text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
7.09k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
It has been a long 22 months since Porcine Epidemic Diarrhea virus (PEDv) was first identified in North American hog herds, and its entrance remains a mystery. However, one Canadian veterinarian believes he knows how the viral disease crossed into Canada. According to the Canadian-based news source, The Western Producer, Frank Marshall, DVM, with Marshall Swine Health Services in Alberta, believes dried porcine plasma are the source of PEDv. His assertion disagrees with a previous announcement made by the World Organization for Animal Health (OIE) in October 2014 that dismissed plasma products as a likely source of the disease “People like the OIE and many others have put forward many very confusing comments regarding the safety of products like blood plasma, claiming that the Canadians were out to lunch in terms of how this entered our industry,” Marshall says. “But I’ll tell you, it is very clear to the vet community involved in the initial 17 sow herds that broke in Ontario. There’s no question how this came.” His belief also contradicts a study released in 2014 by the Canadian Food Inspection Agency (CFIA), concluding that while porcine bloom plasma did contain active PEDv particles, it “could not demonstrate that the feed pellets containing the blood plasma were capable of causing disease.” A scientific opinion from the European Union reported in the European Food Safety Authority Journal also failed to provide a definitively linking porcine plasma products as the source of PEDv. Click here to read more from the European Union.
<urn:uuid:84aad6fd-658c-4f5b-8071-87d82157e7aa>
CC-MAIN-2017-34
http://www.porknetwork.com/pedv/canadian-veterinarian-targets-plasma-pedv-source
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105700.94/warc/CC-MAIN-20170819162833-20170819182833-00416.warc.gz
en
0.962661
326
2.6875
3
Because each cancer type is different in origin, composition, and responsiveness to treatment, reliable prevention techniques are very difficult to identify. Evidence that an activity or dietary item prevents cancer is difficult to confirm because the goal of cancer prevention is to produce an outcome where nothing changes (i.e. cancer does not develop). Additionally, because cancer prevention cannot usually be accomplished by a single event, preventative measures must be taken for many years to give results that can be examned. Even if something is shown to help prevent a certain type of cancer, there is no guarantee that eating or behaving in a certain way will absolutely assure freedom from cancer development. Much of the evidence for cancer prevention is not definitive. As an example, a diet low in fat 12 but high in fiber 34, fruits and vegetables 56 has been associated with lower risks for several cancers. There have also been a number of studies that have shown no connection between these kinds of diets and reduced cancer cases 789. Exercise has been shown to reduce cancer occurrence in some studies; in others, exercise does not seem to make a difference 1011. Despite the conflicting evidence, the National Cancer Institute contends that the best way to help prevent cancer is to exercise, as well as eat a low calorie diet containing fiber, fruits, and vegetables. They also suggest that people should avoid a sedentary lifestyle, animal fats, and grilled meats to lessen the risk of developing cancer 12. Research suggests that a combination of different essential nutrients is better than consuming a large amount of a single item. 13 Another way to help prevent cancer is to avoid behaviors that are generally accepted to increase your risk of cancer. Some of the behaviors linked to cancer development are tobacco use 141516, alcohol consumption 1718, obesity 171920, and sun exposure. 2122 A study on Swedish families shows that an increased risk of cancer is more associated with environmental factors, diet and exercise rather than heredity. 23 The American Cancer Society suggests that a third of all American cancer deaths are linked to poor diet and lack of exercise. Additionally, another third of all cancer deaths are preventable by avoiding tobacco products. 24 The World Health Organization believes that 40% of cancer deaths world-wide could be prevented with proper diet, exercise, and tobacco avoidance. 25 In addition to these general guidelines, there are several specific compounds that have exhibited evidence that they may contribute to cancer prevention. 26 The following pages describe cancer prevention methods in more detail. - Plant Products (Phytochemicals) - Cancer Vaccines - Cancer Prevention Tables If you find the material useful, please consider linking to our website The possible role of antioxidants in the prevention and treatment of a variety of medical conditions has been very highly publicized. For some diseases, anti-oxidants may well play an important role. Unfortunately, some of the excitement is not based on scientific evidence. In order to understand how antioxidants work, it is first important to understand the process of oxidation. What is Oxidation? Oxidation is a chemical process. Oxidation is the reason that metals rust and apples turn brown. When this same process happens inside your body, it can harm cells and tissues. Free radicals are small chemicals that are responsible for oxidative damage. Free radicals can be contained in (or caused to form by) a variety of things including tobacco smoke, radiation (like sunlight or x-rays) and even the normal functioning of the human body. Free radicals are unstable and they can interact with, and alter, other molecules. Targets of free radicals include DNA, lipids and proteins. When free radicals interact with other molecules, they can cause changes (called oxidation) that interfere with the normal activity of the altered target molecules. The altered activity of the affected cell parts can cause severe problems for the cell and ultimately the entire body. You can learn more about oxidation in the Closer Look on this page. What are Antioxidants? Antioxidants are molecules that, as the name suggests, prevent or reverse oxidation. Examples of dietary antioxidants include vitamins C and E. Antioxidants are able to interact with and neutralize free radicals in vitro 2728, improve health and prolong life in animals 2930, and many studies are underway to investigate the potential of these compounds to prevent cancer in humans. Antioxidants are important to humans because they stop 'radicalized' molecules before they cause damage. Compounds that exhibit antioxidant properties do this by donating an electron to a free radical without needing to steal another electron. Unlike most compounds, antioxidants are stable with or without the electron they donate. Some antioxidants function in a "suicidal" manner, neutralizing free radicals by forming permanent bonds with them. Sources and Uses of Antioxidants There are many good sources of antioxidants including green tea, berries, tomatoes and soy. Antioxidants can be found in many fruits and vegetables because plants produce antioxidants to help protect themselves from free radicals created by radiation from the sun. The body naturally produces some antioxidants that help protect against free radical damage. Unfortunately, these do not provide complete protection. Humans must consume antioxidants from other sources if they wish to decrease their risk of developing diseases that are increased by free radical damage 31. Outside of the body, antioxidants can also be used for many practical purposes: museum curators use them to preserve artifacts derived from living things, they can prevent food from spoiling. They are also used to make better rubbers, plastics, automobile fuels and paint 31. NOTE: Just because something is healthy does not mean more is better. Even the healthiest substances can cause harm if taken in large amounts. In fact, there has been some recent evidence linking antioxidants to the spread of cancer. The benefits of antioxidants aren't limited to healthy cells; it seems they can support the survival and spread of cancer cells too. In one study, mice were given an anti-diabetic drug that activated a protein, called NRF2, in their cells. This protein increases the levels of antioxidants in cells. NRF2 activation seemed to increase cell migration and metastasis in mice with pre-existing tumors. Be sure to tell your physician about any drugs you may be taking, and always ask before starting any supplements. 32 A Closer Look at Free Radicals Atoms are composed of a nucleus, containing particles called protons and neutrons, and a group of particles (electrons) that constantly circle the nucleus like satellites around the earth. In most molecules electrons travel in pairs around the nucleus.Free radicals are an exception. At least one atom in a free radical has a single (unpaired) electron circling the nucleus. This single electron gives the atom a charge, making it very attracted to other molecules. A molecule with an unpaired electron is said to be 'radicalized'. These radicalized compounds, or free radicals, can quickly react with other molecules. For this reason these compounds are also called reactive species. Oxygen is the most common reactive species found in the human body and when it acquires an extra electron it is called a reactive oxygen species (ROS). Free radicals 'steal' an electron from a nearby molecule so that all of their electrons are in pairs. The affected target molecule would then become a radical. A chain reaction of electron 'theft' can occur within a cell. Free radicals can affect just about any structure in a cell, including DNA. If free radicals steal an electron from DNA, the genetic code can be damaged and cell function damaged. DNA damage caused by free radicals has been associated with aging, rheumatoid arthritis, inflammatory bowel disease, acute respiratory distress syndrome (ARDS), emphysema, and some types of cancer. 333134 Phytochemicals are compounds found in plants. The phytochemicals below are being investigated to see if they are beneficial to human health; even when extracted from the plant from which they originate. In recent years, there has been a large amount of research to investigate the usefulness of specific natural compounds in the prevention and treatment of cancer. The list below is not meant to be complete. There are numerous other chemicals that are being examined. We have chosen some of the best-studied and most widely publicized agents: Choosing an item from the list below will take you to the Plant Products page in our Integrative Oncology section. - Anthocyanin (Berries) - Curcumin (Turmeric, Curry) - EGCG (Green Tea) - Lycopene (Tomatoes) - Phytoestrogens (Soy) - Pycnogenol (Pine Trees) - Resveratrol (Grapes, Wine) - Selenium (Nuts) Drugs that are used to help prevent cancer are highly regulated by the federal government to insure quality and safety. Most drugs that are suggested by doctors to help prevent cancer are for a specific population that is at a high risk of developing certain cancer types. These drugs are not suggested for all people because they can cause other problems that may not be worth the cost of protection. Nevertheless, some drugs have been shown to decrease the risk for cancer and have been approved by the US Food and Drug Administration for cancer prevention. These include non-steroidal anti-inflammatory drugs (NSAIDs) and the hormonal antagonists tamoxifen and raloxifene, discussed in more detail below. Non-steroidal Anti-inflammatory Drugs (NSAIDs) Types of NSAIDs Structure of Acetaminophen Structure of Diclofenac Structure of Ibuprofen Structure of Salicylic Acid Structure of Celecoxib Structure of Naproxen Structure of Rofecoxib Structure of Valdecoxib Intro and Background The inflammatory response is a normal function of the human immune system. This process helps repair the body after injury. When you get cut or hurt, the area usually becomes red, hot, and swollen. In part, this is caused by the immune system as it works to heal the damaged area of your body. This response brings nutrient rich blood to the area so injured tissues can be repaired and new cells can grow 35. Despite its normally positive function, research has shown that the human inflammatory response is important in controlling the environment of cancer cells. Inflammation can promote tumor angiogenesis, initiation, growth and metastasis. Cells of the immune system, such as macrophages, may also be negatively affected by inflammation. 36373839. Also, the same cells that are stimulated by the immune response to grow and replicate may malfunction and grow without proper regulation; this behavior may lead to the initiation of a cancerous growth. 40. Non-steroidal anti-inflammatory drugs interfere with the activity of a family of enzymes called cyclooxygenases (COX). COX inhibitors prevent the enzymes from producing chemical signals responsible for inflammation, pain and possibly tumor growth 41. There are two types of NSAIDs, grouped by the form of COX they inhibit (COX-1 or COX-2). NSAIDs are quite common and are commonly known as pain relievers [acetaminophen (Tylenol®), diclofenac (Voltaren®), ibuprofen (Advil® ), salicylic acid (Aspirin®), celecoxib (Celebrex®), naproxen (Aleve®), rofecoxib (Vioxx®), and valdecoxib (Bextra®)]. Aspirin is also taken for the prevention of heart disease. For this use, the average, safest, and most effective dose of aspirin usually recommended by doctors is 81 mg/day 42. Research suggests that NSAIDs are effective chemopreventative agents but significant negative effects have also been identified. Regular use of aspirin has been shown to reduce the risk of colorectal cancer and recurrent colorectal cancer in humans 43444145464748. Exactly how these drugs reduce cancer risk is still unclear but seems to be linked to their ability to block the cyclooxygenase (COX) enzymes.49 COX-1 inhibitors are associated with digestive problems such as excessive bleeding and ulcers.42 COX-2 inhibitors have recently come under scrutiny because they were identified as increasing the risk of heart attacks and strokes 50. Because of the risks associated with NSAIDs, only people at high risk of cancer are typically given these drugs as a preventative measure. Researchers are now working to identify the sub-population of people who should take NSAIDS to lower their risk of colon cancer. 51 Aspirin, a type of NSAID, has been documented in some cases to reduce the risk of certain cancers, notably colorectal cancer, and potentially cancers of the oesophagus, stomach, breast, ovary, and lung. Aspirin has also been shown to reduce the risk of Barrett's esophagus, a precursor to esophageal cancer.52. Though daily aspirin use has been shown to decrease cancer mortality,53 aspirin is nevertheless a drug, and long-term use may lead to other problems. Aspirin has even proposed to increase risk for kidney cancer 54 Studies have shown that individuals with an increased risk of colorectal cancer may be able to reduce recurrence of adenomas or advanced adenomas in the colon with the use of aspirin 55. However, its effectiveness in prevention may be dependent on its duration of use and the dose taken.5657 The long term use of aspirin has been documented to reduce the incidence of colorectal cancer. Long-term use was even associated with decreased abnormal methylation of genes related to cancer. 58In contrast, studies with smaller, short term usage have not yielded these results.5960 The US Preventative Services Task Force has concluded, though, that overall, taking aspirin to reduce the risk for colorectal cancer may be doing more harm than good for individuals with an average risk of developing colorectal cancer.61 More research is needed to determine if the benefits outweight the possible risks for people with an increased risk of colorectal cancer. In summary, aspirin has been shown to reduce the risk of developing colorectal cancer and adenomas, and reduce the chance of recurrence of colorectal cancer and adenomas in individuals with a history of colorectal cancer. However, taking aspirin for colorectal cancer prevention depends on an individual's risk of developing cancer; the possible negative effects of aspirin need to be weighed against its chemoprevention benefits. Results of studies on the ability of aspirin to reduce the risk of prostate cancer have been inconsistent.62 Some research indicates that aspirin may be able to reduce the level of prostate specific antigen (PSA) in individuals with latent cancer, and thus affect the detection of prostate cancer.63 Other research indicates that, as with colorectal cancer, the dosage and duration of aspirin intake may play a role in its protective effect 64. For example, researchers found that exposure to an average dose of at least 80 mg of aspirin for 8 years led to a decline of 18% in prostate cancer risk. However, one year after ending the 7 year regular aspirin intake, no protective effect was found. It is unclear whether aspirin reduces the risk of breast cancer. Some studies have found that aspirin use is associated with reduced risk for breast cancer 65, but others have found no significant reduction in risk with use of aspirin 64.It is possible that the effects are different for different types of breast cancer. For example, daily intake of aspirin was associated with reduction in risk for ER-positive breast cancer 64. Recent research also indicates that aspirin may prevent the metastasis of breast cancer 66. Low-dose aspirin may help reduce the risk of ovarian cancer, and could improve survival of women with ovarian cancer. By looking at information gathered by 13 different studies, involving 750,000 women, researchers showed that daily aspirin use reduced risk of ovarian cancer by 10%.67 A separate study, using information from the Nurse's Health Studies, found that daily aspirin users had up to a 30% improvement in their survival.68 US Food and Drug Administration Approval Celecoxib (Celebrex®) is the only NSAID that has been approved to treat cancer. It is used to reduce polyps for people with a rare genetic disorder (adenomatous polyposis)69. In 2007, the US Preventive Services Task Force recommended against the use of aspirin for the prevention of colorectal cancer.70 Raloxifene- Evista®, Keoxifene, Raloxifene Hydrochloride Structure of Tamoxifen Structure of Raloxifene Intro and Background Tamoxifen and Raloxifene are both prescription drugs that are structurally similar to the hormone estrogen. Tamoxifen was originally developed in the 1960s as a possible contraceptive. After it was found to be inneffective for this use, doctors began researching it as a way to fight estrogen stimulated cancers. 7172 In the 1970s, it was tested on late stage breast cancer and was found to be a potent treatment. In 1998, it was approved as the first chemopreventative agent for women with a high risk of breast cancer. 7273 Tamoxifen and Raloxifene are classified as selective estrogen receptor modulators (SERMs) because they are able to block a cell's response to estrogen. Tamoxifen is also known to trigger uterine cancer and blood clots that may block blood vessels (thromboemboli). Because of these negative side-effects, doctors suggest that only women with a high risk of breast cancer should take the drug as a preventative measure 7374. Early studies showed that breast cancer tumorogenesis was inhibited in rats treated with tamoxifen 75. In addition to the positive effects of tamoxifen, it has been found to increase the risk of endometrial and uterine cancers. This may be due to its ability to damage DNA in healthy cells 76. Both tamoxifen and raloxifene have both been shown to reduce the incidence of invasive breast cancer by as much as fifty percent in high risk women.77787980 US Food and Drug Administration Approval Tamoxifen was approved by the FDA for breast cancer treatment in 1977. Tamoxifen was subsequently approved as a way to help prevent surgically removed breast cancer from reoccurring as well to help prevent breast cancer in high risk women 72. Raloxifene has been approved by the FDA to help prevent and combat cancer and bone loss (osteoporosis). 8178 The prevention of cancer is the ultimate goal of cancer researchers and clinicians. One good way to accomplish this is to prevent infection with agents (viruses, bacteria, and parasites) known to cause cancer. Vaccines have been developed and approved to prevent infection with hepatitis B virus, a cause of liver cancer, and the human papillomavirus, the major cause of cervical cancer and a cause of cancers of the head/neck and urogenital tract of men and women. Learn more about the approved vaccines: The development of vaccines against HPV is a major step in the fight against cervical cancer. Currently, there are three vaccines approved for the prevention of infection with HPV, Gardasil®, Gardasil 9® and Cervarix®. Gardasil® is FDA approved for the prevention of HPV types 6, 11, 16 and 18 infection in young women aged 9-26. On October 16, 2009, the FDA also approved Gardasil® to prevent genital warts caused by HPV types 6 and 11 in young men aged 9-26.8283 In 2016, the CDC changed their recommendation for 11- to 12-year-olds, allowing them to take only two doses of HPV vaccine instead of three doses. People vaccinated at 15 through 26 years of age, still need to get three doses of of the vaccine.84 Cervarix® also prevents infection by HPV 16 and 18. Cervarix® was approved for use in the United States in October 2009.85 Importantly, the vaccinations are prophylactic and are not effective against the progression of pre-existing HPV infection or cervical dysplasia, and should not deter women from annual screening tests, especially since not all cancer causing (oncogenic) forms of HPV are included in the vaccines.8687 Watch the video to learn more about HPV vaccines. Click here to watch the full interview with Dr. Ira Horowitz. Because of exciting recent developments in this field, we will cover this treatment in more depth than some others and will discuss the development of the treatment The majority of cervical cancer is believed to be caused by the Human Papillomavirus (HPV). There are more than 100 variants (subtypes) of HPV but only a small subset are associated with human cancer. HPV subtypes 16 and 18 are the variants most commonly associated with human cervical cancer. Several characteristics of HPV make it a good target for vaccine development. The virus is simple, small, and has a stable genome. HPV vaccine development and clinical trials are currently underway. As discussed in the previous sections, the goal of vaccines is to increase the response of the immune system to particular antigens. The idea is that if our immune system 'sees' the protein again, it will respond very strongly. In the case of viruses, the immune system often reacts to the proteins on the outside of the virus particle. In a laboratory, it is possible to construct non-infectious virus-like particles (VLPs) that are similar to the infectious virus but are free of viral DNA and can therefore not reproduce. These VLPs contain viral proteins and are capable of generating the same natural humoral immune response following injection into the body. Two different VLP-based Human Papilloma Virus vaccines are at advanced stages of development/usage. The first preventative cancer vaccine to receive FDA approval was Gardasil®. Gardasil® was designed to prevent infection by four different subtypes of HPV (6, 11, 16, and 18). HPV types 6 and 11 together, cause 90% of the cases of genital warts while 16 and 18 combined, are responsible for 70% of cervical cancer cases. Gardasil® contains VLPs containing the capsid protein of each of these four strains of HPV. Gardasil® is produced by Merck Pharmaceuticals. The agent was approved by the FDA on June 8, 2006 for the prevention of cervical cancer (and genital warts) in females 9-26 years old and is being tested for its effectiveness in other age groups and in combination with other vaccines. On October 16th,2009 Gardasil® was approved for use in boys and men 9-26 years of age. Following positive phase I and II clinical trials, a total of 12,167 women, aged 16-26 years, enrolled in a phase III trial at 90 different study centers in Brazil, Colombia, Denmark, Finland, Iceland, Mexico, Norway, Peru, Poland, Singapore, Sweden, the United Kingdom and the United States. Of the more than 12,000 participants, 6,082 females received a three dose regimen of Gardasil while the remaining 6,075 received a placebo. The study evaluated the occurrence of HPV 16/18 associated cervical pre-cancers and non-invasive cancers. Specifically, participants were screened for moderate (2) and high (3) grade cervical intraepithelial neoplasia (CIN), Grade 3 CIN is also known as carcinoma in situ (CIS). CIS is an immediate precursor to invasive squamous cell cervical cancer. Participants were also examined for the occurrence of AIS adenocarcinoma in situ (AIS), a precursor to glandular cervical cancer. The results of the trial showed that Gardasil® prevented 100 percent of high-grade pre-cancer and non-invasive cancers associated with HPV 16/18. Gardasil® was also found to reduce the risk of developing high-grade pre-cancer and non-invasive cancer in women who may have violated the protocol or become infected with the virus during the time of the trial. The treatment received FDA approval in the summer of 2006.88899086 Building on the success of Gardasil®, a new vaccine was developed which protects against additional forms of the human papillomavirus. Gardasil 9® covers 9 HPV types, 4 of which are covered in the previously-approved Gardasil® and 5 of which are not covered by the previously-approved Gardasil®. The 5 additional HPV types are 31, 33, 45, 52, and 58, which are responsible for approximately 20% of cervical cancers. Gardasil®9 is administered as 3 separate shots: initial dose followed by a second dose 2 months after the initial dose and a third dose 6 months after the initial dose. In a clinical study conducted in the United States and overseas, approximately 14,000 participants (females ages 16 to 26) were either given Gardasil® or Gardasil®9. Gardasil®9 was found to be 97% effective at preventing the diseases caused by HPV types 31, 33, 45, 52, and 58. It was also found to be as effective as Gardasil® at preventing the diseases caused by HPV types 6, 11, 16, and 18. Commonly reported side effects include injection site pain, swelling, redness, and headache. Gardasil 9® is produced by Merck Pharmaceuticals. On December 10th of 2014, Gardasil 9® was approved for use in females 9-26 years of age and in males 9-15 years of age. In 2015, the vaccine was approved for males 9-15 years of age, and in 2016, a two-dose regimen was approved for individuals aged 9-1491 A second HPV vaccine, Cervarix®, produced by GlaxoSmithKline, was approved by the U.S. Food and Drug Administration (FDA) in October 2009 for use in girls age 10 to 25.81 The vaccine is designed to protect against infection by HPV types 16 and 18, these two subtypes of HPV are responsible for 70% of cervical cancer cases. In addition to two VLPs, the vaccine also contains chemicals (aluminum hydroxide and 3-deacylated monophosphoryl lipid A (AS04)) designed to increase the immune response to the viral proteins. A Phase III double-blind, placebo-controlled trial of Cervarix® was conducted with more than 1,100 women in North America and Brazil between the ages of 15 and 25. Those receiving Cervarix® received three doses of the vaccine over a six month period, similar to the manner in which Gardasil® is administered. Follow-up was conducted for 27 months. Researchers found a 92 percent efficacy rate against new infection and 100 percent protection against persistent HPV infection. The results also showed that AS04 helped the vaccine to elicit a stronger antibody response than would occur with natural infection.92 In 2016, Cervarix® was withdrawn from the U.S. market93 Chronic infection with hepatitis viruses is a major risk factor for the development of liver cancer. Both hepatitis B virus (HBV) and hepatitis C virus (HCV) are associated with liver cancer.9495 Gobally, infection with hepatitis B virus is extremely common, with an estimated 240 million people infected worldwide in 2005.96 A vaccine against hepatitis B virus was approved in 1981, making it the first cancer prevention vaccine.97 Today, babies in the US are routinely vaccinated against hepatitis B shortly after birth. It is also recommended that adults receive vaccinations against hepatitis B9899 There is no vaccine available to prevent infection with hepatitis C. |Drugs||NSAIDs, Tamoxifen, Raloxifene| |Phytochemicals||Anthocyanin, Curcumin, EGCG, Lycopene, Phytoestrogens, Pycnogenol, Resveratrol, Selenium, Vitamin E| |Biological Process Affected|| |Angiogenesis||Curcumin, EGCG, Resveratrol| |Apoptosis||Anthocyanin, Curcumin, EGCG, Lycopene, Resveratrol, Selenium| |Inflammation||Anthocyanin, Pycnogenol, NSAIDs| |Metastasis||Curcumin, NSAIDs, Vitamin E, Resveratrol| |Anthocyanin, Curcumin, EGCG, Lycopene, Phytoestrogens, Pycnogenol| |Proliferation||Anthocyanin, Curcumin, NSAIDs, EGCG, Selenium,| |Hormone Activity||Tamoxifen, Raloxifene| - 1. Littman AJ, Beresford SA, White E: The association of dietary fat and plant foods with endometrial cancer (United States). Cancer Causes Control 12 (8): 691-702, 2001 [PUBMED] - 2. McCann SE, Freudenheim JL, Marshall JR, et al.: Diet in the epidemiology of endometrial cancer in western New York (United States). Cancer Causes Control 11 (10): 965-74, 2000. [PUBMED] - 3. Howe GR, Benito E, Castelleto R, et al.: Dietary intake of fiber and decreased risk of cancers of the colon and rectum: evidence from the combined analysis of 13 case-control studies. J Natl Cancer Inst 84 (24): 1887-96, 1992. [PUBMED] - 4. Morse DE, Pendrys DG, Katz RV, et al.: Food group intake and the risk of oral epithelial dysplasia in a United States population. Cancer Causes Control 11 (8): 713-20, 2000. [PUBMED] - 5. Buiatti E, Palli D, Decarli A, et al.: A case-control study of gastric cancer and diet in Italy: II. Association with nutrients. Int J Cancer 45 (5): 896-901, 1990. [PUBMED] - 6. Neuhouser ML, Patterson RE, Thornquist MD, et al.: Fruits and vegetables are associated with lower lung cancer risk only in the placebo arm of the beta-carotene and retinol efficacy trial (CARET). Cancer Epidemiol Biomarkers Prev 12 (4): 350-8, 2003. [PUBMED] - 7. Fuchs CS, Giovannucci EL, Colditz GA, et al.: Dietary fiber and the risk of colorectal cancer and adenoma in women. N Engl J Med 340 (3): 169-76, 1999 [PUBMED] - 8. Michels KB, Edward Giovannucci, Joshipura KJ, et al.: Prospective study of fruit and vegetable consumption and incidence of colon and rectal cancers. J Natl Cancer Inst (2000) 92(21): 1740-52. [PUBMED] - 9. Jain MG, Rohan TE, Howe GR, et al.: A cohort study of nutritional factors and endometrial cancer. Eur J Epidemiol (2000) 16 (10): 899-905. [PUBMED] - 10. Friedenreich CM: Physical activity and cancer prevention: from observational to intervention research. Cancer Epidemiol Biomarkers Prev 10 (4): 287-301, 2001. [PUBMED] - 11. Schouten LJ, Goldbohm RA, van den Brandt PA: Anthropometry, physical activity, and endometrial cancer risk: results from the Netherlands Cohort Study. J Natl Cancer Inst 96 (21): 1635-8, 2004. [PUBMED] - 12. Vainio H, Weiderpass E. Fruit and Vegetables in Cancer Prevention. Nutrition and Cancer. (2006) 54(1):111-42 [PUBMED] - 13. Greenwald P, Anderson D, Nelson SA, Taylor PR. Clinical trials of vitamin and mineral supplements for cancer prevention. Am J Clin Nutr. (2007) 85(1):314S-317S. [PUBMED] - 14. Boffetta P, Pershagen G, Jöckel KH, et al.: Cigar and pipe smoking and lung cancer risk: a multicenter study from Europe. J Natl Cancer Inst 91 (8): 697-701, 1999 [PUBMED] - 15. Anthonisen NR, Skeans MA, Wise RA, et al.: The effects of a smoking cessation intervention on 14.5-year mortality: a randomized clinical trial. Ann Intern Med 142 (4): 233-9, 2005. [PUBMED] - 16. Koh HK: The end of the "tobacco and cancer" century. J Natl Cancer Inst 91 (8): 660-1, 1999. [PUBMED] - 17. a. b. Morimoto LM, White E, Chen Z, et al.: Obesity, body size, and risk of postmenopausal breast cancer: the Women's Health Initiative (United States). Cancer Causes Control 13 (8): 741-51, 2002. [PUBMED] - 18. Bagnardi V, Blangiardo M, La Vecchia C, et al.: Alcohol consumption and the risk of cancer: a meta-analysis. Alcohol Res Health 25 (4): 263-70, 2001 [PUBMED] - 19. Purdie DM, Green AC: Epidemiology of endometrial cancer. Best Pract Res Clin Obstet Gynaecol 15 (3): 341-54, 2001 [PUBMED] - 20. Bergström A, Pisani P, Tenet V, et al.: Overweight as an avoidable cause of cancer in Europe. Int J Cancer 91 (3): 421-30, 2001. [PUBMED] - 21. Preston DS, Stern RS: Nonmelanoma cancers of the skin. N Engl J Med 327 (23): 1649-62, 1992 [PUBMED] - 22. English DR, Armstrong BK, Kricker A, et al.: Case-control study of sun exposure and squamous cell carcinoma of the skin. Int J Cancer 77 (3): 347-53, 1998. [PUBMED] - 23. Czene K, Lichtenstein P, Hemminki K. Environmental and heritable causes of cancer among 9.6 million individuals in the Swedish Family-Cancer Database. Int J Cancer 2002;99:260266 [PUBMED] - 24. Lawrence H. Kushi, Tim Byers, Colleen Doyle, Elisa V. Bandera, Marji McCullough, Ted Gansler, Kimberly S. Andrews, Michael J. Thun and The American Cancer Society 2006 Nutrition and Physical Activity Guidelines Advisory Committee. CA Cancer J Clin (2006) 56; 254-281 [PUBMED] - 25. World Health Organization. Cancer Fact Sheet No. 297. February 2006. Accessed 2 June 2010. [http://www.who.int/mediacentre/factsheets/fs297/en/index.html] - 26. Calle EE, Rodriguez C, Walker-Thurmond K, Thun MJ. Overweight, obesity, and mortaily from cancer in a prospectively studied cohort of U.S. adults. N Engl J Med. (2003) 348: 1625-38 [PUBMED] - 27. Valcheva-Kuzmanova S.V., Belcheva A. Colon-available raspberry polyphenols exhibit anti-cancer effects on in vitro models of colon cancer. Journal of Carcinogenesis (2007) Apr 18; 6: 4 [PUBMED] - 28. Lin Y.G., Kunnumakkara A., et al. Curcumin Inhibits Tumor Growth and Angiogenesis in Ovarian Carcinoma by targeting the Nuclear Factor-ºB Pathway. Clin Cancer Res 2007 13: 3423-3430 [PUBMED] - 29. Yanase S, Yasuda K, Ishii N: Adaptive responses to oxidative damage in three mutants of Caenorhabditis elegans (age-1, mev-1 and daf-16) that affect life span. Mech Ageing Dev. (2002) 123:1579-1587 [PUBMED] - 30. Missirlis F, Phillips JP, Jackle H: Cooperative action of antioxidant defense systems in Drosophila. Curr Biol. (2001) 11:1272-1277 [PUBMED] - 31. a. b. c. Halliwell, Barry. (May 3, 2005) Free radicals and other reactive species in disease. In: Encyclopedia of Life Sciences. John Wiley & Sons, Ltd: Chichester http://www.els.net/ [doi:10.1038/npg.els.0006101] [http://www.els.net/ [doi:10.1038/npg.els.0006101]] - 32. Wang, H., X. Liu, M. Long, Y. Huang, L. Zhang, R. Zhang, Y. Zheng, X. Liao, Y. Wang, Q. Liao, W. Li, Z. Tang, Q. Tong, X. Wang, F. Fang, M. R. De La Vega, Q. Ouyang, D. D. Zhang, S. Yu, and H. Zheng. "NRF2 Activation by Antioxidant Antidiabetic Agents Accelerates Tumor Metastasis." Science Translational Medicine 8.334 (2016). [http://www.ncbi.nlm.nih.gov/pubmed/?term=NRF2+activation+by+antioxidant+antidiabetic+agents+accelerates+tumor+metastasis] [PUBMED] - 33. Ramsey MR, Sharpless NE: ROS as a tumour suppressor? Nat Cell Biol. (2006) 8: 1213-1215 [PUBMED] - 34. Irminger-Finger I. Science of cancer and aging. J Clin Oncol. 2007 May 10;25(14):1844-51 [PUBMED] - 35. Villarreal G, Zagorski J, Wahl Sm (January 29, 2003). Inflammation: Acute. In: ENCYCLOPEDIA OF LIFE SCIENCES. John Wiley & Sons, Ltd: Chichester [http://www.els.net/ [doi:10.1038/npg.els.0006101]] - 36. Fox JG, Wang TC. Inflammation, atrophy and gastric cancer. J Clin Invest. (2007) 117: 60-9 [PUBMED] - 37. Dobrovolskaia MA, Kozlov SV. Inflammation and cancer: when NF-ºB amalgamates the perilous partnership. Current Cancer Drug Targets. (2005) 5:325-44 [PUBMED] - 38. de Visser KE, Eichten A, Coussens LM. Paradoxical roles of the immune system during cancer development. Nature Reviews. Cancer. (2006) 6: 24-37. [PUBMED] - 39. MacDonald N. Cancer cachexia and targeting chronic inflammation: a unified approach to cancer treatment and palliative/supportive care. J Support Oncol. (2007) 5(4): 157-62 [PUBMED] - 40. Villarreal G, Zagorski J, Wahl Sm (January 29, 2003). Inflammation: Acute. In: ENCYCLOPEDIA OF LIFE SCIENCES. John Wiley & Sons, Ltd: Chichester [http://www.els.net/ [doi:10.1038/npg.els.0006101]] - 41. a. b. Baron JA, Cole BF, Sandler RS, et al. A randomized trial of aspirin to prevent colorectal adenomas. N Engl J Med (2003) 348: 891-9. [PUBMED] - 42. a. b. Campbell CL, Smyth S, Nontalescot G, Steinhubl SR. Aspirin dose for the prevention of cardiovascular disease: a systematic review. JAMA. (2007) 297(18): 2018-24 [PUBMED] - 43. Chan AT. Aspirin, non-steroidal anti-inflammatory drugs, and colorectal neoplasia: future challenges in chemoprevention. Cancer Causes Control (2003) 14: 413-8 [PUBMED] - 44. Bertagnolli MM. Chemoprevention of colorectal cancer with cyclooxygenase-2 inhibitors: two steps forward, one step back. Lancet Oncol. (2007) May;8(5):439-43. [PUBMED] - 45. Sandler RS, Halabi S, Baron JA, et al. A randomized trial of aspirin to prevent colorectal adenomas in patients with previous colorectal cancer. N Engl J Med (2003) 348: 883-90. [PUBMED] - 46. Bertagnolli MM, Eagle CJ, Zauber AG, et al. Celecoxib for the prevention of sporadic colorectal adenomas. N Engl J Med (2006) 355: 873-84 [PUBMED] - 47. Arber N, Eagle CJ, Spicak J, et al. Celecoxib for the prevention of colorectal adenomatous polyps. N Engl J Med (2006) 355: 885-95 [PUBMED] - 48. Leibowitz B, Qiu W, Buchanan ME, Zou F, Vernon P, Moyer MP, Yin XM, Schoen RE, Yu J, Zhang. BID mediates selective killing of APC-deficient cells in intestinal tumor suppression by nonsteroidal antiinflammatory drugs. Proc Natl Acad Sci U S A. 2014 Nov 18;111(46):16520-5. [PUBMED] - 49. Chan AT, Ogino S, Fuchs CS. Aspirin and the risk of colorectal cancer in relation to the expression of COX-2. N Engl J Med. (2007) 356(21): 2131-42. [PUBMED] - 50. Couzin J. Drug Safety. FDA panel urges caution on many anti-inflammatory drugs. Science. (2005) 307(5713): 1183-5 [PUBMED] - 51. Markowitz SD. Aspirin and colon cancer--targeting prevention? N Engl J Med. (2007) 356(21): 2195-8. [PUBMED] - 52. Omer ZB, Ananthakrishnan AN, Nattinger KJ, Cole EB, Lin JJ, Kong CY, Hur C. Aspirin Protects Against Barrett's Esophagus in a Multivariate Logistic Regression Analysis. Clin Gastroenterol Hepatol. 2012 Jul;10(7):722-7. Epub 2012 Mar 15. [PUBMED] - 53. Baron JA. Aspirin and cancer: trials and observational studies. J Natl Cancer Inst. 2012 Aug 22;104(16):1199-200. [PUBMED] - 54. Bosetti C, Gallus S, La Vecchia C. Aspirin and cancer risk: a summary review to 2007. Recent Results Cancer Res. 2009;181:231-51. [PUBMED] - 55. Cooper K, Squires H, Carroll C, Papaioannou D, Booth A, Logan RF, Maguire C, Hind D, Tappenden P. Chemoprevention of colorectal cancer: systematic review and economic evaluation. Health Technol Assess. 2010 Jun;14(32):1-206. [PUBMED] - 56. Chan AT, Giovannucci EL, Meyerhardt JA, et al. Aspirin dose and duration of use and risk of colorectal cancer in men. Gastroenterology 2008;134:21¿28. - 57. Chan AT, Giovannucci EL, Meyerhardt JA, et al. Long-term use of aspirin and nonsteroidal anti-inflammatory drugs and risk of colorectal cancer. JAMA 2005;294:914¿923. - 58. Noreen F, Röösli M, Gaj P, Pietrzak J, Weis S, Urfer P, Regula J, Schär P, Truninger K.Modulation of age- and cancer-associated DNA methylation change in the healthy colon by aspirin and lifestyle. J Natl Cancer Inst. 2014 Jun 28;106(7). [PUBMED] - 59. Cook NR, Lee IM, Gaziano JM, et al. Low-dose aspirin in the primary prevention of cancer: the Women¿s Health Study: a randomized controlled trial. JAMA 2005;294:47¿55. - 60. Gann PH, Manson JE, Glynn RJ, et al. Low-dose aspirin and incidence of colorectal tumors in a randomized trial. J Natl Cancer Inst 1993;85:1220¿1224. - 61. Chan AT, Giovannucci EL. Primary prevention of colorectal cancer. Gastroenterology. 2010 Jun;138(6):2029-2043.e10. [PUBMED] - 62. Brasky TM, Velicer CM, Kristal AR, Peters U, Potter JD, White E. Non-Steroidal Anti-Inflammatory Drugs and Prostate Cancer Risk in the VITamins And Lifestyle (VITAL) Cohort. Cancer Epidemiol Biomarkers Prev. 2010 Oct 8. [PUBMED] - 63. Fowke JH, Motley SS, Smith JA Jr, Cookson MS, Concepcion R, Chang SS, Byerly S. Association of nonsteroidal anti-inflammatory drugs, prostate specific antigen and prostate volume. J Urol. 2009 May;181(5):2064-70 [PUBMED] - 64. a. b. c. Takkouche B, Regueira-Méndez C, Etminan M.Breast cancer and use of nonsteroidal anti-inflammatory drugs: a meta-analysis. J Natl Cancer Inst. 2008 Oct 15;100(20):1439-47. [PUBMED] - 65. Zhao YS, Zhu S, Li XW, Wang F, Hu FL, Li DD, Zhang WC, Li X. Association between NSAIDs use and breast cancer risk: a systematic review and meta-analysis. Breast Cancer Res Treat. 2009 Sep;117(1):141-50. [PUBMED] - 66. Bhattacharyya M, Girish GV, Ghosh R, Chakraborty S, Sinha AK. Acetyl salicyclic acid (aspirin) improves synthesis of maspin and lowers incidence of metastasis in breast cancer patients. Cancer Sci. 2010 Oct;101(10):2105-9. [PUBMED] - 67. Trabert B, Poole EM, White E, Visvanathan K, Adami HO, Anderson GL, Brasky TM, Brinton LA, Fortner RT, Gaudet M, Hartge P, Hoffman-Bolton J, Jones M, Lacey JV Jr, Larsson SC, Mackenzie GG, Schouten LJ, Sandler DP, O'Brien K, Patel AV, Peters U, Prizment A, Robien K, Setiawan WV, Swerdlow A, van den Brandt PA, Weiderpass E, Wilkens LR, Wolk A, Wentzensen N, Tworoger SS; Ovarian Cancer Cohort Consortium (OC). Analgesic Use and Ovarian Cancer Risk: An Analysis in the Ovarian Cancer Cohort Consortium. J Natl Cancer Inst. 2018 May 31. doi: 10.1093/jnci/djy100. PubMed [PUBMED] - 68. Merritt MA, Rice MS, Barnard ME, Hankinson SE, Matulonis UA, Poole EM, Tworoger SS. Pre-diagnosis and post-diagnosis use of common analgesics and ovarian cancer prognosis (NHS/NHSII): a cohort study. Lancet Oncol. 2018 Jul 17. pii: S1470-2045(18)30373-5. doi: 10.1016/S1470-2045(18)30373-5. PubMed [PUBMED] - 69. US Food and Drug Adminstration website. Accessed 6/20/2016. [http://www.fda.gov/] - 70. Routine Aspirin or Nonsteroidal Anti-inflammatory Drugs for the Primary Prevention of Colorectal Cancer: U.S. Preventive Services Task Force Recommendation Statement. Annals of Internal Medicine. 2007 Mar;146(5):361-364. [http://www.uspreventiveservicestaskforce.org/uspstf/uspsasco.htm] - 71. Jordan VC . Tamoxifen: a most unlikely pioneering medicine. Nat Rev Drug Discov. (2003) 2: 205-13 [PUBMED] - 72. a. b. c. Wozniak K, Kolacinska A, Blasinska-Morawiec M, Morawiec-Bajda A, Morawiec Z, Zadrozny M, Blasiak J. The DNA-damaging potential of tamoxifen in breast cancer and normal cells. Arch Toxicol. (2007) 81(7): 519-27 [PUBMED] - 73. a. b. Jordan VC. SERMs: meeting the promise of multifunctional medicines. J Natl Cancer Inst. (2007) 99(5): 350-6. [PUBMED] - 74. Hu H, Jiang C, Ip C, Rustum YM, Lu J. Methylseleninic acid potentiates apoptosis induced by chemotherapeutic drugs in androgen-independent prostate cancer cells. Clinical Cancer Research (2005). 11: 2379-2388. [PUBMED] - 75. Jordan, V. C., Allen, K. E. & Dix, C. J. Pharmacology of tamoxifen in laboratory animals. Cancer Treat. Rep. (1980) 64: 745-759. [PUBMED] - 76. Poirier MC, Schild LJ. The genotoxicity of tamoxifen: extent and consequences. Mutagenesis. (2003) 18: 395399 [PUBMED] - 77. Cuzick J, Forbes J, Edwards R, et al. First results from the International Breast Cancer Intervention Study (IBIS-I): a randomized prevention trial. Lancet. (2002) 360:81724. [PUBMED] - 78. a. b. Richardson H, Johnston D, Pater J, Goss P. The National Cancer Institute of Canada Clinical Trials Group MAP.3 trial: an international breast cancer prevention trial. Curr Oncol. (2007) 14(3): 89-96 [PUBMED] - 79. Fisher B, Costantino JP, Wickerham DL, et al. Tamoxifen for prevention of breast cancer: report of the National Surgical Adjuvant Breast and Bowel Project P-1 Study. J Natl CancerInst (1998) 90: 1371-88 [PUBMED] - 80. Vogel VG, Costantino JP, Wickerham DL, et al. Effects of tamoxifen vs raloxifene on the risk of developing invasive breast cancer and other disease outcomesthe NSABP study of tamoxifen and raloxifene (STAR) P-2 trial. JAMA. (2006) 295: 272741. [PUBMED] - 81. a. b. US Food and Drug Administration. FDA Approves raloxifene to prevent osteoporosis. U.S. Department of Health and Human Services. Dec 10, 1997. [http://www.fda.gov/bbs/topics/ANSWERS/ANS00838.html] - 82. Markowitz LE, Dunne EF, Saraiya M, Lawson HW, Chesson H, Unger ER; Centers for Disease Control and Prevention (CDC); Advisory Committee on Immunization Practices (ACIP).Quadrivalent Human Papillomavirus Vaccine: Recommendations of the Advisory Committee on Immunization Practices (ACIP). MMWR Recomm Rep. 2007 Mar 23;56(RR-2):1-24. [PUBMED] - 83. U.S. Food and Drug Administration. News Release: FDA Approves New Indication for Gardasil to Prevent Genital Warts in Men and Boys. October 16, 2009. [http://www.fda.gov/NewsEvents/Newsroom/PressAnnouncements/ucm187003.htm] - 84. Centers for Disease Control and Prevention Newsroom. Accessed 11/1/2016. [http://www.cdc.gov/media/releases/2016/p1020-hpv-shots.html] - 85. Food and Drug and Administration Vaccines, Blood, & Biologics Accessed October 21st, 2009 [http://www.fda.gov/BiologicsBloodVaccines/Vaccines/ApprovedProducts/ucm186991.htm] - 86. a. b. Food and Drug and Administration Vaccines, Blood, & Biologics Accessed October 21st, 2009 [http://www.fda.gov/BiologicsBloodVaccines/Vaccines/ApprovedProducts/ucm186991.htm] - 87. Gardasil® Website Registered by Merck & Co., Inc. Site accessed 12/04/07 [http://www.gardasil.com/index.html] - 88. Lowndes CM. "Vaccines for cervical cancer." Epidemiology and Infection. (2006) 134: 1-12. [PUBMED] - 89. "Merck's investigational vaccine GARDASIL" prevented 100 percent of cervical pre-cancers and non-invasive cervical cancers associated with HPV types 16 and 18 in new clinical study." Merck website. Accessed 3 August 2006. [http://www.merck.com/newsroom/press_releases/research_and_development/2005_1006.html] - 90. Schmiedeskamp, MR and DR Kockler. "Human Papillomavirus vaccines." 2006, The Annals of Pharmacotherapy 40(7):1344-52 [PUBMED] - 91. FDA website https://www.fda.gov/biologicsbloodvaccines/vaccines/approvedproducts/ucm426445.htm Accessed 10-7-2017 - 92. Harper DM, et al. "Efficacy of a bivalent L1 virus-like particle vaccine in prevention of infection with human papillomavirus types 16 and 18 in young women: a randomized controlled trial." The Lancet (2004) Nov 13; 364:1757-65. [PUBMED] - 93. Mulcahy N. GSK’s HPV Vaccine, Cervarix, No Longer Available in US. Medscape. October 24, 2016 [LINK] - 94. El-Serag HB. Epidemiology of viral hepatitis and hepatocellular carcinoma. Gastroenterology. 2012 May;142(6):1264-1273.e1. [PUBMED] - 95. Perz JF, Armstrong GL, Farrington LA, Hutin YJ, Bell BP. The contributions of hepatitis B virus and hepatitis C virus infections to cirrhosis and primary liver cancer worldwide. J Hepatol. 2006 Oct;45(4):529-38. Epub 2006 Jun 23. [PUBMED] - 96. Vaccine. 2012 Mar 9;30(12):2212-9. Epub 2012 Jan 24. Global epidemiology of hepatitis B virus infection: new estimates of age-specific HBsAg seroprevalence and endemicity. Vaccine. 2012 Mar 9;30(12):2212-9. Epub 2012 Jan 24. [PUBMED] - 97. Centers for Disease Control and Prevention. Epidemiology and Prevention of Vaccine-Preventable Diseases. Atkinson W, Wolfe S, Hamborsky J, eds. 12th ed. Washington DC: Public Health Foundation, 2011. http://www.cdc.gov/vaccines/pubs/pinkbook/downloads/hepb.pdf Accessed July 20, 2011. [http://www.cdc.gov/vaccines/pubs/pinkbook/downloads/hepb.pdf] - 98. Mast EE, Margolis HS, Fiore AE, Brink EW, Goldstein ST, Wang SA, Moyer LA, Bell BP, Alter MJ; Advisory Committee on Immunization Practices (ACIP). A comprehensive immunization strategy to eliminate transmission of hepatitis B virus infection in the United States: recommendations of the Advisory Committee on Immunization Practices (ACIP) part 1: immunization of infants, children, and adolescents. MMWR Recomm Rep. 2005 Dec 23;54(RR-16):1-31. [PUBMED] - 99. Mast EE, Weinbaum CM, Fiore AE, Alter MJ, Bell BP, Finelli L, Rodewald LE, Douglas JM Jr, Janssen RS, Ward JW; Advisory Committee on Immunization Practices (ACIP) Centers for Disease Control and Prevention (CDC). A comprehensive immunization strategy to eliminate transmission of hepatitis B virus infection in the United States: recommendations of the Advisory Committee on Immunization Practices (ACIP) Part II: immunization of adults. MMWR Recomm Rep. 2006 Dec 8;55(RR-16):1-33; quiz CE1-4. [PUBMED]
