text
stringlengths
174
640k
id
stringlengths
47
47
dump
stringclasses
17 values
url
stringlengths
14
1.94k
file_path
stringlengths
125
142
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
43
156k
score
float64
2.52
5.34
int_score
int64
3
5
Could hot cocoa be the next "wonder drug" For high blood pressure? Harvard researchers praise stunningly simplediscovery! According to recent estimates, nearly 1-in-3 American adults has high blood pressure. But for the Kuna Indians living on a group of islands off the Caribbean coast of Panama , hypertension doesn't even exist. In fact, after age 60, the average blood pressure for Kuna Indian islanders is a perfect 110/70. yyy Is it because they eat less salt? No. Kuna Indians eat as much, if not more salt, than people in the U.S. Is it due to their genes? No. Kuna Indians who move away from the islands are just as likely to suffer from high blood pressure as anyone else! So what makes these folks practically "immune" to hypertension -- and lets them enjoy much lower death rates from heart attacks, strokes, diabetes, and cancer? Harvard researchers were stunned to discover it's because they drink about 5 cups of cocoa each day. That's right, cocoa! Studies show the flavonols in cocoa stimulate your body's production ofnitric oxide -- boosting blood flow to your heart, brain, and other organs. In fact, one study found cocoa thins your blood just as well as low-dose aspirin! But that's not all. A Harvard Medical School professor claims cocoa can also treat blocked arteries, congestive heart failure, stroke, dementia, even impotence! Painless cholesterol cure works in just 7 days -- and drives the "food police" crazy! Want to lower your cholesterol so fast it'll make your head spin? It's a breeze, just eat guacamole -- or any dish containing avocados! Most health experts and nutritionists will tell you this rich, delicious Mexican dish is BANNED from any cholesterol- watcher's menu. But not Dr. Steven Pratt. That's because new research shows eating avocados can lower your cholesterol even faster than drugs.... without the side effects! One study found after just 7 days on a diet including avocados, LDL ("bad") cholesterol and triglyceride levels dropped by 22 percent. Meanwhile, HDL ("good") cholesterol shot up 11 percent -- something most cholesterol- lowering drugs won't do! The cinnamon cure for high blood sugar Sprinkle a little cinnamon on your toast, cereal, oatmeal, or sliced apples. It not only tastes good, it lowers your blood sugar! In a recent study, people reduced their blood sugar levels by as much as 29 percent in just 40 days. That's with NO drugs, NO diet changes -- just plain old cinnamon! The fat that blasts away cancer You've been told cancer runs in families. You've been told what to eat and what NOT to eat -- including LESS fat. Yet Dr. Steven Pratt says there'sone fat youshould eat MORE of. It's the monounsaturated fat called oleic acid, found in olive oil!It should come as no surprise. After all, olive oil is a staple of the Mediterranean diet. And people inSpain and Greece are far less likely to develop cancer than in the U.S. But what's really interesting is how olive oil not only prevents cancer, it blasts away cancer cells that already exist! So if you're even the slightest bit worried about cancer, this is oneSuperFood you don't want to be without! NEW prostate-protecting champ trumps tomatoes! Unless you've been asleep under a rock for the past decade, you've heard the news about tomatoes. They contain a potent antioxidant calledlycopene that's been proven to reduce the risk of certain cancers -- in particular, prostate cancer. A famous Harvard study back in 1995 found that out of 48,000 men surveyed, those who ate 10 or more servings of tomatoes a week reduced their risk of prostate cancer by more thanone-third. What's more, they lowered their risk of aggressive prostate tumors (the kind that are really tough to treat) by HALF! But before you reach for that slice of pizza or bottle of ketchup, listen up. What if I told you about a sweet, refreshing food Dr. Steven Pratt recommends that's evenbetter for your prostate than tomatoes? This NEW prostate protecting champ is watermelon! Ounce for ounce, watermelon is even richer in lycopene than tomatoes. And since you probably eat more watermelon in one sitting than you do tomatoes, you don't have to gorge on it 10 times a week in order to slash your cancer risk! Just a few times a week should do it. Knock out an ulcer with broccoli?! About 25 million Americans will suffer from a peptic ulcer at some point in their lives. To get rid of their ulcers, most will take an antibiotic like amoxicillin. Pretty tame stuff, right? Wrong! Amoxicillin can bring with it unwanted side effects like fever, nausea, stomach pain, diarrhea, headache, even a yucky condition called "hairy tongue"! And if you think that's bad, according to the Centers for Disease Control (CDC), the cost of treating an ulcer with antibiotics over an average 17-day period can run upward of $1,000! Fortunately, there's oneunconventional treatment with NO side effects Dr. Pratt swears by. "Eat broccoli!" he says. Why? Broccoli contains a remarkably potent compound called sulforaphane, that kills off the H.. pylori bacteria that cause most ulcers. Not only can it knock out an ulcer, eating one serving a day for a month might run you 20 bucks... a fraction of the cost of drugs.
<urn:uuid:cb05dd3e-44b3-44c9-879e-8c9bdb817252>
CC-MAIN-2017-26
http://naim-mohamad.blogspot.com/2010/09/eyeing-these-wonderful-diet.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00258.warc.gz
en
0.942558
1,167
2.65625
3
AN INTRODUCTION TO THE BASICS of wine tasting via estate-bottled French wines. We break the class into two parts. The first part begins with a general overview of the geography of French wine regions and their principle grape varietals. A particular focus is lent to how wines are classified in France.MAKE A RESERVATION The first part begins with a general overview of the geography of French wine regions and their principle grape varietals. A particular focus is lent to how wines are classified in France. By discussing the French ‘appelation’ system, we help decipher typical French wine labels. This part of the class develops an understanding of key regions and grape types, but also demonstrates the idea that French wines are defined primarily by the location of the vineyard where they’re grown. The second part of the class concerns how to taste and appreciate French wines. The aim here is to perceive and appreciate various wine styles and to trace these styles back to the places and people who make the wines. The tasting familiarizes students to the essential building blocks of wine: acidity and sweetness, tannins and alcohol, aromatics and flavors. It’s one thing to taste a wine , and another to manage talking about it! So one key aspect of the second part of the class is providing some common words and language used when tasting wines. Our goal in the introductory class is to demystify the world of French wines and to help students better appreciate and talk about a variety of wine styles. The class is suited for wine enthusiasts with some tasting experience but is particularly adapted to beginners. La Dernière Goutte 6 rue Bourbon le Château 75006 Paris, France phone : 01 43 29 11 62 mail : email@example.com
<urn:uuid:f40d49b7-7f92-47be-bc94-20da68882379>
CC-MAIN-2017-26
http://wine-class-in-english.paris/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00258.warc.gz
en
0.923469
384
2.796875
3
When I started teaching, my philosophy was to cover, at least in some part, all of the topics taught at the college level of a freshmen chemistry class. If I am truly teaching a college-prep course, this idea makes sense. But, this year between the loss of time moving to block scheduling, time lost due to Hurricane Sandy, and refocusing my attention on teaching to a final exam I didn’t create, I have really had to cut out what I feel is important content that is taught in college in order to get my students better prepared for the end of the year examination. When doing all of this, I keep saying “when will my students ever need this?” It is kind of bizarre hearing that phrase said in your own head instead of coming out of a teenager. I have been trying to make class more focused on the activities and less on the videos. This has occurred partially through guided inquiry and guided PBL activities. But, as is the case with most science classes, the activities still just reinforced the content that they had to learn through the videos instead of the activities driving the learning. I decided to make a change. Starting in the unit on Solutions, I gave a starter activity that walked them through the process of making a solution and then walked them through calculations that are required for calculating the concentration. Once they have the foundation, then they watch the video related to the topic. After watching the videos, the students would then come back to the lab to complete an extension to the original activity. Here is a link to the document. It is very much a work in progress, but I am hoping it will shift the students away from relying on the videos and myself to give them the content they need. It also makes the class time more about DOING chemistry and the videos more about preparing for the tests and exams. Now that I think about it, maybe part of the shift needs to be more like the structure of chemistry labs in college: a “recitation” that is just strictly content based and a lab that actually has the students using the content. I have to think more on this. Your thoughts?
<urn:uuid:354ba5f0-e4fa-4a01-83fb-6979a1294006>
CC-MAIN-2017-26
https://marcseigel.com/2013/03/12/content-vs-skills-refocusing-our-attention/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320823.40/warc/CC-MAIN-20170626152050-20170626172050-00338.warc.gz
en
0.975974
441
2.640625
3
A hundred and twenty-five years separate the statements of Henry George and Mandela above. Despite the well meaning efforts of philanthropists, charities, governments and international agencies to root out poverty, the disparity remains. In fact, the gap between rich and poor continues to widen, even in the affluent West. As Mandela also pointed out: ‘Poverty is not natural, it is man-made and can be overcome by the action of human beings’. But how? The twentieth century was dominated by the Marxist and Socialist attempts to tackle the problem. While they can claim some success in mitigating the worst levels of deprivation, the general standard of living lagged far behind the market economies. While the Capitalist system can be said to have triumphed over the Socialist/Marxist in producing wealth, the benefits are not shared by all and a third of the human race lives in abject poverty still. The unique feature of Progress and Poverty is that Henry George reveals the cause of poverty, which is man-made, as Mandela says. George shows how the cause can be removed by a simple tax reform. This reform could be introduced in incremental stages to allow time to adjust. ‘The main, underlying idea of Henry George … is an argument that makes a lot of sense.’ Joseph Stiglitz. Nobel Laureate and author of Globalization and Its Discontents Born in Philadelphia in 1839, Henry George went on to San Francisco and became a newspaper editor who addressed the social problems of his day. On a visit to New York, he was shocked by the contrast between wealth and poverty. He resolved to find a solution, if he could. The result was Progress and Poverty, published in 1879, which is said to be the all-time best selling book on economics. Keywords: Poverty, Tax reform, Fair society, Economics
<urn:uuid:e2d16d88-683a-4a66-8b32-f6862f056c17>
CC-MAIN-2017-26
https://www.shepheard-walwyn.co.uk/product/progress-and-poverty-full-edition/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320823.40/warc/CC-MAIN-20170626152050-20170626172050-00338.warc.gz
en
0.955843
381
3.875
4
As you plan on cutting your weight, you also have to be keen on balancing your blood sugar. Not so many individuals know which foods to choose that can help them lose weight and at the same time balance their blood sugar levels. 9 Part Guide to Bigger CHEST (if clicking doesn't work- right click and hit "Save link As") It is time to change your mind when it comes to dieting and keeping fit. By aiming less on fads and more on keeping a healthy balance of what you consume, you will place your body on a level many diets do not consider. That is, stabilizing your blood sugar. Your blood sugar level is determined by the amount of glucose circulating in your bloodstream. The Glucose comes from the food you eat. The glucose supplies energy to blood cells or may be stored in your body for future use. A well-balanced sugar level is important for your body fitness as well as regulating your hormones, increasing your metabolism and helps in burning stored fat to assist you to cut weight. Too much glucose results to high blood-sugar levels, which is stored as fat since your body is unable to break down the excess glucose. However, not taking enough glucose can still result in one gaining more weight and low sugar levels, making your whole body be in starvation mode. During this mode, your body burns lean muscles instead of the excess fat. Here are a few tips on how to balance your blood sugar level as well as cutting down weight. Eat in 3s Eating in 3s is essential. That is, eat after every three hours and split your meal into thirds: 1/3 carbs, 1/3 protein, and 1/3 fat. Naturally, our bodies need to eat after every three hours. Once you wait longer, your body changes to starvation mode, since it automatically assumes that the food is scarce and stores fat for future use instead of breaking it down. Ensure you take something within one hour of waking up and then after every three hours. Dividing your food into an equal ratio of fat, carb and protein will assist you to maintain your blood sugar level. A good example of what you can take in the course of the day include; taking oatmeal, egg whites, and turkey bacon as breakfast, avocado on a wheat bun with turkey burger as lunch and butter and sweet potato with a small portion of steak as dinner. And it gets better: As your blood sugar normalizes by sticking to the 3s rule, your body releases the stored fat. You eat more as you get leaner, which is the power of having the lean muscle. You can always take as many veggies as you want since they are packed with nutrients and vitamins your body requires and are low in calories. Prepare a portable Food Kit It is essential to carry a snack kit so as you can eat after every three hours regardless of where you are. This will help you keep track on your progress of cutting weight and balancing blood sugar level. Always drink three liters of water mixed with cinnamon Mixing cinnamon with water is good for losing weight as well as balancing blood sugar level. Research shows that taking a half teaspoon of cinnamon everyday reduces blood sugar levels by 30%, and lowers cholesterol and triglyceride levels to reduce the risk of stroke and heart attack. Drinking three liters of water mixed with two drops cinnamon per liter helps with constipation and digestion. Keep your spine in line by rolling This might be new to you, but aligning your spine aids in weight loss. The spinal nerves play a role in controlling food passage through the digestive tract. A spine that is in line helps in proper digestion and elimination of waste and toxins to help in cutting weight. Rolling three times a day using a roller will not only assist with cutting weight but also one feels good too! Exercise your muscles for 15 minutes daily Your skeletal muscle consists of two types of muscle fibers: the white muscles and the red muscles. The white muscles are triggered when you do exercises like running upstairs or skipping ropes, while the red muscles are activated when doing simple exercises like walking. When working out, you burn fat; hence it is important to work out. Take three ounces of protein before indulging in a cheat Once in a while, we cheat on our healthy diet with carbs. However, there is a wrong and a right way to do so. Before taking fries, chocolate bar, cake or drinking alcohol, take three ounces of protein first. You can take three ounces of Greek yogurt, three ounces of cottage cheese or three ounces of turkey breast. Protein will always be your friend when you want to consume heavy carbs; it aids in slowing down digestion. But avoid cheating more than three times a week so that your blood sugar level remains balanced. Beans should be part of your weekly menu The hummus, garbanzo beans, and lentils are rich in fiber, have low fat and are a good type of protein. Taking beans once or twice a week is important. Beans normalize the blood sugar levels and help in digestion. Before cooking beans, soak them overnight to help in digestion. Taking greens in every mealFollow @AboutLifting Green are rich in calcium and fiber that helps in digestion. Always eat greens at every meal. The most nutritious greens include broccoli, chard, tomatoes, spinach and kale. Try the hCG diet Low Calorie HCG diet is one of the best and effective ways of cutting down weight that can give you the outcome you have always wanted. The hCG diet drops reduces around 600 calories a day and is only taken within a period of eight weeks only. It can be taken as sprays, pellets or oral drops. Avoid foods that release energy fasterFollow @AboutLifting Consuming meals that release energy faster results in irritation, hunger and fatigue feelings. Foods with refined sugar as well as processed foods increase your blood sugar levels – they release their glucose faster. Try eliminating processed foods and food with refined sugar from your everyday diet. With all the above tips, you are good to go in your journey for balancing your blood sugar level as well as cutting down weight. Why wait? Start today, and within a short period, you will start experiencing the changes on your body as you always desired. Tuning up your mind and taking the above actions is all you need to maintain your blood sugar levels as well.
<urn:uuid:37d3be44-b144-4e17-88b5-d402044d99c4>
CC-MAIN-2017-26
http://aboutlifting.com/bloodsugar/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323808.56/warc/CC-MAIN-20170629000723-20170629020723-00578.warc.gz
en
0.947559
1,309
2.6875
3
Cinnamon, or dalchini, has the requisite qualities to counter HIV, an Indian company claims. Scientists at the Pune- based Indus Biotech claim the dalchini ( cinnamon) plant has properties which can help keep HIV- infected people healthy. That means they carry the human immunodeficiency virus ( HIV) but don't develop any symptoms. While some HIV- positive cases progress to AIDS patients fast, others are slow progressors. One in 300 HIV- positive people don't develop AIDS even after carrying the virus for 10- 15 years. They are called HIV " controllers". The bark of the dalchini plant has properties to turn HIV- positive people into HIV controllers. The scientists have extracted a molecule - IND- 02 - from the plant. In studies carried out in the laboratory and on humans, in which the molecule was used as a supplement, it was found to be effective in reducing the number of viruses or viral load, a company official claimed. " Currently a cocktail of two- three drugs is used to control HIV. About 22 drugs are in use as therapy for HIV/ AIDS," said Sunil Bhaskaran, the firm's research head. An HIV- positive individual is generally given drugs only after his/ her CD4 cell count falls below 350 or he/ she starts developing symptoms of the disease. CD4 cells are a kind of cells in blood which help fight infection. The molecule was tested among 40 HIV- infected people in Pune, who had no symptoms and had CD4 cell count of over 350. It was given as a nutritional supplement. Out of 40, 20 were given the supplement as a 300 mg capsule once daily for 12 weeks. The viral load came down by 14 per cent in the group given the nutritional supplement, he claimed. In the group who were not given this supplement, the viral load increased by 68 per cent, he added. The group given the nutritional supplement also had a better CD4 count. Preclinical studies were carried out in collaboration with the National Taiwan University at their bio- safety lab with human blood. A blood sample was infected with HIV and then the molecule was added. The sample was examined on the third, fifth and seventh days. The viral load was found to decrease many- fold due to the new molecule, he said. " Besides reducing the viral load, the new molecule has been found to increase production of protective proteins called antibodies," he added. Though the exact action of IND- 02 is not clear, the molecule prevents replication of HIV by protecting a crucial defence protein called APOBEC3G ( apolipoprotein B mRNA editing enzyme, catalytic polypeptide- like 3G), produced by CD4 cells. APOBEC3G neutralises the virus. But Virus Infectivity Factor, produced by HIV, damages APOBEC3G. The new molecule stops degradation of APOBEC3G. Thus, the body's own cells are able to keep the virus under control. Bhaskaran said they aimed to develop this molecule as a drug for treatment of HIV- infected people before they start on anti- retroviral therapy and " remove or delay the need for" it. The company has applied to the Drug Controller General of India for permission to start clinical trials.
<urn:uuid:876afc20-1357-4a46-817f-2929c776926c>
CC-MAIN-2017-26
http://indiatoday.intoday.in/story/Cinnamon+gives+the+zing+to+counter-HIV+measures/1/75312.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319688.9/warc/CC-MAIN-20170622181155-20170622201155-00217.warc.gz
en
0.967333
678
2.546875
3
“While the Angel of Death rides on the fumes of the iron scow, and infected airs are wafted to our shores from the anchorage, we shall have no security against these annual visitations of pestilence.” Dr. Anderson: Harper’s Weekly, 1858 Quarantine. The word is medieval yet futuristic, biblical as well as a harbinger of end-of-the-world doomsday scenarios. According to the BBC, the cases of Ebola since the start of the outbreak in March now stands at 7,780 in Sierra Leone, 7,719 in Liberia, and 2,283 in Guinea. The virus has killed more than 6,300 people. In recent months, public health officials have struggled with how to isolate people who may have been exposed to Ebola while still preserving individual rights and freedoms; governors in New York and New Jersey imposed 21-day quarantines on health care workers returning from the Ebola-stricken countries of West Africa. The New England Journal of Medicine has called these quarantines “not scientifically based” and “unfair and unwise.” Below is a timeline of unusual facts associated with the history of quarantines. 10. The Middle Ages The formal system of quarantine began in the 14th century as a “state of enforced isolation” to protect coastal cities from plague epidemics. During the height of the Black Death, ships arriving in Venice were required to sit at anchor for 40 days before passengers and crew could go ashore. The word quarantine comes from the Italian words, quaranta giorni, which means forty days. Nevertheless, as early as the writing of the Old Testament, informal rules existed for isolating lepers. 9. Leper Colonies Scholars believe the earliest account of leprosy appears in an Egyptian Papyrus written around 1550 B.C. In Europe, leprosy first appeared in the records of ancient Greece after Alexander the Great’s army returned from India. Throughout history, the disease has been feared and misunderstood, often believed to be a hereditary curse or a punishment from God. In Europe during the Middle Ages, lepers had to wear special clothing and ring bells to warn people that they were approaching. By 1200, there were 19,000 leprosariums in Europe, many of which functioned like self-contained towns complete with specially minted currencies. 8. The Lazaretto The Lazaretto, an 18th century building on the bank of the Delaware in Essington, Pa, is the oldest surviving quarantine hospital in the United States. Named after St. Lazarus, the patron saint of lepers, the building was once the official quarantine facility for the port of Philadelphia; its history is tied to the yellow fever epidemic that ravaged the city in 1793, nearly wiping out the country’s fledgling democracy (it killed one of out five people). According to Dr. Robert Hicks, director of the Mutter Museum and Historical Medical Library at the College of Physicians in Philadelphia, “When yellow fever struck, the consequences were absolutely horrific. When people began vomiting up their stomach lining, the black vomit, that was the real lethal calling card that it had arrived.” 7. The Cholera Epidemic Between 1831 and 1832, nearly 30,000 people in Britain died in a cholera epidemic. In June 1832, a New York mandate said that no ship can approach within 300 yards of any dock if the captain suspects that cholera is aboard. However, the disease wasn’t contained and killed nearly 3,500 people in New York before the epidemic ended in September. The catastrophe led to the first international sanitary conference in Paris, with the goal to make quarantine an international cooperative effort. 6. Typhoid Mary Marry Mallon, better known as Typhoid Mary, is believed to have infected at least 53 people –three of whom died -with typhoid fever over the course of her career as a New York City cook. Marry Mallon is the first person in the U.S. identified as an asymptomatic carrier of the pathogen associated with typhoid fever. She was twice forcibly quarantined. After her second arrest in 1915, in which she started a major outbreak at Sloane Hospital for Women (25 infected, two dead), Mallon was isolated at Riverside Hospital. She spent 24-years in quarantine and in 1938, at age 69, died of pneumonia. 5. Venereal Diseases In the early 20th century, venereal diseases were a serious problem for the U.S. military. According to a Harvard University study “The Syphilis Epidemic and its Relation to AIDS,” 13 percent of all Americans drafted by Uncle Sam for WWII tested positive for syphilis or gonorrhea. At the time, the moral stigma associated with venereal diseases was intense, and it was widely believed the transmission of these diseases occurred when one engaged in sex acts outside of traditional marriage. In other words, prostitution was to blame for venereal diseases. In 1918, in an effort to dismantle the prostitution trade, U.S. Congress passed the Chamberlain-Kahn Act, which granted the military $1 million to be used in a civilian quarantine and isolation fund. The highly unconstitutional Act aimed to quarantine prostitutes and promiscuous women and girls. It’s estimated nearly 30,000 women were held in federal detention centers as a result of the program. 4. The Apollo 11 Mission On July 24, 1969, the astronauts in the first manned lunar mission splashed to earth aboard the Command Module Columbia just before dawn local time. The recovery mission took place in the Pacific Ocean, where the three-man Apollo 11 crew was airlifted to safety. NASA, fearing the lunar surface may be wrought with pathogens (or dangerous, Triffid-like spores) took a cue from the science fiction playbook and isolated the astronauts for 21 days, first in a Mobile Quarantine Facility and later at the Lunar Receiving Laboratory at the Manned Spacecraft Center. 3. Cuban “Health Resorts” In 1986, Cuba treated the first cases of HIV/AIDS by enforcing compulsory and indefinite quarantines for citizens who tested positive for HIV. The Los Angeles Times first reported on these “health resorts” in 1988, when a U.S. delegation visiting a sanatorium described it as “pleasant but frightening.” Despite achieving the lowest rate of HIV infection and the highest level of AIDS treatment in the Caribbean, Cuban policies aimed at stopping the spread of the disease were internationally condemned as violations of human rights. The “health spas” were quickly dubbed concentration camps. In 1989, Cuba changed its health care system, allowing patients to leave the sanatoriums for long stretches of time. By 1993, citizens with HIV could choose to live at home after completing an eight-week education program at a sanatorium. The introduction of antibiotics and vaccinations made large-scale quarantines a thing of the past by the mid-20th century. Nevertheless, the threat of bioterrorism and newly emergent diseases like SARS and Ebola resurrected the age-old custom, causing many people, including doctors, nurses, travelers, and the federal government, to publicly debate the success of border security, travel bans, and medical quarantines. However, officials credit the use of quarantines and isolation with forestalling the SARS outbreak (severe acute respiratory syndrome) that began in Asia and Canada in 2003. President George W. Bush added SAARs to the list of the CDC’s quarantinable diseases in April 2003. 1. Quarantinable Diseases According to the CDC, the list of quarantinable diseases contained in an Executive Order of the President include the following: cholera, plague, diphtheria, infectious tuberculosis, smallpox, yellow fever, viral hemorrhagic fevers (Marburg, Ebola, and Congo-Crimean), and severe acute respiratory syndromes. While illnesses such as measles, mumps, rubella, and chicken pox are not on the CDC’s list of quarantinable diseases, they can pose a serious health risk to the public.
<urn:uuid:00f9b5a8-5f6b-408f-9714-554c3525a53f>
CC-MAIN-2017-26
http://www.therichest.com/rich-list/10-shocking-facts-about-quarantines/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320063.74/warc/CC-MAIN-20170623133357-20170623153357-00298.warc.gz
en
0.957316
1,710
3.953125
4
Does the Islamic culture lead to mental illness? People of South Asian origin with mental health problems are missing out on treatment, the BBC has been told. Experts warn it is contributing to the high suicide rate among Asian women. The chairman of one NHS Trust says he blames "institutional racism" for the "lack of engagement" with the South Asian community. It’s not racism that is stopping them from getting access to mental health. It is their own culture that stops them from getting help. Islam is also a cause as it treats women as second class citizens so much so that Asian women are committing suicide in increasing large numbers on just one stretch of railway track because they are abused and degraded by their community. Until the Islamic community bring themselves into this century and stop being backward and treat women as equal they will continue to have mental health problems in their communities.
<urn:uuid:266c2bb0-c2e1-4472-87c6-db68a7d2e8bb>
CC-MAIN-2017-26
http://ydkmwayne.blogspot.com/2008/05/does-islamic-culture-lead-to-mental.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320063.74/warc/CC-MAIN-20170623133357-20170623153357-00298.warc.gz
en
0.979185
179
2.625
3
Canadian federal law defines identity theft as: United States Edit Identity theft is |“||the acquisition and use of another person's PII in a way that involves fraud or deception, typically for economic gain.||”| Federal law defines identity theft as: |“||knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, or in connection with, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law.||”| |“||fraud committed or attempted using the identifying information of another person without permission.||”| |“||a fraud committed or attempted using the identifying information of another person without authority.||”| The OECD has stated that: |“||ID theft occurs when a party acquires, transfers, possesses, or uses personal information of a natural or legal person in an unauthorised manner, with the intent to commit, or in connection with, fraud or other crimes.||”| The U.N. Intergovernmental Expert Group has defined identity theft as: |“||occurrences in which information related to identity, which may include basic identification information and in some cases other personal information, is actually taken in some manner analogous to theft or fraud, including theft of tangible documents and intangible information, the taking of documents or information which are abandoned or freely available, and the deception of persons who have documents or information into surrendering them voluntarily.||”| United Kingdom Edit Identity theft is defined in the United Kingdom as |“||the act whereby someone obtains sufficient information about an identity to facilitate identity fraud ('ID fraud'), irrespective of whether, in the case of an individual, the victim is alive or dead.||”| Identity theft is a form of fraud in which the personally identifiable information of an individual, such as a Social Security number, name, or date of birth, is co-opted by another person to facilitate committing a criminal or fraudulent act by impersonating the victim. As Senator Jon Kyl, Chairman of the Senate Judiciary Subcommittee on Technology, Terrorism and Government Information put it, "there are few clearer violations of personal privacy than having your identity stolen and used in the commission of a crime." Until 1998, identity theft was not a federal crime. Identity theft is the fastest growing type of fraud in the United States; in 2008 about 9.9 million Americans were reportedly victims of identity theft, an increase of 22% from the number of cases in 2007. According to the FTC's survey on identity theft, approximately 8.3% of the U.S.’ adult population may have fallen victim to identity theft. With recent data indicating that the number of identity theft incidents is on the rise, the current proportion of the population falling victim to identity theft may be even higher than the level estimated by the FTC in 2005. In addition, the Federal Trade Commission (FTC) estimates that it costs consumers about $50 billion annually. More recently, a survey by a private research firm, Javelin Strategy & Research, using the methodology developed by the Federal Trade Commission, found that in 2009, a total of 11.1 million U.S. adults (representing 4.81% of the U.S. population) had become victims of some form of identity fraud, with an aggregate loss (to both individuals and corporate victims) of US $54 billion. Identity theft (also sometimes referred to as identity fraud) does not usually occur as a stand-alone crime. Instead, identity theft is often committed as part of some other fraud or white-collar crime, including fraud on existing accounts — such as unauthorized use of a stolen credit card number — or fraudulent creation of new accounts — such as using stolen data to open a credit card account in someone else's name. An identity thief could also take other actions on behalf of the victim, such as establishing residency/citizenship, securing employment, obtaining government benefits, and committing other crimes in the victim’s name. In addition, identity theft can play a facilitating role in potentially more violent crimes such as drug trafficking, people smuggling, and international terrorism. An increase in globalization and a lack of cyber borders provide an environment ripe for identity thieves to operate from within the nation’s borders — as well as from beyond. Federal law enforcement is thus challenged with investigating criminals who may or may not be operating within U.S. borders; may have numerous identities — actual, stolen, or cyber; and may be acting alone or as part of a sophisticated criminal enterprise. How personal information is obtained Edit - Dumpster diving. They rummage through trash looking for bills or other paper with personal information on it. - Skimming. They steal credit/debit card numbers by using a special storage device when processing the card. - Phishing. They pretend to be financial institutions or companies and send spam or pop-up messages to get the victim to reveal his or her personal information. - Changing address. They divert a victim's billing statements to another location by completing a change of address form. - Old-fashioned stealing. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access. - Pretexting. They use false pretenses to obtain personal information from financial institutions, telephone companies, and other sources. A particular crime of identity theft may include one or all of these stages: - Stage 1: Acquisition of the identity through theft, computer hacking, fraud, trickery, force, re-directing or intercepting mail, or even by legal means (e.g., purchase information on the Internet). - Stage 2: Use of the identity for financial gain (the most common motivation) or to avoid arrest or otherwise hide one's identity from law enforcement or other authorities (such as bill collectors). Crimes in this stage may include account takeover, opening of new accounts, extensive use of debit or credit cards, sale of the identity information on the street or black market, acquisition ("breeding") of additional identity-related documents such as driver's licenses, passports, visas, health cards, etc.), filing tax returns for large refunds, insurance fraud, stealing rental cars, and many more. - Stage 3: Discovery of the theft. While many misuses of credit cards are discovered quickly, the "classic" identity theft involves a long period of time to discovery, typically from six months to as long as several years. Evidence suggests that the time it takes to discovery is related to the amount of loss incurred by the victim. Increasing globalization and the expansion of the Internet have provided a challenging environment for law enforcement to both identify and apprehend identity thieves targeting persons residing in the United States. For one, these criminals may be operating from within U.S. borders as well as from beyond. There is no publically available information, however, delineating the proportion of identity theft (or other crimes known to be identity theft-related) committed by domestic and international criminals. Secondly, while some identity thieves operate alone, others operate as part of larger criminal networks or organized crime syndicates. The FBI has indicated that it, for one, targets identity theft investigations on larger criminal networks. These networks may involve identity thieves located in various cities across the United States or in multiple cities around the world, and these criminals may be victimizing not only Americans, but persons living in countries across the globe. A third challenge includes identifying identity thieves operating under multiple identities, such as their actual identities, various stolen identities, and cyber identities and nicknames. What data thieves do with the information Edit These data thieves then sell the information or use it themselves. While identity theft is not solely an Internet issue, a number of high profile data security breaches involving the personally identifiable information (PII) of citizens and consumers has drawn significant attention to the issue. Once they have the victim's personal information, identity thieves use it in a variety of ways. Credit card fraud: - They may open new credit card accounts in the victim's name. When they use the cards and do not pay the bills, the delinquent accounts will appear on the victim's credit report. - They may change the billing address on the victim's credit card so that the victim no longer receives bills, and then run up charges on the victim's account. Because the victim's bills are sent to a different address, it may be some time before the victim realizes there is a problem. Phone or utilities fraud: - They may open a new phone or wireless account in the victim's name, or run up charges on the victim's existing account. - They may use the victim's name to get utility services like electricity, heating, or cable TV. - They may create counterfeit checks using the victim's name or account number. - They may open a bank account in the victim's name and write bad checks. - They may clone the victim's ATM or debit card and make electronic withdrawals, draining the victim's accounts. - They may take out a loan in the victim's name. Government documents fraud: - They may get a driver's license or official ID card issued in the victim's name but with their picture. - They may use the victim's name and Social Security number to get government benefits. - They may file a fraudulent tax return using the victim's information. - They may get a job using the victim's Social Security number. - They may rent a house or get medical services using the victim's name. - They may give the victim's personal information to police during an arrest. When they fail to show up for their court date, a warrant for arrest may be issued in the victim's name. Investigations and prosecutions Edit Identity theft is defined broadly, and it is directly involved in a number of other crimes and frauds. As a result, there are practical investigative implications that influence analysts’ abilities to understand the true extent of identity theft in the United States. For instance, only a proportion (the exact number of which is unknown) of identity theft incidents are reported to law enforcement. While some instances may be reported to consumer protection agencies (e.g., the FTC), credit reporting agencies (e.g., Equifax, Experian, and Trans Union), and law enforcement agencies, some instances may be reported to only one. For example, the FTC indicates that of the 82% of identity theft complaints that included information on whether the theft was reported to law enforcement, 35% were reported to law enforcement. Another issue that may affect analysts’ abilities to evaluate the true extent of identity theft is that law enforcement agencies may not uniformly report identity theft because crime incident reporting forms may not necessarily contain specific categories for identity theft. In addition, there may not be standard procedures for recording the identity theft component of the criminal violations of primary concern. Issues such as these may lead to discrepancies between data available on identity theft reported by consumers, identity theft reported by state and local law enforcement, and identity theft investigated and prosecuted by federal law enforcement. Various federal agencies are involved in investigating identity theft, including the Federal Bureau of Investigation (FBI), the United States Secret Service (USSS), the United States Postal Inspection Service (USPIS), the Social Security Administration Office of the Inspector General (SSA OIG), and the U.S. Immigration and Customs Enforcement (ICE). In addition, federal law enforcement agencies may work on task forces with state and local law enforcement as well as with international authorities to bring identity thieves to justice. The Department of Justice (DOJ) is responsible for prosecuting federal identity theft cases. Impact of identity theft Edit According to the Federal Trade Commission, identity theft is the most common complaint from consumers in all 50 states, and accounts for over 35% of the total number of complaints the Identity Theft Data Clearinghouse received for calendar years 2004, 2005, and 2006. In calendar year 2006, of the 674,354 complaints received, 246,035 or 36% were identity theft complaints. With continued media reports of data security breaches, concerns about new cases of identity theft are widespread. Victims of identity theft may incur damaged credit records, unauthorized charges on credit cards, and unauthorized withdrawals from bank accounts. Sometimes, victims must change their telephone numbers or even their social security numbers. Victims may also need to change addresses that were falsified by the impostor. With media reports of information security breaches increasing, concerns about new cases of widespread identity theft have received significant attention in Congress. A survey by the Federal Trade Commission states that victims of identity theft can spend up to 130 hours reconstructing their identities (e.g., credit rating, bank accounts, reputation, etc.) following an identity crime. In 2007, identity theft alone cost businesses over $40 billion. The average data breach today will cost businesses $192 per-incident. According to a Ponemon Institute study, almost 33% of customers surveyed stated that they would cut ties with a company that had a data breach. Public disclosures of identity thefts have heightened interest in the security of sensitive personal information; security of computer systems; applicability of federal laws to the protection of sensitive personal information; adequacy of enforcement tools available to law enforcement officials and federal regulators; business and regulation of data brokers; liability of retailers, credit card issuers, payment processors, banks, and furnishers of credit reports for costs arising from data breaches; remedies available to individuals whose personal information was accessed without authorization; prosecution of identity theft crimes related to data breaches; and criminal liability of persons responsible for unauthorized access to computer systems. Federal legislative activities Edit Congress continues to debate the federal government’s role in (1) preventing identity theft and its related crimes, (2) mitigating the potential effects of identity theft after it occurs, and (3) providing the most effective tools to investigate and prosecute identity thieves. With respect to preventing identity theft, one issue concerning policymakers is the prevalence of personally identifiable information — and in particular, the prevalence of social security numbers (SSNs) — in both the private and public sectors. One policy option to reduce their prevalence may involve restricting the use of SSNs on government-issued documents such as Medicare identification cards. Another option could entail providing federal agencies with increased regulatory authority to curb the prevalence of SSN use in the private sector. In debating policies to mitigate the effects of identity theft, one option Congress may consider is whether to strengthen data breach notification requirements. Such requirements could affect the notification of relevant law enforcement authorities as well as any individuals whose personally identifiable information may be at risk from the breach. In April 2007, the President’s Identity Theft Task Force issued a report titled Combating Identity Theft: A Strategic Plan, which contained recommendations to combat identity theft, including specific legislative recommendations to close identity theft-related gaps in the federal criminal statutes. In a further attempt to curb identity theft, Congress directed the FTC to issue an Identity Theft Red Flags Rule (effective June 1, 2010), requiring that creditors and financial institutions with specified account types develop and institute written identity theft prevention programs. Several laws restricting the disclosure of consumer information and require companies to ensure the security and integrity of the data in certain contexts have been enacted at the federal level, including: - Section 5 of the FTC Act - Fair Credit Reporting Act of 1970 (FCRA), and - Gramm-Leach-Bliley Act Privacy and Safeguards Rules - Health Insurance Portability and Accountability Act Privacy and Security Rules (HIPPA) Congress also has passed several laws specifically related to identity theft: - Identity Theft and Assumption Deterrence Act of 1998 - Fair and Accurate Credit Transactions Act of 2003 (FACT); and - Identity Theft Penalty Enhancement Act of 2004. - ↑ Bill S-4, An Act to amend the Criminal Code (identity theft and related misconduct). - ↑ Information Security: Agency Responses to Breaches of Personally Identifiable Information Need to Be More Consistent, at 1 n.2. - ↑ 18 U.S.C. §1028(a)(7). - ↑ According to the CFR definitional section for the Fair Credit Reporting Act (16 C.F.R. §603.2), "[t]he term 'identifying information' means any name or number that may be used, alone or in conjunction with any other information, to identify a specific person, including any—(1) Name, social security number, date of birth, official State or government issued driver’s license or identification number, alien registration number, government passport number, employer or taxpayer identification number; (2) Unique biometric data, such as fingerprint, voice print, retina or iris image, or other unique physical representation; (3) Unique electronic identification number, address, or routing code; or (4) Telecommunication identifying information or access device (as defined in 18 U.S.C. §1029(e))." - ↑ 69 Fed. Reg. 63933 (Nov. 3, 2004). - ↑ OECD, Online Identity Theft (2009) (full-text). - ↑ U.N. Intergovernmental Expert Group, "Fraud and the Criminal Misuse and Falsification of Identity" (2007). - ↑ Home Office Identity Fraud Steering Committee (2006). - ↑ Identity Fraud Protection, Hearings on Identity Theft Before the Subcomm. on Technology, Terrorism, and Gov't Info., 105th Cong. (May 20, 1998). - ↑ Javelin Strategy & Research, "Latest Javelin Research Shows Identity Fraud Increased 22 Percent, Affecting Nearly Ten Million Americans: But Consumer Costs Fell Sharply by 31 Percent" (Feb. 9, 2009) (). - ↑ Federal Trade Commission, 2006 Identity Theft Survey Report (Nov. 2007) (full-text). - ↑ As referenced in Nikki Swartz, "Will Red Flags Detour ID Theft?" 43 Infor. Mgmt. J., Jan/Feb 2009, at 38-41. In addition to the costs incurred by consumers, identity theft presents cost burdens to the financial services industry as well. - ↑ See Javelin Strategy & Research, 2010 Identity Fraud Survey Report 7 (Feb. 2010). - ↑ "Identity theft" and "identity fraud" are terms that are often used interchangeably. Identity fraud is the umbrella term that refers to a number of crimes involving the use of false identification — though not necessarily a means of identification belonging to another person. Identity fraud became a federal crime through the False Identification Crime Control Act of 1982 (Pub. L. No. 97-398), and it is codified at 18 U.S.C. §1028. Identity theft is the specific form of identity fraud that involves using the personally identifiable information of someone else. Both identity fraud and identity theft are crimes often committed in connection with other violations, as mentioned above. Identity theft, however, may involve an added element of victimization, as this form of fraud may directly affect the life of the victim whose identity was stolen in addition to defrauding third parties (such as the government, employers, consumers, financial institutions, and health care and insurance providers, just to name a few). This report, however, maintains a focus on identity theft rather than the broader term of identity fraud. - ↑ Identity Fraud: Prevalence and Links to Alien Illegal Activities, at 10. - ↑ Personal information can include name, SSN, account number, password, or other information linked to an individual. - ↑ Graeme Newman & Megan McNally, "Identity Theft Literature Review," National Criminal Justice Reference Service (NCJRS), at v (2005) (full-text). - ↑ Statistics are available on the proportion of cyber-related crimes committed by perpetrators from various countries. However, only a proportion of those crimes are identity theft crimes, and analysts therefore cannot reliably extrapolate the proportion of identity theft crimes committed by domestic and international criminals. - ↑ Federal Bureau of Investigation, Financial Crimes Report to the Public, Fiscal Year 2006 (full-text). - ↑ Federal Trade Commission, "Consumer Sentinel Network Data Book for January-December, 2008 (Feb. 2009) (full-text). - ↑ Graeme R. Newman & Megan M. McNally, “Identity Theft Literature Review,” prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to develop a research agenda to identify the most effective avenues of research that will impact on prevention, harm reduction and enforcement, Contract #2005-TO-008 (Jan. 2005) (full-text). - ↑ The last year for which Identity Theft Victim Complaint Data is available. - ↑ Federal Trade Commission, "Identity Theft Victim Complaint Data" (Feb. 7, 2007) (full-text). - ↑ See Nancy Trejos, "Identity Theft Gets Personal: When a Debit Card Number Is Stolen, America’s New Crime Wave Hits Home," Wash. Post, Jan. 13, 2008, at F01. - ↑ U.S. Department of Justice, Office of the Inspector General, "The Department of Justice’s Efforts to Combat Identity Theft," (Mar. 2010) (full-text). - ↑ Federal Trade Commission, 2006 Identity Theft Survey Report (Nov. 2007).(full-text). - ↑ Javelin Strategy and Research survey (Feb. 2008) - ↑ Ponemon Institute, 2007 Annual Study: Cost of Data Breach (full-text). - ↑ Id. - ↑ BNA Privacy & Security Law Report, "Data Security Legislation Expected to Face Big Challenges," 8 PVLR 51, Jan. 12, 2009. - ↑ See Personal Information: Key Federal Privacy Laws Do Not Require Information Resellers to Safeguard All Sensitive Data, at 56. - ↑ See Federal Laws Related to Identity Theft. - ↑ See Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws. See also Edit - Account takeover - Aggravated identity theft - Data breach - Data breach analysis - Data breach notification laws - Data Security Breaches: Context and Incident Summaries - Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business - Identity fraud - Identity-related crime - Identity-Related Crime: A Threat Assessment - Identity Theft and Assumption Deterrence Act of 1998 - Identity Theft and Pretext Calling - Identity Theft Assistance Center - Identity Theft Data Clearinghouse - Identity Theft Enforcement and Restitution Act of 2008 - Identity Theft Enforcement Interagency Working Group - Identity theft insurance - Identity Theft Penalty Enhancement Act - Identity Theft Resource Center - Identity Theft: Prevalence and Cost Appear to be Growing - Identity Theft: Some Outreach Efforts to Promote Awareness of New Consumer Rights Are Under Way - Identity Theft: Trends and Issues - Information Compromise and the Risk of Identity Theft: Guidance for Your Business - Medical Identity Theft: FAQs for Health Care Providers and Health Plans - New account creation - Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures - Preventing and Responding to Identity Theft - Remedies Available to Victims of Identity Theft - State identity theft laws
<urn:uuid:e5b006a8-37b3-467d-8822-81254421ff5f>
CC-MAIN-2017-26
http://itlaw.wikia.com/wiki/Identity_theft
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320395.62/warc/CC-MAIN-20170625032210-20170625052210-00458.warc.gz
en
0.907475
4,879
2.65625
3
Did you know that there is a direct relationship between psycho-social competency and academic achievement? - “In tests with 1,011 children, those who showed an aptitude for reading feelings non-verbally were among the most popular in their schools and the most emotionally stable. They also did better in school, even though, on average, their IQ’s were not higher than those (less skilled at reading non-verbal messages.)” —Goleman, 1995 - “School interventions that increase social and emotional competence result in higher achievement levels, although the reverse is not true ( i.e., academic enrichment does not increase social responsibility.)” —Coie & Krebheil, 1984 - “SEL improves students’ positive behaviour and reduces negative behaviour. It promotes young people’s academic success, health and well-being at the same time that it prevents a variety of problems, such as drug and alcohol abuse, violence, truancy, and bullying.” —Durlak, Weisberg, Dyminiki, Taylor & Schellinger, 2008 Social-Emotional Learning (SEL) makes a big difference! SEL is one important part of Life Skills. Set For Life is a life skills curriculum that prepares secondary students for present and future challenges. The curriculum covers age-appropriate topics in an interactive, engaging format. For further information about the Set For Life curriculum or for pricing inquiries, please contact Mr Graham Brown, email@example.com.
