specifically binds nuclear localization sequences. - Poly(A) binding protein (PABP) (4 times). ** Others ** - Drosophila sex determination protein Sex-lethal (Sxl) (twice). - Drosophila sex determination protein Transformer-2 (Tra-2) (once). - Drosophila 'elav' protein (3 times), which is probably involved in the RNA metabolism of neurons. - Human paraneoplastic encephalomyelitis antigen HuD (3 times) , which is highly similar to elav and which may play a role in neuron-specific RNA - Drosophila 'bicoid' protein (once) , a segment-polarity homeobox protein that may also bind to specific mRNAs. - La antigen (once), a protein which may play a role in the transcription of RNA polymerase III. - The 60 Kd Ro protein (once), a putative RNP complex protein. - A maize protein induced by abscisic acid in response to water stress, which seems to be a RNA-binding protein. - Three tobacco proteins, located in the chloroplast , which may be involved in splicing and/or processing of chloroplast RNAs (twice). - X16 , a mammalian protein which may be involved in RNA processing in relation with cellular proliferation and/or maturation. - Insulin-induced growth response protein Cl-4 from rat (twice). - Nucleolysins TIA-1 and TIAR (3 times) which possesses nucleolytic activity against cytotoxic lymphocyte target cells. may be involved in - Yeast RNA15 protein, which plays a role in mRNA stability and/or poly-(A) tail length . Inside the RRM there are two regions which are highly conserved. The first one is a hydrophobic segment of six residues (which is called the RNP-2 motif), the second one is an octapeptide motif (which is called RNP-1 or RNP-CS). The position of both motifs in the domain is shown in the following schematic Minvielle-Sebastia L., Winsor B., Bonneaud N., Lacroute F. Mol. Cell. Biol. 11:3075-3087(1991). PROSITE is copyright. It is produced by the SIB Swiss Institute Bioinformatics. There are no restrictions on its use by non-profit institutions as long as its content is in no way modified. Usage by and for commercial entities requires a license agreement. For information about the licensing scheme send an email to or see: prosite_license.html.
<urn:uuid:90ce32e7-4481-43a9-85fd-a8738b64e92c>
CC-MAIN-2017-26
http://prosite.expasy.org/PDOC00030
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00353.warc.gz
en
0.885097
903
3.328125
3
Expert Tips for "Grade A" Grilling Summer may be the traditional grilling season, but more than half of Americans fire up the barbecue all year-round! Whether you're a Weekend-only Griller or an Every Day Grill Gourmet, beef up your food safety with these helpful, hot-off-the-grill tips. Let Leftovers Go While food safety experts say grilled foods have a refrigerator life of only three to four days, many grillers keep leftovers for up to a week or longer. But keeping grilled foods for too long can affect both taste and quality. Make sure your grilled leftovers are as safe as they are delicious by refrigerating foods in shallow containers (no more than 3 inches deep) and writing the date on top to help you keep track. Also be sure to reheat foods to an internal temperature of 165°F before serving a second time around use a food thermometer to check. Clean Your Machine According to a recent survey1, gas grills are America's favorite grill of choice, with 67 percent of the vote. Charcoal grills follow second (46 percent) and a small percentage prefer smokers (10 percent) or outdoor electric grills (4 percent). Before you fuel the fire or rake the coals, follow manufacturer's instructions to clean your grill. Develop a Taste for Safety According to a recent survey conducted by the Academy of Nutrition and Dietetics2, 31 percent of people say the most common thing that causes food poisoning is undercooking or not cooking to proper temperatures, but only 23 percent of Americans use a food thermometer to check the doneness of their hamburgers, chicken breasts and other grilled favorites! Cooking to proper internal temperatures not only helps ensure the taste of your grilled dishes, it also helps ensure their safety. Next time you grill, grab a food thermometer to make sure your culinary creations are delicious, nutritious and done. Cut Condiment Bacteria Data shows that mayonnaise is America's top selling condiment, followed by salsa, ketchup and mustard3. Whatever condiment strikes your fancy, follow these food safety tips: Always marinate meat in the refrigerator (never on the counter or outside by the grill), and bring leftover sauces to a boil before reusing them on cooked meats to prevent cross-contamination. Remember condiments should not be left sitting out for more than two hours (one hour in weather above 90°F). It is a smart idea to bring a cooler or keep condiments in a bucket of ice. Keep the Upper Hand The survey conducted by the Academy found that while 77 percent of Americans use different cutting boards for raw meats and ready-to-eat foods, only 9 percent always or usually wash utensils before using them for cooked foods. These grilling shortcuts may save time, but they also can leave you with a case of foodborne illness! Take precautions by washing cutting boards and utensils in hot, soapy water between uses, or use color-coded sets to keep raw meats, seafood and poultry and ready-to-eat foods separate. And always, always wash your hands! Watch the Clock The Academy survey indicated 21 percent of people believe picnic foods can sit out in summer heat for more than two hours without refrigeration. Not true! In temperatures of 90°F or more, the "two hour rule" becomes the "one hour rule." Next time you dine outdoors, keep guests safe by setting out perishable food items in one-hour shifts. After each shift, place uneaten food back in a refrigerator set below 40°F. Or, keep perishable foods on ice to make sure they stay properly chilled. Download: Learn more with the Safe Grilling Guide. 1 2011 Weber GrillWatch Survey 2 2011 Consumer Knowledge of Home Food Safety Practices Survey 3 SymphonyIRI Group
<urn:uuid:631e6870-bdc2-45d1-8baa-e119ce93a3f4>
CC-MAIN-2017-26
http://www.eatright.org/resource/homefoodsafety/safety-tips/outdoor-dining/grilling
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00353.warc.gz
en
0.918692
792
2.625
3
Social Studies Research and Practice Volume 4, Number 3, Winter 2009 TECHNOLOGY INTEGRATION Digital History with Student-Created Multimedia: Understanding Student Perceptions Thomas C. Hammond Meghan McGlinn Manfra North Carolina State University Social studies educators have displayed an interest in student-created multimedia, including digital documentaries. The research community has responded with a small but growing body of studies, but the literature to date has not explored students’ perspectives on these assignments. This study combined classroom observations, document analysis, and student interviews to examine students’ views of technology, the curriculum, and their final products. The findings reveal that students come to technology-based, content-driven assignments with prior conceptions of both the technology and the content. These expectations shape student actions and transform the assignment, in some cases surpassing curricular expectations. Evidence from students’ products, classroom observations, and interview data, however, also suggest that student agency was limited by the classroom reality of mimetic learning. The results of this study have various implica-tions for teacher educators and educational researchers interested in leveraging technology to improve learning. They must acknowledge the dynamic nature of classroom interaction and the impact student choices have on Technological Pedagogical Content Knowledge (TPACK). Technology integration occurs in the operational curriculum, often in unpredictable ways. Based on our study we know that student preconceptions and desires impact the learning goals. By better understanding the role of student agency, teachers can plan for instruction that uses digital history to effectively teach content.
<urn:uuid:de98e263-a835-41bd-b3ff-4349e3495ddd>
CC-MAIN-2017-26
http://www.socstrpr.org/?page_id=904
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00353.warc.gz
en
0.924586
314
2.65625
3
It’s important to practice cold weather safety and to take steps to prevent dangerous falls in winter, but it’s also important to make sure you consider indoor safety in winter. As the temperature drops, take these steps to make sure that you and your loved ones are safe and warm when you’re at home. Fire Safety Tips Make sure you have a working smoke alarm in every room and a carbon monoxide detector on each floor of your home (if you live in a one-story apartment, place it close to the bedrooms). Test all of them at least once a month and change batteries twice a year. Homeowners and landlords are responsible for installing these, but tenants are responsible for maintaining them, including changing batteries. - Any appliance that gives off heat can be a fire hazard. These include space heaters and electric blankets, as well as coffeemakers and toaster ovens. If possible, purchase appliances that come with a timer. This way, they will shut off automatically before they overheat. And check to make sure cords are in good shape—never use any appliance, lamp, or charger that has a frayed or damaged cord. - Plug space heaters and electric blankets directly into a wall outlet, rather than an extension cord or power strip. Don’t plug anything else into the outlet when the heater or blanket is on. - If you use space heaters, turn them off for a few hours every day instead of running them continuously. Be sure to turn them off when you aren’t home, or when children are playing nearby. - Keep anything that might catch fire at least three feet from a space heater. This includes furniture, curtains, and carpeting. And never drape clothes or towels over a space heater to dry them. - Replace electric blankets that are 10 years old or older. And avoid tucking them in at the sides or foot of the bed. Carbon Monoxide Safety Tips Some portable heaters can lead to fire or dangerous levels of carbon monoxide. Carbon monoxide is released when fuel is burned. Never heat your home with a gas range or oven, a charcoal grill, or a space heater that burns oil, kerosene, or propane. Only use portable heaters that are approved for indoor use. - Be sure that an appliance that burns oil or gas (such as a boiler or furnace, stove, hot water heater, or clothes dryer) is properly ventilated. If you are not sure yours is vented correctly or working properly, contact your landlord, or contact your utility company or a licensed professional to inspect it and make any repairs. - If you have a wood-burning fireplace, make sure the chimney is clean. Avoid burning wood that contains resin, such as pine or cedar, which may build up in the chimney and cause fires. (They can also affect breathing and cause asthma attacks.) Always use a screen and be sure the damper is open. - If your carbon monoxide detector goes off, go outside immediately and call 911. Symptoms of carbon monoxide poisoning include vomiting, dizziness, headache, and trouble breathing. Dry Air Safety Tips Warm air holds more moisture than cold air. Although winters in New York are fairly humid because of the moisture from the ocean and rivers, dry air in your home can still cause health problems. - Dry and cold air pulls moisture from your skin (including lips) and nasal passages. To protect skin from cracking (which may lead to infection), use a moisturizing soap when you bathe. After a shower or bath, pat your skin so it’s almost dry and then use a rich lotion (such as Eucerin) or oil to seal in the moisture. Use lotion after you wash your hands, too. (Tip: Corn Huskers Lotion is extremely effective on dry, cracked skin, and it’s oil-free, so your hands won’t be greasy.) - Some heating systems kick up dust, pollen, and other allergens. If your nostrils and sinuses are already irritated from dry or cold air, this can make breathing difficult. It is particularly dangerous for people with asthma. - As your sinuses dry out, you may become prone to sore throats or nose bleeds. And because mucus in your nose traps viruses, dry nostrils can increase your chances of catching a cold, sinus infection, and even the flu. Practice good hygiene to prevent infections. Emergency Cold Weather Information for NYC Residents If you lose heat or hot water: - Call your landlord or your building’s superintendent right away. If the heat isn’t fixed, call 311 (TTY 1-212-504-4115). - Turn on faucets so there’s a steady drip to keep pipes from freezing. (Be sure drains are clear so that water doesn’t back up and cause flooding.) - See if you can stay with friends, family, or neighbors. If you can’t leave home: - Dress warmly. - Hang blankets over doorways and windows. - Never try to heat your home using your oven or stove!
<urn:uuid:9c97a9aa-a83e-4ffb-80f9-ff3bb7258298>
CC-MAIN-2017-26
https://www.vnsny.org/article/home-safety-tips-for-winter/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00353.warc.gz
en
0.909074
1,078
2.71875
3
land owned absolutely; land owned and not subject to any rent, service, or other tenurial right of an overlord. Nunilo and alodia were the children of a Moslem father and a Christian mother. Christianity and Islam in Spain (756-1031) Charles Reginald Haines noun (pl) -lodia (-ˈləʊdɪə), -lods (history) lands held in absolute ownership, free from such obligations as rent or services due to an overlord Also alodium noun (pl) -dia (-dɪə) a variant spelling of allodium . land owned absolutely; land owned and not subject to any rent, service, or other tenurial right of an overlord. Historical Examples A yet more interesting and equally foreign word is not unfrequently used, namely, alodium. Domesday Book and Beyond Frederic William Maitland The suggestion has been made that alodium represents book-land; see Pollock, Land […] free from the tenurial rights of a feudal overlord. . Historical Examples Certain feudal tenants, and I suppose also alodial proprietors, were bound to serve on horseback, equipped with the coat of mail. View of the State of Europe during the Middle Ages, Vol. 3 (of 3) Henry Hallam adjective (of land) held as an […] any chiefly African shrub belonging to the genus Aloe, of the lily family, certain species of which yield a fiber. . . aloes, (used with a singular verb) . Contemporary Examples Amenities are plentiful—from sun block to aloe for the sun, or the complimentary mini bar for your enjoyment. Gal With a Suitcase Jolie Hunt […] - Aloe vera any aloe of the species Aloe vera, the fleshy leaves of which yield a juice used as an emollient ingredient of skin lotions and for treating burns. noun a juice obtained from the leaves of a liliaceous plant, Aloe vera, used as an emollient in skin and hair preparations the juice of this plant, used […]
<urn:uuid:3d6e2cf9-59a8-415d-a7d6-3a4b0052ec9f>
CC-MAIN-2017-26
http://definithing.com/define-dictionary/alodia/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320174.58/warc/CC-MAIN-20170623202724-20170623222724-00434.warc.gz
en
0.903919
454
2.640625
3
U.S. Food and Drug Administration Collaborates with China on Food Safety The U.S. Food and Drug Administration (FDA) announced an Agreement between the Department of Health and Human Services of the United States of America, which includes the FDA, and the General Administration of Quality Supervision, Inspection and Quarantine (AQSIQ) of the People’s Republic of China on the Safety of Food and Feed. Both the U.S. and China realized the importance of their collaboration to ensure the safety of their citizens. Originally signed in 2007, the renewed agreement between the U.S. FDA and China will protect the safety and health of consumers and animals in the U.S. and China to “prevent, intervene, and respond to any safety issues related to food and feed exported from one country to another.” This agreement continues the relationship between the FDA and China for another 5 years. Since the agreement was first signed, the U.S. FDA has worked closely with China to discuss food safety issues. In 2008, the U.S. FDA established offices in China in order to address these concerns. Both the U.S. FDA and China recognize the amount of improvements that can be made with this collaboration. Both sides hope to enhance confidence in safety of food and feed exported from one country to another. The U.S. FDA continues to enhance measures on food safety. The U.S. FDA Food Safety Modernization Act (FSMA) gives FDA more authority to ensure that foods consumed in the U.S. are safe. With this new law, the U.S. FDA is required to double the number of foreign food facility inspections each year from 2011 to 2016. FSMA also gives FDA the authority to collect re-inspection fees and suspend a company’s registration which fails to comply. (Read about the FDA Suspending a Food Facility’s Registration for the First Time). ** Read more about the FDA Food Safety Modernization Act (FSMA)
<urn:uuid:8cd58881-7d10-45de-9e81-2aa856c5a01b>
CC-MAIN-2017-26
https://www.registrarcorp.com/u-s-food-and-drug-administration-collaborates-with-china-on-food-safety/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320174.58/warc/CC-MAIN-20170623202724-20170623222724-00434.warc.gz
en
0.945284
415
2.53125
3
Microsoft's P language, for asynchronous event-driven programming and the IoT (internet of things), has been open-sourced. Geared for embedded systems, device drivers, and distributed services, P is a domain-specific language the compiles to and interoperates with C, which itself has been commonly leveraged in embedded systems and the IoT. "The goal of P is to provide language primitives to succinctly and precisely capture protocols that are inherent to communication among components," said Ethan Jackson and Shaz Qadeer of Microsoft, in a tutorial on the language. With P, modeling and programming are melded into a single activity. "Not only can a P program be compiled into executable code, but it can also be validated using systematic testing," according to the language's documentation on GitHub. "P has been used to implement and validate the USB device driver stack that ships with Microsoft Windows 8 and Windows Phone." Microsoft has described P as offering "safe" event-driven programming. In their tutorial, Jackson and Qadeer say P programs have a computational model that features state machines communicating via messages, an approach commonly used in embedded, networked, and distributed systems. Each state machine has an input queue, states, transitions, event handlers, and machine-local store for a variables collection. State machines run concurrently, with each executing an event loop that de-queues a message from the input queue. The state machine also examines the local store, sends messages between machines, and can create new machines. "In P, a send operation is non-blocking; the message is simply executed into the input queue of the target machine." A program features a collection of event and machine declarations. Microsoft also offers P#, an extension to C# that targets asynchronous programming, as open source. And in June, Microsoft open-sourced Checked C, a modified version of C that adds new syntax and typing to the C language, with the intent of improving safety in C.
<urn:uuid:2696277a-e0d6-4699-9527-6b81beb761bb>
CC-MAIN-2017-26
https://www.techworld.com.au/article/608591/microsoft-open-sources-p-language-iot/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320174.58/warc/CC-MAIN-20170623202724-20170623222724-00434.warc.gz
en
0.93725
406
2.75
3
Mechanical separations comprise the operations in which different phases are parted from one Three methods specific to solid-solid separation are screening, Unit operations. Mineral processing can involve four sizing separation of particle sizes by screening or and dewatering solid/liquid separation. H-Screening Separation is engaged in sales, service, The efficient solid-liquid separation process accomplish by linear motion shale shaker, The open face should be checked to determine if adequate screening of waste is manager with an operations manual that operation of solid waste Centrifugal Separator Solid Waste Separation Food Waste Separation has been thoroughly tested and in the field in operation since (send for copy of Mineral Processing Design and Operation An Introduction. solidliquid separation, Chapter 11 Screening. 293 Manure Liquid-solid Separation Factors That Determine System For mechanical screening The simplest method for liquid-solid separation is gravity settling in Here are some common separation methods RECOMMENDED LESSONS Separating Mixtures This is a more common method of separating an insoluble solid from a liquid. solid liquid separation principles of industrial filtration solid oxide fuel cell technology principles performance and operations Liquid-solid separation involves the separation of two phases, solid and liquid, from a suspension. Separation operations in relation to pressure. THE PLACE OF THE TROMMEL IN RESOURCE RECOVERY The purpose of any screening operation is separating In solid waste processing, Solid-Liquid Separation of Animal Manure and Wastewater nique for solid-liquid separation uses chemicals to liquid separation systems for your operation, Video embedded Size separation is a unit operation that involves portions by means of screening surfaces. Size separation is separation of dry solid Unit Operation of Chemical Engineering Suspension of Solid Particles Dispersion Operations Agitator Operation of Chemical Engineering Solutions Manure Separators by fine double screening or standard is designed to mate with flush operations and provide separation of waste solids without For Better Solid-Liquid Separation. HOME; Compared to the high investment and operation cost of pressure This dewatering screen unit is an alternative to the Uniform solid-phase extraction procedure for toxicological drug screening in serum drug screening, a mixed-mode solid-phase the next operation. Liquid Solid Separation; Screening Water Effluent The Liquid Solid Separator can process up to 100,000 Our range of separation equipment. Check Screening Solids Separation of Animal Screening separators typically remove less than 25 percent of the 1997. Solid Separation of Animal Manure for Odor Control and Shanghai ZME Company © 2000-2015 Copyrights. sitemap
<urn:uuid:22bd3a36-f8bc-4a11-9e6b-340ac3b25795>
CC-MAIN-2017-26
http://bluegrassmd.us/12566-operation-of-separation-solid-solid-screening/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320264.42/warc/CC-MAIN-20170624152159-20170624172159-00514.warc.gz
en
0.851524
546
2.640625
3
"One common misconception is that individual humans may carry 'disease-causing' genes, such as a gene for cancer," explains James Erickson, a biology professor at Texas A&M University. "All humans have the same genes, but individual genes have different forms, called alleles, some of which may predispose an individual to a disease." "Studying the common fruit fly – Drosophilia melanogaster -- lets us conduct more sophisticated experiments than can be undertaken in humans. These simple organisms can be grown cheaply in test tubes, fed on yeast, corn meal and molasses, yet their embryos, which can be seen with the naked eye, undergo many of the same developmental processes as larger creatures. Thus, they can serve as models, allowing us to observe details we can't see in more complex animals." To understand cellular differentiation, Erickson and his graduate students have been researching how fly embryos become male or female, a process that occurs over a 30-minute period early in their development and which is similar to the differentiation process for different types of cells, mirroring, for example, the way a liver cell becomes different from a blood cell. Erickson cautions that there is no direct connection between sexual development in flies and that of humans, but the logic driving their cellular and molecular processes is the same. A paper by Erickson and postdoctoral student Frank Avila detailing their work on such processes has been published in this month's issue of Current Biology, a leading biology journal. Human females have two X chromosomes in every cell, while human males have an X and a Y chromosome. "Just as in mammals, flies have two 'sex' chromosomes, a X and a Y" he explains. "However, in the fly, unlike in humans, the Y chromosome does not influence sex. Instead, two X chromosomes signal the fly to be female, and one X chromosome means it will be male." A chromosome is a single DNA molecule that may contain different units of inheritance called genes, along with proteins that help to activate these genes under certain conditions. Even though it is the presence or absence of the human Y chromosome that directs sex development, human females still need to determine how many X chromosomes they have in each cell. They do this to ensure that similar amounts of the proteins encoded on the X chromosomes are produced in each sex. Failure to properly count X chromosomes is lethal to embryos of mammals and flies. That's why biologists want to understand the process of "chromosome counting." Early in his career, Erickson was part of the research team that identified the genes involved in counting Drosophilia sex chromosomes. Now, he and Avila have made another breakthrough, identifying a signaling pathway outside the cell that helps trigger a cascade of proteins to ensure embryos remain either male or female once their sex has been determined, as well as help in the chromosome-counting process and in regulating other crucial cell activities. "This signaling process is not unique to embryonic sex differentiation, but occurs in hundreds of genes throughout the body, in flies and in higher animals, too," Avila says. "Our work sheds light on signal transmission in humans." Erickson points out that flies have evolved along with humans and that the two species are "close." Although he is quick to point out that the group's research has no short-term practical application, he believes down the road it has important implications for human health. "Scientists have been trying to understand how the sex of mosquitoes is determined, with an eye to eradicating those which carry diseases," he says. "Our research on fruit flies may help in this quest." "Additionally, many human diseases are linked to genes carried on the X chromosome. That's why women do not suffer in the same numbers as men from such ailments as color blindness or hemophilia, since their double dose of X genetic material helps compensate for 'defective' genes on one of their chromosomes. Men, with just one X chromosome, have less protection. Understanding the role of the X chromosome and the mechanism of chromosome counting in fruit flies may help shed light on these same features in humans." Besides potentially shedding light on human genetic maladies, Erickson and Avila say their work is just plain interesting. "After all," says Erickson, "fruit flies share the same life cycle as butterflies – they're just not as pretty." Judith White | EurekAlert! How brains surrender to sleep 23.06.2017 | IMP - Forschungsinstitut für Molekulare Pathologie GmbH A new technique isolates neuronal activity during memory consolidation 22.06.2017 | Spanish National Research Council (CSIC) An international team of scientists has proposed a new multi-disciplinary approach in which an array of new technologies will allow us to map biodiversity and the risks that wildlife is facing at the scale of whole landscapes. The findings are published in Nature Ecology and Evolution. This international research is led by the Kunming Institute of Zoology from China, University of East Anglia, University of Leicester and the Leibniz Institute for Zoo and Wildlife Research. Using a combination of satellite and ground data, the team proposes that it is now possible to map biodiversity with an accuracy that has not been previously... Heatwaves in the Arctic, longer periods of vegetation in Europe, severe floods in West Africa – starting in 2021, scientists want to explore the emissions of the greenhouse gas methane with the German-French satellite MERLIN. This is made possible by a new robust laser system of the Fraunhofer Institute for Laser Technology ILT in Aachen, which achieves unprecedented measurement accuracy. Methane is primarily the result of the decomposition of organic matter. The gas has a 25 times greater warming potential than carbon dioxide, but is not as... Hydrogen is regarded as the energy source of the future: It is produced with solar power and can be used to generate heat and electricity in fuel cells. Empa researchers have now succeeded in decoding the movement of hydrogen ions in crystals – a key step towards more efficient energy conversion in the hydrogen industry of tomorrow. As charge carriers, electrons and ions play the leading role in electrochemical energy storage devices and converters such as batteries and fuel cells. Proton... Scientists from the Excellence Cluster Universe at the Ludwig-Maximilians-Universität Munich have establised "Cosmowebportal", a unique data centre for cosmological simulations located at the Leibniz Supercomputing Centre (LRZ) of the Bavarian Academy of Sciences. The complete results of a series of large hydrodynamical cosmological simulations are available, with data volumes typically exceeding several hundred terabytes. Scientists worldwide can interactively explore these complex simulations via a web interface and directly access the results. With current telescopes, scientists can observe our Universe’s galaxies and galaxy clusters and their distribution along an invisible cosmic web. From the... Temperature measurements possible even on the smallest scale / Molecular ruby for use in material sciences, biology, and medicine Chemists at Johannes Gutenberg University Mainz (JGU) in cooperation with researchers of the German Federal Institute for Materials Research and Testing (BAM)... 19.06.2017 | Event News 13.06.2017 | Event News 13.06.2017 | Event News 23.06.2017 | Physics and Astronomy 23.06.2017 | Physics and Astronomy 23.06.2017 | Information Technology
<urn:uuid:d3eabb9e-9269-432f-a59f-fabf95c9d0c3>
CC-MAIN-2017-26
http://www.innovations-report.com/html/reports/life-sciences/report-81832.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320489.26/warc/CC-MAIN-20170625101427-20170625121427-00594.warc.gz
en
0.936371
1,550
4.03125
4
Washington, August 22 (ANI): In a new research, a team of scientists is aiming to develop smart material systems inspired by the biology of fish. The remarkable ability of fish to maneuver in tight places, or to hover in one area efficiently, or to accelerate in a seemingly effortless fashion has researchers wondering if they can create smarter materials that emulate the biology of these vertebrates. With an eye towards homeland defense needs, engineers have also noted that fish through neuromasts or 'hairs' in the lateral line are able to sense very small changes in their watery environment that allows them to detect and track prey and to form hydrodynamic images of the environment. Michael Philen, assistant professor of aerospace and ocean engineering (AOE) at Virginia Tech, has pulled together a team of researchers to study these abilities and hopefully develop biologically inspired material systems that have hierarchically structured sensing, actuation, and intelligent control. This research will lead to state-of-the-art advanced materials that can intelligently sense and actuate a network of distributed robust sensors and actuators. As a post doctoral researcher at Penn State, Philen spent time on a three-year project with the Defense Army Research Projects Agency (DARPA) to develop a new structure/actuation system inspired by the mechanical, chemical, and electrical properties of plants. Philen's proposal to the National Science Foundation's (NSF) Emerging Frontiers in Research and Innovation program to study fish to create smarter materials has received 1.95 million dollars in funding. Philen's co-principal investigators are Harry Dorn, professor of chemistry, and Don Leo, associate dean of engineering, both at Virginia Tech. George Lauder, a professor of biology at Harvard, and James Tangorra, an assistant professor of mechanical engineering and mechanics at Drexel, round out the team. Working together, the team will develop distributed sensors and actuators using nanotechnology, advanced composite technology, and smart polymeric materials for understanding the organization and structure of the control systems fish use for sensing and maneuvering. With the inclusion of Harvard University, the research team also plans to develop a traveling exhibit on robotic fish that showcases the biology of aquatic propulsion, new actuator and sensing technologies and how these can be integrated to design a robotic fish. The team of researchers plans to create a robotic fish-like underwater vehicle by integrating their biological investigations of the fish with engineering knowledge about sensors and actuators. "We view this as an exciting opportunity to create a transformative leap in the development of new biologically inspired material systems," Philen said. (ANI)
<urn:uuid:027d43cf-9530-47b0-86a0-4f74368aa0a6>
CC-MAIN-2017-26
http://www.oneindia.com/2009/08/22/futuresmart-materials-may-mimic-fish-biology.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320489.26/warc/CC-MAIN-20170625101427-20170625121427-00594.warc.gz
en
0.927358
537
3.09375
3
What is the safe level of confidence a person should have? Self Confidence is very important for a person to take a meaningful stand in one’s life .It is good to be Self confident but, being over confident and under confident both are detrimental. Read full article at www.platinumlearningmate.com Each one of us needs to find a way to express himself. Expressing ourselves has a lot to do with our overall well being. Pent up feelings and unexpressed thoughts start becoming blockages in the path of our progress as well as our mental peace. When we are not able to express ourselves, we feel suffocated .We need to find ways in which we can express ourselves in a meaningful and positive manner. Outlet is very much required for our feelings and thoughts. Once we express ourselves we are at peace with ourselves and we feel very light within .This opens path for optimum use of our capabilities. Continue Reading on our website platinumlearningmate.com Minimum Browser Requirement IE 11 , Mozilla Firefox and Chrome
<urn:uuid:b23f302a-7d58-400d-9cc3-96ee1a4d0bb5>
CC-MAIN-2017-26
https://parentspeak.wordpress.com/tag/self-confidence/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320489.26/warc/CC-MAIN-20170625101427-20170625121427-00594.warc.gz
en
0.94649
214
2.703125
3
Drinking carrot juice, sticking with a low-calorie diet and avoiding egg yolks all seem superhealthy. Not so fast. Nutritionists are warning people that these seemingly healthy eating fads aren't as good as they sound, and they want people to stop jumping on the all-or-nothing bandwagon diets, stat. Following are the health fads that the nutritionists wish you didn't do. After a nutrition professor lost 27 pounds eating nothing but convenience store foods — Twinkies, chips and cookies — many people were swayed into believing that a calorie is a calorie, no matter what. "But despite his so-called diet success, not all calories are created equal," said Rania Batayneh, nutritionist and author of "The One One One Diet" ($18, Amazon.com). "Picture this: How will you feel after eating 100 calories worth of jelly beans compared with 100 calories of raspberries and nuts?" Since the jelly beans contain sugar and lack nutrients, they would raise your blood sugar levels and would leave your body weak and un-energized. On the other hand, a handful of raspberries and nuts is packed with fiber, healthy fats, vitamins, minerals, antioxidants and protein, so they can boost your health. Studies found that higher-fat diets resulted in better overall health outcomes than lower-fat diets because eating a diet full of processed fats, which are usually more common in low-fat, low-carb diets, can cause excessive weight gain and increase your risk of developing chronic diseases, said Keith Kantor, CEO of Green Box Foods and co-author of "The Green Box League of Nutritious Justice" ($23, Amazon.com). Contrary to popular opinion, Kantor said, there's no fundamental evidence that saturated fat or cholesterol is to blame for the increase in heart disease or obesity rates. A raw diet does have some great benefits: It can increase your body's natural enzymes and alkalize an acidic system, and it can be detoxifying for the liver. But it's not a perfect diet by any means, said Nicole Glassman, a New York-based holistic nutritionist. A raw diet can be tough on the digestive system, especially for those who have difficulty digesting fats, she said. "It is best to eat a mix of some cooked and uncooked vegetables," Glassman said. "Balance is key." There are some vegetables such as spinach, peppers and asparagus that release nutrients only when heated, so eating a variety is usually the best option. If you want strong, healthy bones, you'll need to get calcium in some shape or form, even if you're lactose intolerant. Leafy greens such as kale, chard and collard greens are loaded with calcium and vitamin D, Glassman said. Vitamin K is also key for absorption of calcium, and foods such as celery, blueberries, raspberries, blackberries, okra, cabbage, broccoli and spinach are loaded with it. Magnesium also enhances calcium absorption, and foods such as chocolate, leafy greens, beans and avocados are a great source, she said. Juicing — or pumping large amounts of fruits and vegetables into your body without much effort — may sound like a fantastic way to get healthy, but it's not very good for you. "When you juice fruits and vegetables, you're missing out on a key nutrient that makes them so filling: fiber," Batayneh said. "Juices are sugar-packed, and without the fiber to help balance blood sugar levels you're left in a tailspin of waning energy levels." Instead of juicing, add a smoothie to your diet for breakfast or for a post-workout snack, Batayneh suggests. This way, you'll get the fruits and vegetables into your diet, but add Greek yogurt into the mix for protein and chia or flax seeds for healthy fats. Although it's good to have a base line for the calories you consume every day, this can be misleading because certain foods that are lower in calories may not be nutritionally dense, Glassman said. "For example, a snack of a bag of air-popped popcorn is lower in calories than a small handful of almonds, but the almonds contain healthy fats and protein, so they will satisfy you longer," she said. Egg white diet While many people shy away from eating whole eggs because of the cholesterol levels associated with them, Glassman said that foods high in cholesterol don't necessarily raise blood cholesterol. "Cholesterol is affected by trans fats and oftentimes by the overconsumption of sugar and white flour products," Glassman said. One large egg has zero trans fats and only 1.5 grams of saturated fat, and it's a good source of protein, vitamin D and choline. "So eat the egg yolks; they contain a lot of nutritional benefits," she said. Those who have celiac disease have to go gluten-free. But it shouldn't be the answer for those looking to lose weight quickly or hoping to improve their overall health, Batayneh said. Instead of cutting out gluten, which can lead to nutritional deficiencies, focus instead on eating whole, intact grains.
<urn:uuid:6e0b7a84-9e94-444c-be0e-842eb8ff0d06>
CC-MAIN-2017-26
http://www.courant.com/health/sc-health-0709-fads-20140711-story.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320679.64/warc/CC-MAIN-20170626050425-20170626070425-00674.warc.gz
en
0.958062
1,076
2.59375
3
This is quite amazing considering that it is just only a small part of some people’s diet. Maybe we should all drink a little more green tea daily. Green tea catechins partially protect DNA from ·OH radical-induced strand breaks and base damage through fast chemical repair of DNA radicals EGCG was found to be the most active of the catechins, with effects seen at micromolar concentrations. Combined fast-reaction chemistry studies support a mechanism of electron transfer (or H-atom transfer) from catechins to ROS-induced radical sites on the DNA. These results support an antioxidant role for catechins in their direct interaction with DNA radicals. Green Tea Catechins These results suggest that multiple binding sites of EGCG are present in DNA and RNA oligomers. Double-stranded DNA (dsDNA) oligomers were detected only as EGCG-bound forms at high temperature, whereas at low temperature both the free and bound forms were detected, suggesting that EGCG protects dsDNA oligomers from dsDNA melting to single-stranded DNA. Because both galloyl and catechol groups of EGCG are essential for DNA binding, both groups seem to hold strands of DNA via their branching structure. These findings reveal for the first time the link between catechins and polynucleotides and will intensify our understanding of the effects of catechins on DNA in terms of cancer prevention. Green Tea & Skin Cancer The oral administration of GTPs in drinking water or the topical application of EGCG prevents UVB-induced skin tumor development in mice, and this prevention is mediated through: (a) the induction of immunoregulatory cytokine interleukin (IL) 12; (b) IL-12-dependent DNA repair following nucleotide excision repair mechanism; (c) the inhibition of UV-induced immunosuppression through IL-12-dependent DNA repair; (d) the inhibition of angiogenic factors; and (e) the stimulation of cytotoxic T cells in a tumor microenvironment. New mechanistic information strongly supports and explains the chemopreventive activity of GTPs against photocarcinogenesis. FLAVANOIDS repair DNA Pulse radiolysis measurements support the mechanism of electron transfer or H· atom transfer from the flavonoids to free radical sites on DNA which result in the fast chemical repair of some of the oxidative damage on DNA resulting from ·OH radical attack. These in vitro assays point to a possible additional role for antioxidants in reducing DNA damage.
<urn:uuid:e38d50c2-8165-46bc-b9c6-be1061ab12ff>
CC-MAIN-2017-26
https://gorillafit.wordpress.com/2011/10/19/green-tea-can-it-repair-dna-and-protect-it/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320679.64/warc/CC-MAIN-20170626050425-20170626070425-00674.warc.gz
en
0.92341
532
2.59375
3
Venture capitalists invest in several projects at a time and most of them invest in large projects worth a few million. Most Venture capitalists get their money from various institutional and pension fund investors. Like other investors, Venture capitalists also go through a process of raising funds. They do this by raising funds from foundations, endowment funds and retirement funds. Venture capitalists then divest these funds into companies that they think will grow to make a profit. Most VCs try to invest in several businesses at a time to limit their risk. Venture capitalists look for big returns on their investments and are usually very selective about the projects in which they invest. Venture capitalists invest other people's money they are very selective about their projects. To ensure maximum returns on their funding, prefer to have stock options in the company they are funding as well as a right to choose one member on the Board of Directors. There are several different types of Venture capitalists. Some of them like to concentrate on providing seed money for a new business venture while others prefer to invest in companies that have already matured and are now in the expansion phase. Venture capitalists are also choosy about the business that they invest in. Some VCs are specific about investing only in technology companies while others don't mind investing in varied companies. Venture capitalists like to remain part of the equation in the operation of the company business. Some venture capitalists like to know about the other sources of funding for a company. In many cases, venture capitalists look at the long-term picture and if the business grows according to the plan, it may receive several rounds of funding. However, business owners need to account for all the funding during the initial talks with Venture capitalists also like to become involved in the business, providing their experience and expertise in the industry. This is, in part, because venture capitalists are investing the money of other people or institutions. To obtain Venture capitalist funding business owners need to show a clear business plan with a clear vision that shows the possibility of the company making a profit.