<urn:uuid:3d1d2a47-6612-423a-89e3-b0b78c722a0f>
CC-MAIN-2019-35
https://www.cancerquest.org/index.php/patients/prevention
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330913.72/warc/CC-MAIN-20190826000512-20190826022512-00112.warc.gz
en
0.87261
12,399
3.640625
4
Greenland ice sheet breaks melting record - with four weeks left before warm season ends Melting over the Greenland ice sheet shattered the seasonal record last week – a full four weeks before the close of the melting season. Fears are growing about the impact of global warming on the Greenland tundra after Marco Tedesco, assistant professor of Earth and atmospheric sciences at The City College of New York, reported the record melt. The melting season in Greenland usually lasts from June – when the first puddles of meltwater appear – to early-September, when temperatures cool. Meltwater: A supraglacial lake over the Greenland ice sheet in the Kangerlussuaq area at 1500m elevation photographed on July 21, 2012 This year, cumulative melting by August 8 had already exceeded the record of 2010, taken over a full season, according to Professor Tedesco's ongoing analysis. 'With more yet to come in August, this year's overall melting will fall way above the old records. That's a goliath year – the greatest melt since satellite recording began in 1979,' said Professor Tedesco. This spells a change for the face of southern Greenland, he added, with the ice sheet thinning at its edges and lakes on top of glaciers proliferating. Professor Tedesco noted that these changes jibe with what most of the models predict – the difference is how quickly this seems to be happening. To quantify the changes, he calculated the duration and extent of melting throughout the season across the whole ice sheet, using data collected by microwave satellite sensors. This 'cumulative melting index' can be seen as a measure of the 'strength' of the melting season: the higher the index, the more melting has occurred. The index is defined as the number of days when melting occurs multiplied by the total area subject to melting. Dr Thomas Mote, Professor of Geography at the University of Georgia, confirmed that the cumulative melt in 2012 had surpassed that of 2010 using a similar analysis. The August 8 record differs from Nasa's announcement of unprecedented melting in mid-July, reported by Professor Tedesco and other researchers. Then, they found that the Greenland ice sheet had melted over 97 per cent of its surface. 'That event was exceptional in the sense that it was an extremely rare event,' said Professor Tedesco. 'Imagine Rio de Janeiro under a layer of snow and you get the idea.' The extreme melting detected in mid-July generated liquid water that refroze after a few days. 'This changed the physical properties of the snowpack – making a slushy layer that turned into an icy crust after refreezing – but very likely it did not add to the run-off of meltwater that makes sea levels rise,' the professor added. This pair of images released late July shows the extent of surface melt on Greenland's ice sheet on July 8, left, and July 12, right The cumulative melting index, on the other hand, does account for water flowing to the ocean. The same meltwater can affect ice dynamics by lubricating the base of the ice sheet and speeding its slide toward the sea. 'As far as we know now, the warming that we see in the Arctic is responsible for triggering processes that enhance melting and for the feedback mechanisms that keep it going' This year, Greenland experienced extreme melting in nearly every region – the west, north-west and north-east of the continent – but especially at high elevations. In most years, the ice and snow at high elevations in southern Greenland melt for a few days at most. This year it has already gone on for two months. 'We have to be careful because we are only talking about a couple of years and the history of Greenland happened over millennia,' cautioned Professor Tedesco. 'But as far as we know now, the warming that we see in the Arctic is responsible for triggering processes that enhance melting and for the feedback mechanisms that keep it going. 'Looking over the past few years, the exception has become part of the norm.' Most watched News videos - Shocking dashcam captured moment car turned and hit cyclist - Magic parker! Incredible video of driver getting out of space - Moment sex offender Matthew Falder is arrested in June 2015 - Nick Goepper and McRae Williams test out Olympic snow - This electric hypercar hits 0-60mph in UNDER two seconds - Substitute teacher flips middle school student over his back - KFC workers caught 'smuggling chicken' from a car by neighbour - Nikolas Cruz fights other students year before shooting - "Time traveler!" A man claims to have traveled to the year 5000 - 19-year-old Florida school shooting suspect appears in court - Theresa May tells This Morning she's getting on with the job - 'I thought I had the only key': Family on Cruz's gun safe
<urn:uuid:e81ac9f3-5e4c-4a54-a80f-0c595c546ddb>
CC-MAIN-2018-09
http://www.dailymail.co.uk/sciencetech/article-2189236/Greenland-ice-sheet-breaks-melting-record--weeks-left-warm-season-ends.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812959.48/warc/CC-MAIN-20180220125836-20180220145836-00298.warc.gz
en
0.946437
1,019
3.671875
4
The coming era of tracking goods and pets--and perhaps people--with radio-frequency identification (RFID) tags not only carries the danger of privacy violations, but also of new vectors for computer viruses, four computer scientists argued on Wednesday in a paper presented at the IEEE Conference on Pervasive Computing and Communications. The paper--dramatically titled Is your cat infected with a computer virus?--outlines the potential risks of exploit code and simple viruses using the typically less than 1KB of memory contained in everyday RFID tags. The data, when read by an RFID reader and saved to a backend database, could exploit vulnerabilities in the database, scripting languages, or the "glue code" that connects the reader to the database, according to the paper. The concerns come as privacy advocates and civil libertarians increasingly worry about the impact that RFID tags will have on society. Even though leaks of RFID data have already occurred, a variety of companies and government agencies--including the U.S. Department of Defense--are looking to track inventory and people with the tags. And while the debate rages over national identity cards, a national directory of RFID tags is in the works. While no specific vulnerabilities are outlined in the paper, other security experts have criticized RFID systems for their lack of precautions. An attacker could crash the database driving a supermarket checkout system, spread viruses through the RFID chips placed in pets for identification, and used luggage tags to disrupt airport security measures. Posted by: Robert Lemos
<urn:uuid:7b989ae6-9126-4fd3-a84b-b0c1ba1ada00>
CC-MAIN-2019-04
https://www.securityfocus.com/brief/163
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583662863.53/warc/CC-MAIN-20190119074836-20190119100836-00398.warc.gz
en
0.919105
309
2.703125
3
To a few cooking seems to be an innate skill but to others it is filled with dread and horror. Cooking need not be frightening. Here we will take a look at some of the chief cooking methods and show you how easy it really is. Once, you master one or two of these cooking techniques, you will then be enthused and confident to try some of the others. Just relax and enjoy it. From the oven to the fry pan. Frying is the method of cooking food in hot fat. Frying will give your food a appetizing golden brown color and a wonderful flavor - please keep in mind that nutritionist warn about too much oil in our diet from frying. This is the frying process where the food is totally immersed in hot fat. It needs to be very hot and generally cooks the food quickly. When deep frying you need an oil that can be heated to a high temperature without smoking - an oil with a high smoke point. Good oils for this are corn oil and soya bean oil but groundnut oil is the best. In order to deep fry foods successfully they need a protective coating to avoid drying out. The two most popular coatings are breadcrumbs and batter and these are most commonly used on fish, seafood, chicken and chips, with a new fad being the mars bar. You have probably seen this method of cooking performed many times before at your local store. A deep heavy pan is used to heat the oil and a wire basket used to lift the food out. Much care is need as the oil is extremely hot and it can be quite dangerous. Many house fires have been caused by the fat catching fire. For a safer option you can buy an electric deep-fryer with a thermostatic control. A safer alternative to deep frying is shallow frying. This frying method is similar but the oil is heated in a shallow pan. And instead of immersing the food in the oil the food is laid in the oil and cooked one side at a time. You can use vegetable oil such as corn oil and the thicker the food you are cooking the thicker the oil will need to be. The oil will need to be very hot other wise the food will absorb the fat and won't taste as good. Put the food in and cook one side, and then flip carefully using a slotted spoon or fish slice. Once cooked remove carefully from the oil, shake it gently to remove excess oil and drain on kitchen paper. Serve immediately while still hot. You can use this method of cooking for coated foods like fish cakes and crumbed meat, or for potato slices. Stir-frying refers to cooking a variety of foods together quickly in a pan. It is a very quick way of cooking small pieces of food in a healthy and appetizing way. It has been shown a lot on television in recent years and has become very popular. Generally a wok is used however a similar result can be achieved in your fry pan. For a successful stir fry you need to ensure all the ingredients are cut up into similar sizes, so that they will cook evenly. Prepare all the food in advance and have it ready because once, you start it won't take long to cook. Heat a little oil in the pan and make sure it is really hot before cooking. It is iThis is a modern more heath conscience method. It cooks the food quickly and easily. It is either done dry, for fatty foods like bacon and sausages or a small amount of oil is added for chops, steak, chicken etc. The pan is heated either with or without a little oil, the meat is added and cooked on one side and is then turned over and cooked on the other side until cooked through. The heat quickly seals the food and keeps it moist and tender. mportant to only cook small quantities at a time because you want the food to fry and not to steam. The most common foods cooked like this are:- thin strips of beef, pork, lamb, chicken; prawns; scallops; slices of fish; mixed with lots of vegetables - pak choi, cabbage, mushrooms, peppers, carrot, onion, zucchini and spring onions. Noodles are often added towards the end of the cooking time and since this method of cooking originated from the orient often flavors added are ginger, garlic, soy sauce and sesame oil. This method is similar to frying and evolved from stir-frying. Sautéing means 'moving' the food. The most common item sautéed is onions - fry the onions in a little oil in a frying pan but you keep stirring them. Because the onion is finely chopped it needs to be kept moving to prevent it from burning in the hot pan. For another even easier cooking method take a look at buying a crock pot. Article Source: http://EzineArticles.com/?expert=Lisa_Paterson
<urn:uuid:102c1db8-b630-4929-9880-ab5d26003068>
CC-MAIN-2019-18
http://chefjackie.com/recipes/cooking-methods/cooking-methods-part-2-of-3
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578613888.70/warc/CC-MAIN-20190423214818-20190424000818-00336.warc.gz
en
0.963494
1,009
2.515625
3
Spes the personified Hope of the Romans, was originally conceived of as the Hope of yearly harvests, for which reason she was represented with a wreath of flowers in her hair and ears of grain or a cornucopia in her hands. Subsequently she became the goddess of the marriage bed, and only at a later day Hope in an abstract sense. She was worshipped at Rome, where several temples were dedicated to her, the most ancient of which had been built by the consul Atilius. Calatinus, B.C. 354 (Livy, 2, 51, etc.; Tacit. Ann. 2, 49). The Greeks, too, worshipped Elpis, the personification of hope. When the different evils escaped from the Pandora box, Elpis alone remained behind for the consolation of mankind. See Hesiod, Op. et D. 96; Theognis, 570 sq.
<urn:uuid:565ada88-98ac-4a77-b163-70d1a5b879d5>
CC-MAIN-2018-51
https://www.biblicalcyclopedia.com/S/spes.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826842.56/warc/CC-MAIN-20181215083318-20181215105318-00586.warc.gz
en
0.981545
190
3.046875
3
The UCL Eastman Dental Institute Research published an article in the British Dental Journal based on the survey conducted among the Olympic and professional athletes belonging to 11 different sports. The survey included both the genders from the age of 18 to a limit of all practicing professionals. The participants were analyzed for the following: - Tooth decay. - Healthy gums. - Any surface changes on the teeth during a dental check-up. The evaluation also included a note of the practices followed by the athletes to maintain their oral hygiene. - Frequency of tooth brushing. - Use of oral hygiene aids. - Recent dental visit. - Recent dental service opted. - The reason for the dental visit opted. - Previously, obtained dental advice. The other oral hygiene aids include an electronic toothbrush, floss, Interdental brushes, fluoride mouthwash, and sugar-free chewing gums. Evaluation of oral health risk factors by checking for the following among the participants: - Use of tobacco products. - Diet with the frequency of sugar consumption. - Sports nutrition products. The results after the evaluation of more than 300 athletes revealed that 95% had the habit of brushing at least twice daily. While 45% of the total also used any one of the other oral hygiene aids like electronic toothbrush, floss, Interdental brushes, fluoride mouthwash, and sugar-free chewing gums. A marked compromise in the dietary habits with 97% reported having high levels of sugar consumption daily along with a regular diet. 86% have reported to the use of anyone form of sports nutrition products like energy drinks, bars or energy gels. Their intervals of visiting a dentist are poor as the recent visit to a dentist seems to be 6 months before the evaluation. 60% mentioned that they were advised by their dentist for the dietary modification in the last visit. The study concludes with a report of the incidence of oral diseases in elite athletes is equal to more than a normal population even with their good oral hygiene habits. They rule out the frequent use of sports nutrition products and increased dietary sugar consumption as the risk factors for the increased incidence of oral disease. It is reported that the attitude of athletes to adopt changes in their dietary habits and additional practices for the betterment of oral health is evident.
<urn:uuid:318d5691-df46-4eef-9d0d-cda9867d84cf>
CC-MAIN-2021-25
https://www.arundent.com/elite-athletes-facing-oral-diseases-despite-good-oral-hygiene-maintenance/
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487626122.27/warc/CC-MAIN-20210616220531-20210617010531-00335.warc.gz
en
0.947185
478
3.171875
3
OXNARD, Calif. (Feb. 19, 2018) — From fires and explosions to sharp objects, pathogens and dangerous chemicals, laboratories are home to a variety of hazards. To help promote lab safety, Workrite Uniform Company — a manufacturer of protective workwear, including lab coats — recommends following these safety tips. 1. ESTABLISH A COMPREHENSIVE SAFETY PROGRAM Based on the hazards in your laboratory and the applicable safety standards and regulations, determine the equipment, procedures, emergency protocols and environmental conditions that will best facilitate safety. Be sure to document the program and complete ongoing audits as needed. 2. CREATE A CULTURE OF SAFETY Once you’ve established a safety program, it is important to communicate all safety information clearly and ensure laboratory personnel and visitors fully understand the actions they need to take. Make sure that safety is treated as a top priority and that each individual has the safety resources they need and feels comfortable bringing up safety concerns. 3. FOLLOW SAFE WORK PRACTICES Outlining safety procedures is one thing — following them consistently is another. Even basics such as keeping food out of the lab, storing chemicals correctly, practicing good housekeeping in work areas and washing your hands can easily be forgotten. Remember that skipping a step even once can have devastating consequences. 4. USE THE PROPER PPE Personal protective equipment (PPE) can include lab coats, safety glasses or goggles, gloves, and beyond. Always ensure that the equipment you select is designed for the hazards present in your laboratory. For example, you may need lab coats that are flame-resistant (FR), offer chemical-splash protection (CP) or provide a combination of both (FR/CP). 5. REGULARLY RE-EVALUATE YOUR APPROACH Even if you have a strong safety program in place and have gone awhile without an accident, it is still important to be vigilant. Stay on the lookout for potential safety issues as well as new innovations in laboratory safety, and continue to improve your program over time. Workrite Uniform manufactures chemical-splash protection (CP) lab coats, flame-resistant (FR) lab coats and FR/CP lab coats that combine thermal and chemical-splash protection in a single garment.
<urn:uuid:f821a627-88c7-4dd9-b7c0-c5cc82d847dc>
CC-MAIN-2020-05
https://www.bulwark.com/top-5-safety-tips
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601241.42/warc/CC-MAIN-20200121014531-20200121043531-00428.warc.gz
en
0.917207
470
2.546875
3
Volcanoes and the Environment is a comprehensive and accessible text incorporating contributions from some of the world's authorities in volcanology. This book is an indispensable guide for those interested in how volcanism affects our planet's environment. It spans a wide variety of topics from geology to climatology and ecology; it also considers the economic and social impacts of volcanic activity on humans. Topics covered include how volcanoes shape the environment, their effect on the geological cycle, atmosphere and climate, impacts on health of living on active volcanoes, volcanism and early life, effects of eruptions on plant and animal life, large eruptions and mass extinctions, and the impact of volcanic disasters on the economy. This book is intended for students and researchers interested in environmental change from the fields of earth and environmental science, geography, ecology and social science. It will also interest policy makers and professionals working on natural hazards. Back to top Rent Volcanoes and the Environment 1st edition today, or search our site for Joan textbooks. Every textbook comes with a 21-day "Any Reason" guarantee. Published by Cambridge University Press.
<urn:uuid:38c85f0f-ce33-4007-93b0-45881b726066>
CC-MAIN-2015-35
http://www.chegg.com/textbooks/volcanoes-and-the-environment-1st-edition-9780521597258-0521597250
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440646249598.96/warc/CC-MAIN-20150827033049-00287-ip-10-171-96-226.ec2.internal.warc.gz
en
0.921303
227
3.515625
4
Organism: Borrelia burgdorferi; a bacterium that is transmitted to equines via Ixodes species ticks. The ticks will feed off a host mammal (most common is the deer and white-footed mouse), which is their natural host. They may ingest bacteria that are present in the blood of the mammal, becoming infected. When the tick then finds another host (i.e. an equine or human), they have the ability to infect the host with Borrelia burgdorferi bacteria. Clinical Signs: The most common clinical signs that horses show after becoming infected include lameness in more than one limb, behavioral changes, muscle soreness, lethargy, stiffness and lowgrade fever. The lameness may be a generalized lameness that shifts from one leg to another. Some horses appear stiff all over and are uncomfortable in general. Some owners report significant changes in the attitude of their horses. These horses may simply be unwilling to work, while others may become extremely aggressive toward other horses and/or humans. Each case will be slightly different and not all cases will have all of the above signs. This fact can make diagnosis more complicated. Diagnosis: Clinical signs are usually the first clue that a horse may have Lyme Disease. Because there are numerous causes of lameness in horses, this alone does not mean a horse has this disease. Definitive diagnosis is based on a blood test that detects the presence of antibodies in the horse’s blood. The blood test, however, may, in some cases, not distinguish between active infection and simply previous exposure to the bacterium. A more definitive test called the Western Blot is used to differentiate antibody resulting from infection to Borrelia burgdorferi vs other non-Lyme Borrelia burgdorferi is the spirochete that causes Lyme disease. spirochetes. It can take up to 2.5 months for antibody to appear after an intial infection. More rapid tests are being developed to help in these cases. Identifying Borrelia burgdorferi DNA in a sample of synovial membrane from the inside of a painful joint would indicate active infection. Your veterinarian can help sort through the information and he or she will try to piece together a puzzle that may include all or some of the following components of Lyme disease: - history of tick exposure - living in an endemic region for Lyme Disease - examination and other diagnostics (x-rays, blood work for other diseases, lameness evaluation, etc.) to eliminate Lyme Disease - positive blood test results for Lyme Disease - a positive response to Lyme Disease therapy Treatment: There are several ways to treat Lyme disease. The most common therapy includes four weeks of intravenous oxytetracycline. Alternatively, one week of IV oxytetracycline followed by 4 to 6 weeks of oral doxycycline may be used. At the conclusion of therapy, antibody levels are reassessed to see if the organism has successfully been cleared from the horses’ body. Some veterinarians may recommend an oral supplementation of a probiotic, which helps maintain the health of the horse’s gastrointestinal tract while on antibiotics, to try to combat possible development of diarrhea. Anti-inflammatory medication may also be a part of the treatment protocol. This will soothe some of the discomfort the horse feels caused by Lyme Disease. It is important to note that, although antibody levels in the blood may decrease after antibiotic therapy, recurrence of clinical signs is not uncommon in many horses. Repeat treatment may be needed in these horses. Any horse that has previously been treated for Lyme disease should go on a doxycycline prior to receiving steroids for any other reason. Prevention: Unlike most equine diseases, there is no equine-approved vaccine currently available for Lyme disease. The best prevention is tick control. By checking your horse daily for ticks, and safely removing them, you are taking a big step in avoiding Lyme Disease. If a tick is removed it should be identified to determine if it is an Ixodes spp. tick. Ixodes spp is the only species of tick in North America known to carry and transmit Lyme disease. If an Ixodes tick is removed, it may be beneficial to consider prophylactic antibiotic therapy. This should be discussed with your veterinarian. There are some commercial products that have been developed that contain the ingredient permethrin, which seems to be effective in repelling ticks. Being diligent about applying the repellant, in addition to routine checks of your horse’s body, should go a long way in preventing Borrelia burgdorferi infection. Keeping pasture grass mown will make the environment less hospitable for ticks. Try to remove brush, wood piles, etc. from pasture areas. This may help reduce some rodent nesting areas, which may help decrease tick populations. As always, if you suspect Lyme disease or any illness in your horse, consult your veterinarian for early diagnosis and treatment, as well as for advice on disease prevention.
<urn:uuid:6fe50229-f685-4717-9e85-59275a6afb8b>
CC-MAIN-2017-30
http://lamavt.com/LymeDisease.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426639.7/warc/CC-MAIN-20170726222036-20170727002036-00598.warc.gz
en
0.934347
1,040
3.5
4
Do you know what's the difference between different radio stations and newspapers/magazines? The radio we listen but the newspapers we read. Yes, that's right. The radio doesn't let us see pictures, but the papers don't let us get acquainted with the new charts hitting songs. This sounds reasonable too. What else? The papers we buy or subscribe to but the radio we can listen for free. The radio can be a background while we are doing all other things. A newspaper is a background only while we're having breakfast, probably one can say that for some people the breakfast is the background. But that's all isn't it. Let's speak about the diversity. How many printed mass media are there in your city? Plenty of them. You can't even name them all, if fact you have no idea about the existence of probably more than a half of them. You read a couple of them and that quite enough. But what about the radio. How many radio stations is there in you radio set. Well there are some. You probably don't know them all but some you can name. If you would feel a sudden need to learn about all the radio stations available on you radio set you could just roll through the tuning and find out: what frequency is occupied by each one radio station. Or in the Web there you'll find for sure a list if the radio stations which are available in your city or town. The reason is that the amount of radio frequencies is limited. At first let's see what radio frequency is. Leaving aside all the complicated scientific terms aside one could simply say that the radio frequency is one of the characteristics of an electromagnetic wave tightly correlated with the length of that wave. Radio transmitter based on a radio station generates those electromagnetic waves spreading around. Each one radio station has it's own frequency that's called bearing frequency. It's bearing the information about the sound which is encoded in it. Here come the AM and FM abbreviations which exactly mean amplitude and frequency modulations. It describes the way information is encoded in the bearing frequency ' either it modulated by the amplitude or by frequency. So why is the amount of those frequencies limited? Let's first see what are the others purposes of radio frequencies which aren't only supposed to deliver music to our radio set. Well those purposes are plenty. The air is filled with all those electromagnetic signals, and thanks god our senses don't perceive them without special electromagnetic devices. Those wireless devices are ' at first we should name TV-sets, then there are cell phones, satellite communication systems. On the shorter or longer than radio frequencies word such devices as for example TV-set remote-control boxes, cordless keyboards, mice, ear-phones, infrared (as can be seen from the name) ports of those cell phones and other devices. All the electromagnetic waves are divided in a few groups according to their length. As one understands the longer the wave the lower the frequency and the same on the contrary. The waves of a different frequency ranges are used in different purpose. For long waves are able to spread the signal on the long distances, yet the quality of the signal will be much worse than on the shorter waves. Local radio stations make use of the short waves and high radio frequencies. Your radio sets do catch the signal of the radio station while the tower of their transmitter is visible. That's why the further you drive in the country the less radio stations are available in your set, and when you are approaching to some other town your set starts catching the local radio stations of that town. A physicist would tell you that even the range of only short radio waves isn't physically limited. But if all the radio stations would start using any radio frequencies they like it would be probably impossible to listen to any of them because they would be hammering in a signal of one another. That's why people have arranged some rules of broadcasting including the pace in frequency between two neighbor radio stations. And that's why in the big cities all the FM frequencies are already developed, and that's why there exist all these contests for a frequency, procedures with getting a license on the frequency, prolonging that license.
<urn:uuid:f0b09ed6-7856-4c13-8dd0-d4aa84ff2ba3>
CC-MAIN-2013-48
http://www.syl.com/singles/radiofrequency.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164561235/warc/CC-MAIN-20131204134241-00042-ip-10-33-133-15.ec2.internal.warc.gz
en
0.967817
849
2.5625
3
Polar Icebreakers in A Changing World: An Assessment of U.S. Needs (September 2006)Report in Brief The United States has enduring national and strategic interests in the polar regions, including citizens living above the Arctic circle and three year-round scientific stations in the Antarctic. Polar icebreaking ships are needed to access both regions. Over the past several decades, the U.S. government has supported a fleet of four icebreakers -- three multi-mission U.S. Coast Guard ships (the POLAR SEA, POLAR STAR, and HEALY) and the National Science Foundation's PALMER, which is dedicated solely to scientific research. Today, the POLAR STAR and the POLAR SEA are at the end of their service lives, and a lack of funds and no plans for an extension of the program has put U.S. icebreaking capability at risk. This report concludes that the United States should continue to support its interests in the Arctic and Antarctic for multiple missions, including maintaining leadership in polar science. The report recommends that the United States immediately program, budget, design, and construct two new polar icebreakers to be operated by the U.S. Coast Guard. The POLAR SEA should remain mission capable and the POLAR STAR should remain available for reactivation until the new polar icebreakers enter service. The U.S. Coast Guard should be provided sufficient operations and maintenance budget to support an increased, regular, and influential presence in the Arctic, with support from other agencies. The report also calls for a Presidential Decision Directive to clearly align agency responsibilities and budgetary authorities.
<urn:uuid:b59b05e8-d609-4164-b37f-1eab05a137bf>
CC-MAIN-2017-26
http://dels.nas.edu/Materials/Report-In-Brief/4720-Polar-Icebreakers?bname=prb
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00219.warc.gz
en
0.942259
321
2.609375
3
For a long time, Objective-C has been the central protagonist, but since last few years, swift is taking it all over and evolving as the most popular brand for iOS app development technology. Though Swift is merely 4 years old language, as per the TIOBE programming community index, it has emerged as a faster-growing programming language. Since the introduction of Swift, Objective-C has seen downfall (from 2014 to 2018), in terms of ranking for programming languages. The confusion prevails to a great extent when it is to choose between these two dominants of app development arena. Here are 6 reasons why swift proves to be a better choice over Objective-C. - Swift programming language code is like a native English language and has a clean syntax which reduces the number of lines of code needed to implement a program thereby making it easier to understand than Objective-C - On a contrary, Objective-C has some complex syntax need to be followed and remembered. it becomes difficult and unfriendly to new programmers - Instead of two header files [header(.h), implementation (.m)] as required in Objective-C, Swift compels only one (.swift), which reduces maintenance - Objective-C is time-consuming as it requires manual synchronization of names and comments between files. Wherein Swift offers to invest time in improving the quality of their code, comments, and features - Swift adds an extra layer of quality control during code development which is not possible with Objective-C. Also, it takes the nil code and generates compiler error when there is falsification in code. Hence, fixing the errors while writing the code is possible with Swift - The playground feature helps create small programs that instantly shows the results of the written code. It allows developers to write and test the algorithms or any calculation without creating a real-time application - Swift avails more efficient memory usage with a reduced number of reference type data and SDK classes. Wherein, Objective-C consumes random access memory for object-link. Also, Swift introduced dynamic libraries to iOS that exist outside of the code and are uploaded only when required - Objective-C offers a stringent set of restrictions in terms of portability and user-friendliness Apple made Swift On the other hand, as an open source platform, Swift allow easy porting and more compatibility Objective-C and Swift share multiple similar components but Swift holds a whole new set of features, allowing developers to write safer, more reliable code. Though many developers and mobile app development companies are still using Objective-C, app market giants have started adopting Swift. VOLANSYS’ software development services include scalable mobile and web application design and development. With our foresight into next-generation software solutions and services, we help drive application transformation with our expertise in Mobility Solutions, Business Intelligence and Cloud Computing Services. If you are planning an iOS app development using swift, contact us at [email protected]. About Author: Bhavik Shah Bhavik is associated with Volansys as a Senior Mobile Engineer in Mobility division. He has 6+ years of experience in the development of distinctive native mobile applications. He possesses a splendid exposure in the design and development of mobile applications with SDLC and agile methodology. He plays a significant role during product life-cycle phases like Requirement Gathering and Specification, Application architecture, Software Designing, Development and Deployment
<urn:uuid:3c04004f-3900-4e77-9150-f578eda749d1>
CC-MAIN-2019-18
https://volansys.com/top-6-reasons-why-swift-is-winning-over-objective-c/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578759182.92/warc/CC-MAIN-20190426033614-20190426055330-00004.warc.gz
en
0.914878
691
2.5625
3
Definition - What does Submucosal Fibroid mean? Submucosal fibroids are non-cancerous growths that develop below the lining of the endometrium, which is the top layer of the uterus. These fibroids stick out into the uterine cavity. While there are several types of uterine fibroids, submucosal fibroids are unique for the location of their growth and the symptoms they incur. Of all uterine fibroids, submucosal fibroids are the least common, comprising just 5% of all cases. A complication of fibroids is infertility or recurrent pregnancy loss (RPL). FertilitySmarts explains Submucosal Fibroid Fibroids rarely cause noticeable symptoms. However, submucosal fibroids in certain locations, numbers, or size may incur: - Abnormal periods that are long or heavy - Severe cramping during periods - Bleeding in between periods - Frequent urination, bladder pressure - Abdominal pain There are a variety of treatments for submucosal fibroids, depending on the repercussions of their symptoms and a woman's interest in becoming pregnant. Treatment may include medical or surgical options based on the size, location, and the number of fibroids. However, once fibroids appear, it is possible they may grow back over time. Additionally, the removal procedure may incur additional fertility complications. Prior to any fibroid removal procedure, a woman should be aware of the possible outcomes.
<urn:uuid:29c16dde-2912-45b6-b407-809a56552355>
CC-MAIN-2019-39
https://www.fertilitysmarts.com/definition/715/submucosal-fibroid
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572934.73/warc/CC-MAIN-20190916200355-20190916222355-00517.warc.gz
en
0.928861
321
2.625
3
This week in history: The death of Prince Albert 14 December 2014 By Pan Macmillan 14 December 1861:The death of Prince Albert The German-born Prince Albert of Saxe-Coburg and Gotha and Queen Victoria of England, first cousins, married in 1840. The couple and their many children became the model of the Victorian family. The royal marriage was passionate and often tempestuous, with Victoria initially resisting, and then resenting, Albert’s attempts to involve himself in the affairs of state. But they remained devoted to one another. The British public were slower to warm to the Prince, but his energetic promotion of The Great Exhibition in 1851 won many over and in 1857 the Queen gave him the official title Prince Consort. The only real thorn in their marriage was their errant eldest son, Bertie, the future king Edward VII, whom the Queen looked upon as a half-wit and Albert felt lacked self-discipline. It was after visiting Bertie in Cambridge on a cold rainy day in late November 1861 that Albert caught a chill. He recovered, but was struck down again with severe stomach pains and developed a fever. Deteriorating quickly, he died at Windsor on 14 December 1861. He was 42. Typhoid was given as the official cause of death, though some now speculate that he may have been suffering from Crohn’s Disease, a condition unrecognised at that time. Victoria always blamed Bertie for Albert’s death, and once maintained that she could never look at her son ‘without a shudder.’ A formal period of mourning was expected, but Victoria refused to appear in public for three years, earning her the nickname ‘The Widow of Windsor’. For the remainder of her long reign she only wore black, and the room Albert died in was kept as a permanent shrine to his memory.
<urn:uuid:ddec86c0-1cbe-4e7d-b64e-eb42eceaba8a>
CC-MAIN-2017-22
https://www.panmacmillan.com/blogs/history/this-week-in-history-the-death-of-prince-albert
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612399.20/warc/CC-MAIN-20170529145935-20170529165935-00439.warc.gz
en
0.985549
386
3.140625
3
Environmental, Social, and Governance (ESG) Bonds is a term that covers a variety of green bonds,sustainable development bonds, and social bonds. The bonds inject funds into projects that have a positive impact on combating environmental or social challenges. ESG bonds are increasingly accepted by companies seeking to increase their sustainability credentials and profile. The sense of urgency about the effects of climate change is driving companies to alter their environmental and social footprints for investors to continue to hold them in their investment portfolios. The Environmental Social and Governance factors are a subset of non-financial performance indicators which include ethical, sustainable and corporate government issues such as making sure there are systems in place to ensure accountability and managing the corporation’s carbon footprint. Sustainable or ‘green’ bonds require the proceeds from their issuance to be used for sustainability-related purposes. The majority of green bonds to date target climate change. The World Bank is one of the largest issuers of green bonds globally. Categories of ESG-labeled bonds Following are the types of ESG Labeled Bonds: Green Bonds: Proceeds raised from a green bond are used toward projects and activities promoting a broad range of environmental objectives.Following are the types of Green bonds - Climate bonds: These target climate-change solutions such as mitigation- or adaptation-related projects and activities. - Blue bonds: These target projects in the “blue economy” — for example, development of marine energy or sustainable fisheries. - Transition bonds: These are for transition to cleaner fuels or energy sources, although not for zero-emission fuels. Social Bonds: These bonds funds projects that provide access to essential services, infrastructure and social programmes to underdeveloped people and societies. The goal of social bonds is to achieve positive social impact. Similar to green bonds, social bonds are often issued to address very specific and narrowly defined objectives. These include: - Covid Response Bonds: Issuance started in 2020 with proceeds used to strengthen health-care infrastructure and alleviate the economic losses caused by the pandemic. - Affordable-housing bonds: Issuance started in 2020 with proceeds used to strengthen health-care infrastructure and alleviate the economic losses caused by the pandemic. - Healthcare and Education bonds: Access to essential services such as healthcare and education. - Sustainability bonds: Green and social objectives are typically combined in sustainability bonds, with the proceeds going to projects or activities with either positive environmental or social impact, or both. Sustainability-linked bonds: Unlike the use of proceeds for green, social and sustainability bonds, proceeds raised from sustainability-linked bonds are used for general purposes. The coupon of sustainability-linked bonds is tied to the achievement of sustainability targets and failing to achieve them means the issuer is liable for an additional, pre-disclosed interest rate paid to the investors. SDG-Linked Bonds: These bonds enable issuers to raise capital by specifically committing and advancing to SDG-related targets. The World Bank has launched its first bonds linked to the SDGs through an initiative with BNP Paribas. - While investors now have a wide range of ESG-labeled bonds to select from, they need to conduct thorough due diligence – to analyze the specifics of each bond’s structure and to understand how it supports the overall sustainability strategy of the issuing company. - Securities labeled as environmental, social and governance (ESG) bonds will help create a better, more sustainable world. - Assessing an ESG-labeled bond means delving deeper than an issuer’s financials into the bond’s governing framework and its fit with the overall sustainability of the issuing company.
<urn:uuid:c4058870-2f3d-407a-bcb0-f9d68823f9fe>
CC-MAIN-2023-23
https://mcdberl.com/bonding-over-green-the-esg-bonds/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649193.79/warc/CC-MAIN-20230603101032-20230603131032-00547.warc.gz
en
0.920753
761
3.234375
3
World Big Animals Images Thus here comes the rundown of the main 10 most hazardous wild animals in the world Wild Animals 1. World big animals images. The African lion has staggering velocity well sharpened sharp paws and teeth to assault a conceivable prey. Shutterstock The largest living animal in the world is the blue whale Balaenoptera musculus a beast measuring upwards of 100 feet 30 meters long. African animal invitation african big five big 5 africa animals africa zebra cute watercolor cute safari watercolor africa big 5 illustration big animal big five safari animal. African lion wild cat. See big five animals stock video clips. Life Span 80 90 years. The Winged Whisperer of Ocean. Photo by Antelope Park 1. It has been an isolated Island for more than 70 million years. The 5 biggest marine animals in the world. The animals usually move in herds and congregate to fend off predators. It can span in length up to 35 ft. The majority of all plant and animal species found in Madagascar is found nowhere else in the world. Size 82 105 ft. All animals in the world in one picture. The amur leopard may be the rarest big cat on earth A to z animals is an online animal index that provides quick information about all the animals of the world along with pictures and videos. These five types of animals were named the big five by big game hunters from Africans colonial era as they were considered the most difficult and dangerous African beasts to. Thus this large Island became home to many unique species of animals and plants. - Cellular Respiration Equation And Photosynthesis - Cellular Respiration Meaning In Science - Cellular Respiration Equation Definition - Cellular Respiration Process In Order - Cellular Respiration Takes Place In Which Organelle - Charcoal Lab Puppies For Sale Mn - Cellular Respiration Takes Place Inside The - Chesapeake Bay Retriever Puppies For Sale Canada - Cell Membrane Is Made Up Of Which Component - Charity Christmas Cards Animals Uk - Cellular Respiration In Plants And Animals - Cell Membrane Is Made Up Of Mainly - Cellular Respiration Steps And Location - Cellular Respiration Equation Balanced - Charcoal Lab Puppies For Sale In Texas - Cellular Respiration Formula In Words - Cell Membrane Is Made Up Of Lipids And - Chihuahua Puppies Rescue Ct - Cell Membrane Location In Plant Cell - Cellular Respiration Process Requires
<urn:uuid:ce998cff-56eb-42ad-8410-39c675e0388e>
CC-MAIN-2023-50
https://animalwallpaperforphone.pages.dev/world-big-animals-images
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00313.warc.gz
en
0.841623
513
2.90625
3
Before using refrigerators became popular in our houses, food products had been stored in chunks of ice. And by the way, refrigerators and artificial ice are not a new invention. The first artificial ice was made as soon as in 1755 by William Cullen, a Scottish physician and chemist. It was also him who came up with the idea for cooling technology used in refrigerators till now. It is easy to calculate that 2005 was a 250th anniversary of the invention of artificial ice. As the years were passing, the ice became a product that is as necessary as bread. The only food product that is more important than bread is water. And water only differs from ice in its temperature. The better water we have, the better ice we get. Well, we, as consumers, are really worried about the quality of water that we get to use (and in most cases it is simply a pipe water from a city water intake system). If we do not trust the quality of water in our taps, how can we believe the quality of the “frozen water” that is made of it? Ice made this way has the flavour and smell of the water used to produce it. It is not very clear and absorbs all smells from our home freezers, where the ice is made. Such “strange” ice won’t even last long enough to cool the thing you are drinking. It will melt completely and change the flavour of a drink.