<urn:uuid:1eee6546-3b65-47a3-8cea-2286c5501e96>
CC-MAIN-2017-26
http://www.e-quipped.com.au/products/life-skills-package/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320593.91/warc/CC-MAIN-20170625221343-20170626001343-00538.warc.gz
en
0.941866
317
3.703125
4
Any parent or teenager not thinking very hard about this list is putting themselves at a severe disadvantage. And a lot of the jobs will surprise you. Being a waiter at a restaurant is remarkably resilient because the robots required to move around quickly, juggle lots of food, make quick adjustments, read peoples’ temperaments, attitudes, etc., and adjust accordingly—those are not skills that will come cheap to restaurants any time soon. But few people are making much money being a waiter, so it’s not necessarily a job to look forward to as someone in high school, or as a parent of someone in high school. Same with being a low-end medical person, like taking care of the sick and elderly. That’s not easy to replace with automation, and we’re going to need LOTS of these people, but it also won’t pay much money at all, or command much respect. Then there are tons of jobs that command lots of respect, but that are based on pattern recognition, like Radiologists, and Stock Traders, and Investment Bankers. Looking at radiology films, images of potential skin cancer, etc., are skills that took 10-15 years to master in the past, and hundreds of thousands of dollars in schooling to qualify for. So people who could do it made lots of money. But now they’re being beaten at their game by algorithms. There are numerous examples now of algorithms finding issues in radiology films, identifying cancer, making better stock trades, etc., than the best humans in the world. Importantly, when you improve an algorithm, you just copy it over and it works for whoever’s using it. You can give it to one or 1,000,000 people simultaneously, because it’s just technology. High-end humans are hard to create and hard to replicate. It takes a lifetime, tons of money, and lots of luck. The tech is going to win that race, and it already is. And that’s with them entering the game just a few years ago. If you want to stay employable, and highly valued, you should be thinking about what is hard for AI and/or robots to do. This won’t keep you safe for decades, but it might protect you for the next 10-20 years at least. After that, it’s hard to say what won’t be vulnerable to automation. If you care about someone’s future, make sure they understand this issue. Don’t let people you care about chase money right into a brick wall built by smart robots. - The referenced piece can be found here.
<urn:uuid:f958131e-075e-45c8-bd05-859782fe773b>
CC-MAIN-2017-26
https://danielmiessler.com/blog/jobs-vulnerable-automation/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320593.91/warc/CC-MAIN-20170625221343-20170626001343-00538.warc.gz
en
0.959457
556
2.546875
3
(in Russian, biotoplivo), various organic materials which give off heat during the process of decomposition and are used to warm hothouses, hotbeds, and heated soil. Manure (horse, cow, sheep, and hog), domestic garbage, bark (taken from a tree), sawdust, flax tow, waste from the textile industry, dry wood sheets, and undecomposed peat are used as biological fuels. When laid with average density, the volumetric mass (in tons per cu m) is 0.35–0.45 for horse and sheep manure; 0.40–0.50 for cow manure, 0.70–0.75 for domestic garbage, and 0.40–0.45 for bark. In the late autumn biological fuel is put in stacks for storage (separated by types), strongly tamped and heated by culmiferous manure. During storage the temperature in the biological fuel is maintained at from 0° C to 10° C. For two or three weeks before use the biological fuel is broken up (loosened). In order to accelerate initial burning, damp and dense biological fuel is mixed with dry and loose fuel. If the fuel does not begin burning within one week, artificial ignition is resorted to (laying in hotbeds of burning biological fuel or unslaked lime, putting hot stones in, and so on). For one cu m of area in hothouses and heated soil, 0.25–0.4 cu m of biological fuel is required; whereas for one frame in the hotbeds, 0.6–1.5 cu m is required. V. A. BRYZGALOV
<urn:uuid:7f174e54-7597-4c22-a504-b05fa9dc19c3>
CC-MAIN-2017-26
http://encyclopedia2.thefreedictionary.com/Biological+Fuel
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320841.35/warc/CC-MAIN-20170626170406-20170626190406-00618.warc.gz
en
0.920377
350
2.9375
3
By: Tim Parmenter(Author), Clive Byers(Illustrator) 144 pages, 23 colour plates [by Clive Byers], 52 distribution maps A comprehensive field guide to all the warbler species of Europe, the Near East and Northern Asia. Each species is described in detail, with extensive information on plumage differences between sexes, through ageing, and in different seasons, plus complete descriptions of calls and songs. The colour plates illustrate every species, in a variety of plumages; the plates are arranged for quick comparison between similar species, with important field notes listed in the annotations. Frequently confused species are compared side by side. Accompanying the plates are highly detailed maps showing seasonal distribution, and annotated with a detailed description of the occurrence of the species, including records of vagrants outside its normal range. There are currently no reviews for this product. Be the first to review this product! Your orders support book donation projects We find their customer service to be excellent Search and browse over 110,000 wildlife and science products Multi-currency. Secure worldwide shipping Wildlife, science and conservation since 1985
<urn:uuid:f08928d6-5ca8-42fb-9525-f36977890147>
CC-MAIN-2017-26
http://www.nhbs.com/title/16976?title=a-guide-to-the-warblers-of-the-western-palearctic
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320841.35/warc/CC-MAIN-20170626170406-20170626190406-00618.warc.gz
en
0.910178
232
2.640625
3
Hola a todos! Here is a fun little flipbook that reviews the basic vocab for vegetables in Spanish. Print these in landscape format and on pretty bright paper to make it more fun! Ask the students to first cut along the dotted lines before folding or writing (the first time I did this with my Kindergarteners, they folded the paper and then cut through both sides of the flipbook haha). Then the students fold along the middle of the paper and write their name. Next, the students will write the spanish word inside the flip of each picture (potato=papa, cucumber=pepino, corn=maíz, onion=cebolla, broccoli=brócoli, carrot=zanahoria, lettuce=lechuga, peas=guisantes). They can color the pictures once it is completed and can be kept in their desks until the food unit is completed :) For an extension activity, students can write a sentence(s) (I do not like ____ = No me gusta _____).
<urn:uuid:784021fd-e57b-44db-a3e9-d2f735a00494>
CC-MAIN-2017-26
https://www.teacherspayteachers.com/Product/Vegetables-Spanish-Flipbook-3182880
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320841.35/warc/CC-MAIN-20170626170406-20170626190406-00618.warc.gz
en
0.876883
224
3.5
4
A Viral Factor Speeds thing up Image by DavidErickson via FlickrMost of the principles of Internet advertising are the same as other media. One of the primary differences is that Internet advertising has a strong viral factor to it. In regular advertising, we call this factor word of mouth. The viral factor is a free form of advertising where people pass your information on to others. The Internet was created to make it easy to pass information from one person to another. This attribute of the Internet amplifies the viral factor and greatly increases its results. This also affects the speed at which the message travels. The Speed at which your message is passed on is also one of the big differences. Another difference is that the Internet offers many "free venues" for putting the word out on your product or service. Some example offered on the Internet includes your ability to leave comments and web links on articles sites and blogs, (these become back links to your website). You can also collaborate with other who have a similar customer base by swapping website links, (these are call link exchanges, another type of back link). You can even produce short videos and post them on YouTube as a form of free advertising. By adding your website links and contact information, you create even another type of back link to your primary web presence. Image via WikipediaThen you have social networking. In many ways, social sites are "word of mouth" manifested electronically. This venue is all about connecting, sharing, entertaining, and having fun. Social networks are built on trust. If a trust relationship is not established, then no positive transactions take place. However, this does not mean that negative information will not be shared. On the contrary, if you make a customer mad today, their ability to bad mouth, your product or service is amplified and spread at the speed of light. People join social networks primarily to connect with others, share interesting and entertaining information. Your ability to build a trusting relationship with them is based on how well you are fulfilling their needs. If you do a great job, they will refer you to their friends. If you try to "hard sell" them, they will disconnect you from their "friends" lists, and you will lose a customer. Pay Nothing or Pay and Expert Image by Intersection Consulting via FlickrToday, a person who has learned how to take advantage of this medium doesn't have to pay anything for Internet advertising. They just have to invest their time by creating back links, entering comments, and posting useful content. Unfortunately, most of us don't have unlimited amounts of time to do this. Instead, we swap money for time and pay others to take care of the "free" advertising medium we have access too. The good news is that with some background checks and a little research you can find people who are honest and will do a great job. For many business owners, this is a trade worth making so they can spend more time with their families. There you have it, my reply to the questions; what's the difference between conventional advertising and Internet advertising? Obviously, there are other differences I left out just because of time restraints. There are many books written about these differences. If social media marketing is high on your advertising priority list, go to the library and check out few books on this subject and read them. In the meantime, follow these suggestions and keep on learning, it's your best defense for staying ahead in the 21 century. That's my opinion. I welcome your. Hector Cisneros has been an entrepreneur for 25 year, a veteran of BNI for 18 years, and was a BNI director for over 5 years. He is still an active BNI member and follows the philosophy of Givers Gain. He is the owner of several Businesses in Jacksonville, Florida. He actively coaches business owners in the fine art of internet advertising, Networking and Word of Mouth marketing. He is the president of Website Know How, Inc. a holding company for his business ventures that include online advertising, word of mouth marketing, real estate holdings, books sales, health and wellness product sales and Adventure sports. He is also a partner in a new company called Successful Campaigns LLC. That provides training and support for non profits organizations. To learn more about Social Media Marketing, Internet Advertising and Word of Mouth Marketing explore The Networkers Apprentice workshop or visit us at http://www.Websiteknowhow.com or http://www.60secondstosuccess.com. Friend on Face book by clicking here.
<urn:uuid:ad1ec3ee-eca1-4193-b8ec-963756624ed3>
CC-MAIN-2017-26
http://networkersapprentice.blogspot.com/2011/08/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323588.51/warc/CC-MAIN-20170628083538-20170628103538-00058.warc.gz
en
0.965651
920
2.515625
3
|Title||The climate learning ladder. A pragmatic procedure to support climate adaptation| |Publication Type||Journal Article| |Year of Publication||2010| |Authors||Tabara J.D., Dai X., Jia G., Mcevoy D., Neufeldt H., Serra A., Werners S., West J.J.| |Journal||Environmental Policy and Governance| |Keywords||climate change adaptation, reflexive learning, social learning, sustainable learning| To identify learning processes that support climate adaptation In this article, the “climate learning ladder” (CLL) is presented as an analytical and reflective tool for critical decision-making in climate adaptation. This tool was developed through the process of developing innovative appraisal methods for climate adaptation in two distinct social-ecological contexts. The article contends that climate adaptation is beyond simply presenting ‘more knowledge’ to policymakers. Instead, a multi-step learning process is presented i.e. the CLL. The first step refers to perceptions, frames and awareness; step two identifies incentives, sanctions and motives; step three considers individual adaptation options and resources for transformation and collaboration; and step four looks at institutionalising new rights, responsibilities and feedback. It is recognised that the “ladder” is not one way, and that unlearning can also occur. The “learning ladder” is a pragmatic approach to climate adaptation that is relevant at individual, organisational and institutional levels. It can therefore be used to support learning processes and interactions with various agents. It is a conceptual model and, as with all conceptual models, the real test is in implementation. However, this article explains how the tool was developed as part of a climate adaptation appraisal project, and tested in the later stages of that same project. It therefore provides some practical insights where strengths and weaknesses are discussed and opportunities for improvement are proposed. As an operational heuristic tool, the authors believe that it may harbour practical use for those seeking to develop learning processes in climate adaptation.
<urn:uuid:946be659-5f5a-48ca-976b-52b09a024a5f>
CC-MAIN-2017-26
http://coastalcluster.org.au/node/219
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323864.76/warc/CC-MAIN-20170629033356-20170629053356-00138.warc.gz
en
0.91181
420
2.515625
3
To study that topic, we must go back to a time when bullets were cast round lead balls. The bore or gauge was determined from the weight of a solid ball of lead that could fit into the barrel. For instance, if a spherical ball weighing 1/10th of a pound could fit into the barrel, then the gun was considered to be 10 bore (or 10 gauge). If a ball weighing 1/12th of a pound could fit into the barrel, then it was 12 bore (or 12 gauge) and so on. Conversely, if you had 1 pound of lead available, you could cast 12 bullets for a 12 bore (or 12 gauge) gun and 10 bullets for a 10 bore (or 10 gauge) gun and so on. Even though bullets were no longer spherical shaped, this unit continued to be used into the 19th century to denote the barrel diameter, assuming that a spherical ball of lead was used. As you might have gathered from the paragraph above, the smaller the bore number, the larger the diameter of the barrel. Therefore, a 4 bore gun would have a large diameter, since 1 pound of lead would only make 4 solid spherical bullets for this gun. As you might have guessed, 4 bore guns were called "Elephant Guns" and used to shoot large animals like elephants, buffaloes and rhinos. In the picture above, we have 3 cartridges, left to right: a .30-06, an eight bore and a four bore cartridge. Note that the .30-06 is the cartridge used by the M1 Garand rifle and measures 7.62 x 63 mm. This gives the reader an idea of the size of one of these large bore bullets. By the way, the four bore wasn't the largest elephant gun around. There was also the two bore. The two bore was only used by very few men because of its immense recoil and weight. The above picture shows a .700 Nitro express bullet and cartridge case versus a 2 bore bullet and cartridge case. The diameter of a 2 bore is 33.68 mm and the bullet weighs over 225 grams! The famous British explorer, Sir Samuel White Baker, owned one such weapon and he was afraid to fire it. In his own words: The two bore was the largest rifle that could be fired from the shoulder. There are still larger calibers though. One of these examples is the 1 bore or punt gun, which was designed to be fired from a boat. We will discuss punt guns in a future post.
<urn:uuid:dd4491f9-76ee-4af0-989e-2718fd2a47f8>
CC-MAIN-2017-26
http://firearmshistory.blogspot.co.uk/2010/12/what-is-boregauge-of-weapon.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323864.76/warc/CC-MAIN-20170629033356-20170629053356-00138.warc.gz
en
0.977326
513
3.65625
4
Happy 'Leap Day!' Read about the tradition of marriage proposal on Leap Day below... Then, identify a tradition in your life that has been unhealthy for your spiritual growth. *Share thoughts on Comments. "According to an old Irish legend, or possibly history, St Bridget struck a deal with St Patrick to allow women to propose to men – and not just the other way around – every 4 years. This is believed to have been introduced to balance the traditional roles of men and women in a similar way to how Leap Day balances the calendar. In some places, Leap Day has been known as “Bachelors’ Day” for the same reason. A man was expected to pay a penalty, such as a gown or money, if he refused a marriage proposal from a woman on Leap Day. In many European countries, especially in the upper classes of society, tradition dictates that any man who refuses a woman's proposal on February 29 has to buy her 12 pairs of gloves. The intention is that the woman can wear the gloves to hide the embarrassment of not having an engagement ring. During the middle ages there were laws governing this tradition." (www.timeanddate.com)
<urn:uuid:1aba00f8-20be-447b-ba09-f194d97a5168>
CC-MAIN-2017-26
http://www.crossfitfaith.com/2012/02/spiritual-wod-2292012_5152.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323864.76/warc/CC-MAIN-20170629033356-20170629053356-00138.warc.gz
en
0.963022
245
2.890625
3
Expanding the availability and the accessibility of space science data is becoming a priority that is increasingly stressed by several organizations and is fully recognized by the United Nations. Among the tools required by the 2030 Agenda for Sustainable Development the ones offered by space science and related technology could act as both enablers and catalysts for the efforts with regard to progressing towards internationally agreed development goals for sustainable development. In 2014 the Independent Expert Advisory Group (IEAG) on Data Revolution for Sustainable Development placed great emphasis on the urgency on designing user-centered and user-friendly interfaces. We are indeed at a critical juncture in the history of humankind, since computing power, data storage and interconnectivity have become nearly limitless resources potentially available to billions of people in the world at the same time through larger and smaller devices. Furthermore, the open source space science data are acquired through projects funded with public money, nurturing the idea that participation by the users’ community should be as wide as possible, albeit in the next few years further efforts will be necessary to consolidate, standardize and expand services, promoting a significant inspirational data-driven surge in training, education and discovery. Fig. 1: Active galaxy MKN 421 analyzed by means of a single instrument (left) operating in the optical band and by joining all the data acquired over the entire electromagnetic spectrum and over the years (right). The amount of information is undoubtedly much greater and richer in the second case. In this context “Open Universe” is a initiative proposed by Italy and approved by the United Nations Committee On the Peaceful Uses of Outer Space (COPUOS) in June 2016 at its 59th meeting in Vienna. The main objective of “Open Universe” is to stimulate a dramatic increase in the usability of space science data, extending the potential of scientific discovery to new participants in all parts of the world and empowering global educational services. These objectives will be pursued by means of several interrelated tasks, such as: - Promoting the robust provision and permanent preservation of science-ready data - Advancing calibration quality and statistical integrity - Fostering the development of new centralized services to exploit the capabilities of the modern internet through new web-ready data - Increasing web transparency to space science data - Advocating the need for current and future projects to recognize the essential equality of hardware and software and incorporate centralized high-specification end-to-end analytics into cost envelopes - Promoting active engagement of the Committee on the Peaceful Uses of Outer Space and other relevant national and international organizations towards tangible actions in the domain By accomplishing these tasks space science data will gradually become more “transparent” to the citizens, that is openly available and usable by the widest possible community, from professional space scientists (several thousands of individuals) to citizen scientists (of the order of millions) to the common citizens generally interested in space science (potentially hundreds of millions). Fig. 2: The development of space data archives and the amount of people to which knowledge is available. In the future the entire world population could easily access to data. The level of services delivered by the current generation of space science data archives is very heterogeneous, ranging from basic services restricted to groups of authorized researchers, to open access web-based services offering “science-ready” products. These are high-level calibrated data that can be used in a publication without further analysis by scientists with suitable knowledge. “Open Universe” will implement a method of measuring the transparency of the products available from space science data archives, and urge the data producers to increase their efforts so as to extend the usability of space science data to the non-professional community. The extra cost of reaching the level of adequate transparency (“web-ready” data products) is a very small fraction (less than 1%) of the funding level necessary to produce and archive space science data. The benefits of such a cultural step are potentially enormous. The first public event within the “Open Universe” Initiative is a workshop to be held on 10-12 April 2017 at the ASI HQ in Rome, co-organized by the Italian Space Agency (ASI) and the United Nations Office of Outer Space Affairs (UNOOSA), to bring together the various components of the community potentially interested in space science data. Further information available here: We use Slack for all our real-time community communication. You can request membership to the OpenPlanetary Slack team here. Alternatively, you can leave a comment below for a more public discussion.
<urn:uuid:8c7f50e4-31fc-43cd-92bb-5d6f187e2cd2>
CC-MAIN-2017-26
http://openplanetary.co/blog/community/openuniverse.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319902.52/warc/CC-MAIN-20170622201826-20170622221826-00497.warc.gz
en
0.923226
931
2.75
3
Corvette logo meaning and history The first version of the Corvette logo was created by Robert Bartholomew shortly before the car itself was introduced in 1953. The Corvette symbol consisted of two crossing poles, with two flags (a checkered flag and the US flag). Yet, less than a week before the car appeared at the GM Motorama auto show, it was actually changed as the company’s management found out that it was against the law to use the US flag. The restyled badge featured a fleur-de-lis, the white racing flag, and the company’s signature bow tie. However, this was nothing but a temporary solution, and shortly before the car went into mass production, a new logo Corvette was introduced. In the 1962 version the “Chevrolet Corvette” inscription was gone, and the flags spread a bit out of their circular frame. The version introduced ten years later had no circle frame, while the flags spread apart even further. In 1984 the circle was brought back, but the poles and the fleur-de-lis disappeared. In 1997, however, these two elements returned, while the circle transformed into an oval. The sixth-generation Corvette symbol One more version of the Corvette logo appeared in 2005, with the sixth generation of the car. The poles of the iconic flags were colored in the same colors as the flags themselves. The circular frame was removed once more. The seventh-generation Corvette emblems The C7, which was introduced at the beginning of 2013, underwent so many changes that the company claimed there were actually only two things taken from the previous version: the cabin air filter and the top latch. The Corvette emblems were also revised. The new version looks more angular and swept. In this way the logo Corvette designers created reflects the changes introduced into the seventh-generation Corvette itself. One more reason for the change in proportions is that they also help to convey the idea of speed.
<urn:uuid:53b2839b-8f19-415e-bf82-b55b7597e3f2>
CC-MAIN-2017-26
https://listcarbrands.com/corvette-logo/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319902.52/warc/CC-MAIN-20170622201826-20170622221826-00497.warc.gz
en
0.973478
404
2.84375
3
Could save time, money, and preserve valuable tissue An NIBIB-funded researcher has developed a new technique that creates digital pictures of a tissue’s chemical composition using light and a computer. The technique replaces the need for dyes or stains, which can be costly and require significant time and effort to apply. Dyes and stains have been used for well over a hundred years in medicine and biomedical research to highlight the architecture of tissues under a microscope. While some dyes and stains highlight broad areas within a cell, such as those with positive or negative charges, others highlight specific entities such as collagen or distinct cell types such as neurons. In the past several decades, even more precise “molecular stains” have been developed that reveal the presence of different proteins within a cell. Pathologists use dyes and stains to ascertain critical information about tissue samples taken from a biopsy. This information can be used to diagnose disease and to inform prognoses and treatment strategies. Often pathologists need to use multiple stains to fully characterize a tissue sample. For example, certain stains are used to reveal the types of cells present in a tumor biopsy, whether they are normal or abnormal, and their arrangement in context to one other. Other stains may be needed to identify specific molecular characteristics that can further aid diagnosis and help determine whether a tumor might be more or less responsive to a particular treatment. Biomedical researchers also rely heavily on dyes and stains when conducting research in animals. Animals provide good models for studying human disease and for developing and testing new treatments. As part of the research process, animal tissues are commonly analyzed under a microscope using a wide variety of dyes and stains. Yet despite its importance in medicine and biomedical research, dyeing and staining tissue is a time-consuming and costly endeavor. One reason is that only a few stains can be used on a tissue section before it becomes damaged or difficult to re-stain. As a result, multiple tissue sections are usually needed in order to carry out multiple stains. This process of obtaining multiple tissue sections, mounting them onto slides, staining, and imaging them, is onerous and can become costly as more stains and supplies are needed. Additionally, obtaining multiple tissue sections is not always feasible when tissue is limited, such as when tissue is taken from a fine needle biopsy. Now, with funding support from NIBIB, Rohit Bhargava, Ph.D., Professor of Bioengineering at the University of Illinois at Urbana-Champaign, has developed a technique that eliminates the need for stains or dyes entirely. The technique uses infrared light to scan a tissue section and measure the unique way that the light is absorbed by different chemical structures present in the tissue, referred to as the structure’s spectral pattern. This spectral information is then run through a computer, which uses pattern recognition algorithms to translate it into chemical “stain” patterns. The end result is a digital image that looks nearly identical to a traditionally stained piece of tissue. Bhargava published the technique in the March 2015 issue of the journal Technology. Because the technique has no physical effect on the tissue, there’s no limit to the number of different computer-generated “stains” that can be created and superimposed onto each other. “With this technique, you could visualize a large spectrum of different stains on a single tissue section,” said Bhargava. “You could probe an entire tumor microenvironment in one scan, for example.” Such capabilities could greatly reduce the amount of effort and cost that goes into staining multiple tissue sections and even enable exploratory staining, since preserving tissue would no longer be a limitation. Using a computer to generate “stains” could also help make analyzing tissue a more accurate process by reducing much of the between-sample variability that occurs with chemical staining. Bhargava recently validated the new technique by comparing chemically stained and computationally stained tissue taken from 98 patients. “This flexible, fast approach to staining is a prime example of the importance of investing in new light sources, such as those that enable infrared spectroscopy, and in developing better image analysis,” said Richard Conroy, Ph.D., Director of the Division of Applied Science & Technology at NIBIB. “These kinds of technologies, which make processes faster, cheaper, and more accurate, can have profound effects on medicine and biomedical research. They enable us to push the envelope, to ask bigger questions than we could before.” Bhargava says the next steps for the technology are to speed up the process from several hours down to a matter of minutes. This advance was funded by NIH grants from the National Institute of Biomedical Imaging and Bioengineering (EB009745) and the National Cancer Institute (CA138882) and the National Library of Medicine (LM011390). Stain-less staining for computed histopathology. Technology (Singap World Sci). 2015 Mar;3(1):27-31.
<urn:uuid:719e5dbc-ad33-485d-b619-0f46e84758b5>
CC-MAIN-2017-26
https://www.nibib.nih.gov/news-events/newsroom/new-technique-eliminates-need-dyes-and-stains-tissue-analysis
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320070.48/warc/CC-MAIN-20170623151757-20170623171757-00578.warc.gz
en
0.94889
1,043
3.421875
3
There are only 24 hours in a day, but some people are able to achieve more in life without working more. Increase your productivity by using Time Management Training Course from pdtraining in Atlanta. Most of us try to work for more hours to increase our productivity, which damages our health and our personal life. Working more hours for a long period of time may help you to achieve more in the short-term, but it will have negative effects on your health and personal relationships in the long-term. Time management, on the other hand, teaches us to achieve more in the same time that we usually spend on completing tasks. It is the healthy way to increase productivity. Setting the priorities right is the first step to accomplishing tasks that are the most important to you. Even though we all are aware of what we must need in life, when we begin to work, we get distracted by other tasks that also need completion. Listing your priorities brings our focus back on what we need to give time to. 2. Planning versus Procrastination Planning and doing must be balanced. Some people spend more time in planning than in doing, which results in delays. Some others do tasks without planning, which leads to confusion and delay. Planning must be done, but it must not lead to procrastination. An effective method to help you get the right balance in planning and procrastination is to set a deadline for the planning. Give yourself an hour, ten minutes or a day for planning, depending on the importance and the largeness of the task. After the deadline, get down to do it. It will save your time, and will help you to complete tasks smoothly and successfully. For the effective handling of large or multiple projects, organizing becomes essential. Create specific places, physical or virtual, for your files and documents. Make it a habit to keep everything in its place so that you remember where a thing is kept. If you use one folder for keeping your tax bills, and you always put that folder in the top drawer, your brain will immediately recall where a tax bill is kept. It will save much of your time in looking for and sorting out things. Turn organizing into a ritual and you will save time. 4. Reducing Distractions Much of our time is lost in attending to distractions. It is hard to resist temptations; that is why, it is important to keep distractions away so that you are not tempted to give in. Keeping the television off when you are working will help you to concentrate. If you face distractions at the office, you may consider playing meditative music to help you to concentrate. It will assist you in completing the job much faster. Pdtraining delivers 1000’s of professional development courses each year in Atlanta, Baltimore, Boston, Charlotte, Chicago, Dallas, Los Angeles, Manhattan, Miami, Orlando, Philadelphia, and Seattle, so you can be assured your training will be delivered by a qualified and experienced trainer. All public Time Management Training courses include am/pm tea, lunch, printed courseware and a certificate of completion. Customized courses are available upon request, so please contact pdtraining on 855 334 6700 to learn more.
<urn:uuid:dfa6746a-fee6-44f6-8703-7e96e8402a74>
CC-MAIN-2017-26
http://blog.professionaldevelopmenttraining.com/how-to-manage-time-for-greater-productivity/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320257.16/warc/CC-MAIN-20170624101204-20170624121204-00658.warc.gz
en
0.947968
655
2.515625
3
Nearly a year has passed since Pakistan was devastated by floods on an unprecedented scale. The disaster left many scars, but none so surprising as the ghostly ‘spider trees’ along the country’s river banks. In July 2010, Pakistan experienced the equivalent of ten years worth of rain in less than a week. The downpour left several thousand people dead and 21 million refugees. The economic fallout was also disastrous, with tens of thousands of cattle drowned and an estimated seven billion euros of material damage. A study carried out by the American Geophysical Union recently concluded that the disaster could have been limited if the Pakistani authorities had known how to analyse the meteorological indications in the days leading up the disaster. These photos were taken in the Sindh Valley, in south-eastern Pakistan. The waters receded more slowly from Sindh than any of the other zones affected by the floods. "They were just small, harmless spiders, but there were a lot of them" Russell Watkins works for the Department for International Development (DfID), the British governmental department responsible for promoting development and poverty reduction. I took these photos in December 2010. We do not know when this phenomenon first appeared but the residents, who had left the region in August during the floods, discovered these trees on their return in November 2010. They had never seen anything like it before. As the waters rose, the spiders instinctively climbed the trees, bit by bit, to protect themselves. The floods took so long to recede that the spiders ended up colonising whole trees. The spider webs which they wove ended up embalming the branches, creating these strange sights. They were just small, harmless spiders, but there were a lot of them ! "Locals say the spiders reduced the risk of malaria infection" Local residents told us that the spider webs trapped a large quantity of mosquitos, which are especially prevalent in the marshy areas. Although they say they have no scientific verification, they believe that the risk of malaria infection has decreased as a result. Some of my colleagues have recently been back to these sites. They noticed that the spider webs are beginning to disappear as the waters recede and the rains start. But most trees were asphyxiated by the webs, and did not survive the spider invasion. There are still a million displaced people in the Sindh region. We are working to build homes and deliver food and medical supplies, but it takes time. We are in for the long-haul." Post written with FRANCE 24 journalist Ségolène Malterre.
<urn:uuid:dc4983a9-4207-47cf-b6c7-728e2824c164>
CC-MAIN-2017-26
http://observers.france24.com/en/20110526-spider-trees-ghosts-flooded-pakistan-sindh
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320257.16/warc/CC-MAIN-20170624101204-20170624121204-00658.warc.gz
en
0.979915
533
3.359375
3
I'm busy working on the standards relating to utilitarian objects or functional art. I always try to emphasize the fun in functional art. With that in mind, the 3rd-5th are making clay maracas. We have already done weaving, you can check out the plastic bookmarks here. Last year I did benches click here. And the year before that I did clocks, find it here. I have some plans for chairs and birdhouses in the near future. The very basic directions for the clay maracas are to make two pinch pots, make little clay beads, (must use the word beads and not balls..... gotta love those 4th & 5th grade boys) wrap the beads in paper towels and place inside one of the pinch pots, score and slip edges of both pots and join them together. When students finished, they were instructed to put them on a piece of paper with their name on it, on the back table. I would then write, with the point of a compass, their name and class code. I would also create the hole in the bottom for the air to escape from as they heat up in the kiln. So for anyone curious as to what happens when you don't put that hole in it OR you thought you did but it created a dimple instead, it breaks! This was my first explosion and hopefully my last. I was glad to figure out what went wrong. (I did glue it back together and gave the student the choice to do it again or keep that one.) The above student is in the middle of making an Eiffel Tower. We have a cube and a pumpkin. I really had too many students doing this project for me to have them glaze them and re-fire them. So students first used crayons to color them and watercolor paint to fill in between crayon lines. Basically crayon resist. We have the Titanic and Pokemon. A fox and a cupcake. An owl, a mountain and a ball. There were so many interesting shapes and themes created. I know my students really enjoyed it. If working with clay is new to you I found many wonderful videos online for making pinch pots and clay maracas-SO just Google away and have some fun! I would love to know what lessons you have for teaching functional art! Thanks for reading!!!
<urn:uuid:dc840a91-674b-4ed0-9e13-37d8d33b69a5>
CC-MAIN-2017-26
http://primarilyartwithmrsdepp.blogspot.com/2017/01/clay-maracas.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320443.31/warc/CC-MAIN-20170625064745-20170625084745-00018.warc.gz
en
0.97996
486
2.625
3
A simple record of the geology and the fossils, mineralized bone, bone and stone tools, and minerals excavated from it, and any other item that helps record the history and pre history of the deep beck valleys of the south west area of Cleveland,in the north east of England . Saturday, 20 April 2013 Mesolithic tools and carved bones from the Stainton gravel beds. 1 - I found this worked stone about 3 years ago in Stainton beck, I am certain it was washed from the gravel beds, I believe it was some sort of shaft smoother. 8 - If ime honest I can not remember the beck location I found this piece, at first I paid it little attention, thinking it just to be a worn Equus Metatarsal but I now know it to either have been a tool of some sort or a religious or symbolic artifact. The lighter coloured material is actually preserved wood, that has been inserted into the bone. 11- 14 This piece I found very close to the stone tool in the first images, I found these pieces a long time ago before I had started any excavating, but have never been in any doubt that they were tools of some sort. 15 - 19 Digging tools 20 - 22 Carved bone . 23 - Carved Artefact 23 - Digging tools found at the Orme bronze age copper mines in Wales.
<urn:uuid:bedafbd2-aebc-4286-84ec-db2cd68e18ea>
CC-MAIN-2017-26
http://historyofabeck.blogspot.com/2013/04/temp-post-2_20.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320666.34/warc/CC-MAIN-20170626013946-20170626033946-00098.warc.gz
en
0.954822
286
2.71875
3
You know it is springtime when spring flowering plants burst onto the scene adding a splash of color to a dormant landscape. The most popular spring flowering plants are daffodils, tulips, crocuses and hyacinths. Plant the bulbs outdoors in the fall and reap the rewards of your labor in early spring. The flowering plants provide a lovely fragrance to the warming air and make perfect cut flowers for enjoying indoors as a bright and beautiful spring floral bouquet. One of the most popular perennial flowers associated with spring, the daffodil marks its arrival after remaining dormant for 12 to 14 weeks in temperatures 50 degrees F and below. Among the varieties of daffodils are narcissus and jonquil in colors of white, yellow, salmon and pink. While one flower per stem is typical, some daffodil varieties provide multiple blooms per stem. Growing to stately heights of up to 20 inches, daffodils are easy to cultivate and require little maintenance. They prefer climates that offer cool spring and summer temperatures and cold winters. Daffodils grow best in good draining soil in a spot that gets moderate to full sun. A worldwide symbol of spring, tulips welcome the season after 14 weeks of dormancy in winter temperatures below 50 degrees F. Tulip varieties are extensive, with a wide array of size, color and shape options. Some varieties feature lily-shaped or fringed flowers, while others delight with ruffled or double blooms. Popular tulip colors are red, yellow, pink, maroon, apricot and white. With height ranging from 6 inches to 2 feet, tulips thrive in climates that offer cool springs and summers and cold winters. When planting tulip bulbs, choose an area that is protected from strong winds, has good draining soil and gets moderate to full sun. The crocus is one of the earlier spring flowers to bloom because it only requires four weeks of temperatures below 50 degrees F before its next blooming stage. With their notable cup-shaped flowers, crocuses usher in spring with colors of violet, yellow, blue and white. Since crocuses are low-growing plants, they only reach heights between 3 to 6 inches tall. The easy care flowering plant prefers moderate to full sun and well draining soil. Fragrant hyacinths begin their bloom after being dormant for 12 weeks in winter temperatures of 50 degrees F and below. With its lovely scent and intense color, the hyacinth is a much loved spring flowering plant. The plant grows between 8 and 12 inches tall with single spikes of lush flowers. Color choices include rich dark shades like blue and magenta and pale hues of yellow, orange and white. Hyacinths grow in moderate to full sunlight in well draining soil.
<urn:uuid:84139f06-3082-416b-86f4-42f957ba622a>
CC-MAIN-2017-26
http://www.gardenguides.com/83723-list-spring-flowering-plants.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320666.34/warc/CC-MAIN-20170626013946-20170626033946-00098.warc.gz
en
0.914314
569
2.96875
3
About Half of Tax Returns Report Less than $30,000 October 28, 2013 To understand the distribution of the income tax burden, we must first understand the distribution of tax filers. The median taxpayer earns roughly $33,000. This means that half of the 145 million tax filers (about 72 million or so) earn less than $33,000 and half earn more. While only about 14 percent of taxpayers earn more than $100,000, they pay the vast majority of all income taxes in America today. We should always keep in mind that no two tax returns are alike. While one tax return may represent the wage income of a single individual or head of household, another may represent the income of a two-earner married couple, composed of a mix of sources such as capital gains, dividends, or even the profits from a family-owned business. Failing to account for these differences can give a false impression of inequality in America. For more charts like the one below, see the second edition of our chart book, Putting a Face on America's Tax Returns.