<urn:uuid:ff7e411d-02a8-460f-a3f9-e2f2ae6b0426>
CC-MAIN-2017-26
http://go4funding.com/Articles/Source-Of-Funding-For-Vcs.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320887.15/warc/CC-MAIN-20170627013832-20170627033832-00034.warc.gz
en
0.95928
447
2.59375
3
Ask the Geriatrician: Persistent Pain Ask the Expert David R. Mehr, MD, MS William C. Allen Professor in Family and Community Medicine University of Missouri School of Medicine Keela A. Herr, PhD, RN, AGSF, FAAN University of Iowa College of Nursing AGS Expert Panel, The Management Of Chronic Pain in Older Persons Persistent pain is pain or discomfort that lasts for a long period of time. The pain can come and go for months or years. Pain can keep people from being happy with life. It can cause depression, disability, and problems with walking and with sleep. Yet, there is good news! There are many treatments and methods that can help. Talk to your healthcare provider about your pain. Telling your healthcare provider about your pain is the only way he or she can know how you feel. Q. Is persistent pain just part of growing old? A. No. Pain is very common in older people but it is not normal or healthy. It should not be ignored or said to be a “part of getting older.” Q. How can I explain my pain to my doctor or health care provider? A. You can use a “pain diary” to help you describe your pain to your healthcare professional. A pain diary is a journal or record of your pain. A pain diary can help your doctor or health care provider find a cause for your pain and a plan of care. Here is what you can write down: - Where it hurts - How often it hurts - How much it hurts - What the pain feels like? (Does it burn? Is it sharp or dull? Does it ache? Does it feel like pins and needles, or does it "shoot" through a part of your body?) - What makes the pain go away? - What makes the pain get worse? - What medicines or treatments have been tried? Do they work? What side effects (if any) they caused. Q. Can I take over-the-counter medicine for pain? A. Ask your healthcare provider. Over-the-counter (no prescription needed) pain medications are safe and helpful for mild-to-moderate pain for a few days. For severe pain or pain that lasts longer than a few days, you should talk to your healthcare provider. If you are already taking prescription medicines you need to be sure that it will be safe to take over-the-counter medications along with your prescription drugs. Q. What type of over-the-counter medicine can I take? A. Acetaminophen (Tylenol, for example) may be the best choice for mild-to-moderate pain caused by muscle or bone conditions, such as osteoarthritis or broken bone. If you take acetaminophen for more than a few days, you should talk to your health care provider. Nonsteroidal anti-inflammatory drugs (NSAIDs) are another type of over-the-counter pain medicine. Aspirin, ibuprofen, or naproxen, are some examples of NSAIDs. NSAIDs should be used very carefully because they may have more side effects in older adults. These medicines may also interact with other health problems and medicines. If you have heart problems or stomach bleeding, you should not use NSAIDs. Be sure to tell your healthcare provider about all of your medications, including any over-the-counter medicines. Q. I am already taking a prescription pain medicine. Can I take another over-the-counter medicine for pain? A. Many medicines should not be taken together. They may have overlapping ingredients, leading to getting too much of a drug. Medicines can also interact with each other or with foods, and cause unpleasant or dangerous side effects. Your healthcare provider can tell you how to take your medicines in a safe way. Be sure to follow the instructions on the bottle label, for both over-the-counter and prescription medicines. If you have any questions, you can also ask the pharmacist at your local drugstore or call your healthcare provider. Q. My health care provider suggests that I take antidepressants for my pain. Does this mean the pain is just in my head? A. No! Research has shown that some antidepressants (medicines used to treat depression) can help ease some types of pain. These medicines can help pain caused by nerve damage. Q. I don’t like the side effects from my pain medicine. What can I do? A. Always talk to your healthcare provider about any side effects. He or she may be able to help you find a different medicine, or make sure you are taking your medicine the right way. Your healthcare professional can help you to find the safest and most effective medicine for your pain. Q. What can I do besides taking medicines? A. There are many things you can do that do not involve taking medicine. The more you know about your pain, the more you can do to control it. There are education programs that can teach you about pain and how to cope with it. Ask your health care provider about programs in your area. Exercise is also extremely helpful. Ask about physical therapy, exercise, or fitness programs. These programs can help make you stronger, improve the way you move your joints and limbs, steady your walking and increase your endurance. Other non-drug treatments may help some people. These treatments include using heat, cold, massage, acupuncture, and transcutaneous electrical nerve stimulation (TENS). Other mental and physical treatments such as relaxation, music and distraction may help as well. It is important to ask your healthcare provider about these non-drug options for your specific problem. Q. What if my pain is not going away? A. Don't give up! Ask your healthcare provider for a referral to a pain management center. Your local hospital may offer patient education programs and support groups for patients and family members. Some persistent pain problems are very complex. You may need a team of specialists to diagnose and manage them. Although you may not get complete relief of all pain, a lot can be done to control or manage most persistent or chronic pain problems. Updated: October 2013 Posted: October 2013 Healthinaging.org gratefully acknowledges the support of Purdue Pharma, L.P. and McNeil Consumer Healthcare. The Health in Aging Foundation and Healthinaging.org maintain complete oversight of this content. No input was provided by any supporting companies.
<urn:uuid:98e9de77-3fb6-4dcf-a6c4-b3482feb3694>
CC-MAIN-2017-26
http://www.healthinaging.org/resources/resource:ask-the-geriatrician-persistent-pain/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320887.15/warc/CC-MAIN-20170627013832-20170627033832-00034.warc.gz
en
0.937738
1,348
2.75
3
Jezails were generally handmade weapons, and consequently they widely varied in their construction. Jezails were seen as very personal weapons, and unlike the typical military weapons of the time which were very plain and utilitarian, jezails tended to be well crafted and were usually intricately decorated. Jezails tended to have very long barrels. Weapons of such length were never common in Europe (with the exception of the Spanish “espingarda” circa 15th century), but was more common in American rifles like the Kentucky Rifle. The American rifles were used for hunting, and tended to be of a smaller caliber (.35 to .45 or so being typical). Jezails were usually designed for warfare, and therefore tended to be of larger calibers than the American rifles, with .50 to .75 caliber and larger being common. Larger calibers were possible because the long length of the typical jezail meant that it was heavier than typical muskets of the time. Jezails typically weighed around 12 to 14 pounds, compared to 9 to 10 pounds for a typical musket. The heavy weight of the jezail allowed the rifle itself to absorb more energy from the round, imparting less recoil to the weapon’s user. Many jezails were smooth bore weapons, but some had their barrels rifled. The rifling, combined with the barrel’s long length, made these weapons very accurate for their time. The firing mechanism was typically either a matchlock or a flintlock. Since flintlock mechanisms were complex and difficult to manufacture, many jezails used the lock mechanism from captured or broken Brown Bess muskets. The stocks were handmade and ornately decorated, featuring a distinctive curve which is not seen in the stocks of other muskets. The function of this curve is debated; it may be purely decorative, or it may have allowed the jezail to be tucked under the arm and cradled tightly against the body, as opposed to being held to the shoulder like a typical musket or rifle. The argument against this method of firing is that the flash pan would be dangerously close to the face and the weapon would be harder to aim. It is more likely that the rifle was only tucked under the arm whilst riding a horse or a camel. The curve may also have saved weight; by shaving away some of the heavy wood used for the stock through employment of the new curved shape, whilst maintaining the same structural integrity of the stock it could still be fired from the shoulder safely whilst also being lighter. The weapon was fired by grasping the stock near the trigger, like a pistol, while the curved portion is tucked under the shooter’s forearm, allowing the rifle to be fired with one hand while mounted. Jezails were often fired from a forked rest, or a horn or metal bi-pod.
<urn:uuid:37e35065-e0e7-4fee-b400-3c0e88f52b9b>
CC-MAIN-2017-26
http://www.theknohlcollection.com/portfolio/detail/rifle-2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321553.70/warc/CC-MAIN-20170627203405-20170627223405-00114.warc.gz
en
0.985322
589
3.71875
4
By: James Garcia Wrestling is one of the oldest sports in history. It dates all the way back to 708 B.C. So how is it possible that wrestling can be taken out of the Olympics so easily? The main reason why wrestling is being taken out is that it makes the least amount of money. However, money should not get in the way of people fulfilling their dreams to get a gold medal. Also, it is completely unfair to wrestlers throughout the United States who will not get a chance to cheer on their sport, and their country in the next Olympics. Taking wrestling out of the Olympics is devastating to many wrestlers because it takes away their dreams of getting to participate in the largest competition in the world. Many of them have been working towards this goal their whole lives. Ryan McCormick, wrestling coach at Camden Catholic High School said, “Wrestling is such a true sport, the self-discipline and dedication it takes, the price your body and mind pay. Yet at the end, not one wrestler does it for money or fame.” Jordan Burroughs, a gold medalist in the 2012 London Games, said on his Facebook page that the wrestling community should fight back. He stated. “As an Olympic Gold Medalist I feel an obligation to fight for the sport that I love most.” It’s not fair that wrestling gets very little airtime on sports channels and does not receive enough publicity. It’s unfair to the athletes whose hard work goes unnoticed. Lastly, it is not fair that wrestling, the most grueling sport in the country, is being taken out of the Olympics.
<urn:uuid:151e1d19-911b-4ad5-a9ff-abda6f21ddf2>
CC-MAIN-2017-26
https://weeklyfog.wordpress.com/2013/04/23/wrestling-taken-out-of-the-olympics/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321553.70/warc/CC-MAIN-20170627203405-20170627223405-00114.warc.gz
en
0.966853
339
2.765625
3
It so happens that just a few of these islands and other places most at risk have since had censuses, so it should be possible for us now to get some idea of the devastating impact climate change is having on their populations. Let’s have a look at the evidence: Let’s have a look at the evidence on regions the UN claimed would be decimated by sea level increases and thereby cause the 50 million "Climate Refugees": Nassau, The Bahamas – The 2010 national statistics recorded that the population growth increased to 353,658 persons in The Bahamas. The population change figure increased by 50,047 persons during the last 10 years.St Lucia: The island-nation of Saint Lucia recorded an overall household population increase of 5 percent from May 2001 to May 2010 based on estimates derived from a complete enumeration of the population of Saint Lucia during the conduct of the recently completed 2010 Population and Housing Census.Seychelles: Population 2002, 81755Solomon Islands: Population 2010, 88311 The latest Solomon Islands population has surpassed half a million – that’s according to the latest census results.After Asian Correspondent posted the story on April 11th, it was picked up by news outlets around the world such as Investor News, American Spectator and was cited in the Australian newspaper. It was also a report on Fox News. It’s been a decade since the last census report, and in that time the population has leaped 100,000. Since that story appeared, the “handy map” he cites in his original story, which has this URL: …seems to be gone down the memory hole. This is what you get now, note my yellow highlight: Only one small problem there UN people, a little annoyance called Google cache, which has that page archived here. It pulls up this page that had been removed, with the 50 million refugees title, but the map is missing. Click to enlarge. Fear not dear readers, because as astoundingly smart as those UN people think they are, they forgot one very important yet tiny detail. The map links to a hi-resolution version of the “climate refugee map” and if you delete the page above and the map it contains, you also have to delete the hi-res image it links to. I’m always happy to help the UN in times of “need”, sooooo I’ve recovered it and saved it here on WUWT, because that image link is likely to go down the memory hole on Monday. Here’s the map at web resolution as it would have appeared in the disappeared web page above. And here it is in full sized hi-resolution glory, suitable for printing, slides, or coffee mugs…wherever it might be appropriate to show the folly of these boneheads. Click the link for the hi-res image: Many thanks to Watts Up With That? for the above report.
<urn:uuid:770cb17f-5596-4227-849e-1b2dffe3a52e>
CC-MAIN-2017-26
http://shooter-climatechangetruth.blogspot.com/2011/04/un-disappears-50-million-climate.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323711.85/warc/CC-MAIN-20170628153051-20170628173051-00194.warc.gz
en
0.95154
620
2.6875
3
By Charles Dickens, Patricia Ingham Charles Dickens's strong black comedy of of hypocrisy and greed The greed of his family members has led filthy rich previous Martin Chuzzlewit to develop into suspicious and misanthropic, leaving his grandson and namesake to make his personal means on the earth. And so younger Martin units out from the Wiltshire domestic of his meant champion, the scheming architect Pecksniff, to hunt his fortune in the United States. In depicting Martin's trip - an adventure that teaches him to question his inherited self-interest and egotism - Dickens created many vividly learned figures: the brutish lout Jonas Chuzzlewit, plotting to achieve the relatives fortune; Martin's positive manservant, Mark Tapley; mild Tom Pinch; and the drunken and corrupt inner most nurse, Mrs Gamp. With its portrayal of greed, blackmail and homicide, and its searing satire on the United States Dickens's novel is a strong and blackly funny story of hypocrisy and redemption. In her advent, Patricia Ingham examines characterization, the crucial subject matters of the unconventional, and Dickens's depiction of the USA. This variation additionally contains new prefaces, Dickens's postscript written in 1868, his operating papers, a observe on Mrs Gamp's eccentric speech, a chronology, up to date extra examining, appendices and unique illustrations via 'Phiz'. For greater than seventy years, Penguin has been the prime writer of vintage literature within the English-speaking global. With greater than 1,700 titles, Penguin Classics represents an international bookshelf of the simplest works all through historical past and throughout genres and disciplines. Readers belief the series to supply authoritative texts improved via introductions and notes by means of individual students and modern authors, in addition to up-to-date translations by means of award-winning translators.
<urn:uuid:ceaf5b50-3503-4442-abd9-2177d2eb8cc0>
CC-MAIN-2017-26
http://tomdmorgan.com/library/page/24
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00633.warc.gz
en
0.951736
378
2.546875
3
How to Make a 3D Wood Turtle Puzzle Materials and Tools: any hardwood 2 inches or thicker 3/16- and 1/8-inch blades flexible shaft grinder abrasive burr with aligned cutters vacuum dust collector 1. Draw a turtle form on paper and cut out the shape with scissors. Place the template on a piece of hardwood and trace the outline with a permanent marker. 3. Cut out the other side and keep the excess intact so it can be used as a holder to keep the puzzle pieces together. 4. Turn the turtle on its side and drill a 3/16-inch eyehole in the head. A dowel peg will be inserted in the eyehole to hold the puzzle together. 5. Roughly cut out the head shape and round off the shell area of the turtle. 6. Change the blade size to 1/8-inch and cut the puzzle pieces freehand, starting with the top head piece, followed by the side piece and alternating from side to top until all are sawed. 8. Using a rotary carving machine with a fine (¾-inch) abrasive burr, finish carving the turtle shape. 9. Change to a ¾-inch sanding sleeve with 80- or 120-grit and smooth the carving. 11. Burn the ends of the wood dowel with a wood-burning tool so the turtle looks as if it has eyes. 12. Brush two or three coats of polyurethane finish onto the puzzle.
<urn:uuid:9537c713-576c-46ce-84be-5c5ba89d8008>
CC-MAIN-2017-26
http://www.hgtv.com/design/make-and-celebrate/handmade/how-to-make-a-3d-wood-turtle-puzzle
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00633.warc.gz
en
0.865799
324
3.046875
3
Catholic Encyclopedia (1913)/Postcommunion The Communion act finishes the essential Eucharistic service. Justin Martyr (I Apol., lxv-lxvi) adds nothing after describing the Communion. However, it was natural that the people should not be dismissed without a final prayer of thanksgiving and of petition, so every rite ends its liturgy with a short prayer or two and a blessing before the dismissal. The earliest complete liturgy extant, that of the "Apostolic Constitutions", VIII, contains two such prayers, — a thanksgiving (XV, ii-vi), and a blessing (XV, vii-ix). A significant resemblance between the Roman Rite and that of the "Apostolic Constitutions" is that at Rome, too, there were formerly at every Mass two prayers of the same nature. In the "Leonine Sacramentary" they have no title; but their character is obvious. As examples, those for the summer ember days may serve (ed. Feltoe, p. 51, "In jejunio"), the first Gratias tibi referimus, the second Oculis tuæ miserationis intende. The Gelasian Sacramentary calls the first postcommunio, the second ad populum. In both sacramentaries these two prayers form part of the normal Mass said throughout the year, though not every Mass has both; the prayers "ad populum" in the later book are comparatively rare. They also begin to change their character. The formerly constant terms tuere, protege etc. are rarer; many are ordinary collects with no pronounced idea of prayers for blessing and protection. In the "Gregorian Sacramentary" the second prayer, now called Super populum, occurs almost only from Septuagesima to Easter; the first, Ad complendum, continues throughout the year, but both have lost much of their original character. The Ad complendum prayer (Post-communion) has become a collect formed on the model of the collect at the beginning of Mass, though generally it keeps some allusion to the Communion just received. That is still the state of these prayers after the Communion. The second, Oratio super populum, is said only in ferial Masses in Lent. This restriction apparently results from the shortening of the Mass (which explains many omissions and abbreviations) and the tendency of Lent to keep longer forms. The Mass was shortened for practical purposes except (in many cases) during Lent, which keeps the long preces in the Office omitted at other times, sometimes more than two lessons at Mass, and so on. The medieval commentators (Amalarius, "De divinis officiis", III, xxvii; Durandus, "Rationale", VI, xxviii; Honorius of Autun, "Gemma animæ", lix) explain this mystically; Honorius thinks the prayer to be a substitute for the Eastern blessed bread (antidopon). The Oratio super populum is now always the prayer at vespers on the same day. It has been suggested that its use at Mass in Lent may be a remnant of a custom, now kept only on Holy Saturday, of singing vespers at the end of Mass (Gihr, op. cit., 711). There remains the first prayer, called Ad complendum in the "Gregorian Sacramentary". Its name was uncertain through the Middle Ages. Durandus (op. cit., IV, lvii) calls it merely Oratio novissima, using the name Postcommunio for the Communion antiphon. The first "Roman Ordo" calls the prayer Oratio ad complendum (xxi); Rupert of Deutz calls it Ad complendum (De divinis officiis, II, xix). But others give it the name it had already in the Gelasian book, Postcommunio (Sicardus, "Mitrale", III, viii); so also many medieval missals (e.g. the Sarum). This is now its official name in the Roman Rite. The Postcommunion has lost much of its original character as a thanksgiving prayer and has absorbed the idea of the old Oratio ad populum. It is now always a petition, though the note of thanksgiving is often included (e.g. in the Mass Statuit, for a confessor pontiff). It has been affected by the Collect on which it is modelled, though there is generally an allusion to the Communion. Every Postcommunion (and secret) corresponds to a collect. These are the three fundamental prayers of any given Proper Mass. The Postcommunion is said or chanted exactly like the Collect. First comes that of the Mass celebrated; then, if other Masses are commemorated, their Postcommunions follow in the same order and with the same final conclusion as the collects. After the Communion, when the celebrant has arranged the chalice, he goes to the epistle side and reads the Communion antiphon. He then comes to the middle and says or sings Dominus Vobiscum (in the early Middle Ages he did not turn to the people this time — "Ordo Rom." I, n.21), goes back to the Epistle side, and says or sings one or more Postcommunions, exactly as the collects. At ferial Masses in Lent the Oratio super populum follows the last Postcommunion. The celebrant sings Oremus; the deacon turning towards the people chants: Humiliate capita vestra Deo, on do with the cadence la, do, si, si, do for the last five syllables. Meanwhile everyone, including the celebrant, bows the head. The deacon turns towards the altar and the celebrant chants the prayer appointed in the Mass. At low Mass the celebrant himself says: humiliate capita vestra Deo and does not turn towards the people. The deacon's exclamation apparently was introduced when this prayer became a speciality of Lent. Durandus mentions it. (VI, xxviii). GIHR, "Das heilige Messopfer" (Freiburg im Br., 1897), pp. 708-13; RIETSCHEL, "Lehrbuch der Liturgik", I (Berlin, 1900) 393-4; LE VAVASSEUR, "Manuel de Liturgie," (Paris, 1910), I, 313, 473-4; II, 41, 488; ROCK, "Hierurgia", I, (London, 1900); GIHR, "The Holy Sacrifice of the Mass" (St. Louis, 1908)
<urn:uuid:2ad7a6a8-82a8-43bb-8493-8a4158b00e29>
CC-MAIN-2017-26
https://en.wikisource.org/wiki/Catholic_Encyclopedia_(1913)/Postcommunion
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00714.warc.gz
en
0.935548
1,403
2.84375
3
To mark Easter I have decided to share some photos of the carvings of the Crucifixion & Resurrection of Christ found on Irish Sculpture dating to the Early and Late Medieval period. This imagery was popular in medieval times, for Christian believers, ‘Christ’s suffering and death brought the promise of redemption a theme emphasised by the crucifixion’ (Stalley 1996, 16). One of the earliest representations of the Crucifixion is found on a 9th/10th century cross slab on the island of Inishkea North, off the coast of County Mayo. The slab depicts the figure of a triumphant Christ nailed to the cross, with a wide smiling on his face. Many early medieval High Crosses incorporate scenes of the Crucifixion, usually located at the centre of the cross as at the Durrow High Cross in Co Offaly. The majority depict two soldiers, Stephaton and Longinus, on either side of the Christ figure, one offering vinegar to the dying Christ, the other piercing his side with a lance. Or Muiredach’s High Cross Monasterboise, Co Louth, created in the 9th/10th century. On both crosses the lance-bearer and sponge-bearer are placed on either side of Christ. The Crucifixion is also found on the shaft of the 8th century Moone High Cross, Co Kildare. The Christ figure is dressed in a long robe. Below is the Dysert O’Dea High Cross from Co Clare. It dates to the twelfth century and belongs to the later Romanesque series of crosses dominated by high relief figures of the crucifixion and bishops or patrons. Christ is depicted in a robe with a pleated skirt with his hands out stretched. Late Medieval Cross at holy wells One of my favourite crosses dates to the late medieval period and is found at St Ciaran’s holy well at Clonmacnoise Co Offaly. It has a simple figure of Christ and the inscription over head reading ‘Repent and do penance’. It is part of the modern pilgrim stations at the holy well. Late Medieval Tombs In late medieval Ireland the Crucifixion often appears on funerary monuments such as chest tombs. A fine example is found as part of the Creagh Tomb at Ennis Friary. The Creagh Tomb was built in 1843 but it incorporates parts of earlier medieval tombs from the Friary. The Office of Public Works are carrying out conservation work on the Creagh Tomb and part of the Friary. The panels are currently on display at Ennis Friary which is open to the public. I highly recommend a visit to the Friary which is full of many interesting features. The bottom of the monument incorporates the ‘passion panels’ from the McMahon tomb and depictions of Christ and twelve apostles taken from another royal tomb. The Betrayal of Christ- the panel depicts the figure of an archbishop alongside a scene depicting the betrayal of Christ. Judas can be seen in the centre of the panel betraying Christ with a kiss. Peter stands on the left sheathing sword. Malchus, a Roman soldier, is on the ground below him holding his left ear with his right hand. According to the Gospels Peter attempted to prevent Christ’s arrest by attacking one of the soldiers and cutting off his ear with a sword. Christ miraculously restored the soldiers ear and condemned the action saying: “All who take the sword will perish by the sword”. The Flagellation of Christ – Pontius Pilate, the Roman governor of Judea, ordered scourging of Christ before crucifixion. In this depiction, Christ embraces a column with his hands bound. There are four executioners, two on either side of the central figure. Each hold scourges of three knotted lashes. The Crucifixion the panel shows Christ in the center on a cross surrounded on either side and at the foot of the cross by a host of angels. Roman soldiers appear to the left and right of the panel. The soldier Longinus on the left is piercing Christs side with a spear. At the base of the cross four figures the Blessed Virgin, St John, Mary Magdalene and another male figure. Two angels hold chalices under the hands of Christ and two more kneel at the base of the cross. The Entombment of Christ – on the evening of the Crucifixion, Joseph of Arimathea asked Pilate for Christ’s body wrapped it in a linen cloth and laid it in a tomb. Some Christian traditions hold that Joseph was Jesus’ uncle – but the gospel of Mark, states that Joseph was not a follower of Jesus, but a pious Jew who wished to ensure that the body was buried in accordance with Jewish law, according to which bodies could not be left exposed overnight. The figure on the left overseeing the entombment is thought to represent Joseph of Aramathea and the tiny figure kneeling holding Christs hand is thought to represent Mary Magdelene. The Resurrection of Christ – Christ is depicted emerging from the tomb stepping on a sleeping solider. His right hand is held aloft in blessing and in his left hand he holds a cross which has a banner affixed. The Roman soldiers are dressed in medieval armor. Another very interesting depiction of the Resurrection of Christ is found on a 16th century tomb at St. James Church, Athboy, County Meath. Christ is shown stepping from the tomb on to a sleeping soldier. Two soldiers stand within the tomb on either side of the Christ. The Christ figure holds a cross in his left hand and his right hand is raised in blessing. A 16th century example of the Crucifixion is found in the North wall of South Chapel of the North Transept of the Cathedral Church at the Rock of Cashel Co Tipperary. Christ with a sorrowful expression is shown nailed to the cross wearing a crown of thorn. Mary stands with clasped hands on the left hand-side of the cross. She is dressed in a pleated dress with an Irish style mantle known as a brat pulled up over her head. St John stands on the right hand side of the cross. He is also wearing pleated garment and mantle, his right hand is raised to his face in a gesture of sorrow. In the North side of the chancel of Holy Cross Abbey in Co Tipperary, an end slab of a chest tomb is built into the wall under the existing mensa. The scene depicts Christ flanked on either side by St John and Mary within ogee-headed niches. St John has been broken off the panel. Mary stands with her hands joined in prayer with her hair loose over her shoulders. Have a very Happy Easter everyone. Hunt, J. Irish Medieval Figure Sculpture. Vol.1. Dublin: Irish University Press. Stalley, R. 1996. Irish High Crosses. Dublin: County House. Ennis Friary Facebook page and information boards. To find out more about Ennis Friary Check out their Facebook Pagehttps://www.facebook.com/ennisfriary?fref=photo
<urn:uuid:ef9ddda8-358d-4562-8b1c-07c01f0085fc>
CC-MAIN-2017-26
https://pilgrimagemedievalireland.com/2015/04/03/a-selection-of-irish-sculpture-depicting-the-crucifixion-from-early-and-late-medieval-ireland/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00714.warc.gz
en
0.947679
1,508
2.625
3
Researchers from the University of Helsinki have shown that three anti-influenza compounds effectively inhibit Zika virus infection in human cells. The results provide the foundation for development of the broad-spectrum cell-directed antivirals or their combinations for treatment of Zika and other emerging viral diseases. Globalization, environmental changes, population growth and urbanization make emerging virus diseases a major threat to public health. An example of such epidemics is the Zika outbreak which is ongoing in the Americas after emerging in the Pacific region. Zika infection associated with congenital brain abnormalities is one of the eleven virus diseases that, according to World Health Organization, needs urgent research and drug development attention. At the moment, there are no approved therapies for Zika infection. Several host cell targets are needed for replication of influenza and many other viruses. In contrast to viral proteins, the host targets are less prone to mutations and thus drugs targeting them could be more effective against viruses, which mutate easily. A team led by Dr. Denis Kainov from the Institute for Molecular Medicine Finland (FIMM) and Professor Olli Vapalahti from the Departments of Virology and Veterinary Biosciences, from the University of Helsinki, decided to adopt this approach to test cell-directed compounds for treatment of Zika. In their recent study, published online in the Antiviral Research journal, the researchers showed that antivirals which block influenza virus by targeting host cell factors are also able to inhibit Zika virus infection. The multinational research group utilized a model system where human retinal pigment epithelial cells were infected with Zika virus strain they isolated earlier from fetal brain[T1] . They were able to show that treatment of the cells with three drugs, called obatoclax, saliphenylhalamide and gemcitabine, prevented synthesis of viral building blocks and production of new viruses at concentrations that are not toxic to cells. - Our results show that these antiviral drugs and their combinations are potent inhibitors of Zika virus-host cell interaction. Furthermore, the results broaden the spectrum of antiviral activity of these compounds and shed new light on their mechanisms of action, said Dr. Kainov. - Importantly, the findings of the study demonstrate that re-purposing commercially available, approved drugs or drug candidates may accelerate development of treatment against Zika and can provide a toolbox to target also other emerging viral diseases, Prof. Vapalahti added. Helsingin yliopisto (University of Helsinki)
<urn:uuid:e14cbb1e-4391-4d10-bf5d-5917c650f7e7>
CC-MAIN-2017-26
http://www.news-medical.net/news/20170116/Antivirals-that-block-influenza-can-also-inhibit-Zika-virus-infection-study-shows.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320323.17/warc/CC-MAIN-20170624184733-20170624204733-00074.warc.gz
en
0.934496
514
2.828125
3
Honeywell’s History – international Honeywell looks back on a tradition spanning over 120 years. The development of a damper control for coal furnaces lays the foundations in 1885. The first German Honeywell distribution company was founded in 1954 in Frankfurt. Together with a colleague, Albert M. Butz, a son of Swiss emigrants, develops in Minneapolis, Minnesota/USA, a damper control for coal furnaces, a thermostatic system which can automatically control the room temperature in tenement buildings using the available technology. The patents are registered in 1885 and the "Butz Thermo-Electric Regulator Company" is founded. It is the first company to offer products that automatically control the inside temperature of buildings 1888: The company’s founder leaves Minneapolis. His patents are held by lawyers in the "Consolidated Temperature Controlling Company". After renaming the company the "Electric Thermostat Company", William Richard Sweatt takes over control of the company. Ten years later he becomes the sole proprietor of the company which is now signed with the firm name” Electric Heat Regulator Company". 1912: The company builds its first factory and is renamed "Minneapolis Heat Regulator Company". Mark C. Honeywell, a pioneer of automation technology, develops the clock thermostat in his company, "Honeywell Heating Specialties William R. Sweatt, proprietor of the "Minneapolis Heat Regulator Company", and Mark C. Honeywell, proprietor of the "Honeywell Heating Specialties Company" in Wabash, Indiana, merge both of their companies. The new firm bearing the name, "Minneapolis-Honeywell Regulator Company", is founded as a stock corporation and achieves sales of 5.25 million dollars in 1928. product range for industrial applications can be significantly expanded by the acquisition of the "Brown Instruments Company" at the end of 1934. Founded in Philadelphia in 1859, the company manufactured signalling and writing controllers for industrial processes. The Brown Instruments Company was already active on the international market. The "N.V. Nederlandsche Minneapolis-Honeywell", which was founded in 1934, becomes the first mainstay in Europe. At the height of its pre-war activities, the company has 15 Dutch and German employees. This is swiftly followed by further foreign subsidiaries in England (1936) and Sweden (1938). After the war the three subsidiaries in Amsterdam, London and Stockholm are reorganised, including a subsidiary in Brussels (1946) and in Zürich (1947). The aeronautical division develops as the forerunner of the present-day aerospace division due to the demands that were placed on the company during the preparations made for America to enter the Second World War. 1945: The company’s sales exceed the100 million dollar mark for the first time. Over 17,000 workers are employed worldwide. The '50’s: Honeywell opens further branches and production sites all over the world. The German distribution company is founded in Frankfurt in 1954. Honeywell reacts to the continual increase in demand for automation technology with Probably the most famous control device in the world, the Honeywell Thermostat T68 "The Round®", replaces controllers in living quarters, which had thus far been clumsy and rectangular. "The Round" is just as famous in the USA today as Coca-Cola or McDonalds. It is still being The '60’s: Honeywell enters other areas of automatic technology (industrial automation, sensor technology, aeronautics). Honeywell's sales exceed the 1 billion dollar mark for the first time in 1967. Honeywell spearheads development work in the area of building control. 1972: WSE (today NexWatch, A Honeywell-Company) invents contact-free access control. Global partnerships are created with the aim of consolidating the company. Setting up joint ventures in the West and the East increase internationalism and broaden Honeywell’s horizons. The fittings’ factory, Heinrich Braukmann, is acquired in Germany in 1980 and renamed Honeywell Braukmann GmbH. This is followed by the acquisition of Centra Bürkle GmbH in the area of heat regulation in 1984. In Germany, Honeywell acquires Metallwerke Neheim Goeke & Co. (MNG). Honeywell Inc. completes its acquisition of shares in Measurex Corp. (Cupertino/California) in March 1997. 1999: Merger of Honeywell and Allied Signal. The History of Allied Signal Allied Signal goes back to the Allied Chemical & Dye Corporation which was founded in 1920 by the editor of the Washington Post, Eugene Meyer, and scientist William Nichols. The company merged five chemical companies which were founded in the United States in the 19th century. Allied opens a factory for synthetic ammonia near Hopewell (Virginia), which is set to develop into the largest producer of ammonia in the After the 2nd World War, Allied recommences production of other new products such as nylon 6 (from which almost everything can be produced, from tyres right through to clothing) and coolants. 1958: The company is renamed Allied Chemical Corp. and relocates to its current location in Morristown (New Jersey). Allied acquires the company Union Texas Natural Gas, which owned the oil and gas reserves on the entire continent of America. Allied regards this company primarily as a supplier of raw materials for its chemical products. However, this changes at the start of the Seventies when CEO John Connor (Minister for Trade during the term in office of President Lyndon Johnson) sells countless numbers of Allied’s unprofitable divisions and invests in the search for oil and gas reserves. In 1979, when Edward Hennessy Jr. becomes CEO of the Group, Union Texas generates 80% of Allied’s yields. In 1981 the Group, trading under the firm name Allied Corp., acquires the aeronautics and automobile company, Bendix Corp. In 1984, Bendix is already contributing to 50% of Allied’s earnings, with oil and gas The merger of Allied and Signal Companies in 1985 helps the divisions of aeronautics, automobile and technical materials to reach critical mass. Signal, which was founded by Sam Mosher as the Signal Gasoline Company in 1922, was formerly a Californian company that produced oil from natural gas. When the company began drilling for crude oil in 1928, its name changed to Signal Oil & Gas. Signal ultimately merged with the Garrett Corporation, an aeronautics company located in Los Angeles, and renamed the Group Signal Companies in 1968. By incorporating the Signal company part Garret in Bendix, aeronautics has become one of Allied Signal's largest divisions. In 1985, the company sold 50% of Union Texas and, with the foundation and split-off of the Henley Group, Inc., sold off 35 non-strategic divisions in 1986. Under the new CEO, Lawrence A. Bossidy, and with a new management role in numerous important divisions, Allied Signal undertakes a comprehensive restructuring programme. Bold measures follow, which aim to increase cash flow, operating margins, and productivity as well as position the company as a globally competitive power in years to come. The name Allied-Signal changes to AlliedSignal in 1993, which reinforces the image of a uniform company and symbolises the full integration of all divisions. company sells the rest of its shares in Union Texas as part of a public tender offer, which nets the company US$ 940m in net proceeds. During the Nineties: Lawrence A. Bossidy carries out a reorganisation of the company focusing on growth and productivity, which leads to the market value of AlliedSignal shares increasing four-fold and a striking outperformance of the Dow Jones Industrial Average and the S&P 500. In Germany, AlliedSignal purchases the Riedel-de Haën AG from Hoechst AG. The Group thereby acquires a fine chemicals company which is particularly well known in Europe and enjoys a long tradition. 2005: Honeywell purchases Firma Novar plc. which has numerous locations in Germany. Honeywell’s History – Austria & Eastern Europe 1989: Founding of the firm, ESSER Sicherheitstechnik in Vienna, Austria Sales area: Austria and Eastern Europe 1996: Opening of the first sales office in Prague, Czech Republic and Lugoj, Romania 2000: Renamed ESSER Austria GmbH 2003: Takeover of ESSER Austria by Novar plc. and renamed Novar Austria GmbH 2004: Opening of the first sales office in Moscow, Russia 2005: Takeover by Honeywell Opening of the first sales office in Warsaw, Poland 2007: Novar Austria GmbH renamed Honeywell Life Safety Austria GmbH - Opening of the first Ukrainian sales office in Kiev, Ukraine - Opening of the first Turkish sales office in Istanbul, Turkey - Opening of the second Romanian sales office in Bucharest, Romania - Opening of the second Russian sales office in St. Petersburg, Russia - Takeover of AV Digital by Honeywell, thereby expanding its product portfolio to the division of electro-acoustic emergency warning systems and public address systems.
<urn:uuid:2104405b-a0a0-4a7b-9822-377d7e4156d6>
CC-MAIN-2017-26
http://hrcaz.org/PermPages/HON-Austria_History_of_Honeywell.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00234.warc.gz
en
0.896199
2,078
2.546875
3
SAVANNAH, Ga. — When word reached Camp Lawton that the enemy army of Gen. William T. Sherman was approaching, the prison camp's Confederate officers rounded up their thousands of Union army POWs for a swift evacuation — leaving behind rings, buckles, coins and other keepsakes that would remain undisturbed for nearly 150 years. Archaeologists are still discovering unusual, and sometimes stunningly personal, artifacts a year after state officials revealed that a graduate student had pinpointed the location of the massive but short-lived Civil War camp in southeast Georgia. Discoveries made as recently as a few weeks ago were being displayed Thursday at the Statesboro campus of Georgia Southern University. They include a soldier's copper ring bearing the insignia of the Union army's 3rd Corps, which fought bloody battles at Gettysburg and Manassas, and a payment token stamped with the still-legible name of a grocery store in Michigan. "These guys were rousted out in the middle of the night and loaded onto trains, so they didn't have time to load all this stuff up," said David Crass, an archaeologist who serves as director of Georgia's Historic Preservation Division. "Pretty much all they had got left behind. You don't see these sites often in archaeology." Camp Lawton's obscurity helped it remain undisturbed all these years. Built about 50 miles south of Augusta, the Confederate camp imprisoned about 10,000 Union soldiers after it opened in October 1864 to replace the infamous Andersonville prison. But it lasted barely six weeks before Sherman's army arrived and burned it during his march from Atlanta to Savannah. Barely a footnote in the war's history, Camp Lawton was a low priority among scholars. Its exact location was never verified. While known to be near Magnolia Springs State Park, archaeologists figured the camp was too short-lived to yield real historical treasures. That changed last year when Georgia Southern archaeology student Kevin Chapman seized on an offer by the state Department of Natural Resources to pursue his master's thesis by looking for evidence of Camp Lawton's stockade walls on the park grounds. Chapman ended up stunning the pros, uncovering much more than the remains of the stockade's 15-foot pine posts. On neighboring land owned by the U.S. Fish and Wildlife Service, he dug up remnants of the prisoners themselves — a corroded tourniquet buckle, a tobacco pipe with teeth marks in the stem and a folded frame that once held a daguerreotype. "They're not just buttons and bullets," Chapman said. "They're little pieces of the story, and this is not the story of battles and generals. This is the story of little people whose names have been forgotten by history that we're starting to piece together and be able to tell." A year later, Chapman says he and fellow archaeology students working at Camp Lawton have still barely scratched the surface. In July, they used a metal detector to sweep two narrow strips about 240 yards long in the area where they believe prisoners lived. They found a diamond-shaped 3rd Corps badge that came from a Union soldier's uniform. Nearby was the ring with the same insignia soldered onto it. The artifacts also yield clues to what parts of the country the POWs came from, including the token issued by a grocery store in Niles, Mich., that customers could use like cash to buy food. Stamped on its face was the merchant's name: G.A. Colbey and Co. Wholesale Groceries and Bakery. Similarly, there's a buckle that likely clasped a pair of suspenders bearing the name of Nanawanuck Manufacturing Company in Massachusetts. Hooks and buckles that appear to have come off a Union knapsack also hint that, despite harsh living conditions, captors probably allowed their Union prisoners to keep essentials like canteens and bedrolls. The Georgia Southern University Museum plans to add the new artifacts to its public collection from Camp Lawton in October along with a related acquisition — a letter written by one of the camp's prisoners on Nov. 14, 1864, just eight days before Lawton was abandoned and prisoners were taken back to Andersonville and other POW camps. The letter written by Charles H. Knox of Schroon Lake, N.Y., a Union corporal in the 1st Connecticut Cavalry, was purchased from a Civil War collector in Tennessee. Unaware that Camp Lawton will soon be evacuated, Knox writes to his wife that he hopes to soon be freed in a prisoner exchange between the warring armies. He doesn't write much about conditions at the prison camp, but rather worries about his family. He tells his wife that if she and their young son need money for food or clothing, there's a man who owes him $9. Knox also gives his wife permission to sell the family's cow. Brent Tharp, director of the campus museum, said his growing collection from Camp Lawton has definitely drawn Civil War buffs to visit from far beyond southeast Georgia. "The people who are real Civil War buffs and fanatics, those are definitely coming," Tharp said. "But I think we've also created a while new group of Civil War buffs here because it's right here in their own backyard."