<urn:uuid:4fb5bc6c-0374-4624-a4b9-c1a132e589cf>
CC-MAIN-2020-29
http://ice.pl/en/about-us/technology
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657170639.97/warc/CC-MAIN-20200715164155-20200715194155-00078.warc.gz
en
0.985926
298
2.828125
3
Anthropomorphism, or personification, is attribution of human form or other characteristics to anything other than a human being (wikipedia). The term implies a practice within the domain of cultural and artistic expression. Personification happening these days yet has anything but to do with storytelling. Just as corporations cannot be granted the rights of citizens, the citizen cannot be de-personified or ‘metamorphed’ into a consumer subject. Citizens are not consumers and corporations are not citizens, but fully commercial entities. Citizen denotes man entitled to dissenting judgment and acting upon it, among other rights. Whereas consumer does not entail any recognition of man or ‘individual’ as such. It solely refers to a single state of activity (consuming), which the party is by default expected and subdued to do. The word ‘consumer’ is the definition of man in terms of his relevance to a corporation. He is meant to receive. He is the passive king (!) whose crown was forged by ad business, out of this passivity; just lie back and be served like a king. Ceaselessly bombarded images, personas, statements, experiences offer royal modes of living and behaviour to adopt and stick around forever in the delusion kingdom. This is certainly not to the well-being of the man or society, however just as certainly good for the corporation’s faring – therefore it wishes more people to be transformed into the same state and go on to exist in there. That’s but one instance of why the corporation is not the citizen or the society; it has not only totally separate, but antithetical interests to the latter, too. The consumer-corporation plain is devoid of the questioning of this staged kingdom, nor of latter’s practices or very existence; it inherently excludes from the picture all that lies outside the sphere of a transaction between the two. Thereby the ideological overemphasis on the word consumer instead of citizen is meant to neatly rule out any frictional surface in the talks over matters. It may take pumping of gallons of fake individuality into his ego to rape the mind of man, so that he voluntarily gives up his entitlement to informed citizenship, and joins the royal party. Though corporation may be expecting its citizen-like dressing up to go unnoticed, be ignored or even lured into, counting on a system spawning atomized individuals and glorifying self-seeking ‘economic individualists’ for whom fellow citizens are insignificant if they are not business partners, competitors, potential clients or matters of any tangible interest, things hardly work that way, and it does receive a considerable number of unwelcoming regards. Said system, capitalism, is born out of and dependent on the alienation of man to man (the system was originally named ‘economic individualism’. The socialists disparagingly called it ‘capitalism’ and it stuck), and through these spaces of vacuum in citizens’ own and joint affairs, the corporation attempts to sneak in to mimic (complementing) authentic elements from the life of individual or society. Wherever members of a community have strong relationships and a vibrant culture of living together prevails, this kind of mimicry immediately sticks out and does not get bought into, with citizens knowing themselves are not manipulable consumers, and that corporations are corporations, never to be regarded as one like themselves. Period.
<urn:uuid:bcd413bd-5734-424e-9f62-5565b27f2c9e>
CC-MAIN-2017-30
https://blogntackle.wordpress.com/2014/07/17/depersonification/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549436321.71/warc/CC-MAIN-20170728022449-20170728042449-00111.warc.gz
en
0.952076
694
2.515625
3
A steam generator boiler uses a single tube coil instead of many smaller diameter boiler tubes. The generator forces the flow of hot water through the tube to convert it to steam during a single pass through the coil. The water containing coils go around the steam generator. The furnace heats the water, circulating down through the coiled tube. While traveling down, it turns to steam as it heats, and exits the boiler in a concentrated stream at a point at the bottom of the tube. - It is generally less potent than a full boiler but it is easier to operate. - These generators are also smaller, making them more versatile when there is limited space available. - They are often used as auxiliary boilers because they start up very quickly, and in applications with very low load factors. - These boilers have a compact design, single water tube, and relatively lower water content. Consequently, they can be up and running at full power in a much shorter amount of time than larger boilers. As a result, they are useful in emergency and quick demand situations. - They generally cost less than larger boilers. For this reason, they may be more cost-appropriate for applications that do not necessarily require such high levels of steam. - They perform well at part loads and respond quickly to changes in loads. As a result, they dramatically increase part load operating efficiency. - The fact that they do not have pressure vessels means that in most locations, they do not require a boiler operator. - A steam generator boiler is useful where it can give operational efficiency because it costs around 50% more for the same horsepower output than larger boilers. For more information about steam generator boilers, ask our steam team here. Sources: Superior Boiler
<urn:uuid:2f99d936-0ee0-40a5-b1fc-ede5d9d9f650>
CC-MAIN-2023-40
https://teemselectric.com/blog/what-is-a-steam-generator-boiler/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506423.70/warc/CC-MAIN-20230922202444-20230922232444-00265.warc.gz
en
0.947915
363
3.3125
3
Strategy in Peace and War Historical knowledge of theories of diplomacy and warfare Students will understand and be able to explain and analyze the forms, politics, theories, and legacy of diplomacy and warfare. Analysis of primary and secondary source texts Students will understand how to use and will be able to analyze and interpret primary source documents and secondary historiographical works. Students will be able to analyze, interpret, and devate with their peers in a classroom setting the meanings and historical value of theory, primary source texts, agency, and historical context. Students will be able to analyze historical questions and place them in a historiographical context.
<urn:uuid:562c60b2-4fcf-48ec-b9af-095d2451e4d8>
CC-MAIN-2019-22
http://catalog2017.byu.edu/family-home-and-social-sciences/history/strategy-peace-and-war
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256163.40/warc/CC-MAIN-20190520222102-20190521004102-00154.warc.gz
en
0.895091
131
3.421875
3
Focus: creation news and views Beetle bifocals beat boffins Wikipedia.org: Trisha Shears University of Cincinnati biologists have discovered remarkable eyes in the humble larva of the sunburst diving beetle (Thermonectus marmoratus). Four of the larva’s 12 eyes had “the first demonstration of truly bifocal lenses in the extant animal kingdom”. Furthermore, these tube-shaped eyes avoid a problem of man-made bifocals, where the sharp “first image is more ‘contaminated’ by the blurry second image.” The larva’s bifocal eyes each have two retinas and two focal planes, so the images don’t interfere with each other. This unique “design” allows them to “focus far and near objects in individual retinas” simultaneously. This helps them to catch their favourite prey, mosquito larvae, by quickly switching from far to near vision on their target. The lead author, Annette Stowasser, says that she at first thought she had made a mistake as it was her first research project, so they “did additional research to try to kill the hypothesis.” But they meticulously ruled out many plausible alternatives. She adds, “The discovery could also have uses for any imaging technology.” - Current Biology 20(16):1482–1486, 24 August 2010. - University of Cincinnati News, www.uc.edu, 23 August 2010. Thinking inside the Square Kharkov, the second largest city in the Ukraine, hosted a free exhibition of dinosaurs from Austria for several weeks in Lenin Square in mid-2010. Accompanying the dinosaur models were life-size mammoths, cave bears and cave men. The display was lacking in information, so long-time friend of CMI, Sergei Golovin (see Creation 22(4):24–27, 2000; creation.com/golovin), and his Ukrainian team of biblical creationists (from their Christian Center for Science and Apologetics) stepped in. They sought, and were given, permission to distribute free information to people who attended the display—right next to a statue of Lenin, the fiercely atheistic patriarch of now-defunct Soviet communism. Some years back, this group had taken the opportunity to translate some of CMI’s material—in particular a small booklet on dinosaurs. Those in stock were quickly distributed and a reprint ordered. Sergei tells of the many opportunities this display gave for sharing the gospel message. ‘God thoughts’ reduce stress for believers Psychologists in Canada studied patterns of brain activity in people given a stressful task to do. The subjects for the study were first given an exercise where they thought about God or a more neutral subject. Those who believed in God and were thinking ‘God thoughts’ showed less anxiety during the stressful task, whereas it did not help those who were atheists. For the atheists, ‘God thoughts’, induced consciously or unconsciously, actually increased activity in parts of the brain associated with anxiety. This of course would not surprise Christians. The “aroma of Christ” is to believers “a fragrance from life to life” but to unbelievers “a fragrance from death to death” (2 Corinthians 2:15, 16). - “Brain study shows that thinking about God reduces distress—but only for believers”, www.physorg.com, August 2010. Giant lizard diet surprise The monitor lizards include the Australian goanna, and Indonesia’s renowned Komodo dragon, the largest living land reptile at three metres (ten feet) in length. All known monitors (of the family Varanidae) are carnivores; many monitors eat other lizards; Komodo dragons also hunt and eat pigs, deer, horses and water buffalo—and even each other. Now a new species of monitor has been discovered which is an impressive two-thirds the length of the huge Komodo. The big lizard, found in hitherto unexplored forests on the Philippines island of Luzon, is covered in bright yellow spots. Unlike other monitors, though, this type survives happily on a diet of fruit. When contemplating the possible ways that carnivory, absent in the pre-Fall world, could have entered the world after Adam sinned, it’s always of interest to come across either a member of a herbivorous group which has taken up flesh-eating, or as in this case, a member of a group thought to be exclusively meat-eating is shown to be (still?) vegetarian. See more in-depth discussion in Chapter 6 of CMI’s The Creation Answers Book, addresses p.2. - New Scientist, 10 April 2010, p. 7. Shrinking dino numbers How could Noah fit all the dinosaurs on the Ark? Very easily, as shown by the thoroughly documented book Noah’s Ark: A Feasibility Study (addresses p.2). And discoveries since the book was published make it even easier. For example, dinosaurs went through a sharp growth spurt. This means that Noah didn’t need to take a pair of fully grown 30-ton Apatosaurus. Instead, he could have taken a pair of 4-year-old, one-ton specimens; a year later, they would be hardly any bigger, but after they disembarked, they would grow fast and their full mass of 25–30 tons by the age of 12–13 (Creation 28(1):44–47, 2005; creation.com/dinogrowth). Also, many dinosaur types have been shown to be younger versions of differently-named dinos. For example, Mussaurus was a baby Coloradisaurus; Nanotyrannus was a young T. rex; and Dracorex and Strygimoloch were just juvenile forms of Pachycephalosaurus. Similarly, Lesothosaurus diagnosticus was thought to be not only a different species, but even a different genus to Stormbergia dangershoek, about twice as long and probably three to four times heavier. Both are ornischians or ‘bird-hipped’ dinosaurs. But a closer look has led researchers to conclude that they are in fact one and the same, with one being smaller because it was still younger than the other. Naturally, Noah wouldn’t have needed to take all the different stages of growth of the same dino, but only adolescent specimens. See creation.com/dino-puberty-blues. Now, this has even affected the iconic dino Triceratops, known for its three horns and bony frill. A less famous dino, Torosaurus, shared the three horns but had a much longer skull, with two large holes. But new research indicates that Torosaurus was really a mature Triceratops. No young torosaurs have been found, and the older Triceratops specimens have noticeable thinning in the frill right where the torosaur holes are. Since Triceratops was the first named of the two, its name still stands, while Torosaurus must be abolished as a valid name. So Noah’s task is now shown to be easier still. - Tiny dinosaur creates paleontology puzzle, discovery.com, 4 January 2010. - Journal of Vertebrate Paleontology 30(4):1157–1168, 2010. - New Scientist 207(2771):6–7, 2010. Shellfish inspire materials scientists Certain shellfish produce an iridescent material that is very strong, lightweight and resilient, as an inner shell layer, known as nacre (see also Creation 30(1):44–45, 2007; creation.com/amazing-abalone-armour). Researchers at the Helsinki University of Technology have now developed a nacre-inspired composite material which they expect to be used by the electronics industry as an insulator that is strong, flexible, lightweight and fire resistant. This is yet another example of engineers being inspired by (and seeking to copy) God’s designs—for more, see creation.com/biomimetics. - Nano Letters, doi: 10.1021/nl1003224, 10 March 2010. Splicing code is amazingly complex The 20,000–25,000 protein-coding genes in the human genome are used to create over 100,000 distinct proteins through a process called “alternate splicing”. This is a brilliant design concept that allows for a minimal number of genes to produce a maximum number of proteins by re-using different parts of various genes in complex combinations. Until recently, the process of how this occurs was mostly a mystery, but a new study claims to have discovered the beginning of the splicing code. What researchers found is a marvel of complexity. They found many ‘motifs’ (short DNA words of 5–10 letters each) that could be used to explain about 60% of the alternate splicing patterns found in the human genome, including the proteins that are found at different stages of development and in different cell types. Depending on cell type, 12–19 different motifs were associated with each piece to be spliced. This means the splicing code is complex, and that complex combinations of instructions are needed to control the combinations that lead to the multitude of proteins found in the human body. They also documented features much further into non-coding regions than previously known (up to 300 letters away). Thus, even more “junk” DNA has been subsumed into the functional DNA category! To summarize, even though gene scientists have only scratched the surface, they have already discovered amazing complexity. God wrote a genetic computer program that is, to date, unsurpassed by any human technology. His program is a wonder of data compression and efficiency. It is more sophisticated than anything we have ever contemplated. For more on this see creation.com/splicing. - Gene counters struggle to get the right answer, Science 301(5636):1040–1041, 2003. - Deciphering the splicing code, Nature 465(7294):53–59, 2010. Vertebrates not ‘one blood’ after all According to evolutionary dogma, once upon an eon, all vertebrates shared the same blood. But not anymore. A paper recently published in the prestigious Proceedings of the National Academy of Sciences (USA) claims hemoglobin (the complex oxygen-transport protein that gives blood its red colour) evolved not once, but twice—completely independently of each other. Scientists analyzed the genes of jawless and jawed vertebrates and concluded these two groups used completely different proteins as templates for their different types of hemoglobin. The old evolutionary tale was much simpler and much more likely to happen (if evolution could happen). This new tale is called convergence—when two unrelated creatures share a similar trait. The trait therefore had to evolve twice. Evolving hemoglobin once by random mutation and selection is already stretching credulity to the limit, but twice … ? Similar ‘convergences’ are found repeatedly throughout life, with more and more instances uncovered all the time. This undermines evolution because it unites living things in a way that can’t be explained by common descent. Rather, it speaks of a single Creator of life, who made all things to resist evolutionary explanations. - Proceedings of the National Academy of Sciences (USA), doi: 10.1073/pnas.1006756107, 26 July 2010. - Biologists find that red-blooded vertebrates evolved twice, independently, www.physorg.com, 27 July 2010. Stop press: Ararat Ark hoax claims A team from Hong Kong known as Noah’s Ark Ministries International, or NAMI, claims to have found Noah’s Ark under the ice high up on Mt Ararat, and has shown video footage to the world of rooms lined with wood. From the beginning, rumours circulated that NAMI had been the victim of a hoax perpetrated by the guide who led them to the site. CMI had been invited to join NAMI’s research and news conferences in Turkey. Before committing the ministry to this, CMI’s Dr Carl Wieland flew to Hong Kong to meet with the team who had been on the site. He became convinced that a hoax was likely, and we published this on creation.com. Another Ararat Ark-searcher, Randall Price, who claims to have located an interesting anomaly under the ice elsewhere on Ararat, has now accessed the NAMI site and sampled the wood from the rooms. He states that he has had the wood dated as modern. Some of the planks bear markings like those made by modern high-speed rotary planing machines. The outside of the wood has apparently been artificially blackened with ash and heat, but the inside looks fresh. Price has also video-taped an interview with a person who claims to have assisted in the construction at the site to fool NAMI. Leading creation ministries have long thought that Mt Ararat itself, an active post-Flood volcano, is a most unlikely landing spot. The Bible talks of the mountains of Urartu/Ararat, a sizeable geographic region. ‘Relabelled’ ants are wasps—and evolution doesn’t figure Insect fossils in rocks (allegedly “34 million years old”) found on the Isle of Wight in the 1920s and labelled as ancient ants, have been shown to be, instead, fig wasps—and identical to those alive today. Fig wasps are very specialized creatures which have a complex relationship with their fig tree hosts, which use them to spread their pollen. There are some 800 species of fig tree today, and each is pollinated by just one (sometimes two) of the many hundreds of species of this wasp (which would have descended from an original created kind). And in turn, these one or two wasp species are uninterested in any of the hundreds of other species of this kind of tree. Such specialization and diversification (of both the wasps and the figs, which likewise descended from the same kind) would have happened quickly, aided by natural selection, soon after creation. But all of hundreds of today’s species of this particular wasp kind have features (presumably present in the ancestral kind) suggesting deliberate design for getting into the ‘hidden’ flowers in the green ‘fig fruits’. (These ‘fruits’ are really structures—called synconia—that contain a lot of tiny flowers). This includes their body shape, and special tiny pockets for carrying the pollen beneath their 1.5 mm-long bodies. A team led by Steve Compton from the University of Leeds, UK, confirmed the identification. They found not only the same sorts of specialized structures for laying the wasp’s eggs within the ‘fruit’, but also the same pollen pockets, even identifying grains of fig pollen within them—and also in a fig wasp in Dominican amber (“20 million years”)—also identical to modern ones. Compton stated that this was “an example of something remaining unchanged for tens of millions of years”—i.e. still more of the oxymoronic “evolutionary stasis”. - World’s oldest fig wasp fossil proves that if it works, don’t change it, www.sciencecentric.com, 16 June 2010. Mothers’ marvellous milk Scientists at the University of California have discovered yet another way that mother’s milk benefits babies. About 21% of the milk early in lactation is indigestible. This part comprises special sugars that have two roles. Firstly, the sugars are like those on the surface of human cells to which disease-causing microbes attach to infect them. This means that if the baby ingests any nasty germs, they attach to the sugar complex in the milk instead of infecting the baby. Secondly, this part of the milk feeds special bacteria, which can digest the sugars, in the gut of the baby. These bacteria produce a coating on the baby’s gut, protecting it from harmful microbes. Breast-fed babies presumably acquire the special strain of Bifidobacterium from the mother, but the scientists have not been able to find it in mothers, although adults have other strains of the microbe. Just where it hides and how the mother transfers it to her baby are unknown. One of the researchers described milk as “an astonishing product of evolution”, but it seems more like a testimony to masterful design by our Creator. - Breast Milk Sugars Give Infants a Protective Coat, www.nytimes.com, 3 August 2010. A story of two brothers Christopher Hitchens is an English-American journalist and atheist probably best known for his 2007 book God is not Great. His brother, Peter, also a journalist, was also once an atheist, but he has chosen instead to believe the Christian gospel. Peter recently wrote: “Being Christian is one thing. Fighting for a cause is another, and much easier to acknowledge—for in recent times it has grown clear that the Christian religion is threatened with a dangerous defeat by secular forces which have never been so confident. “Why is there such a fury against religion now? Because religion is the one reliable force that stands in the way of the power of the strong over the weak. The one reliable force that forms the foundation of the concept of the rule of law. The one reliable force that restrains the hand of the man of power. In an age of power-worship, the Christian religion has become the principal obstacle to the desire of earthly utopians for absolute power. “While I was making my gradual, hesitant way back to the altar-rail, my brother Christopher’s passion against God grew more virulent and confident. As he has become more certain about the non-existence of God, I have become more convinced we cannot know such a thing in the way that we know anything else, and so must choose whether to believe or not. I think it better by far to believe.” - “How I found God and peace with my atheist brother”, hitchensblog.mailonsunday.co.uk, 11 March 2010. Soaking up the genetic facts So your relative or friend makes a habit of sponging off of you? Relax, they’re probably just expressing their genes. According to a report by Australia’s national broadcaster, the ABC, an international team has sequenced the genomes of marine sponges from the Great Barrier Reef in Queensland, Australia. The report names University of Queensland Professor Bernard Degnan as the scientist who “has discovered sea sponges share almost 70 per cent of genes with humans”. So next time someone tries to imply that chimps are 90% (or whatever the latest figure is) human because they share 90% of their genes, why not ask them if they believe by the same logic that sponges are 70% human? What this highlights is the immense ingenuity of nature’s Master Designer, and the increasingly obvious subtlety of the genetic code (see Creation 30(2):42–44, 2008; creation.com/splicing). To be able to have end products with such variety and complexity as separates university professors from sea sponges from a few thousand commonly used themes at the basic code level is nothing short of astonishing. - Researchers find sea sponges share 70pc human genes, www.abc.net.au/news, 5 August 2010. Fast fish changes—a sticking point? A paper recently published in Proceedings of the Royal Society B documents the rapid “evolution” of cold tolerance in saltwater stickleback fish. In three generations, the populations had adapted tolerance to water 2.5°C lower than their ancestors. This example of “evolution” is nothing more than natural selection. Natural selection culls already-existing information, which of itself adds nothing new. So it is not surprising from a biblical creation framework for such changes to happen quickly. In fact, it’s what we would expect, given the biblical history of rapid diversification after the Flood. But it always seems to be announced as ‘big news’ to evolutionists used to thinking in terms of vast ages. Further, as a population becomes more specialized, with less and less variety, there is generally a ‘price to pay’ in such a downhill process. This is seen clearly in artificial selection, such as dog breeding. The more specialized breeds are overall less hardy and adaptable than their genetically richer ‘mongrel’ ancestors (see Creation 32(3):28–32; ‘Parade of Mutants’—Pedigree Dogs and Artificial Selection). Thus it is no surprise to find one of the articles here referring to this rapid change in the stickleback fish as “not achieved without a cost”—a population with less likelihood of longterm survival. This is the opposite of the expectations of fish-to-philosopher evolution. - Proceedings of the Royal Society B, doi: 10.1098/rspb.2010.0923, 4 August 2010. - Tiny fish evolved to tolerate colder temperature in three years, www.physorg.com, 4 August 2010.
<urn:uuid:fafa57f6-6504-4567-9bc6-a6fbb547210a>
CC-MAIN-2014-15
http://creation.com/focus-creation-331
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537804.4/warc/CC-MAIN-20140416005217-00460-ip-10-147-4-33.ec2.internal.warc.gz
en
0.949777
4,515
2.921875
3
World Migratory Bird Day 2021: Purpose, Theme The World Migratory Bird Day (WMBD) is observed twice a year. first, it comes on the 2nd Saturday of May, and again, will be observed on the Second Saturday of October. In the year 2021, this day falls on 8th May 2021 and 9th October 2021. The main aim of this day is to spread awareness for the need to conserve migratory birds and their habitats. The theme for 2021 World Migratory Bird Day (WMBD) is “Sing, Fly, Soar – Like a Bird!”. The Convention on Migratory Species (CMS), Environment for the Americas (EFTA) and African-Eurasian Migratory Waterbird Agreement (AEWA) organizations conduct thi day every year.
<urn:uuid:4138995d-d6aa-41ea-af39-1ebb9e9055a3>
CC-MAIN-2021-25
https://www.prepareexams.com/world-migratory-bird-day-2021-purpose-theme/
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488539480.67/warc/CC-MAIN-20210623134306-20210623164306-00596.warc.gz
en
0.898519
175
3.1875
3
Strathfield Local Government Area has many trees that are considered significant to the local community for their historic and heritage value. Strathfield Council’s Significant Tree Register was established in 1995, following extensive analysis of Strathfield’s tree species. The purpose of Council’s Significant Tree Register is to identify and recognise the importance of significant trees in the landscape of the Strathfield area. This Register guides their management and ensures their protection for future generations. The assessment methodology for determining significant trees is based on the criteria developed for the then Register of the National Estate, in accordance with the principles of the Burra Charter. This is the nationally consistent approach to heritage identification and assessment which is applied to all types of heritage places and items. A thorough physical examination of listed trees in relation to their natural occurrence or cultural history has been conducted and supported through extensive field work and examination to evaluate their importance in relation to the following criteria: - Historic and/or natural value (ie, indigenous/cultivated origin) - Botanic/scientific value - Social, cultural and commemorative value - Visual and aesthetic value Listed trees are assessed on their comparative points of importance relating to both cultural and natural significance. Therefore, the heritage values of a significant tree or group of trees are almost always multi-layered. This evaluation process ensures that trees are assessed in a consistent manner. Trees are not classified because they are ‘big’ or ‘old’. For trees to be included in the Register, they require objective assessment against criteria. The enhanced status of significant trees is used by Council to promote broader community awareness and to highlight its commitment to the protection of these trees and their contextual landscapes. Applications to prune or remove Applications concerning pruning or removal of a tree or trees listed on the Significant Tree Register must be accompanied by an arborist report. Development applications involving trees listed on the Significant Tree Register If a proposal for development is on land where there is a tree or trees listed on the Significant Tree Register, Council will require submission of an arborist’s report. The report should identify and address the trees proposed to be removed, pruned or retained and the methods for protection of trees during building works. Where tree protection is required, Council may require payment of a refundable performance bond to ensure the protection of the tree(s). - Council’s Development Control Plan requires that proposed development provides for reasonable retention and protection of existing significant trees, especially near property boundaries and sets out setback controls for development near trees identified in the Council’s Significant Tree Register. - All trees permitted for removal are to be replaced with trees identified on Council’s Recommended Tree Planting lists.
<urn:uuid:3cf99a8d-e6f3-4068-b430-708c1e138f47>
CC-MAIN-2018-39
https://www.strathfield.nsw.gov.au/residents/trees/significant-tree-register/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267164469.99/warc/CC-MAIN-20180926081614-20180926102014-00173.warc.gz
en
0.930214
566
2.90625
3
For Immediate Release, September 28, 2010 ||Tierra Curry, Center for Biological Diversity, (928) 522-3681 Scott Greacen, EPIC, (707) 822-7711 Endangered Species Act Protection Sought for Rare Forest Carnivore Once Believed Extinct ARCATA, Calif.— The Center for Biological Diversity and the Environmental Protection Information Center today petitioned the U.S. Fish and Wildlife Service to protect the Humboldt marten under the Endangered Species Act. The Humboldt marten is a cat-sized carnivore related to minks and otters that lives only in coastal, old-growth forests in Northern California and southern Oregon. Because nearly all of its old-growth forest habitat has been destroyed by logging, the Humboldt marten is so rare that it was believed extinct for 50 years. “The Humboldt marten was once common in old-growth, coastal forests in California and Oregon, but now fewer than 100 are known to exist,” said Tierra Curry, a biologist at the Center. “These martens are in dire need of Endangered Species Act protection if they’re going to have any chance at survival.” “Logging of old-growth forests has driven the marten to extinction across 95 percent of its historic range,” said Scott Greacen, executive director of EPIC in Arcata. “To rebuild a viable marten population, we need to restore old forest conditions, which requires moving beyond short-rotation clearcut logging.” The historic range of the marten extends from Sonoma County in coastal California north through the coastal mountains of Oregon. The Humboldt marten was rediscovered on the Six Rivers National Forest in 1996. Since that time, researchers have continued to detect martens using track plates and hair snares. In 2009 a marten was detected at Prairie Creek Redwoods State Park by remote-sensing camera, the first to be photographed in recent times. Martens are 1.5 to two feet long and have large triangular ears and a long tail. They eat primarily small mammals, including voles and squirrels. The U.S. Fish and Wildlife Service has 90 days to decide whether the petition presents substantial information indicating that protecting the marten under the Endangered Species Act may be warranted.
<urn:uuid:203b2179-4a7e-4488-8bda-1dd99603a2e5>
CC-MAIN-2018-05
http://www.biologicaldiversity.org/news/press_releases/2010/humboldt-marten-09-28-2010.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886437.0/warc/CC-MAIN-20180116144951-20180116164951-00683.warc.gz
en
0.918517
498
3.109375
3
Hari Parbat and the Durrani Fort. |Location||Srinagar, Jammu and Kashmir| Hari Parbat is a hill overlooking Srinagar, the largest city and summer capital of Jammu and Kashmir, India. It is the site of a fort, built in the Durrani era, and of a Hindu temple, mosques, and gurdwara. The first fortifications on the site were constructed by the Mughal emperor Akbar in 1590 who built an outer wall for the fort as part of his plans for a new capital called Nager Nagor. The project, however, was never completed. The present fort was built in 1808 under the reign of Shuja Shah Durrani. Another name for the hill is Pradyumna Peeth. It is considered sacred by the Kashmiri Pandits and hosts a temple of Shakti, who is worshipped there under the name Jagadamba Sharika Bhagawati (or simply Sharika) and depicted as having 18 arms and sitting in Shri Chakra. Gurdwara Chatti Patshahi Guru Nanak visited this place in early sixteenth century.Place where he sat and had discourse with people was earmarked with a pedestal by Moh. ATA Khan general of Akbar who built Fort here as per orders of Akbar . Small Gurdwara at the place was further built by Guru Hargobind when he visited here is still existing with Nishan Sahib (Sikh flag) and managed by local people. - Origin Archived 9 May 2012 at WebCite - Hamza Makhdum - Makhdoom Sahib Shrine - "Gurudwara Patshahi Chevin, Village Rainawari". AllAboutSikhs.com. Retrieved 15 December 2015. - "Gurdwara Guru Nanak Dev Ji, Hari Parbat, Sri Nagar | Sikh Philosophy Network". www.sikhphilosophy.net. Retrieved 14 September 2019.
<urn:uuid:ef08ea78-6aeb-4844-9f8c-2eb04aa4ba66>
CC-MAIN-2019-51
https://search.deepweb.to/wiki/Hari_Parbat
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540523790.58/warc/CC-MAIN-20191209201914-20191209225914-00012.warc.gz
en
0.924659
424
3
3
Between September 2013 April 2015 Adede conducted a large scale archaeological excavation for Artes Depret in Wervik, Belgium. The reason for this excavation is the widening of the river Leie in the area of the town centre and construction of a new bridge connecting Wervik and France. Work in Wervik is part of a huge water intrastructure venture which will connect the Scheldt and Seine estuaries which involves digging a new 106 km long canal, construction of locks and adapting or replacing existing bridges to allow for passage of larger vessels. The project is known as the European Scheldt-Seine project. Adede conducted GPR surveys, test trenches and intrusive prospection in order to establish an archaeological valuation of the project area. This resulted in the excavation of an area east of the Brugstraat in Wervik. Given the fact that the area showed a risk of presence of UXO from both WW1 and WW2 excavation and dredging was preceded by a UXO survey of the Leie and subsequent work was guided by our archaeologists who had an eye out for both heritage and UXO. Section revealing a wooden drain underneath a brick drain demonstrating the fact that the ground level was raised during the 17th-18th centuries Foundations of an old chalk oven, along the river Leie. Entrance of a WW2 era air raid shelter. The project has revealed several interesting stages in Wervik’s development from the late Middle Ages onward. Footprints of the original brick buildings reveal the development of linear building planning starting in the 15th century. A chalk oven foundation that was discovered near the bank of the river was evidence of the industrial history of the town whereas the orientation of an old alley with wooden and brick drainage system on top of each other suggest elevation of ground level and early use of the Leie for drainage. We found relatively little in the way of UXO or remnants of war. Near the bank a few rifles, rifle munitions and jerrycans were found practically on the surface as well as the entrance stairway to a WW2 era air raid shelter. Through archaeology we managed to find, identify, analyse, record and save Wervik’s history before it is sacrificed for the future.
<urn:uuid:4e41072c-d497-4809-83a2-b8511eb65aa6>
CC-MAIN-2020-45
https://adede.com/project_land/uxo-survey-archaeology-wervik/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107894426.63/warc/CC-MAIN-20201027170516-20201027200516-00427.warc.gz
en
0.949189
464
2.671875
3
Freenet provides a global, anonymous datastore where you can upload sites which then work like normal websites. But different from websites, they have a version-number. The reason for this is, that you can only upload to a given key once1. This data then gets stored in the network and is effectively immutable (much like immutable data structures in functional programming). In this model conflicts can arise from uploads of different users and from uploads of different versions of the site. So what if Alice uploads the file gpl.txt, and then Mallory tries to upload it again before users get the upload from Alice? To avoid these conflicts between users, you can upload to an address defined by a key-pair. That key-pair has two keys, a public and a privat one. The URL of the site is derived from the public key. Everyone who has this URL can access the site. The private one allows uploading new data to the site. Only the owner of the private key can upload files to the site. This is the SSK: The Signed Subspace Key. It defines a space in Freenet which only you can update. An SSK looks like this: SSK@[key]/[sitename]/[path/to/file] But now what if Alice wants to upload a new version of gpl.txt - say GPLv3? To avoid conflicts between different versions, each new version gets a unique identifier. The reason for using version numbers and not some other identifier is historical: To update sites despite not being able to rewrite published data, freenet users started to version their sites by simply appending a number to the name and then adding small images for future versions. If these images showed up, the new version existed.2 Most sites in freenet had a section like this (the images might take a bit to load - they are downloaded from a freenet outproxy): At some point, the freenet developers decided to integrate that function into freenet. They added a new key-type: The Updatable Subspace Key, in short: USK. A USK looks like this: USK@[key]/[sitename]/[version]/[path/to/file] (The difference to the SSK is that there is a path-element for the version). If you enter a USK, freenet automatically checks for newer versions and then shows you the most recent version of the site. As a practical example: Note that this link will automatically get you to version 117 (or whatever version is the current one when you read this article), even though it has version 116 in its URL. Internally the USK simply gets translated to an SSK in the form of SSK@[key]/[sitename]-[version]/[path/to/file]. You’ll surely recognize the scheme which is used here. This is a prime example of demand-driven development: Users found a way to make sites dynamic with the activelink-hack. Then the Freenet developers added this as official feature. As nice side-effect, the activelink-images stayed with us as part of the Freenet Culture: Almost every site in freenet has a small logo with width and height 108x36 (pixels). USKs solved the problem of having updatable sites by checking some versions into the future. But they had a limitation: If your USK-Link was very old, freenet would have to check hundreds or even thousands of URLs to find the newest version. And this would naturally be very, very slow. Due to the distributed nature of Freenet, it is also not possible to just list all files under a given Key. You can only check for directories - the sitenames. Also files in Freenet only stay available when people access them - but checking to see whether some file might still be accessible isn’t a defined problem: The data to that file could be on the computer of someone who is currently offline. When he or she comes online again, the file could suddenly be available, so determining whether a file does not exist isn’t actually possible. A timeline of versions could look like this: Now imagine that you find a link on a site which was added in 2010. It would for example link to version 4 of the site. If you access this site in 2014, freenet has to check versions 5,6,7,8...18 to find the most recent version. That requires 13 downloads - and for normal freesites the versions can be as high as 1200. But remember that you can upload to arbitrary filenames. So what if the author of the site gave you a hint of the first version in 2014? With that, freenet would only have to start at version 16 - just 3 versions to check, and the hint. Why the first? Remember that files cannot be overwritten, so the author cannot give you the most recent version in 2014. And this is just what the freenet developers did: Date-Hints are simply files in freenet which contain the information about the most recent version of the site at some point in time. The datehint keys look like this: SSK@[key]/[sitename]-DATEHINT-[year] The file found at this key is a simple plain text file with content like the following: HINT 46 2013-7-5 The first line is the identifier, the second is the most recent version at the time of insert (the first version in the year) and the last is the date of the upload of that version. A yearly date-hint speeds up getting the most recent version a lot. But since sites in freenet have hundreds of versions rather then tens, it is a bit too coarse. It can still leave you with 20 or 30 possible new versions. So it actually provides additional date hints on a monthly, weekly and daily basis: If you give freenet a USK-link, it starts on the order of 10 requests: 4 date hints with the current date and requests for versions following the version in the link. Normally it gets a result in under 10 seconds. The algorithmic cost should be 4 additional inserts per insert, and at least 4 fetches (current year, month, week, day) followed by N fetches (with N the uploads since the last found DATEHINT) to find the most recent version. In case of strictly periodical uploads N should be capped at the number of uploads per day, or 7 (days per week) or 4 (weeks per month) or 12 (months per year), so Freenet would need to start at most 16 fetches to get the most recent version of a USK. With USKs and Date-Hints Freenet implements updatable sites with acceptable performance in its anonymous datastore with effectively immutable data. If you want to see it for yourself, come to freenetproject.org and install freenet. It’s free software and available for Windows, GNU/Linux and MacOSX. If you try to upload to a given key twice, you can get collisions. In that case, it isn’t clear which data a client will retrieve - similar to race conditions in threaded programs. That’s why we do not write to the same key twice in practice (though there is a key-type which can be used for passwords or simple file-names. It is called KSK and was the first key-type freenet provided. That led to wars on overwriting files like gpl.txt - similar to the edit-wars we nowadays get on Wikipedia, but with real anonymity thrown in ☺). ↩ ⚙ Babcom is trying to load the comments ⚙ This textbox will disappear when the comments have been loaded. Note: To make a comment which isn’t a reply visible to others here, include a link to this site somewhere in the text of your comment. It will then show up here. To ensure that I get notified of your comment, also include my Sone-ID. Link to this site and my Sone ID: This spam-resistant comment-field is made with babcom. The European Copyright directive threatens online communication in Europe. But thanks to massive shared action earlier this year, the European parliament can still prevent the problems. For each of the articles there are proposals which fix them. The parliamentarians (MEPs) just have to vote for them. And since they are under massive pressure from large media companies, that went as far as defaming those who took action as fake people, the MEPs need to hear your voice to know that your are real. If you care about the future of the Internet in the EU, please Call your MEPs.
<urn:uuid:0330aea1-f0cb-408c-bbef-d29e0efbb219>
CC-MAIN-2022-27
https://www.draketo.de/light/english/freenet/usk-and-date-hints
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103617931.31/warc/CC-MAIN-20220628203615-20220628233615-00570.warc.gz
en
0.920564
2,064
2.625
3
The U.S. opioid crisis seems to be getting worse with each passing day. Fueled by the influx of illicit drugs in the country, overdose deaths showed an increase of 21 percent between January 2016 and January 2017. Significantly, fatalities involving synthetic opioids such as fentanyl jumped 100 percent during the same period. Though almost every U.S. state is grappling with the opioid epidemic, New Hampshire has seen an alarming increase in overdose deaths involving fentanyl. The latest study by the National Drug Early Warning System (NDEWS) reported a whopping 150 percent increase in fentanyl-related overdose deaths in New Hampshire in a span of two years, from 145 in 2014 to 362 in 2016. A powerful painkiller, fentanyl is easily available in illegal drug markets in the U.S. and is often mixed with heroin and cocaine to increase its euphoric effects. Significantly, the findings of the study revealed that nearly all fentanyl-related overdose deaths involved another drug as well. Through the study, researchers were able to discover multiple fentanyl mixtures of varying potency. The toxicology tests showed decedents testing positive for multiple drugs, with 20 percent of samples revealing the presence of 10 or more drugs. The average count of parent drugs in each deceased person was found to be at 6.2. The study discovered that 95 percent of the overdose victims were white. The researchers also found that opioid antagonist naloxone was administered in only 12 percent of the cases. “While the media tend to emphasize heroin or fentanyl as the ‘primary drug problem,’ it is clear from our research that the users of these drugs tend to use many other drugs. To be effective, treatment must focus on each person’s total drug problem, rather than on a single drug,” said Dr. Eric Wish, principal investigator of the NDEWS. Post its analysis, the New Hampshire study stressed on the need for the following: - Increase availability of needle exchanges. - Increase availability of treatments addressing multiple drug use disorders in fentanyl users. - Eliminate barriers to access and use naloxone. An opioid analgesic (pain relief) and anesthetic, fentanyl is a Schedule II narcotic and is 50 to 100 times more potent than morphine. Owing to its increased euphoric effects, fentanyl is often mixed with heroin and/or cocaine and is much more prone to abuse and overdose. In 2016, fentanyl products were misused by 228,000 people in the U.S. A leading addiction treatment provider, Sovereign Health of California offers all its patients individualized and evidence-based treatment for substance abuse, mental health and co-occurring disorders. Basis their medical history and the severity of symptoms, each of our patients is provided with a comprehensive drug addiction treatment program that may combine detoxification, along with intense behavioral therapies. Sovereign Health’s treatment for heroin addiction in California offers its clients professionally-administered detoxification services followed by numerous treatment modalities, including neurofeedback, cognitive remediation and experiential therapies such as yoga, and meditation. For more information about our state-of-the-art heroin addiction treatment facilities in California, please call at our 24/7 helpline number and speak to our admission specialist. You can even chat online with one of our representatives for further assistance.
<urn:uuid:65c21590-1298-4e8f-8c1b-7e17e6296013>
CC-MAIN-2020-40
https://www.sovcal.com/drug-abuse/study-finds-fentanyl-mixtures-behind-new-hampshires-opioid-epidemic/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401583556.73/warc/CC-MAIN-20200928010415-20200928040415-00623.warc.gz
en
0.952489
681
2.578125
3
New river dolphin species discovered London: A new river dolphin species has been discovered in nearly a century in Brazil. The species was discovered from the Araguaia River basin of Brazil and researchers propose that it be called the Araguaian Boto, or Boto-do-Araguaia. The new species is diagnosable by a series of molecular and morphological characters and diverged from other South American river species more than 2 million years ago, researchers said. About 1,000 of these creatures are believed to be living in the Araguaia river basin, `BBC News` reported. By analysing DNA samples from dozens of dolphins in the Araguaia and Tocantins rivers, researchers concluded the Araguaia river creature was indeed a new species. "We looked at the mitochondrial DNA which is essentially looking at the lineages, and there is no sharing of lineages," said lead author Dr Tomas Hrbek, from the Federal University of Amazonas. "The groups that we see, the haplotypes, are much more closely related to each other than they are to groups elsewhere. For this to happen, the groups must have been isolated from each other for a long time," Hrbek said. "The divergence we observed is larger than the divergences observed between other dolphin species," he said. Writing in the journal Plos One, researchers expressed concerns about the future of the new dolphin, saying that it appears to have very low levels of genetic diversity. PTI RCL AKJ More from India More from World More from Sports More from Entertaiment - DNA: Analysing the importance of Hindi language in our society - DNA: Analysis of the letter written by defence minister to Kolkata CM? - DNA: Is political system root cause of corruption in the country? - IT raids Delhi's Axis bank branch, finds Rs 100 cr deposited in 44 fake accounts - Demonetisation: Majority of ATMs still out of cash - PoK erupts with 'azadi' slogans; Pakistan Army brutally thrashes protesters - Virat Kohli makes fun of Alastair Cook after England exhaust both DRS wrongly, watch video - This happens only in Pakistan? You won't believe what this boy did in front of his lady teacher - WATCH - Kapil Sharma is sweating it out! See pics - OMG! Man punches Kangaroo in face to save dog – Watch video
<urn:uuid:72d13310-f705-44bb-b06b-140228836c22>
CC-MAIN-2016-50
http://zeenews.india.com/news/eco-news/new-river-dolphin-species-discovered_906234.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698544672.33/warc/CC-MAIN-20161202170904-00407-ip-10-31-129-80.ec2.internal.warc.gz
en
0.946544
515
3.140625
3
The word psychedelic comes from ”Psyche” and ”Delos,” which means “soul manifesting” or “mind-manifesting.” Psychedelic design gained its popularity back in the era of 1960s. The 1960s were a great period for hazy yet brilliant time for artistic fluorescence. We see psychedelic design often used even today for commercial work. However, the psychedelic design concept seems to be losing its original history that most people are forgetting about. The history of psychedelic design is vast and widespread throughout the globe and time. It crossed thousands of borders and even dominated graphic arts for a decade between the 1960s and 1970s. You can say that the story of Psychedelic design goes back to 80 years ago. Let us have a look at the history of psychedelic design – There are some striking characteristics of psychedelic design and art: amazing subject matter, spiral patterns, bright colors, kaleidoscopic and extreme details with groovy typography. All of these elements are present in several art movements that precede the Psychedelic Design like Art Nouveau, Vienna Secession as well as Surrealism. There is no coincidence to this; these moments were highly influential when the psychedelic generation studied art. 1. Pyschelic Design and Art Nouveau: 1. What is Art Nouveau? During the late 1800s, new technology in terms of electrical power, telephones, and cars revolutionized the way the world works and how it looks. Some people, especially artists, living through this technological revolution, were not necessarily fond of all these new developments. This led to a conflict that led to the emergence of a new global artistic movement referred to as Art Nouveau. Art Nouveau is a French term that literally means “new art.” The idea and inspiration behind this movement were to make art that would reflect city life’s vibrancy. To do so, they started using flat, decorative patterns, organic and plant motifs, and feminine figures. It would often be stylized with fluid abstract forms. The movement created a visual language that would then be used almost everywhere – from architecture to paintings, textiles, and many other fields. The ideology of Art Nouveau dictated that aesthetics and utility should go hand in hand. They also believed that no object was too mundane to be designed as beautiful. Even advertisements for something as basic as biscuits and champagne would be illustrated beautifully. The idea was to create advertisements as beautiful as possible while also making them informative. 2. Contrast and similarity of Art Nouveau and Psychedelic Design: If we come back to the psychedelic era of the 1960s, it was also a time of cultural upheaval like the 1800s that inspired Art Nouveau. If we talk about the United States, the epicenter of this change was San Francisco. Hundreds and thousands of youngsters descended to San Francisco descended to the city for protests in forms of drum circles and concerts. There were many concerts back in the 1960s. Most of them would be dance concerts that would feature psychedelic bands like Jefferson Airplane and Grateful Dead. Also, there was one sure way of getting more people to come to your concert – creating a good poster. Back in the 1960s, these iconic bands were just starting out by playing back to back shows at important venues like the Avalon and Fillmore. Hence, to advertise this new generation of hippie bands, venues were quick to understand that plain typeface and using grayscale photos weren’t going to be enough. Hence, venues started commissioning work from small group artists. These small group artists came up with a brand new formula for their concert posters. It had influences from various art movements like surrealism, comics, and Art Nouveau. 3. What did Psychedelic Design pick up on from Art Nouveau? When the Art Nouveau movement reached the mid-1960s, it started facing some resurgence. Especially in textiles, dynamic floral designs seemed to be a natural fit that suited the hippie aesthetic. Based on the art pieces of Art Nouveau, some modern-day artists of the 1960s took some of the Art Nouveau samples that resonated with them and turned the dial upon them. Art Nouveau gained popularity for its feminine figures, most often nude and flowing hair and other such characteristics. This was a style that resonated with the psychedelic designers, and they picked on it. Most of the psychedelic posters are designed in a way to be covered edge to edge with intrinsic detailed two-dimensional illustrations. You could see a lot of flowers and abstract curves in psychedelic design. Some of the psychedelic designers also used images pulled directly out of an Art Nouveau poster. However, they made radical changes to their color palette. As the music of Sans Francisco spread across the world, so did their aesthetics. The artists behind such psychedelic designs got their share of fame. The posters they made with the vibrating colors and winding lines captured the energy of the 1960s. 4. Characteristics of Psychedelic Design: - The color palette: Art Nouveau designers used soft pastels, whereas Psychedelic artists preferred high-contrast and intense colors. It was said that these colors could make the viewer’s eye ”vibrate”, which is a term to define an LSD tripper’s visual experiences. - Typography: Psychedelic Design has the most abrupt and innovative use of typography for its design. It makes use of fonts that are cloudy, curly, and barely legible. This concept of using such fonts started first on a 1902 poster designed by the Australian designer Alfred Roller. In the 60s, artists adapted this bold, dynamic typeface and pushed it to a new extreme. They would soften the lines and obscure its edges, which made it almost illegible. This design trend wanted the typography to be almost illegible on purpose. The purpose was to grab the audience’s attention long enough to figure out what the entire poster was trying to say. 2. Op Art and Pop Art Movement’s Influence: 1. Op Art: Op art is short for Optical Art. It is a style of abstraction that depends on geometric lines, shapes, and color juxtapositions that help create optical illusions for the viewers. This art movement also gained decent popularity during the 1960s. Such art usually featured grids, patterns, and effects like diminishing or curved objects. This movement was led by artists who were interested in understanding various perpetual effects. Pop was a term that was an earlier associate with popular culture, rather than art. The objective of Pop art was to blur boundaries between high and low popular cultures. It was one of the major artistic movements for the United States of the 20th century. The term was first tossed in Britain during 1955. However, the Americans took the consumerist cause with far superior conviction and effect. Hence they have deemed the pioneers of the movement. Pop art and pop culture talk about mass media products that were evolving during the late 1950s and 1960s. It was an attempt to break down the barrier between traditional and contemporary culture. 2. Pop art: Pop art also highlighted some of the popular culture elements as a protest against elitist art culture and the general seriousness around it. This marked the return of sharp paintwork and representational art. This led to the glorification of underappreciated objects and ordinary businesses. This was done to make art more relevant and meaningful for everyday people and increase the target audience’s potential pool. Both these movements naturally went hand in hand with psychedelic design, adding more visual elements to it. Let us breakdown one of the most iconic psychedelic poster to better understand the psychedelic elements of this psychedelic design poster: 3. The Breakdown -The Man with Spiral Glasses: Victor Moscoso designed this poster. If you notice the above poster, it has certain clear elements from op and pop movement and other design elements that we have discussed so far that are unique to psychedelic designs. This image has circles with spirals inside those circles as background. There is a border around the image which also has text inside it. It also features a man with a top hat and long hair. There is also text on the man’s chest and shoulders. Such a poster can be used to reflect a dance concert. Moscoso mostly wanted the man to have a perception that he is someone who loves having fun. He paired this fun-loving man with a bright background, which helps this poster stand out and appeal to the right target audience. - Whitespace: He also kept whitespace between the circles on the outside of the background and the borders. This could be to keep the theme of circle geometry and further enhance the design by using illusions created by the spiral circles. - Clustering: He has also used clustering to cluster the background, the man, and the text on the man in layers on top of each other and placed them in the center of the artwork. If you cluster these elements together, the poster seems busier when using a more overpowering image, true to true psychedelic design principles. - Overlapping: Another important design element used in this poster is overlapping. The man is at the front of the background, and the text is on top of the man. The eyes can be looked at as spiral glasses that are meant to align perfectly with the patterned circles used in the background. This creates a visual illusion effect. The text on the man’s chest has important information regarding the concert. Hence Moscoso made it clear to keep it on the topmost layer of all other layers. - Negative Space: If you notice, the space between circles of the background is filled with the same red color used in the circles. This is to make the image look busy and bright, enhancing the psychedelic design. - Tone: This poster also uses very bright and vibrant red and blue colors. This helps the poster stand out from other posters. It is one of the most prominent design aspects of a psychedelic design. Overall, Moscoso’s poster is a fantastic representation of what psychedelic visual design looks like. Especially the idea of creating an optical illusion through a background in more than one layer is a fantastic touch. It serves the purpose and looks enticing enough for anyone looking at the poster to want to do for a dance concert. This was the history and relevance of psychedelic design and everything it has to offer. Psychedelic design is generally considered an art style used by people who like being high on drugs and have a distorted sense of the world. This misconception is highly incorrect. It was a movement based on other important art movements like Art Nouveau, Surrealism, and others. It was for a cause and a form of protest against the industrial and technological age of the 1960s, to keep real art alive. You can incorporate psychedelic designs for your music posters, wall graffiti, and website design to make full use of the benefits of psychedelic design.
