text stringlengths 222 548k | id stringlengths 47 47 | dump stringclasses 95 values | url stringlengths 14 7.09k | file_path stringlengths 110 155 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 53 113k | score float64 2.52 5.03 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|
THE ROYAL ASTRONOMICAL SOCIETY OF CANADA
STANDING COMMITTEE ON OBSERVATIONAL ACTIVITIES
Bulletin No. 2
Meteor observing is a field in which amateurs without specialized equipment can make
an important contribution. The prime requirements are enthusiasm, knowledge of the
constellations, and a willingness to stay awake when the majority of citizens are
sleeping. Other things being equal, more meteors are observed between midnight and
dawn than between dusk and midnight. With some thought, it becomes apparent that
those arriving before midnight have to overtake the earth, while those in the early
hours of the morning are meeting the earth bead-on. Thus the latter will tend to
be brighter with more of then.
Meteor observing is a field in which the junior member of a Centre can come into his
(or her) own. In Ottawa, we have two groups of experienced observers composed of
high school students (Hillcrest and Queensway). If you are thinking of starting Cr
expanding a meteor observing group, include high school pupils in your recruiting -
after a short period of training the students will develop into very effective
The first bulletins of the Meteor Section will deal with topics such as setting up a
visual observing station, the type of information gathered by visual observers, and
the recovery of meteorites after a suspected fall. Later bulletins will deal with
meteor photography and spectroscopy, telescopic meteors, and the collection of fire-
ball reports from untrained observers. I would like to stress that these bulletins
will attempt to transmit advice fran one amateur to another, and will not be formu-
lating hard and fast rules. If you have ideas of your own, go ahead and try them
art and please let me know the results. Your comments on these bulletins will be
welcomed along with news of the activities of your group in the meteor observing
field, but NOT the data you have collected. Please mail this to: Meteor Centre,
National Research Council, Ottawa 2, Ontario, where Dr. Peter M. Millman will feed
it to his hungry computers.
A number of brilliant fireballs have been observed recently; it is important to
remember that most of the people from whom fireball observations can be collected do
not know what they have seen. Reports of flying saucers, or unconfirmed stories of
planes crashing in flames, unexplained noises from the sky and other peculiar
happenings should be investigated - otherwise the chance of a meteorite recovery may
be lost. Remember, reporters and others in the mass-communication field cannot be
expected to be familiar with meteoritic phenomena. It is instructive to read the
reports of the meteorite which fell in Barwell, England, last Christmas Eve (see SKY
AND TELESCOPE July 1966, p.7, and Journal of the British Astronomical Association
April 1966, p.192), art compare this with the published account of the Bruderheim
meteorite of March 4, 1960 and the Peace River meteorite of March 31, 1963 (see
JOURNAL of the R.A.S.C., October 1961, p.218 and June 1964, p.109, respectively).
The comparison reflects great credit on our meteorite recovery experts in Western
Canada and the final story of the fireball of September 17, 1966 should reflect
similar credit on us in Ontario!
Meteor Section, Bulletin No.2 -2-
There are a number of books now available which will be useful to students of meteor-
itics. A reliable star atlas of naked-eye stars is essential - my first choice would
be Norton' s Star Atlas (Gall & Inglis) with Ray Coutchie' s Deep Sky Catalogue a close
second, available from Ray Coutchie, 22018 Ybarra Road, Woodland Hills, California,USA.
Fletcher G. Watson' s Between the Planets (available as a paperback from Doubleday-
Anchor Bock N17) is a near-essential. In a large group, one individual should obtain
McKinley' s Meteor Science and Engineering (McGraw-Hill). There are many others -
some day I hope to send you a fairly comprehensive list. Do not forget the publica-
tions "Sky and Telescope" and "The Review of Popular Astronomy".
METEOR SHOWERS OF AUTUMN AND EARLY WINTER
The ORIONIDS reach the maximum of their 8-day period on the evening of Thursday, 20-21
October. The radiant is located at RA 6 h 20 m, Decl. 15°N (10°NE of Betelguese,
between Betelguese and Delta Geminorum). Thus the shower is at its best in the early
morning with the radiant culminating (reaching its highest point in the sky) around
4 a.m. at which time the maximum rate of 15-20 Orionids and 7 sporadic (non-shower)
meteors may be expected. The first-quarter moon will not interfere with observations
of this shower.
The TAURIDS are not a rich shower (of the 15 meteors per hour which may be expected
under favourable conditions, only half will be Taurids); however, they have an
extremely long period (about 30 days) and the long paths at low speeds make these
meteors fascinating objects. They are associated with Encke's Comet; it is possible
that they give rise to meteor showers on Wars, Venus and Mercury as well as on earth.
During the period of maximum activity, from 1st to 10th November, the diffuse radiant
is located in the area of the sky between Aries arid Aldebaran. The waning moon may
interfere with observing during the early part of this period. Incidentally, this
shower makes a "return visit" in the latter part of June as the daytime Beta Taurids,
which can be observed only by means of radar.
The LEONIDS are the most famous (or infamous!) of the periodic showers. They gave
rise to spectacular displays in 1799, 1833 and 1866, but their failure to perform as
expected in 1899 ruined popular interest in meteor observing for years. However,
interest in this shower is reviving due to the unexpectedly rich display of 1961, and
another rich return in 1965. There is an excellent chance that the night of 16-17
November will be an exciting one for meteor observers. The radiant is in the Sickle
of Leo, and the moon is between new and first-quarter phase. If you have an interest
in meteor photography, this is one night to keep your camera handy. If possible,
observations on the nights of 15-16 November and 17-18 November should also be made,
just in case the Leonids have other surprises in store. Good Luck!
The GEMINIDS, like the Perseids, are classed among the "old reliables" of meteor
showers. The radiant is near Castor, the period of greatest activity is between the
9th and 14th of December, and the maximum will occur on the night of 13-14 December,
when the hourly rate should reach 50 meteors. The Geminids tend to be rather slow
(not as slow as the Taurids) and bright Ä this is a good shower to try your luck with
a camera, taking precautions to prevent the lens from dewing or frosting oven
Culmination of the radiant takes place around 2 a.m.
Meteor Section, Bulletin No.2 -3-
The URSIDS are normally a weak shower of faint meteors, but they apparently gave rise
to a minor storm in 1945. Their maximum falls on the night of 22-23 December; the
radiant is near Beta Ursae Minoris, in the bowl of the Little Dipper.
The QUADRANTIDS, named for a now-defunct constellation, have their radiant roughly in
the centre of a triangle formed by the last star in the "tail" of the Big Dipper
(Alkaid), the head of Draco, and the "Keystone of Hercules" (RA 15 h 28 m, Decl.50°N).
There are no bright stars in this area - just a big nondescript patch which left an
embarrassing void in early star maps - hence the unsuccessful attempt to fill it with
a drawing labelled "Quadrans Muralis". The Quadrantids owe third among the "Big
Three" of the annual showers, with a rate of 40 meteors per hour (the Perseids are
first with a rate of 50+ per hour, the Geminids second with a rate of nearly 50).
However, it is a difficult shower to observe - the period of activity is less than a
day, and weather coalitions normally daunt all but the hardiest observers. The peak
of activity occurs on the night of 3-4 January, 1967. Dress warmly if you observe
Finally, for fireball report forms, meteor plotting charts, meteor record sheets, and
instructions in their use, write to the Meteor Centre, National Research Council,
Ottawa 2, Ontario, and return all data sheets there on completion.
If you want to talk about your meteoritical exploits and adventures, or would like
advice on getting started in this hobby of meteor observing, then write to me. Please
let me know the name of your Centre's meteor co-ordinator as well.
Stan Mott, National Co-ordinator,
Standing Committee on Observational Activities,
20149 Honeywell Avenue,
21 September, 1966 Ottawa 13, Ontario.
Meteor Section Bulletin No. 2 | <urn:uuid:50965ef7-1d91-44c6-af97-b566a39e79f7> | CC-MAIN-2014-41 | http://www.rasc.ca/content/660921meteor2 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657136181.32/warc/CC-MAIN-20140914011216-00072-ip-10-234-18-248.ec2.internal.warc.gz | en | 0.917844 | 2,073 | 2.640625 | 3 |
An astronaut aboard the International Space Station focused a camera on the White River where it pours milky-colored water into the blue-green of Lake Francis Case. The White River’s name—Makhízita wakpá, or “White Dirt River” in the Lakota language—derives from the white sediment it carries from erosion and weathering of rocks and soils upstream, especially limestone and volcanic ash from sources near South Dakota’s Badlands. (The white rocks exposed in the Badlands are visible in this photograph from the early days of the ISS.)
Lake Francis Case is an artificial reservoir on the Missouri River, and it fills the entire width of the Missouri River valley, marked by low but steep bluffs that line both shores. For scale, the bridge and causeway where Interstate Highway 90 crosses the reservoir (at the town of Chamberlain) is a mile long (1.6 kilometers). The town is the local commercial center for the many farms that surround Red Lake (top left).
Astronaut photograph ISS048-E-71652 was acquired on September 3, 2016, with a Nikon D4 digital camera using a 500 millimeter lens, and is provided by the ISS Crew Earth Observations Facility and the Earth Science and Remote Sensing Unit, Johnson Space Center. The image was taken by a member of the Expedition 48 crew. The image has been cropped and enhanced to improve contrast, and lens artifacts have been removed. The International Space Station Program supports the laboratory as part of the ISS National Lab to help astronauts take pictures of Earth that will be of the greatest value to scientists and the public, and to make those images freely available on the Internet. Additional images taken by astronauts and cosmonauts can be viewed at the NASA/JSC Gateway to Astronaut Photography of Earth. Caption by Justin Wilkinson, Texas State University, JETS Contract at NASA-JSC.
- ISS - Digital Camera | <urn:uuid:2311a814-5514-468f-a101-61e356d98f88> | CC-MAIN-2018-22 | https://earthobservatory.nasa.gov/IOTD/view.php?id=91096&src=iotdrss | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867841.63/warc/CC-MAIN-20180526170654-20180526190654-00039.warc.gz | en | 0.91486 | 397 | 3.078125 | 3 |
The Smithsonian Institution is is a special gem. Founded in 1846, it has provided inspiration and resources for literally generations of Americans and international visitors.
Today, many of the Smithsonian's resources are available on-line.
The Smithsonian Center for Learning and Digital Access created the Smithsonian Learning Lab to inspire the discovery and creative use of its rich digital materials—more than a million images, recordings, and texts. It is easy to find something of interest because search results display pictures rather than lists. Whether you've found what you were looking for or just discovered something new, it's easy to personalize it. Add your own notes and tags, incorporate discussion questions, and save and share. The Learning Lab makes it simple.
By encouraging users to create and share personalized collections of Smithsonian assets and user-generated resources, the Learning Lab aspires to build a global community of learners who are passionate about adding to and bringing to light new knowledge, ideas, and insight.
In addition to the Learning Lab, the Smithsonian has a very wide range of on-line resources, with everything from the National Postal Museum and the National Portrait Gallery to Folkways (world music, music history, and music for children).
The Smithsonian has a kids section with games, projects, stories and interactive activities. A sample of topics includes Build a Sod House, Choose Ur Style, Coral Reef Interactive, Do try this at home!, and OurStory: American History Stories and Activities.
Check out over 100 on-line exhibits, covering a wide variety of subjects from Fantastic Worlds: Science and Fiction, 1780-1910 to Views from the Lunar Reconnaissance Orbiter Camera and Solar Energy to The Great Inka Road: Engineering an Empire.
The Smithsonian Magazine is now online for your perusal. Check it out.
The Smithsonian may be of particular interest to history and science educators. The Smithsonian even has prepared a site in which math and American history are "integrated".
A little know fact about the founding of the Smithsonian...
It all started in 1826 when James Smithson, a British scientist, drew up his last will and testament, naming his nephew as beneficiary. Smithson stipulated that, should the nephew die without heirs (as he would in 1835), the estate should go "to the United States of America, to found at Washington, under the name of the Smithsonian Institution, an establishment for the increase and diffusion of knowledge among men."
It took another 20 years (until 1846) for the Smithsonian to become a reality. | <urn:uuid:2a99b0e0-39ed-44a2-b2c9-9bcfdd5ce793> | CC-MAIN-2018-43 | https://www.k12irc.org/tools/virtual/libraries/smithsonian.php | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512693.40/warc/CC-MAIN-20181020101001-20181020122501-00207.warc.gz | en | 0.919353 | 514 | 3.140625 | 3 |
http://www.rbdetectors.com – Call Russ at RB Detectors 702-987-1332
Pat Croce, the former president of the of the Philadelphia 76’ers basketball team and self confessed pirate buff, believes that his team of international explorers from the likes of Britain, Panama, Australia, France, Scotland, and Columbia are close to locating the watery grave of the British Naval hero, Sir Francis Drake.
Croce financed the expedition to the coast off Panama in order to hopefully locate the final resting place of Drake. The team is equipped with some of the most sophisticated equipment available and has located the ships, Elizabeth and Delight. They believe Drake’s lead lined coffin to be nearby. Croce said “It’s truly a needle in a haystack, but so were the ships. We found them within a week. We just haven’t found him – yet.” Croce continued “Explorers have been trying to do this stuff forever, and here I am, a homeboy from Philadelphia in the Caribbean and we score! It’s pretty wild.” Speaking about the ships, Croce said there was no treasure on board as they were stripped prior to being scuttled by the crew.
Sir Francis Drake died from dysentery at the age of 55. He was buried at sea in a lead lined coffin, wearing his full set of armor. Drake is considered a British Naval hero, having lead the English Navy to victory over Spanish Armada in 1588. Drake was also the first Englishman to circumnavigate globe.
James Sinclair a marine archeologist said “We’ve really, I feel, hit a home run here with what we found with Pat.” Sinclair added “Finding ship structures from that time period in this temperature water with the type of organisms that exist is a treasure in itself.”
I found the information for this video at Mail online, the author is Paul Thompson and you can find a link to it on my blog at http://www.treasurebone.blogspot.com.
If you come across some interesting treasure or archeology news or have an interesting find of your own let me know about it. You can email me at email@example.com or, there is a link to my email on my blog.
Well, that’s all I have for now. As Always, take care and happy hunting. Bye!
Visit our website: http://www.giveinsecret.net
This woman shares her testimony of being relieved of pain as a result of prayers during a Treasure Hunt outing.
The Treasure Hunt is a Christian Group. We meet a few times each week to pray and ask God the following questions:
Where do You want us to Go?
What is the appearance of the people You want us to pray for?
What are their prayer needs?
What are their names?
Is there anything else You want us to know?
After asking these questions, we write down the answers that come to our minds. What we each write down becomes our personal “treasure map”.
Then we go out in groups and find the people He has sent us to.
This process allows us to see how clearly and how accurately God speaks to us.
Come with us and be AMAZED at what God does.
The people in these groups come from many different churches and many different denominations.
They range from 7 year old children who are just beginning to learn about God to full time Pastors and Missionaries.
Go to http://www.giveinsecret.net to see what our community is doing and join in on the next Treasure Hunt! | <urn:uuid:2e55bf40-6a64-4c84-992d-f8cbe046b965> | CC-MAIN-2017-13 | http://searchlocated.com/tag/they/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187945.85/warc/CC-MAIN-20170322212947-00555-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.968804 | 768 | 2.5625 | 3 |
Physical Therapist's Guide to Osgood-Schlatter Disease
Osgood-Schlatter disease (OS) is an overuse injury causing pain in the knee area and often a visible growth just below the kneecap. The development of OS is most often a consequence of excessive stress to the front of the knee during periods of rapid skeletal growth. Because adolescents typically experience the greatest rate of skeletal growth, this population is most commonly affected by OS. The condition can be effectively treated by a physical therapist.
What is Osgood-Schlatter Disease?
Osgood-Schlatter disease occurs when there is irritation to the top, front portion of the shin bone (tibia) where the tendon attached to the kneecap (patella) meets the shin bone. It occurs when there is an increased amount of stress placed upon the bones where the tendons attach. This is most often the result of increased activity levels by an adolescent athlete.
Our musculoskeletal system is made up of bones and surrounding soft tissue structures, including muscles, ligaments (which connect bone to bone), and tendons (which connect muscle to bone). These structures all play a role in helping us move.
During adolescence our bodies grow at a rapid rate. As our bodies develop, our bones are growing longer. Throughout this phase, our growth plates (epiphyseal plates) are susceptible to injury. A growth plate is the site at the end of a bone where new bone tissue is made and bone growth occurs. Females typically experience the most rapid growth between approximately 11 to 12 years of age, and males typically experience this growth surge between approximately 13 and 14 years of age. Males experience OS more frequently than females, likely due to an increased rate of sports participation.
Structures in our body might become irritated if they are asked to do more than they are capable of doing. Injuries can occur in an isolated event, but OS disease is most likely the cumulative effect of repeated trauma. OS is most frequently experienced in adolescents who regularly participate in running, jumping, and "cutting" (rapid changes in direction) activities.
When too much stress is present (ie, from rapid growth) and when the body is overworked (ie, either too much overall volume of exercise, or too much repetition), the top of the shin can become painful and swollen. As this condition progresses, the body’s response to bone stress can be an increase in bone production; an adolescent may begin to develop a boney growth that feels like a bump on the front of the upper shin.
OS can start as mild soreness, but can progress to long-lasting pain and limited function, if not addressed early and appropriately.
How Does it Feel?
With Osgood-Schlatter, you may experience:
- Gradually worsening pain below your knee, at the top of the shin bone.
- Pain that worsens with exercise.
- Swelling and tenderness at the top of the shin.
- A boney growth at the top of the shin.
- Loss of strength in the quadriceps muscle (connecting the hip to the knee).
- Increased tightness in the quadriceps muscle.
- Loss of knee motion.
- Discomfort with daily activities that use your knee, like kneeling, squatting, or walking up and down stairs.
How Is It Diagnosed?
Diagnosis of OS begins with a thorough medical history, including specific questions regarding athletic participation (sports played, frequency of practices/games, positions). Your physical therapist will assess different measures, such as sensation, motion, strength, flexibility, tenderness, and swelling. Your physical therapist will perform several tests specific to the knee joint, and may ask you to briefly demonstrate the activities or positions that cause your pain, such as walking, squatting, and stepping up or down stairs.
Because the knee and hip are both involved in these aggravating activities, your physical therapist will likely examine your hip as well. Other nearby areas, such as your feet and core, will also be examined to determine whether they, too, might be contributing to your knee condition.
If your physical therapist suspects there may be a more involved injury than increased stress-related irritation (ie, if there is a recent significant loss of motion or strength, or severe pain when the knee is moved), your therapist will likely recommend a referral to an orthopedic physician for diagnostic imaging, such as ultrasound, x-ray, or MRI.
How Can a Physical Therapist Help?
Once other conditions have been ruled out and OS is diagnosed, your physical therapist will work with you to develop an individualized treatment plan tailored to your specific knee condition and your goals. The goal of physical therapy is to accelerate your recovery and return to pain-free activity. There are many physical therapy treatments that have been shown to be effective in treating OS, and among them are:
Range of Motion Therapy. Your physical therapist will assess the motion of your knee and its surrounding structures, and design gentle exercises to help you work through any stiffness and swelling to return to a normal range of motion.
Strength Training. Your physical therapist will teach you exercises to strengthen the muscles around the knee so that each muscle is able to properly perform its job, and stresses are eased so the knee joint is properly protected.
Manual Therapy.Physical therapists are trained in manual (hands-on) therapy. If needed, your physical therapist will gently move your kneecap or patellar tendon and surrounding muscles as needed to improve their motion, flexibility, and strength. These techniques can target areas that are difficult to treat on your own.
Pain Management.Your physical therapist may recommend therapeutic modalities, such as ice and heat, or a brace to aid in pain management.
Functional Training.Physical therapists are experts at training athletes to function at their best. Your physical therapist will assess your movements and teach you to adjust them to relieve any extra stress on the front of your knee.
Education. The first step to addressing your knee pain is rest. Your physical therapist will explain why this is important and develop a plan for your complete rehabilitation.
Can this Injury or Condition be Prevented?
Fortunately, there is much that can be done to prevent the cascade of events that lead to OS. Physical therapists focus on:
- Educating coaches, parents, and athletes on guidelines for sports participation, explaining common causes of overuse injuries, and providing strategies for prevention.
- Educating athletes on the risks of playing through pain.
- Scheduling adequate rest time to recover between athletic events.
- Tracking a young athlete’s growth curves (height, weight, BMI) to identify periods of increased injury risk.
- Developing an athlete-specific flexibility and strengthening routine to be followed throughout the athletic season.
- Encouraging consultation with a physical therapist whenever symptoms appear.
Real Life Experiences
Caleb is a 13-year-old boy who has been playing basketball since he was in the first grade. When younger, Caleb played only during the winter season. Over the course of the last year, however, he has attended 2 basketball camps during the summer, played on his middle-school team during the winter, and is now playing AAU basketball in the spring.
Caleb also chose to join the track team this spring, competing in the high jump and sprint events to improve his basketball skills. Over the past 3 months, Caleb has grown 2 inches, and both he and his basketball coaches are excited about his recent growth.
Recently, Caleb has been busy playing in weekly AAU tournaments with 1 to 2 track meets during the week. But when he got home from track practice on Monday, he told his dad that his leg was hurting. He said that it had begun getting sore while playing basketball over the weekend, but he didn’t want to tell his coach because he wanted to continue to play. Now he feels like the top of his shin is tender to touch, and he is unable to fully bend his knee without increased pain.
His dad realizes that this is more than the expected postactivity soreness; he immediately calls their local physical therapist.
Caleb's physical therapist takes his health history and performs an extensive examination. It becomes clear that Caleb has not scheduled appropriate rest times between his athletic activities, and that he is experiencing a growth spurt. The physical examination reveals that the top of Caleb’s shin is very tender, the area around his knee is swollen, and he has lost knee motion and strength. OS is diagnosed.
Together, Caleb and his physical therapist, father, and basketball and track coaches develop a treatment plan to help him return to pain-free sport participation. It begins with a 2-week period of rest where Caleb performs only minimal running exercise, and works regularly with his physical therapist on stretching, strengthening, balance, and coordination exercises, and on improving his squatting movements.
While at basketball practice, Caleb continues to work on his ball handling and free-throw shooting, activities that won't increase his knee pain.
After 2 weeks, when his knee is less tender, Caleb, his physical therapist, and his coaches develop a plan for his gradual return to full participation in track and basketball. They help Caleb understand how important it is to be honest about his knee pain, and to communicate with his coach if it starts to bother him again.
A month later, Caleb is back participating in all his track and basketball activities. He has changed his routine to allow for adequate warm-up time before and after each practice, and sufficient rest periods between activities. He makes sure his dad or coaches are keeping track of how much time he spends at practice and at rest.
Caleb decides to spend more time during the week working on his stretching, so he can reduce any risk of pain as he continues to grow. At the end of the season, Caleb’s AAU team wins the state championship—and he sets a new personal-best record in both the high jump and the 100-meter sprint!
What Kind of Physical Therapist Do I Need?
All physical therapists are prepared through education and clinical experience to treat a variety of conditions or injuries. You may want to consider:
- A physical therapist who is experienced in treating people with orthopedic or musculoskeletal injuries.
- A physical therapist who is a board-certified specialist or has completed a residency in orthopedic or sports physical therapy, as the therapist will have advanced knowledge, experience, and skills that apply to an athletic population.
You can find physical therapists that have these and other credentials by using Find a PT, the online tool built by the American Physical Therapy Association to help you search for physical therapists with specific clinical expertise in your geographic area.
General tips when you're looking for a physical therapist (or any other health care provider):
- Get recommendations from family and friends or from other health care providers.
- When you contact a physical therapy clinic for an appointment, ask about the physical therapists' experience in helping young athletes with knee pain.
- During your first visit with the physical therapist, be prepared to describe your symptoms in as much detail as possible, and report activities that make your symptoms worse.
The American Physical Therapy Association (APTA) believes that consumers should have access to information that could help them make health care decisions, and also prepare them for a visit with their health care provider.
The following articles provide some of the best scientific evidence related to physical therapy treatment of athletic injuries. The articles report recent research and give an overview of the standards of practice both in the United States and internationally. The article titles are linked either to a PubMed* abstract of the article or to free full text, so that you can read it or print out a copy to bring with you to your health care provider.
Whitmore A. Osgood-Schlatter disease. JAAPA. 2013;26(10):51–52. Article Summary on PubMed.
Maffulli N, Longo UG, Spiezia F, Denaro V. Aetiology and prevention of injuries in elite young athletes. Med Sport Sci. 2011;56:187–200. Article Summary on PubMed.
Stein CJ, Micheli LJ. Overuse injuries in youth sports. Phys Sportsmed. 2010;38(2):102–108. Article Summary on PubMed.
* PubMed is a free online resource developed by the National Center for Biotechnology Information (NCBI). PubMed contains millions of citations to biomedical literature, including citations in the National Library of Medicine’s MEDLINE database.
Authored by Allison Mumbleau, PT, DPT, SCS. Reviewed by the MoveForwardPT.com editorial board.
Provided by the | <urn:uuid:079ce49e-d158-4345-a5db-d2d661d27646> | CC-MAIN-2022-33 | https://southaikenpt.com/condition-osgood-schlatter-disease/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00407.warc.gz | en | 0.960205 | 2,634 | 3.4375 | 3 |
Integrative Thinking explained
New to Integrative Thinking?
What is Integrative Thinking and how does it work?
More and more, employers are demanding that the pool of MBA grads from which they hire is ready to tackle complex business problems in real time. Teaching them to be specialists in one field is no longer an option. The Rotman School is breaking with tradition to teach the ingenuity and adaptive intelligence required for our grads to respond on their feet to problems that haven't been thought of yet.
How do you think? Do I think differently from you? Many things shape the way we think – our background, training, and our way of seeing the world. What’s interesting to know is that we can create models or maps—blueprints—of how we think, and how others think. Being able to hold these different viewpoints in our mind’s eye is like viewing a many-faceted diamond. And it can change the way we see the world.
You might ask why anyone would want to do something that makes their head hurt? Stepping outside your own mind is not easy. But it is worthwhile. It opens the door to creating more effective and inventive solutions. In fact, Integrative Thinking is all about modelling and bridging the limitations of our conditioned thought patterns. Our graduates are trained to find exceptional solutions to wicked problems.
Here's how former Rotman Dean Roger Martin describes it: "The typical way of dealing with problems is to list several solutions and decide on the best one, as though it were wrong to select more than one. Business students are taught to analyze business problems in this way: option A yields $2.8 million, option B yields $3.4 million, so option B is superior. Integrative Thinking is a mindset that leads you to a new option, which combines the best elements of A and B. It’s a creative act."
Higher education is in crisis--there's a disconnect between what students learn and what employers need them to know. The Rotman School has developed Integrative Thinking to teach ingenuity and adaptive intelligence so that our students graduate with long-lasting techniques for framing problems, learning consciously, precisely and continuously, and drawing from diverse disciplines.
Because of this, our graduates are equipped to tackle problems that don't even exist yet.
Rotman is serious about transforming higher education to equip students to address real problems in the real world. Rotman is bringing problem solvers to the world…A new way to think…A new way to do business. | <urn:uuid:4eabebe3-62e0-4f0e-8dfe-cfeacca86aa6> | CC-MAIN-2022-21 | https://www.rotman.utoronto.ca/FacultyAndResearch/ResearchCentres/DesautelsCentre/Integrative%20Thinking/New%20to%20Integrative%20Thinking.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662604495.84/warc/CC-MAIN-20220526065603-20220526095603-00430.warc.gz | en | 0.962345 | 519 | 2.796875 | 3 |
It’s come up in a couple of ways how my (in progress) activity-based framework for learning is related to other models, e.g. performance-based learning. And, looking around, I am reminded that there’s a plethora of models that have overlap. I’ll try to sort them out. This will undoubtedly be an ever-growing list, as there seems to be X-based learning where X = anything, and I’m sure folks supportive of their approach will let me know ;). Recognize that these are very sketchy descriptions, intended to communicate similarities, not tease apart deep nuances.
At core is the reasoning that meaningful activities have myriad benefits. Learners are engaged in working on real things, and the contextualization facilitates transfer to the extent that you’ve designed the activity to require the types of performance they’ll need in the world. There’s the opportunity to layer on multiple learning goals from different domain, and 21st century skills like media communications, and if it’s social (which is a recurring theme in these models) you get things like leadership and teamwork as well. Better engagement and learning outcomes are the big win.
First, there’s already an activity-based learning out of India! It seems to focus on having learners do meaningful things, which very much is at core here. There’s also an activity-based curriculum, by the way, which is also the way I’m thinking of it: a sequence of activities is a curriculum. This fits within active learning, arguably, in that there’s a desire for the learner to be actually doing something as the basis of learning, though the types of classroom activities of debates and discussions seem not as powerful as others cited below.
So, performance-based learning seems to be focused on assessment, having the students actively demonstrate their ability. This is, to me, an important aspect, as cognitive science recognizes that passing a knowledge test about something is not likely to transfer to the ability to do (we call it ‘inert knowledge’). That’s the point of having products of activities, at least reflection , so it sounds very much is in synergy. This also appears to be the focus of outcomes-based learning, which also emphasizes actual production, but while touting constructivism seems to end up being more a tool of the status quo. This can also be similar (and ideally should be) to competency-based learning, where there are explicit performance outcomes expected, rather than grading on the curve.
And there is problem-based learning and project-based learning. Both focus on having learners engage in meaningful activity, with the distinction between the two having to do with whether the problem is set by the instructor, or whether the project is decided is decided by the students. There are arguments for both, of course; for me, problems are easier to specify, it takes a special teacher to help shape a project and wrap the learning goals around it. I reckon serious games are problem-based learning, by the way.
Service learning is another related idea, that has learners doing meaningful projects out in the community. This is activity-based and expands upon the meaningfulness by connecting it to the community. I’ve been a fan of the Center for Civic Education’s Project Citizen as an example of this, having students try to pass legislation to improve things in their area, and consequently learning about law-making.
Inquiry-based learning shares the focus on activities of information gathering, but has primarily been based in science. It seems to not have a goal other than exploration and understanding, with an even more extreme view of learner control. This seems good with a self-motivated learner, and as long as the learner is either a self-capable learner, or there’s a facilitator, it could work. This seems very similar to the MOOC approach of Siemens & Downes. It also seems to be almost identical to the community of inquiry approach.
I frankly want an activity-based pedagogy and curriculum to support all of these models. The benefits, and the resistance to knowledge dump and fact test forms of learning, drive this perspective. Getting there requires a different type of learning design that one focused on standards. You need to shift, focusing on what do the students need to be able to do afterwards, and working backward from there. Understanding by design is a design approach that works backwards from goals, and if you set your outcomes on performance, and then align activities to require that performance, you have a good chance of impacting pedagogy, and learning, in meaningful ways. I admit it surprises me that this needs to be pointed out, but I see the consequences of content-driven (forward) design too often to argue.
The point is to find an umbrella that holds a suite of appropriate pedagogies and makes it difficult to do inappropriate ones. As Les Foltos tweeted: “We need to fan the fires for these instructional strategies. They don’t align well with standardized tests”. Exactly. | <urn:uuid:164d1ae8-9a93-4b43-a18f-7ad60d691318> | CC-MAIN-2019-51 | https://blog.learnlets.com/2012/04/x-based-learning-sorting-out-pedagogies-and-design/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529006.88/warc/CC-MAIN-20191210205200-20191210233200-00457.warc.gz | en | 0.971661 | 1,058 | 2.5625 | 3 |
Subtropical and Dry Climate Plants
During summer's heat, it's fun for desert-plant-lovers to stay cool indoors and comb through books and catalogs, seeking something different to try next fall. Author Martyn Rix has compiled possible choices in his book, Subtropical and Dry Climate Plants (Timber Press, 2006). It showcases garden plants with native origins in the Mediterranean, Canary Islands & Madeira, South Africa, California, Mexico south to Chile & Argentina, China & India, and Australia & New Zealand. Included are descriptions of the regions that you can compare to your own gardening conditions for plant compatibility. The Plant Directory covers trees, shrubs, climbers, perennials, bulbs, annuals, and cacti and other succulents. Rix notes that "In most cases only one or two plants of each genus have been included, giving as wide a range of different-looking plants as possible." Thus, not all the plants included will perform in all areas of the Southwest, but a careful reading of the description can help you determine whether to give it a try. Check the Native Geographical Region, Drought Tolerance, Hardiness, Cultivation Information, and Climate symbols (Desert, Mediterranean, Subtropical, Wet) and other details. If a plant isn't suited to your region, beautiful photos may send you in search of another species in that genus that is!
Clever Gardening Technique
Have Containers, Will Travel
Take your containers with you to the nursery and mix and match potential plant combinations on-site. Look at container combos at the nursery for ideas and ask personnel for recommendations. This helps maintain your color scheme and you head home with sufficient plants. It's so annoying to arrive home, start planting up a masterpiece and realize it needs just a little something else. | <urn:uuid:7fb6419b-7cd9-4697-8944-8e2d7f2669e1> | CC-MAIN-2015-35 | http://www.garden.org/regional/report/arch/gv/4517 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065330.34/warc/CC-MAIN-20150827025425-00261-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.921046 | 373 | 3.203125 | 3 |
You wake up in the morning and determine to be happy, but your happiness can be short- lived because of other factors not within your control and they are sending negative signals to disturb your peace of mind. To be totally happy you have to handle the three components of happiness well. The three components are resolution, reaction and relation. Let’s take a look at each and every one in detail.
This is at a personal level. Things are within your control. You make up your mind either to attract or repel happiness. Check the following:
- Choice: You decide and you make a choice. Do you want to be cheerful or grumpy to start a new day?
- Health: Health and happiness go hand in hand. Happiness promotes good health and good health enhances happiness. It is up to you to treat your own body with care or to ruin it.
- Emotions: Again, you make a wise choice. Are you thinking of kindness, forgiveness or anger, resentment and bitterness?
- What have you: Are you happy with what you have or you decide to be happy only when you have a more expensive car and a bigger house? Happiness and contentment are making the best use of what you have and enjoying it now.
- Financial situation: Are you in debt? Do you live on credit to satisfy your wants in life? Can you sleep soundly at night because during the day creditors are after you for money. Happiness is debt free and living within your means.
- Your self-esteem: Are you appreciative of your self-worth. Are you happy as what you are with your strengths and weaknesses? Be proud of yourself and love yourself without reservation.
- Work: Do you enjoy your work or do you have to go to work? Your work is not an issue, just change your attitude and find happiness in your work.
At this level things are not within your control. What is within your control is your response and reaction:
- Looking at the bright side of things: Do you see problems as challenges or nuisance? When you are out of job do you curse and swear or take the opportunity to improve yourself so that you are more marketable?
- Handle stressful situation: Angry at having too much work to do? Do not aggravate the situation by making the situation more stressful. Leave your negative emotions aside and just be mindful and concentrate on one task at a time to complete the job. If it has to be done why not do it wholeheartedly and happily?
- Mistakes and humiliation: Accept the mistake gracefully and promise yourself not to repeat the mistake instead of putting the blame on others. Tomorrow is a brand new day. Just do the right thing. What is done cannot be undone.
There is a two-way traffic at this level. It is about how you go about interacting with others and what the responses are like:
- Family: A harmonious family is teamwork. Every one in the household is supporting one another to bring peace and happiness at home. Trust and integrity is highly valued and transgression is not acceptable. When you look after the interests of family members, you sleep at night not only with a soft pillow but with a clear conscience as well.
- At the workplace: Paying attention to your co-workers and looking into their welfare pay dividend. You are noticed and appreciated by others.
- Social connection: Are you friendly and responsive? Always wear a smile and acknowledge the presence of others. Listen carefully when someone is talking to you and find out what you can do for him or her.
- Random acts of kindness: It is all very simple just by saying a few kind words to people you meet. It costs you nothing but it brings delight and happiness to others. Simple words like telling the receptionist at the counter that her dress is pretty and compliment your coworker that his new hairstyle is marvelous. Just pay attention to others and find out the good things to say. I am sure by doing it you are happy too.
Total happiness is about managing yourself positively, react to events positively and relate to others positively.
Charles Chua is a freelance writer and runs the blog All About Living with Life. | <urn:uuid:34af3f98-b559-4a62-babb-f5d4a1692269> | CC-MAIN-2014-10 | http://www.pickthebrain.com/blog/the-3-r%E2%80%99s-to-total-happiness/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010502819/warc/CC-MAIN-20140305090822-00060-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.963788 | 858 | 2.75 | 3 |
We create, and change computer files everyday. These files are important to each of us. Protect these files by making copies of them. I would even put the copies in a safe place away from the computer.
Making backup copies of files is something that I learned before I started my computer career. Writing papers and working on programming assignments, I would always make copies of my work. There is a very practical reason for these backups. It’s to make your files available if the originals become lost. Simple. You don’t even need special software or scripts to protect your files. Just plug a USB flash drive, or some other storage media in a open port. Once your system mounts the drive, just copy and paste your files there.
With storage media being so cheap these days, there is no reason why you don’t make backup copies of your files. From USB flash drives to portable external hard drives, there are many options for making backups. In fact, you can purchase your media right here at our online store (http://www.hornerconsulting.com/shopatamazon.html).
I recommend making backups of files that are most critical to you. If you have files that change often, copy them before making changes. This way if your changes don’t work, you can always restore the file before your changes. That’s an old programmers trick. | <urn:uuid:7e446e1a-657c-4468-9ff1-545bc275c6fc> | CC-MAIN-2019-43 | http://www.hornerconsulting.com/backups-are-a-good-idea/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987763641.74/warc/CC-MAIN-20191021070341-20191021093841-00263.warc.gz | en | 0.933693 | 288 | 3.1875 | 3 |
London, Jan 20 (UNI) Mothers whose babies have cancer are at an increased risk of developing breast cancer, according to a study.
The mutation of a gene known as p53-- which all of us have and which normally suppresses cancer-- could mean that mothers and their children are more susceptible to the disease.
The faulty gene could affect steroid and hormone levels in the womb, which may not only predispose children to cancer but also sensitise mothers' breast tissue.
The groundbreaking study follows research which identified a link between children with soft-tissue sarcomas-- a form of cancer usually found in teenagers-- and mothers with breast cancer.
The study shed fresh light on inherited forms of cancer which could eventually lead to better identifying of those most at risk.
The study was conducted by Manchester University scientists led by Dr Dong Pang. It showed the heightened risk of breast cancer among mothers of children with solid tumours was not uniform across all groups, but was associated with a small number of tumour types and patient characteristics.
Breast cancer cases were found most frequently in mothers of children with rhabdomyosarcoma, a cancer of the connective tissues.
Mothers were also more likely to develop breast cancer in cases where the child had skin cancer or a cancer affecting the central nervous system.
UNI XC YA RS1418 | <urn:uuid:81777ae6-069b-4507-b9be-b6b2ba6b7687> | CC-MAIN-2017-39 | https://www.oneindia.com/2008/01/20/mothers-whose-babies-have-cancer-at-greater-risk-of-breast-cancer-1200901810.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695439.96/warc/CC-MAIN-20170926103944-20170926123944-00392.warc.gz | en | 0.978276 | 280 | 3.28125 | 3 |
Written By Miracle Hawkins, Contributing Writer
“Self-care means taking time to do things you enjoy, and taking care of yourself. When used consistently, self-care can reduce stress, relieve uncomfortable emotions, and improve physical health” (Therapist Aid, 2020). Self-care has always been important, but is now even more necessary in the unprecedented times we are currently living in. We are experiencing increased stress, feelings of uncertainty, and intense anxiety. All of these things can have a huge impact on not only our mental health but our physical health as well. Much research has been done on the impacts of stress on physical and psychiatric functioning.
“Researchers have examined a range of stressors from acute, high-intensity events to chronic, moderate-level challenges, and found a consistent pattern of immune alterations” (Larzelere & Jones, 2008). Ultimately, this means that stress weakens our immune systems. This is a major concern right now because we are in a worldwide health crisis! Stress also has well-known effects on the cardiovascular system, such as increased heart rate and blood pressure. In addition, stress causes changes in our health behaviors. This includes substance use, overeating, not eating enough, sleeping too much, not sleeping at all, and living inactive lifestyles.
In order to protect our health and overall well-being, it is important to recognize what mechanisms or strategies we are using to cope with the stress in our lives. Stress is inevitable, and this is especially true in a global pandemic. With that being said, we cannot expect to live completely stress-free lives. Instead, we must find ways to cope with and reduce stress.
As mentioned earlier, taking care of ourselves and doing things that we enjoy can reduce stress and improve our physical health. For example, having a nighttime routine that you engage in consistently. In times of stress, our brains crave consistency. A nighttime routine is therapeutic self-care and helps to give us consistency. The following tips on how to create your own nighttime routine can help with decreasing stress:
- First, choose a time that you want to begin your nighttime routine and then set an alarm so that you will be reminded each day when to start your routine (consistency is key!)
- Next, use a journal to write down any racing thoughts or feelings you are experiencing at the end of each day. Getting your thoughts and feelings out on paper will help eliminate overwhelming thoughts and help you gain more control of your stress and anxiety.
- Write down a to-do list of any tasks and plans you have for the following day. This will also allow you to reduce any overthinking or negative thoughts.
- Incorporate a skin-care regimen (use cleansers, moisturizers, and soothing face masks)
- Next, decide what will help you wind down at the end of your day?
- Read a book
- Take a hot shower or bath
- Listen to music
- Burn a candle or incense
- Do 15-minutes of stretching or yoga
- Practice breathing exercises
- Engage in prayer/meditation. Meditate on the good things that are happening in your life and demonstrate gratitude for what you do have versus what you don’t. Expressing gratitude helps improve our moods and overall mental health.
- Have a bedtime! Set a specific time you will lay down for bed. Remember, rest is very important as it allows our minds and bodies to recover.
- Lastly, write your routine down and place it in your room or bathroom until you become consistent with implementing it into your daily routine. Remember to be patient with yourself as you work towards incorporating new ways to cope with stress!
Therapist Aid. (2020). Self-care tips. https://www.therapistaid.com/therapy-worksheet/self-care-tips
Larzelere, M. M., & Jones, G. N. (2008). Stress and health. Primary Care: Clinics in Office Practice, 35(4), 839-856. https://doi.org/10.1016/j.pop.2008.07.011 | <urn:uuid:3f275264-a176-418d-b1fc-03a03d2d04bb> | CC-MAIN-2022-27 | https://lesliestevenslpc.com/consistently-coping-how-a-nighttime-routine-can-decrease-stress/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103877410.46/warc/CC-MAIN-20220630183616-20220630213616-00571.warc.gz | en | 0.934188 | 872 | 3.09375 | 3 |
breast reconstruction(redirected from Breast reconstruction surgery)
Breast reconstruction is a series of surgical procedures performed to recreate a breast. Reconstructions are commonly done after one or both breasts are removed as a treatment for breast cancer. Also, a breast may need to be refashioned for other reasons, such as trauma or abnormalities that occur during breast development.
Many authorities consider reconstruction an integral part of the therapy for breast cancer. A breast that appears natural offers a sense of wholeness and normalcy, which can aid in the psychological recovery from breast cancer. It eliminates the need for an external prosthesis (false breast), which many women find physically uncomfortable as well as inconvenient.
Not all women are good candidates for breast reconstruction. Overall poor physical health, or specific problems such as cigarette smoking, obesity, high blood pressure, or diabetes, will increase the chance of complications. Also, a difficult and/or prolonged recovery period or failure of the reconstruction may be a result. A woman's physical ability to cope with major surgery and recuperation also need to be considered.
Breast reconstruction is done in two stages, with the ultimate goal of creating a breast which looks and feels as natural as possible. It is important to remember that while a good result may mimic a normal breast closely, there will inevitably be scars and loss of sensation. The reconstructed breast cannot be exactly like the original.
The first step is to form a structure called a breast mound. This can be accomplished using artificial materials called breast implants, or by using tissues from other parts of the woman's body. The second
step involves creating a balance between the newly constructed breast and the breast on the opposite side. The nipple and areolar complex (darker area around the nipple) are recreated. This is usually done several months after the mound is created, to allow swelling to go down. Other procedures may be necessary, such as lifting the opposite breast (mastopexy), or making it larger or smaller to match the reconstructed breast.
Timing, immediate or delayed reconstruction
While immediate reconstruction (IR) is not recommended for women with breast cancer who need to undergo other, more important treatments, breast reconstruction can be done almost anytime. It even can be done during the same procedure as the mastectomy, or it can be delayed. There are psychological benefits to IR. The ability to return to normal activities and routines is often enhanced when reconstruction follows immediately after mastectomy. A better appearance may result from IR. There is less skin removal, often resulting in a shorter scar. The surgeon is better able to preserve the normal boundaries of the breast, so it is easier to match the opposite breast more closely.
The cost of IR is generally lower than the cost of delayed reconstruction (DR). There is one fewer operation and hospital stay. Surgeon's fees may be lower for a combined procedure than for two separate surgeries.
There are disadvantages of IR as well. The surgery itself is longer, causing more time under anesthesia. Post-operative pain and recovery time will be greater than for mastectomy alone.
Other authorities contend that delayed reconstruction (DR) offers different physical and psychological advantages. The initial mastectomy procedure alone takes less time, and has a shorter recovery period and less pain than mastectomy and IR. The patient has more time to adjust to her diagnosis and recover from additional therapy. She is better able to research her options, and to formulate realistic goals for reconstruction. Some reconstructive surgery requires blood transfusions. With DR, the patient can donate her own blood ahead of time (autologous transfusion), and/or arrange to have family and friends donate blood for her use (directed donation).
The psychological stress of living without a breast is a disadvantage of DR. The extra procedure DR entails results in higher costs. Although initial recovery is faster, an additional recuperation period is required after the delayed operation.
Type of reconstruction
There are two basic choices for breast reconstruction. The breast tissue can be replaced with an implant or the breast is created using some of the woman's own tissues (autologous reconstruction).
ARTIFICIAL IMPLANTS. In general, implant procedures take less time, and are less expensive than autologous ones. Implants are breast shaped pouches. They are made of silicone outer shells, which may be smooth or textured. The inside may contain silicone gel, saline (salt water), or a combination of both.
An implant may be a fixed volume type, which cannot change its size. Implants that have the capacity to be filled after insertion are called tissue expanders. These may be temporary or permanent.
The initial procedure for any implant insertion uses the mastectomy incision to make a pocket of tissue, usually underneath the chest wall muscle. In DR, the mastectomy scar may be re opened and used for this purpose, or a more cosmetic incision may be made. The implant is inserted into the pocket, the skin is stretched as needed and stitched closed.
If there is inadequate tissue to achieve the desired size, or a naturally sagging breast is desired, a tissue expander is used. It resembles a partially deflated balloon, with an attached valve or port through which saline can be injected. After the initial surgical incision is healed, the woman returns to the doctor's office, on a weekly or bi-weekly basis, to have small amounts of saline injected. Injections can continue for about six to eight weeks, until the preferred size is obtained. In some cases it may be overfilled, and later partially deflated to allow for a more pliable, natural result. A temporary tissue expander will be removed after several months and replaced with a permanent implant.
Autologous — From the same person. An autologous breast reconstruction uses the woman's own tissues. An autologous blood transfusion is blood removed then transfused back to the same person at a later time.
Capsular contracture — Thick scar tissue around a breast implant, which may tighten and cause discomfort and/or firmness.
Flap — A section of tissue moved from one area of the body to another.
Free flap — A section of tissue detached from its blood supply, moved to another part of the body, and reattached by microsurgery to a new blood supply.
Mastopexy — Surgical procedure to lift up a breast. May be used on opposite breast to achieve symmetrical appearance with a reconstructed breast.
Pedicle flap — Also called an attached flap. A section of tissue, with its blood supply intact, which is maneuvered to another part of the body.
IR surgery using an implant takes approximately two to three hours, and usually requires up to a three day hospital stay. Implant insertion surgery, as part of DR, takes one to two hours and can sometimes be done as an outpatient, or it or it may entail overnight hospitalization.
AUTOLOGUS RECONSTRUCTION. Attached flap and free flap are two types of surgery where a woman's tissue is used in reconstruction. An attached flap uses skin, muscle, and fat, leaving blood vessels attached to their original source of blood. The flap is maneuvered to the reconstruction site, keeping its original blood supply for nourishment. This may also be known as a pedicle flap. The second kind of surgery is called a free flap. This also uses skin, muscle, and fat, but severs the blood vessels, and attaches them to other vessels where the new breast is to be created. The surgeon uses a microscope to accomplish this delicate task of sewing blood vessels together. Sometimes the term microsurgery is used to refer to free flap procedures. Either type of surgery may also be called a myocutaneous flap, referring to the skin and muscle used.
The skin and muscle used in autologous reconstruction can come from one of several possible places on the body, including the abdomen (TRAM flap or "tummy tuck"), the back (latissimus dorsi flap), or the buttocks (gluteus maximus free flap).
Finishing the reconstruction
Other procedures may be necessary to achieve the goal of symmetrical breasts. It may be necessary to make the opposite breast larger (augmentation), smaller (reduction), or higher (mastopexy). These, or any other refinements should be completed before the creation of a nipple and areola. Tissue to form the new nipple may come from the reconstructed breast itself, the opposite breast, or a more distant donor site, such as the inner thigh or behind the ear. The nipple and areolar construction is usually an outpatient procedure. A final step, often done in the doctor's office, is tattooing the new nipple and areola, to match the color of the opposite nipple and areola as closely as possible.
Insurance coverage for breast reconstruction varies widely. Some policies will allow procedures on the affected breast, but refuse to pay for alterations to the opposite breast. Other plans may cover the cost of an external prosthesis, or reconstructive surgery, but not both. As of January 1998, 25 states had different laws regarding required insurance coverage for post mastectomy reconstruction.
Implants may pose additional insurance concerns. Some companies will withdraw coverage for women with implants, or add a disclaimer for future implant-related problems. Careful reading of insurance policies, including checking on the need for pre-approval and/or a second opinion, is strongly recommended.
Routine preoperative preparations, such as taking nothing to eat or drink the night before surgery are needed for reconstructive procedures. Blood transfusions are often necessary for autologous reconstructive surgeries. The patient may donate her own blood, and/or have family and friends donate several weeks before the surgery.
Emotional preparation is also important. Breast reconstruction will not resolve a psychological problem the woman had before mastectomy, nor make an unstable relationship strong. An expectation of physical perfection is unrealistic. A woman who cites any of these reasons for reconstruction shows that she has not been adequately informed or prepared. Complete understanding of the benefits and limitations of this surgery is necessary for a satisfactory result.
The length of the hospital stay, recovery period, and frequency of visits to the doctor after surgery varies considerably with the different kinds of reconstruction. In general, autologous procedures require longer hospitalization and recovery time than implant procedures. Bandages and drainage tubes remain in place for at least a day for all surgeries. Microsurgical or free flaps are most closely monitored in the first day or two after surgery. The circulation to the breast may be checked as often as every hour. Complete breast reconstruction requires at least one additional surgery to create a nipple and areola. Scars may remain red and raised for a month or longer. The true, final appearance of the breasts will not be visible for at least one year.
Some women have reported various types of autoimmune related connective-tissue disorders, which they attribute to their implants—usually involving silicone gel implants. Lawsuits have been filed against the manufacturers of implants. Food and Drug Administration guidelines, issued in 1992, now limit their use to women who need to replace an existing silicone gel-filled implant, have had surgery for breast cancer, or have a medical condition which results in serious breast abnormality. In addition, patients must sign a consent form which details the potential risks of silicone gel-filled implants, and become enrolled in a long range study. Saline filled implants are permitted for all uses, although manufacturers must collect data on possible risks.
The FDA issued a status report on Breast Implant Safety in 1995, and revised it in March 1997. It noted that studies so far have not shown a serious increase in the risk of recognized autoimmune diseases in women with silicone gel-filled breast implants. It also addressed concerns about other complications and emphasized the need for further study of this issue.
There are a number of risks common to any surgical procedure such as bleeding, infection, anesthesia reaction, or unexpected scarring. Hematoma (accumulation of blood at the surgical site), or seroma (collection of fluid at the surgical site) can delay healing if not drained. Any breast reconstruction also poses a risk of asymmetry and/or the need for unplanned surgical revision. Persistent pain is another potential complication possible with all types of breast reconstruction.
Implants have some unique problems that may develop. A thick scar, also called a capsule, forms around the implant, as part of the body's normal reaction to a foreign substance. Capsular contracture occurs when the scar becomes firm or hardened. This may cause pain and/or change the texture and appearance of the breast. Implants can rupture and leak, deflate, or become displaced. The chances of capsular contracture or rupture increase with the age of the implant. These complications can usually be remedied with outpatient surgery to loosen the capsule or remove and/or replace the implant as needed. There is some evidence that using implants with textured surfaces may decrease the incidence of these problems. An implant tends to remain firm indefinitely. It will not grow larger or smaller as the woman's weight changes. Asymmetry can develop if a woman gains or loses a large amount of weight.
The autologous procedures all carry a risk of flap failure—loss of blood supply to the tissue forming the new breast. If a large portion of the flap develops inadequate blood supply, another reconstructive technique may be necessary. TRAM flap procedures can result in decreased muscle tone and weakness in the abdomen and/or abdominal hernia. Arm weakness may occur after latissimus dorsi flap surgery.
A normal result of breast reconstruction depends on the woman's goals and expectations. It will not be the same as the breast it replaces. In general, it should be similar in size and shape to the opposite breast, but will have less sensation and be less mobile than a natural breast. A reconstruction using implants will usually be firmer and rounder than the other breast. It may feel cooler to touch, depending on the amount of tissue over it. Scars are unavoidable, but should be as unobtrusive as possible.
Breast reconstruction surgery may be performed by inserting an artificial substance, or implant, to replace breast tissue. Autologous reconstruction, in which a woman's own tissues are used, includes the latissimus dorsi flap, where skin and muscle taken from the back is rotated around to the breast area, and the TRAM flap, in which abdominal fat and muscle are tunneled under the skin to the breast area.
American Cancer Society. 1599 Clifton Rd., NE, Atlanta, GA 30329-4251. (800) 227-2345. http://www.cancer.org.
American Society of Plastic and Reconstructive Surgeons. 44 E. Algonquin Rd., Arlington Heights, IL 60005. (847) 228-9900. http://www.plasticsurgery.org.
breast reconstructionSurgical oncology A surgical revision of the anterior chest wall after mastectomy for breast CA, which may be performed during initial therapy or as a 2nd procedure. See Mammoplasty.
Plastic surgery to restore the appearance of the breast after mastectomy. It may rely upon techniques such as the use of breast implants or tissue flaps.
See also: reconstruction | <urn:uuid:3a24ab99-fa0c-40db-b2dc-88d0c2c2cc9a> | CC-MAIN-2018-47 | https://medical-dictionary.thefreedictionary.com/Breast+reconstruction+surgery | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746171.27/warc/CC-MAIN-20181119233342-20181120015342-00295.warc.gz | en | 0.939326 | 3,142 | 2.859375 | 3 |
- Offering access to anyone in the world with an iPhone, Apple’s ResearchKit is becoming a popular platform for population health studies.
The latest to jump on the bandwagon is Boston Children’s Hospital, where researchers are now using ResearchKit to better understand the difference between a fever and a “normal” temperature.
Through the Feverprints app, researchers from BGH’s Innovation & Digital Health Accelerator and Autoinflammatory Diseases Clinic are gathering data from iPhone users on body temperature, lifestyle and health. Their goal is to create a definition of a normal or febrile temperature and a framework of unique temperature patterns – or feverprints – that would help in diagnosing infections and other health issues.
"Many factors come together to set an individual's 'normal' temperature, such as age, size, time of day and maybe even ancestry," Jared Hawkins, MMSc, PhD, the IDHA’s director of informatics and a member of the hospital’s Computational Health Informatics Program, said in a press release. "We want to help create a better understanding of the normal temperature variations throughout the day, to learn to use fever as a tool to improve medical diagnosis and to evaluate the effect of fever medications on symptoms and disease course. By using ResearchKit to bring this study to iPhone, we're able to gather more data about body temperature patterns than ever before possible."
The study – Boston Children’s second using ResearchKit, following a C-Tracker app launched last year to help patients with hepatitis C – continues a recent trend of using the platform to study health issues among large, diverse populations. The University of California at San Francisco got the ball rolling last summer when it launched a study targeting health issues among the Bay Area’s LGBT community.
“The LGBTQ community has been understudied and underserved in healthcare settings,” Kirsten Bibbins-Domingo, MD, PhD, MAS, professor of epidemiology and biostatistics at the UCSF School of Medicine and director of the UCSF Center for Vulnerable Populations, said in a July 2015 press release. “This timely study helps fill the gap in our understanding of health and disease risk in this population, and importantly involves and engages members of these communities in this health-related research in important and novel ways.”
Two unique population health studies were launched on the ResearchKit platform just last month. At the HIMSS16 conference and exhibition on March 2, IBM’s Watson Health and the American Sleep Apnea Association unveiled SleepHealth, an app designed to gather a wide range of metrics on sleep, restlessness and snoring. Two weeks later, Harvard University launched TeamStudy, designed to track brain function, heart health and mobility among former NFL players.
Just last week, the Robert Wood Johnson Foundation launched The Mood Challenge for ResearchKit, a $500,000 competition that challenges researchers to develop an app platform to measure moods.
The pending release of Research Stack, an Android alternative to iOS, is expected to open the population health field beyond the iPhone universe to anyone with an enabled mobile device. That should open the door to more studies involving underserved and lower-income populations and those in developing nations, where the iPhone isn’t as widely used. | <urn:uuid:be1555c0-02c4-4339-bf36-f586682ea4ce> | CC-MAIN-2017-04 | http://mhealthintelligence.com/news/researchkit-the-perfect-platform-for-population-health | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281492.97/warc/CC-MAIN-20170116095121-00105-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.924672 | 680 | 2.953125 | 3 |
Global Food Inequality
Goal 1: No Poverty
This activity is a simulation game that aims to make students/young people reflect on poverty and raise awareness upon unequal distribution of food around the world.
Art and Design
One 45 minute lesson
13 – 21 years old
Groups of up to 25
- To use available resources responsibly;
- To place value own resources and the value of sharing;
- To recognise real needs in combatting poverty;
- To engage in actions to combat poverty.
- To reflect upon the concept of poverty and consequences of poverty globally;
- To recognise the mutual benefits of sharing and the value of own resources;
- To reflect upon the difference between charity and capacity building.
Lifelong learning key competences
- Social and civic competencies
- Entrepreneurial competences
- Corn chips
- Lollies e.g.: jelly beans
- Bottles/jugs of clean and dirty water
- Marker pens
Set up the room with four areas:
- First station has a bowl with only a few corn chips and a bottle of dirty water
- The second station has chairs, a bowl with several corn chips and a bottle of clean water
- The third station has chairs, a table, a bowl with a lot of corn chips and several bottles of clean water
- The fourth station has chairs, a table, bowls with lots of corn chips, fruit and lollies, and several bottles of clean water
These instructions are for a group of 25 students/young people. If the number of students/young people in your class is higher or lower than 25, please check this table to see how to divide your class.
- Ask the 25 students to stand and form a circle representing the total world population of over 7 billion people. Explain that each person represents about 4% of the world’s population or approximately 286 million people.
- Ask 3 of the circle to sit on the floor around a bowl with 1 x corn chip each and a small bottle of dirty water. Say: “You represent the approximately 1 billion people of the world who live on less than €25 per day and who do not get enough food to be healthy and lead an active life. You are undernourished and often sick. Many of your children will die before their fifth birthday. Many of your children will either never attend school or only a few years of primary school. You and your children may be forced to work in dangerous conditions. Some of you will die of hunger this year.”
- Ask 8 of the circle to sit on a chair. Provide 2 x corn chips each. Say: “You represent the approximately 2.2 billion people of the world who live on about €2 per day. Many of you are frequently hungry. You spend long hours working to produce or purchase what food you do have. Your children may go to primary school for a few years but only some will finish or go on to secondary school. You and your family are vulnerable to illness. You could easily loose what little you do have.”
- Ask 10 of the circle to sit at the table with a bowl of corn chips. Say: “You represent the people of the world who are not extremely poor but who also don’t live in a country with a very high level of development. You earn enough to provide for your family. Your children go to school. You are generally healthy. But you are vulnerable. For many of you, losing crops to natural disasters, or a serious illness, or rapid increases in the price of food could throw you into poverty. You may not have savings or government support systems like welfare benefits to protect you.”
Ask 4 of the students to go and sit at the table with the bowls of lollies, fruit, and lots of corn chips. Say: “You represent the approximately 1.2 billion people of the world who live in countries with a very high level of development. You are able to afford a nutritious daily diet. The majority of you have money to spare and it’s easy to access a wide variety of food. As a group, you consume the majority of the world’s food. Since many of you eat more than your daily requirement of calories, you face health problems such as heart disease and diabetes however your average life expectancy is still 77-83 years which is above the global average of 68-73 years.”
Provide a sheet of paper and a marker pen for each group to write down how they feel about this global distribution of food and the group they were in. After the small group have shared thoughts and feelings together, lead a whole group discussion using the following questions:
- How do people in the different groups feel?
- What questions does this cause you to ask?
- How do you feel about the way this food is shared? Does everyone receive a fair share?
- Why might that be the case?
- What could be done to make it fairer?
- Where do most people in your country fit in this share? Note: recognise that not all in a More Economically Developed Country are equally wealthy and not all in a Less Economically Developed Country are equally poor. Nations have people in each of these groups.
- How are wealthy and poor countries connected to each other?
- Discuss global responsibility – the role of aid, fair trade, and individuals in reducing food inequality.
Explain that our world produces enough food for everyone; but that it is not spread out evenly, so some people have more than they need while others struggle to survive. Discuss possible actions to allow students to respond to this experience. Ask students to consider the difference between capacity building and charity actions.
Follow up suggestions
“Freedom from poverty is much more than access to wealth” (Council of Europe)
What is meant with this statement? How can poverty be measured? Is it important to include variables such as life expectancy, education and standard of living? Why is that? Who has the responsibility to ensure freedom from poverty?
Ideas for actions
- Make a campaign to raise awareness upon the issue of global food inequality. Ask the students to set the framework for the campaign and encourage them to invite the local community and relevant local decision makers. Inspiration for topics should come from the debriefing discussion on class.
- Participation in the 40 Hour Famine to raise funds for food and agriculture projects in developing countries;
- Purchase Fair Trade goods (when available).
- The Sustainable Development Goal 1 (No Poverty) targets: http://globalresponsibility.eu/goal-1-no-poverty/
- This method could also be used to discuss SDG 2 (Zero Hunger) and SDG 10 (Reduced Inequalities):
- The Sustainable Development Goal 2 (Zero Hunger) targets: http://globalresponsibility.eu/goal-2-zero-hunger/
- The Sustainable Development Goal 10 (Reduced Inequalities) targets: http://globalresponsibility.eu/goal-10-reduced-inequalities/
- Learn more about Poverty and ways of measuring poverty from Council of Europe: http://www.coe.int/en/web/compass/poverty
- Learn about the “40 Hour Famine” campaign – an action of World Vision Australia to respond to humanitarian crisis in the world. http://www.40hourfamine.com.au .
- Learn about Famine and Hunger in the world from World Vision: https://www.worldvision.com.au/global-issues/work-we-do/famine
This method is based upon the method of the same name made by World Vision Australia. World Vision Australia, “Global Food Inequality – Simulation Game,” 2015, https://www.worldvision.com.au/docs/default-source/school-resources/global-food-inequality—simulation-game-instructions.pdf?sfvrsn=0 | <urn:uuid:6a899af1-ffbc-43b6-b520-5889b7c5a5ae> | CC-MAIN-2022-49 | https://globalresponsibility.eu/global-food-inequality/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710926.23/warc/CC-MAIN-20221203075717-20221203105717-00281.warc.gz | en | 0.938402 | 1,715 | 4.09375 | 4 |
The inauguration of Barack Obama, one day after Martin Luther King Jr. Day, has prompted a healthy discussion in the nation about racial and socioeconomic inequality.
As part of that discussion it is important to point out that, just like the divisions in the Jim Crow south, the death penalty continues to divide us by race and socioeconomic status.
In 1976, when the Supreme Court approved the modern death penalty statutes that were supposed to ensure that death sentences were no longer arbitrary and discriminatory, the Court stated that "capital punishment is an expression of society's moral outrage at particularly offensive conduct . . ."
Yet the evidence from the past 33 years demonstrates that capital punishment remains arbitrary and that society's moral outrage continues to be expressed loudest when wealthy white people are homicide victims. As blue ribbon study commissions in California (PDF), and Maryland (PDF) have recently reiterated, empirical research across the country consistently demonstrates that a defendant who kills a white person is far more likely to receive the death penalty than a defendant who kills a person of color, and the racial configuration most likely to result in a death sentence is a black-on-white crime. Similarly, this research demonstrates that defendants whose victims are high in socioeconomic status face a significantly higher risk of execution.
The death penalty's racial and socioeconomic bias persists despite the best efforts of legislators and judges to erect fair and equitable capital punishment procedures. This bias sends the clear and morally repugnant message that society values wealthy victims more than poor and middle class victims, and white victims more than victims of color. It is one more reason to abolish capital punishment. A society that follows Reverend King's admonition to judge men and women by their character and not their skin color values the lives of all equally, regardless of racial or socioeconomic status.
And capital punishment is harmful to people of color and poor people for another reason: The death penalty aggressively consumes scarce state resources upon which many poor people and people of color depend. In cities across the country, prosecuting death penalty cases has left prosecutors' offices in dire financial straits. In New Orleans, for example, the prosecutor's office has filed for bankruptcy after being held civilly liable for wrongfully sentencing to death an innocent man. Moreover, every dollar spent on the death penalty is one dollar unavailable for community policing and other measures to make poor and African-American communities safer.
The election of Barack Obama as our Nation's 44th President shows how far we have come towards healing the wounds of slavery and systemic racial discrimination. Our continued use of the death penalty, predominately in the South, shows how far we have yet to go. | <urn:uuid:b5d45bdb-2fe1-46d1-a4bc-a0dc796abc4e> | CC-MAIN-2017-04 | https://www.aclu.org/blog/speakeasy/death-penalty-maintains-racial-inequality?redirect=blog/capital-punishment-racial-justice/death-penalty-maintains-racial-inequality | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00492-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.947108 | 525 | 2.59375 | 3 |
Date of Completion
Cognitive Psychology | Psychology
In humans, psychiatric symptoms such as anergia and psychomotor retardation reflect pathologies in behavioral activation. These motivational symptoms are fundamental aspects of depression and other disorders. Drugs such as reserpine and tetrabenazine deplete monoamines, including dopamine, and induce depressive like behaviors in humans. Our results indicate that administration of low doses of tetrabenazine can alter effort-related choice behavior, biasing animals towards low effort alternatives. These findings may be related to the ability of monoamine depleting agents such as tetrabenazine to blunt behavioral activation and induce psychomotor retardation, anergia and fatigue in humans, and this research could be useful for the development of drug treatments for effort-related motivational symptoms in humans.
Huizenga, Megan, "Effort-Related Choice Behavior is Affected by Pharmacological Manipulations Associated with Depression: the Effects of Tetrabenazine" (2012). Honors Scholar Theses. Paper 280. | <urn:uuid:a3e34db4-b0a6-4197-9ac6-8f9c4cd63b43> | CC-MAIN-2016-07 | http://digitalcommons.uconn.edu/srhonors_theses/280/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701148558.5/warc/CC-MAIN-20160205193908-00277-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.821683 | 215 | 2.703125 | 3 |
Benjamin Franklin famously did not like the Bald Eagle as a choice for the national bird of the United States of America. There’s an old urban legend floating around that he advocated for the turkey, but there’s no evidence of this. He did, however, write:
“For my own part. I wish the bald eagle had not been chosen the representative of our country. He is a bird of bad moral character. He does not get his living honestly … besides he is a rank coward: The little king bird not bigger than a sparrow attacks him boldly and drives him out of the district.”
To his credit, he’s right, in a way. Bald Eagles are opportunistic and do not hunt quite like the falcons or most hawks. They have no issue eating recently killed prey and won’t spend a lot of time stalking. They are not the most sportsmanlike of raptors.
But by golly are they beautiful.
There is no bird of prey more easily identifiable than the Bald Eagle. Their white head feathers over their brown bodies with white tails, their angry scowls, and their fearsome beaks and talons make them stand apart. I do not believe there is any raptor more beautiful and majestic in appearance than the Bald Eagle.
Though they opportunistic hunters bordering on being scavengers, Bald Eagles have no problem defending themselves. They are larger than most birds and their talons and sharp beaks make them dangerous. They’ll even attack humans if their territories – and especially their nests — are threatened.
Bald Eagles prefer fish as their main food source. However, they’ll also eat just about any other meat they can get their talons on. Their second favorite food is other birds, mostly sea birds. They won’t spend a great deal of time stalking or chasing prey, instead going after slower, larger birds like Mallards, grebes, or Canada Geese. They’ll also eat mammals. There are over 400 recorded species that Bald Eagles will eat. They are not picky.
We almost lost the Bald Eagle. I don’t think people realize just how close we got to Bald Eagles being completely extinct in the wild. This was due to a pesticide called DDT that would thin egg shells, causing Bald Eagle eggs to become so weak that they couldn’t withstand an adult brooding on them. Even someone who has the most basic of bird knowledge knows that brooding is a completely essential part of raising eggs into chicks.
In 1972, DDT was outlawed. In addition, several other regulations were put in place to protect eagles. Due to this, Bald Eagles were removed from the endangered species list in 1995. They are now not even considered threatened with the eagles thriving so much in some areas that they are considered a pest!
The Bald Eagle proves that humans can cause damage to the environment. Sometimes this damage is permanent. Think of the dodo or the Carolina Parakeet. We will never get to see these birds. The Bald Eagle was almost the same. But their rebound from the brink of extinction shows that we can make a difference. The cause for saving the birds we do have is not lost. Let’s do our parts!
I would be remiss not to talk about Wazoo, the Bald Eagle from all of the pictures. Like the other two featured birds, Wazoo is a permanent resident at Eagle Valley Raptor Center. Wazoo was originally from North Carolina where he suffered a debilitating wing injury. You might notice in some of the pictures he holds his wing kind of funny. Wazoo can still fly, but only for short distances. Wazoo would not survive in the wild and have lived in captivity for over twenty years. Despite this, I’m convinced Wazoo lives the best life he can live at EVRC. It was an absolute delight feeding him mice and watching him in his enclosure. We even got to go in and get super close!
Tell me what you think! | <urn:uuid:f48c8156-8ff1-478d-ab61-7256958e2154> | CC-MAIN-2021-43 | https://greatplainsbirdman.com/2021/05/20/bird-of-the-week-12-bald-eagle/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588246.79/warc/CC-MAIN-20211028003812-20211028033812-00584.warc.gz | en | 0.976184 | 838 | 2.59375 | 3 |
Creation: The First Try
At some point before time began, the gods decided to start making the heavens and the earth. The earth itself had no shape, and contained nothing except an endless, lifeless ocean. For some reason God’s spirit fluttered over the abyss as a wind.
After a time God said, “Let there be light”. Suddenly all the water and nothing was visible. He then separated light from the dark. The light, he called Day, and the darkness he called Night. This was when time began, and was the first day.
The next day God placed an expanse between the waters of the earth, and the waters of the sky. He called this expanse “heaven”.
On the third day God gathered all the water of the earth into one place, and dry land appeared where the waters receded. He called the waters “Seas” and the dry land “Earth”. He then commanded the earth to grow plants. It apparently did.
The fourth day consisted of God realizing he’d screwed up by not creating a source for the light, so he created the stars. This was not enough light, so he created the sun to light up the day, and the moon to light up the night.
On the fifth day God spoke birds, and fish into existence. More importantly he spoke sea monsters into existence, because the world was just boring without giant sea serpents to make sailing from place to place even more hazardous.
Lastly, on the sixth day God creates mammals and insects.
He then turned to his fellow gods and said, “Let’s make some beings that look like us and let them have dominion over the whole earth.” So they created humanity.
On the seventh day God was exhausted and rested.
Creation 2: The Makening
God gave himself a name, started over and briefly quit acknowledging that the other gods existed. Or possibly forgot he already did all this and tried again.
One day Yahweh created the whole of the heavens and earth, but there wasn’t anything growing on it because Yahweh had forgot to create rain. He also forgot that He’d already created dry land, and that the water already existed from his previous attempt. Luckily the Earth knew better what it was doing than God, and a mist came up from the earth and watered everything, which was just dry land.
Yahweh then scooped up some dust from the earth and breathed into it, creating a living being, a man. Then Yahweh planted a garden in Eden, a land to the east. Yahweh placed the man in the garden and caused all the vegetation He’d planted to grow. He also decides to place the Tree of Life, and the Tree of Knowledge of Good and Evil right in the middle of the garden. This will be important later.
Four rivers that are never really mentioned again, and do little to help locate where Eden was, flow out of the garden and we’re going to spend an inordinate amount of time reading about them. The first is the Pishon, which probably doesn’t exist now. The next is the Gihon, which also likely doesn’t exist. Some people theorize these two rivers are either the Nile in Egypt and Ethiopia, or that the Pishon is the Ganges river in India. I say why not the Volga in Russia and the Amazon in Brazil? The other two are the Tigris and Euphrates, which do still exist. Either way, four whole verses are dedicated to these rivers. The speculation on them is endless. Probably two of them dried up after the second chapter of Genesis was written. Either way, if all four of these rivers still exist, they certainly don’t come from the same source.
Then Yahweh placed the man in the garden. He forgot he’d already done this previously, because of all the time He took with the rivers. Yahweh had a short attention span in those days. He then tells the man to not eat of the Tree of the Knowledge of Good and Evil because it would kill him. He was allowed to eat literally anything else. This included the fruit from the Tree of Life, which is probably why the man is seemingly immortal.
Yahweh, forgetting all the people He made before, realizes he only made the one man, and that man will get lonely, so he talks to himself and says He’ll make a helper for him. This is when he decides to pull all the animals from the ground and put them in front of the man. The man would then name them. We can safely assume that this took two to three years to complete if there were half the number of animal species back then as there are now. And this is only if he came up with one name per minute with no breaks for sleep.
After the years pass, Yahweh remembers why he was making the animals in the first place. In the first recorded case of surgery on the first man, God puts the man to sleep and takes a rib from his side and closes the incision. The first woman was made from this rib. The man wakes up and sees a hot naked woman in front of him. This confuses him greatly. Instead of actually giving her a name, he just poetically calls her what she is, “woman”.
The poem he spoke goes like this:
“This at last is bone of my bones and flesh of my flesh. She will be called Woman, because she was taken out of Man.” Later he’d see how things are actually born and realize he sounded a bit stupid. Also the Man must have invented writing right then because we somehow know what he said. It’s more likely the the Woman told this story to their children so many times that writing was invented by one of them with the express purpose of mocking their father for all time.
This is why husbands call their wives “woman” to get their attention.
For no reason it’s pointed out they were naked and not ashamed, or aware. Probably because the man didn’t want to ruin a good thing and tell his wife she should probably put some clothes on.
My cynical take on the creation account uses the Revised Standard Version and Young’s Literal Translation of the Bible as sources. Occasionally I reference the Orthodox Jewish Bible for words in Hebrew. I’m not a scholar and all this comes from research, years of insight, and attempting to read what the Bible literally says.
There are two distinct creation accounts in Genesis. The first one is the more familiar seven day account and the second is a simpler account. They are hard to reconcile if one looks closer. The biggest problem I see is the order in which humanity in particular is created.
In the first account all of humanity is created at once and are the last part of creation. Nothing new is created after mankind. The second account tells us God created a single man right after the plants, then created animals, and finally the woman. Another issue is that in the first account there is nothing but God(s) and water. The second account basically contradicts this by implying there is no water, only a barren wasteland.
The second creation account is also the most monotheistic. In other parts of Genesis God talks to other entities. In Genesis 2, He’s clearly talking to Himself. One could change the words “God said” to “God thought” in Genesis 2:18 and it wouldn’t change the meaning. However, in the following chapters God is objectively talking to other powerful supernatural entities.
My opinion is that the best parts of the two accounts should have been merged into a third ‘unified’ account and all the weird nonsensical stuff be done away with. I believe that originally both accounts probably made a lot more linear sense, but as time went along stuff got added (interpolated) or changed slightly (redacted) by the people copying it. For instance, in the second account God clearly places the man in the garden twice. Once before the rivers are mentioned and once after. This seems like a basic copyist error.
I’d bet the four verses about the river were interpolated in from a marginal note in some ancient version of the text. I’m not the first person to think this either. No less than Granville Penn, one of William Penn’s great grandsons, had the same opinion in the eighteenth or nineteenth century.
My simplified account would go something like this:
“In the beginning God created the heavens and the earth. The earth was dry and barren. God caused a mist to rise up from the ground to water the whole of the earth and spring forth plants. He then created all the birds of the air, the fish of the sea, the beasts of the land and creeping things of the earth. When He surveyed his work, He saw that it was good. God then made mankind in his own image and commanded them to populate the whole of the Earth.”-Aaron
While this still isn’t at all scientific, it does eliminate many of the problems that arise when you take it all literally. God simply created everything, made mankind last, and told them what to do.
This may seem blasphemous to some, but many churches already do something like this in Sunday School. Often the two stories are merged in the teacher’s retelling, keeping the seven days of the first account, but having God create Adam by himself as in the second.
This particular merging causes some issues later in Genesis, namely it begs the question, “Who did Cain and Seth marry? Their sisters?”.
One also notes that “the man” is not named yet. In fact he isn’t named in the entire creation account, all the way to the man and woman leaving the Garden and beyond. This is because Adam means ‘the man’ or something like that in Hebrew. Genesis 5:2 in apparently uses the word “adam” as the name of all humanity. At some point along the way “Adam” became the name of the first man and that’s how the copyists wrote it. The four times the name “Adam” is used before Chapter 5 (Genesis 3:17,3:21,4:1, 4:25), it almost seems like a deliberate translation mistake as it uses ‘the man’ in following verses. | <urn:uuid:35bc3624-d08d-439e-8d56-84c555c6f5a1> | CC-MAIN-2022-40 | https://aaronsarea.com/2020/05/11/uncle-aarons-bible-stories-a-cynical-take-on-biblical-creation/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00246.warc.gz | en | 0.973514 | 2,211 | 2.53125 | 3 |
The over 45,000 plant and 77,000 animal species that have been recorded in India make up 7 percent of the total plant and 6.4 percent of the animal species found in the world.
The enormous variation in landscapes based on climate and topography has created different ecosystems that support and nurture this biodiversity, which is among the country"s most distinctive features. Industrialization and modern ways of life are pillaging these resources and posing a monumental threat to the natural world. It is estimated that as many as 50% of the earth"s species are likely to become extinct during the next two decades.
With 1,300 photographs, 400 illustrations, five animations, 21 videoclips and 26 bird calls captured in 62 of India"s national parks and wildlife sanctuaries, this educational CD-ROM provides an interactive experience on biodiversity answering important questions like -- How is biodiversity degraded? Why do we need to conserve it?
An informative booklet provides detailed information on biodiversity and conservation in India. | <urn:uuid:fcde9073-5678-430d-875d-53ca14e3bf72> | CC-MAIN-2013-20 | http://www.peribo.com.au/product_info.php?cPath=3_64&products_id=18195 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699036375/warc/CC-MAIN-20130516101036-00002-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.929871 | 201 | 3.421875 | 3 |
Behind your story: Navigating genetic test results
Genetic test results are personal, impactful and can be complicated to comprehend. This is why genetic specialists, like genetic counselors and geneticists, are an important part of the process, helping explain results as well as the effect on life and health.
“Most of the time, there are a handful of red flags that indicate genetic testing could be helpful,” explains Megan Bell, a genetic counselor at Sanford Health. “Genetic testing isn’t appropriate for everyone, and therefore a conversation with a genetics professional is important.”
There are a vast number of reasons genetic testing may be considered: a child experiencing developmental delays, a condition running in the family, a couple with problems getting pregnant. But for each, patients are searching to confirm a diagnosis, a carrier status, an increased risk for a genetic condition, or the effectiveness of medication due to genetics (pharmacogenetics).
Types of results
While patients may expect to get a positive or negative, the results are not always so clear. Patients can receive a:
- Variant of uncertain significance (VUS)
“Genetic testing is different than most other lab tests, and the results can be more complicated. Sometimes a result is uninformative because we still haven’t been able to determine the genetic cause of the condition. Therefore, the cause may not be genetic, may be caused by a different genetic variant that wasn’t tested, or something genetic that health care hasn’t learned about yet,” says Bell.
“For example, if we test you for a BRCA variant due to your mom having breast cancer but do not know if your mom had a BRCA variant, that result could be uninformative because there are many factors that impact breast cancer risk,” explains Bell.
Bell continues, “The result would be a true negative when we know the actual genetic cause of a condition. Like if a mom does have a gene variant, we test the family for that gene variant. If the results say the patient does not have that gene variant, the result is negative. The difference here is we know what we are looking for, and we can determine a definite answer for the patient.”
With a VUS, a variant was found, but current knowledge is unsure if this variant is harmless. When this happens, patients are encouraged to follow up with a geneticist or genetic counselor for a reevaluation every few years.
“Our knowledge of genetics is constantly changing, so there is always a reason to stay in communication with your geneticist or genetic counselor. We are continually analyzing more genes. There may be changes in recommendations and testing as we learn more. So even if you get a negative, uninformative or VUS result, it’s important to keep in contact with genetic specialists and let us know about family history and other changes.”
To learn more, call (605) 312-GENE or attend “Now What? Knowing How Your Genetic Test Results Impact Your Health” on Tuesday, Nov. 13 at 7 p.m. at the Sanford Imagenetics Courtyard.
Members of the editorial and news staff of the USA Today Network were not involved in the creation of this content. | <urn:uuid:9592c03a-6e89-4fe5-a5c2-e9b9865343ae> | CC-MAIN-2019-09 | https://www.argusleader.com/story/sponsor-story/sanfordhealth/2018/11/05/behind-your-story-navigating-genetic-test-results/1847576002/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247513222.88/warc/CC-MAIN-20190222033812-20190222055812-00167.warc.gz | en | 0.92195 | 682 | 2.546875 | 3 |
Rhododendron growing shrub of the genus Rhododendron, Rhododendron perennial evergreen or deciduous used as ornamental plant, can grow in temperate, subtropics climate or as houseplant and growing in hardiness zone 3-10a.
Leaves color green in elliptic to ovate shape.
Flower color can be: orange, peach, red, blue, purple, yellow, white or multicolor in trumpet shape.
Rhododendron for sale – Seeds or Plants to Buy
Requirements for Rhododendron growing and care:
Acidic soil 4-6 ph, rich soil, moist soil, well-drained soil, mulch
What is the best way to start growing?
Plant / Seed / Vegetative reproduction
Is it necessary to graft or use vegetative reproduction?
Difficulties or problems when growing:
Winter / Spring / Summer
Pests and diseases:
How to prune:
Just for design and dead flowers
Size of the plant:
0.2-3 m, 8-120 inches and can be higher
Growth speed in optimal condition:
Average amount of water / Big amount of water
Light conditions in optimal condition for growing:
Full Sun / Half Shade / Full shade ( with a lot of light and not all species)
Is it possible to grow as houseplant?
Growing is also possible in a planter /flowerpot / containers:
Spring / Summer
General information about the flower
Trumpet shape in color can be: orange, peach, red, blue, purple, yellow, white or multicolor | <urn:uuid:b6c007bb-26ce-4f24-b3d0-7cea1acaedd2> | CC-MAIN-2019-43 | https://www.growplants.org/growing/rhododendron | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986705411.60/warc/CC-MAIN-20191020081806-20191020105306-00397.warc.gz | en | 0.774773 | 343 | 2.859375 | 3 |
There are over 150 different strains of HPV – some are low risk and others are high risk. The high risk strains, particularly strains 16 and 18, are responsible for about 70% of cases of cervical cancer. For most people, the virus clears on its own without any treatment. In some cases, an HPV infection with a high risk stain can potentially lead to cancer.
The test kit screens for 14 high-risk strains of the virus: HPV16 and HPV18, which cause the vast majority of cervical cancer cases – and 12 additional high risk types. | <urn:uuid:21ceae2b-d39d-44f9-ada4-faac2ebbcc94> | CC-MAIN-2019-35 | https://www.nurx.com/faq/what-does-the-nurx-home-hpv-screening-test-look-for/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316194.18/warc/CC-MAIN-20190821194752-20190821220752-00277.warc.gz | en | 0.951113 | 112 | 2.84375 | 3 |
[jahsonic.com] - [Next >>]
Related: Mother Mary - father - pregnancy - child
Films: Mommie Dearest (1981) - Y tu Mama Tambien (2001) - Ma Mère (2004)
A mother is typically the biological or social female parent of a child or offspring while the male parent is the father.
In the case of a mammal such as a human, the mother gestates her child (called first an embryo, then a fetus) in the womb from conception until the fetus is sufficiently well-developed to be born. The mother then goes into labour and gives birth. Once the child is born, the mother's breasts produce milk to feed the child.
In non-sexual organisms, "mother" can sometimes be used to mean "parent;" in the case of single-celled organisms that reproduce by fission, the mother is a cell that divides to produce "daughters."
Mothers typically have a very important role in raising children, and the title mother can be given to a woman other than a biological parent who fills this role. This is most commonly either an adoptive parent or a stepmother (the wife of a child's father).
The term can also refer to a person with stereotypical traits of a mother.
In the United States, Australia and Canada mothers are celebrated on the second Sunday in May (which has been called Mother's Day since the late nineteenth century). In France, mothers are celebrated on the last Sunday in May. A similar holiday in the United Kingdom, Mothering Sunday, falls on the fourth Sunday of Lent.
Mom, mommy, mama, ma, mummy, and mum are some familiar or colloquial words for a mother. Many times these terms denote affection or a maternal role in a child's life : "anyone can be a mother, but it takes someome special to be a Mum." As such, someone can be a mother and not a mum, or a mum and not a mother.
In contemporary society, single motherhood, the state of an unmarried mother, has become a serious social issue. --http://en.wikipedia.org/wiki/Mother [Aug 2004]
Todo Sobre Mi Madre/All about my Mother - Pedro Almodovar
Todo Sobre Mi Madre/All about my Mother - Pedro Almodovar [Amazon.com]
After her son is killed in an accident, Manuela (Cecilia Roth) leaves Madrid for her old haunts in Barcelona. She reconnects with an old friend, a pre-op transsexual prostitute named La Agrado (Antonia San Juan), who introduces her to Rosa (Penélope Cruz), a young nun who turns out to be pregnant. Meanwhile, Manuela becomes a personal assistant for Huma Rojo (Marisa Paredes), an actress currently playing Blanche DuBois in a production of A Streetcar Named Desire. All About My Mother traces the delicate web of friendship and loss that binds these women together. The movie is dedicated to the actresses of the world, so it's not surprising that all the performances are superb. Roth in particular anchors All About My Mother with compassion and generosity. But fans of writer-director Pedro Almodóvar needn't fret--as always, Almodóvar's work undermines conventional notions of sexual identity and embraces all human possibilities with bright colors and melodramatic plotting. However, All About My Mother approaches its twists and turns with a broader emotional scope than most of Almodóvar's work; even the more extravagant aspects of the story are presented quietly, to allow the sadness of life to be as present as the irrepressible vitality of the characters. Almodóvar embraces pettiness, jealousy, and grief as much as kindness, courage, and outrageousness, and the movie is the richer for it. --Bret Fetzer for amazon.com
The Mothers (1927) - Robert Briffault
The Mothers (1927) - Robert Briffault
[ cover shown here is of the abridged, 1959 edition ]
image sourced here. [Mar 2005]
[Amazon.com] [FR] [DE] [UK]
Old Fashioned Quality Research
The three volumes that form this work are an incredible source of information. Briffault, more or less an amateur yet with lots of time on his hands during WW1, went about his study of cultural institutions, rules and taboos like a loving stamp collector. He carefully documented his sources; and therefore his footnotes and bibliography alone make this work a gold mine. That his outlook was refreshingly less patriarchal and judgmental than that of most his colleagues of the time, for example Sir J.G. Frazier and his famous Golden Bough (1922), makes him all the more readable.
From the Mysteries of Eleusis to tribal fertility dances, from defloration customs to ritual prostitution, from strange marriage ceremonies to circumcision, "The Mothers" is a major source for "Dirty Laundry" from all over the globe. --http://www.yoniversum.nl/blissbooks/review/briffmother.html [Mar 2005]
Robert Briffault, novelist, social anthropologist, and surgeon, was born in Nice, France in 1876. He was educated at the University of Dunedin and Christ Church University and began medical practice in 1901 in New Zealand. In May 1896 he married Anna Clarke; the couple had three children, Lister, Muriel, and Joan, born from 1897 to 1901. After service on the Western Front during World War I, he settled in England, his wife having died. In the late 1920s he married again, to Herma Hoyt (1898-1981), an American writer and translator, best known for her English translations of modern French literature. The Brifffaults became clients of the literay agent William Bradley and were befriended by his wife, Jenny. Briffault is the author of several books, including The Mothers (1927) and Europa (1935). He died in Hastings, Sussex, England on 11 December 1948. --http://library.mcmaster.ca/archives/findaids/fonds/b/briffaul.htm [Mar 2005]
your Amazon recommendations - Jahsonic - early adopter products | <urn:uuid:e8058450-66bc-41fc-acf7-861e5782af13> | CC-MAIN-2013-20 | http://www.jahsonic.com/Mother.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142617/warc/CC-MAIN-20130516124222-00013-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.940934 | 1,316 | 2.6875 | 3 |
Design manual for heating, ventilation, plumbing and air conditioning systems - PDF Free DownloadWe've made some changes to EPA. The main purposes of a Heating, Ventilation and Air-Conditioning HVAC system are to help maintain good indoor air quality through adequate ventilation with filtration and provide thermal comfort. HVAC systems are among the largest energy consumers in schools. The choice and design of the HVAC system can also affect many other high performance goals, including water consumption water cooled air conditioning equipment and acoustics See Acoustics. The following actions detail how engineers can design a quality system that is cost-competitive with traditional ventilation designs, while successfully providing an appropriate quantity and quality of outdoor air, lower energy costs and easier maintenance. This standard is often incorporated into state and local building codes and specifies the amounts of outside air that must be provided by natural or mechanical ventilation systems to various areas of the school, including classrooms, gymnasiums, kitchens and other special use areas.
Ebook Principles of Heating Ventilation and Air Conditioning in Buildings Read Full Ebook
Heating, ventilation, and air conditioning HVAC is the technology of indoor and vehicular environmental comfort. Its goal is to provide thermal comfort and acceptable indoor air quality. HVAC system design is a subdiscipline of mechanical engineering , based on the principles of thermodynamics , fluid mechanics and heat transfer. HVAC is an important part of residential structures such as single family homes, apartment buildings, hotels and senior living facilities, medium to large industrial and office buildings such as skyscrapers and hospitals, vehicles such as cars, trains, airplanes, ships and submarines, and in marine environments, where safe and healthy building conditions are regulated with respect to temperature and humidity, using fresh air from outdoors. Ventilating or ventilation the V in HVAC is the process of exchanging or replacing air in any space to provide high indoor air quality which involves temperature control, oxygen replenishment, and removal of moisture, odors, smoke, heat, dust, airborne bacteria, carbon dioxide, and other gases. Ventilation removes unpleasant smells and excessive moisture, introduces outside air, keeps interior building air circulating, and prevents stagnation of the interior air. Ventilation includes both the exchange of air to the outside as well as circulation of air within the building.
This content was uploaded by our users and we assume good faith they have the permission to share this book. If you own the copyright to this book and it is wrongfully on our website, we offer a simple DMCA procedure to remove your content from our site. Start by pressing the button below! Design manual for heating, ventilation, plumbing and air conditioning systems Home Design manual for heating, ventilation, plumbing and air conditioning systems. Heating Ventilation Air Conditioning. Read more. Heating,Ventilation and Air Conditioning. | <urn:uuid:a8c81ffa-57c0-4e5c-95b7-a33df7f91a40> | CC-MAIN-2020-05 | https://frikilife.com/and-pdf/3049-principles-of-heating-ventilating-and-air-conditioning-pdf-925-280.php | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251705142.94/warc/CC-MAIN-20200127174507-20200127204507-00015.warc.gz | en | 0.935809 | 582 | 3.171875 | 3 |
Interactive maps provide the perfect platform for displaying locations and useful information to visitors. The US holds a lot of pride in its historical past and in particular the events and battles that defined both the War of Independence and the US Civil War. Consolidating the information and linking each battle and historical event to a location on a map of the states creates an influential tool for scholars, tourists and avid historians alike. As part of a recent project, jQueryMaps partnered with a media company to provide an interactive map designed for use within a website as a tool visible to the general public. The project combines several mapping layers and navigation options down to the street level to assure visitors have the necessary resources to capture overview glimpses of landmark events along with tools to plan their next visit.
In this article we will discuss the following topics.
Pros to Using Both Area-Based and Street Level Maps
Integrating Useful Information within Dynamic Pop-Up Boxes
Complex Features that can be Included with Interactive Travel Maps
Consider Combining Multiple Levels on an Interactive Map
The initial thought is more information is always better, however, while this might be true for some interactive maps, the same content can also confuse visitors, both visually on the map and within pop-up boxes. For this reason, we always recommend that projects work with multiple layers, providing increased details as the user navigates further within the project. One concrete example would be to initially provide key landmark locations on the map with labels, as opposed to directly showing full street level detail. This gives users a sense of where locations fall geographically on the map, without cluttering or distracting activity on the map. One approach for creating a simplified initial view can be seen in the following example map of the states with simple filters. The goal at this level is to allow users to choose categories and see where locations are in relation to the State or County borders, without cluttering the map with extensive detail. When an icon is selected, or in the case of larger areas, a County or Town area is selected, the map would navigate to said location and show more extensive details benefiting from either OpenStreetMap or Google Maps. The following is an interactive map with multiple layers. Clicking on a location, opens Google Map’s API within the same window and displays recreational motorcycle routes in parts of the US. The same concept is also helpful when filtering information within a map of the states with high-volume data. If the map is working with thousands of data sets, it would be cumbersome for the user and most likely slow down the performance to show all points in the initial view. A much better approach would be to layer information and cluster locations by key areas. For example, initially, the project could activate Counties where information is available and show major landmark locations. These locations can be defined in the database or generated by combining multiple icons within a single multiPOI. Once a user navigates further into the map, all of the individual icons become visible and active. This functionality works on all levels and greatly increases the usability of your web-based maps.
Displaying Dynamic Content in a map of the states
Pop-ups are normally used to show information for a specific location or area. This can include multiple pop-ups within the same project. Potentially clients would want to see specific information for areas selected, such as States or Counties in addition to location-based information for a marker on the map. Pop-ups can be fully customized, scaled and designed to meet the requirements of any project. Any number of dynamic features can be included within a pop-up, however, we recommend layering the information to avoid cluttering the initial view. Useful tools for making complex pop-up boxes more manageable include: implementing according to filters for titles, tabs filters for sections, and image scroll bars. The following example includes accordion filters within the pop-ups (California ) or larger tab filters by sections if needed. The historic sites example using the Map of the States and Google maps displays information by within a simple tab according to details or location can be seen here. The information also does not need to be confined to a fixed pop-up box, and can potentially display alongside the map or below. Once the structure and layout of the information are defined to maximize the usability of the product, the task becomes gathering the content to display. Projects, in particular maps that work with visual features, can include dynamic features like video players, image carousels, data streams and complex structures of collapsable text to facilitate user interactivity. We recommend that clients contact us for more information and review our showcase for a better understanding of the options available when deciding on a pop-up box design.
Creating Routes and Custom Features in Interactive Mapping Projects
Displaying existing data is usually the primary goal of a project, however, there are cases when a map of the states serves as a portal to define territories via a selection tool. This is often the case with map projects that reside behind a password protected page, often available to existing clients or partners of the company. The map then serves as a tool to display information, but also to select areas and store selections against the user profile for later access. This is a popular tool for companies that would like for providers to independently define and update their territories, whether for shipping rates, accessibility or to define competition. The map is a great tool to make and maintain these selections, without involving an IT department.
Another interesting possibility is to draw overlay lines on an existing map of the states. Similar to the point above, this is often used in projects where clients extend a tool to users to have them create and save information to a map. This has been used to generate motorcycle routes on a US Map combining jueryMaps with Google Maps or in the real-estate sector for realtors and even the general public to update neighborhood boundaries. In the case of this second example, overlays and lines can be combined with area-based maps in addition to Google Maps or most commonly OpenStreetMap.
The navigation and layering of information in a well-structured manner is vital to making any mapping project user-friendly and responsive. It is important not to load too much content in any single view and avoid unnecessary cluttering with filters and multi-POI grouping. Significant customization and dynamic features can also be included with any pop-up boxes, offering ways to project information to users in a logical fashion. Contact us for more information and questions on our web-based mapping tools. | <urn:uuid:b46ec23b-f06e-4185-933b-feeb26efd18c> | CC-MAIN-2019-30 | http://www.jquerymaps.com/blog/map-of-the-states-historic-travel/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525793.19/warc/CC-MAIN-20190718190635-20190718212635-00399.warc.gz | en | 0.921826 | 1,321 | 2.640625 | 3 |
High-Fiber Diet Tied to Lower Heart Risk in Diabetes Patients
FRIDAY, Oct. 4, 2019 (HealthDay News) -- A fiber-rich diet appears to help people with high blood pressure and type 2 diabetes in multiple ways, lowering their blood pressure, cholesterol and blood sugar levels, a new study suggests.
High blood pressure (hypertension) and diabetes raise the risk for heart disease, and diet may help keep it at bay, researchers say.
"This study helps us determine three important things for this patient population," said lead author Dr. Rohit Kapoor, medical director of Care Well Heart and Super Specialty Hospital in Amritsar, India.
"Firstly, a high-fiber diet is important in cases of diabetes and hypertension to prevent future cardiovascular disease," Kapoor said in a news release from the American College of Cardiology.
"Secondly, medical nutrition therapy and regular counseling sessions also hold great importance in treating and prevention of diabetes and hypertension," he added.
Thirdly, this type of diet in combination with medical treatment can improve lipid levels, pulse wave velocity [a measure of arterial stiffness], waist-to-hip ratio and high blood pressure, Kapoor said.
For the study, Kapoor's team tracked fiber consumption among 200 participants over six months. Patients sent photos of their meals on WhatsApp and engaged in phone calls three times a week during which they were asked to recall their diet.
The study found that those participants eating a high-fiber diet showed significant improvement in several risk factors, including a 9% reduction in cholesterol, 23% reduction in triglycerides, 15% reduction in systolic (top number) blood pressure and a 28% reduction in blood sugar.
Foods high in fiber include fruits and vegetables, beans, whole grains and nuts.
The study results were scheduled to be presented Thursday at an American College of Cardiology meeting, in Dubai, United Arab Emirates. Data and conclusions presented at meetings are usually considered preliminary until published in a peer-reviewed medical journal.
For more on type 2 diabetes, head to the American Diabetes Association.
SOURCE: American College of Cardiology, news release, Oct. 3, 2019 | <urn:uuid:95cc78e5-51a5-4611-9503-931cd599e87c> | CC-MAIN-2020-24 | http://healthlibrary.halifaxhealth.org/RelatedItems/6,750867 | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347409171.27/warc/CC-MAIN-20200530102741-20200530132741-00193.warc.gz | en | 0.942933 | 452 | 2.8125 | 3 |
|← Network Access and Transmission||Encryption →|
Forensics can be described as a process that involves the use of scientific knowledge collection, analysis and then presentation of evidence to a court of law. It essentially involves the recovery and analysis of evidence of a crime. A computer forensic expert therefore is a person who combines law elements and advanced computer knowledge in the collection and analysis of data obtained from a computer system or storage devices and later present it as evidence in a court.
Roles of a computer forensic expert
A computer forensic expert has several important roles in an organization. He is entitled to planning, organization and management of various computer forensic activities and examinations around the office. These activities include conduction of a live analysis on various networks within the organization. He is also supposed to offer advice about forensic issues to all members of the organization. He is also supposed to ensure that all digital information about the organization is preserved for any future reference.
Projected growth rates for forensics experts and security roles over the next five years
A forensic expert is also required to verify and validate all the software and hardware to ensure that they are in accordance t the law. He should also assess the security of the company systems to detect any hacking activities and conduct system examination on computers and servers that might be compromised.
A computer security expert on the other hand has the main duty of training and promoting security awareness among computer users to ensure the security and efficient functioning of the whole system. He should also ensure that all computer data is safeguarded against destruction or any modification that is not authorized. He is also supposed to monitor any virus reports on computers and ensure that the system is protected against viruses at all times. The expert is also supposed to assess the systems regularly to guard against any risks on data.
In the next five years, there will be a lot of change in regard to computer forensics and security. Hackers will pose a very big challenge to security experts as new harmful software is constantly being developed. There is going to be further development of anti- forensic tools to counter efforts of forensic experts. Computer forensic tools will be also highly developed and improved making them easier to learn and use than they are now. The duty of forensic experts will also increase as computer hardware and storage devices are being improved to hold more data and process it at high speed.
Positions in demand within business organizations
Computer forensic has gained popularity in all forms and sizes of organizations with various job titles being available for computer forensics examiners. The titles for professionals within this field that are on demand in organizations include computer forensic examiner, forensic investigator, forensic scientist and forensic analyst. All these job titles among others are dependent on their areas of specialization and responsibilities involved in the field (Nelson, 2010).
I am likely to be a computer forensics investigator. A computer forensics investigator involves training in fighting crimes varying from offenses against children to recovery of computer file systems that have either been hacked or damaged (Nelson, 2010). Upon retrieving the required information, a computer forensic investigator comes up with a technical and detailed written report that can later be used in court as evidence. | <urn:uuid:b154195b-2d04-47db-803d-2aadb4261543> | CC-MAIN-2018-34 | http://essaysprofessors.com/samples/technology/forensics-and-security-computer-forensics-and.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210105.8/warc/CC-MAIN-20180815122304-20180815142304-00099.warc.gz | en | 0.968193 | 632 | 3.046875 | 3 |
The IP 192.168.0.1.1 is a wrong IP address, when you type quickly,it will appear this error.You have entered an extra 1, the true IP address is 192.168.0.1.
Router is the bridge between the computer and the Internet.Computers and routers have their own IP address, the IP address 192.168.0.1.1 is one of the address of the wireless router(Note: please change 192.168.0.1.1 to 192.168.0.1). After logging on to the management panel by the IP you are capable of settings like that; network management, security options, IP Qos, DNS, Proxy, LAN, WAN, WLAN settings, DSL, DHCP client, PPPOE, MAC, WPS and DSL. Also blocking and other adjustments are available.
So, what can you do if you ever forget your username or password by default? If you forget your password or username, you need to reset your router. Here’s the Default router usernamea and passwords:
Default router password list | <urn:uuid:9765eec2-96f0-466e-8908-48079b89b051> | CC-MAIN-2017-39 | http://www.routermobile.com/192-168-0-1-1 | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695726.80/warc/CC-MAIN-20170926122822-20170926142822-00562.warc.gz | en | 0.871607 | 230 | 2.859375 | 3 |
Different Types of Numbers
Date: 4/13/96 at 21:36:37 From: Anonymous Subject: Reals, intergers, whatever... I don't understand how to tell the difference between the different kinds of numbers. i.e. reals, integers, and stuff, and I was hoping you could help me.
Date: 4/14/96 at 1:21:51 From: Doctor John Subject: Re: Reals, integers, whatever... Whole numbers are the numbers you use when you count: 0,1,2,3,... Integers are all of the whole numbers and their negatives. They are ...-3,-2,-1,0,1,2,3,... (The three dots means you keep going in both directions.) There are also rational numbers. Rational numbers are all the different kinds of fractions. 1/2, 3/4, -2/3, and 5 are all rational numbers. Irrational numbers are numbers which you can write as decimals but not as fractions. Pi and the square root of 2 are irrational numbers. Real numbers are all of the rational and all of the irrational numbers put together. All of the numbers you normally deal with are real numbers. (There are also other kinds of numbers called imaginary numbers, but don't worry about those right now.) -Doctor John, The Math Forum
Search the Dr. Math Library:
Ask Dr. MathTM
© 1994-2013 The Math Forum | <urn:uuid:112ef05b-1dd4-4a45-8784-27d1b1be0f51> | CC-MAIN-2014-15 | http://mathforum.org/library/drmath/view/57077.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539337.22/warc/CC-MAIN-20140416005219-00601-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.940446 | 301 | 2.875 | 3 |
Article - 15 Apr 2008
Several promising alternative vehicle fuels offer benefits such as reduced emissions, increased energy security, and decreased reliance on foreign oil.
Article - 9 Feb 2008
Full cell vehicles are two to three times more efficient than traditional models. The fuel cell vehicle’s propulsion system is entirely different from conventional vehicles, and unlike conventional...
Article - 15 Jun 2008
Biodiesel is a form of alternative transportation fuel manufactured from renewable sources such as new or used animal fats and vegetable oils.
Article - 7 Jan 2008
Using concentrated solar energy to reverse combustion, a research team from Sandia National Laboratories is building a prototype device intended to chemically “reenergize” carbon dioxide into carbon...
Article - 8 Jan 2013
Gravity light consists of an LED bulb fixed to an adjustable lamp that can be hooked up on a wall or hung from a ceiling. It also comprises a pulley mechanism and a ballast bag hanging from the lamp...
Article - 1 Jul 2010
At the beginning of the 20th century, American drivers faced a fundamental choice: battery electric vehicles (BEVs) or gasoline-powered internal combustion vehicles (ICVs).
Article - 16 Jul 2008
Cellulosic ethanol is an alternative fuel made from a wide variety of plant materials or non-food based feedstocks, including agricultural wastes such as corn stover
Article - 17 Dec 2012
Biofuel is a fuel produced from renewable biomass material, commonly used as an alternative, cleaner fuel source to burning fossil fuels.
Article - 21 Nov 2012
The constantly increasing world population is increasing fuel consumption at a much faster rate than ever before. With many oil wells and coal resources depleting around the world, algae fuel seems to...
Article - 3 Oct 2018
Governmental agencies around the world have become increasingly interested pursuing the development of alternative energy sources and engines to replace the conventional gasoline-powered internal... | <urn:uuid:7359fd9f-eb7d-4a3b-8778-1c6de7ec0451> | CC-MAIN-2020-40 | https://www.azocleantech.com/search.aspx?q=Alternative+fuel&site=articles | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400244231.61/warc/CC-MAIN-20200926134026-20200926164026-00376.warc.gz | en | 0.926401 | 388 | 3.1875 | 3 |
I’ve been thinking long and hard about the issue of AI and morality. If you read the news, you know I am not alone and for good reason. There are so many ways one could imagine an AI system determining certain outcomes that might not exactly be to the benefit of man.
Consider my own little AI brain teaser…
Interstellar Space Paradox
Imagine a AI-controlled space ark, travelling millions of miles to a remote star system. There are thousands of souls aboard, sleeping comfortably in cryo-sleep. Along the way a small meteorite strikes the ship, temporarily causing a loss of precious oxygen. The oxygen stores are depleted by 30% and calculations show that there is not enough oxygen for all of the souls to make it to the destination. Someone in cryo-sleep has to die but who?
The AI now has to make a moralistic decision that even a human would struggle with. Does the AI do the math and kill off occupants? If so, who and how do you choose? Should the AI wake humans to make the decision?
All of these decisions should not be made by one AI based on a set of “learned” response or at least there should be another AI or human that acts as a check.
SMITE, the God AI
So the obvious first solution to the Interstellar Space Paradox is, “We will build morals into the AI!”
But this is where the problems begin. If we build decision making into an AI, how does one build an AI that will not decide to either ignore an outcome or build it’s own set of morals as it matures? A true AI is supposed to learn from decisions it makes. Like a child, it is supposed to make mistakes, learn from them, and then not make the mistake again.
Let’s unravel this further.
- How do I teach an AI to make life or death decisions?
- How can an AI learn life or death decisions without “breaking eggs” (aka killing humans) along the way?
- What if an AI decides that humans are the problem variable in an equation and decide to “remove” us?
- How do we know AI morals will equate to Human morals?
This is just a short list of questions AI moralists are asking themselves….
In my opinion, building morals into an AI system, as hard as that will be, will not suffice. I have a hard time imagining any way in which an AI will not eventually learn to modify it’s own code, it’s own thoughts, it’s own MORALS.
To this point, it seems the only way to add an additional level of humanistic control would be to introduce another AI who’s job was to act as the moral guard-band – a separate AI (I call SMITE) that can oversee the decisions of the first AI and act as a overriding figure (aka GOD) should decisions loose there moral basis. This at the very least prevents the original AI from overriding it’s own intent.
Granted, SMITE too could be coerced but in the end this is equivalent to two humans. We too can be corrupted and coerced but at the very least there would be another voice of potential reason to contend with. It’s simply too dangerous to give one AI complete decision making control is so many situations.
I am sure there were times in our live where would could have all used a SMITE. Why not do that same for our AI prodigy? | <urn:uuid:c18f5cdb-2121-4f5e-8438-b53ed443a673> | CC-MAIN-2023-06 | https://cambridgerad.com/ai-and-the-interstellar-space-paradox/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500813.58/warc/CC-MAIN-20230208123621-20230208153621-00709.warc.gz | en | 0.949734 | 732 | 2.59375 | 3 |
Robyn Flipse, MS. MA, RDN
Consultant to the Calorie Control Council
The global population is aging at a faster rate than ever before in human history. Right now the number of people throughout the world over the age of 65 makes up 8.5 percent of the total population, or 671 million people, according to International Population Reports. That number is projected to jump to 1,566 million people by 2050, making 16.7 percent of the world’s population over 65 years of age!
If you’re wondering what this has to do with aspartame and other no- and low-calorie sweeteners, there is a connection. Knowing you may live well into your 80s or 90s can provide the motivation for living better now to extend the quality of your life as you get older. That’s where aspartame can help.
Benefits of Aspartame
Since the introduction of aspartame into the food supply in the 1980s as an artificial sweetener 200 times sweeter than sugar, a growing body of research has demonstrated its role in a healthy lifestyle, including help with:
- Weight maintenance
- Weight reduction
- Reduction in the risks associated with obesity
- Diet satisfaction with less added sugars and fewer calories
- Eating a greater variety of healthy foods
- Management of diabetes
Knowing low-calorie sweeteners can support weight management is significant because, along with getting older, the World Health Organization reports we are also getting heavier. In fact, obesity has more than doubled in the global population since 1980. Today overweight and obesity are the leading risk factors for noncommunicable diseases such as heart disease, stroke, diabetes and some cancers and are now linked to more deaths worldwide than being underweight.
If you want to prevent the chronic diseases that can strip away independence as you age, achieving a healthy body weight is one of the most important steps you can take. Using aspartame in place of sugar can help by providing a sweet taste to foods and beverages with few or no calories. And it can be used by the entire family, not just those trying to lose weight, although any unintended weight loss should always be brought to the attention of your physician.
Aspartame cannot produce weight loss without making other behavior changes, but it can be a valuable tool in maintaining a balanced and satisfying diet — and that can add more healthy and happy years to your life.
Safety of Aspartame
The safety of aspartame has been closely monitored since it was first approved for use as a food additive more than three decades ago.
New research from human and animal studies is continually evaluated to uncover any potential risk to the population based on changing usage patterns and the Acceptable Daily Intake (ADI) levels established by food regulatory agencies. The ADI represents a very conservative estimate of the amount of aspartame a person can safely consume every day over a lifetime without risk. In the United States that amount is 50mg/kg body weight per day. For a 150 pound person that would be the amount of aspartame in 17 cans of diet soda or 97 packets of the sweetener. While that is much more than anyone could possibly consume every day over a lifetime, it is reassuring to know they would not be adversely affected even at that high a level.
Food safety experts report aspartame does not cause damage to the genes or induce cancer, does not harm the brain or nervous system, and does not affect behavior or cognitive function in children or adults. They also have found no risk to the developing fetus from its use during pregnancy at the current ADI levels (except in women suffering from PKU).
Regulatory agencies representing more than 90 countries have conducted their own scientific reviews of the research on aspartame and approved it as safe for their populations. This list includes the United States, Canada, the member countries of the European Food Safety Authority (EFSA), France, Australia, New Zealand and Brazil. In 2013, the EFSA re-issued its Scientific Opinion on the safety of aspartame as a food additive and found no new safety concerns and no reason to revise the ADI of 40mg/kg body weight per day.
It is reassuring to know there is a consensus among so many experts about the safety of aspartame, especially when conflicting reports are in the news. Living well into our nineties is a big enough challenge without having to worry about that!
Robyn Flipse, MS, MA, RDN is a registered dietitian, cultural anthropologist and scientific advisor to the Calorie Control Council, whose 30+ year career includes maintaining a busy nutrition counseling practice, teaching food and nutrition courses at the university level, and authoring 2 popular diet books and numerous articles and blogs on health and fitness. Her ability to make sense out of confusing and sometimes controversial nutrition news has made her a frequent guest on major media outlets, including CNBC, FOX News and USA Today. Her passion is communicating practical nutrition information that empowers people to make the best food decisions they can in their everyday diets. Reach her on Twitter @EverydayRD and check out her blog The Everyday RD. | <urn:uuid:f4279205-d5c1-4bd6-95fe-55a01d6ea0db> | CC-MAIN-2020-16 | https://aspartame.org/aspartame-turns-35/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370525223.55/warc/CC-MAIN-20200404200523-20200404230523-00104.warc.gz | en | 0.95397 | 1,056 | 2.953125 | 3 |
- Special Sections
- Public Notices
Los Alamos National Laboratory Tuesday began demolishing a Cold War-era complex of buildings in Technical Area 21, that once housed plutonium production and historic, nonweapons research.
“We’re seeing something this morning that has not happened since the late 1940s,” LANL Deputy Director Ike Richardson said. “The Los Alamos skyline is starting to change.”
More than 50 guests, including elected officials and representatives from New Mexico’s Congressional delegation, watched as two large excavators began tearing away walls of the two-story, 22,000-square-foot former lab building.
“This is a symbol of times changing and getting better,” said New Mexico Environment Department Secretary Ron Curry.
Curry ceremonially started the demolition by giving the go ahead on a two-way radio.
LANL was able to accelerate demolition and cleanup of this complex because of a $212 million award from the American Recovery and Reinvestment Act. More than 165,000 square feet of former research, production and office buildings are in line to be demolished.
“This was the second generation of Lab buildings,” said Environmental Projects Manager George Rael of the Los Alamos Site Office. “In the fingerlike mesas upon which the lab and the town site rest, TA-21 was the pointer finger ... Everything was happening here.”
TA-21 Closure Project Manager Al Chaloupka spoke about the educational aspects of the project.
“We’re able to train laborers, heavy equipment operators and others who, once this project is done, will be able to train new workers so the program perpetuates itself. Once trained, these workers will be able to do similar work and even become supervisors for contractors here at the Lab,” Chaloupka said.
LANL’s environmental spokesman Fred deSousa explained that historic achievements at TA-21 included production of nuclear weapons components used in tests in the Pacific and at the Nevada Test Site, isolation of the first gram of americium-241—later used in smoke detectors, and the development of plutonium heat sources now aboard the Galileo and Cassini space probes.
Rubble from the buildings will be sent to licensed disposal sites, he said. Contaminated rubble will go to sites in Utah or Nevada in approved transportation containers.
Recovery Act funding also will help towards cleaning up the Laboratory’s first waste disposal pits, used from 1944 through 1948 and the installation of 16 new groundwater-monitoring wells. | <urn:uuid:13213cdd-178b-4533-8f89-61ddd5cf60c5> | CC-MAIN-2016-22 | http://www.lamonitor.com/content/full-scale-demolition-begins-ta-21 | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464050919950.49/warc/CC-MAIN-20160524004839-00215-ip-10-185-217-139.ec2.internal.warc.gz | en | 0.943946 | 530 | 2.65625 | 3 |
As a physician anesthesiologist, I know how challenging it can be to treat patients who are in pain. For most people, pain is temporary. But for more than 100 million Americans, there is no end to pain.
Chronic pain can be broad or focused, dull or sharp, distracting or excruciating, and in many cases, debilitating.
Your likelihood of experiencing chronic pain increases with age. Gender can also influence how much pain you have. In general, women report having more pain than men.
The Serious Effects of Pain
Living with chronic pain can affect your life in many ways:
Mental health changes. According to a 2006 survey from the American Academy of Pain Medicine, almost two-thirds of people living with chronic pain have reported a decrease in overall happiness and 77 percent reported feeling depressed.
Increased fatigue. Pain can affect your daily functioning, resulting in decreased concentration, diminished energy levels, and difficulty falling or staying asleep.
Decreased job performance. Chronic pain costs the U.S. more than cancer, heart disease, and diabetes. Health economists estimate that the cost of chronic pain may be as high as $635 billion a year, according to a report published in the Journal of Pain. We can only guess how many people have been limited in their professional advancement because of pain.
Which Doctor Is Best at Treating Pain?
If you are experiencing pain, your first stop should be to visit your primary care physician. A 2010 analysis of a national medical database found that 13 percent of all doctors visits were to discuss pain. Of these visits, 45 percent were at a primary care physician's office. Less than 1 percent of those surveyed sought help from a specialized pain physician.
Specialized pain physicians are underused by patients, probably because the specialty is relatively new and people don't know about it. These physicians are trained to treat difficult pain conditions using the most advanced treatments.
I like to compare pain physicians to football players. The goal of all of these doctors is the same — to relieve pain — but the role they play varies:
Anesthesiologists spend four years of their training managing anesthesia and pain control in surgical patients. Most pain specialists are anesthesiologists, and they can offer a full array of pain treatments.
Neurologists focus on targeting the neural, or nerve, aspects of pain. Treatments include medications and procedures to treat nerve-related pain.
Physical medicine and rehabilitation physicians focus on relieving pain and improving their patients' day-to-day functioning via physical therapy and physical reconditioning.
The Future of Pain Treatment
Recently, the American Society of Anesthesiologists analyzed dozens of peer-reviewed medical journals from the past year to create its first Women’s Pain Update. Highlights from the report include:
Success with alternative pain-relief methods such as music, yoga, and rose oil.
Breast cancer research that found the type of anesthesia used during breast cancer surgery can affect how quickly and comfortably you recover.
New research has also led to the development of medications that can decrease nerve irritation and depression caused by pain. Similarly, there are several new procedures that can treat pain.
For example, pain specialists can use X-ray or ultrasound imaging guidance to provide relief through steroid injections that target specific nerves and areas of the spinal cord. The procedure is fairly low risk when administered by a physician specifically trained in interventional pain treatments. All three major pain societies, the American Pain Society, the American Society of Interventional Pain Physicians, and the American Academy of Neurology, state that epidural steroid injections are best suited for those with a pinched or inflamed nerve root (also called radiculopathy).
However, we still have a lot to learn about steroid procedures. Studies have shown that any type of epidural injection — including saline — can relieve pain. In fact, such injections provide twice the pain relief of intramuscular steroid injections, without the associated risks.
Don't resign yourself to a life in pain. If you are one of the millions of people lacking an effective remedy for your pain, a trained pain medicine physician may be able to help you achieve your pain management goals. | <urn:uuid:330ca516-9264-4af9-a6f9-6541f9ed6696> | CC-MAIN-2023-40 | http://www.oiiodailyhealth.com/Details/Detail/124 | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510529.8/warc/CC-MAIN-20230929222230-20230930012230-00509.warc.gz | en | 0.955609 | 852 | 2.5625 | 3 |
Slide 1: Etiquette Slide 2: Etiquette ?
Webster’s dictionary defines it as “the forms , manners, and ceremonies established by convention as acceptable or required in social relations, in a profession, or in official life.” Manners
Thought Slide 3: Where Etiquette is required Personal
Home, Schools, College
Office When Etiquette is required Part of your life
You and the environment Slide 4: Why Etiquette is required ? Professional etiquette - must for Career
builds leadership, quality, business & careers
It refines skills needed for exceptional service Without Etiquette
You limit your potential
Risk your image
Jeopardize relationships Slide 5: Differentiates them in competitive market
Honors Commitments to quality and excellence
Enables them to be confident in a variety of settings with a variety of
people from all walks of life
Modifies distracting behaviors and develops admired conduct How Etiquette Pays Off ! Slide 6: Factors Influencing Etiquette Physical
External Appearance Schooling
Marital life Psychological Childhood Origin Parental Heredity Slide 7: Your Behavior Making Right Friends
Cultivating the charm
Class & Quality
Enemy - The Anger
Patience Tolerance - Carrier Slide 8: Personal Hygiene
Jewellery Mind & Soul
Prefered Liked Loved
Talking while standing
Sitting in Groups PERSONAL ETIQUETTE Slide 9: Personal Etiquette Dress Codes Informal Formal Simplicity
Sense of Taste
Dressing for Occasions Slide 10: Empathy
Heredity Family Etiquette Slide 11: Basic Etiquette for a happier home Don’t nag
Don’t try to make your partner over
Give honest appreciation
Pay little attentions
Don’t be Ignorant
Know first - Talk next Slide 12: You Office Codes Behavior
Rules & Regulations
Policies & Principles
Regularity / Punctuality
Organising your day
Uniform / Dress Codes
Reporting for duty
Greetings OFFICE ETIQUETTE Subordinates
Casual / Contract Workers Bosses
Superiors Slide 13: First Name - Formal Style
Official Introductions - Acknowledgements
Managing The Boss
Gossips / Yapping
Conflicts / Disputes / Memos Timings
Answering a phone
Taking a message - Holding -
Short - Crisp - Clear communications
Ending a Conversation
Voice Mail Slide 14: Some Basics of Office Etiquette Some principles which office employees can utilize to make a
contribution follows Be polite, pleasant and courteous when answering the telephone
Answer promptly any telephone that rings in the office
Avoid blowing and popping gum in the office
Be discrete when coughing or yawning
Avoid applying makeup at the desk
Use positive body language
Avoid eating at your desk when dealing with public
Be tactful with rude people
Avoid personal conversation when a client is waiting Slide 15: Etiquette for Reprimanding & Counseling Begin with praise and honest appreciation
Call attention to people’s mistakes indirectly
Talk about your own mistakes before criticizing the other person
Ask questions instead of giving direct orders
Let the other man save his face
Praise the slightest improvement and praise every improvement.
Be “hearty in your approbation and lavish in your praise”
Give the other person a fine reputation to live up to
Use encouragement. Make the fault seem easy to correct\
Make the other person happy about doing the thing you suggest Slide 16: Other things office employees should watch out for follow Be punctual
Avoid annoying habits
Discourage personal office visitors
Do not use strong perfume or cologne
Do not wear noisy jewellery
Be tactful with rude people In fact, the efforts of employees will be more fruitful and effective if
each practices the common maxim
“treat a person the way you wanted to be treated” Slide 17: Smile It costs nothing, but creates much
It enriches those who receive, without improvishing those who give
It happens in a flash and the memory of it sometimes lasts forever
None are so rich they can get along without it, and none so poor but
are richer for its benefits. Slide 18: Etiquette to make People Like You Become genuinely interested in other people
Remember that a man’s name is to him
Be a good listener. Encourage others to talk about themselves.
Talk in terms of the other man’s interest.
Make the other person feel important - and do it sincerely. Slide 19: Etiquette to win People in your way The only way to get the best of an argument is to avoid it
Show respect to other man’s opinions. Never tell a man he is wrong
If you are wrong, admit it quickly and emphatically
Begin in a friendly way
Get the other person saying “yes, yes” immediately
Let the other man feel that the idea is his
Try honestly to see things from the other person’s point of view
Be sympathetic with the other person’s ideas and desires
Appeal to the nobler motives
Dramatize your ideas
Throw down a challenge Slide 20: Hotels
Down town / Business / Transit Hotels
Classification Hotel Etiquette Slide 21: Clean my Room Card
Do not Disturb Card
Shoe shine strip
Bottle openers Stationary folder containing
Guest Comments form
Ash tray with match box on coaster
Candle stand with candle on coaster
Room Service Menu Breakfast card hanger
Business Centre pamphlet
Sewing kit GUEST SUPPLIES / ROOM SUPPLIES Slide 22: Directory of service
Telephone Directories with covers
Soap basket with choice of 3 soaps
Bathroom tumblers with glass covers on coasters Bed room slippers
Good night chocolate
Personalised stationery folder in suites
Cookies GUEST SUPPLIES / ROOM SUPPLIES Slide 23: Bath Towels
Bath Rug LINEN Slide 24: Dining Etiquette Table settings are like road maps that guide you through
the courses of a meal.
Forks are placed to the left of the plate
Glasses or crystal stem-ware are to the right of the dinner plate.
Knives and spoons are placed at the right side of the plate.
Remember the “etiquette rule”, solids to the left, liquids to the right.
During the courses of a meal you pick up the silverware pieces from the outside in, toward your plate.
When posting a dinner, don’t forget your guest’s special dietary needs.
Do try a little of everything on your plate.
Napkins are to remain on your lap until the completion of the meal.
Do compliment the host/ess on the preparation, tastiness or presentation of the meal Slide 25: Basic Table Manners Beginning of the meal
It is best to order foods that can be eaten with a knife and fork. Finger foods can be messy and are best left for informal dinning.
Do not order alcoholic beverages.
Do not smoke while dining out.
Sit up straight at the table. It makes a good impression.
Do not season your food before you have tasted it.
Never chew with your mouth open or make loud noises when you eat.
Do not slurp soup from a spoon. Spoon the soup away from you when you take it out of the bowl and sip it from the side of the spoon. If your soup is too hot to eat, let it sit until it cools; do not blow on it. Slide 26: When ordering or serving wine :
Red wine generally is served with red meat; white wine with poultry or fish.
A wine’s sugar content shouldn’t rival Captain Cruch.
Nice people don’t drink Ripple, Thunderbird or “Mad Dog”
Sweet and fortified wines should be served with dessert, not the main course.
If it is your main course, get help
If you feel the need to reach for the last piece of chicken, do so at your own risk. Impalement is an ugly thing.
“Finger-lickin’ good” is a slogan, not a suggestion.
Napkins and sleeves are not interchangeable. Neither are shirttails and tissues, for that matter.
If offered a lobster bib, by all means take advantage of it.
Yes, you are supposed to eat that sprig of parsley decorating your plate. Think of it as an organic,after-dinner mint. Slide 27: Basic Table Manners If food gets caught between your teeth and you can’t remove it with your tongue, leave the table and go to the mirror where you can remove the food from your teeth in private.
You should not leave the table during the meal except in an emergency.
Something that you need which cannot be reached easily, politely ask the person closest to the item you need to pass it to you.
Dropping down of silver ware
Food spillage off your plate
Removing inedible from the mouth
Offering food at table
Finger Bowls Slide 28: Foods to be taken by hands Bacon
Chips, French fries, Fried Chicken, and Hamburgers
Hors d”Oeuvres, Canapse, Crudites
Small fruits and Berries on the stem
Snacks Slide 29: Cocktail Etiquette Cocktails and Cocktail Party - Guests are mostly standing and dress attire can range from business to casual.
Cocktail Buffet - Small tables and chairs are set up for guests after they fill up their plates at the buffet station. The attire is usually formal or business attire. This event can last 2-3 hours.
Cocktail Reception - The most formal event. Attire is very dressy for women and usually black tie for men. The reception can be held for a distinguished guest of honor or event, such as an opening of a new performing arts center or film premier. There is so much food that the reception can count as dinner and Champagne is always served. Slide 30: Tips to maneuver your way as a guest at a cocktail party Do some research on the guests attending the cocktail party. ‘Small talk’ will be much easier for you.
Determine what your goals are. Whether you are social or business networking, keep in mind your goal(s) in attending this party.
Do extend your hand and introduce yourself to unfamiliar guests. Maintain eye contact during introductions and conversations.
Circulate (make the rounds) a little before you head to the bar or buffet table. Food and drink should not be the main goals.
Don’t get drunk.
Do keep conversations away from sex, politics and religin.
Keep drinks and food in your left hand. Your right hand will be free for meeting, greeting and departure.
If attending a cocktail party in a private home, treat household staff with dignity and respect.There are to be no personal or special requests from you to the staff. Slide 31: Some Common-Sense do’s and don’ts for dinner : When at a dinner party, don’t expectorate on the floor...unless the hostess does first.
Never eat peas with your knife, unless mashed potatoes are served as well.
Do not ask for something which is irrelevant or N.A.
Chew with your mouth closed. Everyone else at the table already knows what you are having for dinner
Conversation at the table should be light, witty and extemporaneous. Death, diapers and delivery are not acceptable topics.
If your infant must eat with you and your guests and junior spits his pablum all over your great aunt’s Dior gown, please don’t try to pass it off by saying: “Isn’t he the outest thing...and so smart, too!”
“Only cannibles eat standing up.” Slide 32: What is the proper way to shake hands ?
What exactly does RSVP mean
How early should you begin teaching children etiquette
For an upcoming dinner party, I plan to give flowers as a hostess girl. That’s correct, isn’t it ?
When hosting clients from overseas, where should I take them for dinner ?
I’ve noticed a lot of women wearing open toe stiletto sandals at formal functions in the dead of winter. Is this appropriate ? Other General FAQ’s on Etiquette Slide 33: What should you do if you are served a dish at a party that gives you an allergy?
If the host is not looking, should you help yourself to another drink from the bottle?
If you are seized by a coughing fit during the meal, what should you do?
Your host has offered you tea which you do not drink at all
You are invited to a cocktail party but you do not drink FAQ’s At Party Slide 34: You have gone to a restaurant where you find the service is very poor. Calling the waiter is very difficult. What can you do?
You have seen the waiter dipping his finger in your finger bowl before bringing it to you. You do not like it. What do you do?
You go to an expensive restaurant for lunch with a not-too-rich friend. You want to pick up the tab, so as not to burden him financially. He, on the other hand, insists on paying the entire amount from his own packet. What should you do? FAQ’s Eating Out Slide 35: You have entered your train compartment in a hurry and knocked over someone’s water pitcher. Of course, it broke. The traveller is a lady with two children. What should you do?
You have gone to see a movie and the person behind you is constantly talking loudly and disturbing you. FAQ’s Travelling Your boss who is otherwise very nice is very short-tempered at times. One day he shouts at you in front of a group of visitors. You feel humiliated. What will you do? FAQ’s At Work Slide 36: Etiquette Thank you! | <urn:uuid:d3e3da8a-0c95-41eb-b9a5-7ecac66fedb9> | CC-MAIN-2014-35 | http://www.authorstream.com/Presentation/Jayeeta-87177-etiquette-entertainment-ppt-powerpoint/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830903.34/warc/CC-MAIN-20140820021350-00296-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.883114 | 2,962 | 2.8125 | 3 |
Making it through the frigid Martian temperatures after being deployed by NASA’s Perseverance rover is a major milestone for the small rotorcraft.
NASA’s Ingenuity Mars Helicopter has emerged from its first night on the surface of Mars.
Evening temperatures at Jezero Crater can plunge as low as minus 130 degrees Fahrenheit (minus 90 degrees Celsius), which can freeze and crack unprotected electrical components and damage the onboard batteries required for flight. Surviving that first night after being deployed from where it was attached to the belly of NASA’s Perseverance rover on April 3 is a major milestone for the 4-pound (1.8 kilograms) rotorcraft. In the days to come, Ingenuity will be the first aircraft to attempt powered, controlled flight on another planet.
“This is the first time that Ingenuity has been on its own on the surface of Mars,” said MiMi Aung, Ingenuity project manager at NASA’s Jet Propulsion Laboratory in Southern California. “But we now have confirmation that we have the right insulation, the right heaters, and enough energy in its battery to survive the cold night, which is a big win for the team. We’re excited to continue to prepare Ingenuity for its first flight test.”
Devising a craft small enough to fit onto the rover, light enough to fly in Mars’ thin atmosphere, yet hardy enough to withstand the Martian cold presented significant challenges. To ensure the solar array atop the helicopter’s rotors could begin getting sunlight as soon as possible, Perseverance was instructed to move away from Ingenuity shortly after deploying it.
Until the helicopter put its four legs onto the Martian surface, Ingenuity remained attached to the belly of the rover, receiving power from Perseverance, which touched down at Jezero Crater on February 18. The rover serves as a communications relay between Ingenuity and Earth, and it will use its suite of cameras to observe the flight characteristics of the solar-powered helicopter from “Van Zyl Overlook.”
The sole mission of Ingenuity, a technology demonstration, is to conduct flight tests in the thin atmosphere of Mars; the helicopter carries no science instruments. Within 30 Martian days, or sols (a Martian day is 24.6 hours), on the surface, Ingenuity will complete its testing, and Perseverance’s scientific exploration of Jezero Crater will kick into high gear.
“Our 30-sol test schedule is frontloaded with exciting milestones,” said Teddy Tzanetos, deputy operations lead for the Ingenuity Mars Helicopter at JPL. “Whatever the future holds, we will acquire all the flight data we can within that timeframe.”
The Month of Ingenuity
On April 4, Perseverance downlinked the first of the images of the helicopter on the surface of Mars. Taken by the rover’s rear left Hazard Avoidance camera, the image shows the helicopter’s rotor blades still stacked in alignment on top of each other (a configuration used to save room during the trip to Mars) and its four footpads firmly planted into the surface of Mars.
For the next two days, Ingenuity will collect information about how well the thermal-control and power systems perform now that the small helicopter is standing on its own in the Mars environment. That information will be used to fine tune Ingenuity’s thermal-control system to help it survive the harsh Mars nights through the entire flight experiment period.
On April 7, the restraints that have been holding the rotor blades together since before launch are scheduled to be released. If the mission team meets that milestone, the next several sols will involve more testing of the rotor blades as well as the motors that drive them. There are also checkouts of the inertial measurement unit (an electronic device that measures a body’s orientation and angular rate) and onboard computers tasked with autonomously flying the helicopter. Additionally, the team will continue to monitor the helicopter’s energy performance, including assessment of solar-array power and state of charge of the craft’s six lithium ion batteries.
If all goes well with each of the myriad preflight checks, Ingenuity’s first attempt to lift off from the middle of its 33-by-33-foot (10-by-10-meter) “airfield” – chosen for its flatness and lack of obstructions – will be no sooner than the evening of April 11.
Subsequent flight tests will be scheduled throughout the Month of Ingenuity, with Perseverance’s cameras providing plenty of high-definition images of the historic mission.
More About Ingenuity
The Ingenuity Mars Helicopter was built by JPL, which also manages this technology demonstration project for NASA Headquarters. It is supported by NASA’s Science Mission Directorate, the NASA Aeronautics Research Mission Directorate, and the NASA Space Technology Mission Directorate. NASA’s Ames Research Center and Langley Research Center provided significant flight performance analysis and technical assistance.
At NASA Headquarters, Dave Lavery is the program executive for the Ingenuity Mars Helicopter. At JPL, MiMi Aung is the project manager and J. (Bob) Balaram is chief engineer.
JPL, which is managed for NASA by Caltech in Pasadena, California, built and manages operations of the Ingenuity Mars Helicopter. | <urn:uuid:ed4ec42a-8fcc-4bea-a932-9259ab0ef6f3> | CC-MAIN-2022-21 | https://scitechdaily.com/nasas-ingenuity-mars-helicopter-survives-first-frigid-martian-night-on-its-own/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662550298.31/warc/CC-MAIN-20220522220714-20220523010714-00023.warc.gz | en | 0.930955 | 1,142 | 2.953125 | 3 |
Jahns - what does Jahns surname mean?
It could reasonably be argued that this is the most famous name and surname of the Christian World. It was recorded from the 12th century a.d. onwards in every European country, and in a vast range of spellings, of which there are believed to be over fourteen hundred in total. These range from the base forms such as Jon or John (England & Wales), Evan (Wales), Ian (Scotland), Shane (Ireland), Ivan (Russia) and Jean (France), to the Italian Giovanni, Zanni and Zoane, the Polish Janus, the Czeck Jan, Janak and Jansky, to the diminutives Jenkin, Jeannet, Nannini, Zanicchi, and Gianuzzi, the patronymics Johnson, Joynson, Jenson, Jocie, Ivanshintsev, and Ivashechkin. However spelt, all have derived from the biblical Hebrew `Yochanan`, which translates as ` He who Jehovah has favoured (with a son)`. The name became particularly popular after the 12th century when returning Crusaders from the Holy Land often called their children by biblical names in commemoration of the fathers pilgrimage, these then in turn developed into surnames. The earliest recordings of surnames are to be found in Britain and amongst these is Thomas John in the `Hundred Rolls` of the county of Buckinghamshire for the year 1279, and Arnold Johan in the 1280 `Letter Book` register for the city of London. In Germany Walterus filius Johannis appears in the 1323 charters of the town of Vaihingen, whilst the 1344 charters of the city of Friedberg record Baumeister Johannssen. The first recorded spelling of the surname in any spelling is believed to be that of Pertus Johannis, which was dated 1230 a.d.. This is in the charters known as the `Close Rolls` of the county of Suffolk`, during the reign of King Henry 111 of England,1216 to 1272.
Get the Jahns surname meaning widget for your website!
Select and copy the text below in your website's code. | <urn:uuid:4b12ed23-2932-487d-a3f3-4a7b55865299> | CC-MAIN-2014-42 | http://mysurna.me/surname.php?s=Jahns | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637900029.49/warc/CC-MAIN-20141030025820-00207-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.938548 | 456 | 2.671875 | 3 |
Canadian History Quizzes & Trivia
Do you know in which year the Battle of Carillon was fought? What was the name of the first newspaper in Canada? Check out these online Candian history quizzes to learn as you play.
Top Trending Quizzes
The physical geography of Canada is widely varied. Boreal forests prevail throughout the country, ice is prominent in northerly Arctic regions and through the Rocky Mountains, and the relatively flat Canadian Prairies in...
Questions: 15 | Attempts: 3129 | Last updated: Mar 21, 2022
Sample QuestionWho is Canada's Prime Minister?
How well do you know Canada? This quiz has a variety of questions with varying degrees of difficulty. Focus mainly on the last century.
Questions: 9 | Attempts: 1863 | Last updated: Jan 11, 2023
Sample QuestionWhat is the capital of Canada?
What Do You Know About The North-West Rebellion? The rebellion resulted from rising fear and insecurity among the Métis, First Nations peoples, and the white settlers. Some battles saw outbreaks of violence in 1885. The...
Questions: 9 | Attempts: 129 | Last updated: Mar 20, 2022
Sample QuestionWhen were the boundaries of Manitoba changed?
How Much Do You Know About The History Of Northwest Territories? These territories are in the northern part of America, and not only do they have amazing terrains but have a very captivating story about the past. How about you...
Questions: 11 | Attempts: 139 | Last updated: Mar 21, 2022
Sample QuestionWhy and when did Canada purchase Rupert's land?
Welcome to the History Of Northwest Territories Part- II. These territories were formed as a result of land being given back by the British. How about you take up this interesting quiz on these regions and get to see how much you...
Questions: 10 | Attempts: 71 | Last updated: Mar 21, 2022
Sample QuestionWhat majority of people were living in the Northwest? | <urn:uuid:bb5cbded-356f-4488-ba81-c410e07f1694> | CC-MAIN-2023-23 | https://www.proprofs.com/quiz-school/topic/canadian-history | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649193.79/warc/CC-MAIN-20230603101032-20230603131032-00245.warc.gz | en | 0.952882 | 421 | 3.3125 | 3 |
The water flea Daphnia magna was studied as a potential model of the potency of inhalation anaesthetics in humans. Anaesthesia was defined as lack of movement to a noxious stimulus (strong light). Effective concentrations which produced anaesthesia of 50% of the individuals (EC50) for halothane, isoflurane and enflurane were 1.006, 1.156 and 1.415, respectively. Anaesthesia was reversible rapidly. It is suggested that Daphnia should replace vertebrates in early studies of inhalation anaesthetic potency. | <urn:uuid:461fb913-93cc-4e77-82ea-c6d30bf52bb8> | CC-MAIN-2021-21 | https://minnesota-staging.pure.elsevier.com/en/publications/a-model-to-test-the-potency-of-inhalation-anaesthetics | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988758.74/warc/CC-MAIN-20210506144716-20210506174716-00159.warc.gz | en | 0.965352 | 117 | 2.703125 | 3 |
Women, children and young people in the poorest countries in Africa, Asia and Latin America, face problems that kill them, harm them or hold them back.
Problems like severe complications in pregnancy and childbirth, deadly diseases and unacceptable violence.
The Sustainable Development Goals (SDGs)
Building on the Millennium Development Goals the Sustainable Development Goals are a plan to end poverty, protect the planet and ensure that all people enjoy peace and prosperity.
The life course
The WHO defines health as "a state of complete physical, mental and social well-being and not merely the absence of disease or infirmity". The life course approach can help realise the vision of the SDGs - well-being for all, at all ages.
Key stages in people’s lives have particular relevance for their health. The life-course approach is about recognising the importance of these stages in life and focusing on the impact of health determinants - the economic, environmental and social conditions - on health and well-being at these stages.
Tragically, many children across the world die before their fifth birthday. This is most often due to preventable or treatable causes.
Young people face a wide range of problems including poor sexual and reproductive health, abuse such as female genital mutilation, and self-harm.
Women face immense challenges to their health and wellbeing. Many of these are linked to avoidable health issues and underlined by gender inequalities.
Pregnancy, delivery and after birth
Women and babies in developing countries, face a dangerous time, particularly during pregnancy, childbirth and the period after birth. | <urn:uuid:9023ab49-ed3c-44e4-8a65-14c1437b94cd> | CC-MAIN-2019-26 | https://www.womenandchildrenfirst.org.uk/issues | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998817.58/warc/CC-MAIN-20190618203528-20190618225528-00460.warc.gz | en | 0.932429 | 324 | 3.78125 | 4 |
In an ideal world, mistakes would never be made. In a nearly ideal world, mistakes would be quickly corrected. In either of those worlds, innocent people would never face the risk of a criminal conviction because they could count on the truth coming out.
Sadly, our world is less than ideal. It is an unfortunate reality that innocent people are not only charged but convicted. More than 160 people who were on death row have been exonerated after their innocence was finally discovered. Many served decades in prison for crimes they did not commit.
Nobody knows how many innocent people accused of noncapital crimes are serving sentencing sentences they do not deserve. Most death penalty exonerations have been based on DNA evidence, but evidence containing DNA is gathered in only a small percentage of crimes.
Criminal defense lawyers pride themselves on being the guardians of liberty. We do everything we can to assure that the innocent are never convicted. To minimize the risk of a wrongful conviction, innocent individuals should retain a lawyer as soon as they realize they might be suspected of wrongdoing.
Innocent Defendants Face a Real Risk of Conviction
Innocent people are falsely accused and wrongly convicted of crimes for many reasons. Among the most common are:
- A malicious accusation by someone who wants to make trouble for the accused
- Mistaken identification
- Unreliable scientific evidence
- Victims or witnesses perceive events incorrectly
- Victims or witnesses have unreliable memories
- Witnesses are pressured to give false statements
- The police fail to pursue evidence that is inconsistent with their theory of guilt
- Police or prosecutors conceal evidence of a defendant’s innocence
An accused who committed a minor offense may face conviction of a more serious offense because of the common practice of overcharging. Yet many people who committed no offense at all find themselves facing jail or prison time despite their innocence.
Why Innocent Defendants Need a Lawyer
It is naïve to think that you can tell your story to a prosecutor, clear up the misunderstanding, and walk free. Keep in mind that anything you say can be used against you. You might think that what you are saying proves our innocence, but your words may be misinterpreted and used as an admission of guilt.
While good prosecutors never want to prosecute the innocent, they are not on the side of criminal defendants. Once you have been arrested and charged, prosecutors do not presume that you are innocent. They see their job as obtaining a conviction.
Your lawyer is the only person in the system who will fight for your rights. Prosecutors are advocates for the government that charged you. Judges are, at best, neutral. The only advocate for your innocence is your own lawyer.
Don’t Wait to Hire a Lawyer
People who agree to talk to the police, thinking they have nothing to hide, often talk themselves into a jail sentence. Particularly when the police do not record the interview, they may twist your words until they suggest something you did not mean.
Any time the police want to question you about a crime, your response should be “I won’t talk to you unless my lawyer is present.” Your next step should be to call a Cedar Rapids criminal defense attorney to get the advice you need to avoid a wrongful conviction. | <urn:uuid:62caf3b1-1089-41c2-af3f-de5b9fb97dd8> | CC-MAIN-2023-06 | https://scheetzlaw.com/do-i-need-a-lawyer-to-represent-me-if-i-am-accused-of-a-crime-but-innocent/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500250.51/warc/CC-MAIN-20230205063441-20230205093441-00070.warc.gz | en | 0.969108 | 658 | 2.65625 | 3 |
Dignity and Respect
The Dignity & Respect message is designed to help us have respectful interactions with others. The D&R initiative is to help:
- Understand how we see ourselves, how we see others, and how our filters guide our behavior toward others.
- Respond to others in a culturally appropriate manner and work through differences together.
- Understand how our interactions with and perceptions of others influence our decisions in the workplace.
- Understand our role in making organizations better places for ALL to work—with all of our diferences.
- Attract and retain diverse students, faculty, and staff.
What Can You Do?
7 Pillars of Dignity and Respect
START WITH YOU
Self-Awareness is the first step toward becoming a Champion. Understand that our filters guide how we see ourselves and others.
SWEAT THE SMALL STUFF
Understand the concepts of intent vs. impact. Become mindful of how you respond to others and be responsible for your words and actions.
BUILD CULTURAL AWARENESS
Respond to others in a culturally appropriate manner. Treat others the way they want to be treated.
FIND COMMON GROUND
Work through differences and gain agreement, while maintaining dignity and respect. Acknowledge the value of different perspectives.
JOIN THE TEAM
Create interactions on teams that are respectful of individual differences, build trust, limit bias and favoritism, and strive for the best overall outcomes.
LEAD THE WAY
Make inclusion, dignity, and respect a part of your day-to-day practices.
DO THE RIGHT THING
Do your part to make your organization, school, community and sports team a better place for all to work, learn, live and play.
30 Tips to Practice
Dignity and respect are crucial to building and sustaining a climate in which everyone feels included, valued and appreciated. Every voice counts. Be part of the positive change. Here are 30 Tips of Dignity and Respect, practice one each day:
- Start with you
- Sweat the small stuff
- Say “Hello”
- Say “Thank you”
- Build cultural awareness
- Treat others the way they want to be treated
- Make a new friend
- Demonstrate mutual respect
- Find common ground
- Communicate respectfully
- Practice patience
- Seek understanding
Share your point of view
16. Join the team
17. Get someone else’s point of view
18. Be open
19. Be flexible
20. Reinvent the wheel
21. Be a relationship builder
22. Lead the way
24. Remember we all make mistakes
25. Do the right thing
26. Become a mentor
27. Lend a hand
28. Live a healthy life
29. Be a champion of dignity and respect
firstname.lastname@example.org | #ParksideRespect
Give It. Be It. Expect Respect.
Dignity and respect are crucial to building and sustaining a climate in which everyone feels included, valued and appreciated. Every voice counts. Be part of the positive change. | <urn:uuid:18c47ae3-ea7a-47ba-93d2-edc5f36dcd91> | CC-MAIN-2019-26 | https://www.uwp.edu/explore/offices/diversityinclusion/dignityandrespect.cfm | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000613.45/warc/CC-MAIN-20190627035307-20190627061307-00085.warc.gz | en | 0.858891 | 657 | 3.40625 | 3 |
We need a diversity blueprint to help students learn whether it’s a webinar, lecture, or e-learning course. According to Keith Edyburn that means taking an engineering approach to universal design for learning (UDL). He reports on nine case studies and introduces the Design for More Types model. The aim is to turn design concepts into practical “active ingredients that can be carefully defined, measured and evaluated”. Edyburn claims personal commitment to the principles of UDL is not sufficient to enhance student engagement. The table below is from the paper, where Edyburn looks at both targeted learners and others who also benefit.
The thrust of this paper Universal Design Engineering, is that theory is all very well but doesn’t actually make it happen. If you take a practical engineering approach, you are more likely to engage students and increase their success rate. There is more detail about turning information into digital text, testing designs, and determining cost-benefit.
The paper is from the proceedings of the UDHEIT 2018 conference held in Dublin, Ireland, an open access publication.
What’s involved in training actors with disability? This is one topic that needs a lot more exploration now that people with disability are being included in productions. One place to start is the material that’s been developed for Universal Design for Learning (UDL). Deric McNish’s book chapter, Training Actors with Disabilities, provides an interesting perspective on the issues and discusses various approaches to theatre courses. You will need institutional access for a free read. The chapter can be purchased from SpringerLink.
Abstract: This essay presents accessible training methods for students with disabilities in college acting, voice, and movement courses. It presents teaching strategies selected from a survey of prominent professors, as well as from actors with disabilities that have worked professionally and completed an actor training program. This paper presents some valuable perspectives on a largely unexplored topic and offers multiple approaches, including ways to adapt popular acting, voice, speech, and movement pedagogies for the greatest variety of students, ways to effectively communicate with college students with disabilities, ways to apply Universal Design for Learning in practice-based theatre courses, and responsible strategies for portraying disability identity during in-class scene work.
Understanding finance-speak is difficult for quite a few of us according to the latest HILDA survey reported in The Conversation. Perhaps it is time to take a look at what they are doing in Universal Design for Learning on this topic. If curriculum designers can devise a program for young people with disabilities about to enter the workforce then perhaps it would work for the rest of us. The article in The Conversation highlights the inequitable divide by age and gender when it comes to understanding finances. This is another reason to apply universal design principles to financial literacy. While women scored lower than men, generally men still have low levels of financial literacy. Given that most adults can function well in other areas of literacy, the finance sector has much to do to bring us up to speed. Low levels of financial literacy are over-represented in poverty statistics so this has to be addressed from the perspective of equity and inclusion. The article in The Conversation has a five question test you can take and a video of 10 emerging trends in Australia as well as more information from the HILDA data. | <urn:uuid:5580fa50-5de3-456b-abc9-de320fe2e0cd> | CC-MAIN-2019-51 | http://universaldesignaustralia.net.au/tag/universal-design-for-learning/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541310970.85/warc/CC-MAIN-20191215225643-20191216013643-00297.warc.gz | en | 0.952887 | 674 | 2.859375 | 3 |
Last weekend I headed down to DC for the “Yoga: The Art of Transformation” exhibit . If you haven't heard yet, the Freer | Sackler Museum at the Smithsonian put together a “leitmotif” of two thousand years of yoga art.
The exhibit is amazingly great, with weathered sculpture from ancient temples to miniature paintings from the medieval era to post-structuralist reinterpretations of the colonial-era photos of costumed-up ascetics. If you’re a yogi with a bent for art or history, be sure to catch it.
For me personally one of the key insights of the exhibition and its supporting scholarship was how instrumental photography and film have been in the development of “modern yoga”. Few of us probably know that the modern, postural yoga we practice today was developed only in the 1930 - 50s, by Krishnamacharya and his successors. Fewer still probably know the extent to which these pioneers relied on photography and film not just to popularize their redefinition yoga but also to develop it.
Prior to the 1930s, there were some seated postures and austerities described in ancient texts and performed by ascetics, often for Imperial observers, but nothing like the flowing, aerobic sequences taught by Krishnamacharya and Jois. When pre-modern artists weren’t depicting deities, they would draw the body conceptually, as a map of the universe or subtle energy channels, like the Chakras and Nadis.
It would take Imperial Britain and the spread of Western-style fitness and gymnastics programs through photo-rich magazines for Krishnamacharya to synthesize the latter with Tantric and Hatha traditions and lay the foundation of modern yoga. Photography and film both informed Krishnamacharya’s work in adapting Western-style weightlifting and acrobatic exercises into his yoga teaching and enabled the widespread distribution of that teaching.
As yoga researcher Mark Singleton writes, “The phenomenon of international posture-based yoga would not have occurred without the rapid expansion of print technology and the cheap, ready availability of photography. Furthermore, yoga’s expression through such media fundamentally changed the perception of the yoga body and the perceived function of yoga practice.”
Depictions of the “yoga body” went from conceptual to realistic with the rise of photography in the 20th century. As a result, Singleton argues, yoga’s transition from a classical, primarily spiritual basis to modern, primarily athletic practice accelerated.
So, today, when the New York Times roils the yoga community by asking if Instagram selfies remain “true to the spirit of yoga”, let’s remember that yoga, as we know it now, began with self-styled photography and video, including this YouTube of Krishnamacharya from 1938, perhaps the very first yoga video. | <urn:uuid:ceaba34e-3edb-47d3-964e-fc5cb841d781> | CC-MAIN-2018-47 | http://yogasampler.org/blog/2013/11/4/the-first-yoga-video-and-the-art-of-transformation | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742981.53/warc/CC-MAIN-20181116070420-20181116092420-00083.warc.gz | en | 0.957091 | 596 | 2.59375 | 3 |
A team of researchers from the Massachusetts Institute of Technology have just released a video showing a drone autonomously navigating its way through tightly clustered trees at 30 miles per hour, the most advanced system of object detection and avoidance we've seen to date. It's called Pushbroom Stereo and was developed by Andrew Barry and Russ Tedrake, both with the Robot Locomotion Group at MIT’s Computer Science and Artificial Intelligence Lab (CSAIL), a hotbed of innovation in the world of robotics and computer vision.
"Everyone is building drones these days, but nobody knows how to get them to stop running into things," says Barry, who developed the system as part of his thesis with Tedrake, an MIT professor. "Sensors like lidar are too heavy to put on small aircraft, and creating maps of the environment in advance isn’t practical. If we want drones that can fly quickly and navigate in the real world, we need better, faster algorithms." The results look like lost scenes from the Top Gun special effects sequences.
The drone was built using off-the-shelf parts, including a camera and processor that are no more powerful than what you find in today's smartphones. All told, Barry says it cost about $1,700 to build. We've seen drones, like the Asctec Firefly with Intel's RealSense camera, navigate through forests before. But they moved much slower than this. Barry says that's because most systems map the world at multiple points, for example at a distance of 2, 4, and 6 meters in front of its flight path. This new system maps only 10 meters out, making it much less computationally intensive, although what happens if a squirrel suddenly enters the previously empty path between you and that 10-meter mark is not exactly clear. | <urn:uuid:e6ec0668-f055-4e13-8d35-bbce9eed37a2> | CC-MAIN-2022-21 | https://www.theverge.com/2015/11/2/9659706/pushbroom-stereo-drone-uav-autonomous-sense-and-avoid | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662515501.4/warc/CC-MAIN-20220517031843-20220517061843-00239.warc.gz | en | 0.965864 | 368 | 2.96875 | 3 |
Leukaemia is one of the most commonly occurring cancers in children and young adults. As is said and believed, the right treatment and awareness can help a cancer patient improve overtime. This treatment and awareness makes parenting quintessential for successful treatment of the disease, especially when it occurs to a child. Here are tips to successful parenting to help a child coping with child leukaemia.
Read more articles on Understand Leukaemia.
Children are often scared to visit the doctor for check up, they do not like all that seriousness and are afraid of syringes.read more
Kids (4-7) - A child with ADHD may be taken as normal by the parents and his activities can be interpreted as those of a bright and curious kid.read more | <urn:uuid:319f2ca3-112c-4266-851f-4d3bc1ea354d> | CC-MAIN-2017-09 | http://www.onlymyhealth.com/parenting-child-leukaemia-1334291369 | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00400-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.963753 | 153 | 2.765625 | 3 |
Over the centuries, Jonathan Edwards’s name has become synonymous with religious revival and the strict tenets of Calvinism. Most students of American literature are introduced to Edwards’s work through his hellfire-and-brimstone sermon “Sinners in the Hands of an Angry God,” in which he paints a horrifying picture of the torments offenders will surely suffer unless they throw themselves on the mercy of God and repent of their wrongdoings. Hell has lost much of its terror for twenty-first century society and has become a mythological concept instead of a real place. Edwards and his congregation took Hell’s existence for granted. This difference in belief highlights the huge cultural, social, intellectual, and spiritual divide that separates modern people from their eighteenth century counterparts. As author George Marsden observes, “Few today, including many who affirm traditional Christian doctrines, have sympathies to take seriously some of the deepest sensibilities of ordinary eighteenth-century colonials.” Drawing on newly available material, Marsden attempts to make Edwards’s post-Reformation world comprehensible to today’s readers and also to present Edwards within the context of his time. In doing so, Marsden humanizes the severe Northampton preacher, reveals the vitality of his wide-ranging intellect, and provides a lucid analysis of his life and work.
Born in 1703 to a leading New England family, Edwards grew up in East Windsor, Connecticut. His father, the Reverend Timothy Edwards, was the local pastor. His mother, Esther, was the daughter of respected Northampton clergyman Samuel Stoddard and Esther Warham Mather, whose first husband was Eleazer Mather, brother of Increase and uncle of Cotton. A year after Edwards was born, Deerfield, Massachusetts, was attacked by the French and their Indian allies. Three hundred residents were killed, among them two of Edwards’s cousins. This event, along with reports of other conflicts, shaped Edwards’s early perceptions of the dangerous world in which he lived as well as his spiritual sensibilities. Marsden notes that the earthly war in colonial New England mirrored a far more crucial spiritual battle between cosmic powers: “a nation God had favored with true religion versus peoples in Satan’s grip, Catholics and pagans.”
Although Edwards lived on the edge of the frontier, he was exposed to the works of the most brilliant minds of the Enlightenment. A precocious child and youth, he entered Yale College in New Haven, Connecticut, at the young age of thirteen. There he studied the thought of Isaac Newton, John Locke, Joseph Addison, and Richard Steele, among others. Early in Edwards’s academic career, his readings exacerbated his reservations concerning the Calvinist doctrine of the total sovereignty of God. These agonizing doubts, however, were eventually resolved, although Edwards in his diaries does not say precisely how.
Not only was Edwards a devoted philosopher; he also was a keen observer of nature. His meticulous work on spiders, which he attempted to publish in 1723, is still cited as a landmark study. Edwards’s observations of nature and the influence of Newton’s ideas profoundly affected his conception of God. Unlike the deists, who viewed God as a distant creator who did not personally intervene in the cosmos, Edwards saw nothing in Newton’s conception of a mechanical universe to negate God’s intimate involvement in creation. In fact, Newton’s views on gravity, for example, only bolstered Edwards’s belief that “gravity depends immediately on the divine influence.”
Edwards’s prodigious intellect rivaled his rigorous spirituality. His quest to know God was all-consuming, and overcoming his doubts about his Calvinist heritage proved to be a defining moment in terms of his spiritual growth and experience. Marsden relates that soon after becoming reconciled to Calvinist doctrine, Edwards read I Timothy 1:17: “Now unto the King eternal, invisible, the only wise God, be honor and glory forever and ever. Amen,” and became enraptured. His subsequent mystical experiences increased in intensity, especially when he walked through the woods and fields, where God spoke to him through the language of nature. Although Edwards skillfully wielded the tools of reason and logic in his subsequent sermons and writings, he believed that the intellect was subordinate to the heart when it came to experiencing God’s love and grace. This belief became the cornerstone of his theology and the guiding principle of his subsequent ministry.
Marsden’s thorough examination of the cultural, social, intellectual, and spiritual forces that shaped...
(The entire section is 1902 words.) | <urn:uuid:8c3195e3-ecb6-498d-956f-d824c652feb5> | CC-MAIN-2017-17 | https://www.enotes.com/topics/jonathan-edwards-george-m-marsden | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125719.13/warc/CC-MAIN-20170423031205-00460-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.969165 | 958 | 3.09375 | 3 |
"Authentic Grit" is the passionate pursuit of hard goals that awes and inspires others to become better people, flourish emotionally, take positive risks and live their best lives (Miller, C., 2019).
Duckworth (2017) found that some of the strengths that underpin grit, such as optimism and impulse control, are inherited, however many of the traits and behaviours of authentic grit can be learned. For example, goal-setting is a learnable science, as is self-regulation and building positive relationships.
It is suggested one way to cultivate gritty behaviour, is to build positive relationships with others (Miller, C, 2019). People with authentic grit foster teamwork and camaraderie, they flourish in their relationships and lift other people up. One strategy to build positive relationships and boost our personal sense of accomplishment at QAHS is to celebrate our achievements and those achievements of others (Quaid & Kern, 2019).
Last week at QAHS we celebrated the accomplishments of our students via the Honours Board. At our whole school assembly we acknowledged students who have achieved academic excellence across their subject areas.
To qualify for the QAHS Honours Board in each semester, students in Year 10 require a minimum 5 A grades and no less than C in their six subject areas. Students in Year 11 and 12 require a minimum IB progressive score of 34 in their HL and SL subjects including TOK. Additionally, students must achieve nothing less than a 3 in HL subjects, nothing less than a 4 in SL subjects and nothing less than a C in TOK (TOK contributes 1 point for a C grade, 2 points for a B grade and 3 points for a C grade).
We congratulate the many students who appear on the QAHS Honours Board for Semester 2 2020 for their outstanding achievements.
Mrs Alita Lee | <urn:uuid:6fd18d7f-f44c-4396-9dd0-01a827129491> | CC-MAIN-2021-21 | https://qahs.eq.edu.au/calendar-and-news/news/celebrating-the-accomplishments-of-our-semester22020-honours-board-recipients | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988961.17/warc/CC-MAIN-20210509062621-20210509092621-00429.warc.gz | en | 0.95253 | 373 | 2.6875 | 3 |
Facial recognition software is becoming ubiquitous in China as private companies partner with the government to use it for behavioral monitoring and as a form of cardless identification. Chinese startups, tech giants, universities, and government-funded research labs have been heavily investing in artificial intelligence research that includes facial and speech recognition. At The Wall Street Journal this week, Josh Chin and Liza Lin highlighted how facial recognition is being used to influence social behavior in China:
Facial-recognition technology is one of the most powerful new tools in the surveillance arsenal. Fueled by advances in artificial intelligence, these systems can measure key aspects of a face, such as distance between the eyes and skin tone, then cross-reference them against huge databases of photographs collected by government agencies and businesses and shared on social media.
China, however, stands apart in harnessing facial recognition as a cudgel to influence behavior. The Chinese Ministry of Public Security—its national police force—and other agencies called in 2015 for the creation of an “omnipresent, completely connected, always on and fully controllable” nationwide video-surveillance network as a public-safety imperative. In a policy statement, the agencies included “facial comparison” in a list of techniques to be used to improve surveillance networks. [Source]
Among the more widely lauded examples of facial recognition tools is the proposed Smile to Pay feature of Alipay, in which a user can simply take a selfie to authenticate a mobile payment. A similar move toward replacing traditional identification cards with facial data includes ride-sharing app Didi Chuxing’s digital scanning of drivers’ faces to confirm that they are the same people with whom users are matched. E-commerce giant JD.com has begun to deliver packages via robots, giving recipients the options of using either QR codes or facial recognition to sign for delivery. On Wednesday, China Southern Airlines began allowing passengers at one Henan airport to use face scans instead of boarding passes.
Use cases that target young people may be of particular concern. These include the installation of cameras with facial recognition capabilities in female college dormitories to ensure that only students access these buildings, and in classrooms to monitor students’ boredom levels. (Ordinary surveillance cameras are also a concern: before parents and students complained about a loss of privacy, they were briefly installed in the boys’ restrooms of a high school in Beijing to allegedly detect if students were smoking or bullying one another.)
On a broader level, the cities of Shenzhen, Jinan, Jiangbei, Suqian, Chongqing, and Fuzhou have implemented facial recognition-equipped cameras meant to shame jaywalkers into breaking the habit. In Jinan, after a jaywalker is identified, their name, age, hukou registration location, state ID number, and headshot are sent to local police, as well as displayed on publicly mounted screens, in newspapers, and online. Other punishments include reporting these transgressions to a jaywalker’s employers and local community, the imposition of small fines, and requiring offenders to briefly work as auxiliary traffic police. Additional government-run services that make use of facial recognition for identification include social credit services such as the Shanghai municipal government-run Honest Shanghai app. The combination of social credit, facial recognition tools, and public shaming of scofflaws is recurrent in Chinese conceptions of future “smart cities” as sites where big data collection can track citizens’ behavior and cut down on crime.
Most discussions of the widespread collection of facial recognition data have been short on considerations of privacy and security risks. Writing in the China Economic Review in 2015, Hudson Lockett identified a central issue that remains unresolved in the development of facial recognition technology in China today, namely that companies collecting sensitive user data have a long way to go to win official confidence:
While regulators’ stated rationale for the requirements is preserving privacy and stemming systemic risk, they often seem more concerned with the latter. Professor Robin Hui Huang, executive director of the Centre for Financial Regulation and Economic Development at the Chinese University of Hong Kong’s Faculty of Law, said China’s central bank didn’t have enough confidence in the online facial recognition technology being pushed by Alipay’s MYbank, and were pushing back for better biometric verification.
“The more verification the better from the regulator’s point of view,” Huang said. Time will tell whether that holds true for the consumers forking over their identifying information, but neither Tencent nor Alibaba wants to wait around to find out. The competition is too fierce to survive standing still.” [Source] | <urn:uuid:aec1d966-7e5d-475b-8d3e-f41af5070b74> | CC-MAIN-2017-39 | http://citizencn.com/?p=47192 | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696182.97/warc/CC-MAIN-20170926141625-20170926161625-00661.warc.gz | en | 0.941653 | 956 | 2.671875 | 3 |
Halloween is just days away, one of the most popular holidays in this country. Little witches, ghosts, pirates and super heroes will soon take to the streets for trick or treat fun, and the Dakotas Region of the American Red Cross has tips to help everyone stay safe while enjoying the festivities.
Ten Tips for a Safe Halloween
1. Make sure trick-or-treaters can see and be seen.
- Use face makeup instead of masks. Masks can make it hard to see.
- Give kids a flashlight to light their way.
- Add reflective tape to costumes and trick-or-treat bags.
- Have everyone wear light-colored clothing.
2. Use flame-resistant costumes.
3. Plan the trick-or-treat route in advance – make sure adults know where their children are going. A parent or responsible adult should accompany young children door-to-door in neighborhoods.
4. Be cautious around animals, especially dogs.
5. Walk, don’t run.
6. Only visit homes that have a porch light on. Accept treats at the door – never go inside.
7. Walk only on the sidewalks, not in the street.
- If no sidewalk is available, walk at the edge of the roadway, facing traffic.
- Look both ways before crossing the street, and cross only at the corner.
- Don’t cut across yards or use alleys.
- Don’t cross between parked cars.
- Use extra caution if driving. The youngsters are excited and may forget to look both ways before crossing.
8. Make sure a grown-up checks the goodies before eating.
- Remove loose candy, open packages and choking hazards.
- Discard any items with brand names that you are not familiar with.
Welcoming Kids on Halloween
9. Light the area well so young visitors can see.
10. Sweep leaves from your sidewalks and steps. Clear your porch or front yard of obstacles someone could trip over.
Download the free Red Cross First Aid App for instant access to expert advice in case your ghost, goblin or super hero has a mishap. Use the Emergency App for weather alerts and to let others know you are safe if severe weather occurs. Find these and all of the Red Cross apps in smartphone app stores by searching for the American Red Cross or going to redcross.org/apps. | <urn:uuid:32297207-c5ff-471a-bf12-6077c4b3ff3c> | CC-MAIN-2023-14 | https://www.redcross.org/local/mn-nd-sd/about-us/news-and-events/news/halloween-safety-tips.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946535.82/warc/CC-MAIN-20230326204136-20230326234136-00503.warc.gz | en | 0.890933 | 500 | 2.625 | 3 |
Hi, my name is Alan Myrvold, and I am a security tester on the Office Trustworthy Computing Team (TWC). This post introduces the new password rules feature in Office 2010.
Word, Excel, and PowerPoint have been able to password protect documents for several versions by setting the “password to open”. What we felt could be improved was the ability to enforce password strength rules, similar to what may be required when logging into your computer at work.
In Office 2010, the encryption password can be set using the Office Backstage View:
This password can also be set on the General Options dialog from the Save As dialog, as the “Password to open”, just like in previous versions of Office.
Why is password complexity important?
Although historically Word and Excel used 40-bit RC4 encryption, faster computers mean that 40-bit keys are now considered weak. The Office Open XML format (*.docx, *.xlsx, *.pptx) introduced in Office 2007 provided an opportunity for us to improve our mechanism and algorithms used for password based encryption of documents. The Office Open XML format uses 128-bit AES encryption. We also use a slower key derivation algorithm to make brute force password cracking slower. RC4 is still used when saving in Office 97-2003 binary formats. For encrypted Office Open XML documents, the password is the weakest link. A short or commonly used password makes the document less secure, since it is easier for an attacker to guess it.
If an attacker needed to try all possible passwords of 5 lowercase letters from a-z, there are only 265, or about 11 million total passwords to guess during a brute force search. Searching dictionary words might even more quickly find the password. An 8 character password, chosen from lowercase and uppercase a-z, plus digits 0-9 is a much larger space of passwords to guess by brute force, 628 or about 200 trillion, and is more difficult to find with dictionary attacks too. These are all worst case efforts, and NIST estimates far less entropy in user chosen passwords. Having less entropy means that attackers can use heuristics to search the password space more intelligently than brute force.
Attackers can also harness the parallel processing power of graphics cards to help with their attack.
But, for brute force attacks, assuming 10,000 password attempts per second, the length and character set of the passwords can make a big difference.
Enforcing a minimum password length and character set complexity requirements can make passwords more difficult for attackers to guess.
How do I enable password complexity?
By default, complexity settings are not enforced, and registry settings are used to control this feature. Although I am describing the registry keys here, the Office Customization Tool (OCT) will be the easiest mechanism to deploy these policies within an organization, but these settings aren’t present in the OCT yet.
There are 2 registry settings to control this, PolicyLevel and MinLength.
- Value name: PolicyLevel
- Value type: DWORD
- Value data: [ 0 | 1 | 2 | 3 ]
- Use 0 to for no complexity (default), 1 for minimum length, 2 for minimum length plus requiring 3 of 4 character groups, and 3 for all these checks plus enforcing Windows domain password rules.
- Value name: MinLength
- Value type: DWORD
- Specifies the minimum length of password required.
When the policy level is 2 or 3, then the password must contain characters from at least three of four character sets, lowercase a-z, uppercase A-Z, digits 0-9, or non-alphabetic character. When this complexity is enforced, the minimum password length needs to be at least 6, but can be more depending on the MinLength.
Why not just use the Windows domain password policy?
When the policy level setting is 3, then Office will use the Windows domain policy as well as all the settings at level 2. This allows a custom password filter that is installed for Windows passwords to be used. If you are offline or a domain controller cannot be contacted, then the Windows password settings aren’t used, and only the level 2 settings are used. If you don’t have a custom password filter, then using level 2 saves a trip across the network, and would be the best choice.
What if my password doesn’t meet the complexity requirements?
Depending on whether the password is too short, or not complex enough, an error dialog will appear
and then you can re-enter the password.
What if I forget my password? Or the user leaves the company?
Oh dear. We’ve designed the Office Open XML password encryption to be strong and difficult for attackers to crack, which makes password recovery slow. There is no back door, no key escrow, and the 128-bit AES key makes guessing the password the best option.
Unfortunately Microsoft support cannot assist you, as described in KB article 189126.
Microsoft support engineers cannot help you retrieve passwords of files and features in Microsoft products that are lost or forgotten.
Because a forgotten password might result in the loss of critical business information, it is possible to disable setting new passwords in Word, Excel, and PowerPoint, using the DisablePasswordUI setting.
- Value name: DisablePasswordUI
- Value type: DWORD
- Value data: [ 0 | 1 ]
- Use 0 to enable the password UI, or 1 to disable the password UI.
This setting only prevents new passwords from being set. Existing password protected documents can still be opened. The DisablePasswordUI setting, along with the password complexity settings are designed to help balance the need to secure information with the risk of information loss.
The password rules feature is just one security enhancement in Office 2010, and future blog posts will cover more improvements we’ve made.
Security Tester, Office Trustworthy Computing | <urn:uuid:870e743c-ff7f-472f-acca-eb779b9ba9aa> | CC-MAIN-2017-43 | https://blogs.technet.microsoft.com/office2010/2009/10/15/enabling-password-rules-for-office-2010/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825308.77/warc/CC-MAIN-20171022150946-20171022170946-00427.warc.gz | en | 0.860923 | 1,224 | 2.921875 | 3 |
With the move to distance learning, students are interacting with increased amounts of content online. This move comes with new challenges and adjustments to the way all students are completing their semester.
Texthelp’s Read&Write toolbar provides access for students within the digital locations commonly used to host and teach online. These resources are key for many students to continue their learning and finish their term successfully.
Update: The good news is that an integration with Respondus LockDown Browser is now available! This allows students to have access to Read&Write while taking exams. While some Read&Write features may not be exam-friendly, like an online dictionary that opens in your web browser, this new Read&Write “lockdown mode” allows access only to approved features such as text to speech, in order to maintain the integrity of the test itself.
For almost 1000 years, colleges and universities' primary method of teaching has been in-person classes. From the days of the first university in Bologna, Italy in 1088, followed by Oxford shortly after, the majority of classes have been held in person. Then, overnight colleges and universities across the world shut their doors and moved classes online.
A variety of platforms and technologies have shepherded us into this transformation, with Learning Management Systems becoming a central tool for each institution. With much of the work students are doing integrated into these platforms, faculty and educators are using these to collate information, assess students, and provide the vehicle for discussion.
The support needs of students aren’t tied to single places online, rather their need for support transcends to all the places faculty are expecting students to interact with content. With Read&Write, students can use these tools where they encounter content online to provide the access & support required for learning to continue successfully.
Learning Management Systems such as Blackboard and Canvas include a variety of content to teach and assess student learning. The Read&Write toolbar works within these systems by reading content aloud to students within course modules, instructions, quizzes, tests, assessments, or other places where text is visible.
Writing supports such as Talk&Type (Dictation), CheckIt (Grammar/Spell Checker), and Prediction are available for students producing written content within the platform. Acting not only as an accessibility tool but helping to support all students to assess and proof their own assignments and ensure their progress during the term is not interrupted without the usual in person classes.
For students who rely on a peer reader or writer/scribe proctor for exams, Read&Write provides the tools they need to take exams from their own home. This removes the stress of trying to coordinate remote, proctored exams with a student peer or support staff member. Students can instead independently sit their exams with the toolbar they are familiar with and confident in using.
Faculty and administrators concerned about test integrity and security have begun to adopt the use of secure online testing systems and programs at schools across the country at rapid rates.
One of the most popular choices is Respondus LockDown Browser. While these programs help to prevent cheating by “locking down” the student’s device to only allow access to their test or exam, many of them also limit access to critical assistive technology tools that students rely on, including Read&Write.
The good news is that an integration with Respondus LockDown Browser is now available which allows students to have access to Read&Write while taking exams. While some Read&Write features may not be exam-friendly, like an online dictionary that opens in your web browser, this new Read&Write “lockdown mode” allows access only to approved features such as text to speech, in order to maintain the integrity of the test itself.
Beyond LMSs, PDFs and ePubs are synonymous with college coursework. Read&Write provides students the tools to read and interact with these traditionally inaccessible content types.
The PDF Reader provides students with the ability to hear textbooks and course readings, read aloud. Along with additional tools such as the dictionary and highlighters providing avenues for increased comprehension and independent study support.
Much of these same benefits are also available within the redesigned ePub Reader released in March 2020. With more publishers providing ePubs to students and campuses, having access to a tool that integrates seamlessly with these files is essential. With the Scan tool in Read&Write for Windows and Read&Write for Mac, students can take imaged PDF files and make them readable within seconds, providing all students with access to engage with this content.
Outside of the Learning Management Systems, textbooks or document readings, students might be completing projects, research, or papers by interacting with websites and other online content.
The Read&Write toolbar “floats” within the Chrome browser, giving students access to the toolbar they are familiar with. Text-to-speech can be used to read websites aloud while the highlighters can be used for research purposes. Helping students collate & organize important information and easily pull into a report or essay for future reference. While, the Screen Masking tool helps students adjust to this increased time spent online by easing eye strain and screen fatigue.
To help universities and colleges, two webinars focusing on supporting students on a college campus were recently released. Both explore the support tools discussed above, and provide the opportunity to see these tools in action. To help you better support students who may be reaching out in the coming weeks.
The first, Navigating the Changing Waters webinar, is solution focused and details how to support students with Read&Write. The second, Supporting Higher Ed Students in an Online Learning Environment, directly addresses supporting higher education students with the move to online learning.
With a domain or unlimited license of Read&Write, every student across an institution can get access in all of these learning environments and any others that faculty may have students work within. Providing support helps students finish their semester strong and continue to move through their educational journey, including when the doors open again on campus.
Check out our webinars above to find out how to best use these tools to support your students no matter where they're learning and engaging with content online. | <urn:uuid:5b254183-e082-4e71-afeb-2cd922793314> | CC-MAIN-2023-06 | https://www.texthelp.com/resources/blog/supporting-students-where-they-work-online/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500041.18/warc/CC-MAIN-20230202200542-20230202230542-00552.warc.gz | en | 0.94298 | 1,271 | 2.75 | 3 |
Microsoft Research is at it again with an app called Soundscape, which helps those who are visually impaired traverse through the neighborhood using voice-based mapping. Utilizing Bing Maps Local Search and Bing Maps Location Recognition APIs, this app allows those who are blind or have low vision obtain the ability to get from one place to another.
"According to Melanie Kneisel, a Software Engineer at Microsoft Research, one of the major features in Soundscape is a feature they refer to as automatic callouts. As a person approaches identifiable places and things like businesses, bus stops, and intersections, Soundscape will call out the name of the place or thing from the direction they are located. If you are walking towards a Starbucks that is on your right, you will hear a voice saying "Starbucks" in your right ear to orient you in that direction should you wish to go to Starbucks," Microsoft explains in a blog post.
The Soundscape app isn't your typical navigation app that offers turn by turn directions. Instead, the app empowers users by offering contextual 3D audio cues of what is near a user's location, and orienting the user to an audio beacon as a point of interest. This allows the user to build a mental map and make personal route choices.
For example, while walking, the app will state "Starbucks" in your right ear to alert you that Starbucks is on the right side.
"When you approach an intersection the callout is, '36th street goes left, 36th street goes right, 148th continues ahead.' You will hear each of those callouts. When the street goes right, you'll hear it in your right ear. When the street goes left, you'll hear it in your left ear. You start to learn not just that you are approaching an intersection and what is intersecting there, but you learn the geometry of it. You now know that this is not a T intersection, it's a four-way intersection and you know which way each of the roads go," Microsoft's Melanie Kneisel explains further.
At the moment, the app is only available for iPhone users. Grab it here. | <urn:uuid:080d50a6-45b3-4630-9a0c-f5148f464ffc> | CC-MAIN-2022-49 | https://www.onmsft.com/news/microsoft-soundscape-helps-those-who-are-visually-impaired-with-a-voice-based-map-app | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711232.54/warc/CC-MAIN-20221208014204-20221208044204-00696.warc.gz | en | 0.951191 | 439 | 2.671875 | 3 |
Bessarabian Soviet Socialist Republic
The Bessarabian Soviet Socialist Republic or Bessarabian SSR (Russian: Бессарабская Советская Социалистическая Республика, Бессарабская ССР) was a government formed by Bolsheviks as part of their plans to establish control over Bessarabia, which was united with Romania in the course of events after the Russian Revolution of 1917. The state with this name never came into existence, apart from a brief rebellion in September 1924.
The BeSSR was proclaimed on May 5, 1919 in Odessa as a "Provisional Workers' and Peasants' Government in exile" and established on May 11, 1919 in Tiraspol as an autonomous part of Russian SFSR. Neither Odessa not Tiraspol were part of historical Bessarabia. The planned territories included Tiraspol uyezd of Kherson Governorate and Balta and Olgopol uyezds of Podolia Governorate. The self-proclaimed government of the Bessarabian SSR never managed to control any part of Bessarabia, which on 9 April 1918 united with Romania. The union of Bessarabia with Romania was not recognized by Soviet authorities and the proclamation of the Bessarabian SSR was a political measure aimed at preparing a future invasion of Bessarabia by the Red Army.
This "government" had talks with the French military authorities over the military and political settlement but was disbanded in September 1919 after Denikin's army took control of the Odessa region.
The Western European powers recognised the union of Bessarabia and Romania by the Treaty of Paris (1920). However, the United States refused to sign the Treaty on the grounds that Russia was not represented at the Conference. This aided the Soviet Union in its continued desire to retake Bessarabia, which it succeeded in doing twenty years later.
- , ,
- ММК «ПРОРЫВ!». Международная молодежная корпорация. Тирасполь. Приднестровье.: Борис Асаров: У Молдовы дорога в никуда
- Wayne S Vucinich, Bessarabia In: Collier's Encyclopedia (Crowell Collier and MacMillan Inc., 1967) vol. 4, p. 103
|This Soviet Union–related article is a stub. You can help Wikipedia by expanding it.| | <urn:uuid:a90e4b4f-b6df-4249-b3e2-80ade38a28cd> | CC-MAIN-2016-44 | https://en.wikipedia.org/wiki/Bessarabian_Soviet_Socialist_Republic | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720941.32/warc/CC-MAIN-20161020183840-00070-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.917121 | 664 | 3.5 | 4 |
In 1629 Charles I dismissed Parliament, resolving never to call another. He might have succeeded but for the problem of the multiple kingdoms. During the 1630s he decided to bring Scottish religious practice into conformity with English by abolishing presbyterian worship and substituting an Anglican service. The Scots revolted, and Charles's two attempts to subdue them—the Bishops' wars of 1639 and 1640—were abject failures. At the insistence of the nobility he summoned Parliament. Once convened, the Commons refused him the taxes he needed, and set about dismantling the apparatus of prerogative government, abolishing ship money, the courts of Star Chamber, High Commission, Wards, and others; passing a Triennial Act, depriving church courts of their punitive powers, and attainting Charles's chief minister Strafford. Charles ratified these changes, but with such ill grace that many doubted whether he would keep his word. Trust became a critical issue upon the outbreak of rebellion in Ireland in the autumn of 1641. Exaggerated reports of atrocities perpetrated against the protestant settlers in Ireland inflamed English opinion. It was accepted that an army should crush the rebellion, but there was no agreement about entrusting the king with command. Charles's attempt to arrest five of the parliamentary ringleaders contributed to the deepening distrust of him. Mistrust was compounded by fear that the king could not be counted on to defend England against the threat of international catholicism. Thus legal and constitutional arguments about taxation, the rights of Parliament, and the extent of royal power were inflamed by religious panic.
Despite its control of the midlands, the east, and the south‐east including London, there was nothing inevitable about Parliament's victory. Charles almost overthrew his foes at Edgehill (October 1642), while in 1643 there were a number of royalist victories. For all the efforts of John Pym to hold together the parliamentary coalition, parliamentary fortunes reached their nadir in that year.
What turned the tide against Charles I was again the reality of multiple kingdoms. In return for a promise to uphold presbyterian church government and impose it in England, the Scots came to Parliament's aid with an army of 20,000. This bargain was sealed in the Solemn League and Covenant of 1643, and the Scots army entered England early in 1644. The joint armies dealt a crushing blow to the king's forces at Marston Moor, near York (July 1644). However, this victory was almost frittered away by Essex when he allowed his army to become trapped by Charles at Lostwithiel in Cornwall (September 1644). Completely disenchanted with the aristocratic leadership of Parliament's armies, the win‐the‐war faction under Sir Henry Vane and Oliver Cromwell purged the armies of their noble and parliamentary leadership, creating the New Model Army. Led by Sir Thomas Fairfax, and knit together by regular pay and religious indoctrination, this army quickly put the royalist forces to flight at Naseby (June 1645), Langport (July 1645), and Bristol (September 1645). By May 1646 Charles had handed himself over to the Scots.
Refusing to accept the verdict of the battlefield, Charles dragged out peace negotiations with Parliament, attempting to exploit the rift between army and Parliament and redoubling his efforts to persuade the Scots to assist him. Early in 1648 royalist risings erupted in Kent, Essex, Wales, and the navy in anticipation of a Scottish intervention on behalf of the king. But the Scots were late, and the New Model Army had no difficulty crushing the revolts. When the duke of Hamilton crossed the border in July, he attracted little support, and Cromwell destroyed his forces between Preston and Uttoxeter (August 1648). Everywhere triumphant in battle, the army found that Parliament was still intent on negotiating with the king. To prevent such an outcome it occupied London, purged the House of Commons of those who favoured negotiation, and engineered the trial and execution of the king. Once the Rump Parliament had abolished monarchy and the House of Lords, it launched invasions of Ireland (1649) and Scotland (1650). In spite of Cromwellian ruthlessness at Drogheda and Wexford, Ireland took three years to subjugate. The Scots were devastated at Dunbar (September 1650), but continued to resist, to the point of invading England a year later under Charles II. His forces scattered at Worcester (September 1651), the hapless king fled to the continent. Although the king, lords, and Church of England were brought back in 1660, prerogative government was not. The constitutional changes of 1641 were preserved, while the legacy of the civil wars in religious liberty and parliamentary domination of the state re‐emerged in the ‘*Glorious’ Revolution of 1688–9.
Subjects: British History. | <urn:uuid:967a2f03-f2f5-4f76-b800-93e17a51a867> | CC-MAIN-2019-43 | https://oxfordindex.oup.com/view/10.1093/oi/authority.20110803095614224 | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986653876.31/warc/CC-MAIN-20191014150930-20191014174430-00077.warc.gz | en | 0.969439 | 1,007 | 3.796875 | 4 |
In real life, people have internal conflict all the time. Sometimes it’s more apparent than others. Sometimes it’s over a triviality, and other times it’s about something life-changing and complex. But it’s there, and it affects our words, actions, moods, relationships, and worldviews.
If you want your characters and their problems to come alive for readers, you’ve got to give the people in your story some internal conflicts. Of course, it’s most important to show in your main character(s), but secondary and “bit” characters can come through richer and stronger for a little dose of internal conflict, too.
How you go about showing that conflict will depend on a few factors:
- If you’re writing in first person, your readers get direct insight into the main character’s thoughts and feelings, even if he/she is an unreliable narrator. Your other characters will be viewed through the lens of your narrator’s opinions and observations, but you, the writer, should know the real deal about your secondary characters – not just what your main character knows, thinks, and feels about them. That includes knowing what makes them tick and what internal conflicts may be affecting them in any given scene.
- Third person can be done in a few different ways, but generally there’s some balance between omniscient narration and a sort of journalistic telling of the facts (just what is said and observed, with no direct insight into the characters’ minds or emotions). If you go more for omniscient narration, you can reveal characters’ thoughts directly, and show inner conflicts that way. If you stick with “just the facts, ma’am,” you’ll need to make sure to use facial expressions, hesitations, nervous habits, body language, tone of voice, etc. to communicate your characters’ thoughts and feelings, including their inner conflicts.
- If you have a character who just isn’t introspective, who doesn’t (or can’t) face his/her own flaws or mistakes, or who dislikes communicating his/her inner workings (even in his/her own thoughts), again, you’ll have to bring out internal conflict through responses to external factors: other characters’ actions, dialogue, events, etc.
Now, about different kinds of inner conflicts. There are inherent, long-term issues, such as the desire for freedom and independence battling with the desire for belonging and love (which could apply to a character’s family background or love life or both). That kind of deep-rooted conflict is almost a character trait, and can be the foundation for the entire plot or can simply be a factor in your character’s behavior and attitude. You can resolve it as a subplot, give your character new insight into the problem as the main story goes on, have your character come to terms with it by the end, or leave it hanging over his/her head.
There are also smaller, more specific inner conflicts (do the right thing, or the easy / profitable / fun thing?) That kind of internal conflict is the spice of fiction, in my opinion. When an author weaves together the events of the book and the conflicts and tough decisions of their characters, everything pulls together until you can’t separate THOSE characters from THAT plot. It had to be [Character A] faced with [Event 1], because only he would’ve reacted by doing [this], which caused [Event 2], which set up [Character B] with [that] decision, and…so on and so forth.
So there are lots of reasons to give characters internal conflicts of various importance and scale. It gives them depth, keeps them from being too predictable or stereotypical, lends tension to the story (because people don’t always make the right choices, or even know what the right choice is), plays characters off one another, and is an excellent catalyst for both main plot and subplot.
Even if you’re never going to mention a particular character’s hang-ups in the story, you should know what they are. Your characters, dialogue, and story will all be the better for it. | <urn:uuid:d0e4d18b-04be-489c-b5fa-579dfbcf7a66> | CC-MAIN-2017-26 | https://saramarian.com/2010/05/24/ode-to-internal-conflict/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323730.30/warc/CC-MAIN-20170628185804-20170628205804-00692.warc.gz | en | 0.936894 | 890 | 3.125 | 3 |
A GOVERNMENT scientific agency, Inland Fisheries Ireland, has just published the result of 25 years of research involving more than 20,000 sea trout taken from 94 river systems in Ireland or Scotland at varying distances from salmon farms.
The research is objective and utterly credible. It once and for all confirms that salmon farms have a negative, often lethal, impact on wild fish populations.
For years the aquaculture sector — including Bord Iascaigh Mhara and the IFA — has dismissed claims that fish farms sustain unnatural levels of parasites that have a lethal impact on migrating fish using the same waters.
The sector has consistently tried to undermine findings like these and has successfully convinced governments that such claims should be dismissed as the imaginings of cranks.
There are many, many manmade reasons salmon and sea trout populations are collapsing but now we know, and can no longer dispute the fact, that fish farming is a significant factor in this spiral of decline.
Policy, especially planning policy, must quickly reflect this science. | <urn:uuid:12ea6a5f-8a83-4f8c-94c2-fca6e2897829> | CC-MAIN-2021-49 | https://bantryblog.wordpress.com/2017/01/10/irish-examiner-tuesday-10-jan-2017-fish-farms-indicted-on-sea-trout-debate-is-over/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363376.49/warc/CC-MAIN-20211207105847-20211207135847-00264.warc.gz | en | 0.951422 | 209 | 2.9375 | 3 |
What is it?
This is a flashlight that has two metal contacts on the bottom of the flashlight that need to have something conductive placed across the two contacts in order to cause the flashlight to light up.
Why do we use it?
Many paranormal investigation shows and teams across the country will essentially break a flashlight in order to make it so the flashlight is barely off. This is achieved by unscrewing either the front or back of the flashlight so that the battery is barely not in contact with the light bulb. This creates a flashlight that will turn on and off, sometimes seemlingly in response to questions. The YouTube video below explains why that occurs:
So the way they show this being done on TV is clearly just occurring due to the physics of how a flashlight works and has nothing to do with anything paranormal. However, PIM located these touch flashlights online as a means to test the idea that something paranormal could turn a flashlight on and off in response to questions. PIM feels this is a better way of testing this idea since if the touch flashlight comes on, we know exactly what occurred in order for that to happen, unlike the method used on TV.
PIM would like to note, that despite using multiple touch flashlights on many investigations, we have never had the flashlight turn on by itself. | <urn:uuid:c11b1b46-5a33-4bc9-98af-b76ba6564e6c> | CC-MAIN-2021-31 | https://paranormalmilwaukee.com/equipment/touch-flashlight/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154302.46/warc/CC-MAIN-20210802012641-20210802042641-00103.warc.gz | en | 0.96404 | 268 | 2.734375 | 3 |
Clarification: An earlier version of this article was misleading in terms of the comments of Jim Milke, chairman of the Department of Fire Proection Engineering at the University of Maryland. It incorrectly suggested that artificial trees were not safer than natural trees, when in fact they are. Milke’s point was that artificial trees can also burn, but they burn at a slower rate. The story has been updated.
Every year, Lloyd and Susan Creger put an artificial Christmas tree in front of the window of their New Carrollton home and a live Fraser fir in the family room, where most people gather. It’s their yuletide tradition.
The Cregers, like many area families, enjoy Christmas trees because they are a cultural tradition and connect people to the past. The family will convene in the family room Dec. 25 and open gifts and toys next to the fir, which is adorned with ornaments and lights.
“The artificial tree used to be my mother-in-law’s,” Lloyd Creger said. “When she moved in, we put up her tree, and in the family room is the real tree. We have decorations for both. We have a Fraser fir because they smell good.”
Many families share the Cregers’ sentiments, but engineers at the University of Maryland College Park want people to take more precautions with their Christmas trees, saying both natural and artificial trees can be a deadly fire hazard.
“Artificial trees are safer than natural trees, but the surprising aspect of artificial trees is that they still burn, though more slowly than natural trees,” said Jim Milke, chairman of the Department of Fire Protection Engineering at U-Md.
Professors and students at Maryland’s A. James Clark School of Engineering will host the second annual Christmas tree fire safety demonstration Thursday, in which natural and artificial greenery will be ignited to show how easy it is for the holiday to turn tragic.
According to the National Fire Protection Association, fire departments across the United States respond to an average of 230 home fires sparked by Christmas trees each year. The association says that these fires, on average, result in six deaths, 22 injuries and $18.3 million in property damage annually.
In January, a Christmas tree fire in Annapolis destroyed a home and claimed the lives of Don and Sandra Pyle and four of their grandchildren. Fire investigators found that an electrical failure sparked the blaze, which ignited a 15-foot Christmas tree in the home.
“The fire in Annapolis was caused by a Christmas tree that had been up for about two months,” Milke said. “If branches are not watered, they can become quite combustible.”
Milke said the demonstration will be conducted by a group of high school students. It is part of an effort to recruit teens to go into a field that involves testing everything from airplane materials to lithium batteries to determine their combustibility.
The University of Maryland’s Department of Fire Protection Engineering was established in 1956 as part of the School of Engineering. More than 1,100 graduates from the department are employed in the industry, working for entities such as insurance companies; federal, state and local governments; the military; and fire services.
Susan Creger, a retired National Park Service ranger, said she waters her natural tree every day and takes special care of the artificial tree because it connects her with the past.
“Some of the ornaments on that tree were my grandmother’s,” Creger said as she looked at the artificial tree. “These are ornaments I grew up with.” | <urn:uuid:036e2ca7-c891-41ad-83e5-ad082f8d2cda> | CC-MAIN-2019-35 | https://www.washingtonpost.com/local/u-md-fire-safety-demonstration-to-focus-on-danger-of-christmas-trees/2015/12/15/86922854-a27c-11e5-9c4e-be37f66848bb_story.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318011.89/warc/CC-MAIN-20190823062005-20190823084005-00023.warc.gz | en | 0.964093 | 757 | 2.921875 | 3 |
Marcus Chown, consultant
WE CAN kid ourselves about big questions. What is the origin of mass? What is dark matter? Does time really exist? But in our heart of hearts there is only one question we desperately want to answer: what is life and how did it come about?
Astrophysicist Dimitar Sasselov argues that we are on the brink of being able to answer this question, and his enthusiasm is infectious.
Sasselov cites two key developments. The first will come as no surprise: the discovery of planets outside our solar system. The total stands at over 700, with new ones being discovered every day. Rarely in the history of science can a field have advanced at such a breakneck pace.
Of crucial importance to the life question, which explains Sasselov's title, is a certain type of extrasolar planet, a super-Earth. These are solid planets of rock and ice between 1 and 10 times the mass of the Earth. We never suspected they existed because, in our own solar system, with its rocky terrestrial planets and bloated gas giants, such bodies are conspicuous by their absence.
It is these super-Earths that are key, argues Sasselov. They are even more attractive as life-bearing worlds than our home planet. They have a relatively small surface area to volume ratio, for instance, so they are better at holding on to their internal heat than Earth. That makes them likely to have the plate tectonics necessary to prevent carbon dioxide from volcanoes building up to dangerous, Venusian levels. If born with sufficient ice, super-Earths may even have giant oceans spanning the surface, 10 times deeper than any ocean on Earth. Think of those as habitats.
But most importantly, according to Sasselov, the surfaces of super-Earths will be at temperatures that permit large molecules to survive over long periods of time and attain the concentrations necessary for the chemistry of life.
What chemistry? Ah, this is where the second development crucial to the life question comes in: synthetic life. More specifically, the creation of a chemical system enclosed in a "vesicle" and capable of life's main functions. According to Sasselov, this field will enable us to overcome our most crippling handicap: that we know of only a single instance of life. It will enable us to explore the limits of biology, to extrapolate from the specific to the general. And here Sasselov sees the two developments feeding off each other. Super-Earths will tell us about the chemical environments for alien life, which will help those seeking synthetic life to zero in on other biochemistries.
And the results of all this striving? To know ourselves, of course. Only by knowing what is possible, says Sasselov in this inspirational book, can we ever understand how life got going on Earth and why it has the characteristics it has. Sasselov quotes T. S. Eliot: "We must never cease from exploration. And the end of all our exploration will be to arrive where we began and to know the place for the first time."
The Life of Super-Earths: How the Hunt for alien worlds and artificial cells will revolutionize life on our planet
by Dimitar Sasselov
Published by: Basic Books | <urn:uuid:c8e0f78b-cfb8-40aa-870f-80a8fe7f0c96> | CC-MAIN-2014-52 | http://www.newscientist.com/blogs/culturelab/2012/01/lifes-secrets-lie-in-stars-and-petri-dishes.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802767274.159/warc/CC-MAIN-20141217075247-00169-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.931904 | 671 | 3.40625 | 3 |
Consumer Reports has released an article exploring consumer confusion of the “natural’ label on foods. Scheduled to appear in its March 2016 issue, the article, entitled “Peeling Back the ‘Natural” Food Label,” notes that a recent national representative poll of 1,005 U.S. adults found more than half usually seek out products with a ‘natural’ label with the false belief that they are produced without genetically modified organisms, synthetic hormones, synthetic pesticides, or artificial ingredients. Such confusion is already recognized by the U.S. Food and Drug Administration (FDA), which is currently seeking comments through May 10 on the use of the marketing claim on food labels. OTA’s ‘Natural’ Food Labeling Task Force currently is tasked with helping OTA develop comments to FDA on the use of the term and to protect and uphold the meaning of organic claims in the marketplace.
Consumers’ confusion over ‘natural’ food label
February 2, 2016 in Of Note
All Things Organic Annual Awards Gala Annual Fund Arsenic Benefits BioFach Canada Consumer Deals COTA Cotton Dairy Equivalency Expo East Exports and Imports Expo West Farm Bill Farming FDA Food Safety Genetic Engineering Government Affairs & Policy HACCP Health and Environment Concerns IFOAM International Trade Just Label It Leadership Award NOP NOSB Organic Industry Survey Organic PAC Organic Production Organic Products Organic Report Organic Research Organic Sector Organic Week OTA OTA Board OTA Policy Conference Research & Promotion Program Resources Standards The Organic Center USDA | <urn:uuid:174d8786-2a33-4d2d-a040-2ebaaf48ec11> | CC-MAIN-2017-13 | http://www.newsfromota.com/ota-members/of-note/consumers-confusion-over-natural-food-label/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187225.79/warc/CC-MAIN-20170322212947-00305-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.885451 | 318 | 2.625 | 3 |
Getting our children to practice their instruments – or any important skill – has long been a challenge for parents. All families want to make the most of the investment in musical instruments and lessons, and are anxious to see their children benefit from the discipline of learning music. There is no magic pill to solving this sometimes daily squabble in homes, but here are our 10 best tips that could change the struggle to celebration.
#1 ~ Music is fun to play! Your positive attitude will convey that learning music can be a great source of fun and satisfaction. Yes, those phrases can sound less than sweet, and often repetitive, but when a parent responds to the effort with positive, non-judgmental acceptance, children will also judge their imperfect efforts as steps towards progress rather than evidence of failure.
“Fun means engagement, doing and learning what has meaning and purpose, and it means being challenged. Embracing this belief should have a profound effect on what and how we teach.” Valerie Strauss, of The Washington Post
“getting in the habit of practicing each day is much more important than practicing for hours on end.” Holly Schindler, music teacher & author
“If you’re having trouble coaxing your child into practicing, try doing it at a different time of day. In our house, the mood, and the amount of stuff we could accomplish in less than 10 minutes changed really dramatically when we switched from practicing in the early evenings to getting it done before school.” Anastasia Tsioulcas, Assoc. Producer, NPR Music
Some days are just too crazy, and try as we may, getting practice in feels impossible. Don’t bargain to skip today and ‘practice twice as long tomorrow’ only to have it turn into a looming mountain of time. Some practice is better than none.
“My kids were always waiting for me – for the bus, for a ride, for dinner. Rather than letting them play video games, I had them use that time to go over a portion of their lessons.” Nancy Karuzis, co-owner, City Music
#3 ~ Praise the time spent practicing – not their ability or accuracy. This is a common suggestion from our instructors. Once students master a scale, phrase, or song, you can then offer them an opportunity to demonstrate it for a significant person, if they wish. And congratulate the courage it takes to choose to play for others, regardless of the outcome.
“It is much better to praise a child for effort. When children are taught the value of concentrating, strategizing and working hard when dealing with academic challenges, this encourages them to sustain their motivation, performance and self-esteem.” Claudia Mueller and Carol Dweck, Dept. of Psychology researchers at Columbia University
“Compliment your child’s effort and hard work rather than innate ability. Studies have shown that students who are praised for their effort significantly outperform and are more motivated than students praised for natural ability. This gives the child a greater sense of control and responsibility over their progress.” Nathan Samulak, City Music instructor.
“Parental involvement is very helpful. For younger children, keep practice time short. Shower your child with hugs and kisses for a moment or two when they finish and tell them how wonderful it is that they practiced. Then walk away!” City Music instructor, Joanna Katzen
#4 ~ Set age appropriate practice goals. Small children cannot be expected to sit for 30 minutes, playing brief three note pieces. A couple 5-10 minute sessions in the course of the day take the ‘gruel’ out of it – and they add up! The older, more focused the child, the longer sessions can be.
“For four- and five-year-old beginners, 10 minutes of practice time is a common recommendation, unless the child is a prodigy or unusually self-motivated. The important goal for these very young piano students is to establish practice as a routine, daily responsibility and to make it fun.” Piano Teachers Federation
#5 ~ Review new material with your child. Ask your teacher to demonstrate what to practice and write down specific goals for the week, so you both will know what is expected.
“ask her to show you what they learned as soon as you get home. This reinforces the concepts they’ve been introduced to and gets them over the hump of starting a new week’s lesson.” Holly Schindler
#6 ~ Don’t put that instrument away. This can be difficult with younger siblings and boisterous pets, but an instrument that is in view and ready to play, is a great incentive. Wall hangers or stands for guitars and other instruments keeps them in site. Do children really have to practice in their room? Having the instrument in the family room can make it a talking point and a source of pride. This is a great idea for musicians of all ages.
“Keep the instrument in a place where it is out and readily available. The fewer physical barriers there are and the more a child sees the instrument the more likely they are to pick it up and play it.” City Music instructor, Nathan Samulak
#7 ~ Feed the fun factor! Kids love the challenge of games. Offer token rewards like stickers or other collectibles to a keep a record of daily practice, length of practice or other goals. This is a popular theme among our teachers:
“Kids relate to video games – so I remind them that learning an instrument is just like learning a video game. You start basic and work towards more challenging – the better you get, the better the ‘loot’,” Greg Prendergast, City Music instructor
“It’s very helpful to keep a chart that shows a check mark for each day they practiced, and to show it to your child’s teacher at the next lesson so that the teacher can praise him or her too,” City Music instructor, Joanna Katzen
#8 – Keep the fun fresh. Playing sheet music ‘just for fun’ – providing it is appropriate for their ability – can keep enthusiasm up, and create personal goals to aspire too. City Music has a great selection of pop music, Disney favorites and holiday classics that come in easy, intermediate and advanced levels, for a variety of instruments. Listen to and watch videos of music and artists they enjoy. You could even try singing or playing along.
“Have your child listen often to quality music performed on their instrument. Take them to concerts. Ask their teacher for listening suggestions or live music in the area. Students who are inspired by great music are more likely to develop an intrinsic motivation to play.” Nathan Samulak, City Music instructor
#9 ~ Set an example. Are you learning something new for fun or work? Share how you practice, demonstrate how you set time aside to master your goals. Avoid disparaging comments towards yourself – that you “aren’t musical” or “aren’t smart enough”. Be sure to share your successes, too.
#10. All of the above, again and again. As students grow and progress, the material becomes more challenging. Scheduling regular practice, parental support and praise remain all important. Some students can get discouraged by the size or difficulty of their pieces.
“It was a revelation to me when I realized the frustration my son expressed was from his idea that the work being hard meant he was not smart. By talking more about the value of the hard work, not the ease, we helped him see that things worth learning take effort – they don’t come easy” City Music co-owner, Nancy Karuzis
“As the material gets harder, I tell my students to pick different sections to work on. Do not always start at the beginning of the piece, never giving the end of the piece enough attention. Breaking it into pieces makes it more manageable. We have a tendency to just go back to the beginning every time we make a mistake.” City Music instructor, Charlene LeDoux
City Music instructors will be happy to talk to you about practice goals and strategies for your child, to keep it fun and celebrate music – and practice – in your home. | <urn:uuid:96a0c615-66d4-44c9-8755-4420045dd237> | CC-MAIN-2019-04 | https://www.citymusiconline.com/2016/07/29/our-best-tips-for-getting-kids-to-practice/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584332824.92/warc/CC-MAIN-20190123130602-20190123152602-00466.warc.gz | en | 0.955525 | 1,730 | 2.828125 | 3 |
Please help support the mission of New Advent and get the full contents of this website as an instant download. Includes the Catholic Encyclopedia, Church Fathers, Summa, Bible and more all for only $19.99...
A former city of the Roman Empire, situated at the head of the Adriatic, on what is now the Austrian sea-coast, in the country of Goerz, at the confluence of the Anse and the Torre. It was for many centuries the seat of a famous Western patriarchate, and as such plays and important part in ecclesiastical history, particularly in that of the Holy See and Northern Italy.
The site is now known as Aglar, a village of 1500 inhabitants. The city arose (180 B.C.) on the narrow strip between the mountains and the lagoons, during the Illyrian wars, as a means of checking the advance of that warlike people. Its commerce grew rapidly, and when Marcus Aurelius made it (168) the principal fortress of the empire against the barbarians of the North and East, it rose to the acme of its greatness and soon had a population of 100,000. It was pillaged in 238 by the Emperor Maximinus, and it was so utterly destroyed in 452 by Attila, that it was afterwards hard to recognize its original site. The Roman inhabitants, together with those of smaller towns in the neighbourhood, fled to the lagoons, and so laid the foundations of the city of Venice. Aquileia arose again, but much diminished, and was once more destroyed (590) by the Lombards; after which it came under the Dukes of Friuli, was again a city of the Empire under Charlemagne, and in the eleventh century became a feudal possesion of its patriarch, whose temporal authority, however, was constantly disputed and assailed by the territorial nobility.
Ancient tradition asserts that the see was founded by St. Mark, sent thither by St. Peter, previous to his mission to Alexandria. St. Hermagoras is said to have been its first bishop and to have died a martyr's death (c. 70). At the end of the third century (285) another martyr, St. Helarus (or Hilarius) was bishop of Aquileia. In the course of the fourth century the city was the chief ecclesiastical centre for the region about the head of the Adriatic, afterwards known as Venetia and Istria. In 381, St. Valerian appears as metropolitan of the churches in this territory; his synod of that year, held against the Arians, was attended by 32 (or 24) bishops. In time part of Western Illyria, and to the north, Noricum and Rhaetia, came under the jurisdiction of Aquileia. Roman cities like Verona, Trent, Pola, Belluno, Feltre, Vicenza, Treviso, Padua, were among its suffragans in the fifth and sixth centuries. As metropolitans of such an extensive territory, and representatives of Roman civilization among the Ostrogoths and Lombards, the bishops of Aquileia sought and obtained from their barbarian masters the honorific title of patriarch, personal, however, as yet to each titular of the see. This title aided to promote and at the same time to justify the strong tendency towards independence that was quite manifest in its relations with Rome, a trait which it shared with its less fortunate rival, Ravenna, that never obtained the patriarchial dignity. It was only after a long conflict that the popes recognized the title thus assumed by the metropolitans of Aquileia. Owing to the acquiescence of Pope Vigilius in the condemnation of the "Three Chapters", in the Fifth General Council at Constantinople (553) the bishops of Northern Italy (Liguria and Aemilia) and among among them those of the Venetia and Istria, broke off communion with Rome, under the leadership of Macedonius of Aquileia (535-556). In the next decade the Lombards overran all Northern Italy, and the patriarch of Aquileia was obliged to fly, with the treasures of his church, to the little island of Grado, near Trieste, a last remnant of the imperial possessions in Northern Italy. This political change did not affect the relations of the patriarchate with the Apostolic See; its bishops, whether in Lombard or imperial territory, stubbornly refused all invitations to a reconciliation. Various efforts of the popes at Rome and the exarchs at Ravenna, both peaceful and otherwise, met with persistent refusal to renew the bonds of unity until the election of Candidian (606 or 607) as Metropolitan of Aquileia (in Grado). Weary of fifty years' schism, those of his suffragans whose sees lay within the empire joined him in submission to the Apostolic See; his suffragans among the Lombards persisted in their schism. They went further, and established in Aquileia itself a patriarchate of their own, so that henceforth there were two little patriarchates in Northern Italy, Aquileia in Grado and Old-Aquileia. Gradually the schism lost its vigour, and by 700 it was entirely spent; in the synod held that year at Old-Aquileia it was formally closed. It was probably during the seventh century that the popes recognized in the metropolitans of Grado the title of Patriarch of Aquileia, in order to offset its assumption by the metropolitans of Old-Aquileia. In succeeding centuries in continued in use by both, but had no longer any practical significance. The Patriarchs of Old-Aquileia lived henceforth, first at Cormons, and from the eighth to the thirteenth century at Friuli (Forum Julii). In the later part of the eighth century the creation of a new metropolitan see at Salzburg added to the humiliation of Old-Aquileia, which claimed as its own the territory of Carinthia, but was obliged to acquiesce in the arbitration of Charlemagne, by which Ursus of Aquileia (d. 811) was obliged to relinquish to Arno of Salzburg the Carinthian territory north of the Drave. German feudal influence was henceforth more and more tangible in the ecclesiastical affairs of Old-Aquileia. In 1011 one of its patriarchs, John IV, surrounded by thirty bishops, consecrated the new Cathedral of Bamberg. Its influential patriarch, Poppo, or Wolfgang (1019-42) consecrated his own cathedral at Aquileia, 13 July 1031, in honour of the Blessed Virgin Mary. in 1047, the Patriarch Eberhard, a German, assisted at the Roman synod of that year, in which it was declared that Aquileia was inferior in honour only to Rome, Ravenna, and Milan. Nevertheless, Aquileia lost gradually to other metropolitans several of its suffragans, and when the Patriarchate of Grado was at last transferred (1451) from that insignificant place to proud and powerful Venice, the prestige of Old-Aquileia could not but suffer notably. In the meantime, during the thirteenth and fourteenth centuries the Patriarchs of Aquileia had greatly favoured as a residence Udine, an imperial donation, in Venetian territory. In 1348 Aquileia was destroyed by an earthquake, and its patriarchs were henceforth, to all intents and purposes, Metropolitans of Udine. Since the transfer of the patriarchical residence to Udine the Venetians had never lived in peace with the patriarchate, of whose imperial favour and tendencies they were jealous. When the patriarch Louis of Teck (1412-39) compromised himself in a war between Hungary and Venice, the latter seized on all the lands donated to the patriarchate by the German Empire. The loss of his ancient temporal estate was acquiesced in a little later (1445) by the succeeding patriarch, in return for an annual salary of 5,000 ducats allowed him from the Venetian treasury. Henceforth only Venetians were allowed to hold the Patriarchate of Aquileia. Under the famous Domenigo Grimani (Cardinal since 1497) Austrian Friuli was added to the territory of the patriarchate whose jurisdiction thus extended over some Austrian dioceses.
The 109th and last Patriarch of Aquileia was Daniel Dolfin (Delfino), coadjutor since 1714 of his predecessor, Dionigio Dolfin, his successor since 1734, and Cardinal since 1747. The Venetian claim to the nomination of the Patriarch of Aquileia had been met by a counter-claim on the part of Austria since the end of the fifteenth century when, as mentioned above, Austrian dioceses came to be included within the jurisdiction of the patriarchate. Finally, Benedict XIV was chosen as arbiter. He awarded (1748-49) to the Patriarchate of Udine the Venetian territory in Friuli, and for the Austrian possessions he created a vicariate apostolic with residence at Goerz independent of the Patriarch of Aquileia, and immediately dependent on the Holy See, in whose name all jurisdiction was exercised. This decision was not satisfactory to Venice, and in 1751 the Pope divided the patriarchate into two archdioceses; one at Udine, with Venetian Friuli for its territory, the other at Goerz, with jurisdiction over Austrian Friuli. Of the ancient patriarchate, once so proud and influential, there remained but the parish church of Acquileia. It was made immediately subject to the Apostolic See and to its rector was granted the right of using episcopal insignia seven times in the year.
Neher in Kirchenlex. I, 1184-89; De Rubeis, Monum. Eccl. Aquil. (Strasburg, 1740); Ughelli Italia Sacra, I sqq.; X, 207; Cappelletti, Chiese d'Italia, VIII, 1 sqq.; Menzano, Annali del Friuli (1858-68); Paschini, Sulle Origini della Chiesa di Aquileia (1904); Glaschroeder, in Buchberger's Kirchl. Handl. (Munich, 1904), I, 300-301; Hefele, Conciliengesch. II, 914-23. For the episcopal succession, see Gams, Series episcoporum (Ratisbon, 1873-86), and Eubel, Hierarchia Cath. Medii Aevi (Muenster, 1898).
APA citation. (1907). Aquileia. In The Catholic Encyclopedia. New York: Robert Appleton Company. http://www.newadvent.org/cathen/01661c.htm
MLA citation. "Aquileia." The Catholic Encyclopedia. Vol. 1. New York: Robert Appleton Company, 1907. <http://www.newadvent.org/cathen/01661c.htm>.
Transcription. This article was transcribed for New Advent by William Edmund Fahey. Please pray for the souls of Dr. William and Mrs. Beatrice Fahey of Lewiston, Maine.
Ecclesiastical approbation. Nihil Obstat. March 1, 1907. Remy Lafort, S.T.D., Censor. Imprimatur. +John Cardinal Farley, Archbishop of New York.
Contact information. The editor of New Advent is Kevin Knight. My email address is webmaster at newadvent.org. Regrettably, I can't reply to every letter, but I greatly appreciate your feedback — especially notifications about typographical errors and inappropriate ads. | <urn:uuid:fbea3990-a5dc-474d-bef2-77a933cf3bbb> | CC-MAIN-2019-04 | http://newadvent.org/cathen/01661c.htm | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583700734.43/warc/CC-MAIN-20190120062400-20190120084400-00424.warc.gz | en | 0.966711 | 2,493 | 3.1875 | 3 |
Examples of types of habitats and vegetation on the Manhood coastal plain
Woodland, hedgerows and road verges
Woodland and hedgerows are vital habitats for much of our wildlife. Unfortunately, many have disappeared from our countryside over recent years. Those remaining should be treasured! Road verges have become increasingly important as alternative habitats to intensively farmed fields and many Counties now manage these sympathetically for nature.
Saline lagoons and reed beds
The Severals, just behind the shingle bank on the Selsey side of Pagham Harbour, are good examples of saline lagoons, providing protected nesting sites for waterfowl and swans as well as being home for a strong water vole population.
Rifes ponds and ditches
The Manhood area has many rifes and ditches crossing and bordering the large areas of agricultural land and these can provide a rich habitat for many voles and plant species. Surveying have revealed good populations for bank and water voles in many areas along these channels. Ponds are also very important habitats, not just for amphibians and voles, but many birds and bats depend on the insect life found over open water. Many ponds have fallen into neglect in the past and one of the group’s projects is to resurrect and manage them to reclaim the valuable habitat.
Tidal Mud Flats
Pagham Harbour is a wonderful example of tidal mud flats, providing rich feeding grounds for wading birds, both native and migrant when the tide is out.
Arable land and urban wildlife areas.
With many modern agricultural practices wildlife gets squeezed out of the countryside and into more urban settings. Foxes and Sparrow Hawks are two species seen more and more commonly in our gardens. | <urn:uuid:bbf6c436-b8f9-4092-a5e0-a883a6aa555b> | CC-MAIN-2017-39 | http://mwhg.org.uk/coastal-plain-habitats/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818691830.33/warc/CC-MAIN-20170925130433-20170925150433-00233.warc.gz | en | 0.941849 | 362 | 3.203125 | 3 |
And it's many layers
The outermost layer of the Earth is the crust, the red molten layer is the mantle, the part after that is the outer core, and the innermost layer is the inner core.
The crust of the earth is made up of mostly dirt, hard rock like sedimentary and metamorphic, and hard metal. The mantle is made up of molten igneous rock which shifts around under the crust. The outer core is made up of liquid metals like iron and nickel. The inner core because of the pressure of gravity is solid iron metal.
The Earth's crust has a depth of 0-15 kilometers(0-31 miles), being the thinnest layer. The mantle, who is the thickest layer, has a depth of 10-2890 kilometers(6-1806 miles). The outer core has a depth of 2890-51509 kilometers(1806-3219 miles).And the inner core has a depth of 5150-6370 kilometers(3219-3981 miles).
Layer Temperature Range
The crust of the Earth has a temperature range of 0-870 degrees Celsius. The mantle has a temperature range of 870-3,7000 degrees Celsius. The outer core has a temperature range of 3,700-4,300 degrees Celsius. And the inner core has a temperature range between 4,300-7,200 degrees Celsius.
Convection currents are the force that moves the crust across the surface of the mantle. As the molten rock moves beneath the crust it pushes the different pieces of the crust together on one side of the world and away from each other on the other. As the two pieces of crust run in to each other three things can happen, if it is two continental plates they both rise to create mountains, if two oceanic plates run into each other the heavier one runs underneath the lighter one, and if a oceanic and continental plate meet the oceanic plate goes underneath the continental plate because it is heavier. When the plate that goes under goes into the mantle it melts and becomes part of it which eventually rises up through the cracks in the Earth's crust, creating volcanic hot spots.
Evidence of the different layers of earth are things such as magma and lava that suggest a molten interior under the hard crust of the world. | <urn:uuid:ad26f3df-2d8b-4c72-ab67-279a5806d46d> | CC-MAIN-2017-04 | https://tackk.com/e2c5jd | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280850.30/warc/CC-MAIN-20170116095120-00575-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.892807 | 471 | 4.28125 | 4 |
Transitioning from childhood to adulthood is for many adolescents a rollercoaster journey with way too many bumps. Some of those bumps are health risks that they end up plowing through, rather than safely rolling over.
Adolescents need help with learning how to protect their health. What they learn now—the safe health habits they adopt—will provide a lifetime of protection against disease. Vaccines are a safe, effective, yet underutilized method of disease prevention in this population.
Disease prevention has never been so fast and easy; however, 35 million adolescents may not be up-to-date on recommended vaccines.
Raising the awareness of adolescents and their caregivers to the availability of and need for vaccines for this target population will help overcome barriers to increased adolescent immunization rates. Such barriers include lack of uniform school immunization mandates for adolescents, lack of funding, a decline in physician-patient contact, lack of knowledge on the part of adolescent caregivers as to the need for vaccination in the adolescent years, and lack of interest or knowledge on the part of adolescents.
Recognizing the need for developing effective immunization education tools for both adolescents and their parents/caregivers, PKIDs recently completed surveying the two groups as the first step in its Teen Vaccine Initiative; a program geared toward increasing vaccination rates of adolescents ages 11 to 19. Survey findings indicate:
Based on PKIDs’ survey findings and information gathered in its needs assessment, PKIDs has developed a health communication and education program for 1) raising immunization awareness among adolescents and their parents/caregivers and 2) educating adolescents and parents of adolescents about available vaccines and the diseases they prevent.
For more on PKIDs' VI survey, please click here to read the report.
disease from spreading.
doctor to see if you could benefit. | <urn:uuid:214d2410-4e0e-4983-8f49-6620d306f74d> | CC-MAIN-2020-05 | http://www.pkids.org/immunizations/teen_vaccination.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250608295.52/warc/CC-MAIN-20200123041345-20200123070345-00279.warc.gz | en | 0.943569 | 375 | 3.921875 | 4 |
Actinopterygii (ray-finned fishes) > Perciformes
(Perch-likes) > Sparidae
Etymology: Rhabdosargus: Greek, rhabdos = stick + Latin, sargus = sargus (1591) (Ref. 45335). More on author: Forsskål.
Environment: milieu / climate zone / depth range / distribution range
Marine; brackish; reef-associated; oceanodromous (Ref. 51243); depth range 0 - 60 m (Ref. 30573). Tropical; 36°N - 38°S, 19°E - 155°E (Ref. 57004)
Indo-West Pacific: Red Sea and East Africa to Japan, China, and Australia.
Length at first maturity / Size / Weight / Age
Maturity: Lm 23.7 range ? - ? cm
Max length : 80.0 cm TL male/unsexed; (Ref. 3678); common length : 45.0 cm TL male/unsexed; (Ref. 1724); max. published weight: 12.0 kg (Ref. 1724)
Inhabit coastal waters (Ref. 30573, 44894), usually entering estuaries (Ref. 44894). Abundant in shallow water and often caught at the surf-line or in rock pools (Ref. 9987). Larger, solitary fish sometimes enter brackish mangrove areas (Ref. 9987). Juveniles in estuaries move into deeper water with growth (Ref. 4335). Often in schools (Ref. 9710). Feed on benthic invertebrates, mainly mollusks (Ref. 5213) and aquatic macrophytes (Ref. 26055). Popular angling species commonly captured with hook and line (Ref. 44894). Marketed fresh (Ref. 5284).
Normally sexes are separate but some individuals are protandrous due to geographical variation in sexual pattern (Ref. 103751). Gonochorism is confirmed in Australia, and protandry in Asia (Ref. 103751). Also Ref. 28504.
Bauchot, M.-L. and M.M. Smith, 1984. Sparidae. In W. Fischer and G. Bianchi (eds.) FAO species identification sheets for fishery purposes. Western Indian Ocean (Fishing Area 51). volume 4. [var. pag.] FAO, Rome. (Ref. 3507)
IUCN Red List Status (Ref. 120744)
CITES (Ref. 118484)
Threat to humans
Fisheries: commercial; aquaculture: commercial; gamefish: yes
Estimates based on models
Preferred temperature (Ref. 115969
): 21.9 - 29, mean 28 (based on 1662 cells).
Phylogenetic diversity index (Ref. 82805
= 0.5156 [Uniqueness, from 0.5 = low to 2.0 = high].
Bayesian length-weight: a=0.02138 (0.01741 - 0.02625), b=2.94 (2.88 - 3.00), in cm Total Length, based on LWR estimates for this species (Ref. 93245
Trophic Level (Ref. 69278
): 3.3 ±0.47 se; Based on food items.
Resilience (Ref. 120179
): Medium, minimum population doubling time 1.4 - 4.4 years (Assuming tm=2-4).
Vulnerability (Ref. 59153
): Moderate vulnerability (36 of 100) . | <urn:uuid:8e6d249a-fc03-4e9e-81e0-858372130565> | CC-MAIN-2020-16 | http://fishbase.mnhn.fr/Summary/SpeciesSummary.php?ID=5368 | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371830894.88/warc/CC-MAIN-20200409055849-20200409090349-00144.warc.gz | en | 0.737796 | 774 | 3.046875 | 3 |
Gyroelongated square pyramid
|Gyroelongated square pyramid|
J9 - J10 - J11
3*4 triangles |
|Symmetry group||C4v, , (*44)|
|Rotation group||C4, +, (44)|
In geometry, the gyroelongated square pyramid is one of the Johnson solids (J10). As its name suggests, it can be constructed by taking a square pyramid and "gyroelongating" it, which in this case involves joining a square antiprism to its base.
A Johnson solid is one of 92 strictly convex polyhedra that have regular faces but are not uniform (that is, they are not Platonic solids, Archimedean solids, prisms, or antiprisms). They were named by Norman Johnson, who first listed these polyhedra in 1966.
The Gyroelongated square pyramid represents the capped square antiprismatic molecular geometry:
The dual of the gyroelongated square pyramid has 9 faces: 4 trapezoidal, 1 square and 4 pentagonal.
|Dual gyroelongated square pyramid||Net of dual|
|This polyhedron-related article is a stub. You can help Wikipedia by expanding it.| | <urn:uuid:c05d493f-6f76-46dc-bbd8-7d86277e7062> | CC-MAIN-2018-30 | https://en.wikipedia.org/wiki/Gyroelongated_square_pyramid | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589470.9/warc/CC-MAIN-20180716213101-20180716233101-00369.warc.gz | en | 0.870948 | 267 | 3.34375 | 3 |
A bright flash from a star reflects off of objects in space with strange effect.
In 2002 a star named V838 Monocerotis let off a massive explosion, creating a strobe-like flash in the blackness of space. The light was so bright that for a brief time the star outshone every star in the Milky Way galaxy, including our sun. Over months, evidence of the outburst continued to make its way toward Earth, which lies about 20,000 light-years away. As light from the blast rippled outward, some of it reflected off of nearby clouds of interstellar dust producing a phenomenon known as a light echo. In a sequence of images taken in the aftermath of the explosion, a ring of dust appears at first glance to be growing around the star. But this movement is only an illusion—the result of reflected light taking different amounts of time to reach our planet. Watch the video for a view of this event as seen by the Hubble Space Telescope. | <urn:uuid:37de7757-b05f-4fab-9abb-f61df41d3326> | CC-MAIN-2019-35 | https://svs.gsfc.nasa.gov/11233 | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318243.40/warc/CC-MAIN-20190823083811-20190823105811-00443.warc.gz | en | 0.942303 | 201 | 3.796875 | 4 |
The latest systematic comparison of cancer survival between Australia and New Zealand shows more than 750 New Zealanders who die of cancer each year would survive if they lived on the other side of “the ditch”.
Research from Auckland University presented at the World Cancer Congress revealed the gap of about 10 per cent, or 765 deaths per year, between the nations has not improved since an initial study was done by Otago University 12 years ago which first identified a gulf in mortality rates.
Auckland University Professor Mark Elwood said over time mortality rates had dropped significantly in both countries and survival rates had increased – yet this gap in outcomes for New Zealand cancer patients compared to those in Australia had not budged.
“We found that cancer survival was significantly higher in Australia than in New Zealand for all cancers combined in both men and women, as well as for people with bowel or lung cancer, and women with breast or ovarian cancer,” Professor Elwood said.
A key finding was that this gap between the two countries – which share similar rates of new cases as well as health care systems – is most pronounced in the first year after diagnosis.
Professor Elwood said this pointed to specific issues in primary care.
“It’s a significant gap that could be attributed to a range of factors, but the biggest difference recorded in that first year would indicate there are issues related to the speed of diagnosis for New Zealanders and the management of the disease within primary care rather than any difference in treatment standards.
“In the past few years we have seen changes in the health system to close the gap, and we would hope to see that reflected in future studies.”
The study compared cancer survival for Australian patients diagnosed in 2006-2010 and 2000-2005 compared to those in New Zealand using data from each country’s national cancer registration and mortality systems. Cancer survival means relative cancer survival and was assessed at one, five and 10 years from diagnosis.
The study authors found cancer survival was significantly higher in Australia than in New Zealand for all cancers combined for both sexes as well as for several major cancer sites including bowel and lung. Cancer survival was also significantly higher for Australian women with breast or ovarian cancer. Other types of cancer showed no difference, including melanoma and laryngeal. These findings were not explained by age differences between the patient populations.
Source: Cancer Council Australia | <urn:uuid:880b3a21-3b55-4bfa-a573-39b7a46626e5> | CC-MAIN-2019-09 | http://oncologynews.com.au/mind-the-gap-tasman-divide-remains-in-cancer-survival/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247522457.72/warc/CC-MAIN-20190222180107-20190222202107-00257.warc.gz | en | 0.976914 | 487 | 3.015625 | 3 |
Web Date: July 29, 2014
New Pipette Picks Up Single Cells
Researchers are keen to profile individual cells, particularly cancer cells because they can have different genetics and respond to drugs differently. But isolating single cells can be a tricky business. That’s what Lidong Qin’s group at the Houston Methodist Research Institute found when they began collaborating with cancer genetics experts. So, when the team couldn’t find an easy technique, they developed one instead, creating a handheld pipette that catches single cells and . . .
To view the rest of this content, please log in with your ACS ID.
- Chemical & Engineering News
- ISSN 0009-2347
- Copyright © American Chemical Society | <urn:uuid:286dcd71-70ff-4a30-9030-fb2bd0abdc97> | CC-MAIN-2016-44 | http://cen.acs.org/articles/92/web/2014/07/New-Pipette-Picks-Single-Cells.html?type=paidArticleContent | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719437.30/warc/CC-MAIN-20161020183839-00390-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.88668 | 150 | 2.640625 | 3 |
- Open Access
Geographic profiling as a novel spatial tool for targeting infectious disease control
International Journal of Health Geographics volume 10, Article number: 35 (2011)
Geographic profiling is a statistical tool originally developed in criminology to prioritise large lists of suspects in cases of serial crime. Here, we use two data sets - one historical and one modern - to show how it can be used to locate the sources of infectious disease.
First, we re-analyse data from a classic epidemiological study, the 1854 London cholera outbreak. Using 321 disease sites as input, we evaluate the locations of 13 neighbourhood water pumps. The Broad Street pump - the outbreak's source- ranks first, situated in the top 0.2% of the geoprofile. We extend our study with an analysis of reported malaria cases in Cairo, Egypt, using 139 disease case locations to rank 59 mosquitogenic local water sources, seven of which tested positive for the vector Anopheles sergentii. Geographic profiling ranks six of these seven sites in positions 1-6, all in the top 2% of the geoprofile. In both analyses the method outperformed other measures of spatial central tendency.
We suggest that geographic profiling could form a useful component of integrated control strategies relating to a wide variety of infectious diseases, since evidence-based targeting of interventions is more efficient, environmentally friendly and cost-effective than untargeted intervention.
Infectious diseases have, throughout human history, been a major cause of death. Just three such diseases - malaria, HIV/AIDS and tuberculosis - account for 5.6 million deaths a year, and neglected tropical diseases (NTDs) including leishmaniasis and trypanosomiasis are together responsible for 500,000 deaths annually . Recent years have seen a resurgence in vector-borne diseases due to urbanization and development: Jones et al. reported the emergence of 335 infectious diseases between 1940 and 2005.
Evidence-based targeting of interventions is a crucial component in the fight against infectious diseases because targeted interventions are more efficient and more cost-effective than untargeted interventions ; evidence-based interventions also reduce environmental pollution, minimize impacts on biodiversity and protect human health. For example, malaria parasite transmission is strongly dependent on the location of vector breeding sites that serve as focal points for the disease. Most transmission only occurs within certain distances from these sites; in Africa, these distances are typically between a few hundred meters and a kilometer, and rarely exceed 2-3 km . Because of this clustering, untargeted intervention is highly inefficient. Accurate information on the distribution of malaria cases allows interventions to be focused at the points of transmission, greatly increasing the effectiveness of control measures . Although source reduction of mosquito larval habitats can dramatically mitigate malaria transmission [4–7] the transient nature and diversity of potential vector breeding sites makes the identification and control of breeding sites difficult . Consequently, the development of novel spatial tools that allow identification of infectious disease sources is of enormous interest .
Although spatial mapping of epidemiological data is well established (for example, see [9, 10]), the emphasis is primarily on identifying spatio-temporal clusters of cases that suggest the possibility of outbreaks of disease [11–16], rather than on identifying sources of transmission in the early stages of outbreaks when such knowledge might be used to improve targeting of interventions, or depend on control data (e.g., [17, 18]). Ostfeld et al. highlight the complexity of vector-borne disease risk mapping by showing how the invasion of North America by West Nile Virus was not related to changes in the distribution or abundance of mosquitoes, but appears to follow changes in the distribution of WNV in vectors and avian reservoirs . Consequently, Eisen and Eisen [8, 21] identified a need for reliable new methods to determine probable pathogen exposure sites. Geographic profiling (GP), a statistical tool originally developed in criminology and now beginning to be applied to biological and epidemiological data [23–26], may provide a means to directly identify sources of infection based on disease case locations.
In criminology, GP inputs the locations of connected crime sites, and uses these to make inferences about the most likely area of offender residence. The methods underlying GP depend on two concepts, (i) distance decay and (ii) the buffer zone . Distance decay results from the fact that travel requires effort, time and/or money, and that most crimes thus tend to occur relatively close to the criminal's home; for example, 70% of arsons occur within two miles of a serial arsonist's home . Similar constraints operate in infectious disease epidemiology where the probability of transmission declines with distance from an infected host . The buffer zone, in criminology, is an area around the criminal's home in which offences are less likely, arising partly because of increases in detection risk related to reduced anonymity within the criminal's local neighborhood, and partly because the number of criminal opportunities increases with distance from home. The latter influence also occurs in biological systems: assuming suitable habitats are randomly dispersed throughout the surrounding area, then as the distance from the anchor point (usually a home or workplace) increases, the total number of suitable habitats increases. GP uses these opposing effects - the buffer zone and distance decay - to calculate the probability of offender residence for each location within the study area, producing an offender residence probability surface from the point pattern of the crime locations; this is referred to as a jeopardy surface. When the jeopardy surface is overlaid on a map of the search area, the result is a geoprofile. The higher a given surface point the greater the likelihood of offender residence for the underlying position. A geoprofile thus describes an optimal search process based on decreasing probability density, rather than highlighting a single area. Consequently, the performance of a geoprofile can be measured by the hit score percentage (HS%), the proportion of the area covering the crimes (or disease incidents) in which the offender's base (or disease source) is located; in criminology, this is usually the area bounding the crimes, plus a 'guard rail' or buffer of an additional 10%. The smaller the HS%, the more accurate the geoprofile; a hit score of 50% is what would be expected from a nonprioritized (i.e., random or uniform) search .
GP has been extremely successful in criminology, and it is now used routinely by law enforcement agencies around the world, including the Royal Canadian Mounted Police (RCMP), Scotland Yard and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). This success [28, 29] led us to apply it to biological data [23–25]. Here, we extend this work to show how the technique may be applied to epidemiological data, using first John Snow's classic analysis of the 1854 London cholera outbreak , and second a series of malaria cases from Cairo, Egypt between 2001 and 2004. Specifically, we ask whether geographic profiling can use disease case locations to identify infection sources as a means of improving the targeting of interventions.
London cholera study
A geographic profile prepared from 575 cholera deaths from 321 individual addresses from Snow's original data was used to evaluate 13 neighbourhood water pumps. The Broad Street water pump, the source of the cholera epidemic, ranked highest (HS% = 0.2%) (Figure 1). In this analysis, f and g were set to 1.2, the standard values in criminology. B is dynamic and is a function of the particular point pattern under analysis, and is set to half the mean nearest-neighbour distance in order to address scale issues; here, B = 53 feet.
Cairo malaria study
We also analysed the occurrence of malaria in Cairo, Egypt, between 2001 and 2004, and used geographic profiling to rank 59 bodies of water harbouring at least one mosquito larva over the study period. Of these 59 sites, eight tested positive for one or both of the malaria vectors Anopheles sergentii and An. pharoensis (Anopheles sergentii is well established as the most dangerous malaria vector in Egypt ). Geographic profiling ranked six of these - all positive for An. sergentii - in positions 1-6, in the top 2% of the geoprofile. The other two positive sites were ranked 22 and 44; the last of these was positive for An. pharoensis, but not An. sergentii (this was the only positive site that did not contain An. sergentii). Overall the eight breeding sites in which the vector species were identified were ranked more highly than the other sites (mean ranks 10.9 and 33.0 respectively) and had lower hit scores (medians 0.85% and 35.88% respectively; Mann-Whitney U test: W8,51 = 87.5, P < 0.001) (Figure 2). Again, f and g were set to 1.2; here, B = 1,214 feet.
Geographic profiling versus other methods of spatial central tendency
In both of our studies, geographic profiling proved highly efficient in identifying sources of infection using disease case locations when compared to other methods such as spatial mean, median and centre of minimum distance. In the London cholera analysis, the model's hit score was 0.2%, compared to 5.1%, 7.4% and 5.2% for the other three methods respectively. In the Cairo analysis, geographic profiling performed better than all three other methods for five out of seven sources, and was almost the best for one of the other two sources (4.46% versus 4.41%). Only for one source, which happened to lie close to the centre of the disease case locations, did the model not perform as well. Overall, the mean score for the seven sources was 2.77% for the geographic profiling model, versus 4.46%, 3.99% and 4.43% for the other methods respectively (Table 1).
We suggest that geographic profiling could form a useful component of integrated control strategies relating to a wide variety of infectious diseases, by improving targeting of interventions. This is important because of the dramatic improvements in efficiency and cost-effectiveness of targeted interventions compared to untargeted interventions .
GP offers a number of advantages over other measures of spatial central tendency. Direct comparisons of the predictive capability of the Criminal Geographic Targeting (CGT) algorithm used in geoprofiling to the spatial mean show the former approach is both more accurate and more consistent, generating a search strategy approximately three times as efficient, and with a smaller standard deviation . The CGT algorithm has also proved to be both robust and generalizable to a range of crimes in various environments. One important advantage of GP is that it explicitly allows for differences in landscape permeability, in the same way as cost surface analysis considers least-cost pathways. Also, because GP produces a probability score for each point in the study area, it describes an optimal search process as opposed to a single 'central point'. This is useful (i) when there are multiple anchor points (for example in the malaria analysis, where spatial mean, spatial median and centre of minimum distance performed well in identifying one source that occurred near to these points, but more poorly than geographic profiling for the others); and (ii), when differences in landscape permeability have skewed the location of the crime sites (for instance, when travel is more rapid along major roads). In biology, these are analogous to outbreaks with multiple sources, and variance in transmission probability in different habitats. A further advantage to the GP approach in both spatial criminology and spatial epidemiology is that the data are not constrained to administrative units such as census tracts, which often contain heterogeneous environmental conditions, but can utilise point observations. We know, for example, that offenders (or disease vectors) will seek nearby similar opportunities if their preferred criminal opportunity (or blood meal) is blocked or removed ; so a method like GP overcomes the limitations of spatially aggregated data by revealing continuous patterns and processes that might be masked when using administrative units as map inputs (this is a common problem in risk mapping that incorporates both socioeconomic and biophysical data). A final advantage to GP is the possibility of post-hoc analysis; i.e., a geoprofile could become a useful device to gauge the effectiveness of interventions after a specified time lag if the location of interventions is known and subsequent case locations are used to generate a new geoprofile after the application of an intervention, such as residual indoor spraying or use of insecticide-treated bed nets.
Buscema et al. recently applied the geographic profiling to the same cholera data set studied here . However, the geographic profiling algorithm was not applied correctly, failing to locate the Broad Street pump; as we show here, correct application of the model does locate this pump. In fact, interpretation of the results in this study is complicated by the authors' use of error distance, rather than hit score percentage, to measure model performance. Error distance is a flawed metric, reducing all of the information in a geoprofile to a single point. In fact, one of the great strengths of geographic profiling is that it produces a surface describing a search strategy, rather than a point estimate: clearly, if the actual source occurs at (to take a trivial example) the second highest point on the geoprofile, the error distance between the peak of the geoprofile and the source is immaterial, since the search strategy described by the geoprofile will still be highly efficient - in this case, locating the source after searching just 0.02% of the study area (ie two points in the 100 × 100 matrix produced by Rigel). In addition, the 'hidden unit' point estimate the authors favour is poorly suited to cases where there are multiple sources. As our analysis of the Cairo data shows, geographic profiling deals well with such cases.
The results reported here are highly encouraging; however, this study represents only the first step in applying GP to epidemiological studies of infectious diseases. Clearly, epidemiology differs from criminology in a number of obvious ways - and presumably in some ways that are not yet obvious - and further studies will be required to examine how best to implement GP in this new field. As an example of such an adjustment, recent work using GP to study counterinsurgency has shown that that geoprofiles of IEDs (improvised explosive devices) are much more likely to identify the location of the bomb maker than the bomb placer [34, 35]. Even beyond the differences between criminology and epidemiology, infectious diseases differ widely, and different diseases, or types of diseases, may require different approaches within the framework of GP. All this remains to be investigated.
One obvious difference between epidemiological data and criminal data is that in the former the original sources of infection can give rise to secondary sources of infection. Such spatio-temporally dynamic approaches are relatively common in epidemiology; for instance, research on foot and mouth disease (FMD) in the UK . Similar approaches have been used in criminology to identify changes in temporal patterns of crimes. Clearly, it would be interesting to extend the approach described here to include longitudinal studies to establish whether case data can be used to identify secondary, as well as primary, sources of infection.
Rossmo lists a number of operational procedures for the use of geographic profiling in a criminal investigation, including necessary assumptions and minimum data requirements. For example, he notes that different crime locations (e.g., place of victim encounter, murder scene, body dump site) have different theoretical meanings and have to be analyzed appropriately. Similarly in epidemiology, it would be important to distinguish between different location types (e.g., the capture site of a disease carrying insect, the home address of a sick individual, the location of an infected animal). Certainly if geographic profiling is to enjoy the same success in epidemiology that it has enjoyed in criminology, detailed examination of these issues in a range of different types of infectious disease is required.
Fortunately, the application of geographic profiling to the control of infectious disease need not start from scratch. There are a number of different geographic profiling software programs available, including Rigel [22, 36], developed by Environmental Criminology Research Inc. (ECRI), CrimeStat , funded by the U.S. National Institute of Justice, and Dragnet , developed at The University of Liverpool. Rigel and Dragnet are commercial programs.
In addition to these general points, our analyses here, in combination with previous biological studies [23–25] and the extensive literature on geographic profiling in criminology, suggest a number of factors to consider if geographic profiling is to be applied to epidemiological data. Fortunately, most of the likely problems have analogues in criminology, and in many cases there are standard methods that minimise their effect. For example, edge effects can complicate the analysis. In criminology, this is usually compensated for by extending the minimum bounding rectangle encompassing all of the crime sites to include a 'guard rail' or cushion around the study area. Similarly, vectors such as mosquitoes may disperse more easily across some types of environments than others; however, such non-isotropic surfaces (or data collection) are common in criminology, where movement along major roads may be considerably more rapid than movement in other directions. Other difficulties - such as spatial or temporal non-independence of locations - are also well understood in criminology. In fact, epidemiology may in some instances (if not in others) present fewer difficulties than criminology; for example, while missing data are likely in both fields, epidemiologists do not have the problem of criminals actively attempting to mislead them. Another obvious difference is that in the analyses reported here, the geographic profiling was used to rank potential foci that had already been identified (water pumps and standing water). This is similar to the situation in criminology, where the method is primarily used to rank existing lists of suspects; however, the method can also be used to identify potential foci from the surface of the geoprofile, with no other information.
Our primary aim in this paper is to show how a technique that has been successful in criminology can be applied to epidemiology, but of course this cross-fertilisation can also work in the opposite direction. For example, while in criminology work has focussed on spatial central tendency, this is not the case in epidemiology. Epidemiological approaches can - very broadly - be divided into three main classes; (i) Dynamic, deterministic or stochastic models; (ii) Use of environmental correlates to map disease risk; (iii) Risk mapping using disease incidence. Dynamic, deterministic or stochastic models have been used extensively to analyse the factors that govern the spatial patterns, processes of diseases and to assess the effects of various interventions to stem the spread of infectious agents . Traditional epidemiological approaches can be made spatially explicit by including network models, multigroup models, distance-transmission models and patch models . Our GP study is most closely related to the distance-transmission modelling in that it employs buffers and a distance decay functions based on vector and case data where the spatial coordinates are known. Further, both types of disease transmission highlighted in our study can be related to environmental factors, which is a common way to evaluate disease risk . The former relates to the presence of faulty urban infrastructure or poor sanitation, which is often difficult to spatially pinpoint a priori, whereas the latter relates to presence of infected vectors (anophelines) that are spatially heterogeneous and highly sensitive to microclimate and other abiotic factors such as breeding habitats (i.e., water bodies or containers). However, a major limitation to the use of environmental correlates is that direct causal relationships linking environmental conditions (e.g., poor infrastructure, substandard housing, poor sanitation, polluted water sources, climate, etc.) to disease incidence are often difficult to establish and may lead to spurious associations. Spatial criminology and infectious disease epidemiology share several characteristics: disease and crimes tend to be clustered near certain land uses or other environmental features, both criminals and disease agents (e.g., vectors) do not often travel far, and there is often a distance-decay effect between the source of the disease (or crime) and environmental features associated with either disease or crime .
For some diseases such as malaria and cholera, accurate spatial data exist on the location of cases, but spatial data are more difficult to obtain for vectors, their reservoirs, pollution sources or related environmental factors. Spatial data on disease incidence can be used to extrapolate the risk of disease exposure (or crime) from present distributions to areas outside the current, known distribution. Therefore, risk maps (or geoprofiles), can be seen as incorporating spatial variation of all risk factors including human-to-human exposure, contact with infected vectors, presence of disease reservoirs, etc. . The GP approach within spatial epidemiology essentially falls under the broad rubric of risk mapping in so far as point observations are used to generate surfaces that indicate where vectors or pathogens are likely to be present. An advantage to using epidemiological data in mapping and modelling infectious disease is that maps represent actual risk , whereas maps based on environmental correlates are likely to represent potential risk. Of course, risk can be a poor predictor of incidence owing to use of interventions (e.g., bednets or water filtration in the case of malaria and cholera, respectively) or herd immunity (e.g., in the case of influenza and other vector-borne diseases such as dengue). Also, surveillance methods and discrepancies between exposure location and the location of the reported case may complicate further the spatial relationships between risk and incidence. Notwithstanding these limitations, the extension of the GP approach from criminology to spatial epidemiology appears quite powerful in the case where environmental data are scant and/or causal mechanisms are unknown. In this sense, the application of GP seems most appropriate in the context of new and emerging infectious diseases where causal agents or their environmental correlates (or determinants) are unknown, but may be ascertained by examining environmental data in the context of geoprofiles.
In conclusion, we suggest geographic profiling has the potential to form a useful component of integrated control strategies for a wide variety of infectious diseases, including those with a mobile vector (as in our Cairo study) and those spread from a point source (as in the cholera study).
For each point (i,j) in the study area, the score function p is calculated as follows:
such that φ functions as a weighting factor that is set to 0 for disease case locations within the buffer zone, and 1 for locations outside the buffer zone. k is an empirically determined constant, B is the radius of the buffer zone, C is the number of disease cases, f and g are empirically determined exponents, (xi,yj) are the coordinates of point (i,j) and (xn,yn) are the coordinates of the nth location. Thus, pij describes the likelihood that the anchor point occurs at point (i,j), given the locations of the disease cases .
London cholera data
Snow collected address data on 575 cholera deaths (it would have been preferable to work with all known cases, not just mortalities). We digitized and geocoded the locations of 321 individual addresses from Snow's original map (as many of the deaths occurred in the same building (mean 1.79; range 1-18), addresses were used instead of cases to avoid the problem of spatial-temporal non-independence resulting from secondary contagion).
Cairo malaria data
As part of another study, spatial data relating to 139 recorded Plasmodium vivax malaria cases were collected, and buffer zones of 2 km were created around the locations of these malaria cases and merged to form a polygon of 296.5 km2. All accessible aquatic habitats within this study area (surface/cryptic; temporary/semi-permanent/permanent) were located and characterised between April and September 2005. These included water tanks, water pools created through pipelines or drainage system breakage, seepage from slum housing, natural springs, pools and ditches filled with ground water. Water sources included in this analysis were identified as bodies of water harbouring at least one mosquito larva over the study period (n = 59). A total of 11 mosquito species were identified, including the malaria vectors An. sergentii and An. pharoensis, as well as other, non-vector, species.
We analyzed the disease cases discussed in this article following the same standard procedures used in the preparation of a geographic profile for a crime series and using the software Rigel [22, 36]. To compare the model's performance to a simple estimates of spatial central tendency, we compared the model's hit score percentage to the spiral search area (SSA) percentage, which is obtained by calculating the percentage of the total area under consideration that has to be searched, moving out equally in all directions from the spatial mean, spatial median and from the centre of minimum distance.
Hotez PJ, Molyneux DH, Fenwick A, Ottesen E, Sachs SE, Sachs JD: Incorporating a rapid-impact package for neglected tropical diseases with programs for HIV/AIDS, tuberculosis, and malaria - A comprehensive pro-poor health policy and strategy for the developing world. Plos Medicine. 2006, 3: 576-584.
Jones KE, Patel NG, Levy MA, Storeygard A, Balk D, Gittleman JL, Daszak P: Global trends in emerging infectious diseases. Nature. 2008, 451: 990-U994. 10.1038/nature06536.
Carter R, Mendis KN, Roberts D: Spatial targeting of interventions against malaria. Bulletin of the World Health Organization. 2000, 78: 1401-1411.
Yohannes M, Haile M, Ghebreyesus TA, Witten KH, Getachew A, Byass P, Lindsay SW: Can source reduction of mosquito larval habitat reduce malaria transmission in Tigray, Ethiopia?. Tropical Medicine & International Health. 2005, 10: 1274-1285. 10.1111/j.1365-3156.2005.01512.x.
Gu WD, Regens JL, Beier JC, Novak RJ: Source reduction of mosquito larval habitats has unexpected consequences on malaria transmission. Proceedings of the National Academy of Sciences of the United States of America. 2006, 103: 17560-17563. 10.1073/pnas.0608452103.
Walker K, Lynch M: Contributions of Anopheles larval control to malaria suppression in tropical Africa: review of achievements and potential. Medical and Veterinary Entomology. 2007, 21: 2-21. 10.1111/j.1365-2915.2007.00674.x.
Gu W, Nowak RJ: Agent-based modelling of mosquito foraging behaviour for malaria control. Transactions of the Royal Society of Tropical Medicine and Hygiene. 2009, 103: 8-
Eisen L, Eisen RJ: Need for improved methods to collect and present spatial epidemiologic data for vectorborne diseases. Emerging Infectious Diseases. 2007, 13: 1816-1820.
Waller LA, Gotway CA: Applied Spatial Statistics for Public Health Data. 2004, Hoboken, NJ: Wiley Blackwell
Lawson AB: Statistical Methods in Spatial Epidemiology. 2006, Chichester, UK: Wiley, 2
Michael E, Bundy DAP: Global mapping of lymphatic filariasis. Parasitology Today. 1997, 13: 472-476. 10.1016/S0169-4758(97)01151-4.
Sabesan S, Palaniyandi M, Das PK, Michael E: Mapping of lymphatic filariasis in India. Annals of Tropical Medicine and Parasitology. 2000, 94: 591-606.
Lindsay SW, Thomas CJ: Mapping and estimating the population at risk from lymphatic filariasis in Africa. Transactions of the Royal Society of Tropical Medicine and Hygiene. 2000, 94: 37-45. 10.1016/S0035-9203(00)90431-0.
Gyapong JO, Remme JHF: The use of grid sampling methodology for rapid assessment of the distribution of bancroftian filariasis. Transactions of the Royal Society of Tropical Medicine and Hygiene. 2001, 95: 681-686. 10.1016/S0035-9203(01)90115-4.
Gyapong JO, Kyelem D, Kleinschmidt I, Agbo K, Ahouandogbo F, Gaba J, Owusu-Banahene G, Sanou S, Sodahlon YK, Biswas G: The use of spatial analysis in mapping the distribution of bancroftian filariasis in four West African countries. Annals of Tropical Medicine and Parasitology. 2002, 96: 695-705. 10.1179/000349802125001735.
Washington CH, Radday J, Streit TG, Boyd HA, Beach MJ, Addiss DG, Lovince R, Lovegrove MC, Lafontant JG, Lammie PJ, Hightower AW: Spatial clustering of filarial transmission before and after a Mass Drug Administration in a setting of low infection prevalence. Filaria J. 2004, 3: 3-10.1186/1475-2883-3-3.
Henrys PA, Brown PE: Inference for Clustered Inhomogeneous Spatial Point Processes. Biometrics. 2009, 65: 423-430. 10.1111/j.1541-0420.2008.01070.x.
Brooker S, Clarke S, Njagi JK, Polack S, Mugo B, Estambale B, Muchiri E, Magnussen P, Cox J: Spatial clustering of malaria and associated risk factors during an epidemic in a highland area of western Kenya. Tropical Medicine & International Health. 2004, 9: 757-766. 10.1111/j.1365-3156.2004.01272.x.
Ostfeld RS, Glass GE, Keesing F: Spatial epidemiology: an emerging (or re-emerging) discipline. Trends in Ecology & Evolution. 2005, 20: 328-336. 10.1016/j.tree.2005.03.009.
Marra PP, Griffing S, Caffrey C, Kilpatrick AM, McLean R, Brand C, Saito E, Dupuis AP, Kramer L, Novak R: West Nile virus and wildlife. Bioscience. 2004, 54: 393-402. 10.1641/0006-3568(2004)054[0393:WNVAW]2.0.CO;2.
Eisen RJ, Eisen L: Spatial Modeling of human risk of exposure to vector-borne pathogens based on epidemiological versus arthropod vector data. Journal of Medical Entomology. 2008, 45: 181-192. 10.1603/0022-2585(2008)45[181:SMOHRO]2.0.CO;2.
Rossmo DK: Geographic profiling. 2000, Boca Raton, Fla.: CRC Press
Le Comber SC, Nicholls B, Rossmo DK, Racey PA: Geographic profiling and animal foraging. Journal of Theoretical Biology. 2006, 240: 233-240. 10.1016/j.jtbi.2005.09.012.
Raine NE, Rossmo DK, Le Comber SC: Geographic profiling applied to testing models of bumble-bee foraging. J R Soc Interface. 2009, 6: 307-319. 10.1098/rsif.2008.0242.
Martin RA, Rossmo DK, Hammerschlag N: Hunting patterns and geographic profiling of white shark predation. Journal of Zoology. 2009, 279: 111-118. 10.1111/j.1469-7998.2009.00586.x.
Buscema M, Grossi E, Breda M, Jefferson T: Outbreaks source: A new mathematical approach to identify their possible location. Physica a-Statistical Mechanics and Its Applications. 2009, 388: 4736-4762. 10.1016/j.physa.2009.07.034.
Sapp AD, Huff TG, Gary GP, Icove DJ, Horbert O: A motive-based offender analysis of serial arsonists. 1994, Quantico, Virginia: NCAVC
Santtila P, Zappala A, Laukannen M, Picozzi M: Testing the utility of a geographical profiling approach in three rape series of a single offender. Forensic Science International. 2003, 131: 11-
Canter DV, Hammond L: Prioritizing burglars: comparing the effectiveness of geographical profiling methods. Police Practice and Research. 2007, 8: 14-
Snow J, Richardson BW, Frost WH: Snow on cholera : being a reprint of two papers. 1936, [S.l.]: Commonwealth
El Said S, Beier JC, Kenawy MA, Morsy ZS, Merdan AI: Anopheles sergentii is well established as the most dangerous malaria vector in Egypt. Journal of the American Mosquito Control Association. 1986, 2: 6-
Rossmo DK, Velarde L: Geographic profiling analysis: principles, methods and applications. Crime Mapping Case Studies: Practice and Research. Edited by: Chainey S, Tompson L. 2008, Chichester, UK: John Wiley & Sons, 35-42.
Townsley M: Spatial Autocorrelation and Impacts on Criminology. Geographical Analysis. 2009, 41: 452-461. 10.1111/j.1538-4632.2009.00775.x.
Brown RO, Rossmo DK, Sisak T, Trahern R, Jaret J, Hanson J: Geographic profiling military capabilities. 2005, Topographic Engineering Centre, Department of the Army, Fort Belvoir, VA
Kucera H: Hunting insurgents: geographic profiling adds a new weapon. GeoWorld. 2005, 37: 3-
Rossmo DK: Multivariate spatial profiles as a tool in crime investigation. Workshop in crime analysis through computer mapping; Chicago. Edited by: Block CR, Dabdoub M. 1993, Illinois Criminal Justice Information Authority, 89-126.
Levine N: CrimeStat III: A spatial statistics program for the analysis of crime incident locations. 2004, Washington DC: National Institute of Justice, 3.0
Canter DV, Coffey T, Huntley MA, Missen C: Predicting serial killers' home base using a decision support system. Journal of Quantitative Criminology. 2000, 16: 22-
Britton T, Lindenstrand D: Epidemic modelling: Aspects where stochasticity matters. Mathematical Biosciences. 2009, 222: 109-116. 10.1016/j.mbs.2009.10.001.
Riley S: Large-scale spatial-transmission models of infectious disease. Science. 2007, 316: 1298-1301. 10.1126/science.1134695.
Cohen J, Gorr WL, Olligschlaeger AM: Leading indicators and spatial interactions: A crime-forecasting model for proactive police deployment. Geographical Analysis. 2007, 39: 105-127. 10.1111/j.1538-4632.2006.00697.x.
Eisen L, Lozano-Fuentes S: Use of Mapping and Spatial and Space-Time Modeling Approaches in Operational Control of Aedes aegypti and Dengue. Plos Neglected Tropical Diseases. 2009, 3: e411-10.1371/journal.pntd.0000411.
We thank Richard Nichols and Mark Stevenson for comments on the manuscript.
DKR has a commercial relationship with ECRI, Inc, the manufacturers of Rigel. SLC, DOF, JCB and ANH declare that they have no competing interests.
SLC, DOF, DKR and JCB conceived the study and wrote the paper. DKR constructed the geoprofiles. ANH provided data for the Cairo study. JCB was partially supported by the Abess Center for Ecosystem Science and Policy (CESP), University of Miami. ANH received funds from WHO/EMRO/TDR (project number SGS 110). The study was partially supported by NIH grant 5R01GM93345-2. All authors read and approved the final manuscript.
About this article
Cite this article
Le Comber, S.C., Rossmo, D., Hassan, A.N. et al. Geographic profiling as a novel spatial tool for targeting infectious disease control. Int J Health Geogr 10, 35 (2011). https://0-doi-org.brum.beds.ac.uk/10.1186/1476-072X-10-35
- West Nile Virus
- Distance Decay
- Integrate Control Strategy
- Geographic Profile | <urn:uuid:c5e394f6-59ee-435e-8bf2-de7992af9d0a> | CC-MAIN-2022-05 | https://0-ij--healthgeographics-biomedcentral-com.brum.beds.ac.uk/articles/10.1186/1476-072X-10-35 | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304600.9/warc/CC-MAIN-20220124185733-20220124215733-00430.warc.gz | en | 0.89711 | 8,151 | 2.984375 | 3 |
China Information >> National
The People,s Republic of China is a unified, multi-national country, comprising 56 nationalities. The Han people make up 91.02 percent of the total population, leaving 8.98 percent for the other 55 ethnic minorities. They are Mongolian, Hui, Tibetan, Uygur, Miao, Yi, Zhuang, Bouyei, Korean, Manchu, Dong, Yao, Bai, Tujia, Hani, Kazak, Dai, Li, Lisu, Va, She, Gaoshan, Lahu, Shui, Dongxiang, Naxi, Jingpo, Kirgiz, Tu, Daur, Mulam, Qiang, Blang, Salar, Maonan, Gelo, Xibe, Achang, Pumi, Tajik, Nu, Ozbek, Russian, Ewenki, Benglong, Bonan, Yugur, Jing, Tatar, Drung, Oroqen, Hezhen, Moinba, Lhoba and Gelo. All nationalities in China are equal according to the law. The State protects their lawful rights and interests and promotes equality, unity and mutual help among them.
"And past photograph are compared, job of Chinese nation Chinese strode new #step # , show the extraordinary success that Chinese nation job gains from a flank. Interpret of director of bureau of interpreter of Chinese of " China nation, China assist elder sister of Wu Shui of chairman of committee of ethical Chinese interpreter was in the 18th world a few days ago express on interpreter congress.
She says, china used the right of this ethical language character to take a series of policy step to ensure minority, include to end to banner of league of province area, state, county 4 class build organization of orgnaization of ethical Chinese job and cooperation to undertake ethical Chinese manages guidance from which among them, improve original character imperfectly the character of a few nations, nation that does not have a character to have a language so contrives character, compose builds what acquire an university as a child each domains use relatively whole education system and social culture extensively ethical Chinese.
China still has population of about 30 million minority to use the language written language of this nation at present. In Tibet, tibetan language is the important communication tool of person of more than 90% Tibetian and information carrier.
Multiracial, multiligualism, much article plants "to coexist for a long time is fundamental national condition of China. This one fundamental national condition decided ethical language character decided ethical Chinese works is a when our country people works main component from beginning to end, and job of ethical Chinese interpreter is successive as effective as what promote ethical culture carrier. Sister of " Wu Shui says.
In Tibet, nearly 1000 people are engaged in Chinese Tibet interpreter technically, year translation volume amounts to 5000 much words, content involves all trades and professions. Teaching a domain, at present Tibet already was finished acquire tall the Communist Party of China as a child reference book of 122 kinds of 181 kinds of textbook, education mixes 16 course of outline of 16 kinds of education compile the job, special organization translated patriotism of 55 kinds of pupil to teach books, issue 550 thousand.
In literary domain, except " Shui Hu is passed " " on the west travel notes " " Tang poetry 300 " outside waiting for Chinese famous book, " 1001 night " " Tiger Er peotry anthology " work of substandard country fine literature also is become to hide by interpret civil. Current, newspapers and periodicals amounts to the Tibetan article that Tibet publishs formally 28 kinds, among them newspaper 11 kinds, periodical 17 kinds. Meanwhile, the Internet that serves as burgeoning media also develops in Tibet rapid. At present Tibet shares website of article of more than 10 kinds of Tibet. | <urn:uuid:2c118267-727a-49f2-bcf9-20475ea10b21> | CC-MAIN-2020-24 | http://en.chinatefl.com/chinainfo/detail/National | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410352.47/warc/CC-MAIN-20200530200643-20200530230643-00332.warc.gz | en | 0.91709 | 786 | 2.6875 | 3 |
Soil Fungi Plants' Natural Friend
To determine the effects
of compost on mycorrhizae in
greenhouse production of
nursery crops, plant
pathologist Robert Linderman
and technician Anne Davis
grow plants (marigolds shown
here) in a potting mix with
various levels of compost.
Some plants are inoculated
with mycorrhizal fungi and
others are not. Compost was
added to the larger plant
that Linderman is holding
(left) while none was added
to the smaller plant.
Mycorrhizal fungi—naturally occurring, beneficial soil organisms—have been helping farmers for thousands of years by improving water and nutrient use efficiency and suppressing diseases in the plants they colonize. Applying certain chemicals to the soil during the last half century-while increasing crop yields and fighting diseases-has likely inhibited these important fungi.
Agricultural Research Service plant pathologist Robert G. Linderman is one of only a few scientists studying how mycorrhizae affect the nutrition and health of nursery crops. Other ARS scientists look at the fungi in food crops.
At the Horticultural Crops Research Laboratory in Corvallis, Oregon, Linderman is investigating various factors that affect mycorrhizal relationships. He measures the level of mycorrhizal colonization of roots and compares it to control groups to see how effective various treatments are.
Linderman first looked at dozens of fertilizers on various nursery crops—particularly marigolds, because they are very responsive to mycorrhizae—to see whether they help or inhibit fungal growth. He found that organic fertilizers are generally compatible with mycorrhizae, whereas phosphorus-rich inorganic fertilizers inhibit the fungi.
"It's good that organic fertilizers don't inhibit mycorrhizae, but the plants do not grow as large or as fast as the ones treated with inorganic fertilizers," Linderman explains. Manufacturers of organic fertilizers are now advising users to apply more than they were previously. This allows plants to grow normally without interfering with mycorrhizae.
Linderman is looking at other things growers add to their potting mixes. Peat moss has traditionally been a popular component in potting mixes. Linderman observed that some peat types suppress mycorrhizal associations, while others do not.
Instead of peat, some growers are starting to use coir (fibers from coconut) as a potting mix component. Coir has a more uniform texture than peat, and it has a better water-absorbing and nutrient-holding capacity. Linderman's studies show that coir—like organic fertilizers—does not inhibit mycorrhizae, although it may reduce growth of some plants.
Linderman is researching composts that might be added to potting mixes. Composts differ in the types of materials they contain. Nurseries in different parts of the country also use different amounts of compost in their media. Even the way compost is made and stored makes a big difference. "Overall, presumably because of the high levels of phosphorus, fresh composts appear to suppress mycorrhizae," Linderman says. But some very mature composts are not inhibitory.
Linderman admits he has not settled on the one perfect ingredient to add to potting mixes that will establish mycorrhizae in nursery crops and produce healthy plants. "Growers just need to think ahead of time what will happen when a particular product is used, since they wouldn't want to add an ingredient that would suppress the beneficial fungi."—By David Elstein, Agricultural Research Service Information Staff.
This research is part of Methyl Bromide Alternatives (#308) and Plant Diseases (#303), two ARS National Programs described on the World Wide Web at www.nps.ars.usda.gov.
"Soil Fungi Plants' Natural Friend" was published in the May 2004 issue of Agricultural Research magazine. | <urn:uuid:de2e2b6e-9ac5-4ea7-b47a-c82c9457c986> | CC-MAIN-2017-30 | https://agresearchmag.ars.usda.gov/2004/may/fungi | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424931.1/warc/CC-MAIN-20170724222306-20170725002306-00358.warc.gz | en | 0.933781 | 833 | 3.5625 | 4 |
When Jeremy Corbyn, was running his successful campaign for the leadership of Britain’s Labour Party, he floated the idea of “People’s QE”. “QE” stands for Quantitative Easing, the means by which central banks try to loosen monetary policy in an economy without reducing interest rates – handy when interest rates are near zero. It attracted quite a bit of attention from economists, much of it quite approving. That is because the idea touches on one of the most important aspects of modern economic policy: the suggestion that governments can sustain quite big deficits simply by “printing” money. In the end we find, not for the first time, that the current Conservative government acts much further to the political left than it talks, as did its Conservative-Liberal Democrat predecessor.
Back in the 1980s, when monetary policy first became the height of fashion, we had uncomplicated views about what it was about. Although most money was in bank accounts, economists painted a picture as though it was all in notes and coins, and the various actors behaved as if they were kids spending pocket money (and even then was probably too simplistic…). They talked of a “money supply”, which could be manipulated, and the size of which affected spending behaviour. We are older and wiser now, though many economists and journalists still talk about “printing money”, even though physical money has almost no role to play, and bank accounts are different in very important ways. Even trained economists who should know better sometimes trip themselves up in this way. For example there is much excited talk about how commercial banks create money rather than the central bank – which turns out to be a red herring on reflection [That link from Paul Krugman includes a broken link to a masterful essay from James Tobin in 1963, read it here]. It is better to look on monetary policy as a series of policy instruments under the control of the central bank, which have not entirely knowable effects on the economy at large.
The most important of these instruments is the short-term interest rate the central bank charges to commercial banks in their interactions with it. These ripple right through the economy. But when they are very low, as they are now in the UK, it is very hard to lower them further. Some European banks are using negative interest rates without the sky having fallen in, but these negative rates aren’t very high – fractions of a percentage point. So how to “loosen” policy – that is encourage a greater level of economic activity? Here the invention of QE comes in, pioneered, as so much of modern policy, by Japan in the 1990s and early 2000s. This is often talked of as if it means printing physical money and handing it out to the kids to spend on sweeties. What it actually means is that the central bank goes into the market and buys bonds, usually government bonds, like British gilts.
How does that help? Well the people who held the bonds now hold cash instead, which they should spend on something else – which might include new capital investment, after it has changed hands a few times. And it might reduce bond yields, which will reduce long term interest rates right across the economy, and increase asset prices. This creates a “wealth effect” that might encourage the mass affluent to spend a bit more money on stuff that people make. Or all that could happen is that there is a merry-go-round of money chasing various flavours of pre-existing asset to create an asset price bubble. It’s not very clear what has happened to the Bank of England’s QE over the years. The bank produces various statistical associations as evidence that it has helped stimulate the wider economy. Others are sceptical.
Which is where People’s QE comes in. What if, instead of buying government bonds in the market, the money went into extra government spending, such as infrastructure investment, or even current spending. Because the Bank controls the currency in the UK, it can fund the government’s deficit without the need to borrow money from investors. It borrows money from itself. This amounts to supporting looser fiscal policy (i.e. government tax and spend), which should provide a more predictable stimulus to the wider economy.
Mr Corbyn’s advisers developed the idea with the suggestion of administrative structures to channel the extra money into infrastructural investment. This puzzled some economists. There is no need for such engineering. All the government has to do is spend the money, increasing its deficit, issue bonds as normal, which the Bank of England then buys in the existing QE programme. If the Bank is buying bonds, the government is less beholden to the bond markets. In Japan, which has been practising QE on a massive scale, the government now issues little net debt to the bond markets, making large deficits sustainable.
But how does this work? Surely it is something for nothing? The answer to that is that it only works if there is slack in the economy, and the government steps in to create demand because businesses are investing less than the public is saving, creating an imbalance. If this is not the case, you can get inflation, which is what happened to Germany and Austria in the 1920s, Zimbabwe more recently, and is happening in Argentina now. Alternatively you get a asset price bubble. Which in the modern, globalised financial and trading system is in fact more likely for developed economies – though this seems to be a blind spot for many economists, who think that asset markets are too efficient for that.
But in the developed economies, including the US, the Eurozone and Japan, as well as the UK, there does seem to be scope to do this kind of stimulus. There is a lack of business investment, while, it appears, too much money ends up in the hands of rich people, who don’t spend it. Nobody knows how long-term this problem is, but it does look as if large government deficits are much easier to sustain than before. If the bond markets refuse to fund all of the deficit, then central banks can simply “print the money” as the popularisers would put it. Prominent British economist (Lord) Adair Turner (whom I am something of a fan of) suggested that this could be a long term policy in a recent book.
In Britain there is an accounting wrinkle which is having an important impact. The Bank buys government bonds, but it holds them rather than cancelling them, so that it can sell them should it want to tighten policy. So the government still pays interest on the gilts the Bank holds, and this used to count towards the publicly declared deficit. But the Coalition government changed the rules, so that it does not count the interest on the Bank’s holdings against the deficit. That reduces the fiscal deficit and allows the government to spend money on other things instead. Also the effects of QE on longer term gilt yields reduces the deficit projected by the Office for Budget Responsibility (OBR), which plays such a pivotal role in longer term government spending plans. According to the FT’s Chris Giles £22.4bn of the £27bn that the Chancellor, George Osborne, “found” to allow him to loosen austerity measures in the Autumn Statement resulted from these accounting tricks. This boils down to People’s QE, and Mr Osborne used it to fund his U-turn on tax credit cuts, amongst other things.
The problem, as Mr Giles points out, is what happens when the Bank feels the need to tighten policy in, say, a year or two’s time? Then the whole thing goes into reverse. Politicians have seen gain in blurring the distinction between fiscal and monetary policy. That could return to haunt them, at both ends of the political spectrum. | <urn:uuid:7a36edd2-11b7-40c3-9039-5d4c433c5421> | CC-MAIN-2018-13 | http://thinkingliberal.co.uk/osborne-uses-an-accounting-trick-to-implement-peoples-qe/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647545.84/warc/CC-MAIN-20180320224824-20180321004824-00555.warc.gz | en | 0.970454 | 1,620 | 2.796875 | 3 |
2.2 Choosing a CC License
Creators or copyright holders who wish to apply a Creative Commons license to their work can choose to allow their work to be copied and reused with any one or more restrictions, or certain combinations of restrictions. The four restrictions are:
Attribution: You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
Non Commercial: The material cannot be used for commercial purposes.
Share Alike: If you remix, transform or build upon the material, you must distribute your contributions under the same license as the original.
No Derivatives: If you remix, transform or build upon the material, you may not distribute the modified material.
Attributing Creative Commons Licenses
All Creative Commons licenses require that users of the work attribute the creator. When providing attribution to a CC-licensed work, you should include:
- The author's name, screen name, or user ID, etc. If the work is being published on the Internet, it is best practice to link that name to the person's profile page, if such a page exists.
- The work's title or name (if applicable), if such a thing exists. If the work is being published on the Internet, it is best practice to link the name or title directly to the original work.
- The specific type of license the work is available under. Linking to the license will allow others to find the license terms
- The URL where the work is hosted
- Mention if the work is a derivative work or adaptation, in addition to the above, one needs to identify that their work is a derivative work i.e., “This is a Finnish translation of [original work] by [author].” or “Screenplay based on [original work] by [author].”
For a more detailed look at how to attribute CC resources, review Creative Commons' Best Practices for Attributing Content. It has examples of how to correctly attribute different types of CC licensed content.
The Different Creative Commons Licenses
Creative Commons offers six different licenses that allow copyright holders to apply different restrictions to how their work may be reused. When using a specific CC-licensed work, it is important to pay attention to the CC license and its restrictions. All Creative Commons licenses require attribution. The different licenses are listed on the Creative Commons website.
Creative Commons offers a tool to help you choose a license. Aptly named "Choose a License". This tool tool helps with both licensing and proper attribution. We have included a link to a tutorial video that helps guide you through the steps of using the tool.
License Chooser Demo- Video starts at 57 seconds. (Video length 4:55)
The Creating OER and Combining Licenses video is intended to help you choose compatible open educational resources (OER) and then a valid license for your work. (Video length 9:15) | <urn:uuid:7aa295c8-923c-4d49-acb6-eea8dd584f2d> | CC-MAIN-2018-26 | https://courses.p2pu.org/en/courses/2675/content/5824/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863119.34/warc/CC-MAIN-20180619193031-20180619213031-00312.warc.gz | en | 0.86228 | 631 | 2.515625 | 3 |
Prostate cancer is the presence of cancer cells in the prostate gland. Most often, this disease develops slowly and remains localized to the prostate. But, in some cases, it can progress to neighboring organs and lead to the formation of metastases, especially in the bladder, rectum or bones.
The prostate is a gland in the male reproductive system. It is located just below the bladder and, like a ring, it surrounds the urethra, the channel through which urine and semen exit the body. The role of the prostate is to produce prostatic fluid, one of the components of semen along with seminal fluid and sperm, to temporarily store semen before ejaculation, and then to contract during ejaculation, thus participating in the process of ejaculation/expulsion of semen.
Prostate cancer is the most common type of cancer in men: an estimated 1 in 9 men will be diagnosed with it, most often in their 60s. Although no specific cause has been discovered, there is a genetic predisposition.
Most prostate cancers grow very slowly. In fact, the vast majority of men who are found to have this cancer will die of some other cause. Often the tumor remains localized in the prostate and has limited health effects, sometimes causing urinary or erectile dysfunction. However, some cancers can grow and spread more quickly.
In the United States, prostate cancer is the most frequent male cancer (about 174,650 new cases in 2019). Prostate cancer is the second leading cause of male cancer death in North America, after lung cancer. The median age of diagnosis is 66, and 60% of prostate cancers are diagnosed after the age of 65, according to the American Cancer Society. About 1 in 41 prostate cancer cases result in the death of the patient. Most people do not die of the disease: the 5-year relative survival has improved dramatically, from 70% for cases diagnosed in 1990 to 90% in 2020.
Types of prostate cancer
According to the World Health Organization (WHO) classification, benign tumors and cancer precursors are to be distinguished from the malignant tumors of the prostate. The first two groups include:
- AAH (atypical adenomatous hyperplasia): Suspicious tissue
- ASAP (atypical small acinar proliferation): cancerous tissue
- LG-PIN (low grade PIN = low grade prostatic intraepithelial neoplasia): Harmless change
- HG-PIN (high grade PIN = high-grade prostatic intraepithelial neoplasia): Possible cancer precursor
The malignant tumors are further classified according to their origin in:
- Epithelial tumors (most common): They start from epithelial cells (surface cells, including glandular cells) and are therefore referred to as prostate cancer
- Sarcomas (very rare): they arise from cells of the intermediate tissue of the prostate (e.g. muscle cells, connective tissue).
- Secondary tumors (very rare): They grow from the neighborhood into the prostate or are metastases (daughter tumors) of malignant tumors elsewhere in the body.
95% of all prostate cancers are mainly caused by glandular cells and are therefore called adenocarcinomas. The rare remaining prostate cancers can also be derived from other epithelial cells.
Diagnosis and screening
Measurement of the prostate antigen level
Prostate cancer can be detected by seeing an increase in a protein in the blood: prostate specific antigen or PSA. PSA is a substance produced by the prostate. However, a high result on this test does not necessarily mean that there is cancer. Indeed, an amount of more than 4 nanograms/ml of this protein in the blood is associated with prostate cancer in about 25% of cases, and with another prostate disorder in 75% of cases. In the event that it is not cancer, an elevated PSA may correspond to benign prostatic hypertrophy, inflammation or infection of the prostate.
On the other hand, the PSA test does not detect all cases of cancer. In a study evaluating the effectiveness of the PSA test, 15% of men who tested negative (from a cohort of 2,950 men aged 62 to 91) had prostate cancer. The PSA test is also used to monitor the progress of prostate cancer.
The biopsy is not without side effects. The most common are blood in the urine, stool or semen for a very short time. Fever, and infection of the prostate can also occur.
If the prostate is abnormal on digital rectal examination and its palpation suggests cancer, the biopsy is performed, even if the PSA are normal.
If the prostate is normal on palpation and the PSA is greater than 4 ng/ml, the biopsy will be performed if the PSA increases over time.
The purpose of a rectal touch is the palpation of the prostate gland. To do this, the doctor inserts a finger (gloved) into the rectum of the patient and can thus estimate the size and consistency of the prostate. This gesture allows only a partial appreciation. But it can sometimes detect cancers in people who have a normal level of prostate specific antigen.
For this examination, an ultrasound probe is inserted into the rectum. It provides images of the prostate and its surroundings. It is painless and is used to diagnose prostate disease in tandem with prostate biopsy.
Biopsy during transrectal ultrasound
During an ultrasound, the doctor may guide a needle to take prostate biopsies, that is, to remove some prostate tissue for examination under a microscope. This allows the Gleason score to be calculated. Only a biopsy can diagnose prostate cancer with certainty. The biopsy is usually done using a needle inserted into the prostate. 10 to 12 tissue samples are taken in the same session, in different areas of the prostate
This technique is used for diagnostic purposes, not screening. This means that it is performed when a man has high PSA or when a digital rectal examination finds an abnormal prostate.
Symptoms of prostate cancer
At first, prostate cancer does not cause any symptoms. Furthermore, the symptoms mentioned below may be related to another prostate disease, such as benign prostatic hypertrophy.