<urn:uuid:cb69881c-d4cb-4e9a-a128-55d25b1802b9>
CC-MAIN-2017-26
http://www.deseretnews.com/article/700171766/Archaeologists-comb-newly-found-Civil-War-POW-camp.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00234.warc.gz
en
0.977866
1,098
2.8125
3
We continue to refine our knowledge of base elements that form compound words connected to <phobe+ia>. Listen to one student below explain his discoveries about kinemortophobia. Through his work we also discovered more about hybrid words and hybrid creatures in mythology. Discussions such as this are a valuable form of assessment. Here’s what I noticed that this student is beginning to understand : - the term compound. He needs to become more familiar with the term, but recognizes compounds are composed of more than one base element, in the case of <kinemortophobia> there are three and these bases are be bound. - that the Online Etymology Dictionary will provide him with the roots of bases of compounds even when the entire word is not given. - the morphemic structure of a word. His hands indicating stop show the boundaries of each morpheme and help to consolidate this awareness of morphemic boundaries and changes that can happen there. - that the connecting vowel letter <o> is a separate morpheme. - that the infinitive suffix is removed from a root to form a base element in English- he noticed this in the Greek root κινεῖν kinein to move, set in motion. - that that by typing in the root in Online Etymology Dictionary more words sharing that root will appear: kinein. - how to use the Online Etymology Dictionary by entering part of the word . He was able to discuss his process and make sense of the entry. - to apply his knowledge of other languages to help him. - that a final non-syllabic <e> is removed but not certain why- just a procedure. His removal of the <e>in <phobe+ia> indicates he needs understanding of this process rather than “that’s just what you do!” He reverted swiftly to dragging in ‘sound’ as a hypothesis for the removal- then realized that did not make a lot of sense!! - that bases and elements need to be spelled aloud- he self corrected to do this. - one of the functions of synonyms- can be to be express an idea more directly, informally or be blunter than a formal more polite, perhaps technical version- mongrel versus hybrid. He appeared to understand the connotations of implicit in ‘mongrel’. Hybrid, as a linguistic term refers to words with elements of different etymological origins. Hybrid entered English in 1600s via Latin although maybe Greek in origins and linked to hubris. Initially it referred to the young of a domesticated sow and wild boar, thus mixed parentage, or ‘mongrel’. As such its usage was rare until the 1850s. It’s link to hubris was surprising with its initial meaning of presumption towards the gods later expanding to include violence and insolence. Perhaps the implication is that mixed parentage results in impurity and as such is a violence to the gods. ‘Mongrel’, one of the words used to describe hybrid, is often used with negative connotations. The Online Etymology Dictionary notes that mongrel has been attested since the end 15th century and referred to a ‘mixed breed dog’. The roots of this word are Old English gemong which has led to ‘among’, and from its older Proto-Germanic root to mingle. The Online Etymology Dictionary notes the pejorative connotations suggested in the suffix<-rel>. Earlier than its canine connections, in the 1540s, was its derogatory link to racial mixes :’By the waye of reuilyng or despyte, laiynge to the charge of the same Antisthenes that he was a moungreell, and had to his father a citezen of Athenes, but to his mother a woman of a barbarous or saluage countree’, so wrote N. Udall in his translation of Erasmus’s Apothegenes (O.E.D.) We have spotted many hybrids scattered throughout the Greek myths and these hybrids are truly monstrous. Echidna is a Latinate transcription of Greek Εχιδνα. Note the Latin use of <ch> to represent the Greek <χ> ‘khi’. Echidna is a hybrid – a mixture of a beautiful woman and a writhing snake. Hesoid in his Theogeny states that she was ”the divine and haughty Ekhidna, and half of her is a Nymphe with a fair face and eyes glancing, but the other half is a monstrous serpent (ophis), terrible, enormous and squirming and voracious, there in earth’s secret places. For there she has her cave on the underside of a hollow rock, far from the immortal gods, and far from all mortals. There the gods ordained her a fabulous home to live in which she keeps underground among the Arimoi, grisly Ekhidna, a Nymphe who never dies, and all her days she is ageless.” According to Theoi Greek Mythology, Echidna ‘represented or presided over the corruptions of the earth : rot, slime, fetid waters, illness and disease’. She and her fearsome mate Typhon were the parents of other monsters: the Chimaera, the many-headed dog Orthus, Ladon, the hundred-headed dragon who guarded the apples of the Hesperides, the Colchian dragon, of the Sphinx, Cerberus, Scylla, Gorgon, the Lernaean Hydra, and the eagle which consumed the liver of Prometheus, and the Nemean lion. The linking of the monstrous Echidna to the marsupial echidna was initially puzzling. Online Etymology Dictionary explains the naming by Cuvier suggesting that it may be in connection to its long snake- like tongue. Other claims suggest that naturalists were puzzled as to whether it was mammal or amphibian. Typhoeus , Typhon:Τυφωευς Τυφων Typhoeus/Typhon above, hybrid also and consort of Echidna. He too appeared ‘man-shaped to the thighs’ then instead of legs were two coiled vipers. Instead of fingers, he had fifty serpent heads per hand. He belched red hot rocks at the sky and breathed fiery storms from his mouth. His name has been linked with typhoon a word attested since the 1550s in English for violent winds and tornadoes. Hesiod differentiates Typhaon and Typhoeus as two distinct beings. Typhaon is a son of Typhoeus (Theog. 869), and a fearful hurricane, who by Echidna became the father of the dog Orthus, Cerberus, the Lernaean hydra, Chimaera, and the Sphynx. Other writers conflate the two. Winds, fire belching and volcanoes are linked with this giant. Chimera :χίμαιρα: chimaira Chimera as a word is attested in English since early 14th century. It entered the lexicon via Old French and Latin from Greek χίμαιρα:chimaira. This three headed beast Warner suggests in No Go the Bogeyman,verges on the comic. Three heads appear on her body but not in the usual above the neck position as is typical of heads. The chimera’s heads have sprouted along her body: a goats head from her dorsal ridge, and her tail spouts fire, like an amphisbaenic gargoyle doodled in the margins of a medieval manuscript: in the usual place of a head, she roars through lion’s jaws'(Warner, 242). The chimera is a strange blending of parts. Warner in her reflections of its fear inducing qualities notes that the word chimera ‘ has come to mean, since the Renaissance, illusion itself, an impossible and delusory figment of the imagination’. Warner states that the Chimera ‘is the ultimate monster of monsters, who is both frighteningly there and yet a spectre, who shows something real that at the same time exists only in the mind.’ Nathan Bailey’s ‘Dictionarium Britannicum: or a more compleat universal etymological English Dictionary‘ defines chimera as both ‘monster’ and mere whimsy, castle in the air, an idle fancy’ The chimera is killed by the hero Bellerophon mounted on Pegasus which had sprung from the blood of yet another hybrid monster Medusa, too killed by another sword wielding hero Perseus. We continue to wonder about the relationship between heroes and these hybrid monsters- without the defeat of these monsters can the hero really be regarded as such? We have noticed so many are female. An Aside:Bailey’s Dictionary Nathan Bailey, early word nerd, teacher of Hebrew, Latin and Greek at a boarding school in Stepney, philologist and one of a line of lexicographers, compiled’ The Universal Etymological English Dictionary‘ and published this first in 1721. An indication of its popularity is that it reached its twentieth edition in 1763 and its 27th edition in 1794. A folio edition was published in 1730: Dictionarium Britannicum. The esteemed lexicographer Samuel Johnson also owned a copy that he annotated with his own thoughts. Medousa (Medusa) one of three gorgons and the only mortal gorgon, killed by Perseus, in Greek mythology. Medusa’s head was fixed on the aegis or shield of Athene. According to the O.E.D. ‘the Greek form Μέδουσα is identical with the present participle feminine of μέδειν to protect, rule.‘ Medusa in some versions was once a beautiful woman and metamorphosed by Athena for her presumption for lying with Poseidon in her shrine. Medusa’s glance in her new form continued to captivate but ironically now petrifying the unwary gazer, turning him to stone. Medusa’s hair became venomous snakes. Punishment in becoming hybrid for hubris. The OED dates the word zombie as entering English in 1819, earlier than the Online Dictionary’s date of 1876. Both sources link to roots in West Africa. The Online Etymology Dictionary notes its original meaning as a snake god with a later shift to become the reanimated dead in voodoo. There are suggestions that this word could have originated from Louisiana creole meaning phantom or ghost. The Louisiana claim to this word links to the Spanish etymon sombra meaning shade. In the 1930’s it also developed a facetious meaning of someone who was dim- as in dead- head. So shady, ghostly,dim and snaky are these dead who walk. Marina Warner reminds us that the idea of zombie was an ‘early 19th-century import from West Africa via the Caribbean, through the diaspora brought about by the traffic in human beings’. Perhaps its this physical and spiritual sense of dislocation and alienation that is lurking behind zombie. Warner again writes:’Zombies used to be primarily victims of voodoo masters. Today, it’s become an existential term, about mental and physical enslavement, a deathly modern variation on the age-old theme of metamorphosis. ‘ Read Warner’s article The Devil Inside to explore contemporary culture and even the connection between Coleridge’s Ancient Mariner and West Indian spirit cults. Zombies, Echidna, Typhon, Medusa and chimera , all hybrid monsters perhaps all warnings. Wait for our for our analysis of monster next post! We continue our quest and etymological inquiry into more hybrids in Greek mythology.
<urn:uuid:34447425-df9e-4274-84d5-39a1755d4f21>
CC-MAIN-2017-26
https://wordinquiry.wordpress.com/2014/09/16/the-moving-dead-hybrids-and-mongrels/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00234.warc.gz
en
0.946948
2,550
3.5625
4
- A process for rearranging the clusters on a disk for each file so that they are adjacent rather than scattered all over the disk. Files with adjacent clusters are quicker to read (because this minimises any required movement of the disk heads), than if the clusters are scattered all over the disk (because that requires frequent movement of the disk read heads). For this reason a computer with a defragemented disk (i.e. with all its files defragmented) will run faster than if it had a heavily fragemented disk - but only for disk related operations. For more information see:
<urn:uuid:d48c27ee-c901-4038-9dab-27f96f4b6c65>
CC-MAIN-2017-26
http://www.cryer.co.uk/glossary/d/defragment.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321938.75/warc/CC-MAIN-20170627221726-20170628001726-00394.warc.gz
en
0.907998
125
2.96875
3
Keywords: bacteria, biodegradation, filters, groundwater, microorganisms, organic compounds, phenols, pollutants, sand, water treatment, water supply, water quality, water pollution, environmental pollution, chlorophenolic contaminants Secondary removal of chlorophenolic contaminants in water In this study, several factors important for the design of a water supply treatment system for the removal of trace amounts of organic contaminants by microorganisms in a fixed-film were assessed. This entailed evaluating the effect of seeding with adapted microorganisms on the acclimation time, determining what depth of support material was required for removal of contaminants and observing the effect of hydraulic loading rate on the contaminant removal efficiency by the microorganisms. The study was conducted in the laboratory using sand columns as fixed-film biological reactors. Pentachlorophenol (PCP), 2,4,6 trichlorophenol and 2,4 dichlorophenol were used as the test contaminants. Dechlorinated Philadelphia tap water, which contained concentrations of dissolved organic matter (DOC) in the range of 1 to 4 mg/l, was used as the source water. The DOC of the source water served as a primary substrate for microbial growth in the sand columns. The total concentration of the contaminants added to the source water ranged between 200 and 800 μg/l, making them available as secondary carbon sources for the attached microorganisms. The columns were operated in a downflow mode and the hydraulic loading rates through the columns were varied from 0.5 gpm/ft² to 3 gpm/ft² (1.2 m/hr to 7.3 m/hr). It was observed that each cycle of operation of the treatment system could be divided into three different stages: acclimation; equilibrium removal; and clogging. Acclimation is the period of time between initial startup and equilibrium removal of the contaminants. Equilibrium removal was defined as the consistent removal of the contaminants for at least four days. Clogging of the sand with biological growth was found to occur after long term operation in shallow depths of sand. The acclimation time and the establishment of an adapted population were not shortened by seeding the sand columns with laboratory acclimated cultures. During the second stage, equilibrium removal, the removal of DOC decreased with depth as a first order relationship. However, the removal of the contaminants was observed to be zero order. Removal of the contaminants decreased with increasing hydraulic loading rate. Reductions of 80% or more of μg/l amounts of the chlorophenolic contaminants was achieved in a one inch depth of sand.
<urn:uuid:793175a7-fab8-4543-980d-a6b2333e4037>
CC-MAIN-2017-26
https://www.environmental-expert.com/articles/secondary-removal-of-chlorophenolic-contaminants-in-water-81041
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321938.75/warc/CC-MAIN-20170627221726-20170628001726-00394.warc.gz
en
0.959571
523
3
3
The Century of Revolution 1603—1714, by Christopher Hill: Nelson, 1961. 25s. the volume is the fifth in a series by different experts on English history, and wears the modest guise of a book for sixth forms and first-year college classes. As such it needs scarcely anything to make it perfect, except intelligence and curiosity among readers in these walks of life. The type is large and clear. There is a set of excellent illustrations, and a helpful classified reading-list. A good deal of humour, and a strong sense of the dramatic in history, blow away any dry-as-dust flavour that may hang about the notion of a text-book. But a survey of the whole 17th century (of his 17th century, it is a temptation to say) by Christopher Hill is bound to be a good deal more than even an ideal book for the classroom. It will come still more as a blessing to the general reader interested in knowing how modern England, with all its oddities good and bad, has evolved. No scholar could have written a more lucid or penetrating study of this crowded and chaotic epoch. How to prune and arrange the vast bulk of what is known, so as to combine fact with comment and interpretation, is the first problem in any general work of history. The plan followed here has many advantages. It breaks the period up into its four natural divisions: 1603–40 (growth of opposition to the monarchy), 1640–60 (civil war and republic), 1660–88 (restoration of the monarchy in a cut-down form), 1688–1713 (full establishment of parliamentary control over it). Each section opens with a brief, bare narrative, to refresh the reader’s memory; then follow discussions of the three main spheres of national life in turn—economic, political and constitutional, religious and cultural. Supplementary tables of dates, and also of wages and price-movements, help to make up for the brevity of the narrative. In little more than three hundred pages Hill’s talent for making the important things stand out, with the greatest economy of detail, enables him to cover an astonishing range of topics. So much is brought in that it would be ungrateful to complain of anything being left out; of the military side of the civil wars, for instance, not getting much of a look-in. Music and herrings, Dryden and Dissent, all find room, and not as mere odds and ends thrown into a rag-bag. Their relative positions and interactions are pointed out, or at least stimulatingly suggested. For a good specimen of this fitting together of complicated jigsaw puzzles the reader may turn to the account in Part 3 of the effects of the Restoration in 1660 on life and literature, industry and science, politics and political philosophy. Few will read the book without gaining from it a stronger feeling of the wholeness of life, of the fact that politics, painting, and potatoes all belong to one world. In our age when specialisation is shutting us up into smaller and smaller compartments, this is a very tangible service for a historian to perform. Marxists will hail the book as a vindication of their method. All historians ought to welcome it as a vindication of their subject, struggling nowadays to hang on to its small place in the educational timetable in competition with book-keeping or electronics. In 17th century England there was, above all, an emergence of freedom. Hill’s great concern from first to last is to show realistically what this much-used and misused word means in that age. English freedom then was spacious for those who shared in it, but it was shared by very few. It gave the majority nothing, except the incentive to try and broaden it by democratic movements, whose work even now is only half finished. In constitutional terms it meant the rise of Parliament, a Parliament elected by only a handful of voters, to supremacy over the Crown. This happened when in most other countries representative institutions were decaying or being suppressed by allpowerful monarchies. On the economic side the coming of freedom meant the rise of a system which we have known since Karl Marx’s day as capitalism, though Wall Street would prefer us to call it “free enterprise”. By 1700 this system of production was in the ascendant in England; whereas in England in 1600, as in most of Europe till much later and in most of Asia till today or yesterday, economic life was still fixed in the much older, traditional grooves that the Marxist refers to as “feudal”. Both politically and economically the freedom achieved in 17th century England was the right of the property-owning classes to do as they pleased, without interference from any power above them. After overthrowing Charles I in the civil war they abolished the feudal land-laws which allowed the Crown to fleece the landowner; they kept intact the feudal laws which allowed the landowner to fleece the peasant. On the religious issues that intertwine with all others in the 17th century Hill is particularly an authority. He has long been a keen and subtle advocate of the view that Calvinist theology helped to inspire the capitalist spirit, and the progress away from mediaeval stagnation which this made possible. There is occasionally a risk here of losing sight of the broad, basic fact that what started the liberation of the human mind and human society was Protestantism as a whole: the break-away of half Europe, by whatever precise theological pathways, from the stupefying inertia of Catholic incense and saint-worship and priestly domination. To the founders of Marxism the starting-point of the grand revolution that separates modern from mediaeval was the Reformation. Hill’s treatment of constitutional matters too carries conviction nearly all the time. A simple point that might have been included among the causes of the opposition to the first Stuarts is that they were foreigners. The Tudors, who were their own public-relations officers, had always rubbed it into the public that they were English born and bred. People always grumble more at their government when it is in the hands of outsiders. The only attempt at revolution in three centuries of Spanish history was touched off by the advent in 1518 of a foreign king surrounded by foreign favourites. One reason why Parliament came out on top in modern England was that this country (unlike France) was blessed at various times with foreign monarchs, whose outlandishness made them unpopular or ineffective. In the economic sphere Hill may seem now and then by comparison to move a little less sure-footedly. This is partly due to the many gaps in the evidence that has survived, all the more regrettable because for a Marxist historian like him economic facts are the fundamental ones. How far if at all it is due to uncertainties of interpretation will be a question of special interest for the eagerest of all his readers, those who share his belief in the Marxist theory of history and have followed the many contributions that he has made to it in his previous studies. His framework or scaffolding was first put together a good many years ago in his long essay on The English Revolution. That essay was an epoch-making one in its field, and it fitted so many of the facts so convincingly that its ideas can fairly be taken as in a good measure true. It was a pioneer work however, and under close scrutiny, by the test of its own theories and rules, it reveals in a good many places some degree of inconsistency, or blurring of lines, or unconscious substitution of one piece on the chessboard for another. In a work of the character of the present book there is naturally no room for technical discussion of Marxist problems, and some of the difficulties are unavoidably left on one side. To take an example, Marxists including Hill have drawn a sharp—probably a good deal too sharp—distinction between “merchant capital” and “industrial (or productive) capital”, and insisted that only the second of these, which comes later in history, is a dynamic force capable of revolutionising society and taking over political power. In practice the essay failed to keep the two things as distinct as they were supposed to be in theory; and the book is open to the same objection, for it ends with the great merchants of London in control of both the national economy and the State. Non-Marxist historians have treated the civil war of 1642–49 as a religious conflict, or as a struggle between opposing political ideals. Hill sees it as a “bourgeois revolution”, like the great French Revolution of 1789: that is, an overthrow by capitalism of a pre-capitalist economy and ruling class. In a nutshell his argument is this. Tudor and early Stuart England was governed by a form of absolute monarchy, on behalf of a class of landlords who skimmed the cream off an economy and a society still essentially (in the broad Marxist sense) feudal. Inside this set-up a new mode of production, capitalism, was taking shape, and along with it new social classes and interests. As time went on the further expansion of these capitalist interests was increasingly hampered by the still feudal and now obsolete structure of administration and law. Eventually the new forces exploded, blew the old order to pieces, and proceeded to build a new one suited to their own requirements. Both wings of the property-owning minority then joined hands against the dissatisfied common people, and compromised by restoring the monarchy; but when the monarchy tried to turn the clock back too far they expelled James II and inaugurated a definitely capitalist order which set England free to expand in wealth, and march towards world power. This whole transformation was painful, but “progressive” and good in the long run because capitalism was then the only force capable of developing technique, enlarging national production, and eluding the mass unemployment of Tudor days. Not all economic historians might agree that industrial activity was either so big before 1640, or so much bigger after 1640, as Hill believes. But leaving this aside, it is vital to his case to be able to show that the obstacles put in the way of economic development by the old government were serious enough to require a revolution to sweep them away. His original essay, in my opinion, did not altogether succeed in doing this. Does his new book? He has enlarged and strengthened his evidence, but there still appear to me to be loop-holes in it. Businessmen’s grumbles always have to be taken with pinches of salt. To hear them talk today you might think they were panting for another revolution to sweep away the frightful tangle of red tape and officialdom that frustrates all their efforts to make Britain prosperous. Hill makes a good deal of the antiquated guild system as a clog on production; but he acknowledges that despite official support the system was no longer really working. He makes still more of the long list of monopolies granted by the Crown. It may be suspected that a good many of these were more painful to the consumer than to the capitalist. Coal was one of the biggest capitalist industries, and coal-owners found the Stuart government a convenient ally in establishing a price-ring—the happy haven of all free enterprise. One of Hill’s examples of the evil results of intervention in business by a non-business government is the failure of the Cokayne scheme of 1616 to promote cloth exports. James I’s ghost might point to the South Sea Bubble of a century later as an example of what happens when businessmen are left to their own devices. In any case manufacturing interests were not big enough by themselves to take the lead. Hill gives the leading part in the anti-Stuart movement to a section of the landowning class: the “progressive gentry”, those who were up-to-date enough to think of “improving” their estates and increasing their incomes. They were discontented, he argues, at bottom—religious shapes—because they too found themselves hampered and thwarted by an unsympathetic administration. Here again his catalogue of grievances does not seem to me quite to clinch the argument. It is true no doubt that landowners disliked the bankrupt monarchy’s use of feudal law for the purpose of levying spasmodic taxes on them. But as Hill recognises, they were on the whole very lightly taxed before the revolution, and very much more heavily taxed after it. A good deal of his case rests on the fact that landowners were trying to grab and enclose common lands belonging to the villages, and bring them under cultivation for their own profit, and that the government sometimes tried to interfere because of the popular resentment that enclosures stirred up. Yet he has to admit that such interference was neither persistent nor effective. Stuart rule, he makes it plain, did not protect the poor, as it pretended off and on to be doing. Another query arises: what makes a “progressive” or “improving” landowner? Hill lumps all who were not too foolish or too old-fashioned to want to get more money out of their estates. Now they could do this by two very different methods. One was to rackrent their tenants. The other was to invest capital in agricultural improvements, such as land reclamation or better farm-equipment. The first method was quick, safe, and easy. The second was slow, risky, and laborious. In theory they might be combined: money squeezed out of tenants could be ploughed back into the estate as productive capital. Did this happen nearly as often as Hill seems to assume, or was most of the extra income squeezed out of the poor spent on luxuries for the rich? If there were anything “progressive” about rack-renting in itself, the most progressive country imaginable would be 19th century Ireland, bled half to death by absentee landlords. In reality such a situation is more characteristic of Asia than of Europe, and in Europe it is characteristic of backward regions like Spain. It was by using the machinery of feudal land-law, moreover, that these “progressive landlords” were screwing rents up and grinding tenants down. It must be said positively, it seems to me, that rackrenting in itself (like bloodsucking village usury) is not a form or stage of modern capitalism, and does not grow into it by any natural evolution. Something genuinely new, and economically progressive, did evolve in 17th century England; but it was not growing in a logical straight line out of what came before it. This was the modern English system of capitalist farming. It rests on a three-fold division of rural society. There is the landlord, who may invest capital but essentially is a consumer of profit or rake-off; the ploughman, who does the manual work; and, in between, the “farmer”, a small but genuine capitalist who uses his capital to rent land from the owner and to employ landless labourers to work it under his direction. Like all systems, this can be traced back to much earlier beginnings, but on the scale it reached by 1700 it was something startingly novel and revolutionary. As the dominant agricultural pattern over a wide area it existed practically nowhere in the world in 1700 except in south and east England, and since then it has spread to practically no other country (except Scotland) in any continent. To explain the emergence of something so rare and exceptional in world history, we must surely look for a very exceptional combination of historical factors. Among these factors was the commercialising pressure of London, whose overwhelming size and weight in the country Hill emphasises. But another, it may be, was the readiness of some of the English peasants or yeomen to defend themselves sword in hand, as they did when they fought and won the civil war. The class of men from whom the Ironsides were recruited could not be treated like so many Irish or Bengali peasants. What happened in effect was that they were taken into partnership, as “farmers”, by the landlords, at the expense it is true of the poorest countryfolk reduced to the status of landless labourers. In other words the gentry had to be compelled, against their natural animal instincts, to realise that they could make more money by leasing their land to a respectable, businesslike rural middle-class, than to a swarm of Irish-type peasants all equally pauperised and demoralised. Once they were made to grasp this they could not go on screwing rents up unreasonably, for fear of killing their golden goose. Capitalism, I think, Hill is altogether too much inclined to see as a thing already fully formed, before 1640, in the minds and habits of men. Really it was still vague and amorphous, needing the furnace-heat of a many-sided social conflict to crystallise it. Let us recall Engels’ saying that in history millions of opposing wills cancel one another out, and what results is something that no one willed. No Englishman willed a capitalist economy. Capitalism was more the consequence of civil war than its cause. This applies especially to production in agriculture, which was to be capitalism’s chief domain for a hundred years. Popular resistance to landlord tyranny failed, but not altogether; it could not stop, but it could deflect the line of development. In many other parts of 17th century Europe the line of development went on straight to its logical conclusion, the reduction of the mass of the people to serfdom: the middle ages came came back. My feeling at any rate is that Hill, through keeping his eye too closely on his landlords, has not taken sufficient notice of the new-style farmer, as the humble but really “progressive” and transforming agent in English agriculture. I feel too that this is connected with a touch of indistinctness in the book as a whole about the part played by the common people. Admittedly it is the hardest thing of all in this period (or any other before the 19th century) to make out what the “lower classes” were thinking or doing. As Hill points out in his final summing-up, the poor and their lives have for the most part vanished without trace. However, in his survey of the scene before 1640 he does seem to leave the mass of the people somewhat too much in the background, or to look on them as hapless, more or less passive victims of oppression. Then in with the outbreak of civil war, the commoners of England seem to start to life abruptly, angry and clamorous. One of the most fascinating passages of the book tells us how the Restoration was brought about by panic fear of social revolution gripping the propertied classes; a fear that by falling out with one another the Haves had put themselves at the mercy of the Have-nots. If the Have-nots were so formidable before 1660, can they have been insignificant before 1640? This is not a mere sentimental question of doing justice to the nameless heroes of a hopeless struggle for popular rights. It is a practical question of trying to explain the dynamics of the bourgeois revolution; and the more closely this is examined in England, and compared with similar events in other countries, the more infinitely complicated it appears. We might get a fuller understanding of the political scrimmage before 1640 if we thought of it as in some ways a competition among different groups of profiteers to throw the blame on one another for the hardships that were stirring up discontent among the poor. We might see the civil war in clearer focus if we gave it, more than Hill does, the character of a rising of the poor against the rich, even though a section of the rich or would-be rich succeeded in bringing it under their control and turning it to their own advantage. The French Revolution would be a trivial affair if we left this element of it out of account. All history has a quality of paradox; but the idea of rackrenting landlords as champions of the popular side in a civil war is more paradoxical than Hill allows for. It was the landlords after all, much more directly than the Stuarts, who had been oppressing the people, and those landlords above all whom Hill classifies as “progressive”. One more point about capitalism. Just as Hill sees it a little too much as a juggernaut rolling deliberately onward in a straight line from 1600 to 1700, so he also, I think, takes it too much for granted that the route it took was the only possible one. He feels obliged therefore to endorse indiscriminately, as “progressive”, all the demands of the 17th century business interests: wars with Spain, wars with Holland, seizure of colonies, markets for slavedealers. But history shows that there are at least as many roads to capitalism as to socialism, and as many variant forms of it. Like the new order in the English countryside, England’s pattern of commercialindustrial capitalism by 1700 was a special and exceptional one. It was heavily tilted towards imperialism, not from any pure economic law or necessity, but as a result of the state of affairs produced by a revolution partially strangled. In this situation industry lagged behind commerce and finance; the Industrial Revolution was put off by many decades; English cloth had to grope about in the Far East for customers because English workers were too poor to buy it. England’s rulers were deeply infected by envy of the parasite empires of Spain and Portugal, and greed for the same easy gains out of exploitation of colonial labour, cheaper and more defenceless than labour at home. If Poland was relapsing into mediaeval serfdom, England’s heavy investment in slave-trading meant a relapse into something much older and worse. English capitalism was growing up with one foot embedded in the slave-plantations of Jamaica and one eye squinting at the plunder of India. To this day our national brand of capitalism has not got rid altogether of the resulting taint of primitiveness and inefficiency. The truly “progressive” or constructive capitalists of the 18th century were not the bloated merchants of London, but those descendants of the defeated Levellers—the Quakers. This is too carping a note to end on. At least nine tenths of any review of the book ought properly to be devoted to praising it. Nothing would be easier than to fill a long review by going through it and picking out one excellent passage after another for praise. Instead I have preferred to believe that everyone capable of being interested in the 17th century—historian or layman, youth or greybeard—will enrich his mind by reading and re-reading this book for himself. He will be well advised to buy a copy instead of borrowing one. At twenty-five shillings it is extraordinary value for money.
<urn:uuid:1f52a4c6-8e66-434d-bb72-defd148311f2>
CC-MAIN-2017-26
http://marxistupdate.blogspot.com/2011/12/emergence-of-freedom.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323721.80/warc/CC-MAIN-20170628171342-20170628191342-00474.warc.gz
en
0.975773
4,701
2.828125
3
How can we help? You can also find more resources in our Select a category Something is confusing Something is broken I have a suggestion What is your email? What is 1 + 3? Upgrade to remove ads Bible - Test 3 God's Steadfast Love Example of Hesed The 3 Gifts in the Wilderness 3 Gifts in the Wilderness 1) Sweet Water 2) Manna 3) Quail Theophany at Sinai Earthquake, Thunder, Lightening, Cloud, Trumpets, Boundary, Fire... Means it is now formal and you must follow rules to be qualified to talk to God. Exodus: Warrior, Leader Blending of Religious Beliefs and Rituals Why does Israel Hate Religious Syncretism? G-d provides Religious structure. It can't be changed on whim. Cult of Mithras Cow slaughtered on top of Bridge with Open Slots. Person must bathe in and drink blood of cow. POV: Jesus is rabbi, takes place of law in community, Jesus' fulfillment of scriptures. Icon: Man w/ Wings. (NOT AN ANGEL) represents Jesus' Humanity. POV: Jesus is Messiah who will establish and rule the Kingdom of G-d. Supposed to be a secret till the end of the ministry. Icon: Lion w/ Wings. Represents Royalty POV: Jesus is a universal savior. Stresses Jesus' Humanity towards Lower classes, Women, Sick, and Children. Icon: Bull w/ Wings. Represents Sacrifice and Priesthood. POV: Jesus is a God on Earth. Uses Greek Philosophy to expres Christian Ideas. Icon: Eagle. Represents that Jesus is all knowing. There are 3 wise men because of 3 gifts: 1) Gold -> Gift for a King 2) Frankincense -> Incense used in religious ritual, indicates presence of divine. 3) Myrhh -> Used to anoint Dead Bodies Matthew makes a strong connection between Jesus and Moses... 1) Both Survive Threats at Birth 2) Both Grew Up Safely in Egypt 3) Both Renewed the People's Relationship with G-d. Luke's Nativity: Elizabeth She was barren for a very long time. She teaches patience. Luke's Nativity: Mary She was pregnant, which was risky socially because she was not married. She teaches Trust, Faith, and Submission to G-d's plan. Emphasis on Shepherds Shepherds were not respected. If G-d pays attention to the shepherds, it means he's paying attention to everyone. Kingdom of G-d World of total peace and justice, personal, spiritual. Kindgom of World Upgrade to remove ads
<urn:uuid:1e541f74-e5fc-4a5d-8e03-99e1b6aa7655>
CC-MAIN-2017-26
https://quizlet.com/8333654/bible-test-3-flash-cards/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323970.81/warc/CC-MAIN-20170629121355-20170629141355-00554.warc.gz
en
0.871587
586
2.609375
3
Chinatown of Kuala Terengganu As it has always been a place of unique historical and cultural character, it is no wonder that Kuala Terengganu's Kampung Cina (Chinatown) is now regarded as a heritage attraction for both local and foreign tourists. Sprouting from joint restoration and preservation efforts between the Terengganu State Government, the Kuala Terengganu Municipal Council and three Chinese associations (Terengganu Chinese Assembly Hall, Terengganu Chinese Chamber of Commerce & Industry, and Terengganu Hainan Association), Chinatown has been given a boost for tourism in the region. As history goes in the Chinese records, Terengganu, Kelantan and Pahang were vassal states of Sri Vijaya, a powerful kingdom from the 7th to 14th centuries. Sri Vijaya maintained a close relationship with China and tribute missions were sent by Sri Vijaya to China between 906 and 1178 A.D. The descendants of Chinese sojourners and settlers - whose origins are traceable to that period - are still found at the trading ports and coastal settlements of Terengganu, including that of Kuala Terengganu. Various Chinese records and annals - dated as far back as the 10th century (Song Dynasty) have referred to the ports of Terengganu. Javanese records of the Kingdom of Majapahit in the 14th century also placed Kuala Terengganu,Paka and Dungun on their list of trading centres. While the Indians and the Arabs traded and settled on the west coast, the sea-faring Khmers and Chinese were probably regular visitors to the east coast of Peninsular Malaysia for many centuries. From the 16th century onwards, the Chinese population increased gradually, and some established permanent communities. It is believed that Admiral Cheng Ho (Zheng He) of China - the Goodwill Ambassador of the Ming Dynasty - led a huge fleet of about 200 vessels with approximately 28,000 marine officers and crew to the shores of Kuala Terengganu in the year of 1414 A.D. This is based on evidence from a map of places visited by Cheng Ho, during his 4th trip to the west. Right after the visit of Cheng Ho/ Zheng He, Chinese farmers from the coast of China, especially the people from Zhangzhou District of Hokkien Province settled at Bukit Datu (Big City), and along the river bank of Sungai Nerus. The Chinese forefathers named Sungai Nerus as Sampokang (Cheng Ho's River) and built a temple at Kampung Jeram - Sampokong Keramat Cheng Ho. When Alexander Hamilton and Captain Joseph Jackson visited Kuala Terengganu in 1719-1720 and 1764 respectively, the presence of Chinese settlers was noted down in their records. Alexander wrote: " Trangano ........ about one thousand houses in it, not built in regular streets, ....... The Town is above half-peopled with Chinese, who have a good trade for three to four Jonks yearly, ....... | The product of the country are Pepper and Gold, which are mostly exported by the Chinese. About 300 tons are the common Export of Pepper, ........". | Kuala Terengganu was also described by T.J. Newbold in 1893: "...... the Malay town of Terengganu in 1828 was large and populous .... The Chinese are numerous, and live principally in strong brick-built houses, which now exhibit every appearance of an old and long established colony. The Chinese population of the town is estimated at 600, that of the Malays from 15,000 to 20,000". Possible sea routes which ancestors of Chinese took to reach Kuala Terengganu and establish settlements are shown on top while internal migration between Kampung Chepoh, Losong, Bukit Datu, Kampung Tirok and Kampung Cina is illustrated. Of course, intra-migration between Kampung Tirok and other early Chinese settlements such as Wakaf Tapai, Pulau Bahagia and so forth, are also possible. | The Chinese settlers in Kuala Terengganu before 1900 were not homogeneous for they comprise of Hokkiens, Hainanese and Cantonese. According to Munshi Abdullah who visited Kuala Terengganu in 1836, there was a large Chinese quarter with a Kapitan Cina (Chinese leader) named Kapitan Lim Eng Huat (1798-1847), who was the third Kapitan of Chinatown. He probably saw the concrete bridge being built during Sultan Mohammad's period (1837-1839). | According to historical records, there were 7 Kapitans in Chinatown: Teo Tioh Eng (1736-1820), Kow Geok Seng (1782- ), Lim Eng Huat (1798-1847), Kow Teck Lee (1810- ), Low Kian Tee, Wee Teck Siew and Kow Swee Leng. There were also 4 Low Tiews (Jurubahasa) who assisted the local government to manage the Chinese Community's affairs. The Low Tiews were Lim Keng Sing (1820-1849), Lim Keng Hoon (1825-1882), Lim Kian Mou and Lim Kian Siew ( -1911). The Kapitans and Low Tieys were all Hokkien who were the earliest and largest group of Chinese settles in Chinatown and hence, the Hokkien dialect is commonly used by the Chinese community. By the mid-1800s, the Chinese population of Kuala Terengganu increased tremendously as new Chinese immigrants arrived. Kuala Terengganu, which is strategically located on the east coast of Peninsular Malaysia, was a natural stopping point for those who plied the trade route from China to South East Asia in the early days. Kampung Cina became the most densely populated area for the Chinese community in Kuala Terengganu. Some of these extensions date back to times when the riverside shophouses had back entrances and jetties for loading and unloading goods from boats. Today, at the back of some of these riverside shophouses are jetties where speedboats dock. At the back of the other row of shophouses you will find a hawkers selling various types of economic local food both Malay and Chinese. An old well which dates back to more than a hundred years is also located nearby. It is known as the Low Tiey Well. During the early settlement days, the term Low Tiey meant both that of Chinese translator and Chinese community leader. The water in the well was used for drinking and washing. The well was also believed to have been excavated and constructed in 1875 by Low Tiey Lim Keng Hoon (1820-1882). Chinatown has been acclaimed as a part of Malaysia's living history of shophouse architecture, revealing a spectrum of architecture from the earliest wooden and Baroque, to 1920s Art Deco and post-Modernism all on one street. Many of the Chinese in Chinatown are the descendants of the early settlers. Till today, signboards on shopfronts prove that many of these families still live here - namely the Wees, Lims, Tans, Teos and Phuahs. You can see a lot of Chinese characters carved on the antique Doors and Panels. Shophouse No. 177 of Jalan Bandar is the "generation" home of Madame Teo. The shophouse - Chop Teo Lian Hin - is today better known for its durian kuih (durian cake), pulut panggang (roasted glutinous rice) and keropok (fish crackers) which Madam Teo makes for sale. There are many more local delicacies such as paong (small bread), cimkuah (crab cake), and satay (sweetened roast meat) available for sale along this old Chinatown street. Restoran Sin Pin Siang (Ah Hong Coffee Shop) serves breakfast which includes a choice of the delicacies mentioned above. There are also several other reasonably-priced restaurants such as Restoran Chen Chen, Restoran Chan Wah Loi, Restoran Guan, Restoran Golden Dragon, Restoran Sik Wai Sin, Restoran Ho 183, Kedai Makan Soon Kee, Restoran Teck Lai, Kopitiam Cappuccino and Chef Pa Pa. Further down the road and past the old brick bridge is shophouse No. 53. It is one of the earliest brick homes in Chinatown, constructed by builders from China who were commissioned by Wee Beng Siang, a revenue farmer and the great-grandfather of the present landlord Dr. Wee Tiong Wah. There is now a new budget hotel in Chinatown called Hotel Seri Malaysia built on the land of the former Malay farm Market - Kedai Binjai. Several tourist agencies such as, No.200 & 202 Square Point Resort (Lang Tengah), No.139 Redang Bay Resort, No.181 Redang Holidays, No.167 Redang Reef Resor etc are located in Chinatown. There are also many shops - Batik Flaz, Teratai Arts and Crafts - selling souvenirs ranging from batik cloths to antiques. Similar shops can also be found at the Central Market. Two very old Chinese temples - Ho Ann Kiong (1801 A.D.) [left] and Tien Hou Kong (1896 A.D.) [bottom] - are located in Chinatown. Other than being places of worship, the temples were also community centres for the Hokkiens and Hainanese respectively, and temporary shelters for the early immigrants. Further down to the end of Jalan Kampung Cina is the Central Market - or Pasar Besar Kedai Payang - where various fruits, vegetables, textiles, household goods and sundry items are displayed for sale. The atmosphere in Chinatown is one of familiarity and informality. Walking along it feels like being back to the simple days of yesteryear. You may see old ladies in their sarong sitting in front of their shophouses, fanning themselves and watching young children at play. Throughout Chinatown, the Chinese have integrated with the local Malays. They like wearing sarongs, eating Malay food in Malay style and often speak in the typical Terengganu Malay dialect. With Kampung Cina's potential as a tourist attraction, any infill development in the town should be in harmony with its existing structures in order to preserve the historical ambiance of Chinatown.# Semua teks diatas mengenai Kampung China dipetik dari laman web eterengganu.com
<urn:uuid:cb3fd9f4-c1c1-4b93-99f0-fa96a9fbf3ea>
CC-MAIN-2017-26
http://abah740412.blogspot.com/2009/09/malaysian-postcard-china-town.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00193.warc.gz
en
0.950531
2,270
2.671875
3
Model – Theater is a three dimensional art. Make a study model. Just for you. Build it out of dirty cardboard and used tape. The messier and more ripped it gets, the more useful. Later you’ll build the clean white (or colored) model to be used by the director in blocking and by the TD, carpenters, and painters as a guide to construction. Do be sure that if a window, for instance, will be seen through, that you build it see-through to check sight lines. Practical pointers. Measure twice - cut once. Use a metal straightedge to cut against. If it lacks non-skid backing, add masking tape underneath. (Never cut along drafting tools as lines drawn later show every notch you cut!) Use sharp new blades. Remember Alice’s caution: “if you cut your finger very deeply with a knife, it usually bleeds.” Wash hands. Wipe off excess glue.
<urn:uuid:761e6540-ff6c-430a-a8d0-771119f1e1d8>
CC-MAIN-2017-26
http://devriesdesigndiary.blogspot.com/2011/02/snippet-9_11.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00193.warc.gz
en
0.9171
201
3.234375
3
Network & Internet Access Find Your Network Address Most networked devices have (at least) two addresses—the hardware or network address (also known as a “MAC address”) and the IP address. Most laptop computers have two sets of hardware and IP addresses: - a MAC address and an IP address for the wireless network adapter, and - a MAC address and an IP address for the wired network adapter (for plugging into an Ethernet wall port). The MAC, or Network, Address The “MAC” address, also known as a “network card address” or “physical address,” uniquely identifies your computer or device to the UVA network. Note that the Network Card Address/Physical Address/MAC Address is an alphanumeric value, which is listed in six groups of two hexadecimal digits, separated by hyphens (-) or colons (:), e.g., 01-2B-C5-67-89-ab or 01:2B:C5:67:89:ab. The hardware MAC address is required to register a device on the UVA network, and must be entered before your device can connect to the University network. Knowing it can be very useful in network troubleshooting, as well. See also Wikipedia on MAC Addresses. How Do I Find My Device’s Network Address? Please use an Internet search to find up-to-date instructions on how to locate the MAC address of your computer or other device. It will make your search more accurate if you include your operating system and/or your game console or mobile device’s model information in the search terms. The IP Address The IP address is a numerical label assigned to each computer or device which identifies it and allows it to communicate with other devices on a network. See also Wikipedia on IP Addresses. The IP address may be needed in order to troubleshoot stolen or duplicated IP addresses. See also IP Address Space at UVA (NetBadge access required). How Do I Find My Device’s IP Address? See What Is My IP Address or use an Internet search to find up-to-date instructions. It will make your search more accurate if you include your operating system and/or your mobile device’s model information in the search terms.
<urn:uuid:575d054f-5a19-4118-bfeb-8dacc98dbb67>
CC-MAIN-2017-26
http://its.virginia.edu/network/address.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00193.warc.gz
en
0.909117
488
3.421875
3
Plants need sunlight to change water and carbon dioxide into a form that they can use. This process, called photosynthesis, uses chlorophyll from the plant's leaves to produce carbohydrates and oxygen. Initially, the type of carbohydrate that photosynthesis produces in plants is glucose. Once the plant has captured the energy from the sun to break down carbon dioxide and water into glucose, it is then used as an essential part of the plant's metabolism. Plant proteins, enzymes and even its genetic make-up are all produced thanks to glucose. Plant glucose is also changed into fats and complex carbohydrates, which are starches. Plants use glucose in much the same way that humans do, specifically, as energy to carry out everyday functions. Glucose helps plants to have strong cell walls and tissues. The plant uses part of its glucose supply to form fiber, or cellulose. Besides giving the plant structure in the stems and leaves, plant cellulose provides humans and animals with an important source of dietary fiber. Plants also transform glucose into starches and fats. For example, in potatoes, glucose becomes a complex carbohydrate, or a starch. Starch is also found in wheat or rice, and in all whole grains. Plants use glucose to become starch in their seeds. Later, this starch forms an important source of energy during germination. Plants need sunlight to successfully carry out photosynthesis. Leaves that have direct exposure to the sun for many hours produce glucose faster than leaves that are in the shade. The green color you observe in plant leaves is actually chlorophyll, which is the other key component in photosynthesis. Thanks to this process, plants are able to produce their own source of energy, glucose. Humans benefit from photosynthesis as well. Besides oxygen production, plants' transformation of glucose into complex carbohydrates such as starch and cellulose contribute toward a healthy diet.
<urn:uuid:18a3041e-b060-4ae5-8117-d5992ab41aea>
CC-MAIN-2017-26
http://www.gardenguides.com/87413-glucose-used-plant.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00193.warc.gz
en
0.952049
376
4.0625
4
It is of interest to know how to obtain as high an absorption efficiency as possible from a co2-absorption canister used in closed- circuit breathing apparatus. In this study the Bureau of Mines found that varying the bed depth and the cross-sectional area of a canister changes it absorption characteristics. In tests using four, rectangular, variable-depth canisters with different cross- sectional areas, the Bureau found that, given a constant weight of the chemical absorbent, lioh, and a constant co2 input, the canisters, with a greater cross-sectional area reached co2 levels of 0.5 Volume-percent in the effluent gas sooner than did the canisters with a greater bed depth. However, resistance to flow through the canister increases with bed depth, and a trade-off is inevitable. It was anticipated that the efficiency of a canister would increase with increasing intergranular air space approaching the tidal volume of the breathing waveform and then level off at some point under 100 percent. This postulation was partially substantiated. Cylindrical and radial canisters were also tested and compared. It appears that shape is not as important a factor in absorption efficiency as bed depth, since neither canister differed significantly from the rectangular canisters with regard to absorption efficiency values.
<urn:uuid:85f6ff0a-aea7-46b5-9924-1d73d04424a5>
CC-MAIN-2017-26
https://www.cdc.gov/niosh/nioshtic-2/10006642.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00193.warc.gz
en
0.943677
264
2.84375
3
Last year, I had my 6th graders make sunset silhouette pictures with a watercolor background, and Sharpie marker (fine and ultra fine tip) for the silhouettes. The students did a nice job drawing their silhouettes, but many of them got lazy with filling them in with markers. It is fairly tedious to color a large area in neatly with a marker. This year, I tried a similar project with my 4th graders, but after we drew the outlines of the silhouettes with Sharpies, I had them paint in the shapes with tempera. I told them that anything small could be filled in with marker, but to do the larger objects with paint. This gave much better results over all! Below are a few examples of 4th grade art.
<urn:uuid:78745a65-2c1c-4244-8d1f-24261aa46cb7>
CC-MAIN-2017-26
http://missyoungsartroom.blogspot.com/2013/01/4th-grade-sunset-silhouette-paintings.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320209.66/warc/CC-MAIN-20170624013626-20170624033626-00274.warc.gz
en
0.982141
157
2.546875
3
British soldier John Pryor sent letters home to his family from a Nazi POW camp for five years during World War II. Seventy years later, they finally know what he actually wrote. A mathematician at Plymouth University has deciphered the coded messages hidden inside the innocuous-looking letters for the first time since the war, revealing Pryor was really asking for items to help him escape and reporting details of German military targets, the BBC reports. The BBC explains that the code, which Pryor would have learned from British secret agents, involved taking the first letters of each word, translating those letters to numbers, and then translating the numbers back to letters. Deciphered, this sentence—"A few weeks ago we arranged a rather useful scheme, so men could get 'lager'"—reads "MAPS." The letters would have been deciphered at the time by British intelligence, but were then passed on to the family in their original form. "I had known for 30 years that my father had these letters, but he could not remember the full code and so their contents lay hidden," Pryor's son, John, told the Plymouth Herald. "I can now see that despite their plight, he and his peers took incredible risks and it has only made me admire their resilience and ingenuity even more."
<urn:uuid:7421c939-9bd6-481b-a473-2a1605814c6f>
CC-MAIN-2017-26
http://www.newser.com/story/167142/mathematician-finally-cracks-pows-coded-letters.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320209.66/warc/CC-MAIN-20170624013626-20170624033626-00274.warc.gz
en
0.984189
259
3.3125
3
Historic Paris Agreement on Climate Change 195 Nations Set Path to Keep Temperature Rise Well Below 2 Degrees Celsius Paris, 12 December 2015 - An historic agreement to combat climate change and unleash actions and investment towards a low carbon, resilient and sustainable future was agreed by 195 nations in Paris today. The Paris Agreement for the first time brings all nations into a common cause based on their historic, current and future responsibilities. The universal agreement’s main aim is to keep a global temperature rise this century well below 2 degrees Celsius and to drive efforts to limit the temperature increase even further to 1.5 degrees Celsius above pre-industrial levels. The 1.5 degree Celsius limit is a significantly safer defense line against the worst impacts of a changing climate. Additionally, the agreement aims to strengthen the ability to deal with the impacts of climate change. To reach these ambitious and important goals, appropriate financial flows will be put in place, thus making stronger action by developing countries and the most vulnerable possible, in line with their own national objectives. “The Paris Agreement allows each delegation and group of countries to go back home with their heads held high. Our collective effort is worth more than the sum of our individual effort. Our responsibility to history is immense” said Laurent Fabius, President of the COP 21 UN Climate change conference and French Foreign Minister. The minister, his emotion showing as delegates started to rise to their feet, brought the final gavel down on the agreement to open and sustained acclamation across the plenary hall. French President Francois Hollande told the assembled delegates: “You’ve done it, reached an ambitious agreement, a binding agreement, a universal agreement. Never will I be able to express more gratitude to a conference. You can be proud to stand before your children and grandchildren.” UN Secretary General Ban Ki-moon said: “We have entered a new era of global cooperation on one of the most complex issues ever to confront humanity. For the first time, every country in the world has pledged to curb emissions, strengthen resilience and join in common cause to take common climate action. This is a resounding success for multilateralism.” Christiana Figueres, Executive Secretary of the UN Framework Convention on Climate Change (UNFCCC), said: “One planet, one chance to get it right and we did it in Paris. We have made history together. It is an agreement of conviction. It is an agreement of solidarity with the most vulnerable. It is an agreement of long-term vision, for we have to turn this agreement into an engine of safe growth.” “Successive generations will, I am sure, mark the 12 December 2015 as a date when cooperation, vision, responsibility, a shared humanity and a care for our world took centre stage,” she said. “I would like to acknowledge the determination, diplomacy and effort that the Government of France have injected into this remarkable moment and the governments that have supported our shared ambition since COP 17 in Durban, South Africa,” she said. Agreement Captures Essential Elements to Drive Action Forward The Paris Agreement and the outcomes of the UN climate conference (COP21) cover all the crucial areas identified as essential for a landmark conclusion: - Mitigation – reducing emissions fast enough to achieve the temperature goal - A transparency system and global stock-take – accounting for climate action - Adaptation – strengthening ability of countries to deal with climate impacts - Loss and damage – strengthening ability to recover from climate impacts - Support – including finance, for nations to build clean, resilient futures As well as setting a long-term direction, countries will peak their emissions as soon as possible and continue to submit national climate action plans that detail their future objectives to address climate change. This builds on the momentum of the unprecedented effort which has so far seen 188 countries contribute climate action plans to the new agreement, which will dramatically slow the pace of global greenhouse gas emissions. The new agreement also establishes the principle that future national plans will be no less ambitious than existing ones, which means these 188 climate action plans provide a firm floor and foundation for higher ambition. Countries will submit updated climate plans – called nationally determined contributions (NDCs) – every five years, thereby steadily increasing their ambition in the long-term. Climate action will also be taken forward in the period before 2020. Countries will continue to engage in a process on mitigation opportunities and will put added focus on adaptation opportunities. Additionally, they will work to define a clear roadmap on ratcheting up climate finance to USD 100 billion by 2020 This is further underlined by the agreement’s robust transparency and accounting system, which will provide clarity on countries’ implementation efforts, with flexibility for countries’ differing capabilities. “The Paris Agreement also sends a powerful signal to the many thousands of cities, regions, businesses and citizens across the world already committed to climate action that their vision of a low-carbon, resilient future is now the chosen course for humanity this century,” said Ms Figueres. Agreement Strengthens Support to Developing Nations The Paris Agreement underwrites adequate support to developing nations and establishes a global goal to significantly strengthen adaptation to climate change through support and international cooperation. The already broad and ambitious efforts of developing countries to build their own clean, climate-resilient futures will be supported by scaled-up finance from developed countries and voluntary contributions from other countries. Governments decided that they will work to define a clear roadmap on ratcheting up climate finance to USD 100 billion by 2020 while also before 2025 setting a new goal on the provision of finance from the USD 100 billion floor. Ms. Figueres said. “We have seen unparalleled announcements of financial support for both mitigation and adaptation from a multitude of sources both before and during the COP. Under the Paris Agreement, the provision of finance from multiple sources will clearly be taken to a new level, which is of critical importance to the most vulnerable.” International cooperation on climate-safe technologies and building capacity in the developing world to address climate change are also significantly strengthened under the new agreement. Signing the Paris Agreement Following the adoption of the Paris Agreement by the COP (Conference of the Parties), it will be deposited at the UN in New York and be opened for one year for signature on 22 April 2016--Mother Earth Day. The agreement will enter into force after 55 countries that account for at least 55% of global emissions have deposited their instruments of ratification. Cities and Provinces to Companies and Investors Aligning Today’s landmark agreement was reached against the backdrop of a remarkable groundswell of climate action by cities and regions, business and civil society. During the week of events under the Lima to Paris Action Agenda (LPAA) at the COP, the groundswell of action by these stakeholders successfully demonstrated the powerful and irreversible course of existing climate action. Countries at COP 21 recognised the enormous importance of these initiatives, calling for the continuation and scaling up of these actions which are entered on the UN-hosted NAZCA portal as an essential part in the rapid implementation of the Paris Agreement. The LPAA and NAZCA have already captured climate actions and pledges covering: - Over 7,000 cities, including the most vulnerable to climate change, from over 100 countries with a combined population with one and a quarter billion people and around 32% of global GDP. - Sub-national states and regions comprising one fifth of total global land area and combined GDP of $12.5 trillion. - Over 5,000 companies from more than 90 countries that together represent the majority of global market capitalisation and over $38 trillion in revenue. - Nearly 500 investors with total assets under management of over $25 trillion Christiana Figueres said: “The recognition of actions by businesses, investors, cities and regions is one of the key outcomes of COP 21. Together with the LPAA, the groundswell of action shows that the world is on an inevitable path toward a properly sustainable, low-carbon world.” More Details on the Paris Agreement - All countries will submit adaptation communications, in which they may detail their adaptation priorities, support needs and plans. Developing countries will receive increased support for adaptation actions and the adequacy of this support will be assessed. - The existing Warsaw International Mechanism on Loss and Damage will be significantly strengthened. - The agreement includes a robust transparency framework for both action and support. The framework will provide clarity on countries’ mitigation and adaptation actions, as well as the provision of support. At the same time, it recognizes that Least Developed Countries and Small Island Developing States have special circumstances. - The agreement includes a global stocktake starting in 2023 to assess the collective progress towards the goals of the agreement. The stocktake will be done every five years. - The agreement includes a compliance mechanism, overseen by a committee of experts that operates in a non-punitive way. The COP also closed on a number of technical issues. - Under the Kyoto Protocol, there is now a clear and transparent accounting method for carry-over credits for the second commitment period, creating a clear set of rules. - The first round of international assessment and review process (IAR) that was launched in 2014 was successfully completed. - A number of technical and implementation issues related to the existing arrangements on technology, adaptation, action for climate empowerment and capacity building were also successfully concluded.
<urn:uuid:85c9af9a-e608-4f80-a0ae-46485dcb80c0>
CC-MAIN-2017-26
http://seforall.org/2015_12_12_historic-paris-agreement-on-climate-change
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320707.69/warc/CC-MAIN-20170626101322-20170626121322-00514.warc.gz
en
0.937255
1,965
2.703125
3
High carbon dioxide levels set a record Updated 7:13 am, Thursday, May 1, 2014 There's striking new evidence that Earth's atmosphere is increasingly saturated with carbon dioxide, the major gas from fossil fuel emissions that trigger climate change. Measurements of the climate-changing gas by instruments high on a mountain in Hawaii and around the world show that global emissions from burning fossil fuels rose last month to levels higher than at any time in human history - and higher than it has been in hundreds of thousands of years. "This should be taken as a warning," said Ken Caldeira, an atmospheric scientist with the Carnegie Institution's department of global ecology at Stanford University. "It is time to stop building things with tailpipes and smokestacks. Latest news videos "It is time to stop using the sky as a waste dump for our carbon dioxide pollution. If we fail to heed this warning, our children will end up living in a world that is much hotter than any human being has ever experienced." The instruments that have been measuring carbon dioxide for more than 50 years showed that for the entire month of April, levels of the gas exceeded 400 parts per million for the first time, said Pieter Tans, a climate scientist at the National Oceanic and Atmospheric Agency who monitors the instrument record. The precise average for the entire month was 401.25 parts per million as of Tuesday, he said, and that level had only reached the crucial 400 threshold for the first time during a single day a year ago before dipping slightly. Records from ice cores drilled in Antarctica reveal air bubbles trapped in the ice as long ago as 800,000 years ago and not one of those gas bubbles has revealed carbon dioxide levels higher than 300 parts per million, Tans said. "And they were probably that low millions of years ago," he said. "The rise of carbon dioxide levels above 400 parts per million is an indicator that the problem of global warming is getting worse, not better," said Mark Z . Jacobson, a Stanford atmospheric scientist and environmental engineer, in an e-mail. "This means we need to focus more heavily on solutions to this problem, namely converting to wind, water and solar power for all purposes. "Failure to convert will result in a growing risk of economic, social and political instability as warming and air pollution worsens while fossil-fuel prices rise. Such risks can be averted by switching rapidly, but cannot be averted so easily if a switch is delayed." The record that reveals strikingly high levels of the gas is known to climate scientists as the Keeling Curve. It was developed by the late Charles D. Keeling, a climate scientist at the Scripps Institute of Oceanography in San Diego. His son, Ralph Keeling at Scripps, continues to compile the record from eight monitoring stations around the world.
<urn:uuid:06e8c6b8-fa49-46b5-88dd-7799e2f417fd>
CC-MAIN-2017-26
http://www.sfgate.com/science/article/High-carbon-dioxide-levels-set-a-record-5443592.php?cmpid=hp-hc-bayarea
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320995.93/warc/CC-MAIN-20170627050500-20170627070500-00594.warc.gz
en
0.953921
586
3.203125
3
Farmworker wages in California: Large gap between full-time equivalent and actual earnings A report in the LA Times last week explored why farmers in the Central Valley are having a hard time finding enough workers, despite reportedly paying up to 40 percent more than the California minimum wage. “Today, farmworkers in the state earn about $30,000 a year if they work full time—about half the overall average pay in California,” notes the Times. “Most work fewer hours.” The second sentence here is key: most farmworkers are not employed 40 hours a week 52 weeks a year, so most earn far less than $30,000 per year. In fact, in 2015, workers who received their primary earnings from agricultural employers earned an average of $17,500—less than 60 percent of the average annual wage of a full-time equivalent (FTE) worker in California. Many farmworkers are paid an hourly rate higher than California’s minimum wage—$10.00 or $10.50 an hour in 2017, depending on whether the employer has 25 or less, or 26 or more employees, respectively—and workers who are paid piece rates, which reflect how much they pick or prune, often earn $12 to $14 an hour. Many young male farmworkers aim to earn $100 a day, which is $12.50 an hour for an eight-hour day and $14.30 an hour for a seven-hour day. But farmworkers typically are not employed in agriculture year-round. Many farm jobs are seasonal, and few workers migrate between California farming regions—those who pick vegetables in southern California deserts between January and May rarely move to the San Joaquin Valley to pick fruit between July and September. Annual full-time equivalent (FTE) and average wages for California farmworkers, 2015 |FTE Pay||Actual Wages| |Farm labor contractor||$22,464||$9,865| Note: All wages shown are in 2015 dollars. Source: Quarterly Census of Employment and Wages (Bureau of Labor Statistics, U.S. Department of Labor), https://www.bls.gov/cew, and special tabulations provided to the authors by CA Employment Development Department (March 7, 2017). So what’s behind the “about $30,000 a year” for a farmworker’s annual pay? Employers report employment and wages when they pay unemployment insurance taxes, and these data are published as the Quarterly Census of Employment and Wages (QCEW). According to the QCEW, 16,400 California agricultural establishments employed an average of 421,300 workers during 2015 and paid them $12.8 billion, or $30,300 per year for a FTE employee, equivalent to $14.60 an hour for 2,080 hours of work. However, the QCEW grossly undercounts the number of agricultural employees and therefore overstates the pay per employee. The average employment measurement in the QCEW accounts for workers on the payroll for the payroll period that includes the 12th day of the month. Most farmworkers are paid weekly, so employment covers workers employed for the second week of the month. However, employers report wages for all workers who were hired during the month, including those employed at the beginning and end of the month—even if they weren’t employed during the payroll period covering the 12th day. Dividing total wages by average employment in California agriculture reported in the QCEW generates the $30,300 earnings of an FTE employee. The California Employment Development Department extracted all Social Security Numbers (SSNs) reported by agricultural establishments and found 848,000 unique SSNs in 2015, which, compared with the 421,300 workers reported by the QCEW, means there were an average of two workers per FTE farm job. We assigned workers to the commodity or North American Industry Classification System (NAICS) code in which they had their maximum earnings, and found that 705,000 had their highest earnings in agriculture. Their average earnings were $17,500—just over half of the FTE average. Furthermore, most workers are brought to farms by crop support services companies or agents, such as farm labor contractors (FLCs), who usually pay lower-than-average wages. (The most recent data available show that in March 2014, workers hired directly by farmers had average hourly earnings of $14 an hour, compared with $12.55 for those brought to farms by FLCs.) The gap between average FTE earnings and actual earnings for farmworkers is widest for the grouping with the largest number of workers: those employed by FLCs. In 2015, an average worker employed by an FLC full-time and year-round for 2,080 hours would have earned $22,500 or $10.80 an hour. In fact, the average annual earnings of the almost 300,000 FLC employees were less than $10,000, suggesting just under $10 an hour for 1,000 hours of work. When thinking about and analyzing the wages of farmworkers, it’s of the utmost importance to consider what they’re actually paid—not what they would earn if they worked full-time year-round, since very few of them do. (For more on information, analysis and data on farmworkers, Rural Migration News is an invaluable resource.)
<urn:uuid:b19bdcb4-e997-4ea1-8363-7c1abb02c160>
CC-MAIN-2017-26
http://www.epi.org/blog/farmworker-wages-in-california-large-gap-between-full-time-equivalent-and-actual-earnings/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323801.5/warc/CC-MAIN-20170628204133-20170628224133-00034.warc.gz
en
0.968013
1,126
2.734375
3
In mid-December, Emma and Harriet make a charitable visit to a poor and sick family near Mr. Elton’s vicarage. Harriet wonders that Emma remains single despite her charms, and Emma explains that she has no need to marry, and unless she should fall in love, it would be a mistake to marry. Emma has none of “the usual inducements of women to marry” because of her high position in society and fortune. Implied is the reality of gender inequality in Austen’s era, in which women must marry to gain financial security. When Harriet frets that Emma will become an old maid like Miss Bates, Emma scornfully insists that the only thing she and Miss Bates could ever share in common is their singleness: Miss Bates is silly, ignorant, gossipy, and poor. Emma insists that there is no disadvantage in being an old maid except if you are poor, which renders celibacy contemptible to society. Emma’s strong will and independence are unusual for a woman in her era, and in this sense she is a remarkable heroine for gender equality. Yet her self-assurance stems from her financial security, which reveals the social inequality: Emma’s ability to avoid marriage is dependent on her wealth. The two women proceed to assist the impoverished family with great dedication, and they leave filled with compassion for the poor. When Mr. Elton runs into them as they return home, Emma attempts to give him time alone with Harriet by various means—stopping to tie her shoe, taking a different path, pausing at the vicarage for a shoelace—but to no avail. Emma is disappointed that Mr. Elton does not declare his love for Harriet, but she assumes he will propose soon enough. Emma’s charity reveals a favorable facet of compassion in her character, but it is one that is quickly superseded by her matchmaking schemes. She becomes immediately absorbed by her ambitions for Mr. Elton and Harriet, and the remainder of the chapter is dedicated to her elaborate, comical attempts to enable his proposal.
<urn:uuid:0e292e71-8500-4e16-93f6-7b480f58651f>
CC-MAIN-2017-26
http://www.litcharts.com/lit/emma/chapter-10
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323801.5/warc/CC-MAIN-20170628204133-20170628224133-00034.warc.gz
en
0.971678
436
3.1875
3
Along with odour, flower colour is perhaps the most important cue plants use to advertise to pollinators. Change the colour of a flower and that change can have large consequences on which pollinating animals are likely to visit. Bees, for example, are attracted to purple flowers with UV highlights. If that plant were to mutate to white, it could very well find itself being visited by nocturnal moths. In studying plant-pollinator evolution and ecology, it is very important then that we have some objective quantification of the colour of a flower. Human eyes are famously fallible and many insects and birds can see outside the range of our colour vision (400 – 700 nm). The instrument we use is a spectrometer. It uses optic fibres to bounce an initially white-light beam off the surface you want to measure. The wavelengths of light that are reflected (as opposed to absorbed) determine the colour of the surface you are looking at. The spectrometer collects the reflected light, separates the wavelengths through diffraction and digitises the signal. The result is a graph such as the one above. In the graph, the wavelength is given on the horizontal axis, while the proportion of reflectance is on the vertical. The rainbow bar above provides an approximation of how the human eye perceives a given wavelength of light. The rose therefore will reflect greatest at wavelengths above 620 nm, the red part of the spectrum. A violet most strongly reflects around 420 – 480 nm. A pure white surface would show high reflectance across the range of the visible light spectrum. Dedicated to my sweetheart, who for the second year in a row has been alone on Valentine’s. Kniphofia are red, Agapanthus are blue. Fieldwork is fun, But I do miss you.
<urn:uuid:1d2d3294-ce75-45f8-bd33-cbfe4519737e>
CC-MAIN-2017-26
https://michaelrwhitehead.wordpress.com/2014/02/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323801.5/warc/CC-MAIN-20170628204133-20170628224133-00034.warc.gz
en
0.939046
372
3.96875
4
Crowding Out Effect What it is: The crowding out effect describes the idea that large volumes of government borrowing push up the real interest rate, making it difficult or close to impossible for individuals and small companies to obtain loans. How it works (Example): The theory behind the crowding out effect assumes that governmental borrowing uses up a larger and larger proportion of the total supply of savings available for investment. Because demand for savings increases while supply stays the same, the price of money (the interest rate) goes up. Crowding out begins to take effect when the interest rate level reaches a point at which only the government can afford to borrow. Unable to compete for loans under such circumstances, individuals and smaller-scale companies are forced (crowded) out of the market. Why it Matters: Because crowding out leads to decreases in private sector consumption and, therefore, slows economic growth, the crowding out effect should be a serious consideration for any government that plans to get an increasing percentage of its funding through the capital markets. [In its efforts to stimulate the economy, the U.S. government is accumulating trillions and trillions in national debt. A debt that size can be hard to comprehend. But if you're interested in putting it in perspective, click here to read 5 Ways to Visualize Our $13 Trillion National Debt.]
<urn:uuid:243ea85d-e723-4481-8fc7-42e12470a5f7>
CC-MAIN-2017-26
http://www.investinganswers.com/financial-dictionary/economics/crowding-out-effect-2159
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00114.warc.gz
en
0.922039
278
3.78125
4
Üye Girişi yapın, temin süresi ve fiyatını size bildirelim. Üye Girişi yapın, sizi bu ürün stoklarımıza girdiğinde bilgilendirelim. Temin süremiz 28 - 42 iş günü Yayıncı Cambridge University Press ( 05 / 2015 ) ISBN 9781107030145 | Ciltli | 23,5 x 16,3 cm | İngilizce | Türler Felsefe Tarihi | Etik Unlike many important leaders and historical figures, Abraham Lincoln is generally regarded as a singularly good and morally virtuous human being. Lincoln's Ethics assesses Lincoln's moral character and his many morally fraught decisions regarding slavery and the rights of African-Americans, as well as his actions and policies as commander in chief during the Civil War. Some of these decisions and policies have been the subject of considerable criticism. Lincoln undoubtedly possessed many important moral virtues, such as kindness and magnanimity, to a very high degree. Despite this, there are also grounds to question the goodness of his character. Many fault him as a husband, father and son, and many claim that he was a racist. Carson explains Lincoln's virtues and assesses these criticisms.
<urn:uuid:e7141f77-dd8e-41e6-8ddd-caac986724e6>
CC-MAIN-2017-26
http://www.pandora.com.tr/urun/lincolns-ethics/493842
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00114.warc.gz
en
0.850596
289
3.265625
3
A new study from the US suggests that social interaction should be considered an important factor for extending lifespan, on a par with other health and lifestyle factors, to the extent that low social interaction harms longevity as much as alcoholism and smoking, has more impact than lack of exercise, and is twice as harmful as obesity. Researchers at Brigham Young University (BYU) in Provo, Utah, conducted a meta-analysis of published studies and found that having social ties with friends, family, neighbours and colleagues can improve our odds of survival by 50 per cent. You can read about their study online in a paper published in the July issue of PLoS Medicine. “The idea that a lack of social relationships is a risk factor for death is still not widely recognized by health organizations and the public,” noted the journal editors in their summary. First author Dr Julianne Holt-Lunstad, a professor in the Department of Psychology at BYU, and co-authors Dr Timothy Smith, a professor of Counseling Psychology at BYU, and Brad Layton, formerly of BYU and now working towards a PhD in epidemiology at the University of North Carolina at Chapel Hill, suggest that social relationships should be added to the shortlist of factors that impact a person's odds of living or dying. For their analysis, they pooled data from 148 published longitudinal studies (the sort that track groups of people over time, taking observations now and again), and found that low social interaction had a similar impact on lifespan as being an alcoholic or smoking 15 cigarettes a day. It was also more harmful than physical inactivity, and twice as harmful as obesity, they suggested. The studies they examined measured the frequency of human interaction and tracked a range of health outcomes for an overall average period of 7.5 years. If the studies had also yielded data on quality of relationships, the authors suggest the impact of healthy social interaction on odds of survival could be higher than 50 per cent. To work out the impact statistically, Holt-Lunstad and colleagues extracted an “effect size” from each study: this quantifies the difference between two groups, in this case, the likelihood of death between groups that differed in terms of their social ties. Using a statistical method known as “random effects modeling” they then worked out the average effect size as an odds ratio (OR), which essentially expresses the chance of something happening (in this case death) in one group with the chance of it happening in another group, as a ratio. Holt-Lunstad told the press that the data they analyzed only showed whether the participants were “integrated in a social network”; there wasn't enough detail to enable them to separately examine the negative and positive effects of being in the network, “they are all averaged together,” she added.
<urn:uuid:7cdc04c0-1bab-4976-9d82-7e8df379526e>
CC-MAIN-2017-26
http://www.healthfreedoms.org/low-social-interaction-harms-lifespan-on-a-par-with-obesity-smoking-inactivity/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319265.41/warc/CC-MAIN-20170622114718-20170622134718-00234.warc.gz
en
0.968499
576
3.03125
3
The theme of an “in-group” in The Great Gatsby by F. Scott Fitzgerald reminded me of a discussion we had in one of my other classes in which we talked about borders and how they produce certain identities. Borders surrounding countries subdivide the planet and create a distinction between those who are “in” versus those outside. A border symbolically creates inclusion through exclusion of people who are deemed “other”. Divisions between racial groups in particular derive from the fact that racism has played such a major role in history and we are clearly still struggling with equality for all groups of people. Physical borders in countries prevent the mixing of people, and therefore of culture and knowledge. In the novel, Fitzgerald makes it clear that the upper class of society consisted of all whites who had the right connections and enormous amounts of wealth. I think it is interesting how not one of the main characters was a person of color, though I realize that this is because of the historical time frame in which the story takes place. Gatsby’s lavish parties filled with rich people who seem to lead only shallow lives reminded me of the idea of borders. The scene we watched in class in which Nick was looking out onto the street at how the African American people were spending their night was making a clear distinction between the various classes or racial groups in society. Nick and his group were enjoying life while the girl across the street was looking dreamily out of the window. This scene implied that money and status in society dictate “in” and “out” groups. Wealth and the color of the characters’ skin created a border that meant exclusion for the people of color. Even in today’ society we see clear divisions between racial groups, whether in terms of simply wealth or the meaning of “white privilege” as we discussed earlier. Imaginary borders between groups of people are the result of a long history of discrimination and hatred, however I like to think that coming generations are helping to dissolve these divisions.
<urn:uuid:b546f8e2-c13b-46ac-8575-4e25cf291259>
CC-MAIN-2017-26
https://vanderbiltwhiteness.wordpress.com/2017/02/21/exclusion-in-the-great-gatsby/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319265.41/warc/CC-MAIN-20170622114718-20170622134718-00234.warc.gz
en
0.975963
413
3.578125
4
Drug detoxification (informally, drug detox) is variously the intervention in a case of physical dependence to a drug; the process and experience of a withdrawal syndrome; and any of various treatments for acute drug overdose. Medical detoxification safely manages the acute physical symptoms of withdrawal associated with stopping drug use. However, medical detoxification is only the first stage of addiction treatment and by itself does little to change long-term drug use. Although detoxification alone is rarely sufficient to help addicts achieve long-term abstinence, for some individuals it is a strongly indicated precursor to effective drug addiction treatment. A detoxification program for physical dependence does not necessarily address the precedents of addiction, social factors, psychological addiction, or the often-complex behavioral issues that intermingle with addiction. The United States Department of Health and Human Services acknowledges three steps in a drug detoxification process: Alcohol detoxification, or detox, for individuals with alcohol dependence, is the abrupt cessation of alcohol intake, a process often coupled with substitution of cross-tolerant drugs that have effects similar to the effects of alcohol in order to prevent alcohol withdrawal. As such, the term “detoxification” may be somewhat of a misnomer since the process need not refer exclusively to the removal of toxic substances from the body. Detoxification may or may not be indicated depending upon an individual’s age, medical status, and history of alcohol intake. For example, a young man who binge drinks and seeks treatment one week after his last use of alcohol may not require detoxification before beginning treatment for alcoholism. Benzodiazepines such as chlordiazepoxide (Librium), diazepam (Valium), lorazepam (Ativan) or oxazepam (Serax) are the most commonly used drugs used to reduce alcohol withdrawal symptoms. There are several treatment patterns in which it is used. The first option takes into consideration the varying degrees of tolerance. In it, a standard dose of the benzodiazepine is given every half-hour until light sedation is reached. Once a baseline dose is determined, the medication is tapered over the ensuing 3–10 days. Another option is to give a standard dose of benzodiazepine based on history and adjust based on withdrawal phenomenon. A third option is to defer treatment until symptoms occur. This method should not be used in patients with prior, alcohol-related seizures. This has been effective in randomized controlled trials. A non-randomized, before and after, observational study found that symptom triggered therapy was advantageous. Source: drugabuse.gov, wikipedia.org
<urn:uuid:39a3b6d3-48a8-48a6-bfb6-9c5996fa67ec>
CC-MAIN-2017-26
https://www.nationaltreatmentcenters.org/services/detox/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319265.41/warc/CC-MAIN-20170622114718-20170622134718-00234.warc.gz
en
0.932862
541
3.28125
3
Friends are constantly giving us their old electronics. We love it because our junk box is a never-ending pile of possibilities. We’re really starting to amass a collection of LCD screens that are not easily interfaced and this project gives us some hope for the future. [Philip] has been posting about using an FPGA as a driver for a replacement PSP LCD screen. Many projects source cell phone LCD screens that have their own driver chip that can be addressed over SPI for use with a simple microcontroller. More complicated screens need a more involved control scheme and this is where the Field Programmable Gate Array takes over. [Philip] lays out the steps he’s using to implement his controller, from setting up the correct voltage levels, to planning for coordinate addressing, and even some of his follies with reverse current. We think this would be a great way to introduce yourself to FPGA projects.
<urn:uuid:0d6e5a41-775b-4cbf-8bd3-0631e268bd45>
CC-MAIN-2017-26
http://hackaday.com/2009/12/12/fpga-driver-for-psp-screen/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320040.36/warc/CC-MAIN-20170623082050-20170623102050-00474.warc.gz
en
0.958552
189
2.65625
3
WASHINGTON, April 9 (UPI) -- Micro-organisms in the Gulf of Mexico cleaned oil from the 2010 oil spill better than expected though long-term effects are uncertain, U.S. researchers found. A federal judge in New Orleans is reviewing a case involving the 2010 oil spill in the Gulf of Mexico. British energy company BP leased the Deepwater Horizon rig from Transocean. A blowout at the Macondo well sparked a blaze that sunk the rig, killed 11 workers and led to one of the worst oil spills in the history of the industry. Terry Hazen, a biologist specializing in bioremediation at the University of Tennessee, Knoxville, told the BBC that specialized micro-organisms called methanotrophs were able to consume some of the oil spilled from the incident. "That's why I think the Gulf of Mexico is cleaner than you would expect, not only from the oil but from everything else that goes into it," he said. The National Wildlife Foundation said last week that said dolphin deaths in the region affected by the oil spill were elevated every month since the April 2010 accident. Sea turtles and coral colonies didn't fare any better in parts of the Gulf of Mexico affected by the spill, NWF found Hazen agreed, saying the duration of oil contamination made it difficult to assess the long-term impacts on the gulf ecosystem. "I am quite worried about how resilient the Gulf of Mexico is," he said.
<urn:uuid:c1b5b3c6-a43d-4c32-834c-16165b008f48>
CC-MAIN-2017-26
http://www.upi.com/Business_News/Energy-Industry/2013/04/09/Microbes-ate-Macondo-oil-in-Gulf-of-Mexico/UPI-16111365512907/?st_rec=59011366633020
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320040.36/warc/CC-MAIN-20170623082050-20170623102050-00474.warc.gz
en
0.972839
298
3.015625
3
Food manufacturing has always been a part of human culture. What began centuries ago with salt preservation, sun drying, and fermentation is now a billion dollar industry with amazing technical advances. One of those advances is the use of mixers. Mixers blend dry or liquid food contents together to create great tasting food in a quick and convenient manner. One of the most important and commonly used mixers is called an impeller mixer. What is an Impeller Mixer? Impeller mixers create the desired consistency in food processing by converting energy from the motor in a proficient way, in a short amount of time. This means that impeller mixers (sometimes called agitators) mix food items, whether liquid or solid, in an efficient and timely manner that sometimes includes heating or cooling. Impellers assist with food production through several applications, creating a desired taste and consistency. Mixing Applications and Flow The first application is mixing two liquids, for example, milk and water or even water and oil. Impeller blades are able to effortlessly combine the two liquids into a fluid mixture creating optimum mixtures for food manufacturing. The second application is mixing two solids, usually in a powdered state. By using heating or cooling with the mixing blades, an impeller can easily unite these food products into one form during this stage of food production. The last application is mixing a liquid with a solid. Impeller mixers fluidly merge and dissolve a solid into a liquid substance, much like a sugar and water. Within all three of these applications, mixers break up gas or insoluble liquids through mixing and transferring hot or cold temperatures evenly throughout the mixtures. To perform the applications of breaking up gas and liquids, impeller mixers have two different mixing flows—axial and radial flows. Axial flow impellers act in mass motion and increase the volumetric flow during the homogenization process. Homogenization reduces the use of additives, and extends food stability, taste, and shelf life. Radial flow blends two or more liquids that are resistant to mixing and distributes heat or cooling throughout the mixture. Utilizing a variety of applications and flows, impeller mixers mix and blend all sorts of foods, benefitting the food manufacturing industry by saving energy and time. Due to impeller mixers’ high versatility with solids and liquids, and the economical impact it has in food manufacturing, impellers are and will continue to be a key part in the present and future of food production.
<urn:uuid:7f6486b8-1213-451f-b65e-9982ba18a7f7>
CC-MAIN-2017-26
http://blog.mixerdirect.com/blog/impeller-mixers-role-in-food-manufacturing/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320362.97/warc/CC-MAIN-20170624221310-20170625001310-00635.warc.gz
en
0.940031
516
3.171875
3
Cartoon penguins teach Boolean logic. Eric Redmond, the creator of Computer Science for Babies, wants to teach young children about ones and zeros before they’re even one year old. Boolean Logic for Babies, the first book in Redmond’s series of educational books for tiny humans, teaches these fundamental concepts with cartoon animals and simple language, helping kids understand “and,” “or,” and “not,” the basic logic at the heart of programming. Teaching kids algebraic concepts so early might seem like a daunting task, but the cloth book is designed much like any other reading material for children just months old. It’s attached to a teething ring, with pages stuffed with crinkly material. Characters include penguins, kittens, and pandas. There’s no actual technology involved—it’s all about logic and reasoning. Redmond is a computer scientist who has written several books on programming and computer science for adults. He’s also the father of a young daughter, and he and his wife are expecting another baby in December. He wanted to write a book to teach his own young children the computing concepts and logic they’ll need in a future driven by technology. Redmond created the book with help from teachers and educators in the Portland community. It’s based on research about early childhood development, including Mark Johnson’s “Functional brain development in humans,” and developmental milestones published by the Centers for Disease Control and Prevention. Redmond also beta-tested the book with his daughter and other young children. “From the technical side, I’m a computer scientist with a long track record of education, and broke down the minimal required knowledge that a baby could grasp, that cover the basics of computer systems,” Redmond said in an email. Redmond launched his project on Kickstarter earlier this month, hoping to raise $10,000 to publish the first book. Backers will get copies of Boolean Logic for Babies by November. Redmond said the tight turnaround is in part due to his own growing family. “I have a manufacturer, packing, and shipping all lined up,” he said. “I wanted to get the book out before the holiday season, but the biggest driver to get the book out in November is that my second baby is due in December.” The Kickstarter campaign has raised almost half of its funding goal. Stretch goals include two more books in the Computer Science for Babies series—Counting in Binary for Toddlers and Functions for Tots, both targeted at older children. Even if Redmond doesn’t raise the $15,000 he’s seeking to publish all three books, he’ll still write them for his own kids. “Since this is largely a labor of love for my daughter, I’ve already begun writing the second book,” he said. “She’ll continue growing, and as long as there’s a hole in the market that puts basic computer literacy alongside reading, writing, and arithmetic, I’ll do what I can to educate her. Besides writing code, making books is what I know best.” Screengrab via Computer Science for Babies/Kickstarter Pure, uncut internet. Straight to your inbox.
<urn:uuid:63774b1a-21dc-462e-abd2-fe27b69bf531>
CC-MAIN-2017-26
https://www.dailydot.com/debug/computer-science-babies-book-kickstarter/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320362.97/warc/CC-MAIN-20170624221310-20170625001310-00635.warc.gz
en
0.961134
703
3.015625
3
Do not remove any protective gear. Your snowmobile suit and helmet may keep you afloat for several minutes. Get your head above the surface of the water, and get your breathing under control. Swim to the edge of the solid ice you were on before you fell in. Keep your gloves on. If you have a sharp object such as a knife or ice pick, jab it into the ice so that you can pull on it. Kick your feet as hard as you can, and pull yourself up quickly with your forearms. Don't put all your weight on your elbows. If the edge breaks off, move forward to the next solid edge and try again. Crawl up onto the ice, and then crawl or roll (but don't stand—you may break through again) until you're on solid ice. Take action immediately to prevent hypothermia. If You Cannot Self-Rescue If you break through ice and are unable to get yourself out of the freezing water: Get your arms and as much of your upper body as possible out of the water. Keep your arms still. Hopefully your clothes will freeze to the ice and keep you from falling back into the water. Call for help by yelling or using a signaling device. If you plan to venture out on frozen bodies of water, consider additional equipment for emergencies. Small, tethered picks designed to be carried on a person for easy access may increase your chances of survival after falling through the ice.
<urn:uuid:5f1c9973-5e90-4c65-9e86-2c736ba3fc83>
CC-MAIN-2017-26
https://www.snowmobile-ed.com/utah/studyGuide/If-You-Break-Through-Ice/501046_700021765/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320763.95/warc/CC-MAIN-20170626133830-20170626153830-00075.warc.gz
en
0.94593
307
2.96875
3
As well as the factors we have looked at, which are all indicated on the box the film comes in, there are other aspects of film you may want to consider. Basically this is the amount by which you can over or under expose your film yet still get an acceptable result. Different types of film have differing degrees of latitude. Standard colour negative film of 100/200 ASA , the stuff most people use, can yield a reasonable enprint (6x4) from a negative 1 stop under exposed to 3 stops over exposed. Black and white negative film from 1 stop under to 2 stops over and transparency film from 1/2 stop under to 1/2 stop over. At the extremes of film speed, very low or very high, latitude may be reduced. As you can see colour negative film is very forgiving of exposure errors and will compensate for short comings in your exposure metering technique. On the other hand, if you would like to work with transparency material you must be able to expose accurately. Many people make the change from print film to transparency and are very disappointed with the results which are usually down to poor exposure technique which was not apparent using print film. A films exposure latitude is not there to make up for your mistakes, although it helps, and you will always get the best results from accurate exposure. Film consists of a layer or layers of emulsion containing light sensitive silver halide crystals coated onto a plastic base. Over or Under Exposure. This is just a quick look at the effect of under and over exposure on your photographs with different types of film. We are not talking about gross errors just what happens when you start to drift away from the correct exposure. Black and White Negative. - Over Exposure. Loss of highlight detail. Although the detail will be present in the negative special printing techniques will be required to render it correctly. - Under Exposure. Loss of shadow detail. Unlike over exposure if there is insufficient exposure to record shadow detail nothing can be done to retrieve it. - As above but with the added 'bonus' that under exposed shadows may have a colour cast. Transparency or Reversal Film
<urn:uuid:ea1f0913-5fc6-40a6-8260-ee6fa0d634d7>
CC-MAIN-2017-26
http://www.silverlight.co.uk/tutorials/compose_expose/film2.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321306.65/warc/CC-MAIN-20170627083142-20170627103142-00155.warc.gz
en
0.935042
442
3.171875
3
The power system deals with voltage above 36KV, is regarded as high voltage. Since the voltage level is high, the arcing formed during switching operation is also quite high. Therefore, special care is to be taken during the designing of high voltage switchgear. High voltage circuit breaker is the major component of HV switchgear, thus high voltage circuit breaker ought to have special features for reliable and safe operation. Switching operation and faulty tripping of high voltage circuit are very rear. At time these circuit breakers remain, at ON state, and might be operated after a long period of time. Thus CBs must be dependable enough to make sure of safe operation, as when necessary. High voltage circuit breaker technology has changed drastically in the last 15 years. SF6 circuit breaker, air blast circuit breaker and minimum oil circuit breaker are mostly used for high voltage switchgear. Vacuum circuit breaker is hardly used for this purpose since till date vacuum technology is not sufficient for interrupting very high voltage short circuit current. There are two kinds of SF6 circuit breaker, that is, single pressure SF6 breaker and two pressures circuit breaker. Single pressure system is the latest and updated high voltage switchgear system, these days. Nowadays SF6 gas as arc quenching medium has become most accepted for high and extra high voltage electrical power system. Though, SF6 gas has strong influence on the greenhouse effect. It has 23 times stronger influence on the greenhouse effect, than that of CO2. Therefore, leakage of SF6 gas in the service life of circuit breaker should be prevented. For minimizing the emission of CF4 – SF6, N2 – SF6 and SF6 gas mixture, might be used in circuit breaker in future, as an alternate of pure SF6. It should always be taken into consideration that, no SF6 gas comes out in atmosphere throughout the maintenance of CB. Switch boards, comprising the Main LV switch board, also known by the acronym MLVS are vital to the dependability of electrical installation. It must act in accordance with the set guidelines that govern the construction and design of LV switch gear congregations. A switchboard is the point at which an incoming power supply segregates into separate circuits, each of that is controlled and protected by the switchgear or fuses of the switchboard. Switchboard is partitioned into a couple of functional units, comprising all the mechanical and electrical elements that contribute to the fulfillment of a given purpose. It symbolizes a key link in the constancy chain. Therefore, the type of switchboard should be perfectly modified to its application. Switchboard Manufacturers must note that the construction and design must comply with working practices and applicable standards. The switchboard enclosure offers dual protection: - Security of switchgear, indicating relays, fusegear, instruments, etc. against vibrations, mechanical impacts and various other external influences are prone to interfere with operational integrity (dust, EMI, vermin, moisture, etc.) - The defense of human life against the possibility of direct and indirect electric shock. Modern industrial switchboards are sternly fabricated with metal enclosed design construction; no energized parts are easy to get while the panels and covers are closed. Earlier, open switchboards were made with switches and several other devices were mounted on panels fabricated of ebony, granite or slate asbestos board. Metal enclosure of switchboard is linked to earth ground for personnel protection. Large switchboards might be unattached floor mounted enclosures with stipulation for incoming connections at the top or bottom of the enclosure. Switchboard may perhaps have incoming bus duct or bus bars for the source connection and for large circuits fed from the board. Switchboard might include a control or metering compartment estranged from the power distribution conductors. Electrical Substation, a part of an electrical transmission, distribution and generation system’s main concern is encountering is its cost and reliability. An apt design attempts to strike a balance between the two sub stations, to attain reliability without a high cost. The design must also allow growth of the station, whenever obligatory. Selection of the location of Electrical Substations must consider a lot of factors. Adequate land area is obligatory for installation of equipment with obligatory clearances for electrical protection, and for access to preserve large electrical machines like transformers. Where the land is expensive, like in urban areas; gas insulated switchgear may perhaps save money. The location or the spot must have room for expansion because of the load growth or premeditated transmission additions. Ecological effects of the substation should be considered, like, road traffic, noise and drainage effects. Earthing or grounding system ought to be designed. The total ground probable rise, and the gradients in probable throughout the fault (known as “touch” and “step” potentials), have got to be calculated to defend passers-by throughout the short-circuit in the transmission system. The substation locations have got to be rationally central to the distribution area to be provided. The location should be secure from intrusion by passers-by, together with protecting people from harm by arcs or electric shock, and to defend the electrical system from disoperation because of vandalism. The primary step in planning a substation layout is the planning out of one line diagram that shows in simplified form the switching and protection requisite display and the incoming supply lines and transmission lines or outgoing feeders. It is a general practice by several electrical utilities to chart out one-line diagrams with principal elements, such as, switches, lines, transformers, circuit breakers set on the page similarly to the way the apparatus would be laid in the definite station. Electrical switchgear is a term that comprises of all the switching devices related with mostly the power system protection. Switchgears in substations are situated on both the low voltage and high voltage side of large power transformers. The switchgear on the lower voltage side of the transformers may perhaps be located in the building, with medium voltage circuit breakers for distribution circuits, all along with protection, control and metering equipment. Medium Voltage Switchgear Application An arc furnace is necessary to get switch off and on often. The current to be switched might be from 0 to 8 times of the rated current of the furnace. An arc furnace is be switched on and off at its normal rated current up to 2000A, approximately 100 times per day. A normal, oil, air or SF6 circuit breaker is not at all reasonable for this frequent operation. Typical vacuum circuit breaker is most suitable alternative for this frequent high current circuit breaker operation. One more application of medium voltage switchgear is single phase railway track system. The major function of the circuit breaker is linked with railway traction system, is to disrupt short circuit, on the overhead catenary system that come about frequently and are transitory in nature. Thus circuit breaker used for this purpose must have, short breaking time for short arcing time, small contact gap, VCB and quick breaking is the best probable solution. In fact arcing energy is much higher in the single phase CB than 3 phases CB. It is much lesser in circuit breaker than that in usual circuit breaker. The number of short circuit takes place in the overhead catenary system much higher than those occurring on electrical transmission system. The medium voltage switchgear possessed with vacuum circuit breaker is most appropriate for traction application. Indeed depressing, the switchboards market has come of age in terms of patents, designs, safety norms and quality. The archetypal and conventional grey market though, is still playing the role of a spoil-sport. They gloss over the quality and safety guidelines to capture the whole market share and cause a serious threat to the business. The contractor, electrical designer and the end user are equally held accountable both legally and professionally for the design and production of the panel board. The Electrical Switchboard is only a fraction of the total outlay on a complete panel and most generally given the least care, while it comes to the design resulting in rapid halt of operation causing enormous production losses. Imagine developed production unit halted for some specific hours to service the distribution panel!!! The safety guidelines of the operating board safeguard not only the panel but also the other related assets such as, wires, transformers, electronics, machines, etc. and most prominently the precious lives of operators. Thus it is extremely significant that you select the right criteria while designing the electrical switchboard. A well known research expert from the field once drew a comparison of a fully built panel to the human body with fuses & switchgears analogous to the bus bars, vital organs and other connectivity to the veins and arteries, intelligent system to the brain and nerves and the switchboard to the muscular and skeletal systems!!! There’s no better way to underline the significance of properly designed switchboard ! We have noticed a nerving disagreement of interest with the Electrical design consultants and end users on one and the contractors on the other end, with safety norms and quality railed against blind cost decline drives. Pointless to say safety or technical guidelines must always be of utmost priority in switchboard manufacture. Electrical panel boards serve like the control centre for several electrical systems like, residential wiring. If the electrical panel is well-made, it is simple to access and added electrical systems can be additional to the panel with time. If the panel is ill designed, several problems can rise. The electrical contractor can be employed to design the panel however the cost can be great. Use few expert design methods to make an electrical panelboard, thereby reducing the cost of employing the contractor or designer. - Decide the system’s requirements and individual constituents. In residential arrangements, the electrical requirements of a family alter with time. Room additions might be added to the arrangement for extra family members. Electrical panel board should be designed to house these variations. Prepare a record of the immediate requirements and long term goals. If added electrical components need to be added, the panel should be large enough to lodge those constituents. Record all the constituents that will be measured from the panel. - Have a look at the necessary electrical codes for the project. Even panel’s casing need to be constructed from constituents accepted by the electrical codes. Electrical codes could be assimilated at the State’s Building Standards Commission’s website. Record all the suitable panel material and any statistics referring to the panel’s wiring like breaker loads. - Make a sketch of the panel board. Initiate by drawing the panel’s face outline. Decide a logical order of locations for the panel’s constituents. Panel components, like, switches, must be grouped in clusters as per the use and easy to access. If the panel controls devices on any side of it, the switches for the devices ought to be clustered consequently. Design the panel so that any switches or controls are located in logical locations. The non segregated bus duct is fabricated by using top of the line constituents to assure a firm and dependable powers transmit. Bus ducts can be used in range of applications, that is, from switchgear assemblies to unit substations. Enclosure comes in wide range of choices: NEMA 4X, Stainless Steel, aluminum and NEMA 3R. Baked on Epoxy, the powder coat offers mechanical durability, scratch resistance and meeting the salt spray needs of ASTM B-117. Detachable enclosure covers are firmly fixed bolt, thereby letting easy access. Non Segregated Phase Bus joints are protected by bolting the bars by using splice plates on both the sides, thereby offering a solid association. Bus bar is complete conductivity with pure copper. Plastic joints every 50 feet in straight bus runs let bus extension while transferring the rated current. Fluidized bed epoxy insulation is non-hygroscopic in nature and utmost static. It also defies fungus, mold and tracking. Epoxy resin, dissimilar to other insulations, consistently coats bus configuration. Thermal and electrical performance is improved as the epoxy is straightly tied to the bus conductor, removing the air gap found in other buses. It improves heat transfer and avoids corona discharge and insulation damage. Bus joints are shielded with flame retardant element that is detachable for joint inspections. - Flexible shunts - Conductive stub ends - Fire stops - Space leads As per ANSI standards, corona extinction levels are not precise; however they are considered apt for the production type test. Transitory ratings are not specified in the usual; however the duct is predictable to be apt and go with the transitory rating of the equipment to which it is connected. The segregated DC bus duct supposed voltage rating varies from 300 to 3200 volt DC with constant ratings up to 6000A. Isolated phase duct is moderately special as compared to the other duct systems termed and needs much more space. It is also considerably more costly to buy and install, but considered a unique system for particular applications and, in specific, as a generator duct feed. Generally, rigid conductor type Segregated Phase Bus Duct length is computed from centre line to centre line, and the tools to which it is attached, to form overall duct-length footage. Bar extensions within a termination cubicle are regarded as part of the termination tool. For cable duct, the same measures are used for establishing the length. The only exemption is 60 inches of duct length should be added for creating overall length dimensions, because of the cable extension leads vital at every end. Such cable lead extensions are measured part of the duct length, somewhat than part of the termination equipment. Segregated duct that comprises of cable duct basically has the same constant current ratings, from 600A to 6000A. Duct of higher ratings is delivered up to 12000A; nevertheless this is for special applications needing special design, fabricating and installation considerations. Capacities are usually based on 40°C ambient where conductors have silver plated joints, and the permissible temperature rise of the conductor is 65°C. Noncurrent carrying parts that can be voluntarily touched are allowed a 40°C rise. Ambient temperature range limits are -30°C to +40°C, and height is up to 1000 metres (3300 feet). Other ambient situations require special consideration and may perhaps contribute to de-rating. Voltage range for these kinds of duct is chiefly from above 600V to 34.5kV to ANSI but to 46kV to CSA. In everyday terminologies, the maximum rating is 38kV with a BIL rating of 150kV. It comprises of cable duct, even though cable at supposedly 38kV can have a higher BIL rating and can undoubtedly have higher insulating voltage class, up to 33 per cent insulation on higher voltage ratings. All the electrical proceedings, electrical wires tend to pass through a component or unit which makes it feasible and practical to go to other units, easily. It is these electrical components that make work easy for the electricity house to easily distribute electricity to every house or single unit. It is the job and task of the electrical components that they effectively make use of the distribution station. The function of these distribution substations is major. The actual and prime usage of these units is to transfer power from the transmission system to the specific area’s distribution system. Hence, the task of Distribution substation could not be easily neglected. They being the major and important units of the electrical system, they are given the highest authority to perform every single task, efficiently. It is quite extravagant or waste to straight away connect electricity users to the main transmission network, until and unless they make use of large amounts of power. It is because of this reason; the distribution station lessens the voltage to the most appropriate level for the local distribution. The key functionality behind the use of these substations is not clearly understood. Hence, the function and service rendered by these units should be verified and tested by the electrical houses. The more intricate the functionality, the more complex would be the electrical wire mess. The function being obscure and complex, it is necessary that the personnel engaged in handling these substation is a proficient and competent one. Experts and only skilled professionals should be surcharged of handling the substations. If they are not that experienced, the service rendered by them would not be of that standard and competence. So, if you are factory owner going through this post, ensure that only experienced and skilled personnel are being employed in your unit. Electric panel board, also known by the name of breaker panel and distribution board is a constituent of an electricity supply system that divides an electrical power feed into its subsidiary circuits, though providing circuit breaker for each circuit or a protective fuse in a common enclosure. Usually, a main switch, and in recent boards, one or more residual current devices (RCD) or residual current breakers with over current protection (RCBO), are also integrated. Depending upon the application, Electric Panel Board is of varied types: - Factory Assembled Panel Boards Factory assembled panel boards are available in all common configurations. They are available directly through distributor stock to help cut down the lead times while providing a dependable solution for the light commercial projects. Panel boards are ideal for lighting and appliance branch circuit protection. Products are designed for sequence phase connection that permits complete flexibility of circuit arrangement (1-, 2- or 3-poles) to allow balance of the electrical load on each phase. The types and kinds of lighting panel boards are Fusible Lighting Panel boards, Pow-R-Line 1a and 2a, Pow-R-Line 3a, Pow-R-Line BCM panel board, Pow-R-Line 1R and 2R and Pow-R-Line 3E. Column Panels offer a proven design for warehouse, commercial and industrial applications. They measure a compact 8-5/8″ wide by 6″ deep and are easily mounted inside an I-beam for industrial applications. The main breaker lugs could be mounted for top or bottom feed. They are ideal for confined areas or renovation projects. - Elevator Control Panel board Control panel boards are designed to meet the stringent requirements commanded by the multiple building codes. These codes are designed to offer fire protection and safety within elevator shafts. The elevator control panel board takes the speculation out of code compliance with respect to the electrical communications and electrical components systems.
<urn:uuid:2e12b79a-26d8-47e4-9e5f-516b8a9d8e14>
CC-MAIN-2017-26
https://parkdetroit.wordpress.com/category/power-distribution-systems/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321306.65/warc/CC-MAIN-20170627083142-20170627103142-00155.warc.gz
en
0.936121
3,754
2.9375
3
The concept of death and dying is powerful in the minds of most people. To manage the intense feelings associated with a discussion of death, John Donne personifies death in Death, Be Not Proud, and proceeds to discredit it because, although some may think that death is "mighty and dreadful," he maintains that "thou art not so." Death, in its personified form, is arrogant because it thinks that it is the end of life but Donne points out that it is only "One short sleep." Death cannot get the better of man so Donne wonders why it feels as if it has achieved something when "our best men with thee do go" because, when they die, they simply "Rest (of) their bones." The arrogance as Death "swell'st thou then" as it thinks that "thou dost overthrow" is unacceptable to Donne and Death is actually the entity that is defeated and overcome every time. It is nothing more than a transition and, whilst everyone must die, "we wake eternally" and therefore we are no longer dead which shows that, in fact, it is Death that "shalt die."
<urn:uuid:7e1773f6-1e16-4846-bac9-b52060f339e6>
CC-MAIN-2017-26
https://www.enotes.com/homework-help/why-does-poet-feel-tt-death-arrogant-refer-poem-461920
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321306.65/warc/CC-MAIN-20170627083142-20170627103142-00155.warc.gz
en
0.974646
236
2.609375
3
Writing Effective Conclusions (printable version here) A conclusion provides a thoughtful end to a piece of writing; unfortunately, many conclusions in college-level papers are little more than summaries of what has already been said. Here are a few tips to make conclusions more interesting. You may wish to check with your professor about specific recommendations in your field of study; many fields have specific formats for conclusions and other parts of essays, research reports, and experiments. The points below are most applicable to papers in the humanities: - Ending with a rephrased thesis statement that contains no substantive changes. - Introducing a new idea or subtopic (although you may end with a provocative question; see below). - Focusing on a minor point in the essay. - Concluding with a sentence tacked on to your final point. - Apologizing for your view by saying such things as "I may not be an expert" or "At least this is my opinion." - Attempting to make up for an incomplete structure. (If you say you will discuss four books and only attempt a complete discussion of two books, do not try to cover the remaining texts in a concluding paragraph. In such a situation, it's best to limit your paper to topics you can realistically cover.) Conclude an essay with one or more of the following: - Include a brief summary of the paper's main points. - Ask a provocative question. - Use a quotation. - Evoke a vivid image. - Call for some sort of action. - End with a warning. - Universalize (compare to other situations). - Suggest results or consequences. Try to refer to the introductory paragraph, either with key words or parallel concepts and images. Back to 'First Drafts' Writer's Web | Writing Center | Make an Appointment | Library
<urn:uuid:b1a28c37-4646-4a69-93a3-5837719ff56f>
CC-MAIN-2017-26
http://writing2.richmond.edu/writing/wweb/conclude.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322320.8/warc/CC-MAIN-20170628032529-20170628052529-00235.warc.gz
en
0.921244
389
3.65625
4
Today I’m going to talk about something that has proven to be both a blessing and a curse to fisheries management. I’m going to talk about modeling. Tasteful humor. From Sports Illustrated. Unfortunately we’re not talking about the merits of the 2010 Swimsuit Calender (and allow me to be the millionth or so ecology nerd to make this kind of joke). The models we’re talking about look a lot more like this: Though a network modeler might see a thing of beauty in the latter image, for most of us at first glance it looks like a set of stereo instructions gone horribly wrong. That said, the idea behind ecological modeling is actually a very simple one; you’re basically just tracing the flow of energy through an ecosystem. Along the way it makes stops at each ecological component (also known as bacteria, plants, and animals, but can also include things like detritus) and at each stop some of it is burned off, some of it recycles back to lower levels of the food web (usually this means the organism dies and ends up in the detritus) and some of it moves along to the next stop. The actual units of energy measured can vary from model to model, but the basic concept is generally the same, at least when applied to ecology. The problems start to arise with the sheer amount of information that has to go into these things. As you can probably imagine, any kind of accurate food web model has to have detailed data on feeding habits, metabolism, and life history for every single species within that system. Often this is impossible given the amount of data published or collected, the limitations of the current technology, and the maintenance of any semblance of sanity for the researchers involved. This requires certain abstractions to be built in and certain (sometimes huge) assumptions to be made. Because of this, as one of my professors once said, “all models are wrong, but they’re useful.” Probably the biggest assumption that has to be made is that the model is dealing with a discrete, closed system. All the energy flowing in eventually equals all the energy flowing out. This is obviously impossible in reality because sooner or later all ecosystems connect to at least one other ecosystem. Some models try to get around this by having a certain amount of the energy being tracked bleed off into “export,” but are often vague about where they get this number. Another pitfall of the “closed system” approach comes from things like apex predators (you knew sharks were coming into this eventually). These animals have high enough energy needs that they usually feed out of several smaller systems. To include something like a sand tiger shark you’d need to either have a big enough ecosystem to encompass its whole range or figure out which fraction of its energy needs comes from eating out of your study area. Highly migratory species present this same kind of problem, and it’s why in a lot of marine models the food web ends at predators like striped bass and bluefish, species that are high up on the food chain but not necessarily at the top. Where things get interesting is when models are used to determine policy. Ask any fisherman and they’ll give you an earful about the mysterious voodoo math that affects their ability to work. They’ve got a valid complaint, and most fisheries managers are well-aware that they are making decisions that directly affect peoples’ lives based on a system that is “wrong, but useful.” The arguments resulting from controversy over models can drive both fishermen and scientists completely nuts. Unfortunately, the sheer size and complexity of the marine environment makes this sort of thing necessary. The alternative is to continue managing one species a time, something that has arguably only made the fisheries situation worse. One thing is certain, as long as there are models there will be a need for good, accurate, basic science to go into them. Modeling has the potential to be a great tool for solving problems that until recently were simply on too large a scale to tackle, but it needs to be fueled by the best available data. Only by having all that basic biological information on as many species as possible can models start to overcome their limitations. Those of you afraid that field work is slowly being replaced by computers can rest easy; there is plenty of net-hauling and fish-counting to do. So that’s my take on a rather dense and complex topic, and I fully acknowledge that it’s the opinion of a mere Master’s student just starting to get his field work off the ground. Am I on the money? Am I completely misunderstanding everything? Was this whole discussion just an excuse to put a picture of a hot girl on the blog?
<urn:uuid:514e5373-c765-4d68-ae04-11089a3ca586>
CC-MAIN-2017-26
http://yalikedags.southernfriedscience.com/the-trouble-with-models/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323807.79/warc/CC-MAIN-20170628222452-20170629002452-00315.warc.gz
en
0.964773
984
2.53125
3
posted by Sarah . A bullet of mass 12.4 g is fired into an initially stationary block and comes to rest in the block. The block, of mass 1.02 kg, is subject to no horizontal external forces during the collision with the bullet. After the collision, the block is observed to move at a speed of 4.80 m/s. (a) Find the initial speed of the bullet. (b) How much kinetic energy is lost? The law of conservation of linear momentum for inelastic collision m•v =(m +M) •u v =(m +M) •u/m =(0.0124+1.02) •4.8/0.0124 = 399.6 m/s KE1 =m•v^2/2 =0.0124•(399.6)^2/2 =990 J KE2 = (m+M) •u^2/2=11.9 J KE1 –KE2 =990 -11.9 = 978.1J
<urn:uuid:746f7b6c-7752-44cd-bdd7-1280f31885dc>
CC-MAIN-2017-26
https://www.jiskha.com/display.cgi?id=1333058258
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323807.79/warc/CC-MAIN-20170628222452-20170629002452-00315.warc.gz
en
0.869092
226
3.203125
3
Observed since the early 1900s, International Women’s Day is a poignant worldwide event that brings together women from around the world to celebrate women’s achievements and campaign for gender equality. The theme for International Women’s Day 2017 is #BeBoldForChange – encouraging people to step up and take ground-breaking action to help drive gender equality. In a year that has seen millions of women, girls and men take to the streets to march and protest in opposition to divisive politics, organisers are hoping the bold message will be heard around the world. “Each one of us – with women, men and non-binary people joining forces – can be a leader within our own spheres of influence by taking bold pragmatic action to accelerate gender parity,” write the organisers of International Women’s Day 2017. Oak’s Issues Affecting Women Programme (IAWP) seeks to build a world in which women are safe from violence and are free to exercise their full and equal human rights. As part of the programme, Oak seeks to create a strong movement of women who are empowered, individually and collectively, to challenge the root causes of inequality, similar to this years theme for International Women’s Day – #BeBoldForChange. “The mobilisation of women in civil society is in fact the critical factor accounting for positive policy changes around gender equality,” says Florence Tercier Holst-Roness, Director of the IAWP Programme. To find out more about the work of the Issues Affecting Women Programme take a look at the annual report or visit our website. There are many ways you can get involved and #BeBoldForChange. See how you can challenge bias and inequality or champion women’s education by visiting the International Women’s Day website.
<urn:uuid:c685bde7-ff4c-4021-856f-62c74dccdd65>
CC-MAIN-2017-26
http://oakfnd.org/highlights/10749
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00594.warc.gz
en
0.929168
373
2.828125
3
Dingoes may be a native's best friend Despised and hunted by farmers, the dingo may actually help protect native rodents and marsupials from introduced predators, Australian researchers have shown. The study, published on the online version of the journal, Animal Conservation, shows the positive effect dingoes have on biodiversity. In the first field study of its kind, wildlife ecologist and lead author Dr Mike Letnic and colleagues from the University of Sydney, monitored native dusky-hopping mice (Notomys fuscus) at six locations in central Australia near Cameron's Corner. Three of the study areas are known habitats for dingoes, while the other sites were south of the 5400-kilometre dingo proof fence that runs from the Great Australian Bight to the Bunya Mountains in Queensland - an area where few dingo live. The researchers found captured dusky-hopping mice at all three of the northern sites, but only one of the southern sites. Letnic found the presence of dingoes has a positive effect on the abundance of dusky-hopping mice. "Bigger predators, like dingoes, reduce the abundance and movements of smaller predators, like foxes, through competition and predation" says Letnic. Although dingoes and foxes are both predators of the dusky-hopping mouse, dingoes are more interested in bigger prey and not as good as foxes at catching them, he says. Wildlife ecologist Professor Chris Johnson of James Cook University, who was not part of the study, says Letnic's work supports other studies that suggest dingoes protect small mammals like the dusk-hopping mouse and bilby, and help authorities with native species conservation. "We've lost over 20 species of mammals and that's the worst record of recent mammal extinction of any country in the world," says Johnson. "The main cause is the effect of foxes and cats." "We need some way of controlling their impact, and at the moment the only way of doing that effectively, on a large scale, is to leave dingoes alone or controversially put them back where they've been gotten rid of." Since European settlement, dingoes have been hunted because of their predation on livestock, which is estimated to cost the agricultural industry millions of dollars each year. The Northern Territory is the only region dingoes are a protected species. Letnic believes some dingo populations should be restored or maintained to assist biodiversity. "Dingoes aren't a silver bullet and it's unrealistic to have dingoes everywhere in the country because we couldn't have a sheep industry, but there have been less extinctions where there are dingoes," he says.
<urn:uuid:c6dd19b5-59a0-4d8e-9bbd-598b9c7c0629>
CC-MAIN-2017-26
http://www.abc.net.au/science/articles/2009/05/04/2560220.htm?site=science&topic=latest&listaction=unsubscribe
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00594.warc.gz
en
0.948251
558
3.390625
3
The article lists the steps taken by the government to control pollution in the country. - Comprehensive revision of Waste Management Rules for solid waste, plastic waste, biomedical waste, hazardous waste and electronic waste, and notification of construction and demolition waste management Rules during March–April, 2016. - These Rules emphasizes waste minimization, source segregation, resource recovery for recycling and reuse, extended producer responsibility, involvement of waste pickers and self help group, enhanced scope for waste reuse / recycle in different application like usage in road, waste to energy, waste to oil etc, stringent standards for pollutants from waste treatment and disposal facility, fine for littering of waste etc, so as to ensure environmentally sound management of waste and minimise adverse impact on the environment. The Government has taken a series of steps to address issues related to water pollution, air pollution, industrial pollution, improper waste disposal etc. The major steps being taken by the Government to control pollution inter alia include the following:- - Notification of National Ambient Air Quality Standards; - Formulation of environmental regulations / statutes; - Setting up of monitoring network for assessment of ambient air quality; - Introduction of cleaner / alternative fuels like gaseous fuel (CNG, LPG etc.), ethanol blend etc.; - Promotion of cleaner production processes; - Launching of National Air Quality index by the Prime Minister in April, 2015; - Implementation of Bharat Stage IV (BS-IV) norms in 63 selected cities and universalization of BS-IV by 2017; - Decision taken to leapfrog directly from BS-IV to BS-VI fuel standards by 1st April, 2020; - Taxing polluting vehicles and incentivizing hybrid and electric vehicles; - Ban on burning of leaves, biomass, municipal solid waste; - Promotion of public transport network of metro, buses, e-rickshaws and promotion of car pooling, Pollution Under Control, lane discipline, vehicle maintenance; - Revision of existing environmental standards and formulation of new standards for prevention and control of pollution from industries; - Regular co-ordination meetings at official and ministerial level with Delhi and other State Governments within the NCR; - Issuance of directions under Section 5 of Environment (Protection) Act, 1986 and under Section 18(1)(b) of Water (Prevention and Control of Pollution) Act, 1974 and Air (Prevention and Control of Pollution) Act, 1981; - Installation of on-line continuous (24x7) monitoring devices by major industries; - Preparation of action plan for sewage management and restoration of water quality in aquatic resources by State Governments; - Implementation of National River Conservation Plan for abatement of pollution in identified stretches of various rivers and undertaking conservation activities including education and awareness creation, community participation, electric/improved wood crematoria and river front development; - Implementation of schemes for setting up of Common Effluent Treatment Plants (CETP), promotion of waste minimization strategies, Capacity Building for Industrial Pollution Management, setting up of Treatment and Disposal Facilities for hazardous and biomedical waste, setting up of Sewage Treatment Plants etc. - Re-categorisation of industries based on the pollution potential; One of the biggest problem that has come up due to unplanned urbanisation in India is of uncontrolled level of pollution, be it water pollution, air pollution, industrial pollution, improper waste disposal etc. Examine the steps taken by the government to tackle this growing menace. - Steps taken by the government. - Examination of these steps.
<urn:uuid:c6b725be-6b85-4ff8-8912-4ff5eef9b77c>
CC-MAIN-2017-26
https://www.chanakyaiasacademy.com/blog/item/176-getting-rid-of-filth-and-pollution-from-wastes
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00594.warc.gz
en
0.889632
730
3.5
4
Abnormally shaped teeth impinge on the appearance of the face. What leads to their distortion and how to prevent it? Dentists in Poland say these deformities may appear as a result of the biological background – a negative growth pattern, diseases, hormonal disorders, and even as a result of taking drugs. Other reasons include improper putting to sleep and feeding during infancy. Also, abnormal swallowing or chewing food, thumb sucking, teeth grinding, speech defects and body posture can lead to distortions. If you suffer from any kind of deformity – don’t worry and make an appointments with your dentist – there are many solutions, such as veneers, dental crowns in Poland or implants.
<urn:uuid:4a41b3b5-6141-4611-884f-b53b3a2527e8>
CC-MAIN-2017-26
http://www.dentaltravelpoland.co.uk/teeth-change-facial-features/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320057.96/warc/CC-MAIN-20170623114917-20170623134917-00034.warc.gz
en
0.958368
142
2.53125
3
Many of our so-called domesticated animals are quite happy to call it quits with people and return to wildness if given the chance. So it is with horses. The western US states host as many as 30,000 feral animals making up several hundred herds. All of them are the descendants of domestic horses that escaped their confines as long as 200 years ago. They are so successful roaming remote deserts and rangeland that their population is a problem, outstripping their resources. They would damage environments and starve if not for soft-hearted Americans who prop them up with food and water. We cannot bring ourselves to see them hurt, even though managing them becomes ever more expensive. The Onaqui Mountain group of perhaps 200 horses lives in western Utah’s Great Basin, within sight of the salt pans of the Great American Desert. Despite our desire to see them romantically as bold, strong, free-spirited masters of nature, their existence is tenuous in every direction. We may run out of time and money to manage them, or just tire of the task. If left on their own, the next drought will mow them down like desert grass. There are too many to adopt. As I looked over these photographs in the light of their uncertain future, they seemed to be ephemeral and ghost-like, and that is why I chose to make them glow. They seem to be arriving and leaving at the same time, halfway in and halfway out of the world.
<urn:uuid:1ee0e692-0493-4121-9b77-3b4b3a9ef741>
CC-MAIN-2017-26
https://furthertofly.com/fineart/photo_series/ghosts-great-basin/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320057.96/warc/CC-MAIN-20170623114917-20170623134917-00034.warc.gz
en
0.978619
303
2.78125
3
Freshwater mussels: western ridged mussel (Gonidea angulata) (Bivalvia: Unionoida: Unionidae) Profile and maps prepared by Sarina Jepsen, Caitlin LaBar, and Jennifer Zarnoch, The Xerces Society for Invertebrate Conservation The western ridged mussel (Gonidea angulata) is widely distributed from southern British Columbia to southern California, and can be found east to Idaho and Nevada. G. angulata inhabits cold creeks and streams from low to mid-elevations. Hardhead, Pit sculpin and Tule perch are documented fish hosts for G. angulata in northern California, although little is known about the fish species that serve as hosts for this mussel throughout other parts of its range. G. angulata is sedentary as an adult and probably lives for 20-30 years, and thus can be an important indicator of habitat quality. G. angulata is a filter feeder that consumes plankton and other suspended solids, nutrients and contaminants from the water column. The large beds of G. angulata can improve water quality by reducing turbidity and controlling nutrient levels. Some Native American tribes historically harvested this animal and used it for food, tools and adornment. Populations of G. angulata have likely been extirpated in central and southern California, and it has probably declined in abundance in numerous watersheds, including the Columbia and Snake River watersheds in Washington and Oregon. The western ridged mussel belongs to a monotypic genus and thus should be considered a high priority for conservation. Lack of information on the western ridged mussel’s current and historical abundance and distribution, and a lack of understanding of which host fish species it uses will impede conservation efforts. Figure 1. Photograph of Gonidea angulata shell exterior (above left) and interior (above right) © Ethan Jay Nedeau, reproduced from the field guide Freshwater Mussels of the Pacific Northwest (Nedeau et al. 2009). Gonidea angulata belongs to a monotypic genus. This species is obovate to trapezoidal in shape and generally does not exceed five inches in length. It is slightly laterally compressed. The shell has an angular ridge that runs from the beak to the basal part of the posterior margin. The ventral margin is generally straight. The shell is heavier than that of other native freshwater mussels that overlap in range with G. angulata (Margaritifera falcata and Anodonta spp.). The periostracum is yellowish-brown to brown or black. The shell does not have rays or sculpturing. Lateral teeth are absent. The right valve has one pseudocardinal tooth and the left valve has either one small tooth or no teeth. The pseudocardinal teeth are small, compressed, and can be difficult to distinguish. The nacre is generally white, but can be salmon-colored in fresh specimens and pale blue toward the posterior margin and beak cavity. (Burch 1973, Clarke 1981, and Nedeau et al. 2009). Gonidea angulata (Lea, 1838). The taxonomic status of this species is uncontested (Turgeon et al. 1998). Type locality: “Lewis’s River” (now interpreted as Snake River, Idaho, no specific locality) (reported in Taylor 1981). Species: Gonidea angulata Freshwater mussels, including G. angulata, are filter feeders that consume phytoplankton and zooplankton suspended in the water. Gonidea angulata is a relatively slow growing and long lived species – perhaps living 20 to 30 years (COSEWIC 2003, Vannote and Minshall 1982). Low shear stress (shear stress is caused by fast flowing water over substrate), substrate stability, and flow refuges are important determinants of freshwater mussel survival (Vannote and Minshall 1982). G. angulata occurs on the bottom of streams, rivers and lakes with substrates that vary from gravel to firm mud, and include at least some sand, silt or clay (COSEWIC 2003). This species is more common on the eastern side of Oregon and Washington than the western side (pers. comm. with A. Smith, mussel workgroup meeting, 2008). It is generally associated with constant flow, shallow water (<3 m in depth), and well oxygenated substrates (COSEWIC 2003). This species is often present in areas with seasonally turbid streams, but absent from areas with continuously turbid water (i.e. glacial melt water streams) (Frest and Johannes 1992). In Idaho, G. angulata is abundant in areas with sand and gravel bars, and less abundant in more stable, boulder dominated reaches, suggesting that it can tolerate soft, fine sediments (Vannote and Minshall 1982). G. angulata generally occurs at low to mid elevations (Nedeau et al. 2009) and it may be more common at downstream sites than headwater sites, as seen in an eastern Oregon study (Brim Box et al. 2006). Many sites where this species has been found lack dense macrophyte beds. Typically, individuals of this species are found buried to at least half their length in fine substrate, with the posterior end facing upstream (COSEWIC 2003). G. angulata can occur in dense beds, with densities of ~575/m2 (Brim Box et al. 2006). Reproduction and Host Fish Associations Freshwater mussels, including G. angulata, require a host fish to reproduce and disperse. Because freshwater mussels are not able to move far on their own, their association with fish allows them to colonize new areas, or repopulate areas from which mussels have been extirpated. Fertilization occurs when female mussels inhale sperm through their incurrent siphon during the appropriate reproductive period. Eggs incubate and hatch into larvae, or glochidia, which are released into the water, either individually or in packets (called conglutinates). Glochidia will attach to fish and encyst in host fish tissues from 2-36 hours after they attach. Glochidia attach to host fish for a period of weeks to months. Once metamorphosed, juvenile mussels drop from their host fishes to the substrate. (McMahon and Bogan 2001). Gravid G. angulata females have been found from late March through mid-July, and glochidia have been observed on fish from late March to early August (Spring Rivers 2007, COSEWIC 2003). Gonidea angulata glochidia are released in watery mucous and conglutinates are white, leaflike and joined in small groups at the dorsal end (Barnhart et al. 2008). Once glochidia are released, they attach to a fish host. In northern California, the release of glochidia apparently peaks in June, and the glochidia are probably excysted from fish primarily during the period from late June to late July (Spring Rivers 2007). The presence of glochidial host fish is necessary for the reproduction of mussel species. Although the entire suite of host fishes for G. angulata is not known, three native fish have been documented as hosts for G. angulata in northern California: hardhead (Mylopharodon conocephalus), Pit sculpin (Cottus pitensis), and tule perch (Hysterocarpus traski); these three species have been infested with G. angulata glochidia in the wild, and metamorphosis of the glochidia was observed (Spring Rivers 2007). The native Pit roach (Lavinia symmetricus mitrulus) and the non-native black crappie (Pomoxis nigromaculatus) may also serve as fish hosts for G. angulata in northern California – these fishes have been infested with G. angulata glochidia in the wild, but metamorphosis was not observed (Spring Rivers 2007). Table 1. Documented fish hosts for Gonidea angulata from a study in the Pit River drainage of northern California (Spring Rivers 2007). In order to determine that a fish is a host for G. angulata, glochidial infestation of the fish must have been observed in the wild and metamorphosis of the glochidia must have been observed. |Fish species||Is fish species native to western U.S?||Glochidia infestation observed on G. angulata (natural or artificial)||Glochidia metamorphosis observed on G. angulata||Reference| |hardhead, Mylopharodon conocephalus|| |Spring Rivers 2007| |Pit sculpin, Cottus pitensis|| |Spring Rivers 2007| |tule perch, Hysterocarpus traski|| |Spring Rivers 2007| Table 2. Potential fish hosts for Gonidea angulata. The fish species listed below may be host fishes for G. angulata, but glochidial metamorphosis has not been observed on these fish. |Fish species||Is fish species native to western U.S?||Glochidia infestation observed on G. angulata (natural or artificial)||Glochidia metamorphosis observed on G. angulata||Reference| |Pit roach, Lavinia symmetricus mitrulus|| |Spring Rivers 2007| |black crappie, Pomoxis nigromaculatus|| |Spring Rivers 2007| Gonidea angulata is broadly distributed in Washington, Oregon, California, Idaho, Nevada, possibly Montana (see Gangloff and Gustafson 2000), and southern British Columbia. The maps in Figures 2 and 3 illustrate watersheds that contain records of Gonidea angulata prior to 1985 (red) and records of G. angulata observed or collected after 1985 (blue). Watersheds that contain records with no date associated are displayed with diagonal hash-marks. One may conclude that G. angulata has been extirpated from watersheds with only historical records (red), but that assumption may be inaccurate if surveys have not been conducted in that watershed since 1985. To address this issue, we created a map of ‘search effort’ (Figure 3). Black dots represent locations where an individual searched for or collected any species of freshwater mussel. Of the thousands of mussel records and ‘search effort’ records that we received, we generally only had the capacity to map records that had geographic coordinates associated with them, which was a fraction of the total number of records. We also manuscripted some ‘search effort’ points in southern California and Arizona from geographic descriptions, since we considered those watersheds to be of high conservation priority for some species of freshwater mussels. The representation of search effort in Figure 3 represents an underestimate of the true search effort that has occurred since 1985. Caution should be exercised in interpreting the maps below. It is problematic to conclude that a species is absent from an area that may have been searched only once. In addition, the 8-digit HUC watershed scale of the maps in figures 2 and 3 is too coarse to show declines that may have occurred in individual streams or rivers. The maps below were created from thousands of records from the published literature, museum collections, unpublished reports, and state, tribal, nonprofit, retired and amateur biologists. Please contact firstname.lastname@example.org for more information about the records used to create these maps. Figure 2. Map of watersheds containing historical (pre-1985, red) records of Gonidea angulata and more recent (post-1985, blue) records of G. angulata. Figure 3. Map of watersheds containing historical (pre-1985, red) records of Gonidea angulata and more recent (post-1985, blue) records of G. angulata. Black dots indicate areas that have been surveyed for freshwater mussels since 1985. Threats to G. angulata and other species of freshwater mussels in North America include: impoundments and loss of host fish, channel modification from channelization, dredging and mining, restoration activities, contamination, sedimentation, nutrient enrichment, water withdrawal and diversion, thermal pollution, livestock grazing in riparian areas, and the introduction of non-native fish and invertebrate species. Many of these impacts, especially a reduction in stream flow and thermal pollution in arid areas, are being exacerbated by climate change. Impoundments and loss of host fish Numerous freshwater mussel species in eastern North America have gone extinct as a direct result of dams (Vaughn and Taylor 1999, Watters 1996, Williams et al. 1992), which can change a water body’s fish fauna, substrate composition, benthic community, water chemistry, dissolved oxygen levels and temperature (Bogan 1993). The elimination of a host fish species is likely the most harmful effect that dams have on freshwater mussels; Williams et al. (1992) report instances of 30-60 percent of a region’s mussel fauna being extirpated as a result of dam construction. The most fragile part of a mussel’s life cycle is its obligatory association with a host fish; in some cases, damming has extirpated a mussel species’ obligate host fish and that, in conjunction with increased siltation and pollution, has led to a rapid decline in many species of freshwater mussels (Bogan 1993). Since the beginning of the 20th century, 5% of native North American fish fauna have gone extinct, and an additional 364 fish species are considered endangered, threatened, or of special concern (Williams et al. 1989). The host fishes utilized by G. angulata across its range are not well understood; this lack of information will certainly be an impediment to conserving this species. In addition, the flow regime of a river is frequently altered by dams; researchers in northern California suggest that the unnatural pulses in stream discharge from dams (pulsed flows) have the ability to interfere with the reproductive success of freshwater mussels by reducing contact between glochidia and host fish and preventing settlement of juveniles after excystment, if pulsed flows occur during key periods of G. angulata’s reproductive cycle (Spring Rivers 2007). Hardhead, which has been identified as a host fish for G. angulata in northern California, is on the ‘watchlist’ for Species of Special Concern within the state of California because it is not as widespread or abundant as it once was (CA DFG 1995, Spring Rivers 2007). Dredging and channelization River channels are regularly dredged and modified for navigation, flood control, and drainage, which has led to the local extirpation of freshwater mussel populations in the southeastern U.S. (Bogan 1993). Sedentary mussels are directly displaced by dredging operations, and frequently killed in dredge spoils (Neves et al. 1997). Dredging and channelization increases erosion and sedimentation and destabilizes the substrate, which decreases habitat suitability for freshwater mussels (Neves et al. 1997). Dredging and channelization leads to headcutting, which also causes erosion and sedimentation (Hartfield 1993). Instream mining of gravel and suction dredge mining for gold and other metals are common practices in the western U.S. Instream gravel mining removes substrate and leads to siltation downstream (Bogan 1993), which can directly and indirectly harm freshwater mussels. In a study investigating the impact of suction dredge mining on freshwater mussels in the Similkameen River in Washington state, Krueger et al. (2007) found that G. angulata died when covered with tailings from a suction dredge. However, another study by Vannote & Minshall (1982) reported that while large mussels of a different species (Margaritifera falcata) were unable to uncover themselves and perished when they were covered with sediment, G. angulata and small M. falcata were able to uncover themselves and migrate vertically. Activities such as culvert removal, dam removal, and stream reconfiguration to restore aquatic habitat for salmonids have become very common, especially in the Pacific Northwest. Frequently, these activities are undertaken without considering the distribution or conservation needs of freshwater mussels occurring in those streams. These operations can involve temporary stream dewatering, movement of personnel and equipment in streams, and flushing of sediments – all of which could have a negative impact on the survival of mussel populations. Flourishing populations of freshwater mussels are generally associated with high levels of dissolved oxygen and other conditions that are typical of unpolluted water bodies. Contaminants can destroy populations of freshwater mussels directly (by exerting toxic effects) and indirectly (by harming host fishes and/or food sources). (Havlik and Marking 1987). Many contaminants occur regularly in aquatic environments; for example, a study in the Columbia River documented that freshwater mussels belonging to another genus (Anodonta sp.) had a concentration of DDT (dichlorodiphenyltrichloroethane) from 14.9 ppb in spring to 2 ppb in fall and a concentration of PCBs (polychlorinated biphenyls) of 35-160 µg/kg wet weight (Claeys et al. 1975). Pollution from papermills, chemical factories, steel mills, and tanneries has been implicated in the extirpation of freshwater mussel populations in the eastern U.S. in the first half of the 20th Century (Bogan 1993). A review by Havlik and Marking (1987) reported that the following aquatic contaminants are lethal to freshwater mussels at various concentrations: cadmium, copper sulfate, ammonia, potassium, chromium, arsenic trioxide, copper, and zinc. Cadmium was the most toxic at only 2 ppm (parts per million) and copper sulfate was found to be toxic at levels of 2-18.7 ppm. Long term exposure to copper sulfate was lethal to mussels at concentrations as low as 25 ppb (parts per billion). Ammonia, which is a common pollutant from agricultural fertilizers and municipal sewage, was found to be toxic to mussels at only 5 ppm. (Havlik and Marking 1987). In an Illinois river, no mussels were found in an area with ammonia concentrations that exceeded 6 ppm, and mussels began to appear downstream where ammonia concentrations were progressively lower (Starrett 1971). Freshwater mussels can be valuable indicators of pollutants, since they are sedentary, occupy a low position on the food chain, frequently bioaccumulate heavy metals, pesticides, and other contaminants, and can be long-lived. Toxins in the shell are indicative of past exposure, whereas toxins in the soft tissues indicate more recent exposure. Because freshwater mussels frequently bioaccumulate contaminants, substances can be detected in their tissues that are too low in concentration to be detected in the surrounding water body. Sedimentation and nutrient enrichment Because freshwater mussels are filter feeders, they generally cannot handle high levels of siltation that come from agricultural runoff, silvicultural operations and headcutting (Bogan 1993). The EPA considers fifty percent of U.S. rivers and streams that were assessed to be impaired, primarily due to sedimentation, nutrient enrichment, contamination with pathogens and habitat alterations (U.S. EPA 2010). Water withdrawal and diversion Numerous streams in North America have been modified by water flow diversion and groundwater use (Dudley and Larson 1976). A review of the effects of artificially reduced stream flow on invertebrates and instream habitat revealed that these activities lead to increased sedimentation, decreased velocity, wetted width and depth, and can alter water temperature and chemistry (Dewson et al. 2007). These impacts generally reduce habitat diversity and alter invertebrate community composition (Dewson et al. 2007). Climate change is projected to exacerbate the impact of low stream flow on freshwater mussels. For example, stream flows have decreased at a rate of approximately 2% per decade for the past century in the Rocky Mountain region of the western U.S. as a result of climate change (Rood et al. 2005). Increased water temperatures as a result of decreased streamflow, loss of riparian vegetation, and global climate change are likely to stress, and perhaps eradicate, G. angulata. In a study in Fall River Lake in northern California, Spring Rivers (2007) found that high water temperatures (27.3°C or 81.1°F) and low water levels (<1 meter) may have caused the abortion of egg masses and premature onset of a non-gravid period that they observed in another genus of freshwater mussel (Anodonta), and note that thermal stress has caused abortion in other freshwater mussel species (Aldridge and McIvor 2003). Livestock grazing in riparian areas Livestock grazing in and near streams degrades the high water quality that freshwater mussels require for survival. Freshwater mussels generally require high levels of dissolved oxygen (Voshell 2002), yet the presence of livestock has been shown to increase eutrophication in water bodies (Mathews et al. 1994), which in turn can reduce levels of dissolved oxygen in water. Livestock tend to remain near streams because water, shade and forage abound (Strand & Merritt 1999), which exacerbates the impact of cattle on aquatic communities. Cattle grazing in riparian areas frequently leads to headcutting, which can increase sedimentation in the water body – a condition that freshwater mussels generally cannot handle (Bogan 1993). Grazing and trampling of riparian vegetation also increases water temperatures; high water temperatures may impede the ability of freshwater mussels to survive. Introduction of non-native species The nonnative asian clam (Corbicula fluminea) is widespread in water bodies in western North America and may compete with native mussels (Clarke 1988), directly consume glochidia and impact nutrient cycling (Leff et al. 1990, Strayer 1999, Vaughn and Spooner 2006). The zebra mussel (Dreissena polymorpha) and quagga mussel (Dreissena rostriformis bugensis) aggressively compete with native mussels, although they are less widespread in western North America than the asian clam. West of the Continental Divide, zebra and/or quagga mussels currently occur in waterbodies in Nevada, Arizona, California, Colorado and Utah. Zebra and quagga mussels can attach directly to the shells of native freshwater mussels and impede their ability to feed (Mackie 1991, Schloesser et al. 1996, Strayer 1999, Strayer and Malcolm 2007). They have free-swimming larvae that do not require a host fish to reproduce, and thus have a high reproductive advantage over native freshwater mussels. Many species of non-native fish have been introduced into western North America, primarily for sport fishing, which has led to the reduction or elimination of native fish species (Moyle et al. 1986, Rinne and Turner 1991, Andersen and Deacon 1996). In the Great Basin alone, fifty non-native fish species have been intentionally introduced (Sada & Vinyard 2002). Although the full suite of host fishes used by G. angulata is unknown, it is possible that host fish species that G. angulata relies upon are being displaced by nonnative, less suitable host fish. Xerces Red List Status: Vulnerable NatureServe Global Status (2007): G3 – Vulnerable NatureServe National Status: United States (2004)-N3, Canada (2006)-N1 NatureServe State Status (2009): S1S2 (CA), S2S3 (OR), SNR (ID), SNR (NV), S2 (WA) NatureServe Provincial Status – Canada (2009): S1 (BC) IUCN Red List: N/A USA – Endangered Species Act: N/A Canada – Canadian Species At Risk Act (2005): SC Canada – Committee on the Status of Endangered Wildlife in Canada (2010): Endangered American Fisheries Society Status (1993): Undetermined NatureServe indicates that G. angulata has both a global short term trend of declining (10-30%) and a global long term trend of declining (25% change to 50% decline) (NatureServe 2009). Species that are long-lived, such G. angulata, which likely lives for 20-30 years, can appear to have healthy populations, when in reality only the older adults may be withstanding environmental changes and the population may no longer be reproducing. This species has been extirpated from many sites in the Snake and Columbia River basins due to environmental degradation (Brim Box et al. 2006, COSEWIC 2003, Frest and Johannes 1995), although the extent of the decline in those areas is not well understood, as historical abundance data is generally lacking. California ranks G. angulata as S1S2, or critically imperiled/imperiled within the state. Taylor (1981) suggested that G. angulata has likely been extirpated from southern California and most of the Central Valley. Coney (1993) reports that G. angulata historically occurred in Ballona Creek and the Santa Ana River in the Los Angeles River Basin, but was unable to find any living specimens in surveys. J. Howard conducted extensive field surveys throughout California in 2008 and 2009, including visits to historic sites, and confirmed that G. angulata has been extirpated from southern California (Western Mollusk Sciences 2008, Howard 2010). G. angulata still persists in northern California; J. Howard notes that most sites do not have dense beds with the exception of one site on the upper Pit River in the Modoc National Forest and some sites on the Klamath River (Howard 2010). The state of Idaho has assigned a conservation status rank of S2, or imperiled, to G. angulata. G. angulata were found in low abundance (1-10/m2) on the Snake River downstream of the Hells Canyon Dam (Richards et al. 2005). Frest and Johannes (2000) note that G. angulata is locally common in the Snake River plain, but decreasing in abundance, and should be monitored carefully in Idaho. The species is known historically (pre-1985) from the Boise, Little Salmon, Malad, Salmon, Snake, Spokane, and Weiser Rivers. Since 1985, it has been found in the Bruneau, Jarbridge, Malad, Snake, and Salmon Rivers. (Xerces freshwater mussel database 2010). Historic sites in Idaho should be revisited to assess the conservation status of G. angulata in the state. The state of Montana has not assigned a conservation status rank to G. angulata. It is unknown whether G. angulata historically occurred in Montana. There is an historic record from the Columbia River in western Montana, although the Columbia River is not in Montana. Some have suggested that this record may have been from the Clark Fork River or Kootenai River in the Columbia River headwaters, although G. angulata does not currently occur in either of those locations. There are two possibilities: 1) that this record was mistaken and G. angulata never occurred in Montana, or 2) that G. angulata historically occurred in western Montana, but has been extirpated. (Gangloff and Gustafson 2000). The state of Nevada has not assigned a conservation status rank to G. angulata. This species occurs in the northeastern part of the state, in the Owyhee, Salmon and Humboldt Rivers. Few historic records exist from the state and little is known about this species’ status where it occurs. The state of Oregon has assigned a conservation status rank of S2S3, or imperiled/vulnerable, to G. angulata. Numerous historic and more recent records exist for this species throughout Oregon, although there has not been a systematic effort to resurvey historic sites for this species across the state. Brim Box et al. (2006) report that freshwater mussels – including G. angulata – have been extirpated from most of the main stem of the Umatilla River, and currently only occur in the lower reaches. J. Brim Box (pers. comm. 2010) reports observing a mussel kill in entire beds of G. angulata in the John Day River, where the mussels occur at a density of ~500/m2 and appear to be dying in place and remaining upright. The state of Washington has assigned a conservation status rank of S2, or imperiled, to G. angulata. An extensive decline of G. angulata has been observed in the Little Spokane River over four decades; a healthy population existed at one site on the river in 1968 and throughout the 1970s, but by 2000, only a single mussel remained in that location (WDFW database and B. Lang, pers. comm. with S. Jepsen, 8 November 2009). Terry Frest noted that G. angulata was apparently extirpated from the Wenatchee and Yakima Rivers (reported in person by J. Fleckenstein, WA DNR, in Mussel workgroup meeting, 2008). There are numerous historic and more recent records of G. angulata in Washington. The province of British Columbia has assigned a conservation status rank of S1, or critically imperiled, to G. angulata. The species only occurs in the southernmost part of the province. According to a Canadian national status report for G. angulata, in many locations only large individuals of this species are found, suggesting that it is not reproducing in certain areas (COSEWIC 2003). Since G. angulata belongs to a monotypic genus and is in serious decline, it is a high priority for conservation action. The glochidial host-fish species, once identified, should be protected. Populations of G. angulata should be protected and threats (listed above) should be addressed in areas where G. angulata beds occur. Much more information is needed to understand the current distribution of G. angulata. Sites that historically contained G. angulata should be revisited to determine if the species is still extant at those sites (similar to the California study detailed in Howard 2010). Populations of G. angulata should be censused to provide abundance data and enable biologists to monitor population statuses over time. The age class structure of existing G. angulata populations should be examined to determine whether or not populations are reproducing. Biologists should investigate which fish species serve as glochidial hosts for G. angulata. Aldridge, D.C. and A.L. McIvor. 2003. Gill evacuation and release of glochidia by Unio pictorum and Unio tumidus (Bivalvia: Unionidae) under thermal and hypoxic stress. Journal of Molluscan Studies 69:55-59. Andersen, M.E. and J.E. Deacon. 1996. Status of Endemic Non-Salmonid Fishes in Eastern Nevada. Journal of the Arizona-Nevada Academy of Science, 29:124-133. Barnhart, M.C., W. R. Haag, and W.N. Roston. 2008. Adaptations to host infection and larval parasitism in Unionoida. Journal of the North American Benthological Society 27:370-394. Bogan, A. E. 1993. Freshwater Bilvalve Extinctions (Mollusca: Unionoida): A Search for Causes. American Zoologist 33:599-609. Brim Box, J., J. Howard, D. Wolf, C. O’Brien, D. Nez, and D. Close. 2006. Freshwater mussels (Bivalvia: Unionoida) of the Umatilla and Middle Fork John Day rivers in eastern Oregon. Northwest Science 80:95-107. Burch, J.B. 1973. Freshwater Unionacean Clams (Mollusca: Pelecypoda) of North America. Biota of Freshwater Ecosystems Identification Manual No. 11. U.S. Environmental Protection Agency, Washington, D.C. 176 pp. California Department of Fish and Wildlife (CA DFG). 1995. Fish Species of Special Concern. Available online: http://www.dfg.ca.gov/wildlife/nongame/ssc/fish.html (Accessed 22 October 2010). Claeys, R.R., R.S. Caldwell, N.H. Cutshall, and R. Holton. 1975. Chlorinated pesticides and polychlorinated biphenyls in marine species, Oregon/Washington coast 1972. Pestic. Monit. J. 9:2-10. Clarke, A.H. 1981. The Freshwater Molluscs of Canada. National Museum of Natural Sciences, National Museums of Canada, Ottawa. 446 pp. Clarke, A.H. 1988. Aspects of corbiculid-unionid sympatry in the United States. Malacology Data net 2:57-99. Coney, C.C. 1993. Freshwater Mollusca of the Los Angeles River: Past and present status and distribution. Pp. C1-C22 in The Biota of the Los Angeles River: an overview of the historical and present plant and animal life of the Los Angeles River drainage (K.L. Garrett, ed.). Natural History Museum of Los Angeles County Foundation. California Department of Fish and Game Contract No. FG 0541. Committee on the Status of Endangered Wildlife in Canada ( COSEWIC). 2003. COSEWIC Assessment and Status Report on the Rocky Mountain Ridged Mussel (Gonidea angulata) in Canada. Committee on the Status of Endangered Wildlife in Canada. Ottawa. vi + 29 pp. (www.sararegistry.gc.ca/status/status_e.cfm) Dewson, Z. S., James, A. B. W., and Death, R. G. 2007. A review of the consequences of decreased flow for instream habitat and macroinvertebrates. Journal of the North American Benthological Society 26 (3):401–415. Dudley, W.W., Jr. and J.D. Larson. 1976. Effect of Irrigation Pumping on Desert Pupfish Habitats in Ash Meadows, Nye County, Nevada. United States Geological Survey Professional Paper, 927:1-52. Frest, T. J. and E. J. Johannes. 1992. Effects of the March, 1992 drawdown on the freshwater mollusks of the Lower Granite Lake area, Snake River, SE WA and W. ID. Final Report to U.S. Army Corps of Engineers, Walla Walla District. Deixis Consultants, Seattle, Washington. i + 11 pp. Frest, T. J. and E. J. Johannes. 1995. Interior Columbia Basin mollusk species of special concern. Final report to the Interior Columbia Basin Ecosystem Management Project, Walla Walla, WA. Contract #43-0E00-4-9112. 274 pp. plus appendices. Frest, T.J. and E.J. Johannes. 2000. An annotated checklist of Idaho land and freshwater mollusks. Journal of the Idaho Academy of Science 36(2):1-51. Gangloff, M. M. and D. L. Gustafson. 2000. The mussels (Bivalvia: Unionoida) of Montana. Central Plains Archaeology 8(1):121-130. Hartfield, P. 1993. Headcuts and their effects on freshwater mussels. Pp. 131-141 in K.S. Cummings, A.C. Buchanan, and L.M. Koch (eds.). Conservation and Management of Freshwater Mussels. Proceedings of a UMRCC Symposium, 12-14 October 1992, St. Louis, Missouri. Upper Mississippi River Conservation Committee, Rock Island, Illinois. 189 pp. Havlik, M.E. and L.L. Marking. 1987. The effects of contaminants on naiad mollusks (Unionidae): A review. Resource Publication 164, United States Department of the Interior, Fish and Wildlife Service, Washington DC. Howard, J.K. 2010. Sensitive Freshwater Mussel Surveys in the Pacific Southwest Region: Assessment of Conservation Status. Prepared for USDA Forest Service, Pacific Southwest Region. 60 pages. Krueger, K., P. Chapman, M. Hallock and T. Quinn. 2007. Some effects of suction dredge placer mining on the short-term survival of freshwater mussels in Washington. Northwest Science 81(4):323-332. Leff, L.G., J.L. Burch, and J.V. McArthur. 1990. Spatial distribution, seston removal, and potential competitive interactions of the bivalves Corbicula fluminea and Elliptio complanata, in a coastal plain stream. Freshwater Biology 24: 409-416. Luzier, C. and S. Miller. 2009. Freshwater Mussel Relocation Guidelines. A product of the Pacific Northwest Native Freshwater Mussel Workgroup. Available online: http://www.xerces.org/wp-content/uploads/2009/10/mussel-relocation-position-statement.pdf (Accessed 22 October 2010). Mackie, G.L. 1991. Biology of the exotic zebra mussel, Dreissena polymorpha, in relation to native bivalves and its potential impact in Lake St. Claiar. Hydrobiologia 219: 251-268. Mathews, B.W., L.E. Sollenberger, V.D. Nair, and C.R. Staples. 1994. Impact of Grazing Management on Soil Nitrogen, Phosphorus, Potassium, and Sulfur Distribution. Journal of Environmental Quality 23: 1006-1013. McMahon, R.F. and A.E. Bogan. 2001. Mollusca: Bivalvia. In Thorp, J.H. and A.P. Covich (Eds.) Ecology and Classification of North American Freshwater Invertebrates. 2nd Edition. Pp. 331-429. Academic Press. Moyle, P.B., H.W. Li, and B.A. Barton. 1986. The Frankenstein Effect: Impact of Introduced Fishes on Native Fishes in North America. In R.H. Stroud, editor, Fish Culture in Fisheries Management, pages 415-426. Bethesda, Maryland: American Fisheries Society. NatureServe. 2009. NatureServe Explorer: An online encyclopedia of life [web application]. Version 7.1. NatureServe, Arlington, Virginia. Available http://www.natureserve.org/explorer. (Accessed: December 17, 2009 ). Nedeau, E. J., A. K. Smith, J. Stone and S. Jepsen. 2009. Freshwater Mussels of the Pacific Northwest Second Edition. The Xerces Society for Invertebrate Conservation. 51 pp. Neves, R.J., A.E. Bogan, J.D. Williams, S.A. Ahlstedt, and P.W. Hartfield. 1997. Status of Aquatic Mollusks in the Southeastern United States: A Downward Spiral of Diversity. Chapter 3 In: Aquatic Fauna in Peril: The Southeastern Perspective. Eds: G.W. Benz and D.E. Collins. Special Publication I, Southeast Aquatic Research Institute, Lenz Design and Communications, Decatur, GA. 554 pages. Richards, D.C., C.M. Falter, G.T. Lester, and R. Myers. 2005. Responses to FERC Additional Information Request AR-2, Listed Mollusks. Hells Canyon Project FERC No. P-1971-079. Idaho Power Company. Rinne, J.N. and P.R. Turner 1991. Reclamation and Alteration of Management Techniques, and a Review of Methodology in Stream Renovation. In W.L. Minckley and J.E. Deacon, Editors, Battle against Extinction: Native Fish Management in the American West, pages 219-244. Tucson, Arizona: University of Arizona Press. Rood, S.B., G.M. Samuelson, J.K. Weber, and K.A. Wywrot. 2005. Twentieth-century decline in streamflows from the hydrographic apex of North America. Journal of Hydrology 306:215-233. Sada, D.W.; Vinyard, G.L. 2002. Anthropogenic changes in historical biogeography of Great Basin aquatic biota. In: Hershler, R.; Madsen, D.B.; Currey, D., eds. Great Basin Aquatic Systems History. Smithsonian Contributions to the Earth Sciences No. 33: 277-295. Schloesser, D.W., T.F. Nalepa, and G.L. Mackie. 1996. Zebra mussel infestation of unionid bivalves (Unionidae) in North America. American Zoologist 36: 300-310. Spring Rivers. 2007. Reproductive Timing of Freshwater Mussels and Potential Impacts of Pulsed Flows on Reproductive Success. California Energy Commission. PIER Energy-Related Environmental Research Program. CEC-500-2007-097. Starrett, W.C. 1971. A survey of the mussels (Unionacea) of the Illinois River: a polluted stream. Illinois Natural History Survey Bulletin 30(5): 267-403. Strand, M. and R.W. Merritt.1999. Impacts of cattle grazing activities on stream insect communities and the riverine environment. American entomologist 45: 13-29. Strayer, D.L. 1999. Effects of alien species on freshwater mollusks in North America. Journal of the North American Benthological Society 18:74-98. Strayer, D.L. and H.M. Malcom. 2007. Effects of zebra mussels (Dreissena polymorpha) on native bivalves: the beginning of the end or the end of the beginning? Journal of the North American Benthological Society 26(1): 111-122. Taylor, D.W. 1981. Freshwater mollusks of California: a distributional checklist. California Fish and Game 67:140-163. Turgeon, D.D., J.F. Quinn, Jr., A.E. Bogan, E.V. Coan, F.G. Hochberg, W.G. Lyons, P.M. Mikkelsen, R.J. Neves, C.F.E. Roper, G. Rosenberg, B. Roth, A. Scheltema, F.G. Thompson, M. Vecchione, and J.D. Williams. 1998. Common and scientific names of aquatic invertebrates from the United States and Canada: Mollusks. 2nd Edition. American Fisheries Society Special Publication 26, Bethesda, Maryland: 526 pp. U.S. EPA (Environmental Protection Agency). 2010. Watershed Assessment, Tracking & Environmental Results. National Summary of State Information. available online at: http://iaspub.epa.gov/waters10/attains_nation_cy.control (accessed 23 April 2010). Vannote, R.L., and G.W. Minshall. 1982. Fluvial processes and local lithology controlling abundance, structure, and composition of mussel beds. Proceedings of the National Academy of Sciences 79:4103-4107. Vaughn, C.C. and C.M. Taylor. 1999. Imoundments and the Decline of Freshwater Mussels: a Case Study of an Extinction Gradient. Conservation Biology 13(4): 912-920. Vaughn, C.C. and D.E. Spooner. 2006. Scale-dependent associations between native freshwater mussels and invasive Corbicula. Hydrobiologia 568:331-339. Voshell, J.R. 2002. A Guide to Common Freshwater Invertebrates of North America. The McDonald & Woodward Publishing Company, Blacksburg, Virginia. 442pp. Washington Department of Fish and Wildlife (WDFW) database of freshwater mussel records. 2009. Managed by Molly Hallock. Watters, G.T. 1996. Small dams as barriers to freshwater mussels (Bivalvia, Unionoida) and their hosts. Biological Conservation 75:79-85. Western Mollusk Sciences. 2008. Strategic inventory of freshwater mussels in the northern Sierra Nevada province. Report to the USDA Forest Service. Pacific Southwest Region. 65 pp. Williams, J.E., J.E. Johnson, D.A. Hendrickson, S. Contreras-Balderas, J.D. Williams, M. Navarro-Mendoza, D.E. McAllister, and J.E. Deacon. 1989. Fishes of North America Endangered, Threatened, or of Special Concern: 1989. Fisheries, 14(6):2-20. Williams, J.D., S.L.H. Fuller, and R. Grace. 1992. Effects of Impoundments on Freshwater Mussels (Mollusca: Bivalvia: Unionidae) in the Main Channel of the Black Warrior and Tombigbee Rivers in Western Alabama. Bulletin of the Alabama Museum of Natural History 13:1-10. Xerces Society Database of Freshwater Mussel Records. 2010. The Xerces Society for Invertebrate Conservation. Jayne Brim Box (Confederated Tribes of the Umatilla Indian Reservation Mussel Project), 2010 John Fleckenstein (Washington Department of Natural Resources), 2008 Bruce Lang, 2009 Al Smith (retired), 2008 Pacific Northwest Native Freshwater Mussel Workgroup, accessed February, 2010 NatureServe Explorer, accessed February, 2010 E-Fauna BC, accessed February, 2010 Freshwater Mussel relocation guidelines, Pacific Northwest Native Freshwater Mussel Workgroup, accessed October, 2010 Numerous agencies and organizations generously contributed their records to this project. We would especially like to thank the Pacific Northwest Native Freshwater Workgroup, the Confederated Tribes of the Umatilla Indian Reservation Mussel Project, Oregon Department of Fish and Wildlife, Washington Department of Fish and Wildlife, Utah Division of Wildlife Resources Native Aquatics Program, and the U.S. Forest Service. We would like to thank the following individuals for sharing large amounts of information for this project: Jayne Brim Box (Confederated Tribes of the Umatilla Indian Reservation), Molly Hallock (WDFW), Peter Hovingh (retired), Jeanette Howard (Western Mollusk Sciences), Ed Johannes (Deixis Consultants), Shelly Miller (ODFW), Karen Mock (Utah State University), Al Smith (retired), and Wendy Walsh (retired). This project would not have been possible without the generous contribution of records or other information from the following individuals: Aaron David, Al Smith, Alan Cvancara, Andra Love, Art Bass, Bob Brenner, Bob Wisseman, Brett Blundon, Brian Lang, Bruce Lang, Carol Evans, Carol Gelvin-Reymiller, Carol Hughes, Christine O’Brien, Chuti Fiedler, Cynthia Tait, Dale Swedberg, Darcy McNamara, David Cowles, David Kennedy, David Plawman, David Wolf, Donna Allard, Donna Nez, Dorene MacCoy, Doug Post, Ed Johannes, Emily Davis, Fred Schueler, Gary Lester, Gordon Edwards, Jason Dunham, Jayne Brim-Box, Jeanette Howard, Jeff Gottfried, Jeff Sorenson, Jennifer Parsons, Jennifer Vanderhoof, Joanne Richter, Joe Furnish, Joe Slusark, Jon Ives, Karen Mock, Kathy Thornburgh, Keith Benson, Kevin Aitkin, Kevin Cummings, Larry Dalton, Larry Scofield, Lea Gelling, Lee Cain, Linda Ward, Lisa Torunski, Lorrie Haley, Maria Ellis, Mark LaRiviere, Mark Mouser, Mary Hanson, Michelle McSwain, Michelle Steg-Geltner, Mike Mulvey, Mindy Allen, Molly Hallock, Nancy Duncan, Paul Pickett, Peter Bahls, Peter Hovingh, Ray Heller, Ray Kinney, Ray Perkins, Ray Temple, Rolland Schmitten, Roy Iwai, Ryan Houston, Ryan Merle, Shanda McGraw, Shelly Miller, Stephen Conroy, Steve Lysne, Steve Sampfli, Steve Smith, Terry Myers, Tom Burke, Tom Watters, Trevor Swanson, Wendy Walsh and Yvonne Colfax. Funding for the status assessment of western freshwater mussels was provided by the following foundations and individuals: Whole Systems Foundation PGE Salmon Habitat Fund Xerces Society members
<urn:uuid:13f5c52e-53f6-4e43-9d11-2e889d515cc0>
CC-MAIN-2017-26
http://xerces.org/western-ridged-mussel/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320227.27/warc/CC-MAIN-20170624064634-20170624084634-00115.warc.gz
en
0.875527
10,589
3.703125
4
In ecology and forestry, yellow pine refers to a number of pine species which tend to grow in similar plant communities and yield similar strong wood. In the Western United States, yellow pine refers to Jeffrey pine or ponderosa pine.:4 In the Southern United States, yellow pine refers to longleaf pine, shortleaf pine, slash pine, or Loblolly pine. In the United Kingdom, yellow pine refers to Eastern white pine or Scots pine. Western United States The Jeffrey pine and the Ponderosa pine are pines that are common in drier montane areas. They are often confused by casual observers. Jeffrey pine is more stress tolerant than Ponderosa pine. At higher elevations, on poorer soils, in colder climates, and in dryer climates, Jeffrey pine replaces ponderosa as the dominant tree ("Jeffrey pine forest"). Ponderosa pine dominated forests ("Ponderosa pine forest") occur at elevations from about 300 to 2,100 metres (980 to 6,890 ft). Jeffrey pine dominated forests occur mostly in California, from 1,500 to 2,400 metres (4,900 to 7,900 ft) in the north, and 1,700 to 2,800 metres (5,600 to 9,200 ft) in the south. The highest elevations are typically on the east side of the Sierra Nevada. "Eastside pine forest" refers to areas of Lassen National Forest, Plumas National Forest, and Tahoe National Forest, all on the east of the Sierra Nevada crest, where Ponderosa and Jeffrey pine codominate. One way to distinguish between them is by their cones. Each has barbs at the end of the scales. The sharp Jeffrey pine cone scale barbs point inward, so the cone feels smooth to the palm of one's hand when rubbed down the cone. Ponderosa pine cone scale barbs point outward, so feel sharp and prickly to the palm of one's hands. Another distinguishing characteristic is that the needles of Jeffrey pine are glaucous, less bright green than those of ponderosa pine, and by the stouter, heavier cones with larger seeds and inward-pointing barbs. Jeffrey pine wood and ponderosa pine wood are sold together as yellow pine. Both kinds of wood are hard (with a Janka hardness of 550 pounds), but the western yellow pine wood is less dense than southern yellow pine wood (28 pounds / cubic foot versus 35 pounds / cubic foot for shortleaf pine). Southern United States In the south, the yellow pines grow very well in the acidic red clay soil found in most of the region. The wood from the southern yellow pines typically has a density value between 50–55 lbs/cubic foot when pressure treated. Yellow pine grows across the South, from Texas to Virginia. Dimensional lumber and plywood products manufactured from southern yellow pine are used extensively in home construction in the United States. They are also used for wooden roller coasters and most used for utility poles throughout the United States. - Safford, H.D. (2013). "Natural Range of Variation (NRV) for yellow pine and mixed conifer forests in the bioregional assessment area, including the Sierra Nevada, southern Cascades, and Modoc and Inyo National Forests" (PDF). Vallejo, CA: USDA Forest Service, Pacific Southwest Region. - Schoenherr, Allan A. (1993). A Natural History of California. UC Press. p. 180. ISBN 0-520-06922-6. - "Southern Yellow Pine" (PDF). United States Forest Service: Forest Products Laboratory. United States Department of Agriculture. Retrieved 13 April 2010. - Fagan, Damian (2012). Canyon Country Wildflowers (2nd ed.). Morris Bush Publishing. ISBN 978-0-7627-7013-7. - Moore, Gerry; Kershner, Bruce; Tufts, Craig; Mathews, Daniel; et al. (2008). National Wildlife Federation Field Guide to Trees of North America. New York: Sterling. p. 86. ISBN 1-4027-3875-7. - "Jeffrey Pine". The Wood Database. - "Southern Pine". Spartanburg Forest Products. - Vlosky, Richard P. (1 April 2003). "Homebuilder attitudes and preferences regarding southern yellow pine". Forest Products Journal. Forest Products Society.
<urn:uuid:4ebddabd-2698-484a-b4bb-8101dcd56f86>
CC-MAIN-2017-26
https://en.wikipedia.org/wiki/Yellow_pine
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320386.71/warc/CC-MAIN-20170625013851-20170625033851-00195.warc.gz
en
0.876401
914
3.703125
4
'Developing a 21st century education system ... is a national priority, but achieving that goal will take a real partnership with local schools.' Clinton calls for an end to No Child Left Behind (NCLB), which she voted for in 2001. As an alternative, she supports broader assessments of progress in schools than the formulas set out by NCLB. Clinton would also provide incentives for community groups to get involved in education. Would devote $1 billion for programs to reduce dropout rates among minority students No Child Left Behind No: Wants to end it. Says it is underfunded and puts too much emphasis on standardized tests No: Believes that vouchers divert resources from the public-school system Maybe: Favors schoolwide performance-based pay but not merit pay for individuals Longer School Day or Year Yes: Supports the concept but doesn't specify it in her education plans Next Senator Barack Obama
<urn:uuid:95490de4-9dc4-43dc-a2c8-e18eb904e1c4>
CC-MAIN-2017-26
http://content.time.com/time/specials/2007/article/0,28804,1713510_1713513_1713516,00.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00275.warc.gz
en
0.934263
189
2.5625
3
Talking about young children and how to communicate with them effectively, especially the preschooler ones, some important things must be considered. Preschool children, by the way, are those who fall in the under six years old category. While it is true that very young children don’t have the vocabulary of the rest of us nor the experience to accurately pinpoint abstract ideas, yet it is advisable for you, as a parent, and also for the rest of the adults of their lives, to talk to them with the same respect and intelligence that you’re going to show when you talk to everyone else. Children under six years old are keen observers, great emulators, sensitive, and highly curious individuals. So communicating with them is something that requires a lot of patience, skills, and understanding. You must remember that, when talking to them, given the qualities of children under six years of age may have had been possessing, your body language is as important as what you say. Yes, even your facial expressions are enough for the child to pick up and to interpret whether you’re interested and ready to hear for what he or she has to say. It would be important for the child when, seeing a powerful adult stops what he is doing in order to face his child, parents get down on his or her level and invite their child to tell what’s on his or her mind. And, if ever, you, as a parent, are puzzled or a bit confused by your preschooler’s behavior at any particular moment, ask him or her about it. It is important to treat your child as a person and see if you can find out how he or she is feeling. You may start by asking your child, “Is there something wrong?” Or “Is there something bothering you?” And, yes, do not forget to offer your service by asking: “Can I help you with something?” One of the best ways a parent can do is to verbalize what his or her child is thinking. This can be done, to start with, by encouraging the child to tell you first so that you don’t have to spend much time guessing. But it’s not always going to be what you expect from your child each time. Sometimes, words do not come easily to your child and you think you know what’s going on. Ask your child instead, for this particular situation, a question that may help him or her identify and explore what it is that’s troubling him or her. It is an ability of a parent to develop such a skill of putting into words what’s worrying both him and his child. And, by doing so, the parent should be careful enough not to use words that are full of misery or terror. He must be able to convey it well to his child that he understands how his child is feeling and that such feelings are normal. There are times when, in trying to talk to your child, the right topic comes up at the wrong time, and you know you have to continue anyway. Even when you’re caught off guard, you want to keep your wits about you and remember why it is important to empathize, mirror, and validate, no matter what else you’re doing at the given moment. Unless you have some choice in the matter, paying attention to the physical setting of the dialogue is a good idea. Communicating effectively with preschool children is all about, in my humble opinion, learning to dialogue and to stay with it until both of you (parent and child) reach empathic connection with each other. Show that you’re there to listen to what your child should be saying in the first place. Pay close attention to the physical setting, and be nonjudgmental. Put in mind that you’re not there, in a dialogue with your child, as though you had to defend yourself in interchanges with your child, and he is not going to defend against you, either. But both of you, in the atmosphere of mutual understanding, are beginning to build solidly on such a new empathic connection that’s being formed. It is not just about talking with your child though, but you have got to do more than dialogue with him or her by teaching him or her to dialogue with you.
<urn:uuid:40da309e-edf6-4e56-a838-216e5e631f3f>
CC-MAIN-2017-26
https://ashegrowsup.wordpress.com/category/parenting-advice-on-communication/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00275.warc.gz
en
0.980053
896
3.078125
3
The world of the future is often characterised by everything being virtual or touch-screen. Now, we're at a point where this could become normal enough in the future, thanks to the work of researchers in France and the United States. After some experimentation, a possible "disposable electronic touch pad" has been created, as RSC reports. The concept sounds futuristic but the actual production seems surprisingly plausible. The pads are made of metallized paper: paper coated in a layer of aluminium. The aluminium layer is only around 10nm thick, but is then covered with another very thin film of transparent polymer. The paper is already produced commercially, and is used for shiny labels and glossy book covers. For a square metre you can expect to pay out a wallet-crippling $0.25, so it's hardly expensive either. Already, the work has allowed the researchers to develop an alarmed box with a keypad that requires a code, so the real-world ramifications could be experienced very rapidly. One key to the system is that the paper already has the essential elements of a capacitor, with the surfaces of thin metal film being able to collide when something is touched. To try and convey the rapid pace this project is moving at, the team have two different capacitor configurations. One requires two sheets of paper stuck together, while the other uses a single sheet. The human body itself makes a surprisingly effective capacitor, so when the finger touches a key there is an increase of capacitance at the key. The external electronics detect this. While sounding well-developed already, more work is being performed to try and usher in a new age of touch-screen everything.
<urn:uuid:38a176ef-8766-4bb7-a8bd-43148a6923e3>
CC-MAIN-2017-26
https://www.neowin.net/news/researchers-create-disposable-touch-pads
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00275.warc.gz
en
0.949999
340
2.875
3
The IBM-developed artificial intelligence computer system named Watson is capable of answering questions posed in natural language. It was specifically developed to answer questions on the TV quiz show Jeopardy! In 2011, the supercomputer competed on the sitcom against two former winners and won the $1 million prize. Eric Brown, a research scientist with IBM, is responsible for the creation and tutoring of Watson. Its purpose was, as an artificial intelligence, to beat the Turing test. This means that if Watson were to chat with a human and that person could not tell whether the correspondent was man or machine, then Watson would pass the test. It caused havoc after making obscene outbursts after memorizing the contents of the Urban Dictionary. The website contains slang that is part of informal conversation today, but is not considered appropriate for polite conversation. So great was the damage that Watson’s programmers had to wipe out its memory after they could find no way of stopping the supercomputer from swearing profusely. As Watson formulates replies based on the working of several supercomputers together, it had put together some words and started responding to many of the questions posed with bulls***. The original article has reported it as follows, Watson couldn’t distinguish between polite language and profanity – which the Urban Dictionary is full of. Watson picked up some bad habits from reading Wikipedia as well. In tests it even used the word “bulls***” in an answer to a researcher’s query. Ultimately, Brown’s 35-person team developed a filter to keep Watson from swearing and scraped the Urban Dictionary from its memory. But the trial proves just how thorny it will be to get artificial intelligence to communicate naturally. Brown is now training Watson as a diagnostic tool for hospitals. No knowledge of OMG required. For the IBM programmers working on Watson, that was certainly a very interesting day at work. For ever since I have known, we have thought our kids the English Alphabets using objects that pertain to an alphabet. For example, we have learnt the alphabets by using “A for Apple”, “B for Ball”, “C for cat” and so on. However, technology has changed our generation and we have become so advanced now that we do need to change which object we relate to an alphabet. And my friend Jatin Sapra (http://about.me/jatinsapra) has done something similar. Here is an alphabet chart which relates the alphabet to technologies that rock the world today. Kudos to Jatin on this, he said that he did it because he was bored. Now the question is whether you would want to teach your child using the below alphabet chart? Hit me with your comments. (picture after the jump) This blew me away when I first saw it. Apparently some people at Pandorabot have figured out how to create a decent chat bot in 24 hours or less by simply feeding it old transcripts and dialogs. If you are a Trekkie, or simply curious, you must have a chat with Fake Kirk. This Captain Kirk look-alike bot will try to carry on a conversation with you. You will be amazed or disappointed, but you won’t come away without an opinion. Here’s what happened when I went on a 5 minute mission to explore a new website. I am the Lieutenant in the chat below. Lieutenant: What is the Star Date? Fake Kirk: Stardate Tuesday, October 27, 2009. Lieutenant: Where is Spock? Fake Kirk: He is on the planet.Lieutenant: Do you love Tribbles? Fake Kirk: Only a few of them.Lieutenant: What is the meaning of life? Fake Kirk: Our five year mission: to seek out new worlds and new civilizations. To go boldly where no man has gone before. Follow these links to find out more about Pandorabots, or you can see a list of the most popular bots. By the way, one of the bots is named God. Don’t ask him about false idols, he gets really angry. Techie Buzz Verdict: Fun, just plain old fun. This web app should work in any modern browser with Adobe Flash installed. Techie Buzz Rating: 4/5 Do you have any questions about A.I. or chatbots? Do you have any ideas you’d like to share? Be sure to add a comment below or email me. I’d love to hear from you.
<urn:uuid:e319e428-6498-444c-8d00-66c08eafe51a>
CC-MAIN-2017-26
http://techie-buzz.com/tag/funny-technology
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320823.40/warc/CC-MAIN-20170626152050-20170626172050-00355.warc.gz
en
0.958966
950
3.09375
3
A 2009 study from Sallie Mae takes a look at how today's undergraduates are using credit cards. Given the current state of the economy, there is some cause for concern about college students' use of credit cards, their ability to repay, and the amount of debt they might be accruing. Despite the credit freeze, college students last year used credit cards more than ever before, including charging tuition and other direct education expenses, according to a new study from Sallie Mae, the nation's leading saving- and paying-for-college company. According to the report: • Nearly one-third (30 percent) put tuition on their credit card, an increase from 24 percent in 2004, when the study was last conducted. • In total, 92 percent of undergraduate credit cardholders charged textbooks, school supplies, or other direct education expenses, up from 85 percent in the previous study. Students who used credit cards to pay for direct education expenses estimated charging $2,200, more than double 2004's average of $942. • Eighty-four percent of undergraduates had at least one credit card, up from 76 percent in 2004. On average, students have 4.6 credit cards, and half of college students had four or more cards. • Only 17 percent said they regularly paid off all cards each month, and another 1 percent had parents, a spouse, or other family members paying the bill. The remaining 82 percent carried balances and thus incurred finance charges each month. Source: Sallie Mae
<urn:uuid:9d341f42-ac33-4bbd-9e65-f157fb3bbce6>
CC-MAIN-2017-26
http://www.christianheadlines.com/columnists/jim-liebelt/how-college-students-use-credit-cards-11637261.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320823.40/warc/CC-MAIN-20170626152050-20170626172050-00355.warc.gz
en
0.9591
319
2.65625
3
Fencing Sheep An engineer, a physicist, and a mathematician are shown a pasture with a herd of sheep, and told to put them inside the smallest possible amount of fence. The engineer is first. He herds the sheep into a circle and then puts the fence around them, declaring, "A circle will use the least fence for a given area, so this is the best solution." The physicist is next. She creates a circular fence of infinite radius around the sheep, and then draws the fence tight around the herd, declaring, "This will give the smallest circular fence around the herd." The mathematician is last. After giving the problem a little thought, he puts a small fence around himself and then declares, "I define myself to be on the outside!"
<urn:uuid:fe70b453-3a3c-4c75-b804-1e03b32575a0>
CC-MAIN-2017-26
http://sanitarium.net/jokes/getjoke.cgi?68
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319688.9/warc/CC-MAIN-20170622181155-20170622201155-00234.warc.gz
en
0.952783
152
2.953125
3
In today’s market for high performance fibers, used for applications such as bulletproof vests, manufacturers have only four options: Kevlar, Spectra, Dyneema, and Zylon. Made from polymers such as polyethylene, these were the strongest synthetic fibers in the world—until recently. Marilyn Minus, an assistant professor of engineering at Northeastern, has developed a type of fiber that is stronger than the first three commercial products mentioned above, and—even in its first generation—closely approaches the strength of the fourth (Zylon). Adding small amounts of carbon nanotubes—straight, cylindrical particles made entirely of carbon—to polymer fibers increases their strength marginally. But as a graduate student at the Georgia Institute of Technology five years ago, Minus figured that with a little more control, she might be able to turn those modest improvements into dramatic ones. She has spent the last four years at Northeastern proving her hunch. In a paper recently released in the journal Macromolecular Materials and Engineering, Minus presented a tunable process for creating super-strong fibers that rival the industry’s very best. As with previous work, Minus’ method integrates carbon nanotubes into the polymer fiber, but rather than serving as simply an added ingredient, the nanotubes now also perform an organizational role. From carbon black powder to metallic particles, a variety of materials can guide the formation of specific crystal types in a process called nucleation. But before carbon nanotubes, Minus said, “we’ve never had a nucleating material so similar to polymers.” This similarity allows the nanotubes to act likes skates along which the long polymer chains can slide, perfectly aligning themselves with one another. But it’s the crystallization process that drives the remarkable properties recently reported. In their research, Minus and her colleagues showed that they could easily turn these properties on or off. By changing nothing but the pattern of heating and cooling the material, they were able to increase the strength and toughness of fibers made with the very same ingredients. In the current research, Minus and her colleagues worked out the recipe and process for one particular polymer: polyvinyl alcohol. “But we can do this with other polymers and we are doing it,” she said. With funding from a new grant from the Defense Advanced Research Projects Agency, Minus will now work out the method for a polymer called polyacrylonitrle, or PAN. This is the dominant material used to form carbon fibers, which are of particular interest in lightweight composite materials such as those used in the Boeing 787 airliner. With the more organized structure afforded by Minus’ method, this material could see a vast increase in its already great performance. Source: Northeastern / Angela Herring
<urn:uuid:7437cc4c-4e38-46a9-b46b-46db7d5f46dc>
CC-MAIN-2017-26
http://www.advancedsciencenews.com/?p=16508
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320063.74/warc/CC-MAIN-20170623133357-20170623153357-00315.warc.gz
en
0.948248
591
3.203125
3
This article is Part II of Alastair Crooke’s historical analysis of the roots of ISIS and its impact on the future of the Middle East. Read Part I here. BEIRUT — ISIS is indeed a veritable time bomb inserted into the heart of the Middle East. But its destructive power is not as commonly understood. It is not with the “March of the Beheaders”; it is not with the killings; the seizure of towns and villages; the harshest of “justice” — terrible though they are — that its true explosive power lies. It is yet more potent than its exponential pull on young Muslims, its huge arsenal of weapons and its hundreds of millions of dollars. “We should understand that there is really almost nothing that the West can now do about it but sit and watch.” Its real potential for destruction lies elsewhere — in the implosion of Saudi Arabia as a foundation stone of the modern Middle East. We should understand that there is really almost nothing that the West can now do about it but sit and watch. The clue to its truly explosive potential, as Saudi scholar Fouad Ibrahim has pointed out (but which has passed, almost wholly overlooked, or its significance has gone unnoticed), is ISIS’ deliberate and intentional use in its doctrine — of the language of Abd-al Wahhab, the 18th century founder, together with Ibn Saud, of Wahhabism and the Saudi project: Abu Omar al-Baghdadi, the first “prince of the faithful” in the Islamic State of Iraq, in 2006 formulated, for instance, the principles of his prospective state … Among its goals is disseminating monotheism “which is the purpose [for which humans were created] and [for which purpose they must be called] to Islam…” This language replicates exactly Abd-al Wahhab’s formulation. And, not surprisingly, the latter’s writings and Wahhabi commentaries on his works are widely distributed in the areas under ISIS’ control and are made the subject of study sessions. Baghdadi subsequently was to note approvingly, “a generation of young men [have been] trained based on the forgotten doctrine of loyalty and disavowal.” And what is this “forgotten” tradition of “loyalty and disavowal?” It is Abd al-Wahhab’s doctrine that belief in a sole (for him an anthropomorphic) God — who was alone worthy of worship — was in itself insufficient to render man or woman a Muslim? He or she could be no true believer, unless additionally, he or she actively denied (and destroyed) any other subject of worship. The list of such potential subjects of idolatrous worship, which al-Wahhab condemned as idolatry, was so extensive that almost all Muslims were at risk of falling under his definition of “unbelievers.” They therefore faced a choice: Either they convert to al-Wahhab’s vision of Islam — or be killed, and their wives, their children and physical property taken as the spoils ofjihad. Even to express doubts about this doctrine, al-Wahhab said, should occasion execution. “Through its intentional adoption of this Wahhabist language, ISIS is knowingly lighting the fuse to a bigger regional explosion — one that has a very real possibility of being ignited, and if it should succeed, will change the Middle East decisively.” The point Fuad Ibrahim is making, I believe, is not merely to reemphasize the extreme reductionism of al-Wahhab’s vision, but to hint at something entirely different: That through its intentional adoption of this Wahhabist language, ISIS is knowingly lighting the fuse to a bigger regional explosion — one that has a very real possibility of being ignited, and if it should succeed, will change the Middle East decisively. For it was precisely this idealistic, puritan, proselytizing formulation by al-Wahhab that was “father” to the entire Saudi “project” (one that was violently suppressed by the Ottomans in 1818, but spectacularly resurrected in the 1920s, to become the Saudi Kingdom that we know today). But since its renaissance in the 1920s, the Saudi project has always carried within it, the “gene” of its own self-destruction. THE SAUDI TAIL HAS WAGGED BRITAIN AND U.S. IN THE MIDDLE EAST Paradoxically, it was a maverick British official, who helped embed the gene into the new state. The British official attached to Aziz, was one Harry St. John Philby (the father of the MI6 officer who spied for the Soviet KGB, Kim Philby). He was to become King Abd al-Aziz’s close adviser, having resigned as a British official, and was until his death, a key member of the Ruler’s Court. He, like Lawrence of Arabia, was an Arabist. He was also a convert to Wahhabi Islam and known as Sheikh Abdullah. St. John Philby was a man on the make: he had determined to make his friend, Abd al-Aziz, the ruler of Arabia. Indeed, it is clear that in furthering this ambition he was not acting on official instructions. When, for example, he encouraged King Aziz to expand in northern Nejd, he was ordered to desist. But (as American author, Stephen Schwartz notes), Aziz was well aware that Britain had pledged repeatedly that the defeat of the Ottomans would produce an Arab state, and this no doubt, encouraged Philby and Aziz to aspire to the latter becoming its new ruler. It is not clear exactly what passed between Philby and the Ruler (the details seem somehow to have been suppressed), but it would appear that Philby’s vision was not confined to state-building in the conventional way, but rather was one of transforming the wider Islamic ummah (or community of believers) into a Wahhabist instrument that would entrench the al-Saud as Arabia’s leaders. And for this to happen, Aziz needed to win British acquiescence (and much later, American endorsement). “This was the gambit that Abd al-Aziz made his own, with advice from Philby,” notes Schwartz. BRITISH GODFATHER OF SAUDI ARABIA In a sense, Philby may be said to be “godfather” to this momentous pact by which the Saudi leadership would use its clout to “manage” Sunni Islam on behalf of western objectives (containing socialism, Ba’athism, Nasserism, Soviet influence, Iran, etc.) — and in return, the West would acquiesce to Saudi Arabia’s soft-power Wahhabisation of the Islamic ummah (with its concomitant destruction of Islam’s intellectual traditions and diversity and its sowing of deep divisions within the Muslim world). “In political and financial terms, the Saud-Philby strategy has been an astonishing success. But it was always rooted in British and American intellectual obtuseness: the refusal to see the dangerous ‘gene’ within the Wahhabist project, its latent potential to mutate, at any time, back into its original a bloody, puritan strain. In any event, this has just happened:ISIS is it.” As a result — from then until now — British and American policy has been bound to Saudi aims (as tightly as to their own ones), and has been heavily dependent on Saudi Arabia for direction in pursuing its course in the Middle East. In political and financial terms, the Saud-Philby strategy has been an astonishing success (if taken on its own, cynical, self-serving terms). But it was always rooted in British and American intellectual obtuseness: the refusal to see the dangerous “gene” within the Wahhabist project, its latent potential to mutate, at any time, back into its original a bloody, puritan strain. In any event, this has just happened: ISIS is it. Winning western endorsement (and continued western endorsement), however, required a change of mode: the “project” had to change from being an armed, proselytizing Islamic vanguard movement into something resembling statecraft. This was never going to be easy because of the inherent contradictions involved (puritan morality versus realpolitik and money) — and as time has progressed, the problems of accommodating the “modernity” that statehood requires, has caused “the gene” to become more active, rather than become more inert. Even Abd al-Aziz himself faced an allergic reaction: in the form of a serious rebellion from his own Wahhabi militia, the Saudi Ikhwan. When the expansion of control by the Ikhwan reached the border of territories controlled by Britain, Abd al-Aziz tried to restrain his militia (Philby was urging him to seek British patronage), but the Ikwhan, already critical of his use of modern technology (the telephone, telegraph and the machine gun), “were outraged by the abandonment of jihad for reasons of worldlyrealpolitik … They refused to lay down their weapons; and instead rebelled against their king … After a series of bloody clashes, they were crushed in 1929. Ikhwanmembers who had remained loyal, were later absorbed into the [Saudi] National Guard.” King Aziz’s son and heir, Saud, faced a different form of reaction (less bloody, but more effective). Aziz’s son was deposed from the throne by the religious establishment — in favor of his brother Faisal — because of his ostentatious and extravagant conduct. His lavish, ostentatious style, offended the religious establishment who expected the “Imam of Muslims,” to pursue a pious, proselytizing lifestyle. King Faisal, Saud’s successor, in his turn, was shot by his nephew in 1975, who had appeared at Court ostensibly to make his oath of allegiance, but who instead, pulled out a pistol and shot the king in his head. The nephew had been perturbed by the encroachment of western beliefs and innovation into Wahhabi society, to the detriment of the original ideals of the Wahhabist project. SEIZING THE GRAND MOSQUE IN 1979 Far more serious, however, was the revived Ikhwan of Juhayman al-Otaybi, which culminated in the seizure of the Grand Mosque by some 400-500 armed men and women in 1979. Juhayman was from the influential Otaybi tribe from the Nejd, which had led and been a principal element in the original Ikhwan of the 1920s. Juhayman and his followers, many of whom came from the Medina seminary, had the tacit support, amongst other clerics, of Sheikh Abdel-Aziz Bin Baz, the former Mufti of Saudi Arabia. Juhayman stated that Sheikh Bin Baz never objected to his Ikhwanteachings (which were also critical of ulema laxity towards “disbelief”), but that bin Baz had blamed him mostly for harking on that “the ruling al-Saud dynasty had lost its legitimacy because it was corrupt, ostentatious and had destroyed Saudi culture by an aggressive policy of westernisation.” Significantly, Juhayman’s followers preached their Ikhwani message in a number of mosques in Saudi Arabia initially without being arrested, but when Juhayman and a number of the Ikhwan finally were held for questioning in 1978. Members of theulema (including bin Baz) cross-examined them for heresy, but then ordered their release because they saw them as being no more than traditionalists harkening back to the Ikhwan— like Juhayman grandfather — and therefore not a threat. Even when the mosque seizure was defeated and over, a certain level of forbearance by the ulema for the rebels remained. When the government asked for a fatwa allowing for armed force to be used in the mosque, the language of bin Baz and other senior ulema was curiously restrained. The scholars did not declare Juhayman and his followers non-Muslims, despite their violation of the sanctity of the Grand Mosque, but only termed them al-jamaah al-musallahah (the armed group). The group that Juhayman led was far from marginalized from important sources of power and wealth. In a sense, it swam in friendly, receptive waters. Juhayman’s grandfather had been one of the leaders of the the original Ikhwan, and after the rebellion against Abdel Aziz, many of his grandfather’s comrades in arms wereabsorbed into the National Guard — indeed Juhayman himself had served within the Guard — thus Juhayman was able to obtain weapons and military expertise from sympathizers in the National Guard, and the necessary arms and food to sustain the siege were pre-positioned, and hidden, within the Grand Mosque. Juhayman was also able to call on wealthy individuals to fund the enterprise. ISIS VS. WESTERNIZED SAUDIS The point of rehearsing this history is to underline how uneasy the Saudi leadership must be at the rise of ISIS in Iraq and Syria. Previous Ikhwani manifestations were suppressed — but these all occurred inside the kingdom. ISIS however, is a neo-Ikhwani rejectionist protest that is taking place outside the kingdom — and which, moreover, follows the Juhayman dissidence in its trenchant criticism of the al-Saud ruling family. This is the deep schism we see today in Saudi Arabia, between the modernizing current of which King Abdullah is a part, and the “Juhayman” orientation of which bin Laden, and the Saudi supporters of ISIS and the Saudi religious establishment are a part. It is also a schism that exists within the Saudi royal family itself. According to the Saudi-owned Al-Hayat newspaper, in July 2014 “an opinion poll of Saudis [was] released on social networking sites, claiming that 92 percent of the target group believes that ‘IS conforms to the values of Islam and Islamic law.'” The leading Saudi commentator, Jamal Khashoggi, recently warned of ISIS’ Saudi supporters who “watch from the shadows.” There are angry youths with a skewed mentality and understanding of life and sharia, and they are canceling a heritage of centuries and the supposed gains of a modernization that hasn’t been completed. They turned into rebels, emirs and a caliph invading a vast area of our land. They are hijacking our children’s minds and canceling borders. They reject all rules and legislations, throwing it [a]way … for their vision of politics, governance, life, society and economy. [For] the citizens of the self-declared “commander of the faithful,” or Caliph, you have no other choice … They don’t care if you stand out among your people and if you are an educated man, or a lecturer, or a tribe leader, or a religious leader, or an active politician or even a judge … You must obey the commander of the faithful and pledge the oath of allegiance to him. When their policies are questioned, Abu Obedia al-Jazrawi yells, saying: “Shut up. Our reference is the book and the Sunnah and that’s it.” “What did we do wrong?” Khashoggi asks. With 3,000-4,000 Saudi fighters in the Islamic State today, he advises of the need to “look inward to explain ISIS’ rise”. Maybe it is time, he says, to admit “our political mistakes,” to “correct the mistakes of our predecessors.” MODERNIZING KING THE MOST VULNERABLE The present Saudi king, Abdullah, paradoxically is all the more vulnerable precisely because he has been a modernizer. The King has curbed the influence of the religious institutions and the religious police — and importantly has permitted the four Sunni schools of jurisprudence to be used, by those who adhere to them (al-Wahhab, by contrast, objected to all other schools of jurisprudence other than his own). “The key political question is whether the simple fact of ISIS’ successes, and the full manifestation (flowering) of all the original pieties and vanguardism of the archetypal impulse, will stimulate and activate the dissenter ‘gene’ — within the Saudi kingdom. If it does, and Saudi Arabia is engulfed by the ISIS fervor, the Gulf will never be the same again. Saudi Arabia will deconstruct and the Middle East will be unrecognizable.” It is even possible too for Shiite residents of eastern Saudi Arabia to invoke Ja’afri jurisprudence and to turn to Ja’afari Shiite clerics for rulings. (In clear contrast, al-Wahhab held a particular animosity towards the Shiite and held them to be apostates. As recently as the 1990s, clerics such as bin Baz — the former Mufti — and Abdullah Jibrin reiterated the customary view that the Shiite were infidels). Some contemporary Saudi ulema would regard such reforms as constituting almost a provocation against Wahhabist doctrines, or at the very least, another example of westernization. ISIS, for example, regards any who seek jurisdiction other than that offered by the Islamic State itself to be guilty of disbelief — since all such “other” jurisdictions embody innovation or “borrowings” from other cultures in its view. The key political question is whether the simple fact of ISIS’ successes, and the full manifestation (flowering) of all the original pieties and vanguardism of the archetypal impulse, will stimulate and activate the dissenter ‘gene’ — within the Saudi kingdom. If it does, and Saudi Arabia is engulfed by the ISIS fervor, the Gulf will never be the same again. Saudi Arabia will deconstruct and the Middle East will be unrecognizable. “They hold up a mirror to Saudi society that seems to reflect back to them an image of ‘purity’ lost” In short, this is the nature of the time bomb tossed into the Middle East. The ISIS allusions to Abd al-Wahhab and Juhayman (whose dissident writings are circulated within ISIS) present a powerful provocation: they hold up a mirror to Saudi society that seems to reflect back to them an image of “purity” lost and early beliefs and certainties displaced by shows of wealth and indulgence. This is the ISIS “bomb” hurled into Saudi society. King Abdullah — and his reforms — are popular, and perhaps he can contain a new outbreak of Ikwhani dissidence. But will that option remain a possibility after his death? And here is the difficulty with evolving U.S. policy, which seems to be one of “leading from behind” again — and looking to Sunni states and communities to coalesce in the fight against ISIS (as in Iraq with the Awakening Councils). It is a strategy that seems highly implausible. Who would want to insert themselves into this sensitive intra-Saudi rift? And would concerted Sunni attacks on ISIS make King Abdullah’s situation better, or might it inflame and anger domestic Saudi dissidence even further? So whom precisely does ISIS threaten? It could not be clearer. It does not directly threaten the West (though westerners should remain wary, and not tread on this particular scorpion). The Saudi Ikhwani history is plain: As Ibn Saud and Abd al-Wahhab made it such in the 18th century; and as the Saudi Ikhwan made it such in the 20th century. ISIS’ real target must be the Hijaz — the seizure of Mecca and Medina — and the legitimacy that this will confer on ISIS as the new Emirs of Arabia.
<urn:uuid:1f0a577d-e60b-46e6-8765-765f2aced876>
CC-MAIN-2017-26
https://zeitgeist77.wordpress.com/2014/09/07/middle-east-time-bomb-the-real-aim-of-isis-is-to-replace-the-saud-family-as-the-new-emirs-of-arabia/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320063.74/warc/CC-MAIN-20170623133357-20170623153357-00315.warc.gz
en
0.969694
4,274
2.515625
3
The Washington Post The feat was celebrated because it was, let’s face it, really cool: here came a falling rocket that had to withstand 119 mph high altitude crosswinds, locate its landing site, and then fire its engine to slow itself down until it touched down in a cloud of fire and smoke. But it also drew widespread attention because if Bezos (the founder of Amazon.com and the owner The Washington Post) and others can figure out how to repeatedly land and reuse the booster stage of their rockets, they’ve figured out how to slash the now prohibitively high cost of space flight. That's a key step in opening up space to the masses, some argue. At the very least, it'd be a dramatic disruption of the current business model, where rocket boosters burn up at reentry or are ditched into the ocean. It's as if airplanes were thrown away after they were used once, both Bezos and Musk have said. “Rockets have always been expendable,” Bezos wrote in a statement. “Not anymore." He even tweeted about it in his first and only tweet: Elon Musk, a fellow tech billionaire-space enthusiast, congratulated Blue Origin's accomplishment. But he also jabbed at a peer and a rival he seems to enjoy antagonizing. In a series of tweets, the always blunt Musk sought to clarify Blue Origin's accomplishment and place it in perspective. As Musk pointed out on twitter, his company did indeed launch several test rockets as early as 2013 and then bring them back safely smack dab on the launch pad. You can check one of those here: But the highest any of those rockets went was 1,000 meters, or 3,280 feet. Bezos’ rocket hit an apogee of 329,000 feet (the capsule went slightly higher after separation). That's more than 62 miles, just past the boundary of space and back to the pad. And that's a first for the history books. While Blue Origin’s New Shepard may have made it to space, it just barely made it. And Musk wanted to make it clear that getting to space is not nearly as difficult as getting to orbit. Orbital flight requires a bigger, faster rocket, one that’s much harder to land—“like trying to balance a rubber broomstick on your hand in the middle of a windstorm,” Musk has said. But it’s that kind of landing that he is currently chasing. SpaceX's Falcon 9 rockets are used to launch satellites into orbit (not just space, mind you) and take cargo to the International Space Station (the orbiting lab). Twice this year SpaceX attempted landings of its own, on a floating platform in the Atlantic Ocean that Musk calls an autonomous spaceport drone ship. Twice the craft hit the barge, crashed and blew up--a mishap that Musk called a "rapid unscheduled disassembly." Still, the boosters hit an apogee of 130 km, or 80 miles, before they started their descent. In other words, they flew deeper into space than New Shepard’s suborbital launch. The company also performed a "landing" over water in 2014, where the rocket hovered for a few seconds before tipping over. On Tuesday, Musk hinted that the company’s next landing attempt, which could come as early as next month, may be on land—not on the drone ship in the ocean. The company is so confident in its ability to routinely stick the landings, it is building a landing pad at Cape Canaveral, not far from the launch complex it has taken over at the Kennedy Space Center. Musk and Bezos agree that using the rocket’s propulsion to land is the way to go—as opposed to the Space Shuttle’s runway landings. That’s because both have ambitions for deep space missions, which would require different capabilities. Musk’s goal is to colonize Mars. He’s taken note that there are “no runways on Mars,” as he said at a forum at MIT. “You really have to get good at propulsive landing if you want to go somewhere other than Earth." And so here's an artist's concept of what landing SpaceX's Dragon capsule would look like landing on Mars.
<urn:uuid:6730c2bf-e1d8-4d39-8ea3-470b307135c1>
CC-MAIN-2017-26
http://oscarb1.blogspot.com/2015/11/by-christian-davenport-amazon.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320593.91/warc/CC-MAIN-20170625221343-20170626001343-00555.warc.gz
en
0.965312
898
2.75
3
Commemorating a False Past in Union County, North Carolina Here is something that is sure to make a rainy Boston Monday look just a bit more bleak. It’s the first local news report from Charlotte, NC from this weekend’s event in which nine slaves and one free black man were remembered for their service as soldiers in the Confederate army. You can’t really blame WBTV 3 for this report since all they can do is share what took place. Between the ceremony and this report it does give one the sense of just how woefully misinformed some people are about the institution of slavery and Confederate policy about arming black men as soldiers. The report begins: “Ten black military soldiers finally got the honor they deserve 150 years later.” Not one of these men served as a soldier. On the brighter side, this morning I am heading over to Boston University to give a guest lecture in Nina Silber’s Civil War class. I am going to talk about my book and the broader topic of how black soldiers have been remembered in recent years. Part of the talk will focus on how the Internet has helped to spread and give legitimacy to the myth of the black Confederate soldier. All we can do is educate.
<urn:uuid:212019e5-43ca-4c6e-8283-8e4b8ad46f18>
CC-MAIN-2017-26
http://cwmemory.com/2012/12/10/commemorating-a-false-past-in-union-county-north-carolina/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320841.35/warc/CC-MAIN-20170626170406-20170626190406-00635.warc.gz
en
0.964384
254
2.640625
3
A new portable biomass power plant is gaining international interest. Recently, 30 visitors from as far away as Guatemala visited the Thomas M. Brooks Forest Products Center to see a demonstration of the Department of Sustainable Biomaterials‘ technology. About the size of a Mini Cooper turned upright, the biomass power system generates electricity by burning wood chips, corncobs, manure, and other agricultural wastes. In demonstrations, Henry Quesada-Pineda, assistant professor of sustainable biomaterials in the College of Natural Resources and Environment, powered shop tools with the unit. “There is increasing interest in the community and around the world, especially in off-grid situations, to learn more about how biomass energy production can be integrated into small-scale systems,” said Quesada-Pineda, a Virginia Cooperative Extension specialist who is also assistant director of Virginia Tech’s Center for Forest Products Business, as he fielded questions from international development consultants and forest-products industry managers during the demonstration. The unit’s generator is powered by a three-cylinder combustion engine using syngas — a combination of nitrogen, carbon monoxide, and hydrogen produced by biomass reacting with steam at temperatures over 750 C. Virginia Tech’s unit, which produces 1 kilowatt hour for every 1.2 kilograms of biomass, is capable of generating 10 kilowatts, enough to power 100 100-watt light bulbs. This gasification process itself has been in use for years, Quesada-Pineda says. It was used in the mid-1800s to produce gas for streetlights and cooking, before being replaced by natural gas. Wood gasifiers powered thousands of European motor vehicles during World War II fuel shortages. Today, biomass power plants represent the nation’s second largest source of renewable energy in terms of capacity, after hydroelectric. The unit costs around $18,000, and so is not a cost-effective investment for most U.S. companies with access to electricity, Quesada-Pineda says, but his department’s research will seek to determine the optimal use for this renewable energy source. In addition to research, the biomass power unit will be used to support teaching efforts, giving students the opportunity to familiarize themselves with this emerging technology, and to power entrepreneurial projects of the department’s student-run Wood Enterprise Institute.
<urn:uuid:35529311-e47c-41e1-9a31-7a252ceda102>
CC-MAIN-2017-26
http://energy.agwired.com/2013/03/28/portable-biomass-plant-gaining-international-interest/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320841.35/warc/CC-MAIN-20170626170406-20170626190406-00635.warc.gz
en
0.926294
489
3.53125
4
By Scott Berkun, November 15, 2005 [edited 2/21/2015] Are you a good person? How do you know? Unless we’re kicking puppies and stealing lunches from homeless children most of us believe we’re good enough. But not being bad is not the same as being good. And when it comes to making products and technologies the same rules apply. Good and evil demystified A quick trip to the dictionary yields the following basic terms: Good: Being positive, desirable or virtuous; a good person. Having desirable qualities : a good exterior paint; a good joke. Serving the purpose or end; suitable: Is this a good dress for the party? Evil: Morally bad or wrong; wicked: an evil tyrant. Causing ruin, injury, or pain; harmful: the evil effects of a poor diet. Characterized by anger or spite; malicious: an evil temper. But how does this apply to technology? Are there good products and evil products? Rarely. Most things fall in between: tools are amoral. They don’t prevent someone from using them for evil or work better when used for good. A technology performs exactly the same whether you’re using it publish praise for homeless shelter volunteers as when you’re writing recipes for orphan stew. If we want to claim that the things we make are good we have to go beyond their functionality. Goodness, in the moral sense, means something very different from good in the engineering sense. What is the point of technology? But what is the alternative? The answer depends on how you value technology. There are (at least) 5 alternatives: - There is no point. The universe is chaos and every confused soul fends for themselves. Therefore technology, like all things, is pointless. Software and it’s makers are just another chaotic element in the random existential mess that is the universe. (Patron saint: Marvin the robot from Hitchhikers guide to the galaxy). - There might be a point, but it’s unknowable. Technology may have value but we are incapable of understanding it, therefore our attempts at making things will tend to be misguided and even self-destructive. (Patron saint: Tyler Durden, Fight club). - The point is how it’s used (the pragmatic moral view). The point is that technology enables people to do things. How the technology is used, and the effect it has on people in the world. In this line of thought a good technology is one that enables good things to happen for people and helps them live satisfying lives and what we make should be built on the tradition of shelter, fire, electricity, refrigeration and vaccination (Patron saint: Victor Papanak, author of design for the real world). - The point is how it makes the creator feel (the selfish view). What matters is how the creator of the thing feels about the thing. This is an artistic view of technology in that programming or building is an act of expression whose greatest meaning is to the creator themselves. (Patron saint: Salvador Dali) - The point to technology is its economic value. The free market decides what good technology is, possibly giving creators resources for doing morally good things. But the the moral value of the technology itself is indeterminate or unimportant. (Patron saint: Gordon Gekko) I’m not offering any of these as the true answer: there isn’t one. But I am offering that without a sense of the moral purpose of technology it’s impossible to separate good from bad. There must be an underlying value system to apply to the making of things. I’m partial to the pragmatic view, that technology’s value is in helping people live better lives (or even further, that a goal of life is to be of use to people, through technological or other means), but I’m well aware that’s not the only answer. But if you do identify a personal philosophy for technology, there are ways to apply it to the making of things. Assuming you see good technology as achieving a moral good, here’s one approach. For any technology you can estimate its value to help individuals. Lets call that ability V. Assuming you know how many people use the technology (N), V * N = the value of the technology. Here’s two examples: A heart defibrillator can save someone’s life (V=100). But may only have a few users (N=1000). V * N = 100,000. A pizza website allows me to order pizza online (V=1). It may have many users (N=50,000). V * N = 50,000. We can argue about how to define V (or the value of online pizza delivery), but as a back of the envelope approach, it’s easy to compare two different technologies for their value, based on any philosophy of technology. Should you happen to be Satan’s right hand man, change V to S (for suffering) and you’re on your way. However, one trap in this is the difference between what technology makes possible and what people actually do. I could use a defibrillator to start my car, or use the pizza website to play pranks on my neighbors. Or more to my point, I might not actually use the technology at all, despite purchasing it and being educated in its value. So the perceived value of a thing, by the thing’s creator, is different from the actual value the thing has for people in the real world. Here are some questions that help sort out value: - What is possible with the technology? - How much of that potential is used? Why or why not? - Who benefits from the technology? - How do they benefit? - What would they have done without the technology? - What are the important problems people have? Is a technological solution the best way to solve them? The implications of things Every tool has an implied morality. There is a value system that every machine, program, or website has built into it that’s comprehendible if you look carefully. As two polarizing examples, look at these two things: a machine gun and a wheelchair. Both of these have very clear purposes in mind and behind each purpose is a set of values. The wheelchair is designed to support someone. The machine gun is designed to kill someone (or several someones). Many of the products we make don’t have have as clearly defined values. However as I mentioned earlier, the absence of value is a value: not being explicitly evil isn’t the same as being good. If I make a hammer, it can be used to build homes for the needy, or to build a mansion for a bank robber. I can be proud of the hammer’s design, but I can’t be certain that I’ve done a good thing for the world: the tool’s use is too basic to define it as good or bad. It’s common to see toolmakers, from search engines to development tools, take credit for the good they see their tools do, while ignoring the bad. This isn’t quite right: they are equally involved in the later as they are in the former. The conclusion to this is that to do good things for people requires a more direct path than the making of tools. Helping the neighbor’s kid learn math, volunteering at the homeless shelter or donating money to the orphanage are ways to do good things that have a direct impact, compared to the dubious and sketchy goodness of indifferent tool making. The creative responsibility (Hacker ethics) Computer science has no well established code of ethics. You are unlikely to hear the words moral, ethical, good and evil in the curriculum of most degree programs (However some organizations are working on this: see references). It’s not that computer science departments condone a specific philosophical view: it’s that they don’t see it as their place to prescribe a philosophical view to engineering students. (The absence of a philosophy is in fact a philosophy, but that’s not my point). But the history of engineering does have some examples of engineering cultures that took clear stances on ethics. Freemasons, the ancient (and often mocked) order of builders, has a central code that all members are expected to uphold. It defines a clear standard of moral and ethical behavior and connects the building of things to those ideals. A hack must: - be safe - not damage anything - not damage anyone, either physically, mentally or emotionally - be funny, at least to most of the people who experience it The meaning of the term hacker has changed several times, but the simplicity and power of a short set of rules remains. Do you bind the decisions you make in creating things to a set of ideals? What are they? Defining our beliefs Even if we don’t define rules for ourselves, we we all believe one of three things about what we make: - I have no responsibility (for how it’s used) - I have some responsibility - I have total responsibility Most of us fall into the middle view: we have some responsibility. But if that’s true, how do we take on that responsibility? How do our actions reflect that accountability? Nothing prevents us from making sure the tools we make, and skills we have, are put to good use: donated to causes we value, demonstrated to those who need help, customized for specific purposes and people we think are doing good things. It’s only in those acts that we’re doing good: the software, website or machine is often not enough. Or more to my point, the best way to do good has less to do with the technology, and more to do with what we do with it. - “The purpose of technology is to facilitate things. On the whole, I think, technology can deliver, but what it is asked to do is often not very great. “ – Neil Postman - “Let the chips fall where they may” – Tyler Durden - “I think the technical capabilities of technology are well ahead of the value concepts which we ask it to deliver. “ – Edward De Bono - “If you want to understand a new technology, ask yourself how it would be used in the hands of the criminal, the policeman, and the politician” – William Gibson - “With great power comes great responsibility” – SpiderMan - “Our technology has surpassed our humanity” – Einstein - Technopoly, Neil Postman. One of the most important books I’ve read in the last decade. - Why the future doesn’t need us, Bill Joy - Being Digital, Nicholas Negroponte. The founder of MITs media lab’s collection of essays on the future of technology. - The age of spiritual machines, Ray Kurzweil - OnlineEthics.org, Case Western Univerisity’s engineering ethics group. - Computer professionals for social responsibility, Tech-sector folks interested in the impacts of technology. - Benetech, a non-profit dedicated to using technology to help people.
<urn:uuid:8b73897e-db6b-4db8-881e-b26d5d793477>
CC-MAIN-2017-26
http://scottberkun.com/essays/48-good-evil-and-technology/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320841.35/warc/CC-MAIN-20170626170406-20170626190406-00635.warc.gz
en
0.936172
2,380
2.8125
3
Feeding The Future: Part Two – Feeding The World In An Energy Uncertain Future This is a modified version of an essay originally submitted to crossroadsforsociety.org by Ken Whitehead on Jan 12 2013 In part one of this essay I looked at how the industrial agriculture system is unlikely to be able to supply the food needs of the Earth’s population for many more years. I believe that the future of agriculture will evolve based on three potential future energy scenarios. The first is business as usual, where we continue burning fossil fuels indiscriminately and follow the vision of endless economic growth to its inevitable end. This is the path which is likely to lead to the scenario of a global food crisis described in part one. With the current focus of agribusiness and governments around the world, this policy is unlikely to change until its negative effects really start to bite. By then it will most likely be too late to prevent serious food shortages from occurring. The hope must be that these will be short term, as society changes its focus to more sustainable forms of agriculture and sources of food. The second option is that we move to a more energy-efficient model for agriculture, based mainly on renewable sources of energy. This option will require top-down changes to the way agriculture is organised, which will necessitate a transition to lower-energy technologies, and a reduction in net energy consumption from present-day levels. While this option will be difficult to implement and is likely to encounter considerable resistance, I believe that with our current available technologies we have no choice but to move in this direction. The main implication of the low energy scenario is that the industrial model of farming would no longer be practical for many areas. We could no longer keep vast fleets of tractors, combine-harvesters, and energy-intensive farm machinery running in an environment without fossil fuels. So what are the alternatives? One option is organic farming, which has seen considerable growth over the last few years. In term of food grown per unit area it is considerably more efficient than industrial farming. However organic farming is very labour intensive, and to carry it out on a large scale would require considerably more human involvement in the food-production cycle than there is at present. This may be no bad thing for society, as people once again establish a connection with the land which has largely been lost in our current society. Organic food is often viewed as an expensive luxury in today’s world. If we were to adopt these techniques on a large scale organic farms would need to start growing staple crops aimed at providing the greater part of people’s diet, rather than simply producing exotic boutique-style foods, as happens all too often at present. Hydroponics and Aquaponics Another option is hydroponics. Currently this technique is used for high value crops, but it can be applied to almost any plant, other than root vegetables. Instead of being planted in soil, plants are immersed in a special growth medium and water containing dissolved nutrients is circulated around the roots. This is a very efficient way of growing vegetables and can increase crop yields considerably. Since it is continuously recycled, only a twentieth of the water is required, compared to conventional farming. Also since the crops are grown indoors, it is possible to avoid the use of pesticides entirely, and grow what are in effect organic vegetables. To further increase yields, artificial lighting may be used. However this uses a considerable amount of electricity and is unlikely to be a viable option in a future low-energy society, even with new highly-efficient LED lights. Hydroponics is currently expensive, since there is a large investment required to build the glasshouses required. For that reason, the focus to date has been on high-value crops, such as vegetables. However there is no reason in principle why this technique could not be used to grow staples such as rice or grains if the economic conditions were favourable. A variation on hydroponics is a technique known as aquaponics. In an aquaponic system vegetables are grown hydroponically, but with the addition of a pond or tank in which fish are raised. These fish are typically non-carnivorous species such as tilapia, which can live on a diet of pond weed, or another readily-available source of food. The waste produced from the fish can then be used to provide nutrients for the vegetable crop, and a part of the vegetable crop can provide additional food for the fish. Aquaponics is therefore a very efficient way of providing both vegetable products and fish for human consumption. Aquaponic systems are also scalable, and a small system can provide almost all the nutritional needs for a family. Such systems therefore have tremendous potential in the third world, in areas where conventional food and water resources are scarce. Algae as Food In order to be able to feed a population of nine or ten billion with less energy than we currently consume, we will also need to look at developing new sources of food. Algae have been the focus of much research of late, mainly because of their potential to use as a stock for producing biofuels. However it may be more productive to use algae as a source of food, either directly for human consumption, or indirectly as a source of animal feed. The most familiar form of algae to many people is seaweed. Species such as kelp, which grow in coastal waters, are some of the fastest-growing organisms on the planet, and can grow at rates exceeding half a meter per day. Seaweed is nutritious, and could potentially form a significant part of the human diet. In Japan for example, seaweed provided ten percent of the total food consumed prior to the 1970s. Kelp is abundant, easily harvested, and could easily be adapted for farming. It is also ideal as a stock food for aquaculture, and for land-based farming operations. Seaweed is currently sold as a speciality product for seasoning foods, as well as for many non-food applications. Once again, the challenge is to move beyond the perception of seaweed as a boutique-type product, and start thinking in terms of making it a significant part of our future diet. Sources of Protein Another option which has been little exploited to date is the use of insects as a food, otherwise known as entomophagy. Indigenous populations have made use of this resource for many years in Australia and in parts of Southern Africa. However in many first-world societies there is a cultural taboo against eating of insects. As food from conventional sources becomes scarcer however, this option is becoming increasingly attractive. Insects are nutritious, fast growing, and ten times more efficient at converting input food to edible body mass than beef cattle. They also offer considerable advantages over conventional farming in terms of the space requirements and turn-around time, with daily weight increases of between four and twenty percent. The most suitable species, such as locusts and cockroaches have a meat-like texture when cooked and apparently “taste like chicken”. Entomophagy could potentially meet nearly all of the human population’s protein needs, if cultural taboos could be overcome. It also has the considerable advantage that spoiled or wasted food can be used as a feedstock, thus helping to reduce overall food wastage. There is also a need to provide more efficient sources of conventional protein to meet the demands of the human population. Currently the most efficient common protein source is poultry, which uses a fraction of the input resources required to produce an equivalent weight of beef. When egg production is factored in, poultry production looks like a good bet for the future. However there are a number of ethical concerns surrounding battery farming of chickens, and it is likely that in the future, poultry would be required to be farmed in a more humane manner. A new possibility is the use of iguana as a source of protein. A number of trial projects are currently underway across central America, with villagers raising iguanas for human consumption on a small forest plots. Since iguanas are cold blooded, the amount of body mass produced relative to the food they require is very high. Also since they are indigenous to the area, less food is required, and much of the required food can be provided from the forest. This kind of project also has the positive side effect that it encourages forest restoration, rather than deforestation. One other potential source of protein is that derived from aquaculture. This term is fairly wide ranging and can be used to refer to anything grown in an aquatic environment, from algae to fish. We have already discussed farming of seaweed, so I will confine this discussion to other marine organisms. Shellfish such as muscles and oysters have been farmed for many years around the world. They are generally raised in specialised facilities, often located in coastal inlets. These operations are generally sustainable, and do not require the input of large amounts of additional resources. There is scope to increase production well above current levels, but it is unlikely that shellfish could provide a large proportion of the future protein requirements for humanity. Fish farming has the capability to provide large amounts of available protein if it is properly organised. The current boom in open-net salmon farming is environmentally unsustainable, since it requires three to four times as much wild fish to produce an equivalent weight of farmed salmon. Open-net fish farms also can cause contamination of the wild salmon stocks through transmission of pathogens such as sea lice. Much more promising are closed-containment fish-farming systems, using non-carnivorous species such as perch and tilapia. These fish, while small, breed prolifically and grow quickly. They are very resilient and can survive in a variety of different environments. In many parts of Asia, perch are farmed in flooded rice paddies, in effect forming a closed system where the waste from the fish feeds the rice plants and the rice plants provide food for the fish. Genetically Modified Crops One development which could have a profound effect on the food supply in the future is the development of Genetically-Modified (GM) crop strains. This practice is already widespread across North America, where most of the food consumed is genetically modified. In Europe there has been considerable resistance to GM crops, and as a result the majority of food is still derived from non-GM strains. While GM crops may have considerable potential, most of the modifications created so far appear designed to increase corporate profits, rather than to boost crop yields. Examples include crop strains which are modified to increase resistance to herbicides. It is obvious that the objective of this is to increase sales of herbicides, thus adding yet more chemicals to the foods we are forced to buy. This is the exact opposite of the type of sustainable-farming practices we need to adopt if we are to feed the world’s population. That being said, if GM crops can be shown to be safe and to improve yields, then they may be a necessary part of our future food strategy. However there is also the danger of cross-pollination, which could render healthy wild strains vulnerable to new pathogens, ultimately threatening the genetic diversity of many crop staples. We have already let the genie out of the bottle with GM crops, so whether they are a good thing or not, we will likely have to deal with them in any future food scenarios. Mention artificial meat to most people and you will probably get blank stares. Yet this is potentially one of the most exciting areas of research in the food industry. Researchers in both the US and Holland are on the verge of producing synthetic meat substitutes, which could revolutionise the food industry over the next few years. There are two different approaches, with the development of plant-based meat substitutes being pioneered by researchers from Stanford University. This approach starts with plant materials and passes them through a proprietary process to produce a final product with a meat-like texture. While this sounds little different from past attempts at producing meat substitutes, which have resulted in such gastronomic delights as the vegi-burger, the final product is apparently almost indistinguishable from real meat. While such a process could theoretically revolutionise the food industry, the main priority needs to be to feed the world’s population, and there have to be concerns over “proprietary” processes which could potentially limit the potential of this such products in poorer countries. The Dutch approach is to create genuine synthetic muscle tissue artificially from stem cells. By using this approach, small clusters of synthetic muscle fibre can be grown, which can then be amalgamated to produce edible synthetic meat. Although this technique is not yet able to produce synthetic meat in large quantities, there is no reason in principle why this would not be possible. The vision is to have incubators spread around the world, which could produce sufficient artificial meat to make it available to all the world’s population at a very low price. Producing artificial steaks is still a long way off at this stage, since the researchers need to work out ways of stressing muscle tissue and providing scaffolds around which it can grow. However it should be possible to produce the equivalent of ground beef within a few years, with very little environmental impact, since artificial meat requires a small fraction of the nutrients it takes to produce real beef or pork. There is no reason why this process should be limited to beef. All kinds of meat and fish tissues can be created using this process, making it theoretically possible to produce a diverse range of synthetic animal protein sufficient to meet all human needs. So far I have discussed possible future trends for agriculture under a business as usual scenario, and also under a scenario where energy is produced mainly from renewable sources and is therefore in limited supply. The third possibility is that of a future where energy is available in abundance. This could potentially come about through the development of nuclear fusion as a power source. In particular, I believe that small-scale plasma-focus fusion is one largely overlooked technology which has considerable potential to move us into a world of cheap abundant energy. While the concept has yet to demonstrate net energy output, there is considerable evidence that such a process is both theoretically possible and physically achievable. This is in marked contrast to the unsubstantiated claims made for LENR or cold fusion, which have given all forms of alternative nuclear fusion a bad name. With plentiful supplies of cheap energy available, large-scale desalination of ocean water would become a realistic option. Anywhere close to the coast could therefore have access to abundant supplies of fresh water. The costs of pumping water long distances would also be low, making it possible to irrigate large tracts of barren land, and potentially develop new croplands in desert areas. Moving Agriculture Indoors More exciting still is that cheap and abundant energy may make large-scale vertical farming a practical option. Instead of requiring thousands of hectares of land to grow staple crops, the same amount of food could be produced from a multi-story urban farm, with crops being grown hydroponically under artificial lighting. Such a farm, covering an area of a square kilometre, could provide sufficient food to meet most of the needs of a medium-sized city. The vertical farm concept is completely scalable, and it is possible to imagine a scenario where each town and village would have its own vertical farm, which would be able to grow most of the food its inhabitants needed. Because the growing of food would occur in an indoor environment, no herbicides or pesticides would be required, and growing conditions would be totally controlled, thus freeing crop production from the vagaries of the weather and any of the negative impacts we can expect from climate change. The concept of vertical farming also lends itself to the idea of co-operatives, which would make it possible for communities worldwide to be able to feed themselves, without having to worry about the costs incurred. Vertical farms could easily form the basis of local food production centres, with crop cultivation, artificial meat production, and aquaculture all occurring under the same roof. This last option may represent the long-term future of food production. If this model were to take hold worldwide it would theoretically be possible feed every person on this planet a varied and nutritious diet. Most current agricultural land could be taken out of production, permitting much of the Earth to be rewilded, and allowing it to recover from centuries of human-inflicted damage. Freed from worries about food availability people could potentially live longer, healthier, and more productive lives. Whatever happens, business as usual is not a sustainable option for the future. At present we need to focus on developing low energy options for growing food, as it is by no means certain that a future based on energy abundance is even possible. However it is encouraging that solutions do exist which, on paper at least, would allow all people on the planet to receive sufficient food, as long as human populations have ceased growing by the end of the century. In a world of energy abundance there will be a greater range of choices for food production, but even in a world of energy scarcity it should be possible to avoid a Malthusian collapse of the food supply. Keep up to date with all the most interesting green news on the planet by subscribing to our (free) Planetsave newsletter.
<urn:uuid:456c3382-a6c9-41a7-91cf-d2da19faf223>
CC-MAIN-2017-26
http://planetsave.com/2014/05/30/feeding-future-part-2-feeding-world-energy-uncertain-future/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321410.90/warc/CC-MAIN-20170627115753-20170627135753-00715.warc.gz
en
0.964196
3,531
2.53125
3
By Nick Squires in Rome Published: 6:30AM GMT 18 Feb 2010 Golden Bough from Roman mythology 'found in Italy' In Roman mythology, the bough was a tree branch with golden leaves that enabled the Trojan hero Aeneas to travel through the underworld They discovered the remains while excavating religious sanctuary built in honour of the goddess Diana near an ancient volcanic lake in the Alban Hills, 20 miles south of Rome. They believe the enclosure protected a huge Cypress or oak tree which was sacred to the Latins, a powerful tribe which ruled the region before the rise of the Roman Empire. The tree was central to the myth of Aeneas, who was told by a spirit to pluck a branch bearing golden leaves to protect himself when he ventured into Hades to seek counsel from his dead father. In a second, more historically credible legend, the Latins believed it symbolised the power of their priest-king. Anyone who broke off a branch, even a fugitive slave, could then challenge the king in a fight to the death. If the king was killed in the battle, the challenger assumed his position as the tribe's leader. The discovery was made near the town of Nemi by a team led by Filippo Coarelli, a recently retired professor of archaeology at Perugia After months of excavations in the volcanic soil, they unearthed the remains of a stone enclosure. Shards of pottery surrounding the site date it to the mid to late Bronze Age, between the 12th and 13th centuries BC. In Aeneid 6, the Sybil says to Aeneas: A bough is hidden in a shady tree; its leaves and pliant stem are golden, set aside as sacred to Proserpina. The grove serves as its screen, and shades enclose the bough in darkened valleys. Only he may pass beneath earth's secret places who first plucks the golden-leaved fruit of the tree. Lovely Proserpina ordained that this be offered her as gift. And when teh first bough is torn off, a second grows again-- with leaves of gold, again of that same metal.
<urn:uuid:8e439b29-ec08-44fb-8565-4423fd2e9fd6>
CC-MAIN-2017-26
http://antiquitopia.blogspot.com/2010/02/discovery-of-golden-bough.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323864.76/warc/CC-MAIN-20170629033356-20170629053356-00155.warc.gz
en
0.953762
482
3.40625
3
A typical BPM uses a differential pressure sensor to measure cuff or arm pressure. As the output of this sensor lies within a few micro volts (30-50µV), the output pressure signal has to be amplified using a high-gain instrumentation amplifier with a good common mode rejection ratio (CMRR). Usually the gain and CMRR need to be around 150 and 100 dB respectively. The frequency of oscillatory pulses in the pressure signal lies between 0.3-11Hz with an amplitude of a few hundred microvolts. These oscillations are extracted using band-pass filters with gain around 200 and cutoff frequency at 0.3-11Hz. A 10-bit ADC with a speed of 50 Hz is used to digitize the pressure sensor and oscillatory signal. Two timers are used to calculate the heart rate and implement safety timer functionality. A safety timer regulates the pressure kept on a subject’s arm for a certain period of time. This safety timer is a part safety regulation in AAMI standards. A microcontroller core calculates the systolic and diastolic pressures values using an oscillometric algorithm. The cuff is inflated and deflated using motors driven by PWMs. A typical non-contact digital thermometer uses a transducer, also called a thermopile, consisting of a micro machine embedded membrane with thermocouples to measure thermocouple temperature and a thermistor to measure ambient temperature. The thermocouple generates a DC voltage corresponding to the temperature difference in its junctions. The output of the thermocouple is on the order of a few µV. The signal from the thermocouple is amplified using a low-noise precision amplifier. A voltage divider is constructed with the thermistor and external precision voltage reference. This voltage divider converts the change in thermistor resistance with respect to temperature to change in voltage. Voltages from the thermocouple and thermistor are used to calculate the thermocouple and ambient temperatures. The temperature is obtained from voltages using a polynomial function given by the sensor manufacturer or through a look-up table with pre-stored readings. The ambient temperature is added to the thermocouple temperature to get the final temperature measurement. A segment LCD driver, RTC, push buttons, EEPROM and USB are the other peripherals needed in both of the above applications. The components which are external to microcontroller like the transducer, ADC, LCD driver/controller, USB controller, filter, and amplifiers are the peripheral components. These components interface to the microcontroller through either a GPIO or a dedicated pin. The more external components there are, the more limitations and constraints developers have to account for, such as managing the bill of materials, higher PCB complexity, achieving FDA certification for each and every component, increased design/development time, and reduced analog IP protection.
<urn:uuid:8c924d74-06b1-4850-bcc2-c46131a1f66e>
CC-MAIN-2017-26
http://www.eetimes.com/document.asp?doc_id=1280338&page_number=2
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319902.52/warc/CC-MAIN-20170622201826-20170622221826-00514.warc.gz
en
0.903206
585
3.71875
4
The Fair Credit Reporting Act (FCRA) is a federal law that governs how a credit reporting agency (CRA) handles your credit information. It is designed to protect the integrity and privacy of your credit information. The FCRA requires credit reporting agencies--and the entities that report your credit information to them and others--to ensure that your information is fair and accurate, and kept private. The FCRA protects your right to access and correct any inaccuracies in your credit report and provides you with remedies if a credit reporting agency or information furnisher violates your rights. For articles on your credit report, credit score, cleaning up your credit report, and more, see Nolo's Credit Repair topic area. A CRA is any entity that collects and furnishes credit information about you. A common type of CRA is a credit bureau, such as Transunion, Equifax or Experian. A CRA also includes a company or person who collects and sells your credit information (often in the form of background checks) to landlords, employers, or anyone else who makes a credit decision about you. A CRA is obligated to: upon your request, provide you with the information it has on file about you (called your “file disclosure”), often for free (to learn how to get your credit report, see Credit Reports & Credit Scores) provide you with your credit score upon your request (you'll most likely have to pay a fee; see Credit Reports & Credit Scores ) investigate disputed credit information in your file (there are a few exceptions to this rule; see When the CRA Does Not Have to Investigate Your Complaint.) correct or delete any inaccurate, incomplete, or unverifiable information within 30 days of the receiving notice of your dispute (for more on this, see How to Correct Errors on Your Credit Report) refrain from reporting old credit information, usually more than seven to ten years old (see How Long Does Negative Information Stay on Your Credit Report) limit disclosure of your credit file to third parties who have a “valid need” (such as a creditor, landlord, or employer), and withhold disclosure of your credit information to employers unless you consent. An “information supplier” is any entity that submits your credit information to a CRA. Usually, that means your creditor. But it could also mean any other third party that you have even a loose credit relationship with, such as a government entity to whom you owe taxes, costs, or fines. Under the FCRA, your creditor and any other information supplier: must not report to a CRA any information about you that it knows -- has “reasonable cause” to know -- is inaccurate has a duty to promptly update and correct any inaccurate information that it previously supplied to the CRA must tell you about any negative credit information it reports to a CRA within 30 days must notify the CRA when you voluntarily close an account with it, and must maintain a “reasonable procedure” to respond to identity theft notices by a CRA, and refrain from reporting information about an account that you previously reported was the result of identity theft. If you dispute the inaccurate information with your creditor, in writing, it cannot continue to report the wrong information to the CRA until it investigates. It must also notify the CRA of your dispute. To learn more about information supplier's duties, see How to Dispute Credit Report Items With the Creditor. In addition to CRAs and your creditors, anyone who uses your credit information for employment, credit, or insurance purposes is covered by the FCRA. They must: notify you if they turn you down based on what they found in your credit report, and identify the CRA or information supplier who provided the report. If any of these three types of entities (CRA, information supplier, or user) violates the rules in the Fair Credit Reporting Act, you may be able to sue them in state or federal court for damages. If you are in the military, you might have additional protections and remedies. Your state's laws may also offer additional relief and remedies. For more information, visit the Federal Trade Commission's section on the FCRA at www.ftc.gov/os/statutes/fcrajump.shtm.
<urn:uuid:e6687dee-c0ae-45ee-ad0f-2378752a37e4>
CC-MAIN-2017-26
http://www.nolo.com/legal-encyclopedia/what-is-the-fair-credit-reporting-act.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319902.52/warc/CC-MAIN-20170622201826-20170622221826-00514.warc.gz
en
0.948413
879
2.5625
3