<urn:uuid:33430367-a270-4338-963f-518daad19dfe>
CC-MAIN-2023-50
https://webdesigndev.com/understanding-psychedelic-design/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100602.36/warc/CC-MAIN-20231206162528-20231206192528-00297.warc.gz
en
0.963742
2,283
3.046875
3
The Izembek National Wildlife Refuge lies along the Bering Sea side of the Alaska Peninsula. Izembek is an amazingly important migration stopover for many birds migrating to and from Arctic breeding grounds. The area regularly supports more than 90 percent of Brant that use the Pacific Flyway, more than half the world population of Emperor Geese, and a significant percentage of the world populations of Steller's Eider and Taverner's Cackling Goose. More than 82 species have been documented here. These are a few of the reasons Izembek is part of the globally significant Izembek-Moffet-Kinzarof Lagoons Important Bird Area. In January 2018, the Department of the Interior signed a land transfer agreement with King Cove Corporation, which traded away vital bird habitat in the Izembek National Wildlife Refuge. The explicit purpose of the agreement was to facilitate the building of a road through federally designated wilderness and internationally recognized bird habitat. National Audubon Society and eight other parties sued the Department of the Interior for this questionable deal. The lawsuit (filed on January 31, 2018) argued that the agreement violates sections of the Alaska National Interest Lands Conservation Act (ANILCA). The court agreed and on March 29, held that the Department of the Interior failed to explain its decision to enter the Exchange Agreement with King Cove in light of its previous decision that alternatives to a road exist and that a road would cause significant environmental harm. The federal court's decision vacated the land exchange. The decision was a big win for the birds and other wildlife in Izembek National Wildlife Refuge. Building a road through Izembek's wilderness and wetlands would sacrifice key habitats and bring about significant long-term degradation to bird and wilderness values. Here's why: - A road would cut through the biological heart of the Izembek National Wildlife Refuge. Izembek's cold-water lagoons and internationally significant wetlands are critically-important resting places for migrating waterfowl. Virtually all of the world's Pacific Brant and more than half of the Emperor Geese stop at Izembek to feed and rest. The refuge also is home to Tundra Swans, ptarmigan, Bald Eagles, and hundreds of thousands of geese, as well as threatened species, such as Steller’s Eiders. Many mammals also use the refuge including caribou, brown bears, wolves, and wolverines. - A road is not needed. The Alaska congressional delegation claims the road is necessary to address the health and safety needs of the community of King Cove. In fact, Congress addressed those needs in 1998, when it passed the King Cove Health and Safety Act. That legislation provided $37.5 million to upgrade King Cove’s medical facilities, purchase a hovercraft to provide regular ferry and emergency medical service between King Cove and Cold Bay, construct new marine terminals, and build a road between the town of King Cove and the hovercraft terminal. This law specifically prohibited a road through Izembek’s federally protected Wilderness. - The hovercraft worked. Hovercraft service for medical evacuation began full-time operation on August 7, 2007. By all accounts, the hovercraft service quickly and safely met every medical evacuation need of the King Cove community, transporting people and ambulances between the two communities in an average of 20 minutes. Driving the proposed road would take 1–2 hours, in good weather. The Aleutian East Borough chose to suspend hovercraft service, saying it was having staffing and funding problems. Yet the Borough is now trying to transfer the hovercraft for use in another community. - The land swap required to build a road would sacrifice key habitats: more than 200 acres of critical, internationally recognized wildlife habitat in exchange for a larger amount of less important habitat. Izembek and Kinzarof lagoons contain some of the largest eelgrass beds in the world, which attract tens of thousands of migratory birds annually. The narrow isthmus between the two lagoons is an important nesting area for Tundra Swans, provides a migration corridor for caribou, and provides foraging grounds for brown bears. The 56,000 acres of proposed exchange lands do not offer comparable protection or habitat. - A road through Wilderness is incompatible with the purposes for which Congress created the Izembek National Wildlife Refuge. Congress created the Refuge to conserve fish and wildlife populations and their habitats; to fulfill the United States' international treaty obligations (such as the four migratory bird treaties and the Convention on Wetlands of International Importance); to provide for continued subsistence by local residents; and to ensure water quality and quantity within the Refuge. The wildlife values of Izembek National Wildlife Refuge are globally significant, and should not be compromised, especially when there are reasonable alternatives for local transportation.
<urn:uuid:d5539b6c-20f0-4253-ad11-3a160ef496f4>
CC-MAIN-2021-31
https://ak.audubon.org/conservation/izembek-national-wildlife-refuge
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154089.68/warc/CC-MAIN-20210731141123-20210731171123-00427.warc.gz
en
0.933331
985
3.296875
3
Sulphur tuft (Hypholoma fasciculare) growing on dead wood in the copse between Sleepers and Sheep Field. Sulphur tuft is a wood-rotting fungus, a saprophage. Wood-rotting fungi have evolved to produce the enzymes needed to break down the chemically complex substances found in wood. Sulphur tuft is not a fussy feeder and enjoys deciduous woods as well as conifers. Basically any wood that is decaying, sulphur tufts will find a way to feed on it and thrive. These pictures are of the fungus’s fruiting bodies; the main part of this fungus is the mycelium, the threads of hyphae that grow through the wood and produce the enzymes that break it down. The fruiting bodies, the bright sulphur-yellow caps for which the fungus is named, produce the spores; they are the fungal equivalent of a flower. They are usually found in tightly packed colonies, with barely enough space between the caps for each to open; they will grow on a decaying tree stump and sometimes cover it completely. If the caps appear to be out in the open, nowhere near a rotting tree stump, it is because there are tree roots rotting beneath the ground. Sulphur tufts will hang around a dead tree for a number of seasons, until the wood has decayed to the point where there are no more nutrients for the fungus to feed on. This is a poisonous species. It tastes very bitter and unpleasant and is therefore not easily confused with an edible species but its bitterness can be disguised if it is cooked in a medley of other fungi – so be careful. As ever, we recommend that nobody eats the fungi they find in the park unless that have the advice of an expert.
<urn:uuid:5b647b1b-57fe-4afb-bacb-c38267e980bd>
CC-MAIN-2021-17
https://southwickcountrypark.com/2019/10/30/11372/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038073437.35/warc/CC-MAIN-20210413152520-20210413182520-00377.warc.gz
en
0.946618
376
3.71875
4
There are various types of works which are copyrightable as literary work. Some of these are enumerated as under: Books or e-books Books written in print or in any digital form may be protected, the new edition of the book may also be considered or as an original work if there is a substantial change in the new edition. Poems, Novels, and Story Poems, novels, and stories whether in writing or in print or any other digital form are classified as literary work and are also a subject matter of copyright protection. Plays are copyrightable as original dramatic work which is being presented whether in writing or in print but it does not include a cinematograph film. The act of abridgment is an exertion of the understanding employed in representing a large work Concisely in a compressed language of abridger by preserving the thoughts of opinion and ideas expressed in the original work. To qualify as an abridged work in a legal sense the independent labour must be apparent, the mere reduction of the size of work by copying of its part and omitting the others confers no title to authorship and the result is not an abridgment entitled to protection. Abridged work is considered as original literary work and enjoys copyright protection. Adaptation implies the preparation of new work in the same or different form based upon an already existing work. The copyright defines the following acts as an adaptation - Conversion of a literary or artistic work into a dramatic work - Conversion of a dramatic work into a non-dramatic work - Rearrangement of a literary or dramatic work depiction in comic form through pictures of a literary or a dramatic work - Translation of a musical work or any act involving rearrangement or alteration of an existing work The making of a cinematograph film of a literary or dramatic or musical work is also an adaptation. In nutshell, adaptation in works is more or less original and creative work. But at the same time, the creative element in the adaptation is not such that it may be said the prior work was nearly used as a point of departure for inspiration for the creation of new and independent work. The creator of adaptation enjoys copyright protection only to the extent of the creativity contributed to the work by the adaptor without affecting the copyright of the original author. Adaptation to be entitled to copyright protection must have the consent of the author or it must be of work in the public domain. The compilation is an expression literary work, the law protects not only the work of genius science and art but also mere compilation. Many compilations have nothing original in their parts, but the sum total of the compilation may be original. In such cases, it is needed to be seen whether the compilation of original material called for work or skill or expenses. If it did, it is entitled to be considered original and to be protected against those who wish to steal the fruits of work or skill or expense by copying it without taking the pain to compile it themselves. In each case, it is a question of degree whether the labour or skill or ingenuity expenses involved in the compilation is sufficient to warrant a claim to the originality in a compilation. The literary merit of derivative work or creativity, the aspect of the same need not be evaluated; one needs to see whether derivative work is not the end product of the skilled labour and capital which is trivial or negligible but substantial. Some of the compilation to which copyright protection has been granted is mentioned here A dictionaries and directories An arrangement of the broadcasting program Biographical notes of prominent golfers published in a golf annual An alphabetical list of the railway station with notes on their respective importance historical or otherwise A report of a public speech A chemist catalog of drugs for sale The law protects only those compilations where sufficient labour and skill were employed in the selection and the arrangement of it. The law does not prohibit the making of similar compilations if they are the result of the labour of the author and not the copy of those that are protected. Lyrics of a song It is also eligible for protection as a literary work and is copyrightable It contains in a clear and precise language the legal principle deriving from previous judgment, for the fact and the circumstances which bring the matter within the framework of principle or rule of law practice. Therefore, these are considered original literary work if sufficient exercise of skill and judgment is employed by way of writing headnotes, editorial notes, and footnotes. The real judgment delivered by the Court is not copyrightable. Lectures speeches and sermon If these are reduced in writing or in print or in any other digital format they are classified as literary work and entitled to copyright protection. Writing of preachers for a compilation of their teachings for some lines for saying are literary work if they are a result of knowledge labour judgment, learning, skill or realization, and understanding. Letter: letters are literary work and can be protected under the copyright act the letters which are generic in nature add entitled to copyright registration. It involves the effect of the author to explain the situation through his knowledge and examples and is thus classified as a literary work entitled to the protection of copyright. As we all know that the copyright doesn’t protect the idea but if the idea is developed into a concept note fledged with adequate details then the same is entitled to the protection of the copyright as a literary work. Panchang provides the information regarding tithi Nakshatra except apart from mentioning the dates does it cannot be classified as a calendar and is entitled to copyright protection as a literary work. A comic book is a work where the story is depicted by means of images in different frames along with literary work on it in form of dialogue and words the literary element of the comic book can be protected as a literary work and the copyright and the artistic element can be protected as an artistic work under the category of artwork. Research thesis/ dissertation/ research papers These are the literary works and can be copyrighted but NOC from the college of the institution Under whose direction and control the work has been created is required to be submitted at the time of seeking registration by the applicant. Questionnaire and Question Papers In Aggarwal publishing house versus Board of High School and Intermediate Education UP Allahabad AIR 1967 All 91 it was held that the original literary work referred to in section 13 of the copyright act 1957 or not confined to the work of literature as commonly understood. it will include all the work expressed in writing, whether they have any literary merit or not this is clear from the definition given in section 2(o) of the act which states that that literary work includes tables and compilation. It was further held by the court that the word “original” used in section 13 of the Copyright Act, 1957 does not imply any originality of idea but merely means that work in question should not be copied from some other work but should originate in the author being the product of his labour and skill. Thus question papers being original literary work can be copyrighted. Activity books can be copyrighted only if the content and the work contained therein qualify the protection and the registration prerequisites of literary work provided under the Copyright Act. All of these qualifies as work and can be copyrighted. it is important to note that these works are either purely literary in content or a mixture of both literary and artistic content and at the time of seeking registration the applicant needs to seek the registration of the work in the category it falls. However, if such work contains purely artistic work then the applicant seeking the registration of the work should submit a separate application for each image with the prescribed fee under the artistic category. Preparation of tickets and placing them in tables requires a good deal of skill and labour and that satisfies the taste of being original literary work. It was recognized that the arrangement of numbers is the individual work of a person who prepares it; it bears his Individuality and long hours of labour, that’s the ticket books and tickets are literary work capable of copyright protection [Rai Toys Industries V. Munir Printing Press 1982 PTC 85]. Tickets used in the game of Tambola are entitled to copyright protection as it involves a form of tables of numbers requiring an investment of skill, labour, and originality in preparation. Single-word, Name, Title, Screenshot /snapshot of an app, recipe ( without instruction) Mathematical formulas, Slogan, certificates, pocket diaries and calendar, website as a whole, Pocket diaries and calendars, blank form, general layouts, etc do not qualify as a copyrightable work and hence not eligible for registration under copyright. To conclude, the law of copyright rests on a very clear principle that anyone who by his or her own skill and Labour creates an original work of whatever character that will enjoy an exclusive right to copy that work.No one else main forest season reap what the copyright owner had sown.
<urn:uuid:ba991d07-bbcb-477c-a2b5-f73c73ed89d4>
CC-MAIN-2020-50
https://www.setindiabiz.com/learning/matters-which-are-copyrightable/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141740670.93/warc/CC-MAIN-20201204162500-20201204192500-00462.warc.gz
en
0.950036
1,824
3.046875
3
Introduced species of the exhibition refers to the breeds of pigeons. The greatest spread of pigeons reached on the territories of European countries, Canada, the United States. Compared with other species, pigeons helmets overly active, lively, brisk and different qualities. Consider the exterior characteristics of birds: the average size of the head; massive frontal part and flat; powerful and small beak; white, medium size cere; bright eye cream shades; around the eyes thin rings that have light colors; medium size, prolonged neck; beautiful collar, which is clearly visible against the background of the head, it is quite wide and thick, the authenticity of one ear to the other; the body is not very long, it is short, is shaped like a wedge, which significantly narrows to the rear; wings hard enough coagulate; low and powerful legs, there are birds with longer legs, ending without a tail, deep red; white claws; tail is rather narrow. Externally significantly wide variety of colors, stand out only the head and tail parts that are characterized by multicolored color gamut.
<urn:uuid:c88e0d46-5743-4635-bae5-2ccce0c2da64>
CC-MAIN-2021-31
https://geomedia.top/helmets-description/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154459.22/warc/CC-MAIN-20210803124251-20210803154251-00191.warc.gz
en
0.940382
222
3.3125
3
Simple Definition of enlargement : the act of making something larger or of becoming larger : a larger copy of a photograph Examples of enlargement in a sentence Symptoms include enlargement of the lymph nodes. The plans call for an enlargement of the company's offices. First Known Use of enlargement ENLARGEMENT Defined for Kids Definition of enlargement for Students 1 : an act of making or growing larger 2 : the state of having been made or having grown larger 3 : a larger copy of a photograph Seen and Heard What made you want to look up enlargement? Please tell us where you read or heard it (including the quote, if possible).
<urn:uuid:025efdb8-ab5b-4eac-bd10-f34e09b0d774>
CC-MAIN-2016-30
http://www.merriam-webster.com/dictionary/enlargement
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826916.34/warc/CC-MAIN-20160723071026-00320-ip-10-185-27-174.ec2.internal.warc.gz
en
0.86011
147
3.3125
3
Thayer, Kansas came into existence in 1870 with the arrival of the L.L.& G. Railroad. The townsite was selected by a private corporation by men connected with the railroad, for the purpose of selling lots and land. There is some question whether Thayer was named in honor of Eli Thayer, a congressman from New England who started the Kansas Crusade which did much to advance the early settlement of the state; or whether it was named in honor of Nathaniel Thayer, a financier of the railroad company that started the town. Both were great men. The circumstances of the naming indicates that Nathaniel Thayer was the one after whom the town was named. The temporary terminus of the L.L. & G. Railroad attracted big numbers of laborers and traders. This was the most advanced railroad in the country and merchants came from far and wide to get their merchandise which had been freighted to this point. The population grew to 600 in six months and over 200 guests took breakfast one day at the Baldwin House, conducted by General Darr. L.L. & G. Railroad was finished to Thayer in the autumn of 1870 and that town remained terminus for some months. The press for lots became a stampede, especially for desirable business lots, and everybody wanted to build at once. Houses went up with a rush, carpenters and other mechanics were in demand and the capacity of the railroad was taxed to bring in the merchants there and points tributary thereto. It is estimated that the population reached 1000 that winter, with few women among the inhabitants. A large number of people at Thayer that winter were men who were anxious to go to work on the construction of the extension of the railroad and many of them were of the roughest make, with boisterous ways and addicted to the use of intoxicants An act of congress, approved April 19, 1871, granted permission to the L.L. & G. Railroad Company to relocate its route south of Thayer. Soon after this, the railroad resumed its building south towards Coffeyville, and Thayer's boom soon deflated. The reaction was strong, and it is said the population dropped to 300. But the rabble was gone, and those who remained were of sterner stuff, and they set about building a good, wholesome community which any good citizen would be pleased to call his home. Thayer was transformed into one of the most law-biding communities in Neosho County. Thayer is said to be located up on the highest level prairie in Neosho county. Several Streams have their origin in the Thayer vicinity, some of the drainage going to the Neosho river and some to the Verdigris.
<urn:uuid:998b2df8-03ff-47a4-81ac-2b3708505a01>
CC-MAIN-2018-09
http://www.lasr.net/travel/city.php?Thayer&KS&TravelTo=KS0612021
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815843.84/warc/CC-MAIN-20180224152306-20180224172306-00482.warc.gz
en
0.988317
564
2.75
3
The field of valleytronics is emerging as a way of exploiting specific energy extrema known as valleys. This field has the potential to revolutionize conventional electronics, which rely on the control and manipulation of charged particles, such as electrons and holes, and surpass the capacity of spintronics, which depends on the intrinsic spin property of particles. Valleytronics is based on the crucial trapping of charge carriers in energy valleys; however, device development is hindered by the complexity involved with the necessary valley polarization. Several researchers have generated valley polarization in semiconductors called transition-metal dichalcogenides by producing an excited state through exposure to circularly polarized light. This approach, however, results in a state of nonequilibrium of dynamical valley polarization that is difficult to exploit because it demands sustained optical pumping, which requires light to pump electrons to a higher energy state. “This problem can be eliminated by creating a permanent valley polarization by means of magnetic doping,” says Udo Schwingenschlögl, a professor of material science and engineering at KAUST. To test this hypothesis, Schwingenschlögl and research scientist Nirpendra Singh computationally investigated the effect of magnetic doping using chromium and vanadium on valley polarization in single layers of molybdenum disulfide (MoS2). This two-dimensional transition-metal dichalcogenide comprises molybdenum atoms connected to six sulfur atoms, forming a transition metal sheet sandwiched between two sulfur sheets. The researchers' first option for a magnetic dopant was chromium, which presents the same electronic configuration as molybdenum. They chose this dopant thinking it might induce spin polarization—a state in which all spins are oriented in the same direction—and promote valley polarization. But, instead of the desired effect, the team observed a complex magnetic structure (see image). According to Schwingenschlögl this surprising extended-moment formation counteracts the valley polarization. “We had to adapt to this situation, and eventually we were able to exploit it,” he adds. Consequently, the team experimented with vanadium-doped single-layer MoS2 to find that the resulting material exhibited permanent valley polarization. Schwingenschlögl remarked that based on their physical and chemical understanding prior to these investigations, they never would have anticipated that vanadium doping would have had this outcome. Schwingenschlögl believes that although this field remains in the realm of fundamental research, in the future, valley-polarized materials may be used to complement or surpass charge- and spin-based semiconductor technologies. The team plans to investigate in detail the effect of external electric fields on valley polarization. - Singh, N. & Schwingenschlögl, U. A route to permanent valley polarization in monolayer MoS2. Advanced Materials 29,1600970 (2017).| article
<urn:uuid:16d31507-f134-4063-8d48-29f467b204a1>
CC-MAIN-2019-47
https://discovery.kaust.edu.sa/en/article/308/valley-polarization-gets-a-magnetic-boost
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496671548.98/warc/CC-MAIN-20191122194802-20191122223802-00343.warc.gz
en
0.926961
611
3.09375
3
Neutron moderators are a type of material in a nuclear reactor that work to slow down the fast neutrons (produced by splitting atoms in fissile compounds like uranium-235), to make them more effective in the fission chain reaction. This slowing or moderation of the neutrons allows them to be more easily absorbed by fissile nuclei, creating more fission events (see Figure 1). Materials used for moderation need to a very specific set of properties. First, a moderator cannot absorb neutrons itself. This means that the moderator should have a low neutron absorption cross-section. However, the moderator should be able to slow down neutrons to an acceptable speed. Thus, in an ideal moderator the neutron scattering cross-section is high. This neutron scattering is a measure of how likely a neutron will interact with an atom of the moderator. If the collisions between neutrons and nuclei are elastic collisions, it implies that the closer in size the nucleus of an atom is to a neutron, the more the neutron will be slowed. For this reason, lighter elements tend to be more efficient moderators. The table below shows that common moderators have a low neutron absorption cross-section but a comparatively large neutron scattering cross-section. |Neutron scattering cross section (σs) in barns |Neutron absorption cross | section (σs) in barns |Light water (H2O)||49||0.66| |Heavy water (D2O)||10.6||0.0013| There are several different types of moderating materials, and each have places where they are used more effectively. Typically-used moderator materials include heavy water, light water, and graphite. The relative properties of these materials are compared below. The moderators vary in terms of their moderating abilities, as well as in their costs. Light water (no different than regular water) is used in many reactors because it contains large amounts of hydrogen. Hydrogen works well as a neutron moderator because its mass is almost identical to that of a neutron. This means that one collision will significantly reduce the speed of the neutron because of the laws of conservation of energy and momentum. In addition, light water is abundant and fairly inexpensive. One drawback is that hydrogen has a relatively high neutron absorption cross-section because of its ability to form deuterium. Thus light water can only be used as a moderator along with enriched fuels. Reactors that use light water are known as light water reactors and include the pressurized water reactor (PWR), the boiling water reactor (BWR), and the supercritical water cooled reactor (SCWR). Heavy water is used in reactors because its benefits are similar to light water, but since it contains deuterium atoms, its neutron absorption cross section is much lower. The main disadvantage to the use of heavy water is its high cost of production, as it is made using the Girder-Sulfide process. Reactors that use heavy water include the CANDU designs and the pressurized heavy water reactor. Graphite has been a popular moderator in the past, however, one drawback is that it needs to be extremely pure to be effective. Graphite can be made artificially using boron electrodes, however, since boron is a very good neutron absorber— a small amount of contamination will make the graphite an ineffective moderator. One benefit of graphite is that even at the high purity that is necessary for graphite to perform well, it is available at a fairly low price. In addition, graphite is a good moderator as it is thermally stable and conducts heat well. However, at high temperatures the graphite can react with oxygen and carbon dioxide in the reactor and this decreases its effectiveness. Another potential issue with using graphite as a moderator is its ability to oxidize in the presence of air, and its low strength and density which could cause it to change dimensions in the reactor. Nuclear reactors can be either thermal or fast. Currently, almost all operating reactors are thermal and thus require a moderator to slow down fast neutrons to the thermal level so that nuclear fission can continue. However, in fast reactors a moderator is not needed, and the neutrons within it move much more quickly. Fast reactors are beneficial as they enhance the sustainability of nuclear power. This is because they have the ability to get more neutrons out of their fuel, can transform nuclear waste into products that decay more quickly, and they respond better to potentially catastrophic equipment failures. However, they are more expensive, and they can overheat fairly easily.
<urn:uuid:d2a8de56-91a4-48dc-a7b1-8012cc4874d7>
CC-MAIN-2021-43
https://energyeducation.ca/encyclopedia/Neutron_moderator?xid=PS_smithsonian
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587915.41/warc/CC-MAIN-20211026165817-20211026195817-00223.warc.gz
en
0.951248
937
4.5
4
Skip to main content You are not a member of this wiki. Pages and Files (Died between 1253-1260) Köden was Ögödei Khan’s second son and primarily had his seat of power located in Liangzhou, which had been under the rule of the Xia Empire. According to historical records, Köden was likely the first member of the Mongol ruling house that came into contact with the Sa skya Sect of Tibetan Buddhism when he launched an attack on Tibet in 1240AD. Dor-ta, the general who led the army into Tibet, had intended to return to Liangzhou with the Bri gung abbot. The abbot was to give advice and instruct the Mongols on the Buddhist doctrine. However, the Bri gung abbot, for fear of his life, declined the invitation and instead suggested to Dor-ta that the Sa skya Pandita was perhaps a better choice for the job. As a result, Köden summoned the Sa skya Pandita in 1244 and the first historical meeting between a member of the Mongol ruling house and leader of a Tibetan Buddhist sect occurred in 1246. Later Tibetan histories claimed that Sa skya Pandita was given a new political role where he was incorporated into the Mongol bureaucracy as the representative of the new rulers in Tibet. During Köden’s contact with the Sa skya Pandita, the latter healed Köden from an illness which was said to have been one of the reasons he was by-passed as a candidate to the position of Khan. However, in another little known work of ‘Phags pa, the first Imperial Preceptor under Kubilai Khan, he mentioned that Köden had received special blessings from the Sa skya Pandita and was able to “speedily produce a son”. As a reward for the Pandita’s act, Köden gave him the local temple Sprul pa’i sde ( Baitasi or White Stupa Temple) where the Sa skya Pandita was later buried in 1251. After the death of Güyüg Khan, a series of power struggles came into play with Möngke Khan emerging victorious. The members of the new Mongol ruling house took over patronage of the different Tibetan sects. The Sa skya sect was still left in the care of Köden while Khubilai, Möngke’s younger brother was given the Tshal pa sect. However, on his way back from an attack in Sichuan around 1252-53, Kubilai requested that Koöen hand over Phags pa, the Sa Skya Pandita’s nephew and had a personal audience with him. Kubilai was impressed with the wisdom of ‘Phags pa and consequently honored him with the title of Imperial Preceptor some years later. Köden’s influence and authority over the Sa skya sect was thus transferred to Kubilai Khan. Luciano Petech. 1983. Tibetan Relations with Sung China and the Mongols, In China among equals: The Middle Kingdom and its neighbors, 10th - 14th Centuries . Berkeley: University of California Press. pp. 173-204 Drashi Rinchen, Tibetan Buddhism and the Yuan Royal Court, In Tibetan Studies, pp 1-26. Chris Beckwith, 1987, Tibetan Science at the Court of the Great Khans, In Tibetan Society Vol. 7. pp 5-11. Entry by ShiQi Wu, 1/30/07 help on how to format text Turn off "Getting Started"
<urn:uuid:a6634338-5500-4426-a7e3-38216c072626>
CC-MAIN-2018-47
https://lamas-and-emperors.wikischolars.columbia.edu/K%C3%B6den?responseToken=0676473b6ad48bb8e0e5a7b47aaf0dbe
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743011.30/warc/CC-MAIN-20181116111645-20181116133645-00227.warc.gz
en
0.956321
755
2.84375
3
Close reading (in the Common Core) requires students to consider text (in it’s different forms) through three lenses: what does it say, how does it say it, and what does it mean to me? Summarizing is an essential skill for learning, but too often in school we simply ask students to “guess” what the teacher (or author) thinks is important. An essential part of a summary is that it needs to be expressed to an audience. In life, we purposefully craft summaries for a specific audience (directions for the out-of-towner, computer how-to for the technophobe). In school, the tacit audience for most summaries is the teacher. Imagine how a student feels when asked to summarize a textbook passage for the teacher. In effect they have been asked to summarize one expert’s writing for delivery to another expert – the teacher. “…and remember, be sure to use your own words!” If students are going to learn to summarize they need to be given a chance to genuinely share what they think is important for an audience other than the teacher. Here’s a three step process I followed in a second grade classroom using a popular Currier and Ives print, “Westward the Course of Empire Takes Its Way.” (1868) Link to larger image Step 1: Start with the concrete “right there” observations. I projected a digital image on the screen and asked student to talk about the people, things and activities they could identify. They replied, a train, native Americans, a village, people digging, steam from the train, houses, trees, a lake, maybe a harbor, a road, dry grass, covered wagons, poles, mountains, a school house, people working, people waiting for the train, a train track, etc …. Step 2: Give students a chance to tell what they think is important. I managed this aspect by asking each student to draw a picture of what they saw in the projected image. The details they included were what they thought was important. Here’s a few samples. Click to enlarge. Step 3: Give students a chance to frame their summary into a narrative explanation for another audience. I digitally divided the image into multiple sections and photocopied them (in B &W) into packets of image details. I gave groups of students the packets and asked them to work in teams to assemble the images into children’s “a story book” with a caption under each image. Here are some of their captions: (spelling corrected) - Water would come from the mountain and fill the lake. You could get fish and drink water. Water is very important - People were moving west. They moved by wagon at first, then but train, which is faster. - Life was tough. People had to do everything for themselves. - It maybe was lonely because people missed their friends back home. - The people were building a town. They could get wood from the trees. It was a small town at first. - The Indian see the people coming. They knew things were changing. They got sick from the smoke. - The school was different from our school. People had different clothes than us. - The train split the old life from the new life. While summarizing has been shown to be one of the most effective strategies for building content knowledge, that gain only applies when students are allowed to make their own judgements about what’s important and frame their summaries for an audience. When we ask them to “learn” the teacher’s summary – they are reduced to memorizing “another fact.” When we ask our students to create authentic summaries (with audience and purpose) we give students a chance to reflect on their learning. Instead of simply testing them for factual knowledge, students can be asked: - What did I think was important? - How did I share that with my audience? - Did my summary match audience and purpose? - Is my summary accurate? - Did I use my own words and style? - What did I learn from the activity? For more learning strategies see my blog post: 18 Literacy Strategies for Struggling Readers – Defining, Summarizing and Comparing 17 Replies to “How to Teach Summarizing: A Critical Learning Skill for Students” Perfect for an art appreciation class presentation. Love how though the artwork other learning concepts are explored. Glad you like the lesson and see its value for use in art class. I was attracted to your article as an English teacher. Recently I had a discussion about summarizing and teaching summarizing systematically (as applied to writing). The model of deconstructing a passage written in the style of the Queen’s English is rarely appropriate anymore. More often than not the articles that the students are reading, often online, are written in a news format with frequent paragraphing, sometimes just one idea in a one sentence paragraph. Under such circumstances, it’s more complicated to determine what’s important. I really like this activity you’ve presented with the use of images. I appreciate the ‘play by play’ and I plan to use this as a starting point for teaching text summarizing to grade nine students who are under grade level in their reading/writing. I’m glad you found the post useful. Nice to see you re-craft it for your HS students. Best of luck with that. Summarizing can be a lower-order, teacher centered activity. Typically in that situation, the job of the student is to give the teacher back something that the teacher already knows – a “right there” bit of information. Summarizing rises to higher-ordered, student centered when the student is actually invited to decide what’s important to them and is asked to craft it for a audience other than the teacher. Of course in that situation, you get many different summaries. The same approach can be used to help students develop sequencing skills. See this post: Why Don’t We Teach Sequencing Skills? It’s an Essential Higher-Order Thinking Strategy You might also find some useful material at this post 18 Literacy Strategies for Struggling Readers – Defining, Summarizing and Comparing Just speaking with a colleague today about strategies for teaching HS students to summarize. This strategy is excellent–I’ll be passing it on. What I like best is that it encourages students “to make their own judgements about what’s important.” Glad you like the lesson. BTW – I think letting students make “their own judgements about what’s important” is the key to most successful strategies. I was linked to this site from another site. It’s years later, but your suggestion still remains a great one. I look forward to using it in the future. Thanks Glad you find it useful. Hopefully good ideas never go out of style. I truly appreciate the step by step approach and the acknowledgement that all students will come away with their own perspective on what is truly important when crafting summaries. I only wish this was acknowledged on our assessment rubrics. Thank you for the idea! You’re so right about the assessment rubrics. So much conspires against good teaching. i am really glad to read and know how to teach summarizing in a fun way and not the usual way of how we do it. Thanks a lot. Xylene, Good to hear. Hey Peter, I love the fact that you pointed out “that gain only applies when students are allowed to make their own judgements.” If students aren’t allowed to think and come to conclusions by themselves, it can end up stymieing their creativity. At that point, they’re only trying to come up with what has been presented to them as “the right answer”, even though there might not actually be one. Thanks for your insights. Agreed. Why should students have to guess what the teacher thinks is important? Do you have a website suggestion for more paintings? My students did well with this and I would like to continue to practice on other paintings. I am struggling finding ones that fit well with the lesson though. Here links to some of my favorite image resource sites in American History and in World History.
<urn:uuid:75d0cea8-2ddd-402c-8d2d-6a299e384e2a>
CC-MAIN-2023-14
https://peterpappas.com/2009/11/how-teach-summarizing-essential-critical-learning-skill-students.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945242.64/warc/CC-MAIN-20230324020038-20230324050038-00541.warc.gz
en
0.966628
1,858
3.75
4
Researchers exploring hydrothermal vents at the bottom of the Atlantic are using communications technology to share their underwater adventures with students in southwest Florida and around the world. Doctor Bob Ballard – the scientist who discovered the wreck of the Titanic in 1985 - is leading the expedition. He’s studying the “Lost City” – a series of hydrothermal vents more than 2-thousand feet under the ocean. The giant, chimney-like vents release warm water from beneath the earth’s surface – forming a unique habitat for sea life. Through a series of live webcasts, Dr. Ballard and his team are bringing students with them. Speaking from aboard a research vessel in the middle of the Atlantic Ocean – Dr. Ballard says he’s realizing a decades-old dream. “This is the first time we’ve ever tried to do what we’re doing. 24 years ago I sat down and created a dream with the National Geographic Society that’s coming true on this expedition…so I’m thrilled that it’s all working. That concept is a concept of true exploration.” Along with their research - Dr. Ballard and his colleagues are hosting 4 daily webcasts to Boys & Girls Clubs, museums, science centers and aquariums…including Mote Marine Laboratory in Sarasota. Mote will air the webcasts live - at noon, 2 o’clock, and 4 o’clock - until August 3rd. The shows are free with the price of admission. For a look at the video feed…go to Friday, 29 July 2005 01:00
<urn:uuid:a24993de-88e5-4ce6-86d5-31404c26e45e>
CC-MAIN-2013-20
http://www.wgcu.org/index.php?option=com_k2&view=item&id=22497:
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698222543/warc/CC-MAIN-20130516095702-00088-ip-10-60-113-184.ec2.internal.warc.gz
en
0.916132
335
3.078125
3
What Is a Wood Rasp? Wood carving is the kind of art that requires tools to cut pieces of wood out to reveal the intended designs. A rasp is a helpful wood carving tool, and it reduces the unnecessary wood pieces and shapes it just as the carver desires. In this article, we will introduce the 5 best wood carving rasps in the world. Rasps quickly remove woods and leave a smooth surface behind. Rasps consist of four primary components: handle, spike, body, and tip. A rasp is mostly used by hand, and it consists of rectangular, round, or half-round sectioned bars. This tool is absolutely essential for sculptors providing detailed sections of the designs. Rasps are so much easier to use than drawknives. They are basically files but explicitly designed for carving wood. It is perfect for polishing woodworks and gives your design a more pleasing outcome. The teeth set on a rasp are pretty wider than a metal file and deeper, enabling the carver to cut coarser. Table of contents - What Is a Wood Rasp? - What Is a Wood Rasp Used For? - How to Use a Wood Rasp - 5 Best Wood Carving Rasps In The Market - Maintaining The Best Wood Carving Rasps - Suggested Articles Related to Best Wood Carving Rasps What Is a Wood Rasp Used For? Carvers utilize a rasp to remove debris or unnecessary surfaces. Rasps can be used to shape or soften stones and wooden surfaces while making sculptures. This tool can be useful for both professionals and amateurs because it is versatile and convenient. Rasps are easy to maneuver and give the carver excellent control to cut with precise angles. The symmetry in the teeth creates the grooves based on a shape that you have in mind. However, sometimes you need to use sandpaper to land a smooth outcome. Rasps are great tools to provide you with the best experience in wood carving procedures. Of course, you need to learn how to use a rasp properly first before applying your designs. How to Use a Wood Rasp The first thing you need to learn is maintaining the proper body posture while polishing. Then, you need to hold the handle with one hand and the tip with another. Try to use the wood carving rasp in a way that does not hurt your hand. You need to clean the rasp immediately after the rasp’s teeth get clogged with debris. If it’s not cleaned properly, it could damage your work. Another vital point is to always check the handle before starting your carving process. Make sure that the blade is perfectly attached to the handle. Otherwise, it could ultimately cause damage to your work or, worst, cause injuries. Best Wood Carving rasps need occasional maintenance and proper storage to maximize usability and durability. Do not toss your rasps carelessly in a bag. If you do so, you will damage the teeth eventually. Use a wire brush or a file card to clean them. 5 Best Wood Carving Rasps In The Market Buying a suitable wood rasp for your design can make a lot of difference in the outcome. You can ask carvers you know for advice or check the internet for the best models in the market. Often you can find great feedbacks on different products. The following list will also give you enough information about the best wood carving rasps in the market. 1. Narex Wood Carving Rasp Narex, 3 Piece Set Round Retail, consists of 3-course rasps with excellent quality. This product has been manufactured in the Czech Republic. The blades are made of steel, and they are very sturdy and durable, and the tooth pattern is uniform. This set is efficient and reliable. In case of disadvantages, it is a little expensive compared to other best wood carving rasps. 2. YCAMMIN Wood Carving Rasp YCAMMIN Wood Rasp File Set has a three-piece wood rasp with soft rubber handles. It is one of the best wood carving rasps in the market in 2021. These tools give you many woodworking options, such as covering corners. It also comes with a packing bag that you can use when you are not using the items. This set is an excellent choice for both armatures and professionals. Using these rasps will give you the opportunity to smooth rough spots like tight spaces and rounded corners rapidly. These unique tools have been made of high-grade steel with sharp teeth. Although this set has many advantages, there are a few flaws in the construction. The blades quickly get dull after a few usages, and the metal is not entirely straight. Also, the teeth are not inconsistent in shape. 3. Shinto Saw Rasp Shinto 9” Saw Rasp consists of a large handle, which is very comfortable to use and gives you control over your design. This rasp is one of the best wood rasps in the world. Also, it has a coarse and individually-cut tooth pattern. These features enable the carvers to remove more material faster. This model is very easy to use with the best wood for wood carving. Bear in mind that you need to watch for the rust. One advantage is the irregularity in the teeth shapes, which ultimately result in uneven surfaces and deep scratches on your materials. 4. Narex Half Round Wood Rasp Narex Half Round Wood Fine Cut Rasp is very handy and comfortable to use. The teeth are well-formed and very sharp. It has been manufactured in a unique way to ensure balance and stability. On a more cynical note, this wood rasp does not work equally with all types of wood, and it does not provide a good grip. 5. DS-Space Wood Carving Rasp DS-Space 17PCS File Set consists of 17 high carbon steel tools, hardened enough to ensure durability. Inside the beautiful Blister package of this set, you find the most efficient multipurpose tools ever. Each tool is very convenient to use and can get into tight corners and irregular spaces. However, the tools do not have the best handle grip compared to other models, and they are not suitable for heavy-duty work. Maintaining The Best Wood Carving Rasps Just like any other tools, like wood carving chisels and wood carving knives, rasps need to be cleaned and maintained regularly. They are not prone to rust, and rust is terrible for these tools, eventually making them unusable altogether. Also, try to keep all your tools, especially your wood carving rasps, in a clean and specific area and avoid tossing them around. Tossing around could damage the teeth on the rasps, which is not something you want. It would be best if you prepared a unique bag for all your carving tools. Some carving tool sets come with a special bag. In case you don’t want to get a set, you can buy a bag or make one yourself. That way, your wood carving projects will not pay for the messiness, or you won’t have to pay more money to buy new tools. Suggested Articles Related to Best Wood Carving Rasps - Power Wood Carving Tools - How to Sharpen Wood Carving Tools - Wood Carving Kit for Kids - What Are the Best Brands of Wood Carving Tools?
