text
stringlengths
213
24.6k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
499
file_path
stringlengths
138
138
language
stringclasses
1 value
language_score
float64
0.9
1
token_count
int64
51
4.1k
score
float64
1.5
5.06
int_score
int64
2
5
|Expressions of Euphemism in Narratives of Hungarian Holocaust Survivors| |The group of the Hungarian Jews was beside the polish one the second biggest national Jewish group in the concentration camp Mauthausen. Nevertheless the research of their fate began late. In general, while the fighters of resistance were honored in Hungary as freedom fighters, the Jewish victims were suppressed. Whereas the Jewish community was responsible for drawing the most attention to the Holocaust, the Hungarian society was partially characterised by a new wave on Anti-Semitism which was built on the reproach of “Jewish revenge”. On the other hand, analysing the first years after the war it becomes clear that between 1945 and 1948 the official state level was at first characterized with a certain readiness to broach the issues of the Holocaust but as the communist regime became more radical, even using the word "Jew" was taboo and only circumscribed as “persecuted by fascism/national socialism” (fasizmus/nemzeti szocializmus üldözöttei). By and large the collective memory of the Holocaust was suppressed for a long time and remains even now almost unacknowledged in the Hungarian collective memory. Within the framework of the Mauthausen Survivors Documentations Project (MSDP) 57 interviews were made with Hungarian survivors of Mauthausen. For many of them it was the first time that they could speak in a general public about their experiences. In my lecture I would like to analyse these interviews and ask how Hungarian survivors experienced the return to Hungary after the liberation. Did they meet with disapproval in the Hungarian society or could they integrate themselves without any problems? How could they speak about their experiences after the commusist came into power? Did they suit their individual memories to the state-controlled “collective” memory? What kind of narratives, pattern of thoughts had they to take over, in order to find some kind of appreciation in the general Hungarian non-jewish population? Actually, did they speak in different context in different ways? How could they handle the fact that a big part of the Hungarian society made the persecution of the Jews possible, either as persecutors or eyewitnesses? Can we observe here differences between survivors who stayed in Hungary and those who emigrated? What kind of strategies did they develop to live with their experiences and memories? Did they keep one Jewish identity after World War II, became it even stronger facing the events or did they deny it? How did their attitude change after the political turn in 1989? Overall I would like to compare protokolls made in the second half of the 1940s with Hungarian survivors of different concentration camps (protocolls of DEGOB) with interviews of the MSDP. For pointing out the questions outlined above I would like to try a comparison with MSDP-interviews made with Austrian survivors, where the confrontation with the past could proceed in a persisent democratic country.|
<urn:uuid:f1256516-3e9a-4c02-94e1-b338369872f9>
CC-MAIN-2013-20
http://www2.iisg.nl/esshc/programme.asp?selyear=9&pap=5911
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00012-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97272
608
2.46875
2
OFFICE OF GOVERNOR MATT MEAD Cheyenne, WY 82002 Ph. (307) 777-7437 March 7, 2013 ******FOR IMMEDIATE RELEASE****** Governor: Gas Play in Carbon and Sweetwater Counties Could be Significant for Economy, Needs to be Done Right CHEYENNE, Wyo. - Governor Matt Mead says he supports a significant natural gas development in Carbon and Sweetwater Counties, which would create thousands of jobs in Wyoming. Governor Mead sent several comments to the Bureau of Land Management (BLM) with ideas to make sure that the project is done in a way that reduces environmental impacts and maximizes production. "This project could be significant for the economy of Wyoming, creating many valuable jobs and it can produce energy that will power our nation's economy. But, it all must be done in a way that protects Wyoming's air, water and wildlife," Governor Mead said. The project is called the Continental Divide-Creston Natural Gas Development Project (CD-C Project). Operators have proposed a play with 8,950 oil and gas wells. In his comments to the BLM Governor Mead noted a problematic situation with the Draft Environmental Impact Statement (DEIS), it does not have a preferred alternative. "The CD-C DEIS is two volumes and more than 900 pages in length (not including the Air Quality Technical Support Document). Without the benefit of knowing the BLM's preferred alternative, the public is required to evaluate the entire document, which makes it difficult, if not impossible, to understand what mix of development and surface use best accomplishes the purpose and need," Governor Mead wrote. He asks that the BLM work with cooperating agencies and select a preferred alternative before the agency's final decision. Governor Mead has often discussed the benefit of acquiring baseline data before a project gets underway. He notes that the Wyoming Department of Environmental Quality (DEQ) has done the most comprehensive baseline air quality research for any oil and gas project in state history for this proposed development. He complimented the BLM for deferring to Wyoming on air quality and working with the DEQ to address the effects of potential emissions. "I expect the BLM to engage DEQ in its technical analysis and regulatory response. This partnership ensures avoidance, minimization and mitigation of air quality impacts. I encourage operators to work with the DEQ to implement the best available technology, not only when a permit requires such action, but as a matter of common practice," Governor Mead wrote. Governor Mead also urged the BLM to use proper reclamation to benefit wildlife and grazing permittees, and also to do a more thorough analysis of socioeconomic impacts of each alternative.
<urn:uuid:f0f4c63a-7646-4d3d-b015-6fe5b5969e0e>
CC-MAIN-2013-20
http://www.noodls.com/view/410E4F5157DBB1F2D7CD3DBCDD1CCE59267071B2?3227xxx1362758408
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00040-ip-10-60-113-184.ec2.internal.warc.gz
en
0.935759
550
1.570313
2
Here is an example for us to study. It is a mass email recently sent from the marketing department of an online retailer. I want to thank you for being a loyal customer. I truly value your business and noticed that you are not receiving emails about promotions and specials that are available to you in addition to the special pricing you receive from us. After looking into this, I believe this was an error. You can update your preferences by clicking below. Please see below for an example of a promotion and offer you are missing out on. Regardless of your response, please accept this offer as a token of our appreciation for letting us serve you. If you have any questions, please don’t hesitate to contact me at the number below. Again, thank you for your business and I am available to help you anytime you need me. Your Sales Rep (The special offer below was a coupon for $20 off the next order.) The obvious goal is to have customers opt in for email specials and notifications in order to increase savings (and spending). That is a great goal, but let’s examine this from a marketing perspective and see if the message intended was the message received. What were the customer’s perceptions? (Keep in mind that this is not just an academic exercise but is based on actual responses from customers who received this email). 1. There is something wrong with our account. The customer was told that they were not getting promotions and specials and that “this was an error.” When a customer hears the word “error” the natural assumption is, “You are the experts when it comes to my account with you. If there was a mistake, you messed up my account and as a result I am paying too much for what I buy from you.” Suddenly they feel cheated and overcharged. That is not what was said, but what they heard. This reaction happens is response to a negative statement. Even if something is wrong and needs to be corrected, there is a positive way to communicate that message. This email could just have easily have stated: “As a valued customer, we want to assure you that we are working diligently on your behalf to save you time and money. One of the best ways we can help save you even more is by making sure that you are receiving email offers and promotions above and beyond the special pricing you already receive as our customer.” This is a positive message about an added value. It builds on the relationship. It cements the fact that this business relationship is a collaboration and works for their benefit. This kind of positive message will generate a response, not a reaction. A reaction is most often negative and emotionally charged. And when someone complains about others making a mistake that is not good advertising. 2. We are not getting the best deal possible. Customers were notified that they were not receiving promotional emails. This aroused suspicion which was compounded when they read, “see below for an example of a promotion and offer you are missing out on.” Again, this is a negative message that made them wonder what else they are missing. When a seed of doubt is planted in a customer’s mind they are motivated to investigate other, better options, i.e. the competition. Maybe they can get better pricing from that salesman that called them and told them they were being over charged by their current vendor. This gives legs to lingering doubts. 3. We get a consolation prize for your mistake. Finally, a “token” is offered even though it is something that they should already be receiving. A token is an apology or a consolation prize. It is like saying, “We are glad you are buying from us but sorry things are messed up and you aren’t getting the best deal. We will fix it, and to show you how serious we are, here’s $20.” Again, focusing on a precise and positive way to communicate, this could just as easily have been stated, “Here is a current offer we wanted to pass along to help save you more on your next purchase.” These points do not even take into consideration the poor grammar in the note. The messages we send others need to be precise, positive and professional. Grammatically incorrect messages not only serve to make us look unprofessional, they are unprofessional. Working hard to build a strong relationship with customers can be wasted effort if the relationship is undermined by fear, confusion, or doubt raised by a badly communicated message. Some people say we need to work smarter not harder, but we need to work smarter and harder. Hopefully a little critical thinking and concentrated effort can help us continue to improve our communication skills and see greater success as a result. We have to remember that we all communicate differently. That means we cannot assume that anyone else knows exactly what we are saying. Next time we have a failure to communicate, let’s keep two questions in mind, “Can you hear me now?”, and “Do you understand the words that are coming out of my mouth?” When we get the answers, we have bridged the failure to communicate and are actually participating in a two-way conversation. Now go talk among yourselves.
<urn:uuid:01d28cbb-d863-4dbb-828f-4207ddff6666>
CC-MAIN-2013-20
http://bythewaycommunications.wordpress.com/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00062-ip-10-60-113-184.ec2.internal.warc.gz
en
0.974462
1,090
1.726563
2
Before we moved to the UK, we would come over on vacation/holiday, rent/hire a car, and wander with no fixed plan from one wonderful-thing-you-could-never-see-in-the-US to another. And the UK never let us down. You don’t even need a guidebook for this kind of travel, because wherever you go over here you’re almost guaranteed to pass a sign reading “Footpath to the Stone Circle” or “18th-Century Tidemill” or “Roman ruin”. My biggest double take was at a sign in Cheshire reading “Secret Nuclear Bunker”, seeing as how putting up “This way to the Secret Nuclear Bunker” signposts is just a tad counterproductive. (It turned out that the decommissioned Cold War bunker at Hack Green had just been opened to the public. I’ll do a post on it later; if you can’t wait, follow the link to their website, listed under Featured Links.) So on our recent getaway to south Wales, we weren’t surprised to see signs for Neolithic mounds, medieval castles, and ruined abbeys. But we were surprised to see a sign for an Amelia Earhart memorial in the little town of Burry Port (population about 4200)—and of course we turned off the main road to find it. Of course we knew that Amelia Earhart was the first woman to fly across the Atlantic, but what we didn’t know was that her first crossing wasn’t as a pilot, but as a passenger, or—to use her own description— “like a sack of potatoes”. She also went along to keep a log of that 1928 trip, but the pilot, Wilmer “Bill” Stultz, and the navigator/copilot/mechanic, Louis “Slim” Gordon, were men (and men with names out of a Hollywood war movie, at that) and she didn’t do any of the flying. For one thing, she wasn’t rated to fly using instruments only, and their flight path, planned to take them from Newfoundland, Canada, to Southampton, England, was fogged in for almost the entire crossing. After 20 hours of fog, without reliable airspeed data and with the radio on the blink, with fuel running low and unsure of their position, the crew brought their souped-up Fokker F7, the Friendship, down below the clouds and found themselves crossing busy shipping lanes—good news, because it meant they were getting close to Europe. But they still didn’t know where they were; their best guess was that they were close to Ireland. They tried twice to drop a message onto the deck of a convenient ship—in those days, such drops weren’t unusual, and ships would often help by marking their latitude and longitude on decks for pilots to see—but they missed. Earhart wrote the messages, tied them around oranges to weight them, and dropped them through the hatch, but they fell straight into the water. The captain had seen the aircraft, though, and when he realized it was the Friendship but couldn’t reach them by radio, had the ship’s position chalked onto the deck. But by that time the Friendship, too low on fuel to keep circling and with the crew getting worried, had flown on. They had to trust that they were still on course and that Ireland must be close, because otherwise they were going down in the ocean. And they made it, pretty much just in time. Even with the two fuel tanks that were standard for the Fokker and the four extra ones added for their crossing, they had less than an hour’s worth left. They put the plane, which had been fitted with pontoons, down in an estuary, moored it to a buoy, and waited for someone to row out to get them—which didn’t happen for some time. People saw them waving, waved back, and went on about their business. Eventually and old man in a coracle paddled over, but as he didn’t speak English, there wasn’t much of an exchange of information. He was speaking Welsh, because they weren’t in Ireland after all: they were in Burry Port, Carmarthenshire, Wales. That accidental visit put Burry Port on the map (or at least, it has kept Burry Port on the map, now that it’s no longer the region’s main gateway for coal export). It didn’t take local people long to realize exactly who had landed, and they swarmed the crew, with one souvenir hunter famously tearing Earhart’s flying scarf right off her. (Wonder where it is now?) The flyers wanted to refuel and go, but ended up having to stay the night—there’s a commemorative plaque at the hotel—because the fuel left wasn’t even enough to allow them to take off, and it must have taken hours even to partially fill the tanks. One report says the fuel was rowed out to them in 2-gallon cans. Meanwhile, the press found them. Earhart tried her best to get Stultz and Gordon into the photos, but the reporters only wanted to publicize the first woman to cross the Atlantic, even though she had only come along for the ride, an adventurer rather than an aviator. She was already famous, with impressive records for altitude, speed, and distance, either as the best woman in those competitions or the best flyer, full stop. And in 1932 she did of course become the first woman to fly across the Atlantic at the controls of the plane. I would never have known of the 1928 flight, and might never have seen the pleasant little town of Burry Port, either, if we hadn’t detoured to see the Earhart monument. It was erected in1930 and unveiled by aviation hero Sir Arthur Whitten-Brown, one of the team of two who in 1919 first flew nonstop across the Atlantic. (You thought that was Lindbergh? No, Lindbergh did the first solo flight.) The unveiling must have given Sir Arthur, who lived in Swansea, some satisfaction, although he missed getting to meet the crew of the Friendship. They took off for Southampton while he was being rowed out to see them, unaware that he was coming. Nowadays it’s a heck of a lot easier to fly to the UK, so come on over, hire a car or get a rail pass, and see what you find. It could be a bit of our shared US-UK history, like Amelia Earhart’s landing in Burry Port. Or it could even be a Secret Nuclear Bunker.
<urn:uuid:73b39bd5-a55d-4267-9aca-4f0073671fe7>
CC-MAIN-2013-20
http://mefoley.wordpress.com/2012/07/13/burry-port/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00037-ip-10-60-113-184.ec2.internal.warc.gz
en
0.978918
1,429
1.953125
2
2nd Infantry Division celebrates 95 years of service October 31, 2012 CAMP RED CLOUD, Republic of Korea (Oct. 31, 2012) -- The 2nd Infantry Division celebrated its 95th birthday Oct. 26, in the Republic of Korea, where it has spent the majority of its service since the Korean War, deterring aggression on the world's most heavily fortified border. The Warrior Division was activated Oct. 26, 1917, in Bourmont, France, during World War I, making it the first U.S. Army division founded on foreign soil. It is also the only division in U.S. military history to be commanded by not one, but two, Marine Corps generals, to include Marine Maj. Gen. John A. Lejeune, affectionately known as "The Old Indian." As one of the most decorated divisions in the Army, the 2nd ID has more than 20 campaign participation streamers to its credit from five different wars and honors 38 Medal of Honor recipients -- 14 from World War I, six from World War II, and 18 from the Korean War. During World War I, the division won hard fought victories at Soissons and Mont Blanc, for which it was awarded the French Fourragère in the colors of the Croix de Guerre. The "Indianhead Division," which is also referred to as the "Warrior Division," also participated in the Meuse-Argonne offensive, which spelled the end of any German hope for victory. Having fought in every major U.S. engagement, the Indianhead Division emerged from World War I as the most decorated American Division. In 1944, in the onset of World War II, the division landed on Omaha Beach, France. Their second battles against the Nazi allies led them to win their fights in France, Belgium, Czechoslovakia and Germany. Landing in Pusan, South Korea, in July 1950, the 2nd Inf. Div. was the first unit to travel directly from the U.S. to join the Korean War. The "Indianhead" Soldiers, so named for the patch they wear on their shoulders, were the first to enter Pyongyang and fought the North Korean and Chinese troops valiantly at the Naktong River Line, Kunu-ri, Chipyong-ni, Bloody Ridge, Iron Triangle, Pork Chop Hill, Baldy Hill and Heartbreak Ridge. After four years of fighting, the division left Korea in August of 1954. In July 1965, the 2nd Inf. Div. returned to the Korean Peninsula and is now the last remaining permanently forward-stationed division in the U.S. Army, and dominate armored land force in the Asian Pacific Region. The division stands should-to-shoulder with its Republic of Korea Army partners to deter aggression and maintain peace on the Korean Peninsula; and should deterrence fail, "Fight Tonight" in defense of the Republic of Korea. Since its return to Korea, the division has continued to evolve to meet the needs of an Army at war. In August 2004, the 2nd Brigade Combat Team, or BCT, deployed to Iraq where it worked side-by-side with the Republic of Korea, or ROK, Army; just as it had while stationed in South Korea. This deployment was unique in that it was the first operational deployment from the Republic of Korea. The 2nd BCT fought in the Fallujah offensive and helped provide Iraqis the opportunity to vote in the historic 2005 election before returning to its new home at then Fort Lewis, Wash., now Joint Base Lewis-McChord, where earlier this month it became part of the re-activated 7th Infantry Division. As part of the 62-year-old ROK-U.S. Alliance, the 2nd Inf. Div. is at the forefront of the Army's shift from a counterinsurgency focus to Unified Land Operations. To accomplish its mission, the "Warrior Division" is equipped with the most modern and lethal weapons that exist in the world today, to include the newest versions of many of the Army's fighting vehicles, the M1A2 System Enhancement Package Abrams Main Battle Tank and the M2A3 Bradley Infantry Fighting Vehicle. In order to ensure the division's readiness to "Fight Tonight" 2nd Inf. Div. units conduct extensive combined live-fire and lead the Army in the execution of fully integrated, combined live, virtual and constructive training. "The Warrior Division has played a key role in many historical events that have changed the world we live in," said Maj. Gen. Edward C. Cardon, commander of the 2nd Infantry Division. "Today, Soldiers wearing the same patch as those who served proudly on battlefields across the globe stand with our ROK Army partners ready to 'Fight Tonight' if called upon in defense of the Korean Peninsula. I could not be prouder of the Soldiers and KATUSAs of this great division; they are a noble testament to every Soldier who has ever worn the 'Indianhead' patch."
<urn:uuid:170aa5d0-f8b0-4e08-bdbb-a377e04f246e>
CC-MAIN-2013-20
http://www.army.mil/article/90053/2nd_Infantry_Division_celebrates_95_years_of_service/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00001-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966302
1,029
2.0625
2
UNAIDS and KfW Entwicklungsbank renew cooperation agreement 06 November 2008 Four years after signing the first cooperation agreement to support the AIDS response in Central America and the Caribbean, UNAIDS and KfW Entwicklungsbank (KfW) have entered into a new agreement to expand the reach of its cooperation to include parts of Africa. The first agreement between UNAIDS and KfW – which finances development programmes on behalf of the German Federal Ministry for Economic Cooperation and Development (BMZ) – was signed in July 2004 and focused on strengthening HIV prevention efforts in several Central American and Caribbean countries, such as Honduras, El Salvador, Guatemala, Dominican Republic, Haiti, and Guyana. Initiatives included the distribution of affordable condoms and social marketing campaigns to promote behaviour change. Through the cooperation, in 2006 alone, more than 20 million subsidized condoms were distributed and sold in the region. In addition, condom social marketing programmes have reached an estimated 750,000 people, mainly groups most at risk of HIV infection. The renewal, which runs from 2008 to 2011, will broaden efforts to address HIV prevention and reproductive health in West and Central Africa. “Our first cooperation agreement enabled UNAIDS and KfW to provide access to quality, affordable condoms and to promote HIV awareness through various campaigns – prevention efforts that made a difference in the countries where we worked,” said UNAIDS Deputy Executive Director Michel Sidibe. In the spirit of the previous framework, UNAIDS will continue to provide technical guidance for the initiatives and facilitate coordination among various stakeholders. KfW will further strengthen regional initiatives and enforce the regular information transfer between all parties. Jointly with UNAIDS, KfW will foster monitoring of the initiatives to improve transparency and detect opportunities and challenges. “Enhancing the cooperation between UNAIDS and KfW Entwicklungsbank makes sense, as Africa is the continent that is by far the most affected by the epidemic,” said KfW’s Bruno Wenn, Senior Vice President Sub-Saharan Africa. “The activities by UNAIDS and KfW will increase the effectiveness of the AIDS response in Africa and elsewhere”. The German Development Bank finances development programmes in partner countries and regions on behalf of the German Federal Ministry for Economic Cooperation and Development. Between 2001 and 2007, a total of EUR 443 million has been committed to activities focused on sexual and reproductive health and HIV prevention. UNAIDS is an innovative joint venture of the United Nations, bringing together the efforts and resources of the UNAIDS Secretariat and ten UN system organizations in the AIDS response. The Secretariat headquarters is in Geneva, Switzerland—with staff on the ground in more than 80 countries. Coherent action on AIDS by the UN system is coordinated in countries through UN theme groups, and joint programmes on AIDS. UNAIDS’ Cosponsors include UNHCR, UNICEF, WFP, UNDP, UNFPA, UNODC, ILO, UNESCO, WHO and the World Bank. Visit the UNAIDS Web site at www.unaids.org
<urn:uuid:3d640305-8e3a-45ec-bb2a-5291c4e159c5>
CC-MAIN-2013-20
http://www.unaids.org/en/resources/presscentre/featurestories/2008/november/20081106kfwentwicklungsbankagreement/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00051-ip-10-60-113-184.ec2.internal.warc.gz
en
0.932243
647
1.546875
2
The Liberal's Enduring Dilemma: Whether To Vote For Disappointing Centrists? In 1968, Sam Brown, like many of his youthful contemporaries, was disgusted by the Vietnam War which had already claimed more than 30,000 American lives and killed countless Vietnamese. So, he poured his energy into Eugene McCarthy’s anti-war campaign for the Democratic nomination, serving as McCarthy’s Youth Coordinator. Then, after McCarthy lost to Hubert Humphrey at the tumultuous Chicago convention, the 25-year-old Brown faced a tough choice: whether to sit out the general election in protest of Humphrey’s support for President Lyndon Johnson’s war policies or accept Humphrey as superior to his Republican rival, Richard Nixon. In 1980, many on the Left abandoned Jimmy Carter because of his tacking to the political center, thus clearing the way for Ronald Reagan. In 2000, nearly three million voters cast ballots for Ralph Nader (who dubbed Al Gore “Tweedle-Dum” to George W. Bush’s “Tweedle-Dee”), thus helping Bush get close enough in Florida to steal the White House (with further help from five Republican partisans on the U.S. Supreme Court). Today, some on the Left are turning their backs on Barack Obama because he has disappointed them on health-care reform, the Afghan War and other policies. It seems that on the Left – even more than on the Right – there is this quadrennial debate over whether one should withhold support from the Democratic nominee out of a sense of moral purity or hold one’s nose and accept the “lesser evil,” i.e. the major-party candidate who will inflict the least damage on Americans and the world. Yet, as intensely as some on the Left disdain President Obama’s actions and inaction today, the cause for anger in 1968 was much greater. After running as the “peace” candidate in 1964, President Johnson had sharply escalated the U.S. involvement in Vietnam with Vice President Humphrey loyally at his side. Then, in 1968, the bloody Tet offensive shattered U.S. assurances of impending victory; Johnson confronted a surprisingly strong challenge from Sen. Eugene McCarthy and decided not to seek reelection; Sen. Robert F. Kennedy entered the race, but was assassinated (as was civil rights leader Martin Luther King Jr.); and the Democratic convention in Chicago descended into chaos as police clashed with anti-war protesters on the streets. Appeal to the McCarthy Youth It was in that maelstrom of tragedy and anger that Sam Brown, like other McCarthy (and Kennedy) supporters had to decide whether to line up behind Humphrey, who was admired for his support for social and economic justice (even if he was condemned for his loyalty to Johnson), or to stay on the sidelines (and risk Nixon’s victory). In a recent interview, Brown told me that he was on the fence about which way to go, saying his decision depended on Humphrey making a clean break with Johnson on the war. There was a widely held view at the time that Johnson was so psychologically “owned by the war” — and his responsibility for the terrible bloodshed — that he couldn’t take the necessary steps to make peace, Brown said. Humphrey did not want to betray Johnson but understood that his campaign depended on his reuniting the shattered Democratic Party. So, Humphrey sent emissaries to approach Brown and other anti-war activists.
<urn:uuid:65595634-97f3-4da2-97bc-074edf66199f>
CC-MAIN-2013-20
http://www.alternet.org/story/156051/the_liberal's_enduring_dilemma%3A_whether_to_vote_for_disappointing_centrists?page=1
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.971258
731
1.742188
2
Jan 13 2012 The phone rang as I was tying up loose ends for my last day in the office before Christmas. New York Times reporter Elisabeth Rosenthal wanted my thoughts on the sustainability of organic agriculture… a subject that I think about a lot. I gave her my cell phone number and asked her to call back. She called again Saturday afternoon, as my kids and I returned home from Christmas shopping. I plunked them in front of a video and put her on speaker phone so that I could peel butternut squash for a solstice potluck that evening. We talked for a half hour or so, and she said she’d let me know when her story would run. I didn’t hear back from her, but a friend in New York City contacted me on New Year’s Eve to tell me I had been quoted in a front page story. It dealt with important questions about the sustainability of growing organic vegetables in the deserts of Mexico’s Baja peninsula. Apparently it had legs. It was the most e-mailed story in the paper for much of the first week of 2012. It contained some of the ideas that I had discussed as I peeled squash, but only one direct quote from me. My heart sank as I read it: Organic agriculture used to be sustainable agriculture, but now that is not always the case. That’s not what I had said. It wasn’t even a statement I could agree with. Yet there it was, immortalized in America’s newspaper of record with my name attached to it. I immediately fired off the following letter to the editor, which has not been published: I disagree with the statement attributed to me that “organic agriculture used to be sustainable.” Most organic farms remain more sustainable than their conventional counterparts. If we must import produce from Mexico we should support the farmers there that grow it organically. US produce imports from Mexico have almost tripled since 1990, driven by growing demand for inexpensive fruit and vegetables out-of-season. Most of this supply comes from conventional farms. Sourcing more of it from organic farms will not solve the important sustainability issues Rosenthal addresses, but it makes things better, not worse. Despite growth in demand for organic products, less than 1% of farmland in the USA or Mexico is certified organic. Organic farms tend to use energy and water more efficiently than conventional farms. They pollute less. Organic farmers are often healthier, and better able to make a decent living from small, diversified farms, such as those that dominate Mexico’s organic sector. Supporting them promotes sustainability. I have tried to reconstruct my conversation to figure out Rosenthal could have heard me say something I don’t believe. I was trying to explain that sustainability is not a black and white issue. Scientists disagree on how best to measure it, because it incorporates a broad range of environmental, economic and social considerations. When the term was coined by the Brundtland commission in 1987 it was defined as “meeting the needs of the present without compromising the ability of future generations to meet their own needs.” It’s an ambitious goal, seldom truly achieved. We live in a world where almost a billion people live in hunger, even as we exhaust the reserves of fossil fuels and other non-renewable resources on which we increasingly depend. We spew carbon, pollute our groundwater with nitrogen and our surface water with phosphorus, and melt the ice at the same poles where our persistent pesticides accumulate. We are failing to meet the needs of the present, even as we compromise the ability of future generations to meet their own needs. Our current way of living is clearly unsustainable, and the food system that supports it can’t be sustained indefinitely either. This concerned Sir Albert Howard, the father of organic agriculture in the west. Seventy years ago Howard was fascinated by the fall of civilizations, which he saw as an inevitable result of unsustainable food systems. He looked to the agriculture of long persistent civilizations – like China and India – for examples of ways to feed ourselves sustainably. The “practices of the Orient” that he held up as examples were built on a foundation of small, diverse, labor-intensive farms integrating animal and crop production. Few inputs were needed because resources were recycled on the farm by composting, to build soils rich in organic matter that retained water and nutrients. “Organic farming” evolved into a shorthand description for the type of agriculture that Howard advocated. The term “sustainable agriculture” showed up years later, and often incorporated similar concepts and ideas. For many years, organic agriculture – like sustainable agriculture – was defined by principles, rather than specific practices. In his 1981 essay, Solving for Pattern, Wendell Berry called for solutions that solve multiple problems without creating new ones. He used an organic farm as an example, saying that it is not one that uses certain methods and substances and avoids others; it is a farm whose structure is formed in imitation of the structure of a natural system; it has the integrity, the independence, and the benign dependence of an organism. Berry concluded on a note of caution: But we must not forget that those human solutions that we may call organic are not natural. We are talking about organic artifacts, organic only by imitation or analogy. Our ability to make such artifacts depends on virtues that are specifically human: [...] A good solution, then, must be in harmony with good character, cultural value, and moral law. Organic agriculture,to Berry, was a human attempt at moral agriculture. And people have been known to disagree on questions of morality. While a growing cadre of farmers and eaters found inspiration in Howard, Berry, and other eloquent pioneers of organic agriculture, each had a different interpretation of what actually constituted organic farming. Money complicated things further. Growing consumer demand and premium prices for organic products motivated questionable labeling of “organic” food from farms that clearly violated organic principles. People who bought organic food weren’t always getting what they thought they were buying. In response, organic certifiers began to emerge. They developed sets of organic standards, identifying acceptable practices based on principles, philosophy and ideals of organic agriculture. Most prohibited the use of synthetic fertilizers or pesticides, for example. Organic certification remained voluntary, however, and different certification agencies had different standards. A person who bought a certified organic product from Kentucky could get something grown in a way that would not be allowed by certifiers in Oregon. Beginning in 1990, the USDA began to develop a single national standard for organic agriculture. The controversial process took more than a decade, but national organic standards became legally enforceable in 2002. They dictated what methods and substances were allowed for use on organic farms, and they made organic certification mandatory. Organic agriculture had gone from being a fuzzy concept, based on high ideals but open to dramatically different interpretations in practice, to being a clearly defined set of practices. National organic standards drew a line in the sand, transforming shades of grey into black and white, organic and not organic. A colleague of mine compares being an organic farmer to being pregnant… you either are or you aren’t. There’s no part-way about it. Sustainable agriculture, meanwhile, remains open to all sorts of different interpretations. Systems and practices can be more or less sustainable. When somebody tells me they don’t farm organically but they farm sustainably I have to ask what they mean by that. Everybody means something different. Even when people agree on the goals of sustainability, they can disagree on how best to accomplish those goals, or measure progress toward them. This is what I tried to explain to the New York Times reporter as I prepared my squash. Organic agriculture and sustainable agriculture are based on similar principles. They both used to be fuzzy ideas, but that is no longer the case for organic agriculture, which became more cut-and-dried with the introduction of national organic standards. Apparently she heard me say that organic agriculture used to be sustainable, but isn’t always anymore. This bothers me, because it suggests that I think there was a golden age of sustainable organic agriculture, which is now behind us. The New York Times story uses me to bolster its thesis that growth of the organic sector is compromising sustainability. In fact, I think it’s the other way around: Each farm that transitions to organic agriculture makes our food system a little more sustainable. Choosing an organic product over a similar conventional product is a vote for sustainability. The New York Times article deals specifically with the problem of aquifer depletion beneath the deserts of Mexico’s Baja peninsula. Conventional agriculture is responsible for most freshwater use globally, and must shoulder much of the blame for the fact that aquifers the world over are being drained faster than they are recharged. This is clearly unsustainable. It’s happening in Mexico, but it’s also happening in California, the Midwestern US, India, China, and the Middle East. Just about every country growing irrigated grain is depleting aquifers to do it. Since some of the farms in the Baja Peninsula are organic, the problem is presented as an example of growth in the organic sector promoting unsustainable practices. Ironically, the UN Food and Agriculture Organization recently released a report called Sustainable Options for Addressing Land and Water Problems that identifies organic farming as part of the solution to such problems. Organic standards don’t regulate irrigation methods or acceptable water sources, but they do promote practices that improve water use efficiency, build soils that retain water, and reduce pollution of remaining water resources. The Mexican organic vegetable farms highlighted in the article happen to use trickle irrigation, which uses up to 75% less water than sprinkler or flood irrigation systems. They aren’t required to do so by organic standards, but the fact that the farmers can fetch a premium for their organic produce may have allowed them to invest in more sustainable technology. Michael O’Gorman, who used to manage an organic farm in Mexico, describes the irrigation practices used by organic farmers in the Baja peninsula as “some of the most inventive and advanced water saving systems in the world.” O’Gorman offers his own perspective on the particular farms highlighted in the New York Times article: The group doing all of Del Cabo’s production in the southern end of the peninsula is one of the oldest grower-owned organic cooperatives in the world. It is owned by the same 151 families (average acreage less than 10) that were given ownership by organic farming pioneers in the early 1980s. It was started, and remains, as a social enterprise to give Mexican farmers a dignified alternative to waiting on tables and cleaning any of the nearly 500,000 luxiorious hotel rooms that American and European tourists inhabit daily[...] In fact the reason why organics developed in this part of Mexico is because the big conventional growers had no interest in the small fields that were owned by Mexican families. Del Cabo growers are religious about organics. Americans like tomatoes. We eat — and import — more of them every year. In 1981 the average American consumed about a pound of tomatoes each month, of which just 3 ounces were imported. Today the average American eats more than a pound and a half of tomatoes monthly, and a half pound of that is imported, mostly from Mexico. Even our American-grown tomatoes are mostly tended by farm laborers from Mexico and other Latin American countries, who often work in indentured servitude to bring us cheap fruit. The brutal environmental and social costs of America’s conventional tomato industry are detailed in Tomatoland (2011), by award-winning investigative journalist Barry Estabrook: Fields are sprayed with more than one hundred different herbicides and pesticides. Tomatoes are picked hard and green and artificially gassed until their skins acquire a marketable hue. Modern plant breeding has tripled yields, but has also produced fruits with dramatically reduced amounts of calcium, vitamin A, and vitamin C, and tomatoes that have fourteen times more sodium than the tomatoes our parents enjoyed. The relentless drive for low costs has fostered a thriving modern-day slave trade in the United States. Those who tend our crops suffer the health effects of direct exposure to herbicides, insecticides, fungicides, and fumigants, whether they are in Mexico or the USA. In the 1990s a team of anthropologists led by Elizabeth Guilette studied effects of pesticides on children from farming families in the Yaqui valley and foothills of northwestern Mexico. Families in the valley used conventional farming practices with numerous pesticide applications; those in the foothills practiced traditional farming without pesticides. Children from conventional farming families in the valley had much poorer motor skills, less endurance, and worse memory than those who grew up in the foothills without pesticides. Evidence of the effects Guilette and her team observed included representative drawings by her four year-old subjects: As a father of young children, I find these images heartbreaking. I want to be able to choose healthy foods for my kids without hurting other kids in the process. Thankfully, I can grow my own tomatoes, or rely on local farmers to grow tomatoes for me using low-input season extension technology, for about half the year. If I must have fresh tomatoes in January then I can choose organic to support farmers — wherever they are — who step off the pesticide treadmill. This won’t fix all of the problems of our industrial food system, but it can make it a little more sustainable.
<urn:uuid:3cbe858b-dfc2-4ba7-b915-1fac714dcff5>
CC-MAIN-2013-20
http://oak-ky.org/?p=1577
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00010-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961388
2,788
1.710938
2
Tuesday, April 19, 2011 Three Billion Years B.C. As we turn back the cosmic clock the rate of accumulation of material increases. The pockmarked lunar surface has served as a proxy for reconstructing the history of asteroidal and cometary impact on the Earth. Without an atmosphere or significant geophysical activity the Moon has an excellent memory of impacts, while the Earth had eroded and resurfaced itself in continual reinvention. This record has indicated that during a period between about 4.1 and 3.8 billion years ago the Earth must have been subject to a particularly brutal pummeling. A substantial fraction of the outer shell of our planet could have been laid down during what has become known as the Late Heavy Bombardment. It's a fascinating time in the history of our world. The first indications that microbial life might have been at work come not so very long after this quite cataclysmic episode ended. The reason for this infall of material seems likely to be connected to a period of dynamical evolution in the outer planets. Models suggest that both Neptune and Uranus could have migrated outwards and dug into a rich belt of outer, Kuiper or trans-Neptunian objects. Many of those distant small bodies would have been pushed into orbital paths that would eventually lead to passage through the inner solar system and collision with the Earth. At the same time, Jupiter and Saturn would have migrated inwards and could have scattered material from the asteroid belt onto inbound trajectories. Once the dynamical reorganization of the giant planets was finished the Late Heavy Bombardment would have tailed off. A settling planet Earth then gave rise to the tentative steps of biochemistry and single-celled organisms. Or so we thought. New evidence is emerging from the terrestrial rock record that the Earth actually continued to be pounded by very significant impacts from 3.8 billion years ago all the way up to around 2.5 billion years ago. "Life Killer" type asteroid impacts seem to have happened roughly every 40 million years during this timespan, rather than every 500 million years as had previously been thought. So what gives? Where did these chunks of material come from? W. Bottke and colleagues have studied the gravitational dynamics of the teenage solar system and suggest that a now-depleted inner belt of material between Mars and Jupiter could have been scattered onto an inclined set of orbits - out of the plane of the planets. This population would then slowly "leak" into Earth-crossing paths, thereby greatly extending the tail of the Late Heavy Bombardment over another billion years or so. The leftovers of these bodies are still there, known as the Hungaria asteroids. It all looks to fit rather well. The dynamics are believable, and provide a mechanism for the impacts that littered the planet with the molten globs of rock that geologists find in layers of ancient strata. There's just one teensy question. What are the implications for the evolution of life on Earth? While evidence of microbe-built structures like stromatolites from 3.5 to 3.8 billion years ago remain a little controversial, the presence of a diverse planet-wide biosphere is pretty incontrovertible in the 3 to 2.5 billion year ago span. Apparently microbial life not only dealt with continual destructive asteroid impacts but really did rather well for itself. This raises another intriguing issue. As W. Bottke and colleagues point out, this prolonged period of heavy impacts does effectively stop around 2.5 billion years ago. That is suspiciously coincident with the first signs of a rising oxygen content in the Earth's atmosphere (the "Great Oxidation Event"), and the eventual emergence of multi-cellular life somewhere around 1.6 to 2 billion years ago. Is there a connection? Could the continual accumulation of planetary material have held back the full-on evolutionary party of early life? It's highly speculative, but one is tempted to think that this might be further evidence for the incredible resilience of life and its near-relentless nature once it becomes entrenched on a planet.
<urn:uuid:1c251bf2-0608-4aae-b35f-0909a02d592e>
CC-MAIN-2013-20
http://lifeunbounded.blogspot.com/2011/04/three-billion-years-bc.html?showComment=1308169042689
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961679
835
4
4
Helen Smith writes at Pajamas giving her run down on why the choice of Sarah Palin, a self-made woman, is not only is good for women, but men and the whole country. A highlight: "While Democrats want to expand government programs to “help women,” I believe that smaller government and the policies of the libertarian right help women in many ways that are often ignored. Carrie Lukas, in a special report entitled “Dependency Divas” from the Independent Women’s Forum, states that: 'Government efforts to improve on market outcomes often have serious unintended consequences that make women worse off. Workplace regulations make hiring more expensive, thereby decreasing the number of job opportunities available for women. Entitlement programs such as Medicare and Social Security crowd out private enterprise and initiative, and bloat the federal budget. The high taxation necessary to support lavish social spending slows economic growth, reducing the living standards of all Americans. The paternalistic arguments used to justify these government programs also reinforce the harmful notion that women are incapable of surviving or prospering on their own.'" I agree with Helen and Sarah and Carrie Lukas: Many government programs to help women, really only serve to stifle and foster dependence. The left always wants to get in the way by inserting government in the middle of every human endeavor and process, when often the best and most elegant strategy to help others, including women, is to just get out of the way. And stay out of the way. Please note: There's so much I want to write about Palin, issues and the race and will in coming days. However, I am again pressed for time with company here from California for the weekend and also with preparing for surgery next Thursday on my right ankle to repair a severely torn ligament which will keep me off my feet for 2-3 weeks. Will not be able to drive a car during that time and will be 'walking' on crutches. For this reason, I'm scurrying around trying to prepare for this ordeal, one I've put off for about 25 years when I tore the ligament in a jogging accident. Surely I'll have plenty of time to blog, write and play catch up during this recovery period. There's no good time to do something like this, but when it's finally time, it's time. You see, there's a little baby boy now in the cooker and coming into our family, God willing, next winter, and I want to be able to hold him, and sing him lullabies with a strong ankle.
<urn:uuid:5570c73e-9f03-4ca3-af0f-781129594b05>
CC-MAIN-2013-20
http://webutante07.blogspot.jp/2008/08/why-palin-is-fantastic-choice-as-veep.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00025-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958531
528
1.570313
2
Want to share your experiences, advice, or ideas with the GrammarPhile community? Do you have grammar, punctuation, editing questions you'd like answered? Submit guest post ideas or questions to firstname.lastname@example.org. What writer does not want to grab the attention of his or her readers? Whether your lot in life is writing directions for cashing in winning lottery tickets or box labels for over-the-counter sleeping pills, you need to compel your readers to absorb all of the text (even the part about "may cause drowsiness"). Consider using, but not overusing, some of today's tips in your very next assignment. Here are some questions we've received from readers and clients, followed by our answers. Hope you find these helpful! Magazine titles are italicized under most styles. So if you are writing something like "He runs a Fortune 100 company," do you italicize Fortune in that context? I think you do, and you leave "100" (or "500" or whatever) roman. Can anyone corroborate this? © 2013 ProofreadNOW.com, Inc. All Rights Reserved.
<urn:uuid:9fec0a47-d50c-4c95-98b4-0de3ff7ef2d4>
CC-MAIN-2013-20
http://www.proofreadnow.com/blog/?Tag=italicize
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00027-ip-10-60-113-184.ec2.internal.warc.gz
en
0.941727
238
1.679688
2
Lids4KidsNY was founded in 2010 by Dr. Marc Souweidane and Dr. Jeffrey Greenfield, neurosurgeons at the Weill Cornell Pediatric Brain & Spine Center. Lids4KidsNY hosts an annual event that celebrates the return to health of young patients challenged with brain tumors, brain injuries, and other serious neurological conditions, and also helps educate parents, kids, and coaches about the importance of wearing helmets during cycling and contact sports. Wallet Card: Concussions on the Field (pdf) Is Your Child At Risk for Concussion? (pdf) Take the Lids4Kids Pledge (pdf) Use Your Head coloring sheet (pdf) What Is Chiari, and Why Does It Need Your Help? (pdf) Find out more about Chiari malformation Become a Chiari donor Visit the Pediatric Neurosurgery home page The 2011 event was held on the Great Lawn of Central Park in New York, where Drs. Souweidane and Greenfield coached teams of their patients in a softball game. Young players were also invited to join a soccer game coached by Connor Ventura, a teen patient who conquered Chiari – a treatable condition that was featured as part of the event’s educational outreach. This year’s event also featured the presentation of the first-ever All-Star Awards to: - Connor Ventura and Kelly DeMarrais, for being outstanding and inspiring role models for kids with Chiari and helping to support Chiari education and research; and - Patti Ventura, Connor’s mother, for her tireless work raising awareness of Chairi malformation, a condition that Connor conquered with the help of Dr. Greenfield. For more information about the annual event, contact Sarah Fox.
<urn:uuid:f5982bba-b3a8-4714-bfec-fba96b9e4397>
CC-MAIN-2013-20
http://www.cornellneurosurgery.com/pedneuro/lids4KidsNY.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00063-ip-10-60-113-184.ec2.internal.warc.gz
en
0.928506
370
1.914063
2
Is it normal to lose hair after giving birth? All new moms experience hair loss, though some lose more than others. Here's why it happens. During pregnancy, changes in your hormone levels cause your hair to stay in a resting phase for longer, so you lose less hair on a daily basis. (You may have noticed that your hair seemed thicker than usual.) After you've given birth and your hormones have settled down — usually at about 12 weeks after delivery — more hair shifts into a shedding phase. You may be alarmed to find hair coming out by the handful. Normally, you lose about 100 to 125 hairs a day, but after delivery, you may be losing about 500 a day. This can be very disturbing, but try not to worry too much — you won't go bald! There's little you can do about the shedding, other than to be patient. The shedding tends to be most noticeable when you're shampooing or brushing your hair, so you may find that shampooing less frequently or letting your hair dry naturally instead of brushing and blow-drying helps slow the loss. On the other hand, it's going to fall out at some point, and you might prefer that it happen in private. Regular washing and brushing may help you avoid leaving a trail of shedding hair behind you all day. Try using a thickening shampoo if you feel your locks are getting too thin. You may notice fine "baby" hair growing along your hairline at the top of your forehead once the shedding phase has ended. Having bangs can do a lot to camouflage this wispy new growth while it's growing out. Within another six months or so, your hair should be back to its normal pre-pregnancy thickness, but you may find that the texture of your hair is never exactly the same. It may be wavier or straighter or more dry or oily than it was before pregnancy. This is probably due to the hormonal upheaval you've just been through. If the hair loss doesn't seem to be slowing and you're still losing lots of hair six or so months after delivery, check in with a dermatologist or your healthcare provider. It may be a sign that you're low on iron, which is not entirely uncommon for new moms. This is so ironic that everyone here who is losing so much hair has four month olds. My son was 4 months on Oct. 7 as well and I was worrying about this same issue. My husband is always complaining about it. But what can we do? Hey I am glad we are all in this boat together then and I know that I am not weird or anything. My daugther just turned 5 months in October. I noticed my hair falling out in clumps about a month ago. Right now, I'm at the point where I don't even touch my hair unless I really have to because the simpliest touch will make many strands fall out. It's especially bad around my temples. I never realized how attached to my hair I was until I started losing it! The article made me feel a lot better. I'm so glad that my hair loss is normal. A month ago I got my hair cut, and the stylist had thinned it out. Ever since then, my hair has been coming out in clumps in the shower. I thought I had contracted some skin disease, but now I know it was probably coincidence. Whew! I was really starting to freak out. Well, it's all worth it for my little 3 1/2 month old boy! I thought my hair loss was due to damage from my post-pregnancy hair dying, but I'm glad it's just from hormones! Sometimes it comes out in clumps. I've officially clogged the sink and shower drain! My 4th child just turned 4 months on Oct 10th and my hair is falling out more than it ever has after pregnancy. It's almost bald above my temples it's so bad. However, I don't wrap my wet hair in a towel or put it up in a pony anymore because my hairdresser said that can make it worse. So I will just wait it out and wear it down until it grows back. I am actually thinking of having a 5th child so I will probably just shave my head and start over after that one. Just kidding. Just remember ladies its hormones, lovely lovely hormones.. :) My Daughter will be 4 months on Nov.6th and does my hair every fall out....I did not want a dog because it sheds and here I am, leaving hair everywhere! I never did any of this for my last three baby's, but I sure hope it ends soon, I am not too sure how much more of this my hair line can take! a BabyCenter Member my baby is almost 4 months.woow what a sigh of relief to know that hair loss is a normal process after having a baby. thank god is temporary. thanx for the reasurance!! My baby is almost 4 months, and I was ready to go to the doctor because I was afraid I was going bald! It's nice to know this is normal, and that I'm not the only one. I have lost hair after all four of my kids. I haven't found a way to stop it, but I use a biotin shampoo by VitaTress that I get at a salon. I was advised to use my regular shampoo first, then the biotin shampoo and leave it on for about three minutes as treatment before rinsing. It helps slow the thinning and helps a ton with growing it back. My hairdresser also reminds me that taking my prenatal vitamins will also help a lot. Also, avoid wearing any sort of hat, since they rub on your already weak hair and can break even more of it off. Like many of you others, I also loose a lot above the temples. I sometimes tease my husband that I'm going to go bald before he does, even though he's half way there already. LOL Hope this helps! When my baby was 4 months, I started to loose a ton of hair all over my head (200+ strands a day), particulary in the crown area. Since my hair was thin to start out with, I'm not being overly dramatic when I say I was virtually bald. It was terrifying. My self-esteem took a nose dive resulting in bouts of tears!! My dermatologist suggested I wait a year for my hormones to rebalance to see if my hair would grow back. If not, there's always hair translpant. I even went wig shopping, convinced the situation was not fixable. Imagine my suprise when by the 6 months my hair loss significantly slowed down & all these baby hair started to grow. As fast as I lost the hairs, it was just as fast in growing bak. Now my baby is almost 7 months & my hair has regained most of its density. I am so grateful! To all of you out there who are suffering, stay positive. My advice is to NOT stress out, drink prenatal vitamin, biotin, & use scalp massage oil (once a week). Good luck! a BabyCenter Member Want advice from other parents? Post your questions in Mom Answers. IMPORTANT: As noted in our information found on BabyCenter, including that provided by experts in the "Get Answers" area, is a general educational aid. Do not rely on this information as a substitute for personal medical or healthcare advice, or for diagnosis or treatment purposes. Always consult your physician or other qualified healthcare provider as soon as possible about any medical or health-related question, and don't wait for a response from our experts before such consultation. The "Get Answers" area also contains opinions and views created by community members. BabyCenter is not responsible for the accuracy of any information posted by community members.
<urn:uuid:d69bdb85-cb5a-4b3b-860b-6c2f00089002>
CC-MAIN-2013-20
http://www.babycenter.com/404_is-it-normal-to-lose-hair-after-giving-birth_1335883.bc?startIndex=10&questionId=1335883
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706890813/warc/CC-MAIN-20130516122130-00036-ip-10-60-113-184.ec2.internal.warc.gz
en
0.972343
1,630
1.835938
2
Australian Bureau of Statistics 4363.0.55.001 - Australian Health Survey: Users' Guide, 2011-13 Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 07/12/2012 |Page tools: Print Page Print All RSS Search this Product| 'Dwelling location' refers to where the dwelling was situated, as recorded by the interviewer. Categories for the item are: The selected adult was asked to report the number of bedrooms in the dwelling. The item refers to the number of rooms on the dwelling plans as bedrooms, even though they may be currently used for other purposes. Information from both these questions was recorded at the household level. Respondents aged 18 years and over were also asked on behalf of themselves, their spouse/partner, or parent (if the respondent was an adult child living with a parent), whether the dwelling was: Those who reported they paid rent or board (including those purchasing the dwelling under a rent/buy or shared equity scheme) were also asked who it was paid to (e.g; real estate agent, housing authority, parent). Respondents were asked whether they had a landline telephone connected to their dwelling and whether it was listed in the White Pages. The data items and related output categories for this topic will be available in Excel spreadsheet format from the Downloads page of this product. Points to be considered in interpreting data for this topic include the following: Comparability with 2007-08 Data is considered directly comparable between the 2007-08 and 2011-12 surveys. Information about whether respondents had a landline telephone was not collected in 2007-08. This page last updated 4 April 2013 Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
<urn:uuid:9837bf22-bd82-462a-8f54-ae810bfc23d0>
CC-MAIN-2013-20
http://www.abs.gov.au/ausstats/abs@.nsf/Latestproducts/E978D6A02F16E38BCA257ACC000E3D15?opendocument
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00054-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952863
406
2.140625
2
The Census Bureau contracted with RTI to conduct cognitive interviews to determine the accuracy and effectiveness of the translations of Census 2010 mailout/mailback self-administered questionnaires. The target languages to be reviewed include Chinese, Korean, Vietnamese, and Russian. The aim of the cognitive interviews is Cognitive interviews in English were also conducted to determine whether issues found in any of the four target languages present similar problems in English. A total of 109 participants completed in-depth cognitive interviews (16 for English cognitive interviews, 23 each in Vietnamese, Korean, Chinese, and 24 in Russian). Results included the following: 1) translations in the four target languages were generally correct and accurate, however, the translations used difficult wording, uncommonly used words, or long and complex sentences which caused confusion and unnecessary difficulty for respondents, especially for respondents with lower levels of education; 2) some concepts did not exist in the target cultures which caused problems for translation (e.g., foster children, mobile home, nursing home); 3) different cultural practices led to misreport of data (e.g., age-counting practice); and 4) respondents exhibited noticeable difficulties in comprehending the instructions and questions and failed to understand the purpose of the census form. Recommendations based on these results were incorporated into the revised 2010 non-English census forms. This symbol indicates a link to a non-government web site. Our linking to these sites does not constitute an endorsement of any products, services or the information found on them. Once you link to another site you are subject to the policies of the new site.
<urn:uuid:749ba818-efa7-4d9e-a734-2b21ff0d7abf>
CC-MAIN-2013-20
http://www.census.gov/srd/www/abstract/rsm2009-01.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00061-ip-10-60-113-184.ec2.internal.warc.gz
en
0.935267
320
2.296875
2
ADDITIONAL PHOTOS by Nicole Young, Rich Legg & Other iStock Contributors One of the most common problems facing new photographers – and some of us OLD photographers – is finding a great composition. Like pizza, it’s a matter of taste, but there are some fairly standard agreed-upon guidelines for a good composition. On March 20 I wrote a piece for the blog called Five Composition Tips – http://photofocus.com/2009/03/20/five-photo-composition-tips-twipphotocom/ I’ve decided to expand on this. I also want to note these are GUIDELINES, not rules. For each of these points you could make an opposite artistic argument. Go there if you must, but if you do, you miss the point of the list. Concentrate on the basics first, then you have earned the right to get fancy and ignore them. 1. Be clear on your subject. What story are you trying to tell with the photo? 2. Draw attention to the subject. This can be done by simply getting closer, by using selective focus, by using color, by lighting just the subject, by framing the subject in a doorway or window, etc. 3. Simplify. Simple is best. Remove anything that doesn’t help you tell the story. 4. When in doubt, leave it out. If there is something in your field of view that is not relevant to the subject or doesn’t somehow support the subject, get rid of it. 5. Check your negative space. Don’t leave too much negative space and when you do have negative space, be sure you use it right. Leave room for the subject in the frame unless you have a specific reason not to. 6. Fill the frame. You can rarely go wrong by filling the frame with the main subject. Many of the best pictures are the simplest ones. You don’t have to add background for the sake of adding background. 7. Check the edges of the frames. Don’t cut off feet or hands of your subject half way. If you want to exclude those appendages, make sure we know you meant to do so. Make a clean crop well above the wrist for instance if you don’t want to include the hands. 8. Check for intruders. Is there something popping into the picture from the side? Is there a tree branch, power line, telephone poll, etc., that creeps into the shot and steals attention from the subject? Re-compose and remove it. 9. Remember POV – Point of View. Shoot up on objects to make them more powerful. Shoot down on subjects to diminish them or make then look less imposing. 10. Use the rule of thirds. Draw a Tic-Tac-Toe board over your picture in your mind. Position the subject at one of the four intersecting corners in the grid. 11. When making portraits, always keep the eyes above the center line in the photo. 13. The eye goes to the brightest part of the scene first. So don’t let anything in the photo other than the main subject be brighter than the subject. 14. Add depth by including strong foreground objects in shots where the background is also important. 15. Shoot vertically to enhance tall objects or to emphasize height. Shoot horizontally to emphasize width. 16. Use patterns, particularly repeating patterns to make pictures more interesting. 17. Use leading lines to attract the viewer’s eye where you want it to go. 19. Start by shooting at your subject’s eye level. For example, get down low when making a child or animal’s portrait rather than standing over them and shooting down on them. 22. Don’t let the horizon fall dead center in the picture. 23. Don’t let the horizon cut through the head of any human or animal subject. 24. Don’t let the horizon merge with objects that are important to your image and make sure it is level. 25. Right before you make the photo take a second, look up, look down, look all around and make sure there’s nothing you’re missing. This post sponsored by the Digital SLR Store
<urn:uuid:db1f844b-dacc-4237-939c-6b81e15e4b71>
CC-MAIN-2013-20
http://photofocus.com/2009/11/30/25-photo-composition-tips/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00053-ip-10-60-113-184.ec2.internal.warc.gz
en
0.909952
895
1.945313
2
Part of the All About: Sustainability Webinar Series! Selecting the right paper for your direct mail campaigns has always been a balancing act, juggling cost with performance. And now, marketers increasingly are adding environment-friendly to their lists of considerations. But "environment-friendly" is a big concept, encompassing a whole host of options ranging from virgin fiber that is responsibly harvested to post-consumer recycled fiber, mixed fiber sources and even alternatives to wood fiber. In addition, some companies extend their research and selection criteria to include the environmental impact of the processes used to manufacture the paper. To help you suss out the differences in the paper products on the market, Target Marketing and Printing Impressions have assembled a panel of production experts who will take you through the various factors related to the environment and paper. You'll come away with an understanding of: - the substrates that are considered environment-friendly - the environmental issues surrounding the manufacturing process - what factors to weigh when selecting eco-friendly papers Click here to view this webinar today!
<urn:uuid:cfc2b7d0-d5ff-4b33-99de-15dd4c9bcc0b>
CC-MAIN-2013-20
http://www.piworld.com/webinar/paper-choices-post-consumer-recycled-responsibly-forested-everything-in-between-301035
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00065-ip-10-60-113-184.ec2.internal.warc.gz
en
0.943133
219
2.0625
2
It's important to know how to use a generator if it's going to be a primary source of energy on an RV or sailboat or if you'll need it to backup your primary energy source. Knowing how to use a generator before it comes time to need to know how to use it can save you a lot of trouble. Generators should be used outside or in an otherwise open area (in other words, not your garage). Never use a generator in an enclosed space; generators produce carbon monoxide, which is an odorless, colorless gas and can be deadly. Because of that, you also want to avoid keeping the generator near an open window or door and make sure the exhaust points away from the house. It can be impossible to detect carbon monoxide in your home and you may not realize you have been poisoned until it's too late. You also want to keep your generator dry to avoid electrocution. Keep it under a canopy if it's raining or snowing and make sure you don't leave generator extension cords sitting on the wet ground. Make sure your generator is ready to go before an emergency. This means making sure it's in functional condition and is oiled up. Make sure the generator is completely cool before adding fuel. You'll need an extension cord to plug the items you wish to use into the generator. There are extension cords made specifically for generator use; these are ideal to use. Make sure you don't overload your generator. Before use, determine how many watts your generator can handle at once and don't go over that. To determine how many watts your generator will need to be able to handle, add up the wattage of all appliances or items you plan on using. Your generator should be able to handle this number, at a minimum. Don't try to power your whole house using a generator; you can electrocute nearby utility workers. If you want to use your generator to supply energy to your whole house, have a licensed electrician install a power transfer switch in your home before you need to use the generator. What size generator do I need? This largely depends on your intended use of the generator. Whether you'll be using the generator as a backup source of energy for your house, as the main source of energy for an RV or a live-on sailboat or in case of an emergency for a large building such as a nursing home, your needs will greatly vary.
<urn:uuid:0856f4cc-59bd-4184-9f98-78892544f6aa>
CC-MAIN-2013-20
http://www.life123.com/home-garden/electrical/generators/how-to-use-generator.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00058-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944014
495
2.921875
3
Geared towards folks interested in small renewable energy systems, over 60 people attended an informational forum called “Renewable Energy for the Farm, Ranch, and Home,” Tuesday night at Sheridan College. Milt Geiger from the University of Wyoming presented a renewable energy download of information for solar, wind, geothermal and small hydroelectric systems. He said it helps people make informed decisions. Renewable energy systems come with a price; they’re not cheap and the payback could take years to recover. Renewable energy comes in many different packages and those pursuing renewable energy systems have a variety of reasons for doing so. Wyoming ranks second in the nation for energy consumed per capita.
<urn:uuid:641e570b-3762-407e-9ba0-9110693a5c9a>
CC-MAIN-2013-20
http://www.sheridanmedia.com/print/news/power-renewable-energy14804
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00031-ip-10-60-113-184.ec2.internal.warc.gz
en
0.930858
148
2.171875
2
Mar 07,2008 00:00 TRUCKEE, Calif. – A rare wolverine has been documented in the Tahoe National Forest by a researcher from Oregon State University working with colleagues at the U.S. Forest Service’s Pacific Southwest Research Station – the first confirmed sighting of the animal in nearly three-quarters of a century. Katie Moriarty, a graduate student in OSU’s Department of Fisheries and Wildlife, has been conducting research in the forest on the effects of landscape change on American martens. The project, funded primarily by the Pacific Southwest Research Station, uses a large array of cameras that remotely capture images of martens and other animals through the use of motion sensors or heat detectors. However, one of the cameras captured an image from behind of a larger animal with telltale black and brown markings that experts say is a wolverine. William J. Zielinski, a research ecologist with the Pacific Southwest Research Station, sent the image to Jeff Copeland, a noted wolverine expert with the Rocky Mountain Research Station. Copeland said he “couldn’t convert it into anything else” other than a wolverine. “It looks like the real deal,” Copeland added. Zielinski said reports of wolverine sightings occur occasionally in California, but none of those sightings have been confirmed. The last documented occurrence of a wolverine in the state dates back to the 1920s, he said. The North American wolverine is the largest member of the weasel family and adults can weigh as much as 40 pounds. With its bushy tail and broad head, it resembles a small bear and has a similar diet – insects, berries, small animals, birds and carrion. Wolverines are more common in the north-central United States, including Minnesota, Michigan and North Dakota, and also can be found in Idaho, Utah, Colorado and Wyoming. Moriarty, who is pursuing a master’s degree in wildlife science at Oregon State, said the sighting on camera of a wolverine was “hugely unexpected.” “This may be an important scientific ‘stumble,’” she said. “Wolverines are, at the least, extremely rare and some people consider then to have been extirpated in California. I had hoped to get marten detections with the cameras, and I have captured a couple, but getting a wolverine was quite a surprise. “This season, I’ve obtained images of black bear, bobcat, many coyotes, spotted skunk, Stellar’s jay, common ravens, mice, and long- and short-tailed weasels,” Moriarty added. “It’s a fantastic wildlife assemblage.” Moriarty has been working in the Tahoe National Forest under the tutelage of Zielinski, a wildlife ecologist, and Eric Forsman, a wildlife ecologist at OSU and the U.S. Geological Survey. Both are members of Moriarty’s graduate committee. Zielinski, who is an expert at detecting rare mammals including wolverines, lynx, marten and fishers, said the U.S. Forest Service will begin seeking more evidence of wolverines in the region. In addition to the camera array, researchers will try to collect hair and scat samples and compare them to an existing DNA database that may tell them from where the wolverine originated. About Oregon State University: OSU is one of only two U.S. universities designated a land-, sea-, space- and sun-grant institution. OSU is also Oregon’s only university designated in the Carnegie Foundation’s top tier for research institutions, garnering more than 60 percent of the total federal and private research funding in the Oregon University System.
<urn:uuid:dee75860-338a-4c5e-9598-5dd4841c6d4a>
CC-MAIN-2013-20
http://www.bendweekly.com/print/14449.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698924319/warc/CC-MAIN-20130516100844-00003-ip-10-60-113-184.ec2.internal.warc.gz
en
0.945097
817
3
3
ELKHART, Ind. /Send2Press Newswire/ — Leading the way in reducing energy consumption is in the works for the new 49,000-sqaure-foot LEED Platinum Certified Hannaford Supermarket in Augusta, Maine and REMIS AMERICA was sure to be a part of it. REMIS AMERICA installed 32 feet of Remiglas Ecosafe sliding glass covers on freezer bunker display cases which can reduce energy consumption up to a remarkable 55 percent over traditional open frozen food cases. With these potential energy savings, retail grocery stores now recognize the opportunity to significantly lower operating costs, while reducing their carbon footprint. Eco-friendly energy savings are only part of the story. Enclosed cases maintain a more comfortable store temperature, while providing a barrier to protect food freshness in the event of a power outage. Also, insulated glass covers maintain product integrity by keeping temperatures constant, for greater consumer satisfaction. Goods remain uniformly frozen in the refrigerated display cabinet and optimally visible. The Maine-based Hannaford Supermarkets is the first supermarket chain in the world to achieve LEED Platinum Certification. The Platinum designation is the highest rating a company can strive to obtain from the U.S. Green Building Council’s Leadership in Energy and Environmental design (LEED). Hannaford’s first-in-the-world environmental designed Augusta location opened on July 25, 2009. They plan on using the store as a research laboratory to test new innovations that decrease energy usage, waste and water consumption, while improving air quality, storm-water management, and the use of sustainable materials. The REMIS AMERICA, Remiglas Ecosafe covers have been engineered to custom fit individual case specifications. These proven systems are in use in over ten thousand retail stores throughout Europe, via the sister company, REMIS GmbH of Cologne, Germany. REMIS AMERICA, headquartered in Elkhart, Indiana, is the result of a joint venture between, DEHCO, Inc., Elkhart, Indiana, and REMIS GmbH of Cologne, Germany. Hannaford currently operates 169 supermarkets in Maine, New Hampshire, Massachusetts, New York and Vermont under the name Hannaford Food and Drug or Hannaford Supermarket and Pharmacy. Hannaford is owned by Belgium-based Delhaize Group, a global company that is one of the world’s largest food retailers. More information: www.remisamerica.com . News Source: Remis America :: This press release was issued by Send2Press® and is Copyright © 2009 Neotrope® News Network – all rights reserved. REMIS AMERICA, LLC is a joint venture between Germany-based REMIS GmbH and Dehco, INC, headquartered in Elkhart, IN. The first American installation was in November 2008 and the joint venture was finalized in February 2009. In January 2010, REMIS AMERICA opened a 35,000 square foot American production facility, which facilitated over 80 retrofit installations in 2010 and is poised for rapid growth in the coming years. REMIS AMERICA offers retro-fit refrigeration doors and covers to grocery retailers and OEM case manufacturers that cut energy costs up to 80 percent while also greatly reducing retailers’ carbon footprint. REMIS AMERICA’S eco-friendly, energy saving systems are unrivaled in keeping energy consumption low by providing a full range of medium temperature insulated glass doors and bunker freezer covers, installation and service. These proven glass doors and covers are engineered to custom fit individual refrigeration case specifications and are in use in over ten thousand retail stores throughout Europe, via our sister company, REMIS GmbH of Cologne, Germany. REMIS AMERICA provides start-to-finish project management. REMIS' skilled team of engineers evaluates your specific application and works hand-in-hand with our factory during the manufacturing process. Our fleet of trucks ensures on-time delivery for installation that works with your schedule to minimize impact on normal store operations. Experienced installation professionals then efficiently fit the modular doors and covers to the existing cases, producing a clean and uniform appearance. And our services don't end there; we provide continued support and follow up long after the final door is hung. Ensure quality and save energy! Our patented REMIS AMERICA refrigeration systems are specially designed for all the demands of food retail. Please visit Remiglas.de for additional product information REMIS AMERICA ( www.remisamerica.com ), headquartered in Elkhart, Ind., is the result of a joint venture between, DEHCO, Inc., Elkhart, Indiana, and REMIS GmbH of Cologne, Germany. In addition to the Midwest headquarters, REMIS AMERICA offers a network of sales and service centers throughout North America, including Eugene, Ore., Tampa, Fla., and Manheim, Pa. MEDIA ONLY CONTACT: of REMIS AMERICA edolan @ remisamerica.com More News From REMIS AMERICA, LLC: Press Release Copr. © REMIS AMERICA, LLC (or “news source”) and Send2Press® Newswire. Permission granted for reproduction by news portals, aggregators and news indexes provided original attribution to this site and news source is retained. Cannot be used for commercial purposes/advertising or keyword marketing. All other rights reserved. This press release has had 1,040 views so far.
<urn:uuid:dd282587-4abd-439f-be64-ffa56848028d>
CC-MAIN-2013-20
http://send2pressnewswire.com/2009/08/19/s2p1483_120507.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710006682/warc/CC-MAIN-20130516131326-00069-ip-10-60-113-184.ec2.internal.warc.gz
en
0.907176
1,118
1.65625
2
Amateur radio has a deep tradition of providing emergency communications during all kinds of disasters. Of course, some emergencies are more urgent and serious than others. The Golf November Tango frequency is an important frequency to always have programmed into your radio. Established as 146.55 MHz ( FM simplex, no CTCSS), the GNT Frequency is the critical logistics channel for certain types of incidents (to use ICS terminology). This all started when three ham radio operators found themselves stranded on the shore of Lake Michigan. Well, actually they were not so much stranded as just sitting there watching the waves roll in. Without warning, they found themselves getting thirsty without any liquid refreshment in sight. Rather than make the long, treacherous walk back to the beach house, a 2M FM transceiver was employed to make the critical call. Fortunately, the wives of these dehydrated amateurs were also FCC licensed amateur radio operators monitoring the designated GNT frequency. Without delay, communication was established with the beach house and the critical resupply of Gin and Tonic was delivered. There was some thought that the guys on the beach were just being lazy, but the requested GNTs were quickly dispatched anyway. After that incident, 146.55 MHz was established as the GNT Frequency for all of North America. Like they say, When All Else Fails. 73, Bob K0NR
<urn:uuid:888488d3-b830-4f00-96ed-a343debaff39>
CC-MAIN-2013-20
http://www.k0nr.com/wordpress/2009/10/golf-november-tango/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00043-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975692
284
2.34375
2
If you’re camping, hiking, lakeside fishing, or just relaxing in the yard, you’re likely to encounter wood ticks and deer ticks. Keep your eyes peeled, and know what you should do to keep yourself, your family and your pets safe during tick season. A tick bite can leave you infected by a number of ailments, including Lymes Disease. The following tips are recommended by the CDC and outlined in an article by John Lundy, published in the Duluth News Tribune on May 16: 1. Avoid areas with high grass and leaf litter. Walk toward the center of trails. 2. Use a repellant that is at least 20 percent DEET. 3. Bathe or shower as soon as possible after coming indoors. 4. Conduct a full-body tick check using a hand-held or full-length mirror. (Parents should help their children check thoroughly for ticks.) And, check out all the great information available on the Centers for Disease Control website. Click here to visit the CDC Tick Page
<urn:uuid:f0c7cc17-e25f-44b9-9776-1f781e4abfe1>
CC-MAIN-2013-20
http://www.locatelakeshore.com/blog/?paged=2
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00012-ip-10-60-113-184.ec2.internal.warc.gz
en
0.939171
215
2.5625
3
“The non-partisan Congressional Budget Office on Friday said President Obama’s 2014 budget proposal would add $5.2 trillion in deficits over 10 years. The agency said that compared to its baseline scenario, the Obama budget would reduce projected deficits by $1.1 trillion over 10 years. The White House had claimed $1.8 trillion in savings using its own analysis. The CBO’s baseline assumes that automatic sequestration cuts remain in place for nine years, whereas the White House assumes they are eliminated. While it uses a different budget baseline than the White House, the analysis of individual proposals are broadly consistent with what Obama officials projected. The CBO reports $3 billion more in spending than the White House claimed and $79 billion more in revenue over 10 years. “ Via The Hill “A little over a week ago, on May 7, 2013 and in the midst of a worldwide economic depression, Columbia, South Carolina City Council members met to discuss the funding of a million dollar project even as the State government continued its regularly scheduled hysteria over budgets, spending, and deficits. So what was the project so vital to the people of Columbia to be pushed through by a 4-2 vote of the council during the midst of such trying economic times? Was it regarding the road systems? Was it the dismal state of Columbia schools? Was it tax relief for residents? Was it economic development? Water? Power? Sewage? Waste disposal? Actually, it was the purchase and installation of 800 new surveillance cameras all across the city of Columbia that prompted the Council to spend $1.22 million, much of which is scheduled to come from an “emergency reserve fund” that is actually part of next year’s budget. As The State reports, “That previous $1 million fund will be reduced to $250,000. A capital projects fund that was to be $1.7 million next year will be down by $200,000.”” Via Activist Post “Despite the Obama administration’s generous support for green energy, job creation in the sector has both lagged and come at a hefty cost to taxpayers, according to a new report. According to the Institute for Energy Research, the Department of Energy has spent nearly $26 billion since 2009 on its Section 1703 and 1705 loan programs. However, these two programs only yielded 2,308 permanent jobs — meaning the cost to taxpayers was $11.25 million per job. “Clearly, in terms of ‘bang for the buck,” government programs that coddle renewable energy are losers,” according to IER. “In terms of jobs, the losers are the American workers who would otherwise be gainfully employed but for the tremendous waste of taxpayer dollars on the administration’s obsession with “green energy.’”” Via The Daily Caller “The National Institutes of Health (NIH) has awarded more than $400,000 to a research project involving underwear that can detect when a person smokes cigarettes. The University of Alabama has received two grants totaling $402,721 for the project, which so far has produced a “very early prototype” of the monitoring system, which — in its current state — fits like a vest. The goal of the three-year study is to “develop a wearable sensor system comprised of a breathing sensor integrated into conventional underwear.”” Via CNS News “The total number of people in the United States now receiving federal disability benefits hit a record 10,962,532 million in April, which exceeds the 10,815,197 people who live in the nation of Greece. According to newly released data from the Social Security Administration, the record 10,962,532 total disability beneficiaries in April, included a record 8,865,586 disabled workers (up from 8,853,614 in March), 1,936,236 children of disabled workers, and 160,710 spouses of disabled workers. According to its latest census, Greece had only 10,815,197 residents.” Via CNS News “On Monday, The Heritage Foundation released its highly anticipated report on the cost to taxpayers of legalizing the 11 million illegal immigrants, as proposed in the “Gang of Eight’s” immigration reform bill. According to the conservative think tank, “the average adult unlawful immigrant would receive $592,000 more in government benefits” than he or she would pay out in taxes over the course of their lifetime, and the net cost will be at least $6.3 trillion. Heritage Foundation scholar Robert Rector’s examination of the long-term costs focused on Obamacare, Social Security, other entitlements, and the more than 80 means-tested assistance programs. Rector further estimated that the typical illegal immigrant, if legalized, would live for 50 years and by retirement would pull in $3 in Social Security and Medicare for every dollar paid in Federal Insurance Contribution Act taxes.” Via The Daily Caller “Legalizing an estimated 11 million illegal immigrants will cost taxpayers at least $6.3 trillion over the coming decades, according to a study released Monday by the Heritage Foundation. The study projects illegal immigrants would receive $9.4 trillion in government benefits and pay only $3.1 trillion in taxes over their lifetimes if they gain lawful status under comprehensive immigration reform pending in the Senate.” Via The Hill “The U.S. government does not know how many agencies and programs it is asking taxpayers to fund, The Daily Caller has learned. Even though the editors of Wikipedia have been able to assemble a list of federal agencies, no complete official government list of federal agencies and programs currently exists. The Government Performance and Results Modernization Act of 2010 (GPRAMA) — which became law on January 4, 2011 — established required quarterly performance assessments of government programs. That bill also mandated that the Office of Management and Budget (OMB) create a website that would publish quarterly performance reports by the heads of each agency. Currently that website — Performance.gov, which was launched in 2011 — contains only a partial list of government programs, and important agencies such as the FCC aren’t on the list.” Via The Daily Caller Chocolate strawberries among extravagant demands by Nancy Pelosi as she spent $101,000 in two years on services while travelling with US Airforce “If the US Airforce did all airline food, it would be strawberries dipped in dark chocolate and grilled chicken salads all round. Unfortunately this luxury is reserved for top US politicians alone, as new documents detailing Nancy Pelosi’s travel expenses reveal. The former House Speaker was showered with a cornucopia of gourmet food and alcohol as she travelled over 90,000 miles around the world in just nine months last year – all courtesy of the US Airforce (USAF). On one overseas excursion, her office even wrote to the USAF asking for strawberries dipped in dark chocolate as a birthday treat. The documents, uncovered by political corruption watchdog Judicial Watch, reveal that the US taxpayer was billed for $101,429 (£64,000) in Mrs Pelosi’s in-flight services over a period of two years.” Via The Daily Mail ” The most destructive Obamacare tax increases are just around the bend Asked about Senator Max Baucus’s (D-Mont.) recent “train wreck” comments, President Obama today said, “A huge chunk of it [Obamacare] has already been implemented.” Unmentioned was the wave of destructive Obamacare tax increases that will begin to hit Americans during the next tax filing season and beyond:”
<urn:uuid:42580446-1220-4269-bd6a-b74e840a6254>
CC-MAIN-2013-20
http://evilofindifference.wordpress.com/category/government-waste/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00067-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958639
1,612
1.875
2
Conservative media figures have repeatedly claimed or suggested that it would be unprecedented and "corrupt" for Democrats to address "controversial" issues during Congress' lame duck session following the 2010 elections. But in 1998, Republicans impeached President Clinton during such a post-election congressional session. Conservatives fearmonger about supposedly unprecedented use of lame duck session to address "controversial" issues Gingrich: "[A]ny attempt by the outgoing Congress to pass legislation they were unwilling to defend in an election would be an attempt to thwart the will of the people." Writing in Human Events on August 4, Newt Gingrich wrote that "Democratic leaders today have been sending clear signals that they are willing to use the lame duck session of Congress to pass the most unpopular and destructive parts of their agenda," and that, "Like the Federalists' actions in 1801, any attempt by the outgoing Congress to pass legislation they were unwilling to defend in an election would be an attempt to thwart the will of the people." Gingrich continued, "It is hard to think of an attitude more fundamentally at odds with the spirit of our democratic republic than the idea that an elected representative should feel 'liberated' to pass bills the American people do not support once he or she is freed from the burden of having to face the voters." Gingrich urged his readers to asked their members of Congress to sign a pledge not to participate in such a lame duck session because it "smacks of the worst kind of political corruption" and "is an abusive power grab." Rove: "We've never had a lame duck session that has dealt with a highly controversial and extremely consequential item." Appearing on the August 9 edition of Fox News' Your World With Neil Cavuto, Karl Rove said that "we've never had a lame-duck session that has dealt with a highly controversial and extremely consequential item," adding that it "would really be unusual" for Democrats to deal with issues like cap and trade, card check and tax cuts during the session. Fund: "It's been almost 30 years since anything remotely contentious was handled in a lame-duck session." In a July 9 Wall Street Journal column, John Fund wrote, "It's been almost 30 years since anything remotely contentious was handled in a lame-duck session, but that doesn't faze Democrats who have jammed through ObamaCare and are determined to bring the financial system under greater federal control." Geraghty: "Lame-duck sessions are not designed to be shortcuts to ignore the will of the people and erase any sense of legislative culpability." Jim Geraghty wrote in National Review Online's "Campaign Spot" blog on June 16 that "Every Republican challenger ought to be demanding that their Democrat incumbent opponent pledge in writing that they will not pass an energy bill in a lame-duck session if they are defeated" and that "When the people make their opinion clear, fundamental concepts of accountability and responsibility require that the opinion not be ignored." Geragthy added, "Lame-duck sessions are not designed to be shortcuts to ignore the will of the people and erase any sense of legislative culpability." Beck: Democrats "ramping up civil unrest" with lame duck session. On the July 15 edition of his radio show, Glenn Beck discussed the proposed lame duck session with Rep. Michelle Bachmann (D-MN) and said, "[Y]ou tell me what stops these people. Because this is my real fear. They are ramping up civil unrest." From the July 15 edition of Premiere Radio Networks' The Glenn Beck Program: BECK: So help me out with -- help me out with this. Tell me, if we have these Democrats being thrown out of office and we have crummy Republicans being thrown out of office, there's a lame duck session. BACHMANN: Yeah, that's right. BECK: You tell me what stops, you tell me what stops these people. Because this is my real fear. They are ramping up civil unrest. Republicans used 1998 lame duck session to impeach Clinton 1998 House impeachment hearings, debate, and vote occurred during lame duck session. The 1998 congressional midterm elections occurred on November 3 of that year. The 105th Congress was subsequently called back for a lame-duck session dealing with the impeachment of President Clinton.Impeachment hearings before the House Judiciary Committee began on November 19, 1998, and concluded on December 12, 1998. The full House took up four articles of impeachment on December 18 and voted on them on December 19. The 106th Congress began on January 6, 1999. 38 "lame duck" members of Congress were involved in impeachment proceedings. As the New York Times reported on December 19, 1998, "They are the lame ducks in the House, 21 Republicans and 17 Democrats, not including two Republicans and one Democrat who won election to Senate seats. And as the House took up impeachment today, they streamed back into the Capitol to deal with what for many is the most momentous issue of their careers in public service, one they variously view as unfortunately necessary or just unfortunate." GOP support for impeachment credited with turning projected gain of seats into losses in 1998. A November 3, 1998 article in Time reported: From the moment in January that Monica Lewinsky became as famous as Michael Jordan, official Washington and its media auxiliary have been transfixed by the President's sex drive. And for a while, who wasn't? But in time most people moved back to matters nearer at hand--getting ahead, getting settled, getting more sleep, anything but "that." Somehow Congress did not hear. The tobacco deal collapsed; campaign-finance reform died; the patients' bill of rights was shelved. Through it all, the Republicans on Capitol Hill stayed on message. Too bad for them that the message was all Monica all the time. On Tuesday, voters got the chance to send Washington their own message. It was two words: Shut up! So the election that was supposed to be another G.O.P. blowout ended with a gain of five House seats for the Democrats, no change in the Senate and the morning-after spectacle of dumbstruck Republicans." Similarly, in a November 3, 1998 CNN.com article, Stuart Rothenberg wrote, "The president clearly was a winner in Tuesday's balloting. He helped boost minority turnout, and avoided the sort of GOP gains that would have fueled further talk of impeachment." On November 5, 1998, The Washington Post reported that Gingrich had blamed the GOP's losses on "the media for perpetually flogging the Monica Lewinsky scandal"; the article noted that Gingrich "seemed to be writing himself out" of the elections, and pointed out that Gingrich "approved a final-week blitz of scandal ads that aired in 30 key districts." Gingrich himself was a lame duck at the time of the impeachment vote. Despite winning re-election to his congressional seat in 1998, Gingrich announced on November 6, 1998, that he would quit his seat in Congress after Republicans lost seats in Congress during the election. He was still the Speaker of the House on the day the House passed articles of impeachment against Clinton in the lame-duck session, and he voted in favor of all four articles of impeachment offered (two of which ultimately passed).
<urn:uuid:fdacdbf2-8faf-42c4-8c33-f26c86f198d5>
CC-MAIN-2013-20
http://mediamatters.org/research/2010/08/10/conservatives-disappear-gops-clinton-impeachmen/169069
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00021-ip-10-60-113-184.ec2.internal.warc.gz
en
0.974633
1,491
1.664063
2
When you're interviewing for jobs, you try to prepare as best you can by reviewing your resume, thinking about what questions might be asked and how you’ll answer them, and practicing your responses. Then you walk in and realize the interviewer wants to ask you situational interview questions. What’s a situational interview question? - There are two types: past experience questions and circumstantial questions. - For past experience questions, you'll be asked to provide a negative situation from your professional experience, and detail how you successfully resolved it. - For circumstantial questions, you'll be given a specific set of circumstances or challenges and asked how you would create a positive outcome from them. How do you prepare for these types of questions? Interviewers use past experience questions because they believe your past behavior makes a good indicator of your future behavior on the job. The interviewer wants to know how you’ve tackled previous challenges. They’ll ask you to tell them about a difficult situation you’ve faced in your past work history – one that is relevant to the question being asked – that you resolved successfully. Think of some examples before the interview, review those situations, and analyze them. What steps did you take? What words did you use? Become so familiar with your actions, and those of the others involved, that you can give the interviewer very specific details and demonstrate your knowledge of what it takes to create a positive outcome. Part of the reason employers use circumstantial questions is to gauge your ability to think on your feet. For these questions, the interviewer will create a challenge for you to solve. It may be a situation you actually have faced in your work history, or you may be required to respond to a hypothetical scenario. This can be difficult if you’ve never dealt with such challenges before, but use the same structure: specific actions leading to specific results, all handled in a smooth, professional way. It’s impossible to anticipate in advance what specific situational interview questions will be asked, which makes it hard to prepare your answers. However, it’s fairly safe to expect the interviewer to investigate the following broad areas: - organizational skills/time management skills - leadership skills - communication skills - interpersonal skills/conflict resolution In addition to the above examples, an interviewer may formulate more technical or focused situational questions pertaining specifically to your field or area of expertise. Here are some common situational interview questions that you may encounter: You have a deadline approaching and fear you will be unable to meet it. What do you do? Describe a situation where you were in disagreement with a coworker and explain how you handled it. A coworker frequently leaves early when the boss is not around, and asks you to cover for him. What would you do? Please describe a project that you led from start to finish and describe your strategy for seeing it through. While situational interviews may be drastically different from your past interview experiences, they're not impossible to conquer. It's a chance for you to show how you handle real work situations, your problem-solving style and what your personality is really like.
<urn:uuid:e0db3743-8b12-46c5-b896-7665f9375d97>
CC-MAIN-2013-20
http://www.donaldsonjames.com/tag/tricky-interview-questions/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00052-ip-10-60-113-184.ec2.internal.warc.gz
en
0.945176
653
1.953125
2
128th Infantry Regiment National Volunteers; Monitors Mustered in: September 4, 1862 Mustered out: July 12, 1865 The following is taken from New York in the War of the Rebellion, 3rd ed. Frederick Phisterer. Albany: J. B. Lyon Company, 1912. Colonel David S. Cowles received authority, July 19, 1862, to raise this regiment in the counties of Columbia and Dutchess; it was organized at Hudson and there mustered in the service of the United States for three years September 4, 1862. The companies were recruited principally: A at Hudson, Ghent, Chatham, Austerlitz, New Lebanon, Canaan, Germantown and Claverack; B at Washington, Amenia, Dover, Pawling, North East, Stanford and Pine Plains; C at Rhinebeck, Milan, Red Hook, Clinton, Stanford and Hyde Park; D at Poughkeepsie, Hyde Park, Beekman, Fishkill, Pine Plains, Pleasant Valley, Clinton, Livingston, Greenport and LaGrange; E at Kinder-hook, Chatham, Valatie, Hillsdale and Austerlitz; F at Fishkill, Pawling, Pine Plains, North East, Washington, Amenia and Hudson; G at Stuyvesant, Hudson, Ancram, Cler-mont, Taghkanick, Gallatin, Claverack, New Lebanon, Stockport, Ghent and Hillsdale; H at Fishkill, Poughkeepsie, Hyde Park and Beekman; I at Poughkeepsie; and K at Chatham, Hudson, Claverack, Greenport, Hyde Park, Clinton, Germantown, Red Hook and Copake. The regiment left the State September 5, 1862; it served in the Middle Department, 8th Corps, at and near Baltimore, Md., from September, 1862; at New Orleans, La., from December, 1862; in the 1st Brigade, Sherman's Division, Department of the Gulf, from January, 1863; in 1st Brigade, 1st Division, 19th Corps, from March, 1863; in the 3d Brigade, 3d Division, 19th Corps, from June, 1863; in 2d Brigade, 1st Division, 19th Corps, from July, 1863; in 3d Brigade, 1st Division, 19th Corps, from November, 1863; in 3d Brigade, 2d Division, 19th Corps, from February, 1864; in 3d Brigade, 1st Division, 10th Corps, from April 2, 1865; and it was honorably discharged and mustered out, under Capt. Thomas N. Davis, July 12, 1865, at Savannah, Ga. During its service the regiment lost by death, killed in action, 2 officers, 41 enlisted men; of wounds received in action, 20 enlisted men; of disease and other causes, 3 officers, 203 enlisted men; total, 5 officers, 264 enlisted men; aggregate, 269; of whom 41 enlisted men died in the hands of the enemy. The following is taken from The Union army: a history of military affairs in the loyal states, 1861-65 -- records of the regiments in the Union army -- cyclopedia of battles -- memoirs of commanders and soldiers. Madison, WI: Federal Pub. Co., 1908. volume II. One Hundred and Twenty-eighth Infantry.—Cols., David S. Cowles, James Smith, James P. Foster; Lieut-Cols., James Smith, James P. Foster, Francis S. Keese; Majs., James P. Foster, Edward Gifford, Francis S. Keese, George M. Van Slyck, Robert F. Wilkinson. This regiment, recruited in the counties of Columbia and Dutchess, rendezvoused at Hudson, and was there mustered into the U. S. service for three years, Sept. 4, 1862. The following day it left for Baltimore, whence it sailed for New Orleans a few weeks later. In Jan., 1863, it was assigned to Sherman's division, 19th corps, and was complimented by Gen. Sherman for the success of its first achievement—the capture of a large quantity of property at Gainesville in April. The regiment took a gallant and conspicuous part in the long siege of Port Hudson, fighting desperately during the assaults of May 27 and June 14. The splendid service rendered by the 128th is well attested by its casualties during the siege, which amounted to 22 killed, 100 wounded and 6 missing, a total of 128. Col. Cowles fell while gallantly leading his regiment during the assault of May 27, the command suffering its heaviest losses on this occasion. After the fall of Port Hudson, the regiment was ordered to Baton Rouge, where it arrived on the 22nd after a fatiguing march, and the next 9 months were chiefly spent in post and garrison duty, with occasional reconnoissances and minor expeditions. On March 15, 1864, in the 3d brigade, 2nd (Grover's) division, 19th corps, it started on Banks' ill-fated Red River expedition. During the battle of Cane river crossing, the 128th was the first to cross the river and plant a flag upon the hill. It also made a brilliant charge driving the enemy and taking many prisoners, its loss being 10 killed and wounded. It was also present at Alexandria and Mansura. In July it proceeded with the division to New Orleans, whence it sailed under sealed orders for Washington. On its arrival it was ordered into Maryland to confront Early's invasion and took part in the subsequent famous campaign under Sheridan in the Shenandoah Valley. At the battle of the .Opequan the regiment lost 57 killed, wounded and missing, Maj. Keese and 4 other officers being among the wounded. At Fisher's hill its loss was 20 killed, wounded and missing, and the regiment was handsomely complimented by Gen. Emory for its services. At the battle of Cedar creek it lost 95 killed, wounded and missing. During the next two months it was engaged in garrison duty at Winchester and New Berne, and was ordered to Savannah with its division in Jan., 1865. In March it was ordered to North Carolina, where it was temporarily attached to the 3d brigade, 1st division, l0th corps, participating in the campaign of the Carolinas until Johnston's surrender in April. It returned to Savannah in May and was mustered out in Augusta, Ga., July 12, 1863. The regiment returned home with only 400 men of the original 960 and 173 recruits. It lost during service 2 officers and 61 men killed and mortally wounded; 3 officers and 203 men died of disease and other causes; total deaths, 269, of whom 41 died in the hands of the enemy. Battles and Casualties Table from Phisterer Civil War Newspaper Clippings This is also available in PDF format. These are large files; however, they are exact images of the pages. Pages 1 - 10 Pages 11 - 20 Pages 21 - 30 Pages 31 - 40 Pages 41 - 50 Pages 51 - 60 Pages 61 - 70 Pages 71 - 80 Pages 81 - 87 Hudson Gazette Extra. Complete list of officers and privates. 128th Battle Flag This is meant to be a comprehensive list. If, however, you know of a resource that is not listed below, please send an email to firstname.lastname@example.org with the name of the resource and where it is located. This can include photographs, letters, articles and other non-book materials. Also, if you have any materials in your possession that you would like to donate, the museum is always looking for items specific to New York's military heritage. Thank you. "128th regiment, a complete list [roster] compiled by M. P. Williams, editor Hudson gazette, and revised by the War committee." In The Hudson city and Columbia county directory for the year 1862-3, 128th Regiment New York State Volunteers Infantry Veterans Association. Records, 1887-1928. Records of this Civil War veterans' association consist of minutes, membership lists, reports from reunions, and clippings. Located at the Dutchess County Historical Society, Poughkeepsie, NY. American Legion. The Columbia County American Legion presents a Civil War Centennial commemoration, Sunday, July 22, 1962 at the Hudson Fish and Game Club. [Hudson, NY?] American Legion, Columbia County (N.Y.) . Ashley Family. Civil War Miscellaneous Collection (Adjutant's letters, Mar 4, 1863-1864). Located at the Military History Institute in Carlisle, PA. Brown, Ben H. Civil War Miscellaneous Collection (Enlisted man's letter, Oct 21, 1862). Located at the Military History Institute in Carlisle, PA. Crowther, Joseph W. "Joseph W. Crowther and the 128th NY Volunteers." 128th Vols. www.wquercus.com/crowther/128th.htm. Crowther, Joseph W. Joseph W. Crowther diary. 1864-1865. Diary of Union soldier Joseph W. Crowther, who served during the Civil War with Company H., 128th New York Infantry Regiment. Diary is bound in leather, ca. 3 1/2" x 6" x 14", 131 pages; entries begin November 9 1864 and end July 23 1865 when regiment is disbanded. Crowther describes camp life; foraging; skirmishes; winter quarters in Winchester, Virginia; transport via steamship to Fort Monroe, Virginia and Savannah, Georgia; soldiers receiving news of the assassination of President Lincoln; description of soldiers'return to New York at end of war. Locations mentioned or described include Kernstown, Front Royal, Winchester, Martinsburg, Harper's Ferry, Baltimore, Savannah, and Goldsboro. diary 1 volume (131 p.) : bound in leather 9 cm. x 16 cm. Located at the Virginia Military Institute. De Peyster, John Watts. "Address delivered at Hudson county, N.Y., 6th Sept., 1887, by Brevet Major General J. Watts de Peyster, to the 128th regiment, N.Y. vols., on the 25th anniversary of the departure of that regiment for the war." Fabris, Dino. "A Civil war diary." New York history XLIX (1968) 76-88. Based on the diary of James Onderdonk, 1845-1863, of Company D, 128th New York infantry. Guinan, Michael. Letters, 1862-1864. Letters of Guinan, an enlisted man with Co. A, 128th Regiment, New York State Volunteers, who participated in the occupation of Louisiana, the siege of Port Hudson, La., and the retreat from the Red River Expedition. Topics include Guinan's unfavorable comparison of New Orleans to New York and unsympathetic views on the black Union troops, enjoyment of Mardi Gras, friends, the situation at home, and news of other men from the Hudson, N.Y., area. Located at the The Historic New Orleans Collection, http://www.hnoc.org/ Hanaburgh, David Henry. History of the One hundred and twenty-eighth regiment, New York volunteers (U. S. infantry) in the late Civil war, by D. H. Hanaburgh, Chairman of the Committee appointed by the Regimental association. Poughkeepsie: [Press of Enterprise pub. co.] 1894. Available online at http://books.google.com/books?id=aNNYAAAAMAAJ Hanaburgh, David Henry. History of the one hundred and twenty-eighth regiment : New York volunteers (U.S. infantry) : in the late civil war. Salem, MA: Higginson Book Co. 1894, 1998. McPheeters family. The McPheeters family papers,1861-1865. Contains the following type of materials: letters. Contains information pertaining to the following wars and time periods: Civil War -- Trans-Mississippi, -- Western Theater, -- Northern Interior. Contains information pertaining to the following military units and organizations: Company E, 21st Illinois Infantry Regiment; 20th Company, 1st Battalion, U.S. Veteran Reserve Corps; Company B, 11th Regiment, U.S. Veteran Reserve Corps. General description of the collection: The McPheeters family papers include letters from civilian, Mrs. Rankin McPheeters of Illinois from January 1863 until the war's end. Letters of her husband, Rankin P. (Pogue) McPheeters, of the 126th Illinois Volunteer Infantry and 11th Ohio Light Battery from September 1862 to May 1865 are found. Rankin's letters contain material about camp life, food, quarters, disease, mail, politics and Copperheads at Vicksburg and Little Rock. There are also letters from his family in Moultrie Country, Illinois and Tippecanoe County, Indiana. Addison W. McPheeters, Jr. letters describe camp life and activities while on march. Letters from the McPheeters' father from 1863 to 1865 are also found within the collection. Located at the Military History Institute in Carlisle, PA. Miller, Harold (Harold Rupert). Full measure of devotion, the Columbia companies of the 128th N.Y., a narrative written and illustrated by... [Chatham Center, New York]: 1977. Moore, M. P. Diary, 1864. Pocket diary kept during his service with Company A, 128th New York Volunteers during the Civil War with entries on the weather, military events, his furlough home, and other events, 1864. Located at the Daughters of the American Revolution. Hendrick Hudson Chapter, Hudson, NY. New York (State). Bureau of Military Statistics. Roster of Staff Officers and Enlisted Men of the 128th Regiment, New York Volunteers, 1862-1865. Quantity: 0.3 cu. ft. (11 volumes) This series consists of volumes providing the names of enlisted men and officers who constituted the 128th Regiment, New York Volunteers. It is unclear what specific office compiled this roster but it may have been the Bureau of Military Statistics since its enabling legislation directed it to acquire "a record of the services of the several regiments" which fought in the Civil War. In addition to name, the roster provides: rank; birthplace; date of discharge; wounds received (usually a brief description); date and place of death, if applicable; date deserted, if applicable; promotions received and dates, if applicable; and date of discharge. Located at the New York State Library Manuscripts and Special Collections. Poughkeepsie Daily Eagle Newpaper Clippings relating to the 128th, 150th, and 156th Regiments. Poughkeepsie Daily Eagle. July, 1863. Reynolds Family. Correspondence, 1862-1871. Collection consists almost entirely of personal letters written by Alfred C., Charles E., and James W. Reynolds to sisters and parents detailing Civil War experiences in 128th. regiment, N.Y.V. and 11th. Light Artillery, New York. Of particular interest are accounts of the capture of Fort Morgan (1864, Aug-Sept), reflections on the copperheads, African American troops, General Lee, and slavery. Located at Brown University. Smith, James. A resume of the services of the 128th Regiment New York Volunteers, from Sept. 4, '62 to Jan. 1, '64 :with a list of losses, &c, &c. Baton Rouge, La. : Printed at the Gazette and Comet Book and Job Office, 1864. 15 pp. Van Alstyne, Lawrence. Diary of an enlisted man, by Lawrence Van Alstyne. New Haven: Tuttle, Morehouse & Taylor co., 1910. Items in the museum collection are in bold. Back to Civil War Infantry New York State Division of Military and Naval Affairs: Military History September 28, 2011
<urn:uuid:867507e4-2245-4dc9-ad92-c921e528d754>
CC-MAIN-2013-20
http://dmna.ny.gov/historic/reghist/civil/infantry/128thInf/128thInfMain.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00067-ip-10-60-113-184.ec2.internal.warc.gz
en
0.930782
3,453
2.125
2
The New New Deal By Michael Grunwald Typically it takes decades to parse, analyze and recount the information surrounding historical policy decisions. In his new book The New New Deal (Simon and Schuster) Michael Grunwald effectively cuts the line and delivers a walloping, real-time narrative that explores the American Recovery and Reinvestment Act of 2009 (aka “The Obama Stimulus”) in astounding detail. In fluid prose that is accessible without pandering to the reader, Grunwald invites us into the chaotic world of Washington D.C. as a newly elected President grapples with a devastating economic collapse while battling unruly opposition, unrealistic expectations and an ever-dwindling window of opportunity to pass one of the most transformative bills of our time. Assiduously researched and wonderfully written, Grunwald has given future historians the ultimate factual baseline from which to draw conclusions and analyze policy for decades to come. The New New Deal is a gift to policy wonks and casual political observers alike. Regardless of which category you fall into, this book should be required reading for anyone looking to make an informed decision in the voting booth this November.
<urn:uuid:e63a48a2-5efd-4871-82a7-38210e3e78a2>
CC-MAIN-2013-20
http://archive.longislandpress.com/2012/08/16/book-review-the-new-new-deal/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00052-ip-10-60-113-184.ec2.internal.warc.gz
en
0.904005
238
2.109375
2
Monday, May 17, 2010 I like Claus van Zastrow's post on continuing the push towards college for everyone over at his Public School Insights blog today. He makes one of the few points about "college readiness" that rings true and sensible to me: "The vast majority of wealthy parents expect their kids to go to college," he writes. "Even some of those pundits who pooh pooh college in the pages of the Times or The Wall Street Journal would likely pitch a fit if their own children decided to go the voc-ed route. Poor children face a very different reality. (...) [T]hose who never went to college are getting hit hardest by this recession. The poor get poorer." I'm skeptical, I admit, of the idea that all children can be made college-ready. Most children can, but many won't cooperate with the effort. But--and here's the key--college should be suggested and encouraged for every child. The child for whom college is the right thing--and maybe that's a poor child, an immigrant child, a child with learning disabilities--will be heartened and motivated by the expectation, the assumption that he, too, can make it to college. And the child for whom college is not right will hardly be dissuaded from education altogether by someone suggesting that she should stretch herself. Maybe college preparation activities should be made "opt-out" at schools, rather than opt-in; that is, college tours or visits by admissions officers or SAT prep should be de rigueur for everyone. Only after a careful and realistic evaluation made by the student, his or her family, and a counselor should the child be pursuing other options that are concrete and realistic for that child. And those options should still include education. I feel like a system like that would preserve the push towards college for bright, motivated kids who simply feel discouraged that college is out of their reach because of lack of resources. It would perhaps inspire some students to aim for college even if they didn't think they could or should do it before. And it would also help to care for those students who might still decide college is not for them. Posted by Miss Eyre at 7:24 PM
<urn:uuid:80399609-91ce-4df7-9f7c-5fa25c97d178>
CC-MAIN-2013-20
http://themortonschool.blogspot.com/2010/05/college-for-everybody-anyway.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00031-ip-10-60-113-184.ec2.internal.warc.gz
en
0.981073
454
2.203125
2
(PRWEB) September 24, 2012 Sleep Group Solutions, leaders in dental continuing education are teaming up with Ottawa Dental Laboratory to teach dentists how to treat patients for sleep apnea and snoring, through oral appliance therapy (OAT). Ottawa Dental Laboratory, a full service dental laboratory, fabricates sleep appliances for the treatment of snoring and sleep apnea. SGS and Ottawa Dental Laboratory are offering their fourth joint seminar of the year on September 28-29th in Rosemont, IL. More than 20% of Americans report getting less than 5 hours of sleep each night. Those who suffer with OSA report snoring, morning headaches, daytime fatigue, irritability, high blood pressure, hypertension and more. Dental continuing education courses focusing on the treatment of sleep apnea have become an asset in dental offices across the country. During Sleep Group Solutions courses, dentists and staff members learn proper sleep protocol including; sleep stages, screening technologies, clinical issues, home sleep testing, medical billing, appliances and more. “Our courses are known to get the entire dental office up to speed on the treatment of snoring and sleep apnea. All our attendees are taught the proper sleep protocol to practice.” mentions John Nadeau, SGS Vice President. “This partnership makes sense. Ottawa Dental Lab is very good at what they do. They make a variety of sleep appliances, including the Respire Blue Series, EMA and the NORAD.” Teaming up with Ottawa Dental Laboratory, a full service lab in Ottawa, IL, will provide seminar attendees an in depth look into the exciting world of oral appliance therapy. “Our partnership with Sleep Group Solutions affords us the opportunity to help our dental clients expand their business through sleep medicine. We’re very excited to be a part of the treatment of such a life-threatening condition, and it all begins with education.” says Luke Caruso, President and CEO of Ottawa Dental Laboratory. SGS and Ottawa Dental Laboratory have already hosted three seminars together, the experience and feedback from seminar attendees has been extremely positive. For dentists looking to attend a total sleep protocol course on dental sleep medicine, log onto http://www.SleepGS.com for more information. Dental Sleep Medicine Course with Ottawa Dental Laboratory and Sleep Group Solutions: About Sleep Group Solution Sleep Group Solutions is an airway diagnostic technology company serving the needs of physicians and dentists interested in screening, diagnosing and treating sleep apnea and other upper airway disorders. Sleep Group Solutions offers the latest screening and diagnostic equipment solutions for patients with allergy, sinus congestion, rhinitis, deviated septum, nasal polyps, snoring and sleep apnea. SGS offers the most comprehensive dental sleep medicine CE seminars in the industry focused on teaching dentists the protocols needed to make the treatment of snoring and sleep apnea part of their practice. SGS offers sleep study interpretation, oral appliances (Norad Boil & Bite, Respire), online directory 1800SleepLab.com and online marketing for CPAP alternatives. SGS is the manufacturer of the Eccovision Systems Rhinometer and Pharyngometer. About Ottawa Dental Laboratory The Ottawa Dental Laboratory has been serving the dental community since 1937. The lab was founded by Lucien “Tony” Caruso on a shoestring budget. Tony’s philosophy from day one was to “treat every case as though it were for your mother” which became the foundation for his success. Little did Tony realize way back then, just how strong of a foundation he had created, which now in it’s 3rd generation, supports 3 locations. It’s been seventy-five years in the making. Like the father before him, Luke, Jr. has mentored his sons, Luke, III and Jim, in the dental laboratory business. Luke, III is VP of CAD/CAM and New Technology. He is committed to the investment in innovative equipment, technology, and materials, as well as new product development. Jim is VP of New Business Development and oversees many of the operational functions of all three laboratories. He ensures that all three of the locations operate like a well-oiled machine in order to deliver the best products and service to their customers. This deep-rooted family business continues to grow as their dedication and loyalty to the dental community remains constant. The Caruso family is committed to forge ahead in the twenty first century with the dental industry. They’ll continue to thrive and the key to their successful future will be to continue embracing the foundation of why the lab was founded in the first place: “to provide the finest dental prosthetics in the Midwest”. And they’ll not forget to “treat every case as if it were your mother’s” or in Luke and Jim’s case, their “grandmother’s.” They believe that the future of customer satisfaction will continue to be based on solid relationships of trust and respect. It is this commitment that will make dreams of the future come true. The Ottawa Dental Laboratory: Let the tradition of dental excellence continue . . .
<urn:uuid:e0976c62-ad58-402b-a08d-cd49e05db07a>
CC-MAIN-2013-20
http://www.prweb.com/releases/2012/9/prweb9937699.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00068-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944712
1,085
1.671875
2
Tropical Storm Isaac is expected to dump up to 12 inches of rain on Hispaniola, the island shared by Haiti and the Dominican Republic. A forecaster with the U.S. National Hurricane Center says "that kind of rain is going to cause some life-threatening flash floods and mudslides." Forecasters predict the storm will blow ashore in flood-prone Haiti Friday night. The country's prime minister is urging people to avoid crossing rivers, to tape their windows, and to stay calm. He says "panic creates more problems." The government has set aside about $50,000 in emergency funds and has buses and 32 boats on standby for evacuations. A woman who lives in a tent camp in Port-au-Prince says many Haitians don't have homes that will stand up to a hurricane. About 400,000 people still live in the camps following Haiti's devastating 2010 earthquake.
<urn:uuid:6bb457dd-8168-4228-9c1f-0029b4f5ed11>
CC-MAIN-2013-20
http://www.1011now.com/weather/headlines/Isaac-May-Drop-a-Foot-of-Rain-on-Hispaniola-167397855.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00065-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953219
185
1.929688
2
NTSB’s 787 Findings May Lead to Boeing Battery Redesign Evidence is mounting that Boeing Co. may have to redesign the battery on its grounded 787 Dreamliner as U.S. National Transportation Safety Board experts pursue the cause of a Boston jet fire last month. NTSB Chairman Deborah Hersman yesterday said U.S. regulators’ assumptions in certifying the 787’s lithium-ion batteries “must be reconsidered” after investigators found a short-circuit in one cell set off a chain reaction that destroyed the unit. What’s known so far suggests Boeing will have to come up with a new design, John Hansman, an aeronautics professor at the Massachusetts Institute of Technology, said in an interview. “They weren’t supposed to have a fire, and they had a fire, so something went wrong,” Hansman said. “By doing it this way, the NTSB has forced Boeing to do something significant, to prove that they’re doing something different with the battery.” The U.S. Federal Aviation Administration yesterday said Boeing can conduct test flights to speed efforts toward resolving the battery faults. Investigators and Boeing are probing the causes of a fire in a Japan Airlines Co. Dreamliner in Boston and a cockpit battery warning, along with the smell of smoke, that spurred an emergency landing in Japan by an All Nippon Airways Co. 787. Those incidents triggered orders by the FAA and foreign regulators starting Jan. 16 that grounded all 50 Dreamliners in service worldwide. The safety board is “basically calling out the very premise upon which the system was certified,” said Carter Leake, a BB&T Capital Markets analyst in Richmond, Virginia, who is also a former pilot and previously worked for Canadian planemaker Bombardier Inc. “Getting to a root cause to me seems to be a non-event until we find out what the FAA plans to do with regards to its original certification,” he said. “So I think it’s a very difficult situation that’s opening up here. I think the share gain is a misread of the dynamics here.” Boeing rose $1.14 yesterday to $77.43, the highest closing price since Jan. 4, the last day of trading before the Boston fire. That Jan. 7 incident started when a short-circuit in one of the battery’s eight cells set off uncontrolled overheating that spread to the rest of the battery, Hersman said. Boeing had said its pre-certification tests showed no sign such a cascading failure was possible, she said. Boeing had told the FAA the lithium-ion batteries would produce smoke less than once in 10 million flight hours, Hersman said. Fire or smoke in two planes after fewer than 100,000 flight hours by the 787 raise questions about assumptions used to certify the battery’s safety, she said. NTSB investigators are looking at possible causes of the initial short-circuit, including the recharging process, contamination in folds within the cell, the battery design and the manufacturing process, Hersman said. Investigators ruled out mechanical damage and external short-circuiting as a cause of the Boston fire, Hersman said. All battery damage occurred after the short-circuiting began, she said. The lithium battery packs are an essential component in the design of the Dreamliner, which entered service in 2011. The 787, developed to conserve fuel, uses five times more electricity than similar jets and its fuselage and wings are made from composite materials that are lighter than aluminum. Because FAA regulations didn’t cover aspects of the new design, the plane was certified with “special conditions” that allowed use of the lithium-ion batteries, Hersman said. Boeing received regulators’ permission to use the batteries in 2007, three years after the FAA barred passenger planes from carrying non-rechargeable versions of that type of battery as cargo because of fire concerns. Boeing’s chief engineer, Mike Sinnett, said Jan. 9 that the batteries were designed so that failure of one cell wouldn’t cascade to the others, and that the plane would be safe even if it did. He said there had been no issues with the battery cells over 1.3 million operating hours. The FAA hasn’t finished its probe of the Dreamliner’s certification and manufacturing processes or reached conclusions about what changes may be needed, U.S. Transportation Secretary Ray LaHood and FAA Administrator Michael Huerta said in a joint statement yesterday. “We are working diligently with Boeing to figure out the problem and to find a solution,” Huerta said in prepared remarks for a speech yesterday in Salt Lake City. “Our goal is to get this done as quickly as possible, but we must be confident that the problems are corrected before we can move forward.” The test flights authorized by the FAA yesterday will be subject to restrictions, including that they be conducted over unpopulated areas. Boeing, whose widebody-jet factory is just north of Seattle, said the flights will be above the U.S. Northwest using the fifth of six test jets that were built. “We are working collaboratively to address questions about our testing and compliance with certification standards, and we will not hesitate to make changes that lead to improved testing processes and products,” Marc Birtel, a spokesman at Boeing’s commercial headquarters in Seattle, said yesterday in a statement. The agency allowed Boeing to make one ferry flight with a Dreamliner yesterday, under the condition that only the crew would be on board, that special checks of the battery and system would be performed, and that the aircraft would land immediately if there were any indications of a battery fault. The plane landed in Everett, Washington, after an “uneventful” flight, said Birtel, the Boeing spokesman. No tests were conducted on that trip. Redesigning the battery wouldn’t necessarily leave the 787 fleet grounded for months, said Hans Weber, chief executive officer of Tecop International Inc., a San Diego-based aerospace consulting company. While investigating rudder anomolies on the Boeing 737 after two crashes in the mid-1990s, the planemaker and the FAA agreed on temporary fixes that kept the plane flying, Weber said. “Sometimes it takes years before they find the answer, but that doesn’t mean the fleet has to remain grounded,” Weber said. To contact the editor responsible for this story: Bernard Kohn at email@example.com
<urn:uuid:4ab4241e-8d84-41ff-a60e-8ca6d2687b62>
CC-MAIN-2013-20
http://www.bloomberg.com/news/2013-02-08/ntsb-s-787-findings-may-lead-to-boeing-battery-redesign.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00050-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956651
1,404
2.125
2
Hobbyist metal detectorists “King George” Wyant and his buddy Tim “The Ringmaster” Saylor travel the country looking for lost relics of history on ‘Diggers.’ They understand that every item has a story to tell, and are on a quest to unearth history that would otherwise be forgotten. A Word From the Diggers, KG and Ringy: Treasure hunting is a great recreational sport that should be enjoyed by anyone that wishes to participate. It should make you feel like a kid again— like you are on that clichéd quest for buried pirate treasure. The detecting experience should be shared by friends, talked about, and laughed about. In doing so, respecting private property and obtaining permission will go a long way to keeping sites open for detectorists. Why We Hunt for Treasure As you know, we all hunt treasure relentlessly and with great passion, and although we have assembled what some would consider awesome piles of coins and artifacts, the truth is that after a lifetime of treasure hunting, the cost of equipment, gas, food, and other expenses outweighs the true value of the objects by a landslide. In other words, we are not in this hobby to make a living off of the objects we dig up, and they couldn’t, even if that was indeed our goal. We got into this game because we enjoy the thrill of the hunt and the tangible history that comes with digging up, say, a well-worn 1897 Barber dime. While worth next to nothing and easily obtainable at the coin shop for a few bucks, it is precious and incredible to us, because we can hold it in our hands, feel the smoothness of the coin, and imagine who might have lost it and why. Sometimes it’s the small, insignificant find that can be the spark to ignite a lifetime of passion for history, collecting, and learning. Not to mention, being outdoors with friends and family, exercise, fresh air, and being away from the TV for a while is good too. So with that in mind, here are some tips to keep metal detecting a positive and enjoyable hobby: 1. Get Permission Before You Hunt Always ask the landowner or homeowner before you hunt a site. This should really go without saying: Trespassing is illegal. If you don’t get permission, you are breaking the law. Note that state and federal lands are usually off limits, as well as national monuments. Some city parks and public beaches are open to detectorists, but you need to check for possible restrictions before hunting on any particular public site. 2. Fill in Your Holes / Clean up After Yourself Every site is unique. The terrain can vary from loose sand to rocks, yards, lawns, fields, beaches, etc. Landowners are also unique. Some don’t care if you if you dig trenches, while others have meticulously groomed lawns that they don’t want disturbed. No matter where you hunt, go into the site planning to leave it looking better than when you arrived. Take your dug trash, as well as any other trash you encounter with you (whether it’s yours or not). Note that there are many ways to dig an object from the ground. If it’s shallow enough, you can pop it out without even digging a traditional plug. In rocky, dirt fields, you often can’t dig a neat, traditional plug, so you need to adapt to the terrain the best you can. 3. Return Lost Items If you run across tools, keys, or personal objects specifically lost by the landowner, be sure to return them. Before you hunt, ask them if there is anything they might have lost that you could help them find. It’s just one more way to be helpful to your neighbors, and you will likely be invited back with such behavior. 4. Get Rich Quick Myth No matter what you have heard, hobby metal detecting is not a sensible “get rich quick scheme” any more than buying a lottery ticket is a sensible retirement plan. By the time you add your gas, food, time, batteries, and other expenses, you will almost always lose money on a day’s hunt, even if you find something interesting or “semi-valuable”. While it is wonderful to find silver and gold, you are bound to be disappointed if you are not out there for reasons beyond financial success. Team ATC rarely sells or trades anything we find, so we are obviously in this for the love of history, adventure, and the general idea of having fun with friends. If we were in it purely for profit, it would make much more sense to go to the coin store and just buy coins as an investment. 5. Archaeological and National Historic Sites Archaeological dig sites should be left alone. Plain and simple. While most of us have absolutely no interest in intruding on such sites, looting national monuments, or raiding tombs, it’s still worth noting. These sites have been determined to be of particular historical significance, and should be left to professional archaeologists to study. This includes our national monuments and other highly important and/or ancient sites. While extremely unlikely, there is always a chance that you could stumble onto a potentially significant or important burial site or find. If you run into anything you believe is of serious historical importance, please contact the proper authorities so they can determine how best to handle the site. Many hobbyists have made incredible finds that have contributed to our historical knowledge base. And while there are many differing opinions on what should and should not be considered off limits to hobby detectorists, ranging from nothing to everything, please respect the current laws and sites. Only detect where you have obtained permission to hunt. This will help ensure that detectorists will continue to have access to the practically infinite number of yards, fields, and other sites of lesser importance that will never become archaeological dig sites, and to potentially important sites that would never be discovered without us. 6. Coin Cleaning / Coin Scratching Any coin you believe is extremely rare or potentially valuable should be professionally cleaned, if cleaned at all. Obviously, over 99.9% of the coins we dig up are worth way less than $20, so we are not always as careful as we could be during the excitement of a dig. If we see that we have a wheatie or a rosie, and we know it’s not going to be worth a million dollars, we generally don’t feel the need to treat it like the crown jewels. You, on the other hand, may treat each of your finds as delicately as you deem necessary. 7. Running out of Treasure The so-called “issue” of popularizing the hobby so much that we will begin running out of treasure to dig up is laughable. There are so many objects in the ground that none of us could ever find them all in 100 lifetimes, and they are constantly being replenished. Even as I write this sentence, someone is unknowingly dropping a coin or a gold ring onto a sandy beach. It has been written that there are more coins in the ground currently than there are in circulation. Do the math. Believe me. You are not going to run out of signals. 8. Detector Choice Garrett/Minelab/Fisher/Whites/etc. There are lots of different and excellent brands of machines that are capable of finding buried objects. Team ATC uses a variety of brands and models. We have, and continue to use, several different brands. The guys here in Montana can help you with questions about certain Garrett, Minelab, and White’s detectors. For advice on other brands, we recommend you talk to an expert user of that particular brand. 9. Planting Coins The answer is no. We do not plant stuff. Everything shown in the TV show, videos, and books was really found by someone in Team ATC. Anyone who buys coins and claims they dug them up is starved for attention and needs to find something else to do. If we were planting coins, I would have “found” a gold coin or ten by now! K.G., Bones, T.O., and Ringy? None of us have a gold coin yet. We all want one, but we’re not pathetic enough to plant one and fake it. For more on responsible metal detecting and the Diggers, visit Anacondatreasures.com All-new episodes of Diggers are coming soon in 2013! Stay tuned.
<urn:uuid:1c25663d-296a-4ea8-8a1e-0e4265b2a2bf>
CC-MAIN-2013-20
http://tvblogs.nationalgeographic.com/2012/08/22/metal-detector-ethics-and-tips-from-the-diggers/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698924319/warc/CC-MAIN-20130516100844-00055-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954233
1,781
1.90625
2
In the history of popular music, there are a relative handful of performers who have redefined the content of the music at critical points in history -- people whose music left the landscape, and definition of popular music, altered completely. The Kingston Trio were one such group, transforming folk music into a hot commodity and creating a demand -- where none had existed before -- for young men (sometimes with women) strumming acoustic guitars and banjos and singing folk songs and folk-like novelty songs in harmony. On a purely commercial level, from 1957 until 1963, the Kingston Trio were the most vital and popular folk group in the world, and folk music was sufficiently popular as to make that a significant statement. Equally important, the original trio -- Dave Guard, Nick Reynolds, and Bob Shane -- in tandem with other, similar early acts such as the Limeliters, spearheaded a boom in the popularity of folk music that suddenly made the latter important to millions of listeners who previously had ignored it. The group's success and influence transcended its actual sales. Without the enviable record of popularity and sales that they built up for folk music, it is unlikely that Columbia Records would ever have had any impetus to allow John Hammond to sign an unknown singer/guitarist named Bob Dylan, or to put Weavers co-founder Pete Seeger under contract, or for Warner Bros. to record the Greenwich Village-based trio Peter, Paul and Mary.
<urn:uuid:d66a4970-4a71-423c-8dea-7aae8882cfb2>
CC-MAIN-2013-20
http://www.1027jackfm.com/iplaylist/artist/2038/bio.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00051-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961816
293
2.609375
3
The choice is clear – Obama… The Romney-Ryan ticket represents a constricted and backward-looking vision of America: the privatization of the public good. In contrast, the sort of public investment championed by Obama—and exemplified by both the American Recovery and Reinvestment Act and the Affordable Care Act—takes to heart the old civil-rights motto “Lifting as we climb.” That effort cannot, by itself, reverse the rise of inequality that has been under way for at least three decades. But we’ve already seen the future that Romney represents, and it doesn’t work. The reëlection of Barack Obama is a matter of great urgency. Not only are we in broad agreement with his policy directions; we also see in him what is absent in Mitt Romney—a first-rate political temperament and a deep sense of fairness and integrity. A two-term Obama Administration will leave an enduringly positive imprint on political life. It will bolster the ideal of good governance and a social vision that tempers individualism with a concern for community. Every Presidential election involves a contest over the idea of America. Obama’s America—one that progresses, however falteringly, toward social justice, tolerance, and equality—represents the future that this country deserves. Mitt Romney “has pronounced himself “severely conservative.” There is every reason to believe him.”
<urn:uuid:f3bb7fb1-6071-498a-bafe-2b6ab3820da0>
CC-MAIN-2013-20
http://thedemocraticdaily.com/2012/10/22/choice-clear/comment-page-1/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00017-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954054
293
2.015625
2
Do your children know which box to check? Many tots learn more about their heritage by doing a fourth grade genealogy project than they would sitting around the dinner table. Some parents make sure their family roots are well known, while others pay little attention to educating their wee ones on their ethnicity. In last night's "You Gotta Get a Gimmick" episode of Desperate Housewives, Gabby and Carlos are dumbfounded when their daughter Juanita discovers she is Mexican. A humorous clip, the bit also has tremendous meaning behind it and has me wondering how often people discuss their family history with their young children. Do you make your family background an important part of family discussions?
<urn:uuid:4b49776a-9ecc-4f01-998e-a636efcf713e>
CC-MAIN-2013-20
http://www.lilsugar.com/Do-You-Talk-About-Your-Family-History-Home-6995292?fullsite=0
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00024-ip-10-60-113-184.ec2.internal.warc.gz
en
0.981426
139
1.898438
2
Secretary-General Message for 2010 I am delighted that the UN World Tourism Organization is celebrating this year’s World Tourism Day under the theme ‘Tourism and Biodiversity’. Despite repeated global pledges to protect the planet’s species and habitats – and the goods and services they provide – the variety of life on Earth continues to decline at an unprecedented rate. Human activities are the cause. This year – the International Year of Biodiversity – provides a timely opportunity to focus on the urgency of safeguarding biodiversity for the wealth, health and well-being of people in all regions of the world. Tourism and biodiversity are closely intertwined. Millions of people travel each year to experience nature’s splendour. The income generated by sustainable tourism can provide important support for nature conservation, as well as for economic development. Furthermore, sustainable tourism can help to raise awareness among tourists and local communities of the importance of biodiversity to our everyday lives. Through initiatives such as its “Sustainable Tourism – Eliminating Poverty” project, and its collaboration with the UN family, national tourism authorities and the private sector, the World Tourism Organization is helping to highlight the links between tourism, poverty alleviation and biodiversity. The tourism community is becoming increasingly aware of its responsibility. And indeed there is much the sector can contribute to protecting biodiversity, including by integrating simple measures such as managing tour groups to minimize disturbance to wildlife or buying supplies only from sustainable sources. On this World Tourism Day, I commend the tourism community for its growing recognition of the importance of conserving the diversity of life on Earth, and I urge all partners to strengthen their commitment to sustainability.
<urn:uuid:97580573-f087-4f7d-bd2e-af0c85ae070c>
CC-MAIN-2013-20
http://www.un.org/en/events/tourismday/2010/sgmessage.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00071-ip-10-60-113-184.ec2.internal.warc.gz
en
0.928075
336
2.328125
2
Design by Hist: Re Partners LLC to transform Market Square to a pedestrian plaza. At last week’s city council meeting city engineer Phil Shermer briefed council on the complexity of the underground interstate highway of utilities that lays deep beneath Market Square. The square is directly across from the Market Building and mostly accommodates 24 parking spaces when not used for weekend events. The area lays in a flood plain and though larger drainage pipes were installed beneath the streets around the Market Building during its renovation the other side of Campbell Avenue has yet to be addressed. That is only part of the reason for more than doubling the cost estimate to change Market Square into a pedestrian plaza. On July 2, 2012 then DRI, Inc. president Sean Luther sold city council on the plaza at an estimated price tag of $250,000. Councilman Court Rosen thought the $250,000 estimate was a reasonable investment and called it “the next evolution of the square.” City manager Chris Morrill said in July that the city had several million dollars in the “economic development reserve” to cover the cost. There was also the possibility of dipping into the capital contingency fund or paying for it with leftover funds at year-end. Phil Shermer broke the news that after months of study the preliminary estimate for the conversion would cost more like $650,000 and could increase even more if AEP decides that being a good corporate citizen doesn’t stretch charitable giving quite that far. Three vents need to be raised that cover AEP’s underground vault to accommodate the height of pavers integral to making the plaza pedestrian friendly. Lucas Thornton with Hist: Re Partners LLC brought a revised design of the plaza to the November 19 council meeting. The design extends new market canopies into the plaza and adds canopies along Campbell Avenue that would add to retail space overall. There is a passable driveway isle connection to Market Street and a new curb line along Campbell Avenue that will leave space for drive up customers. Downtown flooding was the primary infrastructure challenge for the citizen-initiated project explained Shermer. Besides the obvious change from parking lots to pedestrian space the proposal includes trees, green space, lighting and patterned paving that would tie into the Market Building design. Photo of Market Square taken from the Market Building in 2011. The engineering study of the underground utilities for electrical, water, gas, communication links and storm drainage was hurriedly completed to assess the practicability of the project and its cost said Shermer. Foremost was the 20-30 foot underground AEP vault that occupies most of one side of the square and provides electrical service to much of downtown. “Underground it is completely covered up with every utility you can imagine,” said Shermer. “The big one for us is this underground vault.” The large vault has three surface visible vents on top with a lot of equipment inside. The concrete paver solution requires raising the airway vent stacks at AEP vaults. “We are very optimistic and hopeful that they will help us do that without cost to the project,” said Shermer. It is significant work for them to do. A raised patterned paving system also creates a storm drainage challenge. All improvements must be long lasting and leave no room for disturbing the plaza after completion by cutting and digging underneath said Shermer. A contractor dug eight test holes into the square to determine what exactly they would be facing underneath. The good news was the pavement is in good condition and the 8-10 inch thick concrete foundation is fairly even and will serve as a good foundation for the plaza pavers. The bad news was that the storm drains that connect to Campbell Avenue had cracks and deteriorating pipes that will be costly to replace. “It’s very challenging to build storm drains structures downtown because of all the other utilities that are there,” said Shermer. The preliminary estimated cost of $650,000 is for a concrete paver solution that includes repair of all the storm drains and replacement of sidewalks around 202 Market. “Storm Drain, utilities, pavers, street trees, street lights, electrical conduit – it adds up pretty quickly,” said Shermer. New farmers’ tables are a part of the cost as well he said. All the features are incorporated and ready to put out for bid. Some traffic study still needs to be completed to ensure trucks can service other businesses on Market Street. “There is adequate maneuvering space to get the farm type pickup truck vehicles in and out of that space,” said Shermer. The paving color needs to be selected and final specifications have not yet been completed but “the overall concept works pretty well,” said Shermer. The project will need coordination with other projects like Center in the Square and a water main upgrade project. Biding on the project is targeted for January 2013 with construction commencing in March and completion in June to coincide with Center in the Square’s grand opening. Lucas Thornton said seven public hearings with farmers; restaurant owners, the public and other businesses were conducted during the design phase. It is a very important step forward with the other development downtown he said. Thornton asked council to keep in mind when looking at the cost – “There is no place in our city that is so visible.” Vice Mayor Court Rosen was a skeptical of the price tag. Shermer said he felt fairly positive that AEP would work with the city on raising the vents but was unsure if it would be cost free. When asked by Rosen Interim DRI president Steve Musselwhite said that there was a $245,000 HUD grant that needed to be spent on the market by September 2013 or they would lose it. The grant can be used toward the cost of the project. Councilman Dave Trinkle was concerned that with all the other projects that they too could go over budget all at the same time. Elmwood Park construction bidding had resulted in an increase of about $1 million over the estimate. Morrill said that a “budget adjustment” would need to be approved by council before bids could go out. Shermer will work with AEP and prepare designs for bid. Morrill will look at funding options to present to council in December.
<urn:uuid:a1911102-9bc5-4a2f-8b35-a67e9fd98aea>
CC-MAIN-2013-20
http://www.roanokefreepress.com/cost-to-transform-market-square-to-a-pedestrian-plaza-rises/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00052-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968339
1,296
1.648438
2
Then I ran a search in ESV for *@[KEY G0086] to find all places where the underlying Greek word appears. So far so good -- 10 results, 9 "Hades" and 1 "hell". Next I switched the search text to HCSBS to see how they translated "hades". Also fine -- 10 results all translated as "Hades". Switched search text to KJV and repeated the search. Still fine -- 10 results with 9 "hell" and one "grave" result. Finally I switched search text to Mounce NT and re-ran the search. The results were not what I expected -- 3 results with 2 "troubled" and one "distressed". A little digging shows that the Mounce NT uses G0087 as the code for Hades. I've been operating under the assumption that all tagged texts use the same "codes" (Strongs numbers) for tagging, but that assumption might be incorrect. Are all texts supposed to use a consistent single set of codes (in which case this is a bug in the text tagging) or do differing texts use differing code schemes (in which case it will be sad)? Edited by Stuart Robertson, 01 February 2012 - 02:22 PM.
<urn:uuid:11d85f88-07b4-4366-b264-a7543f470be9>
CC-MAIN-2013-20
http://www.accordancebible.com/forums/index.php?showtopic=7271
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00049-ip-10-60-113-184.ec2.internal.warc.gz
en
0.918047
256
1.523438
2
One of the things that first attracted me to origami as a child was that the tools were all around me; all I needed were my hands and a sheet of paper, and I could find paper anywhere! For many years, I used pads of obsolete business forms from my Dad's business, cut to square. Nowadays, the equivalent paper would be copy paper—used or unused. And all it needs is to be cut (or torn) to square, and you're ready to fold. For simple folds, copy paper works very well. It takes a crease nicely and doesn't easily wrinkle. And you can find it almost everywhere. But as the world of origami has progressed over the last few decades, the complexity of origami designs has grown, and for many designs—and almost everything I compose these days—copy paper is just too thick. You'll need to look for other sources. Even more ubiquitous than copy paper is magazine paper and newsprint. Both are tempting, particularly because they are generally much thinner than copy paper. But if you try them out, you'll find that magazine paper and newsprint are really lousy papers for origami. They have two big weaknesses: they are weak (and so tear easily), and even worse, they don't hold creases very well at all. For many years, my paper of choice was a type called "second sheet" or "manifold." These names came from the days before copy machines, when business forms came in packets of several sheets with carbon paper between the layers, so that when you filled out the form you were making multiple copies. Manifold paper was quite thin (9 lb., using the American system of paper weights; see here for conversions), but unlike newsprint and magazine paper, it was crisp and took creases nicely. Alas, multicarbon forms seem to be a casualty of the commercial photocopier. Although I'm still working on the first 1000-sheet ream of manifold that I ever bought, it's been a long time since I've seen it in stationery stores. But airmail paper is very similar—thin, crisp, and strong—and email has yet to kill it off. I regularly get asked, "do you have to use that special Japanese origami paper that comes in the little square packages?" It's true, there is paper made especially for origami, and most art or craft stores carry it. It's relatively thin, brightly colored (most packages contain an assortment of colors), and, conveniently, it is already cut to square. (Or nearly so; more on that in a minute.) It seems like this paper must be the ideal paper for origami, possibly made by hand according to ancient tradition and used for origami for perhaps hundreds of years! The truth is somewhat less inspiring. What we think of as traditional origami paper—generally called kami—was actually developed in the early 20th century for use in schools, using inexpensive, western-style machine-made paper. It was colored on one side, because that's cheaper. The paper is not archival, and the dyes are unstable, so it degrades over a period of years. And while it is fairly thin (thus using less material, making it cheaper per sheet), it is not very strong, as generations of folders attempting to use it to fold insects, can attest! And it is not always square, to boot. This is not necessarily due to imprecision in manufacturing, though. Kami, like all machine-made papers, has a definite grain, which comes from the manufacturing process. It is made on a continous belt moving through a paper pulp slurry, and the motion of the belt tends to align the paper fibers along a given direction. (You can easily see the effect of this alignment by trying to tear a sheet of newspaper; it will tear much more cleanly in one direction (with the grain) than the other (across the grain).) Paper absorbs moisture from the air, and a change in humidity will cause a slight change in the size of the paper. But because of the grain, machine-made papers swell more in one direction than the other. That means that even if the paper was square when it left the factory, it might not be square when you open the package if the humidity is different where you live. So kami is not very stable, not very strong, and maybe not very square. Why use it at all? Tradition, and convenience. There is a history of using kami for origami; many folders honor that tradition by continuing to do so. And it's convenient to be able to just pull out a sheet and start folding, square or not. (And for many folds, being half a millimeter out of square is not going to make a significant difference.) Kami is most commonly available in two standard sizes: 6 inch (15 cm) and 10 inch (25 cm), and these are so common that if you ask any origami person, "hey, do ya have a square of six-inch on ya?" they'll know exactly what you mean. (At least in America, where we still use inches.) But if you look around, you can find it as small as 1" and as large as 15", and nowadays, there is an enormous variety of colors, patterns, gradations, and prints. (A side note on terminology. The word kami is Japanese, and simply means "paper." The word "origami" is derived from oru, meaning "to fold," and kami, meaning paper. So, to a Japanese speaker, the word kami can refer to any type of paper. However, in English-speaking countries, kami is used informally in a narrower sense to refer to the pre-cut packaged squares, no matter where they come from.) One drawback of kami is shared by most of the other papers I've talked about. It's very difficult to make curved surfaces. For the paper to take a crease cleanly, it should be a bit springy; and if it's a bit springy, and you try to curve it, the springiness will straighten out the curve. (There is a folding genre, called "curved tension folding," that overcomes this problem by creating locking mechanisms in the folding.) In the early days of modern folding, that didn't matter; most origami was flat. You could close every figure in a book, and so curves weren't even contemplated. But as people became more familiar with the works of the great 20th-century Japanese origami master Akira Yoshizawa, works that were delicate, 3-dimensional, organic, and curved, people realized that curved folds and 3-dimensional shaping were major elements of artistic folding. Traditional papers didn't allow this type of shaping (and Yoshizawa didn't use traditional papers for much of his folding). This led origami artists, individually and collectively, on a journey: the quest for the perfect paper! In the next couple of pages, I'll discuss some of the candidates.
<urn:uuid:a0af128c-da29-4f98-a511-c1c159485618>
CC-MAIN-2013-20
http://www.langorigami.com/paper/traditional_papers.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00046-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975895
1,456
2.1875
2
Youth Marketing - what it means, what makes it different, and how it's changed In a light conversation with some campus kids, post a GD in Social Media for personal branding, I asked them what makes you delete a friend from your friends list? One young lady answered "if I haven't talked to them for a month then they are cluttering my list". OUCH! Harsh as it may seem, this is the blunt decisiveness of youth. Gone are the days of experiential entailing mostly "give the T'shirt, he will wear it to campus, we will get branding; give them a topic for a story, the parents will read it; let's do a fashion show at the fresher's party, people will buy the candy". Today, the youth reject any thing that is not interesting to them and they will be quick to remember the fashion show but forget the brand. There is just too much else happening in their lives; the chatter of marketing is deafening and one cannot hope to gain any mind share out of these trendsetters by being boring or frivolous or, god forbid, a "me too". Youngsters today are constantly evolving, adapting, consuming and rejecting thoughts, ideas, opinions and yes, brands. They are the trendsetters, the early adopters, and have more buying power. However, they don't buy things; they buy what those things can do for them. Thus, all marketing to this audience is in context of what a brand means to them and what relevance it will continue to hold the day after next. Youth marketing is about building conversations as opposed to delivering messages; it's about co-creating experiences, not delivering experiences. This is the fundamental difference in approach that sets youth marketing apart. The scope of youth marketing, the challenges and how it's dealt with As the saying goes, "they buy the can, not the soda". This makes youth marketing extremely challenging and keeps us on our toes to evolve constantly with our techniques, designs, formats, engagements and campaigns. The good news is that the youth welcome this attitude of the different, the quirky, and the expression of self. It's all about the social package. This is possibly why Harley in India, which is selling an attitude, a lifestyle, and an emboldened expression of self, ends up selling more machines than all the other big bikes put together. There is no road map. It's every campaign mapping itself to the attitudes which drive its consumers. It's a whole lot of communication and even more conversation. There are some old things rotting in the attic which can be discarded or recycled though. Here are a few that top the list: Today, every campaign that we put out there endeavours to co-create and build a concept into a story along with our audience. The campaigns which find success are the ones which succeed in this co-creation to bring that story to life. As the communication for brands evolves into a strong social package, experiential campaigns have also evolved. Instead of just planning a day-long experience in campus, we create social communities and build consistent conversations through the year, in addition to that experience pad. We no longer advise going to campus communities just to deliver a product experience; instead, recruit campus ambassadors and nurture them to create and evangelize the brand experience via peer-to-peer marketing. Or simply, instead of putting up graffiti walls, we would prefer to go with RFID bands. At the end of the day, him writing on his wall is far more relevant than him writing on ours. Where do we stand - India vs. abroad Internationally, there is a big difference between how we approach youth marketing. In India, the lines are blurred, possibly due to the large population of youth consumers, or more so by the fact that we are "joyful marketers"; we like young happy, jubilant and colourful content. Internationally, a lot of campaigns for the youth are more serious in nature and work on recommendation and the social benefits of constant conversation. We, in India, have not really let go of the road show even when we are planning for things much larger. Elaborate on a recent youth marketing campaign. Did it substantiate or negate your perspectives on youth marketing? In a recent campaign for an IT major, we saw that building online communities on campus via brand evangelists recruited in each of those campuses gave us a critical edge. It ensured that students came together, held contests, consumed product content, shared cool features, saw the product videos and the demos online, and had conversations about what they thought worked for them. With four weeks of this already building a steady buzz when we went into campus with the experience pad, we saw a greater affinity to the product as well as almost the entire campus participating with relevance. Needless to say, the response as well as the ROI increased manifold as the audience was better informed and infused with the excitement, transitioning from online to the campus ground. The Community managers then spent the next few weeks sustaining the buzz and transitioning the groups to the brand page. Essentially, this means that the brand was never really disconnected from the campus even if there is no physical live activation happening on that particular day inside campus. It's a small change in approach that made a big difference.
<urn:uuid:fceaedc6-63a4-4157-82c9-e2a5cd39cd39>
CC-MAIN-2013-20
http://www.eventfaqs.com/eventfaqs/wcms/en/home/marketpulse/guestcolumns/-Youth-marketing-is-to-build-c-1338545928529.html?author=
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00020-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967334
1,085
1.835938
2
Natives in the Landscape: Images and Documents of Seventeenth Century Virginia Indians Compiled by Buck Woodard 1) Powhatan's Mantle This item is constructed of four deerskins measuring a total of 7ft. 8 1/2 in. x 5ft. 3in. The embroidery is constructed of sewn Marginella shells in several configurations. There are 34 disc shapes surrounding two animals and one central human figure. The animals appear to be that of a cougar and a deer. The top of the piece has a V-shaped opening, but it is supposed by scholars that this item was not worn, but rather hung in a temple or palatial interior. Documented by at least 1634. Two early bows constructed of probably mulberry. Both bows have rounded tapering limbs from the center of the handle area, although no clear designation for the handle is indicated. In a sense, the handle area is a "working" portion of the limb. One bow measures 68 1/2 in. long, at a maximum of 1 11/16 in. at the handle thickness. At that point, a cluster of five dots is present on the back of the bow. The belly is less severe in cross section, giving a rounded appearance to the bow from the archer's point of view. The second bow measures 67 in. lengthwise, and appears to be more elliptical in the center cross section. Both bows are notched with a corner cut peg at the uppers; while one bow mimics that construction for the bottom; the other has a simple side notch from the tapered end. Collected in 1665 in the Virginia Colony. Two arrows of an unknown date from the Powhatan. One arrow is a "blunt" from a hardwood shoot, fletched with two turkey feathers. Shallow grooves are cut in the shaft, in which the feathers have been glued and sinew wrapped. The notch has been cut parallel to the fletching. The other arrow is from split hickory. In this case, there is a broad woodenhead left on the arrow as the shaft was reduced. The fletching is glued in grooves, with the nock being cut parallel to the feathers. The tip of the arrow shaft is dyed green beneath the head. The both arrows measure 28 1/2 in. While there is no date associated with these arrow's construction, the technology is indicative of long standing archery traditions in the Mid Atlantic, especially where cane is not present. Deer hide quiver of an unknown date. Hair side out, tail tide to bottom, buckskin strap with overhand knot. Total strap length is 26 in. The quiver is 18 1/2 in. long with a 8" circumference. Probably collected in the late 19th century / early 20th century, this quiver is similar to ones depicted in early engravings of Powhatan warriors. The bag was constructed by folding a long piece of deerskin and sewing the mid section together. After which, the ends were cut into strips. An additional piece of leather was inserted into the long tube to form a bottom. Shells beads were sewn between the strips, forming an embroidered weft and the created flaps were triangle shaped at the ends. This bag was worn over a belt, as early engravings indicate was the custom. This item is 2 ft. 6 1/2 in. by 4 1/3 in. The bag was collected during the mid seventeenth-century from the Virginia Colony. Series of bone hairpins from a variety of Late Woodland / Contact village sites. All have been carved and altered in preparation for use in personal adornment. One from 44VB7 has a series of joining diamond patterns; another piece from the piedmont of Virginia has been heavily carved and polished to a sheen. A collection of bone adornment items from a seventeenth-century contact period site near Radford Virginia. Articles include polished bird bone and carved / polished bone beads, squirrel jaw pendant, raptor beak pendants, scapula pendants, drilled mammal canines, and carved tabs. A collection of bone and antler tools from a seventeenth-century contact period site near Radford Virginia. Shown are a deer cannon bone "beamer" for fleshing hides, a turtle shell cup, bone fish hooks, awls, and beads, a bone set quartz blade, antler projectile points, and a large antler tool (hoe, adze, or scraper). Native copper was a prized commodity of the Tidewater region during the Late Woodland period. These examples of copper pendants come from a coastal village where controlled trade was important to the exchange of resources denoting cultural status. A sample of the type of copper adornments excavated at the Trigg site are indicative of Native produced copper found throughout the Virginias during the Late Woodland. Large and small tube beads, tab pendants, trinkets, and geometric pendants or gorgets dominate the copper artifacts from this period. Different types of shell beads were produced throughout the Chesapeake region prior, during, and after the settlement at Jamestown, Virginia. Grouped by types, the beads are known variously as A) Moons, B) Peak, C) Roanoke (also called Wampum, stubbier ones were also called Runtees), D) Hairpipe Tube. Strung shell beads were very common until colonial times in Virginia. Strands of peak were used mostly as adornment, but later as monetary elements during the Colonial period. Values of commodities were loosely established and could be traded based on lengths of peak or roanoke. An example of peak, runtee, and hair pipe beads strung on a necklace thought to have belonged to a shaman. Beads were laboriously produced and traded to compliment personal adornment throughout the Virginias at the time of contact. A rare example of a "maskette" found within the Patowomeke territory, in Stafford County, Virginia. Several other examples have been found, made from the exterior of whelk or conch shells. These masks are smaller than life-size, and are of a ceremonial nature. They usually are highly polished and carved to imitate faces with eyes, mouths, ears, etc. Other examples are found throughout the Southeast with similar markings, such as the "weeping eye" motif as found with this piece. This mass of shell beads found in the Piedmont of Virginia is an example of the predominant shell bead type for the region. Slightly thicker than peak, these beads were strung together to create a larger necklace. Similar constructions could be made using these beads for embroidery. A series of shell pendants common during the Late Woodland. Often referred to as "moons" by later Colonial traders, the shapes vary from circular to elongated triangles. A sample of the type of smoking utensils found during the earliest contact and post contact periods in Virginia. The upper image is of "tube" pipe of ceramic material, the middle of another clay "bowl" pipe that early Europeans emulate to make the caolin pipes, and the third of a steatite (stone) pipe. All examples found within the Patowomack territory in coastal Virginia. Examples of finely crafted steatite pipes. The one to the left is a platform pipe with several holes for the addition of a reed stem; the other two the stems are of stone and have flared bowl heads. All three are from a seventeenth-century contact period Nottoway context. A series of stone gorgets or pendants, drilled for suspension. All examples have been damaged, however their roughly rectangular shape can be discerned. These examples come from a seventeenth-century contact period Nottoway context. A rare example of a European trade item reproduced in Native material. This pipe is constructed to mimic the metal trade pipe tomahawks exchanged with Native populations beginning in the seventeenth-century. Unearthed in James City Co., Virginia, this item has been carved from steatite and was found in a European context. A collection of reconstructed vessels and large fragments of ceramic wares. Shell and sand tempered clay bodies are predominant with examples of simple stamp, fabric, and cord paddle marks. Referred to as Roanoke, Townsend, and Gaston Wares. Typical of ceramics found at Indian settlements during the time of first European settlement. A sample of reconstructed and fragmentary ceramic wares referred to as Colono-Ware. These examples come from King William Co., produced by American Indians during the later period of English Colonial occupation. The wares were documented as being sold at the market in Williamsburg during the late seventeenth-century. A collection of European glass beads uncovered at a Late Woodland to Contact Period site near Radford Virginia. These seventeenth-century examples of trade into the interior of Virginia document the variety of ways in which contact with Native communities spread through the region. While person-to-person contact may not have occurred, trade commodities from other Native groups had spread from Virginia's English settlers to the interior by the mid to late seventeenth-century. Badges presented to Indian leaders during the time of the 1677 treaty of Middle Plantation. Badges were issued as tokens of alliance to leaders who were "cooperative" or deemed "friendly" and were to be worn when delegations entered into English controlled areas. Trade goods of metal found their way into Native communities almost immediately after contact. This example of a copper pot and spoon were excavated in Greenville Co., Virginia from a Late Woodland through Historic Period Indian site context. Fresh water mussel shell earrings set in precious metal bezels. The pair of earrings has been reported to have belonged to Pocahontas, according to the APVA. Further researches into the origination of the materials and provenience have not been firmly established. The image is of a probable chief's home in the present city of Virginia Beach. The structure was large and had a several entrances. Rare for the coastal plain, two storage pits can be seen on the interior. This collection of house patterns comes from an area known as Jordan's Point in Prince George Co. Virginia on the James River. It is supposed that the remains are from the seventeenth-century village of Weanock. In the foreground are the foundations of Nathaniel Bacon's home with its square tile brick floor and well at the corner. The white foundations in the rear are the first home and then kitchen of Richard and Jane (Bolling) Randolph. Last Updated: 22-Nov-2006
<urn:uuid:99e62eb7-0e97-4a9f-a4cd-dd61562717a4>
CC-MAIN-2013-20
http://www.nps.gov/history/history/online_books/jame1/moretti-langholtz/appendixa1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705953421/warc/CC-MAIN-20130516120553-00049-ip-10-60-113-184.ec2.internal.warc.gz
en
0.962983
2,222
3.484375
3
Interlude—What Durbin said: Social Security has existed for a long time—and journalists still don’t know how to discuss it. As a case in point, consider what Glenn Kessler said. Let’s say it again—we’re not trying to single out Kessler. As recently as September 2000, we publicly judged that he might even be “The Man.” And his recent difficulty with Social Security is hardly unique to him. That said, Kessler had a very hard time explaining Social Security in a recent piece in the Washington Post. To show you had bad this project can get, consider the way Kessler started. Senator Richard Durbin had made a statement about Social Security and the deficit. As he started his Fact-Checker piece, Kessler quoted something Durbin said, then made a weird admission: KESSLER (12/2/12): "Social Security has not added one penny to the deficit."Say what? In late November, Durbin said that Social Security hasn’t added one penny to the deficit. Last year, Kessler examined a similar claim—and he judged it “true but false!” —Sen. Richard J. Durbin (D-Ill.), Nov. 27, 2012 In 2011, we evaluated a similar statement about Social Security and gave it a relatively rare rating—"true but false”—which seemed to please no one. Yet as the "fiscal cliff" negotiations have heated up, Democrats have once again been using this talking point to shield Social Security from the chopping block. According to Kessler, this rating “seemed to please no one.” Perhaps you can understand why! So it goes when journalists explain the workings of this program. Twenty-nine years after Reagan and O’Neill produced their famous revision of Social Security, journalists still have a very tough time explaining basic aspects of the venerable program. So it was when Kessler “fact-checked” Senator Durbin’s recent statement. On November 30, his piece appeared on-line. On Sunday, December 2, it appeared in the hard-copy Post. In our view, Kessler’s piece is a terrible mishmash. We can hardly find a paragraph which doesn’t include some sort of problem—an apparent self-contradiction; the insertion of an irrelevant fact; a distracting example of technical talk; a logical leap which goes unexplained. But this is pretty much par for the course when major journalists attempt to examine this seminal program. When it comes to basic aspects of Social Security, we live inside a Babel—and we always have. Tomorrow, we’ll plow through basic parts of Kessler’s piece, noting the chaos along the way. For today, let’s take a fuller look at what Durbin said—and consider what he might have meant. Kessler is quoting a remark by Durbin in a speech at the Center for American Progress. In his speech, Durbin discussed the way the “fiscal cliff” issues should be resolved. In this part of Durbin's speech, he discussed Social Security: DURBIN AT CAP (11/27/12): Now let me come to the most painful topic of all for progressives, entitlements. Social Security was included in the Simpson-Bowles commission report. I didn't agree with every aspect of it, but I thought that it was a sensible approach to breathing life into Social Security beyond its current longevity.Durbin said the Congresss should act to extend the solvency of this program. But what did he mean by the highlighted statement about Social Security and the deficit? I was elected in 1982 to the House, came here in 1983 and was told that Social Security is on its way out. Six months and we'll be out of money. And so we rolled up our sleeves, came up with a bipartisan solution with Speaker O'Neill and President Reagan that ultimately bought over 50 years of solvency for Social Security. What did we do? We raised the retirement age, we raised the payroll taxes on Social Security, and we indirectly taxed Social Security benefits for the first time, and we bought more than 50 years of solvency. Today Social Security, untouched, unamended, will make every promised payment for the next 22 years. You can't say that about much in Washington, can you? But in Social Security, you certainly can. And, you also have to add, Social Security has not added one penny to the deficit. Now for those who say, “Good reason to push it off the table and wait till another day,” I would add a note of caution. Small changes made today in Social Security will play out over the long run to buy us solvency for a long period of time. I think we should take Social Security off the table for the current fiscal cliff and deficit discussion but be very honest about what we're going to achieve in the near term. I think we should create the equivalent of a Simpson-Bowles commission for Social Security and give them eight months to a year, a directive to come up with a plan to buy 75 years of solvency for Social Security and then bring it to the floor for a vote and allow any bipartisan group of senators or congressmen who can come up with a credible plan that meets the same goal to offer theirs to be voted on in the Senate and the House. Social Security's important. It's important to us and to our kids and grandchildren. And if it is, even though it's not part of the fiscal cliff discussion, I think we should create a commission that will report back to Congress for a vote by the end of the next calendar year. In Kessler’s fact-check piece, he says “Durbin’s office declined to comment” on that point. On balance, we think that’s unfortunate. For decades, voters have been assailed by misleading claims from the right about Social Security. As these claims have (vastly) misled the public, the liberal world has napped in the woods, refusing to comment, challenge, resist, dissent, explain or simplify. We liberals! For decades, we’ve have been too lazy, too feckless, too uncaring to challenge the flow of disinformation. Even today, do you know where you can go to find a clear, simple explanation of the point Durbin was making? We don’t know where to go for that. But we could go a hundred places to find the relentless disinformation—the disinformation which has led the public to think that Social Security “won’t be there for them” unless major changes are made. What did Durbin mean by his remark? Presumably, something like this: In the 1983 “bipartisan solution” to which he refers, a long-term agreement was reached by a Republican president and a Democratic congress. Starting that year, workers would submit more in payroll taxes each year than was needed for that year’s payments to Social Security recipients. Those surplus payments would form a “trust fund”—and a rather large trust fund at that. This surplus money (this “trust fund”) would be used to cover the growing costs of Social Security when those multitudinous baby boomer workers began to retire. Everyone understood the deal. Year after year, baby boomers submitted more money than was needed that year. That extra money would be used to cover the costs of their retirement when they began to retire. Now, those workers have begun to retire—and some people want to renege on the deal! The system is working exactly the way it was designed to work in 1983—and yet loud voices like that of Charles Krauthammer are saying the deal must be thrown down the drain because “the trust fund is a fiction, a mere bookkeeping device.” In a recent column, Krauthammer said that Social Security “adds $165 billion to the deficit” in 2012 alone. But how odd! In his speech, Durbin said the venerable program “has not added one penny to the deficit.” What did Durbin mean by that? We think it’s a shame that he wouldn’t tell Kessler. We’ll assume he meant something like this: Since the time of the Reagan/O’Neill revamping, workers have submitted trillions of dollars in excess Social Security payments! Every year, those workers paid in more money than was needed, in line with the 1983 deal—the deal everyone understood. If workers have paid in trillions beyond what was needed, it’s easy to see why Durbin would say that they haven’t added to the deficit. That said, in his fact-check piece, Kessler focused on the idea that Social Security is adding to the deficit now. Is that true? Is Social Security adding to the deficit now? According to Krauthammer, the program “adds $165 billion to the deficit” in 2012 alone. In Kessler’s piece, he says “the cash flow deficit was $58 billion” in 2012—and he says it will be $75 billion in 2013. Is Kessler’s “cash flow deficit” the same thing as Krauthammer’s “deficit?” Judging from their dueling numbers, it doesn’t seem to be. Should Kessler’s “cash flow deficit” be regarded as a deficit at all? Given the historical lethargy of us liberals, this topic gets confusing real fast. Is Social Security adding to the deficit this year? People like Krauthammer have worked for decades, conditioning voters to assume that such gloomy claims must be true. In reply, we liberals have slept in the woods, entertaining ourselves by telling the world how stupid the other tribe is. You know—the other tribe? The tribe that has been kicking our asses as it confuses the voters? The professors have taken a pass on this topic. (In fairness, many of them were busy in France.) So have the so-called liberal journals and the alleged liberal columnists. So have Democratic pols, they who “decline to comment.” (They rarely decline to fund-raise.) Tomorrow, we’ll look at what Kessler wrote about that statement by Durbin. Largely due to the absenteeism of the self-impressed liberal world, this seminal topic just flat isn’t easy, as Kessler proved last week. Tomorrow: Ball of confusion
<urn:uuid:e9a88bcf-c263-4519-b90a-c361e54f944c>
CC-MAIN-2013-20
http://dailyhowler.blogspot.com/2012/12/budget-babel-babel-concerning-what-adds.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00072-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961933
2,241
1.703125
2
I love the way the words 'sustainable' and 'sustainability' keep morphing into exciting new meanings. The big shift of course can be seen in the way that 'sustainability'— which originally meant, and still should mean, 'a state or situation capable of being sustained indefinitely'—has come to mean unlimited growth by another name. From a green point of view, a sustainable economy is one that stays in a steady state, taking out of the world's resources no more, or even less, than it puts back. Thanks, however, to the dark art of greenwash, whereby resource-depleters seek to put a green sheen on everything they do, creepingly (and creepily) 'sustainability' in the mouths of big business means being able to go on doing exactly as you've always done, whatever the damage. Neat. But wait, there's more. A few weeks ago I noticed somebody saying that Christine Rankin's appointment to the Families Commission might not be 'sustainable,' which excited in me thoughts of Rankin being recycled or even organically reconstituted. Now, just today, we have Finance Minister Bill English saying that taking advantage of the housing allowance paid to him is 'not a sustainable position.' Oh, that's good. By giving some of the money back, English not only does the ethical thing, he does the green thing as well. Heroically, while saving his ass, he saves the planet too. An inconvenient truth is recycled into an expedient act. Is this man New Zealand's Al Gore or what?
<urn:uuid:a91add55-2cb4-4c41-9e37-1ca6412c6c8f>
CC-MAIN-2013-20
http://oppthumb.blogspot.com/2009/08/sustainarama.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698207393/warc/CC-MAIN-20130516095647-00047-ip-10-60-113-184.ec2.internal.warc.gz
en
0.948277
359
1.84375
2
I have authored a part to the Content Center, but the part is inserted at a standardized length. How do I author the part so that the length can be specified whem inserted, like the structural steel shapes? That might best be answered by knowing a bit more about what it is, and how it is used. There are a number of different answers. For example, do you want this inserted as a standard part or a cutom part with each insertion being a unique part file? Do you want it to grow between to other parts like a pipe spool or frame segment? The item is basically Unistrut - a U-shaped extrusion with a hole at a regular interval. It would be inserted as a custom part as the length is variable. I have authored the part as a Structural Shape. I am able to control the length of the piece when inserted using Insert Frame. However, when I use 'Place from Content Center' I am unable to control the length when inserting. I has also been unsuccessful in authoring the hole pattern in the extrusion. For publishing an ipart in the Content Center in the way that you can specify the length inserting one member from the Content Center, in the ipart table you need to set the length column as Custom Parameter Column. If you didn’t do that, you can edit the Family table in the Content Center Editor and set the column properties as in the image below. About the hole pattern, unfortunately, you cannot include it authoring the part as a Structural Shape. You can publish it without authoring the part as a Structural Shape, but, then, of course, you cannot use the part with Frame Generator. I hope this helps in some way. Thanks and regards, Product Support Technical Lead MFG - Inventor
<urn:uuid:15d933df-877e-4485-b8ea-ee088c62709e>
CC-MAIN-2013-20
http://forums.autodesk.com/t5/Autodesk-Inventor/Authoring-Content-Center-Parts-specify-length-on-insert/m-p/3266202
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00040-ip-10-60-113-184.ec2.internal.warc.gz
en
0.923934
379
1.609375
2
It is the policy of Amgueddfa Cymru – National Museum Wales to allow non-flash photography for personal use or study in all galleries, except where there are genuine reasons to forbid it, such as conservation or the protection of copyright. [image: No photography] National Museum Wales will, from time to time, host temporary exhibitions or displays in which photography is not permitted. In such circumstances, the entrance to the temporary exhibition, the display or the display case will be clearly marked with a ‘No Photography’ symbol. Visitors wishing to take photographs will be required to complete a Declaration Form available from the Information Desk. This form states that the visitor will only use the image for personal study and will not display the image for profit, nor allow it to be presented on any website. Visitors who sign this form will be issued with identification which will indicate to staff that the necessary permission has been secured to take photographs. The Museum reserves the right to reject a request made by a visitor. In such cases Museum staff will inform the visitor of the reason for the refusal. School groups will be informed of these arrangements by the Learning Department. This policy will also be placed on the Museum website. Visitors are welcome to ask a member of staff for further information. Commercial Photography is not permitted unless prior approval has been given by the Image Licensing Officer. Reproduced colour photographic prints of your favourite work in the National Collection can be obtained via the Image Licensing Officer. Please pick up a Print on Demand leaflet from the Information desk for further details.
<urn:uuid:9eb51b35-58f9-49b0-950c-0c572542878a>
CC-MAIN-2013-20
http://www.museumwales.ac.uk/en/1422/?display_mode=text
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00066-ip-10-60-113-184.ec2.internal.warc.gz
en
0.918798
323
1.859375
2
νόμος in Paul is almost always Mosaic Law (though probably not in Romans 7 when he finds within himself a "law"). However, not all authors use the same words the same way. Even from above we can see that authors don't even use the same word the same way, though they may exhibit patterns. So, to hold John up to the requirement of using νόμος to refer to Mosaic Law may lead to some confusing conclusions. I'd venture to say that John is referring to principles. A sinful life is a life that is unprincipled ... undisciplined. It is a life that is unattached to Christ, it does not abide within him (to go back to John 15). edit - even more: So looking at 1 John 2 we see that John is reaffirming an old law (probably not the Mosaic Law) but that he is also writing them a new commandment, or law. This new law is linked to love through being children of the light. John is also the recorder of the new "command" to "love one another." With this in mind, lawlessness here means to not be a child of the light, which has many horizontal and vertical implications.
<urn:uuid:ad098f0f-7684-42d2-ad34-92e172b1e113>
CC-MAIN-2013-20
http://hermeneutics.stackexchange.com/questions/1241/what-does-lawlessness-refer-to-in-1-john-34?answertab=active
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00072-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97349
260
2.390625
2
Dynamic stretching is a movement-based type of stretching. It uses the muscles themselves to bring about a stretch. It's different from traditional "static" stretching because the stretch position is not held. Sports medicine experts consider dynamic stretching a better way to reduce muscle tightness than traditional stretching. But how do you do it? These videos introduce you to eight dynamic stretches that target different muscles and areas of the body. They provide tips on how to do the stretches and for how long. Don't let the chill of winter turn you into a couch potato! Read this article to learn about some cool winter sports. Dealing With Sports Injuries You practiced hard and made sure you wore protective gear, but you still got hurt. Read this article to find out how to take care of sports injuries - and how to avoid getting them. Visit our sports center for tips on everything from choosing the best sport for you to dealing with sports pressure and injuries. Strains and Sprains Sprains and strains are common injuries, especially for people who play hard or are into?sports. Find out what they are and how to recuperate from one. You may have heard mixed things about stretching before working out. Here are the cold, hard facts on warming up, stretching, and cooling down.
<urn:uuid:d1e958d1-d660-488c-a622-491ea67bdcc9>
CC-MAIN-2013-20
http://www.devoschildrenshospital.org/body_teens.cfm?id=451&action=detail&ref=86275&cat_id=20130
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00068-ip-10-60-113-184.ec2.internal.warc.gz
en
0.936154
264
2.671875
3
The Handbook of Environment and Society focuses on the interactions between people, societies and economies, and the state of nature and the environment. Editorially integrated but written from multi-disciplinary perspectives, The Handbook of Environment and Society is organised in seven sections: - Environmental thought: past and present - Valuing the environment - Knowledges and knowing - Political economy of environmental change - Environmental technologies - Redesigning natures - Institutions and policies for influencing the environment Key themes include: locations where the environment-society relation is most acute: where, for example, there are few natural resources or where industrialization is unregulated; the discussion of these issues at different scales: local, regional, national, and global; the cost of damage to resources; and the relation between principal actors in the environment-society nexus. 'This is a monumental and timely contribution to scholarship on society and environments. The handbook makes it easy and compelling for anyone to learn about that scholarship in its full manifestations and as represented by some of the most highly respected researchers and thinkers in the English-speaking world. It is wide-reaching in scope and far-reaching in its implications for public and private action, a definite must for serious researchers and their libraries' Bonnie J. McCay, Professor, Rutgers University, USA 'This is the desert island book for anyone interested in the relationship between society and the environment. The editors have assembled a masterful collection of contributions on every conceivable dimension of environmental thinking in the social sciences and humanities. No library should be without it!' Associate Professor Robyn Eckersley, University of Melbourne, Australia
<urn:uuid:9fafb4f8-c09d-4722-bc80-48fe29284cfb>
CC-MAIN-2013-20
http://www.julespretty.com/Handbook_of_Env_and_Soc.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705953421/warc/CC-MAIN-20130516120553-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.927303
337
2.9375
3
Central Kentucky employers take note: A new business study by Midway College found big differences between workplace attitudes of older workers and those of younger workers. The differences don't necessarily make one generation preferable to another, but they might help employers understand how to get a department or team to work together. Business school dean Frank Fletcher said he hopes that the study will help employers help retain workers by focusing on what is important to specific groups. "People of different age groups respond to things differently," Fletcher said. "Hopefully, we raised more questions than we answered." The survey found that: ■ Baby boomers (those born from 1942 through 1960) were more likely to consider themselves work-oriented rather than family oriented. They also value organizational loyalty to employees, and value the need for comprehensive health insurance. ■ Generation X employees (those born from 1961 through 1981) value a balance between work and family, prefer group projects and teams, and want a challenge at work. ■ Generation Y employees (those born since 1982) are more likely to say that job security is their top priority, time off from work is a strong incentive, and close supervision improves their performance. One of the more surprising findings, Fletcher said, was "generation Y being so attracted to social events at work. They place a lot of value on that, more than generation X or baby boomers." Midway College business and teacher education faculty members surveyed 834 Central Kentucky employees in various industries from January through April. Reach Janet Patton at (859) 231-3264 or 1-800-950-6397, Ext. 3264.
<urn:uuid:5898a78d-5291-47d4-a25d-9c19907ed2c4>
CC-MAIN-2013-20
http://www.kentucky.com/2009/10/15/977151/midway-study-reveals-generational.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00057-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970568
332
1.789063
2
tourism & conservation partner to save lake ecosystem Posted: May 04, 2011 10:21 PM Updated: May 05, 2011 12:31 AM By Katie Johnson Collier County, south-west Florida, USA You’ve heard of people planting trees to help the environment, but what about planting something underwater? That’s what crews in Collier did to help out a lake that has seen its share of problems. Growing close to the shores of Lake Trafford is the bulrush – a plant that is commonly called home by fish and other wildlife. But the plant didn’t just grow there on its own. It’s a tedious job done in about two feet of water – and right beside some scary neighbors. “Sometimes I’m scared because there are alligators around,” said one of the men planting the bulrush Wednesday. But the new additions are vital to the lake, which right now only has about a quarter-acre worth of bulrush in it. Crews installed about 25,000 bulrush plants into Lake Trafford, creating an even larger habitat for fish to live and breed. That makes it an ideal spot for fishermen. Don “Bubba” Blalock has been guiding airboat tours through the lake for years. He says Lake Trafford’s been through a lot in that time – after getting taken over by an exotic plant species. That ended up choking and killing many fish. But with three acres of fresh new bulrush, there won’t be a lack of oxygen in there. “It’s going to create a tremendous fishing habitat out there – a place for the fish to hide and the bait,” said Blalock. And more fish means more food for the neighboring gators, which are the main attraction on the airboat rides. So by helping out Mother Nature, the bulrush will also help the nearby businesses which heavily rely on Lake Trafford to make ends meet. “We’re not going to be swimming here but it’s going to be a good lake,” Blalock said.
<urn:uuid:10ff90ad-3ee7-4a05-a67f-d12c00e2c189>
CC-MAIN-2013-20
http://www.airboatafrika.com/use-airboats/ecotourism/partner/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00064-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956837
456
2.453125
2
I, like many long-term fans of the Alien Franchise, was very disappointed by Ridley Scott's Prometheus. Ridley Scott had plenty of time to hire the best writers and plenty of money to produce a great film for loyal Alien fans. So why did this film turn out so incredibly bad? For example, one would expect that in an alien movie there would actually be some aliens. So what caused Ridley Scott to conclude that what audiences really wanted was an alien movie without aliens? I kept waiting and waiting for the alien to appear, but nothing, except for a tall albino Mr. Clean and some worms! In all fairness the alien does make a cameo appearance in the end for about 10 seconds. The creature was very scary, but it should have been featured throughout the film as in the other alien pictures. I can't believe that no one in some board room meeting didn't say: "Hold on there, we got to actually have some aliens!" Furthermore, the film had nothing to do with the original Alien film. In the original, there is a chamber filled with eggs. In this one, they are biological warfare creations encased in capsules. In the original, the atmosphere was dark and gloomy, but in this one it is bright and sunny. In the original, the Space Jockey Alien is found dead and fossilized in his seat, but in this one he is killed else- where. In the original series, Weyland appears in the third episode, but in this one he dies even though it is a prequel. How could Ridley Scott think that loyal fans would not notice all of these inconsistencies? In addition, the film had countless plot holes. (Spoiler alert) 1. Why would the engineers leave cave drawings directing humans to come to a military biological warfare base as opposed to their home planet? 2. Why would trained astronauts take off their helmets in an alien environment knowing full well the risks of alien germs in the air? 3. Why would an astronaut try to pet some alien snake like creature? 4. How did those two guys get lost in the tunnel even though they had a 3 dimensional map of the place? 5. Why was the surgical machine made only for men? How come it could not tell the difference between a male body and a female body? How could the archaeologist know how to program a sophisticated machine like that which clearly was not part of her field of study? How could she then get up and start running all over the place right after the surgery? 6. What was the point of David infecting the male archaeologist with an unknown organism? 7. How could David master the codes and language of an alien race based on merely studying human languages? How could he also know how to pilot an alien ship? 8. Why did it take David 2 years to download language files? A good computer should be able to do that in a few minutes or at most a few hours. 9. Why did the female archaelogist decide to go to the Alien home planet after experiencing the hostility of one lf them? What made her think that the alien life support system would work for her? 10. What made Ridley Scott think that a Mr. Alien was more intimidating and interesting than the original Space Jockey? 11. Why was it necessary to try and attach ancient alien theories with the Alien Franchise? These are just a few of the problems with Prometheus. This film simply did not make any sense. It was illogical throughout. What made the first two Alien films so great was that they were very intelligent films. Prometheus is an insult to the loyal Alien fans who have poured hundreds of millions of dollars into the franchise over the years. After waiting 30 years for a prequel to learn the story of the Space Jockey and its demise, Ridley Scott gives his fans this poorly thought out nonsense. How could Ridley Scott put his reputation on the line and the film studio gamble $130 million on such a poorly written screenplay?
<urn:uuid:c3ab6eff-a704-4a6a-beb5-9abfc496d77a>
CC-MAIN-2013-20
http://curtiscrx25.newsvine.com/_news/2012/06/14/12213182-poll-does-prometheus-live-up-to-the-hype
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00071-ip-10-60-113-184.ec2.internal.warc.gz
en
0.981226
817
2.328125
2
The Challenge to Improve the Future of ICT The aim of the Techno Teens Program is to develop the capacity for technology producers as opposed to consumers by introducing teenagers from the age of 12 to build computers and write software programs. Focus in terms of Information Communication Technology (ICT) in South Africa has been on building computer resource centres and computer literacy. These have focused on the “user” or consumer aspects of computing. The focus of the Techno Teens Program is to develop future ICT producers, innovators and engineers and can help to address a number of challenges we face currently face. The Quality of Entrants into University Teaching teenagers to build computers and write software programs at high school is essential to building a strong pool for the university undergraduate programs. Academics are frustrated by the lowering quality of high school graduates entering university with inadequate basic numeracy, reading and writing skills. There is a lack of interest in engineering and sciences which are seen as being too difficult. Children from disadvantaged and rural communities lack experience and access to develop an understanding of the context and need for many of the formal problem solving theory and methodology. Building computers at a young age helps to build both interest and confidence. It provides context to many of the theoretical work they are being asked to do. It introduces full sensory learning – auditory, visual and tactile. Students who may not respond well in classroom situations may develop an interest in developing logical thinking. Visual learning and principles of geometry will help to develop a better understanding of mathematical and logical concepts. Most students find writing a software program and coding a very challenging activity. We use basic letter writing as a way of introducing programming and developing the confidence to write instructions to people and machines by developing Many matriculating students are not exposed to university programs in ICT. This is often due to the way programs are promoted by universities into high schools and the fact that computing curriculum in universities is often spread across faculty degree programs. High school students are exposed to faculty programs and qualifications such as arts, commerce, engineering, science, medicine, etc. The computing curricula is spread across faculty qualification programs – computer science, computer engineering, software engineering, information technology, information systems in commerce and informatics in social art and science. There is a need to promote computing careers at high schools and matching talent and skills. Through the Techno Teens program we can register and monitor each student and track their development. By tracking the talent pool, we can help match students to the appropriate degree programs that are available and help universities to identify talent more proactively. This will enable access to disadvantaged children who have the foundation to succeed in a higher education program and career. Peer Program and Social Development The Techno Teens Program is unique in that it encourages peer interaction and collaboration between students. Each teenager that is equipped with these skills is encouraged to share their knowledge with others and help introduce them into the program. The program is intended to be a life-long program of learning and networking. Technology and social media is used to empower teenagers to stay in contact and continue to learn and teach each other about technology. It will enable interaction across students from different socio-economic groups to share a common interest and to share what they know. We intend developing awards and recognition programs that leverage collaboration and projects by students across geographical boundaries. Sustainability and Poverty Alleviation When we talk about ICT education for the masses today, we are referring to computer users rather than producers. Basic computer literacy is on using software applications such as word processors, spreadsheets and graphic applications. While this may help in equipping students with basic office computing skills as workers, imagine a society where the basic skills taught involve producing computer hardware and software and not just consuming it. Consider that African digital story-telling is on the increase despite the cost of equipment. Film makers and producers in Africa are finding ways to tell their stories. With the advent of new media and social networking, the need to develop these technical skills to build computers and write software may help establish a new generation of African technologists and creative innovators. While it may seem that the cost of computer parts and computers (which can be in the hundreds and thousands or South African Rands) seems unattainable for the poor, consider the value of having the skill to build such a product or to write a software program. A person that is able to build a computer can earn a few hundred or thousands of Rands. Imagine further if the millions that are currently excluded from the technology driven knowledge economy became participating producers and consumers. These are the kind of skills that have huge potential to benefit small businesses, schools, communities and households. We want to develop all teaching and learning content as Open Source content and encourage Open Source Software development. We will assist schools and provide teacher training programs. We want to develop schools through this program as important self-sustaining enterprises in their communities. Rather than donating computers, we want to use the program to assist schools in developing partnerships with computer suppliers, small medium enterprises, corporate social entrepreneurs, professionals, workers and households. Students and schools with a broader partnership can use this program to help produce computers for their communities and for small businesses. The Techno Teens Program would like to help develop these partnerships and assist schools to develop a sustainable model to address the issues of poverty and lack of infrastructure and resources at primary and high schools. There is often a frustration in poorer communities with lack of access and infrastructure. People in these communities are often introduced into the use of technology but don’t have access to the telecommunications and hardware infrastructure or partnerships that can enable them to have access on an ongoing basis. Techno Teen Program The Techno Teen Program was developed to empower teenagers at high schools with technical computing skills. The program teaches teenagers how to build personal computers and to write software programs. The program uses practical workshop style training to support and encourage learning of more advanced computing theory. The program is aimed at High Schools, particularly disadvantaged schools. The original curriculum was developed and delivered to assist previously disadvantaged students at University who had limited or no opportunity and access to computing and introduce them into software programming. The curriculum was piloted as a Summer Camp to High School students between the ages of 12-17 in Cape Town and has been extended to outlying schools in the Western Cape. The Techno Teen Program includes the following: Provide Training to Build Computers at High Schools - Training Teenagers at High Schools to Build Personal Computers - Assist Teenagers at High Schools to Build and Sell Computers and Support Household Incomes - Partnering with Hardware Component Providers and Black ICT Companies to Support High School ICT Learners - Assist High Schools to Use Computing for Social and Economic Development in their Communities Provide Training for Future Software Engineers at High Schools - Training Teenagers at High Schools to Write Software Programs - Providing Software Engineering and Java Programming to High Schools - Partnering with Industry Trainers, Software Engineers and Professionals Provide Teaching Support for ICT at High Schools - Training Teachers to Deliver ICT Training - Provide Free and Open Curriculum and Content for ICT Training Improve Pool of Candidates into University and Industry Programs - Develop a New Generation of Learners that are ICT Producers and not just Consumers - Training Teachers and Career Guidance Counselors on University and Industry Programs - Promoting University Computing Programs at High Schools - Establishing a Database of Talent, Assisting in University Application and Entry into Computing Programs and Associated Faculties (Engineering, Sciences, Commerce, Social Sciences, Arts, Design & Informatics) Techno Teens is based on a social enterprise model aimed at developing ongoing and longer-term relationships between high schools and associated partners from business, academia and government (the Triple-Helix model). For more information: Contact Person: Bridgetti Lim Banda
<urn:uuid:187442de-b59f-4196-bfb4-d9c0b59d4e69>
CC-MAIN-2013-20
http://www.cencra.co.za/public/technoteens.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705953421/warc/CC-MAIN-20130516120553-00037-ip-10-60-113-184.ec2.internal.warc.gz
en
0.943252
1,694
3.375
3
Pearl Harbor struck a country satiated with war's alarms. True, we had put through the draft and had actually reached the shooting stage with German submarines. But as a people we were still talking of war, without really accepting its imminence. Then, into our national complacency, came a surprise blow at our strongest point! We underestimated Japanese military power. So far as military and naval estimates were concerned, Japan had to be judged largely on her past record. Power cannot be gauged solely on strength reports, even if actual strength be known. Japan's war record was not impressive. She had fought but one great power (if the Russia of 1904-1905 can be so rated), plus a push-over against an isolated German Colony. Most indicative of all were the four years before Pearl Harbor in which she had waged active warfare in China. We knew pretty accurately China's deficiencies in modern equipment, resources, and training. Our maps and time scales, as we followed the war, clearly indicated a low rating for Japanese military prowess when judged by modern standards. We had a yardstick. No better measure exists of what a power plant can do, if you cannot put your own gauges on it, than what it has done. We had no reason to doubt our yardstick's approximate accuracy. Yet it was wholly false. I remember an incident that happened a short time before Pearl Harbor. We feared that the Japanese forces in Indo-China might advance on the northern end of the Burma Road, at Kunming. Secretary Stimson asked me how long such a movement would take. Military Intelligence had considered the terrain and the opposing forces, and applied its yardstick. I accordingly replied, "Three months," and stuck to it when the Secretary tried to shake me. Compared to what the Japanese later did in Malaya, Burma, and the Philippines, my estimate for a Kunming advance was rather like assigning to a race horse the speed of a Percheron. The efficiency of Japanese military power, measured in space and time, in the six months between Pearl Harbor and Midway surprised the world. Japanese ability to attack Hawaii, or alternately Panama or the West Coast, was primarily a naval problem. Unfortunately, our Navy underestimated Japanese sea and sea-air power even more than we in the Army underestimated the efficiency of their land and air forces. The Japanese Navy had seen even less of modern warfare than had the Japanese Army. No yardstick, true or false, could be applied. Whether because or in spite of that, the Japanese Navy was held in low esteem by our naval authorities. I remember Admiral Kelly Turner expressing in a British-American staff conference, six months before Pearl Harbor, his confidence in our ability to hold the Japanese Navy in home waters simply by having our fleet cruise in the mid-Pacific. I suggested that that would simply be "shadowboxing"—to the Admiral's annoyance, I fear. There was also the flat statement of Admiral Kimmel's war plans officer that there would "never" be an attack on Pearl Harbor by air. More specifically, the temporary detachments of carriers and cruisers from the main body of the Pacific fleet, at least tacitly approved by the Navy Department, almost coincidentally with their November war warnings, were practical reflections of the Navy's thinking on the possibility of Japanese major operations at sea. Another important factor entered, almost to the last, into our estimates. It was the question of whether or not Japan would, on her own initiative, immediately involve us in war on the termination of her diplomatic conference in Washington. It became evident in the fall of 1941 that that conference would probably end without agreement. Our increasing economic pressure on Japan, plus the militaristic cast of the government that then came into power there and their partial loss of face in China, spelled a probable resumption of their policy of conquest. In what direction would the Japanese strike, and against whom? There were many reasons, political and economic, to suppose that they would strike to the south. They already occupied Indo-China, under a thin veneer of legality. Beyond lay the riches of Malaya and the East Indies. Oil and rubber they particularly needed. There were also possibilities in the direction of Australia, Burma, and India. That was, indeed, the line they took. It meant unprovoked war with the British and the Dutch, but not necessarily with us. We assumed that they knew the strong feeling in this country against involvement in war. "America First" was still abroad in the land, and very vocal. Crippling strikes threatened. Even in our new Army, bewilderment and discontent had coined the slogan "Over the hill [desertion] in October." We had lately saved that Army from complete disintegration by only a single vote in the House of Representatives! Had Japan not attacked us when the Washington conference failed, there were but two courses of action that could have resulted in our interference with her policy of conquest. The President might have persuaded Congress to declare war, or he might have interposed U.S. forces in the path of the Japanese advance. The Administration's difficulties would have been great and its success problematical in either case. And how the isolationist elements in the country—the "Hearst-McCormick-Patterson Axis," "America First," and others—would have howled! American lives to be sacrificed in defense of British and Dutch colonies, and Siam! All this the Japanese must have known. They certainly missed a bet, once they realized that their negotiations in Washington would fail, in not going about their southern business and leaving us out on a limb. Through "magic," our code-breaking device, we read a strong hint along this line to Tokyo from Ambassador Nomura in Washington. And he was right; for, whatever we did, the Japanese stood to gain time for the seizure and consolidation of their southern conquests, and the still greater advantage, in the long run, of fighting an America torn by dissension. They chose, instead, to bring us in at once, and by so treacherous an attack that complete unity in our war effort was instantly assured. We underestimated their war power, yes; but their fundamental failure to understand America and our potential in a long war (also pointed out to them by their Ambassador) was colossal. It has been argued that the Japanese were bound to attack our fleet on resuming their policy of conquest because it constituted an intolerable strategic threat on their flank. The fleet was certainly an important element in Pacific strategy, and its damage or elimination was highly desirable from the Japanese point of view. But as a matter of fact, it was not an immediate menace to Japan, nor could it have seriously deterred her in the early months of whatever campaign she might decide to initiate behind the shield of her mandate islands. For our fleet, in any operations in the Far East, would have been distinctly inferior to the Japanese in air and sea power and particularly in logistic support. We had no bases beyond Hawaii capable of handling the fleet. We lacked the "train," the great force of supply and repair ships, that would be necessary for such distance operations. This also the Japanese must have known. Not even the most extreme misconception as to the relative efficiency of the opposing forces would have led our fleet so far from its base for a considerable period of time. Or if it had, Admiral Yamamoto could have solved his problem still more tragically for us. Neither factor discussed above—our underestimate of Japan's war power or our evaluation of the advantages that would accrue to her if she put on us the onus of making war—neither consideration caused us to ignore the possibility of an immediate Japanese attack on us when the Washington conference terminated, or the probability that we should eventually be involved in her war. The war warnings of November 24 and 27, together with the many discussions which culminated in the unprecedented appeal of President Roosevelt to the Japanese Emperor, clearly show this. It was also abundantly clear that the decision to bring us in initially or to put the onus on us rested solely with Japan. The high command of our Army and Navy thought they had prepared for either eventual or immediate war, so far as it was humanly possible to do so. But still it was difficult to predict, and indeed we did not predict that the Japanese would commit so great a blunder as Pearl Harbor, gratuitously unifying the war spirit and potential of America. We overestimated their intelligence. That blunder in the realm of high policy eventually cost Japan her empire. But that was not all. On the lower plane of tactics the Japanese decision to attack Pearl Harbor by surprise involved enormous risks. As General Marshall later testified: "A surprise is either a triumph or a catastrophe. If it proved to be a catastrophe, -the entire Japanese campaign was ruined." Our fleet and fortress together constituted what probably was, at that time, the most formidable strong point in the world. The fortress, with its garrison reinforced, had great firepower and a not inconsiderable air force. "'The presence of the fleet," General Marshall had told the President, "reduces the threat of a major attack." Had the fleet been held together and deployed in adjacent waters, it could have retained sea supremacy. Six months later, at Midway, weaker forces, supported by far fewer land-based planes, decisively defeated a Japanese fleet much superior to the hit-and-runners that bombed Pearl Harbor. It is true that most of our air strength was not on the alert or otherwise available when the attack came; but the Japanese had to assume it would be, as of course it might have been. Our radar detection stations closed down after 7.00 A.M., but that again the Japanese could hardly have known. Though we could not have matched the Japanese carrier-borne air force, plane for plane, we had the great potential advantage of near-by land bases for much of our force. Hostile planes had also to count on facing well-equipped and presumably well-prepared antiaircraft batteries, both afloat and ashore. Consideration of high policy aside, a Japanese attack on such a place-of-arms, under alert commands, was, on the face of it, improbable. Our reasoning was correct. The flaw lay in that phrase "under alert commands." The Hawaiian fortress and naval base were built with but one potential enemy in view, Japan. Studies concerning the Japanese bore on their military characteristics. It was well known that they were given to treachery and surprise. The President himself, less than a fortnight before Pearl Harbor, remarked that "the Japs are notorious for making an attack without warning." The strategic importance of Hawaii, coupled with the possibility of surprise on the part of its sole potential enemy, was with us always, whatever might be the probabilities of other Japanese action in any given situation and at any given time. The answer could only lie in Hawaiian readiness to meet an attack, whenever and however made. That had been Army teaching for many years—coupled with the devout hope that we might get some warning of war. The type of attack actually made—the how of it—had by no means been overlooked by the military. Many years before 1941 our fleet had made, in maneuvers, an attack on Pearl Harbor very similar to the actual one. In the early and middle 1930's the possibility of such an attack had been seriously discussed. General Drum, when in command in Hawaii, had had a long correspondence with the War Department on the subject. Even the "vacant sea," that area between the great Pacific traffic lanes through which an attacking force could approach Hawaii undetected, had been marked down in our defense studies. In January, 1941, the Secretary of the Navy listed the first three Hawaiian dangers "in order of importance and probability... (1) air bombing attack, (2) air torpedo plane attack, (3) sabotage." The Secretary of War concurred. Generals Marshall and Short corresponded on the subject that spring, and the former pointed out that the first six hours of hostilities would probably be decisive in Hawaii. In March the two senior air officers there, General Martin and Admiral Bellinger, made a defense study in which they practically called the turn on what later happened. And in May General Short wrote the Chief of Staff describing joint maneuvers he had held with the fleet, the theme of which was the defense of Hawaii from a carrier-borne air attack.
<urn:uuid:8651496b-7b22-4b71-bcbf-9e5cf01d02f4>
CC-MAIN-2013-20
http://www.theatlantic.com/magazine/archive/1948/07/pearl-harbor-in-retrospect/305485/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00026-ip-10-60-113-184.ec2.internal.warc.gz
en
0.981183
2,545
2.703125
3
Kinder Morgan would like us to believe that their Trans Mountain pipeline project in British Columbia is a better proposal than the one Enbridge has put forward, and that they're a more responsible company. Of course, as a climate activist I don't see any oil company proposing to expand oil consumption as playing a positive role in today's day and age. But given all of Enbridge's bungling as of late, some folks may be swayed by this argument. As our government proposes that we become a "super highway" for oil tankers they are simultaneously reducing both the prevention and the response capacity to deal with an accident in what is already Canada's busiest port. This represents a perfect storm of the conditions that could lead to an oil spill. Has there ever been a successful clean up from a massive tanker spill? Should an accident occur involving a large ship, serious inadequacies in B.C.'s response capabilities would hinder rescue and containment operations. And oil spill technology only works in ideal conditions with very little wind and waves; the behavior of diluted bitumen in the ocean is a complete unknown.
<urn:uuid:c785cfe4-d85c-494e-8b14-3d0a87a98e57>
CC-MAIN-2013-20
http://www.huffingtonpost.ca/news/trans-mountain-pipeline
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00018-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973343
222
2.0625
2
Energetic constraints on diapause in Calanus finmarchicus: Implications for population dynamics in the Gulf of Maine Deep basins in the Gulf of Maine act as refuge for a large population of resting Calanus finmarchicus during the summer and fall. Dynamics of this population are not well understood, however, and loss terms from advection and starvation may be large. A three part study was therefore undertaken to determine potential diapause duration in C. finmarchicus , monitor changes in the summer-fall population, and to define the relative importance of energetic limitation as a control on C. finmarchicus population dynamics. Six standard stations were sampled in and around the Gulf of Maine on a series of four research cruises between June 2001 and January 2002. Samples were collected at each station to monitor the abundance and metabolic state of the local C. finmarchicus population. Three additional cruises were carried out in 2003 to collect animals for use in respiration experiments. From these experiments, I constructed an individual based respiration model for estimating potential diapause duration. Maximum potential diapause duration for a hypothetical animal of optimum size ranged between 3 and 9 months for temperatures between 10° and 0°C respectively. Maximum potential diapause duration at temperatures common in the Gulf of Maine ranged between 3.5 and 5.5 months. Observations from the 2001-2002 field season showed that the summer-fall diapause population decreased in abundance by 75% between August 2001 and January 2002. Application of the diapause duration model to the 2001-2002 field population demonstrated that 'mortality' due to energetic limitation could account for changes seen in the diapause population. This possibility was explored further using a box model of C. finmarchicus summer-fall population dynamics. In the model, energetic loss was combined with estimates of advection, production, and mortality as controlling factors. The model successfully predicted the changing trends in C. finmarchicus abundance during the summer-fall of 2001-2002 and, with realistic adjustments to surface mortality terms, differences between predicted and observed abundances were small. The similarities between box model predictions and field observations support the hypothesis that energetic limitation can play a major role in controlling C. finmarchicus population dynamics during diapause. ^ Whitley Joseph Saumweber, "Energetic constraints on diapause in Calanus finmarchicus: Implications for population dynamics in the Gulf of Maine" Dissertations and Master's Theses (Campus Access).
<urn:uuid:40c92ca7-31ae-4851-b8fc-f8e3f1038342>
CC-MAIN-2013-20
http://digitalcommons.uri.edu/dissertations/AAI3188848/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.925048
526
2.46875
2
Report: NC fails to track, punish uninsured firms RALEIGH (AP) The state agency that decides how thousands of people are compensated for workplace injuries does a poor job of making sure companies obey a law requiring them to carry insurance, the state’s internal government watchdog reported Tuesday. The North Carolina Industrial Commission has not done enough to track of companies that fail to cover their workers, which could leave the employees without guaranteed payment for lost work, suffering injuries that don’t heal, and stuck with costly medical bills, according to State Auditor Beth Wood’s office. “Employees of a noncompliant business are not likely to learn that they do not have workers’ compensation coverage until after the employee suffers loss and files a claim. The commission’s current policies and procedures only identify noncompliant businesses after an employee is injured or dies,” Tuesday’s report said. More than 11,000 businesses either cancelled their coverage or let it lapse during the year that ended in June, the report said. As many as 30,000 employers required to carry insurance don’t, The News & Observer of Raleigh reported last year. The Industrial Commission decides on disability and medical benefits in about 65,000 workers’ compensation claims filed each year from employees who say injuries occurred in a workplace accident or that they contracted an occupational disease. The commission also has been insufficiently aggressive in slapping uninsured companies with financial penalties, punishing companies that fail to follow the law, and has collected only a fraction of the assessed penalties, the report said. “Noncompliant businesses have had little to fear from breaking the law because very few penalties have been assessed and collected,” the report said. The commission last year changed its procedures and began assessing more penalties, from $79,025 in 2011 to $6.5 million in 2012. But only 2 percent of that has been collected, auditors said. “In many cases, enforcement of the penalties has been put on hold pending the employer’s agreement to pay the injured worker all or a portion of his lost wage benefits and medical bills,” the commission said in its response to the report. The commission added that it’s working on a system using employment and other data that would allow it to spot uninsured companies sooner and warn businesses they’re obligated to have coverage. The commission said it also will work with state prosecutors to collect penalties and is exploring whether to hire outside bill collectors. North Carolina law requires that all businesses with at least three workers have insurance to cover the medical bills of employees hurt on the job. Exceptions from the law include some railroad workers, domestic servants, farm laborers and federal government employees. A law approved last summer requires insurance company records of workers’ compensation coverage to be shared with the state Labor Department and the North Carolina Industrial Commission to increase the odds cheating companies will get caught. Bills introduced in the General Assembly earlier this month would undo part of last year’s law that made data private on employers and their insurance policies. Republicans in the General Assembly also are considering legislation that would dismiss all Industrial Commission members and let GOP Gov. Pat McCrory make his own picks.
<urn:uuid:dcc1978f-a311-4ab0-89e6-e7f4f8f84321>
CC-MAIN-2013-20
http://www.salisburypost.com/article/20130219/SP01/130219562/-1/SP01053112-wineka-jay-baker-in-carolina-brotherhood-ride-w-anna-pix-factbox-qcd/report-nc-fails-to-track-punish-uninsured-firms
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710006682/warc/CC-MAIN-20130516131326-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970785
662
1.679688
2
How To Inspect the Supply Line continued from page 1 Remove any kinks you find, and adjust the tubing to prevent the kink from reoccurring. If necessary, use duct tape or some other fastener to hold the tubing in place. If the kink cannot be removed, it will be necessary to replace the tubing. Be sure to use a "food grade" quality of tubing suitable for transporting potable water. When you reach the water supply valve, also verify that it is turned on to supply adequate pressure. Next, inspect the water line from the inlet valve up the back of the freezer to where it disappears inside the freezer. If the tube is leaking from any location other than a connection, it will be necessary to replace the tubing. If possible, replace the entire length of tube. However, if access or some other issue makes replacement difficult, you may be able to successfully splice in a piece of tubing. Note though that splices are more prone to leaks and may result in the need for a future repair. If a leak occurs at a connection, attempt to tighten the connection. Leaks might also be stopped with the use of a rubber washer inside the connection or with the use of teflon tape wrapped around the threads of a connection. If you can find no constriction that is preventing the flow of water. Try turning off the water at the source, disconnect the supply line from the inlet valve, place the supply line in a bucket and then turn on the water. If water flows freely then you have confirmed that water is getting to the water inlet valve. page 2 of 2
<urn:uuid:5ddc859d-b7ab-489c-b508-9f1c273cefb9>
CC-MAIN-2013-20
http://www.acmehowto.com/howto/appliance/icemaker/check/supplylineinspect2.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00027-ip-10-60-113-184.ec2.internal.warc.gz
en
0.928284
336
1.984375
2
Rev. Alban Butler (171173). Volume X: October. The Lives of the Saints. 1866. St. Osith, Virgin SHE was born at Quarendon, and was daughter of Frewald, a Mercian prince, and niece to Editha, to whom belonged the town and manor of Ailesbury, where she was brought up with her pious aunt. Osith was married young to a king of the East-Angles; but the same day obtained his consent to live always a virgin. That king confirming her in her religious purpose, bestowed on her the manor of Chick, in which she built a monastery. She had governed this house many years with great sanctity, when she was crowned with martyrdom in the inroads of Hinguar and Hubba, the barbarous Danish leaders, being beheaded for her constancy in her faith and virtue, about the year 870; for fear of the Danish pirates, her body, after some time, was removed to Ailesbury, and remained there forty-six years; after which it was brought back to Chick or Chich in Essex, near Colchester, which place was for some time called St. Osithes, as Camden takes notice. A great abbey of regular canons was erected here under her invocation, which continued to the dissolution, famous for the relics, and honoured with many miracles. See Tanners Notitia Monastica, in folio. William of Malmesbury, l. 2. de Pontific. and principally her life by Vere, a canon of St. Osithes, in Lelands Itinerary, vol. 8. p. 41. and in Malbrancq, in MSS. suorum, t. 1. quoted by Ericus Pantoppidanus, in the life of St. Ositha, in his Gesta Danorum extra Daniam, Hafniæ, 1740, in 4to. t. 2. Sect. 1. § 12. p. 40, 41, 42. See also Alford, Annal. t. 1.
<urn:uuid:d8d5d248-28a6-43f0-8e31-d2fe2e638bc1>
CC-MAIN-2013-20
http://www.bartleby.com/210/10/075.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00034-ip-10-60-113-184.ec2.internal.warc.gz
en
0.980213
439
2.359375
2
infinitesimal sketch to "show" d/dx (e^ix) I'm not sure if this should be in Calculus or pre-Calculus, since the problem is a lead-in to a presentation of a calculus concept, and hence implicitly contain calculus concepts, but the lead-in itself will not explicitly use calculus. This is something of a pedagogical problem. I am trying to draw a diagram with my "infinitesimal microscope" to "show", without using the standard chain rule derivation (or the series expansion of e^ix, or Euler's identity), the instantaneous change of a rotation is that rotation plus a quarter turn (i.e., d/dx (e^ix) = i*(e^ix), without using these symbols). To show that the instantaneous change is perpendicular to the rotation is easy, with infinitesimal secants as the difference between vectors. However, to show that the size of the change will be the same as the size of the original rotation is not as clear, since the secants are clearly smaller than my radius in my diagram. While I am doing it, it would also be useful if it was shown to be most convenient to represent the rotation in radians. This is supposed to be a heuristic diagram, not a formal proof. Any suggestions? Thanks for anything.
<urn:uuid:056f1517-fcc7-4eec-b5a2-cd46784ccc87>
CC-MAIN-2013-20
http://mathhelpforum.com/calculus/167943-infinitesimal-sketch-show-d-dx-e-ix-print.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00031-ip-10-60-113-184.ec2.internal.warc.gz
en
0.923172
285
2.8125
3
New and improved scanning probe microscope Probe upgraded in preparation for use in conjunction with the vapor deposition system 01/28/03The department's scanning probe microscope (SPM) was upgraded in preparation for use in conjunction with the vapor deposition system, as well as by Dr. Isam Marawi of the chemistry department. The $67,000 price included a new scanning head, of which $33,000 went towards electrochemistry features, electronic controllers, and a computer with the imaging software. The SPM has already been used to measure the amount of material deposited by the deposition system with atomic force microscopy. In 1997, the physics department purchased a Scanning Probe Microscope (AutoProbe CP). The microscope was upgraded in early 2003 for $67,000, or which $33,000 went towards electrochemistry features. The microscope is capable of atomic force microscopy, non-contact a.f.m., scanning tunneling m., magnetic f.m., and a few others. A small tip approximately 200 microns wide is attached to the end of a triangular cantilever. A laser is reflected off the back of the cantilever and into a photodiode, which tracks its vertical motion. In this way, a 3D map of the sample surface is created. Past work has been done on carbon nanotubes and anaylsis of impurities in steel. Current work is being done in conjunction with the department's new vapor deposition system, specifically in analyzing the deposited material.
<urn:uuid:263a0df5-483e-4c6f-ba9a-ab573946f409>
CC-MAIN-2013-20
http://www.xavier.edu/physics/news/1635/33/yes
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00074-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944134
312
2.09375
2
Cat Chat Volume IV - The Mass Comes Alive - CD Item #: 8001749 Product DescriptionCat Chat is a fun new audio show for kids that will make them learn and love their faith like never before! With loveable cartoon characters and creative, upbeat songs, Cat Chat will entertain as well as inspire your children. Volume #4, The Mass Comes Alive, entertains and teaches kids that the central celebration of our Catholic faith is the Eucharist. When we go to Mass, we actually get to witness the miracle of bread and wine becoming Jesus' Body and Blood, just like at the last supper! Songs on this volume include: Come Live in Me, The Greatest Gift of All, Real Presence and more... Join Papa, Josh, Hannah and of course Moses at the annual Catholic Family Conference: listen in and have the Mass come alive! Click here to listen to the Cat Chat Theme Song! (Opens in a new window.) Click here to listen to the song The Greatest Gift of All! (Opens in a new window.) Click here to listen to the song Real Presence! (Opens in a new window.) People Also Bought Reviews - Cat Chat Volume IV - The Mass Comes Alive - CD Wonderful Catholic CD's!! |By:||Michelle (Lake County, IL, July 14, 2009)| |Pros:||Faithfully Catholic; Keeps kids attention; Great for teachers too; Professional not cheesy; Fun catchy songs; ALL the volumes are good;| |Best Uses:||Anytime; Car; Home; School;| Yes, I would recommend this to a friend. I am so glad I found these! My 5 year old and 2 year old sing these in the car. My 2 year old son even asks for it by name "Cat Chat!" These are fun songs and stories.. not boring, not cheesy.. well produced. They are strong in faithful Catholic teaching. Nothing to worry about in these CD's. I highly recommend these to parents, as well as teachers. I gave one to my daughters preschool teacher and she LOVES it! Give it a try.. you will not be disappointed! I especially love "The Mass Comes Alive" and "Saints and Superheros", however they are all great! God Bless, Michelle
<urn:uuid:fe65d204-5c9f-4cf4-bf28-c3f8ec7d3fc2>
CC-MAIN-2013-20
http://www.catholiccompany.com/cat-chat-volume-iv-mass-comes-alive-cd-p8001749/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00040-ip-10-60-113-184.ec2.internal.warc.gz
en
0.916464
476
1.546875
2
For more than a quarter of a century, Ildefonso, a Mexican Indian, lived in total isolation, set apart from the rest of the world. He wasn't a political prisoner or a social recluse, he was simply born deaf and had never been taught even the most basic language. Susan Schaller, then a twenty-four-year-old graduate student, encountered him in a class for the deaf where she had been sent as an interpreter and where he sat isolated, since he knew no sign language. She found him obviously intelligent and sharply observant but unable to communicate, and she felt compelled to bring him to a comprehension of words. The book vividly conveys the challenge, the frustrations, and the exhilaration of opening the mind of a congenitally deaf person to the concept of language. This second edition includes a new chapter and afterword.
<urn:uuid:cc2f104b-c51d-4b6b-b626-5dedc3c82fd5>
CC-MAIN-2013-20
http://www.tatteredcover.com/book/9780520274914
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703298047/warc/CC-MAIN-20130516112138-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.981013
176
3.40625
3
Classic Military Vehicle is the UK's best-selling publication dedicated to historic military vehicles. With coverage of the vehicles, people and events that make up this fascinating scene, including authoritative text, superb photography and great archive material, it is the number one publication in its field. Thursday, 16 May 2013 00:00 New on the show circuit for 2013 is Warwick Boulton’s M41 Walker Bulldog, the only running example in private hands in the UK. Pictured here fresh from restoration, it looks absolutely superb and we look forward to seeing it in action at Wicksteed at War, 7-9 June, at Wicksteed Park in Northamptonshire. For more information visit www.wicksteedatwar.co.uk. Geoff Fletcher looks at one of the most iconic military vehicles – the Jeep – but focuses on its service with British forces both during WW2 and after The British Expeditionary Force had the best vehicles that could be provided when it deployed to France and then Belgium in September 1939. But by June 1940, vast quantities had been lost during the withdrawal from Dunkirk. Then, if that were not enough, the Italians declared war and the North African campaign began, creating an urgent need to equip new divisions that were being formed to defend British interests in the region, particularly the Suez Canal. At the time, the British Army relied on commercial saloon cars plus a variety of motorcycles and motorcycle combinations for light transport, command and liaison tasks. There had been few attempts to find a purpose-made military vehicle to meet these various requirements and, in any case, given the pressing need for other types of vehicle it was extremely unlikely such a project would have been funded. However, on the other side of the Atlantic, the US Quartermaster Corps was funding the development of a light reconnaissance car… the Jeep. David Skinner’s 8cwt Humber turned out to be more of a project than he’d hoped but, as John Blackman reports, help was at hand Admit it, when it comes to vehicles or jobs around the house or garden, most of us like to tinker to the best of our abilities and occasionally beyond; we enjoy the challenge of creating or repairing something and the satisfaction it gives us afterwards. But equally for most of us there comes a time when we face something which, because of the skill levels required or the time we have available (or both), is better handed off to a professional. I first saw David Skinner’s 1940 8cwt Humber 4x2 way back in September 2009 when I photographed his Humber Super Snipe staff car (and very nice it was too; you can see the results in April 2010’s CMV). At the time, the vehicle was in bits, although David hoped to get it ready for the 2010 Guernsey liberation commemorations. He didn’t make that deadline… or that for the 2011 event, but by that time the realisation had dawned that despite everything that he had achieved mechanically, the project might best be passed to a professional to get it finished within a reasonable time span.
<urn:uuid:55c73b8a-889f-49cf-869e-19bcb4eec788>
CC-MAIN-2013-20
http://www.cmvmag.co.uk/index.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966952
645
1.71875
2
Libya’s web connectivity appears to be slowly coming back online after a six-month blackout, but the access was then taken back again after some hours. The state-run ISP restored the Internet connectivity for Libyan citizens early Sunday. However, local residents have complained of patchy consistency with the Internet connection coming and going. From early Sunday, there was lots of buzz started floating on Twitter and on other reports. “Welcome to all our brothers & sisters from inside Tripoli on Twitter. Internet returns to them first time in a long time! #Feb17 #Libya,” said in a tweet posted by the National Front for the Salvation of Libya. Renesys, a New Hampshire-based company that monitors Internet usage, reported a message posted on the Libya Telecom & Technology website, “Congratulations, Libya, on emancipation from the rule of the tyrant.” “Bandwidth was scarce, but DSL service was back,” Renesys said in its blog. “People started Skypeing with friends and relatives, some reporting hearing live gunfire in the background as their VoIP calls began to connect.” Internet connectivity was down again after some hours as it had come back on. Renesys reported, Libya’s main Internet router provider Libya Telecom & Technology, had been removed from international routing boundary making them unable to communicate with the outside world. Gadaffi’s government in early March pulled the Internet in an attempt to suppress rebels, which most other governments have done as a weapon in recent past. In Egypt, the Internet was shut down for five days when protest against the ousted president Mubarak was started. Soon after the Internet was restored, anonymous hackers (a group calling itself Electr0n) snuck in and defaced the country’s domain name registry nic.ly. The hackers posted an image on the site’s homepage of the rebel flag with a message “bye bye Gaddafi, Feb 17 Libya”. February 17 was the date when Libyan protestors started demonstrations against the Gadaffi government and the security forces loyal to Colonel Gadaffi. Hacking has become a growing social and political armament for hackers in the Arab world and other parts of world. Turkey is one of the favorite destinations for Anonymous hactivism mainly because of its unauthorized suppression of information. The hackers as part of their AntiSec movement targeted governments, law enforcement, and corporations in the same line as LulzSec targeted corporate sites in recent times. Anonymous trampled over 74 Turkish websites and released data from over 100 websites (mostly Turkish government sites) to protest against the new filtering scheme. Anonymous has hacked the web pages of the Syrian Ministry of Defense and posted message about the massacres occurring in that country. The retaliatory move was done against the brutal regime of Basher al-Assad as the defaced site read. About 91 websites were hit including 51 government websites, the industry regulator, the Malaysian Communications and Multimedia Commission, when Anonymous hactivists targeted most of the Malaysian government controlled website. Anonymous called it as ‘taking away basic human rights’ and blocked access to The Pirate Bay, Wikileaks, movies and television shows. BART’s webpage (Bay Area Rapid Transit), the State of California government agency that runs trains and platforms, have been defaced by Anonymous last week. Hackers compromised the released names, passwords, and other personal data stored on the marketing site MyBart.org in a protest against oppression from any government agency. Anonymous, in one way are helping the protestors by making wide-reaching statements. Under various Twitter accounts @AnonyOps, @AnonOps, @AnonymousIRC, @anonymouSabu, and @Anonymous Press, they are exchanging ideas among themselves with the goal of committing acts of civil rebellion online.
<urn:uuid:cbde1945-e327-48cd-9a0e-58558ce02694>
CC-MAIN-2013-20
http://siliconangle.com/blog/2011/08/22/after-months-of-shutdown-libyas-springs-internet-back-into-action/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00049-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956926
786
1.570313
2
Planting is not just for the pros: Seven steps to create a vegetable garden by Jennifer Cuevas photography by Nicholas Mitzenmacher Planting a vegetable garden is a simple way to eat fresh. If you do not have a patch of dirt—no problem. Vegetable and herb gardens are easy to grow in containers. Here is how to get started. Check how much sun is available and select vegetables or plants that are appropriate for the amount of light in the planting location, “If you have dirt and sun, you can probably have a garden,” says Cinthya Guillen, master gardener and program coordinator of Seedscapes, a hands-on program that teaches affordable housing residents how to design, build and maintain water and energy conserving gardens. Guillen recommends scouting the proposed garden area first before planting. “Ideally, you want to have full sun,” says Guillen. “For example, plants like squash and tomatoes need full sun; whereas some leafy greens may do OK in partial sunlight, but full sunlight is optimal.” Choose a container for the type of vegetable you will plant. If you plant in a container, it must have drainage. Ask the local nursery what plants work well with containers for a successful harvest. Test your dirt or purchase potting soil with nutrients like nitrogen and worms that help vegetables flourish. “Local labs will test the dirt, or you can go to a nursery to ask how to amend the soil. If you plant in containers, ask what kind of potting soil will work well with your plants,” says Guillen. Remove weeds from the proposed planting area. “Before you plant in the ground, be sure to take out all the weeds and grass first, as this will invade the garden,” says Michael Wolfsen, Peace and Carrots Garden co-manager. If you choose to plant in the ground, you can create a border with large rocks, bricks or recycle something you may already have in your home. “Next, you need to dig in the dirt. We like to double-dig,” says Ms. Wolfsen. “That means you dig shovel deep all around the plot one time and put that dirt aside. Then dig shovel deep again and put that dirt on the side. We normally amend the dirt with an organic product called ‘Bumper Crop,’ which helps add nitrogen.” If you are a container gardener, you can purchase a bag of potting soil at your local nursery for about $10. Ms. Wolfsen recommends organic soil to ensure no harmful additives have been added to the dirt, which can ultimately be ingested through the food. Ask what to plant in your available space. “Before planting, be aware of the root space,” says Guillen. “Onions or leafy greens work well in container pots, whereas some tomatoes have root systems of three feet or more, and you want to have enough space for the plant to reach its potential.” Ask your nursery master gardener what to plant, how far apart to plant each vegetable and tell whether you are planting in dirt or containers. Most seeds cost less than $5 an envelope, which can also save you a bundle in grocery costs. Irrigation: Water is the next critical component of gardening. Ms. Wolfsen recommends a drip system to conserve water. “If you have a water hose, soak the ground well the first few times when you first plant, so the water sinks deep into the dirt, then cover the area with mulch. After that, you can water the area once or twice a week.” See your food grow, eat and enjoy! “When you have an organic garden, you can eat well and have better nutrition for not a lot of money,” says Ms. Wolfsen. Also see the companion piece, “Feeding a community.” No related posts.
<urn:uuid:4f055262-3a7c-4b8b-8cab-c2a0158fe57d>
CC-MAIN-2013-20
http://laverne.edu/laverne-magazine/2011/05/planting-is-not-just-for-the-pros-seven-steps-to-create-a-vegetable-garden/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00015-ip-10-60-113-184.ec2.internal.warc.gz
en
0.938307
828
3.125
3
Initiatives for restoring the financial viability of the SEBs seems to be a right thing to do. This is however a magnanimous task as SEBs do not fall under the Central government, as they are a state subject. The Central Govt could look at forming joint Ventures with SEBs so that they become more accountable. They could start with focus on distribution and then move on to transmission and then generation. Though the Budget has emphasised reform in the power sector, there is no mention of power generation through co-gen. There should be a budgetary grant to generate renewable power. K Taranath , MD , Kirloskar Copeland The Budget has put the much-needed emphasis on infrastructure, power, IT and roads. This will definitely have a positive effect on the other industries. Surcharge on import duty being abolished, will make imports cheaper, and to that extent will result in stiff competition to Indian industries. With regard to the CENVAT rate that has been reduced to a single slab as compared to the three slabs earlier (except for a few items), it is not clear as to how it will positively impact the air-conditioning industry. Dr. C. Pratap Reddy, chairman, Apollo Hospitals Ltd "Nothing is there for the healthcare industry in this budget and it is really disappointing," complained Dr. C. Pratap Reddy, chairman, Apollo Hospitals Ltd, Chennai. Continuing his complaint against the 2001-2002 union budget he said, the mindset of the government hasn't changed after all these years when it comes to healthcare sector. According to him corporate hospitals save precious foreign exchange and that has not been rewarded with incentive. "When commercial vehicle is given 50 per cent depreciation benefit the same is not extended to medical equipments. With technological advances in the medical equipments accelerated depreciation benefits should be allowed so that hospitals go in for new equipments," he said.
<urn:uuid:e63cdaf7-9b44-4247-bde7-a73633228cbe>
CC-MAIN-2013-20
http://www.domain-b.com/economy/indiabudget2001/union_budget_2001-02_reaction_8.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00030-ip-10-60-113-184.ec2.internal.warc.gz
en
0.963241
400
1.5
2
The Importance Of Welding Machines Welding is the process of joining two materials like steel, aluminum, brass, stainless steel, plastic or polymer and fusing is the equipment used in welding. Molten metal or plastic called ‘filler’, is used to hold the pieces that are worked on, together. Different kinds of energy sources can be used for welding materials like, gas flame, an electric arc, a laser, an electron beam, friction or ultra sound. There are different processes of welding like arc welding, MIG welding and TIG SMAW or Shield Metal Arc Welding is also known as MMA or Manual Metal Arc or stick welding. This is used for welding steel;, stainless steel and cast iron. In this type of welding, a consumable electrode coated in flux is used to lay the weld. Electric current is provided by the welding power supply. This helps top make an electric arc between the electrode and the metals that are joined. The flux coating disintegrates and this results in a shielding gas which gives a layer of slag. The weld area is protected from any impurity by the slag and the shielding gas. The equipment needed for this type of welding are: continuous power supply, an electrode, an electrode holder and a work clamp. MIG welding means Metal Inert Gas welding. This is also called Gas Metal Arc Welding or GMAW. This is used for joining aluminum with other non-ferrous metals. It is used to join many types of alloys and metals. There is very little splatter in this type of welding. This method is quicker that other traditional methods like the “stick welding method”. A continuous, consumable wire electrode and shielding gas are fed with a welding gun. A constant power source is required for welding steel or aluminum. This type of welding is mainly used in the sheet metal industry and is thus heavily used in the automobile industry. The equipments required are: a welding gun, a wire feed unit, a shielding gas supply and an TIG welding means Tungsten Inert Gas welding. Reactive metals like magnesium and aluminum can be joined together with this process. Welding is done manually. With this method, different kinds of joints like the lap joint, the butt joint, the corner joint and the t-joint can be welded. When TIG welding process is used, oxidation is prevented. It needs a non consumable tungsten electrode and an individual filler material. An arc is made between the pointed tungsten electrode and the area that has to be welded. Since gas shield is used, the welding that is formed is very clean and neat. For shielding an inert gas is used. Thin metals can be joined well with this type of welding. It is used for welding aluminum, magnesium alloys, steel, stainless steel, copper, brass and titanium. FCAW or Flux Cored Gas Welding Gasless needs wire fed welding machines. In this process the metal is heated, melted and then joined together. The joining is done by continuously fed, consumable tubular electrode wire. Constant electric power supply is required for this method. In this high speed welding can be done and it is also portable. So, it is best used in the construction industry. It is generally used in steel, stainless steel and rusty Arc welding needs inexpensive equipment and requires electric current. Resistance welding needs costly equipment and requires the use of additional sheets of metals to encase the material that has to be welded. A modern technique is laser beam welding or energy beam welding. This is very expensive but is also fast and accurate. Welding is becoming automated these days. The use of welding robots is done in the automobile industry. The right type of welding machine has to be used to fuse two types of materials together otherwise the result will not be what is required. You should know for what purpose it is going to be used. Then you should choose the type of welding machine, the power supply needed, whether it is portable, what other tools and accessories might be needed with the welding machine. The accessories that might be needed are: the torch, the welding helmet, the welding gauntlet, goggles and the welding Thus, the welding machines are definitely important and need to be bought and used with great care.
<urn:uuid:53cc7de1-5470-4358-a15d-e3dfb28da9f2>
CC-MAIN-2013-20
http://www.everlastgenerators.com/the-importance-of-welding-machines.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00004-ip-10-60-113-184.ec2.internal.warc.gz
en
0.910619
957
3.40625
3
German-American Bridge Builder Walther Leisler Kiep at the German House “You build bridges where people think you can’t build bridges," is how Thomas Roth, Bureau Chief of ARD German Television New York, introduced the special guest to the audience at the Otto Karl Kiep Auditorium in the German House. For more than half a century, Walther Leisler Kiep has actively committed himself to promoting German-American friendship. The influential politician and longtime Chairman of the Atlantik-Brücke presented his new book, “Bridge Builder: An Insider’s Account of Over 60 Years in Post-War Reconstruction, International Diplomacy, and German-American Relations,” giving an inside history of his life in politics and of German-US relations over many decades. Enlarge image Walther Leisler Kiep (© GKNY) As an independent politician and treasurer of the then-governing CDU party, Minister of Finance in Lower Saxony, member of the Volkswagen Supervisory board for 21 years, and confidant of several US presidents, Kiep made constant and invaluable contributions to German-American relations and worked specifically to improve the German-American friendship, particularly after the Second World War. The book presentation took place at a very special location for the Kiep family. Last year the Consulate General named the German House audience after Otto Carl Kiep, the uncle and godfather of Walter Leisler Kiep. Otto Karl Kiep was the German Consul General in New York from 1931 until 1933; he was removed from his post after he praised Albert Einstein's arrival in the US, stating publicly to the Manhattan audience, "your gain is our loss." He was eventually executed for his resistance opposition to the Hitler regime in 1944. Besides discussing German- and European-American relations, Roth and Kiep had a spirited conversation about Kiep’s political experiences and spoke about topics like German unification, the country’s complex relationship with the Middle East, and the current financial crisis. After a political career of over 50 years, working with true heavyweights in politics and economics, one can imagine that it is not the easiest task to reconstruct every important incident and meeting for an autobiography. For Kiep, his diaries therefore were a “wonderful way of keeping an overview of things you might have forgotten.” The author, who holds a collection of 65 diaries documenting his life, uses them as a “self-control instrument” which make him reflect on his decisions. “The whole book is based on my diaries”, he said. They provide deeper, more personal insight: “Without my diaries, this book would not exist.” It is fortunate for German-American relations that these diaries- and the history they contain- had such a fastidious author.
<urn:uuid:e01edd3d-9a56-466b-a12e-40d76d091d35>
CC-MAIN-2013-20
http://www.germany.info/Vertretung/usa/en/__pr/GKs/NEWY/2012/05/04__Kiep.html?archive=1998824
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00047-ip-10-60-113-184.ec2.internal.warc.gz
en
0.96985
602
2.078125
2
New Numbers Confirm Inflationary Recession (Stagflation) Yesterday's GDP report indicated that the headline volume growth number stayed unchanged at +0.6%, and the terms of trade adjusted real growth number also stayed unchanged at -0.6%. Domestic demand was revised down but so was the trade deficit, leaving production unrevised. However,other revisions were clearly bearish. Inflation was revised up with both the GDP deflator and the domestic demand deflator being revised up with 0.1% point each while the Personal Consumption Expenditure deflator was upwardly revised by 0.2%:points. Meanwhile, disposable income was revised down even in nominal terms and much more so in real terms. Today we got the monthly breakdown on that downward revision, with most of it coming in November and December. Real disposable income rose slightly in January, but this was entirely a result of temporary factors such as expired options and other bonuses. Despite these factors, real disposable income remains 0.2% below the September peak, confirming the beginning of a recession during the fourth quarter of 2007. This is likely to become even clearer after these numbers have gone through the annual revision in late July. These revisions always result in a downward revision of real growth and an upward revision of inflation. For example, the real growth rate for 2004 was initially reported as 4.4% while the GDP deflator was reported to rise 2.1%. After the 2007 annual revision it was said that growth was only 3.6% while the GDP deflator is said to have risen 2.9%. With consumer price inflation soaring and nominal income growth likely remaining slow, this implies that real income will likely fall faster in coming month (also in February, the removal of the temporary factors that boosted the January number will also contribute to a deeper monthly decline. And with the savings rate being negative and asset prices falling, this will also imply a decline in personal consumption which in turn will contibute to faster declines in terms of trade adjusted real GDP.
<urn:uuid:a8f78f17-1173-4c73-a7c5-631b335de80b>
CC-MAIN-2013-20
http://stefanmikarlsson.blogspot.com/2008_02_01_archive.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703298047/warc/CC-MAIN-20130516112138-00028-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970585
408
1.601563
2
Okay, researchers answer this for me: how does my dog know exactly what time I need to get up -- she begins by licking my ears ... Photograph by Gordon Wiltsie, National Geographic Published March 18, 2013 Back before alarm clocks jolted us awake to greet the morning with bleary-eyed confusion, roosters performed that daily duty. Now, a new study shows that roosters don't need the light of a new day to know when it's dawn—rather, their internal clocks alert them to the time. While researchers at Nagoya University in Japan were studying the genetic underpinnings of innate vocalizations—or nonlearned behaviors such as crowing—in chickens, they discovered that the male birds don't need external light cues to know when to start crowing. (Also see "Night Owls Stay Alert Longer Than Early Birds.") "To our surprise, nobody [has] demonstrated the involvement of the biological clock in this well-known phenomenon experimentally," study co-author Takashi Yoshimura, who specializes in biological clocks at Nagoya University, said in an email. Shedding Light on Roosters During their experiments, Yoshimura and colleague Tsuyoshi Shimmura, also of Nagoya University, put PNP roosters—an inbred strain of chickens used often in laboratories because of their genetic similarities—through two different light regimens. In the first experiment, roosters experienced 12 hours of light and 12 hours of dim light conditions for 14 days. The scientists found that the roosters would start to crow two hours before the onset of light—called anticipatory predawn crowing—consistent with observations in wild red jungle fowl. (See National Geographic's pictures of game birds.) In the second experiment, roosters were kept under 24 hours of dim light conditions for 14 days. Yoshimura and Shimmura noticed that the animals started running on a 23.8-hour day and would crow when they thought it was dawn, according to the study, published March 18 in Current Biology. When the scientists exposed the roosters to sound and light stimuli to test whether external cues would also elicit crows, they found that the animals would vocalize more in response to light and sound in the mornings than during other times of day. This means the roosters' internal clocks take precedence over external cues. The researchers also found social rank among the birds affected the timing of when they crow. "Crowing is a warning signal advertising territorial claims. Our preliminary data suggest that the highest ranked rooster has priority in breaking the dawn, and lower [ranking] roosters are patient enough to wait and follow the highest ranked rooster each morning," said Yoshimura. Rooster Study a Long Time in Coming Kristen Navara, a hormone specialist in poultry at the University of Georgia in Athens, said she isn't sure why no one has taken a closer look at this phenomenon before. (See pictures of rare chickens in National Geographic magazine.) "I think many times we don't think to study what appears right in front of us," Navara, who wasn't involved in the research, said by email. For instance, "we have definitely noticed in our own roosters that they begin to crow before dawn and have wondered why that was, but just never thought to test whether it was a circadian rhythm driven by an internal clock rather than an external cue." Added Navara, "I think this is a very interesting study and something that should have been done a long time ago." We raised chickens when I was growing up, and I can say from lots of experience that our roosters tended to crow when- and where-ever they so chose, regardless of time of day or night. We had one big old golden Sex Link rooster that crowed off and on all night long for years. And of course, any time the other roosters thought they could crow, he'd chase them around like a schoolyard bully... they still got to crow, but they got lots of exercise thereafter too. lol :) I grew up with roosters around and have raised egg chickens (with roosters) for the last 20 years,. I note that roosters crow on somewhat differing schedules. Let's start earlier. Chickens are among the most night-blind of animals. They start going to roost an hour to half an hour before sunset. It's dark to chickens when it is dusk to us (they walk like they can't see well). The reverse is true in the gloaming of the morning... they come out into the day well after song birds are hopping around in the grass under our bird feeder. In the times of the long nights (winter), when night stretches to 14 hours, roosters may start crowing at 2 a.m. --sometimes a bit earlier, more often a bit later I notice for myself that i wake up when i can't sleep any more ,, even if i try to. I whimsically say "my sleep reservoir is empty". It may not be true, but it sure is what it feels like. So, i see no behavioral regularity which i could call a "biological clock". Crowing varies an hour or three according to the kind of rooster and the length of night. Bored roosters crow earlier than non-bored roosters -- house chickens or yard chickens vs pastured chickens. Me? i think their sleep reservoir is empty, and a bored, night-blind, non-sleepy rooster uses the only word in his vocabulary to say so Which of course raises the question: how in the blazes to such noisy animals survive in the wild. The rooster announces to the world "I'm here, I'm here!!!" and when a dominant hen lays an egg, the whole flock announces: "I laid an egg, I laid an egg", "She laid an egg, She laid an egg." How DO they survive in the wild? Poor roosters! Locked up in a lab so that people can study such a thing. Instead of running this pretty picture of a rooster in nature, NatGeo should be honest and show us caged birds in a vivisection lab. These six scientists were snubbed for awards or robbed of credit for discoveries … because they were women. Scientists say they've learned why penguin wings, now used for swimming, no longer get the birds off the ground. A boulder-size meteor slammed into the moon in March, igniting an explosion so bright that anyone looking up at right moment might have spotted it.
<urn:uuid:a7063d92-98d7-42f8-aa18-adbe4570471d>
CC-MAIN-2013-20
http://news.nationalgeographic.com/news/2013/03/130318-rooster-crow-circadian-clock-science/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00039-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958288
1,383
3.375
3
Mysterious story about border overflying (Video) 10:52, — Politics Channel One (Russia) showed a report about the latest scandal in Belarus. Belarus is discussing a mysterious story about an unidentified flying object. Numerous eyewitnesses say they saw a small plane dropping teddy bears. The military, however, flatly deny this information branding all photos and videos a hoax, Channel One reports. The Local, a Swedish news portal, reports a plane with Swedish nationals intruded into Belarus's airspace on Wednesday morning, released a thousand of teddy bears with leaflets and returned to an aerodrome in Lithuania. Total PR agency claims it stands behind the operation. The agency's website published photos of teddy bears and leaflets fixed to them: “Free speech now”, “We support the Belarusian struggle for free speech”, “Teddy bears demand to respect human rights in Belarus”. Per Cromwell explains teddy bears were an allusion on a toy picket organized by Belarusian activists, who later were taken into custody for 10 days. Studio Total director says a part of teddy bears was released near the village of Ivyanets and the remaining part was dropped over Minsk. However, the organizers cannot show video or photo to prove they stuffed animals were dropped over the Belarusian capital. Eyewitnesses in Ivyanets report about the plane. “It made two circles and released black packets. It was a kind of a sporting aircraft,” Maria Hrabanava from Ivyanets says. The Ministry of Defence of Belarus denies the very fact of intrusion into the country's airspace. “The Ministry of Defence of Belarus is checking the information published by a number of Internet sources about an alleged unsanctioned flight of a foreign aircraft over Belarus. There are no facts that would prove border crossing in the air. Having examined the photo and video materials, experts identified poor-quality photoshop and video editing, which attests to a clearly provocative nature of the information,” the Belarusian Ministry of Defence says. The Lithuanian defence body confirms the fact of air intrusion into Belarus, but cannot say if it has links to the teddy bears assault. Specialists suppose it's possible that radars cannot detect a small plane flying nap-of-the-earth. The CIS countries defend their air border collectively, but the incident took place in the area of responsibility of Belarusian air defence forces. The incident resembles a story that happened 25 years ago, when 18-year-old Mathias Rust landed on Red Square in Moscow. No one knows how he managed to do this, but several Soviet military officials were fired. Write your comment (142)
<urn:uuid:a0825528-1407-42ef-b926-889177a51c99>
CC-MAIN-2013-20
http://charter97.org/en/news/2012/7/6/54733/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00029-ip-10-60-113-184.ec2.internal.warc.gz
en
0.950526
562
1.648438
2
Recently Nevada Power filed a complaint declaring 200 million dollars in damages to its reputation as a result of the failed energy giant Enron. Liquidation of Enron's assets are supposed to pay for the costs of creditors like Nevada Power, but as KNPR's Ky Plaskon reports it's some others who stand to profit immensely from Enron's bankruptcy. PLASKON: On the surface, the area of east Sahara, past U-S 95 is crumbling: Old strip malls, non-working gas pumps and tiny run-down wood houses. Yet it's the only place Enron considered viable for reinvesting some of the money it charged for electricity in Nevada. Cisco Systems Senior Account Manager Tim Boyle says the company was ahead of it's time when it constructed a block building there in 1998. BOYLE: Enron was the first I believe to realize that 'hey, these pipes are all in Nevada. PLASKON: The underground pipes he's talking about hold many tiny glass tubes known as fiber optic cables. In a rare confluence of high tech capacity these cables are the national backbone for up to 21 information technology companies from around the country. Enron built right on top of them. The building has connectivity to all of them, giving the building's tenants the capability to transfer vast amounts of data. For instance sending the entire Library of Congress anywhere in the world within minutes, streaming video to the whole state of California or delivering the nation's e-mail from one spot on East Sahara. The new owners of the Enron structure have a very bright future says Boyle. BOYLE: They actually have a unique opportunity in the entire market, possibly in the world. PLASKON: Connectivity to the Internet here may be rivaled by New York and Los Angeles he says, but Nevada's lack of natural or other disasters to date makes it a prime location for company's back-up data systems. Fortune 500 customers agree, virtually flocking to this plot of real estate on the spine of the information super highway. Mike Ballard of Switch Communications, the company that operates the building, knows the rent. BALLARD: I won't say what any one customer pays but typically to be in this area they will pay for a 10 square foot area about 3 thousand dollars a month and then for whatever band-with they use typically between 100- and 500 dollars a megabyte. PLASKON: The pipes are so big, customers are transferring not megabytes, but thousands of times that. Four Seasons has 3 terabytes of storage capacity here and is relocating it's data storage operation from Los Angeles because all the bandwidth in the building gives the operator the ability to broker connectivity and that makes it cheaper. KETCHUM: 50 percent less PLASKON: Russ Ketchum is Director of Information Technology for the Four Seasons Resort in Las Vegas. KETCHUM: They can offer every service that we had before and then some to every property here and that gives us a huge cost savings. PLASKON: The company's evaluated services around the world. With such demand, this former Enron building is expected to be full of paying customers by the end of the year. PLASKON: After just 18 months of operation the hum inside the building has grown to include the largest on-line shoe seller in the world, Zappos. Nevada Telephone connects 25 thousand customers through here. It's the origin of a Republican call generating system and UMC stores records here. One financial institution alone is using the facility to store 120-thousand e-mails an hour. The capabilities of this former Enron building are growing beyond its walls with a 55-thousand square foot expansion to be completed early next year. So, how did one person, Rob Roy at the age of just 29 get control of such a BALLARD: Luck is where opportunity meets preparation. Rob Roy is quite lucky because he was prepared when the opportunity came and it is just growing exponentially today. PLASKON: Switch Communications is protective of its reclusive majority shareholder and would only provide public relations guru Mike Ballard to speak on the record. Roy had already realized the opportunity in the area and started a similar facility in a strip mall nearby in 2000. Ballard says Roy simply bought the building at an Enron auction. BALLARD: What occurred is that several other companies should have bid on this facility, but at the time all of these companies were striving to not have happen what happened to Enron which is go bankrupt. And so more than 100 telecommunications companies went bankrupt. Every single one of those should have had an interest in this facility but they were all trying to keep themselves out of bankruptcy. PLASKON: It wasn't just an auction. It was a private auction to just Rob Roy say Enron attorneys. According to Enron's Broadband Services arm, which is still selling property, it marketed all its properties to 300 different information technology companies over three months, but the sales managers say no one except Roy saw any value in the Las Vegas Enron building. So it went to Roy for 930-thousand dollars two years ago. Normally such a sale would close right away, but Enron's attorneys said Roy needed time to find financing. GK Acquisitions - another property investment company - jumped on board two months later. In June the Arden Street Technology Partners bought in for 1.6 million dollars. And last month the building was sold to Tom Thomas of the Thomas and Mack Company for three million dollars, that's three times it's original sale price two years ago. Thomas now leases the property to operator Roy. He says it's quite a success story. THOMAS: Rob has had to slow down selling to national based tenants clients so we can expand services and the new building will give us the opportunity to locating their bandwidth opportunity to Las Vegas PLASKON: But sales of valuable assets like this are supposed to benefit 2-thousand 600 creditors, customers and investors that financed Enron's development of this infrastructure. Robert McCullah of McCullah Research gave the congressional testimony about Enron's trading practices that contributed to its eventual bankruptcy. Now he keeps track of the bankruptcy sales and says the bankruptcy has a pattern of valuable asset give-always. MCCULLAH: If you are wondering why the would sell an asset for one million that looks like it is worth three. That is the same question as to why you weld sell an asset for 3 billion when you could have got PLASKON: He points at an attempted sale of an Enron utility in Portland for billions below market value. While investors stand to profit immensely off the Energy giants carcass, creditors including Nevada Power are left searching for other ways to regain losses. Michael Yackira, Executive Vice President and Chief Financial officer of Nevada Power's parent company says the company is in line to get paid out of the sale of Enron's assets and it won't even come close to the costs. YACKIRA: The secured creditors get cents on the dollars as well so even if anything is left over after the secured creditors are paid then the unsecured creditors would get paid and we would be one of those and even if it was large dollar amounts that were owed, the amount that would be paid would be very, very PLASKON: So, in a complaint filed last week Nevada Power sued some of those secured creditors 8 banks, among them Citigroup, Barclays Bank and Chase for 200 million dollars in estimated damages from Enron. Meanwhile power customers who paid deeply for Enron's investments really have no recourse - only to hear about the success stories of a few entrepreneurs. Ky Plaskon, News 88-9 KNPR Add a comment here or send your comments to email@example.com
<urn:uuid:312e7146-d209-4d7b-ba70-da3cd43f2ea0>
CC-MAIN-2013-20
http://www.knpr.org/archive/detailNEW.cfm?FeatureID=1695
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00074-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956417
1,677
1.898438
2
A variety of factors work in unison to cause foot problems in people with diabetes. These mainly involve poor circulation and nerve disease (neuropathy). Neuropathy affects your ability to feel pain or discomfort in your feet, making you more susceptible to extensive injury-related damage. Also, diabetes can impair your ability to heal by both damaging your immune system and decreasing the blood flow in your legs. This can lead to bone and joint deformities, such as Diabetes can also affect your vision, making it harder for you to notice sores or injuries to your feet. You may not notice an injury or infection until your condition is so serious that you require surgery, possibly removal (amputation) of your foot and even part of your leg. Risk factors for developing foot ulcers Age. Risks increase with age. Gender. Males are at higher risk. Race. African Americans, Hispanic Americans, and Native Americans are at higher risk. Duration of diabetes. The longer you have diabetes, the greater your Other complications from diabetes (small blood vessel atherosclerosis of large blood vessels). glucose control. Having blood sugar levels above a target blood sugar range over time speeds up the damage to blood vessels and nerves. contributes to blood flow problems in your extremities. Primary Medical Reviewer John Pope, MD - Pediatrics Specialist Medical Reviewer David C.W. Lau, MD, PhD, FRCPC - Endocrinology November 2, 2010 WebMD Medical Reference from Healthwise November 02, 2010 This information is not intended to replace the advice of a doctor. Healthwise disclaims any liability for the decisions you make based on this Get the latest Diabetes newsletter delivered to your inbox! Your level is currently If the level is below 70 and you are experiencing symptoms such as shaking, sweating or difficulty thinking, you will need to raise the number immediately. A quick solution is to eat a few pieces of hard candy or 1 tablespoon of sugar or honey. Recheck your numbers again in 15 minutes to see if the number has gone up. If not, repeat the steps above or call your doctor. People who experience hypoglycemia several times in a week should call their health care provider. It's important to monitor your levels each day so you can make sure your numbers are within the range. If you are pregnant always consult with your health care provider. Congratulations on taking steps to manage your health. However, it's important to continue to track your numbers so that you can make lifestyle changes if needed. If you are pregnant always consult with your physician. Your level is high if this reading was taken before eating. Aim for 70-130 before meals and less than 180 two hours after meals. Even if your number is high, it's not too late for you to take control of your health and lower your blood sugar. One of the first steps is to monitor your levels each day. If you are pregnant always consult with your physician. Thank you for signing up for the WebMD Diabetes Newsletter! You'll find tips and tricks as well as the latest news and research on Diabetes. Did You Know Your Lifestyle Choices Affect Your Blood Sugar? Use the Blood Glucose Tracker to monitor how well you manage your blood sugar over time.
<urn:uuid:d9ffe7b7-56cc-4676-af5a-b755ed099036>
CC-MAIN-2013-20
http://diabetes.webmd.com/risk-factors-for-diabetic-foot-problems
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00037-ip-10-60-113-184.ec2.internal.warc.gz
en
0.91375
708
2.78125
3
College of Education & Professional Studies Welcome to the EIU College of Education & Professional Studies. We have a proud history of inspiring students to dream bigger and acquire the knowledge and skills to help individuals meet their fitness goals, enjoy their leisure time, lead schools, and help individuals and groups in crisis. Through our focus on field-based experiences, our students learn from our partners – P-12 schools, business, and industry to blend classroom theory with the challenges of real-life situations. No longer do we see classrooms with blackboards; students now use SmartBoard technologies every day. The internet has become a source of information, a major communication tool, and an important component in the teaching and learning environment. Study abroad/study away experiences and service to professional organizations are opportunities that we provide our students to broaden their understanding of their professions - and the world. Through these opportunities, students build a college career that takes them where they’ve only dreamed before – to a career where touching others’ lives is an everyday occurrence. Please feel free to contact us for additional information about our outstanding programs. Diane H. Jackman, Ph.D. Dean, College of Education & Professional Studies CEPS Departments and Offices - Counseling and Student Development - Early Childhood, Elementary and Middle-Level, Education - Educational Leadership - Health Studies - Instructional Technology Center - Grant Information - Kinesiology and Sports Studies - Recreation Administration - Secondary Education & Foundations - Special Education - Student Teaching
<urn:uuid:4d366404-0583-4255-8742-ff18a28f394c>
CC-MAIN-2013-20
http://www.eiu.edu/ceps/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00060-ip-10-60-113-184.ec2.internal.warc.gz
en
0.929546
315
1.53125
2
Yang Guang feeds on bamboo as he bulks up for the breeding season with partner Tian Tian on February 20, 2013 in Edinburgh, Scotland. (Jeff J Mitchell/Getty Images) (NBC) -- Who wouldn't want to fly across the world and spend a week with giant pandas? They are undeniably cute. Everyone is obsessed with those black and white fuzzy faces. We celebrate when one is born at a zoo. We know their names. We'll watch a YouTube video of them over and over again. This one, which shows a baby panda sneezing, has more than 150 million hits. I dare you not to click the link. For this story, we traveled to Chengdu, China, a city of 14 million people. It's the capital of the Sichuan province in southwest China. Chengdu is known for spicy Sichuan chili dishes that make your tongue go numb, but also for being the hometown of the giant panda. Back in 1987, when it became apparent that pandas were seriously endangered in the wild, the Chinese created the Chengdu Research Base of Giant Panda Breeding. Starting with just six pandas from the wild, they've successfully bred more than 100 pandas. WATCH | 'Rock Center with Brian Williams' airs Friday at 10 pm on 11Alive Here, female pandas are monitored constantly to pinpoint the one day of the year - or the few hours -- when they'll be able to conceive. They are typically artificially inseminated. Test tubes of panda sperm are kept in vats of liquid nitrogen. Mothers stay with their babies for a while but they're eventually put back on the breeding program so the cycle can start again. Sarah Bexell, an American who has worked at Chengdu for 13 years, says the lives of the staff revolve around the fertility cycle of the female pandas. "When our cubs are about to arrive, some of our staff live there 24-7," she said. The cubs I saw on this visit were four months old and just learning to walk. Their fur was soft as silk. Too much for one species? The work done at Chengdu and other breeding centers costs millions of dollars a year. Experts believe more money is probably being spent to save the giant panda than any other species in the world. But is that a good idea? While this may sound like heresy to panda lovers, is it possible that we're spending too much to save the giant panda? "I think we have to make tough choices," British wildlife expert, Chris Packham, said. "I think that, ultimately, we have to be pragmatic as well as sentimental. You know, we can't allow our heart to rule our conservation head... And if we channel this much into just one species, then many others, which could be far better helped, many other not just species, but communities and ecosystems, could be better protected at the expense of one fluffy, cuddly bear." Packham is in the minority here, but a growing number of scientists agree. Bexell and her colleagues at Chengdu's breeding center are not among them. They firmly believe the panda is worth saving. And they worry that without the panda as a symbol for the conservation movement, people might not give any money to saving any species at all. "Where would that money go? Maybe people would go and buy a new iPod instead. You know, instead of throwing that money towards conservation," Bexell said. Humans pushed giant pandas to the brink of extinction, Bexell said, and it is up to us to find a way to save them. "I think pandas are symbolic. We all love them. We all want to share the earth with them. And if we truly cannot save space for giant pandas, what does that say about us as a species? And how could we ever have hope for any of the others if we can't save the one that we profess to love the most?" Watch Kate Snow's full report, "Are giant pandas worth saving?" on "Rock Center with Brian Williams" Friday night at 10 pm on 11Alive.
<urn:uuid:e2156c68-c442-49a0-a61d-0958e6861d60>
CC-MAIN-2013-20
http://www.11alive.com/news/article/278810/166/ROCK-CENTER--Are-giant-pandas-worth-saving
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970774
865
2.609375
3
Find information on common issues. Ask questions and find answers from other users. Suggest a new site feature or improvement. Check on status of your tickets. Nanomaterials is a field that takes a materials science-based approach to nanotechnology. It studies materials with morphological features on the nanoscale, and especially those that have special properties stemming from their nanoscale dimensions. Nanoscale is usually defined as smaller than a one tenth of a micrometer in at least one dimension, though this term is sometimes also used for materials smaller than one micrometer. Learn more about quantum dots from the many resources on this site, listed below. More information on Nanomaterials can be found here. Introduction to VEDA: Virtual Environment for Dynamic AFM Ranking is calculated from a formula comprised of user reviews and usage data. Learn more › 26 Sep 2007 | Teaching Materials | Contributor(s): Arvind Raman This resource has become outdated and has been retired by agreement with the author. Please see the VEDA tool page and supporting documents for current information regarding the VEDA Tool. This … nanoHUB.org, a resource for nanoscience and nanotechnology, is supported by the National Science Foundation and other funding agencies.
<urn:uuid:71effb4f-4da8-431d-bf11-14f4529fd89e>
CC-MAIN-2013-20
http://nanohub.org/tags/nanomaterials/teachingmaterials?sort=date
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00053-ip-10-60-113-184.ec2.internal.warc.gz
en
0.919049
268
3.15625
3
The tomato was one of the first commercially available genetically modified (GM) crops. In 1994, GM tomatoes hit the market in the US but have since disappeared. They’re about to make a come back at a grocery near you. Earlier forms of this GM crop included the transgenic tomato (FlavrSavr) which had a “deactivated” gene. This meant that the tomato plant was no longer able to produce polygalacturonase, an enzyme involved in fruit softening. The premise was that tomatoes could be left to ripen on the vine and still have a long shelf life, thus allowing them to develop their full flavour. Normally, tomatoes are picked well before they are ripe and are then ripened artificially. These GM tomatoes, however, did not meet their expectations. Although they were approved in the US and several other countries, tomatoes with delayed ripening have disappeared from the market after peaking in 1998. Today, tomatoes are being genetically modified to produce a peptide that mimics the actions of HDL cholesterol that biotechnology groups are promoting to supposedly reduce heart disease. Led by Dr Alan Fogelman from the University of California, Los Angeles (UCLA), USA, his study found that consumption of GM tomatoes resulted in reductions of plaque build-up in arteries (atherosclerosis). “To our knowledge this is the first example of a drug with these properties that has been produced in an edible plant and is biologically active when fed without any isolation or purification,” said Fogelman. The rollout into major grocery retailers is expected, however no timeline has been established until more research is completed. The UCLA team genetically engineered tomatoes to produce 6F — a small peptide that mimics the action of ApoA-1, which is the main protein of high density lipoprotein (HDL) or ‘good’ cholesterol. Fogelman and his team fed the tomatoes to mice that lack the ability to remove low density lipoprotein (LDL) or cholesterol from their blood, and therefore develop inflammation and atherosclerosis when consuming a high-fat diet. Similar gene modification techniques were devised in GM crops that led to tumors in a long-term widely publicized study on GM corn fed rats. “The problem remains as with all GM techniques, that we simply don’t know what the long-term effects of consuming such foods will be since short-term studies can never tell us,” said researcher and geneticist Professor Thomas Tranter. There are many other biotech projects aiming to enrich tomatoes with substances that may offer health benefits which claim to be more nutritious, however no human or long-term studies are planned to discover their effects on metabolism. Monsanto developed tomatoes that delayed ripening by preventing the production of ethylene, a hormone that triggers ripening of fruit. Although the tomatoes were briefly tested in the marketplace, patent arguments forced its withdrawal. Tomatoes (along with potatoes, bananas and other plants) are also being investigated as vehicles for delivering edible vaccines. Clinical trials have been conducted on mice using tomatoes that stimulate antibody production targeted to norovirus, hepatitis B, rabies, HIV and anthrax. Korean scientists are looking at using the tomato to expressing a vaccine against Alzheimer’s disease. Hilary Koprowski, who was involved in the development of the polio vaccine, is leading a group of researchers in developing a tomato expressing a recombinant vaccine to SARS. Although GM foods can only be planted in many countries as part of a trial, and even then only under strict conditions, millions of hectares of the crops have already been planted in the Americas. Campaigners have warned that there is no compulsory labelling of meat or dairy products from animals which have been fed on GM crops, and that any long-term problems from eating the foods is still unknown. April McCarthy is a community journalist playing an active role reporting and analyzing world events to advance our health and eco-friendly initiatives. Find out more at: Prevent Disease
<urn:uuid:2be2b4d2-03fb-46b2-9c48-27714930f9ee>
CC-MAIN-2013-20
http://myscienceacademy.org/2012/11/09/new-varieties-of-genetically-modified-tomatoes-coming-soon-to-a-grocery-near-you/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00017-ip-10-60-113-184.ec2.internal.warc.gz
en
0.963484
831
3.234375
3
Anaheim, Asbjom. and Berkhout, Frans. and McEvoy, Darryn. (2008) Adaptation to Climate Change: Why is it needed and how can it be implemented? CEPS Policy Briefs. No. 161, 4 June 2008. [Policy Paper] This is the 3rd study to be published in the CEPS Policy Brief series from ongoing research being carried out for the EU-funded ADAM project (ADaptation And Mitigation strategies: supporting European climate policy). Following an introduction to the aims and objectives of the ADAM project, section 2 sets out the rationales for public policy related to adaptation to the impacts of climatic change in the EU. Section 3 provides evidence from a number of stakeholders and sketches the perception of various actors towards the role of European adaptation policies and climate proofing of sectoral policies. Section 4 on the economics of adaptation argues that the economic impacts of climate change will mainly be reduced by private and autonomous response, while principal challenges are with adaptation needs that require collective action and public engagement, including public finance. Section 5 assesses monetary and socioeconomic risks from extreme weather events in Europe and points to the evidence of rising losses due to weather extremes whilst important knowledge gaps remain to project future risks. And the final section (6) deals with different concepts of uncertainties surrounding climate change and climate variability, and argues for adaptive measures to be sufficiently flexible to allow recalibration as uncertainties are reduced with time. |Social Networking:|| | Actions (login required)
<urn:uuid:bb40e808-eba5-42de-949f-084af40ce334>
CC-MAIN-2013-20
http://aei.pitt.edu/9391/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703298047/warc/CC-MAIN-20130516112138-00021-ip-10-60-113-184.ec2.internal.warc.gz
en
0.921353
314
2.703125
3
June report gives a pulse on pricing for factory-made goods. But it's not expected to inflate the overall CPI. Prices on manufactured goods rose by a slight 0.1 percent in June after two months of declines, the U.S. Department of Labor announced Friday in its Producer Price Index report. Excluding the more volatile energy and food sectors, price tags on finished goods -- such as light motor trucks, home appliances and pet foods -- rose 0.2 percent in June after dropping 1.0 percent in May and 0.2 percent in April. The price of finished goods is a key and "closely watched" economic measure. But the June report is not expected to inflate the overall consumer price index, which is much broader and includes rents and services, said Josh Bivens, research director of the Economic Policy Institute in Washington, D.C. "Today, the producer price index is a very small part of what shows up in the overall consumer price index," Bivens said. "Most of the stuff we consume today is not part of the producer price index." Still the producer price index gives a pulse on pricing for factory-made goods. While overall factory prices rose just 0.1 percent in June, finished consumer foods rose 0.5 percent in June, marking the biggest jump since November's rise of 1.0 percent. In contrast, energy prices fell 0.9 percent in June. It was the fourth consecutive month that energy prices fell, bringing relief to drivers, homeowners and companies alike. Unfinished components and supplies sold to manufacturers saw prices slide 0.5 percent in June to create the third consecutive month of declines. Partially processed foods and feed rose 1.0 percent in June, which marked the biggest jump since August reported a gain of 1.4 percent. An uptick in processing costs for animal food was largely responsible for June's growth, Labor Department officials said. Goods classified as raw or crude fell 3.6 percent during the month, largely thanks to a drop in crude energy prices. For the past three months, all crude prices fell 10.8 percent. Bivens noted that "the weak economy will put a lot of downward pressure on prices until we see much bigger growth. The weak economy means that manufacturers don't have a lot of new customers coming in the door." Dee DePass • 612-673-7725
<urn:uuid:fe69aa2c-6787-43c6-8b03-9d6e840da69b>
CC-MAIN-2013-20
http://www.startribune.com/business/162433096.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00053-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958605
495
1.671875
2
Electronics are complex devices which are made of a wide variety of material constituents. Some of the constituents, such as lead, nickel, cadmium, and mercury, could pose risks to human health or the environment if mismanaged at their end-of-life. EPA is very concerned about ensuring the proper management of used electronics and has undertaken important work to increase the collection and responsible recycling of used electronics. As for managing electronics disposed in the US in landfills, we believe that disposal of electronics in properly managed municipal solid waste landfills does not threaten human health and the environment. The results of landfill leachate studies, suggest that currently allowed disposal of electronics — including those containing heavy metals — in modern municipal solid waste landfills are protective of human health and the environment. However, we strongly support keeping used electronics out of landfills, to recover materials and reduce the environmental impacts and energy demands from mining and manufacturing. Electronics are made from valuable resources, such as precious metals, copper, and engineered plastics, all of which require considerable energy to process and manufacture. Recycling electronics recovers valuable materials and as a result, we reduce greenhouse gas emissions, reduce pollution, save energy, and save resources by extracting fewer raw materials from the earth. *DISCLAIMER*: The information contained in or provided through this site section is intended for general consumer understanding and education only and is not intended to be and is not a substitute for professional advice. Use of this site section and any information contained on or provided through this site section is at your own risk and any information contained on or provided through this site section is provided on an "as is" basis without any representations or warranties.
<urn:uuid:969edc7a-e55b-4c3b-9918-d48836260cd6>
CC-MAIN-2013-20
http://www.cbs8.com/story/6619992/why-recycle-electronics
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00033-ip-10-60-113-184.ec2.internal.warc.gz
en
0.9377
347
3.109375
3
Getting into the swing of things Now that you are comfortable with the idea of integrating PHP directly with your other tools, I want to look at the CLI SAPI streams that are opened for use in all CLI scripts. Owing to the fact that it is very common to use stdin , stdout , and stderr inside shell scripts, the process of opening and closing streams to access these has now been automated through the use of the constants STDIN, STDOUT, and STDERR respectively. These constants, when combined with basic I/O functions like fgets() and fputs(), allow you to easily read and write to the console. fputs() writes to a given stream, and takes two parameters: the stream to write to and the string it should write. It also takes an optional third parameter that is the length of the string to write, but this can be omitted if you wish to write the entire string. It is opposite, fgets(), reads data in from a stream, and takes one parameter: the stream it should read data from. It also has an optional length parameter, to specify how much data should be read. If you do not specify this parameter, the length defaults to 1024 bytes. The return value of fgets() is the string that was read in from the stream. The concept of streams, which is relatively new in PHP, is a unified approach to handling files, pipes, sockets, and other I/O resources. What this means for us as developers is that fputs() and fgets() can read from and write to files, HTTP connections, or the console - all using the same command. Here is an example script to demonstrate fputs() and fgets() in use for working with the console: fputs(STDOUT, "\nThe Amazing Favourite Colour Script\n"); fputs(STDOUT, "What is your favourite colour? "); $sometext = strtolower(trim(fgets(STDIN, 256))); fputs(STDOUT, "Your favourite colour is $sometext!\n\n"); As you can see, the script makes extensive use of fputs to output data to STDOUT. This may seem merely like a trickier way of writing using print(), but it is much more flexible because one could use STDERR in place of STDOUT and redirect error output to a specific place. The only part of the script which might confuse you at first is the call to fgets(). In the example, we read from STDIN in order to allow the user to enter up to 256 bytes of text. This input is then passed through trim() and then strtolower() before it is placed into the $sometext variable. The trim() function is used here because if users do not wish to enter the full 256 bytes of information, they can terminate their input by hitting Return. If their input is not sent through trim() first, their string is stored in $sometext with the extra \n (new line) intact. The last line of the script outputs our user's string back to the screen, to complete the circle. Reading and writing data inside the console is quite straightforward, as the above example shows. Save the script as cli3.php and try editing it a little yourself in order to get a good grasp of how it works - be sure to try redirecting different parts of the output, as this is one of the best ways to take advantage of the STD* constants. Next chapter: Sending code direct to PHP >> Previous chapter: Getting down and dirty Home: Table of Contents
<urn:uuid:5f3bf0da-50f1-48c8-a194-3ee45a65eaff>
CC-MAIN-2013-20
http://www.tuxradar.com/practicalphp/21/2/6
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00052-ip-10-60-113-184.ec2.internal.warc.gz
en
0.903747
756
2.71875
3
WASHINGTON — NASA said Monday there is a good chance SpaceX will soon become the first private company to attempt to launch its spacecraft to the International Space Station on an unmanned cargo mission. “Everything looks good as we head toward the April 30 launch date,” said Bill Gerstenmaier, NASA associate administrator for Human Exploration and Operations, but cautioned more work remains before the launch can be finalized. “There is a good chance to make the 30th,” said Gerstenmaier, adding that a final decision is expected by April 23. The main goals of SpaceX’s flight include a fly-by of the ISS and a berthing operation in which the company’s reusable space craft, the Dragon, will approach the ISS and the crew aboard the orbiting outpost will use the ISS robotic arm to help it latch on. The gumdrop-shaped Dragon capsule will carry 521 kilograms of cargo for the space lab and will also aim to return a 660 kg load to Earth, said Michael Suffredini, International Space Station program manager. Suffredini added that the remaining work includes some verification procedures and coordination of hardware and software, in what he described as “the last little bit of testing.” “We will review those and assuming everything is fine… we will go ahead for the launch,” he said. SpaceX — owned by Internet entrepreneur and PayPal co-founder Elon Musk — made history with its Dragon launch in December 2010, becoming the first commercial outfit to send a spacecraft into orbit and back. The Dragon capsule will have to go through the same maneuvers that Japanese and European cargo ships have had to demonstrate in the past, such as orchestrating a fly-by of the space station no closer than than 2.5 km. Then there is the complicated matter of latching on to the space station, which Musk described as moving faster than a speeding bullet. “I think it is important to appreciate that this is pretty tricky,” Musk told reporters. “The public out there, they may not realize that the space station is zooming around the Earth every 90 minutes, and it is going 17,000 miles (27,000 kilometers) an hour,” he added. “So you have got to launch up there and you’ve got to rendezvous and be backing into the space station within inches really, and this is something that is going 12 times faster than the bullet from an assault rifle. So it’s hard.” Musk voiced cautious optimism that the attempt would work, noting that the company has launched the Falcon 9 rocket twice before and successfully sent its Dragon capsule into orbit and back once. “I think we have a got a pretty good shot but it is worth emphasizing that there is a lot that can go wrong on a mission like this,” Musk said. If this attempt does not work out, SpaceX will try again, he said. SpaceX and several other companies are competing to be the first to operate a private capsule that could tote astronauts and cargo to the ISS, after NASA retired its shuttle program last year leaving Russia as the world’s sole space taxi for astronauts. Other companies in the private space race include aerospace giant Boeing, the Nevada-based Sierra Nevada Corporation, and Washington state-based BlueOrigin LLC. Powered by WordPress.com VIP
<urn:uuid:c2398c79-ca47-48a8-afb2-f756c8fcd7d4>
CC-MAIN-2013-20
http://news.nationalpost.com/2012/04/16/spacex-to-become-to-launch-first-private-spacecraft-to-international-space-station/?utm_source=dlvr.it&utm_medium=twitter
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703298047/warc/CC-MAIN-20130516112138-00042-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958397
703
2.46875
2
OVER 50 people took ill after taking part in an open water swimming event at Strathclyde Loch. They suffered sickness, stomach cramps and diarrhoea following the race which attracted 70 entrants from across Scotland. None of those affected are thought to have been hospitalised, however, the loch has now been closed to water sports and boating. The next major event at the loch – to be used in 2014 to stage the Commonwealth Games triathlon – is the Great Scottish Swim on August 25. Some of those who fell sick tested positive for norovirus, better known as the winter vomiting bug. Experts believe heavy rain prior to the event may have contaminated the water. A Motherwell Masters Amateur Swimming Club source said six members of their club took part and were “very ill.” They had to seek medical advice following the event and some were off work for a week, she added. The event, the Western Districts Open Water Swimming Championships, took place on June 23. Adults and juniors took part in races of up to 4000 metres. Organisers had laid on a 1000-metre novices event, for those aged 12 years plus who had not tried the sport before. Juniors aged 13 to 16 years raced over 2000 metres. A spokesman for NHS Lanarkshire said of the 70 people who took part in the event, 57 became unwell. They suffered gastroenteritis and reported symptoms of abdominal cramps, nausea, vomiting and diarrhoea. Symptoms started on June 24 and June 25 and “tended to resolve after 24 to 36 hours”, explained the spokesman. Norovirus – the UK’s most common stomach bug – has been identified from samples from five race participants. A dozen of those taking part in the race were from Lanarkshire. The spokesman added: “All participants from the event were contacted and given health advice and information about how to prevent further spread of infection. No-one who became ill is known to have required admission to hospital.” The outbreak was discussed on June 26 at a meeting attended by representatives of NHS Lanarkshire, North Lanarkshire Council, the Scottish Environment Protection Agency, Scottish Water and Health Protection Scotland. Experts believe illness among participants could be linked to heavy rainfall between June 21 and June 23. Council officials say the loch’s water was tested on June 11 and June 21. Both tests showed the water was “well within acceptable open water swimming guidelines”. A North Lanarkshire Council spokesman said all water sports, including boating as well as water ski-ing and windsurfing, have been suspended. She continued : “We are working with NHS Lanarkshire and others to monitor water conditions and will publish on our website updates about activities on the loch, as they become available.” The Great Scottish Swim is set for August 25. A spokesman for Scottish Swimming said all their open water events are subject to water quality checks. He continued: “Strathclyde Park Loch is subject to a strict and regular water quality checking regime and we had access to enhanced levels of information for this event. “None of the reports from the tests carried out before the event indicated that there was any reason to cancel it. “Despite all the available reports prior to the event returning results well within our parameters, we still experienced a high level of illness.” The spokesman added: “We are confident what we faced at Strathclyde was an extremely rare occurrence which hasn’t previously been experienced in Scottish Open Water swimming.” It is not the first time there have been problems with open water swim events at the loch. Blue green algae growth caused the cancellation of the Great Scottish Swim in August, 2010. Last summer algae growth put a stop to water sports activities at the loch.
<urn:uuid:831f5b92-96b7-4631-a228-14d48d3916e8>
CC-MAIN-2013-20
http://www.wishawpress.co.uk/wishaw-news/local-wishaw-news/wishaw-news/2012/07/18/strathclyde-loch-closed-after-norovirus-stomach-bug-outbreak-76495-31413019/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00032-ip-10-60-113-184.ec2.internal.warc.gz
en
0.980637
815
2.140625
2
A record 8 million people with HIV in poor countries were receiving potentially life-saving treatment last year and new infections among children are dropping steadily, the United Nations said Wednesday, in an encouraging report on the AIDS epidemic. The report comes days before the world's largest AIDS conference opens in the nation's capital with the goal of finally "turning the tide" on the epidemic, citing research that's possible to dramatically stem the spread of the HIV virus. "The world deserves no less than a future of zero new HIV infections, zero discrimination and zero AIDS-related deaths," Michel Sidibe, executive director of UNAIDS, the Joint United Nations Program on HIV and AIDS, wrote in Wednesday's report. The world is nowhere near that ideal yet: Some 34.2 million people are living with the AIDS virus globally, including 2.5 million who became infected last year. And 1.7 million died in 2011. New infections and deaths dropped slightly last year. But the report found progress toward some interim goals. More than 8 million people with HIV in poor and middle-income countries received AIDS medications last year, up from 6.6 million in 2010, said the report from UNAIDS, the United Nations program on HIV and AIDS. At that rate, the world should meet a U.N. goal of having 15 million people in those countries on treatment by 2015, the report found. Increasing access to treatment doesn't just save the lives of people living with HIV. New research shows that treating them early so they stay healthy also makes them far less likely to infect others, a strategy called "treatment as prevention." "We need to get that number up as rapidly as possible," said Chris Collins of amFAR, the Foundation for AIDS Research, who called the 2011 treatment increase unexpectedly high. "If we can get to scale with AIDS treatment, we're not only saving lives but we're preventing infection and beginning to end this epidemic." Another key goal: To nearly eliminate new HIV infections among children by 2015, including transmission during pregnancy. About 330,000 children were newly infected in 2011, a 24 percent drop since 2009, the report found. Nearly 60 percent of the 1.5 million pregnant women living with HIV in poor countries received effective anti-AIDS medications last year, to lower their chances of infecting their babies. The Associated Press
<urn:uuid:24d2f345-901f-455b-94bf-7eefe52ccb73>
CC-MAIN-2013-20
http://www.utsandiego.com/news/2012/jul/18/un-some-progress-against-hiv-in-poor-countries/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00064-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970511
482
2.96875
3
The strike hit three minibuses that were driving down a major road in the mountainous province. There were 42 people in the vehicles, all civilians, Bashary said. "We are extremely saddened by the tragic loss of innocent lives," NATO commander Gen. Stanley McChrystal said. McChrystal also sent along his regrets six days ago when 12 civilians including 6 children were killed by two NATO-fired rockets which missed their intended target by 300 meters, and still more regrets the following day for five more civilians killed in another NATO airstrike. McClatchy's reports that Operation Mushtarak (translation : Operation Together) is all just "a trial run" for "the next big combat mission" in Kandahar this summer, described by ISAF officials as "the big prize for both the Taliban and the coalition": "Coalition officers describe the Marjah operation, now into its second week, as a "confidence builder" for Kandahar now that extra troops for Afghanistan have been committed." And what is the point of this "confidence builder" for "the big prize" again? Journalist and historian Gareth Porter at The Real News Network : "In my view this offensive has to be viewed as more of an effort to shape public opinion in the United States than to shape the politics of the future of Afghanistan."It's propaganda, explains Porter, to sell the American people on the idea that when the inevitable negotiations with the Taliban for US withdrawal are held in 16 to 18 months, it will look at home as if the US is negotiating from a position of strength. Saving face - that's what all these civilians and soldiers are dying for now.
<urn:uuid:f789f8e1-446f-491e-9930-301ac7641a7e>
CC-MAIN-2013-20
http://creekside1.blogspot.com/2010/02/another-nato-airstrike-another-21-dead.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00027-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97357
344
1.929688
2
R4 3DS is also called R4i-SDHC 3DS card, it is made by famous r4i-sdhc.com. R4 3DS is one of the most popular flashcard for Nintendo 3DS console. Thousands of players are useing it to play games, watch TV, listen music, read E-book....... Comparing with other flashcards, R4 3DS card has it's own features: it supports WiFi update, it offers better compatibility, it is more steady in game speed and quality, it support latest Nintendo games.... and so on. How ever, R4 3DS is actually an advanced DSi card, it can only run DSi games on Nintendo 3DS console, but can't run 3DS games. Currently, all Nintendo consoles can use this R4 3DS card: Nintendo 3DS V2.1.0-4U, 3DS V2.1.0-4E and below version. Nintendo DSi / DSiXL / DSiLL V1.4.3, V1.4.2, V1.4.1 and below version. Nintendo DS and DS lite. It depends on the size of games. The unzipped files of R4i V1.46b kernel is about 50MB, so it need about 100 MB space to run the R4 3DS Kernel. The left (about 1.9GB) space is for game loading. If the game size is 100MB, you can put about 19 games into the MicroSD card for play. For other larger size games, mostly, you can put 4 to 10 games into the 2GB MicroSD card for play. * 1 X R4 3DS card from r4i-sdhc.com * 1 X 2GB Kingston Memory card. * 1 X USB reader * 1 X Hard protective case Posted by norsinild on 12th Nov 2011 How do you play Barcelona in this year? Posted by tom on 25th Oct 2011 I want to play super mario, Pokemon and other classic Nintendo games. About how many games can I play on a 2GB kingston card? Is it enough for a new play? Choose a currency below to display product prices in the selected currency.
<urn:uuid:6ee779de-4734-436d-b337-dc2b6870e03c>
CC-MAIN-2013-20
http://www.r43ds.net/products/R4-3DS-with-2GB-Kingston-MicroSD-card.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698207393/warc/CC-MAIN-20130516095647-00067-ip-10-60-113-184.ec2.internal.warc.gz
en
0.911833
477
1.726563
2
The Prague State Opera House was built in 1888 and was originally called the German Theater; the German artists of Prague had been performing in the Estates Theater, alternating with the Czech company, and wished for their own theater. The theater, designed by the Vienna duo Fellner and Hellmer with Karl Hasenauer and the Czech, Alfons Wertmuller, premiered on January 5th with the performance The Mastersingers of Nurnberg by Wagner and the theater was hailed as one of the most beautiful German theaters in Europe. With the rich ornate neo Rococo decor in the interior, one can only say that that statement is absolutely true. When you enter the theater, you feel as though you have entered a scrolling golden dream floating through the white gilded foyer, continuing through the corridors to the spacious ornate auditorium with the massive gold chandelier and painted ceilings. The dramatic usage of white and gold together with blood red velvet is effective, emotional and simply put, gorgeous. While you are visiting this golden dream take a second to contemplate the complex history of this building; from Gustav Mahler and Richard Strauss directing in this gilded palace, to the Communist regime, where opera was thought too elitist, so this gem of a building fell into a dilapidated state. Luckily the theater has been lovingly and meticulously restored to its former glory, this is truly a grand historic venue. Address: Legerova 75, Praha 1, +420 296 117 111, www.opera.cz Prague-Stay.com will assist you in planning your authentic visit to this lively city and steer you away from numerous 'tourist traps' that sadly exist in this eccentric capital.more information
<urn:uuid:311caa58-94fc-4e69-8e58-f88f7509b3ff>
CC-MAIN-2013-20
http://prague-stay.com/lifestyle/review/167-interior-of-the-state-opera-house/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00003-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956697
350
1.992188
2
Learn How To Play The Ukulele Today The Ukulele is fast becoming the most sought out and popular instrument to learn how to play, mainly because it is relativity easy to do so and a beautiful instrument to learn. With the grown popularity of the instrument amongst celebrities from Busta Rhymes, W.H.Macy and Will Smith to name but a few, the rise on Ukuleles been purchased and played is phenomenal. Whether are not you know how to play, want to know how, a novice or want to improve, finding the right training programme is vital to your progress. Thanks to the celebrity entertainer Nick Night aka. “Beatnik”, from the popular speak ukulele website, has developed an excellent easy to learn music course called Speak Ukulele 2- Breakthrough Interactive Course! ====) What Is This Ukulele Music Course? This music course is based on the simple fact that music is a language and is broking down in to 3 levels, Beginner, Advanced and Expert. It teaches you to - Read sheet music - Learn over a 168 chords and play them from memory. - Access to hundreds of hours of hands-on instruction and interactive quizzes. - Learn the name of chords and how to use finger position - A special feature to learn to play from ear. - Create your own unique lesson plans and quizzes. Beatnik has developed an excellent unique, easy to use music course unlike anything on the internet. People are taking to this instrument like a sugar addict to a creamy cake. Also the fact that an Ukulele is pretty cheap to buy compared to other instruments, but for something so small, the sound you would agree is quite amazing and beautiful. The Speak Ukulele Music Course is a great training programme and for less than half the price of one Ukulele lesson is invaluable and a great investment. This course will dramatically improve your chord retention and with the reviews Nicks music programme has received, is truly a must have for any Ukulele enthusiast. Why Is The Ukulele So Popular? In recent years the popularity of the Ukulele has shot through the roof. I on one hand was just another affiliate who came across this music software product, but, in doing my research, learning all about the Ukulele I fell in love with it and now using Beatniks Music Software to learn how to play and can’t believe I am doing so, since I had never picked up a Ukulele before, but that is a great thing about promoting great products and using them your self, you can really give a proper review on the product in hand and It is great to say that this is a true great product and it has also introduced me to the creator and great decent man, Beatnik. When Israel “IZ” Kamakawiwoʻole-As “Somewhere Over The Rainbow” song was released, that beautiful version it became a huge hit and sparked a great interest in Ukuleles. Now, it is the instrument to be seen with. Just check out Youtube and see just how many people are taking up this instrument and especially Ukulele Boy and his 43 million hits. Celebrities are bracing Ukuleles left right and center. Just look at how popular Eddie Vedder is making the instrument. His new Ukulele Songs Album is becoming an Instant hit and as I now own a copy I can easily see why. Stars like Steve Martin, Kate Micucci, Adam Sandler, Bob Dylan, Bruce Springsteen, George Harrison, Kurt Cobain, Mike Myers and on and on the list is endless in fact you can go check out a great list of Ukulele Celebrities here. With all these celebs playing the Ukulele, tons of people are becoming interested in wanting to learn how to play a Ukulele and a lot are turning to the internet (which is why Beatnik’s software has become so popular) and as the Ukulele is pretty easy to learn and very cheap to buy, Ukuleles are every where, which is great as I am now a convert to this wonderful little fella. Getting Help To Play As you can see, this site was initially set up to promote Beatniks Speak Ukulele music software and has now developed in to a Ukulele shrine that would not be here if it Beatniks amazing software did not exist. On this site now you can find helpful articles (to the right) videos and interesting articles on the Blog and also you can see the Interviews with beatnik here. There are other sites that may help you learn to play but only as you have learned the basics and developed some skills, sites such as Ukulele Underground, Live Ukulele, Humbler Uker Ramblings, Ukulele Hunt are all sites that are great to visit. If you have children, check out the article how to play a Ukulele for children here, using Beatniks software with children is very easy and has helped a lot of children develop great Ukulele skills. Any questions, be sure to head over to the Contact page and send us a mail. Watch the Video below and learn all about this hugely popular Uke training programme.
<urn:uuid:10027ff9-4202-46b7-8870-818b0a771237>
CC-MAIN-2013-20
http://howtoplayaukulele.com/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00010-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956342
1,098
2.21875
2
Photo: This sign displays next to the Academy's dive locker. Bob Hollis has worked with and supported the California Academy of Sciences since before the inception of Oceanic. A few weeks ago we caught up with Elliott Jessup, the Diving Safety Officer over at the California Academy of Sciences/Steinhart Aquarium. Elliott manages all aspects of the diving program, with responsibilities such as running science dive classes, maintenance of the aquarium and dive locker, and supervising volunteer divers. We talked about the contributions that AUP has made to the Academy, how the equipment is being utilized, recent projects, and future endeavors. The relationship between AUP and the Steinhart Aquarium grew through the friendship of Bob Hollis and Dr. John McCosker, Senior Scientist and Chair, Department of Aquatic Biology. When the new academy was being built, Bob was passionate about sponsoring the dive program in order to push forward the efforts of scientific discovery and education. A generous equipment donation was made which provided the Academy with everything needed to support the needs for on and off-site diving. Photo: Oceanic regulators hang inside the dive locker. Photo: Diving Safety Officer, Elliott Jessup, gives a tour of the dive locker and shows off some of the gear. Oceanic and Hollis gear are both used at the Academy for a wide array of duties. The gear is used in-house for exhibit maintenance and public program dive shows, while out in the field the equipment is used for research and scientific collections for the Academy. Photo: A volunteer diver cleans one of the tanks to prepare for an afternoon dive show. The most recent project that the Academy has been working on was an expedition to the Philippines. This recent expedition is the largest that the Academy has ever pursued, both from a diving and terrestrial standpoint. There were over 30 researchers from the Academy as well as members of the aquarium and education outreach. In the Academy's official press release it is stated that "they encountered more than 300 species that appear to be new to science", and although that is an unofficial number, "over the next few months, the expedition scientists will be hard at work analyzing the specimens they collected during their field work—and undoubtedly discovering more new species along the way." One thing that made these finds possible is the fact that the California Academy of Sciences is the only institution in the United States that is allowed to collect in the Philippines. The expedition helped research but all was beneficial in expanding the Academy's living collection. The Academy's dive program is growing both in-house and in the field for research. A new curator has recently been hired who has plans for deep reef research where they will be diving at depths of 200-400 feet and expecting to discover many new species. The diving for some of the upcoming projects will be rated much past a recreational level and "we need gear that reliable, that we can depend on, and that's going to work at 300 ft.", which is why Elliott is excited about continuing to take advantage of the Hollis dive gear. The Academy is planning on expanding their volunteer dive program, moving from nearly 20 divers to around 100, and with hopes of eventually getting the volunteer divers out into the field doing research. The dive program is growing rapidly and if you are interested in becoming a part of it or have any questions you can contact Elliott. Photo: During maintenance and tank cleaning the divers at the Academy always have time to interact with visitors.
<urn:uuid:74d3fe6c-143c-49e2-a561-f12cdd223203>
CC-MAIN-2013-20
http://www.oceanicworldwide.com/us/news/cat/latest-news/post/2011-08-sample-product-update/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00053-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966596
703
2.078125
2
CAD 1200 Online Spring 2013 Syllabus (Online Section) Reliable High Speed Internet Connection, (Note: Students using Dial Up Internet will have difficulty viewing tutorials) Example Video Tutorial (This is typical of the tutorials that will be provided in Blackboard) Autocad Mechanical Student Version 2013 Link to Register for Free Student Download This is the link to the student community site at Autodesk. Once you register, (be sure to use your IVCC student email), you will be able to download an year long license of Autocad 2013. The Autocad student site also has a library of tutorials and resources for students. This is a 3 credit hour course and students can expect to spend at least 10 - 18 hours weekly working on this course. This time will be spent reading assignments, viewing video podcast demonstrations, participating in group discussions, creating drawings and taking quizes. The primary advantage of taking a class online is that students may work at anytime or anyplace. The disadvantage is that the student must make time. Very often busy students find it difficult to find the required 10 - 18 hours to spend on course work. If you are considering taking this class in the online format please view the link below to see what is required to be sucessful in the online learning environment. Keep in mind that even though you are not required to come to the campus at set days and times you will be required to work in the online environment several times each week. Are You Ready for Online Learning Example VideoPodcast (The Fillet Tool tutorial below is typical of t he instructional materials students will use throughout the course.) Fillet Tool Tutorial Autocad 2012 Tutorials IVCC Computer Resource Center IVCC Assessment Center Student Help Desk
<urn:uuid:d1931ff2-a02a-43ea-b58a-384cef9ae266>
CC-MAIN-2013-20
http://www.ivcc.edu/facultywebpages/marysmith.aspx?id=11696
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00071-ip-10-60-113-184.ec2.internal.warc.gz
en
0.900749
362
1.84375
2
An Oregon woman who says she was wrongly accused of music piracy filed a federal lawsuit against the Recording Industry Association of America, claiming the trade group used abusive tactics in its effort to collect thousands of dollars. It is about time!!!! Poeple, the biggest source of pirated music, videos, and software, is not you, me, or your buddies, but the People's Republic of China (PRC), with it's State Run Factories. 8% of the PRC's GDP comes from piracy/counterfeiting.
<urn:uuid:71bbf9a2-d780-43ce-acdd-691749affb60>
CC-MAIN-2013-20
http://fubar.com/it-is-about-time/b96156
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00055-ip-10-60-113-184.ec2.internal.warc.gz
en
0.933274
110
1.523438
2
Stacy Sherman, a 7th- and 8th-grade science teacher at Lower Alloways Creek School, was awarded the 2012 DuPont Excellence in Teaching Award for a middle school teacher, for more than 20 years of participation in the regional science fair. “The Delaware Valley Science Fair includes schools from around the tri-state area, and from that area, we selected a teacher to win this award,” said DVSF President Henry Diston. “Stacy Sherman has had many years dedicated to classroom research projects, and for about 20 years she has had students with projects that go on to the next level.” that continued commitment, Sherman was recognized with a plaque from DVSF, a check for $500, and an all expense paid trip to the Intel International Science and Engineering Fair in Pittsburgh, Pa. A teacher from the Devon Preparatory School, in Devon, Pa, was also awarded the Excellence in Teaching Award for the high school level. In receiving the award, Sherman said she was surprised and honored. “I’ve been teaching since 1990, and every year I’ve had students do very well at the Salem County Science Fair, and then go on to place at the Delaware Valley Science Fair,” said Sherman. “I was very honored when they told me I won this award.” Sherman said creating science projects is part of the LAC school curriculum, and the projects teach students valuable lessons about solving problems by using the scientific “It teaches students to go through the problem solving process step-by-step and see the end result,” she said. “It also teaches them about working hard and recording data.” When it comes to choosing the topic for students’ projects, Sherman said she likes to keep it open ended, to allow students to pick a topic that interests them. “Any project can teach students something new,” she said. “When it’s a topic that interests them, that’s when the students get excited.” According to Diston, it’s that excitement for the scientific process that the Delaware Valley Science Fair seeks to instill in students. “Our mission is to get kids interested in science or engineering through researching their projects,” said Diston. “What’s happening in schools right now is a lot of testing, so we have students that are becoming great test takers, but losing problem solving skills.” He added, “The science fair is about teaching students to solve problems, research and think critically.” Contact Michael Williams at (856) 935-1500 Ext. 433 or via email at firstname.lastname@example.org
<urn:uuid:61f1490a-62cd-4542-a7ff-8a2c0a2d519f>
CC-MAIN-2013-20
http://www.nj.com/salem/index.ssf/2012/04/lower_alloways_creek_teacher_h.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705953421/warc/CC-MAIN-20130516120553-00011-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973778
586
2.140625
2
Every one of us faces stress at some point, whether it's caused by exams, jobs, a financial crisis, or everyday activities. Stress is an inevitable part of life that often leads to anxiety. But when stress interferes with daily activities, it is considered a stress disorder. In the U.S., 18% of adults suffer from acute stress disorder. Acute stress disorder treatment calls for medication, psychotherapy, and reducing stress through family or social support. The first step towards treating acute stress disorder is to accept the illness. The second step is to seek help from a medical professional. A psychiatrist is the best person to give advice on medications for acute stress, which includes antidepressant medications and anti-anxiety drugs. It should be understood that acute stress disorder medication does not cure the disorder but keeps the symptoms under control. Psychotherapy is another promising acute stress disorder treatment modality. Post-traumatic stress disorder, commonly known as PTSD, is a kind of stress disorder. PTSD occurs in people who have experienced trauma such as a serious accident claiming the life of a loved one, a natural disaster, an explosion, rape, etc. PTSD can affect anyone, including children. PTSD patients often find it difficult to sleep, concentrate, and have flashbacks of the traumatic event. Here are the top drugs that work for acute stress disorder: 1. Serotonergic antidepressant drugs like Prozac given in doses of 10 to 40 mg a day, depending on the severity of the symptoms of acute stress disorder. 2.Paxil is another antidepressant medication used for acute stress disorder treatment. It also treats disturbing psychological symptoms that develop with post-traumatic stress disorder. 3.Cymbalta is used for acute stress disorder, as it maintains a mental balance by increasing serotonin and norepinephrine. 4. Zoloft (Sertraline) is used to treat panic attacks by increasing the amount of serotonin in the brain. It belongs to the selective serotonin reuptake inhibitors class of antidepressant medications. Almost every type of antidepressants has some side effects, making it mandatory to visit a health care professional for frequent check-ups if you are taking them. 5. Ativan (Lorazepam) and Klonopin (Clonzepam) are anti-anxiety drugs used to manage agitation and anxiety in PTSD patients. 6. Another class of acute stress disorder medications includes benzodiazepines like Xanon (Alprzolam), which decrease abnormal excitement in the brain and treat panic disorders. These are habit-forming drugs and should only be used for short-term therapy. © Newsmax. All rights reserved.
<urn:uuid:5daa0cc6-f6a3-42cc-805f-81e1b99d92d1>
CC-MAIN-2013-20
http://www.newsmax.com/FastFeatures/Acute-Stress-Disorder-treatment/2010/10/15/id/373887
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00022-ip-10-60-113-184.ec2.internal.warc.gz
en
0.918684
542
2.90625
3
Mineral Project Management is a peer-reviewed course from the professional development program of the Canadian Institute of Mining, Metallurgy and Petroleum (CIM). This course on project management is especially prepared for engineers, estimators, purchasing agents, senior managers, company presidents... in fact, anyone who bears some portion of responsibility for a project but needs a better understanding of how it all works. The course addresses the most important aspects of project management, including planning and scheduling, estimating, cost-control, change forecasting, procurement, contracts, reporting, and administration, as well as when and how to work with consultants. Problems that often lead to delays and cost overruns are examined, as are the best methods to avoid them. Whether you are an operator who is using project management consultants, or managing your own projects, this course will set you straight. This course has been developed and peer-reviewed for the Professional Development Program of the Canadian Institute of Mining, Metallurgy and Petroleum. Mineral Project Management consists of 37 viewing sessions of 30–60 minutes each with supporting figures, tables and examples, plus interactive course reviews. Course duration is equivalent to approximately 30 hours of viewing content.
<urn:uuid:89364db4-a8a9-4f5d-a116-a8501d916623>
CC-MAIN-2013-20
http://www.edumine.com/courses/online-courses/mineral-project-management/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00058-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942585
240
1.851563
2
I'll take Impossibly Idyllic Children's Educational & Play Setups From The About-To-Be-Sobered Utopian 1960s for $100, Alek. Besides the Austrian national pavilion at Expo 67 in Montreal, the city of Vienna opened up an actual kindergarten. 30 kids at a time--10 pre-screened diversity types and 20 offspring of the quickest Quebeckers off the line--spent two weeks getting a top-flight preschool education from muitilingual Montessori teachers imported straight from Vienna, the city with which Maria Montessori is most often associated [If you remember that she worked almost her whole life in Rome, and what is Vienna, but the Rome of Austria? Think about it.] Anyway, crazy-fresh playground equipment, an eye-popping modular, ply cube modernist building by Karl Schwander, Austria's pre-eminent expo pavilion architect [OK, he did one other one, Expo 58 in Brussels. But it was very popular. They even took it home when they were done.], and a bit of depersonalized makework, it was truly a children's paradise of the future of the past. And all for just $2.50/day. And they probably got to keep the hats. For other pictures and more details of the kindergarten, check out NCF's World Expo 67 - The Vienna Kindergarten page [ncf.ca] or The Dixon Slide Collection at McGill University [mcgill.ca]
<urn:uuid:85e2a1b5-dad6-4d14-85cb-6d50fda4892d>
CC-MAIN-2013-20
http://daddytypes.com/2009/10/27/what_was_the_vienna_kindergarten_at_expo67.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00037-ip-10-60-113-184.ec2.internal.warc.gz
en
0.947617
315
1.710938
2
03 Jan New P2P Botnet Arising Join our blog You can contribute to our blog if you have +100 points. Comment on articles and blogposts, and other users will rate your comments. You receive points for positive ratings. About two weeks ago, the German Chaos Computer Club (CCC) has published an analysis report of a backdoor trojan that they claim had been used by German police during investigations in order to capture VoIP and IM communication on a suspect's PC. Our friends over at F-Secure published a blog post last week where they wrote about another file that, according to them, seemed to be the dropper component of the trojan. They were kind enough to share the MD5 hash of the file, so we could pull it from our collection. Stefan and I took a closer look. The dropper carries five other binaries in its resource table, so there are six components in total – each with a different purpose – all of which have been analyzed by us. Amongst the new things we found in there are two rather interesting ones: firstly, this version is not only capable of running on 32 bit systems; it also includes support for 64 bit versions of Windows. Secondly, the list of target processes to monitor is longer than the one mentioned in the CCC report. The number of applications infected by the various components is 15 in total. Earlier this week, Microsoft released an announcement about the disruption of a dangerous botnet that was responsible for spam messages, theft of sensitive financial information, pump-and-dump stock scams and distributed denial-of-service attacks. Kaspersky Lab played a critical role in this botnet takedown initiative, leading the way to reverse-engineer the bot malware, crack the communication protocol and develop tools to attack the peer-to-peer infrastructure. We worked closely with Microsoft’s Digital Crimes Unit (DCU), sharing the relevant information and providing them with access to our live botnet tracking system. A key part of this effort is the sinkholing of the botnet. It’s important to understand that the botnet still exists – but it’s being controlled by Kaspersky Lab. In tandem with Microsoft’s move to the U.S. court system to disable the domains, we started to sinkhole the botnet. Right now we have 3,000 hosts connecting to our sinkhole every minute. This post describes the inner workings of the botnet and the work we did to prevent it from further operation. Identifying a botnet is not an easy task sometimes, especially when one gets lost in different components like droppers, infectors and other bad stuff. Some two weeks ago, Jose Nazario from Arbor Networks pointed me to a new varmint that appears to be another peer-to-peer bot. When executed, the program installs tons of stuff that holds a number of goodies, for example However, we leave these aside for now and focus on the botnet's architecture instead, which is really just a channel for pushing software to infected machines. Scrabbling about in the installed programs finally brought up the actual bot, which we detect as Trojan.Win32.Miner.h. The binary has some layers of obfuscation to make analysis harder but eventually writes a UPX packed executable into a memory section from where to original binary can be restored. One of the first things that come to attention is a list of 1953 hard-coded IP address strings that are contained in the binary. These addresses are contacted by the bot during its bootstrapping phase in order to join the peer-to-peer network. A trojan called Bohu that was spreading earlier this year caught people's attention: it has the ability to block cloud-based anti-virus services, which is kind of a new thing. The malware spreads via social engineering and mostly targets China. The guys over at MMPC have published a nice blog post with more details here. First off, our products already detected and blocked Bohu based on its behavior profile even before we had any signatures out for it. On the contrary, if a system was already infected before the installation of a scanner, you might be in trouble... Amongst other things, Bohu also prevents access to a Kaspersky server that hosts virus signature updates by hooking the DNS resolver in order to filter out resolution attempts for the corresponding domain name. Consequently, an infected system is prevented from automatically updating its Kaspersky signature databases, so it cannot detect and remove the threat. However, the domain name filter can also be turned into an infection check! We have prepared a little web page at http://www.securelist.com/bohucheck that takes advantage of Bohu's blockade and displays different messages depending on whether a system can access the blocked domain or not. Users can now simply surf to this page to find out if they are infected with the trojan. If the page shows the above message, the trojan is not present. But if the web page shows a warning message, the system is most likely infected: In any case, if you see the message above, you should manually scan and clean your system. To do so, you can download our freely available rescue disk image and burn it to a CD or USB drive, then boot into it. As the scanner on the rescue system is not affected by the trojan's domain filter, it can still update its signatures and detect and remove the malware. More information on how to use the rescue system is available online on this link. A new year has broken - a new peer-to-peer botnet is on the rise. It shares some commonalities with the infamous Waledac bot that was taken down in a exemplary effort by Microsoft early last year. Although this new bot has a different code base, it uses the same spreading strategy and also seems to maintain a multi-relay (or peer-to-peer) infrastructure just like its predecessor. Our friends over at ShadowServer have posted an excellent blog entry about this new threat and how it relates to earlier bots. We are currently analyzing the new family and can confirm peer-to-peer-like behavior. When started, the bot loads a list of 20 hard-coded peers. Each entry contains a unique ID, the peer's IP address and a TCP port it is listening on: Yesterday, Adobe published an advisory about a critical vulnerability in their Flash Player that is already being actively exploited. The CVE number assigned to this bug is CVE-2010-3654. A fix is currently being prepared by Adobe. The exploit we are seeing right now has a payload which, while not being very sophisticated, holds several surprises. When executed, the bot checks for command line options. The '-installkys' option installs the bot onto the victim machine. Interestingly enough, if you use the '-removekys' parameter the malware gets entirely removed from the system – a built in unistall. The malware then calls itself without any parameters and the malicious code is run. The screenshot below shows the code for parsing the command line parameters. The binary drops a DLL, the actual malware, to the hard drive and scans the list of running processes for outlook.exe, iexplore.exe, and firefox.exe. If a matching process is found, the dropped DLL gets injected and executed as a new thread. The injected code will send an HTTP request to news.mysundayparty.com every 5 minutes and download an encrypted configuration file. The DNS entry seems to be somewhat fluxy: it has a TTL of 1800 seconds, and the IP address it resolves to changes every now and then. A decrypted config file contains a list of commands to gather information about the infected host. This information is encrypted and sent back to the server. Here is a decoded config file: Searching the web for strings from this file reveals an interesting connection with a piece of malware that was spreading at the beginning of this year. Similar to the current bot, this earlier virus exploits a zero-day vulnerability, collects information about the infected machine and sends it back to its master. A still earlier version is reported to exploit another Flash zero-day. A nice thing is that each configuration download request contains all the necessary information to track down infected hosts in a network. Below is what the HTTP GET request for the config file looks like. The path contains one parameter assembled from the Windows host name and its IP address with the prefix '-nsunday' and is quite unique. Also note the Referer field, which is always set to http://www.yahoo.com/, and the characteristic Accept header. Constructing a reliable IDS signature should not be too hard. GET /asp/kys_allow_get.asp?name=getkys.kys&hostname=PC-192.168.0.1-nsunday HTTP/1.1 Referer: http://www.yahoo.com/ Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:188.8.131.52) Gecko/2009021910 Firefox/3.0.7 Host: news.mysundayparty.com Cache-Control: no-cache Kaspersky detects both the installer and the DLL as Backdoor.Win32.Sykipot.an. The exploit is heuristically detected as Exploit.Script.Generic.
<urn:uuid:050ccd4b-c020-4594-8e1a-2a1530ac12a3>
CC-MAIN-2013-20
http://www.securelist.com/en/blog?author=14245
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00024-ip-10-60-113-184.ec2.internal.warc.gz
en
0.927793
2,022
2.078125
2
In an antechamber in the old Silverstone pit building, a small man in a brown suit is leaping from foot to foot and waving his arms around. This is Kazutoshi Mizuno, the father of Nissan's barnstorming GT-R, and he is not especially happy. "Thinking that my car is too heavy is a mistake!" he says, clapping his hands together for emphasis. "All journalists say [affects a funny voice]: ‘GT-R is heavy, heavy, heavy - it should be lighter, lighter, lighter!' I say, journalists need to develop a more professional level of thinking! More study! More thought! The GT-R needs to be this weight. A car with less weight does not handle. Lighter weight can be dangerous. And it will not be drivable by all customers. You have a responsibility for the customer. I have a bigresponsibility for the customer!" There is a momentary lull as Mizuno-san gathers his thoughts. Then he's off again, this time assaulting a whiteboard in a bid to explain some rudimentary physics. I might have paid attention in school if I'd had a teacher as committed as this. "All people have the right to enjoy a supercar and supercar performance," he says, firmly laying out his MO. "All people, anywhere, anytime. Before, the supercar was a very closed market. I wanted to open the market up. Big boot. Accessible performance. You can drive my car at 186mph with your wife. Before GT-R, it was a dream. After GT-R, the dream was real." His hands are a blur across the board. The face furrows with concentration. Though he's tired, his eyes are blazing. Words: Jason Barlow Photography: David Shepherd This article was originally published in the January 2012 issue of Top Gear Magazine source : topgear.com
<urn:uuid:8c13f63b-e707-475d-8754-8c8cf8697905>
CC-MAIN-2013-20
http://www.bruneistars.com/Magazine/?p=21120
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00071-ip-10-60-113-184.ec2.internal.warc.gz
en
0.977352
400
1.515625
2
Care and Treatment Under New York State Mental Hygiene Law [MHL 45.07], Commission staff serve people with disabilities and their families by providing independent oversight of the quality and cost-effectiveness of services delivered by the state's mental health, developmental disabilities, alcohol and substance abuse and other related programs. - responds to complaints about care and treatment; - investigates complaints of deficient conditions and of rights violations in facilities; - conducts unannounced site visits to examine program operations; - inspects facilities and licensed programs' safety, security, and quality of care and treatment afforded residents and patients, and informs program managers of findings and recommendations; - administers a statewide network of advocacy programs for children and adults with disabilities providing support through case negotiation, administrative proceedings, litigation and legislation; - performs systemic reviews and studies of the mental hygiene system, and - issues reports to the Governor and Legislature, making recommendations for legislative, budgetary and administrative reforms. If you have questions or concerns about the quality of care being provided to a New York State citizen with a disability, would like Commission assistance, or would like additional information about the Commission's services, please contact us: TOLL FREE: 1-800-624-4143 [Voice/TDD/Spanish] The Commission on Quality of Care and Advocacy for Persons with Disabilities 401 State Street Schenectady, NY 12305-2397
<urn:uuid:ae5b944c-6e2b-41c9-9678-98c7c71cc302>
CC-MAIN-2013-20
http://cqc.ny.gov/oversight/caretreatment
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00075-ip-10-60-113-184.ec2.internal.warc.gz
en
0.927522
291
1.671875
2
Date of Award Master of Science in Education Students come to college for a change and for most this is their first time away from home. Some students come looking for acceptance and a chance to freely be themselves. Individuals that identify as transgender or gender-variant have a difficult time finding a way to be themselves in this setting when they do not have a safe place to live. This research examines students who live in campus housing at a large, Midwestern institution. Past research on transgender issues is presented in its limited availability along with the results of an electronic survey of student opinions of gender-neutral housing and restrooms. The possibility of instituting such changes at this specific institution is examined. This thesis is only available for download to the SIUC community. Others should contact the interlibrary loan department of your local library.
<urn:uuid:f47602f1-c6e9-4732-aa62-33b5b4733eb0>
CC-MAIN-2013-20
http://opensiuc.lib.siu.edu/theses/295/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00076-ip-10-60-113-184.ec2.internal.warc.gz
en
0.938283
166
2.109375
2