<urn:uuid:9a678159-20f0-4855-91b3-71d12135b8d6>
CC-MAIN-2017-26
https://taxfoundation.org/about-half-tax-returns-report-less-30000/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320666.34/warc/CC-MAIN-20170626013946-20170626033946-00098.warc.gz
en
0.950901
222
3.1875
3
Canadian Light-bellied Brent Goose Branta bernicla hrota The East Canadian High Arctic (ECHA) population of Light-bellied Brent Goose breeds in Canada and winters almost entirely in Ireland, with smaller numbers in Britain, the Channel Islands and the north coasts of France and Spain. It undertakes one of the longest migrations of any Western Palearctic goose population, crossing the Greenland ice-cap, staging at sites in Greenland and Iceland before crossing the North Atlantic to Ireland. Strangford Lough in Northern Ireland hosts over 75% of the population during the late autumn and is now by far the most important site for this species outside the breeding season. - Status summary - Life history - Latest results - Previous results - Key references & links Global status (IUCN Red List of Threatened Species) African-Eurasian Waterbird Agreement (AEWA) European status (European Red List of Birds) The Birds Directive (European Commission) UK status (Birds of Conservation Concern) UK quarry species (Wildlife & Countryside Act 1981) * assessed at species level Branta bernicla Least Concern (Europe and EU27)* Annex II (Part B) Flyway population size (CSR 6; Wetlands International 2015) GB estimate (Musgrove et al. 2011) Irish estimate (Crowe & Holt. 2013) GB trend (SUKB 2016) Breeding success (GSMP survey) Long-term trend (1988/89 – 2013/14): 60% increase Ten-year trend (2003/04 – 2013/14): 37% increase Marked cyclic fluctuation, varying between <1% and 30% Annual estimates of the population size, percentage of young (%) and mean brood size (young per successful pair) of East Canadian High Arctic Light-bellied Brent Goose, 2003/04-2014/15; recorded during the All-Ireland Light-bellied Brent Goose Census. Autumn Estimate of population size Percentage of young (%) Mean brood size 2015 37,192 12.0 2.16 2014 31,985 4.1 2.10 2013 34,734 0.04 0.83 2012 41,465 1.9 2.61 2011 48,002 25.0 2.69 2010 38,708 3.1 3.36 2009 39,399 0.7 2.00 2008 37,996 18.2 3.42 2007 38,993 25.1 3.28 2006 31,882 2.2 2.33 2005 32,088 13.2 3.22 2004 32,923 21.7 3.43 2003 28,714 17.9 2.30 Crowe, O. & C. Holt. 2013. Estimates of waterbird numbers wintering in Ireland, 2006/07-2010/11. Irish Birds 9: 545-552 Musgrove, A.J., G.E. Austin, R.D. Hearn, C.A. Holt, D.A. Stroud & S.R. Wotton. 2011. Overwinter population estimates of British waterbirds. British Birds 104: 364-397. The East Canadian High Arctic population of Light-bellied Brent Goose breeds in the eastern Queen Elizabeth Islands from eastern Melville Island to Devon Island and northern Ellesmere Island. Almost all of these geese winter in Ireland, with much smaller numbers reaching the west coast of Britain, the Channel Islands, and the north coasts of France and Spain. It undertakes one of the longest migrations of any Western Palearctic goose population, crossing the Greenland ice-cap, staging at sites in Greenland and Iceland before crossing the North Atlantic to Ireland. Flyway of the East Canadian High Arctic Light-bellied Brent Goose Strangford Lough in Northern Ireland hosts over 75% of the population during the late autumn and is now by far the most important site. Lough Foyle, on the north coast, has also become increasingly important in recent years as a landfall site. As winter progresses, these geese disperse around the coast of Ireland, favouring sites in the northwest, east, southeast, southwest and west of the country with notably high numbers at Dublin Bay and Wexford Harbour and Slobs. Over 3,000 also disperse thinly along the rocky coastlines of Ireland in the late winter (Robinson et al. 2004). It has been suggested that Light-bellied Brent Geese may have relied almost entirely on Zostera during the winter, before a wasting disease caused almost the entire depletion of Zostera in Ireland during the 1930s. Since then, the diet in estuarine and saltmarsh areas has become more cosmopolitan, including algal foods such as Enteromorpha and Ulva, and saltmarsh plants such as Festuca and Puccinella. Inland feeding was first recorded in Ireland and Iceland during the mid 1970s. Feeding on grasslands has increased steadily since then, especially in east and southeast Ireland, with 25% of the population spending a large proportion of its time foraging on managed grasslands. In a few areas, most notably Wexford Slobs, Dungarvan Harbour and Strangford Lough, Light-bellied Brent Geese feed on cereal crops, both waste in autumn stubbles and spring seed, and waste potatoes. Although these food types remain available in early spring, most birds return to the saltmarshes at this time to exploit fresh growth of more natural foods prior to spring migration (Robinson et al. 2004). Robinson, J.A., K. Colhoun, G.A. Gudmundsson, D. Boertmann, O.J. Merne, M. O’Briain, A.A. Portig, K. Mackie & H. Boyd. 2004. Light-bellied Brent Goose Branta bernicla hrota (East Canadian High Arctic population) in Canada, Ireland, Iceland, France, Greenland, Scotland, Wales, England, the Channel Islands and Spain 1960/61 – 1999/2000. Waterbird Review Series, The Wildfowl & Wetlands Trust/Joint Nature Conservation Committee, Slimbridge. All-Ireland Light Bellied Brent Goose Census A complete census of the ECHA Light Bellied Brent Goose population is undertaken twice a year, one in autumn and one in spring. Counters record the number of geese present and the age structure of flocks. The census is organised by the Irish Brent Goose Research Group. Results from the census are summarised on the ‘Latest results’ tab. Find out more about the All-Ireland Light Bellied Brent Goose Census Results for 2014/15 [added September 2015] A total of 31,985 Light-bellied Brent Geese were counted during a near-simultaneous census in the southern part of the wintering range in early November (UK, Ireland, France and Jersey). The current lack of aerial survey coverage in western Iceland means that an unknown number may have been present there, although the census date has been moved to a later date in order to try and minimise this. The total count, whilst possibly an undercount, continues a recent trend of counts falling within the range of 30–40,000 (Figure 1). Figure 1. Annual census-derived estimates of Canadian Light-bellied Brent Goose population size, 1960-2014. Five-year running mean shown as red line (e.g. mean for 2011 is from population estimates for 2009-2013). The decrease in abundance is supported by the fact that 2014 was another poor breeding season, the third in succession. The population contained an estimated 4.1% young in a sample of almost 14,000 birds aged (Figure 2). The mean brood size was 2.1 young per family unit. Figure 2. The mean percentage of young (blue columns) and mean brood size (red circles) of East Canadian High Arctic Light-bellied Brent Geese, 1996/97-2014/15. Following a period of long-term growth, the Canadian Light-bellied Brent Goose population has shown signs of significant decline over recent years. A peak count of in excess of 48,000 in 2011 was inflated by high productivity (25.0%) in that season, but a series of poor breeding seasons since then (2012–2014 inclusive; mean 2.0%) has undoubtedly contributed to the lower census totals, in the range 30–40,000, during that period. However, the lack of an autumn survey in Iceland will inevitably have also contributed to the observed decline, meaning that these census totals are probably also an underestimate of actual population size. Thus, it is currently difficult to estimate population size for Canadian Light-bellied Brent Geese with any certainty. In an effort to minimise the effect of this reduced census coverage, we delayed the census date from the typical mid-October period to early November, in order to maximise the number of birds that had already migrated to Ireland or further south where surveys could be undertaken. Accordingly, the population was more dispersed than is usual for an autumn census and counts were received from a larger number of sites. Coverage was comprehensive throughout Ireland, western Scotland, Wales, western England, Jersey and northern France. Thank you to Kendrew Colhoun and the Irish Brent Goose Research Group for providing the update, and to all the counters for their continued support. Previous annual results will be archived here. 2012/13 Results (including 2011/12 results) Colour-marking of this population began in 2001 and is overseen by the Irish Brent Goose Research Group. A large number of birds are currently colour-marked with engraved rings on each leg, and this underpins a range of detailed scientific studies also being carried out on this small, but increasing, population. Further details about this work can be found here. Robinson, J.A., K. Colhoun, G.A. Gudmundsson, D. Boertmann, O.J. Merne, M. O’Briain, A.A. Portig, K. Mackie & H. Boyd. 2004. Light-bellied Brent Goose Branta bernicla hrota (East Canadian High Arctic population) in Canada, Ireland, Iceland, France, Greenland, Scotland, Wales, England, the Channel Islands and Spain 1960/61 – 1999/2000. Waterbird Review Series, The Wildfowl & Wetlands Trust/Joint Nature Conservation Committee, Slimbridge. Download Other relevant material
<urn:uuid:525350d5-0192-427c-b116-46f034979092>
CC-MAIN-2017-26
http://monitoring.wwt.org.uk/our-work/goose-swan-monitoring-programme/species-accounts/canadian-light-bellied-brent/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320865.14/warc/CC-MAIN-20170626203042-20170626223042-00178.warc.gz
en
0.903029
2,201
3.15625
3
Politicians in the Channel Island of Sark have agreed to end the island's feudal system of government which has been in place for the past 450 years. Governing body, the Chief Pleas, has approved new reform laws which will lead to the introduction of a 28-member elected chamber. Elections under the new constitution will be held in December. Sark, 80 miles off the south coast, had been governed by a mix of landowners and elected people's deputies. There was pressure on Sark to reform its feudal constitution to comply with the European Human Rights laws and other international obligations. Owners of the island's 40 tenements (divisions of land) currently have an automatic seat in the Chief Pleas, and islanders chose 12 people's deputies. The first new assembly of Chief Pleas will take place in January next year. Deputy Paul Armorgie said: "It's a great relief. We have been trying to achieve this for 10 years and now a line has been drawn. Sark is finally moving from feudalism to democracy." Sark, which is only 3 miles (4.8km) long and 1.5 miles (2.4k) wide, has a resident population of about 600. Its government can directly trace its roots back to Queen Elizabeth I, who once granted the ruling "Seigner" a fief on the tiny Channel Island. The unelected descendents of 40 families brought in to colonise Sark, after the French abandoned it in 1553, have governed life on the island ever since.
<urn:uuid:07fe7f6e-7b4f-449d-b75e-441a25b2eb51>
CC-MAIN-2017-26
http://domsweirdnews.blogspot.com/2008/02/feudalism-ends.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321458.47/warc/CC-MAIN-20170627152510-20170627172510-00258.warc.gz
en
0.96581
316
2.53125
3
In this guide, users will learn what distinguishes each source type and locate primary source material from print, electronic, web-based, governmental, and archival material. This Research Guide includes a "How To" tab, designed to instruct users on what search terms and descriptors to use when searching, as well as print and electronic guides which show how, where, and what to search. Please note: The examples of available print, electronic, and web-based primary sources are just a sampling and by no means exhaustive. We encourage you to visit the "How To" page for instructions on how to blend search terms relative to your research topic with subject headings that will assist you in locating primary sources. - Art work - e.g. painting, sculptures, poems, musical scores, etc. - Artifacts - e.g. periodic clothing, coins, fossils, furniture, etc. - Audio recordings - Court records - Eyewitness accounts - Internet communications - e.g. emails - Legal documents - e.g. birth/death certificates, marriage licenses, etc. - Newspaper articles from period Here are some questions that may help you evaluate primary sources: - What was the situation that prompted the writer to compose the document? - What was the writer's source of information? - What other primary sources might expand, clarify or contradict this document - Literary Criticism - Magazine articles - Peer-reviewed journal articles - Reviews - e.g. book, performance Here are some questions that may help you evaluate secondary sources: - What is the writer's expertise in this field? - What motivated the writer to compose this document? - How is this person evaluated by others who are known to be experts in this field? - What is the argument this writer is making about the topic? - What contradictions do other sources offer? - How credible are they? - How is this book/article evaluated by others in the field? - Is the information current? Please Note: What sources are considered Secondary and Tertiary may depend on your own institution and more specifically, your discipline. Search in fUSIon Instructional Services Librarian Why Reference Sources? - Background information - Important figures - Dates, places, and people - Definitions and key terms Lists of additional sources (articles, books, etc.) Search the Classic Catalog Search the Rice Library Catalog Find books, DVDs, Cds and more
<urn:uuid:08a4f3dd-f0ec-43e6-ac2c-014c2a5cd29d>
CC-MAIN-2017-26
http://usi.libguides.com/content.php?pid=278135
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321458.47/warc/CC-MAIN-20170627152510-20170627172510-00258.warc.gz
en
0.889072
519
4.03125
4
Historic Forts from within Malta are certainly something to behold. You will of course experience a past which takes you back to the way things used to be and in seeing such forts you will also experience Malta in a completely different light. There are of course 6 main forts in Malta and all in fact uniquely positioned and each with its own history. Fort Saint Elmo Fort Saint Elmo is one of Malta’s many fortifications and stands on the seaward shore of Sciberras Peninsula which divides Marsamxett Harbour from Valletta’s Grand Harbour. Before the arrival of Malta’s Knights in 1530, a particular watch tower existed in the vicinity of this point; reinforcing this site was strategically commenced in 1533. The Dragut Raid of 1551 was a time when the Turks sailed unopposed into Marsamxett Harbour and work commenced even further on this project. By the time of a certain Ottoman Siege of Malta in 1565, the fortification had been reinforced and thus extended into a star fort. Fort St. Angelo Another great fort is the Fort of St. Angelo and is most certainly part of Malta’s heritage. Legend has it that this particular fort is on top of a Roman settlement site. As the Knights came onto the Island in circa 1530, Fort St Angelo became the seat of Grand Master of the Order. The Fort played a major role in Malta’s Great Siege in 1565 where it managed to resist a powerful enemy, the Saracen Armada and was eventually was taken over during the 19th century. In recent years Fort St Angelo was granted the Order of the knights of St John the upper part of the fort and of which comprises St Anne’s Chapel and the Magisterial Palace. Fort Rinella & Dwejra Tower As the British played a major role in the majority of these forts yet another one was still to be cultivated. Fort Rinella was built by the British in 1878 and 1886. Fort Rinella was erected during a threat to Malta’s sovereignty by the Italian navy. Rinella had been especially equipped with a huge 100 ton cannon, which is in fact one of the world’s largest cannons. The furthest of such Forts is located in Gozo and is named Dwejra Tower. Fort Madliena & Manoel Fort Madliena in particular was in fact built by the British for defences to the Island on the north east. This fort was used to defend the Victoria Lines which spanned 12kms. Additionally Fort Manoel is one of Malta’s forts you will find on Manoel Island in Marsamxett Harbour. The Fort was constructed by the Knights of Malta between 1723 and 1755 and was built from its own native rock of Manoel Island itself. All in all, these Forts have really commanded a great deal of respect in what they were used for. Each Fort had its own part to play in the history of Malta. About the Author: MaltaHotel.Net provides discounted hotel rates on the Island of Malta and offers 86 hotel choices.
<urn:uuid:825298ca-58f9-4934-8fcb-1a1606c0446d>
CC-MAIN-2017-26
http://www.articlescholar.com/1937/historic-forts-to-visit-in-malta/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321458.47/warc/CC-MAIN-20170627152510-20170627172510-00258.warc.gz
en
0.971377
657
2.609375
3
Let’s face it: technological innovation is attractive. It has solved so many of our problems that people have come to view technology as the key to improving society. The world of policy, big business, investment, and venture capital mirrors (and often leads) this perspective. Tech companies dominate the top 10 of the world’s most innovative companies, according to Boston Consulting Group’s most recent report. More broadly, perhaps part of the appeal of “innovation” is that we implicitly associate it with economic progress, at least since the second half of the 20th century. This modern association of technological innovation with economic progress may help to explain why one obvious solution to climate change remains often forgotten or underrepresented in mainstream conversations: natural solutions to environmental challenges. Nature has solutions that can sustainably balance environmental health and human priorities. In other words, sometimes nature can outperform our best technological innovations. At least 20% of the solution, but only 0.1% of the attention With around 3,000 journalists in attendance, the UN Conference of Parties (COP21) in Paris generated more column inches than any previous COP. And not surprisingly, energy terms and topics received hundreds of times more attention than the land sector, which received just 0.1% of the media coverage. Yet, the land sector can potentially deliver at least 20% of the climate solution — and likely much more. Certainly, within the negotiations, the land sector and especially parts of the forest sector are recognized for the solutions they could contribute to the global climate situation. More than 100 countries mentioned climate mitigation or adaptation from the land use sector in their Intended Nationally Determined Contributions (INDCs) submitted for Paris, and the COP21 agreement explicitly recognizes the role of tropical forest protection, the agriculture sector, and restoration of oceans and coasts. And while more and more companies are recognizing the importance of removing deforestation from their supply chains (which I have written about here and here), that potential hasn’t been translated through to action or the message hasn’t reached capital markets, private enterprises, public policy, and mainstream media. At least, not yet. What needs to happen to provide nature an equal seat at the table? This is about changing the conversation around climate change solutions. Decarbonizing the energy sector is critical and it is encouraging that the renewable energy sector is now attracting some $300 billion of capital each year. But it is insufficient on its own. We can’t get to a 2 or 1.5 degree Celsius stabilization pathway without taking land use more seriously. Indeed, it is the only sector that can switch from being a net source of carbon to a net sink. For us to reach a 2 degree world, we must optimize land use through smart land management decisions. The renewables sector scaled up with a mixture of developments in public policy, business models, technology, and finance. The land sector can scale up too, with this same approach. This also requires changing how we think about land use. Resistance to rethinking land use practices is often based on several beliefs: restoration is “too expensive”, changing land use is “too difficult”, and returns will take “too much time”. But actually, these beliefs are misconceptions. Dozens of cases have disproven our beliefs around changing land use: The Nature Conservancy has been closely involved in such successes from Indonesia to China, Africa, the U.S., and Brazil, where we are also exploring new business models that can be scaled up in the land sector. Progress without delay… or new technology Along the Mississippi, the Conservancy helped to restore critical areas of floodplain and increased carbon storage when a Norwegian renewable energy company purchased marginal production farmlands and forested it with native commercial hardwoods. In California, the Conservancy helped develop the forest carbon offset protocols and successfully advocated for adoption into the state’s cap and trade program. Win-win forest projects like these can be financed not only by carbon credits but also by future sales of lower-impact timber harvest. They also create the opportunity for new investment models in sustainable forestry where carbon is just one value stream among many. In another example, in Brazil’s state of Pará the Conservancy is helping the state government meets its goal of spurring economic growth with net zero deforestation by 2020. We have found that by restoring degraded pasturelands and implementing other agricultural strategies, ranchers in Pará can sustainably graze three cows per hectare, tripling current productivity without expanding their agricultural footprint — thereby avoiding further deforestation. Of course, scaling this up requires substantial funding. Fortunately, sustainable intensification is a profitable investment. Through new investment models that attract private capital, Pará can reasonably boost its beef production by 50% without any new deforestation. This shift from expansion to sustainable intensification holds tremendous environmental benefits: in this one state alone, more than three million hectares of land can be protected or restored, reducing carbon emissions by around one billion tons in 10 years. These are only three of many promising stories of optimizing land use by turning to nature-based solutions while generating an economic return. All of the examples show that successful interventions do not have to wait for new technology, although certainly, technology can help in the land sector as a whole. Examples such as these are investable today, and their economic, social, and environmental benefits can be immediate. The type of innovation we need here is developing more business models such as these and the new financing structures, and policies that would make these practices investable at a much larger scale. The next steps Such a scaling up can only be achieved by mobilizing the full resources of the private sector, mainstream finance, and public policy. The conversation around climate change solutions as a whole has already started to shift, with encouraging results. The New Climate Economy shows how climate solutions are not economically impractical, but rather hold positive economic opportunity. The Carbon Tracker Initiative has successfully reached the investing and financial sector with its carbon and stranded assets argument. The land sector requires a similar turnaround in conversation — and thinking. It’s time to take action on the agreement formed at COP21 in Paris. And we can only meet its goals by tapping further into the land sector. We’ve made outstanding progress in scaling up our energy sector, and we need to apply the same level of vigor and capital to lands. We need to work with governments to design policies that encourage better land management in much the same way that governments incentivized green energy. We need to shape investable and scalable options across the land sector. Most of all, we need to act upon the unique potential that the land sector offers in shaping our global climate — today. Let’s get to work with a little more innovative thinking, rather than purely relying on the next technology fix.
<urn:uuid:06481e1b-af65-415e-a1c9-a04a5d165599>
CC-MAIN-2017-26
http://blog.nature.org/conservancy/2016/02/17/the-forgotten-climate-solution/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323604.1/warc/CC-MAIN-20170628101910-20170628121910-00338.warc.gz
en
0.93975
1,402
2.578125
3
From The Alpha and the Omega - Chapter Four by Jim A. Cornwell, Copyright © 1995, all rights reserved "Abram’s transformation to Abraham - continued as the Dating of the Patriarchal Age" Return to Abram's transformation to Abraham. Dating the Patriarchal Age - Early Bronze Age (3100-2100) a period of Abram and his mystery genealogy. - Middle Bronze Age I (2100-1900 B.C.) would represent the coming of Abraham to Palestine and the Amorites from Syria. - Middle Bronze Age II (1900-1550/1480 B.C.) the descendants of the Amorites, the Hyskos dominated. Isaac-Amram. - Late Bronze Age (1500-1230 B.C.) the Egyptians broke the Hyskos power between 1400 to 1230 B.C. which included the coming of Moses, etc.. - Iron Age Periods were I (1230-925 B.C.), II (925-586 B.C.) and III (538-333 B.C.). The Discoveries at Nuzu, which were excavated between 1925 and 1941, as this ancient site southeast of Nineveh and not far from modern Kirkuk has yielded several thousand documents of first rate importance to the student of the OT. The tablets provide numerous illustrations of the customs which figure in the patriarchal narratives. The Middle Bronze Age (2000-1500 B.C.) is in agreement with the semi-nomadic life of the patriarchs as pictured in the Genesis narratives. In "Patriarchal Age: Myth or History" BAR, March/April 1995 by Kenneth Kitchen cited as factors to conclude that the patriarchs can be dated to the first half of the second millennium B.C., or the Middle Bronze Age. These factors are: - (1) The price of slaves. This argument was about the price of a slave in Genesis 37:28 (specifically Joseph age 17 of 20 shekels of silver as to 1900-1800 B.C.) compared to the 30 shekels in Exodus 21:32 -- 1400-1300 B.C., and 50 shekels of King Menahem 800 B.C. for the Assyrian king Pul (2 Kings 15:20). This is not a good judge since slave prices can vary depending on age and sex of the slave. - (2) Treaties and covenants. Kitchen considered the three patriarchal covenants: Abraham’s covenant with King Abimelech of Gerar (Gen 21:22-32); Isaac’s covenant with the same (Gen 26:26-31); and after the teraphim that Rachel stole from Laban in (Gen. 31:19, 30-35) led to Jacob’s covenant with Laban (Gen 31:43-54) in that their form and structure matches those of the other Near Eastern treaties of the early second millennium B.C. Of the first two, Abraham’s is from the E source, whereas Isaac’s is from the J source, and lack various agreements. Jacob’s and Laban have all the elements. These are still to fragmentary and partial to determine the argument. - (3) Geo-political conditions. For Kitchen only the Middle Bronze Age fits Genesis 14, where Abram defeats a coalition of four kings and armies of Elam, Mesopotamia, Anatolia, and the leader King Chedorlaomer of Elam. Although "No king of Elam" named Kutir/Kudur-Lagamar [the Elamite form of Chedorlaomer] is attested, nor is there the slightest evidence of Elamite political or military engagement in Palestine at any time in history. A slim argument for this occurring before 12th century B.C. In the ninth century B.C., at Qarqar in Syria, an alliance of "twelve kings of the West and the seashore" (Damascus, Hamath, Israel, some Phoenician cities, Arab tribes, and from Egypt) attempted to defeat the mighty Assyrian army of Shalmaneser III (858-824 B.C.). The so-called "Chedorlaomer texts" Babylonian texts probably composed in the seventh and sixth century B.C., tells of four kings (The first Elamite king Kudur-Nahhunte, and the third Tudhula) who attacked and flooded Babylon. Several scholars have tried to see connection between the Chedorlaomer texts and Genesis 14, though such attempts remain speculative. - (4) References to Egypt. Since the Egyptian royal residences was in the eastern Nile delta for most of the period between 2000 and 200 B.C. such that Abram and Sarai in Genesis 12:10-20 and Joseph in Genesis 47 visited the residences. [Emphasis mine: subject a caravan of nomads entering Egypt ca. 1900 B.C. - Trade between Mesopotamia and surrounding countries and the land of the Nile flourished from early times as the patriarchal narratives indicate (Gen. 27:25). Asiatics arriving in Egypt, as Abraham, Isaac and Jacob may have done. From the tomb painting at Beni Hassan (ca. 2000-1900 B.C.). ] - (5) Patriarchal names. A speculative argument. - (6) The social world of the patriarchs. Dealing with the laws of inheritance as to the first born. [Emphasis mine: subject Adoption: Abram with no prospect for children legally adopted his trusted slave, Eliezer as his heir in accordance with prevailing custom, and calls him "son of my house," that is, his heir presumptive (Gen. 15:2). One adoption tablet from ancient Nuzu (ca. 1500-1400 B.C.) also shows the customs of those days.]. Merrill F. Unger in his book "Archaeology and the Old Testament" under Chapter Nine entitled Abram-Abraham and His Age states the following: Page 105-118 "In the NT the name Abraham stands for the representative man of faith (cf. Rom. 4:1-25)." Has the Bible left the date of Abram and or Abraham’s life completely uncertain? On his page 105-107 regarding Abraham in the frame of contemporary history. "Despite the discovery of numerous bodies of inscriptional material which illuminate the patriarchal age, there has, as yet, turned up no decisive evidence to establish a precise link in the lives of the patriarchs with extra-Biblical history. Most believe that Abraham’s migration occurred from 1900 to 1750 B.C., and the patriarchal period between 1750 and 1500 B.C. The Biblical chronology has not been found correct or incorrect." Genesis and Exodus shows Abram left Mesopotamia (Haran) on his way to Palestine an assumed 645 years before the Israelites left Egypt. If the actual patriarchal period consists of 215 years, which is based on Genesis 12:4 Abram was seventy-five years old when he left Haran; and Abraham in Genesis 21:5 "one hundred years old, when his son Isaac was born unto him." Since Isaac was "sixty years old" when Jacob was born (Gen. 25:26) and Jacob was "a hundred and thirty years" old when he stood before the Pharaoh of Egypt (Gen. 47:9), the total is computed by adding 25 years for Abram, to 60 and 130, thus equaling 215 years assumed. - Plus according to Exodus 12:40, 41 the entire Egyptian sojourn lasted 430 years. - The Septuagint reading of Exodus 12:40 "Now the time that the children of Israel dwelt in Egypt and in the land of Canaan was 430 years," allows only 215 years for the Egyptian sojourn. - The Masoretic Text is emphatic in Exodus 12:41 and the round number (or actual period when oppression first began) of 400 years given in Genesis 15:13 and Acts 7:6. - Did the patriarchs spend 215 years in Canaan? - Did the Israelites spend 430 years in Egypt? - Did Abraham enter Canaan 645 years before the Exodus? - In 1 Kings 6:1 it places the Exodus 480 years before the fourth year of Solomon’s reign (c. 961 B.C.) the date of the Exodus is 1441 B.C. Adding 645 to 1441, the date 2086 B.C. marks Abraham’s entrance into Canaan, and 2161 B.C. the assumed date of his birth as Abram. - If this is true then the patriarchal period is 2086 B.C. to 1871 B.C. - And the Egyptian sojourn from 1871 to 1441 B.C. - This places Abraham in the Sumero-Akkadian empire of Ur-Nammu the founder of the famous third dynasty of Ur (c. 2135-2025 B.C.), who took the new title "King of Sumer and Akkad," and erected the great ziggurat at Ur. - In Palestine numerous smaller states of Elamite princes at Isin and Larsa, and Amorite states at Eshnunna, who between 2100 and 1800 B.C. took over the heritage of the Third Dynasty of Ur after its collapse, and destruction. - In Egypt the Middle Kingdom under the twelfth dynasty (2000-1780 B.C.), where Joseph became prime minister, and Jacob stood before a pharaoh (Amenemes I-IV or Senwosret I-III). - Israel was in Egypt during the Hyksos period of foreign domination (1780-1546 B.C.) and was oppressed by Thutmose III (1482-1450 B.C.) of the New Kingdom (eighteenth dynasty) and left under Amenhotep II (1450-1425 B.C.). More from Merrill F. Unger in his book "Archaeology and the Old Testament" under Chapter Ten entitled The Historicity of the Patriarchs. On his page 125-126 "An interesting appearance of a Biblical name in the Mari letters occurs in the Banu-Yamina, Benjaminites, "Sons of the Right, " that is, "Sons of the South." These were the fierce tribe of nomads who roved the fringes of the desert south of the Euphrates, but had also pushed northward. It is unlikely that scholars can connect these Bedouins with the Biblical Benjaminites, yet chronologically it is possible. The name Benjamin, "Son of the South, " was a common name in Mari where the corresponding term "Sons of the Left," that is, "Sons of the North," is found. Benjamin is said to have been born in Palestine, after Jacob’s return from Laban, and never to have been in Mesopotamia at all. The characterization of Benjamin as "a marauding wolf" (Gen. 49:27) fits the description of the tribe at Mari. From the account of the Benjaminites in the Mari letters is the etymology of the name of David, famous in later Israel. The word translated "chieftain" in the references to the plundering Benjaminites is dawidum ("leader"), which seems to be the original form of the name of Israel’s most famous king. Other terms such as "killing an ass" sheds light on customs which prevailed in patriarchal times and later. The idiom "to kill an ass," khayaram qatalum, is not Akkadian at all, but both words occur in Hebrew and indicated the sacrifice which accompanied the oath of alliance. The connection between sacrificing as ass and concluding a covenant seems to have been preserved by the Shechemites, with whom Jacob and his sons had such unpleasant dealings (Gen. 33:19; 34:1-31). Called the Bene Hamor, "sons of the ass" (Josh. 24:32), their tribal deity was Baal-Berith, "Lord of the covenant" (Judg. 9:4). Later, at the time of Conquest the Bene Hamor of Shechem were, it seems, like the four towns of the Gibeonite confederacy (Josh 9:1ff.), added to Israel by treaty, to judge from various early references to them and their god Baal-Berith." Then Unger on page 127-128 regarding Abraham and other archeological finds states, "The so-called "Execration Texts" attest to the background of the patriarchs, in that these curious documents are statuettes and vases inscribed in Egyptian hieratic script with the names of potential enemies of the Pharaoh, which, if threatened he would break the fragile objects in a magical ceremony to send grief to those whose names were on them. The group of vases from Berlin, published by Kurt Sethe (1926), probably date from the end of the 20th century B.C. , and one from Brussels, published by G. Posener (1940), date from the late 19th century." The name Abraham, moreover, has been found in Mesopotamia in the second millennium B.C. under the forms A-ba-am-ra-ma, A-ba-ra-ma, and A-ba-am-ra-am. This shows that it was actually a name in use at an early date. The name Jacob, which stands for Ya’qub-‘el, "May El Protect," occurs not only as a place name in Palestine in the 15th century B.C. (Thutmose III’s list), but also as Ya-ah-qu-ub-il in the tablets of the 18th century B.C. from Chogar Bazar in northern Mesopotamia. Both Isaac and Jacob are abbreviated theophorous names whose full form would be Yitshaq-‘el and Ya’qub-‘el, and belong to the types known from which the Hebrews came. Attempts to find patriarchal names in the important texts discovered at Ras Shamra (ancient Ugarit) in north Syria (1929-1937) have proved unsuccessful. The claim that the Hebrew God Yahweh figures in these texts and that Terah, the father of Abram, appears there as a moon god is totally unsupported by facts. Neither does a proto-Israelite tribe of Zebulon nor Asher appear in these religious poems from the 14th century B.C. Return to the Table of Contents - Chapter Four or go to the next subject Abraham, Nergal, and Babylon.
<urn:uuid:86f4078e-0b1a-4810-aab7-a49532ba11d0>
CC-MAIN-2017-26
http://mazzaroth.com/ChapterFour/DatingThePatriarchalAge.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323604.1/warc/CC-MAIN-20170628101910-20170628121910-00338.warc.gz
en
0.932339
3,090
3.25
3
The Montmorency cherry is a sour or tart cherry grown in the United States, Canada and France. The tree was named after the Montmorency Valley in France and the fruit produced is a deep rich red color. The cherries were first cultivated in the USA on Old Mission Peninsula near Traverse City, Michigan in the mid 1800s and today the state produces over 70% of the sour cherries grown in the United States with Traverse City being recognized as the cherry capital of the World. Montmorency cherries have long been a favorite for pies and jams but also contains powerful antioxidants and nutrients, the benefits of which first came to light when scientific research showed that sour cherries could possibly offer relief from gout. Ongoing research indicates that Montmorency cherries may also be linked to a myriad of other health benefits. Montmorency cherries contain a type of antioxidant known as anthocyanins. These are believed to help block two enzymes COX-1 and COX-2 which play a role in producing substances called prostaglandins which are known to cause inflammation. Flavonoids, which are also found in the fruit, may well assist in reducing the levels of uric acid in the blood stream. It has been proven that excessive quantities of uric acid present can lead to a build up in joints and tissue causing a condition called Gout. Quercetin; chorogenic acid; gallic acid and p-coumaric acid are all further powerful antioxidants found in sour cherries which can be credited with helping to maintain a healthy cardiovascular system. Tart cherries such as Montmorency are also one of a rare number of foods known to contain another antioxidant called melatonin. This is a substance produced naturally in the body by the pineal gland which is believed to assist in regulating the sleep-wake cycle. If you are using fresh Montmorency cherries, the most effective way to store them is in a plastic bag in the refrigerator where they can be kept up to 3 days. If you intend to use them in pies or other baked dishes you should ideally pit the fruit with a cherry pitter or a small sharp knife. A cherry pitter operates like a hole punch and by putting a stemmed cherry in to the pitter and squeezing the handle you end up with the pit removed while the fruit remains whole. We have a world of information on cherries and their health benefits as well as some great recipes. Stay awhile and read more articles and if you are a cherry lover bookmark our site as we are always adding more information.
<urn:uuid:7c995ac3-edd4-421c-9a0d-e869982e5fa9>
CC-MAIN-2017-26
http://www.cherrieshealthbenefits.com/montmorency-cherries.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323604.1/warc/CC-MAIN-20170628101910-20170628121910-00338.warc.gz
en
0.957461
539
2.90625
3
Stress management is very important especially to those those who get stressed very easily. Today, there are so many techniques of managing stress. Some of which include cognitive therapy, meditation, autogenic training, workout, deep breathing, conflict resolution, and relaxation including fractional and intensifying, effective time management, hearing certain relaxing kinds of music, and using natural medication. People who are in to natural means pick alternative treatments that are validated by the medical center such as aromatherapy because they believe that this will not only reduce stress but can also bring potential health advantages. Nowadays, one of the most typical services in various well being centers and health spas today is aromatherapy. The reason being people believe that the process can help heal not merely physical pains but in addition other conditions that are acquired by too much stress and tension. People who would want to utilize aromatherapy as stress management technique should have a standard understanding about the training including its background, its types, the supplies being used, means of application, current developments as well as the future market for it. Aromatherapy as a tension buster Aromatherapy has a long and rich traditions when it comes to alternative recovery and relieving tension. It dates back to the early civilizations and spread out across the globe. In fact, through the years it has been through drastic changes in terms of application and the practice itself. Today, aromatherapy is utilized not only as a means associated with healing but the stress buster as well. When it comes to aromatherapy, it involves the task that uses essential oils and aims to take notable changes in a person’s mood or physique. With the use of essential oilswhich tend to be derived from various crops and their part which can be believed to have therapeutic propertiesaromatherapy continues to be adapted simply by more and more people across the globe due to its numerous benefits. Important oils are the major medium that is used inside aromatherapy. To be able to gain good results in the procedure, it is advisable that the person performing it has a wide knowledge about aromatherapy to avoid further problems and accidents. For those that are new to aromatherapy, it is best to educate yourselves to various plant derivations of crucial oils and the benefits they could bring. Many individuals believe that an alternative choice such as aromatherapy can be an efficient means of stress supervision because it targets muscle tissue aches and pains, extreme the monthly period, lung problems, urinary problems, and stomach issues as well as in treating epidermis problems and conditions such as acne, boils, and even scars. Aromatherapy is best within relieving conditions that are usually stress-related such as nervous stress because the essential oils that are used usually have high balancing attributes that are ideal for rest and intoxication. When you buy aromatherapy products There are so many products that are available in the current market. So, buying ideas when it comes to aromatherapy products are extremely important for people to ensure that you will see lesser room with regard to mistakes. If you would end up being choosing aromatherapy as a tension management technique, remember not to buy whatever you see in sight, ensure that you are particular in regards to the packaging especially for important oils, and dont buy products that have the word “scented,Inches “perfume” or “fragrance” on the tag because chances are, these types of wont be effective while you expect them to end up being.
<urn:uuid:5d6973c4-949b-44a6-b9f9-325dc604c3ac>
CC-MAIN-2017-26
http://yourdebtnow.com/stress-management-through-aromatherapy/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323870.46/warc/CC-MAIN-20170629051817-20170629071817-00418.warc.gz
en
0.97167
723
2.5625
3
A critical essay is your coherent and intelligent analysis of some work of art. Here you will present your opinion on a movie (painting, book) and support it with precise examples, quotations and references from the original. You should overview the strong and the weak points of the work as well as the methods used by the author. A critical essay preserves the common structure for all other essays (introduction, supporting paragraphs and conclusion). Once you have selected the subject, start collecting pertinent information for the essay. Don’t repeat the common mistake of just reviewing the contents of the work or rewriting it. Your goal is much deeper than that. You are to give a critical analysis of the author’s work, to evaluate his manner of writing (painting, etc). In the introduction you can overview the main points of the work and express your general opinion on it. The supporting paragraphs analyze the elements of work in a consistent way. You will concentrate and discuss a specific idea in every new paragraph. Be sure to present sufficient evidence to prove or rebut that idea. A good critical essay is an objective essay. That is why it should be written in the third person. Write in a simple and clear manner; avoid using unnecessary words that will muddle the reader. The aim of the last part of the essay is to sum up the presented arguments and make sure the reader understands and knows them.