<urn:uuid:9cd275bf-903d-4998-bd62-6151d79b8593>
CC-MAIN-2022-40
https://handicrafts365.com/best-wood-carving-rasps/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335054.79/warc/CC-MAIN-20220927162620-20220927192620-00243.warc.gz
en
0.940344
1,543
2.59375
3
There is life in the heart of the Namib Desert Encountering Namibia’s wildlife while exploring the desert might not be something you expect, but a single excursion with our guides will quickly prove you wrong. At Zannier Hotels Sonop, nothing draws you closer to your environment and to Mother Earth than a walking trail. Discover the delicate life-pulse of the desert and immerse yourself into the fascinating fauna and flora of the Namib Desert, full of surprises and secrets. Connecting with a million-year-old Nature Estimated to be 50 million years old, the Namib Desert has been dry for as far as one can imagine. And yet, life is flourishing. While exploring the dramatic expanse of sand surrounding Zannier Hotels Sonop - either through horseback riding, electric biking or desert driving - life can be found in many various forms. With almost 70 reptile species, wild horses, jackals, leopards, snakes, endemic lizards, birds, rabbits, hyenas, zebras and scorpions, animals living in the Desert must adapt to all the hardships this environment puts in their way. Capable of surviving within extreme conditions and temperatures, these animals have developed ingenious ways of collecting water, resisting to heat and finding food in the infinity of the sand. Here are a few of these fascinating species you may encounter when visiting Zannier Hotels Sonop. With its elegant horns and unique coat, the oryx - or gemsbok - can cope with high temperatures without batting an eye. When it is dehydrated and cannot cool its body by sweating, it allows its body to heat up to 45°C, a temperature it can withstand for 8 hours without succumbing thanks to its sophisticated cooling system. If you are lucky, you may observe an oryx herd passing through the desert right next to Sonop, coming to the five waterholes we installed to support the lodge's needs. Creating an oasis in the middle of the arid desert, these waterholes contributed to bring back many animals in these boulders. To know more about the construction achievements of Zannier Hotels Sonop, click here. The otocyon, also called battle eared fox, is a small mammal easily recognizable by its large ears and eye patch. Possibly named after the Egyptian slit-faced fruit bat, its ears are its most important peculiarity. Thanks to them, otocyons are able to detect the movement of insects in the ground (termites, beetles, small rodents...) that they capture by digging at the precise location. These small animals, always observed in couple and lying in the grass, are easily identifiable thanks to their large ears that stick out from bushes. The world fastest chameleon can be found in the Namib Desert, racing after fast beetles and insects to survive ; the Namaqua chameleon. One of the largest species of African chameleon, it is less colourful than other forest chameleon, displaying earthy and brown colours to match the sandy desert. Its most remarkable ability is to change its colour to regulate its temperature, turning from almost black in the morning to absorb heat to white during the day, reflecting the bright rays of the sun. At Zannier Hotels Sonop, our horses know the desert better than anyone. Our guests can embark on a unique riding experience through the mesmerizing landscapes of the Desert, even closer to nature and to Namibia’s wildlife. Expertly led by your horse guide, travelers depart from our state-of-the-art stables to one of our bespoke trails. Ascending the ridge of a red sand dune and walking its ridge, one can appreciate the cool breeze in its face whilst becoming one with the desert grandeur. Following our guides descending the dunes into an ancient river course interspersed with desert hardened ancient Acacia Erilobas, explorers will discover trees festooned with the World’s largest avian dwellings – the communal nests of the sociable weaver birds. Living in such a hostile environment, some animals became experts at hiding and are more shy than others. Seing a zebra, an antelope or even a merkaat can be a true priviledge in the desert.
<urn:uuid:5d03b857-d22a-4011-9edc-479346f9cdac>
CC-MAIN-2022-27
https://www.zannierhotels.com/sonop-life-in-the-namib-desert/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103344783.24/warc/CC-MAIN-20220627225823-20220628015823-00222.warc.gz
en
0.931047
883
2.578125
3
Definition of Royalmasts 1. royalmast [n] - See also: royalmast Click the following link to bring up a new window with an automated collection of images related to the term: Royalmasts Images Lexicographical Neighbors of Royalmasts Literary usage of Royalmasts Below you will find example usage of this term as found in modern and/or classical literature: 1. The Merchant's and Mechanic's Assistant: Being a Collection of Rules and by Isaac Ridler Butts (1856) "AH royalmasts. two-thirds their respective ... All Royal-Poles, two-fifths their respective royalmasts. BOWSPRIT, outboard, six-sevenths of the breadth of ..." 2. A Tale of Two Oceans: A New Story by an Old Californian : an Account of a by Ezekiel I. Barra (1893) "The ship now looks trim and shapely, as the topmasts and topgallant and royalmasts have all been scraped and slushed, the bulwarks painted inside and out, ..."
<urn:uuid:dc9e38bf-9e9f-4c47-9eb1-c78df5fbef49>
CC-MAIN-2016-44
http://www.lexic.us/definition-of/royalmasts
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719463.40/warc/CC-MAIN-20161020183839-00217-ip-10-171-6-4.ec2.internal.warc.gz
en
0.890751
235
2.671875
3
Leviticus Part One: Deep Dive A DEEP DIVE INTO LEVITICUS | LUKE HOOPER Have you ever tried to read your Bible in a year? Genesis and Exodus are a breeze, but then you get to Leviticus. Rituals, sacrifices, impurities, what does it all mean? What is Leviticus trying to say? And how does it affect me today? To understand these questions, we must step back from the individual topics and the book itself to find its place amongst the other biblical texts. Understanding the purpose of Leviticus aids us in interpreting the individual events within the book. At the end of Exodus we see Moses having just built the tabernacle, speaking to God from outside the tent (Leviticus 1:1). Moses was not allowed into the presence of God and it is upon this basis that Leviticus is built, framing Leviticus as God's plan to graciously provide a way for his people to come into his presence. God's plan isn’t through mutually exclusive laws and regulations; rather it is a unique arrangement of guidelines that are a reflection of God himself. This is essential in understanding and interpreting Leviticus, lest God appear to be a mean playground bully. Matthew 22:36-40 provides clarity of God's heart on the issue. We observe the disciples asking God what “the greatest commandment is in all the Law?” Jesus responds “Love God and secondly love others… For all the Law and the Prophets hang on these two commandments.” Is this essentially saying that all the Law and what the Prophets have said, is summed up in love? In a sense, I say yes. But what does this mean when we come back to Leviticus? Well not only is the Law summed up in loving God and others, but that love can be broken down by looking at and into the Law. Meaning, that each law can be viewed, metaphorically, as a unique puzzle piece. A puzzle piece that builds a picture of what it is to truly love. Just as it is unique, each piece relates to another. Within this Deep Dive, I am going to focus in on three major themes found within this incredible puzzle of Leviticus. The first of which are rituals. Rituals in Leviticus consist of sacrifices and festivals. This begs the question, why does God decree this? Because they are an outward expression of inward confessions. Grain and fellowship sacrifices say thank you to God. Burnt, purification and restoration offerings show repentance. The ritual festivals, on the other hand, are sacred ceremonies. Some are in remembrance of God's goodness (e.g. Passover), and some are a matter of practicality to best maintain the fruitfulness of the land (e.g. Sabbath year). Looking at these rituals as pertaining to love, in some instances, we can quite easily connect the dots. Each sacrifice symbolises an attitude of gladness or remorse, and each festival or ceremony simultaneously benefits the one praising and the praise-worthy one. For example, God's desire for the Israelites to adhere to a Sabbath year was a law that brought further prosperity to Israel, while the Sabbath day shows both humility and thanks to the God of all creation. These rituals thus display God's goodness, wisdom and desire for our actions to speak louder than our words. They are a piece of the puzzle that is fairly clear but also relate to all areas of the law and all the themes, quite like the centre pieces of a puzzle. The second of the major themes is that of priestly ordinances and qualifications. It was never God's will that anyone or anything get between God and his people, however, after the fall of humanity, sin and impurity came into the world. God being so perfect and pure can not affiliate with death and depravity. That's why God required that special individuals be chosen to stand before him on behalf of the people. It’s here the ordaining of the priests (Chapters 8-10) comes into play. As these individuals were coming before God who is pure, good and perfect, the rules of the priesthood can be seen as an act of consecration towards such Godly characteristics. Such characteristics are outlined in Chapters 21-22. The characteristics on the surface can also seem quite unusual; no blindness, crooked back or broken feet. These all seem to be quite arbitrary, however, seen as part of the greater picture of love (and with some biblical hermeneutic) we can begin to understand these conditions/qualifications. Qualifications are not only physical but symbolic. Blind physically may also be seen as symbolically representing that the priests must look to God and not be blind to him. Lastly, comes the laws of purity. In Leviticus, the laws of purity are further broken down into “ritual purity” and “moral purity”. But why does God take concern of whether someone is pure or not? God cares because again, it’s what is best. The ritual purity laws are symbolic practices that reminded Israel that God is present in every area of their lives. Some scholars believe that they also kept the Israelites the healthiest of all the nations, aiding them in their conquests. As such these laws set apart the Israelite people from all the other nations, just as God has set us apart as Christians. These laws can, therefore, be seen as omni-dimensional creating a foundation that helps us best love God. The moral purity laws, however, are more direct. Each law takes its place as a boundary on how to best love God, others and ourselves. These could be seen as the edge pieces to the puzzle, clear and pointed. This doesn't make them easy to understand and it can often be hard to see how they fit into our lives today, however through prayer, community and good hermeneutic it starts to become a little clearer. So today as you Dive into Leviticus I hope I have encouraged you to see the theme of "love" in all of the laws, especially as you venture through the rituals, priestly ordinances and laws of purity.
<urn:uuid:6274d4ed-dbba-4d10-a41f-8b42b276e156>
CC-MAIN-2019-35
https://www.trashyourbible.com/leviticus-blog/part-one-deep-dive
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316150.53/warc/CC-MAIN-20190821174152-20190821200152-00072.warc.gz
en
0.96462
1,271
2.703125
3
SetFont(string family [, string style [, float size]]) Sets the font used to print character strings. It is mandatory to call this method at least once before printing text or the resulting document would not be valid. The font can be either a standard one or a font added via the AddFont() method. Standard fonts use the Windows encoding cp1252 (Western Europe). The method can be called before the first page is created and the font is kept from page If you just wish to change the current font size, it is simpler to call SetFontSize(). Note: the font definition files must be accessible. They are searched successively in: - The directory defined by the FPDF_FONTPATH constant (if this constant is defined) font directory located in the same directory as fpdf.php (if it exists) - The directories accessible through If the file corresponding to the requested font is not found, the error "Could not include font definition file" is raised. Family font. It can be either a name defined by AddFont() or one of the standard families (case It is also possible to pass an empty string. In that case, the current family is kept. Arial (synonymous; sans serif) Font style. Possible values are (case insensitive): or any combination. The default value is regular. Bold and italic styles do not apply to - empty string: regular Font size in points. The default value is the current size. If no size has been specified since the beginning of the document, the value taken is 12. // Times regular 12 // Arial bold 14 // Removes bold // Times bold, italic and underlined 14
<urn:uuid:9f8965e4-d2a2-4969-97d8-119ad11e6b43>
CC-MAIN-2020-40
https://www.bonigl.at/shop/wp-content/plugins/woocommerce-germanized/vendor/setasign/fpdf/doc/setfont.htm
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400245109.69/warc/CC-MAIN-20200926200523-20200926230523-00338.warc.gz
en
0.70204
370
3.015625
3
Music history of the United States in the 1970s |This article needs additional citations for verification. (December 2009)| |United States music history| Popular music of the United States in the 1970s saw various forms of pop music dominating the charts. Often characterized as being shallow, 70s pop took many forms and could be seen as a reaction against the high-energy and activist pop of the previous decade. It began with singer-songwriters like Carole King and Carly Simon topping the charts, while New York City saw a period of great innovation; hip hop, punk rock and salsa were invented in 70s New York, which was also a center for electronic music, techno and disco. By the middle of the decade, various trends were vying for popular success. Sly & the Family Stone's pop-funk had spawned singers like Roberta Flack and Donny Hathaway, alongside George Clinton's spacy P Funk extravaganzas, Lynyrd Skynyrd and the Allman Brothers Band led a wave of country rock bands. Light progressive-rock bands like Kansas, Journey, Chicago and Styx had long-running popularity. Bruce Springsteen garnered critical acclaim during much of the decade, finally breaking through in a big way very late in the 70s. Disco, especially The Bee Gees, was dominating the charts the last few years of the decade, while punk rock and other genres were developing underground. Hard rock, Arena rock and Heavy metal |This section requires expansion. (April 2010)| The 1970s saw the emergence of hard rock as one of the most prominent subgenres of rock music. Bands like Alice Cooper and Deep Purple were highly popular by 1972.The guitar sounds became heavier and the riffs faster. By the second half of the decade, several bands had achieved star status, namely, Lynyrd Skynyrd, Aerosmith and Kiss. Arena rock grew in popularity through progressive bands like Styx ("Come Sail Away"), and hard rock bands like Boston ("More Than a Feeling"). Heavy metal music (though not recognized as a separate genre from hard rock at the time) gained a cult following in the 1970s, led by Led Zeppelin, Black Sabbath and Deep Purple, with their styles later influencing other bands like Judas Priest and Motörhead, which eventually started the New Wave of British Heavy Metal in the 1980s. Soft rock and singer-songwriter Soft rock was prominently featured on many Top 40 and contemporary hit radio stations throughout the 1970s. Soft rock often used acoustic instruments and placed emphasis on melody and harmonies. Major soft rock artists of the 1970s included Carole King, James Taylor, Billy Joel, Chicago, America and Fleetwood Mac, whose Rumours (1977) was the best selling album of the decade. (See the country music section of this article for more about country music that crossed over onto the pop charts.) Bob Dylan's 1975-1976 Rolling Thunder Revue reunited him with a number of folk-rock acts from his early days of performing, most notably Joan Baez. A large number of country-pop and soft rock songs fit into the singer-songwriter classification — that is, songs written and recorded by the same person. Some of the most successful singer-songwriter artists were Jackson Browne, Eric Carmen, Jim Croce, John Denver, Steve Goodman, Arlo Guthrie, Joel, Dave Mason, Don McLean, Joni Mitchell, Paul Simon, Taylor and Neil Young. Some artists — including King, Kris Kristofferson and Gordon Lightfoot — had previously been primarily songwriters but began releasing albums and songs of their own. King's album Tapestry became one of the top-selling albums of the decade, and the song "It's Too Late" became one of the 1970s biggest songs. McLean's 1971 song "American Pie," inspired by the death of Buddy Holly, became one of popular music's most-recognized songs of the 20th century, thanks to its abstract and vivid storytelling, which center around "The Day the Music Died" and popular music of the rock era. The early 1970s marked the departure of Diana Ross from The Supremes and the breakup of Simon & Garfunkel. Ross, Simon and Art Garfunkel all continued hugely successful recording careers throughout the decade and beyond. Several of their songs are listed among the biggest hits of the 1970s: Simon & Garfunkel's "Bridge Over Troubled Water," Simon's solo hit "50 Ways to Leave Your Lover," and Ross' "Ain't No Mountain High Enough." Country rock and Southern rock Country rock, formed from the fusion of rock music with Country music, gained its greatest commercial success in the 1970s, beginning with non-country artists such as Bob Dylan, Gram Parsons and The Byrds. By the mid-1970s, Linda Ronstadt, along with other newer artists such as Emmylou Harris and The Eagles, were enjoying mainstream success and popularity that continues to this day. The Eagles themselves emerged as one of the most successful rock acts of all time, producing albums that included Hotel California (1976). During the 1970s, a similar style of country rock called southern rock (fusing rock, country and blues music, and focusing on electric guitars and vocals) was enjoying popularity with country audiences, thanks to such non-country acts as Lynyrd Skynyrd, The Allman Brothers Band and The Marshall Tucker Band. The American brand of prog rock varied from the eclectic and innovative Steel Heart, Frank Zappa, Captain Beefheart and Blood, Sweat and Tears, to more pop rock oriented bands like Boston, Foreigner, Kansas, Journey and Styx. These, beside British bands Jethro Tull, Supertramp and Electric Light Orchestra, all demonstrated a prog rock influence and while ranking among the most commercially successful acts of the 1970s, issuing in the era of pomp or arena rock, which would last until the costs of complex shows (often with theatrical staging and special effects), would be replaced by more economical rock festivals as major live venues in the 1990s. Many American bands in the late seventies began experimenting with synthesizers, forming the new wave style. The original American bands included Talking Heads, The Cars, and Devo. In the eighties, Britain would respond with the synthpop style, which broadened the definition of "new wave". For many people, disco is the genre of music most readily associated with the 1970s. First appearing in dance clubs by the middle of the decade, (with such hits as "The Hustle" by Van McCoy), songstresses like Donna Summer, Gloria Gaynor and Anita Ward (in North America); and Dalida (in Europe) popularized the genre and were described in subsequent decades as the "disco divas." The movie Saturday Night Fever was released in December 1977, starring John Travolta and featuring the music of the Bee Gees and several other artists. It had the effect of setting off disco mania in the United States. the Bee Gees' soundtrack to Saturday Night Fever became the best selling album of all time until 1983 when Michael Jackson's Thriller broke that record. Almost as quickly as disco's popularity came, however, it soon fell out of favor. The genre started to become increasingly commercialized, and the large number of disco songs flooding the radio airwaves in 1978-1979 resulted in a growing backlash against it, as epitomized by the "Disco Demolition Night" stunt by a Chicago disc jockey at a July 1979 baseball game at Comiskey Park. Disco clubs also gained a reputation as decadent places where people engaged in drug use and promiscuous sex. The popularity of the genre waned, and 1980s "Funkytown" by Lipps Inc. was one of the last disco hits. Along with the demise of disco came the end of the orchestrations and musical instruments (such as strings) which had become associated with disco, in part because of the high cost of producing such music. Electronic and synthesized music quickly replaced the lush orchestral sounds of the 1970s and rock music resurged in popularity with new wave bands such as Blondie ("Heart of Glass"), The Knack ("My Sharona") and Devo ("Whip It"), all who formed their bands in the 1970s. Many artists such as The Bee Gees, who came to be associated with disco, found it difficult to sell records or concert tickets in the 1980s. R&B and urban Along with disco, funk was one of the most popular genres of music in the '70s. Primarily an African-American genre, it was characterized by the heavy use of bass and "wah-wah" pedals. Rhythm was emphasized over melody. Artists such as James Brown, The Meters, Parliament-Funkadelic and Sly And The Family Stone pioneered the genre. It then spawned artists such as Stevie Wonder, The Brothers Johnson, Earth, Wind & Fire, Bootsy's Rubber Band, King Floyd, Tower of Power, Ohio Players, The Commodores, War, Kool & the Gang, Confunkshun, Slave, Cameo, the Bar-Kays, Zapp, and many more. The Jackson 5 became one of the biggest pop-music phenomena of the 1970s, playing from a repertoire of rhythm and blues, soul, pop and later disco. The Jacksons — brothers Jackie, Tito, Jermaine, Marlon and Michael — the first act in recording history to have their first four major label singles: "I Want You Back", "ABC", "The Love You Save", and "I'll Be There" reach the top of the Billboard Hot 100. The band served as the launching pad for the solo careers of their lead singers Jermaine and Michael, and while Jermaine had some success, it was Michael who would transform his early fame into greater success as an adult artist, with songs such as "Don't Stop 'Til You Get Enough" and "Rock with You." The Commodores were another group that played from a diverse repertoire, including R&B, funk and pop. Lionel Richie, who went on to even greater success as a solo artist in the 1980s, fronted the group's biggest 1970s hits, including "Easy," "Three Times a Lady" and "Still." Male soloists who characterized the pop music of the era included Barry Manilow, Eric Carmen, Leo Sayer, Shaun Cassidy and Rod Stewart. Female soloists who epitomized the '70s included Cher, Carly Simon, Dionne Warwick, Barbra Streisand, Rita Coolidge, and Helen Reddy. A number of styles defined country music during the 1970s decade. At the beginning of the decade, the countrypolitan — an offshoot of the earlier "Nashville Sound" of the late 1950s and early 1960s — and the honky-tonk fused Bakersfield Sound were some of the more popular styles. The countrypolitan sound — a polished, streamlined sound featuring string sections, background vocals and crooning lead vocalists — was popularized by artists including Lynn Anderson, Glen Campbell, Ann Murray, Dottie West, Tammy Wynette and others, achieving their successes through such songs as "(I Never Promised You a) Rose Garden", "Snowbird" and others. The Bakersfield sound, first popularized in the early 1960s, continued its peak in popularity through artists such as Buck Owens and Merle Haggard. But other styles began to emerge during the 1970s. One of the more successful styles was "outlaw country", a type of music blending the traditional and honky tonk sounds of country music with rock and blues music, and mixed with the anger of an alienated subculture of the nation during the period. The leaders of the movement were Waylon Jennings and Willie Nelson, although others associated with the movement were David Allan Coe, Jessi Colter, Tompall Glaser, Gary Stewart and Billy Joe Shaver. The efforts of Jennings, Nelson, Colter and Glaser were encapsulated in the 1976 album Wanted! The Outlaws. The country pop sound was a successor to the countrypolitan sound of the early 1970s. In addition to artists such as Murray and Campbell, several artists who were not initially marketed as country were enjoying crossover success with country audiences through radio airplay and sales. The most successful of these artists included The Bellamy Brothers, Charlie Rich, John Denver, Olivia Newton-John, Marie Osmond, B. J. Thomas and Kenny Rogers. Newton-John, an Australian pop singer, was named Female Vocalist of the Year by the Country Music Association, sparking a debate that continues to this day — what is country music? A group of traditional-minded artists, troubled by this trend, formed the short-lived Association of Country Entertainers, in an attempt to bring back traditional honky-tonk sounds to the forefront. The debate continued into 1975, a year where six songs reached No. 1 on both the Billboard Hot Country Singles and Billboard Hot 100 charts. Things came to a head when, at that year's CMA Awards, Rich — the reigning Entertainer of the Year, and himself a crossover artist — presented the award to his successor, "my good friend, Mr. John Denver." His statement, taken as sarcasm, and his setting fire to the envelope (containing Denver's name) with a cigarette lighter were taken as a protest against the increasing pop style in country music. By the later half of the 1970s, Dolly Parton, a highly successful traditional-minded country artist since the late 1960s, mounted a high profile campaign to crossover to pop music, culminating in her 1977 hit "Here You Come Again," which peaked at No. 1 country and No. 3 pop. Rogers, the former lead singer of The First Edition, followed up a successful career in pop, rock and folk music by switching to country music. Like Parton, he enjoyed a long series of successful songs that charted on both the Hot Country Singles and Billboard Hot 100 charts; the first of the lot was "Lucille," a No. 1 country and No. 5 pop hit. Crystal Gayle, Ronnie Milsap, Eddie Rabbitt and Linda Ronstadt were some of the other artists who also found success on both the country and pop charts with their records as well. The 1970s continued a trend toward a proliferation of No. 1 hits on the Billboard Hot Country Singles chart. In 1970, there were 23 songs that reached the top spot on the chart, but by the mid-1970s, more than 40 titles rotated in and out of the top spot for the first time in history. The trend temporarily reversed itself by the late 1970s, when about 30 to 35 songs reached the pinnacle position of the chart annually. In the second half of the decade, a 1950s nostalgia movement prompted the Rockabilly Revival fad. The Stray Cats led the revival into the early 1980s. Billy Joel provided "Piano Man" and "Only The Good Die Young". Also symbolizing this trend was the hit movie Grease in 1978, starring John Travolta and Olivia Newton-John. Tying in with the nostalgia craze, several stars of the late 1950s and early 1960s successfully revived their careers during the early- to mid-1970s after several years of inactivity. The most successful of these were Ricky Nelson ("Garden Party", 1972), Neil Sedaka ("Laughter in the Rain" and "Bad Blood", both 1975), and Frankie Valli as both a solo artist (1975's "My Eyes Adored You") and with The Four Seasons (1976's "December 1963 (Oh, What A Night)"). In addition, Perry Como—one of the most successful pre-rock era artists—enjoyed continued success, albeit on a somewhat smaller scale (as most of his fans were adults who grew up during the 1940s and early 1950s, and not the rock record-buying youth); his most successful hits of the decade were "It's Impossible" (1970) and the Don McLean song "And I Love Her So" (1973). Two of popular music's most successful artists died within six weeks of each other in 1977: Elvis Presley (on August 16) and Bing Crosby (on October 14). Presley—whose top 1970s hit was "Burning Love" in 1972— ranked among the top artists of the rock era, while Crosby was among the most successful pre-rock era artists. - P. Buckley, The Rough Guide to Rock (London: Rough Guides, 3rd edn., 2003), ISBN 1-84353-105-4, p. 378. - J. M. Curtis, Rock eras: interpretations of music and society, 1954-1984 (Popular Press, 1987), p. 236. - P. Buckley, The Rough Guide to Rock (Rough Guides, 3rd edn., 2003), p. 378. - "Top Fifty Hits of the 1970s," American Top 40, Watermark Inc. Aired January 5, 1980. Cue sheet retrieved 1-31-2010. - N. E. Tawa, Supremely American: Popular Song in the 20th Century: Styles and Singers and What They Said About America (Lanham, MA: Scarecrow Press, 2005), ISBN 0-8108-5295-0, pp. 227-8. - N. E. Tawa, Supremely American: Popular Song in the 20th Century: Styles and Singers and What They Said About America (Lanham, MA: Scarecrow Press, 2005), ISBN 0-8108-5295-0, pp. 249-50. - V. Bogdanov, C. Woodstra and S. T. Erlewine, All Music Guide to Rock: the Definitive Guide to Rock, Pop, and Soul (Milwaukee, WI: Backbeat Books, 3rd edn., 2002), ISBN 0-87930-653-X, pp. 1330-1. - Huey, Steve. "The Jackson 5". Macrovision Corp. Retrieved 2008-05-08.
<urn:uuid:fb39fb2b-58fb-45f9-b64c-1ad5af47eb84>
CC-MAIN-2015-22
http://en.wikipedia.org/wiki/Music_history_of_the_United_States_in_the_1970s
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928019.82/warc/CC-MAIN-20150521113208-00344-ip-10-180-206-219.ec2.internal.warc.gz
en
0.958776
3,784
2.984375
3
Steam Locomotive Bells Bells were standard equipment on steam locomotives in North America from around 1840 onward. Their purpose was to make noise, alerting people and animals of an oncoming train. Steam locomotive bells were usually made of cast bronze or brass. They were typically between 11 and 17 inches in diameter (measured at the widest part). They could weigh hundreds of pounds. When a steam locomotive was scrapped, the locomotive bell was often one of the few items saved from the torch. The bell assembly included several parts: - The Bell: The bell itself is one solid piece. - The Cradle: The cradle is the framework portion that attaches to the locomotive. - The Yoke: The yoke holds the bell and allows it to swing in the cradle. - The Clapper: The clapper is the metal piece hanging inside the bell. When the bell swings the clapper hits the bell causing it to ring. - The Pull-Arm: The pull-arm is attached to the yoke. A rope is attached to the pull-arm so that the engineer or fireman can cause the bell to swing. On early locomotives and others that did not have clearance issues, bells were mounted on top of the boiler. On larger locomotives where height clearances became an issue, bells were mounted on the front of the smokebox. There were also cases where steam locomotive bells were mounted in odd places like under the smokebox or under the running board. I am often contacted by people who have acquired a locomotive bell and would like help in identifying it. Unfortunately, it was not standard practice to have marks that easily identified the locomotive (like a serial or engine number) engraved on a bell. Instead, bell manufacturers had their own identifying marks on the yoke and the cradle. Most of the casting numbers were only meaningful to the foundries that cast them and all the information for those casting numbers were lost when the foundries closed. Baldwin bell identification numbers do exist but are only known by a few people. Some steam locomotive bells that were made by a railroad (like CPR or PRR) were only used on their locomotives and were all very similar. For these reasons, it is difficult to determine what locomotive a bell comes from. However, Robin Stuber is an expert at identifying steam locomotive bells and, for a fee, can help you identify one. Contact him if you are interested.
<urn:uuid:aa32b4e7-8f8a-40f8-bf6b-a978274cf575>
CC-MAIN-2017-13
http://www.steamlocomotive.com/appliances/bells.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218193716.70/warc/CC-MAIN-20170322212953-00206-ip-10-233-31-227.ec2.internal.warc.gz
en
0.980344
537
3.65625
4
Your nose is congested and it’s hard to breathe. Thick mucus irritates the back of your throat. Your face, head and even your teeth hurt from the pressure. You’re losing your sense of smell and taste. You’re incredibly tired and irritable. You think that it must be yet another cold or allergy attack again this year. You take allergy or cold medicines to relieve your symptoms but they don’t help. Finally, you see your primary care physician or general practitioner. After listening to your history of symptoms and conducting an exam the doctor says you have acute sinusitis, which is a temporary inflammation of the sinus lining that is caused by a bacterial infection and commonly called a sinus infection. Your doctor may recommend saline nasal sprays, antibiotics, nasal steroid sprays, decongestants and over‐the‐counter pain relievers to help relieve the condition. However, if you experience symptoms for longer than 12 weeks you could have chronic sinusitis. A Look into the Sinuses The sinuses are hollow spaces in the skull (i.e. the frontal, ethmoid, sphenoid and maxillary) which serve to lighten the skull and give resonance to the voice. The purpose of the sinuses, which open into the nasal cavity, is to generate mucus to keep the nose from drying out during breathing and to trap unwanted materials so that they do not reach the lungs. When you have acute or chronic sinusitis, the mucous membranes of your nose, sinuses and throat become inflamed, possibly from a pre‐existing cold or allergies. Swelling obstructs the sinus openings and prevents normal mucus drainage, causing mucus and pressure to build up. Symptoms include: drainage of a thick, yellow or greenish discharge from the nose or down the back of the throat; nasal obstruction or congestion; tenderness and swelling around the eyes, cheeks, nose and forehead; and/or a reduced sense of smell and taste. The impact of chronic sinusitis on a person’s quality of life could include: throbbing facial pain or headaches, congestion, bad breath, irritability, fatigue or nausea. To find a Holy Redeemer Ear, Nose, and Throat Physician (Otolaryngologist), please call 1-800-818-4747.
<urn:uuid:ab41bfd7-d5cb-475e-8a2e-a16c7503e945>
CC-MAIN-2014-41
http://www.holyredeemer.com/Main/EarNoseandThroatDisorders.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657124236.90/warc/CC-MAIN-20140914011204-00244-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.92254
493
3.203125
3
The past 20 years of research have furnished evidence that Moringa Oleifera is the most nutrient-rich plant of the planet. But not just this scientific data draws attention. This tree can do much more and is dealt by some as the most important plant in human history. Moringa could help to: - solve food and health problems - reduce undersupply and malnutrition - bridge shortages in drinking water - tackle poverty and hunger - avoid energy problems The parts of the moringa tree like leaves, pots, seeds, roots and bark can be employed as aliment, remedy and tonic. Therefore, the plant could help with food and health issues in the Third World and improve the situation of hunger, maternal and infant death. Regarding this topic, there are several studies. But not just these regions have diet-related health issues; also in the “First World” the number of sick people is increasing due to malnutrition and machine-made foodstuff. Obesity, anorexia, vitamin deficiency or hypervitaminosis for example lead to other ailments. We are eating “more”, but our food contains less essential and bioavailable ingredients. The health problems accrue with a lack of building blocks that are mandatory for our metabolism. It has been proven that with the relentless usage of agricultural areas also the content of vitamin and nutrients of our local fruits and vegetables has decreased over the last decades. In some parts of Africa – where drinking water is scarce – moringa seeds are applied to clarify contaminated water in a very simple way. The seeds are admixed in powdery form to dirty water and their active substances eliminate most of the suspended particles, bacteria and viruses by binding them as sediment – similar to the principal of modern clarification plants. The 99% pure water can be drunk without harmful effects and could reduce yearly death rates caused by the utilization of polluted water. The moringa tree is frugal in its cultivation and does not need special ground preparation, which is why it is deployed for afforestation and working against desertification. In many cases, composted moringa residues can be used as a natural fertilizer to prepare the soil for growing crops. Moreover, this tree still carries edible leaves at the end of dry seasons – then, when other aliments are short. Bioavailability is a pharmacological measure which shows the proportion of an unmodified active ingredient that is available to the systemic circulation (especially bloodstream). It indicates how quickly and in which amount a substance is resorbed by the body and reaches the targeted area. For an active ingredient that is administered intravenously, the bioavailability is 100 % by definition. In case of an oral intake we speak of an oral bioavailability, as the active ingredient is resorbed by the digestive system, e.g. gastric mucosa. Moringa has a very high bioavailability and therefore can deliver its vital substances into ones metabolism fast and effectively. Vitamins, minerals, trace elements and secondary plant compounds (phytamins) are defined as micronutrients (also vital substances); lipids (fats), carbohydrates and proteins are summed up as macronutrients. Both are essential for our bodily functions, e.g. for the metabolism, the cell growth and with it regeneration of skin, bones, blood cells or nerve conductors. In addition, they fulfill functions in enzymatic reactions and are components of hormones (e.g. iodine of the thyroid hormone), electrolytes and antioxidants. Moringa has a very concentrated, balanced and unique composition of nutrients. Moringa has been accompanying humanity for several millenniums, and some Asiatic and African cultures cannot imagine day-to-day life without it. The plant can only be cultivated indoors at our latitudes, hence it has to be imported from southern countries; Europeans just recently gained access to fresh moringa products. Recognition was acquired 20th century Europe particularly in form of premium-quality ben oil, which was utilized in the watchmaking industry. This may be another reason why moringa was not established as aliment at that time. Many people could simply not imagine consuming oil that was used as mechanical lubricant. Today recognition and popularity of this amazing plant are increasing due to globalization and the internet. ORAC stands for Oxygen Radical Absorbance Capacity and provides information about the total antioxidant capacity of a food sample. The derivative of vitamin E Trolox is used as reference for the measurement; this is the reason why results are expressed as trolox equivalents. Mostly, ORAC values are determined for foods with the objective to evaluate their potential of reducing free radicals and, as a result, of counteracting oxidation processes. Free radicals are atoms or molecules that have at least one unpaired electron in an outer shell which makes them highly unstable. Damage occurs when a free radical encounters another molecule and seeks to find another electron to pair its unpaired electron. The free radical often pulls an electron off a neighboring molecule, causing the affected molecule to become a free radical itself. The new free radical can then pull an electron off the next molecule, and a chemical chain reaction of radical production occurs. The free radicals produced in such reactions often terminate by removing an electron from a molecule which becomes changed or cannot function without it. Such an event causes damage to the molecule, and thus to the cell that contains it (since the molecule often becomes dysfunctional). This is why free radicals are thought to play an important role in the development of illnesses such as cancer, atherosclerosis, liver damages, emphysema and Alzheimer, to name but a few. To put it simply: metal rusts or oxidizes; the human body grows old or oxidizes due to comparable chemical reactions. We can antagonize the aging process with the help of natural anti-oxidants (radical catchers) which we take up with our daily nutrition or which are produced by our own organism. In this way our body – although absorbing free radicals – has the weapons to deactivate them because it has been supplied with the necessary micro- and macronutrients to produce radical catchers that act as a defense army against electron predators. Moringa has an enormous ORAC value and is therefore one of the best radical catchers we know. Depending on the area of cultivation and type of processing, ORACs for moringa lie between 33,000 and 46,000 µmol TE/100 g. Moringa from the Canary Islands even attains 75,000 to 109,000 µmol TE/100 g. Despite the fact that the ORAC measurement method is state-approved in the USA, it is not allowed to use or advertise it in the European Union and we mentioned it just for the sake of completeness. As an overview and for comparison, please find some ORAC values of different food stuffs in the following. ORAC values are expressed in µmol TE/100 grams.
<urn:uuid:a9b7f38a-6ac0-4777-8039-1f444c225209>
CC-MAIN-2020-50
https://moringafarm.eu/en/questions/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141176049.8/warc/CC-MAIN-20201124082900-20201124112900-00178.warc.gz
en
0.946885
1,424
3.3125
3
MGT5019-8 > Ethics in Society and Business > Week 1 > Assess Potential Actions that can be Taken to Promote Ethical Behavior (Graded, Required);Week 1 Assignment: Assess Potential Actions that can be Taken to Promote Ethical Behavior;Activity Description;When considering ethical behaviors and how to implement them in your own life, it is important to approach this through your own experiences. After reviewing the materials for this assignment, reflect on the importance of the Northcentral University Mission, Vision, and Values Statements and respond to the following in a paper;What do Northcentral?s Mission Statement, Vision, and Values Statements mean to you as a student?;How should students, faculty, and staff at Northcentral as a whole strive to meet these statements?;What actions should individuals take at Northcentral to remain ethical in their unique roles?;After reviewing Jenning?s Reading 1.1 regarding the importance of a personal credo, write your own by answering the two questions the author poses for credo development (2012, p. 3).;Interpret how your personal credo can be effectively applied in the workplace.;Support your paper with minimum of three (3) scholarly resources in addition to the required resources listed for the activity ? for a total of six resources. Therefore, in addition to the specified resources, other appropriate scholarly resources, including older articles, may be included.;Length: 5-7 pages not including title and reference pages;Your paper should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards. Be sure to adhere to Northcentral University's Academic Integrity Policy.;Learning Outcomes;1.0 Summarize the actions taken to meet ethical considerations relative to social performance, financial performance, and reputation. Paper#35549 | Written in 18-Jul-2015Price : $42
<urn:uuid:e15a5064-b8ae-477d-8cb5-68afae4935d9>
CC-MAIN-2017-04
http://studentsmerit.com/paper-detail/?paper_id=35549
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280280.6/warc/CC-MAIN-20170116095120-00015-ip-10-171-10-70.ec2.internal.warc.gz
en
0.899229
395
2.8125
3
While not officially declared the first flag of the U.S., after overtaking the British in Boston, George Washington's army hoisted a flag with 13 alternating red-and-white stripes and the design of the British Union Jack flag in the upper left-hand corner, or the canton. They called it the Grand Union flag. But then... The first Flag Act of 1777 (with two more Flag Acts to follow) declared the actual design of the first U.S. flag, commonly known as the Betsy Ross flag. It features 13 red-and-white stripes with 13 white stars in a blue canton, all symbolizing the original 13 colonies forming the Union. Many of the original 13 states continue to wave the Betsy Ross flag to this day. It's my favorite flag design. Eventually, more states meant more stars... By 1794, there were 15 states, resulting in 15 stars and 15 stripes on our Nation's flag. This, in turn, amended the Flag Act (Act 2). In 1818 came the third, and final, change to the Flag Act, reverting back to the 13 original colony stripes. The stars were noted to correspond to the number of states in the union - smart Congressmen, third time was a charm to get the proper wording to avoid future amendments. By 1960 our Nation grew to 50 states (welcome Hawaii!), and 50 stars, providing for the current day design of the flag of the U.S.A., but it's still fun to marvel in the glory of the earlier designs. Whichever you choose to wave... Happy Flag Day!
<urn:uuid:12305b3a-e55d-4205-97a7-c942c70fc1c4>
CC-MAIN-2022-49
https://www.slonerangerblog.com/2013/06/stars-and-stripes.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710503.24/warc/CC-MAIN-20221128102824-20221128132824-00718.warc.gz
en
0.922696
332
3.484375
3
Nest is working to reduce learning gap among government school students Welcome to Nest Foundation We aim to create a protective and caring environment, where girls and boys are free from violence, exploitation, and unnecessary separation from family. Laws, services, behavior and practice must minimize vulnerability, in addressing risk factors while strengthening the resilience of children and their capacity to resist abuse. The approach is based on a human rights perspective, and emphasizes prevention as well as the accountability and responsibility and other entities and institutions dealing with the care and well-being of children. Our Nest Foundation Programs Whether it is during an emergency or after an emergency, Nest Foundation plays major role in reducing the unpleasant effects of these situations, with the help of the program- Disaster management. Nest Foundation will be the first to be present and last to leave during the emergencies. The major focus will be on the following factors of the affected people. - Drinking Water - Shelter and Medicine Nest Foundation is a colorful, child-friendly Early Childhood Development centers offer indoor and outdoor play equipment, learning and teaching materials, access to water and sanitation, training for teachers, and robust parent-teacher associations. Easy access to water reduces the time mothers spend collecting water and increases the time they spend with their children. After receiving training, volunteer mothers guide parents and other caregivers in providing good nutrition, stimulating children’s physical and mental development, and taking care of them in loving ways. Children ages 4 and 5 even learn how to protect themselves during storms and other dangerous weather, through Nest Foundation disaster risk reduction program. Nest Foundation presents Empowerment as follows: - Women’s sense of self-worth (dignity and value placed on one’s capacities) - The space and opportunities to determine choices - Power to control their lives within and outside the home - Ability to decide, act and influence the direction of social change - Help create a just, social and economic order, nationally and internationally - Direct the capacities and strategies of women’s empowerment to the workings of markets and states. - Influence governments to be responsive to women’s needs, participation and contributions as producers and “reproducers” Specific past programmes include: - We carried out a HIV and Malaria immunisation programme. - NEST Projects being implemented in Chennai and Jawadhu Hills. - Volunteer panel of lawyers who appear on behalf of migrant workers, headed by an Executive Committee member. - Elderly Care Givers Awareness Programme on nutrition promotion for Maternal, Infant, Child and Youth Groups. - Safe Migration Promotion programme in the districts Thiruvanamalai. There is a heavy dependence of aid and hand-outs among rural and underprivileged communities in Jawadhu Hills. Further, due to the lack of development training, such communities are affected by several socio-economic conditions caused by unwise borrowings, lack of long-term planning, entitlement mindset caused by welfare state and social stigmas such as discrimination of female entrepreneurs. Due to these conditions, such communities are trapped in the vicious cycle of poverty and continue to be affected by malnutrition, underemployment, lack of education and lack of access to financial services. Recognizing this as the situation that prevents rural poor and urban slum-dwellers from reaching better living standards, the Nest works towards strengthening communities through community development initiatives. Through training, community leaders and other catalysts are equipped to take ownership of the development of their villages and communities. They are instructed on the tools available to them and are linked with local government authorities and other stakeholders so that they may have benefit from development that is sustained by the active contribution of all members of their community. All other development initiatives of the ADT are seamlessly integrated through the development education trainings with the aim of ensuring that the trained community members will continue to initiate development work even after the ADT has phased out. Our Foundation will improve poor children or the affected children. Help the Children The major focus will be on the following factors of the affected people. Become a Volunteer A person who voluntarily undertakes or expresses a willingness to undertake.