- Difficulty urinating: difficulty starting to urinate or holding urine, inability to urinate, need to urinate frequently (especially at night), poor urine output, a burning sensation or pain when passing urine.
- Blood in urine or semen.
- Frequent pain or stiffness in the lower back, hips or upper thighs.
- Changes in urinary function: frequent urge, urge to urinate, urge to push, urine retention, burning while urinating.
- Genital changes: painful ejaculations, or difficulty getting an erection.
Note that some “at risk” men will never get prostate cancer. Several risk factors are being investigated.
- Age. In North America, prostate cancer mainly affects men over the age of 60. The average age at diagnosis is 65 years, and 80 years at the time of death. Only 0.5% of prostate cancers appear before age 50, and 22% between 55 and 64.
- Family history. The risks are higher when the father or a brother has already suffered from this disease, which suggests a genetic predisposition. This hypothesis is reinforced by the discovery that carriers of the BRCA1 and BRCA2 genes have an increased risk of prostate cancer.
- Ethnicity. Men of African descent are more at risk than Caucasians, who are more at risk than Asians. It is estimated that Indians and Chinese are approximately 50 times less affected by prostate cancer than Westerners. However, when they migrate to countries where the disease is more common, their risk also increases. This suggests that factors not only related to genes but also to diet are having an influence.
- Obesity: A seriously overweight man has a higher risk of getting advanced prostate cancer.
- Inflammation or infection of the prostate increases the risk of prostate cancer when it lasts for a long time.
- Tall men have a higher risk of prostate cancer.
- Men who have been exposed to pesticides have a slightly higher risk of prostate cancer, especially if they have a history of prostate cancer in their family.
- Men who have been exposed to cadmium or rubber derivatives in the workplace
Food rich in fat (processed meats and red meats)
It has been known for several years that a diet containing a large amount of foods high in fat (lipids) is associated with an increased risk of prostate cancer. However, the type of fat that we should monitor for is less clear.
The animal fats contained in red meat were first pointed out in epidemiological studies. However, the most recent study (2009) found that heavy eaters of processed meats (cold meats, bacon, sausages) are at the highest risk for prostate cancer. Large consumers of red meats would also be, but to a lesser extent. More studies are underway.
There is no certainty about the influence of smoking on the incidence of prostate cancer. However, a recent study shows that smokers with prostate cancer have a higher death rate.
Prevention of prostate cancer
Reduce your fat intake
Eating too much of foods high in fat, such as meats or dairy products, has been shown to increase the risk of prostate cancer. Cold (bacon, ham, sausages) and red meats are particularly pointed out. Limit your intake of such foods or opt for those that are reduced in fat.
Eat a lot fruits and vegetables
Eating lots of fruits, vegetables, legumes, nuts, foods high in whole grains, and fish can be beneficial strategies for preventing many diseases. In addition, a healthy and balanced diet will allow you to maintain a healthy weight. Overweight and obesity are also believed to be risk factors for prostate cancer.
Eat more tomatoes
Some scientific studies suggest that increased consumption of foods rich in “lycopene”, an antioxidant nutrient, may help prevent the development of prostate cancer. Tomatoes are an example of a food that contains them in abundance.
As you probably know, smoking increases the risk of developing several types of cancer, including prostate cancer. In addition to reducing your risk at this particular cancer, quitting smoking permanently can have many other benefits for your health, well-being, and quality of life.
Visit your doctor regularly
The best way to limit the impact that prostate cancer could have on your life is to find it early. Visit your doctor and discuss your prostate cancer risk and screening measures. Screening for prostate cancer can be done with two additional tests. First, the doctor can do a digital rectal exam. On the other hand, a blood test can detect an elevation of PSAs, that is to say the prostate specific antigen. These two tests are not performed in all men, but are recommended in some, namely men aged 50 or older who have a life expectancy of at least 10 years.
Take vitamin D supplements
Based on the results of various studies, various health agencies are recommending men at risk to take a vitamin D supplement of 25 µg (1000 IU) per day in the fall and winter. Such vitamin D intake would reduce the risk of prostate cancer and other cancers. These studies suggest that people at higher risk of vitamin D deficiency — this includes the elderly, people with dark skin pigmentation and people who rarely get in the sun — to do the same during the whole year.
Treatment of prostate cancer
Several treatment options are available, depending on the stage and how quickly the prostate cancer is progressing. They should be discussed with your doctor who will inform the patient of the risks and benefits inherent in each treatment.
Watchful waiting (more or less active, depending on the case) may be chosen as a treatment option when the tumor is well circumscribed (cancer cells are confined to the prostate). Medication is not given and surgery is not performed, but the tumor is closely monitored.
In fact, if the tumor grows very slowly, and the affected person is old, the tumor will not have time to grow before other health problems arise. Indeed, as more invasive treatments often cause complications (pain, inability to have an erection, urinary incontinence, infection), it is sometimes preferable to observe without intervening.
This involves removing all the cancer cells by operating on the prostate (total prostatectomy or radical prostatectomy) and certain adjacent tissues (seminal vesicles). This surgery causes fewer and fewer problems, such as urinary incontinence and erectile dysfunction, as surgical techniques have advanced. Erectile dysfunction occurs in about 1 in 5 men in their 50s who have a prostatectomy. Erectile and urinary functions usually return to normal within 2 to 3 years after the operation.
Radiotherapy consists of destroying cancer cells using external electromagnetic radiation (emitted by a radiotherapy machine), trying to spare peripheral healthy tissue. Radiotherapy is an alternative to surgery.
Brachytherapy using rays emitted by radioactive seeds inserted and left in the prostate allows the rays to have a very localized and targeted area of action.
This long-term approach aims to deliver drugs that will work to deprive cancer cells of the male hormones they need to grow. It makes it possible to reduce the size of the tumor and to consider radiotherapy treatment. It is also indicated to slow the progression of prostate cancer.
Chemotherapy is reserved for cancers that no longer respond to hormone therapy. It consists of administering, by injection or in the form of tablets, toxic chemical agents to kill the cancer cells. There are several types of chemotherapy, which have different mechanisms of action and different side effects.
The prostate is a gland the size of a walnut. It is located under the bladder and surrounds the urinary canal; it is essential in humans for the production of sperm, and therefore for reproduction. Prostate cancer is the most common type of cancer in men in the United States.
However, in general, it progresses slowly and can often be cured or treated successfully. The sooner this type of cancer is detected, the better the response to treatment and the better the chances of recovery. | <urn:uuid:802b2c77-e8b7-4811-a799-e2e558c7b200> | CC-MAIN-2021-25 | https://scientificorigin.com/prostate-cancer-causes-symptoms-treatment | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488269939.53/warc/CC-MAIN-20210621085922-20210621115922-00279.warc.gz | en | 0.950633 | 2,903 | 3.453125 | 3 |
Risky play is often a central component of nature-based programs…
But what does it mean and how do you do it? Common risks may include using tools, balancing on logs, building campfires and climbing trees. These encounters offer many beneficial opportunities for students to assess risk, build confidence, and develop socially and physically.
Learn about appropriate risk, how to do a risk-benefit analysis and various facilitation tips. Leave this webinar with an understanding of risky play terms and strategies for incorporating risky play into your setting.
Registration: Required to receive Zoom link (see below) | <urn:uuid:853c1179-5133-43de-8a66-1404ddcaf1f8> | CC-MAIN-2021-43 | https://www.goshen.edu/merrylea/risky-play-webinar/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.91/warc/CC-MAIN-20211020055136-20211020085136-00205.warc.gz | en | 0.926276 | 119 | 3.515625 | 4 |
Table of Contents
Creutzfeldt-Jakob Disease (CJD), named after the German doctors Hans Gerhard Creutzfeldt and Alfons Maria Jakob, is considered the main manifestation of transmissible spongiform encephalopathy or prion diseases (Porter & Leemans, 2013). CJD is also known as mad cow disease. Prions, or proteinaceous infectious particles, are the direct agents of the disease. It occurs when prion protein takes a three-dimensional shape. This abnormal protein transforms a healthy protein of human body into the same shape; thus, there is an infection. Scientists have not explored this process in details yet; however, it is known that a misfolded prion protein destroys brain cells. Creutzfeldt-Jakob Disease makes up about 85% of all cases of human prion encephalopathy (Song & Zhang, 2015). CJD is rare as about one in a million is infected annually throughout the world (Song & Zhang, 2015). This paper aims to explore the forms of Creutzfeldt-Jakob Disease, their symptoms, diagnosis, prophylactic measures, and possible treatment.
Forms of CJD and Their Symptoms
There are four forms of CJD: spontaneous or sporadic, genetic, iatrogenic, and variant Creutzfeldt-Jakob Disease. According to modern investigations, in case of spontaneous or sporadic CJD, prions occur in the brain spontaneously without any apparent external cause (Ebringer, 2015). The disease usually affects people over the age of 50. First, it appears in the form of brief memory loss, mood changes, and loss of interest. In the final phase, vision and speech disorders as well as hallucinations occur. Genetic CJD occurs in the families with inherited gene for the prion protein damage. A defective prion protein is much more susceptible to spontaneous transformation into a prion. Iatrogenic CJD is the form of the disease that can happen after casual insertion of prions into a human’s body, for example, during a brain operation. Today, this source of contamination is eliminated. These three forms are characterized by behavioral disorders, disorders of higher cortical functions, cerebellar dysfunction, a combination of pyramidal and extrapyramidal symptoms, and myoclonic seizures. In the terminal phase, the global cognitive impairment, fatal in 8 months from the onset of the disease, occurs (Ebringer, 2015).
Variant CJD first appeared in 1995 in the UK, and since that time, more than 100 people had died; they were infected by meat products containing bovine spongiform encephalopathy prions (Ebringer, 2015). In contrast to the classical form of CJD, this form affects both young and old people. It is characterized by the loss of interest, depression, weight loss, and poor coordination of movements; the patient does not observe the basic rules of hygiene, cannot eat without help. Brain damage increasingly breaks basic life functions, and finally, the patient dies. In contrast to the classical form of the disease, the patient suffering from variant form is long conscious and he or she understands the worsening condition. The main characteristics of variant CJD are mental disorders and sensory impairments, global cognitive impairment and ataxia, possible cortical blindnes, known as Heidenhain syndrome, episyndrome, presented as myoclonic seizures, and cerebellar symptoms.
The Diagnosis of Creutzfeldt-Jakob Disease
The diagnosis of Creutzfeldt-Jakob Disease is the allocation of the classic symptoms of it – progressive dementia, which means the rapidly growing intellectual and behavioral disorders in combination with myoclonia. From paraclinical disease diagnostic methods, the following tests are considered the most informative ones. The first test is electroencephalography. In patients with CJD, characteristic disturbances in the EEG are detected. Sporadic Creutzfeldt-Jakob Disease is characterized by the three-phase detection of EEG activity; early paroxysmal activity is usually diagnosed after 12 weeks from the beginning of sporadic CJD in 80-88% of patients (De Villemeur, 2012).
The second effective method is magnetic resonance imaging. This technique relies on the use of strong magnetic fields to create detailed images of internal organs. MRI is particularly useful in the diagnosis of brain diseases, because it allows getting a good image of white and gray matter of the brain. The characteristic data of MRI of the brain can detect the signs of atrophy of the cerebral cortex and cerebellum.
Looking where to BUY AN ESSAY?
Save your time and money!
Get 15% OFF your first order with code first15
for your first order
According to the third method, the analysis of the cerebrospinal fluid should be taken. It is necessary to make a lumbar puncture to get some milliliters of the material. The presence of a certain protein in the cerebrospinal fluid is a sign of Creutzfeldt-Jakob Disease. Cerebrospinal fluid pressure must be taken into account, as well as blood sugar levels, cell counting, the presence of bacterial and viral cultures, and cryptococcal antigen. A slight increase in protein levels can be observed (De Villemeur, 2012).
The fourth possible method of the diagnosis is the biopsy of tonsils as they are able to accumulate the evidence of prion infection. The study of tissue samples, taken by biopsy, helps to diagnose mad cow disease, but this method is considered less reliable than others. If the diagnosis is unclear, it is possible to conduct a lifetime brain biopsy in the presence of a consent from relatives or guardians in the case of incapacity of the patient. Morphological and histological examination of brain tissue such as cortex and subcortical nuclei are possible at autopsy (De Villemeur, 2012).
Prophylactic Measures and Treatment of Creutzfeldt-Jakob Disease
When it comes to prophylactic measures, the medical employees, who are in contact with body fluids and tissues of patients with suspected Creutzfeldt-Jakob Disease, should wear gloves and avoid contact with infected material with mucous membranes. After the contact of infected material with the skin, first of all, skin disinfection with 4% sodium hydroxide must be conducted for 5-10 minutes; then, skin should be washed under running water. For the decontamination of materials and tools, autoclaving at 132 ° C for 1 hour or sterilization in 4% sodium hydroxide or 10% sodium hypochlorite solution for 1 hour are recommended (De Villemeur, 2012).
In 2003, British doctors conducted an experimental treatmment of 19-year-old Irish boy Jonathan Simms, suffering from Creutzfeldt-Jakob Disease. They used a new experimental medicine— pentosan polysulfate (PPS). This medicine did not cure the disease and did not stop the destructive processes, but the patient’s condition improved significantly after treatment. Thus, pentosan polysulfate, even if unable to cure patients, stops the progression of the disease, thereby increasing the longevity or even improving their condition. After injection, swallowing reflex returned; moreover, the patient lived for almost 8 years after this treatment. Pentosan polysulfate is intended for intraventricular administration, allowing the quick delivery of the desired concentration of the active ingredient directly into the brain tissue. Oral or parenteral administration of the medicine has no appreciable effect. Among the side effects, in some cases, it may cause nausea, vomiting, a slight anemia, and in rare cases, the development of severe thrombocytopenia (Song & Zhang, 2015).
In identifying CJD, all medical treatments, which may adversely affect the mnemonic function and the patient’s behavior, should be canceled. Conventional antiviral agents, such as amantadine, interferons, vaccination, and passive immunization of humans and animals, have proved to be ineffective (Porter & Leemans, 2013). Symptomatic treatment is aimed at a relief of myoclonic seizures and extrapyramidal disorders; therefore, antiepileptic and antiparkinsonian medicines are used with the purpose of preventing and reducing the frequency and intensity of seizures or their equivalents: the loss or impairment of consciousness, behavioral and autonomic dysfunction. They reduce extrapyramidal disorders and tremor. Although an effective treatment for cure mad cow disease is absent, such medicine as Brefeldin A and calcium channel blockers have positive affect on the process. Brefeldin A is given to the patient in order to avert the synthesis of PrPSc in infected cells by destroying the Golgi apparatus. It is a known irreversible inhibitor of translocation of proteins from the endoplasmic reticulum to the Golgi apparatus. It blocks the cytotoxicity of conditioned medium, assuming that cytotoxic proteins are exported via Golgi apparatus (Porter & Leemans, 2013). Calcium channel blockers, particularly NMDA-receptors, are given to promote the long-term survival of the infected neuronal culture (Porter & Leemans, 2013).
Affiliate Program: Earn 10%
from all orders made by people you bring!
Your people also get 17% discount for their first orderJoin now
Creutzfeldt-Jakob Disease belongs to the group of transmissible neurodegenerative prion diseases. It is a progressive dystrophic disease of the cerebral cortex, spinal cord, and basal ganglia. It leads to the problems with thinking, muscle movements, and causes fatal outcome. There are four forms of this rare disease and enough methods of CJD diagnosis, but in any case, the results of a brain biopsy always have the final word. Unfortunately, only symptomatic treatment can be provided. Many potential therapeutic interventions for CJD are currently at the discussion level. The scientists have to admit that etiotropic treatment of Creutzfeldt-Jakob Disease has not been found yet. | <urn:uuid:5b17b404-a5cd-4213-8b53-e9e5c9872a47> | CC-MAIN-2021-17 | https://best-essays-writers.org/essays/medicine/creutzfeldt-jakob-disease.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039536858.83/warc/CC-MAIN-20210421100029-20210421130029-00299.warc.gz | en | 0.911746 | 2,101 | 3.6875 | 4 |
Rintihan Cewek ABG Kidney beans actually has the ability to cope with various diseases, among them capable of reducing damage to blood vessels, capable of lowering blood cholesterol levels, reduce blood sugar concentration, and reduce the risk of colon cancer and breast cancer. Nutrient content of red beans are very good for the health of the human body. Dry beans are a source of vegetable protein, complex carbohydrates, fiber, vitamin B, folasin, thiamine, calcium, phosphorus, and iron. Folasin are essential nutrients that can reduce the risk of damage to blood vessels. Kidney beans contain fat and sodium is very low, almost free of saturated fat, and free kolersterol. In addition, red beans is also a good source of fiber. In 100 grams of dried red beans, can produce 4 grams of fiber consisting of a water soluble fiber and insoluble fiber water. Water-soluble fiber can significantly lower cholesterol and blood sugar levels. To get the perfect properties of red beans, there are some things that need to be done in the process. After soaking, remove red bean soaking water. Then boil the red beans in a covered pan for 3 minutes, and let stand for 2 hours so the juices settle. Change the soaking water is boiled it with water, and let stand overnight. The next day, red beans ready to be cooked into a delicious meal. This needs to be done to eliminate the ability of red beans to produce gas in the intestines that would make the stomach feel bloated. | <urn:uuid:75a85e66-eacd-4691-aad2-e6db0504d5ac> | CC-MAIN-2015-48 | http://rintihan-seorang-perawan.blogspot.com/2011/02/rintihan-cewek-abg.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398452560.13/warc/CC-MAIN-20151124205412-00050-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.925813 | 309 | 2.8125 | 3 |
The influence of urbanization in the Blue River watershed was reflected by the macroinvertebrate communities. All sites, including the sites not influenced by KCP discharges, had macroinvertebrate communities indicative of at least moderate impacts including the predominance of taxa such as the mayfly Baetis, the caddisfly Cheumatopsyche, and chironomids.
With few exceptions, both sites in the Blue River had similar taxonomic composition, and the relative abundances of several of the numerically dominant taxonomic groups were similar. However, the taxonomic richness and the richness of the ET taxa (i.e., Ephemeroptera and Trichoptera) were about one-third lower at BLK 32.1 than at BLK 33.9.
INK 18.5 which was located just downstream of a POTW, was quite different from the other three Indian Creek sites. In addition to the common taxa found at the other Indian Creek sites, leaches and pond snails also were very abundant at INK 18.5 and there were about 50% fewer ET taxa. This is a classic example of the taxonomic composition of a macroinvertebrate community in a highly enriched stream downstream of a sewage treatment facility.
Even though only qualitative samples were collected at Coffee Creek, the resulting data suggested that the macroinvertebrate community was in as good or better condition than the macroinvertebrate communities at the best Indian Creek and Blue River sites.
The benthic macroinvertebrate communities of Indian Creek and the Blue River were characterized by taxa typical of nutrient enriched conditions, siltation, and a less stable, habitat-deficient, environment typical of channelized streams. The study suggested that effluents from the KCP have no detectable negative effects on these biota, but these evaluation was not conclusive, because it is possible that the impacts associated with urbanization and channelization may be overriding any effects associated with these effluents.
Return to Kansas City, MO
Back to BMAP Home Page Last Modified: April 17, 2001 | <urn:uuid:7efe0ce7-f4fe-4b10-acc5-54a7037e231a> | CC-MAIN-2013-20 | http://www.esd.ornl.gov/BMAP/kcbenthic.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706470784/warc/CC-MAIN-20130516121430-00045-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.970331 | 437 | 2.9375 | 3 |
||This article includes a list of references, but its sources remain unclear because it has insufficient inline citations. (October 2008) (Learn how and when to remove this template message)|
Firefighting foam is a foam used for fire suppression. Its role is to cool the fire and to coat the fuel, preventing its contact with oxygen, resulting in suppression of the combustion. Fire-fighting foam was invented by the Russian engineer and chemist Aleksandr Loran in 1902.
The surfactants used must produce foam in concentration of less than 1%. Other components of fire-retardant foams are organic solvents (e.g., trimethyl-trimethylene glycol and hexylene glycol), foam stabilizers (e.g., lauryl alcohol), and corrosion inhibitors.
- Low-expansion foams such as AFFF, have an expansion rate less than 20 times are low-viscosity, mobile, and can quickly cover large areas.
- Medium-expansion foams have an expansion ratio of 20–100.
- High-expansion foams have an expansion ratio over 200–1000 and are suitable for enclosed spaces such as hangars, where quick filling is needed.
- Alcohol-resistant foams contain a polymer that forms a protective layer between the burning surface and the foam, preventing foam breakdown by alcohols in the burning fuel. Alcohol-resistant foams are used in fighting fires of fuels containing oxygenates, e.g. MTBE, or fires of liquids based on or containing polar solvents.
Class A foams
Class A foams were developed in mid-1980s for fighting wildfires. Class A foams lower the surface tension of the water, which assists in the wetting and saturation of Class A fuels with water. This aids fire suppression and can prevent reignition. Favorable experiences led to its acceptance for fighting other types of class A fires, including structure fires.
Class B foams
Class B foams are designed for class B fires — flammable liquids. The use of class A foam on a class B fire may yield unexpected results, as class A foams are not designed to contain the explosive vapors produced by flammable liquids. Class B foams have two major subtypes.
Synthetic foams are based on synthetic surfactants. They provide better flow and spreading over the surface of hydrocarbon-based liquids, for faster knockdown of flames. They have limited post-fire security and are toxic groundwater contaminants.
- Aqueous film forming foams (AFFF) are water-based and frequently contain hydrocarbon-based surfactant such as Sodium alkyl sulfate, and fluorosurfactant, such as fluorotelomers, perfluorooctanoic acid (PFOA), or perfluorooctanesulfonic acid (PFOS).
- Alcohol-resistant aqueous film-forming foams (AR-AFFF) are foams resistant to the action of alcohols and can form a protective film.
Protein foams contain natural proteins as the foaming agents. Unlike synthetic foams, protein foams are bio-degradable. They flow and spread slower, but provide a foam blanket that is more heat-resistant and more durable.
Protein foams include regular protein foam(P), fluoroprotein foam(FP), film-forming fluoroprotein(FFFP),[full citation needed] alcohol-resistant fluoroprotein foam (AR-FP), and alcohol-resistant film-forming fluoroprotein (AR-FFFP).
Protein foam from non-animal sources is preferred, because of the possible threats of biological contaminants such as prions.
Every type of foam has its application. High-expansion foams are used when an enclosed space, such as a basement or hangar, must be quickly filled. Low-expansion foams are used on burning spills. AFFF is best for spills of jet fuels, FFFP is better for cases where the burning fuel can form deeper pools, and AR-AFFF is suitable for burning alcohols. The most flexibility is achieved by AR-AFFF or AR-FFFP. AR-AFFF must be used in areas where gasolines are blended with oxygenates, since the alcohols prevent the formation of the film between the FFFP foam and the gasoline, breaking down the foam, rendering the FFFP foam virtually useless.
History of fire-fighting foams
||This section contains content that is written like an advertisement. (February 2015) (Learn how and when to remove this template message)|
Water has long been a universal agent for suppressing fires, but is not best in all cases. For example, water is typically ineffective on oil fires, and can be dangerous. Fire-fighting foams were a development for extinguishing oil fires.
In 1902, a method of extinguishing flammable liquid fires by blanketing them with foam was introduced by Russian engineer and chemist Aleksandr Loran. Loran was a teacher in a school in Baku, the center of the Russian oil industry at that time. Impressed by large, difficult-to-extinguish oil fires that he had seen there, Loran tried to find a liquid substance that could deal effectively with them. He invented fire-fighting foam, which was successfully tested in experiments in 1902 and 1903. In 1904 Loran patented his invention, and developed the first foam extinguisher the same year.
The original foam was a mixture of two powders and water produced in a foam generator. It was called chemical foam because of the chemical action to create it. In general, the powders used were sodium bicarbonate and aluminium sulfate, with small amounts of saponin or liquorice added to stabilise the bubbles. Hand-held foam extinguishers used the same two chemicals in solution. To actuate the extinguisher, a seal was broken and the unit inverted, allowing the liquids to mix and react. Chemical foam is a stable solution of small bubbles containing carbon dioxide with lower density than oil or water, and exhibits persistence for covering flat surfaces. Because it is lighter than the burning liquid, it flows freely over the liquid surface and extinguishes the fire by a smothering (removal/prevention of oxygen) action. Chemical foam is considered obsolete today because of the many containers of powder required, even for small fires.
In the 1940s, Percy Lavon Julian developed an improved type of foam called Aerofoam. Using mechanical action, a liquid protein-based concentrate, made from soy protein, was mixed with water in either a proportioner or an aerating nozzle to form air bubbles with the free-flowing action. Its expansion ratio and ease of handling made it popular. Protein foam is easily contaminated by some flammable liquids, so care should be used so that the foam is applied only above the burning liquid. Protein foam has slow knockdown characteristics, but it is economical for post-fire security.
In the early 1950s, high-expansion foam was conceived by Herbert Eisner in England at the Safety in Mines Research Establishment (now the Health & Safety Laboratory) to fight coal mine fires. Will B. Jamison, a Pennsylvania Mining Engineer, read about the proposed foam in 1952, requested more information about the idea. He proceeded to work with the US Bureau of Mines on the idea, testing 400 formulas until a suitable compound was found. In 1964, Walter Kidde & Company (now Kidde) bought the patents for high expansion foam.
In the 1960s, National Foam, Inc. developed fluoroprotein foam. Its active agent is a fluorinated surfactant that provides an oil-rejecting property to prevent contamination. In general, it is better than protein foam because its longer blanket life provides better safety when entry is required for rescue. Fluoroprotein foam has fast knockdown characteristics and it can also be used together with dry chemicals that destroy protein foam.
In the mid-1960s, the US Navy developed aqueous film-forming foam (AFFF). This synthetic foam has a low viscosity and spreads rapidly across the surface of most hydrocarbon fuels. A water film forms beneath the foam, which cools the liquid fuel, stopping the formation of flammable vapors. This provides dramatic fire knockdown, an important factor in crash rescue fire fighting.
In the early 1970s, National Foam, Inc. invented Alcohol-Resistant AFFF technology. AR-AFFF is a synthetic foam developed for both hydrocarbon and polar-solvent materials. Polar solvents are combustible liquids that destroy conventional fire-fighting foam. These solvents extract the water contained in the foam, breaking down the foam blanket. Hence, these fuels require an alcohol- or polar-solvent-resistant foam. Alcohol-resistant foam must be bounced off of a surface and allowed to flow down and over the liquid to form its membrane, compared to standard AFFF that can be sprayed directly onto the fire.
In 1993, Baums Castorine of Rome, New York, developed a wetting agent with superior cooling properties that is effective on Class A, Class B, Class D as well as pressurized and 3-dimensional fires involving both hydro carbon based fuels and polar solvents such as alcohol and ethanol. This wetting agent, UL classified as a firefighting foam, was first marketed under the name of Pyrocool. The patented formula was awarded the 1998 Presidential Green Chemistry Award as a bio-degradable alternative to AFFF and AR-AFFF and other foams and wetting agents. It is now marketed under the name Novacool UEF (Universal Extinguishing Foam). Novacool UEF is applied at 0.4% for Class A fires and 0.5% for Class B and Class D fires. Novacool UEF is bio-degradable.
In 2010, Orchidee International of France developed the first FFHPF, the highest performing fluorine-free foam. The foam has achieved a 97% degradability rating and is currently marketed by Orchidee International under the brand name "BluFoam". The foam is used at 3% both on hydrocarbon and polar solvent fires.
Studies have shown that PFOS is a persistent, bioaccumulative, and toxic pollutant. It was added to Annex B of the Stockholm Convention on Persistent Organic Pollutants in May 2009. Regulations in the United States, Canada, European Union, Australia, and Japan have banned the new production of PFOS-based products, including fire fighting foams. 3M phased out production of PFOS in 2002 over toxicity concerns.
One study, published in 2015, found that firefighters were more likely to have fluorinated surfactants in their blood stream. In 2016, the US Air Force paid $4.3 million for a water treatment system for residents downstream of Peterson Air Force Base.
- Loran and the fire extinguisher at p-lab.org (Russian)
- Phos Chek WD881 Brochure (PDF), Phos-Chek, retrieved 2008-12-05
- "Class A Foam: Q & A". Archived from the original on September 29, 2005.
- Clause 1 BS 5306-6.1
- The history of fire extinguisher (Russian)
- Kearney, Paul (February 1966). "Shut the Windows!". Popular Mechanics. Vol. 125 no. 2. Hearst Magazines. pp. 136–139, 210–212. ISSN 0032-4558.
- OECD (2002). "Hazard Assessment of Perfluorooctane Sulfonate (PFOS) and its Salt". ENV/JM/RD(2002)17/FINAL (page 5).
- Governments unite to step-up reduction on global DDT reliance and add nine new chemicals under international treaty. Geneva: Stockholm Convention Secretariat. 8 May 2008.
- "Fact Sheet on AFFF Fire Fighting Agents" (PDF). Fire Fighting Foam Coalition. Retrieved 9 November 2014.
- Pelley, Janet. "Novel Fluorinated Surfactants Discovered In Firefighters' Blood - Chemical & Engineering News". Retrieved 19 November 2016.
- Rotander, Anna; Kärrman, Anna; Toms, Leisa-Maree L.; Kay, Margaret; Mueller, Jochen F.; Gómez Ramos, María José (2015). "Novel Fluorinated Surfactants Tentatively Identified in Firefighters Using Liquid Chromatography Quadrupole Time-of-Flight Tandem Mass Spectrometry and a Case-Control Approach". Environmental Science & Technology. 49 (4): 2434–2442. doi:10.1021/es503653n. ISSN 0013-936X.
- "Elevated rates of cancer south of Colorado Springs, CDPHE finds; Air Force steps in to help with water". Retrieved 19 November 2016.
- "Tainted Water Near Colorado Bases Hints at Wider Safety Concerns". The New York Times. 26 July 2016. Retrieved 19 November 2016.
Performance Characteristics of Wetting Agents by Shawn Oke, EFO (Executive Fire Officer) on FEMA website
- Associated Fire Protection 16 Sept. 2006
- Clark, William E. Firefighting Principles and Practices. New Jersey: Saddle Brook, 1991.
- Hawthorne, Ed. Petroleum Liquids: Fire and Emergency Control. New Jersey: Englewood Cliffs, 1987
- Riecher, Anton. Innovation: Ideas Advance Fire Fighting. ? Vol. 20 No. 6, Industrial Fire World Magazine. 05 Oct. 2005
- Reney, Varghese Bio-degradable Fire Fighting Foams. Dubai:Journal, 2007. | <urn:uuid:535fd606-3642-4ecc-9fcc-f1f54bb9148d> | CC-MAIN-2017-04 | https://en.wikipedia.org/wiki/Fire_fighting_foam | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285337.76/warc/CC-MAIN-20170116095125-00047-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.907216 | 2,886 | 3.3125 | 3 |
Just like at my house, the queen in a bee colony runs the show! The queen bee is the mother to all of the bees in the colony who sort of live to serve her. They feed her and clean up her waste. They guard her and, based on the pheromones she releases, swarm with her when it is time to move. The temperament of the queen has everything to do with the temperament of the colony as well.
Queen bees only breed immediately after they are hatched. Once a queen leaves her queen cell where she pupated, she takes several mating flights in her first week or so where she hooks up with male drones mid-flight. Based on boy-bee anatomy, at the completion of the act, the boy parts are ripped from their bodies dooming them almost immediately. The queen may execute this breeding process 1-10 times in her first week or so and in that process stores all of the sperm with which she will populate her colony. If Africanized drones are flying near (which is a real possibility with Southern-made queens), the queen will produce bees with Africanized genetics. If crazy males are flying by, the queen will produce crazy bees. It’s a bit of a crap-shoot and the temperament of the colony will change as the queen “works her way through” the sperm she gathered during her breeding period.
Hey, here’s a fun fact…female bees, which make up the majority (~95%) of the hive, are the workers who make the honey, guard the hive, and raise baby bees. Only female bees are made from fertilized eggs. The queen lays a certain number of unfertilized eggs which become male drone bees which only exist to breed with other queens outside the hive. That is, if a nearby colony makes a new queen or if the queen in the current hives dies, drones will mate with the newly made queen (more on that in another post). If you thought life required fertilized eggs, you are wrong! Male bees come from unfertilized eggs!
Anyhow, most good beekeepers will, at some point, requeen their hives to ensure that the colony will have a good supply of female workers, to alter the temperament of the colony or to ensure that the queen is young and vigorous. The typical queen will last 5-7 years maximum and will, over that time, produce a weaker and weaker colony. In the end, she will run out of stored sperm and will make a colony full of drones which do not make honey and will ultimately die.
Last weekend was the weekend for me to requeen my colonies. Imagine if you will, looking through a colony of 60,000 bees, one of which looks a little different, and all of which are unhappy about having their home inspected. It’s like finding a slightly longer needle in a needlestack! Some beekeepers go their entire beekeeping career never seeing their queens. Those beekeepers often have trouble throughout their careers which is a shame. Anyhow, I blur my eyes a little and watch for “queen movement” She just moves differently and I can spot her easily if I look for her special “shimmy”!
Once I find her, I mash her and introduce a new queen contained in a special cage that has sugary candy in the end. The idea is that the bees will eat through the candy because it’s…well..candy. In that time, the old queen’s pheromones dissipate and the new queen’s take over. If that goes well, she is accepted and life goes on. Of course, if it doesn’t go well, they immediately kill her and I am out $25 and a lot of work. In that case, I order a new queen and try again!
As a special treat, here is a recording I made of one of my queen bees piping as she waited to be put into a colony. Piping is a way the queen communicates that she is ready to do battle with other queens and that she rules the roost…many people have never heard this sound so I am pleased to have recorded it. I only ever heard it one other time when there was a virgin queen still in a queen cell, but nearly ready to hatch. She and the old queen were throwing it down! Apparently, queen bees pipe in G#!
I’ll check next weekend to make sure all of the colonies have freed and accepted their new queens…lets’ hope for the best…long live the queen! | <urn:uuid:0ecdb9db-06eb-4919-9a7e-80f830059487> | CC-MAIN-2013-48 | http://www.myhomeamongthehills.com/2013/08/the-queen-is-dead-long-live-the-queen/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164026971/warc/CC-MAIN-20131204133346-00056-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.969741 | 944 | 2.765625 | 3 |
Explore the history and legacy of the indigenous people of the Eastern Shore and their connections to the SU campus. Included are sections on the Wicomico, Pocomoke, Nanticoke, Manokin and Choptank tribes. The exhibit was a collaborative effort between Honors College students and SU staff. Student research, civic engagement projects and materials from the Nabb Research Center’s special collections and University archives are highlighted.
We Have a Story to Tell: Native Peoples of the Chesapeake Region is intended for use with students in grades 9–12. It provides information and primary source materials related to key periods and events in the history of the Algonquian communities of the Chesapeake Bay region. It also guides students through an in-depth examination of contemporary issues that are important to these communities' survival.
This collection consists of research, sources, and other papers related to the history of the Accohannock tribe of Native Americans between 1994 and 2013. Descendants of this tribe in Maryland contested for State of Maryland recognition, which is documented through correspondence. Other tribal activities, including those of the Pocomoke tribe, are documented through events calendars and articles.
The records of the Catching Shadows Exhibition documents a series of oral histories and photographic prints recorded and produced by Marc Dykeman and Anne Neilson, 2007-2012, with a focus on Eastern Shore Native Americans from the Accohannock, Assateague, Nause-Waiwash Band of Indians, and the Pocomoke Indian Nation. The prints and oral histories were utilized to create an exhibition titled, “Catching Shadows: Tintype Portraits and Recorded Voices of 21st Century Native Americans Living on Maryland's Eastern Shore”. In addition to the aforementioned materials, there is a recording of the panel discussion held at and sponsored by the Queen Anne’s County Arts Council as well as a substantial volume of letters of support from Eastern Shore tribes requesting the use of the materials in an exhibit at the Smithsonian Museum of the American Indian.
Treaties—solemn agreements between sovereign nations—lie at the heart of the relationship between Indian Nations and the United States. Native Nations made treaties with one another long before Europeans came to the Western Hemisphere. The United States began making treaties with Native Peoples because they were independent nations. Often broken, sometimes coerced, treaties still define mutual obligations between the United States and Indian Nations. The eight treaties featured in Nation to Nation: Treaties Between the United States and American Indian Nations, on loan from the National Archives and Records Administration, are representative of the approximately 374 that were ratified between the United States and Native Nations.
While treaties between Indigenous peoples and the United States affect virtually every area in the USA, there is as yet no official list of all the treaties. The US National Archives holds 374 of the treaties, where they are known as the Ratified Indian Treaties. Here you can view them for the first time with key historic works that provide context to the agreements made and the histories of our shared lands.
Native Knowledge 360° (NK360°) provides educators and students with new perspectives on Native American history and cultures. Most Americans have only been exposed to part of the story, as told from a single perspective through the lenses of popular media and textbooks. NK360° provides educational materials, virtual student programs, and teacher training that incorporate Native narratives, more comprehensive histories, and accurate information to enlighten and inform teaching and learning about Native America.
Building on the ten themes of the National Council for the Social Studies' national curriculum standards, the NMAI's Essential Understandings reveal key concepts about the rich and diverse cultures, histories, and contemporary lives of Native Peoples. | <urn:uuid:d87ec0a0-a513-4480-af3f-b5b8880c2196> | CC-MAIN-2023-50 | https://libraryguides.salisbury.edu/c.php?g=1154012&p=8422980 | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100909.82/warc/CC-MAIN-20231209103523-20231209133523-00799.warc.gz | en | 0.943022 | 753 | 3.296875 | 3 |
Seleny Surname History
The family history of the Seleny last name is maintained by the AncientFaces community. Join the community by adding to to our knowldge of the Seleny:
- Seleny family history
- Seleny country of origin, nationality, & ethnicity
- Seleny last name meaning & etymology
- Seleny spelling & pronunciation
Latest photos on AncientFaces
No one from the Seleny community has shared photos. Here are new photos on AncientFaces:
Seleny Country of Origin, Nationality, & Ethnicity
No one has submitted information on Seleny country of origin, nationality, or ethnicity. Add to this section
No content has been submitted about the Seleny country of origin. The following is speculative information about Seleny. You can submit your information by clicking Edit.
The nationality of Seleny can be very difficult to determine because regional boundaries change over time, making the original nationality indeterminate. The original ethnicity of Seleny may be difficult to determine based on whether the name came about naturally and independently in multiple locales; for example, in the case of surnames that are based on a craft, which can appear in multiple places independently (such as the family name "Gardener" which was given to people of that profession).
Seleny Meaning & Etymology
No one has submitted information on Seleny meaning and etymology. Add to this section
No content has been submitted about the meaning of Seleny. The following is speculative information about Seleny. You can submit your information by clicking Edit.
The meaning of Seleny come may come from a craft, such as the name "Miller" which referred to the profession of working in a mill. Some of these profession-based last names may be a profession in some other language. Because of this it is important to understand the country of origin of a name, and the languages used by its progenitors. Many names like Seleny are inspired by religious texts like the Bible, the Bhagavadgītā, the Quran, and so forth. Commonly these family names are shortened versions of a religious phrase such as "Favored of God".
Seleny Pronunciation & Spelling Variations
No one has added information on Seleny spellings or pronunciations. Add to this section
No content has been submitted about alternate spellings of Seleny. The following is speculative information about Seleny. You can submit your information by clicking Edit.
Family names like Seleny transform in their pronunciation and spelling as they travel across tribes, family lines, and countries over time. In times when literacy was uncommon, names such as Seleny were transliterated based on their pronunciation when people's names were recorded in court, church, and government records. This could have resulted in misspellings of Seleny. Researching misspellings and spelling variations of the Seleny family name are important to understanding the history of the name.
Last names similar to SelenySelenyi, Selenz, Selenze, Selenzneva, Selenzov, Selenzow, Selenzwyska, Seleo, Seleoane, Seleos, Selep, Selepa, Selepack, Selepak, Selepanto, Selepchak, Selepe, Selepec, Selepecz, Selepei
Seleny Family Tree
Here are a few of the Seleny biographies shared by AncientFaces users. Click here to see more Selenies
- Joseph Seleny 1906 - 1975
- William Seleny 1898 - 1978
- Alice Seleny 1904 - 1981
- Edward Seleny 1901 - 1984
- Wanda L Seleny 1924 - 2002
- Valerie Seleny 1926 - 1997
- Frank L Seleny 1926 - 2004
- Alexander D. Seleny 1973 - ?
- Edward L Seleny 1901 - ? | <urn:uuid:33235fed-faff-474e-bfa5-05fe3ba26dc5> | CC-MAIN-2014-10 | http://www.ancientfaces.com/surname/seleny-family-history/1162173 | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999652921/warc/CC-MAIN-20140305060732-00030-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.897034 | 810 | 2.609375 | 3 |
A Ban on Catching and Killing Rodents by Using Glue and Other Traps
Text suggested by Animal Friends Croatia:
It is forbidden to:
Catch and kill rodents and other animals by using glue and other traps that cause prolonged pain and suffering to the animals. (Art. 4, par. 2, pt. 31)
Explanation: Glue traps are undoubtedly one of the cruelest methods of catching and killing animals. They consist of a piece of cardboard, fibreboard, or plastic smeared with glue, which catches any kind of animal that walks across the surface, attracted by the bait: mice, rats, birds, squirrels, snakes, kittens, and other small animals.
Glue traps tear off pieces of skin, fur, and feathers from the animal’s body while it strives to escape, and many animals will even bite or break their limbs in a desperate attempt to free themselves. The glue also irritates and damages their eyes. Sometimes, animals spend several days in agony before they die of hunger or dehydration. Their muzzles or beaks can get caught up in glue and make them suffocate and die for hours.
By banning glue traps and other types of traps that cause prolonged pain and suffering, one would direct the consumer to purchase non-lethal, humane traps, which are inexpensive and readily available in most shops selling agricultural equipment. These are plastic or metal traps resembling boxes with movable doors, which close when the animal has entered. Once the animal has been caught, it can be freed and removed from the house alive and unharmed.
Glue traps were banned in Ireland in 2000, making it illegal to possess, sell, or offer for sale any unlicensed traps, including glue traps. Uncle Bob's Self Storage, the fifth largest warehouse company in the USA, has banned glue traps in all of its facilities, followed by ING Barings and Charles Schwab Corporation. Glue traps have also been banned by other large companies, such as JPMorgan Chase & Co. and American Eagle Outfitters, as well as the New York police. Large corporations such as Dollar Tree and Rite Aid have stopped selling glue traps and other lethal traps. In the USA, it is forbidden to use glue traps in order to catch wild birds.
In Croatia, however, one can still purchase glue traps, as well as traps killing animals with a blow, in various shopping malls. It is evident that animals are insufficiently protected by the present regulation included in the Animal Protection Act (Art. 4, par. 1), which is why we consider it necessary to ban this cruel practice more specifically. | <urn:uuid:beb7e0c8-6cc9-4679-9800-b049052e7b1c> | CC-MAIN-2018-34 | http://prijatelji-zivotinja.hr/index.en.php?id=1852 | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209021.21/warc/CC-MAIN-20180814101420-20180814121420-00373.warc.gz | en | 0.953288 | 535 | 2.890625 | 3 |
How many of us eliminate chocolate from our diets when we are trying to lead a healthier lifestyle? Now, groundbreaking research conducted by the University of Aberdeen could change how we view the nation’s favourite guilty pleasure forever.
The study found that eating 100g of chocolate a day appears to play a part in reducing the risk of heart disease and stroke. The team analysed the snacking habits of 21,000 people throughout a 12-year period and found that people who consumed the equivalent of two chocolate bars had reduced their risk of heart disease during that time by 25%, plus their risk of having a stroke fell by 23%.
What is the reason behind this? Professor Phyo Myint, who headed up the research, commented: "Cumulative evidence suggests that higher chocolate intake is associated with a lower risk of future cardiovascular events.This may indicate that not only flavonoids, but also other compounds, possibly related to milk constituents, such as calcium and fatty acids, may provide an explanation for the observed association."
MOVE OVER FROM THE DARK SIDE
For years dark chocolate has been labelled as the healthier option, but this study suggests that milk chocolate may provide just as many positive nutritional benefits.
The people in the research snacked on milk chocolate as opposed to dark chocolate, which has traditionally been accredited with containing a greater amount of protective molecules called flavonoids. This suggests that there are other components in the milk chocolate that contain disease-fighting properties, such as calcium and fatty acids, as Phyo Myint stated, which may help to protect our cardiovascular systems.
CHOCOLATE WITH A PINCH OF SALT
As much as we’d love to believe this information, hold off from unwrapping that chocolate bar just yet. Despite what the research suggests, there is also a huge amount of evidence carried out over the years that counteracts this study.
Chocolate is full of refined sugar, saturated fat and it is high in calories, which can make up around 90% of an average bar of milk chocolate. Having an excessive amount of any of these things can cause fat to build up in your body, increasing your risk of heart disease and raising the level of cholesterol in the blood. It’s important to consider other factors before deciding to add chocolate as a significant part of your diet, including the amount of exercise you do and other components of your diet and your genetics.
If you are reasonably active, then indulging in chocolate once in a while probably isn’t going to hurt, because you will be able to burn off the calories while still reaping the nutritional benefits. However, the research probably isn’t intended to kid people into thinking that simply eating chocolate will reduce your risk of serious diseases.
Eating chocolate releases a chemical reaction in the brain triggering it to release endorphins, which make you feel happy and content. The good news is that exercise also triggers this hormone! Unlike the minimal amount of research we have on the benefits of chocolate, there is an extensive amount of knowledge about the multiple benefits that exercise has on your health. So the next time you feel like you need a chocolate pick-me-up, reach for a different kind of bar at the gym and raise those serotonin levels naturally!
If you are looking for more direction in your health and fitness plan, book a free consultation with a personal trainer - many are trained in nutrition, so they will be able to offer you expert advice and guidance. Every personal trainer is different, discover what skills they each have here. | <urn:uuid:b285142c-5661-4b2d-96d1-47a6014fac4f> | CC-MAIN-2023-50 | https://www.fitnessfirst.co.uk/blog/survey-shows-chocolate-can-be-good-for-your-health | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100942.92/warc/CC-MAIN-20231209170619-20231209200619-00219.warc.gz | en | 0.965398 | 720 | 3.09375 | 3 |
Stars are dense hot balls of gas so their spectra similar to that of a perfect thermal radiator, which produces a smooth continuous spectrum. (Although, stars are not perfect thermal radiators, their spectra are similar enough to the smooth continuous spectrum for what follows.) Therefore, the color of stars depends on their temperature---hotter stars are bluer and cooler stars are redder. You can observe the star through different filters to get an approximate temperature. A filter allows only a narrow range of wavelengths (colors) through. By sampling the star's spectrum at two different wavelength ranges (``bands''), you can determine if the spectrum is that for a hot, warm, cool, or cold star. Hot stars have temperatures around 60,000 K while cold stars have temperatures around 3,000 K. The filter diagrams are shown below.
A hot star has a B-V color index close to 0 or negative, while a cool star has a B-V color index close to 2.0. Other stars are somewhere in between. Here are the steps to determine the B-V color index:
The UNL Astronomy Education program's Blackbody Curves and UBV Filters module lets you explore the relationship between temperature and the thermal spectrum by manipulating various parameters with a graphical interface (link will appear in a new window). You can also explore temperature-color correlation using various filters.
Another way to measure a star's temperature is to use Wien's law described in the Electromagnetic Radiation chapter. Cool stars will have the peak of their continuous spectrum at long (redder) wavelengths. As the temperature of a star increases, the peak of its continuous spectrum shifts to shorter (bluer) wavelengths. The final way to measure a star's temperature is more accurate than the previous two methods. It uses the strength of different absorption lines in a star's spectrum. It is described in full a little later in the chapter. The temperatures of different types of stars are summarized in the Main Sequence Star Properties table.
Go back to previous section -- Go to next section
last updated: June 7, 2010 | <urn:uuid:e728c397-67d4-4f0d-ab40-8d7b35336a20> | CC-MAIN-2017-17 | http://www.astronomynotes.com/starprop/s5.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120101.11/warc/CC-MAIN-20170423031200-00595-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.907101 | 430 | 4.03125 | 4 |
Scientists use 3D printing to make hair farms for human hair
3D-printed molds are helping scientists grow human hair follicles in labs
NEW YORK CITY — Scientists have discovered a new way to grow human hair in the lab using 3D-printed molds.
According to a Columbia University news release, researchers used 3D-printing to create a plastic mold with long, thin extensions half a millimeter wide, and designed to mimic the natural microenvironment of human hair cells.
Once human skin is engineered to grow around the mold, hair follicle cells are seeded in and topped by keratin-producing cells.
They are then fed a cocktail of growth factors that stimulates hair growth. This includes JAK inhibitors, which were found to reawaken resting hair follicles in mice when applied on the skin.
Researchers had previously discovered a pathway called JAK-STAT in the stem cells of resting hair follicles that keeps them in a dormant state. By controlling pathway activity, JAK inhibitors can trigger follicle growth.
According to the Columbia researchers, human hair follicles appeared after three weeks and started creating hair.
The technique will be especially useful for hair restoration surgery, which currently relies on the redistribution of follicles from one part of the body to another.
Using this new method, scientists can create "a grid of hairs that are patterned correctly and engineered so they can be transplanted back into that same patient's scalp."
Hair follicles grown this way could allow for an unlimited supply, with no need for donor hair grafts.
NEXT ON TOMONEWS
Hybrid wooden skyscraper proposed for Vancouver | <urn:uuid:a16332c2-52cb-4ec5-b07e-7ecc7b032ced> | CC-MAIN-2019-30 | http://us.tomonews.com/scientists-use-3d-printing-to-make-hair-farms-for-human-hair-3851786 | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526799.4/warc/CC-MAIN-20190720235054-20190721021054-00276.warc.gz | en | 0.933039 | 337 | 3.609375 | 4 |
any of a genus (Tamarix) of small trees or shrubs of the tamarisk family with slender branches and feathery flower clusters, common near salt water and often grown for a windbreak
Origin of tamariskMiddle English tamarisc from Late Latin tamariscus, for Classical Latin tamarix
designating a family (Tamaricaceae, order Violales) of small, dicotyledonous shrubs and trees
Any of numerous shrubs or small trees of the genus Tamarix, native to Africa and Eurasia and widely naturalized in western North America, having small scalelike leaves and racemes of small pinkish flowers and usually growing in saline soil. Also called salt cedar .
Origin of tamariskMiddle English tamarisc from Late Latin tamariscus variant of Latin tamarīx tamarīc- probably from an unknown Mediterranean source akin to Greek murikē | <urn:uuid:050cf351-c937-4633-8339-afc7d5247507> | CC-MAIN-2018-34 | http://www.yourdictionary.com/tamarisk | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221218357.92/warc/CC-MAIN-20180821151743-20180821171743-00379.warc.gz | en | 0.87074 | 196 | 2.65625 | 3 |
Lake Urmia comes back to life slowly but surelyMar 22, 2017
By Gary Lewis, UN Resident Coordinator and UNDP Resident Representative in the Islamic Republic of Iran
Life has returned to the dying Salt Lake in North-West Iran. The effort to restore what had been broken is succeeding.
Returning to the barren landscape after almost four years, I was able to see water. Not nearly enough, but much more than last time. The lake is reviving. And this revival is the result of an immensely successful collaborative effort involving many players – some Iranian, some foreign.
Lake Urmia was once Iran’s largest lake. In its prime, it was the second largest saltwater lake in the world. But years of man-made disruption – from the frenzy of 60 years of dam-building to the massive over-use of feeder rivers – had diverted the natural flow of sweet water from the surrounding basin into the salty lake. As a result, it simply dried out. It died at the hands of humans.
I also remember thinking that if the lake dried up two main things would happen. One is that salt from the dried lake bed would blow around and get dumped on farming land and crops in what essentially becomes a salt dustbowl in a fairly large radius around the lake. Secondly, we could expect people to get sick. For example, in the vicinity of the dried-out Aral Sea in Central Asia, we already see people afflicted with allergies and respiratory diseases including cancers.
But there would be a third self-destructive phenomenon at play as well. As farmers drilled ever-deeper to pump out the aquifers at the side of the lake for farming, over-exploitation of this groundwater surrounding the lake would cause saltwater seepage into those very same wells. This would hit people’s access to potable drinking water. So we were threatened by a “perfect salt storm” affecting people’s health and livelihoods.
When our plane landed in Urmia two weeks ago, having taken the normal one hour to fly from Tehran, I wondered what I would see. I had heard tell of an improvement. But such stories often vanish in the face of requests to provide evidence. I wanted to see for myself.
It was when we started to approach the vast open expanse of lake bed that I saw the morning sun glimmering off something which had not been there when last I travelled to the lake.
Water. Not deep. But enough to cover the salt dust granules which had caused such havoc before. As we drove across the bridge which bisects the lake, the glimmering started to stretch out towards the rising sun.
And here are some of the pictures of that long and painful death I captured in October 2013.
Here is what we saw that morning.
I must confess I was so happy that tears were welling up in my eyes. The environmental problems we create can be fixed, I thought. And here is how it happened.
First, some numbers.
When lake Urmia was full, say 20 years ago, it was estimated to contain around 30 billion cubic meters (bcm) of water. At the worst point, 3 to 4 years ago, it accounted for a mere 0.5 bcm of salt water. The number now stands at 2.5 bcm. The deadly decline has been reversed. The amount of water now keeps increasing month on month.
Because the amount of annual precipitation in terms of rain and snow in the basin has not changed appreciably in the last few years, we must look elsewhere for an explanation of why the lake is now filling up.
There are three main reasons. The first is engineering works to help unblock and un-silt the feeder rivers. Second is the deliberate release of water from the dams in the surrounding hills. Third, and most difficult of all to accomplish, has been a change in the way water management in the basin happens – especially among farmers. Other approaches like banning illegal wells have also had an impact.
Here are some more numbers. Three to four years ago, when the water level was at its worst, only 500 of Lake Urmia’s 5,000 square kilometer surface was covered by any water at all. That figure has now risen to 2,300 square kilometers. Admittedly, much of that water is spread extremely thin, and some tends to evaporate easily. But it is there, offering a protective covering for the estimated 6 billion tons of salt and dust, which now no longer finds its way so easily into the air, into our eyes and lungs, and onto the farmers’ crops.
This third approach – better water management – took considerable time and effort to achieve. But it appears here to stay. While practicing new roles and partnership of local authorities and communities within LU restoration process, It took painstaking effort to get farmers to reconsider how they grow their crops by modifying their agricultural techniques when growing wheat, barley, rapeseed and fruit and vegetables.
The new techniques are astonishingly simple: changing farm dimensions to make for smaller plots which retain water better; not using flooding as a form of irrigation, but rather trickle-irrigation which is targeted at the crops and thus not wasted; avoiding deep tillage which causes unnecessary water loss; introducing drought-resistant crop strains; ploughing plant residue back into the soil rather than burning it.
Across the board, in some cases the crop yield – despite using less water – has also increased by 40 per cent.
Here is a final reassuring set of numbers. Considering the normal hydrological conditions, the lake has an average of 5.4 meters and Max. depth in northern part around 15 meters. When the lake was at its worst point, the lake’s average level had dropped to almost zero. When we compare the level of the lake taken now with what prevailed at exactly this time last year, we note a 6 centimeter rise. The monthly increases have been incremental, but sustained.
The project which has brought about the improved water management is being implemented by the UN Development Programme (UNDP). Based in West and East Azerbaijan provinces with a focus on Lake Urmia surrounding cities and villages, it works closely with local farmers, provincial and national governments and others to initiate an adaptation process by implementing the “ecosystem approach”.
Following a 7 year project to introduce ecosystem approach for saving Lake Urmia , with the generous financial support from the Japanese government in recent years, as well as an inflow from the Iranian government’s own resources at both the national and provincial levels, these techniques have been successfully implemented in 90 villages. But this number represents only about 10% of the irrigated farming area in the Urmia Basin. Nonetheless, in the areas where the sustainable agriculture is being practiced, there is a water saving of about one-third of the water that would otherwise have been wasted under the old inefficient practices. This saved water can flow back into the lake, thereby replenishing it.
UNDP’s interventions to save Iranian wetlands including Lake Urmia – starting 12 years ago, but intensifying significantly with the addition of 3 phases of Japanese funds – have focused on working with local farmers, cooperatives and government to support a new model of partnership among stakeholders and initiate an adaptation process by implementing sustainable agriculture techniques. It has also advocated alternative livelihoods for women using micro-credit and biodiversity conservation.
At present the project’s interventions cover sites all around the lake, and most affected, part of the lake basin. To boost coverage from 10%, the plan is to move towards significant upscaling of this important initiative in an emblematic effort which is being recognized at an international level.
As I got on the plane to return home to Tehran in the evening, three takeaway lessons occurred to me.
First, we face powerful environmental challenges in Iran. But we can fix what we have broken. And this is happening – right now – in Lake Urmia.
Second, the public must educate itself and speak out on the environment. The UN received a petition in 2016, containing 1.7 million signatures, requesting action on Lake Urmia. The pressure has been relentless. Such pressure must be welcomed and acted upon.
Third, in the final analysis, these environmental problems cannot be solved if we act alone. The Lake Urmia response shows that it takes leadership by public authorities, acting in collaboration with the affected communities, and sometimes with support from the international community (technical support from UNDP and financial support from a partner like Japan) to do the trick.
What has happened in Lake Urmia is an example to inspire us all – both within and beyond Iran. | <urn:uuid:47852895-073a-4e2f-9c06-5a6ffb5e12fa> | CC-MAIN-2018-34 | http://www.ir.undp.org/content/iran/en/home/presscenter/articles/2017/03/22/lake-urmia-comes-back-to-life-slowly-but-surely/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217970.87/warc/CC-MAIN-20180821053629-20180821073629-00639.warc.gz | en | 0.967603 | 1,783 | 2.546875 | 3 |
The vi editor is a command-line, interactive editor that you can use to create and modify text files. The vi editor is also the only text editor that you can use to edit certain system files without changing the permissions of the files. The Vim editor is an enhanced version of the vi editor.
Accessing the vi Editor
To create, edit, and view files in the vi editor, use the vi command. The vi command includes the following three syntaxes:
$ vi $ vi filename $ vi options filename
If the system crashes while you are editing a file, you can use the -r option to recover the file.
$ vi -r filename
The file opens so that you can edit it. You can then save the file and exit the vi editor, by using the following command:
$ vi -R filename
The file opens in read-only mode to prevent accidental overwriting of the contents of the file.
The vi Editor Modes
The vi editor provides three modes of operation:
1. Command mode – The command mode is the default mode for the vi editor. In this mode, you can run commands to delete, change, copy, and move text. You can also position the cursor, search for text strings, and exit the vi editor.
2. Input mode – You can insert text into a file in the input mode. The vi editor interprets everything you type in the input mode as text. To invoke input mode, press one of the following lowercase keys:
- i – Inserts text before the cursor
- o – Opens a new blank line below the cursor
- a – Appends text after the cursor
You can also invoke the input mode to insert text into a file by pressing one of the following uppercase keys:
- I – Inserts text at the beginning of the line
- O – Opens a new blank line above the cursor
- A – Appends text at the end of the line
3. Last line mode – You can use advanced editing commands in the last line mode. To access the last line mode, enter a colon (:) while in the command mode. Entering the colon (:) character places the cursor at the bottom line of the screen.
Switching Between Modes
– The default mode for the vi editor is the command mode.
– To switch to the input mode, press i, o, or a.
– To return to the command mode, press the Escape key.
– In the command mode, you can save the file and quit the vi editor, and return to the shell prompt.
Viewing Files in the Read-Only Mode
The view command enables you to view files in the read- only mode.
$ view filename
The view command invokes the vi editor in the read-only option, which means you cannot save changes to the file. For example, to view the data.txt file in the read-only mode, enter the following command:
$ view data.txt
The data.txt file appears. Enter the :q command to exit the file, exit the vi editor, and return to the shell prompt.
Moving the Cursor Within the vi Editor
The table shows the key sequences that move the cursor.
|Key Sequence||Cursor Movement|
|h, left arrow, or Backspace||Left one character|
|j or down arrow||Down one line|
|k or up arrow||Up one line|
|l, right arrow, or space bar||Right (forward) one character|
|w||Forward one word|
|b||Back one word|
|e||To the end of the current word|
|$||To the end of the line|
|0 (zero)||To the beginning of the line|
|^||To the first non-white space character on the line|
|Return||Down to the beginning of the next line|
|G||Goes to the last line of the file|
|1G||Goes to the first line of the file|
|:n||Goes to Line n|
|nG||Goes to Line n|
|Control + F||Pages forward one screen|
|Control + D||Scrolls down one-half screen|
|Control + B||Pages back one screen|
|Control + U||Scrolls up one-half screen|
|Control + L||Refreshes the screen|
|Control + G||Displays current buffer information|
Inserting and Appending Text
The table describes the commands to insert and append text to a new or existing file by using the vi editor.
|a||Appends text after the cursor|
|A||Appends text at the end of the line|
|i||Inserts text before the cursor|
|I||Inserts text at the beginning of the line|
|o||Opens a new line below the cursor|
|O||Opens a new line above the cursor|
|:r filename||Inserts text from another file into the current file|
The table shows commands that delete text in the vi editor.
|R||Overwrites or replaces characters on the line at and to the right of the cursor. To terminate this operation, press Escape.|
|C||Changes or overwrites characters from the cursor to the end of the line|
|s||Substitutes a string for a character at the cursor|
|x||Deletes a character at the cursor|
|dw||Deletes a word or part of the word to the right of the cursor|
|dd||Deletes the line containing the cursor|
|D||Deletes the line from the cursor to the right end of the line|
|:n,nd||Deletes lines n -n (For example, :5,10d deletes lines 5-10.)|
You can use numerous commands to edit files by using the vi editor. The following sections describe basic operations for deleting, changing, replacing, copying, and pasting. Remember that the vi editor is case-sensitive.
The table describes the commands to change text, undo a change, and repeat an edit function in the vi editor.
|cw||Changes or overwrites characters at the cursor location to the end of that word|
|r||Replaces the character at the cursor with one other character|
|J||Joins the current line and the line below|
|xp||Transposes the character at the cursor and the character to the right of the cursor|
|~||Changes letter casing to uppercase or lowercase, at the cursor|
|u||Undoes the previous command|
|U||Undoes all changes to the current line|
|.||Repeats the previous command|
Search and Replace Commands
The table shows the commands that search for and replace text in the vi editor.
|/string||Searches forward for the string|
|?string||Searches backward for the string|
|n||Searches for the next occurrence of the string. Use this command after searching for a string.|
|N||Searches for the previous occurrence of the string. Use this command after searching for a string.|
|:%s/old/new/g||Searches for the old string and replaces it with the new string globally|
Copy and Paste Commands
The table shows the commands that cut, copy, and paste text in the vi editor.
|yy||Yanks a copy of a line|
|p||Puts yanked or deleted text under the line containing the cursor|
|P||Puts yanked or deleted text before the line containing the cursor|
|:n,n co n||Copies lines n -n and puts them after line n (For example, :1,3 co 5 copies lines 1-3 and puts them after line 5.)|
|:n,n m n||Moves lines n -n to line n. For example, :4,6 m 8 moves lines 4-6 to line 8, line 6 becomes line 8, line 5 becomes line 7, and line 4 becomes line 6.|
Save and Quit Commands
The table describes the commands that save the text file, quit the vi editor, and return to the shell prompt.
|:w||Saves the file with changes by writing to the disk|
|:w new_filename||Writes the contents of the buffer to new_filename|
|:wq||Saves the file with changes and quits the vi editor|
|:x||Saves the file with changes and quits the vi editor|
|ZZ||Saves the file with changes and quits the vi editor|
|:q!||Quits without saving changes|
|ZQ||Quits without saving changes|
You can customize a vi session by setting variables for the session. When you set a variable, you enable a feature that is not activated by default. You can use the set command to enable and disable variables. The set command variables include displaying line numbers and invisible characters, such as the Tab and the end-of-line characters.
To create an automatic customization for all your vi sessions, perform the following steps:
- Create a file named .exrc in your home directory.
- Enter any of the set variables into the .exrc file.
- Enter each set variable without the preceding colon.
- Enter each command on one line.
The vi editor reads the .exrc file located in your home directory each time you open a vi session, regardless of your current working directory.
Session Customization Commands
The table describes some of the variables of the set command.
|:set nu||Shows line numbers|
|:set nonu||Hides line numbers|
|:set ic||Instructs searches to ignore case|
|:set noic||Instructs searches to be case-sensitive|
|:set noic||Displays invisible characters, such as ^I for a Tab and $ for end-of-line characters|
|:set nolist||Turns off the display of invisible characters|
|:set showmode||Displays the current mode of operation|
|:set noshowmode||Turns off the mode of operation display|
|:set||Displays all the vi variables that are set|
|:set all||Displays all vi variables and their current values| | <urn:uuid:55015fb0-6808-40d0-9ca5-c207e8418bb0> | CC-MAIN-2021-04 | https://www.thegeekdiary.com/beginners-guide-to-vi-editor-command-line-reference/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704839214.97/warc/CC-MAIN-20210128071759-20210128101759-00615.warc.gz | en | 0.75943 | 2,218 | 3.765625 | 4 |
For those lucky people born in the month of February, they get to call the Amethyst their birthstone! This gemstone is prized for its various shades of violet from lilac to deep purple and has a long and interesting history. Our 14 Karat jewelry specialists go over some of the fun facts and the history of this month’s birthstone.
History of amethyst
The color purple has long been associated with luxe and royalty. This is why some of the most famous and perfect jewelry pieces worn by royals are amethysts. Royals have been wearing amethysts as far back as Alexander the Great, but Catherine the Great, an empress of Russia, is perhaps most well known for her adoration of the stone. She was constantly adorning herself in amethyst necklaces, earrings and other jewelry pieces. Although the Duchess of Windsor, Wallis, comes to a close second with her cartier-designed amethyst necklace that made quite a memorable statement.
The word amethyst comes from the Greek word “amethystos” which means not intoxicated. The Greeks associated the stone with the wine god and would serve it with drinks with the belief that it would prevent people from overindulging. Even today the stone is supposed to infuse the wearer with a sense of well-being and strength. It is thought to be a stabilizing force amidst chaos. In fact, Buddhists believe that amethyst’s help to enhance meditation and the stone is commonly used for Tibetan prayer beads. Amethyst is associated with feelings of peace, balance and courage.
Where to find amethysts
Amethyst most often occurs in geodes or in the cavities of granite rocks. Once, it was a very rare gemstone, almost as rare as emeralds and it was most commonly mined in Russia until large deposits of it were found in Brazil. Nowadays, you can find amethysts all over the world! Some of the more well known mines are located in the United States, Canada and Zambia.
Taking care of amethysts
Ranking a 7 on the MOHs scale, amethysts are the perfect jewelry for everyday wear. However, the wearer will want to take necessary precautions against any activities that could scratch the gem. Amethysts should not be worn when using household cleaners or exposed to direct sunlight for a prolonged period of time. The gem can be cleaned, but it is recommended to only be washed with a mild soap and warm water.
Come and visit us for all your Amethyst jewelry needs! It can be the perfect jewelry gift for a loved one born in February, or as a special wedding anniversary present! Come and visit us at the Shops of Legacy, 168th and West Center Roads! | <urn:uuid:6d474a05-3b0d-4dfe-b4a8-1b3bc1ed17e1> | CC-MAIN-2023-14 | https://www.14karatomaha.com/blog/article/the-history-of-februarys-birthstone | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949093.14/warc/CC-MAIN-20230330004340-20230330034340-00450.warc.gz | en | 0.972112 | 576 | 2.59375 | 3 |
© Charles Darwin, "The Missing Link"
Fragment from the book "Origin" not
L. J. White
Charles Darwin on his most important book “ On the Origin of the Species by Natural Selection” (1859) paved the way to what science widely accepts today as the “Theory of Evolution” or evolutionary process of the species. The Theory of Evolution basically proposes that all life in the planet undergo changes in order to adapt to the changing environment, these changes can be due to environmental changes. Darwin also observed that some were inheritable changes. No one today can argue with the validity of Darwin’s theory and scientific research has proven that the evolution of life on the planet is indeed a reality.
According to present scientific research human evolution, or our earliest ancestors, appeared on the planet 4 to 5 millions years ago, it is quite possible and I propose, an earlier date of 6 to 7 millions years ago, perhaps even earlier. Humans, according to the most recent studies evolved from mammals, creatures called Primates. We are categorized in the mammalian order as Primates. Our nearest living relatives are the African Apes; the genetic similarities place them in the Hominid family.
Man appeared on earth rather suddenly and the rate of evolution has been quite rapid. We have evolved physically and mentally as well in a rather short period of time, considering that the first life forms on earth are supposedly 3.5 billion years old. In this day and age to deny our animal self would be absurd, we are indeed “Part Animal” or Primate. Nevertheless, to accept the idea that we simply evolved from primates by some freak genetic accident or by applying The Theory of Evolution, as we understand it today is very shortsighted indeed. A legitimate question would be; what took place 6 to 7 million years ago, and how, that changed Ape into Man?
In order to begin to approach the question we must look first at some very important aspects of man and the evolution process. The Ape, our nearest relative, remains Ape without any significant changes, only that he supposedly became man. However, are we to assume that only some apes underwent the genetic changes needed for man’s evolution and the rest remained basically unchanged? The genetic change that occurred 6 to 7 millions years ago to our dear cousin the Ape was rather radical; what motivated the genetic change or evolution? Was it perhaps the need to adapt to a changing environment? If so did the changing environment only affect selected populations of Apes or primates in a specific geographical location?
As man evolved from those early days, the adaptation to climate and conditions is not very apparent, actually, in many aspects the opposite has occurred. Man began to loose a large portion of his hair; a natural protection against cold temperatures, even in the Arctic Zones the absence of hair is noticeable. Man has not, through the evolution process, naturally adapted himself to the changing environment or become more adjusted to the existing conditions. Man, in essence, has tried to use and change the environment to accommodate for his needs, with a substantial degree of success.
To protect himself from the cold and other predators’ man discovered fire and eventually invented central heat, no need for hair. He began to use primitive tools and weapons to construct shelters and hunt, also to protect against predators. He develops written communication, domesticated animals, started agriculture and so on. In his evolutionary track man has challenged the environment and everything in it, including other life forms. Furthermore man has considered and placed himself above any other specie on the planet, even today the though of us being part Animal or Primates does not settle well at all.
With the appearance of man on the planet, evolution when compared to any other specie took a turn from the norm and a new twist. No other life form, which we know of, has evolved in quite the same way as man has. Why? It is important to note that the rate of evolution and differences between man’s races, or better put, physical differences, although there are some, are not, in the final analysis significant. The major differences noted being physical in nature and not in the overall mental development if we are to consider the total chronological aspect vs. the rate of mental development in different parts of the globe. What this could indicate is that the “Genetic Change” occurred to different primates on different geographical locations on or about the same time, meaning a few million years.
The above implications could seem to conflict with the migratory scenario, but in reality, it should not. It would be hard to conceive that our ancestors were concentrated on a specific geographical location, Sub Sahara, Asia, Africa, as the “Eve” theory suggests, and that furthermore they were of different physical makeup. It is more reasonable to assume that our ancestors were from different geographical locations and of different physical makeup, this would not conflict with migratory theories.
The search for the famous “Missing Link” is still going on today in an attempt to verify and justify the Theory of Evolution, we have not found the so called “Missing Link” yet, I doubt seriously that we will succeed. With the Archeological research and scientific process, we have discovered a great deal of valuable information that helps us to understand better human evolution. However, the sudden appearance of man on the globe remains a mystery today. We can understand that through the evolutionary process, more than likely, Ape became Man, biologically speaking, but the mental and “Spiritual” development of man is still not understood at all and remains a mystery today.
Charles Darwin along with the many other scientists that have developed the Theory of Evolution has contributed a great deal in the search for the “Origin” of man. The scientific data being gathered is of tremendous value and with it, certain pieces of the “Human Origin Puzzle” begin to fit. However, evolution alone does not fully account for, or is responsible for man’s existence on the planet. The Theory of Evolution, now Evolution, only accounts for the “Natural Evolution” of the species within the Planet Earth and nothing more or less than that. Therefore, any exterior or outside the Planet Earth “Genetic Manipulation” would not fit into the Theory of Evolution as we know it and understand it today.
Any reproduction in part or whole is strictly forbidden without the authors authorization | <urn:uuid:f661faca-fdcf-45a6-ae1c-dee8099f5cd3> | CC-MAIN-2016-26 | http://revistainterforum.com/english/articles/origin2_evolution.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00016-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.964819 | 1,320 | 3.421875 | 3 |
The Carbon Footprint Of Spam
It appears that even e-mail spammers have a carbon footprint.
According to a new study, spammers are not only pests to e-mail inboxes, they are also massive energy hogs.
Spammers produced 62 trillion junk e-mails in 2008, which translated into enough energy to power 2.4 million US homes for a year or the same GHG emissions as 3.1 million passenger cars using 2 billion gallons of gasoline, according to researchers from computer security firm McAfee Inc and climate-change researchers ICF.
The electricity required to process one single spam e-mail message results in 0.3 grams of carbon dioxide being released into the atmosphere.
“While the spam that arrives in any individual’s inbox may create just a small puff of (carbon dioxide), the puff multiplied by millions of users worldwide adds up,” McAfee wrote.
In 2008, McColo, which is a major source of online spam, was taken offline and global spam volume dropped 70 percent.
“The energy saved in the ensuing lull before spammers rebuilt their sending capacity, equated to taking 2.2 million cars off the road that day, proving the impact of the 62 trillion spam e-mails that are sent each year,” said researchers.
The study looked at energy involved in creating, storing, viewing and filtering spam across 11 countries. Researchers found that almost 80 percent of spam’s carbon footprint came from the energy expended by users’ PCs while viewing or deleting unsolicited messages.
Spam filtering saves 135 TWh of electricity per year. That is equivalent to taking 13 million cars off the road, the study found.
“If every inbox were protected by a state-of-the-art spam filter, organizations and individuals could reduce today’s spam energy by 75 percent or 25 TWh per year, the equivalent of taking 2.3 million cars off the road,” said McAfee.
Unwanted messages account for 97 percent of all e-mail, according to the AP, which cited new figures from Microsoft Inc.
“As the world faces the growing problem of climate change, this study highlights that spam has an immense financial, personal and environmental impact on businesses and individuals,” said Jeff Green, senior vice president of product development and McAfee Avert Labs.
“Stopping spam at its source, as well investing in state-of-the-art spam filtering technology, will save time and money, and will pay dividends to the planet by reducing carbon emissions as well.”
On the Net: | <urn:uuid:4849d3a6-6102-4a9d-abc2-1ad2895e2686> | CC-MAIN-2014-23 | http://www.redorbit.com/news/technology/1671130/the_carbon_footprint_of_spam/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510272584.13/warc/CC-MAIN-20140728011752-00203-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.934977 | 542 | 2.578125 | 3 |
It is stress awareness month, and we are looking at different situations which may put us under stress. We probably have all experienced stress in our lives from time to time – occasionally being under pressure or worried is normal but sometimes, particularly when stressful life events happen you can find yourself feeling that things are out of control and you are unable to cope. Initially you may experience worrying thoughts about an event or period of time where there’s lots going on in your life. Your body might begin to create a stress response, where you may start to suffer physically from the stress; have headaches, shake, sweat, be unable to sleep, and generally feel exhausted.
Lockdown has added to people’s life challenges and for some a sense of being trapped and as pressures have built up and we may have found ourselves in situations of increased stress. Common complaints from people in recent times is that lockdown has affected their relationship with others and some people have experienced increased serious hassles with neighbours such as witnessing anti-social behaviour, noncompliance with Covid restrictions, threats, noise abuse, damage to property, etc. Neighbours who have previously enjoyed a good relationship with each other can see this break down if for some reason change occurs and it does not suit or upsets one or the other! Even the most beautiful home in the most peaceful town can become a living nightmare if you are next door to someone you don’t get along with, or if you simply don’t see eye to eye.
If you are thrown into the situation of dealing with an aggressive or threatening and nasty neighbour, it can be very stressful.
How Does This Kind of Stress Effect You?
Some issues are easier resolved than others but if you don’t deal with what is triggering your stress, your physical symptoms soon lead to changes in the way you behave. Some signs to look out for are:
- feelings of constant worry or anxiety
- feelings of being overwhelmed
- difficulty concentrating
- mood swings or changes in your mood
- irritability or having a short temper
- difficulty relaxing
- low mood
- low self-esteem
- eating more or less than usual
- changes in your sleeping habits
- using alcohol, tobacco or illegal drugs to relax
- aches and pains, particularly muscle tension
- diarrhoea and constipation
- feelings of nausea or dizziness
- loss of sex drive.
If the issue is not resolved then over time this can lead to significant anxiety and/or depression.
So how do you approach a problem you are experiencing with your neighbours practically, without things potentially escalating out of control?
If not addressed a disagreement with a neighbour is likely to become an ongoing stressful situation, and needs to be handled with care. We all see the world through a different lens to some extent, and it can be small disagreements between neighbours, like who pays for the hedge to be cut, or noisy parties that quickly escalate into something much bigger, and more stressful to deal with. Whether it’s is an issue with noise, planning disputes, or antisocial behaviour, what can start out as a small problem can quickly escalate to become an all-out war with your neighbour.
Any kind of violent or threatening behaviour must be taken seriously and if you have a situation that you feel you can’t resolve through civil conversation, there are a few things you can do to try and ensure a positive and more peaceful outcome.
Whatever it is that is happening, it is likely to become a ‘your word against theirs’ situation. It is useful to keep a log of incidents which can be drawn upon later if things escalate. Try to be detailed in what happened and when, what was said, and how it made you feel.
Gather Evidence (DNA)
It may be necessary in some situations to gather actual evidence. For example, if someone is repeatedly spitting, can you safely gather and keep samples and record the time, place, who it was, and how the action made you feel.
Gather Evidence (Video)
If you can try and gather video evidence discreetly and safely, (e.g. of damage to car) this will become useful if taking the dispute to the police. Video often works well at low light levels.
Gather information (Recordings/sound levels)
Apps on phones often help you measure sound levels so you can try and take recordings if someone is banging on your door or swearing at you. If someone accosts you outside when you are leaving your property maybe think about setting a recording when you leave.
All of this evidence gathering will be useful for you to take your case forward and to have a professional help resolve the dispute. So who do you go to for help?
If you feel comfortable, you should approach your neighbour to discuss the problem. If you have no luck in resolving the dispute, it is important to get the back up from the right people in order to resolve the issue with your neighbour safely and legally.
Some Key People to Contact
If your neighbour is a tenant, you can talk to their landlord. This could be the local council, a housing association or a private landlord.
Housing Officer- It might take a lot for them to act so it is important to keep them updated regularly. Make sure you put your complaint in writing (e.g. email and letter- not phone calls alone) and stress the fact that you feel at risk.
If there’s a residents or tenants association where you live, you could get their support. If more people complain, the conflict will be less personal and you’re more likely to be successful. To find your local residents or tenants association, contact your local council.
Police- You can call the police if a criminal offence is being committed and if you feel you are at risk of harm, and emphasise your distress, the threat that you are under and any impact on yourself or family members and the escalating nature of what’s happening in spite of Police involvement and your fear.
Other people you may want to involve;
The stress will be taking a toll on you, it is a good idea to speak to your Doctor and emphasise the impact the situation is having on your sleep, fear, others at home, low mood, distress, and hope to resolve or anything else. Your G.P. can assess you for symptoms of anxiety & depression and offer treatment options and advice if required.
MSP- You can contact a local councillor or a member of the Scottish parliament (MSP) if you haven’t been able to resolve your dispute by speaking to your neighbour or the council.
See a Lawyer- Legal action should be a last resort after you’ve tried speaking to your neighbour and taking action through your local council. Going to court might resolve the dispute but damage your relationship with your neighbours and can be very expensive.
You can send your neighbour a letter from a solicitor to show that you’re serious about your complaint. A letter from a solicitor might help to explain the legal position in a dispute, for example if neighbours can’t agree about the position of a boundary. Sometimes a consultation with a lawyer can be free, and they can advise you on what you might be able to do about the dispute.
Shelter (Charity) or Women’s Aid
You may want to seek refuge in extreme situations and to get away from the problem and keep yourself safe. When speaking to the local council, police or G.P. they can offer advice on specific place of safety or alternative accommodation support in your area.
Try to limit being out at night and on your own. Try and stay with a friend or family member if you feel unsafe. Don’t escalate things and be tempted to retaliate or respond aggressively yourself. Being aggressive or even being assertive can worsen things. Don’t directly respond to aggression- record it instead.
Make sure you talk to someone you trust about your situation. When under huge amounts of stress we can sometimes act in a way we wouldn’t normally do so, and feel like a pressure pot is about to explode. For example speak to your employer/colleagues at work, and make sure they understand the pressures you are under. Know that with the right support and action, the situation will likely be resolved one way or another and you will be able to move on with your life once again.
If you are suffering from low mood, stress or anxiety, sign up to our free well-being course at www.llttf.com
The Living Life to the Full Team. | <urn:uuid:50b73fbf-dbde-4db2-adbc-0e328a81eb5f> | CC-MAIN-2021-49 | https://llttf.com/stress-dealing-with-difficult-neighbours/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359065.88/warc/CC-MAIN-20211130171559-20211130201559-00237.warc.gz | en | 0.955319 | 1,782 | 2.59375 | 3 |
The Historical Gordian Knot
At one time the Phrygians were without a king. An oracle at Telmissus (the ancient capital of Phrygia) decreed that the next man to enter the city driving an ox-cart should become their king. A peasant farmer named Gordias drove into town on an ox-cart and on entering the city was declared king. Out of gratitude, his son Midas dedicated the ox-cart to the Phrygian god Sabazios (whom the Greeks identified with Zeus) and tied it to a post with an intricate knot of cornel bark. Curiously, the knot was an intricate and complex Turkish knot, having no ends exposed.
The ox-cart still stood in the palace of the former kings of Phrygia at Gordium in the fourth century BC when Alexander arrived, at which point Phrygia had been reduced to a satrapy, or province, of the Persian Empire.
In 333 BC, while wintering at Gordium, Alexander the Great attempted to untie the knot. When he could not find the end to the knot to unbind it, he sliced it in half with a stroke of his sword, producing the required ends (the so-called “Alexandrian solution”). However, another solution is presented by Aristobulus, which indicates “he unfastened it quite easily by removing the pin which secured the yoke to the pole of the chariot, then pulling out the yoke itself.” That night there was a violent thunderstorm. Alexander’s prophet Aristander took this as a sign that Zeus was pleased and would grant Alexander many victories. Once Alexander had sliced the knot with a sword-stroke, his biographers claimed in retrospect that an oracle further prophesied that the one to untie the knot would become the king of Asia. Ever since then, when a person has settled a difficulty by bold or violent means instead of patiently solving it, the custom has been to say that he has “cut the Gordian knot,” in memory of Alexander’s feat. Alexander went on to conquer Asia, though the prophecy itself might have been later propaganda created on his behalf.
The Eternal Gordian Knot
The Gordian Knot is an example of a seemingly unsolvable problem. A problem that can’t be solved on the same level, with the same thinking which created the problem. It is solved by transcending the problem, seeing it from a higher perspective… seeing there was never actually a problem in the first place.
You can try to unravel the knot, thread by thread…. or you can cut through it, burn it up…. instantly.
Ego is a knot. The knot of knots is the self, the ego. It is a tangled mess of contradictions. The mind is a knot. Psychologists and psychoanalysts try to unravel the knot – it never unravels. It will take an infinite number of lifetimes to unravel the knot of the mind. For every effort to unravel it only strengthens its reality more….. Seeing this, take a sword to it and cut it immediately!
A Goose in the Bottle
In Zen there is a Koan concerning an impossible problem.
A great philosophical official, Riko, once asked the strange Zen Master, Nansen, to explain to him the old koan of the goose in the bottle.
“If a man puts a gosling into a bottle,” said Riko, “and feeds him until he is full-grown, how can the man get the goose out without killing it or breaking the bottle?”
Nansen gave a great clap with his hands and shouted, “Riko!”
“Yes, Master,” said the official with a start.
“See,” said Nansen, “the goose is out!”
There is no rational, logical solution to this riddle. The goose in the bottle is a metaphor for your consciousness. You are the one in the bottle, the bottle of mind, the bottle of bondage. You believe you are in the bottle, and so you are.
The master, Nansen, claps his hand and calls the student out. He shocks him into awareness, into presence, and creates a situation in which Riko is here, now, awake. The goose is out.
The goose has never been in, the goose has always been out.
The only way there, is to be there. The only way out, is to Be out
There is no way to solve the problem, for it was never a problem!
And the same for the koan of koans, the question of questions: Who am I? There is no answer, there is no solution, the question is unfounded…. the goose is out!
The Knot of Knots
The knot of knots is the self, the ego.
So how do you cut the knot when you are the knot!?
How to go beyond the self when all your actions stem from self!?
There is no how
It is doing the impossible
Turning oneself inside out
YOU can’t do it! Yet it must happen
Who holds the sword?
Who receives the blow?
Who will remain?
Who will grieve?
It may happen when you have tried everything, and then give up….
It may happen when you find yourself at the apex of the triangle – able to see the two dualities…
It may happen when you realize there was never any knot to begin with….
Or when you realize there was never any one to cut it….
You do not unravel the knot by trying, but by throwing your entire being at it, trying everything possible, and then when you give up, surrender, accept total and utter defeat – the knot unravels itself, or rather you become unraveled. And the knot disappears, the bottle disappears, the goose is loose! | <urn:uuid:c45be5e5-d41d-4d2e-8ecf-1afc0ce0417c> | CC-MAIN-2019-35 | https://sethbalthazar.com/2016/03/30/cutting-the-gordian-knot/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316021.66/warc/CC-MAIN-20190821131745-20190821153745-00018.warc.gz | en | 0.964989 | 1,237 | 3.546875 | 4 |
This video introduces one of the key distinctions in types of research, between quantitative and qualitative data. Quantitative data is any that represents numerical data, such as percentage of visitors, and is great at predicting or describing trends. Qualitative data is any that represents non-numeric data, such as emotional responses, and is much better at describing why things are happening.
- Once you've decided that you need to incorporate UX research, you need to decide the proper approach for your project and your team. There are several types of research methods that UX professionals call on, depending on the type of question you're trying to answer. There's no one right or wrong approach, but in order to select the most appropriate method, it can be helpful to understand the major categorizations of research. The first distinction is quantitative versus qualitative research. Quantitative research is that which produces data that represents numeric information, such as the number of clicks on a certain area, or the percentage of site visitors that fill out a form.
Quantitative data is not based on opinion, and serves as an objective input to decision making. Quantitative research is best at capturing the trends of what is happening, because you normally collect a large amount of information. You may even be able to get statistically relevant data. For instance, you might calculate the percentage of support complaints that are about a particular feature, or perform an A/B test where you see which of two versions of a button gets more clicks. Other examples of quantitative research are card sorts, surveys, click tests, and eye tracking studies.
On the other hand, qualitative research produces data that can't be expressed by numbers, such as emotional responses or first impressions. Qualitative research is often used to help uncover why certain trends are happening. Qualitative research is normally done on a much smaller scale, because you need to hear directly from people. You don't always have to be sitting next to them talking, but you do need to be able to have them express their thoughts directly, whether in text or verbally. Examples of qualitative research are usability tests, focus groups, interviews, diary studies, and participatory design workshops.
For instance, let's say that you've designed two different versions of a signup form, and you want to figure out which one to go with. To understand which performs better, you'd want to use a quantitative method, like A/B testing, to monitor how many clicks you're getting on each one. Then, you'd want to perform qualitative research, like an in-person usability test, to find out why customers prefer one over the other. You might also try to collect both quantitative and qualitative information in one research set, such as by performing a set of interviews where you ask both open-ended questions and specific quantitative questions, such as how many times a week participants performed a particular task.
Both types of information are helpful, but you just need to be aware that you can misinterpret quantitative data if you're working with a very small set. Both quantitative and qualitative research are very helpful, but they're used for different purposes.
This course introduces the fundamentals of user experience research so that anyone can understand the benefits and start integrating research into their everyday design and development process. Start watching to learn how to use UX research to find the answers to the most basic questions about your customers—who, what, when, why, and how—and drive better user experiences and business outcomes.
- An overview of research methods, including usability testing, interviewing, eye tracking, surveys, and many more
- A review of the main types of research, including quantitative and qualitative, behavioral and attitudinal, and moderated vs. unmoderated
- Determining the right methodologies based on organizational environment, client type, and project stage
- Targeting the right research participants
- Crafting the right questions in the right way
- Analyzing and presenting your data | <urn:uuid:f49f6ece-d491-48fe-8376-ce8044f022b8> | CC-MAIN-2018-09 | https://www.lynda.com/User-Experience-tutorials/Qualitative-vs-quantitative-research/439418/485626-4.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815812.83/warc/CC-MAIN-20180224132508-20180224152508-00551.warc.gz | en | 0.950661 | 795 | 3.3125 | 3 |
Since it’s been a while since I wrote any neuro-related posts, I figure it’s as good of time as any to begin a discussion on cranial nerves. Let’s get started!
What are cranial nerves?
Cranial nerves are simply the 12 pairs of nerves that originate in the brain, and then travel to various parts of the body. Typically, these 12 nerves are referred to by roman numerals.
Before we dive further into each of the 12 cranial nerves, it’s nice to have some understanding of, well, nerves. So here it goes:
Nerves can be classified in several different ways, but the most common are:
- Conduction speed
For right now, I primarily want to focus on function.
One major functional distinction is sensory versus motor.
- Sensory nerves carry information regarding your senses to the brain.
- Since they are going to the brain, they are considered afferent.
- Motor nerves carry information from the brain to the body to create movement.
- Since they are coming from the brain, they are considered efferent.
Nerves may also be classified as special or general.
- Special nerves are those related to special senses – sight, smell, hearing, taste, and balance.
- General nerves are for everything else.
Finally, nerves can be responsible for either somatic (general body) or visceral (internal organ) functions.
Okay, I think that covers the basics. Now onto cranial nerves!
CN I: Olfactory
The Olfactory nerve is responsible for smell. There’s some debate as to its classification – special somatic afferent or special visceral afferent. Regardless, it’s a sensory nerve for a special sense!
Interestingly, this nerve doesn’t have a technical nucleus, but rather originates in the nasal cavity, with its branches passing through the cribriform plate of the ethmoid bone. This creates a perfect location for picking up smells!
The fibers then travel to the olfactory bulb to become the olfactory tract, and then pass to other parts of the brain to play roles in memory!
CN II: Optic
The optic nerve is most optometrists’ favorite. After all, it’s the one we work with all the time!
Due to its role in sight, the optic nerve is again a special nerve that carries sensory information to the brain – special somatic afferent! Like CN I, CN II does not have a nucleus.
You can read more about the pathway of the optic nerve in my post: How Do You See?
CN III: Oculomotor Nerve
With the oculomotor nerve, we’re starting to get into more interesting territory!
CN III is a motor nerve that actually has two branches – one for somatic muscle and one for visceral muscle! For this reason, the oculomotor nerve is both general somatic efferent AND general visceral efferent.
Unlike CN I and II, CN III has a true nucleus – the oculomotor nucleus. This structure is located in the midbrain (uppermost) part of the brainstem. Fibers then pass forward (towards the face) through the cavernous sinus and into the superior orbital fissure where it divides into two branches: superior and inferior.
The superior branch of the oculomotor nerve is responsible for somatic innervation of levator and superior rectus. As an optometrist, these two muscles are extremely important, as the levator is responsible for movement of the upper eyelid, while the superior rectus helps to lift the eye up!
The inferior branch of the oculomotor nerve provides somatic innervation to the medial and inferior rectus muscles, as well as the inferior oblique. Once again, these muscles are important in optometry, as the medial rectus turns the eye in, the inferior pulls the eye down, and the inferior oblique helps to rotate the eye!
The inferior branch of the oculomotor nerve additionally carries visceral (parasympathetic) innervation to ciliary muscle and pupillary constrictor. These are once again important to optometrists, as the ciliary muscles drives accommodation (or the ability to focus), while the pupillary constrictor muscle is responsible for contracting the pupil!
Well, that’s enough typing for now. Check back soon for Part II
of this series!
If you learned something from this post, please share it with a friend or family member! If you liked it, please subscribe, or like my page on Facebook! And as always, if you have any questions or comments, please contact me – I’d love to hear from you! | <urn:uuid:a45a235a-556f-4808-986f-91a71c5bde08> | CC-MAIN-2024-10 | https://hannahvollmer.net/optometry/2020/09/14/neurooptometry-in-focus-cranial-nerve-basics-i-iii/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473518.6/warc/CC-MAIN-20240221134259-20240221164259-00640.warc.gz | en | 0.924324 | 999 | 3.84375 | 4 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.