text stringlengths 181 608k | id stringlengths 47 47 | dump stringclasses 3
values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 50 138k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
|Thermodynamics and Propulsion|
Thermodynamics is a science and, more importantly, an engineering tool used to describe processes that involve changes in temperature, transformation of energy, and the relationships between heat and work. It can be regarded as a generalization of an enormous body of empirical evidence1.1. It is extremely general: there are no hypotheses made concerning the structure and type of matter that we deal with. It is used to describe the performance of propulsion systems, power generation systems, and refrigerators, and to describe fluid flow, combustion, and many other phenomena.
The focus of thermodynamics in aerospace engineering is on the production of work, often in the form of kinetic energy (for example in the exhaust of a jet engine) or shaft power, from different sources of heat. For the most part the heat will be the result of combustion processes, but this is not always the case. The course content can be viewed in terms of a ``propulsion chain'' as shown in Figure 1.1, where we see a progression from an energy source to useful propulsive work (thrust power of a jet engine). In terms of the different blocks, Parts I and II are mainly about how to progress from the second block to the third, Part III takes us from the third to the fourth, and a chapter in Part IV takes us from the first to the second. We will start with the progression from heat to work, examples of which are given in Figure 1.2.
Douglas Quattrochi 2006-08-06 | <urn:uuid:e1605750-0e59-4385-8a88-a4760a6f603e> | CC-MAIN-2016-44 | http://web.mit.edu/16.unified/www/SPRING/propulsion/notes/node9.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717783.68/warc/CC-MAIN-20161020183837-00075-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.933714 | 315 | 3.28125 | 3 |
NY, August 3 : Global COVID-19-19 demises surpassed 690,000 on Mon., as per the Centre for Systems Science & Engineering(engr.) (CSSE) in Johns Hopkins University.
Overall COVID-19-19 instances across the globe rose to 18,109,901, as per the CSSE, with demises approaching 690,055, Xinhua recorded.
The US recorded the most COVID-19-19 instances & demises, standing in 4,668,406 & 154,861 respectively, succeeded by Brazil with 2,733,677 instances & 94,104 demises.
Different nations with over 30,000 fatalities contain Mexico, Britain, India(In), Italy & France. | <urn:uuid:14893868-6450-4d1c-9571-399b96383df3> | CC-MAIN-2022-33 | https://logicaldaily.com/global-covid-19-deaths-surpass-690000/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00673.warc.gz | en | 0.787912 | 153 | 1.78125 | 2 |
1.What program are they watching now?
A.Animal World. B.English News. C.Sports News.
2.When did Thomas Edison invent the light bulb(灯泡)?
A.In 1798. B.In 1897. C.In 1879.
3.Why is the street so dirty?
A.Too many people throw rubbish. B.There are too many people.
C.The street is too crowded.
4.Where is the man going? | <urn:uuid:cd52973c-bb32-480b-ad61-903d9159daa0> | CC-MAIN-2017-04 | http://eng.hengqian.com/html/2017/1-11/r22282115593753.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00281-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.880021 | 155 | 2.203125 | 2 |
From the 20th of November, 1969 till the 11th of June, 1971, a diverse grouping of Native Americans occupied Alcatraz Island, which was no longer used as a federal prison and lay largely abandoned. The group claimed the island as theirs under 'right of discovery', and proposed plans to build an education center, an ecology center, and a Museum to honour the culture of America's indigenous people. The occupiers were also protesting at the US government's long term policy of attempting to assimilate and disregard Native American culture and rights. The protest was ended forcibly by the authorities, but became an inspiration to other Native American protest movements.
American Indian activists occupy Alcatraz Island (106 words)
Historical Context Note
Please log in to consult the article in its entirety. If you are a member (student of staff) of a subscribing institution (see List), you should be able to access the LE on campus directly (without the need to log in), and off-campus either via the institutional log in we offer, or via your institution's remote access facilities, or by creating a personal user account with your institutional email address. If you are not a member of a subscribing institution, you will need to purchase a personal subscription. For more information on how to subscribe as an individual user, please see under Individual Subcriptions.
Save this article
If you need to create a new bookshelf to save this article in, please make sure that you are logged in, then go to your 'Account' here. | <urn:uuid:a1851c2f-1b64-41f3-ae36-be4093fb8700> | CC-MAIN-2017-04 | http://www.litencyc.com/php/stopics.php?rec=true&UID=11073 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00060-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.954373 | 309 | 3.84375 | 4 |
Bonds are fixed-income securities that represent a debt made by an investor to a borrower. Entities issue bonds to raise money from investors for a predetermined period of time. The bond’s issuer guarantees to pay a certain rate of interest for the duration of the bond as well as the bond’s face value or principal upon maturity. Governments, businesses, towns, and other sovereign entities frequently issue bonds. Like securities, bonds may be exchanged.
Bond market refers to the market for trading debt securities such as corporate, government, and tax-free bonds. Bond markets are better appropriate for investors with lower risk tolerance since they tend to be less volatile than stock markets. Bond market investments are an effective strategy to diversify your portfolio. The Indian bond market has expanded dramatically since liberalisation. The Indian bond market has seen significant inflows of foreign money over the last few decades due to the fact that many international investors keep a part of fixed-income instruments in their portfolios. A bond market’s main function is to make it easier for the government and big private companies to acquire long-term finance.
Ways to Invest in Bond Market
There are two ways one can invest in the bond market that are discussed below:
- The first option is to maintain the bonds until they mature and start earning interest. Bond interest is normally paid twice annually.
- Selling bonds for more than you paid for them is the second way to profit from bonds.
Types of Bond Market
Government Bonds Market
The central government of the country also raises money by issuing bonds on the government bond market. Treasury Market is another name for it. These fixed-income securities are issued by the nation’s central government and have a set face value, maturity date, and compound interest on all interest payments. This security is very appealing to investors because they have faith in the government to keep it safe and secure. Additionally, the interest rates and payment schedule are unchanging.
TIPS (Treasury Inflation-Protected Securities) are a form of government bond that have a direct correlation to the level of inflation in the nation’s economy. Because it offers real interest rates (nominal interest rate minus inflation rate), this category of a government bond is highly well-liked.
Emerging Countries Bonds Market
Emerging countries are rising nations and will continue to be the focus of investment from industrialized nations, pension funds, and investment organizations. It is because these nations often have higher interest rates than other nations. Therefore, capital from industrialized countries make their way to rising countries in order to achieve or obtain larger returns. Government or business bonds may also be included in this as Emerging Economies corporations or nations frequently issue these bonds. Although these bonds provide better yields, they also come with political and geographic concerns that are exclusive to the country.
Corporate Bonds Market
Corporate bonds are often referred to in this market when they are issued by any private or public corporation. The term “Corporate Bonds Market” is used to describe such a market where the regular transaction takes place. Convertible bonds, which may thereafter be converted into equity shares, can also be issued by public firms. These Bonds, which will have a minimum maturity of 1 year, are a long-term source of funding for the firms.
Investment bonds and junk bonds are the two categories of corporate bonds. While junk bonds are more speculative in nature and more hazardous, investment bonds are steady and less risky.
Municipal Bonds Market
Municipal bonds are issued at a level below the federal government, such as the state, city, or district. The issuing by autonomous or governmental organizations occurs in this market at a significantly lower level. Even if the quantum is lower than the market for government bonds, most investors still like it because of the money’s safety and security. Governmental organizations utilize the money they raise in this market to support initiatives and meet operating expenses.
Mortgage-Backed Bonds Market
These bonds are often issued by banks and other financial institutions. The Banks or Financial Institutions transfer or share the risk associated with the mortgage loans with the aid of this mortgage-backed security. These mortgage debts are bundled together and made into securities in order to issue these bonds. Although they are very hazardous, these offer consistent interest payments. The Mortgage-Backed Bonds Market refers to the market where mortgage-backed securities are traded.
For both bond issuers and investors, the bond market is a crucial financial market venue. It has a system in place for giving investors set returns. It serves as a source of financing for businesses and the government that is comparably less expensive than other sources. | <urn:uuid:38f845a1-b0e4-4b6a-9cd0-e464686f4c42> | CC-MAIN-2022-33 | https://www.thefixedincome.com/blog/bonds-and-debt/what-are-types-of-bond-markets/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00477.warc.gz | en | 0.959109 | 967 | 2.765625 | 3 |
Address: Kyiv oblast, Vyshhorodsky district, village Novi Petrivtsi, Vatutina Street. Tel: +38 04496 45123
How to get there from Kyiv: metro stop Geroyiv Dnipra (blue line), then take a bus #792
State Museum-Preserve "The Battle of Kyiv in 1943". It is a historical and cultural complex, which was founded on March, 20th, 1945. The complex includes: the territory of 8 hectars with the saved 650 meters of connection paths, shelters, observation points, samples of the military equipment of the World War II, the Monument-Museum to the liberators of Kyiv, built in 1958, the diorama "Battle of Kyiv, Lyutizh place of arms, 1943", opened in 1980. The displays of the museum show the events of the autumn 1943. | <urn:uuid:a981aa1c-b2b6-47be-b03c-f06fe9d12312> | CC-MAIN-2017-04 | http://bestofukraine.com/ukraine-travel-center/north/kyiv/regions-attractions/lyutizh-platsdarm.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00190-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.913926 | 189 | 1.664063 | 2 |
Who doesn't love a good selfie?
Video footage captured a giant panda cub spending quality time with its keeper, which included taking a few selfies to commemorate the day.
Manyuemei the giant panda can be seen affectionately posing with its foster father at the Dujianyan's Giant Panda Conservation and Research Center in the Sichuan province in China.
After kisses and backscratches, the caretaker the pulled out his cell phone to take a selfie.
Manyuemei, whose name translates to 'cranberry' in Chinese, immediately crawled up behind him, and places his paw around his shoulder.
Manyuemei even wanted to check the photos after, making sure they showed off its good side, CCTV showed.
The Dujiangyan base is one of three branches of the China Conservation and Research Center for the Giant Panda.
The conservation is home to over 170 pandas, making it the largest captive-bred panda operation in the world.
Earlier this month, two pandas from the Dujiangyan base were flown to South Korea on a 15-year lease. To resettle the pandas Yuan Xin and Hua Ni to the new environment, the pandas' caretaker packed with them 330 pounds of Sichuan bamboo, according to CCTV. | <urn:uuid:c06ea2cb-966d-4393-9df3-76075086d213> | CC-MAIN-2017-04 | http://www.insideedition.com/headlines/15601-giant-panda-cub-poses-for-a-selfie-with-caretaker | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00355-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.955351 | 267 | 1.789063 | 2 |
Unidentified sources at the Norwegian Embassy in the capital Colombo said Norway's Prime Minister, Kjell Magne Bondevik, accepted President Chandrika Kumaratunga's invitation to mediate between the two sides, according to the pro-rebel TamilNet website on Sunday.
Norway helped broker a February 2002 ceasefire between the Tamil Tigers and the government. The ceasefire continues to hold despite the rebels' withdrawal last year from peace negotiations.
Norwegian Embassy sources said a delegation including Foreign Minister, Jan Petersen, will visit Colombo in the first week of May for talks on resuming the peace process, the report said.
The Wickremesinghe-led United National Front party applauded the move to bring Norway back into the peace effort.
However, the party criticised Kumaratunga of having "stridently impugned the impartiality of Norway, in its role as facilitator."
Kumaratunga's Foreign Minister, Lakshman Kadirgamar, said earlier Norway will get involved in the peace process strictly as a facilitator - "not mediator, arbitrator or anything else."
Tamil Tiger spokesman Daya Master was quoted as saying on Sunday any future peace talks had to be be based on recognition of Tamil self-determination.
"If this is accepted as a basis for talks, then the chances of (the Tamil Tigers) participating in the talks and the peace process being taken forward without disruptions are good"
spokesman, Tamil Tigers
The Tigers launched their fight in 1983 for a separate homeland for Sri Lanka's minority Hindu Tamils, claiming discrimination at the hands of the majority Buddhist Sinhalese. The civil war killed about 65,000 people.
However, during the most recent round of talks, the rebels relinquished their demand for full independence and now seek increased autonomy.
"If this is accepted as a basis for talks, then the chances of (the Tamil Tigers) participating in the talks and the peace process being taken forward without disruptions are good," Master said.
The rebels are awaiting official word from Norway on the Sri Lankan government's intentions to resume peace talks, Master said.
Norway withdrew as a mediator last November amid a political tussle between Kumaratunga and former Prime Minister, Ranil Wickremesinghe, who had signed the ceasefire with the rebels.
Kumaratunga had also accused Norway of overstepping its role and being biased towards the rebels.
She later dissolved Parliament and ordered elections three years before schedule, in which her party defeated Wickremesinghe.
Kumaratunga - who survived a 1999 rebel assassination attempt - takes a tougher stance towards the guerrillas. | <urn:uuid:61966ee5-fa5d-4cf5-8ead-78a6672ffab1> | CC-MAIN-2017-04 | http://www.aljazeera.com/archive/2004/04/200849143625330599.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00568-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.959075 | 555 | 1.648438 | 2 |
Look at a coin in your hand, and you may see the face of a person. On modern euro coins, this person is often a living queen or king, or a historical figure that represents a specific EU country. They stand in a long tradition: in the Roman Empire and in early modern Rome, emperors and popes figured widely on coins and medals. The coins represented their power, and the images of these authorities affirmed the value of the objects. During most of the Roman Republic, however, living persons were hardly displayed on coins. How can we explain the presence and absence of images of authorities on coins in different historical contexts? And how can we interpret the presence of other living persons on coins’ obverses and reverses? After all, (anonymous) representatives of different societal groups, such as armies, citizens and provincials, often figure on Roman and early modern coins and medals as well. Does this practice hint at specific audiences the objects were meant for?
This course focuses on the use of coins as a historical source for broader questions regarding representation and power in the Roman and early modern period. Students will be challenged to decipher and interpret the information conveyed by these exceptional primary sources, on which text and images are combined. In addition to theoretical and methodological skills, the students will also learn how to create a digital exhibition of a selected number of numismatic objects that fits the theme of the course.
Drs. Paul Beliën (Dutch Central Bank)
Dr. Liesbeth Claes (Leiden)
Dr. Martin Hirsch (München)
Prof. dr. Fleur Kemmers (Frankfurt am Main)
Dr. Erika Manders (Nijmegen)
Dr. Marleen Termeer (Nijmegen)
MA-, RMA students and PhD candidates in (Ancient) History, Art History, Classics and Archaeology from the KNIR partner universities (UvA, VU, UL, UU, RU and RUG) as well as from German universities. The course is part of the OIKOS education program for PhD students. No specific knowledge of Greek or Latin language is required.
Form of education
- Seminars and lectures
- Individual study and research in the libraries of the KNIR and DAI
- Workshops on numismatic methods
- Museum visits
- ‘Hands on’ sessions
- Group assignment
Will be made available some weeks before the start of the course.
The study load is the equivalent of 5 ects (140 hours) and comprises ten days of study in Rome. Each student should arrange with his/her university whether the course can be part of the existing curriculum. Upon successful completion of the course, the KNIR will provide a certificate mentioning the study load and evaluation tools.
The study load is based on:
- Before arriving in Rome: independent study of course material: 1 ECTS (28 hours)
- Seminars and workshops in KNIR and DAI, excursions and museum visits in Rome: active participation: 2 ECTS (56 hours)
- Research & study for final assignment: 2 ECTS (56 hours)
Application and admission
This is a selective course with a maximum of 15 participants. The selection of (R)MA students is based on grades, the positioning of the course in the student’s curriculum, and a letter of motivation. The selection of PhD students is based on the letter of motivation and curriculum vitae.
Students can apply via the form below. Include in your application:
- a letter of motivation
- a cv
- for (R)MA students: a recent list of grades officially provided by your university
15 January 2022
Please note that the decision of the selection committee is final and no correspondence will be entered into.
All Dutch and German students receive support from the KNIR or DAI for their travel costs and accommodation.
Dr. L. Claes (Leiden University): email@example.com
Dr. E. Manders (Radboud University): firstname.lastname@example.org
Dr. M.K. Termeer (Radboud University): email@example.com
This course is organized in collaboration with | <urn:uuid:90e03556-9ea8-427c-9558-9cda8dfef667> | CC-MAIN-2022-33 | https://incnews.org/2021/12/03/faces-of-power-call-for-participants/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00072.warc.gz | en | 0.905823 | 928 | 3.28125 | 3 |
A baby teethes the four days before a tooth erupts through the gum and the three days after, according to the WebMD article “Teething vs. Illness: How to Tell the Difference.” While teething is associated with refusing food, drooling and crankiness, there is no medical evidence that suggests that teething causes diarrhea. The most likely explanation for diarrhea when your baby is teething, is that her increased chewing, sucking and drooling has caused her to ingest something that has upset her stomach. If your little one develops a temperature of 102 degrees Fahrenheit or is younger than 6 months old and has diarrhea, call her pediatrician immediately.
Preventing Diarrhea and Safe Food Handling
Parasites, bacteria and viruses can cause an intestinal infection in a baby, which may lead to diarrhea. A baby can develop an intestinal infection after ingesting contaminated food or water. Safe food handling practices such as thoroughly heating food, storing food at 40 degrees Fahrenheit or below and cleaning surfaces that you used to prepare food can help prevent diarrhea in a baby. Food allergies and sensitivities, accidental poisoning and drinking too much fruit juice can also cause diarrhea, according to the WebMD article “Diarrhea in Babies.” If your baby develops diarrhea when you give him antibiotics, talk to his pediatrician before discontinuing their use.
The Importance of Hand Washing and Cleanliness
Since a baby has a weak immune system, it’s harder for the antibodies in her system to fight off bacteria, viruses and parasites. In addition to water and food, viruses, bacteria and parasites may live on the surfaces of objects. When a teething baby touches a contaminated object and puts his hand or the item in his mouth, he may develop an infection that some parents may mistakenly attribute to teething. To prevent the spread of harmful organisms, always wash your hands and your baby’s hands after diaper changes, touching food and before and after eating. In addition, always wash your hands after using the restroom. Regularly run a sanitizing wipe over the surfaces in your home, even if they look clean. Since your baby will want to put things in her mouth as she teethes, Fisher Price recommends cleaning your baby’s toys with soap and water, sanitizing them with a solution made with 1 tablespoon of bleach and 1 quart of water, and then air-drying them.
Signs of Diarrhea in a Baby
If your baby has a dirty diaper with stool that’s looser than normal when he teethes, this is not a cause for concern, according to BabyCenter. A baby with diarrhea will have a stomachache and more than a couple loose stools. Her stools may also be runny. However, when diarrhea persists for more than a day, your baby is at risk for becoming dehydrated, according to WebMD. Signs of dehydration include a lack of tears when crying, a loss of skin elasticity, dry mouth and fewer wet diapers because he’s urinating less. If your baby develops diarrhea and doesn’t want to eat because of the pain in his mouth caused by teething, ensure he drinks plenty of fluids.
Treating Diarrhea in a Teething Baby
If your little one is less than 6 months old and has diarrhea, call her pediatrician. WebMD recommends that you also call the pediatrician if your baby is dehydrated, has a fever of 102 degrees Fahrenheit or warmer, is lethargic, vomiting, has pus or blood in her stool or her stool is black, red or white. Depending on the cause of your baby’s diarrhea, the pediatrician may prescribe medication to treat a bacterial or parasitic infection. The doctor may also recommend that you give your baby an oral rehydration solution to replenish her electrolytes and treat or prevent dehydration. Always consult with the pediatrician before giving your baby an over-the-counter anti-diarrheal medication, pain reliever or a pain relief gel to ease the discomfort in her stomach and mouth. | <urn:uuid:945118cb-fb54-470d-8045-fc0634091e2a> | CC-MAIN-2017-04 | http://howtoadult.com/stop-diarrhea-teething-baby-7719774.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00003-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.943672 | 847 | 3.359375 | 3 |
#05-198 September 19, 2005
DNR News (803) 734-3950
Archery deer and hog hunts offered at Georgetown County wildlife areas
The S.C. Department of Natural Resources is offering a new series of archery hunts for deer and hogs during October on Samworth and Santee-Delta Wildlife Management Areas in Georgetown County.
This new series of archery hunts for deer and hogs will take place on Samworth Wildlife Management Area and Santee-Delta Wildlife Management Area, both in Georgetown County. The hunts are scheduled for Oct. 6-8, 13-15, 20-22 and 27-29.
“We are trying to maximize hunting opportunities by opening up these areas, which are primarily managed for waterfowl, to be hunted for deer and hogs,” said Jim Westerhold, S.C. Department of Natural Resources (DNR) Upper Coastal Waterfowl Project leader based in Georgetown. “The dikes will offer a good opportunity to harvest a deer and/or hog. The hunts are also an opportunity for the public to help us remove these wild hogs, which are damaging the dikes.”
For more information on the hunts, call Westerhold in Georgetown at (843) 546-3226, extension 13, or e-mail WesterholdJ@dnr.sc.gov.
Wildlife Management Area regulations will apply to the archery-only deer and hog hunts on Samworth and Santee Delta, and hunters will need a WMA permit in addition to a state hunting license and Big Game permit. The limits will be two deer per day, with no limits on hogs. No dogs will be allowed on these hunts. On Samworth WMA, only managed wetland impoundments may be hunted. | <urn:uuid:3898a00c-db1b-4bcd-86de-63706d77d802> | CC-MAIN-2016-44 | http://www.duckhuntingchat.com/forum/viewtopic.php?f=55&t=8903&start=0 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718957.31/warc/CC-MAIN-20161020183838-00437-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.905118 | 373 | 1.578125 | 2 |
Children and adults with dyslexia are highly creative, and have many cognitive and emotional strengths, despite a weakness in decoding words. Successful dyslexics draw on their strengths to hit their targets in life, as shown in the illustration below:
Children and adults with dyslexia often find alternative ways of gathering knowledge and innovate strategies to learn, work, and acheive in life. There are specific steps that can help strengths come to light, as well as assistive technologies that can also aid in school and work. We discuss them, as well as the stories of successful dyslexics. See below to link to these sections. | <urn:uuid:a2771d95-93c8-4562-aa7e-0903c8d5618c> | CC-MAIN-2017-04 | http://dyslexia.yale.edu/Strengths.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00439-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.981958 | 129 | 3.71875 | 4 |
- MITCH M. LIPA
The number of vaccines allocated for Bacolod City will be reduced as the Department of Health needs to prioritize vaccination in the National Capital Region amid the continuing rise in COVID-19 cases in the area.
The DOH-Western Visayas announced on March 25 that Region 6 will get a share of 65,000 doses out of the 400,000 doses of China-made vaccine that arrived in the country on March 24.
As such, Bacolod City will have 7,000 doses while Negros Occidental will receive 8,000 doses scheduled to arrive in Bacolod this week.
However, City Administrator Em Ang, who also sits as executive director of the Emergency Operations Center Task Force, said that based on the latest advisory issued by the DOH on Sunday, the allocation for Bacolod City will only be 5,000 doses.
Ang said the EOC-TF still hopes that the additional supply promised by the national Inter-Agency Task Force will arrive to augment the unfinished vaccination of front-liners who belong to the Category A1.
As of Sunday, a total of 5,206 frontliners of Bacolod City have been vaccinated. The 3,096 health workers received the China-made Sinovac while the 2,110 got shots of European brand AstraZeneca.
Earlier, Dr. Edwin Miraflor, officer-in-charge of City Health Office, said there are more than 12,000 medical front liners in Bacolod City and those vaccinated were only 43 percent of the total under the first category.
Most of government and private hospitals have vaccinated more than 90 percent their front-liners and the EOC have also conducted vaccination among workers at the CHO, staff of Department of Social Services and Development, and other departments who are deploying front liners.
The next group under the first category will be for barangay health workers. – MML | <urn:uuid:e947531d-9050-486d-b2ba-262f1c793a6c> | CC-MAIN-2022-33 | https://negrosnowdaily.com/covax-supply-for-bacolod-reduced/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00475.warc.gz | en | 0.951382 | 400 | 1.5625 | 2 |
The Riot Act Is a Gorgeous Film Plagued by a Plodding Script
Period pieces have an inherent additional layer of complexity to their presentation that films with contemporary settings don’t need to worry about. Set in 1903, Devon Parks The Riot Act is a thriller that does an excellent job of making the audience feel as though they’re actually in Van Buren, Arkansas, back in a time when a traveling vaudeville act would be the pinnacle of one’s entertainment options. The film makes extensive use of Van Buren’s historic buildings, giving it a far more authentic feel than many period pieces, let alone those with indie budgets.
The beautiful locations give the eyes plenty to look at throughout each scene. Such scenery is often more entertaining to watch than the characters. Period pieces may have additional considerations to look out for, but films set in the past still need narratives that work for their audience living in the present.
The Riot Act’s script is a meandering slog, a product of the film’s unclear narrative focus. Dr. Willard Pearrow (Brett Cullen) takes umbrage with his daughter’s lover (Brace Harris), shooting him before he can run off and live happily ever after with Allye (Lauren Sweetster). Two years later, a traveling vaudeville act is booked in his opera house, haunted by a mysterious “ghost” seeking revenge on the powerful doctor.
While the mystery surrounding Dr. Pearrow’s relationship with Allye could’ve carried the narrative, the film burdened itself with a few unnecessary subplots. In keeping with its 1903 Arkansan setting, the townsfolk are hardly receptive to diversity, taking umbrage with the presence of African American member of the troupe. The film ostensibly tries to aim for historical accuracy in portraying this drama but lingers too long on a plot point that feels particularly stale to a present-day audience.
Making matters worse is the films 101-minute runtime, which stretches its various plot strands quite thin by the end. A more streamlined approach to the narrative would’ve done the film wonders, while allowing it to sidestep the social commentary that’s not very interesting to begin with. The Riot Act is too long for its own good, a script that rarely seems sure of what it’s supposed to be doing.
There is a lot to like in many of the scenes, often shot like a stage play. Parks maintains a minimalist focus, using sparse lighting and stage direction to give his actors a chance to shine. The play-like dynamic works well for the period setting, especially for an indie.
The performances are a bit of a mixed bag. Cullen and Sweetster are mostly good, but many of the scenes are brought down by actors speaking their lines too quickly or sounding muffled in the process. More than a few scenes look like they should have been reshot. There are obvious limitations put on indie films, but clumsy takes drag down the otherwise excellent production values.
The Riot Act has a lot to admire as an indie period piece, but the film plays out like a rough cut in desperate need of additional editing. The locations are beautiful and the acting is mostly good, but the script is too unsure of itself to make for a worthwhile experience. Parks’ debut shows plenty of promise, but the execution just isn’t quite there. | <urn:uuid:10db9454-4815-4147-a9ed-0ea2ed23b4ee> | CC-MAIN-2022-33 | https://ianthomasmalone.com/2019/09/the-riot-act-is-a-gorgeous-film-plagued-by-a-plodding-script/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00076.warc.gz | en | 0.958077 | 709 | 1.742188 | 2 |
In partnership with LA Nature for All, Earth Share is a series of conversations on IGTV with the goal of sharing knowledge and inspiration with local organizations and individuals caring for the Earth. The following is a partial transcript of our conversation with Rishi Kumar, founder of the Sarvodaya Institute and Healing Gardens Co. It has been edited for length.
Paloma Avila: What does nature mean to you?
Rishi Kumar: I have come to realize that nature means everything. In some sense, to me, it has become a word that … we have chosen to limit the meaning of. And a lot of times, in my view, we have used inappropriately. Nature is everything: nature is everywhere. What we are doing as urban gardeners is really realizing that you don’t need to go anywhere to find nature, it’s in front of you, or it’s with you because she is you.
Healing Gardens Co(mmunity) is all about connecting people with the healing power of gardens, especially people who do not have access to gardens in urban areas.
Levi Brewster: How can people learn more about Healing Garden Co?
RK: Gardens have an incredible healing power and are big, complex metaphors for us to understand the same processes we go through in our own lives and see them physically represented in the garden.
What I have found is that what really draws people into gardens, what really keeps people in the gardens… is being in the garden. There are all these hidden metaphors [in the garden], compost being on of the ones that is really pertinent to our world right now. Compost being this … recognition that everything has value. A recognition that even what we call “trash,” even what we call “waste,” has value, and that really, there is no such thing as trash and waste. That’s this concept that we have invented in our society to denigrate and degrade others.
There’re all these important hidden metaphors for us in the garden that we can only see by spending quality time in the garden.
LB: You said that you came to gardening and farming through food, what were you doing before that and what led you in that direction?
RK: I was a computer science major in college and fascinated by technology and really thought that that was going to change the world. When I got to college and ended up doing what I thought I wanted to do, and being on the computer all day and not have a whole body experience in my work, it was draining and felt a bit extractive. I was looking for something more holistic.
I didn’t realize what I was looking for back then, but I wanted to get outside, do something that would contribute to my health… If I want to learn about health, I need to grow some food to understand what that process is, to understand what healthy food looks like, how is healthy food grown? That’s how I got into gardening at the very beginning.
PA: We like to ask everyone on [Earth Share] how they describe community. And I love that everyone has a completely different answer, if you want to talk about the community you feel you work within and that supports you and the connection you have, with how you describe community.
RK: Community is really important. Community is all about relationships, and what I’m learning is that relationships are our very existence. Our body is a community of relationships among cells. What we learn in our schooling and our culture, we have this concept of “I think, therefore I am”. We have this individualistic self-conception. Community is all about understanding that we don’t exist without others, understanding that we are constantly in relationship and constantly in exchange of energy and that we need the support of others, others need our support and that we don’t exist without these relationships.
Community exists beyond our relationships with people…. You can find some form of community with plants, community with soil. When I’m feeling lonely … I’ll just go out and check on my worms, hang out with them, I’ll sit and watch the butterflies flapping around and that is a sense of community.
LB: One of the conversations that I know we have all been having in a lot of the organizations we work with about equity and access, and in what spaces people feel safe. This is definitely something we are talking about at Arlington, as a public garden that is free for anyone to come to, do people actually feel taken care of and safe and welcomed. How do you see that manifesting in the work that you do?
RK: Right now we are in a very special moment, I think, when large parts of our society are expressing the pain that they’re going through and the pain that they’ve been going through and expressing very clearly that we’re not listening. And I see the power of these urban gardens to help people reflect and understand that people don’t cry out for no reason. People don’t feel neglected for no reason.
Our culture has this very abusive [sub-layer] to it. If we can start to see that in soil, we can start to see that in people … I understand through gardening how to treat soil, I understand how to care for soil, I understand how to express my love for soil. When I think about a person, I think “OK, this person is feeling abused or feeling closed up, if I was thinking about soil, how would I treat the soil, if the soil had been abused?” So I respond to the person in the same way.
If your soil has been abused, it doesn’t help to be like, “you suck soil, it’s all your fault.” What does help is saying, “I see what’s going on, I’m learning about your history, I want to offer some care to you. On a very simple level: I’m going to feed you, provide you with water.” And then getting into more complicated forms of care: “What kind of relationships are you looking for? Who do you want to hang out with? What are the ways I can meet your needs? What are your desires? What are your deep desires?” That’s where I see urban gardening providing us with lessons with what’s happening in our society today.
PA: Do you feel that right now there is a shift going on culturally to express that desire to be around more gardens, to be able to farm anywhere: at your own house, or space, or empty lots?
RK: Yes, I think that’s happening in a huge way right now…We have seen a tremendous increase in an interest in urban gardening. At this moment, it’s a really powerful way to understand the moment that we’re in.
I really hope we can start to recognize the value of everyone…. We need to stop seeing the world as a collection of dead things that sometimes come to life. We need to start seeing this world as a living being expressing Herself in many different ways. If we can start to recognize that and understand that everyone requires care and everyone requires love. We can’t help people heal and we can’t help people grow by force. | <urn:uuid:b3289f5f-082e-4f2d-990b-5ac9d54b8772> | CC-MAIN-2022-33 | https://www.arlingtongardenpasadena.org/2020/07/11/earth-share-episode-4-w-rishi-kumar/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00075.warc.gz | en | 0.973481 | 1,541 | 2.109375 | 2 |
If you’ve ever emerged from a shopping excursion with absolutely no idea of where you parked your car, you’ll be happy to know that a simple (and free) feature can make life a whole lot easier, and it’s all thanks to Google Maps.
As CNBC reports, the driving-direction software is able to pinpoint the location of your vehicle—it just takes a little premeditation. When you park your car, open the app on your phone and tap the blue dot, which indicates your current position. Then, hit “Save Your Parking.” (On iOS, it’s worded as “Set As Parking Location.”)
Google Maps will now remember where your car is being left. (You can also add notes or even photos to help jog your memory.)
That’s it. Google Maps now knows where your car is. You can even share the location, in case you want to meet up with someone prior to entering a store or want to direct someone to get something from your car.
Subscribe to our Newsletter! | <urn:uuid:78568ffd-4551-4f54-a1c0-c1dfca8777d7> | CC-MAIN-2022-33 | https://traviscountynewsonline.com/how-to-locate-your-parked-car-with-google-maps-mental-floss/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00073.warc.gz | en | 0.940721 | 233 | 1.851563 | 2 |
Chris Evans is a remarkable star, not just in the Captain America films but additionally in many other motion pictures. Yet the role of Captain America has actually constantly been one that gives him and his body the most work. The duty is made for someone who has the body of a six-pack and the toughness of an over-sized hamster. It was no surprise then that when the very first Captain America film came out it turned out to be a substantial hit and also the star that played the original Steve Rogers took place to star as the current Captain America in the follow up.
Now, when people think of just how does Chris Evans exercise to plan for a duty he plays, they commonly have a tendency to focus on the actual physical aspect of his exercise. He does have some superb abs to make sure that must be assisting him out right? Well, not specifically. Chris Evans Physical Fitness
The fact is that the real key to just how does Chris Evans exercise each day is not around developing huge muscular tissues. The character of Captain America is a really muscle male. As a matter of fact, in the comics the Cap was a body building contractor prior to he ended up being the actor we know as well as enjoy. In the comics, Rogers functioned thoroughly with the Soviet military. This suggests that there is a great deal of lean muscle on display in the Captain’s body.
Nevertheless, muscular tissues alone will not lead to massive, flourishing abdominal muscles. There is even more to creating biceps, triceps muscles and the rest of the upper body than just accumulating the muscular tissues. The truth is that a solid body builder will have a healthy way of life. He’ll eat a well balanced diet, beverage lots of water as well as workout on a regular basis.
When we take a look at the way the Captain America movies have Evans ahead duty, we also see him as a lean mean force of nature. He’s not a satisfied go lucky person, neither is he right into crash diet or “expanding”. Instead, he has a major, deliberate and humble perspective about life as well as works hard. To get this function as a leading male, you require to be a little more than an enthusiast body with big muscular tissues. You require to have a function and also a wish to lead, while being extremely fit and solid.
What does Chris Evans carry out in order to obtain the body of a dedicated body home builder? To start with, he consumes a well balanced diet. He eats plenty of protein and complex carbs. Protein helps construct muscles, while complicated carbs provide power for daily activities. An appropriate diet will certainly keep you stimulated and stop you from getting tired out. And also, you will certainly see some arise from this sort of discipline, particularly in regards to added lean muscle mass.
In terms of cardio, Evans likes to sweat it out. To be able to jump right into his function as Captain America, Evans needed to be in good shape. The bodybuilder’s routine often consists of lengthy walks, running and also climbing up hillsides. These tasks aid increase the cardiovascular system and also offer the muscles a well-deserved rest in between strenuous cardio workouts. While you could not see way too much adjustment in your body when you enjoy the Captain, you will certainly see a substantial change in your appearance.
You might think that a 6 pack is all Chris Evans needed to be a wonderful actor and also physical fitness professional, yet the truth is that he worked hard for that body. Plus, he has actually confirmed that a fit body can make a strong, positive impact on your character. With strong muscle mass, you can be certain that Evans will constantly be a positive, motivating good example to youngsters as well as grownups. Keep in mind, health will certainly always be a possession to any person, even if they are simply human. So, head to the gym and work with the Captain to enhance your total wellness. Chris Evans Physical Fitness | <urn:uuid:fc1b1fe8-b33c-4f42-96df-6b6ea4154901> | CC-MAIN-2022-33 | https://storageaholic.com/chris-evans-physical-fitness-workout-preparation-for-captain-america | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00065.warc.gz | en | 0.974097 | 812 | 1.640625 | 2 |
Mycoplasma pneumoniae, a threatening pathogen with a minimal genome, is a model organism for bacterial systems biology for which substantial experimental information is available. With the goal of understanding the complex interactions underlying its metabolism, we analyzed and characterized the metabolic network of M. pneumoniae in great detail, integrating data from different omics analyses under a range of conditions into a constraint‐based model backbone. Iterating model predictions, hypothesis generation, experimental testing, and model refinement, we accurately curated the network and quantitatively explored the energy metabolism. In contrast to other bacteria, M. pneumoniae uses most of its energy for maintenance tasks instead of growth. We show that in highly linear networks the prediction of flux distributions for different growth times allows analysis of time‐dependent changes, albeit using a static model. By performing an in silico knock‐out study as well as analyzing flux distributions in single and double mutant phenotypes, we demonstrated that the model accurately represents the metabolism of M. pneumoniae. The experimentally validated model provides a solid basis for understanding its metabolic regulatory mechanisms.
A new genome‐scale metabolic reconstruction of M. pneumonia is used in combination with external metabolite measurement and protein abundance measurements to quantitatively explore the energy metabolism of this genome‐reduce human pathogen.
We established a detailed biomass composition for M. pneumoniae, thus allowing for growth simulations.
Using our metabolic model, we corrected the metabolic network topology and the functional annotation of key metabolic enzymes.
M. pneumoniae, unlike other laboratory‐grown bacteria, uses a high fraction of energy (up to 89%) for cellular maintenance and not for growth.
Simulating different growth conditions as well as single and double mutant phenotypes, we analyzed pathway connectivity and the impact of gene deletions on the growth performance of M. pneumoniae, highlighting the limited adaptive capabilities of this minimal model organism.
Representing cellular networks by mathematical models and gaining novel biological insights from subsequent in silico analysis and iterative experimental validation are major hallmarks of systems biology. The integration of experimental data from different sources into suitable mathematical models poses a formidable challenge, but allows to place metabolites and enzymes into their network context and to extract biologically relevant information for the examined system (Kitano, 2002). For this purpose, constraint‐based modeling approaches that allow the determination of possible network flux distributions provide a useful framework (Fell and Small, 1986; Savinell and Palsson, 1992a, 1992b; Feist et al, 2009; Oberhardt et al, 2009).
Flux balance analysis (FBA) is a mathematical method to determine metabolic fluxes within a constraint‐based model, that is, fulfilling the steady‐state condition. Thereby, the flux distribution is optimized toward so‐called objective functions, commonly energy production or growth in form of biomass production, for a given set of available nutrients (Varma and Palsson, 1994a; Kauffman et al, 2003; Reed and Palsson, 2003). FBA has been successfully used to, for example, predict the effect of mutations on Escherichia coli growth rates (Edwards and Palsson, 2000), to predict active pathways under different growth conditions (Covert et al, 2001), to improve biotechnology applications (Puchalka et al, 2008), and to understand infection processes (Oberhardt et al, 2008). More recently, in vivo reaction directionalities were assigned to the E. coli metabolic network, considering quantitative metabolite measurements and associated fluxes (Fleming et al, 2009). In the past year, several tools for constraint‐based modeling, including tools for data integration and extraction of relevant information from the modelled system, have been developed (Fleming and Thiele, 2011; Schellenberger et al, 2011; Thorleifsson and Thiele, 2011). In addition, the first reconstruction of the human metabolism has been published (Duarte et al, 2007; Rolfsson et al, 2011) being the largest metabolic reconstruction so far.
However, the sheer complexity of living systems and the scarce availability of unbiased, large‐scale quantitative data often prevent comprehensive organism‐wide studies. Thus, knowledge gain from modeling approaches is limited due to the difficulties in setting up validation experiments for specific model predictions. In recent years, the bacterium Mycoplasma pneumoniae, a human pathogen preferentially colonizing the pulmonary epithelium (Waites and Talkington, 2004), has been established as model organism for systems biology, providing the research community with detailed quantitative information on its genome, transcriptome, proteome, and metabolism (Güell et al, 2009; Kühner et al, 2009; Yus et al, 2009; Maier et al, 2011). M. pneumoniae combines several favorable properties for organism‐wide analyses. It evolved by massive genome reduction, resulting in a single, small chromosome of only 816 394 base pairs, encoding 689 proteins (Himmelreich et al, 1996; Dandekar et al, 2000). Its expressed proteome is of low complexity, spanning only three orders of magnitude in abundance (Maier et al, 2011). As a consequence of reduced genome and parasitic life, M. pneumoniae lacks many metabolic pathways, forcing it to acquire the necessary cell building blocks, among them amino acids, nucleobases, and fatty acids, from the environment (Yus et al, 2009). For ATP generation, M. pneumoniae relies on simple organic acid fermentation, due to the absence of TCA cycle and a functional respiratory chain (Pollack et al, 1997; Yus et al, 2009). The lack of most anabolic processes and rescue pathways known from more complex organisms and, consequently, the expected high linearity of its metabolic network render M. pneumoniae an ideal organism to study basic metabolic functions and to dissect energetic expenses. In addition, it can be grown autonomously in a laboratory environment and basic genetic tools, such as transposon mutagenesis to study gene essentiality, are available.
We present here a genome‐scale constraint‐based model of the M. pneumoniae metabolism (iJW145—in silico model including 145 genes, designed by JW). We established the biomass composition of an average M. pneumoniae cell based on quantitative experimental data. Performing FBA for growth simulations under a wide variety of conditions, we explored and characterized the metabolic network by an iterative cycle between model predictions and their experimental validation. We corrected the metabolic network annotation and the functional annotation of three metabolic enzymes. In addition, we quantitatively dissected the M. pneumoniae energy metabolism. We show that M. pneumoniae dedicates most of its energy to cellular homeostasis and not growth, as suggested for other bacteria (Schuetz et al, 2012), possibly as a consequence of its small size and its parasitic life style. We analyzed carbon fluxes in vivo and predicted metabolic fluxes in silico. Finally, we proved the predictive capacity of the model by predicting gene essentiality with high accuracy (95%) and specificity (98%). The analysis of the derived single and double mutant phenotypes provided insight into the adaptive capabilities of the metabolic network.
The presented model and the biological findings herein reported can be used for the design of future experiments and the development of novel engineering tools. Furthermore, this model will provide the basis to design dynamic models for metabolic sub‐networks and to relate the gene‐regulatory and the protein interaction networks to metabolism in M. pneumoniae.
A constraint‐based metabolic reconstruction is a union of (i) a stoichiometric metabolic model, (ii) a set of constraints for metabolic fluxes. and (iii) a list of genes responsible for the catalysis of reactions included in the model. Based on a curated wiring diagram for the metabolism of the bacterium M. pneumoniae (Yus et al, 2009), we built a genome‐scale constraint‐based metabolic reconstruction (iJW145_reconstruct—initial reconstruction of the network, Figure 1). The main subsystems of the metabolic network are energy producing pathways, amino acid, nucleotide, lipid, and cofactor metabolism as well as transport reactions. In addition, we considered RNA, DNA, and protein biosynthesis as part of the metabolic network (Supplementary Figure S1; Supplementary Table S1).
Missing transport reactions were added and reaction reversibilities for the metabolic network were defined (Supplementary Table S2; Supplementary information). We assessed the correct connectivity of the reconstructed network by individually testing the feasibility of the production of all metabolic intermediates in silico. Contrary to more complex organisms, the M. pneumoniae metabolic network is predominantly composed of linear pathway modules and with the exception of ubiquitous cofactors, such as AMP, ADP, ATP, H+, H2O, NAD+, NADH, Pi, PPi, only few metabolites interconnect the core metabolic routes (Supplementary Figure S1; Supplementary Table S3). For our study, this low connectivity of the M. pneumoniae metabolism facilitates the analysis of inter‐pathway crosstalk and enables the prediction of metabolic changes in response to environmental perturbations. Particularly, the absence of most catabolic and also a high number of anabolic routes in M. pneumoniae allows the direct relation of external metabolite measurements to intracellular metabolic fluxes and corresponding catabolic activity.
A possible connection of sugar metabolism to aspartic acid via its direct precursor oxaloacetate, which can be synthesized from pyruvate or malate, has been suggested (Manolukas et al, 1988). However, in an organism‐wide approach to quantify cellular proteins of M. pneumoniae, no proof for the presence of the proteins catalyzing the corresponding reactions has been found (Maier et al, 2011). To assure the completeness of the reconstructed network, we validated the proposed connection in vivo by determining the carbon flux from glycolysis into aspartate. To this end, we monitored the incorporation of 13C‐labelled carbon into aspartate. In agreement with previous results (Yus et al, 2009), even after 96 h of growth in medium containing 13C6‐labelled glucose as sole carbon source, no increase in heavy isotope‐labelled reporter ions for aspartate was observed (Supplementary Figure S2A). Thus, for M. pneumoniae cells grown in rich medium we could discard a link between glycolysis and amino‐acid metabolism involving aspartate as connecting metabolite.
To be able to predict metabolic flux distributions and to simulate cell growth with FBA, an accurate, quantitative representation of the biomass composition of an average M. pneumoniae cell is required. Therefore, experimental data on DNA content, RNA composition, and protein abundances were considered (Table I; Supplementary information) (Güell et al, 2009, 2011; Maier et al, 2011). For all three classes of macromolecules, we defined an artificial molecule reflecting their average cellular composition (Supplementary information). To accurately represent the composition of the cell membrane in our model, we experimentally analyzed the fatty acid profile of M. pneumoniae and quantified the fatty acid composition of the cytosol, the surrounding growth medium, as well as the cytoplasmic membrane directly (Supplementary Figure S3; Supplementary information). We found predominantly fatty acid chains of 16 and 18 carbons length in both the membrane and the cytoplasm (Supplementary Figure S3A). Based on our results, we designed an artificial molecule representing the average fatty acid composition to describe lipids in the M. pneumoniae biomass equation (Supplementary information). To account for the experimentally shown essentiality of vitamins and other cofactors, such as FAD, NAD+/NADH or folate (Yus et al, 2009), the end products of the secondary metabolism pathways were included into the biomass qualitatively, that is, in small arbitrary quantities, since a sensitivity analysis showed that a 10‐fold change in cofactor amounts does not significantly influence on the growth rate (Supplementary Figure S4; Supplementary Table S4; Supplementary information). Other cofactors, for example organic phosphate, were included based on the literature information (Table I; Supplementary information).
The biomass equation defining the macromolecular composition of an average M. pneumoniae cell in a general form reads:
Equation 1: Biomass (eq. 1)
DNA+RNA+proteins+lipids+bases+amino acids+fatty acids+cofactors→Biomass
The assembly of the stoichiometric network (iJW145_reconstruct) and the assignment of reaction reversibilities together with the definition of the biomass composition provided us with a version of our M. pneumoniae model that was able to simulate growth: iJW145_growth (Figure 1).
Model assessment and refinement
To validate the network structure of iJW145_growth and to avoid errors in the reconstruction (Reed et al, 2006), we determined the network behavior under different nutrition conditions. To this end, we defined several flux constraint sets based on own experimental data (Supplementary Figure S5) and the literature information (Supplementary Table S5; Supplementary information). As a general strategy, we minimized the possible number of flux constraints to not restrict the solution space of the model but to keep a high predictive capacity (Edwards et al, 2002; Covert and Palsson, 2003; Price et al, 2004). Maximum constraints were set to limit the uptake of all sugar sources and arginine (reflecting the available nutrients for the growth conditions and preventing unlimited ATP synthesis from arginine, Supplementary information), while minimum constraints account for mRNA and protein degradation rates, detoxification, and maintenance energy costs (Supplementary Table S5; Supplementary information).
Initial simulations for different growth conditions verified the network annotation (Supplementary Figure S1; Supplementary information). In addition, the observed in silico fluxes confirmed experimental data on mRNA expression of metabolic proteins (Güell et al, 2009) and for the design of a defined medium (Yus et al, 2009) (Supplementary information). However, we also identified several conflicts between model predictions and available experimental results (Hames et al, 2009; Yus et al, 2009). These conflicts were resolved by an iterative process, involving protein sequence comparison, additional experiments, literature mining, and repeated simulations using adjusted constraints (Figure 2; Supplementary information). In summary, the comparison of model results and experimental data referring to cellular redox states and to nucleotide metabolism led to the functional re‐annotation of three metabolic enzymes: MPN051—glycerol phosphate oxidase (Figure 2A), MPN394—NADH oxidase (Figure 2B), MPN256—no CTP synthase activity (Figure 2C), and guided the correction of the wiring diagram (correction of one reaction, deletion of two reactions, Supplementary information).
Simulation of biomass production
Batch culture growth experiments on glucose lead to a measurable decrease in medium pH (pH 7.8–5.5 during a 4‐day growth course) due to secretion of lactic and acetic acid (Yus et al, 2009). A shift from energetically favorable acetic acid production during early growth (4 ATP/glucose) toward predominantly lactic acid production during later growth stages (two ATP/glucose) has been observed (Supplementary Figure S5C–E). Concurrently, cellular lactate dehydrogenase levels (MPN674, LDH) increased five‐fold from 203 copies to above 1000 copies per cell during 4 days of growth (Maier et al, 2011). To correctly represent this metabolic shift in our model and to account for further carbon incorporated into glycolysis from other sources than glucose, we directly constrained the energetically favored acetic acid production. To this end, we fitted the maximum constraint for acetate production to the experimentally determined ratio of secreted lactic and acetic acid (Supplementary Figure S5E).
In laboratory experiments, M. pneumoniae can be grown in rich and defined medium (Chanock et al, 1962; Yus et al, 2009). In both conditions, it metabolizes glucose as major carbon and energy source. Alternatively, a variety of additional reduced carbon compounds, such as fructose, mannose, ribose, ascorbic acid, glycerol, glycerol 3‐phosphate (G3P) (Yus et al, 2009), and glycerophosphocholine (G3PC) can be metabolized (Schmidl et al, 2011). In addition, arginine can be used to produce ATP but we did not consider it as alternative carbon source since (i) its contribution to energy production is negligible, (ii) in vivo it did not permit growth (Yus et al, 2009), and (iii) only one enzyme involved in arginine fermentation has been detected (Maier et al, 2011). For the other carbon compounds, we adjusted the flux constraints of the model according to rich and defined growth medium compositions as described in Yus et al (2009) and applied FBA. We verified in silico the experimentally tested metabolic capabilities of M. pneumoniae (Table II; Yus et al, 2009; Schmidl et al, 2011). Under defined medium conditions (Supplementary Table S5) the model predicted growth on glucose, mannose, mannitol, ribose, and ascorbate. However, these strict constraints did not allow growth on fructose, glycerol, G3P, and G3PC (Table II). We identified the inability to provide the pentose phosphate pathway precursor fructose 6‐phosphate (F6P) for de novo nucleotide synthesis as cause for the observed in silico growth limitations (Supplementary Figure S1).
While in silico there is no difference in energy yield for M. pneumoniae grown on different carbon sources (assuming the same amount of carbon taken up for each sugar source, Supplementary information), in vivo the doubling times differed significantly and only glucose and mannose allowed robust growth (Yus et al, 2009). This apparent discrepancy can be explained by the abundances of the respective uptake and processing systems. While the glucose‐specific uptake protein (MPN207) has high copy numbers (∼385/cell), the known transport proteins for other sugars (fructose, ribose, ascorbate, mannitol, mannose, glycerol, and G3P) are 8–20 times less abundant (Maier et al, 2011). In fact, to allow relevant growth of M. pneumoniae on fructose in vivo the cells had to be adapted over several serial passages and showed significant overexpression of the proteins involved in fructose import and metabolism (Yus et al, 2009).
Cellular energy balance
Using constraints derived from non‐linear fittings to experimentally obtained metabolite quantification data (glucose consumption as well as acetic and lactic acid production for defining the carbon uptake and the acetic acid production, and total protein increase to restrict the growth rate) from batch culture growth (Supplementary Figure S5B–E), we applied FBA to our refined model to determine cellular ATP production at different growth stages (24, 36, 48, and 60 h). We found that during mid exponential growth (36 h after inoculation) ∼60 000 ATP molecules per cell and second are synthesized in silico (Supplementary Table S6; Supplementary Materials and methods).
Next, we quantitatively assessed the contribution of the available cellular energy to biomass production (eq. 1, Biomass) and other functions specified in the model, for example, protein turnover (Supplementary information). For this purpose, we compared in silico and in vivo doubling times (Figure 3A) at different growth stages. We found that simulation‐based results (between 2.3 and 3.8 h) differed significantly from experimentally measured values during the exponential phase in batch culture growth (between 19.7 and 59.7 h; Figure 3A), as well as from previous reports on microscope studies of single cell division (∼8 h; Seybert et al, 2006). These results suggest the existence of yet undefined ATP consuming reactions, contributing considerably to cellular energy homeostasis in batch culture growth.
To quantify the contribution of those additional cellular ATP sinks to the energy metabolism of M. pneumoniae, we defined a single unspecific energy consuming reaction. The minimum constraint of this reaction was fitted manually for each simulated time point in order to allow reproduction of in vivo doubling times. Strikingly, 71–88% of the total ATP available in silico is used for cellular tasks not directly involved in biomass production (Figure 3B; Supplementary Table S6). Consequently, depending on the growth time, only between 12 and 29% of the total available energy is used for cell growth. More precisely, at 36 h of batch culture growth M. pneumoniae uses 9.8% of its total energy for protein production and degradation (protein half‐life of 23 h; Maier et al, 2011) while 8.4% of the total ATP is dedicated to RNA production (mRNA half‐life of 1 min; Maier et al, 2011) and not even 0.1% to DNA synthesis (Figure 3C; Supplementary Table S6; Supplementary information). Lipid production consumes 0.5% of the available ATP while 5.9% are used for metabolic precursor uptake and the subsequent synthesis of secondary metabolites, such as vitamins, FAD, NAD(H), Pi, folate, and other defined functions such as detoxification (Figure 3C; Supplementary Table S6; Supplementary information).
To characterize the yet undefined energy sinks, we further either classified them as growth‐associated maintenance (GAM) and non‐growth‐associated maintenance (NGAM) (Pirt, 1965; Varma and Palsson, 1994b). To estimate the contribution of GAM to the total energy cost, we calculated upper boundaries for the ATP expenses related to post‐translational modifications (0.01%), DNA repair (0.01%), and chaperone‐assisted protein folding (0.25%) based on the available literature and experimental data (Figure 3C, Supplementary Table S6; Supplementary information; Drake et al, 1998; Naylor and Hartl, 2001; Maier et al, 2011; van Noort et al, 2012). Additionally, considering protein turnover costs and other defined expenses mainly related to the uptake and processing of cellular building blocks and reaction cofactors (as defined in the model), total expenses on GAM account for a maximum of 7.6% of the total available cellular energy.
Systematic literature screening for further cellular energy sinks identified proton translocation by the cellular ATPase as most significant quantifiable NGAM task (Kobayashi, 1985, Hutkins and Nannen, 1992). In fact, for lactic acid bacteria, the proton ATPase is the major contributor to maintain pH homeostasis (for a review, see Hutkins and Nannen, 1992). In these bacteria, the ATPase is predominantly involved in creating an optimal proton gradient across the cytoplasmic membrane to allow nutrient import and to maintain the intracellular pH in an acidic environment (Kobayashi, 1985; Hutkins and Nannen, 1992; Moreno et al, 1998). Considering the experimentally determined ATPase abundance (between 99 and 150 ATPase complexes per cell, Supplementary information; Maier et al, 2011) and assuming constant activity at the maximum catalytic rate reported (130 r.p.s.; Wu et al, 2010), we estimated the global ATP hydrolysis rate of the M. pneumoniae ATPase to be maximally ∼38 500 ATP per cell and second, accounting for up to 57% of the total available ATP at simulated 36 h of growth (Figure 3C; Supplementary Table S6; Supplementary information).
To further analyse the contribution of maintenance tasks to cellular energy homeostasis, we challenged growing M. pneumoniae cultures by incubating them for 36 h in medium with pre‐adjusted pH, ranging from pH 5.5 to 8.0. After harvesting the cultures, we measured growth medium glucose levels and protein content, reflecting cellular energy production and bacterial growth, respectively (Figure 4A; Supplementary information). Comparing protein production with glucose consumption for those cultures revealed that at physiological (high) pH, generated ATP is utilized for growth to a much larger extent than at low pH (Figure 4B; Supplementary information). These findings support our in silico energy analysis, particularly the predicted high cellular maintenance costs at later growth stages in batch culture (Figure 3B). Intriguingly, metabolically inactive cells in medium with low pH values resume activity when shifted back to physiological pH (Figure 4C). This indicates that growth arrest in acidic medium is not predominantly caused by cell death but rather by reversible metabolic stalling as a consequence of an unfavorable ion balance for ATP generation. Thus, in M. pneumoniae energy metabolism and biomass production are decoupled depending on growth medium acidity. Below a critical pH, cells enter into a reversible dormant metabolic state.
Taken together, we used our constraint‐based model and experimental results to quantitatively analyze the global energy balance of M. pneumoniae. Considering all quantifiable ATP consuming processes we are able to explain about 75–100% of the total growth stage‐dependent cellular energy expenses (Supplementary Table S6). Biomass production itself does account for about 11–22%, GAM for about 2–7%, and NGAM for 57–80% of the total ATP generated. This high fraction of energy dedicated to NGAM on first sight contradicts findings in E. coli where GAM expenses are far exceeding NGAM costs ∼2.5‐fold to ∼7‐fold (Varma and Palsson, 1994a; Feist et al, 2007). However, artificially adjusting E. coli doubling times to values measured for M. pneumoniae (20 h; Figure 3A) resulted in much higher NGAM expenses in E. coli, and a GAM/NGAM ratio approaching the value calculated for M. pneumoniae (Supplementary Table S7). Furthermore, our results coincide with a recently published whole‐cell model for M. genitalium (Karr et al, 2012) identifying protein and RNA production as the major ATP sinks in biomass production. Movement, which has been shown to be an energy consuming process in M. mobile (Jaffe et al, 2004), could not be estimated so far due to lacking information about the exact function of the gliding machinery and associated ATP costs.
It is important to note that in M. pneumoniae in silico even during the exponential growth phase 78–89% of the available energy is not directly used for the production of cell building blocks but for cellular homeostasis. This finding could also explain the large discrepancy of 44% between energy production and consumption observed in the whole‐cell model for M. genitalium (Karr et al, 2012).
Prediction of flux distributions for varying conditions in silico and in vivo analysis of central carbon metabolism
Introducing the maintenance energy sink reaction into our model and setting its constraint as described above completed the construction process of our metabolic model. The final model, iJW145, contains 306 reactions connecting 216 metabolites and 145 enzymes (Supplementary Figure S1; Supplementary Table S1). Its capability to simulate growth of M. pneumoniae in silico allowed us to reproduce experimentally determined doubling times.
Constraint‐based models describe cellular metabolism under steady‐state assumptions. Integrating experimental data on metabolic parameters and our information about energy homeostasis, we analyzed changes in metabolism during the exponential growth phase in silico. For this purpose, in addition to fitting sigmoidal functions to experimentally measured glucose consumption, protein production, as well as to lactate and acetate secretion during a 96‐ h time course (Supplementary Figure S5), we fitted a polynomial function to the in silico maintenance costs (Figure 3B; Supplementary Table S8). The fitted functions allow the calculation of metabolic constraints for any given time of a 4‐day batch culture growth experiment (Supplementary information).
Simulating growth under rich medium conditions with respectively determined sets of constraints (Supplementary Table S5; Supplementary information) permitted the prediction of metabolic flux distributions for different times of the exponential growth phase, thus providing information about the flux changes in batch culture growth (Figure 5A; Supplementary Table S9). To this end, we used representative flux distributions instead of considering multiple optima since a flux variability analysis (FVA) showed only negligible variability in the majority of the reactions (Supplementary Table S10, see below). We determined those changes between in silico flux distributions for 24, 36, 48, and 60 h of batch culture growth and found that the majority of the reactions (51.6%) show the same trend as biomass synthesis, that is, from 24 to 36 h the flux increases and from 36 to 48 h as well as from 48 to 60 h the flux decreases (Figure 5B). Another 2.6% of the fluxes change contrary to biomass synthesis, that is, first decrease (24–36 h) and then increase (36–48–60 h). Those findings support the notion that microorganisms generally optimize for growth (Neidhardt, 1996) and that the reductive genome evolution of M. pneumoniae eliminated most cellular functions not associated with growth and survival. For 11.4% of all reactions a constant flux increase is observed while 5.9% of the fluxes constantly decrease over time. The constantly changing reactions either belong to glycolysis, pyruvate metabolism, the energy producing arginine fermentation (amino‐acid metabolism) or are associated transport reactions (Figure 5C). This can be explained by the increase in maintenance costs during batch culture growth (Figure 3B) and the subsequent adaptation of the catabolic pathways as well as by the imposed acetate production constraints. Our results suggest the central carbon metabolism to be influenced rather by the external conditions challenging cellular maintenance functions than by the biomass production rate, which further supports our energetics analysis.
Around 1.6% of all reactions have the same flux at all times and two reactions show other changes not being used at all simulated time points. Both of them belong to the nucleotide metabolism. Our FVA revealed that around 14% of all reactions, mostly associated either directly or indirectly (by involving nucleotides as reaction cofactors) to nucleotide metabolism, can be used with differing fluxes to produce optimal solutions for FBA problems (Supplementary Table S10). For example, the two routes to produce deoxy‐CDP and deoxy‐GDP, respectively, are energetically equal and therefore do not alter growth rate and energy homeostasis, which explains the changes observed during the flux analysis. In general, the FVA revealed that the flux distributions predicted have only very low variability with most of the reactions either allowing no or only very little changes (Supplementary Table S10). A total fraction of 26.1% of the reactions is not used under the simulated rich medium conditions. A higher fraction of unused reactions was observed in amino‐acid metabolism, nucleotide metabolism, and pentose phosphate pathway (between 25 and 35%). Hence, these pathways could serve as possible rescue routes for the adaptation to diverse stress conditions. Lipid metabolism also contains 30% non‐active reactions, which in addition to being a direct effect of not including cardiolipin in the biomass (its catalyzing reactions are not used) is in agreement with detected protein quantification data of the respective pathway (Maier et al, 2011). Due to the simulated conditions, reactions involved in the processing of alternative sugars are not active which is in agreement with the low abundance of involved processing enzymes (Maier et al, 2011). In summary, the majority of the reactions of the metabolic network of M. pneumoniae are active even under favorable growth conditions reflecting the reduced genome and the simple linear network structure.
Usually, metabolic fluxes are studied in connection with transcriptomics data to reveal regulatory mechanisms, but in M. pneumoniae mRNA and protein levels correlate only moderately (Pearson's correlation coefficient of 0.41–0.51; Maier et al, 2011). Therefore, we integrated in silico flux changes along the exponential growth phase directly with protein abundance changes (Supplementary information). Aligning qualitative changes for protein abundances and fluxes along the exponential growth phase and in addition considering a 25% error rate for protein abundances (a two‐fold error was reported by Maier et al, 2011), we found that about 86% of all protein abundance changes agree with the in silico flux changes (Supplementary information). These findings are in agreement with a recent study analyzing the dynamic adaptation of Bacillus subtilis to nutritional shifts (Nicolas et al, 2012). The integration of information about post‐translational modifications (van Noort et al, 2012), however, did not lead to further conclusions about the influence of protein levels on metabolic regulation (Supplementary information).
To further validate the flux distributions predicted by the model, M. pneumoniae cells were pulse‐fed with heavy isotope‐labelled glucose (13C6H12O6) and the propagation of the labelled carbon atoms through glycolysis was observed by GC–MS (Supplementary information). To this end, we monitored reporter compounds for the pentose phosphate pathway (ribose 5‐phosphate (R5P)) and for lipid metabolism (G3P and glucose 1‐phosphate (G1P)) (Supplementary Figure S2A). Under rich medium conditions, we found a large excess of heavy isotope reporter ions for all detected intermediates of glycolysis already 15 s (earliest possible time point for reproducible measurements) after supplying 13C‐labelled glucose (Supplementary Figure S2B). This finding confirms the high fluxes predicted for glycolysis reactions in silico.
The model predicts slow influx from G3P and the pentose phosphate pathway into glycolysis and even slower outflux from glycolysis into lipids via G1P when compared with the overall speed of glycolysis in silico. We used R5P, a key intermediate of the pentose phosphate pathway, to check for outflux from glycolysis into the pentose phosphate pathway in vivo. Contrasting the high fluxes observed for glycolysis with 13C‐carbon saturation after 15 s, we did not observe a significant accumulation of labelled reporter ions for R5P on comparable timescales (Supplementary Figure S2A). However, after about 24 h supply of 13C6‐labelled glucose, intracellular R5P pools were fully labelled, indicating a slow, albeit steady flux from glycolysis into the pentose phosphate pathway in vivo.
Two independent branches connect glycolysis to lipid biosynthesis. The first branch involves G1P, a precursor providing hexose sugars for glycolipid synthesis. G1P gets synthesized from glucose 6‐phosphate (G6P) in a reaction catalyzed by the phosphoglucomutase (MPN066, 80 copies per cell; Maier et al, 2011). G1P is rapidly detected during flux experiments. However, the conversion of G6P into G1P is reversible and it cannot be excluded that G1P is only used as an extension of the G6P pool. For the second connection, G3P provides the polar head group to which fatty acids are covalently attached by ester bonds during phospho‐ and glycolipid synthesis (Supplementary Figure S1). When not imported from the growth medium or obtained from its precursor glycerol, G3P can be generated from dihydroxyacetonephosphate (DHAP) in the corrected GPO catalyzed reaction (compare Figure 2A; MPN051: 62 protein copies per cell; Maier et al, 2011). Analysis of the incorporation of labelled reporter ions in G3P revealed a comparatively slow conversion of DHAP into G3P, reaching saturation after 24 h of incubation (Supplementary Figure S2A) suggesting low flux between glycolysis and lipid biosynthesis as compared with flux velocity in glycolysis.
Summing up, our experimental analysis, in consistency with previous suggestions (Yus et al, 2009) and predictions from our own model as well as from the whole‐cell model for M. genitalium (Karr et al, 2012), showed that the flux through glycolysis far exceeds those shuffled to adjacent pathways such as the pentose phosphate pathway or lipid biosynthesis (Figure 6). Comparing in vivo results to flux distributions predicted in silico, we found that the model predicts well the major carbon flux through glycolysis. However, the flux directions between glycolysis and other metabolic pathways (namely between DHAP and G3P or between FBP+GAP and the pentose phosphate pathway) are inverted (Figure 6). This suggests a slight overestimation of the import of ribose and glycerol/G3P, which however should not significantly affect growth rates and overall energy metabolism due to the low fluxes in the branching reactions when compared with the speed of glycolysis (Figure 6).
Prediction of gene essentiality
To test the accuracy of the refined metabolic network on a global scale, we performed an in silico knock‐out study for genes encoding 131 metabolic proteins (Supplementary information; Supplementary Table S11). We systematically silenced, that is, limited to zero, all reactions catalyzed by the individual gene products and recorded the resulting growth ability for rich medium conditions (Supplementary Table S11; Supplementary information). Seventy‐three genes (56% of metabolic enzymes included in the prediction, Supplementary information) were identified as essential, because the respective in silico knock‐out either led to growth arrest (22%) or rendered the FBA infeasible (34%), that is, at least one minimum constraint could not be satisfied (Figure 7A; Supplementary Table SII). Conversely, 58 artificial gene knock‐outs (44%) resulted in objective values larger than zero, either showing no change as compared with the wild type (19%) or with a lower objective value as in the wild type representing a reduced fitness phenotype (25%), thereby predicting these genes to be not essential for growth and survival in M. pneumoniae (Figure 7A; Supplementary Table SII).
We evaluated the predictions by comparing them with a genome‐wide transposon mutagenesis‐based knock‐out screen in the closely related bacterium Mycoplasma genitalium (Glass et al, 2006) (Table III; Supplementary information). This comparison was based on the assignment of functional orthologs in the two mycoplasmas (Supplementary Table S12; Supplementary information). In a first, unbiased analysis of the in silico knock‐out results using gene essentiality in M. genitalium as sole criterion, we achieved 86% accuracy (correct predicted/total predicted) and 98% specificity (true negatives/(true negatives+false positives)) of our in silico essentiality prediction (Table III; Supplementary information). In case of a contradiction between prediction and this transposon study, we screened an M. pneumoniae transposon library (Halbedel and Stülke, 2007) for respective mutants (Supplementary Figure S7). Thus, we could confirm five model predictions that were not supported by the M. genitalium study alone, raising the prediction accuracy to 92%. Considering additional parameters, namely the literature data, and the simulation conditions, allowed the classification of another eight false‐negative hits (Supplementary information). Thus, the model predicts gene essentiality with a final accuracy of 95% and a specificity of 98% (Table III; Supplementary information). We conclude that our refined model of the M. pneumoniae metabolism (iJW145) possesses high predictive power regarding metabolic phenotypes.
To gain a more detailed quantitative understanding of the resulting phenotypic changes, we assayed the relative in silico flux changes of representative flux distributions for the individual reduced fitness knock‐out strains. As expected, most individual reaction fluxes (i.e., fluxes of all reactions under all different conditions) are downregulated (54%) or do not change (34%) in response to the different gene deletions in silico (Figure 7B). However, we also observed several (highly) upregulated reactions (10.4% of all fluxes) and a few changes in flux direction for reversible reactions (0.4%). Only 88 new fluxes in 32 reduced fitness mutant strains (1.1% of all fluxes) have been observed and they are all found in only 15 different reactions, highlighting—in agreement with our FVA—the limited ability of M. pneumoniae to dynamically adapt to perturbation conditions by using alternative metabolic routes for the synthesis of biomass components and ATP. We analyzed highly upregulated reactions as well as those with new or reversed fluxes in at least one in silico knock‐out strain further (Figure 7C). As expected, lactic acid production (M011) gets upregulated in all strains with gene knock‐outs in the acetate branch of pyruvate metabolism. Interestingly, the other 28 examined reactions belong either to the nucleotide metabolism (and reactions involving nucleotides as cofactors) or to the pentose phosphate pathway. This suggests that the non‐essential genes in those pathways allow M. pneumoniae to adapt to environmental changes and hence lead to a more robust metabolic network.
We used our final model (iJW145) to perform an in silico genetic interaction screen by predicting metabolic phenotypes for double knock‐outs of the 58 non‐essential metabolic genes (Supplementary Table S13). Genetic interaction screens are performed to assay network connectivity and to link functionally related genes of different metabolic pathways (Tong et al, 2001, 2004; Szappanos et al, 2011). Especially, the analysis of synthetic lethal and sick interactions, that is, those double mutants that cause cell death or reduced fitness, allows the identification of gene products that impinge on the same biological process (Hartman et al, 2001). The analysis of the synthetic lethal and sick interactions predicted in silico shows that genes involved in pyruvate metabolism have a global effect on the metabolic network behavior (Figure 8, for a list of gene names see Supplementary Table S14). Particularly, mpn674 encoding the lactate dehydrogenase has a strong influence on the phenotype fitness due to the limited acetic acid production. Pyruvate metabolism is central to cellular energy metabolism and mutations in the involved genes limit ATP availability for all cell functions. As expected, the double knock‐outs of the lactate dehydrogenase together with a gene involved in acetic acid synthesis are lethal for M. pneumoniae. Additionally, the genes coding for proteins involved in sugar uptake and processing can limit the synthesis of ATP and are also found enriched among synthetic lethal interactions (P‐value 6.4E−07). Furthermore, pentose phosphate pathway and folate metabolism genes, respectively, are found to be enriched among the synthetic lethal interactions (P‐values 0.00192 and 0.009981), confirming the existence of rescue routes for parts of these pathways suggested by the single knock‐out analysis.
In summary, flux activity analysis at different time points of the exponential growth phase and in in silico knock‐outs coincide suggesting the same metabolic pathways to be responsible for adaptation to perturbations in M. pneumoniae, namely nucleotide metabolism and pentose phosphate pathway. This can be explained by the relatively unchanging environmental conditions M. pneumoniae encounters in its natural habitat leading to the elimination of pathways not required for life in the lung. In agreement with a recently published study relating metabolic and gene co‐expression networks to predict gene essentiality in M. pneumoniae (Güell et al, 2012), our metabolic gene essentiality analysis identified the genes associated with the main catabolic pathways (glycolysis+pentose phosphate pathway) among the non‐essential genes as most important for the metabolic performance further highlighting the simplicity of the metabolic network of M. pneumoniae.
We developed a comprehensive metabolic model, iJW145, for M. pneumoniae. First, we reconstructed the metabolic network based on a manually curated metabolic map (Yus et al, 2009) giving rise to iJW145_recocnstruct. In the second step, we assigned reaction reversibilities and semi‐quantitatively determined the biomass composition of M. pneumoniae resulting in iJW145_growth. Third, the model was improved in an iterative process of in silico growth simulations and their evaluation based on a variety of experimental data and literature information. We were able to correct the structure of the metabolic network allowing the final model, iJW145, to reproduce experimental findings along the exponential growth phase (Yus et al, 2009).
The number of constraint‐based metabolic models of different organisms has been constantly increasing over the past years (for a list of validated models, see Feist et al, 2009 and Supplementary Table 2). For mycoplasmas, an automatic reconstruction for M. genitalium has been published (Suthers et al, 2009). However, since it has been shown that automatic reconstructions are often highly error prone (Reed et al, 2006; Henry et al, 2010), we integrated different experimental data directly during the manual reconstruction process. This enabled us not only to obtain an accurate metabolic reconstruction but also to revise the wiring diagram and the functional annotation of key enzymes.
After establishing the biomass composition of an average M. pneumoniae cell, we quantitatively analyzed its energy metabolism. Comparing our results with that of the recently published whole‐cell model for M. genitalium showed that both models identified protein and RNA production as well as their maintenance as the major energy sinks in biomass production (Karr et al, 2012). Most strikingly, we showed that M. pneumoniae—at least under laboratory conditions—dedicates only a small fraction of its ATP directly to biomass production. Alternative quantified ATP sinks include chaperone assisted protein folding, DNA maintenance, and post‐translational modifications. The combination of in silico calculations taking into account the ATPase protein copy number in M. pneumoniae and catalytic rates from other organisms reported in the literature, as well as the in vivo analysis of growth in medium at different pH suggest that the ATPase uses about 57–80% (growth stage depending) of the total generated energy to maintain a favorable proton gradient across the membrane and the intracellular pH. On the one hand, this surprising finding can be explained by the small size of M. pneumoniae. Membrane leaking and the transport of molecules across the membrane have a higher effect on cytoplasmic homeostasis in small organisms (M. pneumoniae has surface‐to‐volume ratio 2500 times higher than E. coli, Supplementary information; Supplementary Table S7). On the other hand, the continuous, growth‐associated secretion of acids poses an increasing pH maintenance burden on M. pneumoniae grown in batch culture. Therefore, in consistency with the abundance of the core components of the ATPase protein complex (Maier et al, 2011) and our experimental results for M. pneumoniae growth under pH stress (Figure 4A–B), we propose that at later growth stages most of the available energy is diverted toward cellular maintenance with the ATPase as a major energy sink of M. pneumoniae in batch culture growth, as also suggested for other lactic acid bacteria (Hutkins and Nannen, 1992).
In contrast to the high ATPase costs, the costs for protein folding and maintenance by molecular chaperones are surprisingly low taking into account their high cellular abundance (∼10% of the total cellular protein mass; Maier et al, 2011), as is the total amount of energy used for GAM (∼2–7% of the total generated ATP, ∼2.5–10% of NGAM). Despite it has been shown that GAM/NGAM estimations show considerable variance depending on the experimental data used (Varma and Palsson, 1994b; Feist et al, 2007; Orth et al, 2011), our finding is in agreement with recent results from the whole‐cell model in M. genitalium (Karr et al, 2012). Furthermore, we showed that the doubling time has major impact on the ratio between GAM and NGAM since assuming different doubling times while providing the same amount of nutrients leads to a significant alteration of this ratio (Supplementary Table S7). Summing up, we were able to explain 75–100% of the total ATP consumption during the exponential growth phase. Movement and attachment are the only known major energy consuming processes we could not assess in our analysis. M. mobile has been shown to use ATP for gliding (Jaffe et al, 2004) but no details on related energy consumption are available. The whole‐cell model for M. genitalium also showed that other cellular processes which are not considered in our metabolic model, such as chromosome condensation, RNA modification and processing, ribosome assembly, protein translocation, and the replication initiation only contribute to a minor extent to the cellular energy balance (<3%; Karr et al, 2012). The missing expenses can alternatively be attributed to (i) measurement errors in absolute cellular protein quantifications (a two‐fold error has been reported in Maier et al, 2011), (ii) the determined protein and mRNA turnover rates (we used average half‐life times Maier et al, 2011), or (iii) the estimation of cell doubling times (protein quantities in the beginning of a growth experiment, that is, up to 36 h after inoculation, are near the lower detection limit; Supplementary Figure S5A). When comparing our results with those of the whole‐cell model of M. genitalium (Karr et al, 2012), we find that both models agree in the general predictions on central carbon metabolism. Our findings on cellular energy homeostasis (Figures 3B and 4B) can also explain the discrepancy between produced and consumed energy found for M. genitalium in silico (44%; Karr et al, 2012).
The metabolism of most bacteria follows a single objective function: maximizing growth (Neidhardt, 1996; Buescher et al, 2012). A recently applied multidimensional optimality analysis revealed that metabolic flux states in bacteria additionally evolved to minimize the costs for adjusting to different environmental conditions (Schuetz et al, 2012). Our energy calculations and their integration with the model of M. pneumoniae represent a novel approach toward a more detailed understanding of cellular metabolism. They allow a quantitative dissection of cellular performance into energy gain, biomass production and other cellular, growth and non‐growth‐associated energy sinks. A comparison of maintenance energy costs between M. pneumoniae and E. coli revealed fundamental differences in their energy sink reactions, suggesting individual and characteristic energy expense profiles for different bacteria. We identified four parameters governing the composition of these energy expense profiles: the topology of the metabolic network, environmental conditions, growth rate, and cell size. In the case of M. pneumoniae, one can speculate if the large amount of energy diverted toward maintenance tasks and the associated slow growth in the laboratory additionally represent an adaption to its parasitic lifestyle on epithelial cells of the human lung.
Integrating flux distributions predicted in silico and an experimental analysis of the central carbon metabolism by 13C‐labelled glucose tracer experiments, we showed that glycolysis is directly connected to the pentose phosphate pathway and lipid biosynthesis but not to amino‐acid metabolism in M. pneumoniae in vivo. Model predictions and experimental results further agree that most of the carbon taken up is shuffled through glycolysis for the production of ATP during organic acid synthesis. However, in the flux directions of the minor inter‐pathway fluxes they disagree, indicating a slight overestimation of imported ribose and glycerol/G3P. For an exact in silico representation of also the minor fluxes, further experiments addressing nutrient uptake of M. pneumoniae from the environment are necessary but technically not feasible yet. Taking into account the comparatively small amounts of carbons shuffled via the routes interconnecting different metabolic pathways, we estimate the influence on the overall growth rate and energy balance to be very small.
One interesting general finding with respect to network dynamics is that under all simulated conditions (rich/defined medium, alternative sugars, knock‐outs) oxygen consumption is tightly coupled to acetic acid production. This prediction is in agreement with findings in other organisms, such as Lactococcus lactis, in which limited oxygen availability at later growth stages prevents the regulation of the cellular redox imbalance associated with acetic acid production, while the lactate dehydrogenase is released from its supposed oxygen‐dependent inhibition (Gottschalk, 1986; Neves et al, 2005). We propose that oxygen could also have a regulatory role in pyruvate processing in M. pneumoniae explaining the metabolic shift from mainly acetic to mainly lactic acid fermentation observed in vivo during a 4‐day batch culture growth experiment (Yus et al, 2009).
In silico knock‐out studies have been used in other organisms to predict gene essentiality (Reed and Palsson, 2003; Feist et al, 2007). With our prediction for M. pneumoniae we achieve slightly higher accuracy and specificity that has been obtained for E. coli so far (Feist et al, 2007). M. pneumoniae has an exceptionally high percentage of essential metabolic genes (56.6% versus. 19% in E. coli; Baba et al, 2006; Joyce et al, 2006) for which consequently no other gene can buffer the loss of function caused from gene deletion. We found that in M. pneumoniae nucleotide metabolism and the pentose phosphate pathway are the only pathways preserving rescue routes for gene deletion events. The most likely explanation for this lack of rescue routes in most pathways is the adaptation to parasitism in a specific relatively unchanging niche accompanied by the reductive genome evolution.
In vivo, synthetic genetic array analysis has been shown to allow the automating of the isolation and analysis of double mutants (Tong et al, 2001, 2004). We used in silico prediction of double mutant phenotypes to extract information about the specific effects caused by different gene deletions on the metabolic network, and the adaptive capabilities of M. pneumoniae. The results confirm the general findings of the single knock‐out simulations that have been evaluated based on independent experimental data. Especially in organisms for which no engineering tools for in vivo analysis of double mutant phenotypes are available, the applied in silico analysis provides a promising alternative to experimental approaches.
Materials and methods
The used model in sbml format including MIRIAM annotation is provided for download at http://nin.crg.es/serranolab/mycomap/ (user name: mycomap, password: bicha987) and can be accessed in the BioModels database with ID MODEL1301290000.
Constraint‐based modeling and flux balance analysis.
Constraint‐based modeling is an approach to analyze a (metabolic) system under steady‐state conditions. This means that the concentrations of the network components xi do not change over time, that is,
where N is the stoichiometric matrix of size mxn with m being the number of reactants and n the number of reactions and v an n‐dimensional vector containing the fluxes through the n reactions of the network. FBA is a mathematical method to determine a set of metabolic fluxes (the vector v) fulfilling the steady‐state condition and, at the same time, maximizing an objective function such as growth for a given set of available nutrients using linear programming (Varma and Palsson, 1994a; Kauffman et al, 2003). For our model, maximization of biomass production has been chosen as single objective function, since no other objectives have been revealed for M. pneumoniae so far.
We used the reconstruction and modeling platform ToBiN (Toolbox for Biochemical Networks; http://github.com/miguelgodinho/tobin). The initial reaction network was based on the list of reactions found in Yus et al (2009). Some changes had to be introduced to keep elements and charges balanced and to cope with reactions that can be represented in stoichiometric models only with considerable impact on the model complexity, such as RNA and DNA elongation reactions (see below). To simulate the exchange of compounds with the environment reactions producing or consuming given compounds have been defined (source and sink reactions). Appropriate reaction reversibilities and minimum–maximum flux constraints were imposed based on the experimental data and literature information (Supplementary Tables S2 and S5; Supplementary information). We used CellDesigner 4.1 (Kitano et al, 2005) to visualize the model (Supplementary Figure S1) and the abbreviations used can be found in Supplementary Table S15.
Definition of biomass equation.
Based on the general biomass equation (Results), the different components were identified and, if possible, quantified. According to Razin et al (1963), mycoplasma cells are composed of 54–62% protein, 12–20% lipids, 3–8% carbohydrates, 8–17% RNA, and 4–7% DNA. Assuming that one M. pneumoniae cell contains 10 fg of protein (Yus et al, 2009) and assuming proteins to compose 62% of the total cell mass, we were able to calculate the fractions of RNA and DNA. Based on sequence information and the biophysical properties of M. pneumoniae (Yus et al, 2009; Maier et al, 2011), we determined the DNA to account for 5% and the RNA to account for 6.5% of the total cell mass. Further, we assume that 20% lipids and 6.5% carbohydrates and other metabolites make up the missing 26.5% of the cell mass (Supplementary information). The lipid composition of mycoplasmas varies depending on the fatty acids provided with the medium (McElhaney and Tourtellotte, 1969; Pollack et al, 1970; Rottem, 1980). As these variations cannot be represented in a static model, an artificial molecule has been defined taking into account the average fatty acid composition determined (Supplementary Figure S3; Supplementary information, dataSheet). The synthesis of each macromolecule (RNA, DNA, and protein) is represented by a dedicated artificial reaction (Supplementary information). To consider mRNA and protein half‐lives, minimum constraints have been set on the respective degradation reactions. DNA repair as well as rRNA and tRNA degradation have been accounted for qualitatively by small overhang quantities of the respective components in the biomass equation (Supplementary information). Free bases and free amino acids (together accounting for ∼1.5% of the total biomass) were quantified by GC‐MS analysis (unpublished results). To account for the essentiality of vitamins and other cofactors, the end products of the secondary metabolism pathways are included into the biomass equation qualitatively (i.e., in small arbitrary quantities), whenever their precursors have been shown to be essential in the defined medium (Yus et al, 2009). This qualitative consideration is possible, as they are supposed to be low abundant and we proved in a sensitivity analysis that a 10‐fold change of their quantities does not change the general model behavior but only introduces a negligible change in the objective value and thus the in silico doubling yield. The missing proportion of biomass is accounted for by including a respective amount of G6P (representative for carbohydrates) into the biomass equation. To overcome missing experimental information and to restrict the complexity of the model, a number of approximations have been made which are fully listed in Supplementary information.
We varied different macromolecule fractions of the biomass based on the ranges reported by Razin et al (1963), namely protein from 54 to 62%, RNA from 6.5 to 10% (a further increase in the RNA fraction was not possible without altering other biomass fractions), and lipids from 12 to 20%. Furthermore, we tested the impact of a change in the amount of cofactors included in the biomass from 0.1‐ to 10‐fold as compared with the value given in the M. pneumoniae biomass function. In all cases, the total cell weight was maintained constant by accounting for the applied changes by a respective increase or decrease in G6P (representing carbohydrates). We tested the influence on the growth rate (keeping fixed all normal growth constraints, including the minimum constraint for maintenance costs) as well as on the maintenance energy (in this case, manually fitted the minimal constraint for maintenance energy to reproduce in vivo doubling times.
Growth simulations for the exponential growth phase (24–60 h after inoculation) have been accomplished using biomass production as objective function for the FBA. The resulting objective value ov gives information about the doubling time tdoub of an average M. pneumoniae cell. The relation of the tdoub and ov when assuming a constant cell number (1 g of cells is the default in the used modeling platform ToBiN) can be described by tdoub=1/ov. Thus, it is possible to distinguish between growth (ov larger than zero), catabolic activity (growth arrest) (ov equal to zero), and cell death (infeasibility of the FBA). The FBA solution is considered as infeasible if at least one of the minimum requirements specified cannot be satisfied under the given nutrient conditions.
Flux variability analysis.
FVA is a method to assess the potential alternative flux distributions supporting a given FBA objective. After performing FBA optimization, the objective flux (e.g., Biomass production) was fixed to the value 0.01% lower than the FBA result (this slight decrease in the objective flux aimed at avoiding model infeasibilities due to rounding errors) and for each model reaction two FBA runs were performed, one setting the flux maximization and one setting the flux minimization through the reaction as the objective. Reactions for which these two values differ span the space of alternative flux distributions. As these optimizations are not independent of each other, not every flux combination lying within the hypercube spanned by the minimal and maximal flux values supports the initial value of the objective (or even valid flux distribution).
All constraints and fluxes in ToBiN have the unit mmol × g(cells)−1 × h−1. To calculate the total ATP produced by M. pneumoniae in silico, we summed up the ATP production of the different catalytic pathways in M. pneumoniae using the following equation:
flux(prod(ATPtotal)) =flux(prod(LAC))+2 × flux(prod(ACE))+flux(prod(ornithine))
with prod:= production. To know the production per M. pneumoniae cell, we converted the obtained fluxes into molecules × cell−1 × s−1.
Comparison of qualitative changes in fluxes and protein abundances.
First, linear fittings to the in silico reaction fluxes obtained at t=24, 36, 48, and 60 h and to protein abundances measured at t=24, 36, 48, and 72 h during batch culture growth experiments in vivo (Maier et al, 2011, unpublished results). Second, we determined the qualitative overall change of fluxes and protein abundances during the exponential growth phase, considering proteins to change only if the measured abundance difference exceeds 25% of the abundance at t=24 h, thus accounting for the reported experimental error that would otherwise have a high impact especially on the changes of low‐abundant proteins (Maier et al, 2011). Finally, we aligned protein concentration changes with the change of the sum of fluxes of reactions catalyzed by the respective enzyme (Supplementary Figure S6).
Gene essentiality prediction.
For the gene essentiality prediction, the gene–protein relationship has been determined for all reactions for which the catalyzing enzyme is known. In each in silico knock‐out, all reactions catalyzed by the corresponding gene product have been limited to zero flux. A gene is considered as essential when its knock‐out leads to an objective value of zero (no growth but minimum constraints can be matched) or the infeasibility of the FBA (minimum constraints are not fulfilled). The genes encoding proteins catalyzing DNA degradation, protein folding and the ATPase reaction have been excluded from the essentiality prediction since their corresponding functions have not been modeled explicitly. All simulations of this section have been performed using rich medium conditions for 36 h growth time (Supplementary Table S5). Since the amount of energy used for maintenance tasks has been determined by manually fitting the minimum constraint of the respective energy consuming reaction to allow reproduction of the experimentally determined doubling time, those expenses have been neglected for the essentiality prediction. Otherwise, a knock‐out leading to significant slower energy production would result in infeasibility of the FBA. Subsequently, the obtained objective values give no information about the absolute doubling times but only about the relative changes in the growth rate between wild type and knock‐out simulation.
For the prediction of double mutant phenotypes, we applied the same strategy as for the single in silico gene knock‐outs, but simultaneously silenced the reactions catalyzed by two different non‐essential enzymes at a time. Double knock‐outs resulting in reduced fitness, that is, the objective value is smaller than for the two corresponding single knock‐outs alone, or in cell death, that is, the objective value equals zero or the FBA is infeasible, were considered for the analysis of synthetic lethal and sick interactions.
For the statistical analysis of accuracy and specificity of the gene essentiality prediction, we evaluated the prediction results based on a genome‐wide transposon study in M. genitalium (Glass et al, 2006), transposon screens in M. pneumoniae (this study), and the simulation conditions. Computationally and experimentally essential genes are considered as true positives, true negatives are computationally and experimentally not essential, computationally essential and experimentally non‐essential genes are defined as false positives and computationally non‐essential and experimentally essential genes accordingly false negative hits.
All sequence analyses have been performed using the Basic Local Alignment Search Tool (BLAST) for proteins (pBLAST) (Altschul et al, 1997). pBLAST (algorithm pblast) was used as M. pneumoniae uses the TGA codon to encode for tryptophan instead of indicating the end of a gene as in most other organisms. Protein sequences of related organisms (ordered for preference: other mycoplasmas, B. subtilis, L. lactis, E. coli) were obtained from KEGG (Kanehisa and Goto, 2000) or the National Center of Biotechnology Information (NCBI) (Tatusova et al, 1999) and used to perform pBLAST against the M. pneumoniae proteome. Alternatively, M. pneumoniae protein sequences were aligned to the nr‐DB to detect possible homologies. This has been done so (i) to identify the cofactors used by the GPO (MPN051), (ii) to shed light on the NOX isoform (MPN394), (iii) to confirm that a reaction converting UTP into CTP does not exist in M. pneumoniae, and (iv) to search for proteins possibly catalyzing phospholipid production. All pBLAST results are shown in Supplementary Information, pBLAST Results.
GC–MS analysis of fatty acids.
Fatty acids were targeted specifically by using tailored protocols. Depending on the case, growth medium, total cell content, cell pellet, or cytoplasm was analyzed as described in each protocol.
Fatty acid analysis was conducted on all three cellular preparations according to Ghanem et al (1991). Briefly, to a sample preparation (lyophilized in the case of cytoplasm and growth medium, humid in the case of cell pellet or total cell content) 1 ml of NaOH solution (3.75 M in a 1:1 (v/v) MeOH:H2O mixture) was added. The suspension was incubated for 5 min at 100°C, vortexed for 10 s and incubated for another 25 min at 100°C. Samples were cooled to room temperature and added with 1 ml MeOH:HCl solution (0.46:0.54 (v/v) of MeOH and 6 M HCl) followed by 1 ml MeOH:H2SO4 solution (0.46:0.54 (v/v) of MeOH and 50% H2SO4). This mixture was vortexed for 10 s, incubated at 80°C for 10±1 min, and cooled on ice immediately. Subsequently, 1.25 ml of a hexane:ether (1:1 v/v) mixture was added and mixed end‐over‐end for 10 min. The water layer was removed after centrifugation for 2 min at 3000, r.p.m. Then, to the organic layer 3 ml of a NaOH:NaCl mixture (0.3 M NaOH in 4.75 M NaCl) was added and the solution mixed end‐over‐end for 5 min. The aqueous phase was frozen and the organic phase transferred to a new tube. The content evaporated under nitrogen stream at 30°C, and reconstituted in 100 μl hexane/tert‐butyl methyl ether (1:1 v/v). GC‐MS was carried out on a 6890N gas chromatograph coupled with a 5973 MSD (Agilent Technologies, Palo Alto, CA, USA). The fatty acids methyl esters were separated on a Phenomenex Zebron ZB‐5 crosslinked 5% phenyl polymethyl siloxane column (15 m × 0.25 mm i.d., 0.25 μm film thickness). Helium was used as the carrier gas at a constant pressure of 5 p.s.i. A 1‐μl aliquot of the extract was injected into the system operated in split mode (split ratio 70:1). The GC temperature is ramped as follows: initial 150°C, increased to 240°C at 5°C/min, held for 3 min, thereafter increased to 310°C at 30°C/min, and held for 2 min. The injector and transfer line are kept at 280°C, the MS source at 230°C, and the quadrupole at 150°C. The mass range scanned is from 50 to 650 Da. Conventional fatty acids were identified by comparison with the analysis of 1 μl of a reference mixture (Supelco 37 Component FAME Mix) under the same conditions. Other fatty acid methyl esters were identified by monitoring the typical loss of 43 mass units (CH3‐CO−) from the parent ion.
GC–MS analysis of glycolytic intermediates and reporter compounds for adjacent pathways.
For the analysis of glycolysis intermediates (cytosolic extract), samples added with the internal standard (5 μl of methyltestosterone 10 ng/μl) were lyophilized and subsequently dried in a vacuum oven (500 mbar, 50°C) in the presence of diphosphorus pentoxide for at least 4 h. Then, aldehyde and ketone functional groups were converted into methyl oximes with 75 μl of methoxyamine hydrochloride in pyridine (2 g/L) at 40°C for 90 min with intermediate mixing. Subsequently, hydroxyl groups were converted into trimethylsilyl groups with 100 μl MSTFA (N‐Methyl‐N‐trifluoroacetamide) at 40°C for 50 min. Samples were transferred to glass inserts, spun for 5 min at 5000, r.p.m., and the supernatant transferred to a new vial for GC–MS analysis (Chan et al, 2011). In all, 4 μl of glycolytic products was analyzed (split ratio 1:10) using a HP‐Ultra1 crosslinked methyl‐silicone column, 16.5 m × 0.2 mm i.d., film thickness 0.11 μm (J&W Scientific, Folsom, CA, USA) in an Agilent 6890N gas chromatograph coupled to an Agilent 5973 mass selective detector. Helium was used as carrier gas at a constant pressure of 5 p.s.i. The GC temperature is ramped as follows: initial 70°C, held for 1 min, increased to 280°C at 6 °C/min, and held for 1 min at 280°C. For optimal sensitivity, the acquisition, performed in SIM mode, was split into four time segments with three characteristic ions per compound (plus the corresponding 13C isotopes using 15 ms dwell times) in each. Four different time segments ranged from 6 to 16 min (13 ions: m/z 103.1, 117.1, 211.1, 232.2, 236.2, 299.2, 315.2, 369.2, 371.3, 384.3, 386.3, 445.4, 448.4 for phospho‐groups, PEP, GAP, DHAP, and G3P), 16 to 19.5 min (15 ions: m/z 103.1, 104.1, 147.1, 160.1, 162.1, 191.1, 205.1, 207.1, 217.1, 220.1, 307.2, 310.2, 319.2, 323.2, 409.3, fructose, I.S., Glucose, and G1P), 19.5 to 28 min (11 ions: m/z 103.1, 104.1, 299.2, 315.2, 357.2, 359.2, 387.2, 459.3, 462.3, 471.3, 475.3: F6P, G6P, and R5P), and 28 to 32 min (9 ions: m/z 103.1, 104.1, 299.2, 315.2, 357.2, 359.2, 387.2, 459.3, 462.3: FBP) (bolded are the ions corresponding to the 13C‐labelled compounds). Identification of the sample constituents was based on the theoretical fragmentation pattern expected for each compound. Quantification was performed with respect to the corresponding calibration curve standardized against the internal standard (methyltestosterone‐MO‐TMS). Samples and the calibration curves were analyzed at least in triplicate.
The 64 pools of an ordered collection of M. pneumoniae transposon mutants generated by ‘haystack mutagenesis’ (Halbedel et al, 2006) were assorted into 10 groups. Then, genomic DNA extractions were performed using Illustrabacteria genomic KIT (GE). The disruptive insertions in genes mpn133, mpn321, mpn392, mpn533, and mpn595 were detected by PCR (Supplementary Figure S7). The fragments corresponding to junctions between the genes and the mini‐transposon were amplified using the primer 3JpMT85 and the primers 5MPN133, 5MPN321, 5MPN392, 5MPN533, and 5MPN595, respectively (Supplementary Table S16). The position of the transposon insertion in the different genes was determined by DNA sequencing.
pH Re‐buffering experiment.
To test for the influence of the medium pH on growth performance, M. pneumoniae cells were grown in batch culture in 75 cm2 culture flasks. Cells were grown in pre‐culture for 96 h in glucose containing medium, harvested by scraping and diluted into fresh growth medium. Medium pH was adjusted back to pH 7.7 after 4 days of growth by titration with sterile 1 M NaOH. Samples from growth medium supplemented with 1% glucose (55.5 mM) were taken at indicated time points (Figure 4C). Glucose and lactic acid concentrations were determined with enzymatic assays.
M. pneumoniae growth in medium at different pH.
M. pneumoniae cells were grown for 48 h in 75 cm2 culture flasks with Hayflick medium supplemented with 55 mM glucose. The medium of each growth flask was exchanged with Hayflick medium with a pre‐set pH (between pH 5.5 and 8) and grown for additional 36 h. Triplicates have been used for each pH. Metabolite and protein measurements were done as in Yus et al (2009).
We thank Jörg Stülke from the University Göttingen for allowing us to screen their transposon library. We thank past and present colleagues for helpful discussions; in particular, Javier Delgado for help on scripting; Konstantinos Michalodimitrakis for experimental supervision; and Hinnerk Eilers for information on protein activity. We thank Toni Hermoso for the conversion of Supplementary Figure S1 into a clickable metabolic map. This work was supported by the European Research council (ERC) advanced grant, the Fundacion Marcelino Botin and the Spanish Ministry of Research and Innovation to the ICREA researcher LS. JW is recipient of a laCaixa‐CRG fellowship.
Author contributions: JW developed and organized the project, designed the model, analyzed the results, prepared figures, and wrote the manuscript. JP designed the model and analyzed the results. ML‐S performed the mutant screens and prepared Supplementary Figure S7. JM conducted the mass spectrometry experiments. EY performed the pH stress experiments to validate the ATPase hypothesis. MG provided data extraction and analysis tools. RGG analyzed the mass spectrometry results. VMdS initiated the project and contributed to its development. LS and EK contributed to the project design and development and discussed results. TM participated in the project development, performed experiments, contributed to the figures, and wrote the manuscript.
Conflict of Interest
The authors declare that they have no conflict of interest.
Supplementary Figures S1–8, Supplementary Table Legends S1–16
17 Tables, the last table contains requested additional raw data
SBML Model with MIRIAM annotation. ID in the BioModels database: ID MODEL1301290000
Source data for Supplementary Figure S2
Source data for Supplementary Figure S3A
Source data for Supplementary Figure S3B
Source data for Supplementary Figure S3C
This is an open‐access article distributed under the terms of the Creative Commons Attribution License, which permits distribution, and reproduction in any medium, provided the original author and source are credited. This license does not permit commercial exploitation without specific permission.
- Copyright © 2013 EMBO and Macmillan Publishers Limited | <urn:uuid:d285e3b6-4a97-4f7a-8bbe-c0b2490384f6> | CC-MAIN-2017-04 | http://msb.embopress.org/content/9/1/653 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00300-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.905144 | 16,437 | 1.765625 | 2 |
In June 2012, a 3-year-old boy attending the Ed-U-Care Children’s Center, a licensed daycare provider in Essex Junction, walked off the premises and wandered across four lanes of traffic on Susie Wilson Road. Luckily, an approaching motorist spotted him in the middle of the road and pulled him out of harm’s way.
According to a subsequent investigation by the Vermont Department for Children and Families’ Child Development Division (CDD), Ed-U-Care staffers never notified authorities that the boy was missing, as is required by law whenever a child disappears from a regulated daycare program. As a state official remarked later, “Someone just didn’t count heads.”
Stories like this would give working parents nightmares — that is, if they knew about them. Often, they don’t. By law, daycare centers must notify the parents of children in their care about any serious violations on the premises. But anyone else researching daycare options will find it difficult to learn about a facility’s checkered past.
Parents can look up a daycare’s regulatory history on the Bright Futures Child Care Information System — an online portal for information on all licensed and registered daycare programs. There they’ll see that Ed-U-Care was cited for 15 violations between February 2006 and June 2012.
But they won’t read an account of the June 2012 incident on Susie Wilson Road — or details of any other problems, for that matter. The write-up of the June 2012 incident reads: “Each child shall be visually supervised at all times in person by staff (except sleeping infants who are subject to in-person checks every 15 minutes) … Children must be visually supervised while napping/resting.”
Based on that assessment, a parent wouldn’t know whether a staffer merely left a toddler napping for a few minutes to change another child’s diaper — or, in this case, a child walked out the front door and into traffic. State field reports about such incidents are considered public information. But a parent has to know enough to ask for them — from either the provider or the state. It can take days, or weeks, to receive the information, by which time that daycare slot may already have been filled.
DCF officials admit they have too few people in the field inspecting daycare programs to ensure that they’re safe, clean and obeying the law. But there’s also a shortage of childcare facilities — and their numbers are actually dropping — that puts pressure on the state to keep as many places open as possible.
The problem isn’t new. In February 2012, the DCF official in charge of overseeing Vermont’s nearly 1600 regulated daycare facilities told a Senate committee that the licensing system “does not provide a reasonable threshold of safety for all children in regulated, out-of-home care.” Former CDD deputy commissioner Kim Keiser told lawmakers that the situation caused her to “lose sleep at night” because “I know we did not have the capacity to even stay abreast of situations that were directly putting children at risk.”
In retrospect, Keiser’s year-old warning was prescient.
Ed-U-Care owner Judith McKenzie describes the incident last June as “an unfortunate accident” but also an isolated one. She points out that the child was known as a “wanderer” and that the staffer responsible for his disappearance was fired.
“It was a terrible thing that happened, but it could happen to anybody,” adds McKenzie, who’s been in the daycare business for 26 years. “I’ve suffered terribly from this, as has everyone in the center.”
But the state didn’t revoke or suspend Ed-U-Care’s license. Why not?
Because the state licenser didn’t find a “pattern of neglect,” such as unsecured doors, broken fences or inadequate staff-to-child ratios, explains CDD Deputy Commissioner Reeva Murphy.
“Certainly, if we had kids walking away from the same place more than one time, we might suspend,” she adds. “Kids have walked off the premises even in five-star places … We just have to make those judgments.”
Officials at the CDD acknowledge that they lack the staff and funding to visit every daycare program in the state once a year, as the law requires — making it virtually impossible to observe any patterns of violations. Some facilities, especially registered home-based programs, can open for business and operate for years without a licenser ever setting foot inside to make sure it’s free of safety hazards and has operable smoke alarms, fire extinguishers and carbon monoxide detectors.
Each day, about 39,000 Vermont children, ages 6 weeks to 12 years, attend some form of regulated daycare program. The state has just seven licensing field specialists to oversee and inspect 1577 regulated programs statewide. That’s a caseload of 225 programs per licenser — the highest ratio of any state in the country.
The situation could change this year. The state’s budget for fiscal year 2013 includes funding to hire two more licensing field specialists, which would bring CDD’s total to nine and reduce the average caseload per licenser to 178 programs. But Murphy says she’d need a total of four more licensers to be able to visit every program in the state at least once a year.
Licensed programs, which are larger and have stricter rules than registered in-home daycare programs, are far more likely to be inspected. Currently, 90 percent of all licensed centers are inspected annually, but only 47 percent of home-based programs are.
Elizabeth Meyer is executive director of Child Care Resource in Williston, a nonprofit that helps connect parents with daycare providers. Last year she told the Senate Committee on Appropriations that, all too often, her staffers are “the only professionals who lay eyes on a Chittenden County program in a given year.” According to her own statistics, in the previous year, licensers visited just 55 percent of all regulated programs in Chittenden County. One program had gone more than five years without an inspection; 14 percent — or 44 programs — had no recorded state visits at all.
One Colchester daycare went without a license for almost a year — and essentially had its record of violations expunged — because of what the owner called a “miscommunication” with the state. The license for Muddy Hands Enrichment Center expired in April 2012 and was not renewed. State officials assumed the daycare had closed and removed it from the Bright Futures database.
The facility didn’t show up again until this reporter asked about it. Shortly thereafter, the state’s database indicated that a new license had been issued on December 30, 2012. However, 11 prior regulatory violations — from minor things such as missing job references to more serious ones, including the absence of staff trained in infant CPR — had been wiped clean from its record. Why? Because the new license was issued to different owners under a slightly modified name: Muddy Hands Preschool & Child Center. One of the new owners of Muddy Hands, Naomi Salls, says the state never received license-renewal paperwork from the previous owner.
“I had a little talk with my staff about that one, making sure our i’s are dotted and our t’s are crossed,” says Murphy, “because that’s a huge liability issue.”
There were no resulting regulatory ramifications for the center, which operated without a license for almost a year.
By law, Child Care Resource and its counterparts around Vermont are prohibited from telling parents about problem daycares even when they are aware of them; they can only make referrals, not recommendations. Lee Lauber of the Family Center of Washington County says her staff is sometimes conflicted about what it can and cannot reveal to parents. As long as DCF has granted a program the legal right to operate, she says, it’s considered “an interference” to share information with prospective parents that might paint the daycare in an unflattering light.
Lauber calls it “a very interesting conundrum.”
“There have been times when many concerns have been raised and some of them have been addressed and others still remain, and the program stays open,” she says. “That can go on for years.”
In some instances, the state has allowed daycare centers to remain open despite violations so egregious they put kids at risk of serious physical or emotional harm. Feels Like Home Playschool, a licensed daycare center in Essex Junction, racked up 16 violations in 2012, several of which were serious enough to warrant mandatory notification letters home to families.
Here’s what the Bright Futures database says about the rules broken: “Derogatory or humiliating remarks made by staff in presence of children or families are prohibited”; “Infants shall be held during bottle feedings unless they are able to hold their own bottle and wish to do so”; and “No employee, volunteer or parent shall use any form of inappropriate discipline or corporal punishment.”
The state licenser’s seven-page field report, dated November 6, 2012, paints a far more disturbing picture of the care Feels Like Home provided. That report indicates that a staffer “grabbed and squeezed a child’s face with one hand, followed by pushing the child away because the child walked into a puddle.”
Another entry indicates that, “staff frequently yell[s] at children in an abrupt, harsh tone on an almost daily basis. A staff member was observed yelling at a crying child while face-to-face with this child.” That same staffer was later seen “changing to a positive, friendly tone upon a parent’s arrival.” Still another employee was overheard telling a child, “If you hurt that baby, I swear to God you’re gonna sit outside until your mom gets here!”
According to the report, the “derogatory or humiliating remarks” included “staff call[ing] children names such as hog, retard, moron, idiot, stupid and momma’s boy.”
Other entries in the report suggest that physical and emotional abuse occurred, such as “staff engage[s] in threatening behavior that is frightening for children.” In one instance, a teacher “motioned quickly toward the child’s head with the back of her hand as if to hit the child, followed by kissing the child on the head.”
The licenser further documented that “one teacher held a preschool-age child by the ankles, swinging the child like a bat at a dodge ball thrown at the child by a second teacher … hitting the child in the chest area several times. The child’s arms flailed and the child appeared to be upset.”
The licenser also observed potentially life-threatening bottle-feeding practices. In one case, an infant was observed sleeping in a portable crib with a “boppy pillow placed under the infant’s head, with a blanket wrapped around the sides to hold the bottle in the infant’s mouth.”
The licenser immediately notified the facility’s managers and staff that such practices put infants at risk of choking, as well as sudden infant death syndrome (SIDS). The managers’ response? According to the report, she stated that her staff has been “repeatedly” warned not to do this, but that supervisors “don’t know what else to do when staff do not follow directions.”
The report also indicates that information provided to licensers on five previous site visits was determined to be “false and designed to impede and deter CDD investigations.” In other words, the operators of Feels Like Home evidently knew that what they were doing was wrong — if not dangerous and illegal — but did it anyway, then tried to cover it up.
Were it not for independent video footage provided to investigators — footage which the state now says is no longer available, in response to a reporter’s records request — many of the more dramatic violations documented by the licenser might have gone undetected and unaddressed.
Nonetheless, Feels Like Home Playschool continues to operate.
“No corporal punishment was observed,” says Murphy by way of explaining the decision. Staff behavior “was what we considered inappropriate guidance behavior.” She says the licenser spent four days at the facility afterward, which she calls “a long time” — a typical visit lasts a few hours. The owners notified parents and made staff changes, and regulators increased their surveillance with repeated follow-up visits.
“[Our staff] had this huge discussion at the time that kids should not be subjected to this every day, that these people are just mean. And I agreed with them 100 percent,” Murphy says. “But again, if I’m going to shut this place down because these people are unpleasant, do I have a valid [reason]?”
A spokesperson for Feels Like Home, who agreed to talk to a reporter on condition of anonymity, claims that many of the findings in the state’s report were untrue. She says the allegations about derogatory and humiliating language were actually uttered by parents, not staff. She admits that a child was once held by his feet but claims the child “giggled.” She denies that a dodge ball was ever thrown at the child.
The only allegation she admitted to was the most serious one: that a child was left sleeping in a crib with a bottle propped in his mouth.
“Yeah, we deserved that,” the spokesperson admits. “It was wrong of them to do it, because we always told them not to.” However, she claims there was always a staff person nearby.
But such denials run contrary to what several former clients say about Feels Like Home. Six parents whose children attended the Essex Junction daycare pulled their kids out prior to the state’s visit in November. All say the state’s report is consistent with their own children’s experiences there.
One mom, who declined to be identified, says her daughter attended Feels Like Home for about five months. She says the girl, who has a speech impediment, often came home crying and complained that the staff made fun of her because of the way she talked.
Another mom, Teeshia Farmer of Essex, claims she once arrived to pick up her 9-month-old son “on a cold, 40-degree fall day” and found him outside in an Exer-Saucer, soaking wet and crying. She says she never went back. As she puts it, “I refused to pay for my son being neglected.”
Melissa Barrows of Westford says she once found a “handprint” on her child’s arm that clearly showed “three fingers and a ring.” She says a staffer admitted to having restrained the child but downplayed the injury by saying that some kids bruise easily. Barrows says her child also came home complaining that the daycare people were being mean to her and called her names.
“I couldn’t get my child out of there fast enough,” Barrows says. “I can’t believe this place is still open.”
Feels Like Home currently cares for about 20 children, with openings for an additional dozen. By law, Child Care Resource, the designated childcare resource agency for Chittenden County, must refer parents there unless the center is subject to an active investigation.
Regulators “walk a fine line” between protecting children and maintaining an adequate supply of providers to meet the demands of working families, according to Murphy.
“Our most important responsibility is to protect the health and safety and well-being of kids in the program. That’s number one,” she says. “But, number two, we also want to build a vibrant system so that when parents are looking, they have good choices to make. So we want to increase supply. We don’t want to just be shutting people down.”
License revocations, she adds, happen “very rarely — maybe only four or five times a year in center-based programs.”
In fact, CDD revoked only two daycare licenses in 2012. In the first case, a registered in-home daycare provider, whom Murphy declined to identify, had its registration suspended because an adolescent living in the house was a “prohibited person” — that is, someone with a criminal record involving violence, assault or sexual misconduct. Murphy says state authorities entered the home, immediately notified all the client families and waited on-site until the last child was picked up.
In the second case, the state revoked the license of the Village Play Station in Pittsford for its “spotty compliance history,” incomplete documentation and “false information” provided to licensers — not for any health or safety violations. But Village Play Station appealed its suspension and has been allowed to remain open until that is resolved.
As of press time, the Bright Futures database showed no listing for Village Play Station, which means its regulatory history is invisible to the public. A phone call confirmed that the center is still accepting new clients.
In a third case, the state persuaded an in-home daycare provider in St. Albans to voluntarily surrender her registration after inspectors found “way too many kids” for the number of adults on site — 17 children for one adult, including six children under the age of 2. By law, a registered in-home provider cannot have more than two infants.
“License revocations tend to be messy,” Murphy says. “Sometimes it’s much better for us, and more timely for parents and kids, if the provider voluntarily goes out of business.”
When they don’t, she says, mandatory parental-notification letters “allow the parents to say, ‘Wow! That’s the last straw for me!’ And then the market takes care of the problem, because you can’t stay open for long if your parents are leaving.”
Murphy says her agency prefers to work with daycare providers to improve their practices rather than shutting them down. As Lauber points out, when a program closes, voluntarily or otherwise, it causes tremendous disruption, especially in more rural areas of the state. As she puts it, “If 30 to 50 kids suddenly need a place to go by the following Monday morning, the system cannot absorb it easily.”
If the childcare situation appears dire, relief may be in sight. Vermont is in the midst of a comprehensive review and overhaul of its rules and regulations governing daycare programs. Last year, the state hired an outside contractor, the National Association for Regulatory Administration, to go through its current procedures and recommend best practices based on what other states are doing. For the last nine months, those rules have been under discussion with a diverse group of stakeholders, including daycare providers.
According to Murphy, the newly proposed rules will be made public and presented to the legislature in the next few months. The public will then have an opportunity to weigh in and offer comments and suggestions on how they could be further improved.
In the meantime, child-welfare experts urge parents to ask potential childcare providers plenty of questions, such as: “Are you registered with or licensed by the state of Vermont?” “Have you ever had any documented complaints by the state?” and “If so, what were the problems and how did you correct them?”
Parents can also turn to their community childcare-support agencies, which can help parents identify providers, look up their regulatory track records and explain other ways of measuring quality.
One such method is with DCF’s voluntary rating system called STARS — STep Ahead Recognition System — for childcare, preschool and after-school programs. Providers who choose to participate in STARS have shown a willingness to go above and beyond the state’s minimum requirements. The one- to five-star rating system provides parents with one way to gauge programs and the qualifications of their staff.
But even the STARS system isn’t perfect. After all it’s been through, Ed-U-Care still maintains a three-star ranking.
A version of this story first appeared in the February issue of Kids VT, Seven Days’ free monthly parenting publication.
If daycare providers were unionized, would Vermont kids be any safer? Last week, Sen. Dick McCormack (D-Windsor) introduced S.52, a bill to allow Vermont’s 6000 to 10,000 independent daycare workers to collectively bargain with the state for higher childcare subsidy rates for low-income families and other measures “to improve the quality of child care for Vermont families.”
As McCormack points out, the vast majority of Vermont’s daycare providers are women who get no health benefits, paid time off or opportunities for career development or advancement. Many are self-employed and work long hours, often for less than minimum wage. As a result, Vermont’s early-ed workforce has a 40 percent annual turnover rate, which helps drives down the overall supply — and quality — of providers.
Pay people more, the union argument goes, and you’ll get better-trained workers.
S.52 would allow any provider whose clients receive a state subsidy to join the union, regardless of whether they would traditionally be considered labor or management. This nontraditional model, which is backed by the American Federation of Teachers of Vermont, has already been adopted in 13 other states.
Elsa Bosma is a founder of Vermonters for the Independence of Child Care Professionals, a coalition of 230 daycare providers who oppose the union effort. One of her biggest concerns is that a union would take away her voice on matters that aren’t even spelled out in McCormack’s bill, while still requiring her and others to pay union dues.
But supporters of S.52, also known as the “Child Care Providers Labor Relations Act,” counter that having a union puts providers in a much better position to negotiate with the state, both on reimbursement rates and other improvements to the system. They bristle at the suggestion that they’re doing this simply to get more money.
Nan Reid, an in-home provider in Burlington, supports the union effort — but not because she believes it will reduce abuses. She thinks there will always be “bad apples” in the bunch.
More interesting to Reid is the political force a union brings to the Statehouse. Just having a bill — the result of a three-year effort — means lawmakers are talking about childcare for a change. “We’re on people’s agendas now,” she says.
Sandy Hall Brown: I love the "floating head." It wasn't until I practiced yoga and meditation that I could actually "feel"…
flamingo420: I love the Salt Cave. I have been twice. Trying to go every other week. My breathing is…
Abigail Drake: Beautiful. What an elegant article and perspective!
The Oracle: Portlandia, anyone?
Christine Brown: Such a great, empowering article. Thanks for sharing Emily and Yoga on! | <urn:uuid:38a376b7-4773-4917-aeaf-1dab21c068ed> | CC-MAIN-2017-04 | http://www.sevendaysvt.com/vermont/what-parents-dont-know-about-vermont-childcare-could-hurt-their-kids/Content?oid=2242752 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00137-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.966975 | 4,999 | 1.90625 | 2 |
This chapter forms an introduction to the letter to the Ephesians. Introductory matters addressed are its authorship, the literary character of the letter, the recipients, the date and setting of Ephesians in Paul’s career, the circumstances that prompted Ephesians, and its structure.
What is the nature of the continuity and discontinuity between the Old and New Testaments? Covenant theology tends to maximize the continuity while dispensationalist theology emphasizes the discontinuity. This paper aims to narrow the gap by discussing a neglected dimension of New Testament data: Paul's letter to the Ephesians. | <urn:uuid:02b6def2-60c5-46b2-9d57-1f98be602a53> | CC-MAIN-2022-33 | https://www.christianstudylibrary.org/tag/ephesians | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00478.warc.gz | en | 0.909571 | 122 | 2.890625 | 3 |
The Journal of Media Education is an editor-reviewed pedagogical journal published electronically four times each year by the Broadcast Education Association. Its mission is to provide resources associated with the education and employment of students in various media fields and to promote communication among educators and media professionals.
JoME is BEA’s principal forum for articles on pedagogy pertinent to the various media, industry analysis, responsive essays, reviews of books and other instructional materials, and reports on research and other work that may not fit the editorial objectives of traditional scholarly publications.
As a non-refereed journal, JoME publishes: (1) articles or essays dealing with pedagogical issues in any aspect of media education including, but not limited to, class syllabi, tutorials, and case studies; (2) responsive essays-especially industry analysis-reacting to issues and concerns raised by previous Feedback articles and essays; (3) scholarly papers including those presented at conferences but not published in other publications; (4) reviews of books and other instructional materials; and (5) official announcements of the BEA.
JoME is available online only at the BEA web site. All communication regarding business, membership questions, and changes of address should be sent to the BEA Member Services, 1771 N Street NW, Washington, DC 20036 or Help@beaweb.org. | <urn:uuid:49b8ee2c-3406-4f52-9de4-ef8a692d7d3c> | CC-MAIN-2017-04 | https://www.beaweb.org/wp/?tribe_events=journal-of-media-education-new-issue-released-2017-01-15&eventDate=2017-01-15 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00284-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.906571 | 278 | 1.609375 | 2 |
GHOSTS FROM THROUGHOUT HISTORY: AN ALL NEW SEASON OF “MYSTERIES OF THE ABANDONED” PREMIERES DECEMBER 3 ON SCIENCE CHANNEL
An abandoned North Carolina ghost town which briefly served as the backdrop for the dystopian blockbuster film The Hunger Games. A world-renowned yoga center nestled in the foothills of the Himalayas that once recruited the likes of The Beatles and Mia Farrow in search for Nirvana, now untouched and left alone for decades. A vast labyrinth of subterranean tunnels lying beneath the busy streets of Ukraine with ties to KGB spies, Nazis and criminals who once called the catacombs home.
Once important and significant sites and structures across the globe, today these abandoned marvels are mere ghosts of their once rich – sometimes haunting – history. In an all new season of Science Channel’s hit series, MYSTERIES OF THE ABANDONED, experts reveal the stories behind these remarkable places and why they were left behind.
MYSTERIES OF THE ABANDONED premieres Thursday, December 3 at 9pm ET/PT on Science Channel. In addition to watching MYSTERIES OF THE ABANDONED on Science Channel, viewers can join the conversation on social media by using the hashtag #MysteriesoftheAbandoned and following @ScienceChannel on Facebook, Twitter, and Instagram.
Throughout this season, viewers will travel around the world to uncover the mysteries behind these massive structures and abandoned sites on the brink of collapse. After decades of decay, withstanding erosion, disasters and wars, each of these structures stand to tell their own unique story.
In the northern Dead Sea, a once popular Israeli tourist resort closed suddenly when the safety of guests became of grave concern due to a massive sinkhole engulfing a parking lot, rooms and several palm trees. Once a sought-after destination for travelers around the world, today the buildings stand abandoned as the Dead Sea retreats and more sinkholes emerge at an alarming rate. Sitting high in a sheer cliff face on the Italian island of Sardinia, a strange castle remains eerily abandoned, begging many to wonder what its purpose was at one point in time. Was it built as a defensive structure, or meant to serve as a solution to an impossible engineering problem for nearby mining operations?
Also this season, on a mysterious volcanic island in the East China sea, strange structures sit eerily on a large plateau littered with concrete ‘caves,’ unnatural tunnels and echoes of a dark past. Now a popular destination for visitors eager to understand its shadowed history, this island was once the staging post for untold destruction, anti-communist violence and the killing of thousands of people over time.
Throughout MYSTERIES OF THE ABANDONED, these structures, sites, villages, ruins and more are brought back to life with advanced CGI modeling to help tell the stories of these lost worlds and their haunted pasts.
MYSTERIES OF THE ABANDONED is produced for Science Channel by Like A Shot Productions. For Like A Shot, Henry Scott and Steve Gillham are executive producers. For Science Channel, Neil Laird is executive producer and Andrew Lessner is producer.
What shows are ALREADY cancelled this season? Check the official cancelled shows 2021/2022 list.
What shows are ALREADY renewed for next season? Check the TV shows renewed 2022-2023 list.
About Mysteries of the Abandoned TV Show
HIDDEN SITES WITH A HAUNTED PAST: "MYSTERIES OF THE ABANDONED" RETURNS FOR AN ALL NEW SEASON MAY 20 ON SCIENCE CHANNEL AND DISCOVERY+
The mystery of a former palace outside Delhi and a self-proclaimed queen whose fraudulent deception was unraveled by a New York Times reporter. The bizarre riddle of Muhammed Ali's epic "Rumble in the Jungle" and an upscale hotel resort that once hosted the rich and famous throughout its illustrious history with an underground bunker tucked away in case of nuclear attack. A modern theme park in Indonesia struck down by a series of bizarre events.
Once significant sites and structures around the world, today these abandoned places are merely the ghostly remains of what they once were. In an all new season of Science Channel's hit series, MYSTERIES OF THE ABANDONED, experts uncover the stories behind these abandoned marvels and remarkable sites to reveal their once rich, sometimes haunting, history and why they were left behind.
An all new season of MYSTERIES OF THE ABANDONED premieres Thursday, May 20 at 9pm ET/PT on Science Channel and will also stream on discovery+. In addition to watching MYSTERIES OF THE ABANDONED on Science Channel and discovery+, viewers can join the conversation on social media by using the hashtag #MysteriesoftheAbandoned and follow Science Channel on Facebook, Twitter, Instagram and Tiktok for the latest updates. You can also follow discovery+ on Instagram, Facebook and Twitter.
Throughout this season, viewers will travel across the globe to uncover the mysteries behind these massive structures and abandoned sites on the brink of collapse. After decades of decay and withstanding erosion, disasters, and wars, what's left of these structures will reveal secrets from throughout history.
With what is still considered one of the biggest rotative beam engines in the world, this 'Cathedral of Sewage' was once part of a solution to the public health crisis in London following what was known as the 'Great Stink' of 1958. With insight from the descendants of the engineer responsible for designing the facility that transformed London, experts reveal the history of this revolutionary sewer system and what the future of this unique facility holds. Off the coast of China, a giant concrete box looms over the water appearing to look like an apartment block of sorts. But experts reveal this mysterious structure's true purpose - a giant speaker designed to beam propaganda across the straight to the people of Communist China.
Also this season, experts investigate an epic abandoned resort on the banks of the Dead Sea embroiled in controversy and the Russian mafia, a modern abstract tower in the middle of nowhere in Croatia that appears to belong to a futuristic city, and a former priesthood training center in the forest outside of Glasgow with a brutalist exterior.
Throughout MYSTERIES OF THE ABANDONED, these structures are brought back to life with advanced CGI modeling to help tell the stories of these lost worlds and their haunted pasts.
MYSTERIES OF THE ABANDONED is produced for Science Channel by Like A Shot Productions. For Like A Shot, Henry Scott and Steve Gillham are executive producers. For Science Channel, Neil Laird is executive producer and Andrew Lessner is producer.Keep track of the cancel/renew status of all your favorite TV shows. Discover and bookmark our cancelled shows 2021 list and renewed shows 2021-2022 database.
Wondering how your other Discovery Plus, Science Channel shows are doing? Check out the Discovery Plus, Science Channel 2021 TV scorecard page, where you can find the cancel/renew status of all Discovery Plus, Science Channel TV shows!
How do you feel about this latest Mysteries of the Abandoned news? Share your thoughts with us in the comments below and don’t forget to stay tuned for all the renew/cancel 2021-2022 and beyond news! | <urn:uuid:1cd43dde-6ead-4f12-802e-c7c10a5aa918> | CC-MAIN-2022-33 | https://cancelledsoontv.com/mysteries-of-the-abandoned-renewed-for-season-7-by-science-channel/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00077.warc.gz | en | 0.92063 | 1,519 | 2 | 2 |
NATO Edges Closer to War on Syria
by Stephen Lendman
Waging war is easy. Instigate provocative incidents. Blame them on targeted countries. False flags work as planned. So do Big Lies repeated enough times to get most people to believe them.
Stoking fear is a common thread. So is claiming good v. evil. Mix well with misinformation and duplicity. Sun Tzu was right saying wars depend on deception. It's been that way since antiquity. Modern technology makes it easier.
Churchill said lies get halfway around the world before truths get their pants on. Global communication today is instant. Sending hawkish information everywhere is as simple as ready, aim, fire.
Washington and NATO partners are involved in multiple direct and proxy wars. More are planned. Word hasn't gotten out but it's coming.
Obama and Romney want war. So does NATO Secretary-General Fogh Rasmussen. He's a consummate liar. Numerous times he said NATO won't intervene in Syria. It's been planned all along.
It's ongoing. America, Britain, France and Turkey are lead belligerents. They've been involved since winter last year. Much goes on covertly.
If NATO didn't want war, its key countries would be supporting peace. Death squad armies wouldn't have been recruited. Training, funding, arming, and directing them wouldn't have been ongoing since conflict erupted in March 2011.
Nor would terrorists be given safe haven in Turkey on Syria's border. Provocations throw fuel on the fire. Last June, two Turkish warplanes lawlessly entered Syrian airspace low and fast. Doing so showed hostile intent.
One escaped unharmed. Syrian anti-aircraft fire downed the other in its own waters. Assad was blamed for Turkey's provocation. War could have erupted but didn't at the time.
The latest cross-border incident makes it more likely. Inflammatory rhetoric increases the possibility. Turkey's been shelling Syrian territory for six days.
Assad had nothing to do with mortar fire on Turkish territory. Free Syrian Army (FSA) militants are responsible. It doesn't matter. Only who's blamed counts. Fingers always point the wrong way. Media scoundrels spread Big Lies. They're repeated ad nauseam.
Warmongering officials advance the ball for war. Turkish ones play with fire. As one of 28 NATO countries, it's obligated in ways it wouldn't be if independent. It also borders Syrian territory.
Prime Minister Erdogan has been hawkish for months. President Abdullah Gul marches with him in lockstep.
"The worst-case scenario is happening in Syria at the moment. Syrian people are suffering and the developments there affect Turkey. We have citizens who have lost their lives," he said.
"In such a moment, we are always in consultations with our government and chief of General Staff. Whatever necessary is being done, as you know. And it will continue to be done."
"Sooner or later, a transition will occur. But our wish is (for it to happen) before more blood is shed and before Syria is ruined. I am of the opinion that the international community should actively be involved."
Did he ask NATO to declare war? What else can international intervention mean? It's been involved all along short of launching Libya 2.0. Turkey's role is lead belligerent. Whatever its preference, it's acquiescent.
Except perhaps for EU admission, it's hard imagining what it hopes to gain. War on its southern neighbor assures spillover in its own territory. Heavy casualties and destruction will follow.
Most Turks and key opposition parties oppose war. Erdogan and Gul risk their futures for going against the tide. They're in lockstep with Washington's agenda. The will of their own people is spurned.
Politically it's a bad strategy. Maybe they have other aims in mind. Maybe they're biting off more than they can chew. Maybe they'll get burned or worse in the process.
They've already got enough blood on their hands. So does NATO's Rasmussen. He's a war criminal multiple times over. How many more corpses will he tolerate on his conscience?
Ahead of an earlier October Brussels meeting, he said:
"I would add to that that obviously Turkey can rely on NATO solidarity, we have all necessary plans in place to protect and defend Turkey if necessary."
He did little to cool tensions, adding:
"We hope that all parties involved will show restraint, and avoid an escalation of the crisis. I do believe that the right way forward in Syria is political solution."
If he believed it, he'd work with other NATO members and to call off their dogs. Since conflict erupted last year, belligerence was prioritized. Alleged humanitarian concerns and fake peace plans were subterfuge for what's planned.
On October 9, Rasmussen's rhetoric grew sharper. "We have all necessary plans in place to protect and defend Turkey if necessary," he said.
Damascus needs defending, not Ankara. Rasmussen commended Turkey for its restraint. Shelling Syrian territory for six days hardly shows it. Clearly it makes war more likely.
"Obviously Turkey has a right to defend herself within international law," claimed Rasmussen. "I would add….that Turkey can rely on NATO solidarity."
Rasmussen and Erdogen both sound Orwellian. The NATO chief commends Turkish shelling as restraint. Erdogan practically says the best way to achieve peace is wage war.
Perhaps he also believes freedom is slavery and ignorance is strength. Maybe Turks will get fed up enough to remove him and likeminded warmongers before their country get embroiled over its head.
On condition of anonymity, NATO officials said plans in place are longstanding. In response to Washington's regime change agenda, perhaps they were readied in the 1990s.
Turkey is a willing client state. It risks its own well-being. Partnering with America's imperium has consequences. The price of imperial arrogance may be too much to pay.
Syrians paid dearly for months. Thousands died. Dozens more die daily. On October 9, twin blasts rocked a military base near Damascus. Suicide bombers perhaps were involved.
Dozens were reported killed. Many others were wounded. It's the latest in a series of major attacks. The Al Qaeda-linked Al-Nusra Front took credit. It claimed it was avenging Muslims "oppressed or killed" by Assad.
On October 9, Voice of Russia headlined "NATO invasion of Syria: coming soon, rated X," saying:
Growing signs suggest it. It's likely baked in the cake. Perhaps one spark too many will ignite it. They're easy to create. They're ongoing now cross-border. Erdogen already got parliamentary approval. Shelling may get more intense.
If Syria responds in kind, all bets are off. Turkey suggests it's spoiling for war. It moved tanks and other heavy weapons to its southern border. It has 25 F-16s and other aircraft positioned in Diyarbakir. It's in the country's Kurdish region.
They attacked four alleged PKK sites in Iraq. It followed a near parliamentary declaration of war on Syria. It barely stopped short. After an earlier in October NATO meeting, the following statement was issued:
"In view of the Syrian regime’s recent aggressive acts at NATO’s southeastern border, which are a flagrant breach of international law and a clear and present danger to the security of one of its Allies, the North Atlantic Council met today, within the framework of Article 4 of the Washington Treaty…."
"In the spirit of indivisibility of security and solidarity deriving from the Washington Treaty, the Alliance continues to stand by Turkey and demands the immediate cessation of such aggressive acts against an Ally."
At the behest of any member, Articles 4 or 5 can be invoked.
Article 4 calls for members to "consult together whenever, in the opinion of any of them, the territorial integrity, political independence, or security of any" is threatened.
Article 5 considers an armed attack (real or otherwise) against one or more members, an attack against all, and calls for collective self-defense.
Will NATO invoke it next? Will full-scale war follow? Heightened tensions increase the likelihood. If it's planned, it's virtually certain. Perhaps another pretext will launch it. As explained above, it's as simple as ready, aim, fire. Heaven help regional countries if it's ordered.
A Final Comment
Mossad-connected DEBKAfile 's (DF) October 9 headline added another possible wrinkle of its own. "US, Israel plan October Surprise. Others: Israel can do it alone," it said.
DF said an Israeli/Iranian war already is ongoing. It cited the UAV Israel downed over its territory days earlier. DF blamed Iran, Hezbollah and Hamas.
This writer called it a likely false flag. No regional country has anything to gain. For Israel, it's a convenient casus belli. If one scheme doesn't work, new ones are easy to invent. Israel does it often. So does Washington.
DF points fingers at Iran for practically everything it claims harms Israel. Tehran, of course, is victim, not perpetrator. So are Syria, Hezbollah, Hamas, and other Palestinian resistance groups.
The idea that Israel can go it alone is nonsense. Its capability isn't up to the challenge. It won't dare attack Iran without Washington's approval and support. DF knows it but claims otherwise.
Perhaps it's playing stalking horse for something else big planned. Full-scale war on Syria seems most likely. If it comes, it won't be pre-announced. Nor will war on Iran or on any other countries. Targets aren't given advance notice to prepare.
Stephen Lendman lives in Chicago and can be reached at firstname.lastname@example.org.
His new book is titled "How Wall Street Fleeces America: Privatized Banking, Government Collusion and Class War"
Visit his blog site at sjlendman.blogspot.com and listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network Thursdays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening. | <urn:uuid:09f2dae1-9201-43b7-aac2-60045208b396> | CC-MAIN-2017-04 | http://warisacrime.org/print/63577 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00067-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.9655 | 2,130 | 1.578125 | 2 |
Introduction to Midrash
Richard Hidary –
email the whole class
This course surveys the major works and methods of rabbinic
midrash, both halakhic and aggadic. We will discuss the historical background of
Midrash, inner-biblical exegesis, exegesis in
(1) Attendance, prompt arrival and class participation are assumed. Anything more than two absences will lower your grade. Three lates are equivalent to one absence.
(2) Preparation and Participation: Reading assigned primary and secondary texts is essential for you success in grasping the wide survey of history we are covering in this course. Primary texts are important so that you learn the methodology of how historians use these sources to construct the past. Secondary texts help in presenting, organizing and helping us remember important historical data. I may assign written and electronic homework assignments and quizzes based on the readings. Students may also be selected randomly each class to read and explain the required texts or to summarize the assigned reading. (10%)
(3) Exams. A midterm (35%) and a final (40%) will assess your grasp and retention of material as well as give the class an opportunity to review and notice patterns that recur through many topics.
(4) Written assignments: (15%)
Assignment 1 – due on class 10
Write a translation and comprehensive commentary of Mekhilta d’R. Ishmael, Ba-hodesh, 8: “You shall not steal” (Exod 20:13). You should consult as many editions and commentaries as you can (quote them so I know you saw them). Your analysis should address the following: what hermeneutical method is the midrash using? What is the peshat of the pasuk? Compare the midrash’s interpretation to that of the Talmud and Rishonim. Cite any other source that might be relevant.
Choose one of the hermeneutical rules and find an example of it in Tannaitic midrash or in the Talmud. Find all manuscript variants, parallels, and related material. Address the following, if relevant: What exegetical problem does the midrash face? What is the peshat? Is this a מדרש יוצר or a מדרש מקיים? Does the midrashic argument make sense or does it seem forced? If the latter, what may be motivating such forced interpretation? Does this fit the methodology of R. Ishmael or R. Akiva? Are there significant differences in parallel midrashim? If so, which version is original? Always cite relevant material from the course readings.
Assignment 2 – due on class 25 – Write a translation and comprehensive commentary of Eicha Rabbah, petihta 24, starting from "דבר אחר ויקרא ה' אלקים צבאות." Include an introduction that discusses the main features of Eicha Rabba. Read Shaye Cohen, “The Destruction: From Scripture to Midrash” for relevant data. Address the following in your analysis: What is the significance of this midrash both in terms of content and method? Cite relevant points from class readings. What is the structure of the midrash? What exegetical problems does the midrash face? Is this a מדרש יוצר or a מדרש מקיים? What hermeneutical rules or other rhetorical devices are used in the midrash? What is its overall message?
All readings are available on this website below or as one pdf. Office hours will be on Thursdays, 12:00-2:00PM in room 523 or by appointment by email.
Please bring a Tanakh to every class.
1. Tuesday, August 26 - Definitions, Books and History
powerpoints - what
powerpoints - what is midrash
2. Thursday, August 28 - Inner-Biblical Exegesis
Texts: Resolving contradictions: Cooking Passover - Ex 12:8-9, Dt 16:7, 2Chron 35:13, Mekhilta d’R. Ishmael Piskha 6; Passover Animal - Ex 12:5, Dt 16:2, 2Chron 35 7-9, Mekhilta d’R. Ishmael Piskha 4. Narrative: Samuel and Chronicles. Daniel 9. Nehemiah 11.
to rabbinic lit, Jeremiah's
powerpoints - intro to rabbinic lit, Jeremiah's 70
handout - inner-biblical
handout - inner-biblical exegesis examples
3. Tuesday, September 2 - 4. Thursday, September 4 - Early Midrash in Second
Texts: Septuagint to Megilat Esther, Targum
Why Didn't Esther Pray?
Powerpoint - Why Didn't Esther Pray?
handout - From Transmission
to Interpretation, Fallen Angels
handout - From Transmission to Interpretation, Fallen Angels
5. Tuesday, September 9 – Early Midrash in the
to dead sea scrolls
powerpoints - intro to dead sea scrolls
6. Thursday, September 11 – Introducing Midrash Halakha
[Text: From Priest to Rabbi]
Powerpoint - Mekhilta on Abortion, Mekhilta
7. Tuesday, September 16 – Midrash Yoser or Midrash Mekayem
Halbertal, Moshe. "The History of Halakhah, Views from Within: Three
Medieval Approaches to Tradition and Controversy."(HTML) (PDF)
Halbertal, Moshe. "The History of Halakhah, Views from Within: Three Medieval Approaches to Tradition and Controversy."(HTML) (PDF)
Texts: Rambam Sefer haMisvot, Shoresh 2 and Ramban’s commentary.
Handout: Asmakhta (long
version), Shabbat Laws
Handout: Asmakhta (long version), Shabbat Laws
8. Thursday, Septamber 18 - Hermeneutical Rules מידות שהתורה נדרשת בהם – Kal va-Homer
Richard Hidary, “Talmudic Topoi: The Hermeneutical Methods of Midrash and Greco-Roman Rhetoric.”
Text: Talmudic Topoi Powerpoint, Word, Sifra introduction and examples
9. Tuesday, September 30 - 10. Tuesday, October 21
Hermeneutical Rules – Gezerah Shavah, Binyan Av
Towner, W. Sibley.
“Hermeneutical Systems of
Hillel and the Tannaim: A Fresh Look.”
H. L. Strack and G. Stemberger. Introduction to the
Talmud and Midrash. Translated by Marcus Bockmuehl.
Hermeneutics Sourcesheet (Gezerah Shavah,
Text: Hillel's Hermeneutics Sourcesheet (Gezerah Shavah, Binyan Av)
11. Thursday, October 23
Assignment 1 due.
12. Tuesday, October 28
– Two Schools of R. Ishmael and R. Akiva
Progymnasmata and Midrash - Libanius
Eilberg-Schwartz, Howard. "Myth, Inference and the Relativity of Reason: An Argument from the History of Judaism." In Myth and Philosophy, edited by F. Reynolds and D. Tracy, 247-86. Albany: SUNY, 1990.
Text: Two Schools of Midrash
13. Thursday, October 30 – Updating Torah to Address New Realities
– Midrash and Ethics
handout - Apostate City
handout - Apostate City
14. Tuesday, November 4 - Updating Halakha to Address New Realities - Priests
“Shifting from Priestly to Non-Priestly Legal Authority: A Comparison of the
Priests to Rabbis
Priests to Rabbis Sources
Handout: Rebellious Elder
15. Thursday, November 6 – Midterm
16. Tuesday, November 11– On Interpreting Aggadah
Hananel Mack, The Aggadic Midrash Literature, Tel-Aviv: MOD Books, 1989, pp. 7-29.
Texts: Rambam - Introduction
to Perek Helek,
R. Abraham ben ha-Rambam, Introduction to Aggadah. Printed as an introduction to Ein Yaakov. Translation from S.H. Glick, En Jacob (1916).
handout - On Learning Aggadah
Was Rivkah Three Years Old?
17. Thursday, November 13 - Three Year Cycle and the Synagogue Derasha
Text: Bavli Shabbat 30a-b
Handout - Triennial Cycle
18. Tuesday, November 18 – The Petiha Format
Text: Rabbis as Orators - Sources
Beresheet Rabbah, Lekh Lekha
19. Thursday, November 20 – Midrash Rabbah
Reading: Mack, 88-118.
Suggested Reading: Heinemann on Lev Rabbah
Text: Vakikra Rabbah, Outline
20. Tuesday, November 25 – Methods of Aggadah
Reading: Mack, 119-144.
Suggested Reading: Yitzhak Heinemann, Darkei ha-Aggadah.
Text: Vayikra Rabbah cont.
Midrash and Literary Theory
Midrash and Theory:
Ancient Jewish Exegesis and Contemporary Literary Studies. Evanston:
Northwestern University Press, 1996, ch. 1. (Introduction is
suggested reading, ch. 1 is required.)
(Introduction is suggested reading, ch. 1 is required.)
Text: Vayikra Rabbah cont.
21. Tuesday, December 2 – Passover Haggadah ,
(The Four Sons, Arami Oved Avi
Reading: Joseph Tabory, The JPS Commentary on the Haggadah: Historical Introduction, Translation, and Commentary, pp. 25-46.
22. Thursday, December 4 – The Sea Resists
Daniel Boyarin. Intertextuality and the Reading of Midrash. Bloomington: Indiana University Press, 1990, pp. 93-104.
Mekhilta, Enuma Elish
23. Tuesday, December 9 - Midrash and Archaeology
Steven Fine, “From Meeting House to Sacred Realm: Holiness and the Ancient Synagogue” in Sacred Realm: The Emergence of the Synagogue in the Ancient World, 21-47.
Dura Europos and Midrash
24. Thursday, December 11 –
- Mashal and Dream Interpretation
David Stern, Midrash and Theory, ch 2.
Interpretaion and Polysemy
Polysemy in Midrash, Dream Interpretaion and Polysemy
Assignment 2 due.
25. Tuesday, December 16 - No Class
From Priests to Rabbis
26. Thursday, December 18 – Eicha Rabbah
Reading: Shaye Cohen, “The Destruction: From Scripture to Midrash” in The Significance of Yavneh and Other Essays in Jewish Hellenism (Mohr Siebeck, 2010).
Richard Hidary, “Why Are there Lawyers in Heaven?”
Final – Sunday January 4 at 10:00AM
Editions of Midrashim
מכילתא דרבי ישמעאל
*האראוויטץ - רבין
אייזק הירש וייס
ברכת הנני"ב - Gottesman Ref BM517.M43 B4 1997
מרכבת המשנה Gottemsn BM517.M43 T7 2003
דפוס ונציה וגם כאן
מכילתא דרבי שמעון בן יוחאי
*אפשטיין - מלמד
*פינקלשטין - בספריה
*א.ה. ווייס - בספריה
*שושנה - בספריה
מאיר איש שלום (פרידמן)
דפוס ויניציאה 1545
עם פירושי הראב"ד ור"ש משאנץ
צבי הירש הכהן רפפורט חלק א, חלק ב
מאיר איש שלום
יעקב זאב יאסקאוויטץ חלק ב
*פינקלשטין - בספריה
מאיר איש שלום | <urn:uuid:da806085-6251-42c4-a162-761c746ee29d> | CC-MAIN-2016-44 | http://midrash.rabbinics.org/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720475.79/warc/CC-MAIN-20161020183840-00355-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.7161 | 2,967 | 3.75 | 4 |
An image (from Latin: imago) is an artifact, such as a photograph or other two-dimensional picture, that resembles a subject—usually a physical object—and thus provides a depiction of it. In the context of signal processing, an image is a distributed amplitude of color(s). A pictorial script is a writing system that employs images as symbols for various semantic entities, rather than the abstract signs used by alphabets.
Images may be two or three-dimensional, such as a photograph or screen display, or three-dimensional, such as a statue or hologram. They may be captured by optical devices – such as cameras, mirrors, lenses, telescopes, microscopes, etc. and natural objects and phenomena, such as the human eye or water.
The word 'image' is also used in the broader sense of any two-dimensional figure such as a map, a graph, a pie chart, a painting or a banner. In this wider sense, images can also be rendered manually, such as by drawing, the art of painting, carving, rendered automatically by printing or computer graphics technology, or developed by a combination of methods, especially in a pseudo-photograph.
A volatile image is one that exists only for a short period of time. This may be a reflection of an object by a mirror, a projection of a camera obscura, or a scene displayed on a cathode ray tube. A fixed image, also called a hard copy, is one that has been recorded on a material object, such as paper or textile by photography or any other digital process.
A mental image exists in an individual's mind, as something one remembers or imagines. The subject of an image need not be real; it may be an abstract concept, such as a graph, function, or imaginary entity. For example, Sigmund Freud claimed to have dreamed purely in aural-images of dialogs. Different scholars of psychoanalysis as well as the social sciences such as Slavoj Žižek and Jan Berger have pointed out the possibility of manipulating mental images for ideological purposes. Images perpetuated in public education, media as well as popular culture have a profound impact on the formation of such mental images:
"What makes them so powerful is that they circumvent the faculties of the conscious mind but, instead, directly target the subconscious and affective, thus evading direct inquiry through contemplative reasoning. By doing so such axiomatic images tell us what we shall desire (liberalism, in a snapshot: the crunchy honey-flavored cereals and the freshly-pressed orange juice in the back of a suburban one-family home) and from what we shall obstain (communism, in a snapshot: lifeless crowds of men and machinery marching towards certain perdition accompanied by the tunes of Soviet Russian songs). What makes those images so powerful is that it is only of relative minor relevance for the stabilization of such images whether they actually capture and correspond with the multiple layers of reality, or not." - David Leupold, sociologist
The development of synthetic acoustic technologies and the creation of sound art have led to a consideration of the possibilities of a sound-image made up of irreducible phonic substance beyond linguistic or musicological analysis.
A still image is a single static image. This phrase is used in photography, visual media and the computer industry to emphasize that one is not talking about movies, or in very precise or pedantic technical writing such as a standard.
A moving image is typically a movie (film) or video, including digital video. It could also be an animated display such as a zoetrope.
A still frame is a still image derived from one frame of a moving one. In contrast, a film still is a photograph taken on the set of a movie or television program during production, used for promotional purposes.
Main article: Imagery
In literature, imagery is a "mental picture" which appeals to the senses.[example needed] It can both be figurative and literal.
((cite journal)): Cite journal requires
((cite web)): CS1 maint: url-status (link) | <urn:uuid:259978da-3e6d-4da2-91af-d0c9ee889fa4> | CC-MAIN-2022-33 | https://db0nus869y26v.cloudfront.net/en/Image | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00477.warc.gz | en | 0.935336 | 881 | 3.375 | 3 |
Atlanta — The ad was enticing to the retirement-age couple: ''Would you like an extra $1,000 per month? Part time. Will help you start home print shop. . . . Everything you need for $5,500. Training included.''
Anxious to supplement their income, they plunked down $1,250, agreed to pay the rest in installments, and made plans to start their own business. But three months after the equipment arrived, the couple had earned only $142 and felt the investment was wasted.
An official with the Denver district attorney's office says the training the couple received from the seller was ''insufficient.'' But, under a settlement negotiated by that office, they recently got more training. Often the ending to such stories is not so happy.
''While the incidence of fraud is increasing, the resources (both federal and state efforts to combat the problem) seem to be diminishing,'' says Bill Halamandaris, a staff member for the Senate Committee on Aging.
Money-making plans that have turned sour for some, as cited in the December report by the House Select Committee on Aging, include: home envelope stuffing; telephone solicitations; home assembly of products; marketing assistance to inventors; raising chinchillas or worms for sale; and distributing cheap video games.
For many, work-at-home schemes end with no response to initial fees, or products not bought back as promised. Securities are purchased that turn out to be worthless. Franchises are purchased in markets that turn out to be saturated, and profit claims are often found to have been exaggerated. Would-be distributors find themselves trying to sell products at inflated prices with no assistance in setting up locations for display.
This is a ''very serious problem . . . on a very large scale . . . (involving) a broad range'' of methods, Rep. Claude Pepper (D) of Florida says.
Sometimes the loss is only an initial $10-$15 ''fee''; sometimes people lose homes that they have remortgaged to make a down payment on a scheme.
Most business and investment offers are legitimate, federal and state investigators say. But since many Americans are feeling increased financial pressure and concern about their retirement income, the number of fraudulent schemes is on the rise, according to congressional and US Postal Service investigators.
The elderly are not the only victims, but often they are the most vulnerable, investigators add. Often the victims are too embarrassed to complain to authorities.
Some efforts to combat such frauds are being stepped up; others are being cut back:
* Legislation to strengthen the hand of postal inspectors in stopping use of the mails in such frauds has just been introduced in Congress.
* The number of states with laws requiring promoters to register with the state and provide a financial history of their companies has increased to 15 in the past several years.
* Stiffer penalties are being handed down in some mail fraud cases, says Wayne Kidd, chief fraud investigator for the Postal Service.
* Efforts by consumer-affairs officials and prosecutors in state and local government to warn the public about such frauds are on the increase, says Nancy Burd, now the sole employee of the Economic Crime Project of the National District Attorneys Association. (Her office has shrunk because its federal funds have been eliminated.)
* But the number of Justice Department investigators of white-collar crime (which includes such frauds) has been cut ''enough that it makes a difference,'' she says.
* The Reagan administration is proposing to eliminate four of the six district offices of the Federal Trade Commission, which plays a major role in investigation of such frauds. The cutback plan is running into some congressional opposition.
''The great majority of mail-order people out there are legitimate,'' postal investigator Kidd says. But the illegitimate schemes ''are on the rise.''
He urges would-be investors to: (1) not be pressured into commiting funds before becoming familiar with the business investment; (2) seek the advice of someone already in that business, or the help of an attorney; (3) not buy any medicines without a doctor's advice; (4) report alleged frauds.
Two free pamphlets - ''Pyramid Schemes: Not What they Seem'' (just published) and ''Promises: Check 'Em Out'' - are available from the Economic Crime Project, 1300 Chestnut Street, Philadelphia, Pa. 19107. | <urn:uuid:cd3d2f07-73a8-47ac-bee2-8df45325ec09> | CC-MAIN-2017-04 | http://www.csmonitor.com/1983/0216/021658.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00151-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.961611 | 912 | 1.679688 | 2 |
Tax Lien Lawyers in Cullman
In Cullman, Alabama, a "lien" is a security interest placed on a piece of property, normally land or a house, to secure the payment of a debt. It typically gives a creditor the right to take ownership of any equity that exists in the property, to secure the payment of the debt. If the owner sells the property, the creditor may also be entitled to the funds of the sale, up to the amount owed. It can also give the holder of the lien a higher priority status, giving them an advantage over competing creditors, if the debtor files bankruptcy.
As you might have gathered, a "tax lien" is simply a lien placed on property by the IRS or Cullman, Alabama tax authorities, to compile taxes that the property-owner has failed to pay.
However, a tax lien in Cullman, Alabama will be ineffective if the debtor doesn't own any valuable property to encumber with a lien. As with any debt, the creditor can't collect if the debtor doesn't have any assets. Nonetheless, a tax lien can be applied to property that the taxpayer gains after the lien goes into effect.
Tax Lien Procedure in Cullman, Alabama
Imposing a tax lien in Cullman, Alabama is usually an uncomplicated process. Typically, the tax authorities simply have to make a decision that the taxpayer is delinquent in their taxes, and that imposing and enforcing a tax lien will actually be worth the effort.
At this point, they will send the taxpayer a written notice stating that they owe a some amount of money in back taxes, and that they have a small window of time (commonly 10 days or less) to pay it.
If the back taxes are not paid before the deadline is up, the lien will normally take effect immediately, with no further action by the IRS or Alabama tax agency, giving them all the rights in your property that the law authorizes.
Nonetheless, if the federal government does not seek to enforce a tax lien in Cullman, Alabama within 10 years of imposing it, federal law dictates that the lien automatically expires. This is effectively a statute of limitations on a tax lien, meant to encourage the federal government to collect its taxes in a reasonable period of time, and guarantee that property is not encumbered by a lien forever.
How Can a Cullman, Alabama Tax Lien Lawyer Help?
If you find yourself on the receiving end of a tax lien in Alabama, you are going to have to wade through some substantial and intricate legal contentions.
Therefore, it should go without saying that if you are facing the prospect of your home or vehicle being slapped with a tax lien, you need to obtain the advice of a seasoned tax lawyer in Cullman, Alabama as soon as you can. | <urn:uuid:dfaf1e3c-25d7-4e0c-841f-b3bf9926c59c> | CC-MAIN-2022-33 | https://taxattorneys.legalmatch.com/AL/Cullman/tax-lien-lawyers.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.940099 | 588 | 1.710938 | 2 |
Nuclear DNA content variation within the genus Daucus (Apiaceae) determined by flow cytometry
The genus Daucus (Apiaceae) comprises species from around the world, covering a wide climatic range, and showing great morphological plasticity. Both cultivated and wild forms are described within the genus. The aim of the present study was to estimate the genome size variability in the collection of diploid Daucus species differing in chromosome number (2n = 18, 20 or 22) and originating from various regions of the world. In total, the 2C DNA content in 19 accessions of nine wild Daucus species, as well as in 22 wild and 26 cultivated accessions of Daucus carota L. was measured by flow cytometry. The 2C DNA content varied over 3-fold, from 0.920 pg in D. carota subsp. maximus (2n = 18, Spain) to 3.019 pg in D. littoralis (2n = 20, Israel). The interspecific genome size differences within wild Daucus species were pronounced, e.g. D. carota (2n = 18, Greece) possessed 0.940 pg/2C DNA, D. broteri (2n = 20, Cyprus) 2.218 pg/2C and D. montevidensis (2n = 22, South America) 1.295 pg/2C. In the group of 22-chromosome Daucus species, high similarity in nuclear DNA content among different accessions of one species was observed, in contrast to the 20-chromosome Daucus species, suggesting possible taxonomical misclassifications of accessions within the latter group. The nuclear DNA content of non-cultivated forms of D. carota varied from 0.920 pg/2C in subspecies maximus (Spain) to 1.154 pg/2C in subspecies halophilus (Portugal), which reflects 20% difference. In turn, in the group of cultivated carrots we observed a high homogeneity among the studied accessions, the 2C DNA content ranged between 0.950 pg (‘Kuroda type II’, China; ‘Imperial Long Scarlet’, Japan; ‘Koral’, Poland) and 0.977 pg (‘Cape Market’, South Africa). The mean 2C value calculated for both wild and cultivated forms of D. carota amounted 0.973 pg.
Use and reproduction:
All rights reserved | <urn:uuid:9c29368d-7305-4b6b-aab8-78e9a5b49f64> | CC-MAIN-2022-33 | https://www.openagrar.de/receive/openagrar_mods_00020911 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00469.warc.gz | en | 0.889062 | 535 | 2.4375 | 2 |
Citation: Damania B (2016) A Virological Perspective on Cancer. PLoS Pathog 12(2): e1005326. doi:10.1371/journal.ppat.1005326
Editor: Grant McFadden, University of Florida, UNITED STATES
Published: February 11, 2016
Copyright: © 2016 Blossom Damania. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Funding: BD is supported by grants AI107810, AI109965, CA096500, DE018281, and CA019014. BD is a Leukemia & Lymphoma Society Scholar and Burroughs Wellcome Fund Investigator in Infectious Disease. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing interests: The author has declared that no competing interests exist.
Cancer has prevailed for millions of years, likely dating back to the very first appearance of multicellular organisms. Some of the first documentations of human cancer can be found in the Code of Hammurabi (1750 BCE) and the ancient Egyptian papyri (1600 BCE). Currently, it is a widely accepted fact that infectious agents are responsible for approximately 20%–25% of the world’s cancer burden. Most cancer-associated infectious agents are oncogenic viruses that are linked to a multitude of different human cancers. The field of tumor virology encompasses the study of all known oncogenic viruses. Human tumor viruses include human papillomavirus (HPV), hepatitis B virus (HBV), hepatitis C virus (HCV), Epstein–Barr virus (EBV), Kaposi’s sarcoma-associated herpesvirus (KSHV), human T-lymphotropic virus (HTLV-1), and Merkel cell polyomavirus (MCV).
Historically, identification of the intricate relationship between viruses and cancer was a landmark discovery that laid the foundation for our understanding of the concepts of modern cancer biology. The study of oncogenic viruses led to seminal insights into the underlying mechanisms of how cancers arise. The field of tumor virology was founded in 1911, when Peyton Rous reported that a cell-free extract (containing Rous sarcoma virus; RSV) injected in chickens could cause tumors. Since then, the study of tumor viruses has led to groundbreaking discoveries in cancer cell biology. Research on tumor viruses gave rise to the concept of cellular oncogenes and tumor suppressors, which was solidified by the identification of oncogenes like Src through studies on RSV, and by the identification of tumor suppressors—e.g., p53 and Rb—from studies of simian virus 40 (SV40). Hence, in addition to being etiologic agents of cancer, viruses have also provided us with the tools to understand the mechanisms that underlie the development of human cancer as well as basic cell biology.
My foray into the world of tumor virology began as a graduate student studying SV40 large T antigen, the viral oncoprotein whose function led scientists to discover the cellular tumor suppressor, p53. As a student, I explored how SV40 large T antigen was able to subvert the transcriptional machinery of human cells and activate a plethora of host and viral genes by acting like a cellular TATA-binding protein (TBP)-associated factor (TAF). I was intrigued by how one viral protein, surrounded by several thousand cellular proteins, could nevertheless commandeer the machinery of the cell. I was also fascinated by the fact that expression of just this one viral protein could transform a perfectly normal cell into a rapidly growing, immortal cancer cell. The ability of oncogenic viruses to exploit cellular processes to their advantage was captivating and prompted me to pursue a postdoctoral fellowship studying another tumor virus, Kaposi’s sarcoma-associated herpesvirus (KSHV), which was discovered in 1994 by Drs. Yuan Chang and Patrick Moore.
KSHV is a gammaherpesvirus that is associated with three different human cancers and has a large genome coding for over 100 different gene products, ranging from proteins to microRNAs and long noncoding RNAs. The genome coding capacity of this herpesvirus ensured that I would have plenty to work on, for decades to come, when I started my own laboratory over 15 years ago at the University of North Carolina at Chapel Hill (UNC-CH).
Today, my laboratory’s research focuses on the intersection of viruses, cancer biology, and immunology. We study how KSHV viral proteins influence cellular signaling pathways associated with cell proliferation, in order to better understand how the virus hijacks cellular machinery to promote tumorigenesis. We also study how KSHV interacts with the host innate immune system. Like other herpesviruses, KSHV establishes lifelong latency in the human population, which means that the virus needs to constantly evade immune surveillance by the host. We study how KSHV is able to modulate host innate immune pathways to its advantage, in order to escape detection and elimination by the host immune system.
At UNC-CH, I also direct the Lineberger Global Oncology program with Dr. Dirk Dittmer. The goal of our program is to investigate cancers that disproportionally affect low-income countries, many of which are viral cancers. Thus far, our achievements have been in cancer diagnosis, basic and translational research, as well as preclinical studies, which represent the cornerstone for treatment. We have implemented essential infrastructures, continue to build capacity, and are developing new approaches to diagnose and treat cancer in these countries.
I am a firm believer in the importance of basic science. It is an indisputable fact that translational applications in medicine have often come from fundamental discoveries, which at the time they were identified had no clinical applicability whatsoever. These basic findings were refined over time and transformed into clinical applications in medicine. This has most certainly been true for viruses in the field of oncology. Viruses led to seminal discoveries that laid the foundation for our current understanding of cancer biology. Today, the study of tumor virology continues to reveal new biological insights into the development of cancer and continues to identify key cellular targets important for tumor initiation, progression, and metastasis. Viruses are also being used as cancer vaccine vectors to train our immune systems to attack the tumor within, and oncolytic viruses are being utilized to treat and lyse human tumors in patients. Thus, it seems we have come full circle. The link between viruses and cancer has been a powerful one throughout history, and the fields of virology and cancer biology will forever remain intertwined. | <urn:uuid:d3ef4b4b-44c2-4679-8496-b14a9d4bae94> | CC-MAIN-2017-04 | http://journals.plos.org/plospathogens/article?id=10.1371/journal.ppat.1005326 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00540-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.939255 | 1,405 | 2.4375 | 2 |
A man, who went to River Thames to commit suicide, ended up saving another man who fell into the river
London: In a fortunate twist of fate, a man attempting suicide off the London bridge in Britain unintentionally alerted authorities to rescue another man who was reportedly drowning in the Thames River.
The police managed to stop the other distressed man from jumping off the bridge and helped him to safety. Pic/AFP
The authorities sprung into action after a man threatened to commit suicide by leaping off the bridge at around midnight on Wednesday, The Telegraph reported. To their astonishment, the police and lifeboat crew on the scene — found another man in the water, struggling to keep afloat.
The Royal National Lifeboat Institution (RNLI) rescued the man in the water who was reportedly suffering from hypothermia. The 33-year-old rescued man was in a confused state and could not give any personal information, except for his age, nor could he say how he came to be in the river.
Cops join action
Meanwhile, police managed to stop the other distressed man from jumping off the bridge and helped him to safety. “There were no other boats in the area at the time and I do not think anyone was actually aware he was in the water.
Chances are if it had not been for the lifeboat crew that reached the scene for the original incident, he would never have been spotted and would have drowned,” Toni Scarr, a lifeboat crew member said. She said the survivor could be confused about his whereabouts due to hypothermia. | <urn:uuid:d2152ba9-541d-42fd-b61c-c35b7cf3548a> | CC-MAIN-2017-04 | http://www.mid-day.com/articles/strange-twist-of-fate-suicidal-man-saves-drowning-man/15162073 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00153-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.983096 | 321 | 1.664063 | 2 |
Iran’s President Mahmoud Ahmadinejad
Former colonial and slave-trading governments that today deceptively preach about freedom and democracy have the extreme tendency of reviving the colonialist era when they robbed the wealth and riches of nations, especially in Asia, Africa and Latin America, thus setting the scene for current conflicts and crises in the world, said President Ahmadinejad in a Thursday address to the 12th meeting of Shanghai Cooperation Organization (SCO) in the Chinese capital of Beijing.
Economic crises have spilled over the world and are on the verge of turning into social and political crises, said the president, blaming it on the “inefficient and discriminatory system” that has dominated the globe.
Noting that states like China, India, Iran, Russia, Kazakhstan, and other SCO members are rapidly making great economic advances, the Iranian chief executive reiterated that extensive plans by the US-led NATO states for an eastward expansion to halt this progress and revive the past colonialist order have become quite obvious.
Ahmadinejad pointed out that NATO’s expansion eastward is meant to impede the development of Shanghai Cooperation Organization (SCO) member states, stressing on the need for developing new systems independent of the dominant one.
He emphasized that the US-led wars in Afghanistan, Pakistan and Iraq are part of such “sophisticated scheming,” but the current order has failed “due to its unjust and inhumane features” and is approaching its end.
President Ahmadinejad then suggested to his fellow SCO leaders that to achieve such objectives, “we need to distance ourselves from the current order and make new arrangements.”
The Iranian president specifically offered the following four proposals to SCO leaders:
1- Build regional and international collaboration among member states and those nations that seek a just and humane global order.
2- Expand economic cooperation and design and implement new monetary and financial systems.
3- Establish international financial, monetary and economic institutions outside the dominancy of hegemonic powers.
4- Promote cultural and political ties towards the expansion of friendship and harmony to counter the insistence of others on sowing discord and divisiveness.
Expounding on his proposals, President Ahmadinejad said, “We must realize that colonialist powers are opposed to China’s progress to the same extent they resist the growth of Russia, India, Iran, Pakistan and other SCO member states.”
He added that if SCO members cut their monetary ties with the dominant currency in global economic interactions, they would thus save a great portion of their national interests and resources from “flowing freely to the pockets of hegemonic powers.”
The president, who has on different occasions called for an overhaul in the global order, further urged investments among member states as a matter that would benefit all concerned parties.
Iran’s top executive concluded his remarks by reiterating Islamic Republic’s readiness to expand its cooperation “at the highest level” and support all of SCO’s “just and humane objectives.”
President Ahmadinejad arrived in China on Tuesday evening, leading a high-ranking delegation, to participate in the 12th summit of the Shanghai Cooperation Organization (SCO).
The SCO is an intergovernmental security organization that was founded in 2001 in Shanghai by the leaders of China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan.
Iran, India, Mongolia, Afghanistan and Pakistan are observer states of the organization. | <urn:uuid:8cf9c372-6dce-4b88-ae9d-4adb1ecac9da> | CC-MAIN-2016-44 | http://www.ibn-tv.com/2012/06/iranian-president-urges-restructuring-of-global-order/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719547.73/warc/CC-MAIN-20161020183839-00394-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.944729 | 733 | 1.960938 | 2 |
ERIC Number: ED211440
Record Type: RIE
Publication Date: 1980
Reference Count: N/A
Library Research Guide to History. Illustrated Search Strategy and Sources. ("Library Research Guides" Series, No. 4).
One in a series, this guide takes the college student through the steps involved in a thorough, systematic research of any topic in history. Beginning with the basics, the guide covers selecting a topic, locating an authoritative summary of the topic, taking clear notes, and narrowing the topic. Subsequent chapters cover the use of general guides and indexes to reference sources and the use of card catalogs. One chapter discusses methods for evaluating books. For example, by using a selective bibliography such as the "Harvard Guide to American History," students can identify books of a scholarly merit. Reviews which can be identified through sources such as "Reviews in American History" can be very helpful in evaluating books. Indexes which a student can use to locate current information are described. The bibliographic tools that provide access to government publications, which contain a wealth of information on U.S. history, are examined. The student learns about biographical sources and guides to historical literature. How to find what you need when your library does not have it is the final topic discussed. Appendices include an outline of search strategies for term papers in history, a library knowledge test, an outline of basic reference sources for courses in history, and guidelines to help students proceed with library research. (Author/RM)
Descriptors: Card Catalogs, Guidelines, Higher Education, History Instruction, Indexes, Information Retrieval, Library Guides, Library Instruction, Library Skills, Reference Materials, Research Skills, Search Strategies, Student Research, United States History, World History
Pierian Press, 5000 Washtenaw Ave., Ann Arbor, MI 48104 ($5.95 paper copy).
Publication Type: Guides - Classroom - Learner; Reference Materials - General; Collected Works - Serials
Education Level: N/A
Authoring Institution: N/A | <urn:uuid:ab9e7846-36f7-4eb3-97d7-82251998a763> | CC-MAIN-2017-04 | https://eric.ed.gov/?id=ED211440 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00407-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.865842 | 427 | 3.59375 | 4 |
The University Grants Commission (UGC) made a big announcement on Friday regarding admission to undergraduate courses in the humanities and business. The UGC ordered all universities to process the academic mathematics material for students in class 12 at the same level as mathematics while calculating the overall marks for admission to undergraduate courses.
UGC secretary Rajnish Jain said applied mathematics had curriculum specifications compatible with other major subjects. Therefore, the marks obtained by applicants in this subject can be included in the calculation of the overall marks to decide on eligibility for admission.
The commission asked universities to take appropriate measures for the recognition of the new subject – applied mathematics – for the admission of students into degree programs.
The CBSE has introduced an applied mathematics course for students in grades 11 and 12 as an academic elective course that is in addition to the existing mathematics subject offered by the board. The subject has 80% marks for theory and 20% for practical work for the jury exam.
The course was introduced primarily to increase the math skills and knowledge required even in social sciences, humanities, business, accounting and other aligned fields.
The board noted that the topic will be of benefit to students who wish to pursue graduate studies in social sciences, business, fine arts and biological sciences.
Never miss a story! Stay connected and informed with Mint. Download our app now !! | <urn:uuid:1b198842-e62d-4c44-a838-7bfa2bbd47af> | CC-MAIN-2022-33 | https://uwip.org/ugc-makes-big-announcement-for-admission-to-undergraduate-college-courses/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00076.warc.gz | en | 0.951986 | 268 | 1.773438 | 2 |
12+ How Do You Get Rid Of Possums In The Backyard Images. The virginia opossum is the only species found in the united states, although despite its name, it can be. We recommend to just let them eat your pests in the yard—due to their nomadic lifestyle, the opossum will most likely pack up and.
So how do you get rid of possums that have become all too eager to call you neighbor? He agrees that the possums are the ones eating the small avocados. The opossum is native to north and south america, while possums are only found in australia.
Among all the external parasites that occupy our yards and gardens, ticks are one of the most dangerous.
This animal is not a picky eater. Never fear, we also have information on how to relocate your. Use fencing that is 4 feet high. The opossum is native to north and south america, while possums are only found in australia. | <urn:uuid:08e80227-43e1-416b-8ba8-7e64cad23ed8> | CC-MAIN-2022-33 | https://www.homelerss.org/2021/02/12-how-do-you-get-rid-of-possums-in.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00076.warc.gz | en | 0.956465 | 209 | 2.484375 | 2 |
First Major Survey in 15 Years
From November 8, 2008, to January 25, 2009, the San Francisco Museum of Modern Art (SFMOMA) presents Martin Puryear, a major exhibition of sculpture by the acclaimed American artist. The retrospective features 47 sculptures that chart the development of Puryear’s career over the last 30 years, from his first solo show in 1977 to the present day. The exhibition was organized by John Elderfield, the Marie-Josée and Henry Kravis Chief Curator of Painting and Sculpture at the Museum of Modern Art (MoMA), New York, and the San Francisco presentation is coordinated by Alison Gass, assistant curator of painting and sculpture at SFMOMA.
Puryear began his career in the late 1960s alongside other members of the postminimalist generation. He explored a variety of media—including painting, drawing, and printmaking—before devoting himself to sculpture. As a sculptor he has maintained an unwavering commitment to traditional building methods, working primarily in wood, but also utilizing an array of other materials, including wire mesh, tar, stone, stainless steel, and bronze. Puryear’s work is further characterized by the artist’s reliance on his own hand to create his sculptures, and by his insistence on mastering his materials—often through preparatory drawings and maquettes—and dexterously translating this understanding to individual works.
Throughout Puryear’s life, a passion for diverse cultures and histories has led him to travel, study, and work in Africa, Asia, Europe, and the United States. These explorations have permitted him to observe the material cultures of many societies around the globe, as well as the skills and trades employed there, and to make connections among disparate cultural traditions. As a result, Puryear’s work is quiet but deliberately associative, encompassing his wide-reaching cultural and intellectual experiences and drawing on a varied reserve of images, ideas, and information.
Martin Puryear is organized in a loosely chronological fashion, beginning with a selection of early pieces that reveal the emergence of elements most often associated with his mature works, such as arc and cone shapes. Examples include the 1976 sculpture Bask, a pine structure that resembles a boat hull, and Circumbent, an arc-shaped sculpture made of ash wood. Composed of arcs, straight lines, and flat planes, Bask is the most severely geometric of Puryear’s sculptures, and it provides the clearest evidence of Minimalism’s brief influence on the artist’s work. Circumbent similarly reflects Puryear’s interest in geometry; its shape is a semicircular arc bent 20 degrees out of plane, resting on a prop to form a kind of tripod.
Some Lines for Jim Beckwourth (1978), a tribute to the early 19th-century American adventurer, is made of dried, twisted lengths of rawhide with tufts of red, white, and black cow hair, symbolizing
Beckwourth’s mixed ancestry and the various cultural environments in which he lived. For another work dated 1978, Self, Puryear covered an armature with a half-inch-thick wooden sheath and then removed the armature, leaving only the wooden “skin.” A solid-looking shell with a hollow interior, Self addresses the ideas of interiority and exteriority that pervade much of Puryear’s work, and suggests that the self is a secret entity, a hidden place.
From 1978 to 1985 Puryear created a series of wall-mounted ring forms. Most of these works were constructed from strips of wood that were bent, glued, and shaved into shape. The artist has described these pieces as occupying the same space as paintings but lacking a center, existing only on the periphery. Examples of the Ring series in this exhibition are Cerulean (1982), Dream of Pairing (1981), Big and Little Same (1981), and his earliest prototype for this series, an untitled, garrote-shaped sculpture from 1978. The latter work is an example of a small number of ring sculptures that Puryear produced by forcing natural saplings into a circular form while they were still green.
Progressing into the later 1980s, Old Mole (1985) demonstrates Puryear’s more metaphorical explorations. The approximately 5-by-5-foot woven wooden form invites free association, suggesting the mummified head of a bird, among other objects. Puryear’s work of this period plays with the puzzle of identity and contains many animal-vegetable associations. In Sharp and Flat (1987), the pine planks on the surface of the sculpture are left raw, strengthening the wood’s associations with the natural environment. The form’s birdlike abstraction—its long neck rising from a great base—alludes to the waterfowl decoys used by hunters.
Many of Puryear’s works explore the translucency of sculptural surfaces in materials other than wood. Maroon (1987), one of the artist’s first pieces that incorporates tar over wire mesh, has a bulbous shape, circular wooden cap, and myriad materials and textures. Maroon reflects Puryear’s interest in paradoxes within singular forms: he contrasts organic and geometric shapes; carefully handcrafted elements and raw wood; and a mysterious, unknowable interior space and a tactile exterior, all in the same work.
During the 1990s Puryear continued to explore common themes through forms that were increasingly complex, in both their composition and their symbolism. While Puryear’s earlier sculptures had often featured solid wooden surfaces, the surface of Brunhilde (1998–2000) is open latticework that resembles a woven basket; in fact, it is made from thin strips of laminated red cedar that were cut to precise lengths and then glued, stapled, and clamped together. Evidence of this painstaking process appears in the staple holes on the sculpture’s surface. With this work, Puryear activates the interior space without concealing it. The piece seems inflated from within, its swollen shape suggesting an air-filled balloon or the inflated lungs of its namesake, the Valkyrie heroine of Wagner’s operatic Ring cycle.
The exhibition concludes with a series of allegorical works made since 2000. Le Prix (2005) incorporates a wooden chain, painted gray, whose links are carved as a unit rather than looping loosely through one another, creating the illusion that a typically flexible object is rising improbably and stiffly into the air. The French title is ambiguous, meaning both “the prize” and “the price.” C.F.A.O. (2006–7) makes reference to African tribal art. The work is constructed from an old wheelbarrow that Puryear found in 1993 while he was an artist-in-residence at Alexander Calder’s studio in Saché, France. He attached to it an oversized impression of a mask made by the Fang people of Gabon, West Africa, which is in turn supported by and enmeshed in a dense thicket of interlocking pine scaffolding. The title references the Compagnie Française de L’Afrique Occidentale, a 19th-century trading company that sailed between Marseille and West Africa with ports in Sierra Leone, where Puryear lived during his tour with the Peace Corps (1964–66). The combination of the workman’s wheelbarrow and the mask form suggests themes of colonization and early cultural exchange between vastly different societies.
Two works will be specially installed in SFMOMA’s Evelyn and Walter Haas Jr. Atrium for the exhibition. The first, Ladder for Booker T. Washington (1996), is a 36-foot-tall split sapling that narrows and recedes as it ascends into space, exaggerating its length and distance from the viewer. Unlike earlier sculptures that call the viewer’s attention to their tactile surfaces, this one invites the viewer to contemplate the sculpture’s position—suspended in space by barely perceptible wires, suggesting ascension from the physical world. The second and newest sculpture in the exhibition, the 63-foot-tall Ad Astra (2007), incorporates an ash sapling that measures approximately 58 feet and is extended by an additional tapered limb that appears to reach “to the stars,” as the title infers. The sculpture, rooted at its base by a pair of wagon wheels and a multifaceted wooden, crystalline form, is aspirational; its spire rises to the museum’s fifth-floor bridge, suggesting a perpetual upward trajectory.
Puryear was born on May 23, 1941, in Washington, D.C., and now lives and works in upstate New York. As a high school and college student, he was interested in the natural sciences. He graduated with a Bachelor of Arts degree from Catholic University of America in 1963, before studying printmaking at the Royal Academy of Sweden in Stockholm. He earned a Master of Fine Arts degree in sculpture from Yale University in 1971. In 1977, Puryear had his first solo museum show at the Corcoran Gallery of Art in Washington, D.C. Later that year he received an Individual Artist Fellowship from the National Endowment for the Arts and was awarded a studio at P.S.1 Contemporary Art Center in Long Island City, New York, by the Institute for Art and Urban Resources.
Puryear’s career also includes prolific work in the form of public sculpture installations and architectural designs in public gardens, in locations stretching from Boston to Seattle to Japan. A few of his most notable projects include Knoll for NOAA (1983), a large-scale public art project on the shores of Seattle’s Lake Washington; Pavilion in the Trees (1993), a bridge traversing the steep decline of a hill and connected to a gazebo-like structure in Fairmount Park, Philadelphia; and North Cove Pylons (1993), two tall, illuminated sculptures in New York City’s Battery Park.
Martin Puryear is accompanied by a clothbound publication (192 pages, 130 color illustrations; $60) featuring essays by Michael Auping, chief curator at the Modern Art Museum of Fort Worth; Elderfield; and Elizabeth Reede, assistant curator, Department of Painting and Sculpture, MoMA. The book also includes an interview with Puryear by Richard J. Powell, John Spencer Bassett Professor of Art and Art History at Duke University; a chronology by Jennifer Field, curatorial assistant, Department of Painting and Sculpture, MoMA; and illustrations of all works in the exhibition as well as comparative material. It is available at the SFMOMA Museum Store or online at ww.sfmoma.org.
Martin Puryear is organized by the Museum of Modern Art, New York. The San Francisco presentation is generously supported by Martha and John Gabbert and Room & Board.
* * * San Francisco Museum of Modern Art
151 Third Street
San Francisco, CA 94103
Museum Hours: Open daily (except Wednesdays) 11 a.m. to 5:45 p.m.; open late Thursdays until 8:45 p.m.; summer hours (Memorial Day to Labor Day) open at 10 a.m.; closed Wednesdays and the following
public holidays: Fourth of July, Thanksgiving, Christmas, New Year’s Day. Koret Visitor Education Center: open daily (except Wednesdays) 11 a.m. to 5:30 p.m.; open late Thursdays until 8:30 p.m. Summer hours: open at 10 a.m.
Admission prices (Effective July 1, 2005): Adults $12.50; seniors $8; students $7. SFMOMA members and children twelve and under are admitted free. Thursday evenings, 6 to 8:45 p.m., admission is half price. The first Tuesday of each month admission is free.
SFMOMA is easily accessible by MUNI, BART, Golden Gate Transit, SamTrans and Caltrain. Hourly, daily and monthly parking is available at the SFMOMA Garage at 147 Minna Street. For parking information, call 415.348.0971.
Call 415.357.4000 for more information. | <urn:uuid:274ffb02-a92b-4416-83af-6cbd49a6bcbc> | CC-MAIN-2017-04 | http://mckeegallery.com/press/2008/sfmoma-presents-a-retrospective-on-sculptor-martin-puryear/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00468-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.955822 | 2,588 | 2.09375 | 2 |
Sunday, October 26, 2008
Aziz Leads IMF Criticism as Crisis Grows
The International Monetary Fund has come under severe criticism as the financial crisis that started on Wall Street is spreading to the developing world. IMF is the most important multi-lateral financial institution. It is responsible for overseeing the global financial system and the economic policies of its 185 members. The IMF is supposed to act as an early warning system for markets and economies. The institution is also charged with diagnosing economic problems and proactively regulating and stabilizing the international financial system to prevent and manage the kind of financial crisis the world is facing now.
Pakistan's former Prime Minister Shaukat Aziz, credited with reviving Pakistan's economy, is taking the IMF to task for being absent, or at least tardy. Mr. Aziz accused the International Monetary Fund last week of failing to show leadership during what he described as a "historic" global financial crisis.
As world leaders met to shore up distressed financial institutions, Mr Aziz charged that "this global institution which is supposed to look at everything going on was not even in the room where meetings are going on."
Speaking at an international business conference in Manila, the former Wall Street banker said interest rate cuts, recapitalization of banks and liquidity injections, while helpful, would not be sufficient to solve the problem.
"The very fabric of the global financial system is under threat," Aziz said, according to AFP.
Mr Aziz suggested there was a need to boost the IMF's regulatory powers and create a more powerful body.
"The world is becoming increasingly specialized," he said, adding that existing systemic threats beyond the agency's traditional monetary policy role must be addressed. "A robust regulatory regime must touch all the stakeholders," he said, with reference to the credit rating agencies that have come in for criticism amid the crisis.
Mr. Aziz was pointing out the fact that the banks and capital are now global. Most major financial institutions operate in multiple countries on different continents, and it is hard to draw national boundaries on regulation. In such an environment, international regulatory regime and international action to correct problems are required.
In its defense, it can be said that the IMF is not alone in being taken by surprise by the depth of the crisis, said Mr. Michael Mussa, IMF's former Chief Economist. Even Alan Greenspan, the former US Federal Reserve Chairman, has expressed shock and disbelief at the extent and the speech at which the crisis has grown.
The Bank for International Settlements, which groups the world's central banks, and the Paris-based Organization for Economic Cooperation and Development did not fully realize the gravity of the situation either.
"The explosion of the crisis, particularly in the past few weeks, is something that was not anticipated by anyone in official circles," Mr Mussa says, according to a BBC report.
As the unprecedented credit crunch hits even the countries with a good record of managing their economies, the IMF is considering urgent measures and reforms to rapidly respond to the developing crisis. According to the Associated Press, among the ideas under discussion is to provide a credit line in hard currency to countries that otherwise would have no access to foreign capital.
The IMF's 24-member executive board is expected to meet next week to examine the various proposals under consideration.
The immediate beneficiaries would be developing nations with good economic track records such as Turkey, Brazil and South Korea that normally have no difficulty borrowing but have seen access to money dry up as Western banks simply stopped lending.
Another idea under consideration is to let member countries borrow against the amount they have contributed to the fund, known as a quota. For example, if South Korea borrowed against its quota, it could obtain almost $22 billion.
The IMF already is discussing loan packages with close to a dozen countries and is examining ways to speed up the process in line with instructions it received this month from its policymaking committee.
IMF loans often serve as an incentive to other lenders, generating other financing from private and public sources such as the multilateral development banks.
The loans also come with stringent conditions that involve budget cutting and other belt-tightening measures that some governments have said should be eased in the current crisis. Many developing nations and NGOs have criticized the IMF for its insistence on cuts that hurt the poor the most. IMF supporters counter that the developing nations require close IMF supervision because they have not been good stewards of their economies.
A case in point is Pakistan. It has just returned to ask for IMF's help after a break of several years when its economy was considered one of the fastest growing in the world. But times are different now. The country's economy is in freefall. Inflation is running at about 30%. The rupee has devalued by about 25% in just three months. The fiscal deficit is a whopping 10% of GDP. Foreign-exchange reserves cover just six weeks of imports. A $500m Eurobond matures next February, but the market has already decided it is junk. The country needs at least $3 billion immediately, and a further $10 billion over the next two years to plug a balance-of-payments gap. Without it, default abroad might well coincide with political anarchy at home.
In the first loan made in the current global economic turmoil, Iceland and the IMF tentatively agreed to a $2 billion loan over two years in response to the collapse of the country's banking system.
The government said the deal, which still must be approved by the IMF's board in Washington, also will give Iceland immediate access to $830 million to head off the financial threat to its entire economy.
The IMF has helped several troubled developing economies earlier this decade. IMF was also very active during the Asian financial crisis of 1997-98. In the current financial crisis, Iceland became the first Western country to borrow from the IMF since Britain in 1976.
Other countries thought to be close to reaching a loan agreement with the IMF include Hungary, Ukraine and Pakistan, even though Pakistani government publicly denies it.
The head of the IMF, Dominique Strauss-Kahn, said this month that the fund has more than $200 billion available for bail out and could obtain additional resources quickly if needed. The consensus among the experts is that IMF will need a lot more than $200 billion as the list of countries lining up for IMF help grows longer by the day, including non-traditional borrowers such as Iceland. | <urn:uuid:17e2efdb-ba05-4210-81ba-9a94b876d56c> | CC-MAIN-2022-33 | https://www.riazhaq.com/2008/10/aziz-leads-imf-criticism-as-crisis.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00475.warc.gz | en | 0.971962 | 1,312 | 1.960938 | 2 |
The 2014 statistics for Canadians reporting a diagnosis of fibromyalgia, chronic fatigue syndrome, or multiple chemical sensitivities, (by sex, household population aged 12 and older) are here:
I wonder if the drop in MCS diagnosis has anything to do with fewer doctors being aware of how to diagnose it, or the lack of support (to put it nicely) that they receive for diagnosing and treating patients with MCS?
It certainly isn’t because our environments are less toxic or that we have more access to health care, or other necessary social supports available that would reduce incidence development.
I’ve heard from more than a few people who know they have MCS (thanks to independent research and luck), that their doctors “don’t believe in it”, so they can’t get an official diagnosis.
Interesting too about the jump in numbers of people diagnosed with FM.
Perhaps the increase in FM diagnosis is due to the fact that it is now widely “recognized as real” (since a few pharmaceuticals were developed to treat some of the symptoms without causing more problems in some of the people), so maybe more people with MCS are either getting or choosing to use just the FM diagnosis (with MCS as a symptom instead of an actual diagnosis) because trying to get disability income or accommodations with MCS alone is such a nightmarish process?
My own FM flares are totally caused by some kinds of chemical exposures. Unless people with FM were advised to reduce or eliminate everyday chemical exposures (by doing things like choosing fragrance-free personal care, laundry and cleaning products), and change their diets to fresh, clean organic foods, most would never know how much everyday products, materials, and foods (or food-like products) affect their pain and functioning levels.
Since the Canadian Community Health Survey (CCHS) tracks MCS (they have since 2005), isn’t it time for MCS to have its own specific ICD code?
Isn’t it time for all Canadian doctors to know how to diagnose and treat people with MCS, as well as offer prevention tips so that the condition doesn’t become severe and disabling?
Isn’t it time for ALL medical and dental practices and practitioners to be at minimum fragrance-free so that they would be more accessible to people with MCS?
Isn’t it time for ALL places and services to be accessible to people disabled from MCS?
Accessible (healthy) environments would benefit everyone!
In 2010 there were more people with MCS than there were with cancer or other well serviced health conditions.
It’s time for
Regarding the use of CFS, the stat site noted this:
“At the time of collection, respondents were asked if they had “chronic fatigue syndrome” that had been diagnosed by a health professional. Although the condition can be referred to by other terms, such as “myalgic encephalomyelitis” or “systemic exertion intolerance disease,” this analysis uses the term “chronic fatigue syndrome” to reflect what was asked during the interview.” | <urn:uuid:72e11208-76bf-4659-907c-527d42974e92> | CC-MAIN-2022-33 | https://seriouslysensitivetopollution.org/2015/07/04/2014-statistics-for-mcs-fm-and-cfs-in-canada/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00271.warc.gz | en | 0.974095 | 665 | 2.109375 | 2 |
70). Thus in addition to technical training in equipment use, the training must make two-way pager users conscious of how their e-mail messages might be interpreted by recipients.
Implementation of the training program should take place in hands-on training sessions conducted by hardware and/or software experts in the equipment. Equipment vendors may provide or recommend appropriate personnel for that purpose. Trainers should be completely familiar with the technical features of the electronic units and should be able to answer all questions associated with proper operation of the two-way pager equipment.
Not only field supervisors but also in-house personnel should be included in the training. That is because all personnel who may be communicating with people in the field should know how to send messages appropriately.
Training sessions will cover all of the following issues: when to use e-mail; how messages should be formatted for ease of reading (e.g., keeping them short and to the point, not using all caps or long paragraphs); how to attach word processing or other files to an e-mail message; appropriate length of messages; the level of confidentiality; who will receive copies; when e-mail forwarding of messages is appropriate or inappropriate; the need for follow-up, based on the content of a message; hard copy creation and retention; and how and where to save electronic copies.
Some of the issues to be covered by training are applicable to general e-mail etiquette. But such issues as confidentiality, copying, and so on are also connected to organizational policy. Accordingly, training sessions will be reinforced by the creation of an e-mail manual that explains the technical use of the equipment, that reviews guidelines for using e-mail that relate to the psychology of e-mail messaging, and that articulates organizational policy with respect to employees' use of e-mail. For example, the manual should make clear that perso...
Email Training Program. (1969, December 31). In LotsofEssays.com. Retrieved 17:23, January 22, 2017, from http://www.collegetermpapers.com/viewpaper/1304265808.html | <urn:uuid:db048d4a-4147-4c05-942e-08df7e3fb12d> | CC-MAIN-2017-04 | http://www.collegetermpapers.com/viewpaper/1304265808.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00444-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.929873 | 434 | 1.914063 | 2 |
This article has an unclear citation style.(December 2014)
|Part of a series on|
Naval wargaming is a branch of the wider hobby of miniature wargaming. Generally less popular than wargames set on land, naval wargaming nevertheless enjoys a degree of support around the world. Both historical and fantasy rulesets are available.
Model ships have long been used for wargaming, but it was the introduction of elaborate rules in the early 20th century that made the hobby more popular. Small miniature ships, often in 1:1200 scale and 1:1250 scale, were manoeuvred on large playing surfaces to recreate historical battles. These models were basic representations of ship types, with enough detail to make them recognisable. Firms such as Bassett-Lowke marketed these to the public in England, along with more detailed versions that appealed to collectors. Prior to World War II, the German company Wiking became a leader in the field, but the war ended its dominance.
After World War II, several manufacturers started business in Germany, which remains a major centre of production to this day. Other companies started in Britain and the United States as well, first centering on the wargamer, but as time went by and models became both more detailed and costly, marketing to the collector. There has also been a diversification in scales. Plastic kits in 1/600 and 1/700 became widely available. In the UK Skytrex and Navwar pioneered the "micro scale" with extensive ranges of ships from pre-dreadnought ironclads to modern vessels in 1/3000. In the US CinC and GHQ followed with slightly larger and more detailed models in 1/2400. In recent years Hallmark have moved the scale down to 1/6000.
As with other arms of the wargaming hobby, rules can vary greatly in complexity. Commercially available historical rulesets cover practically every era of naval warfare from ancient and medieval ships through the fleets of the Age of Sail, the ironclad and battleship eras to the modern era. Models of most common types of ships are available, but in many cases wargamers have to source their own models, either by conversion or scratch building, especially where more esoteric periods or scales are in use.
The ancient Romans staged what were probably the first naval "wargames", with mock sea battles acted out in Rome's Colosseum, specially flooded for the occasion. (These Naumachiae later provided the inspiration for the title of Rod Langton's ancient naval rules.)
Popular naval wargaming began with the inclusion of wargaming rules in early editions of Jane's Fighting Ships by Fred T. Jane. Classifications of ships' armour and armament in Janes' were used directly within the rules. Incarnations of the rules are still in use today.
A later proponent of popular naval wargaming was American author Fletcher Pratt. As well as publishing his rules Pratt staged large public games in ballrooms and other large meeting rooms, the events being almost as much a social event as a wargaming meeting. As with Janes' rules various incarnations and revisions of the Fletcher Pratt rule system are still in use today.
The Age of Sail rules for the 1972 Don't Give Up The Ship call for pencil and paper, six-sided dice, rulers and protractors, and model ships, ideally of 1:1200 scale. Single ship engagements can be played on a tabletop, but fleet battles require more space. The rules are elaborate and cover morale, sinking, fires, broken masts, and boarding. Wind speed and direction are determined by a roll of the dice; a protractor is used to measure the angle between the wind and ship directions and hence determine ship speed. The protractor is also used to determine which cannon can fire on an enemy ship, as well as the damage caused and the chance of hitting at short range (4") and long range (16"). The conclusion of the rulebook provides the statistics necessary to re-enact historical encounters such as during the War of 1812. The second edition added 4 pages of simplified rules for battles between fleets.
One of the most popular sets of rules available at present is General Quarters, written by Lonnie Gill. Quick and easy to play, they have established themselves over the years as one of the leading sets of World War I and II era rules. General Quarters 1 and 2 feature a slightly abstract combat system and ship definition system reminiscent of naval board wargames. However, this approach led to a fast-playing system that was the root of its popularity (probably coupled to an extensive array of supporting information and ship statistics). GQ1 and 2 have recently been replaced by a less abstract version, GQ3 which covers World War II; a World War I version entitled Fleet Action Imminent was released in January 2008.
Followers of naval wargaming tend to concentrate on historical settings. However, there is a smaller but nonetheless active arm of the hobby that covers fantasy and science fiction naval warfare. The now out-of-print fantasy game Man O' War, set in the realm of Warhammer Fantasy, dealt with sea battles where each player typically controlled half a dozen to a dozen model ships. Each model had a corresponding template to record damage, crew levels, and outbreaks of fire, among other bookkeeping activities. In this regard, the game mechanics proved some limiting factors. Ships were split into three categories: Ships of the Line, Men O'War and "Independents". The Bretonnian fleet was modelled on ships of the 17th century, while the Empire tended more towards the look of earlier time, with some ships that carried single large cannon or mortars. Dwarf ships were steam powered ironclads, and they also had submarines and balloons. High Elf ships were fast maneuverable sail powered ships, while Dark Elves mainly used great sea creatures as the basis for their "ships".
Land-based miniature wargames have also been adapted to naval wargaming. All at Sea, for example, is an adaptation of The Lord of the Rings Strategy Battle Game rules for naval conflicts. The game's mechanics centred on boarding parties, with options for ramming actions and light artillery in the form of ballistae and other siege engines. As such, the ship's scale ratio corresponds to the 25 mm scale miniatures used by The Lord of the Rings. Model ships are built by hobbyists, just as normal miniature terrain, such as "great ships" of Pelargir, cogs of Dol Amroth and Corsairs of Umbar galleys. Elsewhere successful adaptations of the DBA and Fire and Fury land warfare rules have been made to ancient and Renaissance naval battles at the fleet action level (where naval battles shared many characteristics of their land based equivalents).
An unusual source of recent historical naval wargaming rules has been the adaptation of science fiction starship combat rules (the reverse is also true, as sci-fi tends to treat starships as being an evolution of "wet navy" shipping). An example of this approach to rule development is Victory at Sea from Mongoose Publishing. This is a simple, "entry level" set of rules developed from Mongoose's A Call to Arms sci-fi rules. Victory at Sea has also spawned a number of period variants including Ironclad and Age of Sail, and a World War I variant set called "Age of dreadnoughts" has also been published. Elsewhere a variant of the Full Thrust science fiction starship combat rules exists that covers age of sail battles. Another example, Battlefleet Gothic (BFG), is based from the Warhammer 40,000 land battle game, both developed by Games Workshop. Every major army in Warhammer 40,000 has its representative fleet in BFG, as it is known colloquially.
In contrast to land wargaming, naval wargaming almost exclusively uses ratios to express the scale of the models. Popular scales include:
- 1:6000, 1:4800, 1:3000, 1:2400 - popular for use in games of the pre-Dreadnought era and later, although some notable ranges in earlier periods are available.
- 1:1800 - A growing intermediate scale, made popular by games such as Axis and Allies: War at Sea that use a "trading card" format. While still less common than smaller and larger scales, the simpler dynamics of "casual" wargaming makes this an increasingly common introductory scale.
- 1:1200, 1:1250 - the popular "collectors'" scale, with models from practically every era and nationality available.
- 1:900 - an unusual scale, used for ancient naval games.
- 1:600, 1:700 - generally used for coastal forces gaming set in World War I, World War II or post war periods. Due to the availability of plastic kits in this scale, some naval wargamers use these scales to play "in the grand manner" for battleship encounters, often playing on areas measured in yards rather than feet. This is also an extremely popular scale for American Civil War riverine and other ironclad era actions.
- 1:450 - another unusual scale, used for pirate and small Age of Sail actions (e.g. Peter Pig's "Pieces of Eight" range).
- 1:400, 1:300, 1:285 - some coastal models are available in these scales. Often used for riverine actions involving close liaison with land forces in similar scales.
- 10mm or 1:160 - a newer scale for "collectible" American Civil War naval gaming. Often used for actions involving close liaison with land forces in 10 mm.
Notable exceptions to the "ratio" rule are the use of 15 mm to 25 mm games that emphasise boarding actions, and thus make use of figure ranges in those scales.
Radio control combat
Rather than simply acting out battles through the use of representative static models, in model warship combat, radio control ships (usually used in ponds) are constructed and outfitted with BB cannons capable of damaging and sinking other vessels. The ships are designed to be realistically sunk, and all clubs have very stringent rules requiring ships not to be built with hulls stronger than is appropriate, typically specifying a thickness of the balsa wood hulls as well as a test of penetrability. To reduce the chance of spectator injuries, and to prevent a vessel from having an unfair advantage, the propellant gas used in the cannons is limited in pressure, and may be tested by the judges, again disqualifying a ship if it is too high.
For historic copies any ship traveling faster than the appropriate scale speed may be disqualified or ordered to maintain a slower speed. An inappropriately high top speed gives a ship an unfair advantage, and is frowned upon by other members. 1/144 scale is the most common scale, although others do exist.
Some events try to recreate historic events, while others create original scenarios, such as all-out war, a subset of ships defending a port against an attacking enemy, protection of a group of unarmed merchant vessels, or any other scenario the club members decide would be fun. Even in recreations of historic battles, the sequence of events and outcome of the engagements are decided by the actions and luck of the operators, and often do not have much resemblance of the historical events.
Depending on the rules, a ship may be allowed to surrender and receive safe passage back to shore where it is removed from play, or other ships may fire on it until it sinks. Ships are designed to tolerate sinking such that a sunken ship need only be retrieved after the battle is over, minor repairs executed, fresh batteries installed, and returned to the water for the next round. Many ships also contain bilge pumps, of a maximum capacity specified by the rules of a specific club for the type of ship, to allow them to sustain minor damage without immediately sinking.
In some formats, events are scored by the final results, such as which side has more remaining ships (or survives longest) in a two team game, while others are scored on a point systems, with hits and sinkings assigned differing point values.
- Head, Derek. Bassett-Lowke Waterline Ship Models London 1996 ISBN 1-872727-72-7
- Schönfeld, Peter Wiking-Modelle Die Schiffe und Flugseuge Hamburg 1998 ISBN 3-7822-0731-9
- Jacobs, Paul 1250 History on the steelnavy.com website
- The Fred Jane rules have been reprinted at http://www.wargaming.co
- The Pratt rules are available from http://www.wargaming.co
- Survey of naval Wargames Rules, NWS journal "Battlefleet" 1996
- Nick Davis. "All At Sea Part One". Ruleset. White Dwarf. Archived from the original on 2007-10-09. Retrieved 2007-06-14.
- "The Ports of Pelargir". Website. Archived from the original on 2007-03-13. Retrieved 2007-06-14.
- Victory at Sea | <urn:uuid:c10d39bd-57db-4b61-a496-c1b12aed7e00> | CC-MAIN-2022-33 | https://en.wikipedia.org/wiki/Naval_wargaming | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00670.warc.gz | en | 0.947637 | 2,769 | 2.640625 | 3 |
One of the criticisms often made of MAME / MESS’s CHD format is that it doesn’t actually provide very efficient compression, especially when it comes to CD AUDIO data. I’ve had a number of people ask me if I can look into improving this, especially when you consider that in with the current format a complete Saturn set is almost 1TB, with a large portion of that being AUDIO.
The reason it’s inefficient is because it’s using zlib’s inflate algorithm for the blocks, blocks which are rather small to ensure that data is decompressed quickly. While this is fine for DATA (it’s the same thing that ZIP files use) it’s absolutely hopeless for AUDIO.
There are dedicated audio lossless compressors out there, FLAC is a popular one.
I’ve spent the last 4-5 days solid integrating support for this into the MAME / MESS tree, and extending the CHD format to not only support it’s native blocks (hunks), but also reference to embedded streams via ‘virtual hunks’ which point at a stream, and allow the actual FLAC codec to do the seeking and decoding work for this.
By doing this I can achieve a good level of compression with FLAC, far better than trying to split it into CHD hunks due to the lower overhead, and improved ability of the compression algorithms to predict how data best compresses. I also still get good speed decoding, as the FLAC format is designed to be quick to seek, and has built in seektable support of it’s own which I’m levering.
I have to say FLAC is an absolute joy to work with, the API does everything you can expect, the documentation is great, and it’s very good at letting you know if something is wrong. (the only issue I had with the documentation / API was with the seektables, whereby calling things in the wrong order / wrong time during encoding could cause data to be overwritten without throwing an error)
I’ve also added support to the MAME SAMPLE interface to playback files from FLAC sources, this should allow the recently dumped tape loops to be compressed much better than they are now (they’re uncompressed PCM .wav files)
The other possibilities for this are endless, -wavwrite could also output FLAC data if support was added, MESS could potentially load cassette based software from FLAC images. It’s an incredibly useful codec to have around.
I’ve uploaded my first pass of this code
Here (link offline for the time being, there is definitely still an error). This should be considered ALPHA SOFTWARE and I won’t be held responsible if you end up destroying your CHDs with it. I’m currently in the process of batch converting many images and haven’t found a broken case yet, but still, it’s in testing. While I’m happy with the current format extensions and CHD format created it could change in a final version, you have been warned.
This code has been submitted to R.Belmont, who is currently making some portability fixes. FLAC is designed to be portable, so this shouldn’t be too much of a problem, so fingers crossed it can be sorted out soon.
Usage is simple, I’ve added an additional -createcdflac commandline option which will use the FLAC routines when compressing AUDIO. If you already know how to use CHDMAN then it’s simple enough.
Have fun :-) | <urn:uuid:d5b22679-b122-4471-b51f-407ab62f2e7c> | CC-MAIN-2022-33 | https://mamedev.emulab.it/haze/2012/01/18/taking-the-flac/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00076.warc.gz | en | 0.942652 | 765 | 1.5625 | 2 |
From Wikibooks, open books for an open world
|Servings||As many as you like|
Baked Potatoes - Potatoes are perfect for camping, they don't take up space in the cooler and cooked in foil they are easy to prepare.
Also known as: stuffed potatoes
- 1 large baking potato
- cooking oil
- salt and butter or sour cream (optional)
- other possible toppings: spicy beans, avocado, salsa, mushrooms, grated cheese ... whatever is left in the fridge!
Prepare the potato
- Scrub potato and pierce the skin all over with a fork.
- Wrap in lightly oiled heavy-duty foil and seal.
- Cook over medium-hot coals for 45 minutes or until soft.
- Serve with salt and butter or sour cream .
- Clean and prepare potatoes as above, but wrap them in waxed paper, NOT foil.
- Place a piece of paper towel in the microwave and microwave potatoes on high for 8 minutes. Note: potatoes will be extremely hot when finished.
- Cut potato into four and serve with toppings of your choice.
- Clean and prepare potatoes as above, but wrap them in foil, NOT waxed paper..
- Place the potatoes in the oven.
- Cook for one hour.
- Remove when cooked.
- When cooking is initially completed, handle the hot potato with care. | <urn:uuid:8aaf671d-1a0f-429d-ae9a-f3250f216699> | CC-MAIN-2016-44 | https://en.wikibooks.org/wiki/Cookbook:Baked_Potatoes | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725470.56/warc/CC-MAIN-20161020183845-00076-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.844929 | 293 | 1.78125 | 2 |
Rob and Michelle Avis envisioned Verge Permaculture as a way to provide real-world solutions to create more sustainable homes, resilient communities and a healthy eco-system; however, what they have accomplished goes far beyond teaching and gardening. Through their accredited Permaculture Design Courses, Verge Permaculture has produced a generation of graduates who apply this new integrated design philosophy with the pragmatic entrepreneurial spirit to the communities they serve. Rob and Michelle’s home garden reuses approximately 20,000 litres of rainwater annually, and has become a demonstration site for applied sustainability techniques, serving as the catalyst for a number of community sustainability activities.
- EMERALD SPEAKER SERIES: Kelcie Miller-Anderson
- Derek Beaulieu Wrote a Poem for the Emerald Awards and You Have to Read It.
- ALBERTA’S ECOHEROES RECOGNIZED AT 25TH ANNUAL EMERALD AWARDS CELEBRATION
- Words of Wisdom from One of Alberta’s Favourite EcoHeroes
- ALBERTAN ECOHEROES TAKE ONE STEP CLOSER TO RECEIVING PRESTIGIOUS ENVIRONMENTAL AWARD | <urn:uuid:baba02de-3bb3-43d7-8b71-e57641c79d8c> | CC-MAIN-2016-44 | http://emeraldfoundation.ca/aef_awards/verge-permaculture/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721555.36/warc/CC-MAIN-20161020183841-00178-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.839249 | 252 | 1.90625 | 2 |
Chucklesome Lesson (Optional Kit Add On)
Art is not only what you see but you smell!
Creative, humorous, funny and fragrant. Some of the words that describe our Chucklesome Lesson.
With hours to spare and a kit nearby (or your own craft supplies), your children will create art while smelling their creation and distinguishing the scents. But the fun doesn't stop there, We have a range of activities included that will get your children giggling.
The Chucklesome Kit (Optional to Add on) includes:
- Silly Scents Mini Art Case Crayola
- 1 Funny Faces- People & Animals colouring book Crayola
- 1 Gigantic colouring book Crayola
- 12 Silly Scents- Scented Coloured Pencils Crayola
- 1 Blunt tip scissors
- 5 Glitter glue sticks
- 1 Washable Glue
- 6 Washable paint bottles- Classic colours
- 5 Art and Craft paint brushes
- Products may be substituted if unavailable
- Live & Interactive Lesson (Pack shipping notification email includes lesson booking link)
Out of stock | <urn:uuid:11a4977f-dac3-4c34-87b5-0aa294b78225> | CC-MAIN-2022-33 | https://creativevouchers.com.au/shop/chucklesome-pack/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00473.warc.gz | en | 0.872096 | 245 | 1.632813 | 2 |
The award citation reads "For his insight, courage and creativity in bringing powder diffraction to the macromolecular community."
Von Dreele’s research focuses on the development of x-ray and neutron powder diffraction, and its application to a wide variety of scientific problems. He pioneered the General Structure Analysis System program suite for Rietveld analysis, an exceptionally valuable method for structural analysis of nearly all classes of crystalline materials not available as single crystals. He has been using the Rietveld Method since 1972. His current research is in further extensions of protein powder diffraction including investigation of crystal growth, phase transformations, radiation damage and exploring possible routes to de novo protein structure determination from powder data.
Von Dreele was Professor of Chemistry at Arizona State University (1971-1987) and a Staff Scientist at Los Alamos National Laboratory (1987-2003). He has been at Argonne since April 2003.
He is the author or co-author on more than 150 scientific publications on crystal structure results and techniques, most of which involve Rietveld refinement, including a description of the first protein structure solved from powder diffraction data.
The International Centre for Diffraction Data is a non-profit scientific organization dedicated to collecting, editing, publishing and distributing powder diffraction data for the identification of crystalline materials.
The J.D. Hanawalt Award is named for Professor J. Donald Hanawalt, whose pioneering work in the 1930s led to the development of the PDF database structure and search/match procedures still in use today. The award is presented every three years for an important, recent contribution to the field of powder diffraction.
The Advanced Photon Source at Argonne National Laboratory is one of five national synchrotron radiation light sources supported by the U.S. Department of Energy’s Office of Science to carry out applied and basic research to understand, predict, and ultimately control matter and energy at the electronic, atomic, and molecular levels, provide the foundations for new energy technologies, and support DOE missions in energy, environment, and national security. To learn more about the Office of Science x-ray user facilities, visit http://science.energy.gov/user-facilities/basic-energy-sciences/.
Argonne National Laboratory seeks solutions to pressing national problems in science and technology. The nation's first national laboratory, Argonne conducts leading-edge basic and applied scientific research in virtually every scientific discipline. Argonne researchers work closely with researchers from hundreds of companies, universities, and federal, state and municipal agencies to help them solve their specific problems, advance America's scientific leadership and prepare the nation for a better future. With employees from more than 60 nations, Argonne is managed by UChicago Argonne, LLC for the U.S. Department of Energy's Office of Science. | <urn:uuid:2685d621-70dc-4c74-80d7-ebbe295d0500> | CC-MAIN-2022-33 | https://aps.anl.gov/APS-News/Von-Dreele-Receives-Hanawalt-Award | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00678.warc.gz | en | 0.91554 | 583 | 2.046875 | 2 |
There's still time to apply and start teacher training this September.
Find your postgraduate teacher training course now(opens in new window).
Citizens of every country in the world can apply to train to teach in England.
Already a qualified teacher?
If you’re already a qualified teacher, find out how you can teach in England if you completed your teacher training outside the UK.
Why train to teach in England?
Teacher training in England is practical, hands-on and supportive. As an international applicant, you’ll have the opportunity to train at a world class institution where creativity and innovation is valued, gaining lots of classroom experience along the way.
When you have successfully completed your training, you will be awarded qualified teacher status (QTS)(opens in new window), a professional qualification valued globally.
QTS will allow you to teach in all schools in England. Some courses combine QTS with a postgraduate certificate in education (PGCE) or postgraduate diploma in education (PGDE). These are optional: you do not need a PGCE or PGDE to teach in England.
Read teachers’ stories about the rewards of training to teach in England.
Other ways to train
You can also apply to train to teach in Wales(opens in new window), train to teach in Scotland(opens in new window) or train to teach in Northern Ireland(opens in new window).
If you don’t want to come to England to study you can apply to train for international qualified teacher status (iQTS). This meets the same high standards as English qualified teacher status (QTS)(opens in new window) and, if successfully completed, leads to the automatic award of QTS.
For teachers who qualified outside the UK, as well as those with teaching experience, other routes to qualified teacher status (QTS)(opens in new window) are also open.
Need to know
When you plan your training, bear in mind that:
- international candidates can expect to pay between £12,000 and £22,000, plus living costs, to train (depending on your immigration status, you may get a reduction in fees and some financial support)
- training lasts one 1 academic year full-time, or longer part-time
- you can apply for paid teaching jobs as soon as you successfully complete your training
- you’ll earn at least £25,000 a year, and £32,000 in London, when you qualify as a teacher
- you can update, extend or switch your visa to live and work in the UK long-term
Apply for teacher training
We can help you make an application for teacher training in England. Sign up for a teacher training adviser to get help right away and throughout the application process.
1. Get support and advice
For help applying, you can:
- sign up to get a teacher training adviser(opens in new window) – you’ll be asked for your phone number, email and location so a dedicated adviser can call you back in your time zone
- call +44 800 389 2500, Monday to Friday between 8:30am and 5:30pm (UK local time) – calls will be charged at your standard rate
- use the live chat service at the bottom of this page
2. Check your eligibility
To train to teach in England, you will need:
- a bachelor’s degree (this can be from a university outside the UK)
- an English language qualification which is the same standard as a grade 4 GCSE (General Certificate of Secondary Education)
- a maths qualification which is the same standard as a grade 4 GCSE
- if teaching children aged 3 to 11 in primary school, a physics, chemistry or biology (science) qualification which is the same standard as a grade 4 GCSE
A GCSE is an academic qualification awarded for exams in England, usually taken at age 16.
You will also need to:
- have the health and physical capacity to train to teach
- undergo safeguarding and criminal record checks carried out by your training provider or employer
Help comparing English and international qualifications
For help, call us on +44 800 389 2500. We can check your degree and other qualifications meet the standards set for English teacher training.
When you make your application for teacher training, some teacher training providers will want to see a statement of comparability(opens in new window) from the UK European Network of Information Centres (UK ENIC).
A statement of comparability proves that your school and university qualifications are the same standard as UK GCSEs and a UK undergraduate degree. We can help you with a free statement of comparability, once you’ve submitted your application, if your provider asks for this.
English language, maths and science proficiency
Your English language qualification could be evidence you’ve reached a certain standard in an English language test, for example, the International English Language Testing System (IELTS)(opens in new window), Test of English as a Foreign Language (TOEFL)(opens in new window), or C2 Proficiency, formerly known as Cambridge English: Proficiency (CPE)(opens in new window),
If you haven’t passed an English language test like this, or do not have qualifications in maths or science which are the same standard as grade 4 GCSE, some teacher training providers will let you sit tests in these subjects. It’s best to contact them to ask about their policy before you apply.
If you do not have a university degree
If you do not have a degree, you can apply to study a 3 to 4 year undergraduate course in England(opens in new window) which combines a teaching degree with qualified teacher status (QTS)(opens in new window). When you complete your studies, you’ll be able to apply for jobs as a teacher in England.
The UK Council for International Student Affairs(opens in new window) have lots of helpful information about studying at an English university.
3. Find out about fees and financial support
Fees vary between training providers, but range from about £12,000 to about £22,000 in total. You’ll also have to pay your living costs.
Alternatively, you can apply for a salaried teacher training course, and earn money while you train in a school. However, these courses are limited in number and very competitive. You will usually need to have achieved highly in your bachelor’s degree and have at least 3 years’ relevant work experience.
Any financial support, for example a reduction in your fees to the rate paid by UK applicants (set at a maximum of £9,250) is dependent on your immigration status. Most international candidates will not be eligible for financial support.
Already living in the UK?
You may be eligible to get financial support with your teacher training course if you:
Check your eligibility for financial support(opens in new window).
4. Search and apply for teacher training courses
Find postgraduate teacher training courses(opens in new window) in England leading to qualified teacher status (QTS)(opens in new window). When you have chosen your course, you can apply for teacher training(opens in new window).
First apply for your training place, then apply for your visa
If you need a visa to train to teach in England, you must have a confirmed offer of a training place on a course offering student or skilled worker visa sponsorship before you apply for your visa.
You can search for courses where student or skilled worker visa sponsorship is available(opens in new window). You can also search by location, teaching subject and age group, and for courses which pay a salary.
Due to rules about immigration, not all providers can accept international applicants – we suggest you contact them before you apply to check.
Already living in the UK?
If you have settled or pre-settled status under the EU Settlement Scheme(opens in new window), or indefinite leave to remain(opens in new window), you can apply to any English teacher training provider.
Choosing a subject to teach and preparing to apply
The subject you apply to teach must usually be the same, or closely related to, the subject you studied at university. (For example, engineering graduates can apply to train to teach physics, but computer science graduates are unlikely to be accepted to train to teach geography.)
Your teacher training adviser can help with:
- your choice of subject
- writing a personal statement
- ways to research the English education system
- preparing for your interview
Ways to train
You can train in a school or in a university setting, and study full-time (over a year) or part-time (over 2 or more years). Get a dedicated adviser(opens in new window) to learn about the different types of courses available, or explore how to train to be a teacher in England.
You may also wish to read detailed guidance about fee-paying and salaried courses and qualified teacher status(opens in new window).
5. Apply for your visa
If you’re not sure about your immigration status, you can check if you need a UK visa(opens in new window). You can also contact UK Visas and Immigration for help(opens in new window).
Already living in the UK?
If you don’t already have an immigration status allowing you to train to teach in the UK, you’ll need to apply for a student visa(opens in new window). You can do this once you have a confirmed offer of a training place from a training provider who can sponsor student visas.
If you have a place on a salaried training course, you’ll need a skilled worker visa(opens in new window).
Alternatively, you may be eligible for a different type of visa which allows you to study without being sponsored by your training provider or employer.
Find out more about applying for the right visa for your teacher training course(opens in new window).
6. Plan your move to the UK
Visit the UK Council for International Student Affairs(opens in new window) for advice about immigration, finding a place to live and opening a bank account. Their Student Advice Line(opens in new window) also offers support over the phone.
Your teacher training provider may also be able to help you plan your move to the UK – contact them directly to ask.
7. Complete your teacher training and gain qualified teacher status (QTS)
If you’re accepted on to a teacher training course in England, you’ll train for one year (or longer if you’re part-time) to gain qualified teacher status (QTS)(opens in new window).
Apply for your first teaching job
When you have qualified teacher status, you will be able to apply for paid teaching jobs in all schools in England.
To find a teaching job, you must apply to individual schools (not the Department for Education). Use the Teaching Vacancies(opens in new window) service to search for jobs by region, subject specialism and age group.
You may need to apply for a different visa to work in England as a qualified teacher. Our guidance for non-UK nationals wishing to teach in England(opens in new window) explains the skilled worker visa and covers other ways you can update, extend or switch your visa when you finish your training.
Learn more about your first teaching job in England(opens in new window).
Learn more about life as a teacher and the English education system
Join the Aspiring Teachers Forum on Facebook(opens in new window).
Read interviews with real teachers.
Learn more about English education:
- types of English school(opens in new window)
- curriculum and qualifications(opens in new window)
- behaviour and discipline in schools(opens in new window)
- Office for Standards in Education, Children’s Services and Skills (Ofsted)(opens in new window)
- The Education Endowment Foundation(opens in new window) – a charity gathering international evidence on teaching 5 to 16 year olds
- Times Educational Supplement (TES)(opens in new window) – information and resources for teachers
The Department for Education does not administer teacher training courses or appoint teachers, so we cannot help with individual applications to training providers or schools. You can get support and advice with your application.
However, if you have general questions about the information on this page, you can email us at firstname.lastname@example.org. | <urn:uuid:0fdcd28b-a0be-440c-b242-fef95333b100> | CC-MAIN-2022-33 | https://getintoteaching.education.gov.uk/non-uk-teachers/train-to-teach-in-england-as-an-international-student | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00465.warc.gz | en | 0.940969 | 2,591 | 1.601563 | 2 |
Yesterday, we saw in Acts 1:1-11 how the disciples were commissioned to continue Jesus’ work, being his witnesses in Jerusalem, Judea, Samaria, and the ends of the earth – announcing the reign of God in his world. But they weren’t going to do this by their own power. (After all, they were just “men of Galilee” as the angel reminded them.) They were to wait for the Holy Spirit to give them the power to fulfil their incredible calling. But what to do while you wait?
Acts 1:12-15 Then the apostles returned to Jerusalem from the hill called the Mount of Olives, a Sabbath day’s walk from the city. When they arrived, they went upstairs to the room where they were staying. Those present were Peter, John, James and Andrew; Philip and Thomas, Bartholomew and Matthew; James son of Alphaeus and Simon the Zealot, and Judas son of James. They all joined together constantly in prayer, along with the women and Mary the mother of Jesus, and with his brothers. In those days Peter stood up among the believers (a group numbering about a hundred and twenty)…
Told to wait, they wait. And while they wait, they pray. A good example for those of us who see waiting as a nuisance – a waste of time. Or an opportunity to get some more planning done. Instead, they remember that this is God’s work, not ours, so time waiting in prayer is never time wasted. Perhaps they remembered the order of things from back in Luke 10:Luke 10:2 He told them, “The harvest is plentiful, but the workers are few. Ask the Lord of the harvest, therefore, to send out workers into his harvest field.”
Because the workers were few. Take a look at how many were there: only 120 believers. This movement that was going to go to the ends of the earth was starting pretty small. Almost, like a mustard seed?
Also interesting is not just how many were there, but also who was there: Jesus’ mother and brothers. The brothers in particular have gone from sceptical unbelievers (see e.g. Mark 3:21; John 7:5) to being part of the gang. In fact, James goes on to be the head of the Jerusalem church before being martyred for his beliefs. What had changed? What makes a person go from being (understandably) sceptical about his brother’s claim to be God incarnate, to being the leader of his followers? This is one of the most fundamental pieces of evidence for Jesus’ resurrection: the radical change in his family’s stance.
Speaking of how many, Judas’s treachery had left a bit of a problem. There were now only eleven disciples and there really needed to be twelve. After all, they were representing the twelve tribes of Israel, so you can’t not have twelve! Even in the OT, when there were in effect thirteen tribes (Joseph having split into Ephraim and Manasseh) the lists of tribes still are edited to add up to twelve by omitting one tribe: sometimes Simeon (it effectively got swallowed up in Judah), sometimes Levi (who didn’t have their own land) – even Dan gets left out in Revelation, perhaps because of its association with idolatry… But I digress. At any rate, the point is, there must be twelve! Peter even points this out in verse 21 using the phrase “It is necessary to choose one of the men … to become a witness with us.” And the word translated “it is necessary” is used every time in Luke to refer to something essential to God’s plan of salvation. They need another one. Let’s see how they solve that.
Firstly, we get a recap on what went on with Judas:Acts 1:15-19 In those days Peter stood up among the believers (a group numbering about a hundred and twenty) and said, “Brothers and sisters,4 the Scripture had to be fulfilled in which the Holy Spirit spoke long ago through David concerning Judas, who served as guide for those who arrested Jesus. He was one of our number and shared in our ministry.” (With the payment he received for his wickedness, Judas bought a field; there he fell headlong, his body burst open and all his intestines spilled out. Everyone in Jerusalem heard about this, so they called that field in their language Akeldama, that is, Field of Blood.)
For the pedants, this differs a bit in the detail from Matt 27:1-10 in which it says Judas hanged himself and the priests bought the field as a place to bury foreigners. There are various way people attempt to harmonise the two accounts, but it’s probable that Matthew and Luke heard slightly different reports – a pointer to authenticity, as if you were fabricating Scripture you wouldn’t allow for such obvious discrepancies in detail.
Peter then goes on to quote a couple of Psalms and make the point that Judas needs replacing:Acts 1:20 “For,” said Peter, “it is written in the Book of Psalms: “‘May his place be deserted; let there be no one to dwell in it,’ and, “‘May another take his place of leadership.’
The quotes seem like a tenuous connection. But Peter is simply working from the premise that David was a pattern of a righteous, godly person who suffered – a pattern that Jesus fulfilled. The two Psalms quotes are David talking about his enemies – the second one in particular asking God to remove him from leadership and replace him with another. Peter takes this as an indication that they should do the same to Jesus’ enemy, and replace him.1:21-26 Therefore it is necessary to choose one of the men who have been with us the whole time the Lord Jesus was living among us, beginning from John’s baptism to the time when Jesus was taken up from us. For one of these must become a witness with us of his resurrection.” So they nominated two men: Joseph called Barsabbas (also known as Justus) and Matthias. Then they prayed, “Lord, you know everyone’s heart. Show us which of these two you have chosen to take over this apostolic ministry, which Judas left to go where he belongs.” Then they cast lots, and the lot fell to Matthias; so he was added to the eleven apostles.
Lots. Like drawing straws. Is this the way to select apostles?
It has Old Testament precedent. People would pray and then cast lots, expecting God to answer. Proverbs 16:33 says “The lot is cast into the lap, but its every decision is from the Lord.” Yet few – even those seeing Acts as prescriptive for what we do today – would advocate casting lots as a way of choosing leaders in the church. Like Gideon’s fleece setting, we seem to acknowledge that although God did work that way in that particular situation, it’s not necessarily a model for all-time.
We also notice that there seems to be a variety of methods of discerning God’s will in Acts:
- Acts 6 – a group choice (method unspecified) to choose seven deacons
- Acts 13 – “While they were worshiping the Lord and fasting, the Holy Spirit said, ‘Set apart for me Barnabas and Saul for the work to which I have called them.'”
- Acts 15 – “it seemed good to the Holy Spirit and to us” (after much debate)
- Acts 16 – Paul receives a vision of a man from Macedonia asking him to come over and help
This tells us there’s no one way of discerning God’s will in the story of Acts. But most of the time it seems to involve a group (not just an individual), and a foundation of prayer that actively seeks God’s will. Which is exactly what we find (v24) before the lot-casting here in chapter 1. So perhaps what we take away from this historical account in Acts is that God works in a variety of different ways to communicate his will, but they all seem to happen when people are seeking it.
At any rate, Matthias isn’t mentioned for the rest of Acts (although neither are most of the other apostles), and even in the next chapter they are still referred to as “the eleven.” In church tradition he becomes a missionary to Ethiopia, before turning up in the eastern suburbs of Sydney a couple of thousand years later. | <urn:uuid:db8b97ce-8470-415b-93d4-63dfb272a6c5> | CC-MAIN-2022-33 | https://timmacbride.com/2015/07/16/acts1b/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00471.warc.gz | en | 0.98089 | 1,839 | 1.820313 | 2 |
We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byNoah Holland
Modified over 2 years ago
George Siemens global summit 2006 Connectivism: Learning and Knowledge Today
Why do we need a new theory of learning?
Content is a conduit for conversation
Connectivism Diversity Network formation Knowledge rests in networks Knowledge may reside in non-human appliances, and learning is enabled/ facilitated by technology
Connectivism Capacity to know more is more critical than what is currently known See connections Recognize patterns Make sense
Connectivism Currency/relevance Alterations in the information climate alter approaches
What skills are needed? 1.Anchoring 2.Filtering 3.Connecting 4.Being human 5.Creating and deriving meaning 6.Evaluation/authentication
What skills are needed? 7.Critical/creative thinking 8.Pattern recognition 9.Navigate knowledge landscape 10.Acceptance of uncertainty 11.Contextualizing
Learning Technologies Centre Connectivism: A Learning Theory for a Digital Age George Siemens
What is learning today? Presented to Western Sydney Institute George Siemens.
Learning Technologies Centre Connectivism Learning conceptualized through the lens of todays world George Siemens.
Connectivism Rethinking learning in a digital age October 19, 2005 University of Manitoba.
New Paths in Elearning George Siemens. Why are you using elearning?
Learning and Knowledge Microlearning Business is learning Life is learning Education is learning Aging is learning What isnt learning???
Connectivism Learning Today. The network is the learning.
Learning in Context George Siemens
Connectivism: Museums as Learning Ecologies Presented to Canadian Heritage Information Network March 9, 2006 George Siemens.
TODAYS KNOWLEDGE A NEW METHOD A WORSHOP BY: MS. HELENA MOHAMED - MOHAMED SALLAM AHMADY EDUCATIONAL AREA December 2011.
Patterns and Sensemaking: Information Visualization George Siemens April 25, 2007.
Connectivism A learning theory for todays learner.
What is Worth Learning? New Learning Theories for the Digital Age.
Learning Technologies Centre Learning today… Provincial Territorial Distance Education Association September 25,
Learning Networks and Connective Knowledge Stephen Downes October 16, 2006.
UDL BOOT CAMP. Norms: Consider being Agents of Disruption Understand that “dissensus” is worth exploring Be active in thought and purpose Assume positive.
Where is e-Pedagogy? Is technology a tool, a driver or a constructor of learning in the University of Aberdeen? Flexible Delivery Symposium May 2009 Do.
Week 1: Program Development CAE George Siemens February 5, 2008.
Global Skills- Framing the Issues Dr. Douglas Bourn Development Education Research Centre, IOE Dr. Douglas Bourn Development Education Research Centre,
Library Service Meets Brain Research! OLA Super Conference 2010.
World Café: The World Café is a creative process for facilitating collaborative dialogue and the sharing of knowledge and ideas to create a living network.
LEARNING AND THE BRAIN Teaching that Works: Issues in Vocational & Technical Education Instruction Central Carolina Community College November 17, 2005.
CSTA K-12 Computer Science Standards (rev 2011) These standards will provide students with basic computing skills and concepts at all grade levels in many.
OLA SuperConference Session #408 Building ICT Capacity Through Interdisciplinary Studies (IDC) Tim Gauntley.
Planning for the Revised Curriculum at Key Stage 3.
About Common Purpose Common Purpose gives leaders the inspiration, the knowledge and the connections they need to produce real change. We believe that.
CULTIVATING HUMANITY IN SCHOOLS Promoting global mindedness as good teaching practice.
Making Dreams Come True? Implementing a Strategic Plan in an Healthcare Environment (Moving from Manager to Teacher) Dr Peter Hunter Director Integrated.
Indigenous and Scientific Knowledge for DRR Jessica Mercer DRR Advisor CAFOD
© 2017 SlidePlayer.com Inc. All rights reserved. | <urn:uuid:ee547e36-104b-48d4-a3c3-447f5a84e5be> | CC-MAIN-2017-04 | http://slideplayer.com/slide/703648/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00250-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.841132 | 877 | 2.859375 | 3 |
A group of Eden Cub Sea Scouts have been praised for their initiative, after they organised a hike from the mouth of Wonboyn Lake to the beach at Disaster Bay last weekend.
Six scouts completed the hike, which they planned themselves as part of earning their Grey Wolf Award – the highest award cub scouts (aged 8-10) can achieve.
The group gathered for a bright and early 8am start at Scout Hall, and were driven to the Wonboyn wharf and boat ramp, where Mark Upton took them across to the starting point at the lake mouth.
District Cub Scout leader Nev Cowgill said the hike was well-planned and a credit to the young scouts.
“Conditions were ideal for hiking, as there was light cloud, so it wasn’t too hot,” he said.
“Many things were found on the way, and Tanner had arranged a great little scavenger hunt with cryptic clues.
“To our surprise, the beach was covered in ground-up pumice stone, lots of seaweed from a recent storm and rough seas, Cuttlefish, some driftwood, and a number of birds.
“We saw pairs of Pied Oystercatchers, including one that was banded, Sandpipers, Sea Eagles, Pacific Gulls and Silver Gulls.
“We also saw a pod of dolphins in the surf.
“It was a great little hike and a credit to the young scouts.” | <urn:uuid:c71fc465-0a6c-42da-9b55-db04e7365110> | CC-MAIN-2017-04 | http://www.edenmagnet.com.au/story/2300575/cub-scouts-earn-praise/?src=rss | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00002-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.982551 | 311 | 1.570313 | 2 |
How to Clean Ceramic Tile Countertops
Dirt, stains and bacteria on ceramic tile countertops can make any kitchen or bathroom unsanitary. Here's how to properly clean ceramic tile and grout to keep counters beautiful and germ-free.
Tile countertops are popular in kitchens and baths. Knowing how to clean ceramic tile will help you keep your counters sanitary and looking brand new. This isn’t just about aesthetics, though. Bacteria and microorganisms can get into the grout, which is a porous material. This can make a kitchen counter unsafe for food, and make a bathroom counter unsanitary in general. You should wipe you’re your countertops after every use so you can get rid of the majority of the dirt and germs and prevent staining. But you should do a deep clean two or three times a year. Follow these tips on how to clean ceramic tile countertops.
First, wipe off the countertop with a commercially prepared tile cleaner, or make your own cleaner by combining 1 ⅔ cup baking soda, ½ cup liquid soap, ½ cup water, 2 tablespoons of vinegar. This will remove the day-to-day dirt.
You’re going to start with the grout, because it will be the dirtiest part of the tile counter. Tile doesn’t stain easily but grout does. Spray the grout with a commercially prepared grout cleaner. You can also use a mild bleach solution. It’s a good idea to wear gloves when using these types of products. They contain strong cleaning agents that could irritate your skin. For deep stains, allow the cleaner to sit for 10 minutes. Use a toothbrush or other small scrub brush to scrub the grout. This is where much of the dirt from daily use and, often, mildew accumulates. Start at one corner of the counter and work your way across the surface, cleaning all the grout lines. Do not scrub the tile itself with the brush as this could scratch the tiles.
Let the grout air dry, then seal with a commercial grout sealer. This will protect your grout from coming out and help it resist stains and dirt.
Should you seal the tile? If you have glazed ceramic tiles, you won’t need to seal it. Unglazed tile countertops will need to be sealed with a commercially prepared tile sealer to protect it and make it stain-resistant.
The final step: Rinse the counter and grout with hot water. This will make a tile kitchen counter food-safe, and a bathroom counter germ-free. Knowing how to clean ceramic tile will keep your counters beautiful and germ-free. | <urn:uuid:eebf4b94-8669-4855-bc05-bd787de722a0> | CC-MAIN-2017-04 | http://www.diynetwork.com/how-to/maintenance-and-repair/cleaning/how-to-clean-ceramic-tile-countertops | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00274-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.925232 | 555 | 1.539063 | 2 |
YOUR LIFE MATTERS WEEK – AFTERNOONS WITH AMOS. For the past two months Indianapolis Metropolitan Police Chief Rick Hite and Indianapolis/Marion County Public Safety Director Troy Riggs have been and the command staffs of the IMPD have been meeting with a wide range of community and neighborhood groups and holding meetings on all sides of town in Community Conversations about the crime and violence that’s plaguing Indianapolis this year., As part of YOUR LIFE MATTERS WEEK, Chief Hite and Director Riggs appeared on Afternoons with Amos to hear from the community on their views and concerns on crime, violence and solutions., There were lots of issues covered in the two hour Community Conversation. (Sadly during the Community Conversation came word that there’s been a shotting with at least one fatality with a second person dying later that afternoon). Everything from what is police doing about removing obvious “drug houses” and open air drug air drug selling in Black neighborhoods. Listeners asked about a lack of enforcement of speed limit and traffic laws, including one listener that complained about police who break speeding laws while not responding to emergencies. Chief Hite and Director Riggs talked about the crime data for 2013 and 2014 which shows that crime is down in eery category EXCEPT for homicides. They tried to make the case that crime is decreasing. They said they continue to plan to take tougher attitudes towards repeat offenders and that just a small percentage of people are committing the crimes. In response to several questions on recruitment of new police officers, Chief Hite and Director Riggs said that the latest class of IMPD recruits was 25% Black and over 10% Hispanic, making more than a third of the recruits non-white. Riggs said that he was committed to aggressively recruit and find the best officers and at the same time try to make the IMPD recruit classes reflect more the racial makeup of the city/county. Given that less than one-sixth of homicide victims and suspects and less than one-sixth of all non fatal shootings in the city are committed by individuals under age 18 why the perception among many that teens and committing the bulk of violent crime in the city. Both Riggs and Hite agrees that under 18 persons aren’t the problem, but they’re trying to put in place plans strategies to turn teens away from a life of crime before they turn 18. In the second half of the Community Conversation, Chief Hite and Director Riggs were joined by Steven DuBois of Crimestoppers and Kelly McBride of the Domestic Violence Network. DuBois explained Crimestoppers procedures which includes their staff doesn’t ask for the names of individuals who report tips. They ask tipsters to select a “code word” which the tipster uses to check back during the year to see if the tip has been acted upon. DuBois revealed that Crimestoppers operates in every state and several foreign countries. They pride themselves on their confidentiality and in protecting the privacy of those who provide information. Kelly McBride talked about the rise in domestic violence cases in Indianapolis. African-Americans are nearly half of the domestic violence victims and perpetrators in Indianapolis and its a growing problem. Click the Media Player to Hear Afternoons with Amos Community Conversation on Crime and Violence With IMPD Chief Hite and Public Safety Director Troy Riggs. ©2014 WTLC/Radio One.
Part 1 Runs 54 Minutes – Part 2 Runs 39 Minutes – | <urn:uuid:efb0a187-1e86-4e26-9551-a2d5c5df0170> | CC-MAIN-2022-33 | https://wtlcfm.com/2207202/ylm-week-a-community-conversation-on-crime-violence-with-impd-chief-rick-hite-public-safety-director-troy-riggs/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00065.warc.gz | en | 0.961854 | 706 | 1.539063 | 2 |
David Lynch projects a kind of 1950s niceness that people often assume must be fake. The biography he offers the press says simply “Eagle Scout, Missoula, Montana.” He diligently refuses to explain his works, and the movies themselves seem to try to avoid language.
The movie director who had the most in common with Lynch was Stanley Kubrick. Like Lynch, Kubrick was obsessed with attempting to tell his stories visually, with a minimum of expository dialog (which is why “2001: A Space Odyssey” only has around 40 minutes of dialog in a 140 minute movie). This makes sense if you consider that Kubrick started out as a photographer.
Also like Lynch, Kubrick refused to enter into complicated explanations of what his work meant. Like Lynch, his movies proceed at a naturalistic pace that can bore inattentive viewers. And he viewed language as a source of alienation.
Unsurprisingly, Lynch loves Kubrick’s movies, and Kubrick screened “Eraserhead” to the cast and crew of “The Shining” to get them in the right mood. | <urn:uuid:9ecc7326-e9f4-4f53-8e6b-b104e86809fa> | CC-MAIN-2017-04 | http://meta.ath0.com/2015/11/13/fear-of-language/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00364-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.975531 | 226 | 1.890625 | 2 |
According to Think Progress, McRINO now wants states to review “Stand your Ground” laws like the one in Florida that had nothing to do with the Zimmerman case, and he praised Obama’s divisive “it coulda been me” speech on racism.
According to Think Progress:
The senator also praised the remarks Obama delivered about the Zimmerman case on Friday, calling them “very impressive” and pledging to meet with more African American and Hispanic groups in Arizona. “I need Americans to talk to their friends and neighbors, not just those on their block or in their circle of friends,” he said.
Here’s McRINO’s comments, courtesy of Think Progress.
Maybe someone should tell McRINO that you’re no conservative if you’re being praised by Think Progress.
- Obama ignores death threats against Zimmerman in ‘Trayvon coulda been me’ speech
- Obama: ‘Trayvon Martin could have been me’ (Video)
- Judicial Watch: Zimmerman prosecution may have been forced by Obama DOJ
- UPenn professor: Zimmerman verdict shows God is an armed ‘white racist’ stalking young black men
- ‘Kill Zimmerman’ painted on Pennsylvania business before being torched
- Black Caucus to file flurry of bills in response to Zimmerman verdict
- Docs: Obama DOJ facilitated anti-Zimmerman protests with taxpayer money
- Obama Justice Dept. organized anti-Zimmerman protests in Florida?
- Russell Simmons: Zimmerman ‘Will ultimately be punished’ for Martin’s death
- Clothing line Illuminati calls for murder of George Zimmerman on Twitter
- Attorney: George Zimmerman ‘will never be safe’ if acquitted
- Twitter explodes with death threats against George Zimmerman, white people
- Roseanne Barr calls for arming teenagers, wishes Zimmerman was killed by Martin
- New Black Panther leader in racist rant: ‘I don’t follow American law’
- Petition demands probe of NBC and MSNBC for deceptive editing
Be sure to check out our Headlines page to see what else our contributors are covering. | <urn:uuid:36c69866-07f9-456d-9cfc-d67dbf56a95b> | CC-MAIN-2022-33 | https://conservativefiringline.com/mccain-impressed-with-obamas-divisive-coulda-been-me-speech-on-racism/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00268.warc.gz | en | 0.92236 | 450 | 1.578125 | 2 |
By Rich Csenge
Folks who are curious about the natural world are looking forward to attending southern Utah’s 16th annual Amazing Earthfest 2022. It’s all online this year from the nonprofit’s home base in Kanab, Utah, and here’s a preview of some of the free activities that are coming up. There’s no charge to attend but registration is required to receive the Zoom links needed to participate.
Opening events take place Mother’s Day, Sunday, May 8, beginning with Invocation to Sustainability at 1 PM, MDT, combining music, ideas and poetry to capture the spirit of the week’s events. Keynote speaker will be Blake Spalding, co-owner of Hell’s Backbone Grill and Farm in Boulder, Utah. Later, at 3 PM, you can join Cassidy Jones and Mark Mesle from the National Parks Conservation Association to learn how climate change is affecting our nation’s National Park system. Still later on Sunday, at 6 PM, MDT, take a journey to some of the Southwest’s treasured Native American Rock Art sites near Kayenta, AZ, with host Richard Jenkinson, former president of the Utah Rock Art Research Association.
Each day thereafter, events will occur at 6 PM, MDT online, beginning on Monday with a community conversation on how best to communicate your concerns about climate change with friends, family and neighbors. Then Tuesday, learn all about Owls from Kathy Donnell, naturalist at Wasatch Mountain State Park. Go way back in time on Wednesday with Joe Sertich from the Denver Museum of Nature and Science to learn about the remarkable diversity in dinosaur discoveries being made inside Grand Staircase Escalante National Monument.
On Thursday evening at 6 PM, tour Utah’s Dark Sky Parks and make plans to visit them with Paul Ricketts, program director at the University of Utah’s South Physics Observatory. Friday, the penultimate day of the festival, take a deeper dive into three different cultural perspectives on the natural world with host Sharon St. Joan. Finally, on Saturday evening, renowned astro-nut Dave Lane has designed a presentation featuring some of his favorite sites in the region for capturing night sky photos that is sure to delight both beginning and advanced astro-photographers. Throughout the Earthfest, a free video is available on growing native plants and saving seeds from the Southern Paiute perspective, created by national park ranger Autumn Gillard from Pipe Spring National Monument.
Watch this space for an article about the Amazing Earthfest 2022 Documentary Film series and community conversations that will offer opportunities to discuss the concepts and share personal responses to the ideas addressed in the films. It’s all being offered free of charge but donations to the 501c3 nonprofit organization Amazing Earthfest are always graciously appreciated! | <urn:uuid:d5dd0f6c-fb34-4962-afda-a0dda06773ec> | CC-MAIN-2022-33 | https://amazingearthfest.org/news_posts/amazing-earthfest-free-festival-of-learning-and-discovery | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00078.warc.gz | en | 0.920268 | 589 | 1.796875 | 2 |
Basic Document of Chief Muslim Cleric Mustafa Cerić on Problems in Bosnia
by Mustafa Cerić
August 11, 2006
The following is the original document on foreign interference in the Bosnian Muslim religious community, as finalized by the community's administration in August 2006. Subsequent comments on the Bosnian controversy, by our friend and colleague Prof. Rešid Hafizović of the Faculty of Islamic Studies, as well as by Prof. Esad Duraković, professor of Arabic at the Faculty of Liberal Arts of the University of Sarajevo, along with a response to Brother Hafizović by the community administration, are posted on CIP WahhabiWatch.
* * *
R E S O L U T I O N [AND A D D E N D U M]
OF THE RIJASET [ADMINISTRATION]
OF THE ISLAMIC COMMUNITY OF BOSNIA-HERCEGOVINA
ON THE INTERPRETATION OF ISLAM
[Final version, August 11, 2006]
All praise belongs to Allah subhana wa'tala, who provides benefits in this world. To the One who sent us right guidance, because those whom Allah leaves astray no one can guide. Peace and blessings upon the One who was sent by God swt, as a mercy to all humanity, a proof to the people, our exemplary teacher – Muhammad, the truthful and dependable one. May peace and blessings descend upon his noble family, his Companions, and those who follow his way until the Day of Judgment.
By Allah's mercy, good Bosnians accepted Islam in the fifteenth century AD, while their posterity has steadfastly cherished and bravely carried on this tradition. The year 2013 will mark the five hundred fiftieth anniversary of good Bosnians' Shahadah: I bear witness that there is no God but Allah, and Muhammad is a messenger of God.
As much as they were linked to Ottoman Empire, Bosnian Muslims have remained loyal to the Islamic Community, having been privileged to carry on the religion and cherish the culture which evinces a universally-recognizable principle of faith in one God and consciousness of our umma.
Consequently, Muslims represent a universal umma, since Islam is a universal faith founded on two fundamental principles:
- First, Allah swt is the Alpha and the Omega for everything in existence. There is only Allah swt, who was neither begotten nor begets, and alongside which no person is equal or worthy of devotion or worship. He is the only judge. All of us shall return to Allah swt.
- Secondly, Islam is based on a universal moral imperative: enjoin good and refrain from evil. Effectively, that means: believe sincerely, speak the truth, work honestly and act ethically. Do not believe falsely, do not speak untruthfully, do not work dishonestly and do not live unethically.
In the course of a long and turbulent history, our umma has been exposed to major turmoil due to attacks from the outside, as well as weaknesses on the inside. Without marginalizing the power of outside attacks, the most perilous force destabilizing the umma presently is from the inside. That force is dangerous because it irreversibly tears up the roots that aid the growth and development of the universal umma. There is no other way to stop this force, but for the umma to remember this wisdom of Hadrat Omar: "We were nobody, and Allah advanced us with Islam. And if we were to ask for advancement outside Islam, Allah would return us to what we were – nobody.")
Let us also add the remark by Anas ibn Malik, who said: "There shall be no betterment of the umma unless it recognizes that what used to be good in the beginning is also good in the end – the Book of Allah swt and the revelation of his Prophet aleyhisalem. That means that there is no other path, but for all of us to hold fast to the rope of Allah, without departing from each other and disuniting."
With Allah's mercy, Bosnian Muslims accepted new institutions for Islam in the nineteenth century, thereby keeping the universal faith in One God and remaining loyal to the principle of a universal umma. Therefore, the [Bosnian] Islamic Community is a gift from God which is not to be denied or defamed. Those who do not understand it can not judge Bosnian Muslims. Those who have no respect for it have no right to instruct Bosnian Muslims, either on the faith they profess, or on loyalty to the umma to which they hold fast.
Considering all the above, the Rijaset of the Islamic Community in Bosnia-Hercegovina reaffirms its Resolution on the Interpretation of Islam adopted at its sixteenth assembly on the 27th of Safar 1427 (March 27, 2006), which stated:
- The Rijaset has faced for an extended period of time incidents of the inadequate interpretation of Islam by certain individuals and groups, which disturb Muslims. Consequently, the present goodness which is reflected in Kelime-i tawhid and tawhid-i Kelime [monotheism] is ruptured by controversies which lead to divisions between Muslims.
- The Rijaset is determined in its intention to protect the originality of the centuries-long tradition of the Islamic Community in Bosnia-Hercegovina, which proved to be essential in all historical moments for Bosnian Muslims, through the centuries, especially in the critical moments for survival presented by the recent assault on our country and our people [in the war of 1992-95 and its aftermath – CIP]. Therefore, Rijaset is calling upon all imams, khatibs, and muallims in the mosques, mektebs, and schools and in all other public places to consistently interpret the institutional doctrine of Islam on the basis of Qur'an, the Sunnah, and our Bosnian experience.
- The Rijaset calls upon all the associations and organizations of Islamic orientation in Bosnia-Herzegovina to present to the Rijaset their programs and curricula regarding Islam and Muslims, in order to make them compatible with the generally accepted principles of work and thereby help present an adequate picture of Islam and Muslims with clearly designated responsibilities.
- The Rijaset believes there are no extremist individuals or groups in Bosnia-Hercegovina who may undermine the unity of Muslims as displayed in the spiritual framework of Islamic community in Bosnia-Herzegovina. However, the Rijaset is aware that certain events occurring in the immediate vicinity of Muslims also reflect on the spiritual condition of the Bosnian Muslims.
- Rijaset condemns any attempt to slander or label anyone in the Islamic Community, especially on the basis of their adherence to a school of Islamic jurisprudence [madhdhab] or because of ideological prejudice. The Islamic community is united in its doctrinal and institutional teaching of Islam and refuses any madhdhab-based divisions. The Rijaset calls upon the Muslims of Bosnia-Hercegovina, Sandžak, Croatia, Slovenia, and the Bosniak diaspora to not be deceived by false and malicious information, but to trust the institutions of Islamic Community.
Whereas, noticing that, even after the adoption of the Resolution of the Rijaset, certain individuals and groups exhibited inappropriate attitudes in the interpretation of Islam, especially in Sandžak, where violence has broken out between Muslims;
Whereas, observing that unacceptable criticisms that have been made about the Islamic Community by people who have not properly experienced Islam in Bosnia-Herzegovina;
Whereas, sensing the peril from premeditated discord between Bosnian Muslims, the Rijaset, at its twenty-seventh session, held on the 16th of Shawwal 1427 (November 7, 2006), passes the following
To the Resolution of the Rijaset of the Islamic Community of Bosnia-Hercegovina
From the 27th of Safar 1427 (March 27, 2006)
- The Rijaset extends its full support to the Mešihat [Local Administration] of the Islamic Community in Sandžak, in the enforcement of the Resolution of the Rijaset on the interpretation of Islam, and calls upon all imams, khatibs, muallims, and muderrises in Sandžak to remain conscientious and responsible in preserving and cherishing the religious and cultural tradition of Muslims.
- The Rijaset expects the state of Bosnia-Hercegovina to respect human rights of all its citizens without regard for faith, ethnicity, or origin.
- It is not ethical to discriminate against people who helped us, but, by the same analogy, Shari'a does not justify our being constantly reminded of the aid provided, for God Almighty says in Qur'an al-qerim: "Kind words and forgiving of faults are better than Sadaqah [charity] followed by insult." (Qur'an, 2:263).
- The Rijaset condemns statements which belittle the Islamic Community of Bosnia-Herzegovina and insult the Bosnian ulema. It is not only in contravention of the spirit of Islamic ethics, but also in violation of the peace and security of Bosnian Muslims. The Islamic Community of Bosnia-Herzcgovina has no intention of proving its righteousness to anyone except for God swt, especially to those who do not want to hear or see the Islamic Community and its ulema as a symbol of honor and the pride of the umma.
- The Rijaset calls on all imams, khatibs, muallims, muderrises, and professors of the Islamic Community to speedily obtain information on the position of the Rijaset on important issues regarding the spiritual unity of Muslims, and to consistently enforce that position in practice. The Rijaset reiterates that those who, by any means, bring disquiet into the mosques under the pretext of enforcing the right faith are not well-intentioned. All mosques are the property of the Islamic Community and no one shall do anything in the mosque without the knowledge or the authority of the mosque's imam.
- The Rijaset has invested too much effort in preserving the honor and the reputation of Bosnian Muslims in the most difficult times to allow someone to undermine them, according to orders from those who have neither knowledge of, nor sympathy for the fate of Islam and Muslims in our country.
- The whole of Europe has been holding extensive discussions on the importance of an institutional doctrine of Islam which can be positively exemplified by Bosnia-Hercegovina. The Rijaset is prepared to offer a 100-year experience of the institutionalization of Islam, and thereby to contribute to a better understanding among religions and cultures in Europe. While respecting freedom of thought and expression, and appreciating the critique that spurs the progress of Islamic Community, the Rijaset calls on all media, intellectuals and other meritorious individuals in the society to assist the Islamic Community in that effort.
- Khatibs shall read this Resolution at jumaa prayers at all mosques, while muderrises at all medresas and universities directed by the Islamic Community shall clarify its contents to all students, and they shall strictly adhere to it in its true letter and spirit as the official position of the Islamic community in Bosnia-Herzegovina.
- God Almighty, help us on the path of calling upon the people to live virtuously and to refrain from evil! Amin!
Dr. Mustafa Cerić
Translation by Faruk Bogučanin and Center for Islamic Pluralism
Related Topics: WahhabiWatch
receive the latest by email: subscribe to the free center for islamic pluralism mailing list | <urn:uuid:a7145d04-6600-4456-ba99-10e31ffeafe9> | CC-MAIN-2022-33 | https://www.islamicpluralism.org/903/basic-document-of-chief-muslim-cleric-mustafa | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00069.warc.gz | en | 0.927083 | 2,557 | 1.867188 | 2 |
If you want a backyard pool, but don’t want to spend tens of thousands of dollars installing it, then a natural swimming pool is the way to go. These are an organic and popular alternative to traditional inground pools. The main difference is in the building materials used, as well as the filtration system.
A natural swimming pool can be designed to look like a classic inground pool, or it can be designed to fit in with nature and mimic a pond or lake. The biggest difference in design is with the filtration. A natural swimming pool uses plants to filter the water. Some designs will have a rim of aquatic plants, other designs have a separate plant pond that is linked to the main body of water.
The bottom of a natural pool is lined. Some people think that a natural pool is just a hole in the ground. This is not the case. The pool will be lined with natural sand, bentonite clay or else a plastic liner. There are new eco-friendly plastics which many people use. A layer of gravel needs to be placed at strategic locations to ensure that fresh water is kept in the swimming area.
The plant section needs to be about the same size as the swimming area. The plants will not float into the swimming area. Plants will be anchored either on the edge of the pool or in an adjacent pond. The plant pond must be linked with the main swimming area. A barrier will be placed between the plant section and the swimming section. This is to make sure that the plants do not move into the swimming location. | <urn:uuid:b0b2ec46-b098-4929-b9c4-368a851a1bcb> | CC-MAIN-2022-33 | https://homyracks.com/2019/08/05/20-top-natural-small-pool-design-ideas-to-copy-asap/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00273.warc.gz | en | 0.965124 | 319 | 2.5 | 2 |
The Clean Water Act is federal law which ensures quality water. It also governs the safety of the water to keep it free from toxins and also to diminish pollution. The goal is to create safe waters for recreation as well as for the sustenance of wildlife that use the water for drinking and habitation purposes.
Other People Are Reading
Originally known as The Federal Water Pollution Control Act, it was enacted in 1948, and amended several times in subsequent years before it became federal law in 1972. States had to originally monitor and be the enforcers, and eventually the federal government began to take more of an involved role in the process.
Introduction in 1972
In 1971, the Clean Water Act was introduced on the senate floor. It was given careful consideration by the Senate Public Works Committee. It was approved by the Senate and in 1972 by the House. President Richard Nixon signed off on it on October 18, 1972.
Navigable waters, such as rivers, lakes and canals within the United States and its territories, are considered "navigable" (can be used for travel and transportation) under the Clean Water Act. Industries such as manufacturing, government facilities such as military bases, and agricultural plants including animal feedlots, were now required permits for discharge of pollutants into these waters.
The Clean Water Act is administered by the Environmental Protection Agency (EPA). The EPA works to prevent or reduce pollution to the waters. One of the overall goals was to restore polluted waters. They are also involved in enforcement when there are clear violations of the act. The EPA participates in biological studies and restoration projects for particular waterways.
There were amendments to the Clean Water Act in 1977, 1987 and 1990. In 1977, a major new program was added to protect against toxic substances. In 1987, the addition was to protect the discharge into storm water areas. The Oil Pollution Act of 1990 addressed the topics of oil and hazardous substances spills.
- 20 of the funniest online reviews ever
- 14 Biggest lies people tell in online dating sites
- Hilarious things Google thinks you're trying to search for | <urn:uuid:97861c44-1cb0-4c83-bedf-3d5171a7bd8f> | CC-MAIN-2017-04 | http://www.ehow.co.uk/facts_4867021_what-clean-water-act.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00303-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.976118 | 427 | 3.5625 | 4 |
The earliest presence of the Anglican Church in Newfoundland and Labrador can be traced to stopovers by various military chaplains and visiting clerics in the 16th and 17th centuries. Their stays were often quite brief and not conducive to the development of permanent ecclesiastical structures. It was not until 1701, under the auspices of the Bishop of London and later the Society for the Propagation of the Gospel in Foreign Parts (S.P.G.), that the first resident clergyman was appointed. In 1787 Newfoundland was placed under the jurisdiction of the Bishop of Nova Scotia and in 1839 received its first resident Bishop, Aubrey George Spencer, when diocesan status was granted. His Episcopal jurisdiction included both the island of Newfoundland and the coast of Labrador, as well as Bermuda in the Caribbean.
Bishop Spencer was succeeded in 1844 by Edward Feild who served until 1876. In 1879 a Bermuda Synod was incorporated but requested that the Bishop of Newfoundland at the time, Llewellyn Jones, occupy that see along with his own which he did so until 1917.
The Diocese of Newfoundland joined the Anglican Church of Canada in 1949 when Newfoundland became the 10th province of Canada. Subsequent growth led, in 1976, to the reorganization of the one diocese into three. Today, along with the Diocese of Eastern Newfoundland and Labrador with its cathedral at St. John’s, there is the Diocese of Central Newfoundland (Gander) and the Diocese of Western Newfoundland (Corner Brook). All three dioceses enjoy a close relationship, managing matters of common interest through the Joint Committee and sharing equally in the governance of Queen’s College. As of 2005, the Diocese of Eastern Newfoundland and Labrador is spread over 38 parishes on the Avalon Peninsula of Newfoundland and throughout most of Labrador.
Bishops of Newfoundland & Labrador
Aubrey Spencer – 1839 -1843 (1st Bishop of Newfoundland)
Edward Feild – 1844 – 1876 (2nd Bishop of Newfoundland)
James Kelly – 1876 -1877 (3rd Bishop of Newfoundland)
Llewellyn Jones – 1878-1917 (4th Bishop of Newfoundland)
William White – 1917-1942 (5th Bishop of Newfoundland)
Philip Abraham – 1942-1955 (6th Bishop of Newfoundland)
John Meaden – 1956 – 1965 (7th Bishop of Newfoundland)
Robert Seaborn – 1965 – 1976 (8th Bishop of Newfoundland)
Robert Seaborn – 1976 – 1980 (1st Bishop of Eastern Newfoundland & Labrador)
Martin Mate – 1980 – 1992 (2nd Bishop of Eastern Newfoundland & Labrador)
Donald Harvey – 1993 – 2004 (3rd Bishop of Eastern Newfoundland & Labrador)
Cyrus Pitman – 2004 – 2014 (4th Bishop of Eastern Newfoundland & Labrador)
Geoffrey Peddle – 2014 – 2020 (5th Bishop of Eastern Newfoundland & Labrador)
Samuel Rose – 2020 – (6th Bishop of Eastern Newfoundland & Labrador) | <urn:uuid:8f9df843-3442-4ab0-aa41-bd7ab7b6ee7c> | CC-MAIN-2022-33 | https://anglicanenl.net/about-us/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00267.warc.gz | en | 0.964159 | 625 | 2.28125 | 2 |
Associate Professor Stewart Fallon
Areas of expertise
- Isotope Geochemistry 040203
- Physical Oceanography 040503
- Environmental Chemistry (Incl. Atmospheric Chemistry) 039901
- Geochronology 040303
- Climate Change Processes 040104
- Palaeoclimatology 040605
- Synchrotrons; Accelerators; Instruments And Techniques 029904
- Forensic Biology 069901
- Chemical Oceanography 040502
- Oceanography 0405
- Ecological Applications 0501
- Isotope Geochemistry
- Marine Science
- Carbon cycle Science
I trained as a marine scientist at the University of San Diego (B.A. and M.S. Marine Science) and The Australian National University, obtaining a PhD in isotope geochemistry in 2001. I then went to the Center for Accelerator Mass Spectrometry at Lawrence Livermore National Laboratory to learn radiocarbon preparation and measurements using AMS. In 2004 I moved to the Chemistry, Biology and Nuclear Science Division at LLNL and developed isotopic measurements and maps using the CAMECA nanoSIMS. In 2006 I returned to Australia to take up a research Fellow position as the head of the newly refurbished Radiocarbon Dating Laboratory at the Research School of Earth Sciences, The Australian National University. Since 2010 I have been a Fellow at the Research School of Earth Sciences. My research interests include radiocarbon dating, using radiocarbon as a tracer for the carbon cycle, developing proxy records of marine environment using trace element and isotopic records from biogenic archives and examining past environmental change to help understand our future climate.
2010 – present – Fellow and Head of the Radiocarbon Dating Laboratory, Research School of Earth Sciences, The Australian National University
2007-2010 – Research Fellow and Head of the Radiocarbon Dating Laboratory, Research School of Earth Sciences, The Australian National University
2004-2006 – Environmental Chemist, Chemical Biology and Nuclear Science
Division, Lawrence Livermore National Laboratory
2001-2004 - Postdoctoral Researcher, Center for Accelerator Mass Spectrometry, Lawrence Livermore National Laboratory
Coral geochemistry in a changing Ocean. Using Porites coral cores examine elemental and isotopic proxies under changing ocean acidification from a natural pH gradient in PNG.
Deep Sea Corals as climate archives. Utilize elemental, isotopic and radiometric proxies trapped in deep sea coral skeletons to examine past climate.
Australian Lungfish ecology. Utilize isotopic proxies to understand the changing river ecology that is putting the Australian Lungfish under threat.
Novel Uses of Radiocarbon in Environmental Studies. Utilize the state of the art AMS and radiocarbon preparation labs at RSES to investigate carbon cycle studies.
Grants are drawn from ARIES. To add Projects or Grants please contact your College Research Office.
- Bubble, Bubble CO2 is the trouble: A Natural Ocean Acidification Experiment in a coral reef setting (Primary Investigator)
- Have we already lost the Australian Lungfish? (Secondary Investigator)
- Novel Dating Methods for Marine Sediments of Relevance to Determining Past Climate Changes (Secondary Investigator)
- IODP drilling in the Great Barrier Reef: unlocking the causes, rates and consequences of abrupt sea level and climate change (Primary Investigator)
- Impacts of Catastrophic Marine Inundation Events (CMIEs) on the Prehistoric Archaeological Record of the Australian Coastline (Secondary Investigator) | <urn:uuid:e50315a4-80fd-4656-9ab2-c8fdfb62c892> | CC-MAIN-2017-04 | https://researchers.anu.edu.au/researchers/fallon-sj | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00290-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.797794 | 729 | 1.71875 | 2 |
Intel plans tiny energy suckers to watch environs
Litter the planet
Now the chip giant’s laying plans for tiny sensors that are capable of transmitting data on their surrounding environment while powered by ambient energy.
Intel’s chief technology officer Justin Rattner has revealed the company is combining two over-the-horizon technologies - wireless sensing and wireless power - into a single research initiative to deliver on its plan. The project is called the Wireless Identification and Sensing Platform, or WISP.
WISPs are tiny sensors designed to be embedded in anything from your home to your skull, where they'll report a wide variety of data to radio receivers to monitor anything from temperature and pollution levels to heart rate. As the technology shrinks, it may even be possible to have the little buggers keep an eye on viral infections.
Perhaps more revolutionary is they'll be powered, as Rattner put it, by "scavenging" energy not only from current-technology radio frequency identification (RFID) readers, but also from a wide variety of ambient-energy sources such as WiFi hotspots, cell towers, or TV broadcast signals - even from sunlight or body heat.
The advantages WISPs have over current sensing technologies include the fact that since they're self-powered they are, Rattner said, able to be "install-and-forget kind of systems." Also, since they're intended to be both inexpensive and tiny Rattner said "we could... litter the planet with these things."
Now, whether or not you think that littering the planet with billions of micro-spies is a good idea, you must admit that highly granular environmental data could be a good thing. For example, one implementation that Rattner proposed was a WISP-populated data center in which the tiny sensors would provide wide-ranging and instantaneous temperature data to a central controller, which could then balance computing loads with cooling capabilities.
As pie-in-the-sky as virus-detecting WISPs coursing through your gut may sound, Intel has already conducted one pilot project in San Francisco, where street sweepers were equipped with sensors that monitored air quality. Rattner projects that WISPs won't become marketable products for three to five years, but EETimes Europe has quoted him as saying that WISPs "might turn into a business opportunity" sometime in the future.
Just don't let your employer squirt one into your arm. ®
Sponsored: DevOps and continuous delivery | <urn:uuid:cdb0092d-3968-467f-b6f4-6eef023e91bc> | CC-MAIN-2017-04 | http://www.theregister.co.uk/2008/12/09/wisps/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00561-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.964903 | 520 | 2.875 | 3 |
Each year, Lesbian, Gay, Bisexual and Transgender (LGBT) History Month is marked in February as a time to celebrate and remember the community’s past as a means to understand the present and work towards a better future.
‘If I finally speak, it’s for people to know what we homosexuals had to endure in Hitler’s days… it shouldn’t happen again,’ said Rudolf Brazda, the last known living homosexual survivor of the Nazi concentration camps, who died in August 2011.
Without a doubt, one of the darkest periods of LGBT history was during the Second World War when gay people across Nazi-occupied territory were subjected to persecution simply because of their sexual orientation. Tens of thousands of homosexual men were arrested, and around 50,000 were given severe prison sentences.
Many of these prisoners were forced to carry out hard labour, others were tortured in some of the most gruesome ways imaginable and 10-15,000 were incarcerated in concentration camps. Alongside their fellow persecuted inmates, they were brandished with a pink triangle, indicating their sexuality and reason for imprisonment for all to see. Given the social stigma of homosexuality at this time, the badge marked the prisoners out for particularly cruel treatment not just from the camp guards, but also their fellow inmates. Many were beaten to death, while others were the subjects of vile experiments as Nazi scientists attempted to solve the ‘problem’ of homosexuality in order to achieve the eugenics-based dream of a true Aryan society.
One study from Ruediger Lautmann found that this harsh treatment of gay men in concentration camps meant that they experienced a higher rate of death when compared to other imprisoned groups. His work revealed that 60% of gay men in concentration camps died, in contrast to 41% of political prisoners and 35% of Jehovah’s Witnesses.
Those who survived to the end of the war, eagerly awaiting their liberation and to be free to return home, would often find their dreams quashed. Under Paragraph 175, which was introduced to the German Empire in 1871 and made more severe by the Nazis, homosexuality was illegal. The demise of the Nazi Party did not bring about a transformation of this legislation.
While the Nuremberg Laws that discriminated against Jews and other groups were repealed at the end of the war in 1945, the ongoing enforcement of Paragraph 175 meant that many concentration camp detainees did not experience the immediate freedom they had hoped for. Instead, they were regarded as criminals and faced transportation to German prisons to see out the two-year sentence mandated by the statute.
Those homosexual prisoners who escaped immediate detention by their liberators had to fall silent about their concentration camp experiences and instead devise new stories to explain their incarceration to avoid being taken into custody.
Although the horrors of the Third Reich’s persecution of gay men are now widely known, the social and legal circumstances post-1945 meant that their plight was largely forgotten and left unrecognised in the war’s immediate aftermath. The reparations and state pensions made available to other survivors of the Holocaust and Nazi Persecution were denied to homosexuals, and nor could they expect the same support networks to be there for them.
It would not be until 1968 in East Germany and 1969 in West Germany when homosexuals could be safe from prosecution and begin to talk of their experiences to ensure their stories would become a vital chapter in LGBT history. The dawn of the civil rights era gave gay men and women the confidence to be proud of their sexuality and strive for a more equal future. The pink triangle used to shame homosexuals and mark them for discrimination in the concentration camps was appropriated by the LGBT community, inverted to point upwards and used as a symbol for this new movement.
Nevertheless, the experiences of LGBT communities around the globe remain turbulent, and many gay people still have to live with the reality of persecution. It has been reported that violent homophobia is on the rise in Russia, and there has been a huge furore surrounding the Sochi 2014 Winter Olympics and the host nation’s recent anti-homosexual legislation. Meanwhile in Africa and the Middle East there are many countries where homosexuality is illegal, punishable by death in some states. The anti-gay fervour is far from waning too, with Nigeria and Uganda both ramping up their legislation by outlawing gay rights advocacy and signs of affection between same-sex couples.
While there is growing equality for homosexuals in Europe and the Americas, research from Stonewall has found that one in six people in Britain who are gay, lesbian or bisexual have experienced a hate crime or incident in the last three years. There is clearly still a long way to go. Especially when you consider that elsewhere in the world an individual can face a state-imposed death by stoning simply because of their sexuality. History will continue to be made as society progresses, but it is imperative to not forget what the persecutors of the past have committed against the LGBT community to ensure we work towards a safer future, and that is why this month is so important.
This year LGBT groups have recognised the importance of the experience of homosexuals under Nazi Persecution through holding activities to mark Holocaust Memorial Day (HMD). One stand-out event was organised by Rainbow Hamlets at the John Scurr Centre in east London where a range of speakers took attendees on a journey from pre-war Berlin to 1990s Bosnia. Jack Gilbert, who helped found HMD, and Kemal Pervanić, survivor of the Bosnian War, were among those speaking.
If you want to find out more about the experiences of individuals imprisoned by the Nazis due to their sexuality, we have a number of stories available on our website. You can read about the journeys of Gad Beck, Pierre Seel, Rudolf Brazda and Albrecht Becker, while the moving documentary Paragraph 175 chronicles the lives of several gay men imprisoned by the Third Reich. | <urn:uuid:979b5b52-d6e2-4efd-b5ae-76e61067379b> | CC-MAIN-2022-33 | https://www.hmd.org.uk/news/lgbt-history-month-time-remember-nazi-persecution-gay-people/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00274.warc.gz | en | 0.974187 | 1,203 | 3.984375 | 4 |
Neither snow nor rain can stop a mail carrier from completing his rounds, as the old postal adage goes, but a small Chihuahua just might.
Dozens of homes in a neighborhood in Cedar Rapids, Iowa are missing out on their daily delivery after a mailman said he felt threatened by an unleashed dog on the block.
After the fifth time the mail carrier saw the Chihuahua mix off the leash, USPS took action, sending out letters to announce it would halt services until the dog is restrained, ABC News affiliate KCRG-TV reported.
"The dog has interfered, on a number of occasions with the delivery of the mail in that particular neighborhood," said USPS spokesman Richard Watkins. “Once we know that the dog owner has taken responsibility and making sure that dog is not running free in the neighborhood, the mail delivery will continue."
Neighbors have since been forced to go to a nearby post office to collect their mail -- and some are not happy.
One neighbor, Alyssa Taylor, said she and her family have also had encounters with the dog next door.
"We got chased a couple times just bringing in our groceries into our house in our own driveway,” Taylor said. “We called animal control at that point and they did come and seize the dogs because it did not have its vaccines up to date.
“Two weeks later my five year old was bit in the back of the leg in our own backyard,” she added.
The dog’s owner, Guillermo Tellez, maintains the dog is actually friendly with children.
"It’s a nice dog,” he said.
Another neighbor, Elmer Kasey, said he doesn’t care if the dog stays as long as mail delivery returns to normal.
"I don't really care what they do,” Kasey said. I just want my mail back.”
Last year, 5,879 postal employees were attacked by dogs across the United States, according statistics released by the U.S. Postal Service.
- Hobbies & Personal Activities | <urn:uuid:2ff835c0-a97f-4324-b96f-ecbfe8b6d932> | CC-MAIN-2017-04 | https://gma.yahoo.com/chihuahua-mix-halts-mail-delivery-iowa-neighborhood-211457825--abc-news-pets.html?vp=1 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00321-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.980661 | 440 | 1.546875 | 2 |
Thus says the LORD: "Go down to the house of the king of Judah and speak there this word,
and say, 1'Hear the word of the LORD, O king of Judah, who sits on the throne of David, you, and your servants, and your people who enter these gates.
References for Jeremiah 22:2
Thus says the LORD: 2Do justice and righteousness, and deliver from the hand of the oppressor him who has been robbed. And 3do no wrong or violence 4to the resident alien, 5the fatherless, and the widow, nor 6shed innocent blood in this place.
References for Jeremiah 22:3
For if you will indeed obey this word, 7then there shall enter the gates of this house kings who sit on the throne of David, riding in chariots and on horses, they and their servants and their people.
References for Jeremiah 22:4
But if you will not obey these words, I 8swear by myself, declares the LORD, that 9this house shall become a desolation.
References for Jeremiah 22:5
For thus says the LORD concerning the house of the king of Judah: "'You are like Gilead to me, like the summit of 10Lebanon, yet surely I will make you a desert, 11an uninhabited city.
References for Jeremiah 22:6
12I will prepare destroyers against you, each with his weapons, 13and they shall cut down your choicest cedars and cast them into the fire.
References for Jeremiah 22:7
"'And many nations will pass by this city, and every man will say to his neighbor, 14"Why has the LORD dealt thus with this great city?"
References for Jeremiah 22:8
15And they will answer, "Because they have forsaken the covenant of the LORD their God and worshiped other gods and served them."'"
References for Jeremiah 22:9
16Weep not for him who is dead, nor grieve for him, 17but weep bitterly for him who goes away, for he shall return no more to see his native land.
References for Jeremiah 22:10
For thus says the LORD concerning Shallum the son of Josiah, king of Judah, who reigned instead of Josiah his father, and 18who went away from this place: "He shall return here no more,
References for Jeremiah 22:11
but 19in the place where they have carried him captive, there shall he die, and he shall never see this land again."
References for Jeremiah 22:12
[See ver. 11 above]
20"Woe to him who builds his house by 21unrighteousness, and his upper rooms by injustice, 22who makes his neighbor serve him for nothing and does not give him his wages,
References for Jeremiah 22:13
who says, 'I will build myself a great house with spacious upper rooms,' who cuts out windows for it, paneling it with cedar and 23painting it with vermilion.
References for Jeremiah 22:14
Do you think you are a king because you compete in cedar? Did not your father eat and drink and 24do justice and righteousness? 25Then it was well with him.
References for Jeremiah 22:15
26He judged the cause of the poor and needy; 27then it was well. Is not this 28to know me? declares the LORD.
References for Jeremiah 22:16
But you have eyes and heart only for your dishonest gain, 29for shedding innocent blood, and for practicing oppression and violence."
References for Jeremiah 22:17
Therefore thus says the LORD concerning Jehoiakim the son of Josiah, king of Judah: 30"They shall not lament for him, saying, 31'Ah, my brother!' or 'Ah, sister!' They shall not lament for him, saying, 32'Ah, lord!' or 'Ah, his majesty!'
References for Jeremiah 22:18
With the burial of a donkey 33he shall be buried, dragged and dumped beyond the gates of Jerusalem."
References for Jeremiah 22:19
"Go up to Lebanon, and cry out, and lift up your voice in Bashan; cry out from 34Abarim, for all 35your lovers are destroyed.
References for Jeremiah 22:20
I spoke to you in your prosperity, but you said, 'I will not listen.' 36This has been your way from 37your youth, that you have not obeyed my voice.
References for Jeremiah 22:21
38The wind shall shepherd all your shepherds, and 39your lovers shall go into captivity; 40then you will be ashamed and confounded because of all your evil.
References for Jeremiah 22:22
O inhabitant of 41Lebanon, nested among the cedars, how you will be pitied when pangs come upon you, 42pain as of a woman in labor!"
References for Jeremiah 22:23
43"As I live, declares the LORD, though Coniah the son of Jehoiakim, king of Judah, were 44the signet ring on my right hand, yet I would tear you off
References for Jeremiah 22:24
and 45give you 46into the hand of those who seek your life, into the hand of those of whom you are afraid, even into the hand of Nebuchadnezzar king of Babylon and into the hand of the Chaldeans.
References for Jeremiah 22:25
47I will hurl you and 48the mother who bore you into another country, where you were not born, and there you shall die.
References for Jeremiah 22:26
But to the land to which they will long to return, there they shall not return."
Is this man 49Coniah a despised, broken pot, a 50vessel no one cares for? Why are he and his children hurled and cast into a 51land that they do not know?
References for Jeremiah 22:28
52O land, land, land, hear the word of the LORD!
References for Jeremiah 22:29
Thus says the LORD: "Write this man down as 53childless, a man who shall not succeed in his days, 54for none of his offspring shall succeed 55in sitting on the throne of David and ruling again in Judah."
References for Jeremiah 22:30 | <urn:uuid:17024d41-6b96-41fd-afdc-063d0144d6ab> | CC-MAIN-2016-44 | http://www.biblestudytools.com/esv/jeremiah/22.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721355.10/warc/CC-MAIN-20161020183841-00014-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.946313 | 1,322 | 1.632813 | 2 |
STIGMA-BUSTING BANANA SPLITS
There's not much a little ice cream can't help, and if it can put a dent in the stigma attached to mental illness we say go for it.
This Sunday, Journey Mental Health here in Madison is holding a community conversation about living with mental illness. It's the "We're Not Bananas Ice Cream Social" on Proudfit Street and it features mini banana splits, beverages and music and it's all free. But the real draw is a dialogue with mental health consumers and their families and friends. For all of the efforts at insurance parity, treatment options, medication advances and more, nothing is more important than ending the stigma attached to mental illness. As consumer Jessica put it, "Just because I have a mental illness does not make me bananas. I'm a person, not a diagnosis."
We'll dip a spoon to that. | <urn:uuid:8e1e489a-c8b8-4507-937a-4a898d1b76f1> | CC-MAIN-2017-04 | http://www.channel3000.com/madison-magazine/opinion/editorial-stigma-busting-banana-splits/162311275 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00563-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.941556 | 184 | 1.773438 | 2 |
The main cruise ship operators in French waters have agreed on measures to limit pollution caused by their vessels, including hooking up to the power grid instead of keeping their engines running during stopovers.
The “Blue Charter” agreement signed in Marseille by Costa Cruises, MSC Cruises, Royal Carribean Cruises and Ponant also pledged to use less-polluting fuel when manoeuvring in harbours as well as other measures to reduce emissions.
The four signatories transport 95% of the passengers and account for 85% of the stopovers in Marseille, which is France’s number one cruise ship port and the fourth-biggest in the Mediterranean, with 1.75 million passengers last year and a target of 2 million in 2020.
The move comes ahead of new regulations from the International Maritime Organization (IMO), which will require all ocean-going ships to reduce the sulphur content in fuels used in their vessels from Jan. 1, 2020.
The economic benefits of the cruise industry for Marseille are estimated at about 350 million euros ($389 million) a year and include about 3,000 jobs, but local residents’ associations have long fought pollution from cruise ships.
According to official local data, fumes emitted by cruise ship chimneys are responsible for 40% of the area’s nitrogen oxide emissions, 32% of the sulphur dioxide emissions and 15% of its particulate matter pollution.
Last month Mediterranean resort town Cannes, France’s fourth-biggest cruise ship port, said it would ban the most-polluting cruise ships from next year in an attempt to boost air quality in the city. (Reuters) | <urn:uuid:437f23b2-e584-433e-bc9c-ef511accc703> | CC-MAIN-2022-33 | https://in-cyprus.philenews.com/news/international/cruise-ships-in-french-waters-agree-to-pollute-less/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00277.warc.gz | en | 0.937425 | 381 | 2.140625 | 2 |
UN-Habitat is backing the Cities Coalition for Digital Rights, with more than 60 cities globally shaping a digital future that puts people first and helps bridge the social divide. Smart cities should serve the people and improve living conditions for all. While these are principles that governments are designated to uphold, they often lack the capacity to do so. National governments are overwhelmed by the complexity of digital policies. Municipalities rarely have the in-house skills to create people-focused smart city projects or to execute holistic impact assessments on the agreements they sign with private companies. By bringing its unique global urban perspective to the digital transition, the half day workshop will explore how t potentially highly disruptive technology is used effectively for sustainable urban development. UN-Habitat’s unique approach and knowledge of urban development can create new capabilities for local government to move the discussion about smart cities beyond technology and link it to the implementation of the urban dimension of the Sustainable Development Goals, specifically SDG 11 and the New Urban Agenda. | <urn:uuid:2da19c71-cf37-4a6b-8f46-cad04cbde3a8> | CC-MAIN-2022-33 | https://www.intgovforum.org/en/content/igf-2020-pre-event-50-people-focused-smart-cities | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00474.warc.gz | en | 0.912176 | 208 | 2.671875 | 3 |
The Phil Jones Bass C2 is “to redefine Bass Cabinet size with a vengeance and a mission,” claims PJB. With a 200 Watt shoebox size cabinet, containing the smallest speaker ever produced by PJB, it houses 2 of the most advanced loudspeaker units in the world; “Chrome-Dome” technology, exclusively developed by PJB and designed from the ground up as a bass instrument transducer. Amazingly, each speaker is only 5 inches, yet are engineered to handle the full spectrum and sometimes punishing dynamic range of a bass guitar.
At 0.87 cubic feet of space, weight is not an issue so each driver has a large and powerful strontium ferrite magnet. This magnetic material is the most stable available, immersing the incredible electromagnetic force that can be generated by PJB high-temperature voice coils. The voice-coil is the heart of a loudspeaker that takes the full power from an amplifier and converts this into acoustic energy. The voice-coil in the C2 is a result of PJB’s dedication to loudspeaker research for almost 2 decades.
The difference in PJB’s approach is precision electro-acoustic engineering to enable the musician to fully express themselves without hindrance from an inferior sound product.
PJB says, “The C2 is dynamic, powerful, clear and has lightning fast transient ability. It follows your individual technique without latency, allowing you the freedom to express yourself as if your bass was an acoustic instrument. It can be used as a stand alone cabinet or in combination with other PJB 8 ohm cabinets or with combos including PJB C4, C8, C27, BG-400 Suitcase Compact, and others”.
Established in 2002, PJB and AIRPULSE Guitar Amps are divisions of Phil Jones American Acoustic Development. PJB is dedicated to using the latest technology in the design of compact bass amps and loudspeakers that achieve highest in fidelity and volume. Phil Jones owns several patents for loudspeaker technology.
Available in the UK Selectron | <urn:uuid:8037ed16-302f-41f0-a054-1274620eb8cc> | CC-MAIN-2022-33 | https://www.musicinstrumentnews.co.uk/2020/08/20/pjb-c2-refines-bass-cabinet-size/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00667.warc.gz | en | 0.932198 | 433 | 1.679688 | 2 |
Regret, lost opportunities, looking back instead of forward, dwelling on the past
The past cannot be changed but current actions can change the future.
I regret with weeping, all the times you tried to bring me comfort. To help me put the past behind me and recapture what once was.
You believed I was unappreciative, and I pushed you away. No more did I take delight in your surprises, of driving through quaint little towns, or tasting new food, from a different resturant.
I glanced out the car's window, void of feeling. Turning down your suggestion to stop. . . . . "Just take me back home."
I use to enjoy walking in a shopping mall. Now I appeared bored. I was your lifeless companion. Nothing you could say or do, I wanted. I was drifting away, detaching from our friendship, I was " gone".
The brain injury may cause "slow motion" thinking. Bright lights, too many people talking, radio or television may be overstimulating. When the senses get overloaded, the person may withdraw, get angry and irritable, cry, pace or become combative.
Keep activities and surroundings relatively simple. Too much, too fast, too soon causes confusion.
LACK OF INITIATIVE
Initially or early in the recovery process from injury to the brain, apathy or lack of initiative will often develop. Your family member is confused and unable to conceptualize and plan activities. All projects or goals, however small, are overwhelming, so it is less threatening and less anxiety provoking to just sit and do nothing. This lack of initiative is extremely frustrating to families. They are aware of the precious time that is taken away from rehabilitation efforts when the patient says, "I don't want to do anything."
"I was 'adynamic,'" she said. "I didn't generate ideas or actions. I couldn't plan, organize or make decisions."
Social Difficulties may be apparent, such as impaired social capacity resulting in self-centered behavior in which both empathy and self-critical attitudes are greatly diminished. Brain injury can result in difficulties in making and keeping friends, as well as understanding and responding to the nuances of social interaction. Regulatory Disturbances include fatigue and/or changes in sleep patterns, dizziness or headache.
After a brain injury, you may experience emotional changes. There is usually a level of frustration, especially when you're unable to do things you could before, or when you can't recall day-to-day information.
The brain controls our thought processes and all bodily functions. In short, it controls behavior. When the brain is injured, behavior often is affected. Unfortunately, many changes in behavior following brain injury are not adaptive or acceptable to other people. Such behavior can take many forms. Many people experience increased agitation for a period of days, weeks or months following brain injury. In many cases, the agitation goes away as the brain learns to function in its newly acquired injured condition.
Damage to the frontal lobe, can cause specific behavior problems. The frontal lobe controls decision-making, judgment and other executive functions. Often when the frontal lobe is damaged, an individual has great difficulty tolerating frustration or overstimulation. In many types of brain injury, a person has difficulty with concentration and judgment, as well as problem-solving, making decisions and understanding subtle environmental cues. In many cases, behavior problems are the result of impaired ability to process information or understand situations accurately.
Responding to Cues:
Following damage to the brain, a person no longer may be able to respond to customary cues as he/she once did because he/she does not notice understand or process cues quickly enough. What previously had been a cue to do a simple chore may be misunderstood as a hostile or demeaning threat. Or, an individual may have trouble keeping up with family or friends in terms of responding to social cues from others, and may express his/her frustration with aggression or withdrawal.
Yes, I shed tears. I grieve the death of ME. I regret the times of laughter and anticpation of waiting for the arrival of a dear friend. . . for that now is part of my distant past.
I am getting better now, it is called "acceptance" of my impairments. I have tools to help me cope.
I will heal, in time. My eyes will cease crying. I am learning how to be more patient, listen and become more humble. Continued Page 8
copyright © 2002-2010 Barbara Joan Gushin All Rights Reserved | <urn:uuid:bd5620ce-961f-4bdd-b493-7584296b7851> | CC-MAIN-2022-33 | http://www.joangushin.net/Page7.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00271.warc.gz | en | 0.960121 | 960 | 1.898438 | 2 |
This event will see separate talks from The University of Manchester's Dr Neil Dixon and Dr Aled Roberts
14:00: Welcome and introduction with event chair (TBC)
14:05: Dr Aled Roberts, Research Fellow, Faculty of Science and Engineering, Manchester Institute of Biotechnology at The University of Manchester
Green space: How off-world construction technologies could promote sustainable development on Earth
14:30: Q&A with Dr Aled Roberts
14:40 Dr Neil Dixon, Reader, Faculty of Science and Engineering, Manchester Institute of Biotechnology at The University of Manchester
Microbial engineering for a healthy planet
15:05: Q&A with Dr Neil Dixon
15:15: Event Close
Dr Aled Roberts | Any long-term human habitat on the Lunar or Martian surfaces will require extreme resourcefulness, circularity and sustainability as a matter of survival. The drive to establish such off-world habitats will undoubtedly result in novel technologies which may promote sustainable development on Earth. Here, we will discuss how advanced construction technologies being developed for the Lunar and Martian surfaces could be applied on Earth, and could help improve the sustainability of the buildings and construction sector - which accounts for 39% of anthropogenic CO2 emissions by some estimates.
Dr Neil Dixon | Microbes are one of the dominant life forms on planet earth, comprising close to 90Gt of carbon, outweighing animals by a factor 30, second only plant biomass. As such microbes have hugely important roles in carbon recycling, nitrogen fixation, plant health, and agriculture, and thus are central to creating an environmentally sustainable future. Advanced methods to engineer microbes can provide tractable approaches to address sustainability challenges including i) non-fossil fuel-based production sources of energy, chemicals and materials, ii) solutions for carbon and nitrogen fixation, iii) bioremediation of contaminated environments. In this talk I will present some highlights of these approaches including activities from our research group. This will include the development of advanced biorefinery processes by co-production of high value chemicals directly from waste agro-industrial residues 1, microbial processes to degrade and assimilate waste plastic 2, and thirdly the development of underpinning genetic toolbox to control engineered microbes for sensing, regulation and production3. | <urn:uuid:6fac8aa6-feb5-4842-8bfa-dc4ce0c72dad> | CC-MAIN-2022-33 | https://events.manchester.ac.uk/event/event:zuk-kww1o68b-qya9s4 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00675.warc.gz | en | 0.903321 | 470 | 2.5 | 2 |
Frankfurt:: Philippi Schwartzii. 1739. paperback. ¶ 8vo. 59, pp. Title vignette, head and tail pieces. Modern. marbled wrappers. RARE. Near fine.. Scarce dissertation by German jurist von Spor for the Viadrina European University. Viadrina European University was founded in 1506 by Joachim I Nestor, Elector of Brandenburg. In 1736 the eminent jurist Johann Jakob Moser was called to head the Faculty of Law at the university, but had to leave after three years due to his thoroughly Liberal ideas which were disliked by then King Frederick William I of Prussia (Wikip.). Although there is precious little information about von Spor, and this appears to be his only publication, it is likely that he studied under Moser, publishing his dissertation the year of Mosers departure. A statement relating to King Frederick William I of Prussia (1688-1740) is found on the verso of H2 in this pamphlet. There is also the name of professor Bernardus Henricus Reinoldus [Bernhard Heinrich Reinold (1677-1726)], whose role may have been to represent the author with this dissertation [post-script dated 1723]. According to WorldCat, 3 libraries hold this work, all in Germany: Berlin State Library—Prussian Cultural Heritage, SLUB Dresden, and Universität Leipzig. See also: G. C. J. J. Van Den Bergh, The Life and Work of Gerard Noodt, 1647-1725: Dutch Legal Scholarship Between Humanism and Enlightenment, Oxford University Press, 1988. . 1 (Inventory #: LV2042)
You can be confident that when you make a purchase through ABAA.org, the item is sold by an ABAA member in full compliance with our Code of Ethics. Our sellers guarantee your order will be shipped promptly and that all items are as described. Buy with confidence through ABAA.org. | <urn:uuid:0199e2e9-b397-4901-b609-164589374730> | CC-MAIN-2017-04 | https://www.abaa.org/book/863569819 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00300-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.931184 | 417 | 1.820313 | 2 |
Climate Goal May Spell End for Some Coral Reefs.
Posted on December 8, 2010. Filed under: Bio-diversity
Even if elusive emissions goals are met by world governments, it will be too little, too late for many coral reefs. Many reefs have already been damaged by water pollution and overfishing, leaving them vulnerable to a warming ocean that “bleaches” corals and sometimes kills them. Some of the biggest impacts were in Southeast Asia.
The once-vibrant coral reef shielding sun-soaked beaches from the wrath of the sea is withering away under the stress of pollution and warmer water.
It’s not likely to get much help from world governments meeting in Cancun for talks on a new climate pact. Their so-far elusive goal to limit global warming to 2 degrees C (3.6 F) is too little too late, says coral expert Roberto Iglesias.
“That represents the end of the coral reefs in the world,” says the Mexican scientist, who works at a marine research station in Puerto Morelos, 12 miles (about 20 kilometers) south of the beach resort hosting the annual U.N. climate conference.
Coral reefs are like underwater jungles that host 25 percent of marine species and provide food and income to hundreds of millions of people, mostly in the developing world. They also serve as shock absorbers to storm surges whipped up by hurricanes.
But many reefs, including the one off [a] hotel-packed coastline [in Puerto Morelos], have been damaged by water pollution and overfishing, leaving them vulnerable to a warming ocean that “bleaches” corals and sometimes kills them, Iglesias said.
This year, preliminary reports show global coral bleaching reached its worst level since 1998, when 16 percent of the world’s reefs were killed off, said Mark Eakin, a coral reef specialist at the U.S. National Oceanic and Atmospheric Administration.
“Clearly, we are on track for this to be the second worst (bleaching) on record,” he said. “All we’re waiting on now is the body count.”
The 700-mile (1,100-kilometer) Mesoamerican reef that runs along Mexico’s Yucatan Peninsula — suffering under other stresses — was spared the bleaching this year, but other parts of the Caribbean were hit hard, including Tobago, Curacao, Panama and islands north of Venezuela.
Some of the biggest impacts were in Southeast Asia. In Indonesia’s Aceh province, surveys showed some 80 percent of the bleached corals died. In July, Malaysia closed several popular dive sites after virtually all the corals in those areas were damaged by bleaching.
Bleaching occurs when warmer temperatures disturb the symbiotic relationship between the corals and tiny algae that live inside them. When the algae are spit out, rainbow-colored reefs are turned into pale and lifeless skeletons — a “hideous” sight for veteran scuba divers like 52-year-old Eakin.
“You can’t imagine what it’s like to jump in the water and expect beautiful vibrant colors and all the corals are white,” he said.
One or 2 degrees C (1.8-3.6 degrees F) above normal can be enough to cause bleaching. Corals may recover if the water cools and the algae return, but they’re still significantly weaker and more vulnerable to disease. If the warmer temperatures persist, the corals die.
Bleaching occurs due to natural variability; both the 1998 and 2010 events were linked to the El Nino weather phenomenon. But the gradual rise of ocean temperatures means “it doesn’t take much to push them over the edge,” Eakin said.
The World Meteorological Organization says most tropical waters already have seen surface temperatures rise by up to 0.5 C (1 F) in the past 50 years. The Intergovernmental Panel on Climate Change, the U.N. climate-science network, projects an increasing frequency of bleaching episodes that “is very likely to further reduce both coral cover and diversity on reefs over the next few decades.”
Many reefs have already been degraded by disease and the impact of human activities, including discharges of fertilizers and waste as well as overfishing of parrotfish and other species that help keep the corals clean and healthy.
The global area covered by coral reefs has shrunk by 20 percent since 1950 and another 35 percent could disappear in the next 40 years, even without the impact of climate change, according to a report released in October by the World Meteorological Organization and the Convention on Biological Diversity.
Off the Riviera Maya coast south of Cancun, where large swaths of mangrove forests have been cut down to make room for an endless row of beachfront resorts, only 15 percent of the coral reefs are alive, down from about 45 percent in 1995, said Fernando Secaira, who coordinates a Mesoamerican Reef program for the U.S.-based environmental group Nature Conservancy.
The biggest problem, he said, is the rapid development, with tens of thousands of hotel rooms added only in the past decade. Fertilizers from lawns and golf courses and sewage from the developments filters through the limestone rock and is washed out onto the reef by underground rivers, altering the balance of the sensitive ecosystem.
Secaira said such unhealthy reefs will find it difficult to adjust to warming waters, raising the risk they will be destroyed by bleaching or diseases. The priority for conservationists is identifying the most resilient reefs, and protecting them as climate change sets in with full force, raising temperatures and acidifying the ocean, which limits the carbonate minerals that help corals grow.
Scientists say no emissions cuts being considered by world governments will suffice to prevent that from happening.
“We’re going to lose more corals and more reefs before this is all over,” said Eakin, of NOAA. “The question at this point is how many can we save.” | <urn:uuid:8c907346-362d-4f8c-b040-a676d52f4e9a> | CC-MAIN-2017-04 | http://green-malaysia.webnode.com/news/climate-goal-may-spell-end-for-some-coral-reefs-/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00219-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.946349 | 1,280 | 3.40625 | 3 |
The remote Russian region of Mordovia, famed for its prison camps, may be the home of the author of the most notorious malware ever to hit Mac computers – the Flashback Trojan horse (called OSX/FlshPlyr-A by Sophos products).
The Flashback malware hit more than 600,000 Mac computers in early 2012, posing as a bogus installer for Adobe Flash and exploiting an unpatched vulnerability in Java.
Despite the malware’s prevalence on Mac computers and the high media profile it achieved after even hitting hundreds of Mac computers in Cupertino, the computer crime fighting authorities have made no arrests in connection with Flashback.
Award-winning security blogger Brian Krebs has written today about his investigation into who might have been behind Flashback.
Krebs’s investigation took him to Russian-language forums belonging to the computer underground, where he found a user called “Mavook” claiming to be the author of Flashback, and saying that he specialised in finding security exploits and creating botnets.
Combing the net for further information, and digging through historic website registration records, Krebs went on to link “Mavook” with Maxim Selihanovich, a man in his thirties, living in the city of Saransk, in Mordovia.
You can read more about the clues Krebs pieced together in his blog post.Follow @gcluley
Apple in snow image from Shutterstock. | <urn:uuid:c7751e23-1bc7-4dba-bde0-722e5534f369> | CC-MAIN-2016-44 | https://nakedsecurity.sophos.com/2013/04/03/flashback-mac-malware-author/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719908.93/warc/CC-MAIN-20161020183839-00158-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.939974 | 308 | 1.523438 | 2 |
A charming and vivid country, Bulgaria, has
existed for more than 13 centuries in Southeast Europe.
This country has an important strategic location
playing the role of a cross road between the West
and the East.
Bulgaria is a land of unspoiled natural beauty,
where time has been known to stand still.
For many of the people who fall in love with Bulgaria,
it’s the fact that it harbours so many diverse and
relatively unknown attractions that draws them into
its charming spell.
From its spectacular mountain ranges, to the glorious
white sand beaches of the Black Sea coast, Bulgaria’s
natural beauty is enough to captivate anyone from the
moment they arrive on their first visit.
Besides its stunning scenery the country also offers
a wealth of Balkan culture and history, wonderfully
decorated churches, tranquil mountain monasteries,
and perfectly preserved rural villages.
Bulgaria has lots more for offer!
Perfect climate! Perfect nature! Warm and kind people! | <urn:uuid:f8d16904-0e31-41dd-b4f4-8133b7397aa7> | CC-MAIN-2022-33 | https://bulgarianhomeinvest.com/uk/page_4372162/index.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00475.warc.gz | en | 0.920424 | 219 | 1.703125 | 2 |
Sambars are thick, spicy and fiery vegetable curries and are usually served as the first course of a traditional south Indian meal, but they also make a lovely light lunch or dinner on their own served with rice and pappadoms. This version, which I have adapted from my treasured copy of Dakshin by Chandra Padmanabhan, is easy to prepare and combines the goodness of some split dals and a generous amount of spice, complete with tart and tangy tamarind pulp to give the sambar a unique and delicious hot and sour flavor. If you like Indian hot, this is just the dish for you, followed by a rasam, and served also with a side salad and poriyal. Do serve with some plain yogurt on the side to temper the heat if desired.
Dakshin is certainly a cookbook worth having if you enjoy drool-worthy photos and valuable information and recipes from and about south India. When I first started cooking Indian cuisine, I mostly made dishes originating from northern India. But I wanted to explore native dishes from other regions and this book was certainly a pivotal turning point in my approach to Indian vegetarian cooking. I continue to explore dishes from throughout the subcontinent, dabble with fusion-style dishes, and hope my creations will inspire my readers to get into the kitchen and spice it up.
Tamarind and the other ingredients listed in this recipe are easily available at any Indian and most Asian grocers.
|Recipe by Lisa Turner|
Adapted from Dakshin
Published on June 24, 2012
Thick, hot and sour south Indian tamarind sambar curry
More Indian recipes from Lisa's Vegetarian Kitchen you are sure to enjoy:
Bitter Melon (Bitter Gourd) Sambar
Black-Eyed Pea Sambar
Chana Saag (Chickpea and Spinach Curry)
Macaroni and Paneer Cheese | <urn:uuid:6f321307-856e-4a46-823a-d6c5f809a766> | CC-MAIN-2017-04 | http://foodandspice.blogspot.com/2012/06/tamarind-sambar.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00123-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.950357 | 403 | 1.84375 | 2 |
Rubbish and Recycling
Trash and recycling collection is conducted weekly by Pine Tree Waste, a local company contracted by the City, and hauled to ecomaine, a non-profit, community-owned recycling and waste-to-energy plant in Portland.
Each residence is issued two barrels – green for rubbish and blue for recycling. On your collection day, place barrels curbside, front-facing, by 7am and remove emptied containers by sunset the same day. Please note that yard and construction debris is not accepted in barrels. There is no large-item curbside pickup in South Portland.
**NEW!** Use the interactive tool below to access new features: Check the pickup schedule for your address, add trash set-out reminders to your calendar, sign up for alerts such as disruptions in service. The Waste Wizard feature will help you answer “how should I dispose of this?” questions.
South Portland participates in a single-sort recycling program and encourages all residents to reduce the amount of waste you generate by recycling. Not only is recycling an environmentally-conscientious action, but it saves you money by saving the City money in solid waste tipping fees. Refer to the chart below for general recycling guidelines. Additional information, along with a submission form for questions about items not listed, can be found on ecomaine’s website.
Leaf and Christmas Tree Pick-up
Leaf pick-up is conducted annually during a 4-week period in the fall, usually in November. Leaves should be placed in biodegradable paper bags (no plastic bags, please), and left curbside until collected.
Christmas trees are collected for approximately 3 weeks following Christmas.
Both collections will be picked up by Public Works crews, not Pine Tree Waste. Please set leaf bags and trees curbside, but away from your trash barrels. Specific dates of both collections will be advertised in the Portland Press Herald and the South Portland Sentry, as well as on the city website and via South Portland’s e-community newsletter. If you should miss the collection dates, these items can be brought to the Transfer Facility, free of charge.
Hazardous Household Waste Collection
Public Works coordinates with Water Resource Protection to conduct an annual Household Hazardous Waste collection. Traditionally held in October, this drop-off day is offered free of charge to South Portland residents for the collection of HHW such as oil-based paints, pesticides, solvents, cleaners and other chemicals which could harm our environment if disposed of improperly. Drop-off date will be advertised in the Portland Press Herald and the South Portland Sentry, as well as on the main page of the city website, South Portland Public Works’ Facebook page and via South Portland’s e-community newsletter.
The Transfer Facility is open to residents of South Portland. When you arrive at the Facility (from the access road, turn left at the bottom of the hill), please enter through the gates and proceed to the right, following the pavement to the attendant’s shack. All visitors must check in with an attendant before disposing of yard debris or waste items, and prior to visiting the Swap Shop or silver bullet recycling containers.
HOURS OF OPERATION
The Transfer Facility is open Tuesday – Saturday, 8am-3:30pm. Because it is staffed by attendants who also assist during snow operations, the Transfer Facility may close early or not open at all during periods of inclement winter weather. If that happens, information will be posted on this page, on our Facebook page, and in our outgoing phone messages.
Though normally closed Sundays, there are months when the Facility opens to the public on Sundays – usually twice annually in spring and fall. Notice of Sunday hours is advertised in the locations mentioned above, as well as in the Portland Press Herald and the South Portland Sentry, and in City’s e-community newsletter.
No permit or annual fee is currently required to use the Transfer Facility, however there are fees for the disposal of most items, with the exception of yard waste (including Christmas trees), bulk oil and recycling. Please click the Accepted Items/Fees link at left for additional information.
Commercial use of the Facility is not permitted, with the exception of leaves, grass and yard clippings. Trash haulers, contractors, landscapers or any person/company being paid to dispose of refuse other than listed above may not use this facility. Commercial entities may dispose of leaves, grass and yard clippings that originate from South Portland locations only. Fees for commercial disposal are noted in the Transfer Facility Accepted Items/Fees link.
The Swap Shop, a new resource at the Transfer Facility for reuse and recycling of gently-used items, opened to residents of South Portland in August, 2016. The Shop is a 3-season facility staffed by volunteers, and is open from April 1 to December 1. Hours are Tuesday-Saturday, 8am-3:30pm. Click the Swap Shop link on the left for more information and a list of accepted items. | <urn:uuid:7ce42b55-7932-45ed-abef-4c15bea3f0af> | CC-MAIN-2022-33 | https://www.therecycleguide.org/south-portland-recycles/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00468.warc.gz | en | 0.933984 | 1,054 | 1.78125 | 2 |
- Decisions around IT should be made by those most directly impacted, some by IT management and some by the organization’s management.
- IT leaders often find themselves in situations where organizational management abdicates their responsibilities in decision-making to IT, and IT pays the price in lost project opportunities and wasted spending. Conversely, when the business makes unilateral technology decisions without involving IT, IT has problems delivering on expense management, integration, and support responsibilities.
- There are specific actions that IT leaders must take to realign IT decision rights when they are chronically misplaced.
- A key objective for IT management should be to establish effective decision rights for IT versus the business. Misplaced rights can create problems for IT that create unnecessary work for it, and can result in failure to deliver adequate IT services.
- The business’s lack of involvement in areas like project prioritization and planning is no longer acceptable. IT leaders must learn new tactics to engage business decision-makers and determine decision-making accountability; otherwise, IT risks having to explain results that fail to meet key organizational objectives or having to answer for wasted expenses.
- IT should be the primary decision-maker for technical standards, vendor selection, and IT budget preparation and expense management. When business units or senior management make such decisions without at least IT recommendation, IT is still accountable for providing service, despite not being part of the decision process. If IT is being bypassed, IT management must seek to understand where it is failing to develop organizational confidence in its capabilities or value.
- Project prioritization, project planning, and IT process and policies are often championed from within IT but should actually be established by business decision-makers. When IT makes decisions that are later evaluated as unsatisfactory by the business, IT is held accountable for failing to achieve organizational objectives or failing to allocate resources to the right initiatives. IT must increase the level of business engagement so that decisions made are those of the business stakeholders and not IT.
Impact and Result
- Reduce the incidence of technology decisions made by the business without IT (or in conflict with choices made by IT) that create support and integration challenges for IT. These include direct business unit purchases of IT consulting and cloud services as well as software and end-user devices.
- Put business management in charge of those IT decisions that significantly impact the business, like priority-setting. Focus IT spending on those activities and projects that the business chooses, not what IT considers most important. Avoid wasting money and efforts on initiatives that don’t address key business needs.
This content is exclusive to members.
Get instant access by signing up! | <urn:uuid:808334ed-28ce-4844-9c17-a76933b05a36> | CC-MAIN-2022-33 | https://www.infotech.com/research/ss/optimize-it-decision-making | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00670.warc.gz | en | 0.948107 | 540 | 1.828125 | 2 |
Eugene's MLS offers German Language Lessons.
Our language curriculum allows the student to work at their own pace while regularly using their new language skills!
Research shows that learning a new language can enhance cognitive capabilities, improve memory, and reduce stress - not to mention, open your world to new opportunities and perspectives! The German language has a rich history in music, science, literature, and economics. German classes with Emma focus on everything from the fundamentals of grammar, vocabulary, pronunciation, and spelling to learning about German culture and history. We will build on fundamental skills to develop and strengthen speaking, listening, and writing skills. Each course is driven by and tailored to student interests in order to promote enthusiasm and engagement. | <urn:uuid:736b390e-2f18-48d4-abff-84ac840fb856> | CC-MAIN-2022-33 | https://www.eugenesmls.com/copy-of-french-1 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00267.warc.gz | en | 0.929707 | 151 | 2.921875 | 3 |
The Government set separate capital and resource budgets for Departments at spending reviews. Separate resource and capital budgets support the Government's fiscal rules and ensure sustained investment in priorities, including infrastructure, schools and hospitals. The Government have introduced firm three-year spending plans and Departments have flexibility to focus resources within budget limits, subject to the rules set out in Managing Public Money and the Consolidated Budgeting Guidance 2008-09 (please see the links to these documents as follows). The Government have also introduced End Year Flexibility, which enables flexibility across financial years.
Consolidated Budgeting Guidance 2008-09:
Managing Public Money: | <urn:uuid:18024437-6484-470a-a3cc-944b72d15d9f> | CC-MAIN-2022-33 | https://hansard.parliament.uk/Commons/2008-04-29/debates/08043010000025/PublicExpenditure | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00073.warc.gz | en | 0.894988 | 216 | 2.078125 | 2 |
It’s that time of year again: the students arrive at university, the Student Finance loans hit their accounts, shiny new student bank cards hit wallets – and all that money trickles out again, like water through a sieve. University life can be expensive: those graduating from universities in England now have average debts of £44,000 each.
If you follow me on Facebook, you will know that I recently wrote a post for Matalan’s blog, with some of my top money-saving tips for students. My number one piece of advice? Don’t bother keeping up with the Student Joneses:
It doesn’t matter who you are, where you are studying or with whom you are hanging out: I can guarantee that you will meet students with budgets that dwarf yours, and others who spend money like water. Don’t try to keep up with their spending: it simply isn’t worth it. You wouldn’t believe how quickly a debt-ridden lifestyle can come to feel normal. When it doesn’t seem like such a big deal anymore to borrow more money, begin racking up purchases on a credit card or begin spending your next student loan instalment before it arrives, you enter a danger zone of escalating debt. Debts are tough to live with and they take a long time to pay back, so don’t spend frivolously – in the long run, you’ll regret it.
(You can find the rest of my tips here.)
I’ve seen a substantial amount of advice for new students floating about in the past couple of weeks. Some of it is good, but some of it is woeful. For example my pal Jenni, over at Can’t Swing a Cat, spotted one web article advising new students to set up a joint bank account with their new housemates. Having collected my jaw from the floor, I am NOPING on out of there – for all the reasons Jenni describes.
However there are also some tip-top recommendations out there, including some money-saving advice I wish I’d had when I became a university student. I’ve rounded up the best here:
1. Don’t squander your student loan on fripperies.
I can’t believe I’m even having to write that. According to research from Nationwide, however, two-thirds of students spend loan money on “nice clothes” and a third spend student loan money on holidays. This isn’t just a dumb way to spend money you don’t have, it also stores up unnecessary problems down the line…
2. …Student loans are big and ubiquitous – but they still count as big ol’ D.E.B.T..
Recent research from the Pensions and Lifetime Savings Association revealed that more than half of 18-35 year olds with a student loan don’t consider that loan to be “debt.” Almost two thirds believe a student loan will not count against them when applying for a mortgage.
I understand that property ownership – that distant pipe dream – isn’t on a lot of students’ radars. However the presumption that down the line, a student loan wouldn’t affect your mortgage application, is downright mistaken. Student debt doesn’t affect your credit rating – but that isn’t the same thing. Since 2014, lenders have been permitted to incorporate student loan repayments into mortgage affordability calculations. In other words: student loan repayments may affect your eligibility for a mortgage.
Once you have graduated, get cracking on your student loan as soon as you are able: pay that beast down!
3. Before you take out contents insurance, check you aren’t covered already…
I always recommend contents insurance for students: halls of residence and shared houses aren’t always as secure as they should be, and can provide rich pickings for burglars. However one insurer, NFU Mutual, has emailed me to point out that 78% of home insurance products cover students’ belongings as standard. What does this mean? It means you could well be covered under your parents’ contents insurance, without needing to take out a policy of your own. Do check the small print though – and double-check that your expensive and essential gadgets, such as your computer and smartphone, are included.
4. Work out your costs and see what grants you can get, with this clever tool
Take a look at the Brightside Student Calculator. It is free to use and, for those who are new to budgeting and money-saving, it is brilliant. If your budget doesn’t add up, you need to know sooner rather than later. If you are headed for the red, Brightside will also show you where you can cut back.
5. Take advantage of this TV Licence loophole
You don’t have to purchase a TV License if you:
- live with your parents outside term-time
- watch BBC iPlayer on a battery-powered laptop or mobile device, which isn’t charging at the time
More information here. When I was a student, TV Licensing tried to come down heavy on us, sending terse letters to every student in my halls of residence, so this loophole is good to know.
If you know somebody who is about to start university, please share this post with them. A new chapter in life is always as exciting as it is scary, but a few minutes’ reading could save an awful lot of money (and sanity) down the line. | <urn:uuid:0bb5f750-c5fc-4d04-8472-be3badbe0dbe> | CC-MAIN-2022-33 | https://www.miss-thrifty.co.uk/the-student-money-saving-tips-i-wish-id-known/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00264.warc.gz | en | 0.961273 | 1,165 | 1.726563 | 2 |
By Nadia Stephen
Unlike many Hindus and Sikhs who migrated from India to Pakistan at the time of partition, Christians stayed here and settled across the country. Approximately 1.59 percent of Pakistan’s population is Christian, according to the 1998 Census. The exact number is unknown, but estimates range from less than 2 million to more than 3 million. Despite the presence of Christian communities in Khyber Pakhtunkhwa province, including around 0.21% in Peshawar, most Pakistani Christians live in Karachi, Lahore, Faisalabad, and numerous other smaller communities in Punjab.
Christianity has a centuries-long history in South Asia. However, some of Pakistan’s Christian population is descended from low-caste Hindus who converted under British colonial rule to escape caste discrimination. Christian traders from Goa and elsewhere also settled in Karachi. Although Pakistan is a Muslim country, many people belonging to the Muslim majority still display deeply discriminatory attitudes towards Christians due to the legacy of the caste system. One such example is Christian maids in Pakistan who also face these challenges related to their religious beliefs, work, and patriarchal constraints. So, Ravadar came across some real stories to highlight the discriminatory practices in Pakistan.
Saima*, 21, and Martha*, 52, are two Christian mother and daughter domestic workers from Islamabad who used to work at the same house. One day, a male housemaster told Martha not to accompany her daughter to work but to send her alone. This sounded alarming, and when the insistence grew, the mother and daughter finally decided to quit their jobs.
When Ravadar got a chance to interact with these ladies and further inquired about the incident, Martha narrated with fear, “The master took advantage of us because his wife stayed out most of the time for work purposes, so he used to give us money to buy food for our poor family. This sympathy always felt like a trap to me”.
Both mother and daughter shared this incident with Ravadar and said that they are uneducated and the only source of income is domestic work. They didn’t find any help to raise our voices against this harassment. For them, the only option is to keep their mouths shut and remain silent forever.
When Ravadar asked Martha’s daughter what happened to her? In a fearful tone, she stated that “one day my master found me alone cleaning his bedroom. My mother was sick and couldn’t come to work. So, when the owner’s wife left home to go to work, he approached me and asked for intercourse. I got scared, refused his offer, and ran away from his house quickly. I shared this horrible incident with my mother, and finally, we both decided to leave the job. It’s not just that day, before that too, he had shown weird gestures and said intimidating words to me many times. But still, I’m afraid that he might follow me or cause any harm to me”.
Poor Martha is also upset about losing her income. In addition, Martha shared her concerns that, “apart from this incident, I have noticed that housemaids are constantly threatened with false accusations by their masters, and for young Christian maids, conversion to Islam is also a significant worry too. Once any Christian maid is denied marriage or sex with her master, she is being raped and killed, and some incidents have already been reported.These types of incidents are not new. Several events within housemaids’ daily routines are not reported and are unregistered. Lack of education and awareness about their rights prone them to extreme danger”.
Also, another incident came to Ravadar’s attention when they met a Christian woman from an impoverished background. She moved to Rawalpindi with her two young daughters after separation from her husband and started working as a maid for a Muslim family of Rawalpindi.
Today, she introduces herself as a Muslim woman. Ravadar asked her how she was converted to Islam. She said, “The family I work for offered me financial support if convert to Islam. It was a helpless situation, and I had no other choice. I am poor, and the family used this to exploit me “.
Further, the family even promised her to find a Muslim man for her second marriage, supporting her and caring for her two daughters. As a result, she used to work day and night in that house with her daughters.
The elder daughter, who was nine years old, also used to help her mother at work. For the second marriage, the lady was introduced to a Muslim man (Muhammad Usman) who visited her house every day. He lived there most of the time, betrayed her and her daughters, and never married her. The family she was working for shifted and did not take on any further responsibility. She was betrayed by the family that converted her to Islam, and they later abandoned her with her daughters.
In both cases, we have seen, in the end, either the maids would have to quit the job and accept poverty as their fate or fall into this temptation of forced conversion, leaving their Christian faith, which is quite worse.
Domestic workers from all the minority groups living in Pakistan are threatened and harassed. Still, the worst cases are seen in the Christian community as most women from this community are housemaids. They are not treated well. Christian women are treated as ‘impure/unclean’ human beings. These ladies are not allowed to work in the kitchens, but they are appointed only for cleaning the houses.
These ladies are all victims of the caste system that has been in our cultural roots for centuries. In this region, the lower caste is known as “unclean,” considered only for serving the high class. The Christian maids are always tempted for sex with masters, so one of them said, “We are considered clean only for sleeping with our masters but unclean for working in their kitchens”. Besides poverty, Pakistan’s Christians are confronted with aggressive, often violent, and deadly expressions of Islam said Arch Bishop Joseph Arshad of Islamabad and Rawalpindi.
Christian maids are convenient preys to be converted to Islam by families who take advantage of their low-income background, trap them in sexual affairs, and later forced them to convert to Islam. Christians are the largest in number among the minority groups residing in Pakistan. Although there are other minorities, mostly those women do not work as maids. But most poverty-stricken and needy women and girls in Christianity work as domestic servants.
The impoverished and low-income Christians are an oppressed group. The majority mistreat them to show power and authority, for they find no justice. They are even considered for cleaning jobs under cultural context. The educated Christian class is well aware of their rights, so they always speak for it and try to fight against any persecution, but when it comes to the low-income and uneducated group, they are all helpless and abandoned and are prey for the majority.
However, it is concluded that the lack of awareness and law enforcement is the primary cause of Christian housemaids’ victimization. The Punjab government established the domestic worker’s act 2019 but it still lacks enforcement. There is a dire need to take action for the security of low income and needy females who are working hard to earn a livelihood. Government should provide sources of employment to the poor women so they would not work as maids and can earn a livelihood through other means. Community activists, law enforcement agencies, and the collaboration of local, provincial, and federal governments should take action against this act. Minority females need to be protected in Pakistan.
*Note: Names have been changed to protect the identity of the interviewees. | <urn:uuid:04f3fd57-de99-4109-aaf9-6be6dd23045e> | CC-MAIN-2022-33 | https://ravadar.com/2022/01/15/the-unheard-voices-of-christian-female-domestic-workers-in-pakistan/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00471.warc.gz | en | 0.978141 | 1,617 | 2.4375 | 2 |
Facts of the Day!
Sightseeing around the World
Destinations & WorldNews
Located east of the Equator in the Pacific Ocean, the Galapagos Islands are an archipelago of 127 islands, islets and rocks of volcanic origin, of which 19 islands are large and 4 islands are inhabited. Galapagos, famous for the large number of endangered animal species, is a UNESCO heritage... [read more]
In the city of Beppu, Oita, Kyushu Island, is found a group of amazing hot springs, both through the spectacular landscape and by water volume. In fact, Hells of Beppu ranks second in the world by volume of water, second only to Yellowstone. Over 130,000 tons of boiling water gushing out from... [read more]
South of Aden is a unique tourist destination, a veritable paradise with rare species of plants and animals. Due to its biodiversity, Socotra archipelago is inscribed on the UNESCO heritage list since 2008. The interior of the island is dominated by limestone plateau and Haghier Mountains.... [read more]
The Dominican Republic has a large number of beaches with stunning scenery. If you're looking for a perfect place for a family vacation, a romantic or honeymoon, the Dominican Republic is the perfect destination for you. Here are the top three of the most beautiful beaches! Cabarete Cabarete... [read more]
If you want a different kind of vacation is one of the top destinations of Tuscany. Paradisiacal region of Italy should be visited at least once in life, recommend specialists in travel. And here's why: 1. Florence It is the capital of the most populous city in Tuscany, with a population... [read more]
Quote of the Day!
The secret of getting started is breaking your complex, overwhelming tasks into small manageable tasks, and then starting on the first one.More quotes by Mark Twain (1835 - 1910)
Preparation: Peel zucchini and cut thick slices of 0.5 cm. Beat the egg well and gradually add flour until the mixture has the density of a thick cream. Add salt and pepper to taste. Soak the zucchini slices in egg mixture and flour, then fry in hot oil.External link from: Pufletzel.com | <urn:uuid:a6ba5488-5e95-49f5-93ba-fc3b760adde6> | CC-MAIN-2017-04 | http://worldalldetails.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00210-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.908333 | 481 | 2.015625 | 2 |
As easy as ONE, TWO, THREE!
Place the triangle shaped piece on lower back, with the bottom edge sitting close to the natural waist, and the long tails of fabric draping over shoulders.
Cross the fabric tails over the chest and pull through the loop holes from front to back, crossing the tails on your right, first.
Do this with both tails of fabric
Take both fabric tails and tie them in a double knot IN FRONT of you. (DO NOT wrap them behind your back to tie as this will affect the functionality) creating an "X" for the baby to sit on. Fabric needs to be flat and snug across the body but not tight.
For term birth babies until approximately 4 weeks of age
Place baby high on the chest of the wearer's body. Keeping baby's knees tucked up under their body and legs together in the frog position, place the piece of fabric closest to wearer's body over baby's back and bum, spreading fabric completely over the baby's back and body, and creating a pouch in which to carry them.
While securely holding your baby with one hand, do the same with the outer piece of fabric from the opposite shoulder. Wrap and tie the scarf piece around both wearer and baby, making sure it is snug and spread across baby's back. extending from their knees up to their shoulders.
Place baby high on your chest. While holding baby securely with one hand, place the piece of fabric closest to your body over the baby first, extending over baby's shoulder, across baby's back and bum. Repeat this step with the remaining piece of fabric from the opposite shoulder. Spread fabric, making sure each piece is spread from knee to knee, with baby's bottom lower than their knees. Wrap and tie the scarf piece around both wearer and baby, making sure it is snug and spread across baby's back, extending from their knees up to their shoulders.
Ready for your OWN simple snuggles? Shop now! | <urn:uuid:af6d94f3-b5d4-4843-887a-fc2a4e21e14f> | CC-MAIN-2022-33 | https://www.lolliewrap.com/wearing-your-lollie-wrap | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00468.warc.gz | en | 0.93958 | 427 | 1.65625 | 2 |
Under the current Social Security system African-Americans, on average, get less in benefits relative to the taxes they pay than do whites. This is mainly due to the fact that black men and women both have shorter life expectancies than their white counterparts, at every age and income level.
Because lifetime Social Security benefits are determined largely by longevity, someone who lives to 100 receives far more in benefits than someone who dies at 70. This also means that, groups of people with shorter life expectancies, such as African-Americans; on average get back less from the system.
A hypothetical example shows how this works. Assume that a 30-year-old black man and a 30-year-old white man each earn $30,000 per year over his working lifetime. By the time they retire, they will both have paid $136,740 in Social Security taxes and will get the same $1,162 monthly Social Security benefit. However, if they both reach age 65 then at that point the white man can expect to live until age 81, but the black man only to age 79. If they both live to their expected ages, the white man will receive $189,389 in total Social Security benefits, but the black man will receive only $161,750, almost $27,000 less than his white counterpart. Thus, for every dollar they paid into the system, the white man will get back $1.38 but the black man will get back only $1.18.1
When someone dies, their heirs
inherit their remaining wealth. But because Social Security benefits
are not inheritable the heirs get none of the money a person
would have collected from social security had they lived longer.
Thus, individuals, and groups of individuals such as African-Americans,
with shorter life expectancies would be better off if their Social
Security taxes had been invested in private, inheritable, accounts
1 The example assumes both men begin receiving benefits at age 68. Tanner, Michael, Disparate Impact: Social Security and African Americans, Briefing Paper No. 61, CATO Institute, February 5, 2001. This paper can be found at: http://www.socialsecurity.org/pubs/articles/bp-061es.html | <urn:uuid:c5a97169-2877-4e4d-bb73-a04388ac30eb> | CC-MAIN-2017-04 | http://www.nationalcenter.org/TPSocialSecurity2.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00164-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.956001 | 464 | 3.328125 | 3 |
The Interpretive Center of Tomorrow
The Interpretive Center of Tomorrow
I first visited the Interpretive Center the summer of 2000. As I remember, the only exhibit area was in the original building. As I’m looking at the exhibits, this woman quietly approaches me and starts telling me about the things I’m looking at. At first I was concerned that she was spending so much time with me. What was so special about me? That woman was Gene Woodwick and Gene makes all people she is around feel they are special.
During the past 12 years I have volunteered, been an OSICA Board Member, a member of the Ocean Shores Interpretive Center Operations Committee (OSICOC) and paid staff as a Docent. With the change that is happening now, I’m waiting to see where I’ll fit in next.
I held a position on the OSICOC during their planning and building of the last addition. It was during that time that I started forming a vision of what the Interpretive Center could be. Today, OSICA is the governing board; now it is OSICA’s vision for the Interpretive Center.
When approaching the Interpretive Center, it would be a rather large elevated two story building resembling an Indian Log House surrounded on three sides by a small forest with a lighthouse attached to the front of the building. It would be built with modern building materials making it relatively low maintenance exterior. As the Center is today, first time visitors will be surprised at what is in store for them inside.
Entering through the lighthouse, under the building, would be the outdoor exhibits with a gently sloping ramp going through the exhibit taking you to the first floor. As you enter, the first floor would have a reception area with perhaps a whale skeleton hanging from the ceiling and an impressive bookstore. Off to one side there would be a small auditorium to show movies, have guest speakers and be available for small community functions. Somewhere close by, would be a private volunteer/staff lounge. As you go through the state of the art exhibits with not only physical hands on, but also with interactive media making it the ultimate Interpretive Center experience. There would be docents and volunteers throughout, explaining and answering questions; making people feel special. Adjacent to the Reception there would be an elevator to take you to the top of the weather proof lighthouse. The lighthouse would have a 360 degree view with a fully functioning weather station, viewing telescopes and interpretive information of what you are looking at.
What about the second floor that I skipped over? The second floor would have fully equipped offices, a fully equipped large class room and adequate storage. There would be office space available for other organizations like NOAA, Dept. of Fish and Wildlife, Olympic National Marine Sanctuary, Washington Coast Sustainable Salmon Partnership, Smithsonian, Seattle Aquarium, University of Washington, etc so they could have a presences. The list is endless of the agencies that visit the coast that would use temporary or permanent office space which would help support the Center. What better place than the Interpretive Center.
The Interpretive Center Future
At this point I imagine many of you are rolling your eyes and think “can he be for real?”. Well, sometime this fall I was in the restaurant at the Ramada Inn listening to a John Denver Tribute singer when I was approached by David Spooner from “imadmedia”, whom I barely know. David shared with me his vision of what the Interpretive Center could be. He equated it to the Experience Music Project (EMP) museum in Seattle. You know what? My initial reaction was to roll my eyes and think “are you crazy?”. I gave it a couple seconds of thought and got excited because someone else had an even bigger vision and totally different idea than mine which made my vision seem even more feasible. The more I thought about it the more I liked David’s vision. Are you listening Paul Allen?
Because I had only been to the EMP once shortly after it opened I decided to go online and reacquaint myself with the EMP. I discovered the EMP is a 501(c)3 nonprofit museum same as OSICA. OSICA is part of that same nonprofit community. OSICA being part of the nonprofit community will also help insure the future of the Interpretive Center.
The Interpretive Center has a mission shared by all, however it needs a vision that is bigger than any one person. What the Interpretive Center is today is a small part of what Gene Woodwick envisioned it to be. Some of what is in my vision was inspired by Gene. OSICA should have a vision for the Interpretive Center the world will buy into. | <urn:uuid:f3091466-9b6e-44bd-bc1d-36536321ef76> | CC-MAIN-2017-04 | http://dooceanshores.com/article/the-interpretive-center-of-tomorrow.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00357-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.97097 | 970 | 1.59375 | 2 |
The decrease in water availability at watershed levels due to subsidies is a critical concern for India considering the monsoon response to global warming
A new study has pointed out that increased irrigation efficiency does not translate into more water availability for other uses at the watershed level. The subsidies for increasing irrigation efficiency are intended to increase crop production as well as more return flow from irrigated areas that can be allocated to urban, domestic and industrial uses. But this does not seem to be happening.
The study, published in journal Science, by Quentin Grafton of Australia with co-authors from France, UK and the US underscores what has been observed in recent years. It cites Rajasthan as one of the examples where increased irrigation efficiency due to approaches such as drip irrigation has led to increase in crop yields and agricultural incomes. At the same time, there is also an increase in irrigated area and water withdrawals.
While groundwater management is under the purview of state governments, the central government incentives to the state focus on irrigation efficiency as a step towards climate resilience. A 2017 study by the US geographer Trevor Birkenholtz had reported that farmers adopting drip irrigation are generally commercial scale farmers who can afford the high costs and are also aware of increasing water demand from drip irrigation. Considering that nearly 80 per cent of water supply for both irrigation and domestic use is from groundwater, dependence on irrigation efficiency for groundwater sustainability may be misplaced.
The increased irrigation efficiency, in fact, reduces the usable return flows despite increased crop transpiration and reduced evaporation which are the intended beneficial use of irrigation water. The water availability at watershed levels decreases because subsidies for irrigation efficiency lead to increases in irrigated areas and water withdrawals as well as driving a choice of more water-intensive crops. This is clearly a critical concern for India considering the monsoon response to global warming.
Much has been written about the reduced total monsoon rainfall over India during the 20th century with a striking increase in rainfall extremes, spatial variability and a threefold increase in widespread floods.
Future projections indicate a continued drop in water availability as well crop yields for most major crops. Consistent with the global trends, irrigation in India also accounts for well over 75 per cent of the total water consumption.
In 1960-61, canals and traditional wells contributed nearly 60 per cent. of the water supply for irrigation with less than 1per cent water withdrawals from tube wells. By 2012-13, canals and traditional wells contributed only about 40% but the withdrawals from tube wells are up at 46 per cent. Correspondingly, the total area under cropping systems has increased by about 45 per cent but the area under irrigation has tripled during these decades. This shows up as nearly equal amounts of grain production in both Kharif and Rabi seasons whereas the Kharif used to be the dominant cropping season in the 1960s with twice the annual production compared to Rabi.
Despite impressive increases in agricultural productivity, per capita food production shows a decline over the recent decades due to the increasing food demand and continued population growth. Electricity use is up for pumping groundwater. The depletion of groundwater tables is alarming in the northwest even though the central-western India shows some groundwater recovery. Irrigation water use shows no decrease even during excess monsoon years which is a clear indication that the subsidies are not incentivising the farmers to produce more crops with less water.
If we want to deal with this dilemma of increased irrigation efficiency leading to increased water withdrawals, we need to establish data networks to track not only crop transpiration but also total inflows and recoverable outflows of irrigation water but also the losses to unrecoverable sinks such as evaporation. Explicit caps on extraction as well irrigated areas are also recommended to ensure effective and real increases in irrigation efficiency.
Water withdrawals for irrigation depend on crop selections as well as soil types.Risk perception by farmers based on weather forecasts, access to loans and crop insurance also play a role. The use of subsidies for water withdrawal must be combined with the weather and extended range forecasts as well as seasonal outlooks. This will need trust-building so that irrigation can be planned based on weather forecasts despite their uncertainties. Behavioural economics and other novel approaches can be brought to bear on maximizing agricultural production with minimal water use instead of focusing on marginal increases in yields with unbounded water use.
Ensuring real increases in irrigation efficiency requires carefully combining subsidies with caps and trade offs of water withdrawal, irrigated area, electricity use, crop selection, weather and extended range forecasts as well as seasonal outlooks and other market factors. (India Science Wire)
We are a voice to you; you have been a support to us. Together we build journalism that is independent, credible and fearless. You can further help us by making a donation. This will mean a lot for our ability to bring you news, perspectives and analysis from the ground so that we can make change together.
Comments are moderated and will be published only after the site moderator’s approval. Please use a genuine email ID and provide your name. Selected comments may also be used in the ‘Letters’ section of the Down To Earth print edition. | <urn:uuid:a719b367-6cd7-4563-8ae1-b4fe5d5a3ace> | CC-MAIN-2022-33 | https://www.downtoearth.org.in/news/agriculture/subsidies-on-irrigation-efficiency-may-negatively-affect-water-use-study-61545 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00473.warc.gz | en | 0.961879 | 1,053 | 3.203125 | 3 |
The AP reported yesterday that the Orbital Sciences Corporation successfully launched a rocket from the eastern shore of Virginia. The occasion was marked, as most occasions are, by a tweet:
— Orbital Sciences (@OrbitalSciences) September 18, 2013
OSC's Cygnus capsule is bound for NASA's International Space Station with 1300 pounds of food, clothes, and other goodies including a chocolate stash for astronaut Karen Nyberg.
Following some tests, Cygnus will be expected to dock with the ISS on Sunday. NASA's associate administrator Robert Lightfoot said of the occasion that "If you needed more tangible proof that this is a new era of exploration, it's right here, right now in Virginia."
David W. Thompson, the president and CEO of OSC, said "We are very pleased with the early operations of the COTS demonstration mission... The Cygnus spacecraft appears to be fully healthy and operating as expected during this early phase of its mission... There is clearly still a lot of work in front of us, but the mission looks like it is off to a great start."
The successful launch makes OSC the second business to ship goods into space by rocket. Space Exploration Technologies Corp, or SpaceX, has been delivering supplies to NASA under contract for over a year now. SpaceX bases their launches out of California.
After about 30 days of being attached to the ISS, Cygnus will be filled with refuse and sent to break up upon reentry to the atmosphere, as all Russian, Japanese, and European supply craft end up -- trash bins for astronauts. The executive vice-president of OSC, Frank Culbertson, said of the process that "We categorize it as disposable cargo... Others may call it trash."
This first mission is just a test; if all goes as planned, a second Cygnus capsule will be launched in December. The second launch would be the first operational mission under OSC's $1.9 billion contract with NASA.
If you want to check out OSC's press release regarding the launch, it's located here.[Image via a YouTube video of a previous launch by Orbital Sciences] | <urn:uuid:e1b0331a-b5ed-4a00-8423-b4a6148b0d33> | CC-MAIN-2017-04 | http://www.webpronews.com/orbital-sciences-sends-its-first-commercial-cargo-ship-to-iss-2013-09/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00200-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.953513 | 439 | 2.15625 | 2 |
I’m still trying to figure out the nature of this relationship. It’s much stronger than simple good platonic friendship, but doesn’t seem to be anywhere near a romantic relationship. Yesterday night, as I was putting myself to sleep, I was trying my best to somehow slot the relationship (It’s possible that nowadays she’s also thinking on similar lines). Had a tough time until I remembered Arul Murugan Lakshminarayanan.
This relationship is currently not in a single state. It is a superposition of states. It lies in the “good friend” state with a probability p and in the “romance” state with a probability 1 – p. So the relationship is in a mixture of the “good friend” and “romance” states. Now, don’t ask me the value of p. Frankly, I don’t know it. I just know that 0 < p < 1.
Now, sooner or later, somebody is bound to make a measurement. The somebody could be me or her or my parents or her parents or maybe some common friend or whoever. The measurement would be typically done by getting the two of us in one place and then asking us or something. And if she also thinks the relationship is in a quantum state (which is quite likely), the measurement itself would be non-trivial but assume that it has been achieved.
Here comes the crux – no later than the measurement is made, and communicated to us, the quantum state comes crashing down. Depending on what the two of us decide at the time of measurement, the relationship will collapse into one of the two states it is a mixture of – “good friend” or “romance”. It might also fall into a third state (something like “hate” or whatever), but the probability of this is infinitesimally small, so let us ignore that.
So we have a perfect “quantum situation” here. Something which lies in a superposition of states. And which can’t be measured without the collapse of these states! Arul may have given me a C in PH350 (Quantum Mechanics for Engineers), but I’m now convinced I deserved much better than that! | <urn:uuid:cc7d19bf-0b58-445b-9e2d-591556fa9d99> | CC-MAIN-2017-04 | http://noenthuda.com/blog/2006/05/09/schrodingers-girlfriend/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00182-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.965396 | 483 | 1.59375 | 2 |
There are five types of small intestine cancer.
The types of cancer found in the small intestine are adenocarcinoma, sarcoma, carcinoid tumors, gastrointestinal stromal tumor, and lymphoma.
Adenocarcinoma starts in glandular cells in the lining of the small intestine and is the most common type of small intestine cancer. Most of these tumors occur in the part of the small intestine near the stomach. They may grow and block the intestine.
Leiomyosarcoma starts in the smooth muscle cells of the small intestine. Most of these tumors occur in the part of the small intestine near the large intestine.
A patient with small intestinal cancer usually lives up to 5 years after the diagnosis. There are cases in which people live more than that also.read more
Small intestine cancer is a rare disease in which malignant (cancer) cells form in the tissues of the small intestine.read more | <urn:uuid:3c5cfd21-2fa3-4ac2-b57f-22debea2bf56> | CC-MAIN-2017-04 | http://www.onlymyhealth.com/what-types-small-intestine-cancer-12977602703 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00300-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.91884 | 193 | 3.4375 | 3 |
This is certainly my favourite news story of the day – Google Maps and the Google World Wonders Project has started to add images of key locations in Antarctica to its collection. Someday, I hope to visit these locations myself!
From NBC News:
You can go inside places like polar explorer Ernest Shackleton’s hut and the other small wooden buildings that served as bases for landmark expeditions in the early 1900s. Built to withstand the drastic weather conditions for the few short years, the structures are still intact, along with well-preserved examples of the food, medicine, survival gear and equipment used during the expeditions.
You’ll also see the South Pole Telescope, the hut of Robert Falcon Scott, who led Britain’s 1901 Discovery Expedition, Cape Royds Adélie Penguin Rookery and the Ceremonial South Pole with its international flags planted in the frozen tundra.
The new photos were taken with a lightweight tripod camera using a fish-eye lens with help from the Polar Geospatial Center at the University of Minnesota and the New Zealand Antarctic Heritage Trust. | <urn:uuid:d3cf12d7-787d-4794-80c6-050e57e19978> | CC-MAIN-2022-33 | https://www.jeffreydonenfeld.com/blog/2012/07/explore-antarctica-with-google-maps/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00667.warc.gz | en | 0.943845 | 224 | 2.59375 | 3 |
Reviewed by Andrew Tadross (Ethiopia 2011-13)
The Peace Corps memoir is a literary typology in itself, one with a niche readership. It’s a safe bet that every RPCV has been told by an enthusiastic relative that they must absolutely chronicle their exotic adventures and foibles, their inevitable cultural misunderstandings, their painful failures, and their priceless victories in their valiant efforts to integrate into host communities and accomplish something significant in a 27-month window.
Ted Wells has published such a memoir that transports the reader into the world of wild and rural Ethiopia in the late 1960s, with him and his newlywed wife Helen. Idealistic, naïve, determined, and with an admirable sense of humor, this couple weather the discomforts that come with the territory… intestinal assaults, hellish bus rides, local political dramas, and inconsiderate roosters. Ted’s first-person account of their experience is interspersed with the text of letters sent home to his parents. Their period of service is set against the backdrop of the Vietnam War and civil unrest in Ethiopia, during the late stages of Haile Selassie’s reign. Ted has quite matter of fact that the Peace Corps was an avenue to avoid the draft, but nevertheless put his energies dutifully into his service amongst the people of Shileh; a village of Amhara transplants who settled deep in the Guji Oromo zone of Southern Ethiopia.
As someone who volunteered nearly 50 years later, I have great respect for the decades of volunteers who served without smartphones, laptops, and hard drives full of movies, podcasts, translation apps, or Kindle books in which to escape. Some might argue that this was the REAL Peace Corps experience, and the 21st-century volunteer only gets the watered-down version. Though I believe feelings of frustration, depression, and isolation that come with living outside one’s familiar culture are universal to volunteers.
With training in architecture and urban planning, Ted set about to help villagers of Shileh build termite-free dwellings, and involved himself in various town planning activities, while Helen ran a health center to fight malaria and gardened extensively. Having a similar educational background as Ted’s, I can personally identify with the joys and challenges of such a hands-on application of one’s skill set, especially in contrast to the technocratic modes of modern design and planning. Behind the technology, there are always human consequences.
The title of this book The Old Man in the Bag: and other True Stories of Good Intentions’ hardly indicates the subject matter, but it does indicate the theme of many of Ted’s stories. That is, the intentions of Ted and Helen’s efforts were often more altruistic than the outcome. For example, Ted embarks on an effort to eradicate baboons who were eating local crops, yet when it is too late, he sees the ‘humanity’ in the dying creatures. He insults his village neighbor by replacing the rooster he accidentally killed with another one, thinking a one-for-one trade was appropriate. He stumbles into many a cultural pitfall of trying to ‘help’ with unintended consequences. But we must consider perhaps it’s a human trait, as one story recounts a community gathering to mourn for a dying village elder but which concludes in mourners angrily shouting at each other over who would pay for the booze.
The concept of ‘good intentions’ might be emblematic of the Peace Corps in general. Many PCV’s struggled to create an impactful project, only to have it defunded, neglected, eaten by goats, washed away, or destroyed…like a sandcastle in the surf. My own water project was locked up in disrepair within a few years, and a beautiful new library built by RPCVs was looted in the Tigray conflict. Does that mean the activity and the effort were futile and worthless? That’s up for debate. Perhaps the experience for both the volunteer and their host is worth the cost, but good luck quantifying that in a cost-benefit spreadsheet for Congressional hearings. Surely, the relationships built, and the experience developed by the volunteer has immeasurable value. Still, one wonders if these are Sisyphean goals.
Some years after his Peace Corps service, Ted and his wife immigrated to New Zealand, where he continued to work in planning on a local level and in several different countries in the South Pacific. His other writings take on themes of consensus building and global problem-solving.
Ted’s account jogged many a memory for me as if we had parallel experiences nearly 50 years apart. I particularly enjoyed his transliteration of Amharic dialogues and marveled at his ability to recount events in great detail, which are augmented by several dozen black and white photographs. Another wrinkle of this memoir is his relationship with Helen, describing the ups and downs of newlyweds trying to thrive in challenging terrain. Ted’s humility and willingness to admit his own misassumptions as a husband and a volunteer offer a reflective tone in this book, that makes it much more than a compilation of nostalgic stories. If anything, this book reminds us to keep a journal, contemplate our experience, and consider if the Peace Corps memoir of the future should be much like that of the past.
Andrew Tadross served in the Peace Corps from 2011-13 in Tigray, Ethiopia. He is a landscape architect, and co-author of several linguistic guides for Amharic, Afan Oromo, and Tigrinya. | <urn:uuid:fa6b1705-b4e5-4b58-a2e0-2eb3e0e5db02> | CC-MAIN-2022-33 | https://peacecorpsworldwide.org/review-of-old-man-in-the-bag-by-ted-wells-ethiopia/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00478.warc.gz | en | 0.968211 | 1,166 | 1.9375 | 2 |
|Media only: Brenda Kean Tabor: 202.633.0523
Barbara Kram: 202.633.0520
Public only: 202.357.2700
Media Preview: Thursday, October 16, 9 a.m., Arthur M. Sackler Gallery
Many of the world’s finest examples of Himalayan art go on view Oct. 18 at the Smithsonian’s Arthur M. Sackler Gallery in an exhibition surveying the remarkable range of sacred objects produced in this vast mountain region. “Himalayas: An Aesthetic Adventure”—based on an exhibition first seen at the Art Institute of Chicago—features 163 Buddhist, Hindu and Bon paintings and sculptures created between the 7th and the 19th centuries. Focusing on aesthetic excellence, the exhibition invites visitors to experience an artistic trek through this fascinating region, in which religions and cultures intermingled in unique ways. The exhibit is on view through Jan. 11, 2004.
Works on view were created in an astonishingly large variety of media, scale and color, ranging from a tiny, rare and exquisite ivory of the fasting Buddha to a life-size portrait of a Nepalese king as a multiarmed, cosmic deity. Other objects on view include intricately detailed manuscript illuminations on palm leaf, paper and wood, and brightly colored thangkas (cloth paintings) depicting mandalas, deities and teachers. Benign and terrifying stone, wood and bronze images of deities—many embellished with gemstones, gilding and paint—are also on view.
“We are pleased to be presenting these remarkable works, which highlight the creative spirit of generations of anonymous artists in this austere region,” says Julian Raby, director of the Freer Gallery of Art and the Arthur M. Sackler Gallery.
Extending for 1,800 miles, the harsh Himalayan terrain is interspersed by cultural oases found in the valleys of India and Nepal, as well as on the Trans-Himalayan Tibetan plateau. Merchants, monks and artists traveled between these centers of civilization in Nepal, Kashmir and Tibet for almost two millennia, bringing with them the intellectual, spiritual and material culture of neighboring India, China and Central Asia. Local artists transformed and developed those beliefs and aesthetic ideals to create the unique and richly varied art of the Himalayas.
The exhibition is divided into three broad cultural regions of Nepal; Kashmir and the Western Himalayas; and Central Tibet.
Located on trade routes, the Kathmandu Valley of Nepal forms a cultural bridge between the Sanskrit culture of the Indian subcontinent to its south, and the Tibetan culture to its north. For the last 2,000 years, Buddhism and Hinduism have co-existed so harmoniously in Nepal that their style and much of the iconography—featuring, sculptures of bronze, stone, wood and terra cotta as well as illustrated texts and thangkas—are at times virtually indistinguishable.
A composite of Hindu and Buddhist attributes is apparent in the multiarmed 11th -century figure of the Buddhist god Chakrasamvara (object number ELS2003.7.31 featured in the Malla period room described below). Locked in a sexual embrace with his spouse, Chakrasamvara has a third eye, like the Hindu deity Shiva. The sculpture demonstrates Nepalese artists’ preference for slim, graceful figures with broad, youthful faces and gentle expressions, elongated well-formed limbs, wide, sloping shoulders and smooth contours. The Nepalese love for intricate detail is apparent in both the lively, richly colored illuminations of religious texts, and the monumental paintings on view, which at times interweave aspects of sacred, secular and royal culture (see object ELS2003.7.46).
A room showing art from the Malla period (1200–1769) displays works that reflect Buddhist and Hindu esoteric (or tantric) traditions. On view are sculptural figures of deities (ELS2003.7.31 and 34) and revered “mahasiddhas” (humans whose rigorous practice of yoga, meditation and ritual led to superhuman powers and enlightenment) (ELS2003.7.29).
KASHMIR AND THE WESTERN HIMALAYAS
This region is located on trade routes connecting Central Asia, China and Afghanistan with India. Kashmiri artists synthesized aesthetic traditions from surrounding areas to create a powerful and influential regional idiom. Kashmir was renowned between the 7th and 13th centuries as a center for both Buddhist and Hindu learning. Kashmiri material culture, however, was largely unrecognized in the West before the dispersal during the 1950s of surviving Kashmiri treasures from the Tibetan monasteries in which they survived. Kashmiri sculptures from the Karkota dynasty (626–855/856) were primarily fashioned in stone, gold, silver and brass. Stone sculptures featured characteristically stocky bodies with firm frontal stances, while Kashmiri bronzes are fluidly modeled with rippling garments, intricately engraved patterns of luxurious textiles, and silver-colored eyes beneath arching brows (ELS2003.7.68). The exhibition includes one of the finest ivory panels produced in the Asian world (ELS2003.7.69). Two figures, known as “Vaikuntha,” represent a Kashmiri conception of the Hindu god Vishnu (ELS2003.7.60).
Western Tibetan artistic expression-though heavily influenced by Kashmiri art -was remarkably diverse. Figures like the 11th century figure of the benevolent Bodhisattva Avalokiteshvara (ELS2003.7.85)—featuring inlaid tin eyes with a silvery cast, lips and nipples of pure copper, traces of gilding and red and black-designed clothing—are distinguished by their color and intricate surface patterns.
Esoteric Buddhism flourished here, fostering manifestations of the Buddha in a wide variety of media and forms-many adorned with jewel-like colors, gilded surfaces and precious stones. Brightly colored thangkas were also produced. Portraits of llamas (ELS2003.7.143), mahasiddhas-including Virupa, whose powers included the ability to arrest time (ELS2003.7.156) and masters of Bon (ELS2003.7.135) are evidence of the persistent visual exaltation of human teachers that is unique (within Himalayan art) to Tibet. In Tibetan Buddhism, great monastic teachers were thought to be incarnations of bodhisattvas-enlightened beings dedicated to reducing the suffering of humans. Their portraits were revered.
Esoteric Buddhism also fostered images of ferocious deities, and gods and goddesses in sexual embrace. Works of particular note include one of the earliest Tibeto-Newar bronzes to depict a wrathful deity (ELS2003.7.9), as well as a colorful and intricately detailed 16th-century Kalachakra (wheel of time) mandala modeled on the cosmic order (ELS2003.7. 168). Kalachakra mandalas, representing a synthesis of the highest yogic teachings, are frequently created in sand in the West.
“MONASTIC LIBRARY” ROOM
Tibetan monasteries housed large libraries of Buddhist scriptures, related teachings, and commentaries. The exhibition concludes with a library room featuring an outstanding selection of 12th- to 17th-century Tibetan Buddhist manuscripts. Notable works on view include a cover from a manuscript of the sacred Prajnaparamita text (ELS2003.7.122) and a painting on silk attributed to the 10th Karmapa (1604–1674), who was renowned for his individual style (ELS2003.7.177). Mystical diagrams from the nearly 200-page Manuscript of Tsog dag Rituals (ELS2003.7.178) are among the many other treasures on view.
A video-graphic overview of Himalayan art narrated by curator Pratapaditya Pal is on view in a room where examples of the different production stages of bronzes and thangkas are also on view. An almost 12-foot-high 20th-century iconometric drawing of the bodhisattva Maitreya (ELS1998.1) from the Sackler collection-especially added for this venue-is also on view.
An illustrated 308-page catalog by Pratapaditya Pal, curator emeritus of the Norton Simon Museum in Pasadena, Calif., accompanies the exhibition and is available for purchase online or from the gallery book shop (hardcover $65, softcover $39.95).
“Himalayas: An Aesthetic Adventure” was organized by the Art Institute of Chicago. Major sponsorship support for this exhibition has been provided by Exelon, Proud Parent of ComEd.
This exhibition is made possible by the generous support of the E. Rhodes and Leona B. Carpenter Foundation, The Christensen Fund, the National Endowment for the Arts, and The W.L.S. Spencer Foundation.
Presentation of the exhibition at the Sackler is supported in part by the Else Sackler Public Affairs Endowment, the Friends of the Freer and Sackler Galleries, Ann and Gilbert Kinney, and the Director’s Discretionary Fund established by Peggy and Richard M. Danziger.
The Freer Gallery of Art (12th Street and Independence Avenue S.W.) and the Arthur M. Sackler Gallery (1050 Independence Ave. S.W.) together form the national museum of Asian art for the United States. The Freer also houses a major collection of late 19th and early 20th-century American art. Hours are from 10 a.m. to 5:30 p.m. every day except Christmas Day, Dec. 25, and admission is free. Public tours are offered daily. The galleries are located near the Smithsonian Metrorail station on the Blue and Orange lines. For more information, the public may call 202.357.2700 or TTY 202.357.1729, or visit the galleries’ Web site at asia.si.edu. | <urn:uuid:3c0bb04f-e84c-49c6-8134-b68da0750c66> | CC-MAIN-2022-33 | https://asia.si.edu/press-release/himalayas-an-aesthetic-adventure-opens-october-18-2003-at-the-smithsonians-arthur-m-sackler-gallery/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00269.warc.gz | en | 0.927545 | 2,141 | 2.25 | 2 |
Converting hexadecimal, binary and decimal numbers.
An equation of a line and a point is given. Your job is to find a parallel line to the equation that goes through the given point.
3rd Grade Addition, Subtraction, and Place Value
Addition, Subtraction, Properties of Addition, Rounding to the tens and hundreds place, and Estimation.
Systems of Equations - Substitution
In this game, your job is to solve the system of equations using substitution. Then select the correct solution.
Match an Integer to Its Opposite
Matching integers and their opposites
Multiplying and Dividing Integers
Students will solve problems relating to multiplying and dividing integers in order to progress in the game.
Money and Calculators
Students add or subtract dollar amounts using a calculator.
Math Review: Inequalities
3.1-3.3 Solving 1-step inequalities
Match the solution with the original problem.
Relations - Domain and Range
This game has you finding the domain and range of relations to make a great sounding band. | <urn:uuid:ba8518cb-7eea-48f0-aca8-2483ad59cb90> | CC-MAIN-2022-33 | https://dev.wisc-online.com/arcade/games/mathematics2?gameTypes=TRIVIATRON_MATCHING_HAVEUHERD_SQUIDHUNT | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00076.warc.gz | en | 0.853383 | 244 | 3.765625 | 4 |
The global social media users numbered 3.196 billion in 2018. This number is likely to rise to 3.1 billion – only two short years away. Those who are still not convinced of the digital marketing potential of social networking may think social media is just a way for people to keep connected. While this is indeed a considerable function of social media, it is also a powerful way that you can improve your SEO.
Social media management in addition to search engine optimisation may be two very different business strategies and have their own rules of engagement. However, within the larger realm of digital marketing, these two aspects can be optimised in such a way that the one is a complement to the other.
How SEO and social media work hand in hand
Benefits such as brand visibility, recognition and more website traffic can be improved when you combine these two strategies. Social media – together with SEO – will supplement and enhance your efforts in both areas. Social media content, for example, can assist with amplifying your SEO campaigns with content which is optimised for keywords as well as by generating more backlinks.
While SEO makes sure that your website can properly, it is also possible for you to tweak your social media channels — such as your business pages in addition to your profiles — in order to score higher rankings in search engines rankings. Although your social media strategy may not necessarily be pivotal in your search engine rankings, it can still be strong enough in order to take it a notch higher as well as boost your existing rankings.
Individuals interact with social media networks – such as Facebook and Instagram – in a different manner as opposed to that in which they interact with search engines. However, the results of both are the same in a number of ways:
- Content is filtered,
- Links are shared, as well as
- The most trusted sites get the most amounts of traffic. | <urn:uuid:0a47e92e-9f52-4a6a-90a8-aa47846e8c9e> | CC-MAIN-2022-33 | https://digitalschoolofmarketing.co.za/blog/how-to-boost-your-seo-with-a-smart-social-media-strategy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00467.warc.gz | en | 0.964047 | 380 | 2.015625 | 2 |
Crime scene technician schools in North Dakota offer a number of different programs that prepare students to successfully achieve a career as a crime scene investigator. This growing and popular field has become one of the most recognized and talked about fields in the industry because of its television and movie notoriety. Crime scene technician studies include a heavy load of science and math courses. Analytical skills are a must and classes in physics, anatomy, and calculus are required. Elective courses in the criminal justice department are offered to students pursuing a degree in crime scene technology.
Matching School Ads | <urn:uuid:86698433-c7f8-49ed-b458-778cebcecbad> | CC-MAIN-2017-04 | http://www.criminal-justice-careers.com/crime-scene/North-Dakota/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00494-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.96693 | 111 | 2.171875 | 2 |
Disputes over rituals have given rise to major revolutionary movements in human history. This is true for the Protestant Revolution of 16th
century Europe, perhaps the most important revolution in the making of the modern world, but also for the failed Mutiny and Taiping risings of 19th
century in India and China, as well as for the various atheistic Communist revolutions in Asia. These disputes over rituals are often interpreted as “sideshows” of the real
political struggles or as “the hidden registers of resistance”, but in fact, they are really
about the efficacy, rationality, or “sincerity” of certain rituals. Such controversies have immense impact on the values and political orientations of people, as is shown by the rise of vegetarianism and non-violent politics in India. In China and Vietnam, the anti-superstition and anti-cult aspects of repressive authoritarianism have had huge consequences. The repression of certain rituals does not result in the abolition of all ritual. In fact, Protestantism and Communism have come up with their own rituals. This talk will discuss the dynamic of ritual and anti-ritual from an anthropological viewpoint in general, theoretical terms, but will take its examples from India, China, and Vietnam. | <urn:uuid:1b583f62-82cf-4c20-8a85-d6c67904e2df> | CC-MAIN-2022-33 | https://www.mmg.mpg.de/events/811052?print=yes | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00269.warc.gz | en | 0.95379 | 265 | 2.734375 | 3 |
The William & Mary School of Education has been chosen to establish a Troops to Teachers center in Virginia to help military veterans and soon-to-be veterans become K-12 teachers, Virginia Gov. Terry McAuliffe announced last week. The $400,000 grant was awarded through the Defense Activity for Non-Traditional Education Support (DANTES), a U.S. Department of Defense agency.
“Virginia boasts one of the largest veteran and military populations and is home to some of the nation’s most important military installations,” said McAuliffe. “That is why the Troops to Teachers program is so important to the military-connected citizens of the Commonwealth. This program will help address the teacher shortage in Virginia and provide our veterans with opportunities to bring their experiences and skills into the classroom. These are the kind of innovative opportunities that will allow our nation’s heroes to succeed in the new Virginia economy.”
For Gail Hardinge, the principal investigator on the grant, veterans’ skills, leadership experience and commitment to public service make them a natural fit for the classroom.
“Teaching is an exceptionally rewarding and far more diverse career field than many people realize,” she said. “With strategic support, veterans can find the teaching career that best fits their skills and interests.”
The Troops to Teachers Virginia Center, scheduled to open in June in the W&M School of Education, will help veterans do just that. Through a statewide outreach program, the center will offer veterans, and those who are within one year of exiting the military, guidance in meeting educational and licensure requirements to enter a wide variety of teaching fields.
The center aims to not only help address critical teacher shortages in Virginia, especially in underserved schools and high-need areas like math and science, but to also help alleviate veteran unemployment.
“The Troops to Teachers grant and center will be a game-changer for so many veterans and soon-to-be veterans across the Commonwealth,” said Virginia Secretary of Education Dietra Trent. “As Virginia and the nation continue to experience a teacher shortage, now more than ever we need more qualified and inspired professionals in the classroom, and that is exactly what this program will help us provide to our students.”
In addition to the statewide outreach program, Hardinge and her team will develop a pilot program to further support veterans in the Tidewater area. They will partner with experienced teachers who will serve as mentors to veterans at various stages in their transition to the teaching profession.
The pilot program will offer three tiers of support. The first will introduce veterans to the teaching profession through career exploration opportunities such as job shadowing, career coaching, credential review and the development of an individualized plan for meeting licensure requirements.
The second tier supports veterans just beginning their teaching careers, providing mentorship from an experienced teacher coach. The final tier provides ongoing services to veterans after they’ve transitioned to the classroom, offering continued access to resources and opportunities for professional growth and leadership.
The comprehensive, personalized approach will not only match veterans to best-fit teaching positions, but will also support their success in the critical and sometimes challenging early years of a teaching career. Hardinge’s team of project specialists will include educators and a veteran liaison, who will collaborate with teacher mentors and veterans throughout the program.
According to Spencer Niles, dean of the W&M School of Education, the school’s breadth of expertise and collaborative focus makes it an ideal partner for Troops to Teachers.
“With dedicated faculty working in educational leadership, curriculum and instruction, special education, school psychology and counselor education, we’re well-positioned to support veterans as they identify and transition to the educational opportunities that will best match their experience, skills and long-term goals,” he said. “And in return, our community and Virginia’s classrooms will benefit immensely from their perspectives, leadership and selfless commitment to public service.”
Contact the Troops to Teachers Virginia Center at (757) 221-3415 or firstname.lastname@example.org. | <urn:uuid:4414586b-3a08-451b-9152-d873dcd2a38f> | CC-MAIN-2022-33 | https://www.wm.edu/news/stories/2017/wm-school-of-education-receives-troops-to-teachers-grant-.php | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz | en | 0.947784 | 852 | 2 | 2 |
As part of the University's Student Research Program, the Institute for Culture and Society is offering undergraduate students the opportunity to work on three exciting projects over summer:
- Project 12: Exploring visual tools for visualizing and communicating data in innovative ways: Safe and Well Online
- Project 13: Digital Capacities Index
- Project 14: Examining young people's experiences of Participatory Design in the Safe and Well Online project
For details of these projects including aims, methods, skill requirements and supervisor contacts please see the Project Lists PDF (opens in a new window).
Scholarships of $3,500 are available to currently enrolled Western Sydney University undergraduate students and will be awarded on a competitive basis. Students are placed in a formal research environment supervised by leading academics.
Timeline and Important Dates
|Thursday 22 October 2015|
- Applications close. Further details and the application form can be found on CareerHub. Applications close 11.59pm.
- Shortlisting. Students notified by 14 November.
|30 November 2015|
- Student commences project (and attends Orientation Day).
|21 December 2015 - 3 January 2016|
- Holiday shut down (no work, University is closed).
|4 January - 25 February 2016|
- Continue project work.
- Presentation Day, Final Report due and Feedback Survey distributed.
For further details please see the University's Jobs on Campus page.
Posted: 12 October 2015. | <urn:uuid:2b47ec93-aea6-4cbc-8f9a-d7ce7e6182b2> | CC-MAIN-2022-33 | https://www.westernsydney.edu.au/ics/news/news_archive/2015/ics_offers_summer_scholarship_opportunities | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00272.warc.gz | en | 0.902395 | 310 | 1.570313 | 2 |
February 11, 2014 > NASA Space Place: Bright Flash on the Moon Leads to a New Crater
NASA Space Place: Bright Flash on the Moon Leads to a New Crater
By Alex H. Kasprak National Aeronautics and Space Administration
On March 17, 2013, a meteor the size of a small boulder traveling over 70 times the speed of a bullet crashed into the surface of the Moon. It created an explosion so bright that it could be seen from EarthÑwithout a telescope! Scientists think that the force of the explosion was the same as about five tons of dynamite going off all at once.
The whole thing was captured on video, too! NASA uses telescopes here on Earth to watch the Moon for impacts. NASA has been doing this since 2005. The March 17th impact was the largest they have ever seen.
Scientists wanted to see what kind of damage this speeding rock caused. A couple of months later, NASA was able to use a spacecraft orbiting the Moon to zoom in on the area from the flash. They found a bright, white crater. It had to be the crater caused by the meteor. A picture from 2012 of the same place had no crater there!
The Moon has a rich history of getting hit by meteors. Its surface is covered with all kinds of craters from both big and small impacts. Early on in its history, billions of years ago, the solar system was full of objects crashing into each other. Without weather or many of the geologic processes on Earth to remove them, lots of the craters on the MoonÕs surface are visible from this ancient time.
But that doesnÕt mean that the MoonÕs surface stopped changing after its hectic early years. Thanks to space rocks still zipping around our solar system today, the MoonÕs surface is not frozen in time. Instead, its ancient features are dotted with the scars of subsequent impacts that have occurred to this day. As you look at the Moon in the night sky, let its cratered surface be a reminder of the power and wonder of our busy stellar neighborhood.
To check out a video of the meteor hitting the moon and to learn more about this exciting event, check out: http://www.youtube.com/watch?v=IYloGuUZCFM.
Want to learn more about meteors? Check out NASAÕs Space Place: http://spaceplace.nasa.gov/meteor-shower. | <urn:uuid:96091657-4aff-4289-91fb-be354f93422d> | CC-MAIN-2017-04 | http://tricityvoice.com/articlefiledisplay.php?issue=2014-02-11&file=Space+Place+Moon+372TSP+++TCV.txt | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00198-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.95715 | 512 | 3.890625 | 4 |
NOAA Teacher at Sea
Onboard NOAA Ship Rainier
June 1 – 8, 2005
Mission: Hydrographic Survey
Geographical Area: Aleutian Islands, AK
Date: June 4, 2005
Weather from the Bridge
Latitude: 56 deg 59 min N
Longitude: 135 deg 17 min W
Visibility: 5 nautical miles
Wind Direction: 300 deg
Wind Speed: 10 kts
Sea Wave Height: 0-1 ft
Swell Wave Height: 0 ft (we are in a protected bay)
Sea Water Temperature: 53deg F
Sea Level Pressure: 1009.8 mb
Science and Technology Log
On the RAINIER, the crew works right through the weekend, so the workday began at 0800; again, four launches were deployed to run survey lines and take bottom samples. I was assigned to launch RA-3, and we worked an area on survey sheet Y.
Launch RA-3 ran approximately 40 miles of hydrography using the Sea Bat 8101 Multibeam Echosounder. The Sea Bat is a 240kHz echosounder that measures the relative water depths across a wide swath that is perpendicular to the launch’s track. The system is comprised of 5 main parts: the sonar processor, the sonar head, the sonar processor to sonar head signal and control cable, a color monitor, and a computer mouse. The transmit array, which is a projector section of the sonar head, transmits a pulse of sound energy that travels through the water and is reflected by the sea floor or any object in its path. The reflected signal is received by the hydrophone section of the sonar head, digitized, and then sent to the sonar processor for beamforming. The processor then generates a video display of the ocean floor that can be viewed on the color monitor. The Sea Bat can “see” approximately 300 meters, but it is more accurate in depths of 150 meters or less.
The physical process of running survey lines with the Sea Bat is nicknamed “mowing the grass;” this is because the launch actually follows the parallel lines drawn by the survey techs and the launch’s path resembles an individual mowing a lawn. The survey lines are displayed on a computer screen so the survey tech can highlight a given line for the coxswain to follow. As the launch approaches the line, the survey tech logs the computer data for each line. Lines vary in length from a few meters to several kilometers.
I learned to drive the launch today, and it was a lot of fun. I was able to “mow the grass” for about an hour, and I also drove during a man overboard drill.
Previous question of the day: What is refraction?
Answer: Refraction is the bending of a sound wave. In the case of sound traveling through water, different temperatures and pressures cause sound to travel at different speeds; this in turn causes the waves to bend. | <urn:uuid:bc044dae-8639-4063-b532-708fae9d57ff> | CC-MAIN-2016-44 | https://teacheratsea.wordpress.com/2005/06/04/christy-garvin-june-4-2005/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718866.34/warc/CC-MAIN-20161020183838-00004-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.928307 | 626 | 2.25 | 2 |
Hide IP NG (Hide IP Next Generation) is an application for keeping the computer’s IP address hidden. It makes use of 1024 bits encryption to make sure that the IP address won’t be seen by others. The application is compatible with all popular web browsers including Internet Explorer, Mozilla Firefox, Opera, and Google Chrome. Users can select from the available IP addresses from the application. The program has 11 different IP addresses 4 from the United Kingdom and 7 from the United States. Hide IP NG is also capable of assigning different IP addresses to systems that are connected to the same network.
The program has a simple window with three tabs – General, Bypass, and About. Under the General tab, users can select the browsers where the application will be used. There is also an option to launch the program when the system starts. Under the Bypass tab, users can type in websites where the IP address won’t be hidden.
Here are some of the main features of the Hide IP NG application:
• Support for HTTPS (Hypertext Protocol Secure)
• Send anonymous emails
• Prevent hacker attacks
• Post on websites without displaying real IP address
• One-click function | <urn:uuid:66544608-2f56-42bf-9348-b820f71729a8> | CC-MAIN-2017-04 | http://www.filefacts.com/hide-ip-ng-info | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00346-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.899152 | 244 | 2.328125 | 2 |
Dorothea Lasky’s third poetry collection, Thunderbird, begins with the lines “Baby of air / You rose into the mystical / Side of things”—which immediately prompted me to hum Van Morrison’s “Into the Mystic.” It wasn’t a great start to reading this book, but what I realized was that it wasn’t the word “mystical” that brought a song to mind so much as it was the lyricism of Lasky’s writing. As I hummed on, I recognized that the language of “Baby of Air” works through patterns, creating emotion tenor through lines that build on each other. A few lines later, Lasky writes, “People cannot keep air in / I blow air in / I cannot keep it in.” These lines are not typical, flowing lyrics packed with sound play, but are instead a series of seemingly simple phrases that amass meaning through repetition. At times, Lasky’s lyricism even has a blues-like effect in lines like “O you are already there / O you are already there / My brother tells me, you are already there.” Even in this opening piece, poetic lyricism and song come together to form both voice and emotional resonance to carry the reader through the rest of the collection.
However, Lasky’s language does not end at simple repetition. Mixed with this lyric quality (and sometimes at odds with it) are straightforward statements that strike the reader through their baring of the intimate. At times, this approach takes on the negative association of confessionalism—the self-indulgent statement of personal emotion that shuts out the reader—however, at Lasky’s best she filters this private emotion through straightforward statement, creating for the reader a realistic portrayal of human (universal) feeling.
December 21st, 2012 / 12:00 pm
Due to Betty Freidan’s pet rooster, or, as Mayor Bloomberg calls it, “Hurricane Sandy,” a lot of things were discombobulated, including The Poetry Brothel.
But now The Poetry Brothel has been rescheduled for this Sunday , 17 Nov. 2012. It will be from 8:00-1:00 at the Backroom on 102 Norfolk Street.
There will still be magic, music, burlesque, tarot cards (which I still don’t believe in), and tons of public and private poetry readings.
Dorothea Lasky and Ariana Reines will be there. So will the Princess of Brattydom, Carina Finn, and the Princess of Spanish Harlem, Jennifer Tamayo. What will happen when these two royal figures collide? Will it turn into a girly, more fashionable version of the exciting Israel-Hamas war?
Also, while I’m on the topic of prostitutes, I want to cite one of the most intriguing prostitutes ever (besides Elizabeth Taylor in Butterfield 8): Vivian Ward, played by Julia Roberts in Pretty Woman.
Vivian’s long curly red hair is really fairy tale. If it would’ve ran for president of the United States of America I maybe would’ve supported it.
If you aren’t entertaining the possibility of viewing Pretty Woman right this second, then you are like the shop girls in the movie who are rude to Vivian/Julia, which means you are a brickhead.
So… please consider coming to The Poetry Brothel and contributing to a theatrical and glamorous poetry event.
Here’s another picture of The Poetry Brothel’s madam, Stephanie Berger:
by Dorothea Lasky
Wave Books, 2012
107 pages / $16.00 buy from Wave Books
1. Wave Books made a hardcover edition of this book with a pink cover but it is sold out on their website.
2. The only time I’ve seen Dorothea Lasky read was at last year’s AWP (Chicago) where she read in a theater and everyone clapped when she read and thought she was great (I also thought this).
3. After the whole reading was over there was a dance party and Dorothea Lasky was dancing nearby and I told my friend Chris that I liked her poems and I think she heard me and I turned to her and said something like, “Sorry, I’m talking you like you aren’t in the room or something.” She just smiled because she is a nice human being and poet.
4. The title of the book and all the poem titles are typed in what seems like a medieval font–like something one would see on stained glass windows.
5. “I Like Weird Ass Hippies” is probably the funniest poem title in the book (she read it AWP).
6. “I make hell to live in / I make hell”
7. “The world doesn’t care” is a poem that tells the truth and is not complicated; everyone should read it.
8. I am listening to Allo, Darlin’ and writing this and I feel this band is a good soundtrack to Dorothea Lasky’s poems.
9. “Let’s sit in a sea of flames / And I will never put the fire / Out of you” is something I wish a woman will tell me someday when she is talking to me, not reading the poem in which Dorothea Lasky writes it.
10. A person says, “Is this America?” in a poem titled “The Room” and I think lots of poets ask this important question. READ MORE >
November 8th, 2012 / 1:01 pm
On Sunday there will be a Poetry Brothel.
It will be held in The Back Room at 102 Norfolk Street, which is in the Lower East Side.
The Brothel will start at 8 and end at 1.
There will be masks, music, tarot readings (which I don’t believe in, but still), burlesque, magic, and lots of poetry.
All guests may purchase private readings with the poets, which include the splendidly shrill Dorothea Lasky and the plucky Harlem princess Jennier Tamayo. Also available for a private reading is Carina Finn (the East Village princess behind The Bratty Poets), Ariana Reines (if you haven’t read Mercury then you don’t have proper priorities), myself (Ann Romney 2012!), and lots more.
Throughout the evening, each poet will also give a public reading.
Please come and support poetry that is theatrical and fabulous.
Stephanie Berger is the madame of The Brothel. This is what she looks like:
For further information or to purchase tickets in advance please click here.
It made me very happy to read the various responses to Part 1, posted last Monday. Today I want to continue this brief digression into asking what, if anything, the New Sincerity was, as well as what, if anything, it currently is. (Next Monday I’ll return to reading Viktor Shklovsky’s Theory of Prose and applying it to contemporary writing.)
Last time I talked about 2005–8, but what was the New Sincerity before Massey/Robinson/Mister? (And does that matter?) Others have pointed out that something much like the movement can be traced back to David Foster Wallace’s 1993 Review of Contemporary Fiction essay “E Unibus Pluram: Television and U.S. Fiction” (here’s a PDF copy). I can recall conversations, 2000–3, with classmates at ISU (where DFW taught and a number of us worked for RCF/Dalkey) about “the death of irony” and “the death of Postmodernism” and a possible “return to sincerity.” Today, even the Wikipedia article on the NS also makes that connection:
I wasn’t surprised that my Monday post, which was ultimately about reading & applying some ideas from Viktor Shklovsky’s Theory of Prose, mostly generated conversation about Tao Lin and the New Sincerity. I knew that would happen even as I wrote it. So I thought I should take a post to clarify my thoughts on “the whole NS thing.” What follows will be a mix of fact and personal reflection.
In the first post in this series, I outlined Viktor Shklovsky’s fundamental concepts of device (priem) and defamiliarization (ostranenie) as presented in the first chapter of Theory of Prose, “Art as Device.” This time around, I’d like to look at the start of Chapter 2 and try applying it to contemporary writing (specifically to the New Sincerity). As before, I’m proposing that one can actually use the principles of Russian Formalism to become a better writer and a better critic.
1. Super thrilled to hear via twitter that Coffee House Press will be putting out a new collection by Brian Evenson, Windeye. Hopefully by 2011? No date word yet, but Evenson is the kind that I go stand in line for. If you haven’t read the titular story yet, it is gorgeous, and available via PEN America.
2. At Electric Literature, Melissa Broder interviews Ryan Call about, what else, litblogging.
4. The Complete Recordings of Gertrude Stein Reading Her Own Works @ PennSound
6. At Ubu, Doug Nufer’s Never Again, a 163 pg. novel with no word appearing more than once, which I discovered after an awesome conversation wondering if such a thing existed with Heather Christle and Christopher DeWeese, both of whom have books coming from Octopus in 2011 that I am also mega excited for. | <urn:uuid:75d9b92e-9965-4f50-aec9-369bdf74d827> | CC-MAIN-2016-44 | http://htmlgiant.com/tag/dorothea-lasky/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00127-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.94625 | 2,118 | 1.578125 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.