<urn:uuid:e3b0d3fb-4c30-40c0-847d-f75e4801bfa9>
CC-MAIN-2020-50
http://nestfoundation.in/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141188899.42/warc/CC-MAIN-20201126171830-20201126201830-00472.warc.gz
en
0.943186
864
2.640625
3
KCSE Grading Scale – Per Subject KCSE Grading System – Per Subject; See details on KCSE Grading System – Per Subject The Kenya National Examination Council (KNEC) uses a grading system to evaluate the examination performance of students who sit for the KCSE exams. Currently, KCSE results are determined by a 12-point grade system. This grade will determine the kind of tertiary institution that a student can join. Here is a breakdown of the current KCSE grading system. KNEC recently released the KCSE grading system they will use for the 2019 national examinations. The system is based on a numeric 12-point scale from 1-12 and an expanded letter grade ranging from A to E (A, A-, B+, B, B-, C+, C, C-, D+, D, D-, E). The expanded letter grade means C+ is the ‘pass’ grade that allows students to join a public university. It is a grade most students can aim for when sitting for their exams. Many universities and employers consider grades C to E as insignificant nowadays. A is the best grade a student can strive to get. It takes a mixture of grades A- to B- for a student to enroll in a good university. The KCSE grading system attempts to measure the breadth or depth of learning in Kenyan schools. It also measures competence levels and quality of performance in students. In previous years, KNEC used the grading system as a standard measure of comparing students. But this has changed since the Education Department uses it as a tool to assess learning. Students can use the system to reveal their next learning steps. For example, students who score B+ in Biology, Mathematics, and English can choose to learn medicine in university. Although a student may sit for the national examinations, KNEC may not award the student a mean grade for several reasons. This can happen if a student does not meet the set requirements for getting a certificate. In this case, a candidate will have a grade of: - U – it indicates a candidate has not met the criteria for a certificate award - W – it indicates KNEC has withheld a candidate’s results for various reasons - X – it indicates a candidate was not present throughout the exams - Y – it indicates KNEC has canceled a candidate’s results because of irregularities - Z – it indicates a candidate has not met the registration requirements How the KCSE grading system works KNEC grades candidates who sit for 7 or more KCSE subjects during the national examinations. The examinations body puts all subjects into five groups. These groups include: - Group I – These are compulsory subjects all students must sit for during exams. They include English (101), Kiswahili (102), and Mathematics (121). - Group II – The group consists of four science subjects. However, a student must sit for at least two subjects during the exams. They include Biology (231), Physics (232), Chemistry (233), and General Science (237). - Group III – The group consists of five humanities subjects. A student must sit for at least one subject during the exams. They include History and Government (311), Geography (312), Christian Religious Education (313), Islamic Religious Education (314), and Hindu Religious Education (315). - Group IV – There are eleven subjects in this group. The subjects include: Home Science (411), Art and Design (442), Agriculture (443), Woodwork (444), Metalwork (445), Building Construction (446), Power Mechanics (447), Electricity (448), Drawing and Design (449), Aviation Technology (450), and Computer Studies (451). - Group V – The groups consists of subjects from languages and business studies. They include French (501), German (502), Arabic (503), Kenya Sign Language (504), Music (511), and Business Studies (565). A student can choose the seventh subject from Group II or Groups III, IV or V. To get a mean grade based on the KCSE grading system 2018, KNEC averages a student’s score in all the seven (7) subjects. The table below shows grades and marks and their corresponding points based on the current KCESE grading system. Based on the current KCSE grading system per subject, it shows that the 2018 KCSE examinations will not be as challenging as previous ones. A student is more likely to get a grade of A by scoring 81 or above. Had the highest numeric aggregate grade started from 80, for example, it would suggest students will find this year’s exams a bit harder. Marking of KCE exams During the marking of KCSE examinations, KNEC does not give candidates a percentage mark to get a particular grade. Instead, they publish KCSE grades and points to indicate the general performance of students. The examinations body sets grades by combining expert judgment and statistics to come on an agreeable grade boundary. Exam papers are not the same. They vary in difficulty. As such, the experts set grade boundaries to reflect the current performance of all students. The purpose is to ensure candidates do not get lower grades just because they sat for more difficult papers than previous years’. After agreeing on grade boundaries, KNEC applies them to students’ marks to give them a grade. KCSE examiners are teachers experienced in respective subjects. The examinations body selects them carefully and trains them before they can mark the exams. It is essential that they use the same standards when marking the exams so that KNEC can award students the right grades. Before schools can receive the results, senior examiners conduct final checks on all the marking. The purpose is to ensure no errors and that the standards were met during the marking of the exams. The Kenya National Examinations Council does not use percentages in the grading system. They replace them with letter grades to create a mean grade. Kenyan universities do not use percentages from KCSE results when enrolling students too. Instead, they use the mean grade to determine a student’s rank in the concluded exams. This strategy means that the KCSE grading system gives a better measure of a student’s performance than the traditional marking system.
<urn:uuid:17b14e8c-0e25-4037-80ea-ca7771b14504>
CC-MAIN-2023-06
https://www.citizennewsline.co.ke/knec-kcse-grading-scale-per-subject-2022-2023/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499654.54/warc/CC-MAIN-20230128184907-20230128214907-00142.warc.gz
en
0.932114
1,278
2.765625
3
What we’re hearing these days about carbohydrates – that we should blame them for the increase in obesity, diabetes, and heart disease – makes sense, but why did it take so long for this wisdom to prevail? Part of the answer is political. The US Department of Agriculture has a big influence on what Americans eat. But where were the scientists? Unfortunately, much scientific research is funded by the government. If you want your grant renewed, you don’t threaten to bite the hand that feeds you. So fat wasn’t the problem after all The new wisdom about carbs is discussed in an LA Times story, “A reversal on carbs.” I was pleased to see clear acknowledgment that the advice to reduce fats in our diet resulted in increased carbohydrate consumption. [T]he nation’s levels of obesity, Type 2 diabetes and heart disease have risen. “The country’s big low-fat message backfired,” says Dr. Frank Hu, professor of nutrition and epidemiology at the Harvard School of Public Health. “The overemphasis on reducing fat caused the consumption of carbohydrates and sugar in our diets to soar. That shift may be linked to the biggest health problems in America today.” The chairman of Hu’s department says: “The good news … is that based on what we know, almost everyone can avoid Type 2 diabetes. Avoiding unhealthy carbohydrates is an important part of that solution.” Unfortunately, while we were loading up on carbs, neuroscience discovered that they’re addictive. Avoiding them is not that easy, especially when they’re ubiquitous and cheap. Let’s not jump on another bandwagon here I was also glad to see that not everyone is jumping on the “no/low carbs” bandwagon. Perhaps researchers burned by the low fat episode have learned something. One medical doctor says that “while he fundamentally agrees with those advocating fewer dietary carbs, he doesn’t like to demonize one food group.” How reasonable. [T]hose who eat too many calories tend to overconsume carbohydrates, particularly refined carbohydrates and sugars. “It can be extremely valuable to limit carbohydrate intake and substitute protein and fat. I am glad to see so many people in the medical community getting on board. But in general I don’t recommend extreme dietary measures for promoting health.” A professor of nutrition is also reticent about simply jumping from fats to carbs. The committee [for the 2010 Dietary Guidelines for Americans] … “looked at carbohydrates and health outcomes and did not find a relationship between carbohydrate intake and increased disease risk.” … Cutting down on carbs as a calorie source is a good strategy, “but making a hit list of carbohydrate-containing foods is shortsighted and doomed to fail, similar to the low-fat rules that started in the 1980s.” To see doctors and nutritionists give voice to so much common sense is truly encouraging. Actually, most of them have been saying something like this all along. Their message to eat a balanced diet just wasn’t titillating enough to get the press coverage it deserved. Image: Meri Fitness Marni Jameson, A reversal on carbs, Los Angeles Times, December 20, 2010
<urn:uuid:6db8e671-426d-4e7b-bfc6-4fd67b7fbc42>
CC-MAIN-2014-10
http://www.thehealthculture.com/2010/12/carbs-are-the-new-no-no/
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010980041/warc/CC-MAIN-20140305091620-00043-ip-10-183-142-35.ec2.internal.warc.gz
en
0.945044
687
2.65625
3
History of Warfare #4 – C. 1150-856 BC Bible Battles take place in a relatively small area of the Levant (which, in itself, is only a tiny part of what we today call the Middle East). Between (and including) the period of the Judges and the emergence of Israel as a kingdom, other empires fought to conquer this fertile territory. Events in history worked to the advantage of God’s plan. We can see how the superpowers of Egypt and Hatti fought each other to a standstill, leaving, for a short period, the land open for God’s people to take over. Special thanks to Dr. Robert L Diss Jr. for his materials on this topic. Outer Kingdoms of the First Millennium BC MITANNI – c. 1150-950 BC Mitanni was a multiethnic empire composed of different kingdoms spread out through the land between Anatolia (modern Turkey) and Babylon (modern Iraq). Mitanni took brief control of the region in the Tigris and Euphrates basin between the fall of Amorite Babylon to the Hittites around 1150 BC. They had healthy relations with the Kassites and Hurrians. After the Battle of Megiddo (1121 BC) Egypt pushed Mitanni to a narrow region in northern Syria. By 1058 BC, Mitanni had fought Egypt to exhaustion and made peace. By 950 BC the Hittites and Assyrians had reestablished rule in the region and Mitanni was reduced to a province within the Middle Assyrian Empire. Some historians place the Kassites and Hurrians within the bounds of Mitanni. The KASSITES – c. 1184-763 When Matanni rose in northern Mesopotamia, the Kassites occupied the south. Their major accomplishment was to unify Mesopotamia into one culture centred around Babylon instead of allowing the separate independence of the surrounding city-states. This unification was in part possible because the Kassites were outsiders to this region. From their vantage point, they were able to discern what the Mesopotamians had in common while the Mesopotamians themselves only saw the differences that kept their cities apart. The Kassites launch naval expeditions down the Persian Gulf to attain more land there.A system of debt slavery imposed on the conquered subjects became the norm in the kingdom. Temple organization provided the people with loans and advances in return for labour. The use of labour commitment to pay off debts was similar to what the Hebrews had with the Mosaic Law. Historians and theologians often overlook that a critical difference in the Hebrew Law was that it prescribed the cancellation of debts after seven years, avoiding a society of perpetual enslavement. The amnesty demonstrates the contrast between oppressive kingdoms like the Kassites with an Israel led by a benevolent God of compassion and peace. NOTHING NEW UNDER THE SUN America’s Federal Reserve Bank, which has nothing to do with federalism, is a private consortium created in 1913 which holds the country in perpetual debt through interest accumulated for each bill it prints and puts in circulation. The Kassite Dynasty lasted 440 years until 763 BC. It collapsed attacks by Assyria in the north, Elam to the east and Aramean nomads to the west. Elam took over most of the territory. King Nebuchadnezzar would later briefly avenge the Kassites in his attack on Elam. The HURRIANS c. 905-886 BC Also known as Hanigalbat, the Hurrians were Indo-Iranian warrior people who filled the vacuum left in central and northern Mesopotamia after the segregation and fall of their city kingdoms. They propagated the language that became the official throughout Mitanni. Hurrians controlled territory from Eastern Anatolia to the Tigris, Kaddesh, Syria and Assur. The army was built around the chariot corps which, like an honour guard, was commanded by the king. Their main adversary in the Levant was the Hittite Empire which they confronted in northern Syria and the New Kingdom of Egypt with the climactic Battle of Megiddo. After this period the parties made a treaty in which Mitanni gave daughters to the Egyptian court as princesses. The Hurrian Kingdom collapsed at the beginning of the 9thCentury BC. The Hittite Empire The Hittites (Hatti) were an Ancient Anatolian people who would establish an empire centred on Hattusa in north-central Anatolia. Anatolia (today Turkey) was a strategic pearl. Its coastline was dotted with excellent harbours to enrich the land through trade, and its centre was easily defendable by the disposition of the mountain passes. The core Hittite territory used seven languages. In 2000 BC Anatolia was filled with different peoples and different kingdoms. The origin of the Hittites seems to tie with the Assyrian trade following the establishment of merchant colonies in Anatolia. Almost every Hittite king was engaged in war. Part of the reason was that the geography facilitated threats to the empire from all directions. PRE-IMPERIAL OLD HITTITE KINGDOM c 1350 BC The Old Hittite Kingdom began around mid-14thCentury BC. One defining aspect of the Hittite grand strategy is that they attacked consistently and without rest. Occupation of faraway territory following their enemy’s defeat there did not seem to be the general rule for the Hittite rulers. In a campaign against northern Syria, for instance, King Hattusili’s army reached and crossed the Euphrates river. His modus operandi was to attack, destroy and withdraw. Only by having a strong kingdom could they afford to have their armies so far away from home. King Mursili continued the expansion by conquering the Amorite Dynasty of Aleppo and destroying Babylon in 1362. These wars led to the obliteration of the regional system that was in place holding Syria and Mesopotamia together. The land plunged into a dark age of depopulation for 100 years when the restoration of order began in the kingdom. Coups, bloodbaths and usurpation of power within weakened the nation and eventually Hatti lost control of most of the land it had conquered while retaining its original space in Central Anatolia. The survival of their core empire was in part due to the Hittites’ lack of a centralized culture. They were a group of divided clans, and so the kingdom did not possess an identifiable central source of command and wealth, causing invading armies strategic confusion of where to strike. NEW HITTITE KINGDOM and HITTITE EMPIRE We know little about the Hittite Middle Kingdom. It had prominence around the Black Sea, and its activity overlaps with the New Kingdom. It was within the New Kingdom that the Hittite Empire developed (1126-875 BC). The Hittite Empire reached its zenith during the mid-14th century BC under Suppiluliuma I, when it encompassed an area that included most of Asia Minor as well as parts of the northern Levant and Upper Mesopotamia. The Hittites were the first bureaucratically based empire which used logistics to the full for expansion of its borders. The extent went into Babylon and Lebanon where their advance halted at the decisive battle of Kadesh against the Egyptians in 939 BC. Hittite power came to an end by the end of the 9thCentury BC, during the Bronze Age. The Hittite Empire collapsed and splintered into several independent“Neo-Hittite” city-states, some of which survived until the 8thCentury BC. These states were the ones that the Israelites defeated. It is perhaps significant is it all though we do not see the Hittites as an even remotely substantial threat until the Book of Judges, they are mentioned in all the first five books of the Old Testament (except Leviticus). GOVERNMENT and ECONOMY of the HITTITE EMPIRE Aruna, the Sun and storm god was the chief deity. The Hittite king presided over judicial religious and military issues. Citizens were punished for certain sexual practises or from abstaining from giving proper offerings to the gods. The Hittites took their religion very seriously. The king was not a God but rather a high priest. Government organization was through an ample system of viceroys and governors. Kings were careful to handle lawsuits without discriminating social status. The empire based its feudal character on dependency on vassal states. Hittite princesses were married to heads of vassal states, and they would take an active part in their government, thus assuring loyalty to Hatti. Other. Actions sometimes followed this treaty method, for instance, when the daughter of Egyptian Pharaoh Ramses II daughter married King Solomon. The king was in personal command of the army. Royal princes were trained early on, bringing with them a lifetime of experience into the battlefield. The army had a complex organization, and its structure reflected that of the empire’s governmental architecture. There were six levels of officers below the king. The core of the Hittite army was a standing army of chariots, also known as the royal militia of the great king recruited from the free male population of Hatti. When a soldier broke his oath of loyalty, the people put colourful curses upon him. One of them was designed to ridicule him by declaring his ways to be changed into feminine ones; highlighting how in these early civilizations, feminine form in men was regarded as unnatural and as a curse. By the time of the battle of Kadesh in 939 BC, the Hittites chariot had a crew of 3. One is the shield-bearer, which allowed the other two soldiers to concentrate on the fight. This setup gave them an advantage over the Egyptians. Chariot warfare required elaborate training and selecting special horses. They were probably transported and assembled near the battlefield for fighting just as the tanks in World War II were transported to the battle zone by train. Middle Eastern armies of the era probably used phalanx style massed unit lines. Their weapons were made of bronze-like everyone else is at this stage. The only weapons made of iron would’ve been from meteoric iron which had the added value of being sent from the gods above. The largest unit was a division of 1000 men; the smallest was a squad of 10.Hittites never had a large enough army to deal with all the threats within the empire simultaneously. They would have to thin out forces from one front to support another. STRATEGY and RESOURCES of the HITTITES Hatti suffered from chronic population scarcity. War served a dual purpose of growing their economy as well as to replenish their population from the vast source of conquered territories. Unlike other empires, Hittite Kings did not give long accounts of their battles and preferred to pick episodes where they fought defensive wars. Hittites would base their strategy on asking the gods questions. They would ask, for instance, whether their force deployment was sound, or the weather results would be favourable. The irony is that, in biblical accounts, we see that the Hebrews did not often ask God about strategy but got volunteered this information by the almighty; sometimes with precise instructions. It seems to Hittites was more humble. Given the results, it goes to show that God will do what He wills no matter what. Hittites would tweak their tactics depending on the enemies they faced. Sometimes they would provoke the enemy to come out into the field against them. They were also proficient in siege warfare. Notable is their highly developed intelligence system for finding out about enemy threats. Conquered cities were looted, populations deported, and the spoils of war distributed between the King and troops. A very positive outcome for the population in these wars was that the deported captives that submitted willingly to their new rulers we’re given land in Hatti and a three-year remission on taxes! Very often, the conquered populations had better conditions under the Hittites than before the occupation. FINAL PERIOD of GLORY of the HITTITE EMPIRE Tudhaliya II began the final period of imperial Hatti with campaigns into western Anatolia. Tudhaliya crushed revolts by Mitanni then launched an offensive into northern Syria, weakening Mitanni through their defeat in Megiddo at the hands of Egypt. The Hittites pushed aside the Kingdom of Aleppo. Tudhaliya III defeated Aleppo in northern Syria and Mitanni establishing a Hittite bridgehead in the region. Hatti remained vulnerable to neighbouring great powers. 1400 Egypt concluded an anti-Hittite alliance. “Club of the great powers” describes empires of the late 2nd Millennium BC: Hatti, Egypt, Kassite Babylonia, Mitanni and Assyria. The rulers of these powers regarded each other as equal, and this is evident in their diplomatic relationship where they treated each other as “brother.” When military clashes between these empires did take place, they rarely threatened the survival of either combatant (clearly exemplified during the Battle of Kadesh in 939 BC.) NEAR DEFEAT and RESURGENCE of the HITTITES In 1035 BC Hatti suffered an invasion from all sides and was reduced to a small central mountain territory, but it resurrected and rose again to greater glory than ever before starting under the leadership of Suppiluliumas I. The Hittites captured all their lost land, invaded Mitanni and sacked their capital. It was unprecedented for a vast empire to defeat another great empire completely mortally. Suppiluliumas I then attacked Syria, conquering territory all the way to Damascus and forcing the vassals to accept full control as subjects. Treaties with Egypt fell through, and although Suppiluliumas tried reviving it, the Egyptians discarded all attempts, which led to the battle of Kadesh where Hatti defeated Egypt’s Rameses II. It was a tactical victory for Egypt but a strategic one for Hatti as they extended their territory southwards. DEFEAT of the HITTITES As it was their habit during these campaigns, the Hittites brought back tens of thousands of captives back to Hatti, but this time this backfired in the form of a plague from Syria which crept in killing the king himself and his succeeding son. Fights with the Kaska and northern Syria resurfaced, and Assyria also attacked, eventually defeating Hatti in the Battle of Nihriya. The last stand of the Hittite Empire was a naval battle against Assyria for the control of Cyprus, which they lost. The Assyrians, under Ashur-resh-ishi I seized most if the Hittite territory and pushed aside their rival contender king Nebuchadnezzar I of Babylon. The Sea Peoples invaded the south of the Levant and cut the Hittites off from their Mediterranean trade routes which left the very homeland open to further attack from all sides. Hattusa burned around 845 BC, and the final annihilation took place in the hands of the Kaskas, Phrygians and Bryges.Hatti eventually succumbed to consecutive advances from all sides of its frontiers: Mitanni from the east, Egypt from the South, Aegean and Anatolian powers from the west, and the clans of the Gasga from the north. They had to face too many enemies with too few resources. WHO WERE the ARAMEANS? Arameans were a motley of tribes located in southern Syria. They took over the Hittite land after dislodging the population. Aramaic language stayed in the Levant until the 5th century AD when the Muslims took over; it was the language spoken by Jesus. The Egyptian Empire Antiquity has always equated Egypt to the Nile. Egypt’s only habitable land was along the fertile banks of the mighty river. The rest of the kingdom was inaccessible from all other parts. Unlike other rival nations, Egypt suffered no invasions for the first 15 centuries of her history. The NEW KINGDOM of EGYPT Egypt survived the difficult period following the Hebrew Exodus and re-emerged stronger than ever as the New Kingdom (c. 1203–981 BC). It was during this time that Egypt, and for the only time in its existence, expanded beyond its natural confines. Since the most vulnerable frontier was the fertile land of the Levant in the northeast, it was in this direction that the might of the Egyptian Empire directed its offensives. EGYPT’S GOLDEN PERIOD – the 18th DYNASTY The 18thDynasty of Egypt’s New Kingdom began with Pharaoh Ahmose. The tides turned in Egypt’s favour when Ahmose expelled the Hyksos from the Nile Delta – including the Avaris stronghold – into Canaan. The reconquest allowed Egypt to secure southern Canaan and establish a base from which to launch future campaigns against the Levant. Subsequent pharaohs Amenhotep I and Thutmose I took over the land of Nubia and Cush to the south. Thutmose I then took his armies into Canaan, executing a symbolic (but not material) advance to the Euphrates River, which was to remain the high watermark of Egypt’s expansion. Egypt also subdued the Kingdom of Mitanni’s presence in the area. Pharaoh Thutmose III (1134-1082 BC) inaugurated Egypt’s golden age of imperial power. He organized 17 campaigns into the Levant, consolidating Egypt’s power. Thutmose III defeated a coalition of native rulers at the Battle of Megiddo (1121 BC), thus securing Canaan including the coastal ports. Thutmose III then launched a new campaign across the Euphrates, pillaged Carchemish, eliminated Mitanni’s influence and established Egypt’s limits at the Orontes River in Southern Syria. EGYPTIAN IMPERIAL ARMY Unlike the period of Joseph’s establishment in Egypt, the New Kingdom was a period of stable centralized and militaristic government. The Egyptian army during the Old and Middle Kingdoms resembled more of a feudal levy while in the New Kingdom, it became a professional force. During the Imperial period, the Egyptian Army had a regular rank, a dedicated officer corps and stood organized into infantry divisions named after Egyptian gods. The chariots continued to compose its elite force. Pharaoh Thutmose III was an excellent military leader with a close relationship with his soldiers. The following Pharaoh Amenhotep II (1087-1058 BC) was equally devoted to the fighting culture of the day, exhibiting personal physical strength and courage. It was Amenhotep II who initially captured Kadesh. By the 10thCentury BC, Egyptian Army branched into four battle divisions, each with about 20,000 troops. Some historians agree that it was only at this time that the chariots stood as an independent fighting force. The Egyptian Army recruited Philistines, Libyans and Nubians into its ranks during the late 19thand early 20thDynasties. The battle formations were depth in mass, up to ten or more ranks deep, similar to the future Greek Phalanx. Egyptians were early masters at combined arms tactics to destroy enemy formations. The LAST HURRAH OF RAMESES II The Egyptian army’s ability to conquer the Levant is unquestionable. The challenge, which would eventually lead to defeat, was keeping those extremely long supply lines open and functioning. After neutralizing Mitanni, the Hittite Empire began to threaten Egypt’s assertion in the Levant after the reign of Pharaoh Thutmose III (1134-1082 BC). Pharaoh Amenhotep IV (Akhenaten; 1022-1007 BC) failed in coercing Egypt’s ally Ugarit to fight the Hittites. Ugarit instead joined Hatti. At this time, Israel developed its turbulent infant monarchy under King Saul and then David. After Pharaoh Tutankhamun (1007-998 BC), an Egypt-Hatti alliance fell through in 952 BC, which culminated in a Hittite takeover of the Levant. Egypt then took up a new limited objective of re-taking its Judean positions through campaigns mounted by Seti I (980-973 BC) and Ramses II (943-877 BC). It was here that the Egyptians clashed with the Kingdom of Israel, although their main goal seems to be not the destruction of Israel but securing the land from Hittite takeover. Israel’s King Solomon married the daughter of Rameses II (known in the Bible as Shishak). Egypt’s war against the Hittites pinnacled at the Battle of Kadesh (939 BC) which was a tactical draw but a strategic defeat evidenced by Egypt’s withdrawal from the northern Levant.After Kadesh, Egypt became embattled with Mitanni for control over Syria until striking a peace treaty. Rameses II tried to regain further land from the Hittites unsuccessfully. DECLINE OF THE EGYPTIAN EMPIRE – THE 19TH DYNASTY Egypt could not defend against attacks from all sides, and that would seal its destiny as a superpower. Egypt’s enemies were: the Hittites to the east, Nubians to the south, Libyans to the west and Sea Peoples to the north. Mitanni’s engagement of their new enemy, the Hittites, gave Egypt a chance to focus on its national development once again. These wars hareld a reasonably peaceful period in Canaan which allowed the development of the Israelite Kingdom under King Solomon into a pseudo-imperial holding. Attacks from all sides became more gradual and prevalent throughout the 19thDynasty, even from previously scattered Libyan tribes to the arid west in 859 BC. By the 20thDynasty, expansionist contenders kicked Egypt out of the Levant. The reversal forced Egypt to retreat from Nubia, in the south, to protect her flank. Egypt’s government became destabilized, and power within the kingdom was decentralized and divided for the next few centuries. The notorious Sea Peoples invaded in 856 BC. Rameses III (863-832 BC) was able to fight them off for and finally defeated them entirely in a naval battle. Egypt, however, would never rise again to the heights of glory it had experienced as an empire in the Levant and would disappear 84 years after the assassination of Rameses III.Egypt would fall into anarchy and divide into Upper and Lower Egypt. WORLD HISTORY TIMELINE This world history timeline shows ancient calendars dates prior to 664 BC based on Rohl’s New Chronology. Why we chose this timeline? See summarized explanation in the Chronological Discrepancies chapter.
<urn:uuid:7d6d49ba-59c7-42e2-be61-75099c61ef96>
CC-MAIN-2020-45
http://godswarplan.com/ancient-empires-middle-east-canaan-mitanni-kassites-hittites-egypt
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107876768.45/warc/CC-MAIN-20201021151342-20201021181342-00296.warc.gz
en
0.969327
4,806
3.984375
4
The practice of lining a borehole with tubing to prevent the entry and migration of gas, liquids, or other debris between subsurface formations. A private company that provides services to the public at large, generally in the field of transportation or communications infrastructure. Under the law, a common carrier is required to make its infrastructure available to everyone willing to pay to access it. A legal argument made by the railroads that held that the rates set by the Railroad Commission did not allow them enough profit to operate, pay off debt, or reinvest in the company, thus depriving the railroads of their property without due process of law. A legal doctrine holding that certain rights of land owners over a common resource such as oil or gas are coequal, or correlative. No one owner can take more than his share. A practice in which railroads charged higher rates for one set of shippers than for another. The most common form of discrimination was long-haul/short-haul discrimination, in which the railroad charged more for shipping freight or passengers between two intermediate points on a line than for shipping the same cargo the full length of the line, including the intermediate section. Railroads also charged more to ship finished goods than raw materials, more to ship to popular destinations, and more to ship partial car loads than full carloads. A practice in which large shippers received the rebate from their competitor’s shipments, after the competitor paid full price. A form of discrimination in which influential people were given free railroad passes as a form of bribery. In 1901 there were 271,285 free passes issued by the railroads – enough for every third or fourth male in Texas. Legislators, tax assessors and collectors, county commissioners, sheriffs, judges, and even local doctors, lawyers, and clergymen were all offered free passes. The pass was revoked if the recipient acted contrary to railroad interests. Oil produced above the limits set by the Railroad Commission or other regulatory bodies. Small petroleum producers who receive their revenue from production at the wellhead, and who generally have no refining or fuel marketing subsidiaries. Texas is the only state in the Union that retained ownership of its public lands when it was admitted as a state. In the early days of statehood, it was a cash-poor and land-rich state. Texas recognized the potential economic value of its public land, and set much of it aside for the support of public schools. Revenue was slow to materialize, however, because the land was virtually inaccessible for development. Texas financed railroad construction through land grants, which were regarded not as subsidies, but as investments in the future of Texas. The railroad construction would make the land accessible for development, thus making the land valuable and bringing in revenue for public schools. Large petroleum companies that not only produce oil but also control related infrastructure such as pipelines, refineries, and service stations. Although ownership of the railroads in Texas was never exclusive to one company, railroad opponents often referred to the industry as a monopoly. The railroads controlled the means of transportation, the rates for shipment, and many related industries such as steel, oil refineries, copper plants, and lumber companies. National Industrial Recovery Act (NIRA) Passed in 1933, the NIRA was the centerpiece of New Deal legislation. It created the National Recovery Administration to promote cooperation among corporations and established codes of fair competition for numerous industries. Businesses that voluntarily complied with the codes could display the famous NRA Blue Eagle with the slogan, “We Do Our Part.” The NIRA was declared unconstitutional by the U.S. Supreme Court in 1935. A political party formed in 1891 to represent agrarian interests. The Populists were most famous for their advocacy of the free coinage of silver money and government control of monopolies. A practice in which competing railroads made agreements to divide up the traffic and maintain freight rates. A political philosophy advocating moderate political change and social improvement by governmental action. Progressives believed that the government should ride herd on corporate interests such as railroads, insurance companies, and oil companies, and act as an advocate for ordinary people. The progressives did not want to change the basic American system of property rights and capitalism, but they did want to make the system more equitable. The ability of a state to limit oil and gas production, usually based on market demand. The term comes from the word “prorate,” and refers to the practice of limiting production proportionally to a fraction of the total capacity of each producer. A practice in which railroads gave price breaks to large shippers. rule of capture A legal doctrine that said that oil and gas pumped from a well belonged to the operator of the well, even if the volatiles had been drained from beneath another owner’s land. Because of this rule, wells were drilled very close together. The race to produce oil often resulted in damaged reservoirs and the waste of both oil and natural gas. A practice in which railroad companies issued more stock than the company was worth, diluting the value of all shares, which they then bought back at a lower price. The joint development of an oil field that includes territory controlled by different owners. A unitized field allows participants to share both royalties and risks in the development of the field and to utilize the field’s natural features without damaging the field through excessive competition. An exploratory oil well drilled on speculation in an area not previously known to produce.
<urn:uuid:a6b5a84f-eb57-4140-a69c-68c68059e549>
CC-MAIN-2021-49
https://www.tsl.texas.gov/exhibits/railroad/glossary.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362287.26/warc/CC-MAIN-20211202175510-20211202205510-00373.warc.gz
en
0.974924
1,194
3.34375
3
In the early 1800s, the population of England was roughly 8 million, and they produced Wordsworth, Coleridge, Blake, Byron, Keats and Shelley — not to mention Robert Southey, Leigh Hunt, Walter Savage Landor, Thomas Campbell, Thomas Moore, John Clare and Thomas Lovell Beddoes. It is an astonishing flowering of poetry in a single era. Six major poets and a handful of others still read with pleasure by millions of people. One might average them out very inaccurately as one great poet per 1 million in population. Even in the 17th century, when the population of England was half that of the early 19th century, we have Thomas Carew, George Chapman, Richard Crashaw, John Donne, Michael Drayton, William Drummond, John Dryden, George Herbert, Robert Herrick, Ben Jonson, Richard Lovelace, Andrew Marvell, John Milton and John Wilmot (Earl of Rochester). Of these, we can easily confer “major poet” status on Milton, Donne, Marvell and Dryden, making our ratio again 1-in-a-million. By these numbers, we should easily expect, living in the United States at this moment, roughly 300 major poets. One scratches one’s head, because these numbers obviously are not true. Just one state, North Carolina, is roughly equivalent in land area and in population to England in 1800. There should be at least six poets writing between Asheville and the Outer Banks of equivalent worth to Keats and Shelley, Wordsworth and Coleridge. (Obviously, there are eras in which poetry features more importantly in a nation’s culture, and other times when the palm, the oak or bay goes to the novel or the stage, and times — and places — where emphasis is given to painting, sculpture, music or even philosophy. This equation is only meant in general terms — in any art, there should be more well-known and influential practitioners than one might generally count among the population at present). I reckon that the problem should be understood much as a bicameral legislature. If we count a poetic house of representatives, there should, indeed, be 300 major poets writing at this moment. But instead, we have a senate, and we have a limited number of spots per nation reserved for “major” status. Perhaps we should never expect more than four at any given moment in any given nation. That means we must look to the reading public (or art-going audience) as a conferring body that says there is only so much room in our culture model for the role of major poet, like only so many slots for general in an army. It may be part of our cultural umwelt. We have a fixed and number-limited idea of what it means to rise to the top. Perhaps there really are 300 people writing poetry in American now that, if they had been published 200 years ago, would have been considered important, but now are merely the residue of a niche publishing market. But I mean to present my case in much wider terms: the many arts as they manifest in the culture. There is a top tier, and we treat these artists — currently the Damien Hirsts, the Jeff Koonses, the Richard Serras — as if they are the “major” artists, whose work is our answer to the Raphaels, Rembrandts and Monets of the past. Their work is deemed somehow more important than the work of thousands of other artists working away, often outside the beehives of New York and LA. Of course, any critic with an ounce of humility will grant that these are only our “guesses.” That history has a way of choosing different names for the art history textbooks of the future. But as the art world is currently constituted, there is a great divide between art that is considered important and influential — art at the cutting edge of a presumed history — and all the lesser lights, the wannabes. And this doesn’t even make marginal room for all the weekend painters and watercolor society members and their pretty irises and tablecloths. But who is art for? This is the crucial question. Is art made for the critic, curator, collector and gallery owner? Is the measure of its worth that it fulfill the expectations of narrow and self-specified interest group? If that were so, the rest of us might as well give up and turn on the TV. This is not to disparage those critics (of which I am one), curators, collectors and gallery owners, many of whom I know and admire, and whose gifts are considerable. But it is like saying that a book is best judged by a librarian: There may be some insight there, but we choose our books by our own lights, our own interests and tastes. To the librarian, we entrust the Dewey Decimal System. So, who is the art for? The poetry? The dance, the theater, the opera, the string quartet? They are all for all of us who love them. The search for the “historically significant” artist is a question of history, not of art. We should all be free to enjoy whatever art speaks to us. And as artists, free to make the art that speaks for us. The “big-boys” (and girls) of art are not disincluded: They really are making wonderful things. But so are the lesser lights, the regional artists, the undiscovered, the shy. The names you see over and over in the art magazines are there on their merit, for sure, but they are also there because of their naked ambition to climb the art-world hierarchy and because of luck. Some were just lucky enough to be spotted by some curator making the rounds for another museum biennial, or to work in a university program noted for graduating elite artists. I worked in the fields for 25 years in Arizona, which is not usually thought of as a fertile ground for the world’s great art. And it does have its unfortunate share of blue coyote paintings and noble Indian chief portraits. But I knew a dozen, maybe a score of artists whose work, given the proper exposure to the right people with open minds and open eyes, might stand equally before the impasto of Lucien Freud or the imposture of Jeff Koons. The work was forceful, imaginative, idiosyncratic and intellectually rigorous. There should be no shame in being thought an “Arizona artist” if the state could produce a Marie Navarre, a Jim Waid, a Mayme Kratz, a Bailey Doogan, an Anne Coe, a Matthew Moore, an Annie Lopez. I could name a dozen more that you’ve likely never heard of, but that you could well have, if things had gone differently. Each of these artists had given me great pleasure and spurred my intellectual growth and widened my world for me. And every state in the union — indeed, every nation on the globe — can put forth its own slate of names of the artists, poets, dramatists, filmmakers, architects, authors, musicians and composers whose value is underrated or ignored, whose work has made a local difference, even if not a national ripple. Who’s to say they are not important? Who’s to say their work is not the equal of the headline artists at the Whitney Biennial? If we include these excellent but unheralded artists and poets, we probably begin to match the ratio of poets to population of 17th- or 19th-century England. But I don’t want to stop there, either. It isn’t merely regional art I am defending. I would make a case even for such maligned art as the academic art of university teachers, the irises and tablecloths of the watercolorists — even the paint-by-numbers amateurs and the selfie-posters of Instagram. Every person who makes an image — and especially those rare and brave people who take up a pencil and attempt to draw something on paper — makes a contribution. They learn something about the world, and about art, even if they don’t have that name for it. Art is not merely what hangs on gallery walls. Its primary purpose is an interaction with the world, and when anyone makes that connection, with pen, brush, camera, clay or word processor, filtering through their sensibility their ideas, feelings and reactions to the world around them, they have made art. And ultimately, it is the making of art, not its consumption that has value. Everyone should try it, everyone would benefit from it.
<urn:uuid:91227f02-f7b3-4ccd-8f36-5bcf44df85f4>
CC-MAIN-2017-47
https://richardnilsen.com/2014/04/12/who-is-art-for/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806708.81/warc/CC-MAIN-20171122233044-20171123013044-00413.warc.gz
en
0.961301
1,818
2.859375
3
Alimony, in divorce law, compensation owed by one spouse to the other for financial support after divorce. Alimony aims at support of the one spouse, not punishment of the other. In some places, the term means simply a property settlement irrespective of future support. Alimony has traditionally been granted from husbands to wives but has occasionally been granted from wives to husbands. Alimony obligations were first imposed by the Egyptians, Greeks, and Hebrews. The practice helped to avoid feuds with the divorced wife’s relatives. Under the Code of Hammurabi, a Mesopotamian husband divorcing his wife without cause had to forfeit a piece of silver. Similarly, Roman law under Justinian I demanded a forfeiture of gold from the guilty spouse in a divorce. In England, alimony was purely a creation of statute—probably arising out of the medieval church’s belief that divorce could not terminate the obligations of marriage in the eyes of God. Scandinavian countries treat husband and wife as equals in divorce suits, allowing reciprocal claims for injury. Some countries—e.g., Russia, Austria, Belgium, and Romania—allow divorce as a normal cancellation of contract, with financial questions being settled by mutual agreement. Alimony is either temporary—for support and expenses during the lawsuit; or permanent—for support thereafter. Temporary alimony is designed to enable one party to initiate or defend the divorce suit. The granting of temporary or permanent alimony is within the court’s discretion, as are the frequency and amounts of payments.
<urn:uuid:20b2cbdb-4b17-4234-9bda-3d43d3cce71a>
CC-MAIN-2016-36
https://www.britannica.com/topic/alimony
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982293468.35/warc/CC-MAIN-20160823195813-00263-ip-10-153-172-175.ec2.internal.warc.gz
en
0.96442
311
2.640625
3
courtesy of Independence National Historical Park William Washington was born in Stafford County, Virginia on February 28, 1752. He was a distant cousin of George Washington. Washington had been trained for the ministry at the time of the outbreak of the Revolution but was commissioned as a Captain of the Third Virginia Continentals on February 25, 1776. Revolutionary historian Mark Boatner described Washington as six feet tall, strong and obese. He was kind to his soldiers to the extent that his discipline was sometimes lax. Washington preferred the heat of the action and not the tedious calculation of strategy. He was bold, collected, and persistent. Washington served with the Third Virginia Regiment throughout the New Jersey and New York Campaigns. He was wounded at the battle of Long Island, August 27, 1776 and at the battle of Trenton, December 26, 1776. After Trenton, Washington was transferred to Colonel George Baylor's Cavalry Corps and soon received other promotions. A promotion to Major in 1777 gave him command of the Fourth Continental Dragoons. On November 20, 1778Washington became lieutenant colonel of the Third Dragoons. As the focus of the war changed to the Southern colonies, Washington also came south. He aided General Isaac Huger's corps at Charleston. On March 23, 1780, Lieutenant Colonel Banastre Tarleton beat Washington's force in a skirmish at Bee's Plantation. Three days later, Tarleton again defeated him in another skirmish at Governor Rutledge's Plantation. On April 14, 1780, Huger and Washington's forces were routed and many captured at Monck's Corner near Charleston. After this defeat, Washington withdrew into eastern North Carolina to recover and recruit. In late 1780 Washington's activities picked up again. In December Washington and his dragoons were attached to General Daniel Morgan's force which had been sent into South Carolina. On December 4, Washington and his men captured 112 Loyalists at Rugeley's Mill. On December 28, 1780, Morgan used Washington's dragoons and mounted militia to subdue 250 Georgia Loyalists at Hammond's Store near Fort Ninety-Six. This was the start of the operations that led to Morgan's victory at Cowpens. At Cowpens on January 17, 1781, Washington commanded 80 dragoons and about 50 mounted militia. The first time his men appeared during the battle was when they surprised the advancing British who were attacking the retreating American militia. James Collins, a militiaman, referring to the speed of Washington's troops, described them as being among the British like a "whirlwind." Washington appeared a second time near the end of the fighting when he helped defeat the British on the right side of the American third line and complete Morgan's "double envelopment" of the British. While engaged in the fight, he caught sight of the British leader galloping down the Green River Road. Washington pursued Tarleton and caught up with him but soon found himself surrounded by Tarleton and two other British officers. Each made a sword swipe at him. As Tarleton made the last slash, Washington successfully parried the blow. As Tarleton wheeled on his horse and began to gallop away, he drew his pistol and fired at Washington but wounded his horse instead. By the time Washington was given another horse, Tarleton had escaped. Having experienced a glorious victory, Morgan and Washington began a hasty retreat into North Carolina with the remainder of the army and prisoners. A grateful Congress voted Washington a silver medal to commemorate his heroic efforts of the battle of Cowpens. The remainder of 1781 continued to be an active time for Washington. In February, he and General Morgan rode to Beatties' Ford, North Carolina to inspect American defenses and to link Morgan and Greene's forces. With the two armies combined, Greene dispatched 700 of his best troops including Colonel Washington's corps to position themselves between the main American army and the main British force under Lord Cornwallis. They were to recover the retreat of the main army by destroying bridges and delaying Cornwallis' march as much as possible until Greene could be reinforced. On March 15 at the battle of Guilford Courthouse in North Carolina, Greene placed Washington as leader of the cavalry that supported the third line. Colonel Washington's corps performed with valor. At the battle of Hobkirk's Hill, South Carolina, Washington was present with 87 dragoons. His men served Greene with reliability and dependability. Washington's cavalry corps was present at the battle of Eutaw Springs, South Carolina on September 8, 1781. During the heavy fighting Greene ordered Washington's reserves to attack Major John Marjoribanks and his corps of British troops. When Washington tried to attack, his cavalry was not able to penetrate a thickly wooded area and were defeated. Washington became entangled with his fallen horse and was bayoneted and captured. After his capture Washington was taken to nearby Charleston as a prisoner where he remained until the end of the war. In Charleston, Washington met Jane Riley Elliot. Charmed by her beauty, polish, and respectability, they eventually married and settled there. After the war, Washington served in the state legislature. Some admirers tried to persuade him to run for governor. He declined, saying he was unable to formulate and deliver speeches. The end of the war did not end Washington's military activity. In 1798 he was appointed Brigadier General and served in this capacity until 1800. In 1802 Washington visited his friend and former commander, Daniel Morgan, who was near death. Washington later recalled that his friend showed the same courage in the face of death as he did on the battlefield. Washington died on March 6, 1820 and was buried near Charleston. Mark M. Boatner, Encyclopedia of the American Revolution (New York, 1966), 1170. J. D. Bailey, Some Heroes of the American Revolution (Spartanburg, 1966), 45. Boatner, 1169. Bailey, 45. Boatner, 1169. Bailey, 45. Boatner, 1169. George Sheere and Hugh Rankin, Rebels and Redcoats, (New York, 1957), 495. Ibid., 216. Ibid., 219. Ibid., 499. Ibid., 502. North Callahan, Daniel Morgan: Ranger of the Revolution (New York, 1961), 238. Sheere and Rankin, 518. Boatner, 1169. Boatner, 505. Callahan, 198. Sheere and Rankin, 535. Bailey, 54. Boatner, 1169 - 1170. Boatner, 1170. Callahan, 295.
<urn:uuid:41d27510-ccef-4e5c-9532-556d3f7f1d8e>
CC-MAIN-2015-22
http://www.nps.gov/cowp/learn/historyculture/williamwashington.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930916.2/warc/CC-MAIN-20150521113210-00279-ip-10-180-206-219.ec2.internal.warc.gz
en
0.974102
1,378
3.203125
3
T HERE are as many definitions of public opinion as there aredisciplinary points of view. Political scientists see public opinion interms of the distribution of power and the management of societies. Sociologists theorize about collective forces at work. This review will take a communication perspective to public opinion. It will center on research traditions that address the perception that public opinion exists and that this perception is gained by observing and communicating. If we accept as reality that perceptions of the reality of public opinion exist, then we may ask how people gain those perceptions and how they act upon them.
<urn:uuid:93fe7ff6-aa5a-4a88-8547-3767dc9c0d87>
CC-MAIN-2023-06
https://www.taylorfrancis.com/chapters/mono/10.4324/9780203856192-22/communication-perspectives-public-opinion-traditions-innovations-alex-edelstein-james-anderson?context=ubx&refId=ef3b89b2-d0dd-447b-91c4-0b4d0706b695
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499804.60/warc/CC-MAIN-20230130070411-20230130100411-00772.warc.gz
en
0.95605
116
2.796875
3
Definitions for killer whale This page provides all possible meanings and translations of the word killer whale killer whale, killer, orca, grampus, sea wolf, Orcinus orca(noun) predatory black-and-white toothed whale with large dorsal fin; common in cold seas A sea mammal related to dolphins and porpoises. The killer whale, also referred to as the orca whale or orca, and less commonly as the blackfish, is a toothed whale belonging to the oceanic dolphin family. Killer whales are found in all oceans, from the frigid Arctic and Antarctic regions to tropical seas. Killer whales as a species have a diverse diet, although individual populations often specialize in particular types of prey. Some feed exclusively on fish, while others hunt marine mammals such as sea lions, seals, walruses, and even large whales. Killer whales are regarded as apex predators, lacking natural predators. Killer whales are highly social; some populations are composed of matrilineal family groups which are the most stable of any animal species. Their sophisticated hunting techniques and vocal behaviors, which are often specific to a particular group and passed across generations, have been described as manifestations of culture. The IUCN currently assesses the orca's conservation status as data deficient because of the likelihood that two or more killer whale types are separate species. Some local populations are considered threatened or endangered due to prey depletion, habitat loss, pollution, capture for marine mammal parks, and conflicts with fisheries. In late 2005, the "southern resident" population of killer whales that inhabits British Columbia and Washington state waters were placed on the U.S. Endangered Species list. Translations for killer whale From our Multilingual Translation Dictionary - حوت قاتلArabic - Mörderwal, Killerwal, SchwertwalGerman - نهنگ قاتلPersian - épaulard, orqueFrench - mada-chuain, canaScottish Gaelic - לוויתן קטלןHebrew - kardszárnyú delfinHungarian - paus pembunuhIndonesian - 鯱, さかまたJapanese - aarlukKalaallisut, Greenlandic - łóóʼtsoh łizhin dóó łigaígííNavajo, Navaho - orca, baleia-assassinaPortuguese - кит-уби́йца, касатка, косаткаRussian - orka, kit ubojicaSerbo-Croatian Get even more translations for killer whale » Find a translation for the killer whale definition in other languages: Select another language: Discuss these killer whale definitions with the community: Word of the Day Would you like us to send you a FREE new word definition delivered to your inbox daily? Use the citation below to add this definition to your bibliography: "killer whale." Definitions.net. STANDS4 LLC, 2015. Web. 1 Jul 2015. <http://www.definitions.net/definition/killer whale>.
<urn:uuid:323d7d1b-51c1-4491-93d8-eca967f54d6b>
CC-MAIN-2015-27
http://www.definitions.net/definition/killer%20whale
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095270.70/warc/CC-MAIN-20150627031815-00217-ip-10-179-60-89.ec2.internal.warc.gz
en
0.816258
707
3.328125
3
The Dangers of Bees Though small, bees can be dangerous to you and your family, especially if you or someone is allergic to bee stings. You are also legally responsible for any injuries incurred from a bee-related accident if there are bees on your property. With a beehive removal, you can prevent any liability from a bee attack or sting, as well as protect yourself, your neighbors, and anyone who visits your property. Most importantly, the beehive in your property might not be a native honeybee. They could instead be Africanized “killer” bees, which have migrated to the southern United States. These bees take over an existing beehive by killing the queen and establishing themselves in the hive. Their danger comes from their defensiveness, as they are easy to provoke, quick to swarm, and will attack intruders with greater numbers and over longer distances than a typical honey bee. Damage Caused by Bees Whether the bees set up shop in a forgotten bar-b-que, shed, rotted tree, chimney, or wall, they are sure to cause significant damage due to their sophisticated networks. Honeycombs and hives can be filled with honey, further attracting more insects to your home. Within abandoned hives, there also can remain dead bees, which will leave a stench if not removed. Honey can also be hard to remove and stain surfaces, one other mess that can be costly if not dealt with immediately. By removing a beehive properly, you can prevent taking these measures. The Beehive Removal Process A technically skilled professional will also be able to evaluate reasons for the bees on your property or in your home, and can recommend ways to keep them from nesting and destroying your property. They can also remove a hive in hard to reach or well-established places, such as within a wall or tree. Without the right training and licensure, bee removal can be hazardous and should be left to an expert with experience in fumigating and treating the hive with a pesticide in order to get rid of the bees. As beehives can be extensive, the professional will also know how to clean out the cavity the bees have built combs within. This process can take time, but if not done properly, neglectfulness can disrepair. What Happens to the Bees? Honey bees can safely be removed and relocated by bee removal professionals like Willie the Bee Man. These bees are an important part of the ecosystem and are facing a decline, and therefore, should be relocated in safer areas for their survival. Removing a large beehive does not have to be a hassle, nor expensive. If you would like to know more about professional bee removal services West Palm Beach, you are encouraged to call the Florida bee expert, Willie the Bee Man at 305-504-8020 in Miami-Dade County, 954-719-8700 in Broward County or 561-544-7474 in Palm Beach County.
<urn:uuid:f9516c82-5fbf-47ee-aab1-196aed89630e>
CC-MAIN-2022-27
https://williethebeeman.com/removing-large-beehive/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104204514.62/warc/CC-MAIN-20220702192528-20220702222528-00202.warc.gz
en
0.955179
614
2.59375
3
The colour and texture of honey depends on the flower nectar used for the honey. There are thousands of honey types, originating from different nectar, such as lavender, acacia, eucalyptus, heather and orange flowers. The texture of honey is liquid by nature, but it will start to crystallize after a while and become solid. The ratio between different types of sugar in the sugar determines how fast the honey turns solid. The colour of the honey can vary from almost white to black, depending on the flowers used by the bees. Light honey is often mild, while dark honey often has a more intense flavour. Avocado honey comes from the nectar secreted by the flowers on the avocado tree. The flowers are in large bundles, where the flowering occurs in April-May. The tree can be 15-20 meters high. Avocado tree is typically found in Mexico, California and Central America, but can also be seen in Europe. The honey has a very dark, tar-like color, and feels smooth and silky on the tongue. The honey of the avocado has a special flavor, with a touch of burned and smoked. Acacia is from a very big plant family, and can grow to be 6-8 meter high. The acacia often looks bushy and the flowers are round or oval with plenty of stamens. The leaves are normally double-finned and feather-like. Acacia trees bloom in early spring, where the fragrant flowers attract bees with a large amount of nectar. The acacia tree, which typically grows along the Danube river in Eastern Europe, is only in bloom for about 14 days in early summer. Bees do not fly in case of rain, and frost will make the flowers fall to the ground. Thus, the production of acacia honey depends on the weather conditions in May. Acacia honey is almost always liquid, due to the high fructose content. It is one of the most popular honey types, since it is mild and therefore suitable as sweetening agent. The sunflower is known by most, as a beautiful and very vibrant flower with a lovely smell. The tall, yellow sunflower is the essence of European summer. The head of the flower has a diameter of 5-50 cm, depending on the sort. The most common sunflower has yellow crowns and a brown centre that contains a lot of small seeds. The sunflower is not just one flower, but contains hundreds. The flowers compete in attracting the bees - that is why the sunflower has a dark centre, only visible under ultraviolet light, visible to insects. The name of the sunflower means ”the one, following the sun” and that is exactly what the sunflower does. It reaches high into the sky and follows the sun to get energy. The sunflower has further the same shape and colour as the sun. Sunflower honey has a beautiful yellow colour, a delicate sweetness and a pleasant taste, and is loved by most. The forest is a very special place to have honey bees, since the forest soils are darker and have fewer flowers, compared to other sunny areas. But the bees stay in larger forest areas and collect nectar from trees and bushes. Since sunlight is rare in the forest soils, the forest is moister than other places. Bees normally collect nectar from flowers, but since the forest does not have many flowers, the bees collect sugar from "honeydew" from honey glands on ferns and the leaves of certain hardwood trees. The sugar substances are energy to the plants and are transformed into the most wonderful honey. Forest honey is very dark and has an intense taste. It is incredibly fragrant and tasty! The pretty orange trees produce fragrant flowers that add a Mediterranean feeling. The branches of the orange tree are grey-green with short hair and leathery, shiny green leaves that are cluttered with bright, transparent dots like the leaves of other citrus trees. The leaves have an intense, aromatic scent. The flowers are white, fragrant and bundled into large bouquets. Orange blossom honey is collected in orange orchards, and has a mild taste with a characteristic touch of citrus. Eucalyptus is related to myrtle and includes several sorts of evergreen bushes and trees, including some of the highest trees in the world. All eucalyptus trees contain essential oils that vary quite a lot by sort and composition. The leaves of most of the eucalyptus sorts are very fragrant with tones of lemon or peppermint. The flower buds of eucalyptus trees open by means of a lignified cover, made by the cup and crown. The flowers are characteristic with numerous, coloured stamens. Eucalyptus flowers are very attractive to bees, resulting in a very golden and creamy honey with a pleasant and aromatic taste, without a distinct taste of eucalyptus. Clover is a very common plant in Denmark. It is related to various ochrus-pea sorts. The most common clover sorts are red clover and white clover. Clover grows wild on meadows, in dunes, roadsides and fields of grass. Clover spreads with creeping stems that take root. The clover leaves consist of three green leaves and in rare cases by four leaves. According to old faith, a four-leaved clover means good luck for the person finding it. The flowers of the clover are accumulated in heads and are in bloom from May to September. Clover flowers are extremely attractive to bees, due to the large production of nectar. Further, clover is self-sterile, meaning that the plant depends on insect pollination from bees, in order for the flowers and the function of the clover to develop. Clover honey has a lovely mild and well-balanced sweetness. The texture is creamy and with a pretty pearly colour. Lavender in bloom in the summer sun is a feast for the senses. The flowers are beautiful with velvety labiatae on green ears. Lavender is partly evergreen and perennial, and a joy to humans, butterflies and bees in midsummer. Lavender has an eye-catching blue-purple colour. The leaves are needle shaped and grey-greenish depending on season. Lavender is bushy and can grow to be about 50 cm high. The close-set leaves are covered with a fine layer of down, which is very aromatic. If you let your hand glide across lavender, it will release a calming and intense scent. Lavender honey can be liquid or creamy, and has a very characteristic and aromatic taste. It is not as scented, as you might expect, but is fresh with a touch of citrus. Many people know heather from late summer, when it is in bloom and shows off a beautiful purple carpet. Heather is the common name for a group of evergreen, low bushes. It is a sturdy and branched bush that can grow to be 50 cm high. The flowers are in groups of 4 with fan-leaved cups and crowns. The fruit is a small and round capsule. The heather family is characterised by the fact that the stamens often have two corniculate appendages. Heather grows wild in Denmark and is most common in Western and Northern Jutland, as well as on Bornholm. Heather grows on the heath, in dunes and dry parts of moors. Bees collect heather honey in August, when the heather is in full bloom. Honey from heather has a amber-golden colour and a characteristic taste. It is sweet, aromatic and intense. It smells like pure summer, when the linden trees are in bloom. The linden tree is also referred to as the tree of love and joy, since the leaves are heart-shaped and the treetop looks like a big heart. It is one of the few big trees that is pollinated by bees and not the wind. Linden trees can grow to be 30 m high and more than 300 years old. The trees grow naturally all over Europe, but mainly in the eastern part of Europe. The linden tree is in bloom in July and has numerous small flowers, full of nectar that smell amazing. The flowers of the linden tree are hermaphrodites, i. e. both male and female. The flowers are white-yellow and have 5 petals, 5 sepals, plenty of stamens and a stigma in the middle. The linden flower contains a lot of nectar and is very attractive to bees and insects. They carry flower dust (pollen) from one flower to the next and pollinate the linden flowers. Linden honey has a mild taste and a light colour. The texture is soft and pasty. Beehives are often placed in areas with varying vegetation. Bees hum around and suck nectar from all kinds of flowers. That is why, honey often is a blend of nectar from various flowers. Flower honey varies in terms of smell, taste, colour and texture, depending on the weather, location and season. Jakobsens flower honey has a delicious full and well-balanced taste.
<urn:uuid:6d8119c8-35a9-427a-a257-3f6ee264cabc>
CC-MAIN-2019-26
https://jakobsens.com/en/from-nature/honey-types/
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000353.82/warc/CC-MAIN-20190626134339-20190626160339-00533.warc.gz
en
0.958321
1,934
3.25
3
The word game “Doublet” was invented by Lewis Carroll (1832-1898), the author of children’s classics “Alice in Wonderland”, Lewis Carroll was also a mathematician, who was known to his fellow mathematicians as Charles L. Dodgson. Aside from children’s classics, he had also written a number mathematics books. The game Doublets is also known by other names such as Word Chains, Word Ladders, and Stepwords. After its first appearance in the magazine Vanity Fair, it became a popular word game. This game is a word transformation puzzle. As mentioned by Lewis Carroll himself, the rules of the puzzle are simple. Two words of similar length are given. The objective is to transform the first word into the second word by forming successive words of the same length having changing only one letter at a time. The greater challenge is to do the transformation in the least number of words. This word game became a favorite when the magazine Vanity Fair ran a contest of the Game of Doublets.
<urn:uuid:1ecfba7f-1c80-42cb-b16d-132f86bd89a1>
CC-MAIN-2018-47
http://blog.dialectzone.org/thanksgiving-coloring-page-doublet-game/
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743960.44/warc/CC-MAIN-20181118011216-20181118033216-00447.warc.gz
en
0.985689
214
3.625
4
There are total 6 letters in Lutein, Starting with L and ending with N. Lutein is a scrabble word? Yes (6 Points) Lutein has worth 6 Scrabble points. Each letter point as below. Definition of the word Lutein, Meaning of Lutein word : n. - A substance of a strongly marked yellow color, extracted from the yelk of eggs, and from the tissue of the corpus luteum. An Anagram is collection of word or phrase made out by rearranging the letters of the word. All Anagram words must be valid and actual words. Browse more words to see how anagram are made out of given word. In Lutein L is 12th, U is 21st, T is 20th, E is 5th, I is 9th, N is 14th letters in Alphabet Series. Copyright © Word Creation 2017. All Rights Reserved
<urn:uuid:97b7a213-e1e9-4c2e-9d2b-5e3b0a61ccbe>
CC-MAIN-2018-39
http://wordcreation.info/how-many-words-made-out-of-lutein.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160145.76/warc/CC-MAIN-20180924050917-20180924071317-00339.warc.gz
en
0.936879
198
2.640625
3
Heat Treated Pallets (HT Pallets) Today we’re going to talk about heat treated pallets, find out what makes them special and beneficial, and discuss an alternative to heat treated pallets. Some pallets are untreated. These untreated pallets are known as “national pallets”, because they lack ISPM pallet certification and are therefore not used for international trade and foreign travel. Pallet Treatments – For Safety Wood pallets are treated to reduce the spread of pests and inhibit the growth of fungi and other organic matter to increase consumer safety and the stability of regional ecosystems. There are many wood pallet treatment processes for making pallets safe for use: - Chemical Pallet Treatments - Fungicide Pallet Treatments - Pressure Treatments - Heat Treatments At the very least, treated pallets must be debarked prior to their treatments. Because bark can harbor pests and their eggs, it has to go! Heat Treated Pallets Heat Treated or FT Pallets are subjected to a very specific heat treatment. The heat treatment kills bugs and their eggs and reduces the wood’s moisture level. Reduced moisture means that the pallet loses weight during the heating process as well! HT Pallet Recipe: Bake Wood Core at 56°C (134.6°F) for 30 Minutes Just what exactly has to happen for a wood pallet meet the heat treating requirements to meet ISPM15 requirements? The core temperature of any wood pallet greater than 6MM in thickness must be raised to 56°C (Celsius) for no fewer than 30 continues minutes. Reaching the 56°C wood core temperature for half an hour destroys pests, their eggs, and organic plant life that may contaminate the payload or impact other ecosystems adversely. Wait, what are we here in the US? We’re Fahrenheit. So 56°C is 134.6°F – which is roughly equivalent of the hottest recorded temperature in the USA: 134°F at Furnace Creek, Death Valley, CA (July 10, 1913) What Does A Pallet Heater Look Like? Pallet Heater, Pallet Kiln, whatever you call them, they have one essential purpose: to heat the pallets to 56°C and keep it there for 30 minutes. Here’s one of the little devils now: Pallet Heater System Components: * Fuel Source (natural gas or propane) – The fuel used for heating, sometimes kept in separate tanks * Power Supply – Powers the heating and air handling devices * Heating Unit – Creates heat from burned fuel for the heated air used to dry the pallets * Air Handler – Forces the heated air into the heating chamber Some pallet heating systems combine the heater and air-handler into an integrated unit, heating the air and forcing it into the heating chamber. ISPM 15 Stamps – What do they look like? The IPPC stamps used to indicate that a pallet manufacturer has met ISPM 15 standards looks something like this: And as you might have already guessed (or already know) – HT stands for Heat Treated. Here’s another example of an ISPM 15 style stamp. The Downside To HT Pallets Well, there aren’t any problems to using HT Pallets specifically; they’re better than using MB Wood Pallets (pallets treated with the now banned MB – methyl bromide). The problem with MT Pallets is that they are wood pallets and are not the first choice for efficient and cost-effective material handling due to the normal wood pallet disadvantages: * Added weight of wood causes higher transportation costs * Lack of uniformity causes interruptions and failure during transport and storage * Splinters can risk health of all hands in the supply chain, and can cause contamination, exposure to blood borne pathogens, and payload damage. * High cost of replacement over the long term due to lower service life compared to plastic pallet alternatives. The Wood Pallet Alternative Is A Plastic Pallet Advantage Are you ready for a pallet that will last longer, weighs less, performs better, causes less downtime, doesn’t need to be treated, can comply with FDA regulations, and will cost you less to use in the long haul? Plastic Pallets are the answer – and our pallet experts can help you find the perfect fit to your needs. Share your Comments! We’d love to hear from you – please let us know what other tricks you’ve used to save on freight – and check our our article on how FDA Pallets can help food and pharma companies work better!
<urn:uuid:bf291dfe-339f-4e5b-a878-6f902b33df19>
CC-MAIN-2019-30
https://oneway-solutions.com/blog/category/faq
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525004.24/warc/CC-MAIN-20190717001433-20190717023433-00044.warc.gz
en
0.920449
988
2.78125
3
What can we do to address the obstacles to HCV treatment? by Larry Buhl Hepatitis C (HCV) is a “silent killer” in more ways than one. It is a sneaky disease that can leave its victim asymptomatic for many years while doing massive damage to the liver. And too often it’s not talked about, due to stigmatization of the disease. But the alarming statistics regarding hepatitis C are causing more in the medical community to talk about it: Liver cancer, which is often driven by HCV, is the most rapidly rising cause of death in those infected with HIV. While some are talking, Lynn E. Taylor, MD, an HIV specialist focusing on HIV and viral hepatitis coinfection, is shouting. “We’ve been losing the battle [against HCV]. I’m tired of going to funerals for people who have survived having HIV only to die of complications from hepatitis C,” she tells A&U. In addition to her private practice, Dr. Taylor directs the HIV/HCV Coinfection Program at Miriam Hospital, a major teaching hospital of Brown University. The program provides multidisciplinary care to HIV/HCV and HIV/HBV coinfected people. Dr. Taylor is principal investigator of the Lifespan/Tufts/Brown Center for AIDS Research (CFAR) pilot study to develop, implement, and evaluate a screening strategy for acute hepatitis C virus infection among at-risk patients in an HIV clinic. Through her research and direct work with hep C-infected patients, Dr. Taylor has identified five barriers that the medical community must break down in order to halt the alarming rise in HCV infection. 1. National screening guidelines. Right now it’s up to the doctor and the patient to determine whether to check for HCV. “Typically patients usually receive one hep C test when they first test positive for HIV, but they’re not tested after that. Doctors are under no obligation to test.” Taylor recommends that HCV tests be automatic, and done every year. “It should be a standard test. Too many doctors are missing hepatitis C because they are not diagnosing it early.” 2. Make wiser decisions about using interferon. Pegylated interferon is a standard treatment for hepatitis C, but it is toxic and often leads to debilitating side effects. Because of this, many doctors resist putting their patients on it. Furthermore, interferon doesn’t directly attack hepatitis C. New drugs in the pipeline, including protease inhibitors such as telaprevir (covered in the October 2010 issue), offer some hope that interferon may be retired. But until then, interferon therapy, when used, must be made safer for patients. One of these ways, according to Dr. Taylor, is a new FDA approved screening test to help predict which patients are most likely to benefit from chronic hepatitis C therapy. “With this test you can see how sensitive the patient is to interferon.” 3. Better hepatitis education for doctors. Taylor believes that a lot of good doctors don’t understand HCV well enough. “When you compare HIV and hepatitis C, it’s much easier to find out what’s going on with the patient who has HIV,” Taylor says. “If I know the CD4 count and T cells, I have a good idea of how it’s progressing. Hepatitis C is a puzzle. Even with ten different blood tests, a physical exam, and sometimes a liver biopsy, which is invasive and many patients don’t want, it’s tricky to tell what’s really going on in the body. Unless they’re hepatitis experts, doctors don’t know how to interpret all of these tests. People are referred to me all the time with severe liver scarring, and their doctors didn’t know it was going on.” Dr. Taylor tells A&U that the Infectious Disease Society of America needs to become more involved in promoting training for doctors. 4. Government funding for research and prevention. Last year the Obama Administration overturned the federal ban on needle exchange, which is a good start in prevention. But there are no federal funds for hepatitis C research and needle-exchange programs, so this must come from the states. And in this prolonged economic slump, many of the states are broke. Beyond funding needle-exchange programs, there needs to be a strong effort to research several aspects of this murky disease. The CDC needs to research how and why hepatitis C is so deadly among those with HIV, for example. 5. Public awareness. Just as doctors are not trained in treating HCV, at-risk populations don’t have enough information to prevent the disease and to understand treatment options. “[HCV] is spread through blood, and it’s a disease that’s been stigmatized and the at-risk population is underinsured and often marginalized. And we’re finding out that IV drug use is not the only risk factor. There is a dramatic rise in cases of sexually-transmitted hepatitis. We need to know why, so we can direct our prevention efforts there.” Dr. Taylor has a palpable frustration with the slowness of the government and the medical community in responding to HCV, although she does have hope that awareness is growing. “We have to remember that hepatitis C is the only virus that is completely curable. We should be doing a much better job of curing it.” Larry Buhl is a freelance journalist and screenwriter living in Los Angeles.
<urn:uuid:518d6827-15ba-40ab-b27b-c96b1ccf713b>
CC-MAIN-2014-41
http://aumag.org/wordpress/2010/12/01/clearing-hurdles/
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657140379.3/warc/CC-MAIN-20140914011220-00091-ip-10-234-18-248.ec2.internal.warc.gz
en
0.951754
1,190
2.578125
3
In March 1870, fifty years before the 19th amendment granted women citizens in the US the right to vote, a bold group of women from Hyde Park, voted in a local election. Their march and vote was the first in Massachusetts and the publicity it garnered would galvanize many more across the country. Angelina Grimke Weld and Sarah Grimke, sisters who actively fought for abolitionism, had moved to Hyde Park after the Civil War. After the 13th Amendment outlawed slavery, the sisters focused their activism on securing rights, both political and social, for women. In January 1870, the Massachusetts Womens Suffrage Association was founded and the Grimke sisters were elected as vice presidents. In February of that year, Lucy Stone gave a powerful lecture in Hyde Park and a discussion followed featuring the Grimke sisters and Theodore Weld. The group present determined that action was needed. They would lead the women of Hyde Park not only to organize and speak out for women’s suffrage, but to vote in the upcoming local election. On Monday, March 7, 1870 a group of approximately 50 women including the Grimké sisters and Sarah M. Stuart, turned out on election day and cast their votes. The votes were placed in a separate box and local officials did not count the women’s ballots. But women’s collective action–showing up and voting–brought widespread attention to their demands for political rights. It also helped inspire another generation of women to continue the fight. The women’s ballots were saved and are in the collection of the Hyde Park Historical Society. They represent a valuable piece of our local women’s history. Below are reports of the march and vote from, A Memoir of Sylvanus Cobb, Jr. By Ella Waite Cobb. Published 1891. Sylvanus Cobb, jr was often chosen moderator of town meetings and filled that position at the memorable meeting of March 7, 1870, when the women were allowed to cast their vote. For this date his diary contains the following entry. At our annual town meeting I was elected moderator and had a hard time of it. Late in the afternoon our female friends who had gathered at the Everett House for the purpose of voting, came over in a body and deposited their votes in a box prepared for them, forty seven in all. There was much excitement in the hall which was packed and I had great difficulty in maintaining order but I did it. The event has created universal interest and comment, the first of the kind in the country. I have taken my stand for woman’s suffrage and am proud of it. The affair received wide spread newspaper comment and the New York Herald reported it as follows. The women succeeded in voting in Hyde Park Mass yesterday at the town election. They put a separate ticket in the field and about sixty of them voted for it. They came in a body to the polling place with bouquets and cotton umbrellas in their hands and a modest determination in their countenances, some of them old and gray headed, and many of them young and pretty. Their presence, which should have cast a benign influence over the unhallowed precincts which heretofore had been accessible to men and the vile odors of rum and tobacco, was the occasion of hisses on the part of some of the disorderly men in the crowd. But the women had a staunch defender in Sylvanus Cobb Jr, who stood up for them with the gallantry and daring of the old Spanish knights or Muscovian gun makers that he writes about in the Ledger. He cast upon the disturbers one look of his eagle eye. “Base ruffians“ he cried in thunder tones, “think ye to bar the way of these fair dames to yonder ballot box. By my halidom these women shall vote or perish in the attempt.” These brave words had their effect and the gallant women voted and more than that, although their votes were counted out, their ticket was elected. The following extracts, are from the local paper, Norfolk County Gazette. The delay of the women in making their appearance led to the rumor that their courage had failed them and the anti female suffrage masculines were in high glee. Their joy however soon turned to sorrow, for in a few moments Mr Sylvanus Cobb Jr received a delicately written note and proclaimed its contents in a loud and eloquent tone. Mr Cobb said that he did not wish to interfere with the business of the meeting or to interrupt the gentlemen who were voting, but he would suggest that, if there were any friends of universal suffrage in the hall, it would be gallant for them to go over to the Everett House and escort the ladies hither. Some of the gentlemen present, Mr Cobb said, might have wives daughters or mothers among the number and he hoped that for this reason, if for no other, the ladies would be treated decorously. They only asked the favor of coming over, perhaps more than anything else for the purpose of drilling themselves in the form of casting the ballot and thus preparing for the great duty and obligation which would with the help of God at no very distant day be conferred upon them. Their votes he said of course would not be counted and would have no influence, for or against the election. He then again expressed the hope that the ladies would be treated with civility and respect, at which there were affirmative responses and cheers mingled with a few hisses. When Mr Cobb had finished his few remarks the eyes of all were turned towards the door to witness the grand entree of the coming women. The suspense was only momentary for there soon appeared a couple of elderly dames whose frosty locks had seen seventy or eighty summers and as many winters. The crowd meanwhile became noisy and demonstrative in the extreme. Some cheered some groaned some hissed and all united in making as much noise and confusion as possible. Just as the confusion seemed bordering on a riot and as the strong minded women were becoming timid, Mr Cobb with determination in his countenance declared in a loud stentorian tone, that unless order were maintained he would have certain men arrested. Then looking in the direction from whence the disturbance originated pointing his finger in a Websterian manner, he said in a tone at once sarcastic and full of rebuke, “Ain’t you ashamed of yourselves. Do you think you are acting like men? We will forgive you for all this if you will now try and behave like orderly gentlemen.” These words of the Ledger novelist so determined and unmistakable in their meaning were momentarily effective and the voting of the women was resumed. But almost instantly there was a sound of groans and hissing which of course justly excited the ire of Mr Cobb. He advised them, as they pretended to have opinions of their own, to respect the opinions and actions of others, adding that if there were any men in the hall who would attend church next Sunday, they would probably have an opportunity to see some of the same ladies whom they were insulting, and he hoped for the credit of the town, that they would discontinue such unbecoming conduct as they had been guilty of. One man in the crowd replied that he thought Mr Cobb as moderator of the meeting had no right to criticise the action of those who were opposed to female suffrage, even if they manifested it and he therefore would move that he be requested to resign. Mr Cobb said that he had the same right to show his sympathies that others had and he should exercise the right as an individual and furthermore that he should endeavor as moderator to preserve order. While all this discussion was going on the women were very quietly depositing their ballots, and when they had ended, the polls were declared closed and there was therefore no occasion for further disturbance. Written and edited for the web by Patrice Gattozzi and Peter Brown
<urn:uuid:a6ba2606-2a90-48d2-956f-8ea8164ce180>
CC-MAIN-2023-23
https://www.hydeparkhistoricalsociety.org/1870-womens-march-and-vote/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646257.46/warc/CC-MAIN-20230531022541-20230531052541-00668.warc.gz
en
0.989203
1,616
3.09375
3
As one of the largest military facilities in the United States of America, Dugway Proving Ground covers more than 800000 acres and is located close to the Juab County. The military base is almost the size of a state. It covers a huge area of the famous desert of Salt Lake. Most of the surroundings consist of mountains, therefore the training range is somehow protected. Judging by the 2000 census, there were a little over 2000 inhabitants. Most of them lived in the eastern part of the base, in Dugway. The name defines a common technique used in the training sessions. The proving ground is also close to a different facility in Utah – the Test and Training Range. The two bases together represent the widest military field in the United States of America. The purpose of this field is to test biological and chemical weapons for the defense of the country. The environment is excellent, since there aren’t any close human communities around. The place is used by multiple commands, such as the Air Force, the National Guard or the Army Reserve. All of them use it for various training techniques. Prior to the invasion of Afghanistan, the special forces of the US Army used the area to train, since the environment was similar to the desert areas from Afghanistan. By 1941, the US government could easily rely on Edgewood Arsenal Maryland, a wide area for multiple tests. However, as World War II was approaching, the government needed a wider area to test more powerful weapons. While searching around the West Coast for a proper place, the officials decided on this desert. By 1942, the training sessions began. During World War II, Dugway Proving Ground Utah tested chemical sprays, flamethrowers, biological agents, various antidotes and protective equipments and even fire bombing. When the war ended, the activity was stopped and the base adopted a stand-by position. It was reactivated later, when the Korean War started. At that time, the authorities decided to turn this place into a permanent military base. A school was also relocated in this area, to help the students understand what they are actually trained for. In 2004, the desert unexpectedly had to host a NASA spaceship – Genesis. One of its parts was mounted backwards, which caused the ship to malfunction. The desert was chosen for the “crashing” site due to the moondust-like soil. In January, 2011, Dugway Proving Ground Utah was set on lockdown after the workers lost a vial with the VX nerve agent. Those who were at work were not allowed to leave, while those who were coming to work were not allowed in. The lockdown was removed the next day after the problematic vial was found. The housing system at Dugway Proving Ground is operated by two groups – UPH for single or dual housing opportunities and Army Family Housing for multiple bedroom units. The military personnel deployed here doesn’t have to wait. Instead, the troops are hosted automatically. The civilians working here will be hosted according to the available space.
<urn:uuid:b32a7a86-d3e9-41be-a240-13dc2c11e6c9>
CC-MAIN-2018-51
https://militarybases.com/utah/dugway-proving-ground/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823618.14/warc/CC-MAIN-20181211104429-20181211125929-00178.warc.gz
en
0.973211
619
2.75
3
In post 13, we began to think about economics. Today, our main subject will be the role of government, especially the role of government in the "free" market. Here's the main question to think about: do you see any parallels between Schlosser & Limerick? Think back to the governmental role that we read about on day 3, in Patty Limerick's history. Then think about Schlosser's perspective. In his introduction, Schlosser wrote: The political philosophy that now prevails in so much of the West - with its demand for lower taxes, smaller government, an unbridled free market - stands in total contradiction to the region's true economic underpinnings. No other region of the United States has been so dependent on government subsidies for so long, from the nineteenth-century construction of its railroads to the twentieth-century financing of its military bases and dams. One historian has described the federal government's 1950s highway-building binge as a case study in 'interstate socialism' -- a phrase that aptly describes how the West was really won. (Schlosser, Fast Food Nation, 7-8). But what is socialist about the fast food industry? As Schlosser reiterates on page 111, in his portrait of potato-baron J. R. Simplot, "Simplot displays the contradictory traits that have guided the economic development of the American West, the odd mixture of rugged individualism and a dependence upon public land and resources." Simplot got his first major break selling onion powder to the U.S. Army, before selling frozen french fries to McDonalds. It's not quite socialist, but it is what Schlosser calls an "oligopsony"(page 117) - a market in which a few huge players exert undue influence. These huge players seem to be private companies, but they have myriad, subtle, public ties. As Schlosser explained in chapter two, corporations lobby for low taxes, which mean that the public schools struggle for funding, so then corporations step in with special edutainment sponsorship deals for schools that are really disguised advertisements -- and that allow the corporations to then take even more tax write-offs. The same process with schools happens for parks: when public governments can't fund adequate parks, McDonalds introduces its private playlands. Since foods eaten in childhood will become "comfort foods" for a lifetime, McDonalds hopes that appealing to children will create lifelong consumers. Yet beyond this clever tax-deductible advertising, fast food has many more deep government ties. Fast food is an industry that took advantage of government subsidies for researching food science for the military, as well as subsidies for highway construction and suburbanization and farm fertilizer and farm commodities. Despite accepting all those government handouts, the fast food industry also fights against government oversight, opposing any increase in the minimum wage, any restrictions on advertising to children, or any improvement in the laws to maintain worker health and food safety. In a parallel book, journalist Michael Pollan reports on Iowa farmers who tell Pollan that their corn crop is "a welfare queen." (Michael Pollan, Omnivore's Dilemma, page 41). U.S. farm subsidies give billions a year to agribusiness, to encourage farmers to grow more and more corn, to make cheaper food available to consumers. All that government-subsidised corn gets used to fatten up beef-cows quickly, even though cattle aren't evolutionarily capable of digesting corn, and the corn-diet leads them to an increasing number of diseases. It's still the cheapest way to make hamburgers. It also goes into high-fructose corn-syrup that sweetens our sodas and hamburger buns, as well as other corn-derived chemicals that go into so much processed food: diglicerides, dextrose, lecithin, corn starch. Chemists breaking down the atomic content of a McDonalds meal measure the soda as 100 percent corn, milk shake is 78 percent corn, salad dressing is 65 percent corn, chicken nuggets are 56 percent corn, cheeseburger is 52 percent corn, and even the fries are 23 percent corn (mostly because they're cooked in corn oil -- if this perplexes you, Pollan explains it wonderfully in his book, chapter 7). You may think you're eating a balanced meal, but it's mostly government-subsidized cheap corn, disguised into other flavors, so that your stomach doesn't know quite how much it's eating, and the industry can sell you even more. The problems for consumer's health, the cow's health, the cow-workers, and the farming environment are hidden. As Schlosser writes, "The real price never appears on the menu" (Schlosser, 9). The role of government in Schlosser's story is a particularly complex one. The government works to insure food safety and worker safety. Governmental anti-monopoly laws should protect small businesses from giant corporations. Government investigates mob involvement in meatpacking, scale-tampering among meatpackers, price-fixing, mis-labeling, the disposal of toxic waste from the meatpacking corporations and giant agribusinesses, and, most importantly for public health, the periodic e. coli outbreaks in food. Yet again and again in Schlosser’s story, the U.S. government seems ineffective at protecting small businesses, independent ranchers, the lowest workers, or even all food consumers. You will read next that American meatpackers prefer working on days when the meat is prepared for export to the European Union, because those are the days when E.U. laws insure that the work is most humane and injuries are rarest (page 265). The U.S. government laws have been gutted, in Schlosser's investigation, especially in the 1980s, and corrupted by corporate lobbyists, ineffective enforcement, and corporate lying – especially about meatpacking corporation's own abysmal safety records. Some might conclude from this that government is ineffective, and should be minimized. Yet we can’t exist without the government. Each of us cannot independently test our own food for e. coli. We need the government to test our food for us, and the story is bigger even than that. Each of us alone cannot do much to protect decent people like Kenny Robbins (read his story beginning on page 187) from profit-hungry corporations that don’t care about Kenny’s health or safety. This is one irony of the book: it takes government intervention to insure a truly competitive market, with full disclosure and fair competition. Without adequate government laws, Schlosser reports, half a million ranchers have gone out of business in the last decade. Chicken-farmers have lost their independence to the relentless forces of the mcnugget. Meatpacking workers are losing limbs. Hank, the hero of chapter six, and a sort of modern-day version of the Marlboro Man, ends up killing himself. The government failed Hank. It failed to regulate the construction of Colorado Springs, so that the city’s poorly-planned water-runoff now destroys Hank’s land. The government did attempt to give tax breaks to conservationists, but these laws ended up favoring wealthy tourists instead of struggling working ranchers like Hank. Most of all, the government failed to prevent mergers among meat-buyers, so Hank no longer has much choice whom to sell his cattle to, and thus very little ability to negotiate a decent price. The government fails Hank, but the solution Schlosser implies is not less government but more. Schlosser also shows us the government working well: antitrust laws in the 1920s made sure that ranchers had a variety of buyers for cattle. But by the 1980s, the government stopped enforcing these laws as well. The government failed to limit a string of mergers and consolidations that led to monopoly capitalism, so that only two or three companies control most of the market for French-fries, chicken, or beef. This monopolistic (or oligoptic) economy means that farmers aren't dealing with a truly free market. The chicken-farmers especially seem eerily similar to the franchisees we read about earlier, assuming all the economic risks but getting little control, little freedom, and little profit. The story Schlosser tells is one in which more and more of the people working to bring us our McDonald’s Happy Meal end up being “cogs in the great machine” (the title of chapter seven) trapped in an economy of huge consolidated corporations, in which independent farmers or meatpacking employees can’t negotiate equally with giant processing companies. The western myth of independence actually hurts the potato farmers (“independent to the point of poverty,” Bert Moulton tells Schlosser on page 118), and the cattle-ranchers, who don't use the government as cleverly as Simplot, Karcher, and the other early fast-food entrepeneurs did. As Schlosser argues, Indeed, the ranchers most likely to be in financial trouble today are the ones who live the life and embody the values supposedly at the heart of the American West. They are independent and self-sufficient, cherish their freedom, believe in hard work – and as a result are now paying the price. (145). After the “IBP revolution” in meatpacking, the non-unionized de-skilled meatpacking workers seem to have the least independence of all: free only to quit every few months, and sometimes to sue the corporations that injure them. As Schlosser will point out in his conclusion: Many of America’s greatest accomplishments stand in complete defiance of the free market: the prohibition of child labor, the establishment of a minimum wage, the creation of wilderness areas and national parks, the construction of dams, bridges, roads, churches, schools, and universities. If all that mattered were the unfettered right to buy and sell, tainted food could not be kept off supermarket shelves, toxic waste could be dumped next to elementary schools, and every American family could import an indentured servant (or two)… (261). Schlosser encourages us to look beyond myths of the free market to understand the real forces at work, what he calls the “relentless drive for conformity and cheapness” of consolidated corporations which actually create a lack of freedom. Nevertheless, Schlosser concludes that we have some freedom, not as fast-food workers but as consumers. We have the freedom to choose to consume In’N’Out instead of McDonalds, or slow food instead of fast. Government pressure may have failed recently, but consumer pressure can still be powerful, getting fast-food industries to serve healthier, more environmental, more diverse food. No one forces us to eat any fast food, anyway, although all that marketing to children -- and creating comfort foods for life -- is a bit coercive. Still, Schlosser concludes, “Even in this fast food nation, you can still have it your way,” which might mean choosing not to have any fast food at all. Will you? Will this book change how you eat? I am curious about that, and about your ideas of government involvement in the market. I am looking forward to this week’s blackboard discussion-board.
<urn:uuid:cff60414-25a6-4108-9ab3-ab0ab3d8f323>
CC-MAIN-2018-51
http://amst101.blogspot.com/2010/05/14-governmental-frontiers.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826145.69/warc/CC-MAIN-20181214162826-20181214184826-00432.warc.gz
en
0.950025
2,356
3.171875
3
These are the page proofs, with autograph corrections by the composer, of Aleksandr Grechaninov’s Liturgia Domestica (1926/7). Grechaninov (1864–1956) is best known for the sublime choral music he wrote for the Russian Orthodox Church. It is what you expect to hear in Russian church music, comparable to, say, the style of Rachmaninov’s Vespers. But there was evidently also an unorthodox streak in Grechaninov, for he was the first (and, maybe, the last) Russian composer to write sacred music with instrumental accompaniment. The Liturgia Domestica was written in 1917, at the time of the October Revolution. Grechaninov recalls the time in his memoirs: ‘Many music lovers like to sing church music while accompanying themselves at the piano. Yet the average amateur experiences considerable difficulty in trying to play from a choral score written in four parts. I decided to write a simple sacred song for a single voice with piano accompaniment, to the words “O Holy God.” Later I added several liturgic chants to it and put them together under the ancient title Demestvennaya, that is, Domestic Liturgy. ‘I wrote this Liturgy in the autumn of 1917 during the Bolshevik uprising in Moscow. The bitterness of the Hallelujah in this Liturgy is explained by my horrible experiences during that period. Every time I hear this Liturgy the memories of those dreadful days come to mind. Peaceful citizens kept vigil in their homes. There were trenches right in front of our house. No one dared appear in the streets. Gunfire and the sound of the cannonade broke the ominous silence. At any moment a stray bullet or a cannonball might have hit our house which stood between the battle lines …’ (My Life, tr. Nicolas Slonimsky, New York, 1952, p. 121). Grechaninov soon expanded on his initial ideas, scoring the work for tenor, strings, harp, and celeste, and the premiere was given in Moscow in 1918. He later added four further movements, conducting the premiere of this version himself in Paris in 1926 (he had left Russia the year before; in 1939, he emigrated to America). These page proofs date from the Paris period, and show Grechaninov returning to his original scoring intention—a domestic piece for voice(s) and piano. It was published in 1927 by A. Gutheil (S. & N. Koussewitzky) in Moscow and Breitkopf & Härtel in Leipzig; the printing itself was done in Paris by Delanchy-Dupré.
<urn:uuid:679965ed-bf2a-49d9-ba1f-77b072dda7e4>
CC-MAIN-2021-49
https://simonbeattie.co.uk/blog/archives/449/
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363229.84/warc/CC-MAIN-20211206012231-20211206042231-00472.warc.gz
en
0.963648
574
2.59375
3
The first glimmers of the proto-Hurricane Laura showed up on forecasters’ radars on August 16, 2020, a large, loose splattering of clouds rolling off the edge of West Africa. It grew quickly. By the time it got a name, on August 21, forecasters for the National Hurricane Center (NHC) were watching it obsessively, kneading in data from airplanes and models and their own decades of experience to forecast exactly where and how the storm would develop. By the 24th, the center’s three-day forecast predicted that Laura would make landfall at Cameron, Louisiana, at 2 a.m. on the 27th. That bulls-eye was a remarkable demonstration of how much forecasting has leapt forward in the past few decades. “The improvements have been really phenomenal,” says Chris Landsea, a hurricane researcher at the NHC. But are we nearing the limit for how accurate storm track predictions can get? Landsea and a colleague recently asked that question and found some evidence that suggests it may be true. But others think the same scientific dedication that led to the super-accurate forecast for Laura will break through that supposed limit. How have forecasts gotten better? Though 2020 has already seen 26 named storms, including Hurricane Epsilon just this week, hurricanes are rare events. Between 1955 and 2015, only 88 made landfall in the United States. Add to that their semi-chaotic nature and tendency to spend their youth in remote stretches of ocean that aren’t routinely crisscrossed by data collectors, and you end up with a tricky phenomenon to understand. What’s amazing, says Allison Wing, an atmospheric scientist at Florida State University, is how much we do know. The clearest success has come in forecasting the storm track. In 1990, the average three-day forecast was off by about 300 nautical miles, which is the distance from New Orleans to Houston. Today, that’s down to 100 miles. By the time a storm makes landfall, the difference between its predicted and real locations is less, on average, than 8 miles (and in Laura’s case, much less). The lead time has also grown: A five-day track forecast today is as accurate as a three-day one was in 2001. Much of that progress is because weather forecasting generally has advanced. A tropical cyclone is like a stick floating in a river: Larger weather systems move it along in their swirling flow. If meteorologists know what’s happening with the big atmospheric streams, they’ll have a pretty good idea of where a storm will track. Forecasts are better now “not because we had a bunch of knuckleheads 40 years ago and a bunch of Einsteins today,” says Landsea, but because thousands of scientists around the world developed a more detailed understanding of atmospheric physics, translated it into better forecast models running on more powerful computers, and have reams of real-time weather data to feed the models. The underlying concepts have been in place for a century. In the 1920s, scientists hand-calculated the first weather “forecasts” for two spots in Europe, based on developing theories of the atmosphere and observations telegraphed in from far-off locales. But the math required for an ostensible “six-hour” forecast took six weeks to do. More than a century later, the equations from that first calculation form the backbone of modern weather models. But as computers have gotten more powerful, the calculations can begin earlier in the storm’s life, says Chia-Ying Lee, an atmospheric scientist at the Lamont Doherty Earth Observatory. “If you get the genesis correct, you have a pretty good chance of getting the rest.” Now, flotillas of satellites feed a steady flow of atmospheric and ocean data into models that produce 3-D simulations of the winds and clouds. Computers are powerful enough, and data precise enough, to reconstruct weather happening over areas as small as just a few miles in diameter. “We want them as small as individual clouds, ideally,” says Rosimar Rios-Berrios, an atmospheric scientist at the National Center for Atmospheric Research. “Going down in scale, you’re going away from seeing just high-pressure and low-pressure systems, but going to groups of clouds, how water vapor is turning into clouds, and more.” All the tweaks, little and big, have added up to a pretty consistent four-percent improvement in track precision each year, calculates Zoltan Toth, an atmospheric scientist at NOAA’s Global Systems Laboratory. The NHC started issuing five-day forecasts in 2003; it’s flirting with seven-day ones now. Where’s the limit? But can the improvements keep marching forward? In 2018, Landsea and a colleague came to an unsettling conclusion: Improvements in the accuracy and lead time of track forecasts might be slowing. They looked at the errors in the 24- and 72-hour track forecasts from the past 30 years, as well as 20 years of data for the 120-hour forecasts. The shorter forecasts were still getting a little bit better each year, on average. But the longer ones had stalled. Theoretically, weather predictions can’t improve indefinitely. Even with perfect models, and perfect math, and near-perfect data, the ultimate limit for any weather prediction is somewhere under two weeks, longstanding theory has held. For something more complicated, like a tropical cyclone, the limit of predictability is much shorter. That’s because even a tiny initial error—a few hundred meters in the location of a storm center, or a few knots in the measurement of wind speed—compounds with time. Tiny errors eventually grow so big that a forecast quickly becomes useless, no better at predicting the future than chance. Time-wise, forecasts stretching farther out than five or six days were long considered pie-in-the-sky goals. And the shorter-term forecasts can only get better if the initial errors get smaller. Landsea and his colleague calculated the theoretical “best” a model could do, assuming small initial errors that doubled roughly every two days. In the Atlantic, a 120-hour forecast could likely get about 175 nautical miles from the truth; current models get to about 200. For 24-hour forecasts, the error could shrink from 45 miles to 40. In other words, we’re fast approaching the limit of how good the track forecasts can get:At the rate we’re going, Landsea argues, we could max out within a few years. He’d like to be wrong, though. “I think it’s possible we’ll look back in eight to 10 years and realize we’ve blown past the theoretical limits,” he says cheerfully. When Toth read the paper, he thought, wait a second. There’s no reason science would stop getting better; many previous “limits” of predictability have turned out not to be intrinsic to the system and have been overcome by unforeseen scientific cleverness. Using a different approach to analyze the same data on forecast errors than Landsea did, Toth and his colleague Feifan Zhou found much looser theoretical limits of predictability and much more room for improvement in five-day forecasts and shorter ones as well. By their calculations, we should be able to gain about a day of extra lead time each decade well into the future—meaning that by 2050, we would have eight-day forecasts as accurate as the five-day ones today. “We are fighting…for our forecast accuracy,” Toth says, “We are fighting for it every day. We put effort into doing things a little better, year by year, so we can knock the error down. If we put 10 times more resources into it, who knows, maybe we could even go a little faster.” Let’s hope more progress is coming The improvements in forecasts so far have occurred so slowly that they’ve been nearly invisible to the public, says Rebecca Morss, an atmospheric scientist at the National Center for Atmospheric Research with an expertise in risk communication. “As soon as the forecasts improve, society just eats them up and expects more,” she says. But those extra two days in the accurate track forecast gained since 2001 make a difference, says Samantha Montano, an emergency management expert at the Massachusetts Maritime Academy. “When you go back many decades, we just were not able to do the kinds of large-scale evacuations we do now, because you just didn’t have enough warning.” Cities, especially big ones like Houston or New Orleans, need several days to evacuate safely, and a few miles difference in track can drive decisions about whether to leave or stay put. Eric Blake, a forecaster with the NHC, notes that initial forecasts this year had Hurricane Laura heading toward Houston; the NHC’s subsequent course corrections helped the city manager decide not to evacuate the city. The economic value of improving forecasts is enormous. A recent analysis suggests that since 1970, good hurricane forecasts have been worth a staggering $82 billion to coastal residents. Another suggests that improvements in storm track forecasting just in the last decade have saved over $1 billion. Besides the storm track, emergency managers and coastal residents are interested in better forecasts of other characteristics of a storm, like the speed of its strongest winds, the height of its storm surge, and how much rain it will dump. “We still don’t have a complete understanding of the physics that controls things like rapid intensification,” Wing says—which means there’s plenty of room to get better at that too. So where is the limit? “I think it’s an open question,” says Blake. “The reality of it is we’ve blown through all the old predicted limits.”
<urn:uuid:b239d4f6-6168-4070-a4f4-8b3552a6a78a>
CC-MAIN-2022-21
https://www.nationalgeographic.com/science/article/hurricane-path-forecasts-have-improved-can-they-get-better
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522309.14/warc/CC-MAIN-20220518183254-20220518213254-00738.warc.gz
en
0.959503
2,097
3.015625
3
Japanese supercomputer smashes own world speed recordPublished On: Fri, Nov 4th, 2011 | Computer Science | By BioNews A supercomputer that is being developed in Kobe, Japan, is said to have broken its own record of being the world’s fastest computer. The computer, which has been nicknamed K, exceeded the mark of 8.16 petaflops it set in June by of achieving a performance goal of 10 petaflops, or 10 quadrillion computations per second in October. According to the developers, the results of the latest performance have been submitted to the world ranking to be presented at an international computing conference in Seattle that starts on 12th November. The supercomputer has about 88,000 central processing units and software is now being adjusted before its planned completion in June. “The K computer is a key national technology that will help lay the foundation for Japan”s further progress,” the Japan Times quoted Ryoji Noyori, the Riken President as saying. “As such, I am delighted that it has achieved its major objective of 10 petaflops, demonstrating our strong technical power,” he said. The supercomputer is being jointly developed by Fujitsu Ltd. and the Riken research institute.
<urn:uuid:2f88654f-7253-462d-ac2b-1c2f6c3c54a9>
CC-MAIN-2016-36
http://news.bioscholar.com/2011/11/japanese-supercomputer-smashes-own-world-speed-record.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982935857.56/warc/CC-MAIN-20160823200855-00028-ip-10-153-172-175.ec2.internal.warc.gz
en
0.953131
267
2.6875
3
Stand up for the facts! Our only agenda is to publish the truth so you can be an informed participant in democracy. We need your help. I would like to contribute Gay rights advocates are casting the fight for same-sex marriage as a struggle mirrored in the nation’s past. "This is a civil rights issue," Assembly Speaker Sheila Oliver said during a news conference announcing Democratic plans to legalize same-sex marriage in New Jersey. Oliver recounted the story of an interracial couple forced to leave Virginia in the 1950s or face jail time for being married. The U.S. Supreme Court eventually heard Richard and Mildred Loving’s case and ruled state statutes banning interracial marriage unconstitutional. But, "in 1958, there were 16 states in this country that prohibited -- prohibited -- an African-American and a Caucasian from being married," Oliver (D-Essex) said on Jan. 9. "Without question, Senator (Stephen) Sweeney said it best: this is a civil rights issue. It is a snapshot in time in the history of our country issue. And I think for those of us that believe in equality, equality, equality, marriage equality represents the third leg on the stool of civil rights and equality in this country." A spokesman said Oliver based her statistic on a New York Times article published earlier this month. It put the number of states where interracial marriage was illegal in 1958 at 16. It’s actually more than that, PolitiFact New Jersey found. Oregon repealed its law in 1951, becoming the first state to do so since Ohio in 1887. Colorado, Montana, North Dakota and South Dakota followed suit. By 1958, two dozen states still prohibited interracial marriage: Alabama, Arizona, Arkansas, Delaware, Florida, Georgia, Idaho, Indiana, Kentucky, Louisiana, Maryland, Mississippi, Missouri, Nebraska, Nevada, North Carolina, Oklahoma, South Carolina, Tennessee, Texas, Utah, Virginia, West Virginia and Wyoming. Although California still technically had a miscegenation law on its books in 1958, "once the state Supreme Court declared the law invalid in the 1948 Perez V. Sharp case, it was no longer legally enforceable. So from 1948 on, California is put into the ‘legal column,’" Renee Romano, the author of "Race Mixing: Black-White Marriage in Postwar America" and an associate professor of history at Oberlin College in Ohio, said in an email. "The Speaker was responsibly relying upon the data graphic included in that New York Times [article]," Tom Hester Jr., a spokesman for the Assembly Democrats, wrote in an email. "The Speaker’s overall point was to note that same-sex couples continue to suffer from the same wrongful discrimination that interracial couples such as the Lovings and many, many others endured until the Supreme Court rightly put a stop to it." By the time the Supreme Court unanimously ruled miscegenation laws unconstitutional in 1967, 16 states still had such statutes. "Under our Constitution, the freedom to marry, or not marry, a person of another race resides with the individual, and cannot be infringed by the State," then-Chief Justice Earl Warren wrote in the opinion for the court for the Loving v. Virginia case. Romano said the analogy between interracial marriage and same-sex marriage isn’t exactly parallel, but it’s powerful. If you can make the case that 50 years ago people supported bans on interracial marriage, but "now, we know that it goes on and it’s no big deal, you can sort of use that," she said, to say in another 50 years, people may ask "what the hullabaloo is about. It’s a really powerful analogy. There’s a lot of richness there politically." Oliver claimed that 16 states prohibited interracial marriage in 1958. There were actually 24 states with legally enforceable statutes banning the marriage of blacks and whites then. Oliver’s number is off, but the precise figure only further supports her point about discrimination against interracial couples in the 1950s. We rate this statement Mostly True. To comment on this story, go to NJ.com. Blue Jersey’s YouTube Channel, Sheila Oliver on Marriage Equality, Jan. 9, 2012 Email interview with Tom Hester Jr., communications director for the Assembly Democratic Majority Office, Jan. 11, 2012 The New York Times Magazine, The Case of Loving v. Bigotry, Jan. 1, 2012 The New York Times, Mildred Loving, Who Battled Ban on Mixed-Race Marriage, Dies at 68, May 6, 2008 Cornell University Law School’s Legal Information Institute, Loving v. Virginia, accessed Jan. 10, 2012 The Family Life Coordinator via JSTOR, Anti-Miscegenation Laws, Oct. 1964 "What Comes Naturally: Miscegenation Law and the Making of Race in America," by Peggy Pascoe Phone and email interview with Renee Romano, director of the Institute for Gender, Sexuality, and Feminist Studies and associate professor of history at Oberlin College, Jan. 12, 2012 NPR, The Changing Face of Seeing Race, Oct. 14, 2011 PolitiFact, Obama's more right than he knows, April 15, 2008 Gallup, Record-High 86% Approve of Black-White Marriages, Sept. 12, 2011 The Nation, Far From Heaven, May 29, 2003 University of Oregon’s Center for the Study of Women in Society, In Memoriam: Peggy Pascoe, accessed Jan. 12, 2012 Read About Our Process In a world of wild talk and fake news, help us stand up for the facts.
<urn:uuid:2cdb8fc2-c235-4d94-92bd-2c0759f9d2e6>
CC-MAIN-2022-27
https://www.politifact.com/factchecks/2012/jan/15/sheila-oliver/sheila-oliver-says-16-states-prohibited-interracia/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103640328.37/warc/CC-MAIN-20220629150145-20220629180145-00453.warc.gz
en
0.932139
1,205
2.953125
3
The vineyard of Santorini: The terroir Manual work: From pruning to harvesting, everything is done by hand. The vintners have invented a distinct way of pruning, called “kouloura”. The vines stay close to the ground and form a spiral, a natural basket that hosts the grapes and protects them from the strong wind. In areas of notable slope, the vine growers have built stone terraces, known as “pezoules” in order to facilitate the cultivation and to maximize the absorbance of rainwater. The vineyard of Santorini, one of the most ancient in the world with a 3,500-year history, consists of a World Heritage site. Volcanic soil: The volcanic eruption formed a soil of unique texture which includes lava, volcanic ash and light stone. That special composition gives birth to grapes of distinctive flavor-profile, hosts low-yield vines and works as a natural shield from diseases. The vineyard in Santorini is self-rooted as it was never affected by the phylloxera. Dry farming: The vines are not irrigated artificially and the rainfall is rare. Therefore the plants’ watering is dependent on the natural humidity and the sea mist; absorbed by the volcanic soil, they offer the necessary hydration. Indigenous varieties: Assyrtiko thrives in Santorini, the birthplace of the famous Greek variety. As a single varietal or blended with the aromatic Athiri and the delicate Aidani, it offers the Santorini Protected Designation of Origin (PDO) wines. White, dry wines with high acidity, intense minerality and a remarkable ageing potential.
<urn:uuid:2012d0f2-e76f-4562-a1ee-aa6a0ae8489a>
CC-MAIN-2017-26
https://www.santowines.gr/en/profile/santorini-volcanic-terroir.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320679.64/warc/CC-MAIN-20170626050425-20170626070425-00008.warc.gz
en
0.927503
355
2.6875
3
In 1840, when the first official British presence touched down in New Zealand, it was led by a very idealistic young naval captain, Captain Hobson. And he gathered together representatives of most of the tribes in New Zealand. And at the Treaty of Waitangi he agreed that there should be certain rights that would be inherent within the Māori nation if they pledged allegiance to Queen Victoria. One of the key differences between Islamic scripture and Christian scripture is that Islamic scripture (the Koran) was meant to have been revealed to the prophet Muhammad during his adult lifetime. It was not meant to have been revealed to a number of people over many thousands of years. We’re looking at religion as an organized and above all institutionalized system of beliefs. The organization particularly of textual or other recorded teachings that form the basic faith framework of the religion, and the institutionalization which polices those teachings, polices the extent, the limits, and above all the interpretation of what those texts might mean. The best justification we have for killing fifty‐six, fifty‐seven, whatever billion land animals and a trillion sea animals every year is that they taste good. And so, in a sense how is this any different from Michael Vick, who likes to sit around a pit watching dogs fight, or at least he used to?
<urn:uuid:b571850c-3109-421c-bf9e-d1502be6f5f4>
CC-MAIN-2018-51
http://opentranscripts.org/transcripts/tagged/christianity/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829140.81/warc/CC-MAIN-20181218102019-20181218124019-00000.warc.gz
en
0.966128
268
3.015625
3
The Parsha ends with a very short account of the early life of Avraham Avinu. It outlines his family, including his brother, Haran, and how he met an untimely death. The Torah briefly tells us that Haran died in front of his father. The Medrash provides the details to the background of this tragedy. It discusses how Avraham rejected the rampant idol worship of his time and came to belief in one G-d. He destroyed the idols in his father, Terach’s store, and as a result, Terach handed him over to King Nimrod. Nimrod tried to force him to worship idols and when he refused, Nimrod had him thrown into a fire. Haran was an onlooker to all this and knew that he would be forced to side either with Avraham or Nimrod. Before Avraham was thrown into the fire, Haran took a very practical approach – if Avraham would survive, then Haran would join him, but if he would die, then he would side with Nimrod. When Avraham emerged unscathed from the fire, Haran accordingly declared his support for Avraham. As a result, he was thrown into the fire and was killed. The Medrash points out that his death was somewhat unusual in that only his internal organs were destroyed, implying that his external body was left undamaged. What is the significance of this unusual death? The answer is given that on an external level, Haran was righteous, in that he made himself out to be of the same ilk as Avraham, however, internally, he was did not believe with a leiv shalem. Accordingly, his insides were destroyed because they were lacking merit. However, his exterior was unharmed because it appeared righteous. This explanation provides us with an example of the principle that it is possible to observe Torah and Mitzvos on two different levels – internally or externally. Internal observance means that a person imbues himself with the attitudes espoused by the Torah – his outlook and life goals are solely defined by the Torah. External observance means that a person may observe all the Mitzvos, however, his deep-seated desires and aspirations are not in tune with doing ratson HaShem (HaShem’s will), rather, other factors drive him. Haran proved himself to be someone whose adherence to belief in one G-d was purely superficial, therefore, he was only protected on a superficial level. Avraham, in contrast, held a deep internal commitment to fulfilling ratson HaShem on all levels, as a result he was fully protected from Nimrod’s fire. Haran’s trait of externality was emulated by his son, Lot. On a superficial level, Lot observed the Torah, however, many of his actions demonstrated that internally, he was lacking a true desire to follow Avraham’s ways. He was more interested in satisfying his desire for financial success and immorality. The extent to which Lot represents a dichotomy between his internal and external nature is borne out by Chazal in Parsha Lech Lecha. Having settled in Eretz Yisroel, Lot’s shepherds begin to justify grazing their animals on the land of the inhabitants. Avraham’s shepherds protested his, correctly arguing that it constituted thievery, and as a result, a dispute broke out. At that point, Avraham requested that they separate, arguing that they were ‘brothers’ . The obvious problem with this argument is that they were not brothers, Avraham was Lot’s uncle. Moreover, what was the rationale of his argument that they were brothers? The Medrash explains that Avraham was saying that they were like brothers in that they were extremely similar in appearance. Accordingly, Avraham was concerned that people would see Lot grazing other people’s land with his animals and think it was Avraham. We see from here that on a superficial level, Lot was very similar to Avraham, indeed he must have appeared to be a very righteous person, yet internally, he resembled his father, Haran. Haran had another child, Sarah Imeinu. It seems that she succeeded in avoiding the failing of her father and brother, and became someone whose external observance was matched by internal righteousness. In our Parsha, she is called by a second name, that of Yiskah. The Gemara offers two reasons for this name. One is that she saw with ruach Hakodesh, the other is that everyone would gaze at her beauty. It seems that these two explanations complement each other. The beauty she possessed was not merely of a physical nature, rather it was a spiritual beauty. This emanated from her high spiritual level, which was demonstrated by the fact that she had ruach Hakodesh. Thus, her external beauty was a result of her internal righteousness. In this way, we see that she was able to emulate Avraham in matching her external observance with internal sincerity. There are many lessons that can be derived from the failings of Haran and Lot, and the greatness of Avraham and Sarah. As Haran demonstrated, it is very easy to be a ‘superficial tzaddik’, it is not hard to dress in a certain way and perform certain actions that make a person look ‘righteous’. However, such externality is very dangerous in that it can cause a person to be a mere shell of an Eved HaShem (one who serves HaShem), whilst on the inside, he is anything but an Eved HaShem. The Prophet, Yeshaya, informs us of the seriousness of this failing: He describes how HaShem will punish Klal Yisroel, “because this people approached [Me] with it mouth and honored me with its lips, but its heart was far from me…” Moreover, emphasis on externalities can actually hinder one’s internal gowth. One of the methods of the yetser hara is to make a person who wants to grow focus on external changes, whilst distracting him from internal growth. My Rebbe, Rav Yitzchak Berkovits describes a secular person who had a tendency to violence. He became ‘observant’, dramatically changing his dress code and external actions, however, he retained his internal tendency to violence. Now he channeled it in a different, ‘frum’ way, by throwing stones at people whom he disagreed with, but he did not change his true self. In a less dramatic fashion, this pitfall can affect all people who try to improve their Avodas HaShem and overemphasize external changes at the expense of true growth. It is essential that a person make a cheshbon hanefesh of the balance between his external and internal Avodas HaShem. May we all merit to emulate Avraham and Sarah and internalize what we believe in.
<urn:uuid:cf597946-24e3-4249-86c3-3ba0567b0425>
CC-MAIN-2017-17
http://rabbiygefen.blogspot.com/2011/10/depth-and-superficiality-noach.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120844.10/warc/CC-MAIN-20170423031200-00055-ip-10-145-167-34.ec2.internal.warc.gz
en
0.989552
1,462
3.234375
3
The Quadriga Prize The ‘Quadriga’ is a German prize named after the statue on top of Berlin’s Brandenburg Gate. It was founded in 2003 in celebration of German re-unification and is awarded in an annual ceremony on 3 October (Reunification Day) to people ‘whose courage tears down walls and whose commitment builds bridges’ and whose ‘thoughts and acts are built on values which promote vision, courage and responsibility’, to quote the Quadriga website. Past recipients have included Mikahil Gorbachev, Recep Tayyip Erdogan, Viktor Yushchenko and Vaclav Havel. This year the Award Committee nominated 4 laureates including the Prime Minister of the Palestinian Authority, Salam Fayyed, Mexico’s Foreign Minister Patricia Espinosa and… Russian Prime Minister Vladimir Putin. He was to have been honoured for his ‘service to the stability of German-Russian relations’, but the nomination provoked an outcry from both German politicians and others. Former recipients, including former president of Czech Republic Vaclav Havel, insisted that they would return their award, if the Russian leader were so honoured and the Committee took the difficult decision (‘in light of the growing and unbearable pressure and the danger of further escalation.’) to cancel the award for 2011. It was, however, not only international figures who protested so vigorously. There is another dimension to the matter, one rather nearer to Russia. A Circassian protest Immediately after the announcement, one of the leaders of the German Green Party, Cem Ozdemir, quickly stated that he had voted against the award and announced that he would leave the committee. Ozdemir’s behaviour was so unexpected that initially other committee members tried to reason with him, but subsequent national and international developments changed their view and the award was withdrawn. Cem Ozdemir is by origin a Circassian. He is one of the 5 million members of the diaspora, which resulted from 19th century mass deportations by the Russian Army of Circassians from their home in the North Caucasus to Turkey. The Circassian population inside Russia today is about 1 million, but Russia will not allow diaspora Circassians to return, so they remain scattered all over the world. Is it too far-fetched to imagine that Ozdemir could not countenance an award celebrating reunification being given to one of the leaders of a country which will not allow his people to reunite? Cem Ozdemir is the son of a Circassian gastarbeiter family from Turkey; in 1983 he acquired German citizenship. The announcement cancelling the award was made on 16 July, on the eve of high-level talks between Russia and Germany. Both sides assert that political relations are not affected. The Russian statement referred to ‘probable internal problems’ in the Award Committee. Circassian Days at the EU Parliament Ozdemir had not previously displayed any signs of anti-Russian feeling. He is a European MP and actively engaged in the Circassian movement, organising annual ‘Circassian Days at the European Parliament.’ He has even taken the Russian side several times, going against the main trend in Circassian and European politics. He did not, for example, support 20 Circassian organizations in their appeals to the Presidents of the European Parliament Josep Borrell Fontelles in 2006 and Hans-Gert Pottering in 2008 for recognition of the Circassian genocide. He sided with Russia after the 2008 Russian-Georgian war, inviting an Abkhaz delegation to the ‘Circassian Days at the European Parliament’ in October 2008 and organising a meeting for them with 30 members of the EU Parliament, including Jacek Saryusz Wolski, the head of the committee for international affairs. Such meetings were crucial for Russia, which was trying to legitimize its actions after its war with Georgia and recognition of Abkhazia. Ozdemir cannot be said to have taken the first step against Russia. It was actually the Russians who made the first move: in December 2010, six Circassian organizations from Russia unexpectedly signed a statement against ‘Circassian Days at the EU Parliament’. Extensive experience of European politics is hardly needed to work out who organized this anti-Circassian campaign. One of the signatories to the statement openly confessed to Caucasus Knot that the Russian Ministry of Foreign Affairs was watching the 2010 ‘Circassian Day’ with great attention. Apparently, Russian diplomats had been so pleased by Ozdemir’s support for the Abkhaz question in 2008 that they made him an offer to turn his “Circassian Days at the EU Parliament” into a regular pro-Russian event. He refused and they had clearly decided to punish him by mobilizing the Russian Circassians. Russia and the Circassian question There is no doubt that Russian leaders analyzed the Quadriga situation from every angle, but they decided not to respond to the Circassian dimension of the situation. They took a similar decision in May 2011, when the Georgian Parliament recognized the 19th century Circassian genocide, which Russia has always refused to do. Circassian activisits visit Brussels regularly in connection with the annual event, Circassian Days at the EU Parliament. They would like the EU to support their struggle for Circassian civil and cultural rights. Today, the Russian authorities are unable or unwilling to resolve any of the three main components of the Circassian question – recognition of the genocide, the unification of the multiple Circassian regions into a single republic within the Russian Federation, and the repatriation of the Diaspora. After the wave of demonstrations against Caucasian ethnic minorities in Moscow, it was obvious that any decision in favour of Circassians could stir up Russian nationalism, which is far more dangerous than Circassian nationalism, so the Kremlin apparently decided just to adopt the ‘tactics of silence’ on the Circassian question. Thus, German politician Cem Ozdemir’s refusal to accept that Putin should receive the prestigious Quadriga award was his first anti-Russian action in public. What might lie ahead for him? In my opinion, he has more than one option. His success with Quadriga might lead to the formation of an anti-Russian lobby, which has not hitherto existed in Germany. Or he could initiate discussion of the Circassian genocide in the EU Parliament. He could easily do this himself, or via the German-friendly Estonian Parliament, which has recently received similar appeals from Circassian organizations. There is also the question of the 2014 Winter Olympics, which are to take place in Sochi, the last capital of independent Circassia in the 19th century, and which will coincide with the 150th Anniversary of the Circassian deportations. The anti-Sochi movement is fairly strong already and the situation could become immeasurably more complicated if an experienced and well-known politician like Cem Ozdemir were to decide to take matters further. "Today, the Russian authorities are unable or unwilling to resolve any of the three main components of the Circassian question – recognition of the genocide, the unification of the multiple Circassian regions into a single republic within the Russian Federation, and the repatriation of the Diaspora." Whatever strategy he chooses, he would certainly be able to cause Russia quite a headache if he acts in the same way, and with the same success, as in the Quadriga affair. At the same time it is clear that Russian leaders do not regard the problems with Cem Ozdemir as insoluble, as they are, for example, with the Georgian President Mikhail Saakashvili. Given the pragmatism and flexibility of Russian diplomacy, a mutual understanding will probably be re-established with the national leaders of the Green Party. Might the Quadriga affair, which both sides continue to assert has not affected Russo-German relations, serve as a reminder to the international community that the Circassian question remains unsolved? Get our weekly email CommentsWe encourage anyone to comment, please consult the oD commenting guidelines if you have any questions.
<urn:uuid:3a282da2-f2ef-43f4-94e3-4d189028c170>
CC-MAIN-2023-14
https://www.opendemocracy.net/en/odr/quadriga-prize-circassian-dimension/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945288.47/warc/CC-MAIN-20230324180032-20230324210032-00518.warc.gz
en
0.969614
1,691
2.546875
3
The term fraud has already been mentioned, but what does it mean? The Association of Certified Fraud Examiners (ACFE) in the United States defines fraud as “any intentional or deliberate act to deprive another of property or money by guile, deception, or other unfair means” (ACFE 2014a).5 Focusing on occupational fraud and abuse, the ACFE distinguishes between corruption (conflicts of interest, bribery,6 illegal gratuities, and fraudulent statements), asset misappropriation (cash, inventory, and all other assets), and fraudulent statements (financial and nonfinancial). In Canada, Section 380(1) of the Criminal Code of Canada provides a general definition for fraud: “Everyone who, by deceit, falsehood or other fraudulent means, whether or not it is a false pretense within the meaning of this Act, defrauds the public or any person, whether ascertained or not, of any property, money or valuable security or any service.” The Fraud Act (2006, c35) of England and Wales and Northern Ireland, which came into effect in 2007, defines three categories of fraud—fraud by false representation, fraud by failing to disclose information, and fraud by abuse of position. Finally, Australian criminology researchers Duffield and Grabosky (2001, 1) define fraud to mean “obtaining something of value or avoiding an obligation by means of deception.” While definitions of fraud vary across jurisdictions and attempts to precisely define it are indeed problematic (Croall 2010), the essential element of fraud is deception. Deception, of course, underpins a broad variety of fraudulent activities in society, including insurance fraud, politicians misleading the electorate, and advertisements that intentionally dupe consumers. This book focuses on fraud as the legal concept used to investigate and prosecute fraudsters. Fraud, like corruption, is an example of an economic crime, which is a category of white-collar crime. According to the ACFE, “fraud includes any intentional or deliberate act to deprive another of property or money by guile, deception, or other unfair means.”7 An example would be occupational fraud whereby an accountant in collusion with a client steals money from the company employing him/her. The term economic crime covers illegal acts perpetrated by a person or a group of persons to obtain a financial or professional advantage. In such offenses (e.g., Internet fraud and tax evasion) the offender’s main motive is economic gain.8 It can be seen that the terms white-collar crime, economic crime, fraud, and corruption overlap. Producing a precise definition of white-collar crime has proven difficult for criminologists (see Croall 2010, for detailed discussion). The American sociologist-criminologist Edwin Sutherland originally defined the term as “a crime committed by a person of respectability and high social status in the course of his occupation” (1947, 9). The following are examples of white- collar crime: tax evasion, money laundering, fraud, embezzlement, insider trading, bribing (which is an example of corruption), cybercrime, identity theft, Ponzi schemes, copyright infringement, selling kangaroo meat for beef, and running unsafe factories. Sutherland’s definition has been criticized for emphasizing the social status of the offender, thus excluding offenders of lower socioeconomic status who also commit white-collar offenses. An important category of white-collar crime is corporate crime. American criminologists Clinard and Quinney defined corporate fraud as “ ... offences committed by corporate officials for the corporation and the offences of the corporation itself” and individual crime as “ ... offences committed by individuals for themselves in the course of their occupations and the offences of employees against their employers” (1973, 188). In the context of the present book, the distinction introduced by Clinard and Quinney is useful in terms of fraud prevention. Duffield and Grabosky (2001, 1) distinguished four broad categories of fraud and gave the following examples of each: - 1. Fraud committed by a high-ranking entrepreneurial or corrupt insider against, for example, shareholders or creditors - 2. Fraud such as embezzlement, insurance fraud, tax evasion, or other types of fraud against a government, or committed against a private organization by an insider or by an outsider, such as a client - 3. Fraud in face-to-face interactions, for example, by sales staff, unethical investment advisers who victimize clients and/or customers, or plumbers of questionable integrity who prey on consumers - 4. Fraud against a number of prospective victims through indirect means such as newspapers, magazines, or the Internet (e.g., Nigerian advance fee frauds, share market manipulation, deceptive advertising, and investment solicitation) As Duffield and Grabosky (2001, 1) reminded their readers, the four fraud categories are neither definitive nor mutually exclusive but “provide a useful point for explanation.” Further, as the world is celebrating the twenty-fifth anniversary of the Internet at the time of writing, there is no doubt that the Internet makes electronic frauds one of the most threatening forms of economic crime and transcends Duffield and Grabosky’s four categories. Large-scale fraud by individuals against financial institutions and by the institutions themselves can be catastrophic because such fraud can cause organizations to fail, putting the national economy as well as shareholders’ and other stakeholders’ interests in jeopardy. Although a corrupt public sector and politicians in many countries worldwide deprive large numbers of people of a better standard of living, some types of fraud are perceived as morally ambiguous. This perception explains survey findings that taxation fraud is less of a concern to the public than credit card fraud that affects them directly (Smith et al. 2011, 62). Also, compared to other crimes, fraud has drawn insufficient attention from the authorities through the decades, despite it being a serious problem in society (Smith et al. 2011, 62). Most people are more concerned about conventional street crimes such as robbery, rape by a stranger,9 and burglary, which are visible and featured a great deal in the mass media. In fact, “[the] media regularly report cases of business or professional people caught out in serious offences, sometimes for behaviour that they did not expect to be treated as criminal, ...” (Nelken 2012, 623). However, this does not mean that white-collar crime causes less harm to individuals and society at large as shown by the well-known cases described here. When talking about fraud we need to distinguish between fraud committed by an individual working for a corporation and fraud committed by a corporation. The failures of Enron, WorldCom, BCCI, Polly Peck, and the Barings Bank, which were preceded by systematic fraud, prompt the question of how it was possible. In the case of Enron, a huge debt was left because of systematic accounting malpractice (Smith et al. 2011, 56). This section draws on the discussion by Smith et al. (2011) of corporate fraud theories. Smith et al. mentioned Coleman’s (1994) argument that the structure of a corporation is more important than an individual’s morality for understanding why corporate fraud occurs. Braithwaite (1985) attributed corporate fraud to “organizations that are ‘criminogenic’ by the way they exercise ‘concerted ignorance’ where senior management demand results, whatever the means” (Smith et al. 2011, 57). Box (1983) drew on economic theory to argue that corporate fraud is a response to uncertainties and legal, financial, and economic pressures. Not surprisingly, therefore, fraud increases in times of recession. Taylor (1999) argued that the deregulation of the markets in the 1980s and 1990s encouraged a culture of continuous competition, growth, and greed that was conducive to individual irresponsibility. Finally, Messerschmidt (1986) proposed that the struggle for business success and profits has largely been the work of male corporate executives. Thus, gender is useful in understanding corporate fraud (see Chapter 3).
<urn:uuid:91fc7c4b-911f-4862-9795-af6e07fe77a8>
CC-MAIN-2020-34
https://m.ebrary.net/37106/management/fraud
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439741154.98/warc/CC-MAIN-20200815184756-20200815214756-00016.warc.gz
en
0.937942
1,659
3.28125
3
LET the party begin. Every year, crowds of animals gather to enjoy feasts hosted by colonies of starlings. Metallic starlings (Aplonis metallica) migrate from New Guinea to the tropical rainforests of north-east Australia, where they stay from November to April. The birds return to the same patch each season, with up to 1000 nesting in any one tree. The areas underneath their nesting sites become some of the world’s most diverse wildlife hotspots. Mammals, reptiles, amphibians and other birds congregate to feed on seeds scattered by the starlings. Bird droppings enrich the soil, boosting insect populations and root growth, which provide additional food sources. An eight-year study of 27 starling colony trees on Cape York Peninsula in Queensland found that they attracted 42 species during the nesting season. Many species were 100 to 1000 times more abundant under nesting trees than trees elsewhere (PLoS One, doi.org/brjt). “The hotspots are spectacular,” says Daniel Natusch at the University of Sydney, who led the study. “It is uncommon to have a single resource that attracts such a diverse assemblage of species.” Other bird colonies attract animals – penguins draw predatory seals, whales and sharks, for example. But the species pulled in by Australia’s starling colonies are unrivalled in number and diversity, including wallabies, bandicoots, brush-turkeys, cockatoos and brown tree snakes. This article appeared in print under the headline “Migrant starlings draw hordes to their food bonanzas”
<urn:uuid:b6d4fbdc-9dcc-4dab-8fbb-32d90a8f7d4e>
CC-MAIN-2016-44
https://www.newscientist.com/article/mg23230952-100-thousands-of-animals-flock-to-annual-party-hosted-by-starlings/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719877.27/warc/CC-MAIN-20161020183839-00353-ip-10-171-6-4.ec2.internal.warc.gz
en
0.930538
338
3.890625
4
One common concern about vegan diets is whether they provide your body with all the vitamins and minerals it needs. Many claim that a whole-food, plant-based diet easily meets all the daily nutrient requirements. Some even encourage vegans to avoid all supplements. Despite meaning well, this type of advice can do more harm than good. Here are 7 nutrients that you may need to supplement with while on a vegan diet. 1. Vitamin B12 Foods often touted as rich in vitamin B12 include unwashed organic produce, mushrooms grown in B12-rich soils, nori, spirulina, chlorella and nutritional yeast. Some believe vegans who eat enough of the right plant foods don’t need to worry about a vitamin B12 deficiency. However, there is no scientific basis for this belief. Several studies show that while anyone can have low vitamin B12 levels, vegetarians and vegans have a higher risk of deficiency. This seems especially true for vegans who are not taking any supplements (1, 2, 3). Vitamin B12 is important for many bodily processes, including protein metabolism and the formation of oxygen-transporting red blood cells. It also plays a crucial role in the health of your nervous system (4). The daily recommended intake is 2.4 mcg per day for adults, 2.6 mcg per day during pregnancy and 2.8 mcg per day while breastfeeding (4). The only scientifically proven way for vegans to reach these levels is by consuming B12-fortified foods or taking a vitamin B12 supplement. B12-fortified foods commonly include plant milks, soy products, breakfast cereals and nutritional yeast. What’s more, no scientific evidence supports depending on unwashed organic produce as a reliable source of vitamin B12. Nutritional yeast only contains vitamin B12 when fortified. However, vitamin B12 is light-sensitive and may degrade if bought from or stored in clear plastic bags (14). It’s important to keep in mind that vitamin B12 is best absorbed in small doses. Thus, the less frequently you ingest vitamin B12, the more you need to take. This is why vegans who are unable to reach the recommended daily intake using fortified foods should opt for a daily supplement providing 25–100 mcg of cyanocobalamin or a weekly dosage of 2,000 mcg. Those weary of taking supplements may find it reassuring to get their blood vitamin B12 levels checked before taking any. But be aware that high intakes of seaweed, folic acid or vitamin B6 can falsely inflate markers of vitamin B12. For this reason, you may want to have your healthcare practitioner evaluate your methylmalonic acid status instead (15). Interestingly, your ability to absorb vitamin B12 decreases with age. Therefore, the Institute of Medicine recommends that everyone over the age of 51 — vegan or not — consider fortified foods or a vitamin B12 supplement (16). Bottom Line: It’s extremely important that all vegans get enough vitamin B12. The only reliable way to achieve this is by eating fortified foods or taking a vitamin B12 supplement. 2. Vitamin D The RDA for vitamin D for children and adults is 600 IU (15 mcg) per day. The elderly, as well as pregnant or lactating women, should aim for 800 IU (20 mcg) per day (22). That said, there is some evidence that your daily requirements are actually far greater than the current RDA (23). Unfortunately, very few foods naturally contain vitamin D, and foods fortified with vitamin D are often considered insufficient to satisfy the daily requirements. Besides the small amount you get from your diet, vitamin D can also be made from sun exposure. Most people likely make enough vitamin D by spending 15 minutes in the midday sun when the sun is strong — as long as you don’t use any sunscreen. Furthermore, because of the known negative effects of excess UV radiation, many dermatologists warn against using sun exposure to boost vitamin D levels (28). The best way vegans can ensure they’re getting enough vitamin D is to have their blood levels tested. Those unable to get enough from fortified foods and sunshine should consider taking a daily vitamin D2 or vegan vitamin D3 supplement. Bottom Line: Vitamin D deficiency is a problem among vegans and omnivores alike. Vegans unable to maintain normal blood levels through fortified foods and sun exposure should consider taking a supplement. 3. Long-Chain Omega-3s Omega-3 fatty acids can be split into two categories: - Essential omega-3 fatty acids: Alpha-linolenic acid (ALA) is the only essential omega-3 fatty acid, meaning you can only get it from your diet. - Long-chain omega-3 fatty acids: This category includes eicosapentaenoic acid (EPA) and docosahexaenoic acid (DHA). They are not technically considered essential because your body can make them from ALA. Long-chain omega-3 fatty acids play a structural role in your brain and eyes. Adequate dietary levels also seem important for brain development and preventing inflammation, depression, breast cancer and ADHD (31, 32, 33, 34, 35, 36). Getting enough ALA should theoretically maintain adequate EPA and DHA levels. However, studies report that the conversion of ALA to EPA may be as low as 5%, whereas conversion to DHA may be near 0% (37, 38). Additionally, research consistently shows that vegetarians and vegans have up to 50% lower blood and tissue concentrations of EPA and DHA than omnivores (39). While no official RDA exists, most health professionals agree that 200–300 mg of a supplement containing EPA and DHA per day should be sufficient (39). Vegans can reach this recommended intake through an algae oil supplement. Minimizing your intake of omega-6 fatty acids from oils such as corn, soy, safflower, sunflower and sesame, as well as making sure to eat enough ALA-rich foods, may further help maximize EPA and DHA levels (40).
<urn:uuid:bc7e550a-ce9a-462e-be4d-572006d84094>
CC-MAIN-2019-26
https://www.qlnutraceuticals.com/blogs/news/7-supplements-you-need-on-a-vegan-diet
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999482.38/warc/CC-MAIN-20190624104413-20190624130413-00363.warc.gz
en
0.920912
1,291
2.765625
3
Good Manufacturing Practices in Food and Related Products: Ensuring Food Safety Protocols Food safety is a critical concern in today’s globalized world, where food products are manufactured and distributed on an unprecedented scale. The implementation of Good Manufacturing Practices (GMPs) plays a crucial role in ensuring the safety and quality of food and related products. For instance, consider the case of a hypothetical yogurt manufacturing company that experienced a significant increase in customer complaints regarding spoilage and contamination. This incident highlights the importance of adhering to GMPs to prevent such issues and maintain consumer trust. In order to address these concerns, this article aims to explore the significance of implementing GMPs in food and related product manufacturing processes. By following standardized protocols for hygiene, sanitation, training, documentation, and quality assurance measures, manufacturers can effectively mitigate risks associated with contamination, cross-contamination, allergen handling, improper storage practices, and other potential hazards. In doing so, they not only safeguard the health and well-being of consumers but also protect their brand reputation from potentially devastating consequences such as recalls or legal liability. Thus, understanding and practicing GMPs form an integral part of any successful food production operation aiming for excellence in both safety standards and overall business performance. Overview of Good Manufacturing Practices Overview of Good Manufacturing Practices In today’s fast-paced and interconnected world, ensuring the safety and quality of food products is paramount. This is where Good Manufacturing Practices (GMPs) play a crucial role. GMPs are a set of guidelines and regulations that outline the requirements for manufacturing processes to ensure the production of safe and high-quality food products. To better understand the significance of GMPs, let us consider an example. Imagine a large-scale dairy company producing milk-based beverages. Without proper adherence to GMPs, there may be instances where contaminants such as bacteria or foreign particles find their way into the final product. One such case occurred in 2008 when a major beverage manufacturer faced a widespread recall due to contamination issues arising from inadequate sanitation practices at their bottling facilities. This unfortunate incident not only resulted in financial losses but also raised concerns among consumers regarding the safety standards followed by manufacturers. To address these challenges, GMPs provide comprehensive guidance on critical aspects related to food processing, packaging, storage, and distribution. