text
stringlengths 174
640k
| id
stringlengths 47
47
| dump
stringclasses 17
values | url
stringlengths 14
1.94k
| file_path
stringlengths 125
142
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 43
156k
| score
float64 2.52
5.34
| int_score
int64 3
5
|
|---|---|---|---|---|---|---|---|---|---|
If you’ve been following the Frequency Fundamentals series, hopefully you’ve already had a go at the first two quizzes (1, 2), designed to test your knowledge of frequencies and harmonics. If not – now’s the time!
This new quiz is a recap of the course, for students who feel they’ve really got to grips with the material.
As usual, the quiz consists of 10 questions, chosen randomly each time you take it so you can keep practising as you learn. This one covers material from throughout the Frequency Fundamentals series, and digs into some corners of the course which the first two quizzes missed out.
You might want to refresh your memory before you dive in:
- What’s ‘Frequency Training’ All About?
- Introduction to Frequency Training
- Percussion Frequencies Part 1 – Drums
- Percussion Frequencies Part 2 – Cymbals
- Frequency Band Characteristics – Part 1
- Frequency Band Characteristics – Part 2
- Background: EQ Feathering and Spectrum Analyzers
- Harmonics and Distortion
And the first two quizzes:
Also, if you’re just joining the “Hearing Effects” course, now’s a great time to make sure you’re up to speed on frequencies – if you can ace this quiz, you’ll probably manage fine!
We’re always keen to hear from you – let us know what you think of the new quiz in the comments below!
Want to become more musical?
Whether you want to sing in tune, play by ear, improvise, write your own songs, perform more confidently or just make faster progress, first you need to know where you’re starting from.
The Musicality Checklist will quickly reveal your personal musicality profile and how you can improve your natural musicianship.
Available FREE today!
|
<urn:uuid:dcdfa581-3ac3-4d75-8f7a-7ba3e86714bf>
|
CC-MAIN-2017-26
|
https://www.musical-u.com/learn/frequency-fundamentals-recap-quiz/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320593.91/warc/CC-MAIN-20170625221343-20170626001343-00532.warc.gz
|
en
| 0.906527
| 403
| 2.546875
| 3
|
To help boost your immune system, particularly useful during the winter months when colds and flu are prevalent, you may consider to eat foods that contain some of the following spices…
GingerGinger or Ginger Root is traditionally used in Western cuisines mainly in sweet foods, including ginger ale, gingerbread, ginger snaps, and ginger biscuits. Elsewhere it is used widely as a main ingredient in traditional medicines, consumed in salad dishes (shredded and preserved in oil), ingredient in beverages, soups, tea, sliced with fish, chopped and paired with meat, and countless other garnishes and uses as an ingredient or spice.
The health benefits of ginger are thought to include anti fungal, antibacterial, anti clotting, antiviral, analgesic, increases blood flow, and more…
CurryCurry is a generic term for a wide variety of dishes originating in Indian and other cuisines. These dishes are typically loaded with turmeric, of which India is a significant producer.
Some research shows compounds in turmeric to have anti-fungal and anti-bacterial properties.
ClovesCloves are the aromatic dried flower buds of a tree in the family Myrtaceae. Cloves are native in Indonesia and used as a spice in cuisines all over the world.
Cloves are used in Indian medicine, Chinese medicine, and western herbalism and dentistry where the essential oil is used as an anodyne (painkiller) for dental emergencies. Although most spices are excellent sources of antioxidants, cloves rank as the richest source of them all. The abundant health benefits of cloves have been well known for centuries. Cloves have antiseptic and germicidal properties that help fight infections, relieve digestive problems and arthritis pain.
CilantroCilantro is an herb commonly found in Mexican dishes and salsas, and is sometimes referred to as Mexican parsley. It is featured in dishes cooked everywhere from Spain to Mexico, the Middle East to the South America.
Cilantro has apparently been effectively used to help remove heavy metals and other toxic agents from the body. The chemical compounds in cilantro apparently actually bind to the heavy metals, loosening them from the tissues, blood and organs. Cilantro’s chemical compounds then aid to transport these harmful substances out of the body through elimination.
ThymeThyme is a culinary herb native to Southern Europe, and used widely in European cuisine. It has a faintly lemony flavor that goes well with vegetables, poultry, fish, meats, stuffings, and sauces, and it is available in both fresh and dried form at many markets.
Thyme contains an essential oil that is rich in thymol, a powerful antiseptic, antibacterial, and a strong antioxidant. The oil of thyme is used in mouthwashes to treat inflammations of the mouth, and throat infections. It is a common component of cough drops.
RosemaryRosemary is an aromatic evergreen shrub that is a woody, perennial herb with fragrant, evergreen, needle-like leaves. The leaves, both fresh and dried, are typically used in traditional Mediterranean cuisine. It is also often used to flavor foods while barbecuing.
Health benefits of rosemary include the ingredient, carnosol, which has been found in studies to be a potent anti-cancer compound. It has long been believed to have memory-enhancing properties. It has been a popular natural migraine remedy for centuries. Rosemary boosts the immune system thanks to its antioxidant, anti-inflammatory, and anti-carcinogenic properties.
Safety Alert: Rosemary in culinary or therapeutic doses is generally safe, but can cause allergic skin reactions. Consumption of large quantities of rosemary should be avoided. People with high blood pressure should not take rosemary because it may raise blood pressure.
NutmegThe spice called nutmeg comes from the ground seed of a tree found in the Spice Islands of Indonesia. It is harvested from plants of which there are about 100 species native to Australia, Southeast Asia, and the Pacific Islands. In Western Europe, nutmeg more often appears in savory dishes, including cheese sauces, soups, and potato and meat dishes. Other ‘sweet’ uses include pies, puddings, custards, cookies, souffles, cakes and pastries. In India, nutmeg is commonly used in sweet dishes while in Japan it is often used as an igredient in curries.
Nutmeg has strong antibacterial properties. ‘Myristicin’ found in nutmeg has been shown to inhibit an enzyme in the brain that contributes to Alzheimer’s disease and is used to improve memory. It is effective in killing a number of cavity-causing bacteria in the mouth.
Safety Alert: Nutmeg should be used in moderation—a pinch or two is considered safe. However, large doses can trigger psychiatric disorder (ill effects may occur in adults after ingesting between 1 to 3 Tbsp).
Do your due diligence and research the health benefits and safety concerns before you ingest anything you are unfamiliar with.
And there’s this… the obligatory statement, “check with your doctor”.
Appreciate topics of survival, emergency preparedness – or planning for disaster?
Read our current articles on Modern Survival Blog
Similar Articles You Might Enjoy:
- Mayan Cacao Powder: A Super Survivor Food
- Turmeric – A Super Spice
- Top 100 High ORAC Value Antioxidant Foods
|
<urn:uuid:54648ff3-b115-413e-8e62-6212ac8286a1>
|
CC-MAIN-2017-26
|
http://daily-survival.blogspot.com/2012/11/7-spices-to-boost-your-immune-system.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320841.35/warc/CC-MAIN-20170626170406-20170626190406-00612.warc.gz
|
en
| 0.943082
| 1,133
| 2.96875
| 3
|
Pointe work carries some risk of injury. Far too many students suffer injury in their first few years en pointe, sometimes because we, their teachers, expect too much too soon. Slow, gradual buildup of strength is the best way to ensure your students will be able to continue dancing en pointe for many years to come. Below are some guidelines that can help the ballet teacher who is working with students who are just starting pointe work.
Please note: Teachers must use their own judgment in applying these guidelines. When in doubt, or if problems occur, seek medical advice. Even the best rules have exceptions.
- The minimum age recommended by most authorities for starting pointe work is 12, with 13 strongly recommended and 16 listed as not too late to begin pointe, even for a professional career. Student should have had three to four years of weekly or bi-weekly ballet classes since the age of eight.
- Student must be able to maintain strong and equal turnout during all barre exercises and have the strength to land correctly from jumps with thighs well turned out and feet in perfect alignment with knees.
- Strength, coordination, and muscle tone must be good, and technical progress should be at about a Ballet Grade 3 or 4 (RAD, Cecchetti, or ISTD grades).
- Student must take at least two classes per week. Pointe will be included in the second weekly class only if the first weekly class was attended. No home practice for the first year. Shoes are worn only with teacher supervision.
- The teacher needs to keep a detailed record of each student’s attendance so the rule of not wearing pointe shoes when the first weekly ballet class was missed can be enforced.
Fitting the Pointe Shoes
Each student must get the style, shape, and brand of pointe shoe that is best for their foot structure. Find the one that is best. Help your students (and their parents) understand that no one shoe will work well for everyone.
The teacher should supervise the fitting. If desired, the very first pair can be fitted one to two widths wider and a half size longer* than for an advanced dancer. This allows the muscles, bones, and ligaments involved in pointe work to make the necessary increases in strength and size during the first three months.
The second pair is fit to the student’s comfort and ability to dance in them both flat and en pointe. The student decides (with the teacher’s approval) which size and style helps them stand correctly and dance comfortably. Pointe work that is comfortable will be more artistic and more correct.
Do the Shoes Fit?
- Toes must be able to lay perfectly flat in the pointe shoe when the student stands flat.
- The student must be able to stand on demi pointe (or nearly so) in the pointe shoes.
- There should be no “pressure points” of pain caused by the shoes when standing en pointe or flat, other than what is felt on the very ends of the toes. The pointe shoe should feel somewhat like a hand is holding the foot in place when it is en pointe.
- The student must be able to place their weight correctly onto the ends of the pads of the toes when en pointe, not on the nails. The toes must “feel the floor” through the shoes. At first there will be a feeling of “pins and needles” on the ends of the toes. This will go away in a few weeks when the nerves on the ends of the toes get used to being stood upon.
Using Pointe Shoes with the Teacher’s Supervision
- The phalanges (toe bones) need to be as perpendicular to the floor as possible when the student is en pointe:
This drawing is intended to show how the phalanges can be perpendicular to the floor when en pointe, regardless of the shape of the foot above them.
High arches will need to make a slight dorsiflexion (backward bend) at the metatarsophalangeal, or MTP, joint (note the arrow) in order to get the weight exactly on the ends of toes, and not over onto the nails, while stretching the ankle and arch of the foot. This will take more strengthening and conditioning time at the barre. (See “Weight Placement en Pointe” and “Conditioning Principles to Improve Pointe Work”)
- When en pointe, the ankles and arches must be fully stretched. The weight is placed on the ends of the toes, and never on the toenails or knuckles, and is never supported entirely by the shoes.
- Students must learn to roll up and down through the demi pointe position in first and second position. All rises go through the demi pointe and do not displace. The relevés to first and second go quickly through demi pointe and do not displace.
- It is quite all right to put considerable pressure straight down on the barre until the toes become used to being stood upon and the student gets used to the more careful posture control needed en pointe.
- For the first twelve weeks (see “The Twelve Week Rule”), the students leave their pointe shoes in a securely locked cupboard at the ballet studio, or with the teacher. Then they are not tempted to wear them at home!
- If the regular ballet class is missed, they do not wear pointe shoes in the next pointe class. If several classes in a row are missed, they must take that many classes without pointe before wearing them again.
- A student showing unnecessary strain in the shoulders, neck, face; appearing to be in pain; or showing wobbly ankles or unsteadiness en pointe should remove their pointe shoes for the rest of that class.
- If the feet are uncomfortable, the shoes should be removed, and the student can finish the class on demi pointe. Shoes that are too small should not be worn, as damage to feet can occur.
- Pointe shoes should not be worn if the feet are injured or blistered, or if there is any slight injury to ankles or knees. Toenails need to be kept trimmed slightly shorter than the toes, and should be well groomed at all times. Students with ingrown toenails may need some medical advice on how to care for them.
- There is no need to deliberately create callouses on the toes. Gradual, correct training en pointe should gradually toughen the structures of the feet that need it.
- There should never be any need for a student to use “pain-deadening” medications on the toes. If this is needed, then the student needs to stay off pointe until whatever is wrong is fixed or healed.
- If correct weight placement is learned and the rules above are followed, students should not have difficulty or extreme discomfort with their pointe work. If they do, there is a problem that needs to be found and fixed.
The first twelve weeks are very important. This is when the initial buildup of strength and endurance at the cellular level in bones, ligaments, and muscles should take place. The skeletal structures involved must not be overstressed before the strength is there if the best results are to happen.
*Early teens will need the half-size growing room because the first pair will probably last six months to one year. If this extra room is not provided, the toes will begin to buckle and curl under as the feet grow. Students whose feet are fully grown will not need the extra length. This method of fitting is appropriate for the method of teaching beginning pointe outlined in the “Pointe 1: An Introduction to Pointe Work” curriculum book, but may not be appropriate for other methods. If you fit the shoes this way, you may want to stick to this teaching program as well.
- The Twelve Week Rule
- Weight Placement en Pointe
- Their First Pair of Pointe Shoes
- Is My Student Ready for Pointe?
|
<urn:uuid:b2ad5ffa-e468-46eb-9111-bd07bfd206c4>
|
CC-MAIN-2017-26
|
http://www.balletcurriculum.com/guidelines-for-starting-a-student-on-pointe/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320841.35/warc/CC-MAIN-20170626170406-20170626190406-00612.warc.gz
|
en
| 0.942085
| 1,680
| 2.703125
| 3
|
Like a forest close and mute,
With folded arms and looks which are
Weapons of unvanquished war.
And if then the tyrants dare,
Let them ride among you there,
Slash, and stab, and maim and hew,
What they like, that let them do.
With folded arms and steady eyes,
And little fear, and less surprise
Look upon them as they slay
Till their rage has died away.
Then they will return with shame
To the place from which they came,
And the blood thus shed will speak
In hot blushes on their cheek.
Rise like Lions after slumber
In unvanquishable number,
Shake your chains to earth like dew
Which in sleep had fallen on you-
Ye are many — they are few”
The Mask of Anarchy
by Percy Bysshe Shelley – 1819
The Mask of Anarchy is a political poem written in 1819 by Percy Bysshe Shelley following the Peterloo Massacre of that year. In his call for freedom, it is perhaps the first modern statement of the principle of nonviolent resistance.
|
<urn:uuid:e0348e1d-a540-4e2d-9dfc-f329b30591e9>
|
CC-MAIN-2017-26
|
http://ajgraves.com/the-masque-of-anarchy/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321410.90/warc/CC-MAIN-20170627115753-20170627135753-00692.warc.gz
|
en
| 0.957415
| 237
| 2.78125
| 3
|
Ceferina Sánchez García stands in front of the doorway to her kitchen. Inside, a kitten sleeps curled in a ball at the edge of the earthen stove, where the last of the tortillas are cooking over the fire. It has just stopped raining, and the lush, forested mountains surrounding the community of La Tejera seem especially green.
This is exactly where the 73-year-old grandmother stood when the police came looking for her son in November 2013, seven months into an ongoing Indigenous Lenca blockade against the construction of a hydroelectric dam in western Honduras. Tomás García, an outspoken blockade participant like her son, had previously been shot and killed by a soldier. Others have been attacked this year.
Sánchez García grabs a large wooden stick and holds it diagonally against her slight frame. “They aimed their guns at me from over there,” she says, indicating a spot 20 feet away. Unable to find her son, the police insulted Sánchez García’s grandson, kicked him several times, and left. “I wasn’t afraid,” she says. “We’re against the dam, for the land.”
Criminalization of, attacks against, and murders of Indigenous land defenders, LGBTQ organizers, journalists, human rights activists, and political opponents have become the norm in Honduras, and many have fled for their lives. Militarization, violence, and repression have risen dramatically since the June 28, 2009, coup d’état. To cope with increasing threats and attacks, human rights defenders and media workers have been developing networks and alert systems.
Bertha Oliva takes a moment to find the words to describe her alarm at the unfolding reality. She sees an increasing resurgence of the policies and death squad activities of the ’80s, and it’s not a comparison she makes lightly. In 1981, her husband was abducted from their home by six men, presumably from the state death squad, Battalion 3-16. He was never heard from again. Oliva co-founded the Committee of Relatives of the Detained-Disappeared in Honduras and is currently the organization’s general coordinator.
“Since 2009, one can see how the situation in the country has suffered a profound setback in terms of the protection of human rights,” says Oliva. “I didn’t think we were going to live through this again because we had continuously worked so that we wouldn’t have to.”
Honduras holds the notorious distinction of having the highest per capita homicide rate in the world. It also ranks as one of the most dangerous countries for journalists. LGBTQ organizations have documented more than 100 murders of transgender, lesbian, and gay Hondurans since the 2009 coup. In the same time frame, more than 100 farmworker movement activists and land occupation participants have been killed in the lower Aguan valley region alone. Indigenous land defenders and community leaders struggling against natural resource extraction and energy projects have also been targeted.
Canada, the U.S., and international financial institutions are pouring millions into security programming in the region, in part to bolster the investigative capacity of police forces and the judicial system, but only an estimated one per cent of crimes are ever investigated in Honduras. Journalism in the Shadow of Impunity, a 2014 report by the international human rights program at the University of Toronto’s faculty of law, PEN Canada, and PEN International, points to the historical legacy of impunity as a principal determinant of today’s abuses and lack of investigation.
“The roots of the crisis lie further back in Honduras’ history, notably in its failure during the demilitarization process that began in the 1980s to hold those who had committed serious human rights violations accountable for their actions,” wrote the report’s authors. The conclusion is echoed by Oliva, whose words grace the cover of the report: “When we allow impunity for human rights violations, we see the crimes of the past translated into the crimes of the future.”
Despite this record of impunity, an initiative to protect today’s human rights defenders and journalists is moving forward. In June, the Law on Protection of Human Rights Defenders, Journalists, Social Communicators and Operators of Justice was passed by the Honduran Congress. The law was initially a joint project of three national human rights organizations, but work on the proposed legislation was cut short by the coup in 2009. When a government agency picked up the initiative after the coup, the Committee of Relatives of the Detained-Disappeared in Honduras declined to participate. The situation has changed, says Oliva, and a human rights law isn’t going to repair a broken democracy or spark a return to rule of law.
“Laws aren’t what are needed in Honduras. I don’t think the answer is more laws because at the same time this law to protect human rights is approved, other laws that restrict rights and violate human rights are being passed,” says Oliva. “If there’s no political will to respect human rights in practice, the most amazing laws can be created but the results will still be against those of us who defend human rights, against those of us who defend life.”
Faced with the state’s practical intransigence, media workers and human rights defenders have been developing networks and other strategies. The Committee for Free Expression has been building the RAPCOS project, a web of local networks around the country. The initiative brings together journalists, local organizations, and others to develop capacity for an immediate response and alert system if a media worker is threatened or attacked.
Dina Meza is an independent journalist who knows all too well what it’s like to be targeted. She has been threatened and followed due to her work reporting on human rights issues. Phone calls and text messages have included threats of sexual violence and allusions to the disappearance of her teenage daughter. Meza spent several months abroad for the safety of herself and her family.
These days, Meza is organizing PEN Honduras as a national branch of PEN International, a worldwide writers’ organization dedicated to freedom of expression and to speaking out on behalf of writers who are threatened, jailed, or killed for their views. The initiative was inspired in large part by the 2014 Journalism in the Shadow of Impunity report, which concluded that journalists in Honduras needed to organize themselves in the face of continued threats.
“It seemed like a really interesting initiative,” says Meza, who was interviewed for the report and is now the president of the provisional board of directors for the proposed PEN Honduras. The initiative is bringing together writers, journalists, artists, human rights defenders, lawyers, and others working for freedom of expression in the realms of art and culture as well as literature and journalism.
For now, the incipient organization is focused on spreading awareness about its existence and getting more people and organizations on board. “Our goal isn’t to replicate the work being done by other organizations but to organize different actions,” Meza says, explaining that cultural and artistic freedom of expression isn’t something addressed by existing organizations in the country. The provisional board has developed a three-year work plan, but the next hurdle will be approval of PEN Honduras as a national branch at the 80th PEN International Congress being held in Kyrgyzstan from September 29 to October 2. “We’re making progress,” she says.
Like journalists, human rights organizations are working to link human rights defenders around the country. “Human rights have always been an issue debated in the big cities like Tegucigalpa and San Pedro Sula,” says Oliva. But defenders in rural and Indigenous communities fighting land grabs, mining, and energy projects – like Sánchez García and her son in La Tejera – are increasingly at risk, she says. “We see the need to empower and make visible those who are struggling on the ground.”
For now, hard times are here to stay in Honduras, says Oliva, and things will probably get worse before they get better. But she remains hopeful that the road to justice and a return to democracy can be constructed from below, one step at a time.
“If we wait for the state or the government to solve the problems of inequality, social injustice, and human rights violations, we’re not going to see it happen, even in the long term,” she says. “It’s the people who have to organize themselves, to rise up.”
|
<urn:uuid:6d932c54-f06f-4afb-abb5-c2e12036c8b5>
|
CC-MAIN-2017-26
|
https://briarpatchmagazine.com/articles/view/five-years-after-the-coup
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321410.90/warc/CC-MAIN-20170627115753-20170627135753-00692.warc.gz
|
en
| 0.963432
| 1,806
| 2.609375
| 3
|
This is the second in a series of posts about the pillars of the revolution in education.
The most critical pillar of our educational system is obviously learning. Education without learning is like a car without wheels: it’s not going to get you very far. So let’s pull apart this first pillar of education and see where new technologies and online opportunities are having an impact.
For this discussion, I’ll define learning as the process of knowledge acquisition for an individual, through whatever means available and independent of the benefits it provides (either to the individual, employers or society). In this definition, knowledge encompasses both abstract (a priori) knowledge and knowledge gained through experience or application; this applies to an individual in isolation or to knowledge that pertains to groups. The facets of learning can then be broken down using process as a lens:
So what’s happening with technology in the different facets of learning? A few generalizations seem clear at this point:
- Technology is impacting almost every facet of the learning process in a fundamental way, and more deeply than technologies have in the past
- Questions about scalability, student-teacher interaction and online assessment must be addressed; fierce debates rage on these topics and more regarding the best approaches
- Effective integration of technology in the learning process will require training and support for educators, but it’s often missing due to time and budget constraints
- The political and economic realities of educational institutions create inertia and foster an environment of antagonism between edtech entrepreneurs, educators and administrators; collaboration will be a key to success
- Progress is being made in the realm of guiding principles (e.g., the Bill of Rights and Principles for Learning in the Digital Age), but serious disagreements still need to be resolved, political and otherwise
- Change may come slowly, but it is coming, and the pace of change has accelerated
Let’s dig a little deeper on technology and its impact on learning, using the facets above as a guide.
Access is exploding
Access is an absolute prerequisite for learning…If a student doesn’t have access to instructional materials, instructors, and hopefully the guidance and support that go with them, then learning simply isn’t possible. The promise of broad access is one of the greatest things people in the edtech revolution tout, and there’s a lot of truth in this promise. Educational technologies can help overcome an existing supply and demand problem (i.e., too many students, not enough qualified teachers and classrooms). Indeed, initial work by companies like Udacity show how MOOCs can easily provide hundreds of thousands of students access to high-quality educational content.
In the new world of the Web, all a student needs is a computer and a network connection, and the world of knowledge becomes available, or so the story goes when people talk about online learning. While on the face of things, this is true, some deep questions remain:
- Availability: Do students have access to both devices and network connectivity? In the developing world, and indeed poor communities, this is far from clear. Also, many schools just can’t offer the resources. Over time, though, it’s likely that device costs will drop to the point where they are not a barrier to entry, and network access will eventually become ubiquitous. Also, the rise of mobile computing (via smartphones and tablets) will only increase availability.
- Inequality: By providing open access to all students, regardless of their economic situation, will online learning amplify class inequality (i.e., only some students can afford face-to-face education)? It remains very unclear whether or not edtech will exacerbate a two-tier system of education, despite trying to eliminate it.
- Technical Fluency: Are students, particularly younger ones, well-versed enough in technology and online tools to navigate the new online learning opportunities being created?
- Dropouts: Easy access means lots of dropouts (or seems to, at the moment). It’s easier for students to drop out of free online courses than real-world classes, especially those students who are trying to juggle online learning and work. Is there a way to overcome these high dropout rates?
- Scaling: Can online learning approaches truly scale to meet the needs of students? Instruction and access to materials and knowledge seems quite scalable, but the corresponding flood of students creates challenges when it comes to interaction, feedback, guidance, and support.
Instruction is evolving
Historically, and for most subjects considered core to an education, instruction has involved textbooks, teachers with the necessary subject matter expertise, and lectures in a face-to-face classroom. Technology is radically altering this simple model by creating broader possibilities than have existed in the past. First, the textbook itself is evolving, being replaced (either partially or completely) by things like interactive digital textbooks or learning applications on tablets and mobile devices. This step alone represents huge progress, because digital implies easily mutable, which means these resources will be kept up to date, as opposed to dead-tree textbooks that often fail to reflect changes in knowledge. Second, the sheer volume of knowledge available has undergone hockey-stick growth. Assuming a student has access, a whole world of instructional resources is now available, and synchronous, classroom-oriented lectures no longer seem to be a requirement. From MOOCs to online lectures a la Khan Academy to so-called Open Educational Resources, technologically enabled students now have a world of knowledge at their fingertips.
A few points are worth making about lectures, since these seem to be such a central element to online learning. The first is that centralization of lectures online will probably mean that the best lecturers are the ones who get the widest audience; there won’t be 10,000 versions of Economics 101, there will only be a few, and the bad ones will die. This is good for students, because it means the average quality of educational content will increase. Sadly, there is a dark side behind this good:
- Some lecturers (particularly the bad ones) would probably lose their jobs or suffer pay losses, which has economic impact on learning institutions and society at large
- Anyone who might be negatively impacted in this way will actively oppose change
In addition to the availability of high-quality resources, ideas around instruction itself are changing; flipped classrooms and new models of teaching are gaining traction. The promise of highly individualized instruction seems closer at hand (e.g., by leveraging more data about individual student performance), but questions remain about whether this can scale. There are concerns that these "new" approaches ignore a huge body of knowledge about how people learn. There’s also concern that this is just the latest fad in applying technology to instruction, that we’ve been here before. Things might be different this time, though, when it comes to augmenting traditional methods of instruction with technology. The growing ubiquity of access, the incredible volume of materials now available online, and the real-time changes to instruction based on hard data are game changers.
One final area of significant evolution relates to learning by doing, as opposed to the traditionally passive approach of listening to a lecturer, rote memorization, repetition and abstract examination. Technology has the potential to radically alter the way students spend their time in the classroom. In the flipped classroom model, less time is spent lecturing, which then opens the door to more active pursuits. Students can spend more time applying their knowledge to problem solving, through games or task-oriented projects. The Khan Academy has already experimented with these ideas in a series of summer camps called Discovery Lab, designed to promote project-based learning through application. It’s counterintuitive that technology can promote less time spent in front of the computer when students are with teachers and in groups, but pilot programs are showing this is exactly what can happen.
Interaction presents opportunity, but here be monsters
For everyone other than the auto-didacts of the world, interaction is a key to learning, and it takes many forms. Technology is having an impact on all of them, but to varying degrees and with some huge questions:
- Student – Teacher interaction: For many subjects, the interaction between a student and a teacher is absolutely essential. The didactic and opportunity for exchange makes for a richer learning experience. Online learning environments pose several significant challenges in this regard. The first is that a teacher who has a class with 100,000 students cannot possibly interact with all of their students; this kind of interaction doesn’t scale.The second problem is slightly fuzzier, and that’s the different between face-to-face and online interaction. Some argue that online interactions between students and teachers lack the power to create the same learning environment, but many students would argue otherwise. There are also some indications that teachers can actually provide better feedback because they know more about where their students are having problems (see Assessment below). The jury is still out on this question, but it will be critical in the success or failure of many online learning efforts where real-world student-teacher interaction is a key to learning. In particular, this is a big area of distinction between online learning efforts for K-12 and higher education.
- Peer-to-peer interaction: Students often learn best from each other, and technology can offer a lot of things when it comes to fostering peer-to-peer interaction. MOOCs like Udacity eschew basic online lecture formats, and heavily promote the social components of the learning experience. Discussion forums, social networks and other ways of interacting online in groups are essential elements of the learning experiences here.
- Student interactions with family and friends: This kind of interaction usually takes the form of basic support, and technology makes it easier (e.g., through email and social networks). Relatively speaking, though, technology’s impact here is more evolutionary change than revolutionary.
Assessment goes big with data, but might get cheated
Testing and assessment are huge components of learning, and there’s no doubt technology has had an impact in this realm. Online assessment has grown over time, and will probably continue to grow. The big changes lately, however, lie in the realm of big data. It’s now possible to collect a huge amount of information about how individual students are performing, and for teachers to then provide targeted feedback. The Khan Academy is the greatest example of this approach; they offer teachers dashboards through which they can view individual student’s progress, down to the time it takes them to solve problems. Coursera has also used large data sets to enhance and update their courses and testing approaches in near real-time. The promise here is great – it may be that we can finally start providing more personalized educations for students, breaking down the one-size-fits-all model of the past. The question is, can these approaches scale?
The second thread of questions on digital assessment revolves around validity, both in terms of cheating and in terms of students being able to game technology-oriented assessment systems (i.e., passing tests when they really haven’t achieved mastery). People at the Khan Academy have recognized the opportunity for pattern recognition as a problem in online learning, and there will no doubt continue to be work to solve this problem. Cheating is a deeper concern for many, but the reality is that students cheat in the real world, too…It will always happen, and there is no doubt that technology will evolve and adapt to discourage cheating, however imperfectly.
Recognition gets gamified
The traditional form of recognition in classroom-based education is the letter grade. Students take lots of courses, letter grades get aggregated into a grade-point average, and accolades follow based on where students land in the GPA hierarchy. This system of recognition is ripe for change, and some people have had ideas about how it might be changed. The first set of ideas comes from the entrepreneurs and others exploring gamification (e.g., badging systems like Foursquare that reward actions with tiny badges of merit). Indeed, efforts to gamify learning are already occurring, and there’s no doubt that people will keep exploring new ways to recognize achievement. There are no doubt significant challenges in this world, not the least of which is identity and the ability to unambiguously tie recognition with an individual in a way that cannot be forged or spoofed. At the end of the day, there will be changes here, but they’re pretty unclear at the moment.
Bottom line: Technology is driving the sea change, but it’s not enough
Clayton Christensen has written eloquently and at length about the forces that drive innovation, and in recent years, his focus has turned to changes in our educational systems. He argues quite convincingly that online learning is the engine that will drive innovation in our post-secondary educational systems. At the same time, there are clearly those who believe that technology as a disruptive force is insufficient. Others also point out problems with the fact that there is a gap between edtech entrepreneurs and educators, and that technology alone is insufficient to overcome this gap. There is truth in all of these arguments, but whatever side of the fence you live on, one thing seems very clear: technology will change the way people learn, fundamentally, and we are at the beginning of the revolution.
|
<urn:uuid:e9cac401-fa8f-4a8d-ac2a-76150aeea24f>
|
CC-MAIN-2017-26
|
http://bitstrategist.com/2013/01/the-education-revolution-part-i-learning-and-technology/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323588.51/warc/CC-MAIN-20170628083538-20170628103538-00052.warc.gz
|
en
| 0.952569
| 2,744
| 3.3125
| 3
|
Researchers from the School of Computer Science (SCS) have developed an algorithm that takes the check-ins generated when foursquare members visit participating businesses or venues, and clusters them based on a combination of the location of the venues and the groups of people who most often visit them. This information is then mapped to reveal a city's Livehoods, a term coined by the SCS researchers.
Maps for New York, San Francisco and Pittsburgh are available on the project website, http://livehoods.org/. People can help choose the next city to map by voting on the Livehoods Facebook page.
"Our goal is to understand how cities work through the lens of social media," said Justin Cranshaw, a Ph.D. student in SCS's Institute for Software Research.
Part of the emerging field of Urban Computing, the Livehoods project takes advantage of the proliferation of smartphones and the location-based services they make possible. In this case, the researchers analyzed data from foursquare, but the same computational techniques could be applied to many location-based databases.
Livehoods thus provide a powerful new tool that could be used to address a wide variety of urban problems and opportunities. The researchers are exploring applications to city planning, transportation and real estate development. Livehoods also could be useful for businesses developing marketing campaigns or for public health officials tracking the spread of disease.
"In urban studies, researchers have always had to interview lots of people to get a sense of a community's character and, even then, they must extrapolate from only a small sample of the community," said Raz Schwartz, a Ph.D. student at Bar-Ilan University, Israel, and a visiting scholar at SCS's Human-Computer Interaction Institute. "Now, by using foursquare data, we're able to tap a large database that can be continually updated."
The Livehoods project is led by Norman Sadeh, professor and co-director of the Institute for Software Research's Ph.D. program in Computation, Organizations and Society, and Jason Hong, associate professor in the Human-Computer Interaction Institute. The team will present its findings June 5 at the International AAAI Conference on Weblogs and Social Media (ICWSM) in Dublin, Ireland.
All of the Livehoods analysis is based on foursquare check-ins that users have shared publicly via social networks such as Twitter. This dataset of 18 million check-ins includes user ID, time, latitude and longitude, and the name and category of the venue for each check-in.
In their study of the Pittsburgh metropolitan area, the researchers found that the Livehoods they identified sometimes spilled over existing neighborhood boundaries, or identified several communities within a neighborhood. The Pittsburgh analysis was based on 42,787 check-ins by 3,840 users at 5,349 venues.
For instance, they found that the upscale neighborhood of Shadyside actually had two demographically distinct Livehoods -- an older, staid community to the west and a younger, "indie" community to the east. Moreover, the younger Livehood spilled over into East Liberty, a neighborhood that long suffered from decay but recently has seen some upscale development.
"That makes sense to me," observed a 24-year-old resident of eastern Shadyside, one of 27 Pittsburgh residents who were interviewed by researchers to validate the findings. "I think at one point it was more walled off and this was poor (East Liberty) and this was wealthy (Shadyside) and now there are nice places in East Liberty and there's some more diversity in this area (eastern Shadyside)."
The researchers found that one Pittsburgh neighborhood, the South Side Flats, contained four distinct Livehoods, including one centered on bars popular with college students, another centered on a new shopping district dominated by chain stores and another that focused on a supermarket. Again, these Livehoods made sense to residents familiar with the area.
The study has limitations. Foursquare users tend to be young, urban professionals with smartphones. Consequently, areas of cities with older, poorer populations are nearly blank in the Livehoods maps. "You can literally see the digital divide," Schwartz said. Likewise, foursquare members don't check-in at all of their destinations -- hospitals, for instance. But the researchers contend that the limitations are those of the data, not the methodology.Share this story on Facebook, Twitter, and Google:
Other social bookmarking and sharing tools:
The above story is reprinted from materials provided by Carnegie Mellon University.
Note: Materials may be edited for content and length. For further information, please contact the source cited above.
Note: If no author is given, the source is cited instead.
Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of ScienceDaily or its staff.
|
<urn:uuid:d531da7d-505e-4a21-8542-e86e595fa9dd>
|
CC-MAIN-2017-26
|
http://computerprogrammingnews.blogspot.com/2012/05/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323588.51/warc/CC-MAIN-20170628083538-20170628103538-00052.warc.gz
|
en
| 0.949579
| 1,011
| 2.515625
| 3
|
LENS: Lowering Events in Non-proliferative retinopathy in Scotland
Diabetic retinopathy remains one of the commonest causes of blindness, one of the most feared complications of diabetes. While control of glucose and blood pressure is important, many patients with diabetes still develop progressive retinopathy and this may require interventions such as retinal laser, vitrectomy and courses of intravitreal injections to preserve sight. However, these treatments are only given when the condition is already advanced. Therefore, treatments which can substantially reduce the progression of retinopathy to a serious level are urgently required.
Fenofibrate is a well-known cholesterol-lowering medicine that has been used for more than twenty years. Two major trials conducted in patients with diabetes suggested that taking fenofibrate may slow down the progression of retinopathy by 30% to 40%. However, conclusive information is needed.
The LENS (Lowering Events in Non-proliferative retinopathy in Scotland) trial is testing whether taking fenofibrate tablets on a regular basis for at least 3 years will slow the progression of retinopathy compared to placebo. LENS will recruit over a thousand patients with diabetes and observable retinopathy from across mainland Scotland. This streamlined trial is funded by the National Institute for Health Research. LENS is being sponsored and co-ordinated by the University of Oxford and run in close partnership with the Universities of Glasgow, Aberdeen, Dundee and Edinburgh, and with NHS Scotland’s Retinal Screening Service.
|
<urn:uuid:493e63a7-8950-4827-a0e2-9606af9ea022>
|
CC-MAIN-2017-26
|
https://www.ctsu.ox.ac.uk/research/lens
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323588.51/warc/CC-MAIN-20170628083538-20170628103538-00052.warc.gz
|
en
| 0.937735
| 320
| 2.5625
| 3
|
The practice of segregating waste for biodegradable or non-biodegradable, wet waste or dry waste and re-usable or recyclable by the households, schools, private and public offices, eating places, malls, institutions and other organizations in the community is necessary for environmental concerns and economic point of view.
With this, the people involved in this campaign need a great selection of recycling bins for the implementation of sorting waste in their respective locations. In fact, the government is encouraging the people regarding this matter and had been implemented in the collection and segregation of waste to the entire city.
In fact, proper management of waste is also important for ecological and health concerns in the environment. The segregation of waste that starts in household can really help reduce waste in the advocacy campaign of a green environment. Hence, the recyclable and reusable waste collected can be sold to the buyers of scraps which I used to do during my childhood days. Even the personnel of the companies are practicing proper disposal of waste. With this, it could also create jobs for scrapers related to economic concerns.
During my high school days, I had been assigned and participated in the campaign of proper waste management in our school. Planning, strategy, teamwork and cooperation of each members and students in the school are factors to be considered in the successful implementation of the advocacy campaign. Of course, we need a great selection of recycling bins for segregation of waste in every designated area in the school building. Information, policies and regulations are informed among the students as a whole with regards to the issue for a clean and green environment campaign.
Every individual in the community can help in the clean and green environment by practicing in the proper segregation of waste which is probably starts in households. For the local government, strict policies regulations and programs should be implemented in their respective locality.
|
<urn:uuid:24ca5aa0-fdff-4cc0-b29d-43355bf5e395>
|
CC-MAIN-2017-26
|
http://duldulao.net/2013/07/12/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323864.76/warc/CC-MAIN-20170629033356-20170629053356-00132.warc.gz
|
en
| 0.968054
| 371
| 3.421875
| 3
|
Varicose veins have troubled mankind for thousands of years. Varicose veins are mentioned as early as 1550 B.C. in the Ebers papyrus, where it was recommended not to treat them. Varicose veins were also mentioned in ancient Greece. The role of varicose veins and venous hypertension in creating venous ulcers was recognized as early as the days of Hippocrates. Compression therapy, still in use today for the treatment of varicose veins and venous ulcers, was also recommended by Hippocrates. Also, the name ‘varicose veins’ is derived from the Latin word ‘varix’ which means twisted.
Some of the first true-to-life diagrams of varicose vein anatomy were created by Leonardo da Vinci during the 15th century. He also delineated normal venous anatomy, with much accuracy, despite lack of the posterior arch vein. Valves were not described until later when the Padova school of medicine anatomy professor Jeronimus Fabricius d’Aquapendente described them in 1603. Interestingly, the term ‘varicose’ was first coined to correlate between varicose veins and venous ulcers only in the mid sixteen hundreds. Further reading regarding the historical aspects of varicose vein treatment is available here.
|
<urn:uuid:184ea621-19ac-434f-8e7b-fac3232cfbe9>
|
CC-MAIN-2017-26
|
http://www.angiologist.com/venous-disease/history-of-varicose-veins/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323864.76/warc/CC-MAIN-20170629033356-20170629053356-00132.warc.gz
|
en
| 0.975239
| 274
| 3.609375
| 4
|
In Chapter 6 we discussed quantum mechanics and how electrons arrange themselves in atoms. In addition to explaining the electronic properties of the atom, quantum mechanics can also explain the arrangement of elements in the periodic Table.
7.1 Development of the Periodic Table
The periodic table is broken down into two main groups. Group “A” or the main group elements, and Group “B” or the transition metals
7.1 Main Group Elements and Transition Metals
Periodic Trends allow chemists to generalize properties of atoms and they will be a big help in explaining the concepts of chemical bonding in the next chapter. The first trends we will investigate are atomic and ionic radii.
|
<urn:uuid:665f60a6-0f23-472a-8a36-ed187782409b>
|
CC-MAIN-2017-26
|
http://drfus.com/chapter-7/7-1-development-of-the-periodic-table
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319902.52/warc/CC-MAIN-20170622201826-20170622221826-00491.warc.gz
|
en
| 0.850306
| 143
| 3.96875
| 4
|
Technology Solutions Case Study: Foundation Heat Exchanger, Oak Ridge, Tennessee
The foundation heat exchanger, developed by Oak Ridge National Laboratory, is a new concept for a cost-effective horizontal ground heat exchanger that can be connected to water-to-water or water-to-air heat pump systems for space conditioning as well as domestic water heating.
- Publication Date:
- OSTI Identifier:
- Report Number(s):
- Research Org:
- Oak Ridge National Laboratory
- Sponsoring Org:
- USDOE Office of Energy Efficiency and Renewable Energy (EERE), Building Technologies Office (EE-5B) (Building America)
- Country of Publication:
- United States
- Ground Source Heat Pump; GSHP; foundation heat exchanger; residential buildings; energy efficiency
Enter terms in the toolbar above to search the full text of this document for pages containing specific keywords.
|
<urn:uuid:b1497e0c-e4d0-4d75-a45c-144abda991f2>
|
CC-MAIN-2017-26
|
https://www.osti.gov/scitech/biblio/1220375-technology-solutions-case-study-foundation-heat-exchanger-oak-ridge-tennessee
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320443.31/warc/CC-MAIN-20170625064745-20170625084745-00012.warc.gz
|
en
| 0.830957
| 192
| 2.53125
| 3
|
African Musical Instruments: 3-Part Cards (color borders)
Beautiful photographs that show the Musical Instruments of Africa. Cards have green borders - which follow the traditional Montessori map colors.
- 23 pictures with labels
- 23 pictures without labels
- 23 labels
- title card
Cards with label are approx. 3½ x 3¼", cards without label are approx. 1" shorter.
Learn how to prepare Montessori 3-Part Cards.
|
<urn:uuid:67f8fbe3-110e-4a9e-b649-8c53f53c6da7>
|
CC-MAIN-2017-26
|
https://www.teacherspayteachers.com/Product/African-Musical-Instruments-3-Part-Cards-color-borders-1772368
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320443.31/warc/CC-MAIN-20170625064745-20170625084745-00012.warc.gz
|
en
| 0.822827
| 97
| 2.59375
| 3
|
A Scientist from Florida who studies Comb Jellies, which are simple sea animals has discovered that there is a new type of brain development through which neurodegenerative diseases such as Alzheimer’s and Parkinson’s can be treated.
Leonid Moroz, a researcher at the University of Florida, says that there is more than a single way of making a brain. Moroz stated that comb jellies are different as compared to common jellyfish. He stated that the molecular makeup of comb jellies and the way in which they develop is very complex and different. It involves neural transmitters and genes.
Traditional scientific reasoning has proved that a simple nerve net evolves all the way till human complexity level. However, a different route has been taken by comb jellies and a neurochemical language is used which is not seen in other animals.
All other animals have same chemical language and the language of these species is completely different. For instance, dopamine, which controls the brain activity is not used by comb jellies. The brains can be regenerated in less than 4 days. In an experiment, the brain was regenerated 4 times. Now, it is known that the neural systems can be constructed differently. Moroz stated that these degenerative diseases can be treated for stalling progression but cannot be reversed.
|
<urn:uuid:79c05293-c96f-4cb2-b2a5-5de934f94650>
|
CC-MAIN-2017-26
|
https://www.utahpeoplespost.com/2014/05/brains-of-comb-jellies-can-be-used-for-curing-neural-disorders/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320443.31/warc/CC-MAIN-20170625064745-20170625084745-00012.warc.gz
|
en
| 0.970456
| 269
| 3.375
| 3
|
This article is only available in the PDF format. Download the PDF to view the article, as well as its associated figures and tables.
The book Inequality by Christopher Jencks is in one sense an arid waste of somewhat confusing and misleading statistics between chapter one and chapter nine, and, in another sense, a destructive, unscientific critique of American education and families. Jencks' interpretation comes down hard on his basic feeling that "The crucial problem today is that relatively few people view income inequality as a serious problem; indeed the Nixon administration apparently convinced itself that income was too equally distributed in 1968 and that the rich needed additional incentives to get even richer. The Kennedy and Johnson administrations were only marginally better. Neither made any explicit effort to equalize incomes; the subject was hardly discussed. Instead reformers focused on equalizing opportunity." This view is probably correct but it is no excuse for an unscholarly, unscientific polemic against far from "peripheral institutions," which is Jencks' evaluation of the American schools. This book states
MOEHLMAN AH. Inequality, A Reassessment of the Effect of Family and Schooling in America.. Am J Dis Child. 1974;128(1):121-123. doi:10.1001/archpedi.1974.02110260123039
|
<urn:uuid:27e659ed-189b-4703-bf1d-0d3c621acbab>
|
CC-MAIN-2017-26
|
http://jamanetwork.com/journals/jamapediatrics/article-abstract/505623
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320666.34/warc/CC-MAIN-20170626013946-20170626033946-00092.warc.gz
|
en
| 0.96028
| 271
| 3.03125
| 3
|
The nonhuman primate (NHP) model is often the best experimental model for testing interventions designed to block infection by human pathogens, such as HIV, tuberculosis, and malaria. A physiological model may require the use of a limiting dose of the infectious agent, where only a fraction of animals become infected upon any given challenge. Determining the challenge dose of the pathogen in such experiments is critical to the success of the experiment: using too-high or too-low a challenge dose may lead to false negative results and an excessive use of animals. Here I define an optimized protocol for defining the dose of pathogen that infects 50% of the time (AID50); other challenge doses, e.g. AID80, can be easily calculated from the same data. This protocol minimizes the number of animals, as well as resources and procedures, while providing an estimate of the AID50 within 1.5-fold of the true value.
Exposing nonhuman primates to infectious pathogens (such as tuberculosis, malaria, or the simian equivalent of HIV) is an important model for testing vaccines or other interventions designed to prevent infection or disease. In fact, demonstrating efficacy in animals is often a requirement before clinical testing in humans can be started. A critical variable in such testing is the dose of the pathogen used: this dose should be similar to what humans would encounter. Using too-high a dose may overcome the intervention and mask a successful approach; using too-low a dose may not be relevant. Often, an optimal dose will lead to “successful” infections only a fraction of the times the animal is exposed. A successful intervention experiment therefore needs to use a precisely calibrated dose of the infectious agent; this calibration can only be done by exposing animals to a range of doses and measuring how often they become infected. Here I define the most parsimonious method for performing this calibration: one that uses the least number of animals and procedures. Given the large number of new pathogens being tested in animal models, adoption of such a parsimonious protocol is both economically and ethically warranted, and will thereby enable favorable review of proposed animal use numbers by Institutional Animal Care and Use Committees.
Citation: Roederer M (2015) Parsimonious Determination of the Optimal Infectious Dose of a Pathogen for Nonhuman Primate Models. PLoS Pathog 11(8): e1005100. https://doi.org/10.1371/journal.ppat.1005100
Editor: Guido Silvestri, Emory University, UNITED STATES
Received: April 20, 2015; Accepted: July 20, 2015; Published: August 18, 2015
This is an open access article, free of all copyright, and may be freely reproduced, distributed, transmitted, modified, built upon, or otherwise used by anyone for any lawful purpose. The work is made available under the Creative Commons CC0 public domain dedication
Data Availability: All relevant data are within the paper and its Supporting Information files.
Funding: This work was supported by the Intramural Research Program of the Vaccine Research Center, NIAID, NIH. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing interests: The author has declared that no competing interests exist.
The nonhuman primate (NHP) can be the best (or only) experimental model for studies of human infectious pathogens and immunological interventions. NHPs represent the preferred animal models for testing vaccines and therapeutics for HIV, tuberculosis, ebola, and malaria. However, significant ethical and economic constraints accompany such models: the most prominent includes a mandate to use as few animals as possible to achieve statistically significant and biologically meaningful results.
In many NHP models, it is desirable to use a limiting infectious dose as a challenge—a dose which only infects a fraction of animals at each exposure. Such exposures are generally considered to be more physiological , and therefore better mimic the potential clinical impact of vaccination or therapeutic intervention. In addition, low dose repeated challenges provides significantly more statistical power to discern effects of intervention [1–3]. To date, the most-used example of this is repeated mucosal challenge with SIV or SHIV for testing vaccines [4–18], microbicides [4,13,19–21], or peri-exposure prophylaxes .
Limiting-dose challenge models require careful titration of the infectious agent: using a dose that is too high (and not physiological) may lead to a false negative effect of the intervention , whereas a dose that is too low will lead to insufficient infections within the time frame of the experiment to yield useful data, consequently using animals for no gain as well as wasting resources. Even a 2-fold error in the challenge dose can significantly impact the power of an experiment. The goal of the analyses presented here was to define a titration protocol that minimized animal use and procedures while estimating the AID50 to within 1.5-fold of the true value. While much of the discussion is based on NHP (and the SIV model), the protocol is generalizable to any pathogen and any animal model.
A method for estimating infectious doses was published almost 80 years ago , Based on this method by Reed and Muench, one would use as many as 48 animals to estimate the AID50. A seminal paper by Spouge used a Bayesian framework to define a method to estimate the AID50 (and its precision). However, the goal at that time was to define a minimal dose infecting all animals in an experiment (e.g., AID99) following intravenous infection (using a purely stochastic model of infection). Here I model infection based in part on Michaelis-Menten kinetics, with the goal of defining a challenge dose that reproducibly infects a fraction of animals; the statistical analysis is similar to a Logit model from Spouge [24,25]. From this, I define a parsimonious protocol to efficiently estimate the AID50 for a pathogen; this protocol will, on average, only use 15 animals.
The principal goal for titrating an infectious agent is to define the outcome response (i.e., probability of infection) as a function of challenge dose. In this regard, a useful quantity is the “50% animal infectious dose” (AID50), the dose which results in infection of 50% of animals after a single challenge. To date, many researchers still rely on modifications of the Reed and Muench method , which was never optimized to be parsimonious.
The primary ethical consideration for devising NHP protocols is minimizing the number of animals enrolled while still achieving a statistically significant outcome. Secondary considerations include minimizing the time and number of animal procedures required. In titrating a pathogen for experimental use, these criteria must be balanced against the need to accurately estimate the AID50. Since the titrated pathogen will be used in multiple, expensive, NHP-intensive experiments, it is paramount that the AID50 be determined to within a relatively small error in order to assure success of those experiments. Even a 2-fold error in the AID50 can significantly impact the power of a repeated challenge study.
To define the most efficient protocol for determining the AID50, several approaches were modeled by simulation (using experimental data as a guide). Varying input parameters to the possible titration protocols combined with large numbers of simulations allowed the definition of a titration method that minimizes animal use while maximizing accuracy of the estimated AID50. The optimal proposed protocol was then applied to titration of two virus strains in vivo.
Infection is a stochastic process: even if the challenge dose used in a cohort was the exact AID50, the number of animals infected will most likely deviate from 50%, following a binomial distribution. For example, if 8 animals were challenged with a pathogen at the AID50, there is only a 27% chance that exactly 4 would be infected. As with any measurement that includes statistical random variation, the precision and accuracy of the estimated AID50 from a challenge experiment depends on the number of observations: using more animals per challenge will yield a better estimate.
Indeed, the most accurate determination of the AID50 will occur when the largest number of animals are challenged with a dose closest to the AID50. Therefore, determining the AID50 for a challenge stock of pathogen is typically done by iterative exposures of cohorts of one or more animals to a dilution of the stock [26–28], adjusting the dose between each round to try to achieve 50% infection.
Adjusting the challenge dose between iterative rounds requires an understanding of the relationship between the probability of infection (P) and the challenge dose (D). A precise determination of this relationship is prohibitive; moreover, it may differ by pathogen and experimental conditions. A reasonable hypothesis is that P increases linearly with D at low doses, and asymptotically approaches P = 100% at higher doses. Such a relationship may be modeled by standard first-order linear kinetics, as shown in Fig 1A (where the power term m = 1).
(A) Modeling the probability of infection (P) as a function of the pathogen challenge dose (D). At D = 1, P = 0.5 (i.e., AID50, the dose that will infect 50% of the time). The curves for linear kinetics (solid; m = 1), third order kinetics (long dashes; m = 3), and mixed kinetics (short dashes, m = 0.5) are shown on linear (left) and logarithmic (right) scaling. The inset table on the right illustrates some values for P at different doses, for linear kinetics. (B) Five groups of NHP were challenged with a moderate dose of SIVsmE660 (a dose that gave 30% infection in unvaccinated animals, or approximately 0.4 AID50). Data are taken from a published study . Env immunized groups were partially protected, showing lower infection rates overall. Shown is the fitted infection rate (linear least squares, with shaded confidence intervals), at each challenge point (i.e., among animals remaining uninfected following prior exposures). There is no decline in infection rate over time, indicating no acquisition of immunity to infection nor selection for innately-resistant animals.
Alternatively, it may be possible that higher order kinetics is suitable, i.e., that infection occurs more likely above a threshold dose, and rapidly saturates above that. This relationship may be modeled by second (m = 2) or third (m = 3; Fig 1A) order kinetics. Furthermore, it is possible that m < 1 is applicable, indicating a mixed reaction (which might occur, for example, by using a swarm of heterogeneous challenge viruses comprising clones with large differences in infection rates, and/or having a distribution in host susceptibility to infection among animals challenged). An example of such a model is also shown in Fig 1A, for m = 0.5.
Most of the analysis in this paper was performed assuming first order kinetics. Indeed, data from an SIV challenge experiment using two doses of virus support the use of first-order kinetics for SIV infection (Table 1). While this relationship may not hold for other pathogens, it is the most reasonable in the absence of data to the contrary. As shown below, the reaction order impacts the efficiency by which AID50 is estimated, but does not impact the choice of optimal experimental parameters.
The best estimate of the “true” AID50 occurs with the most measurements occurring in the linear phase of the response curve (i.e., close to the AID50). For example, challenging many animals at a high dose will result in nearly uniform infection, providing little information about the actual dose (was the challenge dose too high by 100x? or 10x?). Similarly, challenging animals at too low a dose, where none or few are infected, also provides little precision for estimating the AID50. However, this case is fundamentally different than challenging at too-high a dose: here, most animals remain uninfected, and can be re-challenged with an adjusted (increased) dose. With too-high dose, new animals must be enrolled into the titration study.
To define the optimal titration experiment, an iterative protocol was modeled by Monte Carlo simulation. This iterative approach includes two phases: phase 1, a dose-ranging study, during which the challenge dose is modified following each round, until termination criteria have been met; and phase 2, during which any uninfected exposed animals from phase 1 are repeatedly challenged until infected in order to refine the estimate of the AID50.
Re-using exposed but uninfected animals can only be done if exposure does not change subsequent risk of infection. Such a change could occur actively: exposure could “vaccinate” the animal, or engage an innate response, so that the animal becomes more resistant to subsequent challenge. It is also possible that there is a heterogeneity in the innate susceptibility to infection, and over time, repeated exposures will select for such animals. Such a process might skew the statistical analysis of infection data, and one may wish to set a cap on the total number of exposures of any single animal after which data from that animal is censored.
These risks must be evaluated for each pathogen. In the case of SIV, there is no evidence for a decline in infection probability following multiple exposures (Fig 1B). Thus, for this model, uninfected exposed animals can be re-challenged to provide more data for the infection-dose response curve. Nonetheless, the impact of limiting the total number of exposures for any given animal in a titration protocol was evaluated.
The outcome response was defined as in Fig 1A; input parameters to the simulation included the number of animals challenged at each round (NC), the starting dose of challenge (initial estimate, D0, as a fraction of the AID50), the desired precision of the final estimate of AID50 (σT), and the maximum number of exposures for any given animal (EMAX). The outputs of the simulation were the total number of animals enrolled (n), the total number of rounds during phase 1, and the distribution of estimated AID50 for all simulations. The flowchart shown in Fig 2 outlines the protocol.
The procedure is divided into two phases. First, an initial dose ranging study that uses the same cohort size (NC) at each challenge, where the dose D is refined following an initial guess (D0) after each challenge. Once the accuracy of D is within the desired bounds (σT), remaining uninfected animals are moved to phase 2, undergoing challenges until all are infected. The AID50 is estimated at each time based on a least-squares regression to the single-parameter equation in Fig 1A, using data from all challenges in phases 1 and 2. n = total number of animals enrolled. Shown in red are the parameters optimized in Fig 3.
The accuracy of the estimate of the AID50 is greatest when 50% of animals challenged are infected. However, because of the stochastic nature of the infection, there is a good chance that this outcome is possible even with a challenge dose that is not near the AID50 (particularly for small values of NC). For example, at a 0.25 AID50, the probability of infection (P) is 20%; in a cohort of 4 animals using this low dose, the chance of two or more animals becoming infected with one challenge is nearly one in five. Such an outcome would lead to erroneous dose de-escalation, or, if the accuracy criterion was too loose (i.e., a large σT), a termination of the titration with an AID50 estimate off by a factor of 4.
In initial simulations, the probability of premature termination (with a final estimated AID50 well off the actual value) occurred too frequently when fewer than 12 animals had been enrolled. Hence, the procedure includes a Phase 1 termination criterion that the estimate of AID50 must be based on a minimum of 12 animals.
A large number of simulations were performed, simultaneously varying the four input parameters over reasonable ranges (S1 and S2 Tables). Fig 3 shows the distributions of output values for a selection of the simulations, in order to illustrate how the outcomes depend on these values.
The procedure outlined in Fig 2 was evaluated by Monte Carlo simulation (350–1000 simulations for each set of values). The parameters modeled were: (1) the starting dose (D0), ranging from 1/27th to 27x AID50; the number of animals challenged at each dose during the dose ranging (group size: NC); the target standard error on the estimate of AID50 (σT); the maximum number of exposures (EMAX) of any single animal; and the order of the kinetics of infection (m). Shown in red are the suggested values of these parameters, i.e., those that resulted in the fewest animals, the fewest rounds, and the most accurate estimate of AID50. Where not graphed, parameter values were held constant, as follows: NC = 8, σT = 0.5, D0 = 1/3, m = 1, EMAX = unlimited. (A) The number of animals required is not strongly dependent upon the group size, except in cases where the starting estimate of D0 is greater than 1 AID50. Thus, in the case where D0 is low, the number of rounds required decreases with increasing group size, to a point. (B) The number of animals required increases when D0 goes above 1, but the number of rounds (shown for phase 1) is not strongly impacted by D0. (C) The number of animals required decreases as the target standard error (σT) on the final estimate of AID50 decreases (i.e., more precision requires more data). (D) Decreasing EMAX increases the number of animals required, particularly at low D0. If D0 is close to 1, then a limit of three exposures performs equally to no limit. (E) When EMAX is limited, then the number of animals required increases when D0 is far from AID50 in either direction. (F) Example outcomes on parameters when using a infection kinetics with nonlinear order (m = 3 or m = 0.5). The pattern of results is largely similar to first-order kinetics, with similar optima. Bar and whisker plots show the median, interquartile range, and full range excluding outliers.
The number of animals required for the study is fairly constant when the initial challenge dose (D0) is at or below the actual AID50, irrespective of group size (Fig 3A and 3B). This is because of the reuse of uninfected animals for subsequent rounds. In contrast, if the number of exposures per animal (EMAX) is limited, the number of animals required increases as D0 deviates in either direction from the actual AID50 (Fig 3D and 3E).
With small group sizes (NC < 8), the number of rounds in Phase 1 increases dramatically as D0 decreases (Fig 3A)—requiring far more time and re-exposures of uninfected animals. This cost in efficiency is not offset by a decreased requirement for total number of animals—hence the recommendation that NC = 8.
If the infectivity of the pathogen is completely unknown, it is may be best to start with a pre-dose ranging study using one or two animals, with a very low dose, and doing step-wise 10-fold increasing challenge doses until infection is achieved: this now can be used as D0 for the main protocol.
The major termination criterion for Phase 1 is achieving a standard error on the estimate of AID50 (σT) that is below 0.5 (50%). Changing this threshold to higher values reduces the number of animals required (Fig 3C)—but at a higher risk of an inaccurate final AID50 estimate. Notably, the risk of underestimating the AID50 is greater than overestimating it; if underestimating the AID50 is an acceptable risk, then the titration protocol can be made more parsimonious by increasing σT to 60% or 70%. Doing so does not change the optimal value of 8 for NC (S1 Table).
In models where exposure to the pathogen substantially changes subsequent risk of infection, every animal should only be challenged once irrespective of outcome (EMAX = 1, Fig 3D). Simulations performed with such a restriction showed that the optimal parameters are unchanged, i.e., NC = 8 and σT = 0.5. Of course, the inability to re-use uninfected animals significantly increases the total number required (Fig 3D and 3E).
Simulations were performed on a model infection system with 3rd order infection kinetics (“threshold infection”; m = 3 in Fig 1A). As shown in Fig 3F, the patterns of outcome dependencies on input parameters is similar to first order kinetics, but requiring more animals and more rounds. This occurs because of the steepness of the response curve (Fig 1A)–i.e., small variations in infection frequency (arising from the stochastic nature of infection) lead to much larger errors in estimating the AID50 when the infection frequency is not near 50%.
This protocol was followed to titrate two SIV strains in vivo (Fig 4). Titration of FL14-TR (Fig 4A) began with a challenge dose of 20 μl of stock diluted into 1 ml (based on estimates from the TCID50 of the stock). 4/8 (50%) of animals were infected, resulting in no change in the estimated AID50, which, after one round, had an error of 76%. In round 2 of this challenge dose, only 3 of 8 animals became infected, necessitating an increase in the AID50 estimate, to 25 μl. At this point, 12 animals were enrolled and the error on the estimate was 52%, so the decision was made to enter phase 2 (and not enroll additional animals). By the end, with 12 animals, there were a total of 31 challenges with 12 infections at a range of doses, and the final AID50 estimate was 50 ± 41%.
The procedure outlined in Fig 2 was used to titrate two different SIV strains in vivo. For both strains, challenges and outcomes are represented pictorially, with statistical analyses tabulated to the right. Estimates of AID50 and its precision were done using the first order kinetics model described in Fig 1 (“FOK”), or by the Logit model online calculator (“Logit”) . (A) Titration of SIV FL14-TR. (B) Titration of SIV FL14-AK. Note that the protocol was terminated with one animal still uninfected in phase 2; further challenges will not substantively change the estimate of AID50.
Fig 4B illustrates the titration of a SIV FL14-AK stock. Because this stock is more concentrated (by TCID50), the initial challenge dose was selected to be 12.5 μl in round 1. 3 of 8 animals were infected, so round 2 used dose of 20 μl—resulting in 100% infection. For round 3, only 6 animals were available, and a much lower dose was used. While the threshold to enter phase 2 was barely met following the 3rd round, a decision was made to enroll four more animals prior to initiating phase 2. The final AID50 estimate, based on 21 animals and 32 challenges was 5.7 ± 37%.
Fig 4 also compares statistical estimation of the AID50 and its precision based on the first order kinetics model described here, and the Logit model described by Spouge [24,25]; the latter has a web-based calculator. Overall, the progressive estimates of AID50 are highly comparable; the confidence interval reported by the Logit model is about 50% higher (presumably, a different interval). Thus, if using the online calculator, multiply the error estimate by 0.67 to convert to the σT used here, or (equivalently) use a termination σT that is 1.5x larger than suggested here.
From these data, and based on the optimization criteria (in order of priority: minimum number of animals, minimum number of rounds in Phase 1, maximum accuracy on the AID50 estimate), the optimum parameter values were selected. Specifically, the number of animals per cohort (NC) should be 8 (with 7 being close to optimal); the target precision (σT) should be 0.5 (with 0.6 being close); and the maximum number of exposures per animal (EMAX) should be unlimited (with 3 being close to optimal). If any information about the likely AID50 is known (e.g., from previous experiments), then a starting challenge dose (D0) should be between 0.1 and 1 AID50.
Using as many as 8 animals per round may seem unintuitive—for example, why is NC = 4 less efficient? There are two reasons for this: First, the criterion for precision (σT < 0.5) is heavily dependent on the total number of exposures in the experiment—thus, using four animals will usually double the number of rounds in the experiment (increasing time and resources) without reducing the eventual number of animals. Second, a four animal cohort presents a much larger risk of a obtaining an outlier outcome (due to the stochastic nature of the infections), leading to incorrect dose adjustment for the following round.
Fig 4B illustrates this risk. In this titration, only 3 of 8 animals were infected despite using what turned out to be a challenge dose that was ~2-fold above the actual AID50. Based on Fig 1A, using this dose is expected to infect 68% of animals challenged once; the odds of having 3 or fewer of 8 infected is low (8%) but not insubstantial. Were this the extent of the titration, a future (large) study would have used this or even higher challenge dose. By following the procedure specified here, this statistical anomaly was overcome.
The length of time required to determine the outcome of a challenge will define the length of each round. For example, with a titration of highly pathogenic SIV, infection usually be determinable by day seven and always by day 10. Thus, each subsequent round will likely be initiated two weeks apart. In contrast, during phase 2, this step can be accelerated. For example, an animal might be infected during the first round of phase 2, and then re-challenged one week later when its infection status is still unknown. The animal would become viral positive day 10 (i.e., a few days after the second challenge of round 2), indicating that it actually became infected after the first round and that the subsequent challenge should be discounted. This ambiguity at day seven, fully resolved before day 14 (i.e., 3rd round), does not impact the analysis of the phase 2 data. However, such ambiguity is not appropriate for phase 1, where challenges must be spaced with sufficient delay to positively establish infection.
However, other pathogens may require considerably more time between rounds in phase I. For example, in titrating a stock of SHIV 162p3, we found that some animals did not become viremic until day 14, and adopted a 3 week cycle for titrations. With mTB, infection may not be clinically evident until four weeks post-exposure, and the cycle time needs to be commensurately higher.
The number of animals enrolled in phase 2 is between zero and NC (i.e., the number of uninfected animals remaining from the last round of phase 1). At this point, a fairly accurate estimate of the AID50 is available, so phase 2 will usually require no more than 3–4 rounds to infect the remaining animals. Therefore, the total time required for this titration protocol will be, on average, four rounds for phase 1 and three rounds for phase 2. In the example of titration of an SIV, where each round in phase 1 requires two weeks and each round in phase 2 requires one week, the total time for the titration should be expected to be 11 weeks. In our in vivo examples (Fig 4), titration of FL14 was finished in 8 weeks, and FL14-AK in 12 weeks. Of course, the total time will depend on the specific requirements of each pathogen and system, and the timing between rounds should be adjusted accordingly.
Many variations of titration protocols were evaluated, including (i) using smaller group sizes during initial rounds of Phase 1 and larger group sizes when narrowing in on the true AID50, (ii) other modes of variable group sizes; and (iii) eliminating Phase 2. Most alternatives performed worse in by requiring more animals and/or more time and procedures. The scripts created for the simulations reported here can be modified to test any configuration of the titration protocol that might be considered for a given pathogen.
It should be noted that this protocol returns an estimate of the average AID50 for a cohort of animals, and will be valid for an experimental cohort that is matched for relative infection rates. For example, this protocol could be used for titration of a virus used in intravaginal challenge where the infection risk varies by time in the menstrual cycle. The best results will be obtained by challenging both titration and experimental animals at the same point in the menstrual cycle. But as long as the challenge time points are equivalently randomized across the menstrual cycle in both the titration and experimental cohorts, the estimate of the AID50 will still be valid.
Most of the modeling assumed a uniform infection rate for the viruses in the challenge stock (i.e., by setting m = 1). If a swarm of genetically distinct viruses is used, in which clonal variation in infection efficiency is present, then the result may be a mixed kinetics of infection (i.e., m < 1). Modeling even a severe example of this (m = 0.5) resulted in the same optimal parameter values, albeit the total number of animals (and rounds) may increase (or even decrease in some cases).
A somewhat different model for the infecting dose response was used by Spouge his seminal paper . While the motivations and goals of that paper were different than for this paper, either model can be used to estimate the AID50 (Fig 4). A difference between the Spouge model and the model used here is in the estimate of the precision of the AID50 (σT), which differ by a factor of about 1.5. Consequently, if using the convenient online calculator (select the “Logit” fit) , multiply the error estimate by 0.67 to approximate σT as used here.
In some experiments, it may be desirable to use a higher (e.g., AID80) or lower (e.g. AID20) challenge dose. These doses can be estimated from the following formula (assuming, based on the estimated AID50, where “x” is the desired percentage of successful infections:
In summary, an optimized pathogen titration protocol is presented (Fig 2) to determine with good precision the limiting infectious dose of a pathogen, a dose which may be critical for testing interventions . On average (90% range in parentheses), the protocol will enroll 15 (12–25) animals, require 3 (2–5) phase 1 rounds, and result in an estimate of the AID50 within 40% of the true value.
The protocol defined here is generalizable to any pathogen and any animal model. However, it is most critical for NHP models, where ethical considerations mandate minimization of animal use. This protocol and the analyses reported here will aid in the preparation of an Animal Study Proposal (ASP) for the purposes of defining the characteristics of an NHP-infectious agent. Finally, these analyses provide a statistical justification for animal numbers in the ASP, as required for Institutional Animal Care and Use Committee (IACUC) review and approval. Importantly, by following the method described here, investigators can minimize the number of animals and resources needed to define an infectious pathogen challenge dose in NHPs.
Data in Fig 1B and Table 1 from a large vaccine/challenge study, VRC 10–332, the results of which have been published . Data in Fig 4 represent titration of two VRC-amplified challenge stock of SIV strains, administered intrarectally, in rhesus macaques (VRC 13–444). Blood was collected weekly during the challenge phase for viral load quantification.
All simulations and statistical analyses were performed in JMP versions 10 and 11 (SAS Institute, Cary, NC). Simulation scripts and data tables are available by request to the author. A simple JMP document that includes a script to calculate the AID50 as well as the precision (σT) is also available by request. In this context, σT is the approximate standard error of the regression; according to the software documentation, “it is formed by the product of the RMSE and the square root of the diagonals of the derivative cross-products matrix inverse.”
All in vivo procedures were carried out in accordance to institutional, local, state, and national guidelines and laws governing research in animals including the Animal Welfare Act. The animal protocols “VRC ASP 10–332” and “VRC ASP 113–444” and the procedures were reviewed and approved by the Animal Care and Use Committee (ACUC) of both the Vaccine Research Center (in accordance to all the NIH policy and guidelines) as well as the Institutional Animal Care and Use Committee (IACUC) of Bioqual, Inc. where non-human primates were housed for the duration of the study. Bioqual Inc., and the NIH are both accredited by the Association for Assessment and Accreditation of Laboratory Animal Care (AAALAC) and are in full compliance with the Animal Welfare Act and Public Health Service Policy on Humane Care and Use of Laboratory Animals. In accordance to the institutional policies of both institutions, all compatible non-human primates are always pair-housed, and single housing is only permissible when scientifically justified or for veterinary medical reasons, and for the shortest duration possible.
Non-human primates were housed in appropriately sized caging according to the Guide for the Care and Use of Laboratory Animals, 8th ed., and supplemented with a variety of enrichment toys, treats, fresh produce, and foraging devices. Water was offered ad libitum and monkeys were fed primate biscuits (Monkey Diet, 5038, Lab diet, St. Louis, MO) twice daily. Animal holding rooms were maintained on a 12 hour light/dark cycle, room temperature of 60-70F, and relative humidity between 30 to 70% as standard practice.
The studies being performed support HIV/AIDS research and, as addressed in the Weatherall report, non-human primates were an appropriate animal model for this infectious disease. In order to ensure that animal use was not duplicated, literature searches were performed using several key words related to the study. Specific intervention and endpoint criteria tables were integrated into the protocols. Facility veterinarians were familiarized with the disease model and progression to minimize any associated pain or distress, and to perform euthanasia as directed in the approved ACUC and IACUC protocols.
S1 Table. Tabulated outcome of simulations testing algorithmic parameters.
All combinations of group size (n = 3 to 12 by increments of 1), starting challenge dose (D = 0.037 to 30 by factors of 3), and target AID50 precision (σT from 0.4 to 0.7 by increments of 0.1) were simulated with 350 iterations. The mean and standard deviation of the outcomes is shown for each set of inputs. Note that the ideal estimated AID50 would be 1.0, and the ideal Log10(AID50) is 0.0. In these simulations, there is no limit to the number of exposures that would be given to any single animal.
S2 Table. Impact of limited exposures on experimental needs.
1000 simulations were performed across a range of starting challenge dose (D = 0.037 to 30 by factors of 3), and maximum number of exposures for any given animal (1, 2, 3, or unlimited; the latter are the same as in S1 Table), while holding the group size (n = 8) and target AID50 precision (σT = 0.5) fixed. Outputs are the same as in S1 Table.
I thank Drs. Srinivas Rao, John Mascola, and Jeff Lifson for critical reading of the manuscript.
Conceived and designed the experiments: MR. Performed the experiments: MR. Analyzed the data: MR. Contributed reagents/materials/analysis tools: MR. Wrote the paper: MR.
- 1. Regoes RR, Longini IM, Feinberg MB, Staprans SI (2005) Preclinical assessment of HIV vaccines and microbicides by repeated low-dose virus challenges. PLoS Med 2: e249. pmid:16018721
- 2. Hudgens MG, Gilbert PB (2009) Assessing vaccine effects in repeated low-dose challenge experiments. Biometrics 65: 1223–1232. pmid:19397589
- 3. Hudgens MG, Gilbert PB, Mascola JR, Wu CD, Barouch DH, et al. (2009) Power to detect the effects of HIV vaccination in repeated low-dose challenge experiments. J Infect Dis 200: 609–613. pmid:19591571
- 4. Barouch DH, Klasse PJ, Dufour J, Veazey RS, Moore JP (2012) Macaque studies of vaccine and microbicide combinations for preventing HIV-1 sexual transmission. Proc Natl Acad Sci U S A 109: 8694–8698. pmid:22586094
- 5. Ellenberger D, Otten RA, Li B, Aidoo M, Rodriguez IV, et al. (2006) HIV-1 DNA/MVA vaccination reduces the per exposure probability of infection during repeated mucosal SHIV challenges. Virology 352: 216–225. pmid:16725169
- 6. Garcia-Lerma JG, Otten RA, Qari SH, Jackson E, Cong ME, et al. (2008) Prevention of rectal SHIV transmission in macaques by daily or intermittent prophylaxis with emtricitabine and tenofovir. PLoS Med 5: e28. pmid:18254653
- 7. Hansen SG, Vieville C, Whizin N, Coyne-Johnson L, Siess DC, et al. (2009) Effector memory T cell responses are associated with protection of rhesus monkeys from mucosal simian immunodeficiency virus challenge. Nat Med 15: 293–299. pmid:19219024
- 8. Hessell AJ, Poignard P, Hunter M, Hangartner L, Tehrani DM, et al. (2009) Effective, low-titer antibody protection against low-dose repeated mucosal SHIV challenge in macaques. Nat Med 15: 951–954. pmid:19525965
- 9. Letvin NL, Rao SS, Dang V, Buzby AP, Korioth-Schmitz B, et al. (2007) No evidence for consistent virus-specific immunity in simian immunodeficiency virus-exposed, uninfected rhesus monkeys. J Virol 81: 12368–12374. pmid:17686853
- 10. Letvin NL, Rao SS, Montefiori DC, Seaman MS, Sun Y, et al. (2011) Immune and Genetic Correlates of Vaccine Protection Against Mucosal Infection by SIV in Monkeys. Sci Transl Med 3: 81ra36. pmid:21543722
- 11. Ma ZM, Abel K, Rourke T, Wang Y, Miller CJ (2004) A period of transient viremia and occult infection precedes persistent viremia and antiviral immune responses during multiple low-dose intravaginal simian immunodeficiency virus inoculations. J Virol 78: 14048–14052. pmid:15564513
- 12. McDermott AB, Mitchen J, Piaskowski S, De Souza I, Yant LJ, et al. (2004) Repeated low-dose mucosal simian immunodeficiency virus SIVmac239 challenge results in the same viral and immunological kinetics as high-dose challenge: a model for the evaluation of vaccine efficacy in nonhuman primates. J Virol 78: 3140–3144. pmid:14990733
- 13. Otten RA, Adams DR, Kim CN, Jackson E, Pullium JK, et al. (2005) Multiple vaginal exposures to low doses of R5 simian-human immunodeficiency virus: strategy to study HIV preclinical interventions in nonhuman primates. J Infect Dis 191: 164–173. pmid:15609225
- 14. Reynolds MR, Weiler AM, Piaskowski SM, Kolar HL, Hessell AJ, et al. (2010) Macaques vaccinated with simian immunodeficiency virus SIVmac239Delta nef delay acquisition and control replication after repeated low-dose heterologous SIV challenge. J Virol 84: 9190–9199. pmid:20592091
- 15. Roederer M, Keele BF, Schmidt SD, Mason RD, Welles HC, et al. (2013) Immunological and virological mechanisms of vaccine-mediated protection against SIV and HIV. Nature.
- 16. Vaccari M, Keele BF, Bosinger SE, Doster MN, Ma ZM, et al. (2013) Protection afforded by an HIV vaccine candidate in macaques depends on the dose of SIVmac251 at challenge exposure. J Virol 87: 3538–3548. pmid:23325681
- 17. Van Rompay KK, Abel K, Lawson JR, Singh RP, Schmidt KA, et al. (2005) Attenuated poxvirus-based simian immunodeficiency virus (SIV) vaccines given in infancy partially protect infant and juvenile macaques against repeated oral challenge with virulent SIV. J Acquir Immune Defic Syndr 38: 124–134. pmid:15671796
- 18. Wilson NA, Reed J, Napoe GS, Piaskowski S, Szymanski A, et al. (2006) Vaccine-induced cellular immune responses reduce plasma viral concentrations after repeated low-dose challenge with pathogenic simian immunodeficiency virus SIVmac239. J Virol 80: 5875–5885. pmid:16731926
- 19. Dereuddre-Bosquet N, Morellato-Castillo L, Brouwers J, Augustijns P, Bouchemal K, et al. (2012) MiniCD4 microbicide prevents HIV infection of human mucosal explants and vaginal transmission of SHIV(162P3) in cynomolgus macaques. PLoS Pathog 8: e1003071. pmid:23236282
- 20. Singer R, Mawson P, Derby N, Rodriguez A, Kizima L, et al. (2012) An intravaginal ring that releases the NNRTI MIV-150 reduces SHIV transmission in macaques. Sci Transl Med 4: 150ra123. pmid:22956201
- 21. Veazey RS (2008) Microbicide safety/efficacy studies in animals: macaques and small animal models. Curr Opin HIV AIDS 3: 567–573. pmid:19373023
- 22. Cranage M, Sharpe S, Herrera C, Cope A, Dennis M, et al. (2008) Prevention of SIV rectal transmission and priming of T cell responses in macaques after local pre-exposure application of tenofovir gel. PLoS Med 5: e157; discussion e157. pmid:18684007
- 23. Reed LJ, Muench H (1938) A Simple Methodd of Estimating Fifty Per Cent Endpoints. Amer J of Hygeine 27: 493–407.
- 24. Spouge JL (1992) Statistical analysis of sparse infection data and its implications for retroviral treatment trials in primates. Proc Natl Acad Sci U S A 89: 7581–7585. pmid:1323844
- 25. Spouge JL (2015) Infectious Dose or Dilution (ID50) Server. <http://www.ncbi.nlm.nih.gov/CBBresearch/Spouge/html_ncbi/html/id50/id50.cgi>
- 26. Dittmer U, Stahl-Hennig C, Coulibaly C, Nisslein T, Luke W, et al. (1995) Repeated exposure of rhesus macaques to low doses of simian immunodeficiency virus (SIV) did not protect them against the consequences of a high-dose SIV challenge. J Gen Virol 76 (Pt 6): 1307–1315. pmid:7782761
- 27. Lewis MG, Bellah S, McKinnon K, Yalley-Ogunro J, Zack PM, et al. (1994) Titration and characterization of two rhesus-derived SIVmac challenge stocks. AIDS Res Hum Retroviruses 10: 213–220. pmid:8198874
- 28. Pauza C, Wallace M (2002) The Role for Nonhuman Primate Models in the Development and Testing of AIDS Vaccines. In: Wong-Staal F, Gallo R, editors. AIDS Vaccine Research: CRC Press. pp. 287–309.
- 29. Regoes RR (2012) The role of exposure history on HIV acquisition: insights from repeated low-dose challenge studies. PLoS Comput Biol 8: e1002767. pmid:23180981
|
<urn:uuid:ca22eee6-7962-4360-bf5d-250b6325ab66>
|
CC-MAIN-2017-26
|
http://journals.plos.org/plospathogens/article?id=10.1371/journal.ppat.1005100
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320666.34/warc/CC-MAIN-20170626013946-20170626033946-00092.warc.gz
|
en
| 0.897374
| 9,763
| 3.046875
| 3
|
Maybe you can help us understand a little more about this old postcard.
This card was probably published in 1910 or 1911. Passenger rail service was just getting started on a new rail line from Chicago to Seattle across the northern part of the USA. This rail line had several names over the years, but for a short time, around the time this card was published, it was called Chicago, Milwaukee, and Puget Sound Railway. The card features an eastbound train arriving at the brand new Missoula, Montana, depot. One of the things we like about this card is the "sepia tone" ... the brownish tint that was common in some of the vintage photographs of this period. It is printed on heavy card stock, which even today would be considered high quality.
The card was mailed on January 19, 1912, to Miss Viola Jones, Grass Valley, California. The sender had some of the best handwriting we've ever seen as evidenced by the address part of the card, HOWEVER, the other half, the correspondence portion, is a mystery to us as it is written, we think, in shorthand. The art of shorthand may have just about disappeared today, but in 1912 it was used as a way to write down a lot very quickly. For example, it was used to record what people were saying in meetings. We copied the correspondence part of the card and turned it a little sideways to make it easier to read ... Can you tell us what it says, or, at least, what it is about?
|Chicago, Milwaukee & Puget Sound Depot|
|Can you read the shorthand?|
|
<urn:uuid:20ce4ebc-f832-4599-89df-e133ccb9f48d>
|
CC-MAIN-2017-26
|
https://john-s-island.blogspot.com/2015/01/mystery-card-missoula-montana-1912.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320865.14/warc/CC-MAIN-20170626203042-20170626223042-00172.warc.gz
|
en
| 0.983615
| 333
| 2.625
| 3
|
Hi everybody! My name is Isidro, and I am from Costa Rica. Some time ago I was trying to find out how to create realistic grass and plants for a university project, but I could not find anything. Later I learned how to do it, and now I have created a tutorial on the subject.
You can find this tutorial in the officialCommunity of Autodesk-Maya User
In this tutorial, I will describe how to create realistic 3d grass using Maya's Paint Effects. Here is the final image that we will create
First, we need to understand what grass looks like in reality. See this photo.
This photo contains many different colors, sizes, and types of grass. You will almost never have a single kind of grass in your scene, because in reality there are always other plants mixed in with the grass. There are some flowers, some weeds, some dried-out (dead) grasses, and so on. So, if you want realistic grass, you must use several different kinds of plants in your image. In addition, you must vary the size and color of your plants throughout the scene.
Take a close look at this photograph:
Notice how many different kinds of grass and other plants there are in this little space! There are also some pieces of wood mixed in. Also, observe the shadows in the grass:
The red arrows show how the shadows work, and the blue ones show where the light goes. You can see that the top of the grass gets plenty of light, and the bottom of the grass has dark, irregular shadows.  Each stalk of grass casts a shadow on the ground and on its neighboring stalks. As a result, very little light reaches the ground.  We need lots of contrast between the top and the bottom of the grass to produce a really realistic image. I am not saying that the individual shadows need to be very strong, just that there needs to be a distinct contrast between the tip of each stalk and the root.  This gives the grass a sense of depth. Look at this series of images:
You can see how the shadows (the second image) are random and have many different sizes and shapes. In the third image you can see that the light is more uniform (mainly because the grass has uniform size).  In places with strong light, we see strong shadows; but where the light is softer the shadows are softer and more transparent.  This combination of soft, semi-transparent shadows and harsh shadows gives the image realism.
The first stage
Now that you understand how light and shadow work in a more theoretical sense, let's open Maya and start actually creating our image. This is the image we will create in this tutorial.
|
<urn:uuid:0838d374-f06a-4caa-897f-245c44e4595e>
|
CC-MAIN-2017-26
|
https://www.3dtotal.com/tutorial/1404-realistic-grass-in-maya-by-isidro-fernndez-caldern-animation
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320865.14/warc/CC-MAIN-20170626203042-20170626223042-00172.warc.gz
|
en
| 0.94266
| 573
| 2.84375
| 3
|
EM 1110-2-1100 (Part II)
30 Apr 02
(b) An expression relating wave celerity to wavelength and water depth is given by
(c) Equation II-1-8 is termed the dispersion relation since it indicates that waves with different periods
travel at different speeds. For a situation where more than one wave is present, the longer period wave will
travel faster. From Equation II-1-7, it is seen that Equation II-1-8 can be written as
(d) The values 2π/L and 2π/T are called the wave number k and the wave angular frequency ω,
respectively. From Equation II-1-7 and II-1-9, an expression for wavelength as a function of depth and wave
period may be obtained as
(e) Use of Equation II-1-10 involves some difficulty since the unknown L appears on both sides of the
equation. Tabulated values of d/L and d/L0 (SPM 1984) where L0 is the deepwater wavelength may be used
to simplify the solution of Equation II-1-10. Eckart (1952) gives an approximate expression for Equa-
tion II-1-10, which is correct to within about 10 percent. This expression is given by
(f) Equation II-1-11 explicitly gives L in terms of wave period T and is sufficiently accurate for many
engineering calculations. The maximum error 10 percent occurs when d/L . 1/2. There are several other
approximations for solving Equation II-1-10 (Hunt 1979; Venezian and Demirbilek 1979; Wu and Thornton
1986; Fenton and McKee 1990).
(g) Gravity waves may also be classified by the water depth in which they travel. The following
classifications are made according to the magnitude of d/L and the resulting limiting values taken by the
function tanh (2πd/L). Note that as the argument of the hyperbolic tangent kd = 2πd/L gets large, the tanh (kd)
approaches 1, and for small values of kd, tanh (kd) . kd.
(h) Water waves are classified in Table II-1-1 based on the relative depth criterion d/L.
Water Wave Mechanics
|
<urn:uuid:962dfcc2-26b2-4e43-9315-cdfeaa8b69ef>
|
CC-MAIN-2017-26
|
http://coastalengineeringmanual.tpub.com/Part-II-Chap1/Part-II-Chap10013.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321458.47/warc/CC-MAIN-20170627152510-20170627172510-00252.warc.gz
|
en
| 0.860845
| 507
| 3.078125
| 3
|
back, backward, backwards, rearward, rearwards(adverb)
at or to or toward the back or rear
"he moved back"; "tripped when he stepped backward"; "she looked rearward out the window of the car"
in a manner or order or direction the reverse of normal
"it's easy to get the `i' and the `e' backward in words like `seize' and `siege'"; "the child put her jersey on backward"
Toward the back.
In the opposite direction of usual.
The clock did not work because the battery was inserted backwards.
In a manner such that the back precedes the front.
The tour guide walked backwards while droning on to the bored seniors.
Oriented toward the back.
The battleship had three backwards guns at the stern, in addition to the primary complement.
The backwards lettering on emergency vehicles makes it possible to read in the rear-view mirror.
Behind current trends or technology.
Modern medicine regards the use of leeches as a backwards practice.
Clumsy, inept, or inefficient.
He was a very backwards scholar, but he was a marvel on the football field.
Origin: . See -s#Etymology 3
with the back in advance or foremost; as, to ride backward
toward the back; toward the rear; as, to throw the arms backward
on the back, or with the back downward
toward, or in, past time or events; ago
by way of reflection; reflexively
from a better to a worse state, as from honor to shame, from religion to sin
in a contrary or reverse manner, way, or direction; contrarily; as, to read backwards
Backwards is the fourth Red Dwarf novel. It is set on the fictional backwards universe version of Earth. The novel was written by Rob Grant on his own. It follows on directly from the second Grant Naylor novel, Better Than Life, ignoring Last Human. As well as continuing the general conceit from the episode Backwards, it contains minor elements from the episode Dimension Jump, and all of the plot from Gunmen of the Apocalypse. An audiobook of Backwards was also produced, read by the author.
British National Corpus
Written Corpus Frequency
Rank popularity for the word 'backwards' in Written Corpus Frequency: #2814
Rank popularity for the word 'backwards' in Adverbs Frequency: #306
The numerical value of backwards in Chaldean Numerology is: 6
The numerical value of backwards in Pythagorean Numerology is: 1
Sample Sentences & Example Usage
Life can only be understood backwards but it must be lived forwards.
Nobody gets to live life backwards. Look ahead -- that's where your future lies.
Technological progress has merely provided us with more efficient means for going backwards.
Remember, Ginger Rogers did everything Fred Astaire did, but she did it backwards and in high heels.
Chavista, i wish I could say I still am but the situation is too hard. Everything is going backwards.
Images & Illustrations of backwards
Translations for backwards
From our Multilingual Translation Dictionary
- επαναφορά επιστροφή, προς τα πίσωGreek
- hacia atrás, a contrapelo, invertidoSpanish
- tagurpidi, tahapoole, peegelpilt, vanamoodne, saamatu, tagasisuunasEstonian
- takaperin, kelvoton, taaksepäin, vanhanaikainen, väärinpäinFinnish
- دواکهوتو, بهرهودوا, پاشهوپاشKurdish
- направленный, назад, смотрящийRussian
- bakåtriktad, bakvänd, efterbliven, baklänges, omvänd, efterSwedish
Get even more translations for backwards »
Find a translation for the backwards definition in other languages:
Select another language:
|
<urn:uuid:224e5d1f-986c-464e-bceb-207f18407143>
|
CC-MAIN-2017-26
|
http://www.definitions.net/definition/backwards
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321458.47/warc/CC-MAIN-20170627152510-20170627172510-00252.warc.gz
|
en
| 0.783634
| 933
| 3
| 3
|
A tranquil pool containing fish and plants is projected onto the floor.
When the participants discover the pool, they see mostly fish but few plants,
because the fish are the plants' predator. When the participants
enter, the fish, mysteriously attracted to the participants,
playfully swarm around their feet. Because the fish are distracted from
eating, the plants are then able to bloom. Most people imagine that
ecosystem disruption means the destruction
of a specie(s).
However, as this project illustrates, a counter-intuitive effect of ecosystem
disruption is often that one species is suddenly increased
population due to a predator displacement.
(c) 2015 Mine-Control, Inc.
|
<urn:uuid:f5b2f889-c15a-47eb-95dc-1a62ca15ea50>
|
CC-MAIN-2017-26
|
http://mine-control.com/pond.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323604.1/warc/CC-MAIN-20170628101910-20170628121910-00332.warc.gz
|
en
| 0.940796
| 144
| 2.875
| 3
|
By Rod Van Mechelen
What the sameness standard fails to notice is that men's differences from women are equal to women's differences from men. There is an equality there. - Catharine A. MacKinnon, Feminism Unmodified: Discourses on Life and Law
Equal Rights Are Not Equal to Equal Outcomes
1992 Bellevue, Wash. - Equal rights are no guarantee of equal opportunity. (You Just Don't Understand: Women and Men in Conversation, Ballantine Books Edition, June 1991, Deborah Tannen, Ph.D., p 95) Thus, how men extend equal rights seems oppressive to many women. (You Just Don't Understand: Women and Men in Conversation, Ballantine Books Edition, June 1991, Deborah Tannen, Ph.D., pp 128 - 129)
Relying on this perception of oppression, pop feminists confuse equality and equal opportunity with equal rights, and use the law and the courts to stack the deck in their favor in the name of "equality." In the process, they violate men's rights, because in society there is generally no such thing as absolute equality. Only equal rights.
My Random House College dictionary defines equality as "the state or quality of being equal," and equal as "of the same in quantity, degree, merit, etc." These definitions confirm what most of us already know - no one is really equal to anyone else. Our aptitudes, abilities, and special differences preclude the possibility, and any attempt to enforce anything other than equal rights leads only to the lowest common denominator, where genius is gutted and prosperity is reduced to poverty.
Understanding this, we understand both the goal and the flaw of the pop feminist's public agenda: to obtain sameness in quantity and degree without merit.
Pop feminists complain because men as a demographic make more money than women do. To them, this is unfair because it's unequal. So they demand affirmative action to change that. Yet, men work more hours and more years in the paid labor force than women do. Productivity and perseverance, not discrimination, cause men to earn more. Thus, there are only two ways most women can achieve income-parity with men: earn it, or violate men's rights.
Through laws and threats of government intervention, they coerce corporations to give preferential hiring to women, because few women are doing what it takes to earn it for themselves.
Essentially, pop feminists are demanding and getting superior rights for women to compensate for the superior economic performance of men. In their arrogance, they aver this should serve as an injunction to men to work harder to provide parity for women. Anyone acknowledging the truth of the nature of inequality, however, should not be surprised by the increased incidence of rape, suicide, and violence in our society such policies cause. Violating men's rights to get economic equality cannot help but create a backlash. (In a Different Voice: Psychological Theory and Women's Development, Carol Gilligan, p 100)
2012 Olympia, Wash. - In the years since I wrote that passage, idiots and imbeciles have accused me of justifying rape because men feel they are getting a raw deal. What a crock!
Ironically, this double standard is precisely what they want: "Women admit to having a double standard, to wanting equality in employment and pay along with privilege in social status." (Women Vs. Women: The Uncivil Business War, Tara Roth Madden, p 61)
Some Are More Equal Than Others
In the pop feminist paradigm, need is a moral imperative. That is, a person's rights are determined by their needs. (In a Different Voice: Psychological Theory and Women's Development, Carol Gilligan, p 54) Consequently, as they think women's needs are greater than men's, women's rights should have the higher priority because, "everybody has the 'right' to live." (In a Different Voice: Psychological Theory and Women's Development, Carol Gilligan, p 57)
The idea of a "right to live" presumes the "right" to consume. A "right" to consume requires that others provide what will be consumed. Certainly, everybody has the right not to be killed, but a person who is forced to work in service to others' "right" to consume is a slave. Thus, their ethic is slavery. In practice, that means male slavery.
We are all aware of millions of others who need our help, and most of us wish we could help them all. But if we treated their needs like rights, we would expend ourselves trying to satisfy them: our own needs would go unfulfilled. (After decades of having other countries enjoy the largesse of our Imperial Presidents, our own nation is now enjoying just this result as our own national needs go unmet.) So we need some means by which to narrow the field down. Something not too arbitrary, something that violates neither our sense of justice nor the principle of equal rights.
Political attempts to create equal opportunity always rely on "worsening the situations of those more favored with opportunity." (Anarchy, State, and Utopia, Robert Nozick, p 235) Since such action is, by nature, aggression, and since pop feminists say they oppose acts of aggression, they should oppose this, and favor a system that would be fair.
In Anarchy, State, and Utopia, Robert Nozick provides a concept of justice that would satisfy this. He sums it up as, "from each as they choose, to each as they are chosen." Basically, this is a "hands off" concept: you get what you earn or are given, period. Pop feminists are sure to balk at this, but we have already exposed how their arguments rely on some presumed right to enslave men.
Nozick's idea, however, rests upon the principles of non aggression, and readily lends itself to a concept of justice as fairness: "(S)ocial and economic inequalities are to be arranged so that they are both (a) reasonably expected to be to everyone's advantage, and (b) attached to positions and offices open to all." (A Theory of Justice: Original Edition, John Rawls)
Cutting through the academic jargon, what this means to us is, power and wealth are justified only if they contribute to, or do not harm the common good, and if there are no unfair obstacles barring the rest of us from earning equal power and wealth. This can be paraphrased as, "You get what you earn or are given, and that's okay if what you get or earn either benefits or does not harm the common good, and if all of us can aspire, without prejudice, to earn or receive the same."
This is utterly fair, producing hierarchies without domination and providing equal advantages without diminishing our inherent inequalities. But we are social beings with an inherited history that imposes structural inequalities upon us all that are neither just nor fair. Legislation to remedy these rely on forcible appropriation and redistribution of wealth and opportunity. A group can justify such action only if it can prove unique victimization of its members warrants it. That is precisely what pop feminists are successfully doing by portraying men as more violent than they are, and women as more oppressed than they are.
To do this, they rely upon the effects of choices women make without considering the choices, or who makes them. They point to the preponderance of low-paying jobs women hold, and expect us to ignore the general inclination of women to make their job selections on the basis of personal needs rather than just on income. (Women Vs. Women: The Uncivil Business War, Tara Roth Madden, p 3) By pre-defining this inequality as the result of male oppression of women, they make the enactment of legislation to empower women at the expense of men a moral and social imperative.
This is unjustified
Again, we do not live within a historical vacuum, and if there is any true gender equality, it is that our common history imposes structural inequalities upon both genders that are neither just nor fair:
Feminists are demanding 51 percent representation in such areas of our society as politics, law, medicine and business administration. But regardless of how close they come to attaining that, virtually 100 percent of the cattle butchering, grave digging, sewer cleaning, and garbage collecting that is so critical to that society will continue to be done (b)y males. So will almost every other backbreaking, marrow-freezing, stomachturning job. (Manhood Redux- Standing up to Feminism, C.H. Freedman, p146)
To appropriate the money and opportunities men earn, and then redistribute them to women, is to install women as the dominant sex. This is not equality, but the epitome of female chauvinism.
Rod Van Mechelen
|
<urn:uuid:8fbe3c6f-d1dc-4d2f-bef8-554da40b74b7>
|
CC-MAIN-2017-26
|
http://www.backlash.com/book/equality.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323604.1/warc/CC-MAIN-20170628101910-20170628121910-00332.warc.gz
|
en
| 0.954595
| 1,811
| 3.09375
| 3
|
By James Petras
Over the past three years Latin American leftist leaders, who presided over heterodox ‘free trade’ and commodity based welfare economies, lost presidential, legislative and municipal elections and referendums or faced impeachment.
They fell because they lost competitive elections, not because of US invasions or military coups. These same leftist leaders, who had successfully defeated coups and withstood gross US political intervention via AID, NED, the DEA and other US government agencies, lost at the ballot box.
What accounts for the changing capacity of leftist presidents to retain majoritarian electoral support over almost a decade? Why did the US-backed and funded candidates win this time, when they had been defeated in several previous elections? What accounts for the defeat of the rightist violent road to power and their subsequent victory via the electoral process?
Class Struggle and Popular Mobilization as a Prelude to Leftist Electoral Victories
The electoral victories of the Left were preceded by a deep crisis in the ‘free market’ and deregulated economies, which were accompanied by intense class struggle from below. Class struggle polarized and radicalized vast sections of the working and middle classes.
In Argentina, the total collapse of the financial and manufacturing system led to a popular uprising and the rapid overthrow of three presidents. In Bolivia, two popular uprisings overthrew two US backed ‘free market’ presidents. In Ecuador, a popular ‘citizen movement’ ousted a US-backed president.
In Brazil, Paraguay and Venezuela, burgeoning peasant and urban movements, engaged in direct action and in opposition to their ‘free market’ presidents, resulted in the election of left presidents.
Four inter-connected factors came to the fore to explain the left’s rise to power: First, the dramatic collapse and ensuing socio-economic crisis, entailing poverty, stagnation and repression by rightwing regimes, precipitated a large-scale shift to the left. Secondly, the intense class struggle, responding to the crisis, politicized the workers, radicalized the downwardly mobile middle classes and eroded the influence of the ruling class and the impact of their elite-controlled mass media. Thirdly, the leftist presidents promised long-term large-scale structural changes and successfully implemented immediate social impact programs (employment, social benefits, bank deposit protection, pay raises and large scale public investments). Last, but not least, the leftist presidents came to power at the beginning of or during a mega-cycle commodity boom providing multi-billion dollar surpluses in export earnings and tax revenues with which to finance new inclusionary social programs.
Electoral Clientalized Politics, Social De-Mobilization and Extractive Partnerships
During the first years of the left governments, they kept the heat on the rightwing elites: defeating abortive coups, expelling intrusive US Ambassadors and US agencies and defeating the local US clients.
They moved on the legal front to consolidate political power by convoking constitutional assemblies to approve progressive constitutions. They attracted and built on the support from their new indigenous, popular and middle class constituents.
The constitutional changes reorganized new social alignments, especially the rights of indigenous people, but fell far short of serving as the basis for a change of property relations.
The left governments reinforced their dependence on agro-mineral exports by designing a growth strategy based on economic partnership with multi-nationals and agro-business plantation owners.
The rising prices of commodities on the world market led to increases in government revenues, public investment in infrastructure and expanded employment in the public sector. The left governments constructed large-scale patronage systems and clientelistic electoral machines, which ‘mobilized’ the masses on electoral and ceremonial occasions and for international forums.
International left academics and journalists were impressed by the left administrations’ fiery rhetoric supporting anti-imperialist, anti-neoliberal policies. Local and overseas pundits parroted the rhetoric about new forms of ‘socialism’, 21st century socialism in Ecuador and Venezuela and Andean socialism in Bolivia.
In actual practice long-term, large-scale contracts were signed with international giants like, Repsol, Monsanto, Jindel and scores of other imperial backed multi-nationals.
Big agro-exporters received credits, loans and technical aid while peasants and local producers received only the paper ‘land titles’ for their small holdings. No large-scale land distributions were undertaken. Landless peasants, who were engaged in land occupations, were forcibly evicted. Increased government spending on credit and technical assistance was channeled almost exclusively to large-scale soya, cattle, cotton and other agro-exporters, which increased rural class inequalities and exacerbated the decline of food security.
During the decade, militants became functionaries, who developed ties with business groups and began their own process of ‘social mobility’.
The agro-mineral export model raised incomes and reduced poverty but also accentuated inequalities between government functionaries and peasants and urban workers. The newly affluent, upwardly mobile middle class no longer flocked to hear ‘egalitarian rhetoric’. They sought security, pursued credit-financed consumerism and looked upward toward the wealthy elite for their role models and life style changes – rather than expressing solidarity with those left behind.
From Retreat to Defeat: Pragmatic Accommodation as a Formula for Neo-Liberal Restoration
The leaders’ anti-imperialist rhetoric was increasingly discounted by most people as it was contrasted with the large-scale inflow of capital and the contracts with multi-nationals.
The symbolic ‘gestures’ and local projects celebrated before large crowds were accepted but increasingly failed to compensate for the daily routines of centralized power and local corruption.
Over the decade the political cadres of the left governments rounded-up votes via electoral patronage favors, financed by bribes from contractors and illicit transfers of public funds.
Re-election bred complacency, arrogance and a sense of impunity. The perquisites of office were taken for granted by party leader but were perceived as unwarranted privileges by many working class and peasant voters.
The de-radicalization process at the top and middle levels of the left regimes led the lower classes to rely on individualistic, family and local solutions to their everyday problems.
With the demise of the commodity cycle, the broad coalition of workers, peasants, middle class and professional groups splintered. Many rejected the malfeasance of the left regimes as a betrayal of the promise of change.
Thus the popular sectors embraced the moralizing critique mounted by the right.
The retrograde radical right exploited discontent with the incumbents and played down or disguised their plans to reverse and undermine the employment and salary gains, pensions and family allowance gained over the decade.
The left governments stimulated the growth of extractive capitalism and converted their mass base into a passive recipient of regime reforms.
The unequal power between leaders and followers was tolerated as long as the incremental rewards continued to flow.
As classes rose in the social hierarchy they shed their leftist ideology born of crisis and looked to elite politicians as the new ‘modernizers’.
The left regimes encouraged a ‘dependency culture’ in which they competed for votes on the bases of growth, markets and patronage.
The left functionaries, unable to rise via the ‘closed’ agro-mineral sectors – under the control of the multi-nationals, turned to state corruption, extracting ‘commissions’ as intermediaries for the MNC, or simply absconding with public funds allocated for municipal health, education and infrastructure projects.
As a result, electoral promises were not kept. The corrupt practices were ignored by their elected leaders, deeply offending the popular electorate, who were disgusted by the spectacle of corrupt left politicians applauding radical rhetoric while raiding federal funds with impunity.
Party loyalty undermined any national political oversight of local politicians and functionaries. Disenchantment with the local functionaries spread up to the top. Popular leaders, who were repeatedly elected soon, were implicated or at least complicit in bribe-taking.
The end of the decade and the end of the commodity boom marked the twilight of idols. The left lost elections throughout the region.
The Kirchner-Fernandez regime was defeated in Argentina (2015).
The Lula-Rousseff regime faces indictment and impeachment in Brazil (2014-2016).
The Chavez-Maduro regime lost the legislative election in Venezuela (2015).
The Evo Morales regime lost the constitutional amendment allowing the president’s third term re-election in Bolivia (2016).
Is South America’s ‘Progressive Cycle’ at an End?
From Allende’s Chile to Chávez’s Venezuela : The Challenges of Advancing Toward Socialism
New Paths Toward 21st Century Socialism
Social Movements and Progressive Governments
|
<urn:uuid:6f1f568a-5c4f-402e-95f7-b6cc92e97c1c>
|
CC-MAIN-2017-26
|
https://libya360.wordpress.com/2016/03/04/twilight-of-the-idols-rise-and-fall-of-the-personalist-left/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323604.1/warc/CC-MAIN-20170628101910-20170628121910-00332.warc.gz
|
en
| 0.950259
| 1,835
| 2.65625
| 3
|
most common male-specific cancer. The choice of treatment and its
efficacy depends strongly on the stage of the cancer when it is diagnosed.
Screening procedures for males older than 30 years of age are well
established and begin with digital palpation and ultrasound imaging.
In case of a suspect result, further tests such as the blood level
of prostate specific antigen (PSA) test and biopsy are carried out.
However, only 80 percent of prostate cancers are diagnosed in the
By providing a more accurate and precise tool for diagnosing prostate
cancer in its early stages, the percentage of curable cancer patients
would increase dramatically. A lot of research work has attempted
to achieve this goal by using medical imaging with planar and computed
tomography, X-Ray systems or magnetic resonance imaging; yet the use
of these systems for screening and diagnosis is limited due to their
high costs and/or lack of sensitivity. Ultrasound
imaging systems are low-cost, but their effectiveness for prostate
cancer screening is limited by poor sensitivity and lack of molecular
specificity. A cost-efficient imaging technique with significantly
improved sensitivity and specificity would be extremely valuable.
to prove the concept of using optoacoustic imaging of gold-labelled
antibodies as an integrated biosensor based imaging system for the
production of specific and sensitive data for prostate cancer diagnoses.
of this objective requires excellent know-how on a variety of scientific
and technologic fields such as laser and ultrasound technologies and
image reconstruction, as well as the the bio-functionalization of
nanoparticles, system integration and experiments to evaluate the
application potential of the technique.
the project objectives, the partners of ADONIS, coming from five European
countries, are combining the necessary interdisciplinary know-how
in a jointly defined work programme, which comprises the development
and integration of the necessary laser and ultrasound transducer components
with bio-functionalized nanoparticles.
these contributing partners, the Institute of Cancer Research, will
experimentally evaluate the effectiveness of the developments during
the course of the project, feeding back results and comments in order
to optimize the technological components of the ADONIS system.
|
<urn:uuid:55de52d8-e6e1-4262-9bf4-f46e951782fd>
|
CC-MAIN-2017-26
|
http://fp6-adonis.net/ADONIS-Objectives.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323870.46/warc/CC-MAIN-20170629051817-20170629071817-00412.warc.gz
|
en
| 0.907995
| 459
| 2.59375
| 3
|
Contracts. A bill of exchange is defined to be an open letter of request from, and order by, one person on another, to pay a sum of money therein mentioned to a third person, on demand
, or at a future time therein specified. 2 Bl. Com. 466; Bayl. on Bills, 1; Chit. Bills, 1; 1 H. Bl. 586; 1 B. & P. 291, 654; Selw. N. P. 285. Leigh's N. P. 335; Byles on Bills, 1; 1 Bouv. Inst. n. 895.
2. The subject will be considered with reference, 1 . to the parties to a bill; 2. the form; 3. their different kinds 4. the endorsement and transfer; 5. the acceptance 6. the protest.
3. - §1. The parties to a bill of exchange are the drawer, (q. v.) or he who makes the order; the drawee, (q. v.) or the person to whom it is addressed; the acceptor, (q. v.) or he who accepts -the bill; the payee, (q. v.) or the party to whom, or in whose favor the bill is made. The endorser, (q. v.) is he who writes his name on the back of a bill; the endorsee, (q. v.) is one to whom a bill is transferred by endorsement; and the holder, (q. v.) is in general any one of the parties who is in possession of the bill, and entitled to receive the money therein mentioned.
4. Some of the parties are sometimes fictitious persons. When a bill is made payable to a fictitious person, and endorsed in the name of the fictitious payee
, it is in effect a bill to bearer, and a bona fide holder
, ignorant of that fact, may recover on it, against all prior parties, who were privy to the transaction. 2 H. Bl. 178, 288; 3 T. R. 174, 182, 481; 1 Camp. 130; 19 Ves. 311. In a case where the drawer and payee were fictitious persons, the acceptor was held liable to a bona fide holder. 10 B. & C. 468; S. C. 11 E. C. L. R. 116. Vide, as to parties to a bill, Chit. Bills, 15 to 76, (ed. of 1836.)
5. - §2. The form of the bill. 1. The general requisites of a bill of exchange, are, 1st. that it be in writing. R. T. Hardw. 2; 2 Stra. 955; 1 Pardess. 344-5.
6.- 2d. That it be for the payment of money, and not for the payment of merchandise. 5 T. R. 485; 3 Wils. 213; 2 Bla. Rep. 782; 1 Burr. 325; 1 Dowl. & Ry. N. P. C. 33; 1 Bibb's R. 502; 3 Marsh. (Kty.) R. 184; 6 Cowen, 108; 1 Caines, R. 381; 4 Mass. 245; 10 S. & R. 64; 14 Pet. R. 293; 1, M'Cord
, 115; 2 Nott & M'Cord, 519; 9 Watts, R. 102. But see
9 John. R. 120; and 19 John. R. 144, where it was held that a note payable in bank
bills was a good negotiable note.
7. - 3d. That the money be payable at all events, not depending on any contingency
, either with regard to the fund out of which payment is to be made, or the parties by or to whom payment is to be made. 8 Mod. 363; 4 Vin. Ab. 240, pl. 16; 1 Burr. 323; 4 Dougl. 9; 4 Ves. 372; Russ. & Ry. C. C. 193; 4 Wend. R. 576; 2 Barn. & Ald. 417.
8. - 2. The particular requisites of a bill of exchange. It is proper here to remark that no particular form or set of words is necessary to be adopted. An order " to deliver money," or a promise that " A B shall receive money," or a promise " to be accountable
" or " responsible" for it, have been severally
held to be sufficient for a bill or note. 2 Ld. Raym. 1396; 8 Mod, 364.
9. The several parts of a bill of exchange are, 1st. that it be properly dated as to place
10.- 2d. That it be properly dated as to the time of making. As the time a bill, becomes due is generally regulated by the time when it was made, the date of the instrument ought to be clearly expressed. Beawes, pl. 3 1 B . & C. 398; 2 Pardess. n. 333.
11. - 3d. The superscription of the sum for which the bill is payable is not indispensable, but if it be not mentioned in the bill, the superscription will aid. the omission. 2 East, P. C. 951.
12. - 4th. The time of payment ought to be expressed in the bill; if no time be mentioned, it is considered as payable on demand
. 7 T. R. 427; 2 Barn. & C. 157.
13. - 5th. Although it is proper for the drawer to name the place of payment, either in the body or subscription
of the bill, it is not essential; and it is the common practice for the drawer merely to write
the address of the drawee, without pointing out any, place of payment; in such case the bill is considered payable, and to be presented at the residence
of the drawee, where the bill was made, or to him personally any where. 2 Pardess. n. 337 10 B. & C. 4; Moody & M. 381; 4 Car. & Paine, 35. It is at the option of the drawer whether or not to prescribe
a particular place of payment, and make the payment there part of the contract. Beawes, pl. 8. The drawee, unless restricted by the drawer, may also fix
a place of payment by his acceptance. Chit. Bills, 172.
14. - 6th. There must be an order or request to pay and that must be a matter of right, and not of favor. Mood. & M. 171. But it seems that civility in the terms of request cannot alter the legal effect of the instrument. "il vous plair a de payer," is, in France, the proper language of a bill. Pailliet, Manuel de Droit
Francais, 841. The word pay is not indispensable, tor the word deliver is equally operative. Ld. Raym. 1397.
15. - 7th. Foreign bills of exchange consist, generally, of several parts; a party who has engaged to deliver a foreign bill
, is bound to deliver as many parts as may be requested. 2 Pardess. n. 342. The several parts of a bill of exchange are called a set; each part should contain a condition that it shall be paid, provided the others remain unpaid. Id. The whole set make but one bill.
16. - 8th. The bill ought to specify to whom it is to be paid. 2 Pardess. n. 338; 1 H. Bl. 608; Russ. & Ry. C. C. 195. When the name of the payee is in blank
, and the bill has been negotiated by endorsement, the holder may fill the blank
with his own name. 2 M. & S. 90; 4 Camp. 97. It may, however, be drawn payable to bearer, and then it is assignable by delivery. 3 Burr. 1526.
17. - 9th. To make a bill negotiable, it must be made payable to order, or bearer, or there must be other operative and equivlent words of transfer. Beawes, pl. 3; Selw. N. P. 303, n. 16; Salk. 133. if, however, it is not intended to make the bill negotiable, these words need not be inserted, and the instrument will, nevertheless, be valid as a bill of exchange. 6 T. R. 123; 6 Taunt. 328; Russ. & Ry. C. C. 300; 3 Caines' R. 137; 9 John. It. 217. In France, a bill must be made payable to order. Code de Com. art. 110; 2 Pardess. n. 339.
18. - 10th. The sum for which the bill is drawn, must be clearly expressed in the body of it, in writing at length. The sum must be fixed and certain, and not contingent. 2 Stark. R. 375. And it may be in the money
of any country. Payment of part of the bill, the residue
being unpaid, cannot be endorsed. The, contract is indivisible
, and the acceptor would thereby be compelled to make two payments instead of one. But when part of a bill has been paid the residue may be assigned, since then it becomes a contract for the residue only. 12 Mod. 213; 1 Salk. 65; Ld. Ray. 360.
19. - 11th. It is usual to insert the words, value received
, but it is. implied that every bill and endorsement has been made for value received
, as much as if it had been expressed in totidem verbis
. 3 M. & S. 352; Bayl. 40, n. 83.
20. - 12th. It is usual, when the drawer of the bill is debtor to the drawee, to insert in the bill these words: " and put it to my account but when the drawee, or the person to whom it is directed, is debtor to the drawer, then he inserts these words : "and put it to your account;" and, sometimes, where a third person is debtor to the drawee, it may be expressed thus: "and put it to the account of A B;" Marius, 27;. C, om. Dig. Merchant
, F 5; R. T. Hardw. 1, 2, 3; but it is altogether unnecessary to insert any of these words. 1 B. & C. 398; S. C. 8 E. C. L. R. 108.
21. - 13th. When the drawer is desirous to inform the drawee that he has drawn a bill, he inserts in it the words, "as per advice
;" but when he wishes the bill paid without any advice from him, he writes, "without further advice." In the former case the drawee is not authorized to pay the bill till he has received the advice; in the latter he may pay before he has received advice.
22. - 14th. The drawee must either subscribe
the bill, or, it seems, his name may be simply inserted in the body of the instrument. Beawes, pl. 3; Ld. Raym. 1376 1 Stra. 609.
23. - 15th. The bill being a letter of request from the maker to a third person, should be addressed to that person by the Christian name
, or by the full style
of their firm. 2 Pardess. n. 335 Beawes, pl. 3; Chit. Bills, 186, 7.
24. - 16th. The place of payment should be stated in the bill.
25. - 17th. As a matter of precaution, the drawer of a foreign bin may, in order to prevent expenses, require the holder to apply to a third person, named in the bill for that
purpose, when the drawee refuses to accept the bill. This requisition
is usually in these words, placed in a corner, under the drawee's address: " Au besoin
chez Messrs. - at -," in other words, ((In case of need apply to Messrs. at -. "
26. - 18th. The drawer may also add a request or direction, that in case the bill should not be honored by the drawee, it shall be returned without protest
or without expense, by subscribing the words, " retour sans protet
," or " sans frais
;" in. this case the omission of the holder to protest, having been induced by the drawer, he, and perhaps the indorsers, cannot resist
the payment on that account, and thus the expense is avoided. Chit. Bills, 188.
27. - 19th. The drawer may also limit the amount of damages, by making a memorandum
on the bill, that they shall be a definite
sum; as, for example: "In case of non-acceptance
or uon-payment, re-exchange and expenses not to, exceed dollars." Id.
28. - §3. Bills of, exchange are either foreign or inland. Foreign, when drawn by a person out of, on another in, the United States, or vice versa
; or by a person in a foreign country, on another person in another foreign country; or by a person in one state, on another in another of the United States. , 2 Pet. R. 589 .; 10 Pet. R. 572; 12 Pick. 483 15 Wend. 527; 3 Marsh. (Kty.) R. 488 1. Rep. Const.; Ct. 100 4 Leigh's R. 37 4 Wash
. C. C. Rep. 148; 1 Whart. Dig. tit. Bills of Exchange, pl. 78. But see 5 John. R. 384, where it is said by Van Ness, Justice, that a bill drawn in the United States, upon any place within the United States, is an inland bill.
29. An inland bill is one drawn by a person in a state, on another in the same state. The principal difference between foreign and inland bills is, that the former must be protested, and the latter need not. 6 Mod. 29; 2 B. & A. 656; Chit Bills, (ed. of 1836,) p. 14. The English rule requiring protest and notice of non-acceptance of foreign bills, has been adopted and followed as the true rule of mercantile law
, in the states of Massachusetts, Connecticut) New York, Maryland, and South Carolina. 3 Mass. Rep. 557; 1 Day's R. 11; 3 John. Rep. 202; 4 John. R. 144; 1 Bay's Rep. 468; 1 Harr. & John. 187. But the supreme court of the United States
, in Brown v. Berry, 3 Dall. R. 365, and in Clark v. Russel, cited in 6 Serg. & Rawle, 358, held, that in an action on a foreign bill of exchange
, after a protest for non-payment, protest for non-acceptance, or notice of non-acceptance need not be shown, inasmuch as they were not required by the custom of merchants
in this country; and those decisions have been followed in Pennsylvania. 6 Serg. & Rawle, 356. It becomes a little difficult, therefore, to know what is the true rule of the law-merchant in the United States, on this point, after such contrary decisions." 3 Kent's Com. 95. As to what will be considered a foreign or an inland bill, when part of the bill is made in one place and part in another, see 1 M. & S. 87; Gow. R. 56; S. c. 5 E. C. L. R. 460; 8 Taunt., 679; 4 E. C. L. R. 245; 5 Taunt. 529; 1 E. C. L. R. 179.
30. - §4. The endorsement. Vide articles Endorsement; Endorser; Endorsee.
31. - §5. The acceptance. Vide article, Acceptance.
32. - §6. The protest. Vide article, Protest. Vide, generally, Chitty on Bills; Bayley on Bills; Byles on Bills; Marius on Bills; Kyd on Bills; Cunningham on Bills; Pothier, h. t.; Pardess. Index, Lettre de Change
; 4 Vin. Ab. 238; Bac. Ab. Merchant and Merchandise, M.; Com. Digest
, Merchant; Dane's Ab. Index, h. t.; 1 Sup: to Ves. Jr. 86, 514; Smith on Mer. Law, Book 3, c. 1; Bouv. Inst. Index,.h. t.
|
<urn:uuid:877bb321-c422-4ddf-9e45-c0b4f44bebba>
|
CC-MAIN-2017-26
|
http://legaliq.com/Definition/Bill_Of_Exchange
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319933.33/warc/CC-MAIN-20170622234435-20170623014435-00051.warc.gz
|
en
| 0.926048
| 3,616
| 2.546875
| 3
|
E-Cigarettes Are No Safer, Study Shows
May 12, 2016 10:23 PM EDT
People get addicted on cigarettes and enjoy them up to the cigarette butt because of the nicotine craze. Although the nicotine doesn't promote lung cancer and diseases, it's the tar and other chemicals that do most of the damage.
A vigorous debate has been going on among public health officials if electronic cigarettes or e-cigarettes can reduce the dangers of smoking tobacco or id they should be dealt as negatively as conventional cigarettes. Countries such as Britain, authorities prefer e-cigarettes more, enticing smokers to transition to electronic from conventional.
The Food and Drug Administration issued last week new rules on e-cigarettes, prohibiting their sale to people less than 18 years of age and required adults under the age of 26 to present a photo identification to buy them, according to The New York Times.
Producers will be required to reveal the ingredients in the liquid nicotine used in "vaping" and permit government review on how the devices are manufactured before they can be sold to adults in the U.S.
Presently, anything could be concealed inside the liquid and isn't the only fact why children are not allowed to use e-cigarettes. Since it still contain nicotine which is an addictive ingredient associated to heart disease, it doesn't mean even without the carcinogenic tar and smoke it is already safe to use. Harmful substances are discovered in e-cigarette "juice" like the flavoring Diacetyl linked to lung diseases, as reported by timesunion.
While tobacco products are responsible for the huge majority of the exposures, e-cigarettes are held accountable for 14% of them. But what is most worrying is the increased scale at which most young children are exposed with e-cigarettes and the serious incidents compared to tobacco product exposures, the Medical News Today reported.
Nicotine is an impetus that exists naturally in tobacco plants affecting the heart and nervous system. Even so, being exposed to small amounts can be quickly fatal.
Studies showed that using e-cigarettes is still dangerous even without the tar or even the smoke especially if young children are exposed to it meaning it was ingested, inhaled or absorbed by eyes or skin. The nicotine found in juice and other ingredients can still do harm to everyone's health.
|
<urn:uuid:26d2eaa0-68e5-41f9-93ed-5b2f4a171e67>
|
CC-MAIN-2017-26
|
http://www.lawyerherald.com/articles/45071/20160512/e-cigarettes-safer-study-shows.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319933.33/warc/CC-MAIN-20170622234435-20170623014435-00051.warc.gz
|
en
| 0.950254
| 466
| 2.828125
| 3
|
Ancient Mesopotamia and West Asia
The storage essentials, including food in the Sumerian and Babylonian, were distributed in the gate of the city and palace. It was also carried out the sale of craft products in the Bazaar. Distribution system of irrigation type national decline soon, commercial of the Islamic world is to penetrate, food market in the region was also to serve as the Bazaar. Foreign trade for has been carried out separately from the regional market, but foreign market did not yet exist in Babylonia. Do not understand the market system of the Greeks, Cyrus II of later accused.
Ancient Greek, Hellenistic
In ancient Greek Police, Agora was also used as a market. Foreign market and regional market is divided, Agora regional market, Emporium was present in the foreign market. Cage is retailer that Kaperosu In Agora, who called Enporosu In Emporium have done the foreign trade. In addition, there is a market for the soldier expedition, had been made to dispose of the loot and supply to the army. Grain market as an international market for the first time a price change, Kureomenesu of Naukratis is a vassal of Alexander III has been run by the present, but this system was not handed down in ancient Rome.
In the 7th century, there is a regulated market of a kind, such as (one of mulberry after) Omonetokuwa and the city (Noichi paintings) Esako City Light and the city (Tsubaki-shi), Kawachi sea pomegranate City of Asuka in Japan I understood from the description of the "Chronicles" that was. In addition, from the "Topography", I understood that the city has been established from money previously issued at strategic points in the traffic and where farmers and fishermen such as Izumo countries 促戸 passed and Hitachi country Takahama to traffic.
In the ancient state, while referring to the system in China, was established a municipal organization by Seki Ordinance of Taiho Code. Regulatory agency that is placed Shitsukasa city is located in the east and west of the city, east and west of the city government-run has been operated in such Fujiwarakyo-Heijokyo Namba Kyo-Nagaokakyo-Heian-kyo. This regulated market open at noon, close to sunset, city Tsukasa has determined the price of goods. In addition, not only function as a commercial facility, it was also used as the location where you can honor the person who has success, punish the public a person who has committed the crime.
Commercial in a specific area other than that specified in the authorities had forbidden initially, but as the regular city by the city stand in a pre-defined day of the moon is formed in the places where people such as strategic points in the transportation gather with relaxation of Ritsuryosei became. Local market was born in the manor around the Kinki, peddlers were activities. "The Day of the eight" is often as (city date) market day, "Santoki city" (wild plants one) in many cases. If it is "the day of the eight", the city date stand is in 8, 18 and the 28th. The (Open City), is from morning till evening "Morning" and "evening city" time to open the city. Stalls was written with such Yomise, Night Market and evening city. The 15-6 century, six times a month "Rokutoki city" is born.
East-west city of Kansei decline with Ritsuryo nation, those who carry out the wholesale dealer from the city who settled appears to city, the wholesale market by wholesaler set is born. Which formed the seat, but the seat is dismantled by Rakuichi-Rakuza of the 16th century and later, Yuku divided into retail market and the central market of the castle town, militia in the market town for the residents around the country. While wholesaler gather in the middle market, the retail market, Friuli, Noichi, sell out, and stand selling was seen. Exclusive monopoly occurs in markets patronized by the wholesale market wholesale merchants flourished, was driven to the lords, especially in the early modern period. While subject to Kin'atsu, market Machikata Zaikata and became the responsibility of the residents is the buyer and the general brokerage (paid fish, Osamena) is paid for the market patronized by this.
The old city, Gojome (Akita Minamiakita County), Yokote (Yokote City, Akita Prefecture), Atsumi (thickness, Yamagata Prefecture Nishitagawa County), Rikuzentakata (Iwate Prefecture Rikuzentakata), Otaki (Chiba Isumi), Katsuura (Katsuura, Chiba Prefecture), Takayama (Takayama, Gifu Prefecture), Wajima (Wajima, Ishikawa Prefecture), tin (tin, Ishikawa Prefecture Suzu) Echizen Ono (such as Fukui Prefecture Ono City) is traced back to the Edo period. In addition, remnants of the past can be seen in the name formerly Shiga Yokaichi City (Genhigashi Omi City) and Yokkaichi, Mie Prefecture, Hiroshima Prefecture Hatsukaichi, such as the former Chiba Prefecture Youkaichiba City (now Sosa City).
|
<urn:uuid:3b706344-a67b-469f-bc6e-d35cd488edc8>
|
CC-MAIN-2017-26
|
http://thelittleshopgirl.blogspot.com/2014/10/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320130.7/warc/CC-MAIN-20170623184505-20170623204505-00132.warc.gz
|
en
| 0.968601
| 1,160
| 2.78125
| 3
|
3. This Argument Doesn't Hold Up
A derecho is a somewhat common weather event. In fact the phenomenon was identified and given a name way back in the 1880s. And as for the recent heat wave, yes it's hot. But it pales in comparison to the most severe heat wave to hit North America in modern history, the 1936 North American Heat Wave, which hit in the middle of the Great Depression and the Dust Bowl of the 1930s. Incidentally, the 1936 North American Heat Wave followed one of the coldest winters on record at the time -- a six-month weather swing far more extreme than what North America has seen over the last six months.
— Matthew Sheffield, creator of NewsBusters and president of Dialog New Media
Katherine Burger is Editorial Director of Bank Systems & Technology and Insurance & Technology, members of UBM TechWeb's InformationWeek Financial Services. She assumed leadership of Bank Systems & Technology in 2003 and of Insurance & Technology in 1991. In addition to ... View Full Bio
|
<urn:uuid:f02a1c45-5221-4b65-b9cc-903a504d05e1>
|
CC-MAIN-2017-26
|
http://www.insurancetech.com/data-and-analytics/extreme-weather-in-the-us-is-it-climate-change-or-a-historical-pattern/d/d-id/1313801?page_number=3
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320130.7/warc/CC-MAIN-20170623184505-20170623204505-00132.warc.gz
|
en
| 0.903324
| 208
| 2.6875
| 3
|
Spruce plywood is a type of wood that fits into the SPF (Spruce, Pine, Fir) class. It is also commonly known as “Whitewood” and tends to be very light in color. Of course, this depends on the exact species of Spruce being used, but in general it is a very lightly colored wood.
Furthermore, Spruce plywood is known to be both lighter and softer compared to many other types of plywood, although it is harder than pine. However, this wood can work well for basic construction purposes, but only if used in the correct situations.
Again, Spruce plywood is often used in basic construction projects. This includes boat hulls, ladders, oars, drywall framing, etc. However, some of these situations can get a bit tricky for reasons that will be discussed in the next section.
Secondly, people often use Spruce wood or plywood to make instruments. In fact, it is one of the more recommended types of plywood in instrument construction because of its acoustical properties. It may be referred as tonewood, but tonewood is actually any type of wood used to make musical instruments. It has been proven to be great in making instruments sound good; examples of instruments that are built with this type of plywood include guitars, violins, pianos, mandolins, cellos, and various soundboards. Lastly, Spruce plywood is very often used to make specialized wooden aircraft panel, because of a great strength to weight ratio. In fact, the Wright Brothers’ first aircraft was made from Spruce.
Once again, Spruce is often used in making boats and their accessories (oars, paddles, etc.). However, this type of plywood has very little decay resistant qualities. This means that, exposed to harsh weather conditions or water, this type of wood cannot be expected to last more than one to one and a half years before cracking, splitting, or rotting.
Spruce plywood is also not recommended for any other type of outdoor use either. Not only does it stand up poorly to weather and water, but it also has very little resistance to insects, unlike the cedar plywood. This is also why Spruce tends to rot and decay easily. It is also not suggested for outdoor usage because of its susceptibility to heat as well as moisture and insects. This type of wood can burn easily under the right conditions. It also has a tendency to swell easily, which makes it susceptible to further damage to plywood, like splitting.
However, because it is so light weight, easy to work with, and versatile in its uses, Spruce is a great type of plywood to use as long as the person plans on treating it right. Furthermore, as long as a person can avoid the conditions listed above, they well do just fine. Kept indoors, it can last a long time and provide excellent service in many different projects (ex. musical instruments, construction basics like flooring, dry wall, etc.).
Spruce is very easy to get a hold of, as it grows in many different places throughout the world, including North America, Asia, Europe, etc. Purchases can be made at any local hardware store, although it may be called something other than just straight “Spruce plywood”.
|
<urn:uuid:57f0287b-990a-42ab-8170-87a7a9c9e421>
|
CC-MAIN-2017-26
|
http://theplywood.com/spruce
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320476.39/warc/CC-MAIN-20170625083108-20170625103108-00292.warc.gz
|
en
| 0.972343
| 687
| 3.3125
| 3
|
|Jacob Fattal, Publisher |
The current global focus on generating renewable energy has continually focused a spotlight on the problem of storing it. Battery technology lags far behind semiconductor development, and in fact has not advanced significantly in decades. The potential benefits are many. According to the journal Energy and Environmental Science, the reduction of air pollution from the burning of fossil fuels would save the U.S. hundreds of billions of dollars annually in associated public health costs alone.
Renewable energy — solar, wind, hydroelectric, geothermal — all require an efficient system of storage that can smooth their output when the source is irregular; at night, a solar-powered home relies on a backup system of batteries, or a connection to the power grid. Current battery backup technology, such as Tesla's Powerwall, a modified version of the lithium ion batteries installed in the company's cars, are simply cobbled-together assortments of the batteries found in our laptops and smartphones.
So far, lithium ion technology, although vastly better than the old nickel-cadmium batteries, has not proven effective enough for large-scale use. And because lithium is so volatile, there's always the danger of fire. For the amount of power generated by a field of wind turbines, other solutions are needed. Ingenious systems are being used today, though they are far from perfect and are at best, terribly inefficient. Besides electrochemical storage, energy is stored mechanically in flywheels, in underground basalt formations full of compressed air, and in water pumped from a low reservoir to a higher one, which is then allowed to run back down through a hydro turbine generator.
These systems, while seemingly simplistic, still cost roughly twice as much money to store energy than the actual cost of delivered power. It seems that the world of energy storage has been hamstrung, waiting for the next development to appear. Certainly there are teams of people working on batteries, many universities in the U.S. have created wildly futuristic contraptions, such as lithium-air batteries from Dallas University, or gold nanowire batteries from the University of California Irvine. Earlier this year, scientists at Pohang University in South Korea even developed a stainless steel battery with a thin-film electrolyte, which promises to keep a smartphone charged for a week at a time.
These incremental steps in battery technology, however, are not full-scale solutions to our dilemma of storing what we generate from renewable energy sources. As Tesla completes its Gigafactory in Nevada and begins to produce more lithium ion batteries in a year than the entire world produced in 2013, I am reminded of the company's namesake, Nikola Tesla, the father of hydroelectric power, and wonder whether he would think the extravagant factory a leap forward, or a shocking example of excess.
|
<urn:uuid:34fb48b5-59f0-4202-8a4c-d2ba0c874988>
|
CC-MAIN-2017-26
|
http://us-tech.com/RelId/1608350/ISvars/default/Storage_Renewable_Energy_s_Achilles_Heel.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320476.39/warc/CC-MAIN-20170625083108-20170625103108-00292.warc.gz
|
en
| 0.945104
| 572
| 3.75
| 4
|
Thailand: Teens' Unsafe Sex Biggest AIDS Threat
June 14, 2006
UNAIDS' latest report placed Thailand among countries that had made significant progress in controlling the spread of HIV/AIDS. However, according to AIDS task force member Sureerat Treemanka, "Teens are a new risk group." She said as many as 30,000 Thais contract HIV each year, many of them teens. Sureerat said the social trend toward "free sex" had not been accompanied by education about responsible sex, and teens' attitudes could lead to risky behavior.
As many as 700,000 Thais could have HIV/AIDS, but most do not know it, experts say. Sureerat estimates around 200,000 know they are infected. About half have access to medicines through the universal health care system. However, during a period of transition in the system's implementation, some hospitals are reluctant to provide HIV/AIDS services. Sureerat said hospitals are worried they will not be paid for such treatment while oversight of the program moves from the Public Health Ministry's AIDS office to the Office of Universal Healthcare.
Although the situation in Thailand may appear to be improving compared with other countries, Sureerat said the epidemic has become more complex. "Our problem is how to deal with people who are living with HIV/AIDS," she noted.
Charin Khonman of Wat Phrabaht Namphu, a temple serving as an AIDS hospice, estimated that three of every 10 Thais with HIV/AIDS keep it a secret, and one in 10 seeks proper medical treatment.
Sureerat said a new AIDS-awareness program run by youth for youth is needed to slow the epidemic, and Thai society will remain vulnerable to the virus until it accepts the importance of safe sex. "We need to accept various kinds of sexual relationships, including those outside marriage, but they must be safe," Sureerat said.
The Nation (Bangkok)
This article was provided by CDC National Prevention Information Network. It is a part of the publication CDC HIV/Hepatitis/STD/TB Prevention News Update.
|
<urn:uuid:669fb68d-dbf2-4507-a77e-aa6660d81740>
|
CC-MAIN-2017-26
|
http://www.thebody.com/content/art23662.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320476.39/warc/CC-MAIN-20170625083108-20170625103108-00292.warc.gz
|
en
| 0.969317
| 437
| 2.5625
| 3
|
Today’s SPECIAL WEEKEND EDITION comes from Nicola Martin, a third-year, AHRC-funded Ph.D. candidate at the University of Dundee and the University of Stirling. Nicola holds a B.A. and MSc. from the University of Strathclyde, and is currently working with Colin Nicolson and Matthew Ward. Her dissertation is tentatively titled “The Cultural Paradigms of British Imperialism in the Militarisation of Scotland and North America, 1715–1776.” Her research investigates how warfare and pacification affected eighteenth-century British imperialism, and she can be found @NicolaMartin14. This is her first post for The Junto, a fitting occasion—it commemorates the Battle of Culloden (April 16, 1745).
On April 16, 1746, the British army defeated its much smaller Jacobite counterpart in a battle on Culloden Moor, Scotland. The conflict lasted less than half an hour, but it left over 1,500 Jacobites dead. In the days and weeks following the battle, hundreds of Highlanders were killed as the British army, under the orders of the Duke of Cumberland, implemented draconian measures to punish those who they held responsible for the rising. Shortly thereafter, the British imperial elite embarked on a systematic pacification of the region that lasted for decades and evolved over time from punishment toward measures designed to civilize the “barbarous” Highlanders and assimilate them more closely within the British state and empire. Continue reading
|
<urn:uuid:cb45310d-d7fe-4588-b23a-f48420390e41>
|
CC-MAIN-2017-26
|
https://earlyamericanists.com/tag/scottish-history/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320476.39/warc/CC-MAIN-20170625083108-20170625103108-00292.warc.gz
|
en
| 0.945679
| 315
| 2.9375
| 3
|
Quality of life is the third topic that must be reviewed to analyze a problem in clinical ethics. The idea of quality of life is difficult to define. However, it is often raised in complex cases and must be addressed. This chapter is devoted to explaining the concept of quality of life, analyzing its implications for clinical decisions, and suggesting certain distinctions and cautions that should be observed in discussing this concept in clinical care. The chapter also reviews in detail an area of clinical care in which quality-of-life considerations often loom large, namely, end-of-life care, including termination of life-support and physician-assisted dying.
The Ethical Principle of Beneficence as Satisfaction
No single ethical principle predominates in this discussion of quality of life. Both principles that we have discussed in the prior topics, namely, Beneficence and Respect for Autonomy, are relevant to this topic. However, we may select one particular aspect of the Principle of Beneficence as most relevant to this discussion about Quality of Life. In Chapter One, we limited the very broad idea of Beneficence to one of its implications, namely, as a moral principle that directs persons to help others in need. In medicine that need arises from deficits in health, and the actions are those that correct those deficits and support the patient. In this topic, we focus on another aspect of the Principle of Beneficence, namely, acting in ways that bring satisfaction to other persons. Many moral philosophers have taken satisfaction or happiness as a significant element of beneficence. We propose that it is particularly relevant to clinical decisions. One significant feature of all medical interventions is the aim to produce a state of satisfaction for the patient who has sought treatment. He or she is not only made well, but feels well. Quality of life, then, refers to that degree of satisfaction that people experience and value about their lives as a whole, and in its particular aspects, such as physical health. The ethical dimensions of any case in clinical medicine must include not only appropriateness of interventions (Beneficence as Help) and respect for the patient's preferences (Autonomy), but also the improvement of quality of life (Beneficence as Satisfaction). When medical care fails to do so, ethical problems will arise, as this topic will demonstrate.
Beauchamp TL, Childress JM. Utilitarianism. In: Beauchamp TL, Childress JF, eds. Principles of Biomedical Ethics. 6th ed. New York, NY: Oxford University Press; 2009:336–343.
Meaning of Quality of Life
When defined as a state of satisfaction, quality of life expresses a value judgment: the experience of living, as a whole or in some aspect, is judged to be good or bad, better or worse. In recent years, efforts have been made to develop measures of quality of life that can be used to give some empirical basis to this value judgment and to evaluate outcomes of clinical interventions. ...
|
<urn:uuid:58f70ca1-635a-43d9-bd5a-36940050756c>
|
CC-MAIN-2017-26
|
http://accesspharmacy.mhmedical.com/content.aspx?bookid=364§ionid=39900121
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320669.83/warc/CC-MAIN-20170626032235-20170626052235-00372.warc.gz
|
en
| 0.956257
| 608
| 3.09375
| 3
|
Though your teeth look and feel like a hard surface, they are actually quite porous, full of thousands of tubules that can absorb all kinds of bacteria and acids. These toxic little critters can cause all kinds of odors and decay – leading to bad breath and cavities.
Don’t stop eating the foods you love – just take a few extra steps to protect your teeth from your food! One of the simplest things you can do is to drink water with your meals. This helps wash away any food residue. Brush your teeth at least twice a day, and floss at least once a day to get all the particles out from between the teeth and from the gumline.
And of course, make regular appointments with your dental hygienist. Dental Hygienists have a two year degree in keeping your teeth clean and healthy, and they LOVE to help their patients.The hygienists here at Valley Dental Group, here
in Selinsgrove, PA have over 30 years of combined experience! A dental prophylaxis (cleaning) will take about 40 minutes,and will include diagnostic x-rays, a thorough cleaning, and a full exam. You’ll also get tons of advice, and a “goody”bag – even a sticker if you ask 🙂
|
<urn:uuid:244714d0-bda4-43e4-9ed6-f496e3813a36>
|
CC-MAIN-2017-26
|
https://valleydentalgroup.wordpress.com/2017/01/31/blog-post-title/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320669.83/warc/CC-MAIN-20170626032235-20170626052235-00372.warc.gz
|
en
| 0.94803
| 271
| 2.796875
| 3
|
YOU can save on your water mater and help the environment - read on to find out more.
Lynne Le Conte, SKDC grounds maintenance co-ordinator and nature expert, says:
“I’ve been reading about ‘gre water’ on the Environment Agency website and was amazed how much information is available about this ‘untapped’ (excuse the pun) and readily available resource.
Anyone with a property on a water meter who wants to save money should visit the Environment Agency website.
And if you have a garden or patio pots, you can do your bit for recycling too. And why not take a tour on the Energy Saving Trust website? They have a water energy calculator and water saving tips. See what you could save.
So, to start with, what is grey water and how can we use it?
Grey water can be waste water from all sources within our properties other than toilets. The water from baths, showers and wash basins is less contaminated that that from the kitchen.
My neighbour also gave me a good tip - she keeps a two-litre water container in her bathroom and when she runs the hot tap collects the cold water that always precedes it and uses that to water houseplants or the pots on her patio.
It may seem extreme, but add up how many litres of useful water have been saved instead of going straight down the plug hole and it makes perfect sense.
Not to mention that the pennies saved by someone on a water meter soon add up, too.
Just adding a very simple diversion system to divert cooled, untreated bath water to irrigate the garden is another idea - not storing the water but using it immediately on non-edibles.
Problems may occur if the water is stored and it gets warm. This creates ideal conditions to incubate bacteria.
Remember that soaps contain nitrogen and phosphorus, so this will affect the amount of plant food/fertiliser required and one with lower ratios should be selected to maintain the correct balance.
Likewise, it’s worth remembering that grey water tends to be alkaline and collected rainwater acid. So get to know the conditions that your plants need to thrive and organise your garden/greenhouse accordingly.
Other systems typically used in the domestic environment collect grey water and store it before re-using it to flush the toilet while more advanced systems treat grey water that it is claimed can be used in washing machines and the garden. Systems for flushing the toilet can save around a third of daily household water demands and a trial by the Environment Agency showed a range of water savings from about five per cent to 36 per cent.
So the potential water savings from a specified, well maintained, correctly-installed and fully operational grey
water system are huge and could potentially save up to a third of the water used in a typical domestic property.
The knock-on effect of that would reduce the pressure on our water resources.
Of course we shouldn’t forget the humble water butt, used to collect and store rainwater to use on the garden, especially edible crops. Or top up the fish pond when we have times of drought.
Increase storage by connecting several butts together or, if room allows, by using one of the larger storage butts available.
Follow the manufacturer’s installation instructions and install butts in such a way that they cannot topple over. Water butts need no special treatment or mains back-up. And it may surprise you - depending on your roof size and its pitch - how much water can be collected this way.
Water butts can be fitted to every downpipe from your house, shed, garage or greenhouse. Lots of us have our greenhouses away from the house or a direct mains tap and a water butt in that location also saves having to drag the hosepipe or carrying watering cans, so can also save time too.
While the Environment Agency website is a great place to look for water-saving ideas, I also took the opportunity to speak to an officer at the office in Lincoln.
Here’s what Dominic Freestone, environment management team leader, had to say on the subject: “Making use of grey water is a win-win. It can help people to save money and helps the environment.
“For example, cold water which comes from the hot tap before it warms up and goes straight down the plughole goes to a sewage treatment works. Collecting it in a bottle and using it on the garden saves the energy it would take to treat it.
“Using grey water also means using less fresh water that has been treated for drinking – something that isn’t needed when using it to water plants.”
It should be noted there are more expensive options also discussed which would benefit large communal domestic or commercial developments where the economics of the systems may be better.
A lot of information is available from the Environment Agency website at www.environment-agency.gov.uk and by following the links.
If you need further information, you could call them on 03708 506 506 or see the Energy Saving Trust website at www.energysavingtrust.org.uk/Water/
|
<urn:uuid:70430ce2-8955-4f3d-adab-5e8b5cd8a7bb>
|
CC-MAIN-2017-26
|
http://www.granthamjournal.co.uk/news/environment/naturewatch-with-lynne-le-conte-1-2750991
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00532.warc.gz
|
en
| 0.939753
| 1,075
| 2.890625
| 3
|
I blinked in surprise when my Philosophy professor posed this question in our first ever class. I looked around and saw that most students were equally puzzled. I mean, everyone knows what education is right? What kind of a question is that to start a Master’s program?! But, by the end of those 2 hours, I realised I was mistaken.
That question was the perfect start to the whole program: What really is education? Is it a product, measured by the student achievement level? A service? A process?
[Tweet “I am still in the process of defining what education is to me. On the other hand, I do know what it isn’t!”]
Charlotte Mason (1842 –1923) said, “Education is an atmosphere, a discipline, a life”. This definition rings true to most parents. Not many would dispute that every parent, whether deliberately or unintentionally, creates an environment where a child can learn and thrive.
In the 21st century, education has come to mean different things to different people. I’ve compiled a very brief list of the many definitions:.
“Education involves essentially processes which intentionally transmit what is valuable in an intelligible and voluntary manner and which create in the learner a desire to achieve it, this been seen to have its place along with other things in life”- R.S. Peters
“Education is the kindling of a flame, not the filling of a vessel- Socrates.
“There is no end to education. It is not that you read a book, pass an exam and finish with education. From the moment you were born to the moment you die, it is a process of learning”- Jiddu Krishnamoorthy.
On the one hand, I am still in the process of defining what education is to me. On the other, I do know what it isn’t and know enough to resist succumbing to common misconceptions.
The first among them is…
A pattern of reasoning which dominates the current educational system is: My child gets 90%(or more) in annual exams every year and because marks are a good indicator of learning, s/he is getting a superlative education. Let me attempt to debunk this reasoning.
Firstly, although a test measures what one knows at a certain point in time, knowledge of a topic is highly dependent on how a test is constructed. In other words, what is the test actually testing?
Secondly, high marks need not necessarily lead to a person being educated. Because performing excellently on a test requires 2 conditions: test taking and study skills. If both the 2 conditions are not fulfilled, performance tanks.
Focussing excessively on high marks will possibly lead to academic burn out in your child. I say possibly because I accept that there are children who enjoy a competitive environment. I also acknowledge that there are just as many (if not more) students who have test anxiety and under perform. Most children seek validation of their learning and sometimes their personal worth from teachers, parents, and their test marks. You can probably see how this external validation seeking can be dangerous in the long run.
An assessment is meant to be a snapshot of a performance on a particular day.
As a parent, you are in an enviable position of influence over your child. (Don’t believe parents who claim to have no influence over their children!)
What do you focus on? What do you not focus on? Do you scold when your child gets low marks? Do you praise them when they get good marks? Do you ask “Who got the highest”? Do you expect your child to study every day? Do you answer all your child’s questions? How do you encourage curiosity? Do you question (or not) their teachers during a PTM?
Are you, the parent, through everyday micro interactions and with the child’s best intentions at heart, telling your child (ren) that a good or great performance in school (and college) is education?
That school and college is his/her fate is determined?
Almost all Indian parents from the so-called middle and upper classes are having similar conversations with their children. Is it any surprise that our current society is intensely competitive and performance focussed and where students commit suicide because they have failed or disappointed their parents?
What about the situation where the parent is not performance focussed but the school is?
When my daughter comes home with 10/10, I say “Looks like the test was easy for you” “I suppose the test content was not something you were familiar with”, when she comes with 5/10.
The premise behind those statements is to remind children (as well as ourselves) that an assessment is meant to be a snapshot of a performance on a particular day. The purpose of a test is to inform the teacher as well as student of how well the child is learning what she/he’s supposed to learn; to revise teaching strategies and change study habits.
Knowing what you know now, and assuming that most parents want to inculcate a lifelong love for learning in their children, how are you going to approach the all- consuming ‘performance’ and ‘marks’ focus in society today? Maybe it begins by recognizing that education does not end at a poor performance on a test in school. This brings me to my second point…
That’s right. Most schools with a certain student demographic base will do a satisfactory job of teaching your children.
So, why do parent place an undue importance on where the child goes to school? As long as the child is in a safe environment, teachers are more or less friendly, and the curriculum is engaging, one would think that schooling would not take too much of our mind space, right?
Most parents agonise over choosing a school. Firstly because of the enormity of school choice faced by our generation of parents. There are elite private schools charging over 14 lakhs a year, next layer is upper- mid range schools anywhere from Rs 3 to 10 lakhs. The mid-range will set you back by Rs 1-3 lakhs. Then come the chain schools or so-called public schools with fees in Rs 80,000-1 lakh range. The lower income group also has a choice of schools costing anywhere between Rs.1000 to Rs.30,000 annually.(My domestic help’s children go to one such Low fee private school)
Second, because parents are misinformed about the actual effect of schooling on a child’s future. These parents are under the assumption that a good school leads to a better ‘quality’ education. (Recognise that both the italicised words are highly subjective and have multiple interpretations.)
Do schools make a difference?
But, most schools, assuming some uniformity in resources, have negligible impact on student achievement or learning outcomes. I’ll explain why…
“Schools make no difference; families make the difference.” – (Adam Gamoran, Daniel A Long, 2006)
In the mid-1960s, about the time when Dr. Kothari and his team of eminent academicians, scientists, economists (Kothari commission) were busy drawing up a report( The report was based on democratic principles of social justice, equality and opportunity and is most famous for recommending a ‘common school system’ to ensure a more egalitarian society) on the education system in India on the behest of the then Education Minister- M.C. Chagla; The then U.S. Commissioner of education Harold Howe asked professor James Coleman from John Hopkins University to do the same. The aim of the study was to answer a question: “Which strategy was more likely to equalize educational opportunities for poor minority students-compensatory education or racial integration”
Family background is more powerful than which school the child goes to.
The report was titled Equality of Opportunity and findings of the almost 800 page report have been summed up insightfully in a single line quoted above.
The implications of the controversial Coleman Report( Controversial because, up until the Coleman report, the widely accepted belief to equalise educational opportunity was to pour resources into schools.) crushed the long held belief that school quality is tied to achievement. It demonstrated a strong correlation between the family background and student achievement.
Putting aside student achievement, the point I’m trying to make is that the family background is more powerful than which school the child goes to.
What did the report mean by family background? It could be interpreted as a complex system of values, beliefs, habits and practices. In short, the family ‘culture’.
Culture is a fluid concept, it is constantly in flux, reinforced and moulded every time humans interact. In a family unit, the parents determine, reinforce or shape the family culture.
What is the dominant culture in society and schooling at present? -An excessive focus on ‘marks’ and ‘performance’. The aim of becoming a ‘rank holder’ encourages super achievement. Children get categorised into winners and losers. I propose that it is time to reculture these binary notions.
Reculturation, as the prefix implies, is a process of re-establishing the culture in a unit. Be it a family, school, community or an organisation. Fullan (2001) calls it as ‘transforming the culture…changing the way we do things..”
And this reculturation can only come through changing my own belief system. It begins with me challenging those taken for granted, hegemonic norms in society about ‘achievement’ and ‘success’. When what I believe goes through a paradigm shift, it has a ripple effect. Every single conversation with daughter, husband, family and friends undergoes a change. It is easy to underestimate the effect of changing one’s beliefs because it seems insignificant in the larger scheme of things.
Yet, Gandhi had it right. Be the change you wish to see.
Preeti Konaje is an inquirer at heart. In her past avatars, Preeti has been a copywriter, baker, event manager, homeschooler and tutor. Now, we can add educator and teacher to that mix. She is currently pursuing the ‘Master of Education’ program from Azim Premji University.
|
<urn:uuid:ba63cc97-edea-450e-96c6-cf4a94ca7f2e>
|
CC-MAIN-2017-26
|
https://www.kidskintha.com/the-conundrum-called-education/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00532.warc.gz
|
en
| 0.964269
| 2,167
| 2.671875
| 3
|
Most people know various corvid species by their common names but have you ever wondered what etymologies inform their scientific names? Turns out it’s a pretty fun little exercise to find out!
Before we get to breaking down individual corvids though, a quick word on scientific names more generally. Scientific names always have the format: Genus species. Meaning, the first word in the name tells you what genus the plant/animal belongs to and the second tells you the species name specific to that organism. So for example crows, rooks, jackdaws and ravens are all in the same genus so their scientific names will all start with the same word: Corvus. The second word, however, will be unique to each species. This system of binomial nomenclature was first developed by Carl Linnaeus in the 1700’s. By looking up the roots of an animal’s scientific name we can learn a thing or two about what he, (or whoever named it) was trying to highlight. Then again, sometimes they’re just fans of Beyoncé or Jonny Cash.
One more note: although scientific names are often referred to, informally, as Latin names, their roots may actually pull from many languages. Though by far the most common languages are Latin and Greek.
As it happens, I have an old book of root words I inherited from my late grandfather, Richard Swift. Something about having that book in my hands begged for this exploration in a way that having the breadth of the Internet at my fingertips never did. What can I say, a childhood spent in the library of my grandfather’s office has made me a sucker for old, smelly books. So let’s get started!
Common raven: Corvus corax
Common ravens are the biggest of the corvids (and in fact, the biggest of all the songbirds) so it makes sense their name might be the yardstick by which other corvids are measured. Cora literally translates to “crow, raven” so the common raven’s scientific name essentially just means raven.
American crow: Corvus brachyrhynchos
Turning to American crows, we can see that yardstick I mentioned coming into play. Brachy means “short” and rhynch means “a beak or snout.” So the American crow’s full scientific name basically translates to the “short-beaked crow.”
Jungle crow: Corvus macrorhynchos
At this point, the meaning of the jungle crow’s name probably needs no explanation. The bird looks essentially like an American crow but with a more pronounced bill. Macr rhynch = large beak.
Pied crow: Corvus albus
Alb means “white.” No mystery here.
House crow: Corvus splendens
Splen means “a badge or patch.” With grey sweater they sport, it’s likely the person who named them was trying to highlight this physical distinction.
Thick-billed raven: Corvus crassirostris
Sometimes, scientific names are precisely their common names. Such is the case here. Crass means “thick” and rostr means “beak.” This is a good example of where we see different languages influencing the names. In this case, thick-billed ravens got the Latin root, whereas American and jungle crows got the Greek root for beak.
Rook: Corvus frugilegus
This one is less clear to me. Frugi means “useful, fit” and legus means “lie down; choose; or collect” depending on what language you pull from. My guess is it’s supposed to be ‘collect’ and the name refers to the more specialized bill they have for collecting insects.
The grey crow: Corvus tristis
Trist means “mournful; sad.” I have a feeling I know the backstory for this one but I’ll leave it to my readers to see if they can figure it out. Leave me your best explanation (made up or researched) in the comments!
|
<urn:uuid:59dcaf99-e0ac-4491-a557-949cd9e3b9f1>
|
CC-MAIN-2017-26
|
https://corvidresearch.blog/2017/03/05/whats-in-a-corvid-name/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323680.18/warc/CC-MAIN-20170628120308-20170628140308-00612.warc.gz
|
en
| 0.936989
| 906
| 3.671875
| 4
|
- Capital Gains
This is when a share's selling price exceeds its initial purchase price. If the selling price falls beyond the purchase price, you would make a capital loss. Capital Gains are free of tax.
A company may decide to payout a portion of its earnings to shareholders. But companies are not required to pay dividends.
- Rights Issues
The company may extend this privilege to existing shareholders to buy shares at a specified and usually discounted price, usually in proportion to the number of shares already owned.
- Distribution by the company
Shares shall be offered to the holders of existing shares in a manner which would, if the offer was accepted, maintain the relative voting and distribution rights of those shareholders.
Shares quoted on a stock market are generally liquid. Therefore, they can be sold easily and you can get your money back in a few days.
- Higher Returns
In the longer term, shares have ensured a higher return to investors.
- Hedge against inflationShares are a good investment in an inflationary environment, since share prices increase to protect investors from the effects of inflation.
You may also use your shares as collateral against loan facilities to banks.
Saturday, October 10, 2009
Why we should invest in Shares?
Let's see what are the benefits of Investing in Equity
|
<urn:uuid:6957b8c4-d2d8-4896-b545-ad7c2cc14545>
|
CC-MAIN-2017-26
|
http://cse-lk.blogspot.com/2009/10/why-we-should-invest-in-shares.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00331.warc.gz
|
en
| 0.94459
| 265
| 2.6875
| 3
|
Continuing on antiviral drugs...
While viruses have fewer targets for drugs due to their smaller number of gene products, there are still many targets for potential drugs. Processes such as viral attachment, absorption, fusion, replication, transcription, translation, assmebly, anf virion release are a few such targets.
Entry inhibitors: One particularly effective drug target is that of virus entry into the cell. If the virus cannot enter a cell, then it canont cause an infection. One example is TAK799, a drug that blocks the HIV gp120 protein from attaching to the CCR5 co-receptor on T-cells. This prevents viral fusion, effectively blocking the entry of the virus. Other examples are Heparin and dextran sulfate, which are effective against many viruses, and Amantadine, which is used against influenza (specifically, it blocks the action of the M2 ion pump, thereby preventing the pH change in the endosome, resulting in the virion being trapped).
Replication inhibitors: Inhibiting viral replication is a favoured target of antiviral drugs. Most of the replication inhibitors are analogues of nucleosides, and are also chain terminators. They can be acyclic GTP analogues, acyclic nucleoside phosphonates, dideoxynucleotides, and pyrophosphate analogues. There are some non-nucleoside inhibitors as well. A well known example is that of Lamivudine which is given for Hepatitis B and HIV. Also known as 3TC, it has a sulphur at the 3' carbon instead of a hydroxyl group. This means that the growing DNA chain cannot be extended and elongation is terminated. It is only incorporated by reverse transcriptase, and not by cellular replication machinery, giving it specificity for infected cells.
Usully the mechanism by which replication inhibitors work is complex. First the drug is activated by the viral thymidine kinase enzyme, and then is selectively use by the viral replication machinery. This means that specificity is dependand upon two factors: that cellular kinases do not recognize it as a substrate, and that the cellular replication machinery does not use it as a valid nucleoside. Strains which are resistant, then, can have mutations in two different aspects.
Non-nucleoside analogue inhibitors work by some other method. They may affect the binding of a nucleoside to the polymerase or affect protein oligmerization.
Protease inhibitors: Many viruses require proteases to cleave their gene products from polyproteins (such as HCV, or the HIV protease). By inhibiting these, the assembly of the virus is also inhibited.
Neuraminidase inhibitors: In influenza, the virion is assembled at the cellular membrane and is attached to the cell surface by sialic acid. Neuaminidase cleaves the sialic acid, freeing the virion. Drugs which inhibit this chemical thus prevent virus release.
Viral Stability Inhibitors: Viruses with lipid envelopes are sensitive to detergents. Using detergents to break up the envelope will render the virus avirulent. Nonoxynol-9 is one such reagent. It is commonly used in spermacides to prevent HIV and HSV infections. Another is ST-246 which is used against poxviruses.
Antiviral Drug Resistance
Resistance to antiviral drugs is as big of a problem as that of bacteria to antibiotics. For example, before the introduction of HAART (higly active antiretroviral therapy), the drug Foscornet was used to treat HCMV which caused retinitis in 30% of HIV patients. Unfortunately, HCMV strains quickly became resistant to the drug and it can no longer be used.
How can viruses become resistant to drugs?
Polymerase fidelity: DNA Polymerase has a proofreading ability which allows it to remove incorrect nucleotides and nucleoside analogues. This means that viruses that use DNA Polymerase may be albe to avoid incorporating the drug into its growing DNA chain. RNA polymerase, however, lacks proofreading ability, meaning RNA viruses have a much higer error rate, and consequently, mutation rate, than DNA viruses. This could be the cause behind the aparent restriction in genome size of RNA viruses.
Also, no polymerase is 100% efficent at proofreading; if a mistake is made, it could potentially lead to a mutation that confers resistance to a drug.
Quasispecies: Viruses do not reproduce clonally, so each virus may be different. They are subject to evolutionary selection pressures so many different forms of a virus are produced; a drug is then not effective against all of them. An example is the resistance of Cidofovir in orthopoxvirus.
How can we determine if resistance will be a problem?
1) Pass the virus through a cell culture, increasing the concentration of a drug
2) Select the strains which gain resistance
3) Sequence the polymerase gene (or other gene target, depending on the drug) and determine where the mutations lie
4) make recombinate strains that contain the mutations
5) check for resistace in cell cultures and in mice
The last three steps are known as "marker rescue".
How can resistance be prevented?
Use drugs more cleverly! Using two or more antiviral drugs which have independent mechanisms will reduce the chances of a strain becoming resistant. A "drug vacation" may also work by reducing the selective pressure on strains to become resistant (though this has the added risk of allowing virus titres to increase).
|
<urn:uuid:d68ff96d-b5f1-4cad-9dac-9a451d3b4512>
|
CC-MAIN-2017-26
|
http://cwgk.blogspot.com/2007/12/virus-prevention-and-control-part-ii.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00331.warc.gz
|
en
| 0.942231
| 1,181
| 2.765625
| 3
|
Irish socialist volunteers in the Spanish Civil War
Irish Socialist volunteers in the Spanish Civil War describes a grouping of IRA members and Irish Socialists who fought in support the cause of the Second Republic during the Spanish Civil War. These volunteers were taken from both Irish Republican and Unionist political backgrounds but were bonded through a Socialist and anti-clerical political philosophy. Many of the Irish volunteers who went to Spain later became known as the Connolly Column.
Following the rejection of the socialist motion put to the IRA Army convention on 17 March 1934 at St. Stephen's Green, Dublin three leading IRA volunteers resigned their duties within the IRA; Frank Ryan, Staff Captain Peadar O'Donnell, and George Gilmore.
Then followed a meeting of the Republican Congress, a body composed of the disaffected members of the IRA who wanted Irish Republicanism to focus on achievement of its goals via the political ideals of Socialism. Held in Athlone on April 7 and 8 the focus of the initial meeting was to decide on the direction of the new body and it was decided that an annual Congress should be inaugurated beginning in September 1934.
Following this an IRA court martial took place with former Major-General Seán Russell and the Commanding Officers (OC.) of North Tipperary, Clonmel, and the Fourth Dublin Battalion presiding. Former Commandant General Michael Price and O'Donnell were found guilty in absentia on a charge of insubordination and dismissed from the organisation. Bobby Edwards, Ryan, and Gilmore were also court martialed. IRA members who had expressed support for the Congress were effectively "stood down" from active service in the IRA although they would have retained links to the organisation due to its make up and operational nature.
Planning for Republican Congress continued, however, with a meeting being held in Rathmines town hall on September 29 — 30 1934. From the outset schisms within the newly formed group were apparent. Michael Price, Roddy Connolly and his sister Nora Connolly called for a drive towards a Workers Republic and the formation of a Workers Republican Party. O'Donnell, Ryan, Gilmore, and Edwards put forward a resolution supporting a United Front of the working class and small farmers. The latter resolution was eventually carried by 99 votes to 84.
The Congress gradually fell apart by 1936 and its significance as a political group passed. It did however provide the framework through which recruitment of IRA volunteers to fight in Spain would take place.
With the outbreak of the Spanish Civil War, Peadar O'Donnell and then George Gilmore went to Spain on behalf of the Congress to report on proceedings, and returned enthusiastic supporters of the Spanish Republicans. Ryan was incensed at quasi-Fascist Eoin O'Duffy organising an Irish Brigade to fight with the Fascists, and in open letters to the papers criticised Cardinal MacRory for raising funds at church collections to support Franco. The Congress started publicising the Spanish Republican cause in public meetings. Frank Ryan organized the first transports of Irish volunteers. The first men left Dublin, Belfast, and Rosslare ports in early December 1936 traveling through France and Britain to Spain.
The first Socialist volunteers saw action on the Cordoba front in December 1936. Approximately 135 men fought beside the French IXth Battalion and No.1 Company of the British Battalion. The objective was the town of Lopera and by the time the action was complete it had caused the death of nine in the Irish contingent. They were Frank Conroy (Kildare), Johnny Meehan (Galway), Henry Boner, Jim Foley, Tony Fox, Leo Green, Michael Nolan, Michael May, Tommy Woods (Dublin).
Training for the Socialist volunteers took place at Madrigueras (Albacete) alongside troops from the British Battalion. The two groups were not amalgamated, and the Irish contingent was shortly moved to a base in the town of Villanueva de la Jara in January 1937 and part of the Irish voted to move over to the American Abraham Lincoln Battalion.
The next engagement the Irish were involved in was the Battle of Jarama following Franco's advance into the Jarama Valley in February 1937. Other campaigns the volunteers were involved included the 1938 Advance on Gandesa and the decisive Battle of Ebro where they fought as part of the XV Brigade.
Other factors outside of anti-fascist political conviction and the charismatic urging of Ryan and O'Donnell cited by volunteers for fighting in Spain include:
- a series of riots in Belfast in 1932 and 1935. The 1932 riots, labeled the "Outdoor Relief Riots" were seen by many working class Protestants as a reason to turn to the politics of Socialism. William Tumilson, a working class Protestant, volunteered to join the IRA in the Short Strand district and subsequently became involved in the politics of Republican Congress following the riots.
- Harry Midgley, leader of the Northern Ireland Labour Party, supported the Spanish Republic, but this alienated most of his Catholic supporters.
- sections of the Catholic Church's support of Generalísimo Francisco Franco also turned many to support the legitimate government.
- media reporting of the bombing of Guernica in April 1937 and a perceived bias in pro-Francoist media reporting in the Irish and British media. Along with radio reports given by Frank Ryan on "Radio Madrid".
- it was easier to form a "common front" against fascism abroad rather than against imperialism and unionism at home
- events organized across Ireland, including the Ulster Hall in Belfast, in which Basque representatives encouraged participation
- a continuation of the struggle that the Irish had been engaged in; Tumlinson was to write home shortly before his death on 14 March 1937:
"Still determined to stay here until fascism is completely crushed. Impossible to do other than continue on with the slogan of Cathal Brugha: "No Surrender"
The heavy toll paid by the Republican side in terms of manpower and eventual defeat lead to the imprisonment of those who did not escape from Spain following the victory of the Francoists. While many Socialist and Republicans were able to escape on time, they returned to an Ireland which had undergone significant change in terms of restrictions placed on those sympathetic to the aims of the IRA.
Commemorations of the part Irish Republicans and Socialists played in the conflict are still held and a plaque honoring IRA volunteers from the Short Strand in Belfast is the site of annual ceremonies. The Connolly bookshop in Dublin keeps various items of memorabilia from the troops who fought.
Notable Socialist Irish volunteers in Spain
- Arthur Archibald - Belfast
- Bill Beattie - Shankill Road
- Danny Boyle - Belfast
- Joe Boyd - Belfast
- George Gorman - Derry
- Jim Lamour - Belfast
- James Haughey - Lurgan
- Hugh Hunter - Belfast
- Billy Henry - Shankill Road
- Bill Lord - Belfast
- Paddy McAllister - Belfast (fought with Canadian Mackenzie-Papineau Battalion)
- Paddy "Roe" MacLaughlin - Donegal
- Fred MacMahon - Belfast - Paramedic
- Eamon McGrotty - Derry
- Ben Murray - Ballymacarrett - KIA Battle of Aragon 1938
- Willie O'Hanlon - Belfast
- Dick O'Neill - Falls Road
- James Straney - Short Strand - KIA Advance on Gandesa, Hill 481, 1938
- William "Liam" Tumilson - Belfast - KIA Battle of Jarama Hill, February 1937
Other regions of Ireland
- Robert Boyle - Dublin
- Paul Burns
- Paddy Cochrane - Dublin
- Frank Conroy - Kildare
- Kit Conway, Burncourt, Co. Tipperary - mortally wounded Battle of Jarama 12 February 1937
- Charlie Donnelly - fought with the Abraham Lincoln Battalion
- Bob Doyle - Dublin
- Rev. Robert M. Hilliard
- Frank Edwards - Waterford
- Jackie Hunt - Waterford
- Maurice Levitas - Dublin/London
- Alan MacLarnon - Dublin
- Peter O'Connor
- Eddie O'Flaherty
- Michael O'Riordan - Cork
- Thomas Patten, County Mayo, killed in the Battle of Madrid, December 1936
- Foreign involvement in the Spanish Civil War
- Connolly Column
- Abraham Lincoln Brigade - encompassing Ryan's command in the George Washington Battalion
- Ireland and the Spanish Civil War
- Irish Brigade (Spanish Civil War) - Irish volunteers who fought for Franco under the leadership of Eoin O'Duffy.
- At the Bodenstown Commemoration of 1934 members of the Republican Congress from Shankill Road and Ballymacarrett (then members of the Socialist Party) had attempted to carry a banner which read "Wolfe Tone Commemoration 1934 - Shankill Road Belfast Branch" but caused scuffles due to the friction between nationalist and socialist outlooks.
- Other prominent members in the O'Donnell/Ryan/Gilmore faction included Seamus MacGowan, Sheila Humphreys, and Eithne Coyle, although Coyle and Humphreys resigned prior to the September Congress due to "[verbal] attacks on the IRA".
- Frank Ryan, by Seán Cronin, p. 79. Repsol, 1980
- This was the view expressed by Jack MacGougan then secretary of the NI. Socialist Party (NISP).[clarification needed]
- "Jim Haughey's letter to his sister, May 1945". Archived from the original on 28 October 2009. Retrieved 31 August 2015.
- "Obituary for Hugh Hunter". Archived from the original on 28 October 2009. Retrieved 31 August 2015.
- "Patsy McAlister - Irish veteran of the Spanish Civil War - a collection of articles, etc.". Archived from the original on 28 October 2009. Retrieved 31 August 2015.
- "Paddy Roe McLaughlin - Donegal and the Spanish Civil War". Archived from the original on 28 October 2009. Retrieved 31 August 2015.
- "Ben Murray: An Appreciation". Archived from the original on 28 October 2009. Retrieved 31 August 2015.
- "Richard O'Neill:- An Appreciation – Irish volunteer killed in Spanish Civil War". Archived from the original on 28 October 2009. Retrieved 31 August 2015.
- "Liam Tumilson - An Appreciation". Archived from the original on 28 October 2009. Retrieved 31 August 2015.
- "Bob Doyle (Feb. 12th 1916 - Jan 22nd 2009)- A collection of speeches, articles and obituaries.". Archived from the original on 28 October 2009. Retrieved 31 August 2015.
- "Paul Burns". Archived from the original on 28 October 2009. Retrieved 31 August 2015.
- Arthur, Max (2009). The Real Band Of Brothers – First hand accounts from the last British survivors of the Spanish Civil War. Section 8 – Paddy Cochrane, Page 271, reference to Cochrane’s place and date of birth. Collins. ISBN 9780007295098. Cite error: Invalid
<ref>tag; name "BAND1" defined multiple times with different content (see the help page).
- Doyle, Bob and Harry Owens: Brigadista- An Irishman's fight against Fascism :Currach Press: 2006: ISBN 1-85607-937-6 Page 47
- "Ireland and the Spanish Civil War - Memorial unvieled for KIT CONWAY". Archived from the original on 28 October 2009. Retrieved 31 August 2015.
- "Charlie Donnelly - Irish veteran". Archived from the original on 28 October 2009. Retrieved 31 August 2015.
- Rev. M. Hilliard at the Ireland and the Spanish Civil War site[dead link]
- "Peter O'Connor - a collection of articles, etc.". Archived from the original on 28 October 2009. Retrieved 31 August 2015.
|
<urn:uuid:be77a77f-4931-4c46-9c1c-bf58238def4f>
|
CC-MAIN-2017-26
|
https://en.wikipedia.org/wiki/Irish_Socialist_Volunteers_in_the_Spanish_Civil_War
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00331.warc.gz
|
en
| 0.943831
| 2,475
| 2.890625
| 3
|
IBM’s Silicon Integrated Nanophotonics – ‘ICON’ uses Light Pulses to Move Data at Blazing Speeds!
- Monday, December 10, 2012 By Mahalakshmi Kabilan
How fast would be the data transfer, if the transmission is done via light pulses?! The answer is here – IBM has announced optical communication technology which has been verified in a manufacturing environment and is ready for Development of Commercial Applications now. The technology is called “silicon nanophotonics”,
Silicon nanophotonics uses light instead of electrical signals to transfer information. Thus it allows large volumes of data to be moved fast (25Gbps per channel) between computer chips in servers, large data-centers, and supercomputers via pulses of light. Instead of copper or optical cables, IBM envisages on-chip optical routing, where light blasts data between dense, multi-layer computing hubs.
Silicon nanophotonics allows the integration of different optical components side-by-side with electrical circuits on a single silicon chip, in standard 90nm semiconductor fabrication.
“This future 3D-integated chip consists of several layers connected with each other with very dense and small pitch interlayer vias. The lower layer is a processor itself with many hundreds of individual cores. Memory layer (or layers) are bonded on top to provide fast access to local caches. On top of the stack is the Photonic layer with many thousands of individual optical devices (modulators, detectors, switches) as well as analogue electrical circuits (amplifiers, drivers, latches, etc.). The key role of a photonic layer is not only to provide point-to-point broad bandwidth optical link between different cores and/or the off-chip traffic, but also to route this traffic with an array of nanophotonic switches. Hence it is named Intra-chip optical network (ICON)” , IBM press release.
As per IBM it may take few years for ICON to come on sale. Lets wait to see more!
|
<urn:uuid:b5d25df9-6f50-4cb8-8439-f038b7d38815>
|
CC-MAIN-2017-26
|
https://techglimpse.com/ibms-silicon-integrated-nanophotonics-icon-light-pulses-move-data-blazing-speeds/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00331.warc.gz
|
en
| 0.909923
| 430
| 3.078125
| 3
|
It is for a fact that a lot of Filipino scholars has been giving big contributions to the world in the field of inventions. Creating new things for the betterment of people from all round the world. Who would have a thought that a Filipino invented florescent lamp and the incubator? Amazing right?
Here is a few list of Filipino inventors and their amazing inventions:
Dr. Fe Del Mundo
As far as I can remember, I have been idolizing her for a few years now. She is the first ever Asian to have entered the prestigious Harvard University’s School of Medicine. Just WOW! She is also credited for her studies that led to the invention of Incubator and jaundice relieving device.
Eduardo San Juan
Would you believe if I tell you that the inventor of the Lunar Rover, popularly known as Moon Buggy which was used by Neil Armstrong and other astronauts when they first explored the moon in 1969 was invented by a Filipino? Eduardo San Juan in fact constructed its model using homemade materials only!
San Juan, however, was not listed as the inventor of the Moon Buggy in American scientific journals. It said the vehicle was designed and constructed by a group of space engineers. In Poland, the Moon Buggy is attributed to a Polish inventor. Worse, the National Academy of Science and Technology (NAST) does not recognize San Juan in its roster of outstanding Filipino scientists.
A Filipino has made the world brighter by inventing the Florescent Lamp.
Countless number of Filipino inventors are still out there. Either recognized or not, their accomplishments just prove to the world that Filipinos got what it takes to gain international recognition and make current dreams into future realities!
Read More about another amazing stuff in the Philippines: The WONDER fan.
|
<urn:uuid:7b5688f0-5c30-47ce-838f-b0e85a11174e>
|
CC-MAIN-2017-26
|
https://dpsaphilippines.wordpress.com/category/science-technology-and-health/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320174.58/warc/CC-MAIN-20170623202724-20170623222724-00412.warc.gz
|
en
| 0.968205
| 370
| 2.609375
| 3
|
No doubt one thing we all look forward to during the holiday season is the endless food. From the ham and turkey to the cakes and pies, we pretty much celebrate food. But what about all those across the world who are living with hunger, or even without access to clean water? As they say, the holiday season should be about giving to others, so please consider giving through these food-focused charities.
Blessings in a Backpack
In the US, many students’ only meals are at school. To feed students over the weekend when they are not in school, every Friday students get backpacks filled with easy-to-prepare and ready-to-eat food, such as granola bars, peanut butter, tuna, crackers, mac & cheese, cereal, juice boxes, etc. Blessings in a Backpack reviews its standard menu with a nutritionist annually to make sure the food is kid-friendly, nutritious, non-perishable and easy-to-prepare. On Monday, the students return the backpacks, fed and ready to learn. $80 feeds a child in the program for an entire school year. How to get involved or donate
Oprah featured this charity in 2009 and it’s impact around the world has grown since. By making a monetary donation, you can empower a family and help provide livestock, seeds, or training. For example, a donation towards a heifer will provide milk and nourishment, boosts a family’s income through the sale of milk, and encourages better crop yields by creating fertilizer. A donation towards a wool sheep provides warm clothing for families living in harsh environments and also increases income through sales of extra wool. How to get involved or donate
Food Bank NYC
2.6 million New Yorkers have difficulty affording food. Food Bank tackles hunger through food distribution, income support and nutrition education. The organization recently received half a million dollars from an anonymous donor inspired by a New York Times article highlighting the need for social-service philanthropy, and now the organization is matching all donations dollar-for-dollar. $35 can help feed a child for two months and $65 can help provide food for an elderly couple for 8 weeks. Low on funds? You can also donate your time.
Right now, almost one billion people in the world do not have access to clean, safe drinking water. This non-profit organization brings clean, safe drinking water to people in developing countries. Just $20 can give one person clean water for 20 years. Check out their online store where you can give and get fashionable shirts, phone cases, candles and posters. 100% of the profits from these goods directly funds clean water projects and helps the organization grow. Donate or get involved
What more can you do? Get political.
Know your Representatives – Senators, Assembly members, Congress, City Council, etc. – and educate yourself about candidates’ positions on hunger and poverty. Know who is advocating for what and why. Rally behind candidates who are actively addressing hunger. You can also sign petitions (check out change.org or moveon.org) or lobby yourself or with an advocacy group at all levels of government to end hunger.
|
<urn:uuid:821c0830-8875-4311-8fe8-1eae28b1ddd0>
|
CC-MAIN-2017-26
|
http://www.thecouchsessions.com/2013/12/food-for-thought-hunger-the-holidays/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320264.42/warc/CC-MAIN-20170624152159-20170624172159-00492.warc.gz
|
en
| 0.944042
| 651
| 2.578125
| 3
|
Andaman and Nicobar Islands(redirected from Andaman & Nicobar Islands)
Also found in: Dictionary.
Andaman and Nicobar Islands(ăn`dəmən, nĭk`ōbär), union territory (2001 provisional pop. 356,265), India, in the Bay of Bengal. Port Blair (1991 pop. 74,955), in the Andamans, is the capital. Comprising the Andaman Islands, or Andaman Archipelago (2,508 sq mi/6,496 sq km), in the north and the Nicobar Islands (707 sq mi/1,831 sq km) in the south, the territory chiefly exports tropical products and lumber. Tourism is economically important. The islands, less than 40 of which are inhabited and some of which are subject to volcanic eruptions, are administered by the home ministry in the central Indian government.
Known to Europeans since the 7th cent. A.D., the Andamans, consisting of some 300 islands, were the site of a British penal colony from 1858 to 1945. The population is made up of indigenous Negritos (numbering less than 1,000) and largely Bengali and Tamil settlers from the Indian mainland. Settlers greatly outnumber the indigenous peoples, hundreds of which died from epidemics in the late 19th cent. Some of the Negritos live largely isolated from the settlers and have preserved a Stone Age culture; their isolation is protected by the Indian government.
The Nicobars, which comprise 19 small islands, are separated from the Andamans by a channel that is 90 mi (145 km) wide. The native population is of Mongolic stock. The Nicobars became a British possession in 1869. Japanese forces occupied both archipelagos during World War II.
Since World War II and Indian independence, some of the islands have undergone significant population growth and economic development, include Indian military bases, and regular air and ship services connect the islands with the mainland. The islands were especially hard hit by the Dec., 2004, Indian Ocean tsunami, because of their relative closeness to the epicenter (off NW Sumatra) of the earthquake that caused the waves; some 3,500 people are believed to have died.
Andaman and Nicobar Islands
a territory (administrative unit) of India. The area is 8,300 sq km. In 1966 the population was 79,000. The administrative center of the islands is Port Blair.
|
<urn:uuid:07a54a54-2e61-42f6-9036-a069e71eab67>
|
CC-MAIN-2017-26
|
http://encyclopedia2.thefreedictionary.com/Andaman+%26+Nicobar+Islands
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320679.64/warc/CC-MAIN-20170626050425-20170626070425-00652.warc.gz
|
en
| 0.942001
| 516
| 3.125
| 3
|
Our students need to learn more than just the vocational skills that come from the arts. Although having a deep understanding of one’s medium is extremely important, the journey of creating art should initiate opportunities to learn so much more: about oneself, one’s community, and the culture by which one is surrounded by. A contemporary and multicultural art education creates a path for students to develop critical thinking skills, problem-solving skills, and the means to navigate through an increasingly complex visual world. By giving students a well-rounded art education, we arm them with the ability to create, think divergently, critically analyze and effectively communicate.
My art classroom will provide a forum for students to express themselves through visual arts and dialogue. Through class and small-group discussions, students leaving my classroom will have respect for their peers and their opinions. I will encourage conversations that critically explore the work and subject we are investigating. Students will leave my classroom with an understanding that not everything is black and white, right or wrong. They will be able to navigate through the gray areas within the world and confront the tasks before them. Each student’s voice will be heard within my classroom and each opinion will be highly valued. Students will not leave my classroom feeling unsure or insecure, rather they will leave with the confidence to attempt anything.
Our schools will continue to become more diverse; thus, our lessons and the way in which we teach should diversify as well. As teachers, we must find contemporary content to keep our young students interested and as multicultural teachers, we must find a way to share many viewpoints and cultures. I will empower my students through a multicultural and contemporary art education and in turn, these students will feel more a part of their community and their school. Exploring many cultural viewpoints will create empathic and tolerant students who will grow up to be empowered and strong citizens.
Ultimately, my goal is to help students find themselves. I will create contemporary and multicultural lessons that help students explore who they are and where they are in society. By understanding themselves, the culture in which they live in and our complex society, students will walk away from school confident, empathetic, and understanding.
|
<urn:uuid:12fc2a8b-a7cf-4bba-a77a-8b95154e1f18>
|
CC-MAIN-2017-26
|
http://madelinemuhlberg.com/teaching-philosophy/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320679.64/warc/CC-MAIN-20170626050425-20170626070425-00652.warc.gz
|
en
| 0.960595
| 442
| 3.046875
| 3
|
The powers denied to Congress are enumerated in Article 1, Section 9 of the Constitution of the United States. A key provision necessary for passing the original Constitution was a compromise between the free and slave states. In that section of the Constitution, Congress was prevented from interfering with the slave trade until at least 1808.Continue Reading
Other powers denied to Congress include suspending the writ of habeas corpus, except in the event of rebellion or invasion. This prevents a person from being held against his will without just cause and judicial oversight. Congress is also prevented from enacting any ex post facto laws or passing a bill of attainder.
Ex post facto laws are enacted retroactively and are designed to penalize someone for something that is not illegal at the time the act is committed. A bill of attainder is a law designed to have a negative impact on a single person or a group of people.
Congress is denied the power to tax goods that are shipped from one state to another. Congress cannot give a commercial advantage to one state over another. Originally, the Constitution precluded Congress from levying an income tax. A subsequent amendment to the Constitution granted this power to Congress.Learn more about Branches of Government
|
<urn:uuid:e21281d1-b9e7-410a-84f5-a1930ba9117f>
|
CC-MAIN-2017-26
|
https://www.reference.com/government-politics/powers-denied-congress-523510c4613afb33
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320679.64/warc/CC-MAIN-20170626050425-20170626070425-00652.warc.gz
|
en
| 0.960344
| 244
| 3.953125
| 4
|
The Beams of Light, first published 24 December 1905 by the Gospel Witness Company, Scottdale, Pennsylvania, was a four-page illustrated paper for children of the home and Sunday school. It contained short articles, stories, and poems, as well as contributions from its young readers. Until 23 June 1907 the inside two pages contained a discussion of the Sunday-school lesson. Except for issues from 30 June 1907 to April 1908, which were 9 x 12 inches, the size of the paper remained 6 x 9 inches until January 1951, when it was enlarged to 8 x 11 inches. After April 1908 the paper was published by the Mennonite Publication Board and the Mennonite Publishing House. Beams of Light ceased publication on 29 December 1957, and was continued by Story Friends.
Beams of Light was edited by Daniel Kauffman, D. H. Bender, A. D. Martin, J. A. Ressler, Lina Z. Ressler, Betty Weber Springer and Helen Trumbo. The four-page paper contained selected stories and original stories by Mennonite authors, illustrated frequently by Mennonite artists, for the ages from four to eight years. The circulation in 1952 was 20,000.
|Author(s)||Ellrose D Zook|
Cite This Article
Zook, Ellrose D. "Beams of Light (Periodical)." Global Anabaptist Mennonite Encyclopedia Online. 1953. Web. 27 Jun 2017. http://gameo.org/index.php?title=Beams_of_Light_(Periodical)&oldid=123089.
Zook, Ellrose D. (1953). Beams of Light (Periodical). Global Anabaptist Mennonite Encyclopedia Online. Retrieved 27 June 2017, from http://gameo.org/index.php?title=Beams_of_Light_(Periodical)&oldid=123089.
©1996-2017 by the Global Anabaptist Mennonite Encyclopedia Online. All rights reserved.
|
<urn:uuid:83114c10-9959-4c66-a8ba-a9139e53f71b>
|
CC-MAIN-2017-26
|
http://gameo.org/index.php?title=Beams_of_Light_(Periodical)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321553.70/warc/CC-MAIN-20170627203405-20170627223405-00092.warc.gz
|
en
| 0.92347
| 426
| 2.8125
| 3
|
All people are entitled to a healthy and secure food supply. This
begins at birth with breastfeeding. Breastfeeding is a human right
as supported by the Provincial Human Rights Commission.
Breastfeeding is a child’s right:
All children have the right to be breastfed in order to achieve
and maintain optimal health.
Breastfeeding is a woman’s right:
It is her right to be able to provide her child with optimal nutrition
and it is her right to enjoy the physical and emotional benefits
that can come to her through a breastfeeding relationship.
Federal and provincial human rights law bans discrimination against
women. If someone tells you to stop breastfeeding at work or in
a public place, such as a park, shopping mall or restaurant, that
person may be discriminating against you. You have the right to
feed your baby, wherever you are allowed to be.
Employers and people providing public services must accommodate
Speak up about your right to breastfeed your baby anywhere anytime.
By speaking up, you're not just helping yourself and your child.
You are helping all mothers and children by making your community
If you are interested in more details about breastfeeding rights
and how to advocate for yourself, see this document.
|
<urn:uuid:06aeb59b-a966-4174-9631-4837dde26b06>
|
CC-MAIN-2017-26
|
http://saskatoonbreastfeedingmatters.ca/breastfeeding_in_public/your_rights.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321553.70/warc/CC-MAIN-20170627203405-20170627223405-00092.warc.gz
|
en
| 0.934138
| 260
| 3.234375
| 3
|
US and Gabonese scientists say a common type of fruit bat could be the source of an outbreak of the deadly Marburg disease in Africa.
Uganda has been hit by outbreaks of deadly viruses like Marburg and Ebola
The scientists tested more than 1,000 bats caught in caves in Gabon and DR Congo, and found some members of one species were infected with the virus.
Outbreaks of the Marburg disease have hit sub-Saharan Africa in the past.
Marburg is a contagious disease characterised by sudden bleeding and high fever, often ending in death.
The researchers, from the US Centres for Disease Control and Prevention and Centre International de Recherches Medicales de Franceville in Gabon, who are investigating the death of the man from Marburg fever in western Uganda, found that the virus is common in only one species of fruit bat.
Scientifically known as Rousettus aegypticus, the bat is found across sub-Saharan Africa.
"Identifying Marburg infection in the African fruit bats brings us one step closer to understanding this deadly disease," Eric Leroy, one of the study's authors, told AFP news agency.
Marburg and the related Ebola virus have caused in the past large outbreaks with extremely high mortality rates, 80 to 90%, in humans and great apes.
The largest outbreak of the Marburg disease occurred in 2004-2005 in Angola and killed more than 300 people.
Scientists say that the discovery could lead to better strategies in combating the disease.
Early symptoms of Marburg are diarrhoea, stomach pains, nausea and vomiting, which give way to bleeding. It is spread by the transfer of blood or other bodily fluids.
There is no cure. Infected patients need to be kept in isolation so as to prevent the spread of the virus.
|
<urn:uuid:d541e0f2-d555-49a3-9504-70d15e4c9177>
|
CC-MAIN-2017-26
|
http://news.bbc.co.uk/2/hi/africa/6958015.stm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323711.85/warc/CC-MAIN-20170628153051-20170628173051-00172.warc.gz
|
en
| 0.942066
| 374
| 3.46875
| 3
|
|1.||[ verb ] recall knowledge from memory; have a recollection|
|Synonyms:||remember think recollect call_up remind call_back retrieve|
: "I can't remember saying any such thing" "I can't think what her last name was" "can you remember her phone number?" "Do you remember that he once loved you?" "call up memories"
|Related terms:||forget recognize review know remember idea think retrieval|
|2.||[ verb ] go back to something earlier|
|Synonyms:||return come_back hark_back|
"This harks back to a previous remark of his"
|Related terms:||denote recur|
|3.||[ verb ] cause one's (or someone else's) thoughts or attention to return from a reverie or digression|
"She was recalled by a loud laugh"
|4.||[ verb ] call to mind|
: "His words echoed John F. Kennedy"
|Related terms:||resemble echo|
|5.||[ verb ] summon to return|
"The ambassador was recalled to his country" "The company called back many of the workers it had laid off during the recession"
|Related terms:||call call-back|
|6.||[ verb ] make unavailable; bar from sale or distribution|
"The company recalled the product when it was found to be faulty"
|Related terms:||issue cancel retire call_in callback|
|7.||[ noun ] the process of remembering (especially the process of recovering information by mental effort)|
"he has total recall of the episode"
|Related terms:||memory mind reproduction regurgitation reconstruction reminisce|
|8.||[ noun ] (psychology) the ability to recall past occurrences|
|Synonyms:||recollection remembrance anamnesis|
|Related terms:||memory memory mind reminiscence reconstruction remember remember commemorate|
|9.||[ noun ] (military) a bugle call that signals troops to return|
|10.||[ noun ] a call to return|
"the recall of our ambassador"
|11.||[ verb ] cause to be returned|
|Synonyms:||withdraw call_back call_in|
"recall the defective auto tires" The manufacturer tried to call back the spoilt yoghurt"
|Related terms:||take decommission callback|
|12.||[ noun ] a request by the manufacturer of a defective product to return the product (as for replacement or repair)|
|13.||[ noun ] (law,politics) the act of removing an official by petition|
|Related terms:||abrogation US|
|
<urn:uuid:61e38495-7392-4449-815d-40184d926124>
|
CC-MAIN-2017-26
|
http://test.what-is-the-definition-of.com/recall.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323711.85/warc/CC-MAIN-20170628153051-20170628173051-00172.warc.gz
|
en
| 0.817206
| 583
| 2.609375
| 3
|
These vegetables aren't all that good for you
By Amanda Kabbabe and Angeli Kakade, Buzz60
Growing up, your parents have been up your neck encouraging you to eat your vegetables. You may have known that potatoes aren't what they were talking about, but did you know that other vegetables are also not all they're chalked up to be?
Peas, for instance, are right there with potatoes when it comes to lackluster health benefits. They're high in starch, and eating too many can lead to weight gain.
SEE ALSO: 9 healthy foods that reduce bloating
According to the USDA, celery is not only borderline nutritionless, but also close to poisonous. The water filled veggie contains an alarming number of pesticides.
Corn is also being exposed as a major vegetable let-down. The summer vegetable staple is known for its fair share of genetic modifications which can lead to sensitivity and increased allergens.
While eggplant served plain is safe, you may want to avoid cooking it with other meats. This vegetable is known for soaking up the flavor once it's cooked, meaning it also absorbs more of the fat and calories from other sources.
Perhaps the scariest veggie is the bell pepper. These peppers, of all colors, cause inflammation that can lead to heart disease and diabetes down the line. It also contains solanine, an alkaloid known to block nerve function.
Yikes. Pizza it is!
RELATED: 10 nifty kitchen gadgets that make healthy eating easier
|
<urn:uuid:090aad4f-d2b5-4302-8733-85c74d099efc>
|
CC-MAIN-2017-26
|
https://www.aol.com/article/2016/06/24/these-vegetables-arent-all-that-good-for-you/21401492/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323711.85/warc/CC-MAIN-20170628153051-20170628173051-00172.warc.gz
|
en
| 0.975065
| 310
| 2.71875
| 3
|
Ecosystems and the quantity and quality of water resources are under severe pressure globally. The EU responded with its Water Framework Directive1, which aims to reverse pollution and clean up EU water bodies by 2015. BRIDGE2 was established to develop and test a methodology to derive groundwater threshold values, and support the development of a common methodology for EU Member States.
The 14 groundwater bodies investigated in BRIDGE were selected to represent as many aquifer types, climate settings and European ecoregions as possible within the project group that included partners from 17 EU countries. Some of the groundwater bodies are known to interact with associated ecosystems, while others do not.
BRIDGE has developed an approach and methodology that uses two different environmental quality standards. These are for:
- dependent aquatic ecosystems, and
- groundwater 'itself'
In the latter case, groundwater is protected as an ecosystem 'itself' or as a source of human water supply for the protection of human health. Little is known about water quality needs of groundwater ecosystems, so surface water quality standards (EQS) or drinking water standards (DWS) are sometimes used instead.
The researchers compared derived groundwater threshold values for dissolved chlorine and arsenic using drinking water standards as reference values for all 14 case studies. They also carried out more detailed analyses for the Odense Pilot River Basin (Denmark) and the Vouga River Basin (Portugal), where they derived groundwater threshold values for these and five further elements, including the nutrients nitrogen and potassium, based on environmental objectives and quality standards for groundwater dependent ecosystems.
The thresholds are derived using relevant reference criteria, such as natural background levels, environmental quality standards and drinking water standards. The study results demonstrate that the proposed methodology is operational and may be used to protect human health and the environment. Furthermore, the results also show that for some pollutants (e.g. nitrate) and catchments, groundwater threshold values for safe drinking water (drinking water standards) are not low enough to meet environmental objectives and safeguard dependent ecosystems.
The research has shown that developing environmental quality standards for groundwater 'itself' is in its infancy. Much more research is needed to develop and apply this concept appropriately and efficiently; more data on groundwater and groundwater interaction with dependent ecosystems are also needed. Properly designed monitoring programmes and compliance guidelines considering groundwater and surface water as one resource are just as important as properly derived groundwater threshold values to protect human health and the environment.
|
<urn:uuid:6ba8d2ba-d7c4-4396-9f91-ef861465fbcf>
|
CC-MAIN-2017-26
|
https://www.environmental-expert.com/news/bridge-provides-thresholds-for-eu-water-framework-directive-33956
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323711.85/warc/CC-MAIN-20170628153051-20170628173051-00172.warc.gz
|
en
| 0.941678
| 498
| 3.296875
| 3
|
How Luther Shared the Creator's Comfort
By Ryan C. MacPherson, Ph.D.
Lutheran Sentinel (Evangelical Lutheran Synod), Jan. 2006.
In Luther’s German catechism, Schöpfung is the title of the First Article of the Apostle’s Creed. In our English catechism, it is translated “Creation.” When Luther wrote about God’s work of creation, he emphasized above all that God is loving and merciful to his most special creatures, human beings.
The First Article states quite briefly, “I believe in God the Father Almighty, Maker of heaven and earth.” Luther searched the Scriptures to explain what the Church confesses with these words. His catechism provided this summary:
I believe that God has made me and all creatures; that He has given me my body and soul, eyes, ears, and all my members, my reason and all my senses, and still preserves them; that He richly and daily provides me with food and clothing, home and family, property and goods, and all that I need to support this body and life; that He protects me from all danger, guards and keeps me from all evil; and all this purely out of fatherly, divine goodness and mercy, without any merit or worthiness in me; for all which I am in duty bound to thank and praise, to serve and obey Him. This is most certainly true.
Luther’s summary of the Bible’s doctrine of creation is rich in meaning. For now, three phrases will be emphasized.
“and still preserves them”
The Bible teaches that God the Creator keeps Himself close to us. Some religions speak of a deity who formed the universe and then backed away; not so for God the Creator. One of God’s names is “Immanuel,” a Hebrew expression meaning “God with us” (Matthew 1:23). He remains close enough to number the hairs on our head as He preserves us, body and soul (Matthew 10:30). The Bible tenderly invites, “Cast all your anxiety on Him because He cares for you” (1 Peter 5:7). If our Creator ever seems like a distant and uncaring deity, it is only because we have pushed the true God out of our hearts.
“He richly and daily provides”
God the Creator provides for us richly. “Every good and perfect gift is from above, coming down from the Father of the heavenly lights” (James 1:17). He gives us good and perfect gifts, sustaining our life that He created. As the Psalmist celebrates, “The eyes of all look to You, and You give them their food at the proper time” (Psalm 145:15).
God the Creator supplies our needs daily. Jesus instructs us to pray “Give us this day our daily bread” so that we remember God’s blessings each day (Matthew 6:11). On the third day of creation He made the sun as a source of light for the earth (Genesis 1:14–19). Every morning since then, God has caused the sun to rise (Matthew 5:45), providing our daily needs of light and warmth.
“purely out of fatherly, divine goodness and mercy, without any merit or worthiness in me”
Our Creator does a lot for us, every single day. But why? It certainly is not because we have asked for it, for God blesses us even on the days that we neglect to ask Him. (When was the last time you prayed for a sunrise?) As Luther noted regarding the Fourth Petition, “God certainly gives daily bread without our prayer, even to all the wicked.”
Even to all the wicked? Let the question be asked more honestly: Even to me? We dare not exclude ourselves from the Holy Spirit’s teaching, “All have sinned and fall short of the glory of God” (Romans 3:23). Humbly, we confess with Joseph to our Creator, “I am unworthy of all the kindness and faithfulness You have shown Your servant” (Genesis 32:10). Being sinners who constantly fail to appreciate our Creator’s love, not one of us deserves daily bread, sunlight, or any good gift.
Thankfully, we know that God loves us and provides for all our needs, temporal and eternal. Just as God lovingly created Adam and Eve “in His own image” (Genesis 1:27) so He also makes each of us “a new creation in Christ Jesus” (2 Corinthians 5:17). God creates us anew in Christ “not because of righteous things we have done, but because of His mercy” (Titus 3:5). If this new creation depended upon us, we would be left to despair because we know we have not lived up to God’s standard. But salvation comes from God, who is faithful to complete His work. This gospel comfort is at the heart of the Bible’s doctrines of both creation and redemption because our gracious God is as much our Creator as He is our Redeemer.
Gospel comfort from God the Creator—that’s what Schöpfung meant in Luther’s German catechism. “Creation,” the translation in our English catechism, means far more than “against evolution.” The Christian doctrine of creation is first and foremost a positive proclamation of God’s love for all people. Let us never be ashamed to confess that God is our Creator.
|
<urn:uuid:f474916f-d6ea-4cee-829b-f36db01cf7c1>
|
CC-MAIN-2017-26
|
http://www.ryancmacpherson.com/publication-list/23-devotional-writings/41-how-luther-shared-the-creators-comfort.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323908.87/warc/CC-MAIN-20170629103036-20170629123036-00252.warc.gz
|
en
| 0.939066
| 1,191
| 2.828125
| 3
|
The Benefits of Improving School Snacks
In many schools, kids have access to snacks and beverages throughout the day from vending machines. Kids can also buy foods such as fries and cupcakes a la carte in the lunch line. But do kids really need fatty, sugary snacks available to them at all times?
The Healthy, Hunger-Free Kids Act of 2010 directed the USDA to set nutrition guidelines for snacks sold in schools as well as breakfast and lunch. Earlier this year, the USDA submitted a set of guidelines for school snacks that resembled the guidelines for breakfast and lunch that went into effect at the beginning of the 2012-2013 school year. Some of the radical ideas include a requirement that the snack be “either a fruit, a vegetable, a dairy product, a protein food, a “whole-grain rich” grain product…, or a combination food that contains at least ¼ cup of fruit or vegetable.”
The largest benefit of improving school snacks is the impact on kids’ health. Unhealthy kids often grow up to be unhealthy adults. Selling healthy snacks reinforces health and nutrition education and also supports parents’ attempts to teach their kids healthy habits. The infographic below from the Kids Safe and Healthful Food Project puts it together nicely.
Apples photo via Shutterstock
|
<urn:uuid:67033e10-7f27-40ed-a6b5-2ef6cddb0a4b>
|
CC-MAIN-2017-26
|
https://eatdrinkbetter.com/2013/06/22/the-benefits-of-improving-school-snacks/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00611.warc.gz
|
en
| 0.949486
| 265
| 3.59375
| 4
|
Dimensions of Biodiversity: Deconstructing Diversity and Ecosystem Function at Multiple Spatial and Genetic Scales in a Keystone Plant-Microbe Symbiosis
Biologists have traditionally focused on competition between organisms as the driving force behind ecological or evolutionary processes. However, over the last decade a new perspective has begun to emerge that gives equal weight to cooperative, symbiotic interactions in structuring many natural communities. Ectomycorrhizal fungi are among the most common plant fungal symbionts in terrestrial ecosystems. They form a major component of the soil microbial biomass and contribute to the biodiversity, ecology and nutrient cycling of forest ecosystems. Despite the importance of ectomycorrhizal fungi for global nutrient cycles, little is known about large-scale patterns of fungal community structure relative to plants, animals or even bacteria.
The Dimensions of Biodiversity project is an NSF-funded research effort that takes advantage of technical advances in genomic sequencing and functional enzyme assays to begin shedding light on the extent of genetic and functional diversity within and between species of ectomycorrhizal fungi across North America. The study will provide the first continental scale perspective on ectomycorrhizal taxonomic diversity, establish patterns of gene flow and selection for multiple ectomycorrhizal taxa across North America, and measure the full spectrum of functional trait expression on individual mycorrhizal root tips and partition functional diversity across individuals, populations, and species. By doing so, this project will build a bridge between taxonomic and functional diversity across the fungal tree of life and ascertain the links between fungal diversity (taxonomic, genetic and functional) and the health and functioning of forest ecosystems.
|
<urn:uuid:cf47c6fd-b8a3-448f-8997-983f8e044b88>
|
CC-MAIN-2017-26
|
https://www.msi.umn.edu/content/dimensions-biodiversity-deconstructing-diversity-and-ecosystem-function-multiple-spatial-and
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00611.warc.gz
|
en
| 0.901694
| 345
| 2.578125
| 3
|
To figure out how best to prevent motion sickness, you first need to figure out how best to bring it on. Aerospace research has excelled at the latter, if not the former, and perhaps nowhere more triumphantly than at the U.S. Naval Aerospace Medical Institute in Pensacola, Florida: the birthplace of the human disorientation device. In a 1962 NASA-funded study, twenty cadets agreed to be harnessed to a chair mounted on its side on a horizontal pole. Thus affixed, the men were rotated, rotisserie style, at up to thirty revolutions per minute. As a reference point, a chicken on a motorized spit typically turns at five revolutions per minute. Only eight of the twenty made it to the end of the experiment.
From Packing for Mars: The Curious Science of Life in the Void by Mary Roach, page 108
Teaser Tuesdays is a fun weekly bookish meme, hosted by MizB of Should Be Reading. I change the rules a little bit to suit my own purposes: I hand pick the teaser, rather than choose one randomly. I also very frequently post more than two sentences. :)
|
<urn:uuid:510c77c4-988b-4b2e-a7b7-69ddc82a605d>
|
CC-MAIN-2017-26
|
http://www.booksuniverseeverything.com/2010/07/13/teaser-tuesday-14/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00692.warc.gz
|
en
| 0.93726
| 235
| 2.609375
| 3
|
A 40- year old man was firstly told by his doctor that he had pink eye but this diagnose was not true as it turned out that he had eye cancer.
Many studies have proven that the mobile phones can damage our eyes. The light from the screen damages the retina and in this way it also affects our eyesight. We are at greater risk if we regularly use smartphones in low light mode. The light goes directly towards our eyes and they become dry so cancer can be developed and blindness as well.
This man visited his doctor because he had problems with his eyesight and his eyes were red. When he told his doctor that he almost always uses his smartphone before going to bed, the doctor told him that this habit was probably the cause of his eye cancer. The bad news was that eve his doctor couldn’t help him. The modern medicine still cannot find the cure for this type of medical problem and that is why we need to be more careful when we use our smartphones.
Source: Natural Remedies For Long Life
|
<urn:uuid:83b33612-65f6-495f-9c49-291192211d66>
|
CC-MAIN-2017-26
|
http://www.wisethinks.com/2016/05/man-diagnosed-with-eye-cancer-because.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00692.warc.gz
|
en
| 0.993324
| 211
| 2.640625
| 3
|
“What is that in your hand?”
“Throw it on the ground.”
So he threw it on the ground, and it became a serpent, and Moses ran from it.
Moses knew snakes. He spent his first 40 years in the land of Egypt, where there are about thirty six species of snakes. Seven of those species are venomous! He spent the next 40 years as a shepherd in the desert. Moses knew snake lore. Enough to know that you don’t pick up a snake by its tail since it can turn on itself and bite your hand.
Guess what God tells Moses to do next? That’s right. “Put out your hand and catch it by the tail.” Why? “…that they (the Israelites) may believe that the LORD…has appeared to you.” Exodus 4:1-5
1) God wants us to use the things He has provided to us for His purposes.
In this case, the staff of Moses identified him as a shepherd. The staff was his primary tool for making a living. The staff represented his “circle of influence” which extended to the size of his flock and not much further. The staff was his support and a sign of who and what Moses had become after his disgrace in Egypt.
God was about to transform the ordinary into the extraordinary. “Throw it on the ground.”
2) We should expect the unexpected. And, it might be frightening.
Many people think that the snake God created from the staff wasn’t just an ordinary snake. The serpent was frightening enough to make a veteran of the land move as fast as he could to get away, not at all the proper reaction in an encounter with a snake.
Out first reaction to God’s prompting may be the same; we want to run in the other direction. Due to fear. God helps us overcome fear.
“Put out your hand and catch it by the tail.”
3) God redefines us and extends our influence through His gifts.
When Moses picked the snake up by the tail, he was showing extraordinary faith. He was terrified by the snake. But, he trusted God. I know. I know. Moses then proceeded to object to God’s every suggestion for the duration of their conversation, but in the end, he obeyed God.
God used the staff to redefine Moses. He gained a new identity as leader and prophet for the children of Abraham. The staff came to symbolize God’s care for Moses, and because of God’s mighty works, the staff became a symbol of authority. Through the staff, God extended Moses’s “circle of influence” to include all of us from then until this day.
4) Warning: Use as directed!
Moses paid dearly for the one time he misused the staff. What’s sadder than looking into the Promised Land but being unable to enter it? Take this lesson to heart; use what God puts into your hands according to His will or your life will not go in the intended direction.
5) God’s purposes are larger than we can imagine.
“Put out your hand and catch it by the tail.” Moses could not imagine that he would use the staff to turn the water into blood, or bring plagues of frogs, lice, storms, locusts, part the Red Sea, bring water from the rock, or win a battle.
So, take what God has placed in your hands. Throw it out there. Take it by the tail and see what God will do with you. How will God redefine your identity? How will He extend your circle of influence? How many others will your life affect with God’s help?
How has God used what He placed in your hand? How has that affected your life and the lives of others?
|
<urn:uuid:1e47e823-1410-47f6-aca2-a7d844e873d0>
|
CC-MAIN-2017-26
|
https://christsreflections.wordpress.com/2012/05/29/five-lessons-from-moses-and-the-staff/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00692.warc.gz
|
en
| 0.974843
| 824
| 2.75
| 3
|
Unformatted text preview: EXPERIMENT 2. MEASUREMENT AND PRECISION
In the first row in the example data table the calculated value of π is 3.17 ± 0.08 meaning,
within the experimental uncertainty a value as low as 3.09 or as high as 3.25 would be consistent with our measurement, therefore this example measurement agrees with the accepted
value of π . If the experimental uncertainty were not included however, the values would not
agree since 3.17 = 3.14. The calculated values for π in row 2 also agrees with theory, but
those in row 3 and 4 do not. Report
In addition to the standard elements of a well written lab report described in the introduction
to this manual, your report must include
1. An appropriate title
2. The objective of the lab
3. The general procedure for the experiment
4. Your groups data in an appropriate format
5. An example calculation of your uncertainty in π for one of the disks
6. A description of any systematic errors present in the experiment and a discussion of
how they were dealt with.
7. A summary of your results giving your average value for π along with an uncertainty
with and without any systematic errors corrected for.
8. A conclusion that states if you met the objective of the lab (i.e. did your measured
value agree with the accepted value for π ?) 17 ...
View Full Document
This note was uploaded on 01/27/2012 for the course PHY 2048l taught by Professor Staff during the Fall '08 term at University of Central Florida.
- Fall '08
|
<urn:uuid:ee7ab436-3a19-4cca-881b-2bc5c740dfe4>
|
CC-MAIN-2017-26
|
https://www.coursehero.com/file/6734275/Physics-I-Lab-Manual-2011-27/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00692.warc.gz
|
en
| 0.932509
| 349
| 3.171875
| 3
|
Many of the world’s finest scientists, including the world famous physicist Stephen Hawking, are openly voicing their concerns about a Donald Trump presidency. A recent open letter published by 375 scientists says that the global environment will face tremendous challenges if Trump wins the election in November.
Trump himself has been openly critical of global warming, even going so far as to claim that the idea that carbon emissions are poisoning our atmosphere and melting polar ice caps is a lie invented by Chinese propagandists.
Most scientists fear that Trump will take America out of the recent climate change treaty that was signed in Paris by President Obama. This treaty was agreed to by over 190 nations and was set to reduce carbon emissions by at least 47 percent in the nations that are the worst offenders. The treaty is going to be officially ratified by the end of the year, whether the U.S. is on it or not.
The scientists who penned this open letter say that there are two tipping points Americans should be concerned about in this election. The first tipping point is environmental. Although scientists do not know exactly how much longer until we pass the point of no return in terms of polar ice caps melting, once that threshold is passed we will certainly face enormous environmental threats. Scientists only know that the best way to avoid such a non-reversible catastrophe from ever happening is to curtail the production of carbon emissions.
The second tipping point scientists fear is a political one. They fear that if Trump is elected, and if Trump actually does pull out of the Paris Agreement, then it will send a negative message to the rest of the world in terms of pollution responsibility. America still has tremendous power to potentially change the status quo on pollution and carbon emissions in other nations. Without America’s full support of the Paris Agreement, other countries may not feel the need to curtail their own pollution issues.
Whenever Trump is asked by reporters why he does not support the Paris agreement, he says that the terms of that treaty would give far too much power to foreign bureaucrats and that America would have less of an ability to freely determine how it uses its energy. Critics of Trump’s stance, however, say that the Paris Agreement does allow different countries to devise different energy plans. Each country just has to share their emissions levels and targets in an international assembly every year.
Other critics believe that Trump is hostile to the Paris Agreement because he wants the support of multinational energy companies in the General Election. Of course, multinational energy companies have the most to lose with the ratification of the Paris Agreement, thus they will probably end up voting for Trump.
In any case, this year will certainly be an important one for climate change and how humanity moves forward in the face of these environmental challenges. According to the world’s most respected scientists, the better option in this election is Hilary Clinton.
|
<urn:uuid:425580e4-0055-48fc-9080-f8e15556f472>
|
CC-MAIN-2017-26
|
http://www.greenvillegazette.com/p/hundreds-of-top-scientists-write-open-letter-begging-america-not-to-vote-trump-141453/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320323.17/warc/CC-MAIN-20170624184733-20170624204733-00052.warc.gz
|
en
| 0.955876
| 573
| 2.578125
| 3
|
Many sites, such as Facebook or a blog, will allow a user to upload or download files to the site for a myriad of reasons, such as pictures for a website or files for a forum or blog software. In either case, there are two ways to upload a file to a server or website: using HTTP or using FTP.
Here are some of the differences:
1. HTTP is used to view websites while FTP is used to access and transfer files. FTP's file transfer purpose is more or less for website maintenance and batch uploads, while HTTP is for client-end work and for end users to upload things such as movies, pictures and other files to the server.
2. HTTP and FTP clients: The common HTTP client is the browser while FTP can be accessed via the command line or a graphical client of its own.
3. HTTP Headers: HTTP Headers contains metadata such as last modified date, character encoding, server name and version and more which is absent in FTP.
4. Age Difference: FTP is about 10 years older than HTTP.
5. Data Formats: FTP can send data both in ASCII and Binary Format but HTTP only uses Binary Format.
6. Pipelining in HTTP: HTTP supports pipelining. It means that a client can ask for the next transfer already before the previous one has ended, which thus allows multiple documents to get sent without a round-trip delay between the documents, but this pipelining is missing in FTP.
7. Dynamic Port Numbers in HTTP: One of the biggest hurdles about FTP in real life is its use of two connections. It uses a first primary connection to send control commands on, and when it sends or receives data, it opens a second TCP stream for that purpose. HTTP uses dynamic port numbers and can go in either direction,
8. Persistent Connection in HTTP: For HTTP communication, a client can maintain a single connection to a server and just keep using that for any amount of transfers. FTP must create a new one for each new data transfer. Repeatedly making new connections are bad for performance due to having to do new handshakes/connections all the time.
9. Compression Algorithms in HTTP: HTTP provides a way for the client and server to negotiate and choose among several compression algorithms. The gzip algorithm being the perhaps most compact one but such kind of sophisticated algorithms are not present in FTP.
10. Support for Proxies in HTTP: One of the biggest selling points for HTTP over FTP is its support for proxies, already built-in into the protocol.
11. One area in which FTP stands out somewhat is that it is a protocol that is directly on file level. It means that FTP has for example commands for listing dir contents of the remote server, while HTTP has no such concept.
12. Speed: Possibly the most common question: which is faster for transfers?
What makes FTP faster?
1. No added meta-data in the sent files, just the raw binary
2. Never chunked encoding "overhead"
What makes HTTP faster?
1. Reusing existing persistent connections make better TCP performance
2. Pipelining makes asking for multiple files from the same server faster
3. Automatic compression makes less data get sent
4. No command/response flow minimizes extra round-trips
Conclusion: Ultimately the net outcome of course differ depending on specific details, but I would say that for single-shot static files, you won't be able to measure a difference. For a single shot small file, you might get it faster with FTP (unless the server is at a long round-trip distance). When getting multiple files, HTTP should be the faster one.
|
<urn:uuid:4fe44708-4f2e-44ab-b031-4baf8a1081a6>
|
CC-MAIN-2017-26
|
http://theprofessionalspoint.blogspot.com.by/2012/04/12-point-comparision-between-ftp-and.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320532.88/warc/CC-MAIN-20170625134002-20170625154002-00132.warc.gz
|
en
| 0.932333
| 764
| 3.59375
| 4
|
Many people believe that heart disease occurs primarily in men, but the disease is actually the No. 1 killer of both women and men. Women also are less likely than men to survive a heart attack, and to complicate matters, they often experience different symptoms.
Chest pain typically associated with a heart attack was originally identified by now-outdated studies based on mostly white, middle-aged men. Women may not necessarily experience “chest pain” in the traditional sense, but might describe tightness, squeezing, spasms, or “feeling of fullness” in the chest or upper abdomen.
Women may also feel discomfort in the chest that extends to the shoulders, back, jaw or teeth. These symptoms may be accompanied by nausea, vomiting, sweating, dizziness or shortness of breath. In some cases, women may not have any symptoms at all.
The first hour of a heart attack is critical, so it’s imperative to call 911 if you are experiencing any of these symptoms – whether you’re a woman or a man. That’s because a heart attack is actually an injury to the heart muscle due to a loss of blood supply, and as each minute passes, more tissue is deprived of oxygen and deteriorates or dies.
Women who survive a heart attack can face a lifetime of challenges. According to the American Heart Association, 23 percent of women die within a year after surviving a heart attack, and approximately 46 percent more develop a severely weakened heart or heart failure.
Who’s most at risk for heart disease? Family history of it increases your chances, which is something a woman cannot control, and so does menopause. There are other risk factors – smoking, diabetes, obesity, high blood pressure and cholesterol, and lack of exercise – that a woman can modify, treat or control. It is important for women to understand that by eliminating as many of their risk factors as possible they increase their chances of preventing heart disease.
Establishing a positive family history for heart disease isn’t always a black-and-white situation. A person whose first-degree family members (e.g., parent, sibling, offspring) have had heart disease at a younger age – a father who had heart disease before 45, or a mother who had heart disease before menopause, usually before age 50 – would demonstrate positive family history. However, family history may not be considered a prominent risk factor if the father had a heart attack later in life, such as in his 50s or 60s. Ultimately, the best way to understand how your family history may define your risk is to consult your physician.
The following tips can help prevent heart disease in both women and men:
• Don’t smoke.
• Help keep your blood pressure and cholesterol levels down by managing your weight and eating more fruits, vegetable and grains. Cut down on your portions. Reduce your intake of foods that are high in sodium or fat.
• Drink alcohol only in moderation.
• Exercise at least three to four times a week for 30 minutes to help keep your heart and blood vessels toned.
|
<urn:uuid:459a9aaf-0a19-448c-981e-5b76f4596f62>
|
CC-MAIN-2017-26
|
http://www.sandiegouniontribune.com/sdut-women-and-heart-disease-its-complicated-2011may03-story.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320532.88/warc/CC-MAIN-20170625134002-20170625154002-00132.warc.gz
|
en
| 0.959265
| 640
| 3.03125
| 3
|
Introducing babies to solid food can be a very confusing and worrying time. Babies vary in so many ways; some take to solid food quicker than others, and appetites and tastes can vary too. But if your baby is eating nutritious food, even just a small amount, you are doing well!
Here are some tips to help reassure and guide you:
- Make sure your baby is ready; pushing a young, reluctant baby will make the start of the weaning process upsetting for you both.
- You may find it easier and the baby more comforted if you hold your baby on your lap while you feed her as this will help her feel loved and secure.
- If your baby has trouble with a spoon try tipping a clean finger in the pure and let her suck your finger for the first few mouthfuls.
- Laugh, smile, sing and taste your baby’s food at mealtimes – she’ll want to join in the fun by copying you and eating it herself.
- You can use cow’s milk in cooking for babies under one year old – but continue giving breast/formula milk as a drink for the first year. Pasteurised cow’s milk can be introduced from the age of 6 months with your baby’s cereal or in dishes like cauliflower cheese or rice pudding. Choose whole milk for your baby. Skim and other milks are too low in calories and do not contain enough vitamin A and D for babies and children under 2. You should also choose whole milk and not low fat dairy products like low fat yoghurts for your child as she needs the calories they provide.
- Iron deficiency is the commonest nutritional problem during early childhood. Red meat provides the best source of iron. Babies often reject red meat not because of the taste but the chewy texture. I find one of the best ways to get babies to enjoy eating red meat is to saut some onion and garlic, add some stewing steak and lots of root vegetables, like sweet potato, and carrots plus some stock and cook it slowly until very tender and then puree to a smooth consistency.
- There is a close relationship between eczema and immediate food allergies. There is also a clear relationship between the age at which the eczema first appeared, how severe it is and the likelihood of developing food allergies. Studies have shown that children with eczema often also have a food allergy and those with severe eczema that started before 6 months are at particular risk .
- A vegetarian diet can be fine for babies and small children as long as it is carefully balanced and does not contain too much fibre. Unlike adults, a bulky high fibre diet is unsuitable for young children as it is too low in calories and essential fats and hinders the absorption of iron. Good foods to introduce if your baby is being brought up on a vegetarian diet are eggs (well cooked and not before 6 months) lentils, fortified breakfast cereals, cheese and green vegetables like spinach and broccoli.
- Babies’ appetites can alter when they are cutting teeth or have growing spurts.
- You can reheat food in a microwave, but you must be careful that there are no hot spots, so it is important to stir the food thoroughly before giving it to your baby and always test the temperature of the food yourself first. When defrosting or reheating it is important that food is heated until piping hot in order to kill off any bacteria. Then leave it for a few minutes and allow it to cool down before giving it to your child.
- You can use frozen vegetables such as peas as all the nutrients are locked in. If you make pures from frozen vegetables you can cook them and then re-freeze them.
- There are a number of fruits that make excellent instant ‘no-cook’ baby food provided they are ripe. Bananas for example make perfect baby food. Simply mash with a fork, maybe adding a little of your baby’s usual milk if the texture is too thick. Papaya and avocado are also very nutritious and make excellent baby food.
- The important things are to try and relax and enjoy the weaning process, and not to worry about the mess!
Annabel Karmel is the mother of three children, a bestselling author of books on nutrition and cooking for babies and toddlers, and a familiar face on British television. Find more creative feeding advice and delicious recipes in her book SuperFoods and at her website.
The views expressed in this article are those of the author and do not necessarily represent the views of, and should not be attributed to, POPSUGAR.
|
<urn:uuid:0c5801ca-7ce8-44c6-9d53-4830136aa8a4>
|
CC-MAIN-2017-26
|
https://www.popsugar.com/moms/Guide-First-Foods-How-Relax-Enjoy-Mess-27330784
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320532.88/warc/CC-MAIN-20170625134002-20170625154002-00132.warc.gz
|
en
| 0.953039
| 961
| 2.609375
| 3
|
Using one perspective, parallel lines converge to one point somewhere in the distance. This point is called the vanishing point (VP). This gives objects an impression of depth.
When drawing using one point perspective all objects vanish to one common point somewhere on the horizon.
The sides of an object diminish towards the vanishing point. All vertical and horizontal lines though are drawn with no perspective. i.e. face on.
One point perspective though is of only limited use, the main problem being that the perspective is too pronounced for small products making them looking bigger than they actually are.
So when would you use one point perspective?
One area where one point perspective can be quite useful is for sketching room layouts.
Although it is possible to sketch products in one point perspective, the perspective is too aggressive on the eye making products look bigger than they actually are.
|
<urn:uuid:448674ee-0d6f-432a-af10-2bae83b8feb8>
|
CC-MAIN-2017-26
|
http://bohemiantruckstop.blogspot.com/2008/12/one-point-perspective-sketching.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00212.warc.gz
|
en
| 0.919953
| 174
| 3.265625
| 3
|
- Widney Brown says women took the same risks as men during the Arab Spring.
- However, women are treated as second-class citizens in post-revolution politics, says Brown.
- Using cases from the region, Brown argues that the struggle for gender equality is far from won.
Women have been badly let down by the men they stood with during demonstrations that toppled tyrants in the Middle East and North Africa.
Shot at, tortured, assaulted and detained -- they were equals at the point of protest but now, as new governments extend their grip, we can see that, as citizens, women remain firmly in the second class.
So, as we celebrate the role of women on International Women's day, let us not forget that the struggle for equality is far from won. Even when progress seems to be a given, the pendulum can swing back leaving fresh challenges to defend progressive values.
In Egypt, it did not matter that women had played a critical role in the uprisings that ousted the tyrant Mubarak. It did not matter that they had suffered equally from repression and lack of economic opportunity along with the men.
It did not matter that they were subjected to the additional burden of discrimination because they were female. It did not matter that the Supreme Council of the Armed Forces tried to discredit women protestors by arresting them and subjecting them to forced virginity tests.
When elections finally came after so many years of dictatorship, Amnesty International asked political parties in Egypt to make commitments to basic human rights principles: principles such as freedom of expression and assembly, religious freedom, non-discrimination and gender equality.
Most of those seeking political power through the parliamentary elections fell short of meeting even these minimum human rights commitments.
The Muslim Brotherhood's Freedom and Justice party which won 235 seats -- 47 per cent of the total - failed even to respond to Amnesty International's request.
The Salafist Al-Nur party, which came second with 121 seats (24 per cent) declined to promote women's rights or abolish the death penalty.
So 71% of the new parliament is unwilling to commit to promoting women's rights and gender equality.
There have been some chinks of light. Tawakkol Karman of Yemen was named as one of three women Nobel Laureates for peace, in an important, though, belated recognition of the role women have played in the protests dubbed the Arab Spring.
During those heady days, women were a powerful voice, a compelling presence in the protests. They took the same risks as men when exposing human rights abuses committed by the state and calling for accountability; as leaders and agents of change in the uprisings they have not been exempt from the worst of the violence.
Many women protesters were harassed, arrested, tortured and otherwise ill-treated in gender-specific ways just because they are women, defying convention and exercising their rights to freedom of expression and assembly.
In Bahrain, where thousands of women took part in anti-government demonstrations, dozens were arrested and some were reportedly tortured or otherwise ill-treated.
In Yemen, women taking part in protests and women activists have been killed, harassed, arrested and in some cases beaten for their participation in protests.
In a desperate attempt to sideline women, Yemeni officials demanded that male relatives assert control over the women in their family and stop their activism.
However, women's protest is not new in this region: women were demanding their human rights long before the start of the uprisings of the last year -- in Iran and elsewhere.
In Saudi Arabia, 20 years after women first sat at the wheels of their cars and challenged the restriction on females driving, the ban remains in place. Any woman who dares to challenge the ban faces arrest and attacks on their character.
Saudi religious clerics have claimed that allowing women to drive would lead to moral decline in the kingdom.
The demands of the women are clear. Women want a seat at the table and a voice in the debate and a vote in the decision making.
More specifically, women are calling for equal rights to political participation and decision-making, equal rights in law, including in relation to marriage, divorce, child custody and inheritance.
Women must have legal protection from gender-based violence, including domestic violence and marital rape, and sexual harassment.
International Women's Day is an opportunity to recognize the courage and stamina of the women living in the Middle East and North Africa.
They will not be pushed back to the kitchen. We must all take a stand today in solidarity with them.
|
<urn:uuid:ca1e1337-86fb-4818-a3c6-a19e74cffdde>
|
CC-MAIN-2017-26
|
http://edition.cnn.com/2012/03/08/world/meast/widney-brown-inside-middleeast/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00212.warc.gz
|
en
| 0.975555
| 925
| 2.8125
| 3
|
Other available languages: none
Brussels, 7 February 2013
Proposed Directive on Network and Information Security – frequently asked questions
Information systems can be affected by security incidents, such as human mistakes, natural events, technical failures or malicious attacks. These incidents are becoming bigger, more frequent, and more complex. 57% of people who responded to a Commission consultation said they had experienced Network Information Security (NIS) incidents over the previous year. A lack of NIS can compromise vital services: it can stop businesses functioning, generate substantial financial losses for the EU economy and negatively affect societal welfare. Digital information systems, in particular the internet, work across borders. A disruption in one EU country can have a knock-on effect in other Member States or the EU as a whole - for example, cross-border movement of goods, services and people could be hampered.
Who will benefit and how?
Citizens and consumers, however they define themselves, will have more trust in the technologies, services and systems they rely on day-to-day. This increased confidence will means a more inclusive cyberspace, and a digital economy that grows even faster, supporting our economic recovery.
Governments and businesses will be able to rely on digital networks and infrastructure to provide their essential services at home and across borders. Secure eCommerce platforms could bring more customers online and create new opportunities.
Providers of ICT security products and services will benefit from specific security measures, combined with a more harmonised EU approach. Demand for their products and services is bound to increase, leading to innovative products and economies of scale.
Activists need to be safe online in order to express themselves freely. A more secure and resilient internet means these vital voices will be heard and protected more than happens today.
The EU economy will benefit as sectors that rely heavily on NIS will be supported to offer a more reliable service. Harmonised NIS requirements will lead to more consistent risk management measures and response and more systematic reporting of incidents. All of these should create more equal and stable conditions for anyone trying to compete in Europe’s Single Market.
When will the Directive come into effect?
Member States will have to implement the Directive within 18 months of its adoption by the Council and European Parliament.
Why do digital technologies, networks and services need protecting?
Because most Europeans rely on digital technologies, networks and services to conduct their day-to-day life, even if they don’t always realise it. Each year, 200 million Europeans – 40% of all citizens – buy over the internet. The ICT sector alone represents almost 6% EU GDP, and Europe's ICT sector and ICT-related investments deliver around half of our productivity growth. The internet economy has generated 21% of EU GDP growth over the last 5 years. Major cybersecurity incidents put jobs and our chances for economic growth at risk.
What is the scale of the problem?
Cybersecurity incidents or breaches can have a major impact on individual companies and on Europe's wider economy. According to a Symantec and Ponemon Institute study, a data breach could cost a company anything up to US$58 million, with equally significant potential side effects like reputational damage, loss of customers and market share. A 2012 PwC survey found that 93% of large corporations and 76% of small businesses had a cybersecurity breach in the past year, with estimated losses of £15,000-30,000 even for smaller businesses.
Recent large-scale problems have included:
Why the new approach? Are existing regulatory measures or initiatives not working?
Past efforts have been on too small a scale and too fragmented, with the voluntary nature of past efforts leaving many gaps in our overall cybersecurity.
For example, under existing EU rules, only telecoms companies and data controllers have to adopt security measures, and telecoms companies alone are required to report significant security incidents. The new proposed Directive works to level the playing field by applying to all owners of critical infrastructure.
What do the proposals on risk management and reporting of security incidents mean for businesses and other organisations?
The Commission proposes to extend the obligation to report significant cyber incidents to:
Will every incident have to be reported?
No. Only incidents having a significant impact on the security of core services provided by market operators and public administrations will have to be reported to the competent national authority. For example, an electricity outage caused by a NIS incident and having a detrimental effect on businesses; the unavailability of an online booking engine that prevents users from booking their hotels or of a cloud service provider that inhibits users to get access to their content; the compromise of air traffic control due to an outage or a cyber attack.
The competent national authority may require that the public be informed. Public announcement will not be mandatory. Wider public interest will need to be considered in such judgements and vulnerabilities should not be disclosed until appropriate security fixes are available.
Why does the Directive target internet companies?
The proposed Directive includes internet companies because it is absurd to work to protect critical internet infrastructure without obliging such companies to take responsibility for their wider role in this ecosystem.
What about Internet Service Providers or the network owners?
These companies are already reporting incidents under the risk management and incident reporting obligations under the EU Telecom Framework Directive. ENISA (European Network and Information Security Agency) has recently published its report on incident reporting in 2011. In total, 51 incidents were reported.
Given that Member States now have more mature national incident reporting schemes compared to 2011, ENISA expects that the next annual report will contain 10 times more incidents.
Who is exempted from the reporting obligations?
Hardware manufacturers and software developers are exempted from the risk management and reporting obligations. The same applies to specific sectors or sub-sectors, for example insurance, water, food supply. The sectors currently covered in the proposed Directive are the ones for which the importance to ensure cybersecurity is widely recognised. The public consultation on NIS also pointed to these sectors. Trust services are not covered as they are covered by the Commission's proposal for a Regulation adopted in June 2012.
Are media companies involved if they provide IT-like services?
The NIS Directive covers key internet enablers, i.e. those players whose services, delivered through the internet, empower key economic and social activities. When such activities or services are suspended for a couple of hours there may be a significant impact. The annexed table gives some examples of players that could be affected. News agencies and publishers, even when they provide IT and/or online services, are not covered. They are not key internet enablers like large eCommerce or cloud platforms, booking engines or social networks. Neither are Web browsers like Mozilla Firefox or websites like Wikipedia or content management systems like Wordpress.
What will you do to ensure companies don't end up dealing with 27 systems for reporting breaches?
Common reporting systems will be developed through implementing measures for the Directive. Specific templates could also be developed by ENISA, which has already brought together national regulators to develop harmonised national measures for risk management and incident reporting as part of the EU telecoms rules. ENISA is going through the same process for Article 4 of the ePrivacy Directive.
Doesn’t security regulation limit freedom and openness?
No. This strategy and the proposed Directive emphasise that security and freedom go hand-in-hand. Security enables citizens to reap the full opportunities that digital technologies offer. It is in full compliance with the EU Charter of Fundamental Rights, respecting privacy, with protection for personal data, freedom to conduct a business, the right to property, the right to an effective remedy before a court and the right to be heard.
Will the EU define minimum standards or level of security?
No, the Commission is not a standard-setting body. The proposed Directive seeks to lift the quality and assurance of cybersecurity, but does not impose any specific technical standards or mandate particular technological solutions. The wider Strategy asks ENISA to work with standardisation bodies and all relevant stakeholders to develop technical guidelines and recommendations for the adoption of NIS benchmarks and good practices The proposed Directive does, however, impose the take-up of a minimum level of security by obliging critical infrastructure operators, key internet companies and public administrations to manage risks and report significant incidents. It also details a minimum set of NIS capabilities which Member States are required to put in place (e.g. a well-functioning Computer Emergency Response Team (CERT) which is adequately staffed and resourced). Member States are free to go beyond and adopt or maintain stricter security requirements.
Why was minimum harmonisation chosen for the proposed NIS Directive?
The current level of NIS in the EU varies across Member States and industries. It is therefore important to first establish a common minimum level, before moving to more advanced cooperation. Those Member States and businesses that want to be frontrunners in terms of NIS by going beyond the minimum requirements are free to do so, even at this stage.
Isn't ENISA already doing enough in the field of cybersecurity in the EU?
Effective cybersecurity cannot be outsourced to a single body. ENISA will continue to provide its expertise and advice at EU level on the basis of its mandate in the new cooperation framework, to be established by the proposed NIS Directive.
How is the EU approach different to the US approach?
President Obama has long recognised cybersecurity as a top priority and recently announced that he will issue an Executive Order on cybersecurity. The executive order is likely to contain recommendations for operators of critical infrastructure such as energy and transport to join a voluntary program and follow a set of cybersecurity standards. The guidance is not thought to prescribe one type of security over another. The main difference is that under the US Executive Order companies will be encouraged, but not required to adopt some non-technical standards, to be defined by the Institute of Standardisation and Technology.
What proof is there that openness and reporting is better for companies than covering up?
The obligation to report incidents will give companies the incentive to ensure that appropriate security processes are in place. Being prepared is vital, given the staggering potential cost of just one data breach. Being open and reporting incidents is also a way to ensure the long-term survival of a company. For example, DigiNotar a Dutch certificate authority, failed to report a significant breach it suffered in 2011. When the breach was unveiled, DigiNotar suffered from a catastrophic loss of reputation and subsequently went bankrupt. Being open about a problem, and what a company is doing to resolve it, can restore confidence.
Examples of companies which are obliged to report cyber incidents
|
<urn:uuid:e6d47acb-10a2-4d13-800a-bb5240e2e6b7>
|
CC-MAIN-2017-26
|
http://europa.eu/rapid/press-release_MEMO-13-71_en.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00212.warc.gz
|
en
| 0.9486
| 2,167
| 2.609375
| 3
|
Imagine walking through a field on a cloudless day when you suddenly hear the 130-decibel roar of a fighter jet. But you can’t spot the jet, or even tell which direction the sound is coming from. Rather, it seems to originate from the thin air in front of your face, like a shout from an angry, Old-Testament God. No, you aren’t hallucinating. And you aren’t Moses. You’re experiencing a new type of military weapon intended not to kill but to startle an enemy into retreat. It’s called the Laser-Induced Plasma Effect, or LIPE, a weapon that the U.S. military hopes to begin testing in coming months.
LIPE is the brainchild of the Joint Non-Lethal Weapons Program, a group tasked with inventing better options for crowd control and checkpoint security. The noise comes from a unique manipulation of matter and energy to produce loud sounds at specific target locations, sort of like an incredibly precise missile of noise. Here’s how it works:
Matter comes in four states: solid, liquid, gas, and what’s called plasma, the one least familiar to most people, though it’s actually the most common state of matter in the universe. You can think of it as gas plus. In the plasma state, high doses of energy have pulled electrons from their atomic nuclei, creating ions. A bunch of these hanging out is a state of matter that isn’t a liquid or solid and doesn’t behave exactly like a gas either, but rather has magnetic and electric properties and can take the form of light (think neon lights, or the Sun).
LIPE’s lasers fire extremely short bursts (around a nanosecond, or a billionth of a second) of directed high energy at a target. That target could be on a person, a windshield, or merely a single point in space. The energy, relatively harmless at the LIPE levels, separates electrons and nuclei at the target area to create a blue ball of plasma. Additional pulses of directed laser energy manipulate the ball to make a noise that seems to come from nowhere.
“We’ve demonstrated it in the lab at very short ranges. But we haven’t been able to demonstrate it at even 100 meters. That’s … the next step,” said David Law, the technology division chief at JNLWD.
The total cost will be about $3 million, paid out in two $1.5-million small-business-innovation-research contracts to Physical Optics Corp., which is working on the lighting effects, and a Tucson-based company called GEOST, which is working on the sound.
All of that may sound cutting-edge (in addition to loud), but LIPE is not the military’s first attempt to harness the unique properties of plasma matter to achieve strange effects. In 2002 ,a JNLWD program called the Pulsed Energy Projectile sought to create a sound effect that could “literally knock rioters off their feet” New Scientist reported a decade ago. It was supposed to be released in 2007;Instead, the project vanished. In 2004, the Navy tested plasma’s capabilities as a missile deflector in an initiative called Plasma Point Defense, another project with goals well beyond what the technology at the time could deliver.
Such early plasma weapons were heavy — many weighed more than 500 pounds — and required enormous power to deliver very limited effects.That slowly began to change.
In 2005, a company called Stellar Photonics was working on a precision sound weapon for JNLWD under a $2.7 million contract that was part of a program called Plasma Acoustic Sound System, or PASS. By 2009, JNWLD was testing it, with some success. A lot had changed. “What we do with these prototypes to date is power them off of just a regular car battery. They don’t take a lot of energy, but there is … very high peak power, which is what makes this thing work,” said Law.
The short-term goal for PASS was a loud sound effect at a range of 100 meters, very similar to LIPE. What LIPE promises is far more volume. “Current plasmas maybe achieve 90 to 100 dB … we are trying to get to be around 130 dB or a little more,” Law said. He likened the difference to a lawn mower versus a fighter jet. “Every dB is a factor of 10 times the loudness… We’ve been working this in bits and pieces since 2009, but it really has been just over the past couple years that the laser technology has matured enough to be able to potentially get this kind of sound out,” said Law.
Will it work out this time? The world will know soon enough. Law’s goal is to test at 100 meters in coming months and evaluate the program in its entirety by next May.
|
<urn:uuid:ddbb09dc-ded6-43c3-af3e-1bb12d161426>
|
CC-MAIN-2017-26
|
http://www.defenseone.com/technology/2015/07/military-will-test-new-terrifyingly-loud-noise-gun/118662/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00212.warc.gz
|
en
| 0.953988
| 1,050
| 3.046875
| 3
|
George M. Strain, PhD
Recent issues of Top Notch Toys have printed dialog about the merle gene, especially relating to its presence in the Chihuahua breed. One particular article (1) cited research of mine (2) with an incorrect interpretation that I wish to correct. In addition, I would like to provide unbiased up-to-date information on the merle gene that may inform and clarify the debate on this issue. I have been performing research on hearing and deafness since the late 1980’s, and am identified as a leading authority on deafness in dogs, so I am well positioned to provide this information. I should point out that publications and writings of mine from past years discussing the merle gene no longer represent my opinion, as recent research has led me to change my position.
The above cited article contained the statement that According to Dr. George Strain merle and piebald dogs with blue eyes are 50% more likely to be deaf.@ The research from which this was drawn only applied to the piebald gene and only applied to the Dalmatian breed, where blue eyes and deafness are a wide-spread problem (30% of US Dalmatians are deaf in one or both ears). My research did not apply to dogs with merle, and I am unaware of any study examining this issue using adequate numbers of dogs and dogs from breeds other than Dachshund, where the published studies have limitations (see below).
Two pigment genes are associated with deafness in dogs: piebald (s) and merle (M). Piebald, which is present in Dalmatians, bull terriers, cocker spaniels, Jack Russell terriers, Chihuahuas and others, is a recessive gene. There are three recessive alleles for piebald: Irish spotting (si), piebald (sp), and extreme white piebald (sw); dogs that have uniform color without white carry the dominant allele (S). The piebald gene produces areas of white by suppressing pigmentation cells (melanocytes). Merle, which is present in Shetland sheepdogs, Australian shepherds, Dachshunds, Great Danes and others, is a dominant gene. Merle produces a color pattern where patches of color are diluted or absent (white); animals homozygous with the recessive allele (mm) have solid color. Dogs with piebald must be homozygous to have areas of white, while merles can be either heterozygous (mM) or homozygous (MM). There is no evidence to suggest that dogs carrying both the piebald and merle genes have an increased likelihood of deafness.
Much of the literature on merle in the past focused on problems seen in homozygous merles and in breeds where the merle gene can produce dramatic effects B in some cases including deafness, blindness and microphthalmia, and sterility. Even heterozygous dogs in these breeds can have less serious visual and auditory deficits. This indeed happens with some breeds, but unfortunately many people have taken this truth and extrapolated it to apply to all breeds carrying the merle gene, which is not true. For example, dogs in the Catahoula breed can be homozygous merle without any of these health defects, and heterozygotes do not seem to be affected. Until recently it was not possible to even distinguish between mM and MM merles in some breeds.
Since not all breeds carrying the merle gene experience the deleterious effects, it is incautious to proclaim that the presence of this pattern in a breed will be injurious to the breed without first investigating whether deaf or blind dogs result from breeding heterozygous merles. Are there any known deaf or blind merle chihuahuas? If so, are they heterozygous or homozygous? In many breeds carrying merle, breeders know not to breed homozygous merles, and visual and auditory deficits do not seem to be a problem in the heterozygotes. Studies have examined auditory function (3) and visual function (4) in heterozygous and homozygous dappled (merle) Dachshunds, as described in several writings by Dr. Malcolm Willis. These studies, from geographically and numerically restricted populations, found hearing loss and deafness and visual abnormalities, but only examined small numbers of dogs B 38 in the first study and 18 in the second. Dappled Dachshunds, when carefully bred to avoid MM, do not appear to have deafness or blindness in the general population, so one must be careful to not raise alarms at the presence of merle in a breed until experience shows that a true problem exists.
A large leap in understanding merle occurred when Clark and Murphy of Texas A&M University identified and sequenced the canine gene for merle in 2006 (5). The gene, named SILV, (also known as Silver in mice) plays a role in pigmentation in skin, eye, and ear. Dogs with the merle phenotype have a short piece of DNA inserted into this gene B a DNA modification known as a short interspersed element (SINE). This work was performed with Shetland sheepdogs, then confirmed in merles from eleven other breeds, including chihuahua. The sequence of the SINE was the same in all breeds, suggesting that all breeds in the study shared a common ancestor. The merle SINE insertion has three components: a head, a body and a tail; the latter contains a long string of repeated adenine nucleotides (polyA). For a dog to show the merle phenotype, it must have both the SINE insertion and a polyA tail that is of sufficient length (90-100 adenine repeats). Some merle-merle breedings produce homozygous merles called cryptic because they don=t show the merle phenotype, and when bred they do not produce any merle offspring. It turns out that the polyA tail in cryptic merles has been truncated to 65 or fewer adenine repeats. So, the merle gene phenotype can revert to the non-merle in one generation. In the same way, it is theoretically possible for the polyA tail length to increase from genetic processing error, spontaneously producing a merle (5,6). The likelihood of this possibility is unknown but probably low.
It has been suggested that merle appeared in the Chihuahua breed from a cross to another breed, such as the Dachshund. Others have suggested that the gene has been present for many generations, but that the pigmentation pattern was incorrectly described, such as blue and tan or black and silver. A single event of the first possibility might still make it hard to explain all of the merle Chihuahuas now in existence. Regardless of the source of merle in the breed, to my knowledge there is no data at this time to suggest that merle Chihuahuas are prone to visual or auditory problems. I would encourage the breed organization investigate the prevalence of visual and auditory disorders in merle Chihuahuas prior to making decisions affecting the breed standard.
More information on deafness in general can be found on my research web page:
1. Lambert G. 2006. Chihuahuas – Any color (breed) marked or splashed?? Top Notch Toys 22(4):116.
2. Strain GM. 2004. Deafness prevalence and pigmentation and gender associations in dog breeds at risk. The Veterinary Journal 167(1):23-32.
3. Reetz, I., Stecker, M., & Wegner, W. 1977. Audiometrische Befunde in einer Merlezucht [Audiometric findings in dachshunds (merle gene carriers)]. Deutsche Tierärztliche Wochenschrift 84(7):273 277.
4. Klinckmann G, Koniszewski G, Wegner W. 1986. Light microscopic investigations on the retinae of dogs carrying the Merle factor. Journal of Veterinary Medicine A 33(9):674 688.
5. Clark LE et al. 2006. Retrotransposon insertion in SILV is responsible for merle patterning of the domestic dog. Proceedings of the National Academy of Sciences 103(5):1376 81.
6. Cordaux R, Batzer MA. 2006. Teaching an old dog new tricks: SINEs of canine genomic diversity. Proceedings of the National Academy of Sciences 103(5):1157 8.
|
<urn:uuid:2e1e7c60-4568-42d7-b30f-5eb5e01d6cd7>
|
CC-MAIN-2017-26
|
http://petitdogs.com/merle-strain/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320915.38/warc/CC-MAIN-20170627032130-20170627052130-00292.warc.gz
|
en
| 0.917822
| 1,789
| 3.078125
| 3
|
Engineering Technology graduates in the mechanical concentration design equipment and products that affect virtually every area of your life, including:
The emphasis of engineering technology is on the practical application of theory. Mechanical Engineering Technology is one of the most diverse engineering technology disciplines, dealing with the design, development and manufacture of every kind of vehicle, power system, machine and tool.
The concentration in Mechanical Engineering Technology at LeTourneau University involves a curriculum of 130 semester hours and is one of five concentration choices within our Bachelor of Science in Engineering Technology degree.
To learn more about course requirements
As a senior design team, Frontier Wheelchairs has partnered with Hope Haven International in Antigua, Guatemala, to improve wheelchair designs to serve the needs of wheelchair users.
Led by Norman Reese, the project allows students to go through the whole engineering design process, from interacting with the "customer" and developing design concepts, to getting hands-on experience building their own wheelchair.
The SAE Mini Baja Project is an international, collegiate competition that requires students design, build, and race an off-road vehicle. SAE gives specific guidelines that each team must follow in order to compete.
Competition results are based on the design, cost, and performance of each vehicle. Teams are entirely student based with the exception of a faculty advisor.
This concentration gives a firm understanding of mechanical principles and machines to prepare you to work in various career fields, including:
Learn more about the lab space and facilities available to Engineering Technology, Mechanical Concentration students:
|
<urn:uuid:7657d556-a192-4e84-b114-a4ba96b89340>
|
CC-MAIN-2017-26
|
http://www.letu.edu/opencms/opencms/_Academics/Engineering/degrees/Engineering_Technology_BS/Mechanical_Concentration.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320915.38/warc/CC-MAIN-20170627032130-20170627052130-00292.warc.gz
|
en
| 0.93779
| 310
| 2.609375
| 3
|
Interesting creatures are often seen within the fantastic habitats of carnivorous plants across Long Island. Some can be somewhat common, while others rare. But all are beautiful in their own ways, and are always wonderful to discover. Visits to the Sphagnum bogs and ponds near the Peconic River were where these photographs were taken, and these are just a few of the interesting subjects that were observed on those summer days. In the first photograph, a cluster of traps of the spoonleaf sundew, Drosera intermedia, with brilliant red coloration is seen. The second photograph, we have a detail of these traps sparkling in the mid-day sun, showing the particular shape of the traps of this species. For the third photograph, a detailed look of a trap from the hybrid sundew, Drosera x belezeana (Drosera rotundifolia x intermedia). Known from other parts of the world, this hybrid was recorded for the first time in New York, by the author in the summer of 2012. This particular trap is a great example of the blending of characteristics between the parent species. For quick observation, the trap appears much like that of Drosera rotundifolia, yet is nowhere as wide, and a little more elongated, inheriting some traits from Drosera intermedia.
Onto the fourth photograph, there is a trap from the purple pitcher plant, Sarracenia purpurea, springing forth from its mossy habitat of the Sphagnum bog. The fifth photograph, is a flower of the Broadleaf Arrowhead, Sagittaria latifolia, which often grows near carnivorous plants in the wetter parts of the habitats. Sometimes known as the Duck Potato, which is strange, because ducks rarely eat the tubers of this plant. And for the final photograph, we see a female Green Frog, Lithobates clamitans, sitting on the edge of a coastal plains pond. The frog was very cooperative, allowing for close-up photographs with a 50mm lens coupled with a set of macro tubes. Was she remaining so perfectly still hoping to go unnoticed by a potential predator? Or was she gracefully posing for the photography session, basking in the adoration and recognition of her glorious beauty? I asked, but she only replied “ribbit”.
|
<urn:uuid:ddf4ce7e-409c-4d94-a80a-89b93f796e8e>
|
CC-MAIN-2017-26
|
https://suffolkboglands.wordpress.com/category/2014/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320915.38/warc/CC-MAIN-20170627032130-20170627052130-00292.warc.gz
|
en
| 0.956791
| 479
| 2.5625
| 3
|
By Dana Gabriel
As part of the Beyond the Border initiative, the U.S. and Canada are strengthening cybersecurity cooperation. In a move that received little attention, both countries recently announced a joint cybersecurity action plan. Cyber threats know no national borders which has made the issue an important security concern. A fully integrated North American security perimeter would be entrusted with preventing and responding to any such attacks.
One of the key priorities identified in the November 2011 Beyond the Border Action Plan is cybersecurity. The agreement lays the framework for enhancing U.S.-Canada, “bilateral cyber-security cooperation to better protect vital government and critical digital infrastructure and increase both countries' ability to respond jointly and effectively to cyber incidents. This will be achieved through joint projects and operational efforts, including joint briefings with the private sector and other stakeholders, and the enhancement of real-time information sharing between operation centres.” The deal will also work towards strengthening, “cooperation on international cyber-security and Internet governance issues to promote prosperity, enhance security and preserve openness in our networked world.” Merging cyber threat strategies would force Canada to further bring its security practices in line with American ones and under the reach of the Department of Homeland Security (DHS).
|
<urn:uuid:0d498874-a092-4ffd-b36d-53c701e7a667>
|
CC-MAIN-2017-26
|
http://beyourownleader.blogspot.com/2012_11_01_archive.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321938.75/warc/CC-MAIN-20170627221726-20170628001726-00372.warc.gz
|
en
| 0.94553
| 250
| 2.59375
| 3
|
The Ming dynasty (1368 – 1644), officially known as the Empire of the Great Ming, was the penultimate imperial dynasty of China. Established by Zhu Yuanzhang in the wake of the Red Turban Rebellion that overthrew the Mongol Yuan dynasty, it saw a return to native Chinese rule, though it would ultimately be the last imperial dynasty to carry this title.
While the dynasty maintained millennia of Chinese prestige as the premier power in the region, it differed from its predecessors in the establishment of a secret police, the Jinyiwei, an increasingly isolationist attitude towards trade, and a decline in scientific development. Because its founder was a former peasant who had to deal with a court run by the traditional nobility, the government began with an atmosphere of distrust that precipitated a series of widespread purges. Through these purges, Zhu Yuanzhang, better known as the Hongwu Emperor, set a precedent for the violent purges that would frequently ignite throughout the entire course of the dynasty. At least some of these purges were initiated under the auspices of the Templars, and the Chinese branch of their archenemy, the Assassins, was nearly exterminated during this era.
In spite of these excesses, the dynasty was also responsible for major achievements such as the restoration of the Grand Canal, the expansion of the Great Wall, the construction of the Forbidden City in Beijing, and the voyages of exploration conducted by the fleet admiral Zheng He. Literature, poetry, and music thrived, and some of the most famous Chinese novels were produced in this period.
In the 17th century, famine, epidemic, and economic disaster gave rise to massive rebellions throughout the country. The Manchus, newly unified under an empire they dubbed the Great Qing, seized advantage of this turmoil to conquer the entirety of China in 1644, ending the Ming dynasty, and inaugurating what would be the last imperial dynasty in Chinese history.
The heir-less Zhengde Emperor's death in April 1521 brought disarray to the imperial court. The Templar eunuchs Eight Tigers used this opportunity for plotting to control China by controlling the most influential people in court. They placed the Zhengde Emperor's cousin Zhu Houcong on the throne and ruled China through his stead.
In 1524, the Eight Tigers triggered the Great Rites Controversy to hunt down officials who tried to oppose the Jiajing Emperor, specifically purging the Chinese Assassins. They managed to chase and kill the Mentor Zhu Jiuyuan, who was in Italy seeking help with the now Assassin Shao Jun and eradicate most of the Brotherhood.
After receiving training with the legendary Master Assassin Ezio Auditore da Firenze, Shao Jun returned to China in 1526 to exact vengeance with her old Mentor Wang Yangming. By using a Precursor box, they assassinated the majority of the Eight Tigers until Zhang Yong retrieved the box upon killing Wang Yangming.
In 1532, Jun traveled to the Great Wall in pursuit of Zhang Yong, the last Tiger, who was planning to let the Altan Khan and his Mongols invade China. The Assassin killed the Mongol scouts and closed the Wall's gates, preventing the invaders from breaching her home. Among the chaos of bombardment from the Mongols, Shao Jun managed to kill Zhang Yong, eliminating the Templar threat in China.
From 1542 to 1550, China was continually harassed by the Mongols. The Jiajing Emperor eventually ended the conflict by offering the Mongols special trading rights and expanded Beijing by building the Outer City. He developed an interest in alchemy in his later years, a fascination which led to his death after the Assassins played on his desire to drink the elixir of life and arranged for him to ingest a lethal dose of mercury.
The dynasty collapsed after the Manchu invaded and conquered the Ming, establishing the Qing dynasty.
|
<urn:uuid:4c44077a-d493-418d-8507-f1c706a8f301>
|
CC-MAIN-2017-26
|
http://assassinscreed.wikia.com/wiki/Ming_dynasty
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323721.80/warc/CC-MAIN-20170628171342-20170628191342-00452.warc.gz
|
en
| 0.957152
| 791
| 3.296875
| 3
|
Measuring Intelligence: Facts and Fallacies
The testing of intelligence has a long and controversial history. Claims that it is a pseudo-science or a weapon of ideological warfare have been commonplace and there is not even a consensus as to whether intelligence exists and, if it does, whether it can be measured. As a result the debate about it has centred on the nurture versus nature controversy and especially on alleged racial differences and the heritability of intelligence - all of which have major policy implications. This book aims to penetrate the mists of controversy, ideology and prejudice by providing a clear non-mathematical framework for the definition and measurement of intelligence derived from modern factor analysis. Building on this framework and drawing on everyday ideas the author address key controversies in a clear and accessible style and explores some of the claims made by well known writers in the field such as Stephen Jay Gould and Michael Howe.
What people are saying - Write a review
We haven't found any reviews in the usual places.
appears approach argument arises average Bell Curve brain calculated Central Limit Theorem chapter Charles Spearman claim collective property common construct contribution critics debate depends described dominant dimension effect empirical environment environmental factors example expect fact factor analysis factor model figure Flynn effect fundamental genes genetic Gould group differences height heritability human idea identify important indicators individuals inheritance intelligence testing interactions IQ scores IQ tests item response theory Jensen judgement kind large number latent class model latent structure latent variable level of measurement manifest variables matter means measurement of intelligence measuring intelligence mental ability normal distribution observed one,dimensional particular population positively correlated possible precise principal components analysis problem quantity question recognise relevant sample scale sense set of test shape simple single Spearman sufficient statistic summarise suppose test items test scores theory things underlying Wechsler
Clocking the Mind: Mental Chronometry and Individual Differences
Arthur R. Jensen
Limited preview - 2006
Integrating the Mind: Domain General Versus Domain Specific Processes in ...
Maxwell J. Roberts
No preview available - 2007
|
<urn:uuid:f822f13a-123b-4992-a4af-7289c8d775cb>
|
CC-MAIN-2017-26
|
https://books.google.com/books/about/Measuring_intelligence.html?id=sPaS7R5-Wk4C&hl=en
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323721.80/warc/CC-MAIN-20170628171342-20170628191342-00452.warc.gz
|
en
| 0.867861
| 393
| 2.625
| 3
|
Among India’s ethnic or Western fashions no dress has had such dimensional breadth as had a kurta since its inception almost over two millenniums ago. During these years this kurta, in one incarnation or the other, has been one of the main components of man’s ensemble. As suggest early sculptures and Ajanta murals from a short-length kurta of the king’s attendant to a longer one of a female dancer a kurta has been in fashion since early times. If the fifth century gold coins of Samudra Gupta represent the king in a kurta with sharp angular ends, Ajanta murals represent their dancer in a kurta with far more sharp ends. This fashion of a kurta with such sharp ends comes back in the form of Akbar’s sixteenth century chakdar jama, an Akbari form of kurta. It was in the eighteenth century under the Nawabs of Oudh that the fashions of kurta were further diversified leading it to zenithal heights transforming it into a timeless wear – a form now prevalent with greater thrust.
Unlike a tight-fitted piece of ensemble this semi-loose wear has immense scope for ingenuity and innovation. From a tight-fitted piece designed for a wrestler allowing each muscle to project, a kurta might also be designed with a larger breadth to conceal a pot belly and minimize the bulkiness of an awkward figure. It might be a less expensive footpath trader’s piece, neither too long nor too large and crafted from an ordinary textile length, but also one crafted at an expensive designer’s studio. Similarly, a plain kurta might be designed to breathe the beauty of a highly embellished wear, and vice versa, a highly embellished piece might breathe an air of rare simplicity and elegance. In its form a kurta is endowed with such ability that neither the plainness affects its appearance adversely nor any amount of adornment makes it showy.
This piece, a plain kurta, has been crafted out of pure cotton length with raw silk like texture which is the primary source of its beauty. It discovers all its grace, elegance and beauty in its simplicity and rawness. As the raw silk-like texture shall not suit a pajama the designer has chosen for pajama fine mercerized cotton though in such colour-shade that affords to the kurta appropriate contrast.
This description by Prof. P.C. Jain and Dr Daljeet. Prof. Jain specializes on the aesthetics of ancient India. Dr Daljeet is the chief curator of the Visual Arts Gallery at the National Museum of India, New Delhi. They have both collaborated on numerous books on Indian art and culture.
|
<urn:uuid:670e6fa4-728a-4958-90a3-b41571f5c0f1>
|
CC-MAIN-2017-26
|
http://www.exoticindia.com/product/textiles/solid-plain-kurta-pajama-set-SPC24/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323970.81/warc/CC-MAIN-20170629121355-20170629141355-00532.warc.gz
|
en
| 0.957736
| 580
| 2.609375
| 3
|
Jonathan Edwards (1703-1758)
Born Oct. 5, 1703, East Windsor, Conn.
Died March 22, 1758, Princeton, N.J.
Johnathan Edwards was the greatest theologian and philosopher of British American Puritanism, stimulator of the religious revival known as the "Great Awakening," and one of the forerunners of the age of Protestant missionary expansion in the 19th century.
Edwards' father, Timothy, was pastor of the church at East Windsor, Conn.; his mother, Esther, was a daughter of Solomon Stoddard, pastor of the church at Northampton, Mass. Jonathan was the fifth child and only son among 11 children; he grew up in an atmosphere of Puritan piety, affection, and learning. After a rigorous schooling at home, he entered Yale College in New Haven, Conn., at the age of 13. He was graduated in 1720 but remained at New Haven for two years, studying divinity. After a brief New York pastorate (1722–23), he received the M.A. degree in 1723; during most of 1724–26 he was a tutor at Yale. In 1727 he became his grandfather's colleague at Northampton. In the same year, he married Sarah Pierrepont, who combined a deep, often ecstatic, piety with personal winsomeness and practical good sense. To them were born 11 children.
The manuscripts that survive from his student days exhibit Edwards' remarkable powers of observation and analysis (especially displayed in “Of Insects”), the fascination that the English scientist Isaac Newton's optical theories held for him (“Of the Rainbow”), and his ambition to publish scientific and philosophical works in confutation of materialism and atheism (“Natural Philosophy”). Throughout his life he habitually studied with pen in hand, recording his thoughts in numerous hand-sewn notebooks; one of these, his “Catalogue” of books, demonstrates the wide variety of his interests.
Edwards did not accept his theological inheritance passively. In his “Personal Narrative” he confesses that, from his childhood on, his mind “had been full of objections” against the doctrine of predestination—i.e., that God sovereignly chooses some to salvation but rejects others to everlasting torment; “it used to appear like a horrible doctrine to me.” Though he gradually worked through his intellectual objections, it was only with his conversion (early in 1721) that he came to a “delightful conviction” of divine sovereignty, to a “new sense” of God's glory revealed in Scripture and in nature. This became the centre of Edwards' piety: a direct, intuitive apprehension of God in all his glory, a sight and taste of Christ's majesty and beauty far beyond all “notional” understanding, immediately imparted to the soul (as a 1734 sermon title puts it) by “a divine and supernatural light.” This alone confers worth on man, and in this consists his salvation. What such a God does must be right; hence, Edwards' cosmic optimism. The acceptance and affirmation of God as he is and does and the love of God simply because he is God became central motifs in all of Edwards' preaching.
Under the influence of Puritan and other Reformed divines, the Cambridge Platonists, and British philosopher-scientists such as Newton and Locke, Edwards began to sketch in his manuscripts the outlines of a “Rational Account” of the doctrines of Christianity in terms of contemporary philosophy. In the essay “Of Being,” he argued from the inconceivability of absolute Nothing to the existence of God as the eternal omnipresent Being. It was also inconceivable to him that anything should exist (even universal Being) apart from consciousness; hence, material things exist only as ideas in perceiving minds; the universe depends for its being every moment on the knowledge and creative will of God; and “spirits only are properly substance.” Further, if all knowledge is ultimately from sensation (Locke) and if a sense perception is merely God's method of communicating ideas to the mind, then all knowledge is directly dependent on the divine will to reveal; and a saving knowledge of God and spiritual things is possible only to those who have received the gift of the “new sense.” This grace is independent of human effort and is “irresistible,” for the perception of God's beauty and goodness that it confers is in its very nature a glad “consent.” Nevertheless, God decrees conversion and a holy life as well as ultimate felicity; and he has so constituted things that “means of grace” (e.g., sermons, sacraments, even the fear of hell) are employed by the Spirit in conversion, though not as “proper causes.” Thus, the predestinarian preacher could appeal to the emotions and wills of men.
Edwards' influence on the intellectual character of American Protestantism for a century after his death was very pronounced, and he was widely read in the British Isles. In a general revolt against Puritanism and Calvinism after the U.S. Civil War (1861–65), Edwards' prestige declined, and he was remembered mainly as a hell-fire preacher or as an abstruse, absent-minded metaphysician. In the 1930s and after, he was rediscovered by theologians reacting against liberalism and by secular scholars seeking to delineate the “American mind.” Edwards' ability to combine religious intensity with intellectual rigour and moral earnestness, the cosmic sweep of his theological vision, his emphasis on faith as an “existential” response to reality, his insistence that love is the heart of religion, and his uncompromising stand against all forms of idolatry are some of the reasons his life and writings are again being seriously studied.
Edwards, Jonathan. Encyclopædia Britannica. Retrieved April 14, 2006, from Encyclopædia Britannica 2006 Ultimate Reference Suite DVD .
Sermons by Jonathan Edwards 1.0
|
<urn:uuid:9aa629cb-5161-4b98-91d4-d87e898d2e31>
|
CC-MAIN-2017-26
|
http://forums.swordsearcher.com/resources/sermons-by-jonathan-edwards.293/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320209.66/warc/CC-MAIN-20170624013626-20170624033626-00252.warc.gz
|
en
| 0.973681
| 1,285
| 3.015625
| 3
|
Freedom and Gun-Control
Return to Home Page
The first clause of the Second Amendment, the preamble, is "A well regulated Militia being necessary to the security of a free State," How important is this preamble in interpreting the Second Amendment? Historian David Thomas Konig, quoting from a widely used law dictionary of the eighteenth century, explains the importance of preambles in eighteenth century law: "The preamble, then, was more than merely a 'justification' for a statute, but a positive guide for understanding the purpose of the text of the statute in relation to other enactments. In the words of Giles Jacob, whose law dictionary enjoyed wide usage in the eighteenth century, 'The Preamble of a Statute which is the Beginning thereof, going before, is as it were a Key to the Knowledge of it, and to open the Intent of the Makers of the Act; it shall be deemed true, and therefore good Arguments may be drawn from the same.'102" http://www.historycooperative.org/journals/lhr/22.1/forum_konig.html
So the preamble of the Second Amendment is not superfluous as it would seem to be if it were merely a justification for the right. It is the "Key to the Knowledge" of the Second Amendment. Every clause in the Constitution must have some kind of effect. The preamble of the Second Amendment is no exception. Supreme Court Chief Justice John Marshall stated in Marbury v. Madison in 1803: "It cannot be presumed that any clause in the constitution is intended to be without effect; and therefore such a construction is inadmissible.6"
In 1939, the Supreme recognized the importance of interpreting the text of the Second Amendment with the militia end in view: "The Constitution as originally adopted granted to the Congress power- 'To provide for calling forth the Militia to execute the Laws of the Union, suppress Insurrections and repel Invasions; To provide for organizing, arming, and disciplining, the Militia, and for governing such Part of them as may be employed in the Service of the United States, reserving to the States respectively, the Appointment of the Officers, and the Authority of training the Militia according to the discipline prescribed by Congress.' U.S.C.A.Const. art. 1, 8. With obvious purpose to assure the continuation and render possible the effectiveness of such forces the declaration and guarantee of the Second Amendment were made. It must be interpreted and applied with that end in view." -United States v. Miller
Furthermore, it is difficult to understand why a military term such as bear arms would be used to describe the right to own and carry guns for private purposes. Legal scholar Michael C. Dorf explains, "In my view, protecting a 'right of the people to keep and bear Arms' is a sufficiently odd way of protecting an individual right to possess firearms for rebellion, self defense, or hunting as to provoke further inquiry.
"As I note in the next Part, at the time of the founding, the phrase 'bear arms' was most commonly used in a military setting, and even today it carries a military connotation." (Chicago-Kent Law Review Symposium on the Second Amendment vol. 76, 2000: 291) This is further supported by a search of the Library of Congress website. Simply type in the words "bear arms" and click search.
In all the recorded debates of the First Congress about the Second Amendment bear arms is used to refer to military activity. Elbridge Gerry of Massachusetts, for example, voiced his disagreement with the conscientious objector clause in earlier drafts of the Second Amendment which exempted such groups as Quakers from bearing arms. He explained, “I am apprehensive that this clause would give an opportunity to the people in power to destroy the constitution itself. They can declare who are the religiously scrupulous, and prevent them from bearing arms."
Thomas Scott of Pennsylvania echoed these concerns, He said that under the proposed clause, conscientious objectors could not be “called upon for their services” and that in such circumstances "a militia can never be depended upon. This would lead to the violation of another article in the constitution, which secures to the people the right of keeping arms, and in this case recourse must be had to a standing army.”
Gerry and Scott thought that exempting certain groups of people from militia duty could turn out to be a serious threat to the right to keep and bear arms. People opposed to war for religious reasons could still use firearms for private purposes so it’s difficult to see how such an exemption could threaten this right if the right is concerned with nonmilitary activities and has no necessary connection with a well regulated militia.
So what does the Second Amendment say about gun-control in our own day? Clearly, the evidence indicates that the Founders were clearly more interested in ensuring the existence of an armed citizen militia than in creating a barrier to laws intended to protect public safety. Nowadays, both sides of the debate show little interest in such a militia. Some think that gun control regulations should be stricter to protect public safety. Others are concerned that such regulations may interfere with their ability to use a gun in self-defense. In more recent rulings, the Supreme Court has tried to strike a balance between these two views. Basically, the court has recognized the validity of laws which don’t interfere with a law abiding citizen’s ability to use commonly owned firearms to protect their homes against intruders. Dangerous and unusual weapons, however, may be banned. The Supreme Court even went so far as to say that M-16’s, a weapon that would clearly be useful in a militia, may be prohibited. Such an approach is an attempt to resolve a modern day debate but is hard to reconcile with the plain militaristic language of the Second Amendment and the concerns the Founders had about tyranny. A more conservative court would have let the bulk of the issue be decided by the people through their elected representatives.
Comments can be sent to firstname.lastname@example.org
|
<urn:uuid:23721f58-1c49-4fc3-938d-a07c8a6abfff>
|
CC-MAIN-2017-26
|
http://guninformation.org/secondamendment.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00332.warc.gz
|
en
| 0.960796
| 1,255
| 2.921875
| 3
|
10 to 20 percent of children have common skin warts, but where do they come from? Old wives tales and folklore suggest they come from touching frogs or toads, but I think we've all grown past that as an explanation. Actually, warts are caused by human papillomavirus (HPV). They form when the virus gets into the skin, usually through a cut or scratch. The virus causes the rapid growth of cells on the outer layer of skin and once formed, they can be rough or smooth to the touch.
How do children get warts? A recent study found that elementary age children are most likely to catch the virus from family members or at school.
The study was led by, Sjoerd C. Bruggink, MD, Department of Public Health and Primary Care at Leiden University in the Netherlands. He and his team looked at how warts are commonly spread. They focused on HPV, but not the strains transmitted through sexual activity.
The study looked at 1,000 children ages 4 to 12. Researchers looked for warts on the children's hands and feet, and recorded information such as whether any family members or classmates had warts, whether the children walked barefoot at home, and whether they visited public swimming pools, used public showers or played sports barefoot. At a follow-up exam a year later, the children were re-examined for warts.
Overall, 29 percent of the children in the study developed new warts during the year. Researchers said that children who had warts at the start of the study were more likely to develop new warts than were children who had no warts at the beginning of the study.
The investigators noted that the susceptibility to developing warts may run in families. The study found that children who had family members with warts were twice as likely to develop warts.
20 percent of the children were more likely to get them from classmates who had warts.
Prevention should be aimed at reducing transmission within families and classes, the researchers said. For example, covering warts at home, rather than in the swimming pool, might be a more effective way to prevent their transmission.
Fortunately, common warts are not harmful to a child's health and often go away on their own. If your child's warts are uncomfortable and causing problems, your physician can remove them. That won't guarantee that they won't come back though, warts often return, but it can offer some relief.
The findings suggest that while public places can certainly be a contact point for the HPV virus, the home and classroom are more likely to be where children come into contact with the virus. The researchers say more preventative recommendations should be focused there.
The study was published in the journal Pediatrics.
|
<urn:uuid:01be8281-7b4c-433a-a2b4-92bc78e398cb>
|
CC-MAIN-2017-26
|
http://www.your4state.com/news/kids-warts-where-do-they-come-from
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00332.warc.gz
|
en
| 0.982074
| 569
| 3.5625
| 4
|
Getting Greener Gardens
Sustainability is becoming the buzzword for the 2000's, the Brave New World of the new milennia. We hear it applied to everything from transportation systems and energy production to the economy. So it shouldn't be surprising that it applies to gardening as well. And it's a lot more than just planting native plants. A sustainable garden contributes to reducing greenhouse gases, helps cut down on energy use, saves water and other resources, and contributes to the health and well being of those who frequent it. Plus they are less work than many more traditional gardens. The New York Times crack garden writer Ann Raver has a piece about sustainable gardens, and directs readers to the Sustainable Sites Initiative, sustainablesites.org, where you can learn about the advantages of garden sustainbablitly, get all kinds of ideas to make your own garden more sustainable, and read several case studies of gardens gone sustainable. They are also developing a set of guidelines and performance measures for developiong more sustainable gardens.
|
<urn:uuid:7e3d0ff7-8912-4c01-a6b0-94f9f6857bc7>
|
CC-MAIN-2017-26
|
http://clattervalleygardens.blogspot.com/2009/01/getting-greener-gardens.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320539.37/warc/CC-MAIN-20170625152316-20170625172316-00412.warc.gz
|
en
| 0.934324
| 207
| 3
| 3
|
MCAT General Chemistry Review
Chapter 8: The Gas Phase
8.3 Kinetic Molecular Theory
The kinetic molecular theory was developed in the second half of the 19th century, well after the laws describing gas behavior had been developed. The kinetic molecular theory was used to explain the behavior of gases, which the other laws merely described. The gas laws demonstrate that all gases show similar physical characteristics and behavior irrespective of their particular chemical identity. The behavior of real gases deviates from the ideal behavior predicted under the assumptions of this theory, but these deviations can be corrected for in calculations. The combined efforts of James Maxwell, Ludwig Boltzmann, and others led to a simple explanation of gaseous molecular behavior based on the motion of individual molecules. Like the gas laws, the kinetic molecular theory was developed in reference to ideal gases, although it can be applied with reasonable accuracy to real gases as well.
To simplify the model proposed by the kinetic molecular theory, certain assumptions are made:
1. Gases are made up of particles with volumes that are negligible compared to the container volume.
2. Gas atoms or molecules exhibit no intermolecular attractions or repulsions.
3. Gas particles are in continuous, random motion, undergoing collisions with other particles and the container walls.
4. Collisions between any two gas particles (or between particles and the container walls) are elastic, meaning that there is conservation of both momentum and kinetic energy.
5. The average kinetic energy of gas particles is proportional to the absolute temperature (in kelvin) of the gas, and it is the same for all gases at a given temperature, irrespective of chemical identity or atomic mass.
It is fairly straightforward to imagine gas particles as little rubber balls bouncing off each other and off the walls of the container. Of course, rubber balls, like real gas particles, have measurable mass and volume, and not even the bounciest rubber balls will collide in a completely elastic manner. Still, this provides an apt visualization of the behaviors described by the kinetic molecular theory.
Average Molecular Speeds
According to the kinetic molecular theory of gases, the average kinetic energy of a gas particle is proportional to the absolute temperature of the gas:
where kB is the Boltzmann constant which serves as a bridge between the macroscopic and microscopic behaviors of gases (that is, as a bridge between the behavior of the gas as a whole and the individual gas molecules). This equation shows that the speed of a gas particle is related to its absolute temperature. However, because of the large number of rapidly and randomly moving gas particles, which may travel only nanometers before colliding with another particle or the container wall, the speed of an individual gas molecule is nearly impossible to define. Therefore, the speeds of gases are defined in terms of their average molecular speed. One way to define an average speed is to determine the average kinetic energy per particle and then calculate the speed to which this corresponds. The resultant quantity, known as the root-mean-square speed (urms), is given by the following equation:
where R is the ideal gas constant, T is the temperature, and M is the molar mass.
Understanding concepts will be much more fruitful on Test Day than memorizing all of the facts. The higher the temperature, the faster the molecules move. The larger the molecules, they slower they move.
A Maxwell–Boltzmann distribution curve shows the distribution of gas particle speeds at a given temperature. Figure 8.7 shows a distribution curve of molecular speeds at two temperatures, T1 and T2, where T2 is greater than T1. Notice that the bell-shaped curve flattens and shifts to the right as the temperature increases, indicating that at higher temperatures, more molecules are moving at higher speeds.
Figure 8.7. Maxwell–Boltzmann Distribution Curves of Molecular Speeds at Two Different Temperatures
What is the average speed of xenon difluoride molecules at 20°C?
The ideal gas constant should be used, and the molar mass of xenon difluoride is M must be expressed in because joules are also derived from kilograms.
Graham’s Law of Diffusion and Effusion
The movement of molecules from high concentration to low concentration through a medium (such as air or water) is called diffusion, as shown in Figure 8.8.
Figure 8.8. Diffusion of Solutes in a Solvent
The kinetic molecular theory of gases predicts that heavier gases diffuse more slowly than lighter ones because of their differing average speeds, as shown in Figure 8.9. Because all gas particles have the same average kinetic energy at the same temperature, it must be true that particles with greater mass travel at a slower average speed.
Figure 8.9. Maxwell–Boltzmann Distribution Curves of Molecular Speeds for Gases with Different Molar Masses The more massive the gas particles, the slower their average speed.
In 1832, Thomas Graham showed mathematically that, under isothermal and isobaric conditions, the rates at which two gases diffuse are inversely proportional to the square roots of their molar masses. This is called Graham’s law, which is written mathematically as
where r1 and r2 are the diffusion rates of gas 1 and gas 2, respectively, and M1 and M2 are the molar masses of gas 1 and gas 2, respectively. From this equation, we can see that a gas that has a molar mass four times that of another gas will travel half as fast as the lighter gas.
Effusion is the flow of gas particles under pressure from one compartment to another through a small opening, as shown in Figure 8.10. Graham used the kinetic molecular theory of gases to show that, for two gases at the same temperature, the rates of effusion are proportional to the average speeds. He then expressed the rates of effusion in terms of molar mass and found that the relationship is the same as that for diffusion.
Figure 8.10. Effusion of Gas Particles Effusion is the flow of gas particles under pressure from one compartment to another through a small opening.
In the clinics, a pleural effusion is a condition in which fluid enters the intrapleural space through small openings in the capillaries or lymphatic vessels. This causes a pressure buildup around the lungs which hinders breathing.
· Diffusion—When gases mix with one another.
· Effusion—When a gas moves through a small hole under pressure.
· Both will be slower for larger molecules.
· Both conditions use the same equation.
Oxygen molecules travel at an average speed of approximately at room temperature. Calculate the average speed of hydrogen molecules at the same temperature.
Oxygen’s molar mass is Hydrogen’s molar mass is Plugging into Graham’s law, we get:
MCAT Concept Check 8.3:
Before you move on, assess your understanding of the material with these questions.
1. What are the assumptions made by the kinetic molecular theory?
2. What is the average speed of helium atoms at –173°C?
3. If neon gas travels at at a given temperature, calculate the average speed of krypton at the same temperature.
4. Hydrogen sulfide (H2S) has a very strong rotten egg odor. Methyl salicylate (C8H8O) has a wintergreen odor, and benzaldehyde (C7H6O) has a pleasant almond odor. If the vapors for these three substances were released at the same time from across a room, in which order will you smell odors? Explain your answer.
|
<urn:uuid:f1d0ee66-47b9-43b0-9930-12ade92e718b>
|
CC-MAIN-2017-26
|
http://schoolbag.info/chemistry/mcat_2/61.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320539.37/warc/CC-MAIN-20170625152316-20170625172316-00412.warc.gz
|
en
| 0.926513
| 1,593
| 3.8125
| 4
|
See Also: Boolean
public struct Boolean : IComparable, IComparable<bool>, IConvertible, IEquatable<bool>
A Boolean instance can have either of two values: true, or false.
The Boolean structure provides methods that support the following tasks:
Converting Boolean values to strings: Boolean.ToString
The following sections explain these tasks and other usage details:
Formatting Boolean values
The string representation of a Boolean is either "True" for a true value or "False" for a false value. The string representation of a Boolean value is defined by the read-only Boolean.TrueString and Boolean.FalseString fields.
You use the Boolean.ToString method to convert Boolean values to strings. The Boolean structure includes two Boolean.ToString overloads: the parameterless Boolean.ToString method and the Boolean.ToString(IFormatProvider) method, which includes a parameter that controls formatting. However, because this parameter is ignored, the two overloads produce identical strings. The Boolean.ToString(IFormatProvider) method does not support culture-sensitive formatting.
code reference: System.Boolean.Structure#3
Because the Boolean structure can have only two values, it is easy to add custom formatting. For simple custom formatting in which other string literals are substituted for "True" and "False", you can use any conditional evaluation feature supported by your language, such as the conditional operator in C# or the If operator in Visual Basic. The following example uses this technique to format Boolean values as "Yes" and "No" rather than "True" and "False".
code reference: System.Boolean.Structure#4
For more complex custom formatting operations, including culture-sensitive formatting, you can call the String.Format(IFormatProvider,String,Object) method and provide an ICustomFormatter implementation. The following example implements the ICustomFormatter and IFormatProvider interfaces to provide culture-sensitive Boolean strings for the English (United States), French (France), and Russian (Russia) cultures.
code reference: System.Boolean.Structure#5
Optionally, you can use resource files to define culture-specific Boolean strings.
Converting to and from Boolean values
The Boolean structure implements the IConvertible interface. As a result, you can use the Convert class to perform conversions between a Boolean value and any other primitive type in the .NET Framework, or you can call the Boolean structure's explicit implementations. However, conversions between a Boolean and the following types are not supported, so the corresponding conversion methods throw an InvalidCastException exception:
All conversions from integral or floating-point numbers to Boolean values convert non-zero values to true and zero values to false. The following example illustrates this by calling selected overloads of the Convert.ToBoolean(Int64) class.
code reference: System.Boolean.Structure#6
When converting from floating-point values to Boolean values, the conversion methods perform an exact comparison with zero. If the floating-point value has lost precision, the result can be unexpected. This is illustrated in the following example, in which a Double variable whose value should be zero is converted to a Boolean value. As the example shows, the result is true because repeated additions of 0.2 have resulted in a loss of precision.
When converting from Boolean to numeric values, the conversion methods of the Convert class convert true to 1 and false to 0. However, Visual Basic conversion functions convert true to either 255 (for conversions to Byte values) or -1 (for all other numeric conversions). The following example converts true to numeric values by using a Convert method, and, in the case of the Visual Basic example, by using the Visual Basic language's own conversion operator.
code reference: System.Boolean.Structure#8
Parsing Boolean values
The Boolean structure includes two static parsing methods, Boolean.Parse(String) and Boolean.TryParse(String,Boolean), that convert a string to a Boolean value. The string representation of a Boolean value is defined by the case-insensitive equivalents of the values of the Boolean.TrueString and Boolean.FalseString fields, which are "True" and "False", respectively. In other words, the only strings that parse successfully are "True", "False", "true", "false", or some mixed-case equivalent. You cannot successfully parse numeric strings such as "0" or "1". Leading or trailing white-space characters are not considered when performing the string comparison.
The following example uses the Boolean.Parse(String) and Boolean.TryParse(String,Boolean) methods to parse a number of strings. Note that only the case-insensitive equivalents of "True" and "False" can be successfully parsed.
code reference: System.Boolean.Structure#2
If you are programming in Visual Basic, you can use the CBool function to convert the string representation of a number to a Boolean value. "0" is converted to false, and the string representation of any non-zero value is converted to true. If you are not programming in Visual Basic, you must convert your numeric string to a number before converting it to a Boolean. The following example illustrates this by converting an array of integers to Boolean values.
code reference: System.Boolean.Structure#9
Comparing Boolean values
Because Boolean values are either true or false, there is little reason to explicitly call the Boolean.CompareTo(Boolean) method, which indicates whether an instance is greater than, less than, or equal to a specified value. Typically, to compare two Boolean variables, you call the Boolean.Equals(Boolean) method or use your language's equality operator.
However, when you want to compare a Boolean variable with the literal Boolean value true or false, it is not necessary to do an explicit comparison, because the result of evaluating a Boolean value is that Boolean value. For example, the expressions
code reference: System.Boolean.Structure#12
code reference: System.Boolean.Structure#13
are equivalent, but the second is more compact. However, both techniques offer comparable performance.
Working with Booleans as binary values
A Boolean value occupies one byte of memory. The byte's low-order bit is used to represent its value. A value of 1 represents true; a value of 0 represents false.
You can use the BitVector32 structure to work with sets of Boolean values.
You can convert a Boolean value to its binary representation by calling the BitConverter.GetBytes(Boolean) method. The method returns a byte array with a single element. To restore a Boolean value from its binary representation, you can call the BitConverter.ToBoolean(Byte,Int32) method.
The following example calls the BitConverter.GetBytes(Boolean) method to convert a Boolean value to its binary representation and displays the individual bits of the value, and then calls the BitConverter.ToBoolean(Byte,Int32) method to restore the value from its binary representation.
code reference: System.Boolean.Structure#1
Performing operations with Boolean values
This section illustrates how Boolean values are used in apps. The first section discusses its use as a flag. The second illustrates its use for arithmetic operations.
Boolean values as flags
Boolean variables are most commonly used as flags, to signal the presence or absence of some condition. For example, in the String.Compare(String,String,Boolean) method, the final parameter, ignoreCase, is a flag that indicates whether the comparison of two strings is case-insensitive (ignoreCase is true) or case-sensitive (ignoreCase is false). The value of the flag can then be evaluated in a conditional statement.
The following example uses a simple console app to illustrate the use of Boolean variables as flags. The app accepts command-line parameters that enable output to be redirected to a specified file (the /f switch), and that enable output to be sent both to a specified file and to the console (the /b switch). The app defines a flag named isRedirected to indicate whether output is to be sent to a file, and a flag named isBoth to indicate that output should be sent to the console.
code reference: System.Boolean.Structure#10
Booleans and arithmetic operations
A Boolean value is sometimes used to indicate the presence of a condition that triggers a mathematical calculation. For example, a hasShippingCharge variable might serve as a flag to indicate whether to add shipping charges to an invoice amount.
Because an operation with a false value has no effect on the result of an operation, it is not necessary to convert the Boolean to an integral value to use in the mathematical operation. Instead, you can use conditional logic.
The following example computes an amount that consists of a subtotal, a shipping charge, and an optional service charge. The hasServiceCharge variable determines whether the service charge is applied. Instead of converting hasServiceCharge to a numeric value and multiplying it by the amount of the service charge, the example uses conditional logic to add the service charge amount if it is applicable.
code reference: System.Boolean.Structure#13
Assembly: mscorlib (in mscorlib.dll)
Assembly Versions: 1.0.5000.0, 126.96.36.199, 188.8.131.52
The members of System.Boolean are listed below.
See Also: ValueType
|TryParse(String, out Boolean)|
|
<urn:uuid:4f1d9222-b89a-4ed4-95e6-862a5dd2befb>
|
CC-MAIN-2017-26
|
https://developer.xamarin.com/api/type/System.Boolean/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320539.37/warc/CC-MAIN-20170625152316-20170625172316-00412.warc.gz
|
en
| 0.760819
| 2,008
| 3.921875
| 4
|
Christian Friedrich Hebbel
|Christian Friedrich Hebbel|
Portrait (1851) by Carl Rahl
|Born||18 March 1813
Wesselburen, Dithmarschen, Holstein
|Died||13 December 1863 (aged 50)
Vienna, Austrian Empire
|Occupation||poet and dramatist|
|Notable works||Judith; Maria Magdalene; Herodes and Mariamne; Agnes Bernauer; Gyges and His Ring|
|Notable awards||Schiller Prize|
Christian Friedrich Hebbel (18 March 1813 – 13 December 1863) was a German poet and dramatist.
Hebbel was born at Wesselburen in Dithmarschen, Holstein, the son of a bricklayer. He was educated at the Gelehrtenschule des Johanneums. Despite his humble origins, he showed a talent for poetry, resulting in the publication, in the Hamburg Modezeitung, of verses which he had sent to Amalie Schoppe (1791–1858), a popular journalist and author of nursery tales. Through her patronage, he was able to go to the University of Hamburg.
A year later he went to Heidelberg University to study law, but gave it up and went on to the University of Munich, where he devoted himself to philosophy, history and literature. In 1839 Hebbel left Munich and walked all the way back to Hamburg, where he resumed his friendship with Elise Lensing, whose self-sacrificing assistance had helped him over the darkest days in Munich. In the same year he wrote his first tragedy, Judith (1840, published 1841), which in the following year was performed in Hamburg and Berlin and made his name known throughout Germany.
In 1840 he wrote the tragedy Genoveva, and the following year finished a comedy, Der Diamant, which he had begun at Munich. In 1842 he visited Copenhagen, where he obtained from King Christian VIII a small travelling studentship, which enabled him to spend some time in Paris and two years (1844–1846) in Italy. In Paris he wrote his fine "tragedy of common life," Maria Magdalena (1844). On his return from Italy Hebbel met in Vienna two Polish noblemen, the brothers Zerboni di Sposetti, who in their enthusiasm for his genius urged him to remain, and supplied him with the means to mingle in the best intellectual society of the Austrian capital.
Hebbel's old precarious existence now became a horror to him, and he made a deliberate breach with it by marrying (in 1846) the beautiful and wealthy actress Christine Enghaus, giving up Elise Lensing (who remained faithful to him until her death), on the grounds that "a man's first duty is to the most powerful force within him, that which alone can give him happiness and be of service to the world": in his case the poetical faculty, which would have perished "in the miserable struggle for existence". This "deadly sin," which, "if peace of conscience be the test of action," was, he considered, the best act of his life, established his fortunes. Elise, however, still provided useful inspiration for his art. As late as 1851, shortly after her death, he wrote the little epic Mutter und Kind, intended to show that the relation of parent and child is the essential factor which makes the quality of happiness among all classes and under all conditions equal.
Long before this Hebbel had become famous, German sovereigns bestowed decorations upon him; in foreign capitals he was feted as the greatest of living German dramatists. From the grand-duke of Saxe-Weimar he received a flattering invitation to take up his residence at Weimar, where several of his plays were first performed. He remained, however, at Vienna until his death.
Besides the works already mentioned, Hebbel's principal tragedies are:
- Herodes and Mariamne (1850)
- Julia (1851)
- Michel Angelo (1851)
- Agnes Bernauer (1855)
- Gyges and His Ring (1856)
- Die Nibelungen (1862), his last work (a trilogy consisting of a prologue, Der gehörnte Siegfried, and the tragedies, Siegfrieds Tod and Kriemhilds Rache), which won for the author the Schiller prize.
Of his comedies Der Diamant (1847), Der Rubin (1850) and the tragi-comedy Ein Trauerspiel in Sizilien (1845), are the more important, but they are heavy and hardly rise above mediocrity. All his dramatic productions, however, exhibit skill in characterization, great glow of passion, and a true feeling for dramatic situation; but their poetic effect is frequently marred by extravagances which border on the grotesque, and by the introduction of incidents the unpleasant character of which is not sufficiently relieved. In many of his lyric poems, and especially in Mutter und Kind, published in 1859, Hebbel showed that his poetic gifts were not restricted to the drama.
His collected works were first published by E. Kuh in 12 volumes at Hamburg, 1866–1868.
Some of Hebbel's works were set to music, such as his poem Requiem by Peter Cornelius and in Max Reger's Hebbel Requiem. Reger set his poem "Die Weihe der Nacht" for voice, choir and orchestra. Robert Schumann's opera Genoveva is based on a play of Hebbel.
In 1872 Samuel de Lange used Hebbel's poem "Ein frühes Liebesleben" in an unusual instrumentation for voice, string quartet and harp. An arrangement with piano instead of harp was made during a centennial revival of Samuel and Daniël de Lange's music.
Eduard Lassen wrote incidental music to Die Nibelungen in 1873. In 1878/79 Franz Liszt combined music from the Die Nibelungen setting with excerpts from Lassen's incidental music to Goethe's Faust, in a single piano transcription, Aus der Musik zu Hebbels Nibelungen und Goethes Faust (S.496).
In 1922 Emil von Reznicek composed an opera Holofernes after Hebbel's Judith und Holofernes.
The poem "Dem Schmerz sein Recht" was set to music by Alban Berg in 4 Gesänge, Op. 2, No 1.
- Glutmensch (A man aglow, 1975), 90 min.; writer and director: Jonatan Briel; Production: SFB and Literarisches Berliner Kolloquium; Plot: Werner Brunn plays Friedrich Hebbel, who is confined to his sickbed on his 50th birthday, and recalls his youth in his feverish dreams.
||This article includes a list of references, related reading or external links, but its sources remain unclear because it lacks inline citations. (July 2014) (Learn how and when to remove this template message)|
- "Samuel de Lange, "Ein frühes Liebesleben"". pythagoraskwartet.nl (in Dutch). Retrieved 2017-03-24.
- This article incorporates text from a publication now in the public domain: Chisholm, Hugh, ed. (1911). "Hebbel, Christian Friedrich". Encyclopædia Britannica. 13 (11th ed.). Cambridge University Press. pp. 165–166.
|Wikimedia Commons has media related to Friedrich Hebbel.|
|
<urn:uuid:6d12ee90-36ab-4b72-af7c-4027ab27cad1>
|
CC-MAIN-2017-26
|
https://en.wikipedia.org/wiki/Hebbel
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320539.37/warc/CC-MAIN-20170625152316-20170625172316-00412.warc.gz
|
en
| 0.948483
| 1,614
| 2.640625
| 3
|
Ancient Greece, 480 BCE
Was the Oracle of Delphi a teenage visionary who saved the Cradle of Democracy or was she manipulated by politically-savvy priests as some modern historians claim?
The slaughter of the Spartan Three Hundred at Thermopylae, Greece 480 BCE—when King Leonidas tried to stop the Persian army with only his elite guard—is well known. But just what did King Xerxes do after he defeated the Greeks?
Fifteen-year-old Thaleia is haunted by visions: roofs dripping blood, Athens burning. She tries to convince her best friend and all the villagers that she’s not crazy. The gods do speak to her.
And the gods have plans for this girl.
When Xerxes army of a million Persians marches straight to the mountain village Delphi to claim the Temple of Apollo’s treasures and sacred power, Thaleia’s gift may be her people’s last line of defense.
Her destiny may be to save Greece...
but is one girl strong enough to stop an entire army?
|
<urn:uuid:7750abd4-4196-4eb8-9a28-4f321f04fc8b>
|
CC-MAIN-2017-26
|
http://gailstricklandauthor.com/?q=book
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320707.69/warc/CC-MAIN-20170626101322-20170626121322-00492.warc.gz
|
en
| 0.945485
| 221
| 2.703125
| 3
|
This bearskin headdress belonged to a grenadier of Napoleon’s elite Imperial Guard, and was captured at the Battle of Waterloo. The Imperial Guard was the most feared fighting force in the French Army.
The fame of the Imperial Guard bearskin headdress was only equalled by its prestige. Grenadiers were originally specialized grenade-throwing assault troops. They gained a reputation for being fearsome, courageous soldiers. By the 18th century they were usually the elite of every European army. To make throwing grenades easier, the wide hats with broad brims worn by infantry during the late 17th century were discarded and replaced with caps. These were frequently trimmed with fur and in time evolved into the full bearskin headdress.
The concept of a bodyguard of elite warriors owing personal allegiance to their leader is ancient. When Napoleon became First Consul and virtual dictator of France in 1799 he created a new Garde des Consuls as his personal guard. Initially it was made up from a small number drawn from the cream of the Army. The Guard were first blooded at the Battle of Marengo in 1800 where they stood firm amid the wavering French lines and laid the foundations of their reputation for invincibility.
When Napoleon proclaimed himself emperor in 1804, these “invincibles” became La Garde Imperial. They evolved from a small regiment to a complete army of 100,000 men in 1814. Napoleon took great care of his Guard. They received better pay, rations, quarters, and equipment, and all guardsmen ranked one grade higher than all non-Imperial Guard soldiers.
The growth in size of the Guard resulted in the creation of three categories: the Old Guard was made up of veterans from the earliest campaigns; the Middle Guard was composed of veterans from the 1805 to 1809 campaigns; and the Young Guard consisted of the best of the annual intake of conscripts and volunteers.
The Guard, as Napoleon’s elite troops, were always kept in reserve to be committed at the decisive points of a battle under his personal direction. At Waterloo, as the last reserves of the French Army, the Young Guard was deployed to hold the right flank against the Prussians. The Middle Guard, supported by part of the Old Guard, mounted the final attack of the battle to break through the weakened British centre.
They almost succeeded but were held and then forced back in disarray by counter attacks by Dutch-Belgian and British troops. This in turn led to the disintegration of the exhausted French Army. This bearskin was probably taken from the body of one of the guardsmen killed during this final, desperate attack.
Find it here
This object is in the collection of National Army Museum
|
<urn:uuid:0240cfc7-0061-4b9b-b60e-0fc6a8e8d118>
|
CC-MAIN-2017-26
|
http://waterloo200.org/200-object/guards-bearskin-from-waterloo/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320707.69/warc/CC-MAIN-20170626101322-20170626121322-00492.warc.gz
|
en
| 0.981496
| 559
| 3.046875
| 3
|
Bogacz, Renee, and Miguel Gómez Gordillo (2011). Point/Counterpoint: Should Schools Be Held Responsible for Cyberbullying? Learning and Leading with Technology, 38(6) retrieved from
Bogacz and Gordillo's article goes well beyond addressing anything specifically digital. The article explores the prevelant societal problem of bullying in general in American culture, including schoolyard bullying. In addition to emphasizing the importance schoolteachers, administrators, and students themselves who witness or are victims of cyberbullying, the first half of the article, namely Bogacz's portion, stipulates that parents closely monitor and check everything that their children do in the online world. Bogacz places the onus of responsibility on the schools to deal with cyberbullying, while Gordillo's response in the second half of the article is to place the onus of responsibility on parents, because children who bully, either in the digital world or the real world, tend to do so because they have not been taught how to respect others. The root of that problem is how their parents, or whoever has raised them, has taught them how to behave. Schools can only do so much. Parents and students themselves have to meet them halfway.
Question 1: What can someone like me do about cyberbullying in my future classroom?
When my students use the Internet to carry out class assignments--such as having them having engage in online discussions or write responses to prompts, I may deduce points if they are disrespectful to me or their fellow students. Or, I may simply ask them to keep redoing the assignment until they behave. And whether I am dealing with cyberbullying or live bullying, one thing I have had in thr back of my mind for a long time now is that when I catch my students being rotten, I will simply ask them to write letters of apology, as well as ask the two parties--the bully and the victim--to honestly express their feelings to each other, ie for the one who is bullied to tell the bully how the latter made him/her feel while asking the bully themselves to write maybe a semi-essay on why they acted the way they did and why they will never do it again. As an English teacher, getting my students to embrace written and spoken language as a means to improve human relationshsips is what it's all about, for me.
Question 2: What should parents do about cyberbullying?
I am of the opinion that Bogacz's stipulation that parents closely monitor and check everything that their children do in the online world is indeed overkill. If parents cannot even trust their own children with phones and computers than they shouldn't let their offspring have them at all. Before letting their children have access to electronic communications, however, parents should emphasize to their kids about being careful and watchful of people they run into tin the online world, just as parents should caution children when dealing with people in the real world. Parents can't wrap their children in woll forever; they need to prepare them for dealing with unpleasant and potentially dangerous people in life and teaching their sons and daughters how to behave responsibly and how to avoid undesirables is the key to giving adolescents the tools to function on their own.
|
<urn:uuid:edde727d-584d-4b27-98a9-bf9eb76317c8>
|
CC-MAIN-2017-26
|
http://asandwell.blogspot.com/2011/04/journal-8-pointcounterpoint-should.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320995.93/warc/CC-MAIN-20170627050500-20170627070500-00572.warc.gz
|
en
| 0.965611
| 669
| 2.796875
| 3
|
Recently a czimages visitor sent me some really great French Era photos of which several were French dredges. The photos are very nice and sparked
an interest in me to do a bit of research to learn more about the great old machines. The article below I took from an old Scientific American publication,
Supplement No. 476, dated February 14, 1885. This article is written in the style of the day back then, and may seem strange in some parts, but the
information within is most valuable.
The author/s are speaking of a new dredge used by the contractors known as the Slaven Brothers which evidently was a far superior dredge than the Suez type
dredges that the French started out with in Panama. (See article following the Scientific American article below.) Above is an old engraving of the Slaven
Dredge at work in Panama. This excellent engraving accompanied the article
With all this being said, starting next week I will begin posting these recent new images that were sent to me. This will begin a mini-series for the
next few weeks about the dredgers of the French.
THE AMERICAN DREDGERS ON THE PANAMA CANAL.
Our engraving represents one of the great dredgers now in use on the Panama Canal. The contract for the ten miles of marsh work, beginning near
Aspinwall, taken by Slaven Brothers, this city; the great machine is believed to be the most effective of anything in the line. It was built under
the patents of Messrs. H. B. Angell and H. H. Lynch. The machinery of the dredge is mounted on a scow one hundred feet long, sixty feet wide, and
twelve feet deep. There are eight engines, arranged in four pairs, for operating the machinery. The main engines are for driving the buckets which
do the digging, and are of 250 horse power, having Myer’s adjustable cut-off. The belt from the engine runs to the top of the bucket tower to a
pulley eight feet in diameter, which drives compound driving gear, connected with the upper tumbler shaft, which is ten inches in diameter. This
shaft moves a thirty-six inch square drum, over which the buckets pass when they dump their load into the hopper. The bucket tower IS forty-five
feet high above deck. There are thirty-eight buckets, with a capacity of one and a half cubic yards each. From sixteen to eighteen buckets full of
dirt per minute are discharged into a hopper attached to a cast iron elbow near the top of the tower. This elbow is five feet four inches in diameter
where it connects with the hopper, and thirty-six inches in diameter where it connects at the lower end to the discharge pipe, which is attached to
the elbow. This pipe is made of boiler iron and is one hundred and fifty feet long. The distance the mud falls, the position in which it strikes, and
the inclination of the discharge pipe give the mud a velocity of from 1,300 to 2,000 feet per minute through the pipe,
according to the kind of material which is being dug and discharged. The discharge pipe is supported by a derrick which stands on the scow. Water is pumped into the hopper by a pair of
ten inch pumps from the canal through a seven inch pipe which passes through the bottom of the boat and extends to the hopper, at top of bucket tower.
A second pair of engines of thirty horse power raise and lower the ladder that supports the buckets; they are attached to a drum for that
purpose. There is a hinged joint in the ladder outside of the derrick, for the purpose of operating one section of ladder independent of the other. A half inch cable
connects the drum to the outward end of the lower section by two bails. The endless chain to which the buckets are attached is made of horseshoe iron
1 1/8 inches by 9 inches. Another pair of spud and gypsy engines of thirty horse power is used for raising the spuds and feeding the buckets. The dredger
rests upon the spud, upon which it can be revolved without stopping the dredging buckets, thus enabling the operators to dig from side to side at will.
A chute connects with the hopper, and is boarded on the sides to prevent the mud or water from falling upon the deck. The fourth pair of engines, also
of thirty horse power, is connected to a windlass for snag pulling. The engines are all supplied with steam from one set of three boilers, and will
require only about two tons of coal each day. Six men, including a superintendent, run the entire machine. Capacity of the dredger, 1,000 cubic yards
The cutting of the canal is to be 100 feet wide at the bottom, 185 feet at the top and 27 ½ feet deep.
A correspondent of one of our city papers, resident in, New York, who just returned from a visit to the works of the Panama Canal, writes:
The canal is an assured fact. The French seem thoroughly to understand the work before them, and have made admirable preparations to cover all contingencies.
The take the greatest care of their employees, and their hospital service is unsurpassed in the world. A force of over twenty thousand men is a good many to
handle, and, of course, entails a lot of red tape, but that seems necessary, especially with Frenchmen. But they have a grand chief in M. De Lesseps, and
have now a splendid working staff in M. Diggler and his officers.
I was very anxious to see the Scotch dredger at work in the harbor of Colon, but it was not in operation during the eighteen days I was there. I was disappointed, as I wished to compare it with our mammoth American
dredgers. It cost, I understand, £50,000, and is considered very good for deep-sea dredging, but for actual work I saw nothing there to compare to our American dredgers. I went on
board and saw the latter work on many different occasions, and was highly satisfied. The principle is unique and very ingenious. The tower is iron, 75 feet high;
the buckets and chains, are of, steel, and each bucket will, and does .take 1 ½ tons of earth each lift. The spud, on which the dredge rests and
revolves, enables It to take a sweep of 15 meters wide, and each move of the spud moves her forward 18, feet, so that, like a mowing machine, she cuts a swathe (to use a farmer's
expression) 45 feet wide, 18 feet long, and 9 feet deep, on each movement forward. They work perfectly, and it is indeed a grand sight to sit, as I have done, for
an hour or two at a time, and watch them working. Rotten coral, roots, stumps of small trees, etc., all come up with the dirt, and make no difference. Of course,
where rock is struck, or hard coral, or an old petrified monarch of the forest, blasting has to be done by the canal company ahead of us. Otherwise, after the ground
is cleared of vegetation, trees, etc., we simply start in and eat--literally eat-our way through with absolutely no other preparation whatever, no men on shore working
ahead or any other way. What we take out goes though the dredger's own discharge pipe on to the bank, and forms practically the bank of the canal proper. We have now cut
from the sea (the harbor of Colon) three and a half miles of the canal by one machine, and some ten miles up we have two other
machines entering from the Chagres River, cutting their way back to meet the first machine. A fourth machine leaves here tomorrow, and will join the others by the middle of January, while eleven more are
building, and will follow, one each six weeks or so, until all are fairly at work. Our contract is for 30 million cubic
meters, and will probably lead to half as much again, as it is conceded by the canal company and everyone in the isthmus that nothing like our machines has been seen: or used anywhere. One instance of their capacity
I saw myself. A Suez dredger was put to work at a certain spot. After fifty days she was withdrawn, and one of ours took its place, and did in five days as much as the
other had done. Our machines cost about $125,000 (say £25,000), and require about 20 men to work them.
Slaven Brothers - Contractors
SLAVEN, HENRY BARTHOLOMEW, distinguished capitalist and financier, and the practical constructor of the large completed section of the Panama Canal, was
born in Picton, Ontario, October 19, 1853, the son of Patrick Slaven, a successful stock raiser. He at tended the common schools up to the age of ten,
and then, entering. a drug store as clerk, attended an evening school. At the age of seventeen he was graduated from the Ontario College of Pharmacy, and
spent the next two years as a student at a Philadelphia medical college. He then accepted a good position in a large wholesale and retail drug establishment
in Philadelphia, and later returned to Canada to assume the active management of a large wholesale drug house in the Dominion. He remained in the successful
direction of this business from 1873 to 1876, and then resigned with the view of establishing himself in the far West.
His brother, M. A. Slaven, had become a successful contractor in California, and this fact was probably a determining factor in turning Mr. Slaven’s eyes
toward the section where his great enterprises were to have their origin. In 1876 he accompanied a party of engineers through the then unexplored country,
by way of the Great Lakes, to the present Port Arthur, thence to Winnipeg, Manitoba, and thence westward through Manitoba and the British Northwest. The tour
was successfully accomplished, notwithstanding the presence of hostile Indians. At its conclusion Mr. Slaven proceeded to St. Paul, Minnesota, and thence to
San Francisco. In the latter city he established a drug and manufacturing business, and such was his mastery of this line of business, and his general executive
and financing abilities, that in a short time he developed his enterprise into the largest establishment of the kind on the Pacific coast. He also be came
interested with his brother in contracting enterprises, and it was a signal tribute to this firm that in 1878 the Slaven Brothers should be selected by De Lesseps
and contracted with to assume the control and execution of all the Pacific coast operations in connection with his gigantic enterprise, as well as to do all the
preliminary work, including the erection of the buildings at the Isthmus of Panama.
In 1880 Mr. Slaven went to the Isthmus in person to inaugurate the work, taking with him two steamers, loaded with men, provisions, and the materials of construction.
Finding the men largely incapacitated by malaria, he inaugurated the policy of employing native labor, and was thus enabled to successfully execute his contracts.
In 1882 the brothers closed a contract for the actual construction of the Atlantic division of the canal, a section sixteen miles long, from Aspinwall to Bohio
Soldado. Their contract involved the ambitious project of changing the course of the Chagres River for the same distance. To organize this construction enterprise the brothers
removed their headquarters to New York City, and in September, 1882, they secured the incorporation of the American Contracting and Dredging Company. Of this corporation
Mr. Slaven was President, the late Eugene Kelly Treasurer, M. A. Slaven General Manager, and James J. Plielan Secretary. The shares of the company rose from $30 to over
$400; and well they might, for upon the completion of the contract for the construction of the Atlantic division of the canal, in 1889, Mr. Slaven’s company was paid
$25,000,000 by the De Lesseps Company.
The work of construction, in progress from the fall of 1882 to 1889, was an interesting performance among enterprises of the kind. For its execution eight gigantic dredges
were devised, the largest in the world, and costing $150,000 each.. This model was known as the” Slaven dredge.” During the period of construction, Mr. Slaven was at the
Isthmus most of the time, personally superintending the work. In 1889 the American Contracting and Dredging Company was about to be awarded a further contract for the completion
of the canal, when the collapse of De Lesseps’s French company occurred. “Had the other interests in connection with the project been handled as skillfully and judiciously as the
part operated by Mr. Slaven,” re marks the writer of an article in the well-known work published by the New York Tribune, “the canal would have been carried to a successful
completion and have resulted in revolutionizing the ship ping and commercial interests of many
Leslie's History of the Greater New York: Biographical: Volume DeLuxe
by Daniel Van Pelt. Arkell Publishing Co., New York.1898.
|
<urn:uuid:72fa1422-8bc1-42bb-8921-7ef88948372b>
|
CC-MAIN-2017-26
|
http://www.czimages.com/CZMemories/Photos/photoof712.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320995.93/warc/CC-MAIN-20170627050500-20170627070500-00572.warc.gz
|
en
| 0.966452
| 2,813
| 2.71875
| 3
|
It may not have taken as long as Michelangelo’s Sistine Chapel though it’s on a par with its mesmerising beauty. Apparently, it’s the first time that the university’s invited an artist to make a work of art in the chapel.
Miguel Chevalier creates an immersive environment made up of thousands of constellations. Viewers become bathed in light and the mystery of the universe. In the same spirit, relating to stephen hawking’s research about black holes, each of the projections entices audiences into the imaginative atmosphere where science meets spirituality.
For more detail and imagery, see here.
The site-specific installation highlights the architecture of the 16th century Chapel through light and highlights the high technicality of the cathedral’s fan vaults, one of the finest examples of late Perpendicular Gothic English architecture. The soft light and the wealth of colours from the digital installation is in resonance also with the light from the stained glass windows. The installation gives the building life before our eyes, creating an unprecedented visual experience.
This digital installation is a celebration of the open-mindedness and the highness of research of Cambridge University.
|
<urn:uuid:829a62ac-1da3-4676-a210-aac826006dac>
|
CC-MAIN-2017-26
|
https://megorourkeblog.wordpress.com/2015/11/25/cambridge-uni-chapel-gets-extra-spiritual/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320995.93/warc/CC-MAIN-20170627050500-20170627070500-00572.warc.gz
|
en
| 0.890324
| 248
| 2.953125
| 3
|
Applying liquid fertilizer to your lawn or garden can help give a needed boost of essential nutrients to your plants or grass. These mixtures can vary in proprietary chemical compositions, but all liquid fertilizers have a few main ingredients in common. Understanding more about these ingredients helps you choose the right fertilizer to keep your plants or lawn looking its best all season long.
Most liquid fertilizers contain nitrogen. Nitrogen, known by the symbol N, promotes dark green grass, thick foliage and stimulated top growth in grasses and plants. Nitrogen is great for producing green lawns, but too much nitrogen can stymie the growth of flowers and vegetable. It's best to use a balanced fertilizer and apply it in the amount recommended on the packaging to avoid adding excessive nitrogen. If you are planning to fertilize for the first time, consider having your soil professionally tested to determine the nitrogen levels in your lawn and how much nitrogen should be added. The compounds that produce nitrogen in fertilizer vary widely but may include animal manure, ammonium, urea or nitrate.
Potassium is another essential ingredient found in most liquid fertilizers. Potassium, also known by the symbol K, promotes healthy roots and root development. Most fertilizers contain potassium in the form of muriate of potash or potassium chloride. Because potassium chloride is easily dissolved in water, plants can absorb it more quickly in a liquid-based fertilizer. As with nitrogen levels, you can test your soil with a kit or have it checked professionally to determine current potassium levels and avoid excess applications that can burn grass and other plants.
Phosphorous is the third main ingredient found in most liquid fertilizers. Phosphorous, also known by the symbol P, aids in plant photosynthesis, as well as flower production. In plants that produce fruit, phosphorous helps the fruit production cycle by transferring energy within the plant's structure. A lack of phosphorous means that plants will not produce fruits and that seeds produced by the plant may not germinate properly. Adding too much phosphorous to your lawn or garden may result in a lack of zinc for plants, leading to stunted growth.
Micronutrients are ingredients that plants require for proper growth but may not be contained in all liquid fertilizers. Examples of common micronutrients include calcium, zinc, boron, sulfur, magnesium, iron and copper. To determine whether a liquid fertilizer contains all or some of these ingredients, read the label on the bottle. All fertilizers contain a guaranteed analysis that shows the percentage of each ingredient. For best results, select the proper balance of micronutrients for your soil based on regular testing.
- Hemera Technologies/Photos.com/Getty Images
|
<urn:uuid:1281887d-5fb7-4dee-8881-b6be69c63d11>
|
CC-MAIN-2017-26
|
http://homeguides.sfgate.com/ingredients-liquid-fertilizer-39719.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321961.50/warc/CC-MAIN-20170627235941-20170628015941-00652.warc.gz
|
en
| 0.911707
| 548
| 3.078125
| 3
|
Bermudagrass is becoming a common weed in many Colorado lawns and landscape/garden beds, and can be especially problematic during very warm summers. It is often confused with crabgrass because their seed heads are similar.
Bermudagrass is a perennial, warm-season grass. It will begin greening up in late April or early May, depending on how warm it is in the spring. While it can form seed, the main way that this grass spreads is via underground, laterally growing stems called rhizomes – and by aboveground, creeping stolons (runners). This aggressive creeping growth habit allows bermudagrass to spread rapidly in lawns and gardens. Attempts to control this weedy grass by pulling and digging are almost always unsuccessful.
Garden areas invaded by bermudagrass can be sprayed with an herbicide containing fluazifop (Grass-B-Gone). Read the label carefully before using, but it can be safely sprayed over most shrubs and flowers beginning in the early spring when bermudagrass begins growth. Several applications (every 2-4 weeks) during the summer when the bermudagrass is actively growing will be necessary to successfully control this weed. For a few years following control, scout the affected for any regrowth of the bermudagrass. Note that applications of any herbicide for bermudagrass control are INEFFECTIVE if the bermudagrass is brown/dormant (spring and/or fall).
When growing in bluegrass, ryegrass, or fescue lawns, bermudagrass can be selectively controlled by using the herbicide Tenacity (mesotrione). Multiple applications of the herbicide will be required throughout the summer – and should not be started until bermudagrass has begun greening up in late spring. Tenacity will cause the bermudagrass to turn a bright white color, an indicator that it is working effectively. Note that Tenacity is NOT labeled for use in non-lawn parts of the landscape. Follow all directions for mixing and application of Tenacity to ensure effectiveness in controlling bermudagrass and to prevent injure to desirable turf.
Products containing the herbicide glyphosate can be used to NON-SELECTIVELY manage bermudagrass in lawns and to spot treat bermudagrass in gardens. Glyphosate is a non-selective herbicide, which means it will kill all plants which are sprayed. When using glyphosate to manage bermudagrass in lawns, spray an area extended 2-3 feet out from the spot where bermudagrass is observed growing in order to control stolons/runners that are difficult to seed. A single application of glyphosate will NOT successfully control a bermudagrass infestation in a lawn. Apply the glyphosate to the area 2-3 more times during the growing season (every 3-4 weeks after the initial application) to kill any reappearing bermudagrass. In some cases, treatment with glyphosate may be necessary for two or three years before bermudagrass is completely controlled. Once the bermudagrass is eliminated, the dead area can be reseeded or resodded.
|
<urn:uuid:20982fd8-9456-4f01-a2b9-75d49f27db62>
|
CC-MAIN-2017-26
|
http://planttalk.colostate.edu/topics/lawns/1531-bermuda-grass-lawns-gardens/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323801.5/warc/CC-MAIN-20170628204133-20170628224133-00012.warc.gz
|
en
| 0.936567
| 699
| 3.296875
| 3
|
In the event that you have been given the task of writing a compare and contrast essay, you have to put in a lot of effort to make sure that you can get a good paper written. You have to realize that these papers go a long way in determining the marks that you get when the end of the semester comes around.
When you are writing any paper, there are certain elements that you have to consider. The conclusion in particular is a brief chapter that makes a lot of sense when the paper is done. You need to follow the following rules and be able to finish off your paper properly:
The most important thing about this chapter is the fact that your paper is finally coming to an end. You therefore have to write the chapter with that concept in mind. Do not be the student who starts rambling about new ideas here. Simply put, sum up your paper and put an end to your work.
Just like all the other chapters in your work, it is important that you focus on the title of your paper as you address your work here. The conclusion must show the connection between what you are writing and the title of the paper you are discussing.
It is always easier to write this chapter when you put an emphasis on the introduction. This helps you stay in focus all the time. It gets even better, because as you are doing this, you will not lose points for writing an irrelevant chapter.
Analytical strength is important. Just because you are concluding your paper does not mean that you have to weaken your resolve. Be as strong in addressing this chapter as you would have been if you were writing the other parts of the paper too.
Since your paper is about drawing comparisons, it is important that you bring out the comparisons clearly in this chapter. You have to stay objective, as you do it, and ensure that you highlight all the necessary issues accordingly too.
|
<urn:uuid:118e32b2-0fe3-4f60-a36b-73eebe949d5c>
|
CC-MAIN-2017-26
|
http://www.conservationafrica.org/2016-id13.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323801.5/warc/CC-MAIN-20170628204133-20170628224133-00012.warc.gz
|
en
| 0.972368
| 381
| 3.109375
| 3
|
This collection contains 1 Power Point presentation and 2 WebQuests.
Life in the West is a colorful 15 slide Power Point describing the customs and environment of the Makah, Great Basin, Pueblo, Navajo and Apache Indians. This beautiful presentation is a concise, well organized introduction to Native Americans for the younger student or a comprehensive review for a Native American unit.
WebQuest:Teepees, Longhouses, and Pueblos examine the places and the structures that various Native American tribes called home.
WebQuest: Famous Native Americans- Grades 4-7 examines many Native Americans who had a great impact and influence on society.
Each of these products are available separately in my store. Buying them bundled offers you a savings of 20%.
Power Point-Life in the West-a Study of Native American Tribes
WebQuest: Famous Native Americans- Grades 4-7
WebQuest:Teepees, Longhouses, and Pueblos
Looking for sources about Ancient Egypt?
WebQuest-The Pyramids of Egypt
Worksheet ANCIENT EGYPT Latitude Longitude Questions&Map
Ancient Egyptian Review in a Bingo Game Format
WebQuest King Tut The Boy Pharaoh
Power Point Ancient History Egyptian Number System
If you're looking for a fun, different project using technology, you might want to give this a try.
Lesson in Designing a Bar Graph in Excel 2007
Another one you might find interesting is,
Language,Social Studies,Computer Project -Teaching with Power Point "Who Am I?"
For a preview of all my WebQuests-over 100-all subjects and grades, click on the following link
Mrs. Mc's WebQuests
|
<urn:uuid:607a8113-82e8-44cd-9122-ff50324d706a>
|
CC-MAIN-2017-26
|
https://www.teacherspayteachers.com/Product/Native-Americans-Grades-4-7-The-Bundle-1191778
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323801.5/warc/CC-MAIN-20170628204133-20170628224133-00012.warc.gz
|
en
| 0.827245
| 351
| 3.171875
| 3
|
This high quality timeline features 43 key milestones in the development of technology throughout the ages. Each poster features the year date, a brief description of the technology development and a high resolution clip art. These posters are sure to compliment any classroom. Use as posters for display or for discussion on the interactive whiteboard. Let your imagination run wild with this high quality resource.
Also included in this bundle are 4 activities to use alongside the Technology and Inventions Timeline. Please see the preview for further details of these activities. Lesson plan instructions are included to aide you in the implementation of these activities.
This bundle is designed to save you time! Simply print, laminate where needed and you are ready to go.
Each poster is best printed on A4 sized paper.
The following technology inventions are included in the timeline (please note information given here is paraphrased and in more detail on the posters):
3500 BC - wheel invented
105 - paper is first made
600 - windmills invented
700-900 - fireworks invented
1000 - eyeglasses invented
1450 - printing press invented
1470s - first parachute sketched
1590 - first microscope invented
1600 - first thermometer invented
1609 - telescope invented
1700s - piano invented
1783 - first hot air balloon invented
1800 - first battery invented
1814 - first practical steam train invented
1827 - first modern photograph taken
1830-1840s - development of telegraph
1860s - fire extinguishers invented
1868 - keyboard invented
1876 - telephone invented
1880 - lightbulbs invented
1885 - first gasoline-powered car invented
1886 - dishwasher invented
1890s - data projector invented and first movie theatre opened
1901 - first vacuum cleaner invented
1903 - first engine-powered airplane invented
1905 - chainsaw invented
1906 - air conditioner invented
1907 - washing machine invented
1920s - electric television invented
1928 - refrigerator invented
1930s - ballpoint pen invented
1930s - first solar powered house
1939 - helicopter invented
1949 - barcodes invented
1950s - microwave invented
1960s - computer mouse invented
1960s - CDs invented
1973 - cellphones invented
1976 - Apple 1 invented
1989 - World Wide Web invented
2001 - iPod invented
2007 - iPhone invented
2010 - iPad invented
If you don't need the activities, why not just purchase the Technology and Inventions Timeline Posters
separately. Click the link to find the product.
If you liked the look of these posters, you may also like these:
— Christmas Around the World Poster and Student Workbook MEGA Bundle - Ready to Print and Go!
— Synonym Posters - Words to Use Instead of...
— History of Toys Timeline Posters
Please note: This product is for personal use only. Multiple licences are available for use among more than one person.
If you liked the look of this product, please take a look at my other products for sale in my store:
To keep up with new products, simple follow me on
Pinterest: Ridgy Didge Resources
Or better yet, follow my store to receive updates of new product listings right in your inbox!
|
<urn:uuid:e4eea912-3c48-47ad-8135-9cc599481f81>
|
CC-MAIN-2017-26
|
https://www.teacherspayteachers.com/Product/Technology-and-Inventions-Timeline-Posters-Powerpoint-Worksheet-and-Activities-2898089
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323801.5/warc/CC-MAIN-20170628204133-20170628224133-00012.warc.gz
|
en
| 0.813013
| 679
| 3.59375
| 4
|
By Tim Everson
Read or Download Warfare in Ancient Greece: Arms and Armour from the Heroes of Homer to Alexander the Great PDF
Similar Ancient Greece books
Aeschylus (525-456 BC) introduced a brand new grandeur and epic sweep to the drama of classical Athens, elevating it to the prestige of excessive artwork. The Persians, the one Greek tragedy to house occasions from fresh Athenian historical past, depicts the ultimate defeat of Persia within the conflict of Salamis, throughout the eyes of the Persian courtroom of King Xerxes, turning into a sad lesson in tyranny.
In comedy, satisfied endings get to the bottom of real-world conflicts. those conflicts, in flip, depart their mark at the texts within the kind of gaps in plot and inconsistencies of characterization. Greek Comedy and beliefs analyzes how the constitution of historical Greek comedy betrays and responds to cultural tensions within the society of the classical city-state.
This quantity examines cinematic representations of historic Greek ladies from the nation-states of fantasy and historical past. It discusses how those lady figures are resurrected at the great reveal through various filmmakers in the course of various old moments, and are for that reason embedded inside of a story which serves a number of reasons, counting on the director of the movie, its screenwriters, the studio, the rustic of its starting place, and the sociopolitical context on the time of its construction.
In contemporary many years literary techniques to drama have improved: new historic, intertextual, political, performative and metatheatrical, socio-linguistic, gender-driven, transgenre-driven. New details has been accrued, occasionally via re-assessment of extant literary texts and fabric artifacts, at different occasions from new discoveries from the fields of archaeology, epigraphy, artwork historical past, and literary reviews.
Additional resources for Warfare in Ancient Greece: Arms and Armour from the Heroes of Homer to Alexander the Great
|
<urn:uuid:ccece502-41da-4278-89f0-7072cac8c376>
|
CC-MAIN-2017-26
|
http://animalesenpeligrodeextincion.co/lib/warfare-in-ancient-greece-arms-and-armour-from-the-heroes-of-homer-to-alexander-the-great
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00092.warc.gz
|
en
| 0.913606
| 396
| 2.65625
| 3
|
The police need probable cause or a warrant to arrest someone. They often need one of the two to search someone or something. But a lesser standard—“reasonable suspicion”—allows officers to briefly detain people and perform limited searches.
This kind of detention-and-search is known as “stop-and-frisk.” It’s also sometimes called “Terry stop” or “Terry frisk,” in reference to the Supreme Court decision of Terry v. Ohio. (392 U.S. 1 (1968).)
Assume an officer is on patrol. She notices a man behaving unusually and begins to suspect that a crime is going on. If her suspicion that the man is involved in criminal behavior is objectively reasonable, she may briefly detain him in order to investigate. This detention is a “seizure” within the meaning of the Fourth Amendment, but it’s not a full-blown arrest, so it doesn’t require probable cause.
Similarly, the fact that someone starts to run away after noticing the police could be enough to justify a Terry stop. On the other hand, simply walking in a high-crime area and seeming suspicious to the officer for some unspecified reason is not enough for a detention. If the officer nevertheless stops and frisks someone in that kind of situation, any evidence from the encounter will normally be inadmissible in court.
Free to Leave?
When a suspect reasonably doesn't feel free to leave, there’s been a detention. If there hasn’t been a detention, of course, the police don’t need reasonable suspicion.
Factors that might make a reasonable person feel unable to leave include the officer:
- displaying a weapon
- physically touching the suspect, or
- using strong language or tone of voice.
If the officer approaches someone on the street and politely asks to talk for a minute, there probably hasn’t been a detention. If the person responds with an incriminating statement or gives the officer a basis to detain, frisk, or arrest, the evidence will in all likelihood be admissible in court.
Reason to Frisk
That there’s reasonable suspicion to detain doesn’t always mean there’s a basis to frisk. After a legitimate detention, an officer may normally conduct a pat-down only if there’s reason to suspect that the suspect is armed and dangerous.
The “frisk” part of stop-and-frisk is supposed to be a limited search of the suspect’s outer clothing. It’s meant to be a search for weapons only. But an officer who comes across something that feels like a weapon may reach into the suspect’s clothing to grab and examine it. If an officer encounters something during the limited frisk that doesn’t feel like a weapon—but is obviously contraband—the officer may likewise seize it.
Get Legal Help
Make sure to talk to an experienced criminal defense attorney if you have a case. Search and seizure law is complex and can vary somewhat from one state to another. A knowledgeable lawyer will be able to explain the relevant law and your rights.
|
<urn:uuid:15657113-1d2d-4116-8a5e-c3bafad25ffa>
|
CC-MAIN-2017-26
|
http://criminal.lawyers.com/criminal-law-basics/your-search-and-seizure-rights-stop-and-frisk.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319265.41/warc/CC-MAIN-20170622114718-20170622134718-00212.warc.gz
|
en
| 0.947712
| 663
| 2.953125
| 3
|
The Laguna del Maule Volcanic Field, Chile, includes a record of unusually large and recent concentration of silicic eruptions. Since 2007, the crust there has been inflating at an astonishing rate of 25 centimeters per year. This unique opportunity to investigate the dynamics of a large rhyolitic system while magma migration, reservoir growth, and crustal deformation are actively under way is stimulating a new international collaboration.
Explosive eruptions of large-volume rhyolitic magma systems are common in the geologic record and pose a major potential threat to society. Unlike other natural hazards, such as earthquakes and tsunamis, a large rhyolitic volcano may provide warning signs long before a caldera-forming eruption occurs. Yet, these signs—and what they imply about magma-crust dynamics—are not well known.
This is because we have learned how these systems form, grow, and erupt mainly from the study of ash-flow tuffs deposited tens to hundreds of thousands of years ago or more, or from the geophysical imaging of the unerupted portions of the reservoirs beneath the associated calderas.
Research findings thus far lead to the hypothesis that the silicic vents have tapped an extensive layer of crystal-poor, rhyolitic melt that began to form atop a magmatic mush zone that was established by about 20,000 years ago, with a renewed phase of rhyolite eruptions during the Holocene. Modeling of surface deformation, magnetotelluric data, and gravity changes suggest that magma is currently intruding at a depth of approx. 5 km. The next phase of this investigation seeks to enlarge the sets of geophysical and geochemical data and to use these observations in numerical models of system dynamics.
“Dynamics of a large, restless, rhyolitic magma system at Laguna del Maule, southern Andes, Chile.” B.S. Singer et al., University of Wisconsin–Madison, Dept. of Geoscience, Madison, Wisconsin 53706, USA, Pages 4–10; DOI: 10.1130/GSATG216A.1.
Note : The above story is based on materials provided by Geological Society of America
|
<urn:uuid:c06e652e-8fd0-468e-8ad6-7200faea4b69>
|
CC-MAIN-2017-26
|
http://www.geologypage.com/2014/11/investigators-research-the-laguna-del-maule-volcanic-field-chile.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319265.41/warc/CC-MAIN-20170622114718-20170622134718-00212.warc.gz
|
en
| 0.91394
| 463
| 3.78125
| 4
|
By Jennifer Williams
Across grades and content areas. For engagement, assessment, and crowd sourcing ideas. Our month-long journey exploring ways teachers are creatively using Nearpod’s Collaborate! in classrooms across our country has returned us back to “home.” And, one thing is quite certain–teachers are a remarkable bunch! Each day in our schools, they are seeking out ways to connect students meaningfully to concepts, and they are purposefully using resources to inspire students to think “beyond the page” and invent their own learning. Collaborate! as an interactive virtual discussion board has already brought limitless possibilities to instruction, and one of the very best parts has been seeing the ways all students in a class can feel part of a conversation. Ready to put Collaborate! into practice with your students? As we unpack ideas shared along our journey, here are eight extraordinary examples of ways teachers are putting Collaborate! into action.
1. Six Word Stories
Six Word Stories are short, short stories that encourage young writers to succinctly organize thoughts and ideas. With an aim of being concise and direct, the messages often center on topics that evoke deep emotion, humor, or insight. This week, Courtney Kofeldt, a K-12 Educational Technology Director and fellow Nearpod PioNear, shared on Six Word Stories in a Bite Size PD session at her school in West Chester, Pennsylvania. With a focus on digital storytelling, teachers were invited to create their own six word stories using Spark Post from Adobe, and then they shared their finished creations with the group using Nearpod Collaborate!. In real time, teachers were able to see the shared examples and discuss ideas! How creative! LINK to ClassBoard.
2. Teaching Future Teachers
So often, transformational change in education starts with how we prepare our pre-service teachers. Following this, many university programs today are placing dedicated efforts on infusing meaningful learning with new age technologies into all college of education courses. Integration specialist and PioNear Laurie Guyon put this into practice with students at Skidmore College in New York by sharing and modeling high-quality edtech tools in her own instruction. This week, Laurie was able to share on Nearpod with Junior block students in a workshop on integrating technology into literacy lessons. Students were able to see the great ways Nearpod interactive features can encourage engagement and communication of ideas, and then they got to jump in by using Collaborate! to share authentically on ways they felt Nearpod could be used with students in their future classrooms. Check out all their amazing ideas: LINK to ClassBoard. Especially love this shared idea: if you introduce a new topic you can use the poll to gauge students’ background knowledge on the topic and then have them share to the class. What a wonderful way to bring in the voice of each student.
3. A World of Ideas
Each year, teachers of the world join together to connect students around selections of stories in the Global Read Aloud project. The world becomes a classroom as students engage in lessons with international classes to discuss and analyze text collaboratively. As a Grade 3 teacher in Ontario, Canada, PioNear Vickie Morgado was eager to bring the conversation on her class readings of The BFG to a larger audience using the new Collaborate! feature of Nearpod. To extend the conversation out to the world, she shared her Nearpod lesson code on Twitter and invited teachers within her PLN to join in on a prediction activity with their students. Over several days, students from near and far shared ideas and posted what they anticipated would happen in the next chapter of the book. Such a wonderful example of students working together beyond classroom walls! Check out the shared ClassBoard HERE.
— Mrs Morgado (@MrsMorgado1) November 4, 2016
4. Virtual Team Teaching
Fourth grade teachers, Rachel Thomas and Steven Lamb (better known on Twitter as Collaborative Genius), are reinventing the concept of “team teaching!” Each week, the two Albuquerque, New Mexico teachers come together in what they have termed Virtual Team Teaching (VTT), and, though at schools eight miles apart, they join with their classes using videoconferencing, a variety of technology tools, and innovative teaching practices to engage their together 50 students in interactions and inspired lessons. Use of Collaborate! has enabled their students to document and share on understandings of rocks, circuits, and even their personal learning environments. This past week, the classes joined in a science lesson where each group simultaneously examined a human heart. Videoconferenced conversation was supported with the Collaborate! discussion board which also served to inform learning as a reflection and assessment tool. Such a WOW! Learn more about their extraordinary journey on their website, and be sure to catch their upcoming TEDx Talk where audience members will too be joining on a Collaborate! board!
5. Making Time for Reflection Adds Up
For years and years, learning to count and add money has been a staple lesson in early elementary—but, with Collaborate!, 2nd grade teacher Gabrielle Cinelli found a way to make it not only engaging and collaborative for her students, but also reflective to extend learning. Gabrielle’s young students were able to seek out evidence and document knowledge on the interactive discussion board, and then were encouraged to make deeper connections to concepts through self-evaluations and shared personal reflections on the process of counting. The class also used DrawIt, Nearpod’s version of an interactive whiteboard, in a counting money activity which was then captured in a graphic collage that was sent right to Gabrielle’s email inbox! How fun!
6. Digital Citizens Get Social
In addition to having access to the Common Sense Media K-12 Digital Citizenship Curriculum in the Nearpod Content Library, California Tech Coach and PioNear Joe Marquez is finding innovative ways to engage his middle school students in discussions on social media etiquette and the importance of cultivating a positive digital footprint for college and career readiness. In his classes, students participate in Twitter EdUniversity and receive their “Twitter Learner’s Permit.” This semester, Joe and his students were able to use Collaborate! during their lessons to share their ideas as they selected their “handles.” Click here to view his ClassBoard, and be sure to follow Joe on Twitter and Periscope at @JoeMarquez70 to learn about all his great ideas on empowering students with technology!
7. Self-Assessment: Español Style
As a Nearpod Certified Educator and PioNear, Foreign Language teacher Rachelle Poth uses the Nearpod platform throughout the day in her Spanish classes in all forms of language study—reading, writing, listening, and speaking. In recent weeks, Rachelle has incorporated the new Collaborate! feature into class lessons with activities such as photo scavenger hunts in cultural studies, open-ended sharing of foods, dishes, and recipes common to Mexico, and reflective lessons on language use. For one Collaborate! lesson, she asked students to engage in a self-assessment exercise that had them considering areas in which they may need additional help. To guide them further, areas of focus were indicated as verbs, grammar, and vocabulary. Check out the ClassBoard to see how her students were also able to reflect on others’ responses with the heart icons. Rachelle shared that in addition to self-assessments, a benefit for her as a teacher is the ability to delete or reinstate answers as needed. Truly fantastic!
8. Little Learners and Big Elephants
Collaborate! can be an effective learning tool for students both old and young. Kindergarten students in Kali Kopka‘s class were able to jump into a cross-curricular literacy/science lesson in their non-fiction unit called “All About Elephants.” To gauge background understandings before the daily lesson, Kali welcomed her little learners to each add one fact about elephants using Collaborate!. Next, the kindergarteners watched a video and then did a reflection activity using DrawIt. For Kali, the data obtained and recorded in the Teacher Report was instrumental in guiding her next lessons. And, how precious are these responses:
With Collaborate! now available for all teachers, the journey really is just beginning! Please share ways you are using Nearpod and Collaborate! with your students by sharing your ClassBoards and photos on social media! Happy collaborating!
Special thanks to all the amazing teachers and students that kindly shared their learning this month! Celebrating you all each and every day!
Find Jennifer’s original blog post here.
|
<urn:uuid:9d34b666-c142-42b0-85a5-ba43f13ecc31>
|
CC-MAIN-2017-26
|
https://blog.nearpod.com/field-notes-week-3-unpacking-ideas-8-ways-to-use-nearpod-collaborate-today/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319265.41/warc/CC-MAIN-20170622114718-20170622134718-00212.warc.gz
|
en
| 0.956708
| 1,786
| 3.109375
| 3
|
Elmwood, Cambridge, Massachusetts 22 February 1819
Elmwood, Cambridge, Massachusetts 1891
1. Maria White 2. Frances Dunlap
Mabel, 3 others who predeceased him
James Russell Lowell was a very well-connected American. He was Professor of Modern Languages at Harvard; with his friends Henry Longfellow, Ralph Waldo Emerson and Oliver Wendell Holmes he began a literary periodical, the Atlantic Monthly, which is still published today and he was American ambassador in Madrid and London. His uncle Francis Cabot Lowell introduced cotton manufacturing to America and his great-grand-uncle, General William Whipple, was one of the New Hampshire signatories of the Declaration of Independence. However, his uncle's name, Robert Traill Spence, gives a clue to another part of his ancestry.
His great-grandfather, Robert Traill, son of William Traill and Barbara Fea in Rousay, emigrated from Orkney and became Comptroller of Portsmouth, New Hampshire. In 1748 he married General Whipple's sister Mary.
Robert was a loyalist during the American War of Independence and returned to Britain when hostilities began. Afterwards he was a collector of taxes in the Bermudas.
Robert and Mary had a daughter Mary who married another Orcadian, Keith Spence from Kirkwall, who had become a merchant in Portsmouth and then purser on USS Philadelphia. They had a son Robert Traill Spence, who became a naval hero and friend of Stephen Decataur, and a daughter Harriet.
The Lowells were one of the most important families in Boston, of whom it was said, "The Lowells speak only to Cabots, and the Cabots speak only to God". Charles Lowell, minister of the West Church in Boston, showed this wasn't always true by marrying Harriet in 1806.
Their son James Russell Lowell became one of the Fireside Poets, a group which included Henry Longfellow, Oliver Wendell Holmes and John Greenleaf Whittier. His best known work was The Bigelow Papers, lampoons that expressed opposition to the Mexican War and supported the North in the Civil War. He was a prominent opponent of slavery, described by Edgar Allan Poe as, "one of the most rabid of the Abolition fanatics".
In 1855 he succeeded his friend Longfellow as Professor of Modern Languages at Harvard, a position he held until 1876. Coincidentally, Longfellow's house used to be the home of Andrew Craigie, America's first Apothecary General, whose Orcadian father had been shipwrecked in Nantucket. The professorship clearly didn't occupy all his time, as it was in 1857 that he helped found the Atlantic Monthly, which he then edited for four years. This magazine was one of the first to publish short stories instead of serialized novels and published early work by Mark Twain, Henry James, Edgar Alan Poe and Nathaniel Hawthorne.
In 1877 Lowell became ambassador to Spain and then ambassador to Britain from 1880 to 1885. He was a very successful ambassador and a literary occasion doesn't seem to have been complete without him. Gladstone described him as one of London's best talkers and his circle included Robert and Elizabeth Browning, Tennyson and Thomas Hughes, author of Tom Brown's schooldays.
Lowell was a pall-bearer at Charles Darwin's funeral at Westminster Abbey. He himself has a memorial window in the chapter-house, largely at the instigation of his friend Leslie Stephen, to whose daughter, later Virginia Woolf, he was godfather.
He returned to his home, Elmwood, Cambridge in 1877 and died there in 1891. His two wives, Maria White and Frances Dunlap and three of his four children had pre-deceased him but his surviving daughter Mabel married Edward Burnett and raised five children, James, Joseph, Francis, Esther and Lois not too far away, in Southborough, Massachussets.
James Lowell's nephew, Charles Russell Lowell was made a Brigadier General in the Union Army the day before he was killed in 1864 and his great-grandnephew, Robert Traill Spence Lowell, was also a well-known American poet and won the Pulitzer Prize for poetry in 1947 and 1974. The family home of Elmwood is now the residence of the Presidents of Harvard.
Although now largely forgotten, James Russell Lowell was clearly an important literary figure in his day and very widely liked and respected. He made an unlikely reappearance in 2004, as one of the main protagonists in an American best-selling whodunit, The Dante Club by Matthew Pearl.
|
<urn:uuid:c7dc938e-d9b1-4893-8f3b-d3095c7071f0>
|
CC-MAIN-2017-26
|
http://aboutorkney.com/jlowell00.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320040.36/warc/CC-MAIN-20170623082050-20170623102050-00452.warc.gz
|
en
| 0.981777
| 962
| 2.765625
| 3
|
Athens Forklift Parts - The consolidated city-county of Athens-Clarke is located within the northeastern section of the state of Georgia. It consists of the former City of Athens proper, which is the county seat and Clarke County as well.
The University of Georgia is in this college township and actually responsible for the original development of Athens. During nineteen ninety one, after a successful vote the year prior, the original city abandoned its charter and decided to form a unified government together with nearby Clarke County. The new region was called collectively as Athens-Clarke County. According to the 2010 Census, the consolidated city county had a total population of around 115,452. This combined population consisted of all of Athens-Clarke County less a section of Bogart and Winterville.
Athens, Georgia was originally a trading settlement set up along the Oconee River banks. The region went by the name Cedar Shoals in the late seventeen hundreds. On the 27th of January, 1785, the Georgia General Assembly chartered the University of Georgia as the very first chartered state-supported university. Abraham Baldwin drafted the charter which existed solely on paper for 16 years.
A delegation of men consisting of John Milledge, Hugh Lawson, John Twiggs, Baldwin and George Walton traveled during the summer of the year 1801, to the region called Jackson County. Their aim was to select the future site for their university and to secure a construction contract for the university. Unanimously, the delegation agreed on the site of the property on the hill above the Oconee River and Cedar Shoals. On the 25th of July, the year 1801, Milledge purchased six hundred thirty three acres from Daniel Easley and afterward donated it to the university. The land was named Athens in honor of the Greek city which was the center of culture and learning in the ancient times.
The Athens-Clarke County is spread out over approximately one hundred twenty five square miles, which is the smallest area amongst the one hundred fifty nine counties in the state of Georgia. One of the highest points in Athens is designated by City Hall within the downtown core. It is located roughly 761 feet above sea level. Athens-Clarke County was the 25th county established within the state. It is approximately sixty five miles northeast of the city of Atlanta.
The area has developed a somewhat diversified economy which is led by the poultry processing, healthcare, timber, education and tourism industries. Other major factors for the economy comprise the manufacturing of items such as textiles, electrical components, transportation equipment, apparel, and industrial machines. Additionally, Athens is considered to be the major center for trade within the Northeast Georgia region.
Within Athens, there are certain professions, jobs that are much more common than in other regions of the United States. For instance, coil winders, bio-technology technicians, finishers, tapers, off-beaters and machine feeders, metal fabricators,surgical technologists as well as veterinary technicians and technologists are among the most popular occupations.
The top sectors for employment in the area comprise: Healthcare, Government, Management, Education, Administrative Sales and Support, Manufacturing as well as Finance and Business.
|
<urn:uuid:59526b2e-84ca-4e25-81c6-79aedad0951a>
|
CC-MAIN-2017-26
|
http://forkliftpartsgeorgia.com/forklift/5950/athens_forklift_parts.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320040.36/warc/CC-MAIN-20170623082050-20170623102050-00452.warc.gz
|
en
| 0.964237
| 652
| 2.5625
| 3
|
Social Learning Theory
- Tonya R. HammerAffiliated withCounseling Department, School of Education, University of Houston Clear Lake Email author
Social learning theory states that norms, attitudes, expectations, and beliefs arise from an interaction with the cultural or social environment around an individual.
Albert Bandura, the leading theorist in social learning theory, proposed that people learn from their observations of individuals or models. Bandura believed that behavioral theories presuming that environment determines one’s behavior were too simplistic in nature. In response he presented the idea of reciprocal determinism, meaning the environment and one’s behavior cause each other. As the theory developed the term prosocial behavior was coined. Prosocial behavior has been defined by theorists as “helping behavior that benefits others” . The premise behind social learning theory, unlike operant or classical conditioning, is that the behavior does not have to be perfor ...
Reference Work Entry Metrics
- Social Learning Theory
- Reference Work Title
- Encyclopedia of Child Behavior and Development
- pp 1396-1397
- Print ISBN
- Online ISBN
- Springer US
- Copyright Holder
- Springer Science+Business Media, LLC
- Additional Links
- Industry Sectors
- eBook Packages
- Editor Affiliations
- 480. Neurology, Learning and Behavior Center
- 481. Department of Psychology MS 2C6, George Mason University
- Tonya R. Hammer (1)
- Author Affiliations
- 1. Counseling Department, School of Education, University of Houston Clear Lake, 2700 Bay Area Blvd, Houston, TX, 77058, USA
To view the rest of this content please follow the download PDF link above.
|
<urn:uuid:e7dc993b-a81a-4d71-b845-972666c07b9f>
|
CC-MAIN-2017-26
|
https://link.springer.com/referenceworkentry/10.1007%2F978-0-387-79061-9_2695
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320040.36/warc/CC-MAIN-20170623082050-20170623102050-00452.warc.gz
|
en
| 0.846469
| 354
| 3.109375
| 3
|
| The following page is under construction.
Please do not edit or alter this article in any way while this template is active. All unauthorized edits may be reverted on the admin's discretion. Propose any changes to the talk page.
The Republic of Donskoya (Russian: Республика Донскоя); also known as Donskoya (Russian: Донскоя) is a nation located on the border of Greenland and North America.
The name Donskoya is derived from Dmitry Donskoy, the first to openly challenge Mongol authority in Russia. This name is symbolic to the Donskoyans as they first had to live with Russian, then Soviet authority but have always resisted the Soviets and the Romanovans trying to take control of all their lands.
However, during the era of the Soviets, they did have to bow down to them, citing their forces and strength in the area. They were absorbed into the USSR as the Greenland Soviet Socialist Republic and stayed that way for some 55 to 60 years. However, with the expulsion of the Soviets in the late 70s, the country, which now named itself Donskoya, was now independent of any country trying to rule its lands.
Era of the Arctic Company
The area which is now known as Greenland, was originally first explored, then settled by the Russian-Arctic Company. The land was first spotted in 1743, teo years after the land which is now Romanova was discovered. It was colonized a year later and it was in the initial colonization period when the native Inuits were discovered.
The area was mainly colonized by serfs who did not get the rights they deserved, and over time the population of the colony grew as the citizen enjoyed unrivalled freedom. The colony swore alligience to the Emperor and he named it Donskoya, in the honour of Dimitry Donskoy, a Russian rebel who fought for the Russians against the Mongols. By the 19th Century, the RAC's population had touched 2 million.
In 1803, at the outbreak of the Napoleonic Wars, the Russian-Arctic Company declared war on Louisville, along with the Russian-Greenland Company during the Russian Greenland-Louisvillian War. It, however, did not see any active action during the war, but the commander of the Russian Greenland forces, Field Marshal Yevgeniy Porodovsky, hailed from Russian-Arctic Company, specifically its capital Albanov.
The Russian Revolution
The populace of Donskoya, mainly made up of serfs, joined the White Russians in the Russian Civil War, even having their own Russian Arctic Legion. However, there were some people who believed that communism was the way forward for their land, and they supported the Bolsheviks. In turn, the Bolshevik leaders like Vladimir Lenin provided more advanced training and weapons to the Peasants and Partisans' Army of the Russian Arctic, the main Red body of fighters in RAC. After a series of bloody battles, the White Russian Arctics were overrun by the serfs who supported the Communists, and those who managed to make it through the war escaped to neighboring Romanova.
World War Two
Donskoya, under the Soviet-sponsored Soviet-Greenland Company, declared war on the Axis when the Soviet Union was invaded by Nazi Germany. Later on, they begrudgingly agreed to side with the Tsarists of Romanova, signing the Treaty of Kharitonovo. However, the Romanovans still didn't trust the Soviets enough to let their troops inside the country, and the two countries' armies barely worked with each other, if at all. Donskoyan Soviets didn't participate in the Vichy invasion of Romanova, but there were a few Donskoyan battalions that fought in the Eastern Front, and Donskoya served as a staging point for Soviet naval patrols against the dreaded U-boats.
On June 9, 1946, the Soviet-Greenland Company was abolished, and the Greenland Soviet Socialist Republic erected in its place. The primitive port facilities in the town of Badygin were quickly renovated and modernized, and it was here that the Soviet Arctic Fleet was based. Because of this, Romanovan Navy ships based out of Kolomeitsev kept watch on their naval activities, and many minor incidents between the two fleets nearly caused armed conflict to break out between the two sides. The most infamous of these incidents is the B-455 incident, in which a diesel-powered ballistic missile submarine suffered electrical failures that nearly caused a launch of its nuclear missiles.
Eventually, the people of Donskoya grew tired of Soviet rule and on February 27th 1978, in the Donskyan Revolution for Independence, an uprising commenced, followed by a full blown revolution. The revolution was swift and with secret Romanovan and NATO aid and support, many Soviet military bases were captured. The government authoritized the use of force against the revolutionaries, and this seemed to have slowed down the progress of the revolution with most of the country in the hands of GSSR. However, the battle for Albanov was the turning point in the war, where government forces were decisively defeated. The Soviet Union sent tanks and troops, but this proved useless against the determination of the rebels and on the 4th of September, Donskoya was completely controlled by the Transitional Government of Donskoya.
Donskoyan Socialist Revolution
According to the 1979 Provisional Constitution of Donskoya, the formation of parties with the words "communist" and "socialist" is not allowed, but the Communist Party of Donskoya, the remnants of the GSSR's ruling body, got around this by renaming themselves the Democratic Left Party of Donskoya. Allying themselves with Soviet and GSSR forces in hiding, they launched a coup that removed the Transitional Government of Donskoya from power and replaced it with another socialist regime. Both the Donskoyan and Romanovan people were not happy about this, and the TGD, after fleeing the capital Albanov, set up shop in the little hamlet of Kocherginskoye and commanded forces loyal to it there.
In reaction to the coup, Romanova withdrew most of its troops, only sending small contingents of "military advisors" to train the TGD forces. They also urged the United Nations to not recognize the DLPD-led regime of Donskoya, and support the TGD, which they claim is the "legal successor to the government of the former Greenland Soviet Socialist Republic." These events would eventually lead to the Donskoyan Civil War.
The Donskoyan Civil War lasted for twenty-eight years, from 1980 to 2008. During this time, over ten thousand Donskoyans died on both sides, as well as at least five hundred Romanovan military advisors. Finally, after the Second Battle of Albanov, the TGD finally restored its control over Donskoya, and its relations with Romanova and the rest of the world were soon normalized.
However, despite the redemocratization of Donskoyan government offices, some names reminiscent of the Socialist times still exist, such as the Supreme Socialist. Even the full name of the nation, the Socialist Republic of Donskoya, still brings to mind the DPLD regime.
The military of Donskoya is divided into three parts: the Army, the Navy, and the Air Force. They are all mostly made up of soldiers who have served the Transitional Government of Donskoya throughout the Donskoyan Civil War, but there are also some former soldiers of the old DLPD regime who had renounced their socialist beliefs defected to the TGD. Most of their equipment is a combination of old Soviet bloc weaponry and new and advanced Romanovan arms.
The military of Donskoya is an all-volunteer force. After an initial tour of duty, citizens may choose to become part of the reserve until they are 55 years old unless they voluntarily reenlist, in which they are considered career soldiers. The total peacetime strength of the entire armed forces is estimated at 15,000 fully combat-trained troops. An estimated 15,000 more are in the reserves.
- ↑ Prurov, Mikhail, Donskoya. Our Land (Albanov: Leningradskaya Publishing House, 15 March 1999), p. 3
- ↑ Prurov, p. 9
- ↑ de Lourry, Jean-Anton Michel, The Russian Greenland-Louisvillian War (Cartier: Bonaparte Publishing Houses Associated, 7 May 2008), p. 36
- ↑ Grubanov, Iosef, Donskoya in the Russian Civil War (Schmidt: Brezhnevskoye Book House, 15 May 2005), p. 107
- ↑ Tatravina, Tatiana, Donskoya: The Nation During the Second World War (Schmidt: Borodin and Sons Publishing Associates, 7 May 2006), p. 95
|
<urn:uuid:189db601-6240-4bd2-b080-b38a6e016188>
|
CC-MAIN-2017-26
|
http://althistory.wikia.com/wiki/Donskoya_(The_Green_North)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320215.92/warc/CC-MAIN-20170624031945-20170624051945-00533.warc.gz
|
en
| 0.970248
| 1,912
| 3.46875
| 3
|
You may want to look into homeschooling if you think your child does not get enough attention in school. Homeschooling does not need to be overwhelming; the key is in arming yourself with the right knowledge. The advice in this article will help you begin.
You should always allow your children a recess time when you are going through your school day. Studying for prolonged periods of time will both tire and bore them. That means you need to let them loose for a bit every so often. Everyone will benefit from a little break.
You would not want your children to get mixed up with the bad crowd in public schools, yet they need to have opportunities to interact with other children. Set up play dates with family, friends or even neighbors. You should also take your children to local parks and allow them to interact with other children there. Another option is to sign them up for sports teams, clubs or similar organizations.
If you have preschoolers in addition to older kids, make certain to spend individualized time with each. Designate an area that has toys the kids can play with. Ask your older children to help you teach the littler ones. That will enable both children to learn, and older kids will thrive on the responsibility you give them.
Give the kids your housework, or hire someone. Doing all of the work yourself can be hard. Homeschooling along with cleaning, shopping, cooking, and more can be very difficult. Take any help you can get.
When teaching your kids something, provide hands-on opportunities. Create foreign recipes if your child is learning about another culture. Learning about England could have them creating bangers and mash. You can cook pasta, sushi and schnitzel when learning about WWII. A tasty lesson will be one which is retained.
Make sure you research the process thoroughly prior to deciding to homeschool. There are a lot of resources out there to help you determine whether this is the best thing for your family. Homeschooling is very exciting but you should not consider this option if you already have a full-time job or cannot afford to give your child a good education.
The Homeschool Association can provide you with the guidelines to abide by when homeschooling. Different states have different requirements. In some, you must simply provide standardized tests as instructed. In others, you must register your home as a privately owned school. Also be sure to make the school district aware of your decision to homeschool so that you don’t run into any problems with truancy.
Be certain the kids have a study spot that is quiet and free from typical distractions. Choose an area that is separate from the places your child usually plays. If your children’s study area lacks storage, add some boxes to help organize their materials and school supplies.
Reason with yourself on paper. You know what your reasons are, but it may help your spouse to see them in black-and-white. Realize what needs to be accomplished, and you will then be able to answer others’ questions about your decision to homeschool. It is going to make things much easier for you.
Homeschooling is a good option for those who have a hard time with a traditional school setting. Your child will be much less stressed out. On top of that, it builds the parent-child bond. When the traditional learning model cannot nurture and develop your child, homeschooling offers a possible solution that can possibly limit or eliminate discomfort and stress.
Do not lecture your children like a teacher would. Teachers are trained to give lectures, do you have that training, too? Additionally, the children are your own, so you are aware of their feelings about lecturing. Make learning fun and untraditional by reading with your child and viewing the lesson from his perspective. It is very likely you will also learn a lot.
Turn your kid into a blogger. Every child must know how to communicate clearly and properly, and blogging fits the bill on both counts. Help your little one to choose a topic they really are interested in as a first step. Next, create the blog making sure that the settings are set to private. They can learn about a topic and they write on it, including fact-checking research. They may also be able to write short stories to entertain others.
Find a homeschooling support group. Homeschooling is growing quite quickly. Make some friends in your area that homeschool and attend events together, share ideas and have fun. You might also choose to seek families like yours on the Internet and in blogs and forums. Talk with other parents about the issues you are encountering and your favorite teaching methods, exchange lesson plans and filed trip ideas. Your children will also have some good friends. Homeschooling can be much easier if there’s a support group behind you.
Become a regular visitor to the local library. Reading is an integral part of the homeschooling curriculum. Indeed, reading regularly is essential if a student is to improve. Libraries provide tons of material, ensuring they find something they like. Let them choose their own reading material, but keep them to books which challenge them a bit. Use these same books for teaching them writing, reading, and other subjects.
You hold the keys to your child’s future. You are the person most dedicated to your child’s success, and this can be reflected through homeschooling. What you’ve read here should help you become the best teacher your child ever had.
|
<urn:uuid:8a36ae64-8d51-4c32-8d6a-7b7ef2283ee5>
|
CC-MAIN-2017-26
|
http://educlue.eu/homeschooling-tips-you-can-start-using-today/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320215.92/warc/CC-MAIN-20170624031945-20170624051945-00533.warc.gz
|
en
| 0.969178
| 1,126
| 2.53125
| 3
|