<urn:uuid:c1617bf9-b9b2-4211-8647-9defadff1cc3>
CC-MAIN-2017-26
https://www.bestessays.com/critical_essay.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323870.46/warc/CC-MAIN-20170629051817-20170629071817-00418.warc.gz
en
0.93516
285
3.453125
3
Major Meteor Showers in 2011 In 2010, the Perseids and Geminids put on nice shows under mostly moon-free skies. The Orionids had quite a bit of moonlight interference, but rates seemed to be high for the fifth straight year. The Lyrids and Leonids also had a bit of a moon problem, and no unusual activity was reported. The other major showers were so badly moonlit as to be nearly unobservable. 2011 is even worse as far as moonlight is concerned. The only showers that are moon-free are the Quadrantids (good luck with getting clear skies), the Eta Aquarids (marginal except for southern observers), and the South Delta Aquarids (more of a "mid-major" shower). The Perseid peak contends with a Full Moon, and the Geminids have an 85% illuminated waning gibbous moon. The moon is at least bothersome for all of the other showers. There have been some interesting predictions of enhanced meteor activity for several showers in 2011. The Draconids or Giacobinids are a periodic shower that has produced storms in the past. Several models predict ZHRs of several hundred per hour near 20h UT on October 8. Unfortunately, this is during the middle of the day in North America. If you happen to live where it's nighttime--guess what? The moon is 90% illuminated and will wash out a majority of the meteors. According to the IMO Meteor Shower Calendar, work by Jeremie Vaubaillon predicts an outburst of the periodic Epsilon Eridanid shower at 19:34 UT on September 12. Once again, this will occur during daylight hours for North America (and there's a Full Moon)! There is always the possibility of unusual Leonid activity, but this shower also deals with a waning gibbous moon in 2011. Basic Meteor Observing Information: Don't forget to consider the effect of radiant elevation when planning an observing session. Even if a shower is near its activity peak, you won't see a thing from it if the radiant is below your local horizon. In the case of a strong shower, you may expect a (very) few long "earthgrazing" meteors when the radiant is near the horizon, but even when the radiant has reached an elevation of 30 degrees you will only see half as many meteors as you would if it were at your local zenith. Most shower radiants are highest during local morning hours, often just before twilight begins. That's usually when you want to observe, although occasionally a rising Moon or a sharp activity peak will suggest an earlier time. See "WHEN TO WATCH" below. I get quite a few questions about "when to watch" and "where to look". "Where to look" is usually fairly easy: center your field of view high in the darkest, least-obstructed part of your sky. If you have tall trees or an overpowering city light dome in one direction, you probably should face another direction. You don't have to look right at the shower's radiant. Indeed, you'll probably see fewer meteors if you do. But it's also nice and productive to keep the radiant somewhere within the field of view. If there's a bright Moon in the sky, keep it out of your field of view or try to block it with something, like a tree or a car or a chair... WHEN TO WATCH: For each shower, I list the shower's name and a "Predicted Maximum". This is when THE SHOWER should be at its maximum activity, whether or not you are in a position to view it. If this maximum time happens to coincide with a time when it's clear and dark and the radiant is high in your sky, you'll probably be a happy camper. However, life usually involves compromises. So, for each shower I've included a paragraph titled "WHEN TO WATCH". This is my take on the best viewing window for each shower. These times are generally valid for all of North America and are given as local time (i.e., you don't have to worry about converting for your time zone). It may be worth looking up the beginning of astronomical twilight for your location on a given date (in an almanac or planetarium program); this will give you an idea of how late you may observe into the prime morning hours. Disclaimer: Vagaries of meteor activity, your personal ability to perceive meteors, and local sky conditions all have a dramatic effect on the rates you observe. Sky conditions to consider include weather and light pollution. If you can't see the summer Milky Way in Cygnus on a moonless night when this region of the sky is overhead, you probably won't see much from even the strongest annual showers. Clear, dark skies are essential for satisfactory meteor observations. More shower meteors are visible from a dark site, and sporadic (random) meteor rates are enhanced greatly. Predicted Maximum: January 4, ~1h UT (= Jan. 3, 5pm PST; = Jan. 3, 8pm EST) Moon: New Moon (no interference) WHEN TO WATCH: European and Asian observers should have the best view of this year's Quadrantids, and should focus on the morning of Tuesday, January 4. North American observers will get lower rates, but both the mornings of January 3 and January 4 will produce some activity. Observe during the last couple of hours before twilight on Monday, January 3 (better for West Coast observers) and from about 1am until morning twilight on Tuesday, January 4 (better for East Coast observers). Be aware that these are more of a best guess; the Quadrantids are not very predictable. The peak of this shower doesn't last long, and is notoriously variable in strength and timing and duration. The 2009 peak was much longer and stronger than the one in 2008. North American observers with clear skies could see anywhere from 15 to 60 Quadrantids per hour during the windows above. The Quadrantid radiant is highest in the predawn hours. From latitudes above 41N, the radiant is circumpolar (above the horizon all the time), but it is very low during the pre-midnight hours. It is possible to see a few earthgrazing Quadrantids in the evening--a challenge for adventurous observers in the Pacific Northwest this year. An even bigger challenge is the January weather, which is usually awful. Quadrantids are medium-velocity meteors, and some bright ones are often visible around the time of maximum activity. The radiant is in a rather blank area surrounded by the constellation figures of Bootes, Hercules, Draco and Ursa Major (see the radiant map). Along with the Quadrantids, there are usually quite a few sporadic meteors visible from dark sites. Note: Skies were cloudy on the morning of the 4th. I did get out for 1.5 hours on the morning of January 3rd and saw 26 Quadrantids and 22 other meteors. Predicted Maximum: April 22, ~23h UT (= Apr. 22, 4pm PDT; = Apr, 22, 7pm EDT) Moon: Waning Gibbous (major interference) WHEN TO WATCH: Observers in mid-northern latitudes get a brief period when the radiant is above 30 degrees and the moon has not yet risen. For my location in Southern Oregon, this is between about midnight and 1:30am on the morning of Saturday, April 23. Check your local moonrise time; the window gets shorter the farther south you go. Expect between 5 and 15 Lyrids per hour from a dark site, plus a few other meteors. The Lyrids are another shower with a reputation for variable rates and timing. Usually, they produce about 20 meteors per hour at maximum (under dark skies). Lyrids produce fairly fast meteors with a reputation for being faint on average. However, I've seen my share of Lyrid fireballs, and the 2009 display was uncharacteristically bright. Predicted Maximum: May 6 (broad) Moon: Waxing Crescent (no interference) WHEN TO WATCH: The Eta Aquarids have a fairly broad peak. The morning of Friday, May 6 would be the nominal maximum, but if that's clouded out try the adjacent mornings. With no moon, this is a good year to observe this challenging shower. The Eta Aquarids are better for Southern Hemisphere observers, but are a bit difficult for everyone. The key is to watch during the last hour or so before twilight gets really bright. In terms of local time this depends on your latitude and also on your longitude with respect to the center of your time zone. Check an almanac or planetarium software. At latitude 42.6 degrees North, I've had my best results from about 3:40-4:40am local daylight time. The Eta Aquarids would produce maximum rates of >50 per hour if we could see them with the radiant high in a dark sky. In the northern temperate latitudes, we don't get close to that. We get just a small taste of them in an intricate dance just before dawn. At 40 degrees North, the radiant is only about 15 degrees up when twilight begins. If I could get those conditions for an hour, I might see 10-15 ETAs. However, everything's changing. Before that time, there are fewer shower members visible because the radiant is lower. After that time, the radiant is higher and rates would keep rising but for the onrush of twilight. You're fortunate indeed if you see 10 ETAs in an hour, along with about 5 sporadic (random) meteors. The low radiant elevation means that the earliest ETAs you see will be "earthgrazers": long, relatively slow and often tracing paths along the horizon. Bright earthgrazers are spectacular. Unfortunately, because of their greater distance from the observer, earthgrazers tend to be faint. As the radiant gets a bit higher, the ETAs take on more of their typical appearance: fast meteors, bright on average and often leaving a glowing train. You'll only catch a few of them, though, because dawn is approaching. This shower seems to fluctuate irregularly, and you could easily hit either a spurt or a lull during the all-too-brief observing windows. SOUTH DELTA AQUARIDS Predicted Maximum: July 28 (broad) Moon: Waning Crescent (minor interference) WHEN TO WATCH: This shower's maximum seems to be broad and irregular. Watch during the last couple of hours before morning twilight on Thursday, July 28, or try the adjacent mornings. Remember that twilight comes pretty early for mid-northern latitudes at this time of year (around 4am for my place). The South Delta Aquarids are barely a major shower from 40 degrees N; southern observers have a somewhat better view, but the maximum ZHR is probably about 20. The real treat is the number of meteors from different sources visible from dark sites on moonless mornings in late July. Along with 5-10 South Delta Aquarids, a mid-northern observer might see at least the same number of sporadic (random) meteors. There will probably also be a couple of meteors from the Antihelion and Alpha Capricornid radiants. The Perseids are just becoming active, and you may see 2 or 3 per hour. This can add up to an impressive number of meteors with a bit of luck. You may not be able to assign every meteor to its correct radiant, but that doesn't keep you from enjoying them! South Delta Aquarids are medium-speed meteors, and tend to be faint on average. Note: In a 1.5-hour session on the morning of July 27th, I only saw 6 SDAs along with 22 sporadics, 2 Perseids, and 3 members of other showers. Predicted Maximum: August 13, ~6h UT (=August 12, 11pm PDT; =August 13, 2am EDT) Moon: Full Moon (major interference) WHEN TO WATCH: The Perseids have a severe moonlight problem this year. The Full Moon will be in the sky all night long, and will wipe out most of the meteors. If you can get high and dry (clean, dry air will scatter less moonlight), you might see as many as 15-30 Perseids per hour on the morning of Saturday, August 13 from midnight until morning twilight. Face away from the moon and keep it out of your field of view for best results. The Perseids are probably the most-watched annual meteor shower. The shower has a very long duration, from about July 15 through August 25, but is most interesting around its peak on August 13. In recent years, the exact timing of the peak has varied somewhat from the predictions. The Perseid radiant is above the horizon the entire night for observers north of latitude 32N, but it is fairly low at the end of evening twilight. Rates are better in the morning. Perseids are fast meteors and tend to be fairly bright on average. An occasional fireball is seen. The Perseids aren't the only meteors around: sporadics, minor showers like the Kappa Cygnids, and a few leftover South Delta Aquarids add to the display but will be hard to see due to moonlight in 2011. Note: I observed Perseids after moonset on August 10 (27 Perseids and 26 other meteors in 1.75 hours) and under full moonlight on August 13 (51 Perseids and 9 other meteors in 2.2 hours). Details are in my observing log. DRACONIDS (aka Giacobinids) Predicted Maximum: October 8, 20h UT? (=October 8, 1pm PDT; =October 8, 4pm EDT) Moon: Waxing Gibbous (major interference) The Draconids are a periodic shower that produced storms of thousands of meteors per hour in 1933 and 1946. During most years, few or no Draconids are seen, but when the Earth crosses a denser trail of dust left by parent comet 21P/Giacobini-Zinner things get interesting. 2011 should be one of those interesting years, with models suggesting a peak within a few hours either side of 20h UT on October 8. As mentioned above, this is daylight for North America. Rates are very uncertain, but given the shower's stormy history it could be worth watching despite the bright moonlight. WHEN TO WATCH: If you're in Europe, watch on the evening of Saturday, October 8. If you're in North America, don't expect much (if anything), but watch on the evening of Saturday, October 8. While previous storms have been brief, East Coast observers may have the best chance of seeing something soon after it gets dark. The Draconid radiant is highest in the early evening, and gets very low in the morning hours. Draconids are notable for being very slow-moving meteors. They are likely to be faint, which means that even favored observing locations may not see much in the moonlight. Predicted Maximum: October 21-24 (broad and irregular) Moon: Waning Crescent (moderate interference) WHEN TO WATCH: The moon causes fewer problems later in the activity period this year. From mid-northern latitudes, the Orionid radiant reaches 30 degrees elevation at around 1am. The 36% illuminated moon rises soon after on the morning of the 21st, but then rises later and gets fainter as the week goes on. Even when the moon is in the sky, Orionid observing should be rewarding from otherwise dark sites. You might even explore which conditions yield the most Orionids: early in the morning when the moon is down but the radiant is low, or later in the morning when the radiant is high but the moon is in the sky? All mornings between October 21 and October 24 would be suitable for this experiment. For casual observers, I suggest the mornings of Saturday, October 22 and Sunday, October 23, from 1am until morning twilight. The Orionids are capable of producing interesting activity from October 17-25. Traditionally, the shower produced maximum rates of about 25 per hour, with occasional enhancements to 50 per hour occurring irregularly. Recently, the shower has been stronger. Very high rates were seen on several mornings in 2006. The last three years have produced a broad maximum of 35-40 per hour, stretching from October 20-24. The Orionids are fast meteors, perhaps a bit faint on average but capable of producing fireballs. Note that the radiant is north of Betelgeuse and not right in the middle of Orion. A minor shower called the Epsilon Geminids has a nearby radiant that can cause confusion, but usually produces only 1-2 meteors per hour. The South Taurids produce a few nice, slow meteors from a radiant farther west. Finally, 5-15 sporadic meteors are usually visible each hour under dark sites. Note: I observed the Orionids for 1.4 hours on the morning of October 22nd and experienced very low activity with only 16 Orionids and 6 other meteors. The morning of the 23rd was somewhat better--I observed for 2.5 hours and saw 47 Orionids and 29 other meteors. Predicted Maximum: November 18? Moon: Last Quarter (major interference) Who knows what to expect from the Leonids? The IMO Meteor Shower Calendar summarizes some of the predictions, including a possible strong outburst of faint meteors on November 16 that favors Eastern Europe and parts of Asia. The moon will be brighter on the 16th, and then nearer the radiant on the 17th and 18th, so it's not an especially good year to observe this shower. WHEN TO WATCH: The Leonids are best observed from about 2am until the beginning of morning twilight. Try the mornings of Thursday, November 17 and/or Friday, November 18. If the timing of 22:36UT is correct for the November 16 outburst, it will happen many hours before the radiant rises in North America. I wouldn't expect more than 5-10 Leonids per hour even under favorable conditions. The Leonids are very fast meteors. The shower is active at a low "background" level for about a week from November 14-21. Predicted Maximum: December 14, ~17h UT (=Dec. 14, 9am PST; =Dec. 14, 12noon EST) Moon: Waning Gibbous (major interference) This isn't a very good year for the Geminids. For mid-northern latitudes, the bright moon rises at around 8pm on the evening of the 13th while the radiant is still low, and will be in the sky all night long. There is an additional hour of moon-free evening time on the 14th, but note that Geminid rates usually drop off quickly after the peak. If you choose to watch while the moon is in the sky, either face away from the moon or make sure you block it with something to keep the direct light out of your eyes. The Geminids produce some bright meteors, so quite a few will be visible despite the moonlight if your skies are otherwise clear and transparent. WHEN TO WATCH: Late Tuesday evening, December 13 through morning twilight on Wednesday, December 14. Also Wednesday evening, December 14, around 8-9pm local standard time. The Geminids show a broad peak. When moonlight doesn't interfere, peak rates may exceed 100/hour from dark northern hemisphere sites, and rates of 60/hour may persist for 24 hours or more. Southern hemisphere observers also enjoy this shower, although with lower rates and a shorter viewing period in the predawn hours. The radiant is highest in the sky at around 2am. Geminids are medium-speed meteors. Most of them don't leave glowing trains, but the brighter ones are often colored (yellow, green and blue are most common). The Geminids seem to produce quite a few fireballs. Often, more bright meteors are seen during and after the maximum than before the maximum. A good number of sporadic and minor-shower meteors add to the show. Note: I did a brief, casual watch on the evening of the 13th before the moon rose and saw about a dozen Geminids in an hour. On the morning of the 14th, I started counting at 3:40am under bright moonlight. Skies were perfectly clear when I started, but there was a brief period during my watch when clouds moved in and covered as much as half the sky. After the clouds departed, there was still some high haze. In spite of all this, the Geminids put on a good show. I saw 70 Geminids and 7 sporadics in 1.82 hours of observing time. The mean Geminid magnitude was +1.2, and I didn't see any fireballs but saw a good number of -1 and -2 Geminids. Other Sources of Meteor Activity The major showers listed here (except the Draconids) are fairly reliable and occur every year. However, meteor activity is visible on any clear night. Random sporadic meteors, minor showers, and major showers near the beginning or end of their activity period all contribute to this "background". For the Northern Hemisphere, there is a general pattern of lower rates during the first half of the year and higher rates during the second half, but rates vary greatly from hour to hour, day to day, and observer to observer. Occasionally, unexpected high activity occurs. It is up to the observer to objectively describe what was seen. In many cases, high activity may be ascribed to randomness. At other times, many of the meteors seen may be part of a periodic or previously unknown shower. There are some periodic, irregular, and hypothetical showers that could produce surprises during 2011. The meteorobs mailing list is a good way to keep track of predictions and developments "beyond the majors". Other Meteor Shower Info. General shower attributes, radiant maps and predicted times of maximum are adapted from the International Meteor Organization's 2011 Meteor Shower Calendar as well as personal data. Recent activity profiles were characterized from http://www.imo.net/zhr. All on-site text and contents are Copyright 2010, 2011 by Wes Stone and may be reproduced for not-for-profit use so long as credit is given.
<urn:uuid:a200a24b-d3cf-4cfe-a2a0-a6774a1a4635>
CC-MAIN-2017-26
http://skytour.homestead.com/met2011.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319933.33/warc/CC-MAIN-20170622234435-20170623014435-00057.warc.gz
en
0.950397
4,695
2.71875
3
Friday, February 6, 2015 Please dispose Motor Vehicle batteries properly, 97% of these batteries are recyclable. Motor Vehicle batteries include any batteries from cars, trucks, motorcycles, boats, anything with an internal combustion engine. These batteries can be taken to any retailers that sell the batteries for recycling. Retailers should have posted a flyer like the below picture. If purchasing a new one the retailer may not charge, if not purchasing a new one the retailer may charge a fee. If motor vehicle batteries are not recycled properly they can leak lead and/or acid which can leak into the ground water and/or soil; which can harm the environment. The lead or acid can result in severe injuries if it comes in contact with eyes or skin. The leak can short and result in a fire. It is illegal to incinerate or put these batteries in the landfill. If you have additional questions on battery recycling, or recycling questions please contact the Brown County Port & Resource Recovery Center website http://www.browncountyrecycling.org/, by phone at 920-492-4950. Alkaline batteries can be disposed of in regular solid waste receptacles. They no longer pose a health or environmental risk. Button batteries and rechargeable batteries should be disposed of through the local Household Hazardous Waste Collection site. They still contain certain metals that are hazardous to the environment. Go to http://www.call2recycle.org or call 1-877-2-RECYCLE(7329253)
<urn:uuid:39e3fdb4-e413-456c-aa3e-cc446ddbc207>
CC-MAIN-2017-26
http://villageofbellevue.blogspot.com/2015/02/battery-recycling.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319933.33/warc/CC-MAIN-20170622234435-20170623014435-00057.warc.gz
en
0.896905
308
2.65625
3
Up to now, the brain's magnetic field is measurable only under technical laboratory conditions. This technique is therefore not feasible in terms of the broader medical use, although it would be significant for diagnosing numerous conditions such as epilepsy and dementia, or even for improving therapies such as deep brain stimulation for treating Parkinson's disease. Three research teams at Kiel University (Germany) have now jointly developed a new type of magnetoelectric sensor, which is intended to allow the use of this important technology in the future. The scientific breakthrough: As opposed to conventional magnetoelectric measuring techniques, the new sensors operate at normal conditions. Neither cooling nor external magnetic bias fields are required. A new article in Nature Materials describes the design and properties of these so-called exchange biased magnetoelectric composite materials. "Our composites with exchange biasing present an international milestone in the research of magnetoelectric materials", says Professor Eckhard Quandt, senior author of the study and spokesperson of the Collaborative Research Centre 855 Magnetoelectric Composites - Future Biomagnetic Interfaces (CRC 855). "By eliminating the dependence on externally applied magnetic bias fields, we have removed a significant obstacle for the medical application of magnetoelectric sensors such as magnetocardiography and magnetoencephalography". As the sensors do not affect one another due to their particular design, measuring arrays made up of hundreds of units are now conceivable. This would enable the production of flow maps of heart currents or brain waves. The new composites consist of a complex sequence of around a hundred layers of material, each of which is only a few nanometres thick. The magnetoelectric sensors contain both magnetostrictive and piezoelectric layers which, on the one hand, deform due to a magnetic field to be measured and, as a result of this, at the same time produce electrical voltage which is used as the measuring signal. Enno Lage who has been working on the study since 2010 explains its background: "With the conventional magnetoelectric layer systems it is only possible to perform such highly sensitive measurements if the sensor is subjected to a bias magnetic field. "What makes our composites so extraordinary are antiferromagnetic supporting layers made of manganese iridium, which act like magnetic fields inside the material", he adds. "This means that the bias field for the measurement is produced directly in the sensor and no longer needs to be provided externally." A complete sensor is usually a few millimetres in size and contains a multi-layer of this new material, which is approximately a thousandth of a millimetre thick. The new composite materials have been produced in the recently established Kiel Nano Laboratory's cleanroom. "These types of sensor systems can only be produced successfully in this particle-free environment", says Dr. Dirk Meyners, who is scientifically supervising Lage during the doctoral degree programme. With this step in the development towards removing the dependence of magnetoelectric measurements on external magnetic bias fields, the working groups led by Lorenz Kienle, Reinhard Knöchel and Eckhard Quandt have achieved an important objective of the CRC 855, which has been supported by the German Research Foundation since January 2010. The CRC's overall aim is to develop such new materials and to implement them into a fully functional, biomagnetic interface between men and the outside world. Quandt indicates future prospects: "Beyond the CRC's opportunities, in the Cluster of Excellence Materials for Life, which is currently being reviewed, we could promote a range of further applications on the basis of these composites, for example, as sensors for non-invasive brain stimulation."
<urn:uuid:2ee60088-3e47-4f03-8600-845fc9856bfe>
CC-MAIN-2017-26
http://www.news-medical.net/news/20120427/New-article-describes-design-and-properties-of-magnetoelectric-composite-materials.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319933.33/warc/CC-MAIN-20170622234435-20170623014435-00057.warc.gz
en
0.936064
755
3.75
4
When we use the sensor devices in the IoT network, it is neccessary that the devices are roaming witin the network, or sometimes it can roam to other operator's network. LoraWAN protocol V1.0 has not yet done any thing about roaming but it is in plan. In this blog post, we are going to explore the possible scenarios and solutions of LoraWAN roaming. What is LoraWAN roaming? To answer the question, let's take a look at the network architecture: In a single network, where all the gateways are connected to one or multiple lora-server instances, the gateway just forwards the data bidrectionally. Hence there is no really handover in the backend that specifies the protocol between the gateways. In this case, roaming within a signal network is quite easy, no extra efforts are required. That is basically how LoraWAN 1.0 works. When it comes to another scenario, which involves multiple networks, the architecture is illustrated below: Two loraWAN network may deploy in the adjacent or the same regions, in this case, whether the network operator can provision the other vendor's end device is also relevant to roaming. What information is needed from one network from another to trust the end devices? Who pays who in this situation? The information needed for inter-network roaming In theory, LoraWAN end devices won't know which gateway it is connected. The main jobs of end devices are sending, receiving, ADR query and checking wheather the link is alive. With unconfirmed sending and receiving, the end devices have no idea about the success of delivery. More importantly, with link checking and ADR query, roaming devices need to receive downlink packets from the original lora server. When the roaming devices lost connection or reset, it will also need to join the network again with its own credentials. The MAC commands from the original network will also need to reach the roaming devices. Hence we need to share some information between the networks to make this happen. In Lora packets, there are some fields are not encrypted: Fields in FHDR, like DevAddr and FCtrl are not encrypted and can be read directly from the gateways that belongs to other network, in which DevAddr contains the identification of the end device. It is assumed to use DevAddr as a credential to forward the data bidirectionally. Both networks should reach a consensus that who pays who for the forwarded packets between the network, and provide some APIs for query the device address from the other network and then forward. Necessary steps for inter-network roaming To enable the inter-network roaming, we need a clean house in between the network that can negotiate and reply queries. The steps could be: - Gateway receive the packets which include not-local DevAddr - Query the DevAddr and register in the backend as a roaming device - Based on the billing agreement, start to forward data bidirectionally - Original lora server receives the packet and register in the backend as a roaming device - When data is needed to be sent from the original lora server, use the roaming protocol to send to another network - If the device is offline or goes back to the original network, terminate the roaming and delete entries in both network.
<urn:uuid:d98a8033-3729-4c16-8181-b06fb931e5b4>
CC-MAIN-2017-26
http://matchx.io/developers/blog/19-roaming
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320130.7/warc/CC-MAIN-20170623184505-20170623204505-00138.warc.gz
en
0.939413
691
2.890625
3
New from Pew Global Attitudes Project. Social networking has spread around the world with remarkable speed. In countries such as Britain, the United States, Russia, the Czech Republic and Spain, about half of all adults now use Facebook and similar websites. These sites are also popular in many lower-income nations, where, once people have access to the internet, they tend to use it for social networking. Read the Complete Report Meanwhile, cell phones have become nearly ubiquitous throughout much of the world, and people are using them in a variety of ways, including texting and taking pictures. Smart phones are also increasingly common – roughly half in Britain, the U.S., and Japan have one. Globally, most smart phone users say they visit social networking sites on their phone, while many get job, consumer, and political information. In 19 of 21 countries, about three-in-ten or more of those polled use sites such as Facebook, including about half in Britain (52%), the U.S. (50%), Russia (50%), Spain (49%), and the Czech Republic (49%). Only in India (6%) and Pakistan (4%) is the percentage of adults who use social networking sites in single digits.1 In every country polled, use of social networking sites varies by age. In 17 of 21 countries, there is a gap of 50 points or more in usage of social networking sites between those younger than 30 and those 50 or older. This gap is particularly pronounced in Italy, Poland, Britain and Greece, where at least 70 percentage points separate those in the younger group from those in the older group. Read the Complete Report (34 pages; PDF)
<urn:uuid:3b26de1e-2ccf-47e7-a852-f10abdcf921c>
CC-MAIN-2017-26
http://www.infodocket.com/2012/12/12/new-survey-findings-social-networking-popular-across-globe/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320263.78/warc/CC-MAIN-20170624133941-20170624153941-00218.warc.gz
en
0.952774
340
2.796875
3
Here are a number of tutorials prepared by the AMBER developers to help you in learning how to use the AMBER software suite. The tutorials are divided into basic, advanced, and analysis-specific. If you are new to AMBER you should start at the beginning of the introductory tutorials and work your way through linearly. If you are already familiar with AMBER then you should consider skipping directly to the advanced tutorials that interest you. (Note: These tutorials are meant to provide illustrative examples of how to use the AMBER software suite to carry out simulations that can be run on a simple workstation in a reasonable period of time. They do not necessarily provide the optimal choice of parameters or methods for the particular application area.) The Amber Website (http://www.ambermd.org/) Amber 2016 Reference Manual (http:ambermd.org/doc12/index.html) The Amber Mailing List Archive (http://archive.ambermd.org/) A computer is like any other scientific instrument in that you need to have a basic understanding of how it works and, more importantly, how to use it to do your work, before you can hope to to carry out meaningful calculations with any computational chemistry package, including AMBER. Without a basic knowledge of how to navigate a filesystem, execute commands, or create and modify files and folders, you will be unlikely to understand what is being done in these tutorials well enough to learn AMBER. Most of these tutorials assume a decent level of experience and competency with Unix command-line use, and as such expect that basic concepts of using the command-line and common commands are part of a standard vocabulary. You should develop this vocabulary so that trying to learn the command-line while performing the tutorials does not replace trying to learn how to use AMBER itself. The link provided at the top navigates to an interactive Unix tutorial through Code academy, and is sufficient for beginners. You will need to create a free login to use it. This is by no means the only resource available for learning Unix, but it seems to be fairly thorough. By codecademy; No affiliation with AMBER This tutorial is written for beginners of LEaP, which is the main program for preparing the topology and coordinate files for AMBER. The tutorial gives comparison of different kind of files used in the LEaP program, introduces the workflow of LEaP for doing modeling. In the end a quick example of a protein-ligand complex was shown. By Pengfei Li This tutorial is designed for new users who have little or no experience with running molecular dynamics simulations. It assumes no prior knowledge of AMBER or Linux but assumes that AmberTools 14 as well as VMD are correctly installed on your system and AMBERHOME is set correctly. If you are new to AMBER and MD in general this is the place to start. By Ben Madej & Ross Walker This tutorial will act as a basic introduction to LEaP, sander and ptraj, to build, solvate, run molecular dynamics and analyze trajectories. It will also cover visualising trajectories using VMD. The aim of this tutorial is to act as a brief introduction to running classical molecular dynamics simulations using the AMBER software. In this tutorial we will create a initial structure for a 10-mer of DNA and then we will run gas phase, implicit and explicit solvent simulations on it. Finally we will look at a practical example of how MD simulations can be used to investigate how A-DNA can convert to B-DNA. This tutorial acts as a brief introduction to using VMD for visualising AMBER inpcrd, restrt and trajectory files. While only scratching the surface of what VMD can do it covers setting up a .vmdrc file to set the default layout of VMD, loading static structures and performing RMSD fits between similar structures. It then goes on to cover loading and visualising AMBER trajectories, both from gas phase/implicit solvent simulations and from periodic boundary simulations and shows how to save individual frames from a trajectory as well as create an MPEG video of the trajectory. tutorial is designed as a case study that will show you how to reproduce the work discussed in the following paper: Simmerling, C., Strockbine, B., Roitberg, A.E., J. Am. Chem. Soc., 2002, 124, 11258-11259 It is a fairly long and in-depth tutorial covering creating structures using XLeap followed by running heating and long MD simulations to conduct protein folding experiments. It then moves on to more advanced analysis, including RMSd fitting, mdcrd to binpos conversion, average structure calculation, hydrogen bond analysis and dihedral angle tracking using ptraj. We also look at cluster analysis using the MMTSB toolset. It is recommended that you complete the earlier tutorials in this listing before attempting this more advanced tutorial. This tutorial is a walk-through of one of Prof Matt Lee's research projects. It will take you through how to setup, run and analyze a simulation of the core domain of the HIV-1 integrase enzyme. (Japanese translation) Antechamber is a set of tools, shipped with AMBER, that can be used to prepare "prep" input files for organic molecules, which can then be read into LEaP and used to create prmtop and inpcrd files. The Antechamber suite is designed for use with the "general AMBER force field (GAFF)" and is ideal for setting up simulations involving organic pharmaceutical compounds or other organic molecules. In this tutorial we will use antechamber to create a leap input file for BMS's HIV reverse transcriptase inhibitor sustiva (efavirenz). Then we set up a simulation of sustiva bound to HIV-RT. (Ukranian translation; Japanese translation) In this tutorial, we will learn how to use the AMBER programs to build a residue template and parameter set for a custom, modified amino acid. Unlike other tutorials that detail how to create a residue template and parameter set for a small organic ligand, the modified amino acid in this example must be bonded to the residues that come before and after it in the protein polymer sequence. As a result, the process is more complex and has more steps. This tutorial covers setting up an advanced system. In this case it shows you how to set up a dye system that is covalently bound to DNA. It also includes manually running multiconformational RESP fits, building custom units and assigning parameters manually. This tutorial is somewhat replaced by tutorial A1 above, however, it is kept here since it does show a useful example of how to create a system containing a metal atom. Often you will want to simulate a protein system that contains a non-standard residue such as a co-enzyme or an inhibitor. In this case you cannot simply build the topology and coordinate files. You first need to generate a new unit in xleap, add any missing parameters and charges and then create your prmtop and inpcrd files. If the non-standard residue is a standalone molecule then you could use Antechamber for this (see tutorial B4). However, in this this tutorial we will model plastocyanin which has a copper atom bound to four close residues. This tutorial will give an example of how to build this residue unit in xleap. There are two versions of this tutorial. A simple version which creates just a new copper residue and approximates it as a +1 ion and a more advanced version where new special histidine and methionine residues are created so that different charges and bond / angle and dihedral parameters can be used. In this tutorial we will delineate several modeling strategies of metal ions in mixed systems (proteins and nucleic acids) using the AmberTools package. Both the bonded model and nonbonded model are illustrated. For the bonded model, MCPB and MCPB.py are used to facilitate the modeling. While for the nonbonded model modeling strategies for the 12-6 Lennard-Jones (LJ) and 12-6-4 LJ-type nonbonded models are presented. (Japanese translation) The tutorials up to this point have all used the classical amber force field equation to minimise the system and propagate the dynamics. With the release of AMBER 9 came the ability to do very fast advanced coupled potential QM/MM driven minimization and MD. This tutorial will show you how to set up a simple QM/MM/MD simulation of NMA in solution. In this tutorial we will generate force field parameters for two small moleculesfrom ab-initio quantum calculations using the AmberTools program Paramfit. This tutorial generates the phi and psi dihedral potentials over two different small peptide chains, and details each step of the parameter generation process from preparation of a conformational sampling of each structure to generation of quantum data to evaluating the quality of the resulting parameters. Phospholipid bilayers are essential components to cellular membranes and are the stage where many essential biophysical and biochemical processes take place. This tutorial explains how to set up and simulate lipid bilayers with the Lipid14 force field. A DOPC bilayer is built, converted, and loaded into LEaP to assign parameters for molecular dynamics simulation. A molecular dynamics scheme is presented followed by analysis of the bilayer structural properties in the trajectory. Furthermore, membrane-bound proteins are examined and a simple membrane-bound protein system is built. Parker de Waal has created an alternative lipid-building tutorial using Maestro. This tutorial illustrates the use of antechamber and sander to carry out some simple simulations of a room-temperature (non-biological!) ionic liquid. Together with the INTERFACE force field, this tutorial explores the functions of employing the AMBER software package to modeling material and interfacial systems. This tutorial will give a basic introduction to using CPPTRAJ for performing trajectory analysis. It will cover using CPPTRAJ interactively and in batch mode for processing scripts, loading topologies and trajectories, processing data, and working with data sets. (Japanese translation) This tutorial will give a basic introduction to performing RMSD calculations with CPPTRAJ. It will cover loading reference structures, as well as calculating RMSD to references with different topologies. (Japanese translation) This tutorial will cover how to perform combined clustering analysis with CPPTRAJ, which is a way of comparing structure populations between two or more independent trajectories or between different parts of a single trajectory. These tutorials focus on analyzing and visualizing MD simulations with PYTRAJ and NGLView. By Hai Nguyen By Hai Nguyen This tutorial provides a step by step explanation of using the mm_pbsa script to calculate the binding energy of the RAS-RAF protein complex. It also includes instructions on using the mmpbsa_py script to perform these calculations as well. (Japanese translation) This tutorial demonstrates the functionality of the Free Energy Workflow tool FEW. Using a sample data set of inhibitors of the protein Factor Xa it is shown how FEW can be used to easily prepare MD simulations and binding free energy calculations by the MM-PB(GB)SA, the linear interaction energy (LIE), and the thermodynamic integration (TI) method for multiple ligands binding to the same receptor. FEW provides an efficient way to setup and conduct binding free energy calculations with AMBER. This tutorial covers how to setup, run and postprocess replica exchange simulations using multisander and Amber 10 or later. This tutorial describes a couple of ways to assess conformational equilibria of a short polyproline peptide using so called steered molecular dynamics, and the famous replica-exchange protocol: html, pdf, polyproline-tutorial-files.tar.bz2 (Warning: 60Mb). In this tutorial, we will learn how to use AMBERs implementation of aMD to enhance sampling. In this tutorial we focus on the steps necesary to prepare and run an aMD simulation. We use the work we published on the discovery of long lived conformational transformations in the Bovine Pancreatic Trypsin Inhibitor (BPTI) protein. We follow the preparation of the files and give sme information about amd reweighting. This tutorial illustrates the use of steered molecular dynamics and a QM/MM energy to compute the barrier to proton transfer in malonaldehyde. This tutorial provides detailed instructions on how to perform Adaptive Steered Molecular Dynamics Simulations (ASMD). Compared to Steered Molecular Dynamics, ASMD has been shown to converge much faster while reducing the computational cost. The tutorial calculates the Potential Mean Force of unfolding a small alpha-helical peptide using two different velocities. This tutorial illustrates the use of conformational "flooding" to setup a Hamiltonian replica exchange simulation of a small molecule in explicit solvent. This tutorial uses a feature that is only available with Amber v11. As such you need to have Amber 11 installed to run the calculations in this tutorial, if you are using Amber 9 or 10 then you should use the older NEB tutorial. In the nudged elastic band method, the path for a conformational change is approximated with a series of images of the molecule describing the path. Minimisation of the entire system, but with the end point structures fixed, provides a minimum energy path. In this tutorial we will use the NEB method to predict a pathway for a conformational change in alanine dipeptide. In this tutorial we will learn how to use the AMBER software to perform molecular dynamics simulations at constant pH (CpHMD). Solution pH affects titratable side chains in proteins (and, on occasion, ribozymes), which can have a dramatic impact on the function, structure, and stability of large biomolecules. CpHMD is a method that uses a hybrid molecular dynamics/Monte Carlo approach to sample conformations and protonation states of various titratable residues in biomolecules. This method can help capture the coupling between protein structure and pH. This tutorial introduces the Nonequilibrium Free Energy (NFE) toolkit, which is fully functional in SANDER and partially ported to PMEMD AMBER. The purpose of this tutorial is multifold. We review the current status of the porting of software to PMEMD AMBER v.16, and provide suitable patches for upgrading the toolkit to older versions of AMBER (v.14). Additionally, patches are provided for upgrading modules not released to PMEMD AMBER v.16, and we provide a step-by-step tutorial on how to write new collective variables for free energy calculations. Software templates for new collective variables are also given. Finally, a few examples of using the new PMEMD versions of the code is provided. This tutorial reproduces the calculation of the pKa value of the ASP residue in the protein thioredoxin as described in the following paper: Simonson, T., Carlsson, J., Case, D.A., "Proton Binding to Proteins: pKa Calculations with Explicit and Implicit Solvent Models", JACS 2004, 126, pp4167-4180. In this tutorial we will learn how to use the AMBER software coupled with the Weighted Histogram Analysis Method (WHAM) of Alan Grossfield to generate potentials of mean force. Often one might want to know what the free energy profile is along a specific reaction coordinate. Such a profile is known as a potential of mean force and it can be very useful for identifying transition states, intermediates as well as the relative stabilities of the end points. At first thought one might think that you could generate a free energy along a specific reaction coordinate by just running an MD simulation and then looking at the probabilities of the states sampled. However, often the energy barrier of interest is many times the size of kbT and so the MD simulation will either remain in the local minimum it started in or cross to different minima but very very rarely sample the transition state. Umbrella sampling offers a way to effectively force the system to move through a transition state and reaction pathway that chemical knowledge of the system under study suggests is important. This tutorial computes the relative binding free energy of two ligands bound to a lysozyme mutant. In three steps, you will learn about the background of soft core TI calculation, the new system setup for Amber10 or later, and how to run and analyze a short free energy calculation. This tutorial is a walk-through of absolute free energy calculations using EMIL. EMIL works by perturbing the "normal" atomistic representation of the system into a model for which the free energy is exactly known, thus it is a sort of thermodynamic integration tool. The example in this tutorial is an estimate of the four free energy basins of the alanine dipeptide. In this tutorial, we will learn how to use AMBER to compute precise binding enthalpies using explicit water molecular dynamics simulations. Here we focus on the guest B2 binding to the host CB7. However, while the example in this tutorial focuses on a host-guest system, the technique is directly applicable to protein-ligand systems although we caution that the such systems will require considerably more sampling to converge than the host-guest system in this tutorial. This tutorial demonstrates how to use the attach-pull-release (APR) approach to compute the binding thermodynamics of a host-guest system with explicit water model. Results from binding calculations using the APR approach showed moderate to strong correlations with the experimental measurements of cucurbituril (CB7), β-cyclodextrin (β-CD), octa acid (OA) and tetra-endo-methyl octa-acid (TEMOA) with their guest molecules. This tutorial provides a basic introduction to using AMBER for NMR refinement of a DNA duplex. It makes use of LEaP and Sander. [Related information: Mike Summers has prepared a set of scripts for RNA refinement. It contains descriptions, examples, and scripts that were used to generate initial structures with cyana and refined with Amber. Nearly all steps (file conversions, etc.) are written into scripts so that the process can be followed. Some scripts may need tweaking, depending on your operating system. The work is described in: J. Biomol. NMR 47, 205-219 (2010).] This tutorial describes one way to set up a simulation of a protein crystal, showing how to construct unit cells, and how to fill in missing solvent. This tutorial shows how the 3D-RISM method can be used to generate an initial configuration of water around a solute molecule. In this tutorial we will learn how to use the AMBER software coupled with the Grid Inhomogeneous Solvation Theory Method (GIST) to estimate thermodynamic values for the water molecules occupying the binding pocket of Factor Xa. Often one might want to estimate changes in hydration which are central to correctly describe biomolecular phenomena such as molecular recognition, drug binding, etc. However it is difficult to estimate precisely the thermodynamic solvation contribution in these phenomena. This tutorial reproduces the calculations of the diffusion constant and IR spectrum of liquid water by employing path integral molecular dynamics (PIMD) and linearized semiclassical initial value representation (LSC-IVR) as described in the following paper: Jian Liu, William H. Miller, Francesco Paesani, Wei Zhang and David A. Case. J. Chem. Phys. 131, 164509 (2009). It is designed for those who are going to run molecular dynamics simulations with quantum dynamic methods, PIMD and LSC-IVR.
<urn:uuid:3b9f7f1d-acb6-4eb2-bb7f-4c7bba329bbf>
CC-MAIN-2017-26
http://ambermd.org/tutorials/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320476.39/warc/CC-MAIN-20170625083108-20170625103108-00298.warc.gz
en
0.879941
4,154
2.71875
3
In addition, BLOCker-Sequencing can be combined with our COLD-PCR technologies to provide ultra-sensitive DNA mutation detection allowing us to look for DNA mutations in a patient's blood sample rather than requiring a tumor sample. 3 percent of the Alzheimer's patients they studied had the mitochondrial DNA mutation that Wallace investigated, while only 0. If DNA mutations caused by excessive sunbathing can promote skin cancer in humans, how do plants manage to get away without harm? COLD-PCR preferentially amplifies genomic DNA mutations in comparison to normal, wild-type sequences. He wonders whether immobile or feeble sperm -- which normally don't stand much chance of penetrating the egg's inner sanctum -- might be more likely to harbor serious DNA mutations than their more vigorous counterparts. Transgenomic's SURVEYOR Nuclease is a proprietary mismatch-specific endonuclease that efficiently detects any mismatches in double-stranded DNA and cleaves at the site of DNA mutations Even more compelling, genetic analysis of mitochondria in the blood platelets of Alzheimer's patients reveals DNA mutations that appear capable of disrupting normal mitochondrial metabolism. 6, which allows researchers to quickly and easily find DNA mutations and Single Nucleotide Polymorphisms (SNPs) in their sequences. Discovery Services Team Employs High-Sensitivity Technologies to Explore Links Between Mitochondrial DNA Mutations Furthermore, he stated, "By combining PGI's technologies of pooling and CDCE with Beckman Coulter's genetic analysis platforms, rapid and cost effective automated discovery of DNA mutations of low frequency will be possible for large populations. The idea that DNA mutations cause disease is common knowledge today largely thanks to one study published in 1978 by Y. The fact that the intratumoral DNA mutations vary considerably (DNA analysis of the same tumor from different locations within the primary tumor) and intertumoral DNA analysis (DNA samples of the same type of tumor from different patients) also varies significantly should make it clear to the most casual observer that we are barking up the wrong tree.
<urn:uuid:d5b720c5-6797-4b01-a646-2a6773ac7573>
CC-MAIN-2017-26
http://legal-dictionary.thefreedictionary.com/DNA+mutations
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320476.39/warc/CC-MAIN-20170625083108-20170625103108-00298.warc.gz
en
0.890437
440
2.875
3
Wolves are located throughout the United States, Asia and Canada. Although their regions extend throughout most of the world, wolves are considered to be endangered. Gray wolves are the most commonly found wolves. They reside mostly in the Northern Hemisphere. In earlier days, gray wolves were found throughout the world, but out of fear, humans hunted and killed many of them, slowly decreasing their population. Red wolves are the rarest breed of the species. It is estimated that maybe 100 still exist in the wild, as of 2015. Red wolves can be found in the southeastern area of the United States. Arctic wolves are accustomed to colder climates. Their thick coats allow them to live in areas such as Alaska and Antarctica.
<urn:uuid:98643aa0-8a12-4e86-8ea5-f4a01ba94246>
CC-MAIN-2017-26
http://www.joyofanimals.com/where-do-wolves-live/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320476.39/warc/CC-MAIN-20170625083108-20170625103108-00298.warc.gz
en
0.978276
145
3.59375
4
Before choosing a reference style, please consult with your lecturer on which style and variation thereof should be used. The importance of referencing: All new knowledge is built on previous knowledge. In academic writing such as assignments, theses, research articles and reports it is standard practice to give an overview of the current knowledge about a topic and to provide evidence to support the points that you make. These ideas will form the foundation for your own arguments and will be integrated into your own work by: - quoting (using the exact words of another), - paraphrasing (using the ideas of another in your own words), - summarising (using the main points of another), - translating the original text and summarising or paraphrasing it. The ability to relate one's own work to existing knowledge is a skill that needs to be mastered by every student. This is done by acknowledging all the sources of information in the text of your assignments and providing a list of these sources at the end in the form of a bibliography or reference list in the specific style that is prescribed by your faculty. If this is not done correctly, it may give the impression that you are trying to pass off the work of another as your own and you may be accused of committing plagiarism which is a serious offence.
<urn:uuid:61251cad-0cff-40d9-a26a-a5af1830c053>
CC-MAIN-2017-26
http://www.library.up.ac.za/referencing/index.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320476.39/warc/CC-MAIN-20170625083108-20170625103108-00298.warc.gz
en
0.94799
265
3.234375
3
Eating better and exercising more are on most people’s lists of New Year’s resolutions. However, setting such broad goals often leads to failed “diets” and abandoned exercise plans. You’re much more likely to succeed if you take small steps to improve your health. Try these simple changes to take care of your body and enjoy better wellness in 2014. Eat More Plants Research shows that people who eat diets high in whole, fresh plant foods—including leafy green vegetables, starchy vegetables and fruits—are healthier than those who don’t. Plants provide a wide spectrum of vitamins and minerals as well as fiber and important health-promoting compounds known as phytonutrients that aren’t found in animal-based foods. Phytonutrients protect the body against everything from heart disease to cancer and work best when consumed in whole food forms. Try High Intensity Interval Training (HIIT) One of the most effective forms of exercise for increasing muscle and reducing fat, high intensity interval training involves working out at your peak heart rate for at least a minute followed by a lower intensity “recovery” period. These cardio bursts improve your body’s ability to utilize carbohydrates for energy as you exercise and burn fat when your workout is over. HIIT also stimulates the release of “feel good” chemicals calls endorphins, so you experience a positive boost in mood that makes your workout feel all the more worth the effort. Keep Your Mouth Clean You already know that regular brushing and flossing keeps your teeth healthy. Did you know that it can also lower your risk for other diseases such as heart disease and diabetes? The prevailing theory surrounding this phenomenon hinges on inflammation. When you don’t take care of your mouth, bacteria can build up, causing painful swelling in the gums. This inflammation can inhibit blood flow, potentially raising blood pressure and increasing the likelihood of arterial plaques detaching from blood vessel walls. The same inflammation also interferes with the body’s ability to adequately use insulin which may lead to higher blood sugar and increased resistance to insulin action at a cellular level. If you have more questions about your teeth, you can ask Southridge Dental, or find your local dentist. Get More Sleep Your body needs adequate sleep every night in order to rest and repair from the rigors of the day. More sleep means fewer stress hormones, so you’ll be calmer and more focused in the morning. Getting enough sleep also lowers your risk of both obesity and diabetes, since being well-rested ensures proper levels of the hormones that control hunger and satiety.
<urn:uuid:07385b9a-f759-408f-835e-33d9c0470577>
CC-MAIN-2017-26
https://harcourthealth.com/4-easy-healthy-ways-to-take-care-of-your-body-in-2014/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320476.39/warc/CC-MAIN-20170625083108-20170625103108-00298.warc.gz
en
0.941067
550
2.765625
3
For over 60 years, ethnic Karen and other ethnic farming communities in Eastern Burma have been under attack by the Burmese Army. This is because these jungle mountain lands are rich in gold, precious gems, hydro power and other sources of income. As a result, over 3,600 villages have been burned to the ground by the Burmese Army. Over 400,000 villagers have been displaced and over 800,000 forced laborers have been used for the profit of the Burmese government, military and business leaders. As a direct result of this aggression war orphans have been created. The Karen do not believe in offering these children up for adoption and so they take care of their own as they are able. Of all “the oppressed,” these are the most defenseless. Worldwide Impact Now works in collaboration with Karen civil society and health care leaders to modestly support these orphans’ needs based on donor support.
<urn:uuid:de72fab2-1650-41d3-b495-0ea3dfed6822>
CC-MAIN-2017-26
http://worldwide-impact-now.org/objective-burma/war-orphans/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320869.68/warc/CC-MAIN-20170626221252-20170627001252-00458.warc.gz
en
0.967946
188
2.53125
3
One will think that perfect teachers probably have exemplary lesson plans, numerous marked books with targets of high proficiency level, perfect authority in class and good management skills. However, looking at our common teenager’s life, great teachers are more than those qualities mentioned above. Real teachers are the ones whose lessons are always discussed every dinner tables, whose names are always remembered, and whose impact is never forgotten. Outstanding teachers are the ones who have deep knowledge and understanding of their student’s life. This happens when that teachers offer an after school session every single week. This occurs when the teachers perform student remediation in academics, coach extracurricular tasks, conduct school initiated intervention, do home visitation and initiate both formal and informal interviews. These tasks are beyond their DepEd duties but as teachers with big heart, they troubleshoot whatever incompetence or loopholes encountered to render meaningful service. There are lots of teaching issues they can address and this is the teacher’s opportunity to touch the lives of their students meaningfully. This is teaching more than what is required from our Curriculum Guide. “On task training”, “modelling” or “hands on” activities are more realistic for skills training. Real acquisition of life’s skills are indirectly taught here, acts of resourcefulness encountered will teach them how to tackle obstacles and therefore make them stronger. These are the outputs of perfect lessons, wherein an insecure teenager feels cared and nurtured. Another quality of an outstanding teacher is their good attitude. They are the ones whose personalities are so bright that the light bulbs inside fifty (50) heads are switched on in any way. These teachers always smile and can do the voices in books without feeling embarrassed. They don’t shout because the students are always motivated to work with them. They don’t criticize verbally as they see their student’s potential in every human aspect. They don’t complain because every challenge is their opportunity to show they are inspired. Such qualities of a teacher will dramatically improve student’s self-esteem. Students will be encouraged to go to school always and hear their teachers say “You’ve got it!” “Very Good” or “absolutely”. It could just be an enthusiastic nod and a proud glint of their eye. It sounds simple, but being told that you’ve achieved something means the world. Their ridiculous stress and efforts make their students appreciate because for them, these kind of teachers are like melodies that you can’t get out of your head.
<urn:uuid:5bd62588-e814-4fe3-9a67-6d58e595fdfe>
CC-MAIN-2017-26
https://mythirdchildhoney.wordpress.com/2017/02/27/great-teachers-are-like-melodies-of-your-heart/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320869.68/warc/CC-MAIN-20170626221252-20170627001252-00458.warc.gz
en
0.96156
531
2.640625
3
Good vs. Bad Fat Not to be the bearer of bad news, but the USA, UK, and even developing countries like China are becoming fat, fatter, and even obese. In the fall of 2008, Time Magazine reported that sixty-seven percent of Americans are now overweight or obese, and that ninety-six percent of the population cannot even recall the last time they had a salad, which is roughly 288,000,000 citizens. In the UK, two-thirds of men and nearly sixty percent of women are considered overweight, while China’s youth are 6.6 pounds heavier on average than their counterpart’s thirty years prior. Although the “F” word usually correlates to our burgeoning waistline, there is fat that we need. Below are examples of “Bad” and “Good” Fats. Trans Fat- Perhaps the biggest “fat” culprit of all, The Harvard School of Public Health, which offers an in-depth history of this man-made fat, describes that trans fat was first developed in the late 1800’s where chemists added hydrogen atoms to unsaturated fats by bubbling hydrogen gas through vegetable oil. Also noted, the process was found to be less expensive than solid animal fats and their composition allowed for easier transportation and broader use. Until the overwhelming, negative effects of this fat were revealed, trans fat, which is also referred to as partially hydrogenated oils, could be found in cookies, cakes, breakfast products, snack foods, and the list can go on and on. In 2006, it was mandated that trans fat be specifically labeled on packaged food. Since that time, there have been trans fat bans in restaurants throughout New York City, and the entire state of California. Health challenges arising from trans fat include: heart disease, cancer, and liver distress. Did you know we actually need fat to survive? This is why “Low or No Fat Diets” are a terrible idea. Yes, our bodies need fat, specifically those known as Essential Fatty Acids (EFA). Here is a list of EFA’s that you need to know and incorporate into your diet: Omega-3 and Omega-6- These omega fats cannot be created within the body, we actually need to consume foods that offer them: Omega-3- Ground flaxseed, flaxseed oil, linseed oil, walnut oil, green leafy vegetables (broccoli, kale, and spinach), legumes (mung, kidney, navy, pinto, and lima beans, peas and split peas) Omega-6- Leafy vegetables, seeds, nuts, grains, and vegetable oils (safflower, cotton, sesame) Monounsaturated- This fat reduces bad cholesterol levels in your blood and lowers your risk of heart disease and stroke. It also provides nutrients to help develop and maintain your body’s cells. Examples of monounsaturated fats include olive oil (make sure you buy organic), avocados, nuts, and seeds. We have a valuable service that will assist your regarding your personal fatty acid levels. The Bloodspot EFA profile measures key omega-3 and omega-6 fatty acids and provides solutions to help determine a proper balance. Furthermore, it identifies levels of inflammatory, eicosanoid balance, and zinc requirements. Harvard Nutrition Source Wikipedia Vegan Peace AmericanHeart.org, Boseley, Sarah. “Fears for the future as figures reveal Britons are fattest people in Europe.” 11 October 2006. guardian.co.uk. 11 November 2008. Park, Alice. “America’s Health Checkup,” Time. 1 December 2008: 41-51.
<urn:uuid:4db4faba-786b-4c4b-9896-174f104247fe>
CC-MAIN-2017-26
http://druglessdoctor.com/food/dr-bob-approved/oil/good-vs-bad-fat/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00538.warc.gz
en
0.94762
777
2.8125
3
Something unique to our company is our feral bee project. We believe that this project will help improve honeybee genetics and resistance to disease. Over time, we (the beekeeping industry) have selected and bred honeybees exclusively for honey production. In this process, we’ve lost some of the bees’ genetic resistance to disease. There is a movement in the industry to bring back some of these missing gene expressions that may still exist in isolated populations. We hope that doing so may re-introduce some of the bee’s natural abilities to overcome disease. We are still working through this process and hope you will join us in testing out this theory. Our preliminary results are promising. How it came about While horseback riding in Southern Utah several years ago, many miles from agriculture or population, Stan noticed a honeybee on a flower. Bees don’t forage farther from home than they have to, a mile or two. Considering the distance it was from town, the bees’ colony must have been a feral colony. It was too far away to be a recently-escaped swarm and must have been there for a long time. If bee swarms move about half a mile each year, this swarm could have been there for about 100 years. Since finding the first feral bee, we take yearly trips to Southern Utah in search of feral colonies. We look for bees along the way on local flowers, and now that word of the project is out, we look in locations referred by our customers. Once we find a feral colony, we take swarm traps and mating nucs to the area with virgin queens ready to mate. We let queens out of their nucs to find feral drone congregation areas and mate with feral drones. As a queen only mates once in her lifetime, with a dozen-ish drones, she will store sperm from the feral bees to lay eggs during her reign. We carefully remove all drones and drone cells from the mating nuc. Their removal ensures that the queen can only mate with feral drones, and that the feral gene pool will not be polluted. We raise daughter queens from these, and repeat the process of mating with feral drone bees over several generations. This way, our queens have a high proportion of feral bee genetics. We send these feral queens to California to our package producer, who uses them as breeding stock. Queens will mate with California drones, and then come back to Utah as queens for our packages and nucs. Photos Above: Left, A laying breeder queen. Right: A photo sent from our package suppler of the queen in California. Because some parts of Southern Utah have Africanized bees, we sent a sample of our bees to the Utah Ag department. The results was negative for Africanized genes. They are European. When you purchase a package or nuc from us, you will be getting one of these feral cross queens. People drive from all around the Western U.S. to try our bees. We offer them for local pickup in April and May, and do NOT ship bees at this time. We have noticed that feral bees have a generally calm disposition, which makes them good backyard bees. They are also acclimated to our Utah high-desert environment. Generally we’ve noticed that they reduce the size of their brood chamber in fall and winter. This makes them so they are more winter hardy, need less honey and pollen to get through the winter, and it disrupts the varroa mite (bee pest) life cycle. Our feral bee project has been a lot of fun. Please enjoy these photos and videos of our bee hunting adventures! Feral Bee Project Videos
<urn:uuid:b1ba9240-157f-44b0-bb70-19ce12cc4d0d>
CC-MAIN-2017-26
http://thehoneycompany.com/feral-bee-project/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00538.warc.gz
en
0.952358
759
2.953125
3
Question: Using Figure show the effect on consumer and producer surplus Using Figure, show the effect on consumer and producer surplus of the sugar import quota (relative to free trade). Also show the changes in consumer and producer surplus in RoW. Answer to relevant QuestionsSuppose that sugar imports are completely prohibited by the U.S. government in Figure. What will be the new equilibrium in the United States and RoW? Show the effect on consumer and producer surplus of the prohibition on ...If bad weather causes the supply of sugar in RoW to fall, how will this affect the U. S. market if the import quota described by Figure is in place? Does this explain why the U. S. and world prices can differ greatly from ...Suppose that the Berkeley City Council takes 10 years to award its first cable television franchise for the sake of ensuring that the price the franchised operator charges is as close to average cost as possible. Explain why ...Explain the determinants of a firm’s monopoly power. How can a firm have monopoly power if it is not the sole supplier of a product?In Figure, how will the profit realized by raising the price and reducing the entry fee be affected if Donald’s demand curve is only slightly greater than Martha’s (instead of twice as large, as shown in the graph)? In ... Post your question
<urn:uuid:ef5da659-1991-4423-b0d0-f52a80de47d7>
CC-MAIN-2017-26
http://www.solutioninn.com/using-figure-show-the-effect-on-consumer-and-producer-surplus
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00538.warc.gz
en
0.930287
278
2.703125
3
Known as “nature’s engineers”, the beavers, large nocturnal semi-aquatic rodents, are famous for their ability to build impressive dams known as beaver dams. These dams are built for serving a variety of purposes like keeping the beavers safe from predators like coyotes, bears and wolves and also for accessing food sources quickly and safely during winter time. Beavers also build lodges where they reside and water canals which they use to float their food and building materials. This ability of the beavers to adapt the environment based on their own needs is not seen anywhere else in the Animal Kingdom except, of course, in the case of man. 4. Dam Building Processes The Beaver Way Beavers building dams have often been photographed by researchers studying this interesting behavioral trait in these creatures. The beavers do not build dams in areas with fast, deep flowing rivers and streams but build dams in areas with shallow, slow flowing water to prevent the blockage of the underwater entrance to their lodges by ice in winter and also to create a water body with sufficient depth to hide themselves from their predators. The beavers first gnaw away at the barks of trees and branches near the river or stream to allow them to fall on the flowing water-body, blocking its flow and creating a diversion. This basic structure is then further strengthened by placing twigs, stones, leaves, branches, grasses, uprooted plants and anything else the beaver manages to find, on top of the base to build a superstructure. The beaver dams are usually 5 feet in height, a few feet to over 330 feet in length, and the water reservoir resulting from the dam is usually 1.2 to 1.8 meters in depth. 3. Ecological Significance Beaver dams have high ecological significance as they trigger the creation and development of stable, wetland ecosystems, one of the most productive ecosystems of the world, which serve as the home of rare and endangered flora and fauna species. The dams also divert water to the newly created ponds or reservoirs, thus, preventing flooding in areas downstream of the rivers where these dams are built. Beaver dams also protect land from soil erosion and act as natural filters for toxins like pesticides and silt, trapping these contaminants, blocking their flow downstream into major water bodies. 2. Negative Effects of Beaver Dams Though beaver dams are ecologically significant, they might act as a nuisance in some cases when crop fields and pastures are destroyed by the flooding of water from these dams. The moisture retained in the soil near beaver dams might also weaken the underground foundations of roads, bridges, and railway tracks. Thus, often a need has been felt to control the construction of the beaver dams, especially in human inhabited areas, near agricultural fields and pasture lands. The beavers might be relocated from these areas to new areas where dam building would not pose a threat to humans. Special low voltage electric fences or other barriers might also be installed in human inhabited lands and waterways to restrict beavers from entering such territories. 1. What Can We Learn From Beaver Architects? The small-scale dams of beavers can help us learn a lot about dam building, its advantages, and disadvantages. Beaver dams also allow us to study the gradual development of a rich wetland ecosystem in an area that was previously sparsely populated with wildlife. Unlike dams built by humans, most of which lead to widespread displacement of human populations and large-scale ecological damage, dams built by beavers have the exact opposite result of attracting species to inhabit the newly created wetlands. This fact definitely proves that nature’s own ways are always better than those of human beings.
<urn:uuid:6c10b925-9125-40cc-9c82-26fb93a07319>
CC-MAIN-2017-26
http://www.worldatlas.com/articles/how-do-beavers-build-dams.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00538.warc.gz
en
0.96657
753
3.8125
4
Thousands marched for peace in the central Italian city of Assisi on the fourth anniversary of the Sept 11, 2001 terror attacks in the United States as a memorial was unveiled in the northern Italian city of Padua. A ceremony was also held in Rome and Pope Benedict recalled the victims and called for a renunciation of hatred. Waving rainbow-colored peace flags, thousands of people from all over the world marched through the streets of Assisi, the town of Saint Francis. They carried banners calling for an end to poverty and hunger in the world. Many in the crowd called on world leaders meeting next week at the U.N. General Assembly in New York to take concrete actions to promote peace. "This demonstrator said he was taking part in the march to spread a positive culture of peace, which calls on all of us today to take on our responsibilities," one demonstrator said. Elsewhere in Italy, in the northern city of Padua, U.S. architect Daniel Libeskind unveiled a memorial to the victims of the September 11th attacks. The memorial, titled "Memory and Light," integrates a piece of the World Trade Center given to Italy by the United States. In a message, the Italian president, Carlo Azeglio Ciampi, said this work of art could be a symbol that increases awareness of the ideals of peace, democracy and solidarity, which must always enlighten humanity's path. A ceremony was held in Rome to mark the September 11th attacks and was attended by the new U.S. ambassador to Italy, Ronald Spogli. Lower house speaker Pier Ferdinando Casini said the attacks were a deep wound straight to the heart of the West. Mr. Casini said September 11th was followed by too much amnesia in the West. Many wept at the time but have forgotten too easily. He added: "We will continue in our commitment and battle against terrorism. We owe this to our children if we want to leave them a more united and just world." At his summer residence in the hills south of Rome, Pope Benedict also recalled the fourth anniversary of the attacks in the United States. He said today was a day to think of all the victims of terrorist violence in the world and to pray for an end to hatred. Pope Benedict said: "May God inspire men and women of goodwill everywhere to renounce hatred and build a world of justice, solidarity and peace." The pope also told the faithful that next Wednesday a summit of heads of state and government will begin in New York next Wednesday that will tackle important issues such as world peace, human rights, development, and the reform of the world body. The pope said the Vatican's Secretary of State, Cardinal Angelo Sodano, would be traveling to New York for the U.N. General Assembly. Pope Benedict said he hoped those attending the summit would be successful in putting in place efficient measures to respond to the urgent problems afflicting so many people, including poverty, illness and hunger.
<urn:uuid:fdf5d091-2667-4690-802f-8ffdbab62480>
CC-MAIN-2017-26
https://www.voanews.com/a/a-13-2005-09-11-voa35-67540277/285839.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00538.warc.gz
en
0.970806
613
2.53125
3
People who undergo traumatic experiences or endure stressful situations during their midlife years may be more likely to suffer from cognitive decline such as Alzheimer’s disease and memory loss as they age compared to their counterparts who manage to sail through life more smoothly, according to a study from Sweden that followed participants over decades, keeping track of their mental health. The study only included women, but the researchers say there is no reason to assume their observations wouldn’t be applicable to men as well, although, as other studies have shown, the sexes respond to stress differently in a number of ways. What is remarkable about the findings of this study is that stress-producing events, even if they had taken place long in the past, continued to have a negative impact on people’s mental well-being. Whether they could pinpoint the source to certain incidents like a divorce or the loss of loved ones, or whether they were exposed to high stress levels for extended periods of time, a.k.a. chronic stress, the potential for lasting health damages increased significantly as they grew older. There also seems to be an accumulative effect: For each additional stressor the participating women reported at the beginning of the study, their risk of later developing Alzheimers’s disease was raised by up to 20 percent. The researchers do not claim having found a cause and effect connection between stress and age-related mental decline, though. “Stress and stressors are just one of several risk factors. Not everyone who had stress or stressors developed dementia,” said Dr. Lena Johansson of the Institute of Neuroscience and Physiology at Gothenburg University in Mölndal, Sweden, one of the authors of the study report. However, what the study does show, she said, is that common stressors most of us encounter every day can have severe long-lasting physiological and psychological consequences. One possible explanation for this is that stress hormones like cortisol may cause harmful alterations in the brain. They can also affect blood pressure and blood sugar control. It is well known that high blood pressure can lead to heart disease, which is also suspected to play a role in mental decline. Even if all the connections are not yet fully understood, a larger picture seems to emerge that allows for a better identification of all the components. For now, however, our best options are to take as many preventive measures as we can, such as eating healthy and exercising plenty. Getting enough sleep and managing stress are equally as important. While there is no real protection against Alzheimer’s and memory loss available today, and perhaps never will be, we all can take steps to remain mentally active and alert. Lifelong learning and problem solving are most beneficial in this regard. Maintaining an active social life is also important. As far as stress is concerned, most of us can never escape that for good. Modern life is just that way. That means we must find solutions to deal with the inevitable and counterbalance the impact of stress as best as we can. There is no shortage on advice on how to go about this, including on this blog. What matters in the end is how successful we are in controlling our responses to the obstacles that are thrown in our way, not just for the moment but for the rest of our lives. If you liked this article, you may also enjoy reading “Staying Physically Healthy and Mentally Engaged Protects Best Against Dementia, New Studies Finds.” Timi Gustafson R.D. is a registered dietitian, newspaper columnist, blogger and author of the book “The Healthy Diner – How to Eat Right and Still Have Fun”®, which is available on her blog and at amazon.com. For more articles on nutrition, health and lifestyle, visit her blog, “Food and Health with Timi Gustafson R.D.” (www.timigustafson.com).
<urn:uuid:4c5e9448-02bc-4879-ae60-a96b485121fa>
CC-MAIN-2017-26
http://blog.seattlepi.com/timigustafsonrd/2013/10/09/stress-in-midlife-may-increase-risk-of-dementia-study-suggests/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323680.18/warc/CC-MAIN-20170628120308-20170628140308-00618.warc.gz
en
0.970272
815
3.140625
3
In the United States, about 50 percent of marriages end in divorce according to the Centers for Disease Control and Prevention. Adults who want to share their lives with others start new relationships, and many remarry. When divorced parents find new partners, step families are created. There is a special holiday that celebrates these family units: National Stepfamily Day. National Stepfamily Day The official date for National Stepfamily Day in the U.S., along with other countries who recognize it, is September 16. This day is designated as a time for step families to spend time together and for children to honor their stepparents. History of the Holiday The first National Stepfamily Day was founded by Christy Borgeld in 1997. The holiday was created in order to give step families a day to celebrate a strong family structure, give recognition to individual family members and instill a sense of responsibility in all extended family members. Communities across the U.S. celebrate the day at organized picnic gatherings. Families who cannot participate are encouraged to plan their own individual family activity on the date. Plan to do something special with your family on National Stepfamily Day this September 16th. Individual Family Activities If your local community doesn't have anything planned for this holiday, don't let that stop you from starting a new family tradition. It doesn't matter what you do, how much it costs or how extravagant you want to be; the key is spending time together. - Go get a professional family portrait taken. - Create a blended sand bottle that represents your family. Give each family member a package of colored sand (or make your own with sand and food coloring). Take turns pouring the sand into a tall glass bottle. The end result symbolizes how you are all individuals that create one beautiful, united family. - Set the dining room table with your finest linens and china. Serve each family member's favorite food for the meal. It doesn't matter if all the items go together or not! - Start a family cookbook by compiling everyone's favorite foods along with funny or nostalgic anecdotes about memories with the items. - Write letters to one another about what you love about each family member and what makes the person special. - Plan a family camp-out in the backyard or a slumber party indoors. If you're outside, look at the constellations, roast hot dogs and make s'mores. If you're indoors, pop popcorn, play board games and watch movies. - Plan outdoor family activities if the weather is nice. For years when the holiday falls on a weekday, plan a family fun day the weekend before or after the holiday. This holiday will be celebrated for the 15th time in 2011. Celebrate and honor your unique and special family by spending time together in any way that your family finds fun.
<urn:uuid:98f51cd7-5e8f-4e2f-939f-a4b220e5e17d>
CC-MAIN-2017-26
http://family.lovetoknow.com/stepfamily-day
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323680.18/warc/CC-MAIN-20170628120308-20170628140308-00618.warc.gz
en
0.944741
578
2.546875
3
Ancient Alasarna Archeological Zone of St. Theotitas (Divinity) The ancient municipality of Alasarniton spread to the western part of todays Kardamena, where excavations along the beach brought to light a sanctuary dedicated to the gos Apollo. In the sanctuary were many worship statues such as Zeus, Athena, Artemidos, Litous, Estias, Dioskouron, Ekatis, Afrodite and Hermes. At a close distance at the foot of the hill above the sanctuary there was an ancient theatre which belonged to the municipality of Alasarniton. The area continued to be used from the first Christian years up until the middle of the 7th century AD when continuous Arabic attacks pushed the residents to move to a safer place. Basilica of St. Theotitas (Divinity) It is situated in the archaeological zone of St Theotitas and has been built using marble and signs from the buildings of the ancient municipality of Alasarniton. Today the Basilica is deserted and in ruins. It is thought to be one of the first Christian buildings to be established on the island and dates to the 5th century AD Basilica Dorothea, Eftihiou & Presbiteriou Fotinou (6th – 7th Century) The Basilica is situated in the centre of the village and belongs to the three sided type of Basilica with a semi-circular arch in the east, an antenave and atrium in the west and the smaller outer buildings were on the northern side. In the interior many adult tombs were found while three children’s tombs were discovered in the southeast. The Baptistry, which is in the northern area had two fonts, one for children and one for adults. Finally, according to the signs found , the Archbishop dedicated and donated the beautiful mosaic floors of the sanctuary.
<urn:uuid:87023d1b-de2b-44ea-9866-b6990faaa773>
CC-MAIN-2017-26
https://www.kosinfo.gr/history/countryside-monuments/kardamena
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323889.3/warc/CC-MAIN-20170629070237-20170629090237-00698.warc.gz
en
0.964517
380
2.65625
3
Der Fuhrer, Adolf Hitler, dictator of Germany, burrowed away in a refurbished air-raid shelter, consumes a cyanide capsule, then shoots himself with a pistol, on this day in 1945, as his “1,000-year” Reich collapses above him. Hitler had repaired to his bunker on January 16, after deciding to remain in Berlin for the last great siege of the war. Fifty-five feet under the chancellery (Hitler’s headquarters as chancellor), the shelter contained 18 small rooms and was fully self-sufficient, with its own water and electrical supply. He left only rarely (once to decorate a squadron of Hitler Youth) and spent most of his time micromanaging what was left of German defenses and entertaining such guests as Hermann Goering, Heinrich Himmler, and Joachim von Ribbentrop. At his side were Eva Braun, whom he married only two days before their double suicide, and his dog, an Alsatian named Blondi. Warned by officers that the Russians were only a day or so from overtaking the chancellery and urged to escape to Berchtesgarden, a small town in the Bavarian Alps where Hitler owned a home, the dictator instead chose suicide. It is believed that both he and his wife swallowed cyanide capsules (which had been tested for their efficacy on his “beloved” dog and her pups). For good measure, he shot himself with his service pistol. The bodies of Hitler and Eva were cremated in the chancellery garden by the bunker survivors (as per Der Fuhrer’s orders) and reportedly later recovered in part by Russian troops. A German court finally officially declared Hitler dead, but not until 1956.
<urn:uuid:9f1f9252-8c9c-468e-9713-3158a830cb55>
CC-MAIN-2017-26
http://www.history.com/this-day-in-history/adolf-hitler-commits-suicide-in-his-underground-bunker
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00337.warc.gz
en
0.984262
369
2.984375
3
The Importance of Pet Dental Health February is Pet Dental Health Month. Pet oral health is possibly the most overlooked of pet parent responsibilities. Humans are told to brush and floss twice a day to avoid cavities and gum disease. Our diets are much more diverse and include a lot more sugar, so the recommendations aren’t quite so extensive for pets. Nonetheless, Pet Dental Health is important to ensure a long, healthy, happy life for your fur babies. The concerns for pets are similar to humans. Pets are at risk for cavities (tooth decay), tooth and gum bacterial infections, and other diseases that affect the mouth. Left unchecked, these can also lead to more serious health problems such as heart, lung, and kidney disease. It is generally agreed that your pet’s teeth and gums should be checked at least once a year by your veterinarian. They will check for early signs of a problem, make recommendations, and keep your pet’s mouth healthy. Pets have evolved to not need much dental care, but we have tipped the scales by providing them a lifestyle that alters their experience away from the wilds. To make up for those shifts, there are a few simple things we can do at home to promote oral health. Home Dental Care For almost no cost, you can gently brush your pets teeth. Use a human tooth brush or wrap your finger in gauze and hold it at a 45-degree angle to the teeth. Using small, circular motions, work in one area of the mouth at a time. The most tartar builds up on the tooth surfaces that touch the cheek, concentrate there and finish up with a downward stroke on the teeth to remove tartar. Dental Care Products Provide chew toys that help massage your pet’s gums and keep their teeth clean. Run Those Dogs likes Nylabone. One bone can keep your dog busy for hours. With lots of choices and sizes, you’re sure to find the right one for your dog. Another option is a frozen marrow bone. Also known as a soup bone, this old school treat is so good for a dog’s teeth. Be educated when choosing. Cooked bones can splinter, or others are not good for your dog. Most grocery stores have frozen marrow bones for a fraction of the cost that you would pay at the pet health food stores. If you don’t see them in the frozen meat section then you can ask the butcher of your local grocery store. They’ll often cut some special for you when they know it’s for your dog. There are also a number of products on the market to aid in cat and dog home dental care. Do your research to decide which is right for your budget, pet, and practicality. Here’s an overview by the American Veterinary Dental College for cats and for dogs. Veterinary Dental Cleanings Because of the anesthetic risks and costs, there is disagreement about how often pets should be put under general anesthesia for cleanings and more thorough check ups. The American Animal Hospital Association has published Dental Care Guidelines for Cats and Dogs. You can get more information from the American Veterinary Medical Association to help you decide on a plan that’s right for you and your pets. Signs That Your Pet Might Need a Check Up Pets’ breath isn’t normally great smelling, but if it becomes particularly offensive, it could be a sign of a serious oral problem. Be on the look out for these other signs that warrant a trip to the veterinarian: - bad breath - broken or loose teeth - extra teeth or retained baby teeth - teeth that are discolored or covered in tartar - abnormal chewing, excessive drooling, or dropping food from the mouth - reduced appetite or refusal to eat - pain in or around the mouth - bleeding from the mouth - swelling in the areas surrounding the mouth - tumors on the gums - cysts beneath the tongue Try to choose a plan your pet will tolerate and that has the best chance for you to follow through. Some effort on your part is better than none at all. Try not to give up. It may take several attempts on your part before your pet gets used to something new. You might also need to try more than one approach before you find the one that’s right for your family.
<urn:uuid:3f6c8ef4-fe78-4e5f-a8e1-1ea2348d1bb3>
CC-MAIN-2017-26
http://www.runthosedogs.com/pet-dental-health-is-important/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00337.warc.gz
en
0.947777
915
2.765625
3
Pre-Exposure Prophylaxis (PrEP) for HIV Prevention: Promoting Safe and Effective Use in the United States Developing Formal U.S. Public Health Service Guidelines on PrEP Use CDC is the lead federal agency in developing U.S. Public Health Service guidelines, in collaboration with other federal health agencies. The guidelines will be based on a full review of trial data and other research, and will incorporate input from providers, HIV prevention partners, and affected communities. The guidelines will help ensure both physicians and MSM have accurate information to guide decisions about the use of PrEP. Topics to be addressed in the guidelines will include: Maximizing the Potential Benefits of PrEP in the U.S. The iPrEx trial findings offer a new tool to help combat HIV among MSM, one of the hardest hit populations in the U.S. and many areas of the world. We will have to carefully consider how to most effectively use this tool in combination with other prevention strategies to reduce the continuing toll of HIV and AIDS. There are a significant number of HIV-positive individuals in the U.S. and around the world who do not have access to antiretroviral drugs to treat their infection, and we know that treatment not only benefits infected individuals, but can also reduce transmission of HIV to others. But, we also know that treatment alone will not end the epidemic. With 2.7 million people becoming infected annually worldwide, including approximately 56,000 in the U.S., we must capitalize on every available prevention tool. Ultimately, the impact of PrEP on the U.S. HIV epidemic will depend on difficult decisions and many things that remain unknown, including the feasibility, cost, and impact of this strategy in real-world settings. Available data suggest that PrEP, used strategically and effectively among MSM, could have a positive impact on the U.S. epidemic and be cost-effective, but only if certain conditions are met, including: CDC's Next Steps CDC will be implementing a range of activities to promote the effective and strategic use of PrEP in the U.S. In addition to developing public health guidelines, CDC will: CDC has also identified other activities that could help address remaining research questions and is currently exploring all avenues to identify resources to support them. Key among these is the need for demonstration projects in clinics serving MSM to assess feasibility, acceptability, and the impact of PrEP in real-world settings. It will also be critical for public and private sector partners to begin to collectively address the significant financial barriers that may place PrEP out of reach for many MSM at highest risk for HIV infection. Given the urgency of addressing the HIV epidemic among gay and bisexual men in this nation, CDC is working to maximize the impact of this important new intervention in combination with all available HIV prevention strategies. For more information on PrEP and HIV prevention, please visit www.cdc.gov/hiv/prep. This article was provided by U.S. Centers for Disease Control and Prevention. Visit the CDC's website to find out more about their activities, publications and services. Add Your Comment: Internet search results. Be careful when providing personal information! Before adding your comment, please read TheBody.com's Comment Policy.)
<urn:uuid:6f3e5641-1ad8-4d3c-b843-128b8e7cb17e>
CC-MAIN-2017-26
http://www.thebody.com/content/art59861.html?getPage=2
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00337.warc.gz
en
0.93855
676
3.109375
3
In response to concerns about the adverse consequences of rapid population growth, family planning programs have been implemented in many developing countries. The aim of the present study is to assess the impact of this programmatic approach on long-range population growth. The result of a new and hypothetical population projection indicates that in the absence of family planning programs the population of the developing world could be expected to reach 14.6 billion in the year 2100 instead of the 10 billion that is currently projected by the World Bank. Despite the apparent success of existing interventions, fertility control is far from complete, as many women continue to bear unwanted births. To assess the impact of this unintended childbearing a second hypothetical projection is made. This document may be accessible through your organisation or institution. If not, you may have to purchase access. Alternatively, the British Library for Development Studies provide a document delivery service.DOWNLOAD [1.46 KB]
<urn:uuid:9459ce0d-2b6d-4419-9bae-785a369a2267>
CC-MAIN-2017-26
http://www.heart-resources.org/doc_lib/the-demographic-impact-of-family-planning-programs/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320174.58/warc/CC-MAIN-20170623202724-20170623222724-00418.warc.gz
en
0.928167
182
2.609375
3
Hemorrhoids, often called piles, are swollen and inflamed veins in and around the anus and lower rectum. They are much like varicose veins you might see on a person’s legs. Hemorrhoids are a very common health problem. Hemorrhoids cause serious problems in about 4% (over 10 million) of people in the United States. Prevalence of hemorrhoidal disease increases with age until the seventh decade and then diminishes slightly. Hemorrhoids also increase in pregnancy due to direct pressure on the rectal veins. Causes of hemorrhoidsHemorrhoids are caused by too much pressure in the rectum, forcing blood to stretch and swell the blood vessels. People whose parents had hemorrhoids may be more likely to get them. Most common causes of hemorrhoids: straining with bowel movements (from constipation or hard stools) sitting on the toilet for a long time pressure of the fetus in pregnant women SymptomsSymptoms of hemorrhoids include: pain around the anus and rectum irritation and itching bulge or lump at the anus</ul> Excessive straining, rubbing or cleaning the anus may worsen symptoms. In most cases, the symptoms of hemorrhoids will only last a few days. Not every one with hemorrhoids will experience symptoms. Types of hemorrhoidsThe type of hemorrhoid depends on where it occurs. There are two types of hemorrhoids: internal and external. External hemorrhoids develop around the rim of the anus. External hemorrhoids cause most of the symptoms associated with hemorrhoids (pain, burning, and itching) because the skin around them is very sensitive. If an external hemorrhoid becomes strangulated (cut off from blood supply), a clot can form in it and become an excruciatingly painful thrombosed hemorrhoid. Thrombosis of an external hemorrhoid causes an anal lump that is very painful and often requires medical attention. Internal hemorrhoids develop inside the passageway of the anus. Internal hemorrhoids are often present without causing any discomfort or even awareness of their presence. Internal hemorrhoids are usually painless, although they sometimes cause discomfort and bleeding if a hard stool rubs against them during a bowel movement. Internal hemorrhoids also may prolapse outside the anus, where they appear as small, grape-like masses. These can be painful. A prolapsed hemorrhoid will go back inside the rectum on its own, or you can gently press it back into the anus with your fingertips. Internal hemorrhoids are classified by the degree of tissue prolapse into the anal canal: First-degree – hemorrhoids that bleed but do not prolapse Second-degree – hemorrhoids that prolapse with straining or defecating and retract on their own Third-degree – hemorrhoids that prolapse and require manual reduction Fourth-degree – hemorrhoids that chronically prolapse and, if reducible, fall out again</ul> Mixed hemorrhoids are confluent internal and external hemorrhoids. PreventionYou often can prevent hemorrhoids by preventing constipation and straining to have bowel movements. Some of the following diet and lifestyle changes may help you to soften the stool, and avoid the straining that can lead to hemorrhoids: Include more fiber in your diet – fresh fruits, leafy vegetables, and whole-grain breads and cereals are good sources of fiber. Drink adequate amounts of fluids – 6 to 8 glasses of water daily. Do not strain or sit on the toilet for long periods of time. Straining for more than 5 minutes can be harmful. Try not to stay on the toilet any longer than necessary. Use a soothing wipe, such as baby wipes or witch hazel pads, to clean after each bowel movement and to ease the pain. If your main job activity is seated, always stand or walk during your breaks. Make it a point to stand and walk at least 5 minutes every hour and try to shift frequently in your chair to avoid direct rectal pressure. Avoid heavy lifting, which puts pressure on the anal opening.</ul> TreatmentA number of surgical methods may be used to remove or reduce the size of hemorrhoids: Rubber band ligation – A rubber band is placed around the base of the hemorrhoid inside the rectum. The band cuts off circulation, and the hemorrhoid withers away within a few days. Sclerotherapy is one of the oldest forms of treatment. A chemical solution is injected directly into the hemorrhoid or the area around it. This solution causes a local reaction that interferes with blood flow inside the hemorrhoid, making the hemorrhoid shrink. Laser or electro-coagulation techniques – Both techniques use special devices to burn hemorrhoidal tissue. Cryotherapy uses cold temperatures to obliterate the veins and cause inflammation and scarring. It is more time consuming, associated with more posttreatment pain, and is less effective than other treatments. Therefore, this procedure is not commonly used. Hemorrhoidectomy – Occasionally, extensive or severe internal or external hemorrhoids may require removal by surgery known as hemorrhoidectomy. This is the best method for permanent removal of hemorrhoids. Hemorrhoidectomy is the treatment for severe third-degree and fourth-degree hemorrhoids.</ul> Sclerotherapy, ligation, and heat coagulation are all good options for the treatment of hemorrhoids. Neo Healar – herbal remedy for hemorrhoid(http://www.originaldrugs.com/neo-healar.shtml-Neo Healar) is a 100% herbal product that is composed on four natural occurring plants: Lupinus Albus, Vateria Indica, Mentha Piperita and Aloe Vera. Neo Healar is available in two forms: 30 g ointment and suppositories (in 10s).
<urn:uuid:13cdfa92-5a36-4c78-b305-9acee92ec744>
CC-MAIN-2017-26
http://centr-ginmed.ru/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320264.42/warc/CC-MAIN-20170624152159-20170624172159-00498.warc.gz
en
0.920816
1,220
3.3125
3
Sexually transmitted diseases are a common affliction among adults, and can be dangerous if left untreated. Among STDs, molluscum contagiosum is one of the less severe; however, treatment is still essential. Molluscum contagiosum (MCV) is an STD caused by a poxvirus, a family of viruses that date back hundreds of years. MCV is spread through skin-to-skin contact, and is therefore easily transmitted through sexual intercourse. Is molluscum contagiosum an STD? Molluscum contagiosum is considered an STD and should be treated. Here are some key facts that you should know about MCV and how it can affect you: - Molluscum contagiosum is a highly-contagious STD – Although more common in children, MCV can be transmitted between adults, and is most often transmitted in adults through sexual intercourse. If you or your partner has MCV lesions, then you are at risk of contracting the virus. - MCV is relatively painless – Unlike other STDs, molluscum contagiosum typically does not cause any pain. The lesions can; however, become infected if left untreated. - Without treatment, molluscum contagiosum will go away…in a few years – If you’re thinking about letting MCV “run its course,” think again. Lesions can take up to four years to heal on their own, and you are highly contagious as long as you have lesions on your skin (view images of Molluscum Contagiosum). - Molluscum contagiosum is an external STD – This means that MCV lesions will only appear on the skin – outside your body. If you have symptoms that are not on the skin, you should consult your doctor, as these are likely caused by another source. - MCV is rarely seen in healthy adults – While adults can contract molluscum contagiosum through sexual activity, it is rarely seen in adults who are healthy. Instead, MCV is typically found in adults with compromised immune systems (from cancer, HIV/AIDS or other medical afflictions). - Molluscum contagiosum can be spotted – If you believe you may have MCV, you should see your doctor. You can identify them fairly well from home; however, by looking for rounded, pink-to-skin colored bumps or lesions that have a small indention in the middle. Identifying these lesions, which are typically 2 to 5mm in diameter, is often an indicator of molluscum contagiosum. - Several treatment options are available – Traditional treatments include cutting, freezing or burning lesions with acid; however, there are natural remedies for molluscum contagiosum available that offer a painless, more discreet method for treating MCV.
<urn:uuid:db09128a-8c50-49da-9d2c-8e0c6e54809a>
CC-MAIN-2017-26
https://molluscumrx.com/is-molluscum-contagiosum-an-std/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320679.64/warc/CC-MAIN-20170626050425-20170626070425-00658.warc.gz
en
0.958522
594
2.765625
3
I was interested to see an article in CCT news proclaim “a combination of biometrics and wearable technology is inevitable” and that it is “expected to be the most disruptive technology in the coming decade”. I’ll not go into what biometrics and wearable technology are; I’m sure you’re well aware. But what new security possibilities might emerge from combining these two technologies? While the potential for using biometrics for authentication on smartphones and wearable devices is being evaluated, the potential use of wearables for biometric authentication is still being studied by researchers. In one example, students in Israel have already developed a way to authenticate handwritten signatures using a wearable device’s accelerometer and gyroscope. According to Biometric Update The prototype can currently identify signatures with 95% accuracy. In another example, an article in the New Scientist shows how wearables could use accelerometers to identify an individual by picking up their “gait fingerprint”– the unique way a person walks. Stephan Sigg, an assistant professor in the Department of Communications and Networking at Aalto University in Finland explained that The authentication key is in your gait. The research, which Biometric Update describes in a little more detail, found that wearables worn by the same individual recorded gait fingerprints that were 82% similar, whereas wearables worn by different individuals recorded gait fingerprints that were 50% similar. In this instance If two devices pick up a gait fingerprint that is similar enough, they know they are being worn by the same individual and can automatically connect to each other. As René Mayrhofer from Johannes Kepler University in Linz, Austria told Biometric Update, “gait authentication is not as secure as fingerprint or iris scanning”. Gait fingerprinting is just one form of behavioural biometric possibilities. Other include keystroke dynamics (which analyses your typing rhythm), mouse use characteristics and voice identification (which analyses your vocal characteristics). Being able to authenticate via your unique way of walking or how you waggle a mouse is probably some time away, but with no apparent slowdown in password breaches, the race to find better and more secure ways to log in to services is very much a priority.Follow @NakedSecurity
<urn:uuid:4a744ccf-e0af-4804-87d5-4f664a290f81>
CC-MAIN-2017-26
https://nakedsecurity.sophos.com/2017/05/19/walk-this-way-how-you-roll-could-become-how-you-log-in/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320679.64/warc/CC-MAIN-20170626050425-20170626070425-00658.warc.gz
en
0.939856
477
2.59375
3
Origin of the Name Gillespie The origin of the name Gillespie was found in the allfamilycrests.com archives. The name Gillespie is derived from the Gaelic name 'Mac Giolla Easpuig' which translates as 'devotee of the bishop'. Almost all the Gillespies to be found in the Annals, Fiants, and diocesan histories and other records are Ulster men. Mac Giolla Easpuig was Chief of Aeilabhra up to the end of the twelfth century, later the family appearing as erenaghs of Kilraine. The leader of the Scots that slayed Shane O'Neill in 1567 was William Gillespie. The first recorded person of the name in Scotland was Ewan filius Gillaspeck who witnessed a charter by Alwin, Earl of Levenax, in the year 1175. The Fiants and Petty's Census indicate that the name was chiefly found in north Ulster in the sixteenth and seventeenth centuries, while in modern times the birth indexes show that the name is still numerous in the same Northern counties. Sir Robert Rollo Gillespie, 1766-1814, born in County Down, had a distinguished career as a soldier in India, where he was killed in action. Occasional variants of the name include Clusby and Glashby in County Louth, Clasby in County Galway and Bishop in County Donegal. The Gillespie coat of arms came into existence centuries ago. The process of creating coats of arms (also often called family crests) began in the eleventh century although a form of Proto-Heraldry may have existed in some countries prior to this. The new art of Heraldry made it possible for families and even individual family members to have their very own coat of arms, including all Gillespie descendants.
<urn:uuid:392d23e9-48d5-40d3-8afb-b8f22b2ee86d>
CC-MAIN-2017-26
http://www.allfamilycrests.com/g/gillespie-family-crest-coat-of-arms.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320887.15/warc/CC-MAIN-20170627013832-20170627033832-00018.warc.gz
en
0.957632
375
3
3
Send the link below via email or IMCopy Present to your audienceStart remote presentation - Invited audience members will follow you as you navigate and present - People invited to a presentation do not need a Prezi account - This link expires 10 minutes after you close the presentation - A maximum of 30 users can follow your presentation - Learn more about this feature in our knowledge base article Do you really want to delete this prezi? Neither you, nor the coeditors you shared it with will be able to recover it again. Make your likes visible on Facebook? Connect your Facebook account to Prezi and let your likes appear on your timeline. You can change this under Settings & Account at any time. Iago and Sexuality in Othello Transcript of Iago and Sexuality in Othello Sexuality and Interpersonal Relationships Then what can be inferred about Iago's character, motives, as well as his internal conflicts? But what do we know about Iago himself? - How Iago sees himself in relation to others Othello is one of Shakespeare's greatest works. It tells the tragic story of Othello, "the Moor," just recently married to Desdemona. The story's narrator and antagonist, Iago, sets about manipulating Othello and his peers in ways that end disastrously in true Shakespearian fashion. Although Iago is a rather guarded character, the audience can certainly infer quite a lot about his personality from his relationship with others. As a "Mind Reader": As a playwright Throughout the play, Iago is in a constant state thinking and plotting: According to Paul Celafu, this is because Iago is attempting to predict the actions and motives of his peers, being a "mind reader," so to speak. He never shrinks from making bold assumptions about others, such as Othello or Cassio, because he is certain he is right. However, Celafu argues that in some ways, Iago is a victim to his own mind. He states that, "'Iago's most remarkable gift is his insight into human nature.' Cognitively overloaded, Iago is as much the victim as he is the exploiter of the imagined intentions and beliefs of those around him" (265-66). Through his constant state of over-thinking and predicting others' - namely Othello's and Cassio's - thoughts, he has to make his peers out to be caricatures in his mind rather than accept them as three-dimensional human beings. Gradually, Iago develops a sort of perverse fascination with watching his "plot" play out. Iago consistently distances himself from the events of the play unless dealing with Othello directly. Celafu quotes Calderwood, stating that this is because, "Iago is 'an amateur of tragedy in real life [...] staging scenes and manipulating people, in creating illusions, [and] in improvising to meet occasions.' Iago is indeed a playwright" (Celafu 268). As said previously, Iago creates various caricatures of his three-dimensional peers in order for his imagined "play" to make sense in his head. Othello is a brutish, neglectful villain who has made Iago into a cuckold - whether or not the latter is an actual motive will be argued later - while Desdemona, like most of the female "characters" in Iago's mind, a heartless, wanton woman whose nature is built on selfishness, laziness, and deceit (Arogundade). [to Cassio of Emilia] "Sir, would she give you so much of her lips of her tongue she oft bestows on me. You'll have enough." [to Desdemona of women] "You rise to play and go to bed to work" (Act II, Scene I). However carefully Iago is to stay a distance away (as a playwright should from his work), he relinquishes his duty as playwright when it comes to dealing with Othello face-to-face. It's in those situations that Iago plunges himself into the middle of the plot, inserting himself as a character. Much of Iago's excessive over-thinking stems from his own anxiety and lack of internal understanding. Celafu argues that Iago's "mind reading is a psychological handicap" (266). Iago constant need to track his "characters," Celafu states, has much to do with his inability to track his own mind." Iago doesn't understand himself or his own motives, so he compensates by attempting to predict the actions and thoughts of Othello, Cassio, and Desdemona. Because of his own internal anxiety, Iago exacts his revenge by bringing Othello to his level and making him question and attempt to predict the motives and actions of others just as Iago does (Celafu 277). Edward Pechter states that, "Iago's obsessive mind reading derives from his conviction that he is diminished by the mere existence of others" (295). One could even go so far as to say that his assumptions about others reflect how he sees himself. Despite his self-assured persona, Iago thinks quite lowly of himself compared to Othello or Cassio. For instance, in Act V, Scene I, he states, "[Cassio] hath a daily beauty in his life that makes me ugly." Iago is undeniably jealous of Othello as well because of his character - rather than simply physical appeal as with Cassio - Othello is a man of great importance and "fullness of being," something Iago lacks and pines for, which is in part why Othello is Iago's primary target(Celafu 270). Despite Iago's hatred for "the Moor," Iago takes much stock in the latter's opinion of him, which is why he listed Cassio's promotion over himself as a possible motive. Iago's mistrust of others' seems to stem from a low opinion of himself in comparison to others. What are Iago's motives throughout the play? Iago's Sexuality and His Relationship with Othello One of the main criticisms of Iago's actions is that he lacks a motivation. During the first act, Iago reveals that his motivation for betraying Othello is that he promoted Cassio to lieutenant over him; however, it's not long after that he backtracks and says that his motivation is instead that he believes Othello has slept with his wife, Emilia, as shown here Despite his attempts to convince his audience of his motives, however, the viewer can't help but take note of his indecisiveness. Is it that Iago simply doesn't have a motive to begin with? Or is it that Iago has a motive he refuses to reveal to the audience and acknowledge himself (besides petty jealousy)? Many critics believe it is the latter. Homoeroticism and Obsession Iago's obsession with destroying Othello seems to be inspired by an unusual love/hate relationship. Celafu argues that Iago is sadomasochistic in his relationship with Othello. There are times within the play, and specifically in the 1995 film adaption, where Iago's words and actions contradict each other. As the events unfold, Iago's actions indicate that he desires Othello through homoerotic undertones he himself may not even realize are there and through implications brought up by other characters. Throughout the play, Iago's actions are supposedly inspired by his hatred for Othello; yet when he fulfills his first supposed motivation (becoming lieutenant), he doesn't discontinue his plan for revenge. At the same time however, he never fulfills the second motivation, which is sleeping with Desdemona after Othello supposedly cuckolded Iago - "wife for a wife." Both of these factors indicate that there is a deeper motivation for Iago - one that drives him to keep going. As Robert Matz states (quoted by Celafu), "It is indeed Othello [...] who is the primary object of Iago's desire" (Celafu 283). Whether or not Iago has acknowledged and realized his desire for Othello is subjective, but the above factors point to this being Iago's true motivation. "What handkerchief? Why, that the Moor first gave to Desdemona; That which so often you did bid me steal." This scene, both in the play and film adaption, serves two purposes: The first being that it implies that Iago has been obsessing over Othello for some time, quite possibly before the events of the play, as implied by Emilia (Cefalu 284). Its second purpose is that it is one of the first indicators of not only Iago's desire for Othello but also his desire to be desired by Othello. The handkerchief was given to Desdemona by Othello as a symbol of his desire and love for her. The fact that Iago wants this symbol for himself is telling of his true feelings. The scene from the film adaption, as seen above, seems to indicate to this same conclusion as well. The act of Emilia dragging the handkerchief along Iago's face as if to tease him while reciting the above quote only further supports this argument. Interestingly enough, this is also the first time in the film the audience sees Iago display any signs of sexual desire, and this only comes about through obtaining a symbol of Othello's desire The second indication of Iago's desire for Othello comes in Act III, scene III when Othello is demanding proof from Iago that Cassio is having an affair with Desdemona. Iago then fabricates a story how, one night, Cassio awoke Iago whilst having an erotic dream: "In sleep I heard him say 'Sweet Desdemona, Let us be wary, let us hide our loves;' and then kiss me hard[;] then laid his leg over my thigh, and sigh'd, and kiss'd[.]" Once again, Iago hints that he wishes to be in Desdemona's places, and that he himself desires Othello. Although Iago may or may not notice the homoerotic implications of his story, it supports the idea that Iago wishes to be the object of Othello's desire and jealousy (Cefalu 283). Sexual Anxiety and Sin As Ben Saunders argues, many times, Iago refers to physical illness in conjunction with sexual desire, specifically desire acted upon (155). For instance, in Act II, Scene I, Iago states that he imagines Desdemona acting on her own sexual desire as, "her delicate tenderness will find itself abused, begin to heave the gorge..." Saunders argues that this indicates one of many instances through the play where Iago becomes disgusted at the idea of excessive desire acted on. This indicates that Iago has an unhealthy understanding of sexual desire. Later on in the same scene, Iago says of Othello, "For that I do suspect the lusty Moor hath leaped into my seat, the thought whereof doth like a poisonous mineral gnaw my inwards" (Pechter 298). In many ways, Iago seems to be experiencing what Saunders calls "sexual anxiety." Although the exact reason why Iago has such an unhealthy understanding of sexuality and desire is unknown, a possibility may be that he believes it to be a sin (Saunders 157). He typically sees sex as a tool for manipulation or revenge, such as his original plan to cuckold Othello, "wife for wife," or the film adaption's "handkerchief" scene. Outside of that, it seems to be either a sin or an excess worthy of disgust. Finally, a last indicator of Iago's true motives is in Act III, Scene III. A kneeling Othello vows to take revenge on Desdemona for cuckolding him. Iago then knees in front of him, taking a vow himself of loyalty and devotion to Othello. This is seen by many as a sort of perverse "marriage" ceremony, even going so far as following the same ritual. As one marriage is "ending," with Othello vowing to kill Desdemona, another "marriage" is forming between Iago and Othello (Arogundade). This scene differs from most of Iago's scenes in that it seems to be one of the few where he expresses genuine feelings with little to no deceptive undertones or asides to the audience. Furthermore, the film adaption of this scene also indicates the same notion. Throughout the film, Kenneth Branagh (Iago) periodically looks to the camera while acting in a persona as an indication to his falsehood; he'll usually do this with a scoff or a grimace. During this scene, however, there is no such look. He looks to the camera for a split second while embracing Othello as if to do one of the above actions but he looks away before crying out, "I am your own forever." This seems to a clear-cut confirmation of Iago's (perverse) love and desire for Othello. Arogundade, Ben. "Homosexuality in William Shakespeare's Story, Othello: Is Iago Gay?" /Arogundade./ 3 Dec. 2013. Web. Cefalu, Paul. "The Burden of Mind Readng in Shakespeare's Othello: A Cognitive and Psychoanalytic Approach to Iago's Theory of Mind." /Shakespeare Quarterly/ Fall 2013: 265-294. Print. /Othello./ Dir. Oliver Parker. Perf. Kenneth Branagh, Laurence Fishburne. 1995. Film. Pechter, Edward. "'Iago's Theory of Mind': A Response to Paul Cefalu." /Shakespeare Quarterly/ Fall 2013: 295-300. Print. Saunders, Ben. "Iago's Clyster: Purgation, Anality, and the Civilizing Process." /Shakespeare Quarterly/ Summer 2004: 148-176. Print.
<urn:uuid:a0c9ccab-085a-42cf-a246-eb27336955d9>
CC-MAIN-2017-26
https://prezi.com/jjbzj8_3j_hj/iago-and-sexuality-in-othello/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320887.15/warc/CC-MAIN-20170627013832-20170627033832-00018.warc.gz
en
0.967828
2,998
2.8125
3
The United States and Russia are locked in a fundamental dispute over how to counter the growing threat of cyberwar attacks that could wreak havoc on computer systems and the Internet. Both nations agree that cyberspace is an emerging battleground. The two sides are expected to address the subject when President Obama visits Russia next week and at the General Assembly of the United Nations in November, according to a senior State Department official. But there the agreement ends. Russia favors an international treaty along the lines of those negotiated for chemical weapons and has pushed for that approach at a series of meetings this year and in public statements by a high-ranking official. The United States argues that a treaty is unnecessary. It instead advocates improved cooperation among international law enforcement groups. If these groups cooperate to make cyberspace more secure against criminal intrusions, their work will also make cyberspace more secure against military campaigns, American officials say.Continue reading the main story “We really believe it’s defense, defense, defense,” said the State Department official, who asked not to be identified because authorization had not been given to speak on the record. “They want to constrain offense. We needed to be able to criminalize these horrible 50,000 attacks we were getting a day.” Any agreement on cyberspace presents special difficulties because the matter touches on issues like censorship of the Internet, sovereignty and rogue actors who might not be subject to a treaty. United States officials say the disagreement over approach has hindered international law enforcement cooperation, particularly given that a significant proportion of the attacks against American government targets are coming from China and Russia. And from the Russian perspective, the absence of a treaty is permitting a kind of arms race with potentially dangerous consequences. Officials around the world recognize the need to deal with the growing threat of cyberwar. Many countries, including the United States, are developing weapons for it, like “logic bombs” that can be hidden in computers to halt them at crucial times or damage circuitry; “botnets” that can disable or spy on Web sites and networks; or microwave radiation devices that can burn out computer circuits miles away. The Pentagon is planning to create a military command to prepare for both defense and offensive computer warfare. And last month, President Obama released his cybersecurity strategy and said he would appoint a “cybersecurity coordinator” to lead efforts to protect government computers, the air traffic control system and other essential systems. The administration also emphasizes the benefits of building international cooperation. The Russian and American approaches — a treaty and a law enforcement agreement — are not necessarily incompatible. But they represent different philosophical approaches. In a speech on March 18, Vladislav P. Sherstyuk, a deputy secretary of the Russian Security Council, a powerful body advising the president on national security, laid out what he described as Russia’s bedrock positions on disarmament in cyberspace. Russia’s proposed treaty would ban a country from secretly embedding malicious codes or circuitry that could be later activated from afar in the event of war. Other Russian proposals include the application of humanitarian laws banning attacks on noncombatants and a ban on deception in operations in cyberspace — an attempt to deal with the challenge of anonymous attacks. The Russians have also called for broader international government oversight of the Internet. But American officials are particularly resistant to agreements that would allow governments to censor the Internet, saying they would provide cover for totalitarian regimes. These officials also worry that a treaty would be ineffective because it can be almost impossible to determine if an Internet attack originated from a government, a hacker loyal to that government, or a rogue acting independently. The unique challenge of cyberspace is that governments can carry out deceptive attacks to which they cannot be linked, said Herbert Lin, director of a study by the National Research Council, a private, nonprofit organization, on the development of cyberweapons. This challenge became apparent in 2001, after a Navy P-3 surveillance plane collided with a Chinese fighter plane, said Linton Wells II, a former high-ranking Pentagon official who now teaches at the National Defense University. The collision was followed by a huge increase in attacks on United States government computer targets from sources that could not be identified, he said. Similarly, after computer attacks in Estonia in April 2007 and in the nation of Georgia last August, the Russian government denied involvement and independent observers said the attacks could have been carried out by nationalist sympathizers or by criminal gangs. The United States is trying to improve cybersecurity by building relationships among international law enforcement agencies. State Department officials hold out as a model the Council of Europe Convention on Cybercrime, which took effect in 2004 and has been signed by 22 nations, including the United States but not Russia or China. But Russia objects that the European convention on cybercrime allows the police to open an investigation of suspected online crime originating in another country without first informing local authorities, infringing on traditional ideas of sovereignty. Vladimir V. Sokolov, deputy director of the Institute for Information Security Issues, a policy organization, noted that Russian authorities routinely cooperated with foreign police organizations when they were approached. This is not the first time the issue of arms control for cyberspace has been raised. In 1996, at the dawn of commercial cyberspace, American and Russian military delegations met secretly in Moscow to discuss the subject. The American delegation was led by an academic military strategist, and the Russian delegation by a four-star admiral. No agreement emerged from the meeting, which has not previously been reported. Later, the Russian government repeatedly introduced resolutions calling for cyberspace disarmament treaties before the United Nations. The United States consistently opposed the idea. In late April, Russian military representatives indicated an interest in renewed negotiations at a Russian-sponsored meeting on computer security in Garmisch, Germany. John Arquilla, an expert in military strategy at the Naval Postgraduate School in Monterey, Calif., who led the American delegation at the 1996 talks, said he had received almost no interest from within the American military after those initial meetings. “It was a great opportunity lost,” he said. Unlike American officials who favor tightening law enforcement relationships, Mr. Arquilla continues to believe in cyberspace weapons negotiations, he said. He noted that the treaties on chemical weapons had persuaded many nations not to make or stockpile such weapons. The United States and China have not held high-level talks on cyberwar issues, specialists say. But there is some evidence that the Chinese are being courted by Russia for support of an arms control treaty for cyberspace. “China has consistently attached extreme importance to matters of information security, and has always actively supported and participated in efforts by the international community dedicated to maintaining Internet safety and cracking down on criminal cyber-activity,” Qin Gang, spokesman for the Foreign Ministry, said in a statement. Whether the American or Russian approach prevails, arms control experts said, major governments are reaching a point of no return in heading off a cyberwar arms race.Continue reading the main story
<urn:uuid:3588e6f1-50d1-47c0-8ee7-04475ae2b85a>
CC-MAIN-2017-26
http://www.nytimes.com/2009/06/28/world/28cyber.html?fta=y
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321553.70/warc/CC-MAIN-20170627203405-20170627223405-00098.warc.gz
en
0.955323
1,453
2.65625
3
Description: The dorsal side is grey with large black oval spots, while the ventral side is white and partially mottled. The characteristic red for which these animals are so aptly named is only visible when the animal is in motion, normally being hidden in the hip, armpit, and groin areas. Range: Eastern Africa from Kenya to South Africa. Habitat: Grassland, scrubland, or forest. These animals prefer to live in close proximity to a permanent body of water. Fun Fact: The red colors of the Red Legged Walking Frog are normally hidden while the animal is sitting still. However, once the animal starts to move those bright red colors become visible, especially around the armpits and hip. This serves as a potential distraction to predators, which may become startled and confused by the sudden display of bright colors, hopefully giving the frog ample time to escape.
<urn:uuid:74b4aa9e-f34a-4d8f-9fa6-3fb4966c5a01>
CC-MAIN-2017-26
http://www.theradzoo.com/meet-the-animals/frogs-toads/red-legged-walking-frog/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321553.70/warc/CC-MAIN-20170627203405-20170627223405-00098.warc.gz
en
0.913811
182
2.96875
3
December 14, 7:16 AM Vail Environmental News Examiner Kelly Enright Extreme winter weather atop Vail Pass creates a rugged environment that seems of little use to humans or wildlife. But within the 50,000-acre tract of the White River National Forest, known as the Vail Pass Winter Recreation Area, snowmobilers and Canadian lynx compete for habitat. In 2000, the U.S. Fish and Wildlife Service listed Canadian lynx on their threatened species list. Lynx were already extinct in Colorado at that time; the last recorded sighting was in 1973. Between 1999 and 2005, the Colorado Division of Wildlife reintroduced some 200 lynx from Canada and Alaska. As the species recovers in the state, it is essential they have new spaces in which their population can grow, find resources and breed safely. Meanwhile, snowmobiles rumble through their growing habitat. Although the National Forest Service limits the number of snowmobile outfitters on the pass, and the frequency of their trips, they do not limit individual snowmobiler use. The Forest Service is currently studying the effects of snowmobiles on lynx habitat and their main prey, snowshoe hare, while the state Department of Wildlife has radio-collared numerous lynx to monitor their movements throughout the Colorado mountains. The White River National Forest sprawls over most of Colorado and balances the needs (and desires) of industry, recreation, and wildlife. Lynx, however, can not distinguish recreational areas from wilderness areas, created before their reintroduction. As wildlife officials study their movements and populations, they renew their commitment to keeping these wild cats in Colorado. Have you seen a lynx? Help the Colorado Division of Wildlife study their movements: Learn more about big cats and Big Cat Rescue at http://www.bigcatrescue.org
<urn:uuid:6f094176-93d7-4c00-912f-6cc65d4003c2>
CC-MAIN-2017-26
http://bigcatrescue.blogspot.com/2009/12/colorado-lynx-habitat-threatened-by.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00617.warc.gz
en
0.927768
372
3.71875
4
It is the root and cause of physical, psychological and social disability for millions of people, meaning that it has an immense effect of their lifestyle, and it is often poorly managed. The pain occurs in the lower back, with radiation into the leg, which can make the normal life almost hopeless. The best way to find a way to effectively treat it is to begin from its cause and its characteristics. The root of sciatica pain is in the lower back, and extend down through the buttock, thigh, and into the lower leg and foot. The syndrome occurs when a nerve or nerve root is compressed or pinched in the lower back, leading to pain, numbness, and weakness into the leg. The nerve and the nerve root can be pinched on multiple locations. All health care professionals suggest that initially, conservative care should be performed, and surgery should be only considered as a last resort for this issue. It is at this point where health care professionals, including chiropractors and physiotherapists, come in. 1.Lumbar Spine Traction and Decompression Therapy This therapy is often performed when the patient has not experienced beneficial effects from other kinds of treatments. It includes manual and instrument- assisted traction therapy to aid spread the lumbar vertebrae and allow disc material to become re-absorbed into the outer disc material. 2. McKenzie Exercises Chiropractors and physiotherapists offer McKenzie exercises as being effective in decreasing leg pain and centralizing the pain (bringing it into the lower back). 3. Heat/Ice Therapy This therapy can provide beneficial effects in the early stages of sciatica. It uses heat packs or ice packs to decrease pain and inflammation at the root of the problem. Ice helps to lower inflammation and swelling, while heat loosens the muscles. 4. Acupuncture and Traditional Chinese Medicine Various Chinese medicine methods and acupuncture has proved to be able to help patients in this case. Acupuncture relies on the use of small needles inserted through the skin and into muscles at specific points along the meridian channels. The needles used cause micro-trauma to the muscles and thus stimulate the release of hormones called endorphins. These hormones reduce the sciatica symptoms and soothe nerve and muscle pain.
<urn:uuid:201870b8-0e9f-4a95-b06f-d8018ac411de>
CC-MAIN-2017-26
http://www.inthegrapevine.com/my-patient-crawled-through-the-door-in-sciatica-pain-agony-i-immediately-told-him-to-do-this/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00617.warc.gz
en
0.94034
472
2.8125
3
Although sun-filled days of idling by the pool may be long gone until next summer, facility managers and building owners must still maintain commercial spas and indoor pools. Due to the large amount of chlorine used to ward off bacteria, such features are often costly, time-consuming and sometimes uninviting to visitors and occupants. Recent advancements in ionization technology have offered healthy and cost-effective alternatives. Sabrina Assad, director of distribution for Clear Blue Ionizer—the first digitally controlled ionizer system approved by Health Canada and the CSA, addresses sustainable benefits of new ionization systems. How did ionization systems come about and how do they operate? Silver, as an antibacterial element, has been around for centuries. People eventually began ionizing silver by placing it in water and producing silver ions. NASA was the first to use these ions on their space shuttle because their water would remain clean and bacteria-free. The idea of using the ionization process in pools has been around for more than 40 years; however, many systems were not able to regulate the amount of ions going into a spa or pool. It’s difficult to maintain ion levels without a very advanced control system. Some of the earlier systems weren’t as developed because they would release way too many ions into water or not enough. Our system is more controlled by taking into account the water chemistry and conductivity. It continuously releases precise amount of microscopic ions into the water that seek and control algae, bacteria, and viruses. Ions are picked up by the water flow as it passes over an electrode that is installed into the plumbing of the pool or spa. What are the benefits of transitioning to an ionization system over relying on chlorine maintenance In all commercial pools and spas there has to be a residual of chlorine. However, sometimes people are running up to 3.5 parts per million of chlorine, which is extremely toxic. Since it’s linked to cancer, organ damage and respiratory problems, it’s best to limit chlorine use as much as possible. With this knowledge, people are now trying to reduce the amount of toxic chemicals they’re exposed to. For commercial pools to advertise the use of an alternative sanitizer as opposed to chlorine, would be good for tenants and customers who are now looking for healthier options. For people who are sensitive to chlorine, ionized water is like spring water; it’s tasteless and odourless. At 0.5 parts per million, chlorine becomes harder to detect. However, when you reach levels of 1 to 3 parts per million, the side effects will become more noticeable. Also, with higher levels of chlorine, design features like delicate tiles and wood can corrode, needing frequent replacement over the years, which isn’t cost-effective. Ions are pH neutral, and completely non-corrosive or abrasive. What are some other cost factors associated with the system? Owners can reduce the amount of chlorine to 0.5 parts per million and save thousands of dollars in chemical costs. By using an ionization system, you no longer need to purchase chlorine buckets. You also don’t have to worry about increasing the amount of buckets used in hot summer weather when the chlorine is constantly evaporating, making it hard to keep up with algae growth. The only thing you need to replace is the silver, copper and zinc electrodes. There’s a direct current released in very low voltage, sending out the silver, copper and zinc in microscopic ion form. As these ions slowly wear away–every one to three seasons in a pool, or a couple years in a hot tub–you’ll see electrodes are gone and you’ll want to thread in a new set. How easy are these systems to install and use? Any handy person can install this system within half an hour, although some people prefer their maintenance person to do the work. Once you plug it in, you set the ion action according to the pool or spa and test every two weeks. Since the system runs on low-voltage, you can leave it running and it’s still inexpensive to operate. We have an advanced digital controller, which is first on the market. The controller takes into account the water chemistry, adjusting for things such as conductivity to provide a constant output and maintain the recommended ion level very easily. Should people be skeptical of ionization systems? Ionizers have received a fair bit of skepticism because when they came on the market, people were told that they were a stand-alone system, they no longer needed chlorine. Silver attacks bacteria, copper is a strong algaecide and zinc reacts with the copper to keep it in the solution and prevent staining. However, you still need to use an oxidizer such as chlorine to breakdown organics, like body oils, lotions, deodorant and urine. Chlorine has been approved in Canada for a long time, and many manufacturers have given ionization a bad reputation. If you are seriously looking into an ionizer system, our advice is to evaluate not only the unit itself, but the entire water maintenance program put forth by the manufacturer. While ionizers don’t completely eliminate the need for chemicals, they reduce the amount required to a level that is undetectable, while still providing the security that your water is safe. Sabrina Assad is owner of Argenia Systems—an engineering and manufacturing company that develops technologies to help people lead safer and healthier lives.
<urn:uuid:482cecfb-30cf-4812-93a6-13ec6039175c>
CC-MAIN-2017-26
https://www.reminetwork.com/articles/sustainable-advice/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00617.warc.gz
en
0.961885
1,141
3.0625
3
In Charles M. Schulz's comic strip Peanuts, the Head Beagle is the apparent ruler of all dogs on planet Earth and, aside for the short while from February 16 to March 8, 1970 when Snoopy served as Head Beagle, this character has never been seen. Known Head Beagles Powers granted to the Head Beagle The Head Beagle seems to serve as the all-powerful ruler of all dogs in the world. He or she is treated with great respect and even feared by some. When Snoopy is sent to the Head Beagle, he calls him, "Father of Us All." Duties of the Head Beagle - Judge: The Head Beagle seems to be able to solve disputes and cases given to him/her This seems to be his or her primary service. - The Head Beagle can give out secret missions to other dogs, when he has too much to do. - The Head Beagle can also punish dogs when they do not follow the rules. Problems with being Head Beagle As shown when Snoopy briefly serves as the Head Beagle, massive amounts of stress and headaches come with the duty. Much like the President of the United States, the Head Beagle is shown to be hated by some people for his or her decisions. In the strip from March 2, 1970, Lucy blames the Head Beagle for all the world's ills. Position in the Peanuts universe Power over dogs and other animals Dogs are often shown to be terrified of being reported to the Head Beagle. When Snoopy refuses to chase rabbits in the strip from October 9, 1969, Frieda threatens to report him to the Head Beagle, which she eventually does. It also seems that other dogs worry about the effect it will have on their relatives if they are sent to the Head Beagle. This is shown in the strip from October 14, 1969, when Snoopy is miserably contemplating being sent to the Head Beagle, saying that this will bring shame onto the Daisy Hill Puppy Farm. Whenever Snoopy gets a letter from the Head Beagle, he always faints, because he says the rule is you have to faint if you get a letter from the Head Beagle. Many dogs show great respect for the Head Beagle. However, due to the fact that the Head Beagle is not often seen in person, some believe that he or she does not even exist. In the strip from October 18, 1969, Snoopy supposedly goes to where he will meet the Head Beagle (which is apparently the middle of a forest), after waiting for a while, he thinks to himself, "Suddenly I have a terrible feeling someone is putting me on." Of course, it is possible Snoopy merely went to the wrong location. Lucy claimed that Snoopy would "probably be impeached", suggesting the Head Beagle's authority is not infallible. Whether this is true or not is unknown. As seen in the Sunday strip from January 8, 1970, in a parody of IRS tax forms, every January, dogs are required to send in forms to the Head Beagle detailing their activities, including their rabbit chasing quotas. Respect from humans The Head Beagle also seems to be treated with great respect by people as well. For example, Charlie Brown is very proud and honored that his dog is named the new Head Beagle in the strip from February 16, 1970. In the following day's strip, Lucy pretends to be comically terrified, claiming Snoopy will destroy them all. Charlie Brown, Lucy and Linus watch Snoopy's inauguration as Head Beagle on television, the event being covered live by all three networks, in the strip from February 18, 1970. In the strip from October 25, 1969, Linus contemplates the possibility that the Head Beagle and the Great Pumpkin could be one and the same. In the strip from October 29 of that year, Linus decides not to write his annual letter to the Great Pumpkin but to send one to the Head Beagle instead.
<urn:uuid:3df1d7a2-c9ec-464d-9d82-08d8aec1e6a2>
CC-MAIN-2017-26
http://peanuts.wikia.com/wiki/Head_Beagle
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00698.warc.gz
en
0.975713
834
2.890625
3
This website is self supporting Learn how: In this 5 part craft project you will be making a realistic miniature version of a WWII Anderson Shelter like the ones used during the Battle of Britain and shown in the pictures below. This is a great little project which requires the minimum amount of materials. It is very easy and would be ideal for a school project as it falls within the national curriculum, It is quite complicated as there is some marking out and cutting out to do, which may take little time. For this simple project you will need: A large tin or other cylindrical container. A stiff corrugated cardboard box, e.g. A family size crisps box. 2 Rubber bands. A craft knife or Scissors Pencil or pen A paint brush PVA adhesive or sticky tape Glue spreader or glue stick To make your Anderson Shelter you will first have to make a rectangular template to the desired length of your shelter. This can be based on the size of the cylinder you are using to form the shelter. For example a Baked beans tin. A baby milk container or any other cylindrical object you choose. You will then need to make it slightly damp, Not wet as the corrugated card will separate and turn to mush. Once you have dampened the card, carefully wrap it around your cylinder and fasten it with the 2 rubber bands as shown in the pictures. Once you have done this leave your cylinder somewhere warm to dry and take shape. Once it is dry take off the rubber bands and remove the cylinder. You should now have a cardboard cylinder as shown in the picture. Once your cardboard cylinder is dry you are ready to form the main part of your shelter. You will first need to carefully open up your cylinder to form a u shape. Allowing enough to form the sides of your shelter, carefully fold up the excess cardboard on each side and remove accordingly as shown below. Before cutting make sure you have allowed enough card to form the tabs on the base of the shelter as these will be used to glue it to your base using PVA adhesive. The next thing to do is to paint the inside of the card with silver paint or you can find a suitable image of some corrugated iron online and print it onto a full size sheet of A4 paper as shown below . You will need to carefully stick it to the inside of the shelter making sure you have the lines of the corrugations running vertically from the tabs. That is running from tab to tab. Hint: To save ink before you print the whole sheet, do a small test panel to see if you have the correct scale for your model. Once you have done this you are ready to stick the main part of your shelter onto a base. You will now need to cut a piece of card large enough to make your base as this is what you will build upon to make your Anderson shelter. As shown in the picture below I used the side of my family size crisps box to make the base, allowing enough card each side to form the sloping sides. You will need to use a piece of card that is of a suitable size for your initial shelter. Tip: To hold my shelter in place while the PVA glue dried I used 4 small pieces of double sided sticky tape placed just inside each corner. You may notice in the picture that I also stuck my bomb shelter inline with the factory fold on the cardboard base. This was to enable it to fold up to form the back of my bomb shelter as shown in the pictures below. To form the back of your Anderson/Battle of Britain air raid shelter you will need to place the flap,as shown below, or a separate piece of card against the back of the shelter and carefully draw around it. If you are using the flap as shown in the picture make sure you allow for a tab at the top to fix it in place. If you are using a separate piece of card as shown in Fig 3 you can add an extra tab to the base of your template to allow you to stick it onto the base. You will also notice that in Fig 2 and Fig 3, which is the separate back piece I have allowed for the sloping sides that will form the banks of grass against the shelter and will be replicated at the front of the shelter in stage 3. Once you have the back piece fixed and the initial shape of your bomb shelter you are now ready to make the shape of the front to match the back. Take another piece of card large enough to match the back of your shelter and place it against your model making sure the bottom edge is flush with the cardboard base. Using your model as a template draw around it so that you have an identical shape to the back on the piece of card. Carefully cut out the shape and then place it against the front of your bomb shelter making sure that the curve is lined up properly with the curve of the shelter. Next draw around the shelter so that you now have the shape of it replicated on the card as shown below. Measure in from each line approximately 1cm as shown above as this will form the tabs that will enable you to fix it to the sides of your air raid shelter. Next carefully cut your sides out making sure you cut on the inside line. Be careful when you do this as you do not want to cut the tabs off, you will need to concentrate. (Remember always ask an adult for help when using scissors or craft knives). When you have cut out your side templates you will need to carefully cut the tabs at about 1cm intervals making sure you do not cut past the other line forming the shape of your Anderson shelter as shown. To form your tabs. Score down the lines on the template using the back of your scissors. (Remember always ask an adult for help when using scissors or knives). This will make it easier to bend the tabs into shape. See the example below. As shown in the examples, I have cut the corners on each tab. This will make it easier to form the shape of the shelter and to stick them in place, as, if you leave the tabs without trimming them they will overlap and make it difficult to get a good flush joint. Note: The above image is only showing examples, not the actual pieces you are making so you will only need to cut the tabs on the edge that will fix to your shelter. Once you have done this use your PVA or sticky tape to fix your sides to your Anderson shelter as shown below. You can use pegs to hold them in place if you need too. Once you have your sides in place the next thing to do is to reinforce them by adding a cardboard brace. To do this measure the distance between the two ends and then add 2cms to allow for a tab 1cm long at each end. The width of the brace does not matter as long as it fits flush to the edges of the curves on your sides. Bend over your tabs and glue the brace into place. Do this to both sides of your bomb shelter as shown in the picture. Note: You can add more than one brace if you wish, for example you could place one at the base. One in the middle and one at the top, it's entirely up to you. Once you have your basic Anderson air raid shelter you are now ready to add a light if you wish. To do this you will need. 1 torch bulb. 1 length of 2 core wire as shown or a long length of single wire. A soldering Iron. To add your light puncture a small hole in the top of your shelter where you want your light to be. Important: Adult supervision required as solder irons WILL burn. If you do not have a soldering iron then perhaps a glue gun would do the same job. Just try to make sure you have a good contact point on the bulb before applying the glue. Take your bulb, wire and tape. Firstly strip the wire and fix it to the bulb as shown either with solder or a glue gun. To securely fix the wire to the shaft of your bulb place a piece of insulating tape around it. (not shown) This will also make it look more effective when you add it to your shelter. To add the light simply thread the wire through the hole you made in the top of your shelter and pull it through until your bulb just touch's the card. Next you will need to lay the wire across the outside edge of the shelter and toward the back. Then secure it in place with a paper strip as shown. Now that you have your basic Anderson shelter frame you are now ready to add the sloping sides. To do this lay a length of corrugated cardboard along each side making sure it is large enough to cover the open sides that you have created and that it meets the original curved cylinder with at least an extra 1cm to allow for it to be fixed firmly in place. Also allow 1cm at the other end to secure it to the base. Hint:When placing the card on your sides use the corrugations in the cardboard to your advantage by making sure the corrugations run the length of your shelter as it will make it much easier to shape your sides. With the card correctly positioned draw up the sides and across the top and bottom and then add 1cm at each end as mentioned. Then cut it out. Note: Before you fix one side thread the wire down the back edge of the shelter and into one of the sides as shown in the picture as this will become your battery and switch compartment for your light. To fix the sides first glue the base tab to the base of the shelter. Next apply a layer of glue to the cardboard brace and firstly fix your card to the brace using pegs as shown. This will ensure that you have good contact with the brace to reinforce your shelter. Also apply glue to the edges of the front and back pieces that you made earlier. Once it has dried firmly to the brace apply a layer of glue to the other tab and fix it to the side of the shelter as shown in Fig 1 above.
<urn:uuid:c626640e-02d0-490b-92d1-ff106981ba08>
CC-MAIN-2017-26
http://www.arts-crafts-hobbiesanddiy.com/how_to_make_a_model_wwii_Anderson_Shelter.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00698.warc.gz
en
0.940819
2,094
3.453125
3
With 96 tiles in tow, Potters Place potters Susan Brum and Lisa Walker visit the 5th grade at Elm Street Elementary School to instruct on clay. This is the first of a two part visit. Part one gives the students a chance to create a tile using a wet clay tile. We teach them how to create relief (build up and add on) as well as to incise or carve to translate their two dimensional idea into a three dimensional sculptural tile. The students worked really hard. They were focused, creative and enjoyed working with the clay. At the end of our visit, we gave a preview of the painting they will do when we return next week. They will be able to add details and color before their work heads back to Potters Place to fire in the kiln. Some of the many beautiful tiles created at Elm Street School: Makes you smile, doesn’t it?! Great attention to detail and the look of someone having a lot of fun playing with clay!
<urn:uuid:e1d26e7a-9c10-41a4-9dd0-82cbbcc21a39>
CC-MAIN-2017-26
https://lisawbwalker.wordpress.com/2014/03/13/potters-in-local-schools/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00698.warc.gz
en
0.966694
206
2.578125
3
Alberta dairy cow found with mad cow disease WINNIPEG, Manitoba (Reuters) - Canadian government officials have found a dairy cow in Alberta with mad cow disease, but the finding is not surprising and shouldn't affect beef exports, a spokesman for the Canadian Food Inspection Agency said on Friday. The agency confirmed the case of bovine spongiform encephalopathy, or BSE as the disease is also known, on February 18 in a 77-month-old dairy cow, spokesman Guy Gravelle said. In 2003, the first discovery of a cow in Canada with the disease led to closures of numerous export markets to Canadian beef. Most have reopened, other than South Korea and China, and importers are no longer as sensitive to new cases as countries such as Canada now have monitoring systems in place. Canada continues to be rated a "controlled risk" for the disease by the World Organization for Animal Health, Gravelle said. The newest case may delay any upgrade to Canada's international risk status as a country cannot apply for negligible status sooner than 11 years after the latest-born case. The cow has been destroyed and no part of its carcass entered the human food or animal feed systems, Gravelle said. The case, which is believed to be Canada's 18th, should not affect exports of Canadian cattle or beef, he said, as a small number of BSE cases are expected as Canada monitors for the disease. (Reporting by Rod Nickel; Editing by Walter Bagley) © Thomson Reuters 2017 All rights reserved.
<urn:uuid:a96d5b58-9edf-4c41-93a4-d59ce7b09531>
CC-MAIN-2017-26
http://ca.reuters.com/article/domesticNews/idCATRE7233JT20110304
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320323.17/warc/CC-MAIN-20170624184733-20170624204733-00058.warc.gz
en
0.964713
319
2.609375
3
Social responsibility is the balance of profit objectives in a business with ethical and responsible business activities. Dilemmas come up when companies must choose between saving money and operating responsibly with regard to stakeholder interests and the environment. Small businesses have some advantages and some challenges relative to larger organizations in handling responsibilities. Small businesses can typically find information and consider alternatives to dealing with responsibility concerns and issues. This is because of the more limited scope and geographic area they serve and interact with relative to larger organizations. Additionally, decision-making processes in response to dilemmas is usually more efficient since fewer people and fewer levels of management are involved in the process. Often, a single owner or company manager makes judgment on courses of action. The localization of business activities and responsibility standards helps small companies as well. In a smaller community, it is easier for managers to interact with community leaders and customers to get a sense of expectations and objectives. Additionally, communities often offer support systems and resources for use in fulfilling social responsibilities. A company looking to address environmental concerns may, for instance, connect with local environmental recycling programs and get information on other ways to use resources efficiently. A major drawback for small businesses are the costs involved in improving social and environmental responsibility. Investment in equipment that uses resources more efficiently may be needed, for instance. Hiring service providers to dispose of waste in a more green-friendly way is another. Additionally, companies may need to add new building space and invest in employee education and training to ramp up care for customers and the environment. Fair treatment of customers and promotion of fair working practices are part of social responsibility. Companies that operate in less diverse communities may struggle to meet expectations that they have a diverse workforce in terms of age, gender, ethnicity and socioeconomic background. Additionally, individual customers or small groups in a local market can more easily hamper small business success with public criticism than they can large companies spread across many regions. - Jupiterimages/Creatas/Getty Images
<urn:uuid:710de323-c88a-4998-85ac-186b229ba64d>
CC-MAIN-2017-26
http://smallbusiness.chron.com/advantages-disadvantages-small-businesses-social-responsibility-dilemmas-66239.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320323.17/warc/CC-MAIN-20170624184733-20170624204733-00058.warc.gz
en
0.956233
397
3.28125
3
A statewide bio-surveillance system designed to provide early detection of potential health threats has received a $3 million grant from the U.S. Department of Homeland Security (DHS) to continue its research efforts. Called the North Carolina Bio-Preparedness Collaborative (NCB-Prepared), the group was formed in 2010 through an initial $5 million grant from the DHS. The public-private partnership includes representatives from the University of North Carolina at Chapel Hill, North Carolina State University and SAS. The new funding will be used to expand the system and help determine how information from the collaborative can best be used by local, state and federal agencies. The group’s detection system accumulates disparate data streams from a number of different sources. Those feeds include recent life-threatening disease cases from emergency medical services, reports about food production and information from animal and human clinical services. That data is combined and analyzed by NCB-Prepared members using the collective's proprietary text analytics and analysis approaches. The group is then able to predict whether a particular health event is a sign of a pending disease epidemic or evidence of a terrorist release of a pathogen in the food, air or water supplies. According to Charles Cairns, principal investigator with NCB-Prepared, the collective’s goal is to detect outbreaks quickly and get the data to decision-makers who can intervene and save lives. He views the system as a way to speed-up intervention efforts, as opposed to traditional disease surveillance methods that are centered on investigating a health event and its origins. “One of the things we’re trying to do is literally detect things within hours or days,” Cairns said. “And we’re trying to recognize cases, classify them as a particular disease or health challenge, understand the change … over a particular geography or a particular time, and then be able to understand what’s going to happen next.” The University of North Carolina’s Department of Emergency Medicine played an early critical role for the collective by taking a close look at emergency department data across the entire state. The department developed data standardization approaches including information collection forms and systems that were used statewide in the system’s beginning stages. The NCB-Prepared team is made up of public- and private-sector medical, public health, technology, sociology and psychology experts. The group also includes emergency management officials and first responders. Barbara Entwisle, vice chancellor for research at UNC Chapel Hill, called the collective and its system a “powerful tool” to stopping outbreaks before they become widespread public threats. “This is one of those areas where, using data and new technologies, university researchers and our industry partners can make a real difference in peoples’ lives,” Entwisle said in a statement. The system has already been successful in several cases. In 2011, the collective identified an outbreak of norovirus three months earlier than it was announced by public health officials. Cairns explained that his team used the bio-surveillance system to obtain data from pre-hospital providers, such as paramedics, and using the collective’s analytic approaches was able to determine the outbreak's severity. The findings were made public at a meeting of the International Society for Disease Surveillance in 2011. NCB-Prepared also was successful in determining the severity of last year’s flu outbreak in North Carolina. The collective evaluated a series of Internet search terms and emergency medical services records, and accurately predicted the severity of the 2012 flu season three months ahead of the Centers for Disease Control and Prevention’s public announcement. According to Cairns, the group is effective because of the early access it has to data from an event where people cross paths with the health-care system. “Our current approach is to really look at emergency health data, so we’re not looking for things that aren’t severe or aren’t life-threatening,” he said. “We’re really focused on that slice of data because we think that’s the best opportunity to intervene and save lives.”
<urn:uuid:0a9bcf29-59cb-4df4-b7b1-37de626305bc>
CC-MAIN-2017-26
http://www.govtech.com/health/Bio-Threat-Early-Warning-System-Gets-Booster-Shot.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320323.17/warc/CC-MAIN-20170624184733-20170624204733-00058.warc.gz
en
0.951505
864
2.578125
3
WIKIMEDIA, ALBERTO SALGUEROScientists are finally getting a glimpse into how defense hormones shape plant health both above and below the soil, thanks to a study published today (July 16) in Science. The results show how an Arabidopsis thaliana defense hormone, salicylic acid, which helps protect the health of the plant’s shoots and leaves, also guides the growth of microbial communities in and around its roots. “This is the first study that really tied this phytohormone to the microbiome associated with the root,” said Xinnian Dong, a professor of biology at Duke University who was not affiliated with the work. Commensal root microbes can confer numerous benefits to a plant, including increased tolerance to environmental stressors like heat, drought, and acidity, and aid in the plant’s acquisition of nutrients. However, little is known about how plants might influence their underground microbial communities, or how a plant’s immune system interacts with the bacteria it encounters in the soil. To explore these interactions, the University of Tennessee’s Sarah Lebeis and her colleagues grew mutant strains of A. thaliana that were deficient in either the biosynthesis or signaling detection of different key defensive immune hormones, including salicylic acid, jasmonic acid, and ethylene. They then used DNA sequencing to profile the bacterial communities found in and around the mutant plants’ roots. When they compared the bacterial profiles of mutant and wild-type A. thaliana, the researchers found significant differences in root bacterial populations not only at the strain- and species-levels, but also at higher taxonomic orders. “In some of our mutants we saw what we call a loss of control. Microbes that shouldn’t have been there were there,” said Lebeis, an assistant professor of microbiology. This effect was most pronounced in mutants lacking the ability to produce or respond to salicylic acid. “We found that salicylic acid and the ability to produce it is one of the cornerstone features that plants require to control the [bacterial] community,” Lebeis added. In A. thaliana shoots and leaves, the production of salicylic acid helps the plant ward off pathogenic bacteria by triggering a broad range of immune responses, including the increased production of antimicrobial agents. However, the compound appears to play a slightly different role in the root system, increasing the abundance of some microbes while decreasing or eliminating others. “Certain [microbes] were not actually able to get into or onto the salicyclic acid-deficient roots,” said study coauthor Jeff Dangl, a professor of biology at the University of North Carolina, Chapel Hill. “This implies that in the wild type plant, salicylic acid is actually required to recruit those microbes.” “It is interesting that there is this contrasting role of the plant hormone in the shoot and in the root,” said Dong. “The root tissue is exposed to microbes constantly—almost like an inside-out intestine. There are beneficial microbes and pathogenic ones, so you don’t really want to have a defense mechanism that inhibits the beneficial microbes.” Lebeis said it is still unclear how the biosynthesis of salicylic acid in A. thaliana appears to attract some types of bacteria to the root while blocking others, though she did note that a few select microbes are able to use salicylic acid as a carbon source. She added that the results do not indicate whether it is salicylic acid that performs this function versus a modified version or degradation product of the hormone. James Kremer, a PhD student studying the plant microbiome at Michigan State University who was not affiliated with the research, cautioned that identifying bacterial populations through DNA sequencing does not capture the fully complexity of plant-microbe interactions. “It doesn’t show anything about who is actually alive and who is doing things, who is expressing genes, who is making proteins,” he said. However, he continued, “it is a huge advance for the field—the fact that they were able to identify any differences [in bacterial population] at all.” “One of the major future directions in sustainable agriculture is utilizing all of these microbes in the soil,” Kremer said. “Right now we have no idea how to engineer a plant to help recruit these [beneficial bacteria]. This [result] is a nice building block for getting there.” S.L. Lebeis et al., “Salicylic acid modulates colonization of the root microbiome by specific bacterial taxa,” Science, doi: 10.1126/science.aaa8764, 2015.
<urn:uuid:3e819c98-a4c4-4533-a17b-526763d6f59c>
CC-MAIN-2017-26
http://www.the-scientist.com/?articles.view/articleNo/43530/title/Underground-Immunity/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320323.17/warc/CC-MAIN-20170624184733-20170624204733-00058.warc.gz
en
0.951914
1,004
3.46875
3
Yesterday, while admiring pelicans on the beach, the wonderfully talented young adult author and my beloved friend, Amy Mair, educated me on effects of DDT on San Diego’s pelicans in the 70s. As it turns out, DDT softened the eggs of these birds, and their mothers crushed them when trying to warm them, thus dramatically reducing their population. Miraculously, scientists heard what these precious birds were trying to communicate, and ultimately banned DDT. This resulted not only in a pelican population boon, but also in a safer, DDT-free environment for ourselves and all the life that may have been impacted. I wondered – what if we could hear sensitive children with as much compassion and respect as we heard those sensitive birds? Susan Cain, author of Quiet: The Power of Introverts in a World That Can’t Stop Talking, addresses this in her book, citing specific and fascinating points in history in which the sensitive perspectives of introverts (over 30% of our population) have been dismissed to our detriment, including the time leading up to recent housing market crash. A common gift of introversion is foresight, but it’s wasted if no one can hear it. Profoundly intelligent and accomplished children’s author Jennifer O’Toole addresses the dismissal of her own sensitivities as a woman on the autism spectrum by stating: We feel too much. React too much. Say too much. Need too much. So says the world. Except the world is wrong. Imagine, if instead of hearing the wisdom the pelicans had to offer in the 70s, we collectively said, “Those pelicans feel too much. They’re too needy. They need to toughen up.” What an opportunity we would have missed. So why do we allow society to send these messages to our sensitive children? How much more peaceful and healing could life on this planet be if we stopped labeling human sensitivity as too much of anything, and started hearing its wisdom? I believe in the deepest fiber of my being that every child has something of value to bring to our earth. However, I think we sometimes confuse what value truly is. One of the issues I see a lot in children’s literature is the trend of extremely sensitive characters, frequently stereotypically portrayed as autistic, serving the sole purpose of providing “inspiration” for main, neurotypical characters to become “better people.” While I’m certain these story arcs were created from a place of good intention, I believe they miss a major point – that the sensitive characters (and the impressionable little readers who relate to them) have much more to offer than that. In her book, Susan Cain states that the most sensitive instruments in science are the most expensive. Think of the care that is taken to ensure those instruments are handled correctly and are not harmed. Think of how much value we attach to the information they deliver. What were to happen if we treated our sensitive kids with the respect and gentleness that we treat our sensitive instruments? What if we heard their cries, and allowed them to watch school assemblies on Skype from their media centers instead of thrusting them into painful, chaotic environments? What if we turned down (or off) the music at the “child-friendly” venues and the school events that blatantly disregard their needs? What if we provided low-lit cozy spaces for the kids who cover their ears or walk the periphery of the playground so they could read or do a soothing activity during overstimulating recess? What if we heard their wisdom? Sensitive kids are necessary and as valuable to the collective as anyone else. Let’s honor them. Let’s hear them. And together, let’s help our planet heal.
<urn:uuid:2eac0663-7403-4120-bb3f-95992d5a6b4a>
CC-MAIN-2017-26
http://emmalesko.com/2016/04/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320532.88/warc/CC-MAIN-20170625134002-20170625154002-00138.warc.gz
en
0.968021
786
2.546875
3
<a> element. Our friend, the hyperlink. Few HTML elements are as versatile as the hyperlink. We can jump around a page, back and forth between different pages, open our email clients, and execute scripts, all with one meek little HTML tag. Talk about over-achieving... Don't believe me? Well then, maybe I should show you some examples! Navigating a Page One of the more useful ways to implement a hyperlink is to use it as a method of quickly jumping to different topics within a page. This is accomplished by using what are referred to as "page anchors," or "anchors" for short. Creating anchors is a simple, two-step process: - Add the "id" attribute to the HTML element closest to where you want the link to "jump" to. - Point the "href" attribute of the link tag to that id, preceded with a # sign. <html> <head> <title>Sample Page</title> </head> <body> <div> <h2>Hyperlink Sample Page</h2> <ul> <li><a href="#one">Link #1</a></li> <li><a href="#two">Link #2</a></li> <li><a href="mailto:email@example.com">Contact</a></li> </ul> <h4 id="one">Anchor #1</h4> <p> Sample text here. Blah blah blah. </p> <p> Blah blah blah some more... </p> <h4 id="two">Anchor #2</h4> <p> Look! More sample text! </p> <p> Isn't HTML neat? :) </p> </div> </body> </html> Each of the links in the "navigation bar" would take you to a different section of this page. The MailTo: Link The "Contact" link in the example above is what is known as a "mailto" link, which gets its name from the fact that you precede the email address in the "href" attribute with "mailto:". The browser recognizes that the link is an email address and causes whatever email client you have installed on your machine to launch. Linking to Another Page There are two ways of linking to another page. If you want to link to another page within your website, you only need to specify the folder and file name of the target document. Linking to an entirely different (external) site requires a canonical, or absolute, URL. - Relative (Local site) - Absolute (External site) I will eventually update this post to include some script links, as well, but for now, I think I've given you a good introduction into how to use the hyperlink tag. Questions? Comments? You know what to do...
<urn:uuid:15aa6ae1-0289-46c6-b40f-f39a57fdcb99>
CC-MAIN-2017-26
https://tiesontrowbridge.com/blog/the-many-faces-of-the-hyperlink-element
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320532.88/warc/CC-MAIN-20170625134002-20170625154002-00138.warc.gz
en
0.851448
608
3.34375
3
Participatory Action Research (PAR) provides a critical framework for making science – systematic inquiry and analysis – a public enterprise. Allied with feminist, critical race, queer, and indigenous theories, PAR is an approach to research that values the significant knowledge people hold about their lives and experiences. PAR positions those most intimately impacted by research as leaders in shaping research questions, framing interpretations, and designing meaningful research products and actions. With these commitments as a foundation we used a wide variety of data collection methods designed to maximize flexibility, to accommodate the exploratory nature of the project and the diverse experiences and interests of the intergenerational research team. These methods allowed us to collaboratively explore a range of questions about youth experiences with school discipline and surveillance, young people’s educational desires, and community concerns. Beware of the Watchers Rapid Research is a growing set of techniques with roots in public education that is designed to help us “dive in” to the work, jumpstarting decisions about which topics mattered most to our group, teaching the youth research skills in context, and helping us visualize possible research products. With an emphasis on the idea that “nothing is precious,” each “Rapid Research” session involved teams of researchers selecting a theme from previous conversations and then either creating and administering a mini-survey or a video short on the topic – all within about 90 minutes. The resulting Rapid Research products were then used to facilitate discussion and analysis of the new themes coming up, in an iterative process. Sidewalk Science is a set of techniques, strategies and activities designed to bring our research, literally, into the streets and engage the community in dialogue about our findings. BARC used Sidewalk Science to share our ongoing research with the larger community, setting up research stations on the sidewalk and asking community members to contribute in multiple ways: populating a “crowd-sourced” map [link to photo of map] of the neighborhood, providing answers [link to whiteboard photo gallery] to basic research questions like “what does our community need?” and “what does our community have?” among others, or simply taking the time to learn about the project. Images from Sidewalk Science in Bushwick, July 2014 #wickwalk is a multi-method digital research method we developed for learning about Bushwick, to provide a foundation for thinking about the development of a community school in the neighborhood. Aided by maps, cameras, and interview questions, our research team set out in small groups (including Bushwick residents and non-residents, and both adult and youth co-researchers) on walking tours of different segments of the neighborhood, mapping routes and landmarks, photographing, observing, and talking to people on the street. These tours aimed to document the neighborhood’s “assets,” think about who is a part of “the community,” and to think about what residents could use from a community school. In addition to paper documentation, we used Twitter to post photos of and reflections on the neighborhood with our hashtag #wickwalk, helping build an online repository of our observations and experiences. Community interviews were conducted our #wickwalk tour of the neighborhood to better understand resident experiences of and relationship with the neighborhood over time. These brief, on-the-street interviews included questions about their favorite and least favorite things about the neighborhood, and their perception of the changes in the neighborhood connected to gentrification. A series of video testimonials document youth researchers’ thoughts on the most important things to consider when developing a community school, and their hopes and fears about rapidly changing Bushwick. Filmed at the conclusion of the summer, these brief testimonials were based on our work together over the course of the project. We used mapping in a variety of ways to document experiences in and out of schools, locating ourselves and our experiences. The research team used both traditional maps (e.g., google maps and MTA maps) and more personal maps from scratch to depict experiences of schools and our neighborhoods. These more creative and personal maps allowed us to illustrate our lived geography in ways that were most meaningful to us. Akin to facilitated focus groups, were used small group discussions to document the experiences and opinions of the research team on a wide range of topics. Members of the research team split up into small groups to focus on answering isolated questions (e.g., “What are some reasons that students don’t come to school?” or “What assets already exist in your neighborhood?”). Groups then rotate between a set of questions, building on the answers of the previous group. This format both encourages participation of researchers who might feel more comfortable in small groups and helps ensure that each question of interest is addressed. Stats-in-action is a growing set of techniques, strategies and activities designed to analyze quantitative data collaboratively through an iterative, exploratory process (Stoudt et al., 2011; Stoudt & Torre, in press). Through this process, Public Science Project researchers guide community-based researchers through a hands-on and collaborative process of data entry, data cleaning and coding, the use of statistical software for analysis, and interpretation of findings. Stats-in-action is intended to “demystify” quantitative analysis by making the process more transparent: providing opportunities for skill development and involving co-researchers less familiar with quantitative research in each step of the process, bringing their expertise to bear in decision made along the way. Post-It Walls are a strategy to facilitate collective brainstorming, discussion, and organization of themes, as we use post-it notes to record ideas, experiences and questions and then post in a central location for the whole group. Then, through facilitated discussion of the growing collection of post-its, team members begin to see connections between experiences and questions, identify research questions, and key in to topics in need of further consideration, as they move post-it notes around into new groups, forming and transforming nascent themes for the research. In addition to providing non-verbal opportunities for everyone to share ideas with the group (including those who are more soft-spoken), the visual nature of the exercise provides opportunities to make connections that might be lost in verbal discussion.
<urn:uuid:7df17b0d-0b77-41c7-b0f6-bb8ddcbcb026>
CC-MAIN-2017-26
http://bushwickactionresearch.org/research-methods/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00218.warc.gz
en
0.944927
1,298
2.828125
3
The U.S. Department of Education and Department of Justice, Civil Rights Division, this week issued a Dear Colleague Letter addressing the nondiscriminatory administration of student discipline. While the departments recognize the need to maintain safe and orderly educational environments within our schools, research has shown that students of certain racial or ethnic groups tend to be disciplined more than their peers. Federal law prohibits public school districts from discriminating in the administration of student discipline based on certain personal characteristics, such as race, color, and national origin. The guidance is intended to help public elementary and secondary schools administer student discipline in a manner that does not discriminate on the basis of race. The analytical framework set out in the guidance can also be applied to discrimination on other prohibited grounds, such as disability, religion, and sex. According to the Letter, discriminatory discipline can be shown when (1) similarly-situated students of different races are disciplined differently for the same offense; (2) districts strictly enforce a discipline policy against members of one racial group, while overlooking the same violations committed by members of another racial group; (3) districts intentionally target a racial group for “invidious reasons,” i.e., adopting a dress code policy that targets a style of clothing that students of a particular race are likely to wear; and (4) a teacher or administrator acts with racially discriminatory motives, i.e., the educator utters a racial slur when disciplining a student. Districts can also violate federal law when they implement facially-neutral policies that were not adopted with the intent to discriminate, but nevertheless have an unjustified effect of discriminating against students on the basis of race. These “disparate impact” situations require an examination of whether a discipline policy resulted in an adverse impact on students of a particular race as compared with students of other races. The Dear Colleague Letter offers a number of practical examples of situations in which the Departments might find discrimination in the administration of student discipline. It also sets out what the DOE considers when investigating claims of discrimination. The Letter stresses the importance of keeping good records on student discipline and the expectation that districts will cooperate fully in investigations conducted by the Office for Civil Rights. An Appendix to the Dear Colleague Letter offers specific recommendations for school districts, administrators, teachers, and staff to assist in identifying, avoiding, and remedying discriminatory discipline based on race, color, and national origin. The Departments also encourage school districts to contact them for technical assistance in applying this guidance to particular situations. To review the entire Dear Colleague Letter, as well as Guiding Principles and other resources issued by the Departments, go to the Department of Education website at http://www2.ed.gov/policy/gen/
<urn:uuid:b9b243f2-964d-4077-aa4c-71bbea2aa682>
CC-MAIN-2017-26
http://www.legaldigest.com/dear-colleague-letter-addresses-discriminatory-practices-in-student-discipline/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00218.warc.gz
en
0.944178
555
2.515625
3
Today is Sunday, Dec. 7, the 341st day of 2014. There are 24 days left in the year. Today’s Highlight in History: On Dec. 7, 1941, the Empire of Japan launched a pre-emptive air raid on the U.S. Navy base at Pearl Harbor in Hawaii as well as targets in Malaya, Hong Kong, Guam, the Philippines and Wake Island; the United States declared war against Japan the next day. On this date: In 1787, Delaware became the first state to ratify the U.S. Constitution. In 1796, electors chose John Adams to be the second president of the United States. In 1808, electors chose James Madison to be the fourth president of the United States. In 1836, Martin Van Buren was elected the eighth president of the United States. In 1842, the New York Philharmonic performed its first concert. In 1909, chemist Leo H. Baekeland received a U.S. patent for Bakelite (BAY’-kuh-lyt), the first synthetic plastic. In 1911, China abolished the requirement that men wear their hair in a queue, or ponytail. In 1946, fire broke out at the Winecoff (WYN’-kahf) Hotel in Atlanta; the blaze killed 119 people, including hotel founder W. Frank Winecoff. In 1963, during the Army-Navy game, videotaped instant replay was used for the first time in a live sports telecast as CBS re-showed a one-yard touchdown run by Army quarterback Rollie Stichweh. (Navy beat Army, 21-15.) In 1972, America’s last moon mission to date was launched as Apollo 17 blasted off from Cape Canaveral. Imelda Marcos, wife of Philippine President Ferdinand E. Marcos, was seriously wounded by an assailant who was then shot dead by her bodyguards. In 1987, 43 people were killed after a gunman aboard a Pacific Southwest Airlines jetliner in California apparently opened fire on a fellow passenger, the pilots and himself, causing the plane to crash. Soviet leader Mikhail S. Gorbachev set foot on American soil for the first time, arriving for a Washington summit with President Ronald Reagan. In 1993, gunman Colin Ferguson opened fire on a Long Island Rail Road commuter train, killing six people and wounding 19. (Ferguson was later sentenced to a minimum of 200 years in prison.) Ten years ago: Hamid Karzai (HAH’-mihd KAHR’-zeye) was sworn in as Afghanistan’s first popularly elected president. The House of Representatives passed an intelligence network overhaul measure, 336-75. Amway co-founder Jay Van Andel died in Ada, Michigan, at age 80. Singer Jerry Scoggins, who performed “The Ballad of Jed Clampett,” the theme song to “The Beverly Hillbillies,” died at age 93. Five years ago: The Obama administration took a major step toward imposing the first federal limits on pollution from cars, power plants and factories the same day an international conference on climate change opened in Copenhagen, Denmark. Manager Whitey Herzog and umpire Doug Harvey were elected to the baseball Hall of Fame by the Veterans Committee. One year ago: North Korea freed an 85-year-old U.S. veteran of the Korean War after a weekslong detention, ending the saga of Merrill Newman’s attempt to visit the North as a tourist six decades after he oversaw a group of South Korean wartime guerrillas still loathed by Pyongyang. Today’s Birthdays: Linguist and political philosopher Noam Chomsky is 86. Bluegrass singer Bobby Osborne is 83. Actress Ellen Burstyn is 82. Sen. Thad Cochran, R-Miss., is 77. Broadcast journalist Carole Simpson is 74. Baseball Hall of Famer Johnny Bench is 67. Actor-director-producer James Keach is 67. Country singer Gary Morris is 66. Singer-songwriter Tom Waits is 65. Sen. Susan M. Collins, R-Maine, is 62. Basketball Hall of Famer Larry Bird is 58. Actress Priscilla Barnes is 57. Former “Tonight Show” announcer Edd (cq) Hall is 56. Rock musician Tim Butler (The Psychedelic Furs) is 56. Actor Patrick Fabian is 50. Actor Jeffrey Wright is 49. Actor C. Thomas Howell is 48. Producer-director Jason Winer is 42. NFL player Terrell Owens is 41. Rapper-producer Kon Artis is 40. Pop singer Nicole Appleton (All Saints) is 39. Latin singer Frankie J is 38. Country singer Sunny Sweeney is 38. Actress Shiri Appleby is 36. Pop-rock singer/celebrity judge Sara Bareilles (bah-REHL’-es) (TV: “The Sing-off”) is 35. Singer Aaron Carter is 27. Thought for Today: “Any frontal attack on ignorance is bound to fail because the masses are always ready to defend their most precious possession – their ignorance.” – Hendrik Willem van Loon, Dutch-American journalist and lecturer (1882-1944). Copyright 2014, The Associated Press. All rights reserved.
<urn:uuid:45286eb4-4573-4687-83e9-8739b9d76cfd>
CC-MAIN-2017-26
https://navarrepress.com/today-in-history/sunday-dec-7-341st-day-2014/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00218.warc.gz
en
0.937495
1,121
2.671875
3
Muhammad followed an Arab group called the Sabians in proclaiming that Allah is the only true God. In the Qur’an, Allah is described as the creator of the world (41:9-12), who is all-powerful (2:106), all-knowing (33:40), wise (57:1), merciful (1:1), and just (11:45). A characteristic description of Allah is found in Qur’an 59:22-24: He is Allah besides Whom there is no god; the Knower of the unseen and the seen; He is the Beneficent, the Merciful. He is Allah, besides Whom there is no god; the King, the Holy, the Giver of peace, the Granter of security, Guardian over all, the Mighty, the Supreme, the Possessor of every greatness. Glory be to Allah from what they set up (with Him). He is Allah the Creator, the Maker, the Fashioner; His are the most excellent names; whatever is in the heavens and the earth declares His glory; and He is the Mighty, the Wise. While a Christian would have no objections to this description of God, the Qur’an adds qualifications that make the Islamic concept of God theologically unacceptable. Allah is not a Trinity (4:171; 5:73; 5:116); he is a Father to no one (5:18; 19:88-93; 21:26); he has no love for unbelievers (3:32); and he is the “best of deceivers” (3:54; 8:30). QUESTIONS ABOUT ALLAH
<urn:uuid:2617d059-dfed-4839-9d42-c60a5baa69de>
CC-MAIN-2017-26
http://www.answeringmuslims.com/p/allah.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320915.38/warc/CC-MAIN-20170627032130-20170627052130-00298.warc.gz
en
0.912792
344
2.875
3
Online works based on the Writings of Emanuel Swedenborg 2 Spirits and Men “What is man that Thou art mindful of him?” Psalm 8:4 Faith and Superstition The ages preceding the dawn of the New Church were steeped in superstition. Every graveyard was peopled with spectres. The Devil made his appointments with witches and wizards, and ministers of the church solemnly cooperated with panicky magistrates to prevent unlawful intercourse with spirits. Diseases were often treated by exorcism—by driving the obsessing demons away. Today most of us sneer at superstitions. And when we of the New Church nevertheless proclaim our faith in the proximity and influence of the spirit-world, there are those who sneer at us. But true faith is a very different thing from superstition. Superstition wishes to assign to the supernatural all unknown causes of natural happenings and evades reasonable explanations. It lacks authority. It creates fear rather than understanding. It advances elusive claims to special sanctity or unusual enlightenment which some will capitalize for their own gain or repute. It leads not towards freedom and charity and social progress, but to a slavery to forms and castes, and often engenders distrust and persecution. Superstition does not draw its origin from Divine revelation, but is conceived from human anxieties and undue ambitions while it is mothered by ignorance. It is not satisfied with the revealed knowledge and shows a lack of faith in the Lord’s omnipotent laws. But over against Superstition stands Skepticism, which proudly spurns admitting the existence of any invisible factors in life except the purely physical. Not unlike a company of physicians of whom Swedenborg speaks in one of his memorable relations, and who claimed to have cured the pains of conscience by mustard-plasters and cupping-glasses, many skeptics now explain all unusual mental states as mere symptoms of digestive disorders, wrong diet, or glandular deficiencies, and deny any other cause for crime than physical appetites and social maladjustments.2 A rational faith in the interdependence of the inhabitants of the spiritual world and those of the natural, and in the normal but unconscious communion of spirits and men, stands free from both superstition and skepticism. Such a rational faith is derived solely from Divine revelation. Yet it is also founded on the primary testimony of man’s own consciousness —that he is essentially a spiritual being, a free thinking mind, although he is clothed by a body of carefully selected material substances which in many ways limit the expression of his mental powers. Nor can any authentic experience upset our faith in the continual operation of the spiritual world—the proper world of human minds and living forces—into the world of nature. Without any hesitation we can postulate, and challenge any one to disprove, that life does not inhere in matter but inflows from an inner source. Indeed it is beyond the scope of science ever to deny that—ultimately—matter is derived from life. The mode by which the Lord created the universe is a subject far afield from our present discussion. Still it must be premised that the spiritual can act upon the natural, that the mind can be present in the body, and that there can be an influx of the life of spirits into men living on earth. And this because the world of matter is created and sustained by the Lord mediately through the spiritual world.3 The natural originates from the spiritual, as an effect is produced from its cause.4 The material world is therefore an “open world” which constantly receives a formative influx from the spiritual world. It is the spiritual world which—as the soul of the mechanical universe—imposes patterns and forms and at length moulds material substances to its own purposes, imaging its own forms in the forms of living organisms, whether plants or men. Only when the necessity of this is seen and acknowledged, can our faith in the existence of the spiritual world become rational. Faith, to be rational, must be calm. It must not be based in hysteria or upon passing moods, or on the testimony of purely exceptional and questionable phenomena; nor on research conducted in darkened chambers. Faith must see the operation of the soul upon the body and of spiritual things upon natural, not as a mechanical process or as a transfer of energy from one physical realm to another, but as the bestowal of the qualities of life upon visible things of nature, which, so far as their own substance and motions are concerned, are dead. Such a bestowal of qualities takes place, we conceive, by what the Writings call “influx.” The spiritual does not act upon matter as do physical forces; instead, it bestows qualities. When the Writings expound the doctrine that the life of God is mediated for human minds by the spiritual world, or by the spirits and angels there, they are not discussing the currents of natural energy which fashion corpuscular matter and course through the bodies of men, but the transmission of human qualities—of good and evil—qualities which make the natural activities of one man vastly different from those of another; different throughout, different in intention, different in mode, different in effect. The things of dead, elemental nature have attributes, dimensions, conditions, motions. But in a strict sense, nature has no qualities, no “states” of life. Its only state is one of death. Its only quality is its inertia, its lack of any power to change its state. All appearance of life in nature is borrowed from the spiritual world. In plants and in animals we see something added that is not of nature, something which gives an appearance not of blind motion but of purposeful change—a conatus or endeavor, an appearance of aspiration, will, and freedom. In man, this freedom becomes self-conscious. He is sensitive to the qualities of life. He is subject to various states and attitudes, and feels that he can to an extent determine them. He can choose between right and wrong. He cannot change his natural environment of a sudden, although this also will yield somewhat to his will. But in the inner realm of his spirit he feels himself above the conditions of nature, feels himself part of a free world in which he can will and think as he pleases; and for what he does in that world he feels responsibility. But even in his mind man is not utterly free. His natural mind is built up out of elements drawn from heredity and from education, from early impressions and unconscious influences. Is he solely accountable for all the changes within his mind— all the suggestions and impulses of his inner world? If he were, would it not be a terrible responsibility—beyond his power to bear ? One moment of impulse could determine his entire spiritual destiny—one decision might send him into anguish forever—if that were so! And if thus determined, he would no longer be free to change his general state. Even spiritual freedom is therefore governed most carefully by the Lord. The Lord leads man gently into his freedom. Even the spirit of man has to be surrounded by restraining conditions and circumstances. Its freedom has to be limited to a few things, tested. Its bounds have to be let out gradually, his states have to change by degrees. Therefore it is provided, that man’s spirit should be surrounded with attendant spirits, good and evil, through whom the influx of life may be accommodated so that his choice and his responsibility can be particularized and limited to his capacity at each moment. It is of Divine mercy that this is so; otherwise man could never be saved, but he would plunge himself into hell with the first evil choice. Instead of being at once introduced into the responsibility for his whole spiritual destiny, he is therefore gradually introduced into a choice between particular states, or between the delights offered by particular spirits, good and evil. He is not made responsible for the state of his whole mind at once. This, then, is the explanation of the many shifting and contradictory states of a man. He is held in an equilibrium between good spirits and evil spirits. He is given his chance to change his general state, by countless particular opportunities of choice. His spiritual freedom is doled out to him “piecemeal,” and from his moments of choice, a series of free decisions, his character is built up and gradually matures, and becomes able to enter an ever wider choice, a more intelligent freedom. This is, of course, illustrated by the gradual way in which one acquires freedom in natural affairs in youth and adult age. Parents, teachers, masters or employers will give the youth more freedom, more autonomy, so far as he can be trusted to understand what he is actually committing himself to. But when it is seen that he does not yet have any real insight into a situation or into the consequences of his actions, but is blinded by prejudice or simply borne away by impulsive desires, so far his freedom is—if possible—prudently withheld by wise governors. The spirit of man is therefore free and responsible only when he realizes the spiritual situation in which he is, and feels himself free to choose. In order that this may be the case, the Lord so orders the lives of men and spirits, that men should not sensibly feel the presence of spirits, or their influx into his mind. If we felt our will as the will of another prompting us we would not feel free—whether the prompting were good or evil. Yet at the same time, if we were never able to know how the case actually is, we would not be able to realize the nature of our choice. From doctrine we are therefore taught about the functions of the spirits who are with us; so that we may see the importance of our choice, the inward nature of our responsibility, the fact that in our consent or resistance to various states, suggestions, desires, and moods, we are in fact turning either towards heaven or towards hell. Man’s Dependence on Spirits It is therefore revealed as a truth in the Gospel, that man can do nothing except it be given him from above. And this general truth is in the Writings filled in with infinite particulars which show that man cannot lift hand or foot or think the least idea from his own will or understanding: for his will and understanding are vessels responsive to the spheres of spirits and angels. Swedenborg, in order that he might be instructed, was brought into a state in which he perceived the operation of spirits, yet—by a miracle—was at the same time not deprived of freedom.5 He then received “the clearest experimental proof that all human thought, will, and action are directed determinatively by the Messiah alone”; that there was “not even the least of thought that did not sensibly inflow” from spirits who were themselves also “ruled as passive powers” by the Lord. The spirits sensibly ruled the very movements of his body; convincing him that what appears to be our own deeds is the doing—or rather the willing—of spirits.6 Yet a man is free so far as he can decide what spirits shall attend him! Spirits who use man as a subject in this manner are not aware that they are with man. Such a spirit “knows so little of the man that he is not even aware that the man is anything distinct from himself.” Man is thus nothing in the eyes of spirits. And if they knew him—as they did Swedenborg— they might chide him with “being nothing” or at best an inanimate machine. Meanwhile the man all the time supposes himself to be living and thinking and the spirits to be “nothing!”7 In his Diary Swedenborg tells that, despite the fact that he could not make the least little motion of his body from himself, yet at the same time there was insinuated into him a faculty of choice in whatever he did. Spirits then supposed (hat he might have acted otherwise. But it was shown them that as a matter of fact the circumstances and the spiritual influxes had conspired and led Swedenborg to what he had (afterwards) decided to do; and also that they themselves had effected nothing from themselves but were subjects of other spirits and societies in an unending chain. It then seemed to these spirits that, if so, they were “nothing”; and they were unwilling to admit this. But Swedenborg insisted that this was indeed true; still, it was enough for them that they seemed to themselves to be able to think, speak, and act as from themselves, and to be their own. What more did they want?8 Surprisingly, Swedenborg instructed some spirits that only when they acknowledge that they are nothing, can they begin to be something. Nor was it enough to know or say that one is nothing; one must believe it.9 “Such is the equilibrium of all in the universal heaven, that one is moved by another, thinks from another, as if in a chain; so that not the least thing can [occur from itself]; thus the universe is ruled by the Lord, and indeed with no difficulty !”10 But when some spirits were unable to tolerate the expression “that they were nothing,” the seer consoled them by saying that “they are always something, but that something is from the Lord.”11 And it is the same with man: “Unless the Lord saw the man to be something,” the whole world of spirits would see him as nothing—or as an inanimate thing. He is “something—not a mere idea of being !”12 And this something is something of reception. Man cannot control the experiences that come to him: but he can receive or reject, react affirmatively or negatively. Heaven consists in every one regarding himself as nothing.13 The celestials know this. They know that to attribute anything to themselves, except reception, is of evil. No doubt this is involved in the Lord’s saying: “Your speech shall be Yea, yea, Nay, nay; whatsoever is more than these, cometh of evil!” The Non-appropriation of Evil Evil has no power over one who in sincerity of faith believes himself to be nothing !14 How vitally important and practically effective this truth of faith is, may be judged from the doctrine which describes how evil enters into man. Evil is continually infused by unclean spirits into man’s thoughts, and is as constantly dispelled by the angels. This does not actually harm man. “Not that which enters the mouth defileth a man,” but that which proceedeth from the heart! It is by detention in the thought and by consent and afterwards by act and enjoyment that evil enters into the will.15 If so, it is appropriated to man—imputed to him as his. But the reason that it is appropriated to a man is that the man believes and persuades himself that he thinks and does this from himself. He identifies himself with it—and so takes sides with the evil. Believing that it is his own, all his self-pride upholds it and defends it. The evil was not produced by man! Evil spirits—the whole network of hell—produced it, infused it, and subtly made man to feel as if he did it from himself. “If man believed as the case really is, then evil would not be appropriated to him, but good from the Lord would be appropriated to him; for then, immediately when evil flows in, he would think that it was from evil spirits with him; and when he thought this angels would avert and reject it. For the influx of angels is into that which a man knows and believes and not into what man does not know and does not believe.”16 If an evil is appropriated it can be removed only by the arduous and long road of self-examination and of actual repentance. But here we are shown an easier way! Shown how to shun evils before they become man’s own or before they become actual or confirmed; shown how faith defends men from evil! And if a man really believes that the good that prompts him inflows from the Lord through heaven, he is thereby freed from any self-righteous reflection on his own act—a thought which would poison the good which he has received and turn it into the evil of merit and the pride and the contempt of others that follow in its wake. The knowledge and belief that all our affections, emotions, and moods are the actual results of the presence of spirits, good or evil, must become a watchman who must never shimmer. This faith—that good inflows from heaven and that evil inflows from hell, and that man, except for reception, is “nothing”—must be firmly fixed in definite knowledge. And to the New Church the knowledge is given in a vast body of information about spirits of all types and classes. From the instruction given in the Writings we may perhaps also gather information as to how to say “Nay, nay” to the spirits who produce various evil moods that captivate us; as to how we can to some extent modify or change these states into which we fall—or rather withdraw from them by degrees. Choice versus Freedom Man’s spirit is free. Yet it is bound up with the states of the men and spirits around him. No one can deny that our thoughts and affections are influenced by the men of the society with which we are associated in the world’s work and pleasures. Even the church undergoes its cycles of common states, its temptations, its progression in which all take part. Even angelic societies whose uses are intertwined by marvelous modes experience common states, recurrent mornings, noons, and evenings; for each angel is a center for the influx of all others.17 Man’s spirit is free, but never independent! It cannot alter its general spiritual environment by any sudden decision, any more than a man in the world can change the face of nature. The speed of the growth of the mind and of the progression of a man’s spirit is not measured by the fixed time which is associated on earth with the clock and the calendar and the orbit of the planets. Yet spiritual states have their durations—require a preparation and a gradual growth, have their own cycles, rhythms, and climaxes which cannot be circumvented. And the development of the state of one spirit often waits upon that of another, for it depends upon the progressions of the society of which he is a part. How men’s spirits are affected by the spirits who live in the world of spirits is seen from the state before the coming of the Lord, when no flesh could have been saved unless the spirits of that world had been reduced into order. And history repeats itself. For Swedenborg notes that in his day the, whole world of spirits had become evil, and therefore it could not but be that mankind should become worse through the nearer influx of hell. The good inflowing from the Lord availed less and less, until man could hardly be bent to any genuine good.18 A general judgment then became inevitable; and it took place in the world of spirits in the year 1757.19 Its result was to restore spiritual freedom. Men and spirits had been in spiritual captivity—had been in states which they could not alter or change. The progression of their spiritual life of reformation and regeneration had been arrested because they had been intricately entangled with evil spirits from whom they had no power to separate. It is not to be thought that men living before the last judgment did not have free agency in spiritual things. All men have free choice, then as now. In the issues which they discerned from time to time they had their choice. But freedom implies more than choice. It implies that one should be free to follow out one’s choice, to progress according to the choice, and find and enter into the delights of his ruling love. Interiorly, all salvable spirits in this world and in the “lower earth” of the other life had made a choice of good as over against evil. Yet they were so much a part of the perverted world of spirits that they could not shake off their infesters who stole their delight in spiritual good and truth, insinuated unhappiness, destroyed cooperation, induced obscurity and confusion as to what was right and wrong, and prevented them from finding their way to heaven—or to the true uses of heavenly life. The freedom to progress requires an ability to perceive interior truths. It was this new freedom that was “restored” when the Lord ordered the world of spirits by His redemptive work.20 The ordering was done by separating the spirits there according to their various qualities, so that spirits in different spiritual states might be seen in contrast, in their true colors, or—in the light of heaven. The light of Divine truth which brought about the judgment and reduced the spiritual world into order is still present in that world; and that Divine light is spreading also into this world of ours, through the teachings of the Writings of the New Church. It is the same light. It passes “not through spaces, like the light of the world, but through the affections and perceptions of truth.”21 It affects, and tends to distinguish and order, the spirits who are with us. We would surmise that it also orders the things which go on—subconsciously—within man’s thinking; and thus ensures the free operation of the rational faculty with men, for good or for evil. But consciously and directly it reaches us in the Writings. The teaching is, therefore, that after the last judgment (when the group of spirits which the Apocalypse calls “the Dragon” was cast down), “there was light in the world of spirits. . . . A similar light also then arose with men in the world, from which they have a new enlightenment.”22 The Writings are shedding a new light on all the states through which men pass on earth. They also disclose the character of the spirits who are responsible for our moods of sadness, temptation, melancholy, enthusiasm, rashness, confusion. They give us a knowledge by which to judge wisely how far we can resist such states, and how far they should be left to the Divine providence. It is our purpose to consider this new approach to a rational and spiritual life thus opened to the New Church. But before we enter upon this task it is necessary to recount the perils which attend any mortal effort to break open the gates of the unseen world. New book: Starting Science from God.
<urn:uuid:e193384a-cead-4363-a1c8-38cb8061d9f2>
CC-MAIN-2017-26
https://havau22.com/tag/spirits-and-men/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320915.38/warc/CC-MAIN-20170627032130-20170627052130-00298.warc.gz
en
0.976986
4,704
2.53125
3
Internet-Based Reporting to the Vaccine Adverse Event Reporting System: A More Timely and Complete Way for Providers to Support Vaccine Safety Background: On March 22, 2002, Internet-based reports (IBRs) were added to the Vaccine Adverse Event Reporting System (VAERS) to allow rapid, expedited reporting of adverse events (AEs) in anticipation of wider use of counter-bioterrorism vaccines such as those against smallpox and anthrax. Objectives: To evaluate the impact of IBRs on the timeliness and completeness of vaccine AE reporting. Methods: To evaluate timeliness and completeness, we compared the proportions of IBRs with non–Internet-based reports (NIBRs). Report interval was analyzed for timeliness and age at vaccination, birth date, and onset date for report completeness. To evaluate the impact of the smallpox vaccination program, we compared smallpox vaccine reports separately. Because influenza vaccine is the most widely used vaccine in adults each year, we compared influenza vaccine reports separately. Results: During the study period, VAERS received 54 364 NIBRs (85.8%) and 9008 IBRs (14.2%). Sixteen percent (1455) of IBRs followed smallpox vaccination. Overall, for all vaccines and for smallpox vaccine alone, IBRs had a greater proportion of completeness and a shorter report interval. The proportion of most frequently reported AEs did not differ between IBRs and NIBRs. A higher proportion of adults (18–64 years old) who received influenza vaccine chose to complete an IBR (62% vs 48%). Conclusions: The improved timeliness and completeness of IBRs allow VAERS to more rapidly detect new or rare vaccine AEs. This important advantage is critical in times of increased public concern about vaccine safety. Clinical vaccine providers should be aware of VAERS and use IBRs whenever feasible to report vaccine AEs. - Accepted November 29, 2010. - Copyright © 2011 by the American Academy of Pediatrics
<urn:uuid:eeb668cd-8355-4ab3-bfa9-f6bdb1ddae79>
CC-MAIN-2017-26
http://pediatrics.aappublications.org/content/early/2011/04/18/peds.2010-1722G
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321938.75/warc/CC-MAIN-20170627221726-20170628001726-00378.warc.gz
en
0.918496
430
2.640625
3
This article comes to us via the Basqueresearch page: Study confirms importance of lineages in the Cantabrian coast of the Bay of Biscay in the European genetic map A PhD thesis at the University of the Basque Country (UPV/EHU) involved a detailed study of the maternal lines (mitochondrial DNA) of three autochthonous human populations in the Cantabrian coast area of the Bay of Biscay and which aimed to clarify the role of these populations in the postglacial recolonisation in Europe. The study, carried out by Dr. Sergio Cardoso Martín, confirmed the importance of the proposed H1 and V lines as well as considering lines J1c, U5b and T2b as significantly important demographic landmarks in the history of the evolution of European human populations. One of the aspects that has sparked most interest in recent years in the field of Population Genetics is the postglacial repopulation of Europe that happened about 15,000 years ago. A great amount of this research has focused on the analysis of mitochondrial DNA or maternal lines, using them as a tool to assess the impact of large human migrations in the make-up of the genetic heritage of current European populations. With his thesis entitled, “Diversity of the mitochondrial genome in autochthonous populations in the Cantabrian coast area: Traces of postglacial recolonisation in Europe”, Dr. Sergio Cardoso Martín explored the involvement of the Franco-Cantabrian populations of the Franco-Cantabrian refuge during the postglacial recolonisation of Europe, by analysing the variability of mitochondrial DNA. The Franco-Cantabrian refuge, extending from the south-east of France to the eastern end of the Cantabrian coast, is considered to have been the main settlement for groups of humans who arrived from the north of Europe during the last glacier age, in order to escape from the extremely adverse weather conditions. Sergio Cardoso Martín has a degree in biochemistry and is currently working in postdoctoral research. His PhD thesis was directed by Dr.Marian Martínez De Pancorbo of the Department of Zoology and Animal Cell Biology at the Faculty of Pharmacy (UPV/EHU) and of the General Genomic Research Service: DNA Bank, and by Dr. Miguel Ángel Alfonso Sánchez, of the General Genomic Research Service: DNA Bank. Looking for genetic markers In order to carry out this research, an analysis was undertaken of a sample made up of 194 individuals belonging to three autochthonous populations from the Cantabrian coast: from the Arratia and Goierri valleys in the Basque Country, the Valley of Baztan in Navarre and from the Pas valley in Cantabria. The HVI and HVII segments from the mitochondrial DNA control region of the 194 participating individuals were sequenced. Moreover, the complete mitochondrial DNA for 43 of the individuals was sequenced with a twin objective: to reconstruct the development of the various maternal lines from the Franco-Cantabrian refuge area and to confirm the results of the analysis of the sequenced segments. The results of this analysis enabled the classification of the individuals under study into genetic families known as haplogroups. The frequency of the various haplogroups was also analysed - their spatial distribution throughout Europe and the age of the most recent common ancestor to the various lines was estimated. Reduced genetic diversity Most of the 194 individuals analysed presented mitochondrial haplogroups characteristic of the European populations. Additionally, very infrequent haplogroups were found and exceptionally individuals, carriers of a haplogroup of African origin, were found in the Pas Valley. The most frequent haplogroup amongst our samples from the Basque Country and Navarre turned out to be H, and, more concretely, the subhaplogroup H1. Also notable amongst these two populations was the high frequency of the J1c line, and particularly in the case of the north of Navarre, lines U5b and T2b also registered notable frequencies. In the Pas Valley, on the other hand, the greatest frequency corresponded to haplogroup V. The adverse climate and the orography of the terrain would have favoured a marked isolation of the populations and, in consequence, a local genetic microdifferentiation that is reflected today in the predominance of some or other maternal lines in each of the analysed populations. Apart from presenting caracteristic haplogroups, as regards diversity, the research showed that the three autochthonous populations studied were characterised by reduced values for genetic diversity with respect to other European populations, even with respect to the rest of the Iberian Peninsula. The populations of the Basque Country and the Pas Valley, together with that of Galicia, demonstrate the lowest diversity of lines within the European context. The population of the north of Navarre showed values within the range of European populations taken as reference. The author of this study has put forward these differences in mitochondrial genome diversity as being related to the lower isolation of northern Navarre, given the powerful influences of the presence of Romans, Arabs and Jews in the region, as well as its location on the pilgrim route to Santiago de Compostela. The comparison undertaken with other European populations showed that certain mitochondrial haplogroups presented their maximum level of frequency in the area of the Franco-Cantábrico refuge. It can be deduced from these findings that the definitory mutations of these haplogrupos could have originated in the refuge zone, or otherwise could have been transported by humans who retreated from the north of Europe, thus substantially increasing their frequency subsequently as a consequence of the genetic drift, a phenomenon known as the “founder effect”. Genetic markers of recolonisation in Europe The study enabled the confirmation of the importance of lines H1 and V – the most abundant amongst the sample of analysed individuals – as genetic markers of the postglacial recolonisation from the refuges of southeast Europe. Also, the study’s findings showed that the T2b, J1c and U5b haplogroups constitute “paleolithic maternal lines”, well conserved to date and with relevant frequencies in the Franco-Cantabrian refuge area. This is why it is recommendable to include the area in future studies aimed at finding genetic tracks of the postglacial repopulation of Europe and at the evaluation of the impact of this grand demographic event in the reconstruction of the genetic patrimony of contemporary European populations. .... ... .
<urn:uuid:55194ed6-2094-471d-ae74-079a870d4752>
CC-MAIN-2017-26
http://txikilike.blogspot.com/2008/10/lineages-in-cantabrian-coast.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323721.80/warc/CC-MAIN-20170628171342-20170628191342-00458.warc.gz
en
0.936326
1,371
2.78125
3
Half Price Initial Consultation Printable VoucherView Our Special Offer » Could not load news feed WATCH YOUR BACK You rely on your spine – so take care of it! Your spine protects a vital part of your body – the spinal cord, which delivers the messages from your brain to your body. Almost every day you carry your schoolbag, sit for hours at your desk, and work or play at a computer. You might play sports too. Are you sure you’re protecting your spine? You’re not a superhero! Sad, but true. Lifting, carrying, sitting for too long (particularly sitting slumped forward) and sporting injuries can all affect the proper movement of your spine if you don’t actively protect it. You might not notice at first, but after weeks, months or even years, you could start getting back pain, headaches and other problems that stop you leading a healthy life. You don’t want to end up like this! You can make sure this doesn’t happen to you by following the six golden rules on this page. Make sure that your parents and teachers read them too, so that they can help you to keep fit and healthy. You can tell them that a third of adults treated by chiropractors have pain that started then they were children. Chiropractors can help too What if you’ve already got pain in your back, neck or head? Your local chiropractor has been trained to find out the cause of your pain and use his/her hands to make manipulations to your spine that can make you feel better. Chiropractic is a treatment that can take the strain off your spine without using painkillers or other drugs. People of all ages get treated by chiropractors – including lots of parents and teachers! According to chiropractors the common causes of joint and back pain amongst school children are: - Lack of exercise - Bad posture - Computer games - Ill-fitting desks - Using a PC Bag it up If you have to carry a bag to school, a rucksack is the best option as long as you carry it over both shoulders, and the straps are adjusted so that the bag is held close to your back. Keep it light Make sure you’re not carrying any unnecessary excess weight – check that you are only carrying essential items. Best foot forward Make sure you’re wearing good soft-soled shoes that are supportive and have a good grip on the ground to make carrying a heavy bag easier. Lack of exercise is your worst enemy. Take regular and frequent exercise – the fitter you are, the less likely you are to injure yourself. It doesn’t have to be at David Beckham levels – just something that you enjoy, uses all your joints and increases your heartbeats. Staying still for a long time is bad for your spine. Limit yourself to 40 minutes on the computer or in front of the TV before you get up and do something else for a while. Make sure your computer or games console is set up so that you’re sitting comfortably and your spine is supported. You may not realise that the position you’re sitting in is painful when you’re concentrating on what you’re doing.
<urn:uuid:84ebc3d1-ed62-4561-a09c-ffc0caa080cd>
CC-MAIN-2017-26
http://www.lichfieldchiropractic.com/watch_your_back.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323721.80/warc/CC-MAIN-20170628171342-20170628191342-00458.warc.gz
en
0.93756
689
2.6875
3
Advanced Art students practiced the techniques of "one stroke" painting, using resource materials by popular decorative painters, such as Donna Dewberry and Priscilla Hauser. Additional resources included a wide variety of books on decorative and "folk art" painting, and an attractive display was set up in the classroom by a parent who works in this art style. Many students--who are highly skilled in realistic drawing and painting--found this to be a surprisingly difficult technique to master! They first practiced the brushstrokes on clear acetate sheets (which were washed off and reused) and then on paper to learn how to accurately "double load" their brushes and use the correct amount of "floating medium." For their final project in this unit, students had to create a gradient background--in a color of their choice--on an 8x10 canvas panel. To demonstrate their understanding of the technique, they had to paint at least three different "one stroke" flowers. They were given the option of adding more traditionally painted shades, shadows and highlights, though few students chose to do so. In addition to learning about the history of decorative painting (which included an overview of Norwegian "rosemaling" and French "tole painting"), these students developed a new appreciation for the considerable talents and skills of accomplished "craft" and "folk" artists!
<urn:uuid:f9557fd9-fe9d-4875-b5f1-e417e534c8ab>
CC-MAIN-2017-26
http://art-rageous.net/DecorativePainting.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323970.81/warc/CC-MAIN-20170629121355-20170629141355-00538.warc.gz
en
0.967164
274
3.53125
4
“The Great Adventurers of the modern world”: with these words Charles Péguy, the great French Catholic poet of the early twentieth century, honored the fathers of families. Péguy was killed in the first of the modern world’s global wars, but if he were alive today, he would probably feel the need to underscore his statement. What soldier of fortune faces a greater challenge than that confronted by the father, in partnership with his wife, navigating the ship of the family through the currents of modern life? Erupting from the depths of life’s sea, raging storms — seen only as warnings on the barometer in Péguy’s day—now crash full against the seams of the family ark, tearing at its white sails of holiness, pounding against its bulwarks that are the unity and indissolubility of marriage. If at any given time the parents underestimate the danger or fail to respond adequately to the challenge, the ship may founder. “The Great Adventurers of the modern world,” indeed. And called to an adventure of no little importance: the pitting of ourselves against all the enemies of fatherhood; the warding off of all the daily advances of a multibillion-dollar advertising industry devoted to making us and our children avaricious, lustful, and proud — all of this, yes, but more. Ours is not only a defensive action; we must at the same time take the offensive. We fight against storms, but for the sake of arriving at our destination. The enemy without must be held off while each day sees new attacks of the enemy within. And yet, for all this, the call to sanctity remains and is one conditioned to each person’s state in life: for fathers of families, it is in and through our fatherhood that we are to achieve our fullest holiness. Not in spite of marriage and our family will we become holy, but because of them. Our parental work, when performed in Christ, is our holy work, as holy a work as that of any celibate religious who works full-time in a parish ministry, cares for the poor, houses the homeless, or prays unceasingly in a cloister. There is particular relevance for us, as fathers, in that incident which occurs in the Gospel of Mark: “And He sat down and called the Twelve; and He said to them, ‘If anyone would be first, he must be last of all and servant of all.’ ” It is in and through the experiences of marriage, and in the labors of rearing a family, of welcoming God in the children we are given, that we are to advance in the spiritual life. We were called to the vocation of Christian marriage. We are laypeople, and our care for our families, our domestic churches, is at the very heart of the life of the Church as a whole. Our daily work, whatever it may be, our bill-paying and our bedtime reading, is holy already; there is no need for us to think up ways to make it holy. It remains for us only to remember the holiness of all that we are about, to recognize and appreciate this fact and celebrate it in ways natural to family life. This is the glorious adventure upon which we are embarked. Yet, how often we fail! Our resolutions seem so quickly shattered under one or another of the day’s poundings. We are human beings, not angels; we are the sons and daughters of the fallen Adam and Eve, and we ache with the bruises of all our own falls. “Out of the depths I cry to Thee, O Lord . . .” and cry we must, but we must not become discouraged, for our major conquest is intended to be ourselves. All of the pounding to which we are submitted on the anvil of our daily lives is intended to form us in the image of Christ. Like iron that, to be shaped, must be heated and pounded, heated and pounded, so we are heated with the flames of daily life and shaped by the life of God in us. “It is for discipline that you have to endure,” the letter to the Hebrews says. “God is treating you as sons; for what son is there whom his father does not discipline? . . . He disciplines us for our good, that we may share His holiness. For the moment all discipline seems painful rather than pleasant; yet it yields peaceful fruit of righteousness to those who have been trained by it. Therefore lift your drooping hands and strengthen your weak knees, and make straight paths for your feet, that what is lame may not be put out of joint but rather be healed. Strive for peace with all men, and for the holiness without which no one will see the Lord.” In Christ, even our failures become a source of grace when we accept them in imitation of His humility and courage; even our anxieties become a path to holiness when we ally them with His sufferings. All that we do and say, if it is done and said in Christ, is done and said well, for true wellness is life in Christ. In light of this, the father’s recognition of the way in which his family impinges upon him, far from being the source of any malice toward those who are a drain upon his resources and time, is seen as the way in which he is being transformed in Christ. Such a man takes joy in receiving the living souls entrusted to him with patience and kindness, remembering the words of Jesus: “I say to you, whatever you did for one of these least brothers of mine, you did for me.” Our homes become schools of love for all who live there, a love that of its nature radiates outward, first to the receiving of all guests as Christ and then to the meeting with equal love those who lack sympathy with our beliefs and our way of life. We can will the good of all our enemies. All those who are dedicated to ideals destructive of all we hold dear have a call upon our prayers. Perhaps through the love we hold for such people, the example we set for them in Christ, we will one day be privileged to hear the words that St. Augustine addressed to St. Ambrose: “I was not convinced by your arguments, but by the great love you showed me.” Editor’s note: This article is adapted from a chapter in The Father of the Family, which is available from Sophia Institute Press. The image depicts actor Dan Blocker, playing with his children and is via Wikimedia Commons.
<urn:uuid:41ba25f1-8f6c-49ce-8e34-0434647b699a>
CC-MAIN-2017-26
http://catholicexchange.com/fathers-great-adventurers-modern-world-2
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323970.81/warc/CC-MAIN-20170629121355-20170629141355-00538.warc.gz
en
0.974604
1,386
2.5625
3
1. A profit-making business that is a separate legal entity and in which ownership is divided into shares of stock is known as a: A. sole proprietorship B. single proprietorship 3. A list of assets, liabilities, and owner's equity of a business entity as of a specific date is: A. a balance sheet B. an income statement C. a statement of owner's equity D. a statement of cash flows 4. If total assets increased $20,000 during a period of time and total liabilities increased $12,000 during the same period, the amount and direction (increase or decrease) of the period's change in owner's equity is: A. $32,000 increase B. $32,000 decrease C. $8,000 increase D. $8,000 decrease 5. If revenue was $45,000, expenses were $37,500, and the owner's withdrawals were $10,000, the amount of net income or net loss would be: A. $45,000 net income B. $7,500 net income C. $37,500 net loss D. $2,500 net loss A corporation, organized in accordance with state or federal statutes, is a separate legal entity in which ownership is divided into shared of stock. A sole proprietorship, sometimes called a single proprietorship, is an unincorporated business enterprise owned by one individual. A partnership is an unincorporated business enterprise owned by two or more individuals. The properties owned by a business enterprise ... This solution looks at accounting principles and practices: proprietorship, properties, and financial statements.
<urn:uuid:2b14bc89-8f56-44b0-9897-3ce9920fa0ea>
CC-MAIN-2017-26
https://brainmass.com/business/accounting/accounting-principles-practices-63601
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323970.81/warc/CC-MAIN-20170629121355-20170629141355-00538.warc.gz
en
0.96157
348
3.0625
3
(EMAILWIRE.COM, August 17, 2015 ) Orlando, Florida -- Athletes, especially females, are more prone to injuries, and this is due to the physical activities they regularly engage themselves in. While they are highly susceptible to injuries, there are things that they can do to protect their knees. A recent study reveals the secrets for preventing knee injuries among female athletes. Studies have been conducted to determine the ways of helping athletes avoid injuries. The study points from these studies can be very useful to athletes. Experts are trying In a study, it was found that an exercise program, which involves landing on the ground correctly while running, playing and jumping on the soccer field, has helped reduce serious knee injury cases by 77 percent. Experts consider the findings of this study significant mainly because female athletes are believed to be 8 times more prone to injuries than men. These injuries include anterior cruciate ligament or the wear and tear of a band tissue. Another study conducted by Swedish researchers involved 1,506 female subjects between ages 13 and 19. The participants were divided into two groups and one received HarmoKnee, which is a physical exercise program. This program was created for athletes and is combined with the education about injury risk given by their parents and coaches. Liisa Byberg, PhD, the study's lead author from the Department of Surgical Sciences, reveals that the program features various warm-up exercises, including jogging and high-knee skipping. Other exercises are included, such as muscle activation, sit-ups and other strength stability and balanced training with jumping exercises. The Archives of Internal Medicine published the study, and it was found that only three athletes suffered from knee injuries from the group that received HarmoKnee. There were also 13 girls who suffered from injuries who belonged to the control group. According to Dr. Byberg, this only demonstrates that injuries could potentially be prevented. Another interesting thing about the study was that athletes who received HarmoKnee experienced less severe injuries than those in the control group. Exercise is just one of the best ways to strengthen knee health. Today, many people are resorting to natural alternatives such as glucosamine for maintaining their joint health. Glucosamine supplements are believed to help repair joint cartilage damage, and improve one's mobility. Supplements that not only contain glucosamine, but also other ingredients such as chondroitin, MSM and turmeric, are highly recommended by experts (http://www.amazon.com/Glucosamine-Sulfate-Chondroitin-Supplement-Turmeric/dp/B00DUMO9X4/). VitaBreeze is a nutraceutical brand that manufactures high quality natural supplements to help people live a healthy, enjoyable and longer life. Michelle O Sullivan This is a press release. Press release distribution and press release services by EmailWire.Com: http://www.emailwire.com/us-press-release-distribution.php.
<urn:uuid:fab32692-8d8d-4ded-a557-cf83f1cf696a>
CC-MAIN-2017-26
http://crweworld.com/article/press-releases/989/a-recent-study-reveals-the-secrets-for-preventing-knee-injuries-among-female-athletes
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00177.warc.gz
en
0.966459
616
2.890625
3
The Galactic Empire was the ruling government for the entire Star Wars Galaxy between the years 18 BSW4 and 4 ASW4, and continues to control several worlds within it. Since the Yuuzhan Vong invaded this number has dwindled considerably. The Empire portrayed in the films in evil, there can be no dispute there, George Lucas created it to be evil and therefore it is, however the times outside the films are out of his control. In the years that followed the Empire reformed greatly, outlawing slavery and xenophobic practices, but maintaining a very efficient way of ruling. The Empire is what replaced the old Galactic republic when it collapsed. The republic collapsed slowly as the bureaucrats took over, its death was sealed when the Chancellor , was given emergency powers to pass laws without consent of the senate. This is the same way Adolph Hitler became the dictator Palpatine began secretly training Dark Jedi, among them was Anakin Skywalker, who became Darth Vader. Palpatine sent these agents of evil out to destroy the Jedi Order. This was completed, sans two, (Yoda and Obi-wan Kenobi). The Jedi gone, Palpatine had no physical opposition. Palpatine managed to stay in power by creating an almost perpetual war. He was elected into power so he could create a Grand Army of the Republic, to combat the separatists. However, he was also the leader of the separatists. Eventually he allowed the Republic to defeat the separatists, because a new threat to his regime had emerged. The Rebel Alliance. Palpatine declared a new state of emergency and extended his power again. At this time he was still seen by the masses to be benevolent, but he was slowly creating a system of ruling by fear. The rebels had noticed this and were attempting to put a stop to it. It was around now that he began to refer to himself as emperor of an empire. The Empire was born. The Emperor commissioned the building of the two Death Stars, the first was designed for the purpose of ruling by fear, but was destroyed by the rebels in SW4, the second Death Star, built in SW6, was designed for taking down the rebels. In a grotesquely arrogant plan, the rebels were lured to the construction at Endor, but were ultimately victorious. The Emperor was killed by his henchman Darth Vader, but would have died anyway when the Death Star was destroyed. The Emperor had created a very efficient meritocracy within the military and bureaucracy, ensuring that very intelligent and loyal people were at the top. Unfortunately these people were power-hungry and after the death of the Emperor the system almost fell apart in the struggle for power. The assumption the Rebels had made was it would simply be a cleaning up job after the Emperor died, but in fact the Empire lived on. The system of ruling remained the same, Moffs Governed sectors etcetera, but the position of overall ruler changed hands fairly frequently. The first leader after him was Dark Lady Lumiya, who rallied the Empire against some hostile invaders. Then power fell to Yssanne Isard, who was successful for a while in unifiying the Empire, but ultimately she lost Coruscant and power and the Empire was split between various warlords. The most notable being Grand Admiral Thrawn. Grand Admiral Thrawn was a tactical genius who very nearly lead the Empire to success, however he was thwarted by his bodyguard, who turned against him. Thrawn was really the last hope for the Empire. It is true however, that the Emperor himself was resurrected as a clone, but the clone was mad and stopped by Luke Skywalker and his sister. After that the Empire became very fractionated, only reunited when the various squabbling Warlords were executed by Admiral Daala. She was defeated when she tried to attack the Jedi Training Academy. She handed power over to Admiral Pellaeon, who was Thrawn’s second in command. After years of keeping peace in the Empire, he eventually signed a historic treaty with the New Republic, approximately 19 ASW4. The Empire retained many planets that preferred the more efficient style of governing, it is no longer evil, and is semi-democratic. However, with the invasion of the Vong, the Empire lost many of the worlds under it’s control. It is currently allied with the New Republic in fighting against the invading aliens, but, like the New Republic, it is losing badly. The fate of the Empire remains undecidedd. The Empire originally worked on a system of advisors and a ruler. The Emperor would make the final decision, but the senate could influence it. He would call the senate and listen to their opinions, then give his, and let them argue it with him. This was not necessarily fair though, because he had at some point gained great skill in the dark side of the force and so could influence their minds. However the much of the senate was falling under the sway of a young senator named Leia Organa, from Alderaan and he suspected (correctly) that she was involved with the Rebel Alliance, this lead to him permanently dissolving the senate just prior to SW4 A new system was devised by a governor named Tarkin. He proposed a system where the Galaxy is divided into sectors according to the amount of rebellion going on in them. Each sector would be ruled by a Moff and would contain several star systems, the Moff would collect taxes and enforce the New Order and would answer to a Grand Moff. A Grand Moff would be in charge of several sectors, and would answer to the Emperor himself. Moffs would also have the power to control the military in their sector, but could be overruled by a Grand Moff. But there was much corruption, Moffs could be bribed and often followed personal agendas, rather than working for the good of the Empire. The Emperor however, had another plan. He wanted to know that worlds would fall in line, so he commissioned the building of a superweapon, a space station so powerful that it could destroy a planet. The Death Star. After demonstrating it by destroying the peaceful planet of Alderaan, he intended never to use it again. He believed that the mere ability to destroy worlds would be enough to bring the Galaxy fully under his control. However the Rebel Alliance managed to steal the plans for the Death Star and found a weakness. The managed to destroy it, much to the Emperor’s rage. The Empire has a largely nationalised economy, it has a policy of taking businesses by force to fund its war effort. At the beginning of SW4 Luke mentions that the Empire is looking a little closely at his uncle’s farm. This is because the water farming industry there was making a substantial profit, and the local Moff, Tarkin, had decided that the industry was worth enough to be integrated into the Empire. The Empire had very large expenses, if you consider the amount of Storm troopers they have to pay and the amount of Star Destroyers they need to pay for it isn’t cheap, a single TIE Fighter costs 30,000 credits. And that is just the military budget. The Empire did not, however, have extortionate taxes. People living under the Empire were reasonably comfortable, the Empire paid through the huge businesses it owned. In a large galaxy there are almost unlimited resources, and therefore the Empire was able to create jobs to make itself more money. But resources alone are not enough. The Empire also needed workers for its huge construction projects such as the Death Star. The Emperor’s own xenophobia helped here since he could legalise slavery and allow the kidnapping of what he saw as the lesser species such as Wookies. The Empire has since illegalised slavery, but is still able to support itself by restricting it’s military construction. Sources: www.starwars.com, the movies, the books
<urn:uuid:6ae7e2e7-a6a8-408e-b3cb-bab3ee23e682>
CC-MAIN-2017-26
https://everything2.com/title/Galactic+Empire
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00177.warc.gz
en
0.988621
1,614
2.59375
3
People were undeniably the focus of nineteenth-century photographic portraits, but it's easy to forget the innumerable other details went into the composition and construction of photographs. First and foremost were the photographers, artists who occasionally turned their lenses on themselves. Note that this 1870s photographer sits in front of a plain backdrop on grass and also appeared in a different pose. Most photographic studios features a variety of painted backdrops. Often these canvases and artificial walls depicted quiet garden or domestic scenes that literally faded into the background. But sometimes photographers stocked backdrops that complimented the mindsets and costumes of their subjects, as in these three images (to take only a small sample): Three mid-late nineteenth-century tintypes with unique backdrops. Such backdrops were painted, with various degrees of realism, by professional artists who most likely also worked on murals, houses, and even fine art. Occasionally, these backdrop artists had their photographs taken as if caught in the act of preparing the studio. This 1850s daguerreotype shows a studio backdrop painter at work in his shirtsleeves and straw hat (William Brown dated this image to between 1853 and 1855, Thoughts on Men's Shirts in America 1750-1900, 88). 1870s tintype and CDV of probable backdrop painters. The man on the right, whose photograph was taken in Marion, Ohio, may actually be a house painter (as indicated by his larger bucket and brush) using a studio backdrop as a prop. A late nineteenth-century backdrop painter in two views, Collection Jim Linderman. See this blog and book on the subject as well. A painted backdrop had the advantage of stillness over outdoor scenes, critical because even minute movement caused blurs in early photographs with longer exposure times. This was true for daguerreotypes (on silvered copper), ambrotypes (on glass), ferrotypes (on iron, commonly called tintypes), as well as other photographic processes and their associated paper prints. Even though exposure times in the second half of the nineteenth century were a matter of seconds (contrary to long-standing myths), subjects required metal braces to hold their bodies and necks in one stable position during a photograph. Thus the small tripod feet visible behind many individuals in such images as well as the prop in this 1880s tintype: Man tinkering with photographic neck brace. Rather than a builder of these braces, he is probably another type of tradesman who simply took the neck brace as a convenient prop for the photo. Once the standing, bracing, and photographing was over, customers could upgrade their purchase with a variety of solid and paper prints as well as coloring. Here's an example from my collection of a tinted ambrotype. Tintype 1850s ambrotype, author's collection. Such tinting was most often done in-house by photographic colorists who used different media depending on the photographs they prepared. CDV of colorists with CDVs, 1860s. Colorist working with paper prints, 1860s. Colorist with framed full plate tintype, 1880s. Of course, some photographers were versatile artists who combined a variety of trades into their new pursuit. It's thanks to people like these, along with the other tradesmen who built cameras, painted backdrops, and printed photographs, that we have such vivid and moving images of the nineteenth century. 1860s CDV of photographer/artist.
<urn:uuid:317351da-e823-4d90-8d49-e854f18edda0>
CC-MAIN-2017-26
http://ranawayfromthesubscriber.blogspot.com/2012/06/occupational-images-artisans-of.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00338.warc.gz
en
0.979872
713
3.1875
3
BOSTON – Sea turtle strandings in Massachusetts' Cape Cod Bay are so common that the phenomenon has its own season. But the brisk rate at which the cold-stunned turtles are washing ashore this year has packed a local rescue hospital. As of Saturday, 221 turtles had been stranded this fall. That already exceeds the range of 50 to 200 that typically are stranded from October to December. The numbers have pushed the New England Aquarium's Animal Care Center over its turtle capacity a few times, and more than two dozen were flown to a Florida to relieve the crowding. The cold-blooded animals become immobile when the temperature drops too low. And the geography of the Cape, which hooks well into the ocean, acts as a natural turtle trap.
<urn:uuid:2c0eb0fa-412b-46a9-9d76-e956c350c53b>
CC-MAIN-2017-26
http://www.foxnews.com/us/2012/12/08/sea-turtles-stranding-on-mass-shores-at-brisk-pace-culprits-are-high-winds-cape.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00338.warc.gz
en
0.974597
155
2.703125
3
It is proper Netiquette to make consumer investment low. Do make transactions easy. Reaching consumers online mostly involves getting them to follow a user path. The path is the product. Investment must be low. This means it must be easily identified and fast. Slow user paths are often abandoned. There are two ways of thinking in web design content display. All in one page and long scroll. All in one page is a page that users do not have to scroll far through. They can see all the content in one screen shot. Long scroll has a lot of content on one page. This requires visiting less pages. Pick one and consciously write content for it to keep users coming back. Make an easy to follow user path because difficulty discourages action. Mistress and student discuss the principle of society. Mistress teaches the do unto others quote. A meeting to discuss etiquette. Essential online safety tips and guidelines are shared. From the newsroom, User Generated Content communication skills. A news broadcast of conventions for easily movable devices and wireless connections. Techniques for engagement during the acquisition of knowledge. Digital Citizens discuss freedom from harm and risk online. A lesson in business etiquette for electronics at the office. Email etiquette incuding the inverted pyramid style of writing. From the news station, digital motion picure tips for capturing and viewing.
<urn:uuid:5f60b2e0-b660-47fe-8458-f28d6a8da2df>
CC-MAIN-2017-26
http://www.netiquette.xyz/marketing/rule-3.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00338.warc.gz
en
0.894647
278
2.515625
3
In chemistry, elements having certain numbers of electrons are particularly stable. These are the noble gases: helium, neon, argon, krypton, xenon and radon. Similarly, elements having certain so-called magic numbers of protons or neutrons should also be especially stable. Examples include lead and tin. Based on the magic number 114, researchers believe there also exists a group of relatively stable heavy elements, called the island of stability, having roughly that many protons each. Experiments performed at Russia's Dubna, the Joint Institute for Nuclear Research, had already turned up signs of elements 113 through 116. To go further, the group began blasting a target of radioactive californium 249 (98 protons, 115 neutrons) with a beam of calcium 48 ions (20 protons, 28 neutrons). The collisions should occasionally fuse the two different elements into a single atom of 118 protons and 143 neutrons, which would lie in the periodic table column directly below radon. Element 118 would then decay into element 116 and lighter elements by emitting a series of alpha particles, each of which contains two protons. But even an element reasonably close to a magic number becomes much less stable at the high temperatures created by the collisions, explains team member Kenton Moody of Lawrence Livermore National Laboratory, so the group had to search through an enormous number of events. Finally, after a total of four months spent in 2002 and 2005, the researchers observed three events that looked like decays of element 118, which showed a half-life of a millisecond, they report in the October Physical Review C. The signatures match up with prior studies of the decay of element 116, bolstering the claim for the heavier element, Moody says. "We're being as careful as we can," he notes. Four years ago physicist Victor Ninov was fired from Lawrence Berkeley National Laboratory for falsifying the data behind a previously reported discovery of element 118. "We worried about this a lot," Moody reflects. "We do what we can to minimize the problem. There is no one person who's responsible for the data analysis."
<urn:uuid:848e2fc9-6c4d-400f-a32c-d646ec358f9b>
CC-MAIN-2017-26
https://www.scientificamerican.com/article/element-118-discovered-ag/?mobileFormat=true
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00338.warc.gz
en
0.937884
430
3.65625
4
Authored by United States Government Whether caregivers work with children from low-, middle-, or upper-income homes, at some time they are likely to encounter child maltreatment. Relatives (parents, grandparents, etc.) and non-relatives (child care providers, teachers, etc.) who abuse and neglect children live in cities, suburbs, and rural areas; come from all ethnic backgrounds; can be male or female; and may be any age. Child abuse and neglect may be a single incident, such as a child care provider shaking an infant to make him/her stop crying; it may be a pattern of behavior, such as incest between parent and child that takes place over several months or years; or it may be parental failure to provide adequate supervision of a toddler on an ongoing basis. Child maltreatment is often difficult to recognize, particularly in young children who are not seen regularly by anyone other than their parents and child care providers. The caregivers’ frequent contacts with children put them in an excellent position to recognize and report suspected child maltreatment. In addition, by providing support to children, families, and colleagues under stress and building on family strengths, caregivers may help them learn ways to cope with their problems, thus preventing maltreatment from occurring. When maltreated children are enrolled in a high-quality child care program, the caregivers’ sensitivity to their feelings and needs will contribute to their recovery from abuse or neglect. Dec 06 2014 1505392888 / 9781505392883 US Trade Paper 8.5″ x 11″ Black and White Family & Relationships / Abuse / Child Abuse
<urn:uuid:d7e21d9b-fc48-4ba7-b407-69861c74df77>
CC-MAIN-2017-26
http://crs.pennyhill.com/2016/07/caregivers-of-young-children-preventing-and-responding-to-child-maltreatment/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320539.37/warc/CC-MAIN-20170625152316-20170625172316-00418.warc.gz
en
0.942324
330
3.171875
3
It seems harmless enough: You see your dog's big, brown eyes peering over the tabletop at you and you can't resist slipping him a bite of turkey. While one bite may not be a big deal, constantly feeding your dog "people food" as a rule can cause serious issues from food allergies to gastrointestinal problems. Dogs are meant to eat a specific, balanced diet. If you do decide to give your dog people food, you'll need to understand what's okay and what could cause a problem – both to your dog's health and to their personality and obedience training. Even if your dog seems perpetually hungry, think twice before you slide that human treat across the table or use it for a reward. Certain foods can cause gastrointestinal distress and become choking hazards for dogs. Some of the foods that they should avoid include chocolate, low fat foods, moldy foods, bread dough, foods with nuts, foods with bones still inside, onions and garlic. Sometimes, these foods can cause an upset stomach and other times they can cause allergic reactions and even choking or food poisoning. Keep your pup healthy by only giving them foods that you know are safe. Setting a Precedent Once a beggar, always a beggar; this may as well be the motto for dogs across the world. Once your dog realizes that you will give them food if they beg, they will try the behavior again and again. As you continue to reinforce that behavior, it becomes a viable way for your dog to get food. They may even start to ignore the food in their bowl meant for their own consumption. Of course, your dog doesn't know the difference between a treat that they can eat or one that is off-limits, so they may even beg for food that could be dangerous. Starting to give them people food young can mean a lifetime of sad eyes as you try to eat your dinner. Some of your dog's worst behavior could be traced back to when they were allowed to eat people food. Dogs that go through the garbage and steal food off of the table are those who already have a taste of people food and who want more. By giving your dog the occasional table scrap, you tell them that it's okay to eat people food. Don't blame them when you come home to a garbage can strewn around the kitchen! Train your dog to expect nutritious dog food. Nutrition and Balance Dogs require a specific diet made up of protein, carbohydrates and whole grains. In the wild, they'd get this diet through a combination of hunting and foraging. At home, it's up to you to feed your dog the nutrition that they need to be healthy. Constantly giving your dog people food – especially unhealthy treats – can disrupt their desire to nosh on foods that are actually good for them. Instead, they are more content to beg for scraps than to eat the well-balanced meal in their bowl. Of course, if you are concerned about your dog's health and nutrition, see your veterinarian for recommendations on specific dietary needs. Even though your dog might look really cute when begging for your chicken, make sure that giving your dog the occasional human treat is safe and that you avoid foods that could hurt them. And, be willing to deal with consequences of giving into those sad eyes: You may launch a lifetime of begging and sharing plates instead of a well behaved and well-balanced pup. Lilly Sheperd is an occasional guest-blogger and a self-proclaimed geek girl from New-Zealand. When not blogging, she likes to play netball with her girlfriends. Lilly is interested in and produces commentary on health, fashion, beauty, green, non-profit topics.
<urn:uuid:c35f0e83-6f99-4971-8ce7-a60f8c7454c5>
CC-MAIN-2017-26
http://www.entirelypets.com/why-dogs-need-dog-food.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320539.37/warc/CC-MAIN-20170625152316-20170625172316-00418.warc.gz
en
0.972591
749
2.703125
3
The trumpet is played over a whole range of musical genres. These include classical and modern forms of music, but the most famous trumpet players inevitably hail from the world of jazz, both traditional and modern. The reason behind this is perhaps the nature of jazz music, which makes ample use of the full range of sound that the trumpet can produce. Having said that. It would be unfair to ignore the contribution that the trumpet has made in other spheres such as rock, blues, pop, and rap music. However, since we are limited by our space and your time, we asked our Life Daily team to make their selection of famous trumpet players only from the field of jazz musicians. Inevitably such a list is bound to be subjective since we had to choose from many hundreds of talented men. Interestingly, the fact is that most jazz trumpeters turned out to be male. Whilst there are today a small number of women playing jazz trumpet, their names are only really known to dedicated jazz aficionados. Cast your eyes over our selection and see if your favorite is among them: 1. Louis Armstrong (1901 – 1971) It is fitting that we start with one of the most famous names of all. Armstrong was born in New Orleans, and died in New York. Apart from being a superb musician, Armstrong – or “Satchmo” as he was affectionately known – appealed to an audience outside of the jazz world. This wider appeal probably started with his appearance in the movie “High Society” in 1956 and continued until his death. Nevertheless, he was still one of the most influential people in the world of jazz and his his whole career was marked with awards, honors and recognition. 2. Miles Davis (1926 – 1991) Another familiar name is Miles Davis – a bandleader, composer, and a great trumpet player. Davis was born in Alton, Illinois, into a middle class background. He started taking trumpet lessons at the age of 12. His great achievement was the pioneering work and contribution he made to the West Coast genre of jazz. His album, “King of Blue”, released in 1959, was the biggest-selling album in the history of jazz. In later years, Miles extended his magic with electric instruments. This experiment gave birth to the style of fusion and jazz rock compositions. He died in Santa Monica in 1991. 3. Dizzy Gillespie (1917 – 1993) John Birks (Dizzy) Gillespie was born in South Carolina and died in New Jersey. He was a composer as well as an accomplished player of the trumpet and trombone, both of which he learned to play by himself. He could also sing and play the piano. Dizzy, as a master trumpet player, bandleader, singer and composer, was one of the prominently major figures in the development of bebop and modern jazz. He gave a completely new and unique shape and beauty to the nature of jazz, and kept improvising his talent even until shortly before his death. 4. Lee Morgan (1938 – 1972) Lee Morgan was born in Philadelphia and died in New York. At the age of 15, he became a professional trumpeter, and was regarded as a child prodigy. He studied with Clifford Brown, a well known trumpet player at the time. He also worked for 18 months in Dizzie Gillespie’s band. Unfortunately, in later life he had some drugs issues. Although this did not seem to damage his commercial success, it did not help in his private life. He had a very rocky relationship with his wife. So rocky, in fact, that one day she decided that enough was enough – and shot him in the chest, killing him instantly. He was 33 years old. 5. Chet Baker (1929 – 1988) Chesney Henry (Chet) Baker, Jr. was born in Oklahoma and died in Amsterdam in mysterious, but drug related circumstances. It is widely assumed that he committed suicide. He began to learn to play the trumpet while still at school, but his developed his skill in the band of the US Army over a period of several years. His career blossomed when he joined the famous Gerry Mulligan Quartet. Baker’s performance in the Quartet was received with huge accolades, especially because of the fusion of his trumpet playing and play of Mulligan’s baritone sax. Although he was regarded as a sensational trumpet player, especially in the 1950’s, he had serious drug problems and was a heroin addict most of his adult life. 6. Wynton Marsalis (1961 – present) Wynton Learson Marsalis was born in New Orleans. He is known as a trumpeter, composer, teacher, music educator, and Artistic Director of Jazz at Lincoln Center in New York City, United States. Wynton was born into the perfect environment for music; his father was a pianist and brothers are players of saxophone, trombone, and drums. Although an accomplished player of classical music, it was Wynton’s playing of acoustic jazz that got him the newspaper headlines. He was awarded nine Grammys in both the genres of Classical and jazz music. He also received the first Pulitzer Prize for Music for a jazz recording. 7. Bix Beiderbecke (1903 – 1931) Leon Bismark (Bix) Beiderbecke was born in Iowa. Together with Louis Armstrong and Muggsy Spanier, Beiderbecke was one of the most influential jazz soloists of the 1920s. In 1927, he joined the renowned Paul Whiteman Orchestra, but his stint there marked a precipitous decline in his health which was aggrevated by the bandleader’s relentless touring and recording schedule. But the main cause was Beiderbecke’s persistent alcoholism. He went into rehabilitation centers several times, but to no avail. He left the Whiteman band in 1930 died the following year in his New York apartment at the age of 28. 8. Harry James (1916 – 1983) Henry Haag (Harry) James was an actor and musician, best known as a trumpeter, who led a swing band during the Big Band Swing Era of the 1930s and 1940s. He was born in Albany,NY. and died in Las Vegas. He was especially known among musicians for his astonishing technical proficiency as well as his superior tone. His career progressed to the the point that he eventually established his own band in 1939, known as “Harry James and His Music Makers.” His was the first band to employ Frank Sinatra as lead vocalist. And it was Frank Sinatra who gave the eulogy at his funeral following his death from cancer in 1983. 9. Herb Alpert (1935 – Present) Herbert “Herb” Alpert was born in Los Angeles and is best known for his association with the band “Herb Alpert & the Tijuana Brass.” What is less known is that he is also a recording industry executive, and that he is an accomplished artist who has created abstract expressionist paintings and sculpture over two decades. His musical accomplishments include five number one albums and 28 albums total on the Billboard charts, eight Grammy Awards, fourteen platinum albums and fifteen gold albums. Alpert is the only recording artist to hit No. 1 on the U.S. Billboard Hot 100 pop chart as both a vocalist and an instrumentalist. 10. King Oliver ( 1885 – 1938) Joseph Nathan (King) Oliver was born in New Orleans and died in Savannah. He was a jazz cornet player and bandleader and was particularly recognized for his playing style and his pioneering use of mutes in jazz He was also a notable composer, and was the mentor and teacher of Louis Armstrong. Armstrong once claimed, “if it had not been for Joe Oliver, Jazz would not be what it is today.” In 1922 he formed a group known as “King Oliver and his Creole Jazz Band” which was quite successful. However, in later years Oliver struggled with difficulties in playing trumpet due to gum disease, and he had to use other trumpeters to handle the solo work. Sadly, Oliver’s business acumen was often less than his musical ability and a succession of managers stole money from him. We hope you enjoyed browsing through these short biographies of famous trumpet players. Did you find your favorite, or do you have one that we left out? You can tell us and our readers by using the comments feed below.
<urn:uuid:959e5062-7b7f-4df5-bfac-1481b9a24ce5>
CC-MAIN-2017-26
http://www.lifedaily.com/10-of-the-most-famous-trumpet-players-of-all-time/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320539.37/warc/CC-MAIN-20170625152316-20170625172316-00418.warc.gz
en
0.991916
1,786
2.9375
3
New Publication: Predictors of Peanut Sensitization to Identify Infants at High-Risk for Peanut Allergy Oral Immunotherapy is known to be an effective means of desensitizing some patients to food allergens, but could the early introduction of foods in high-risk patients prevent allergies altogether? That is the primary question to be addressed by the ITN’s LEAP study (Promoting Tolerance to Peanut in High-Risk Children) led by Gideon Lack, MD (Kings College London) which aims to determine whether peanut oral immunotherapy or peanut avoidance is better for reducing peanut allergies in at-risk infants. Patients with peanut sensitization are the ones most likely to develop peanut allergy in the future. In this new Journal of Allergy and Clinical Immunology paper, investigators determined criteria to identify infants who are at risk for developing peanut allergy but without already-established clinical peanut allergy. This research details the immunological characteristics of the study subjects at baseline and whether selected risk factors were effective predictors for peanut sensitization (as indicated by presence of peanut-specific IgE or wheal size of a peanut skin-prick test). The results suggest that severe eczema and egg allergy had strong associations with peanut sensitization. Final results of the LEAP study will indicate to what degree these criteria are also risk factors for the development of peanut allergy, and whether early consumption of peanut can successfully prevent peanut allergy in at-risk infants. Details about the LEAP study can be found here.
<urn:uuid:940224f8-52a9-4005-a961-a92695dccfcf>
CC-MAIN-2017-26
https://www.immunetolerance.org/news/2012/11/new-publication-predictors-peanut-sensitization-identify-infants-high-risk-peanut-aller
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320539.37/warc/CC-MAIN-20170625152316-20170625172316-00418.warc.gz
en
0.931438
312
2.75
3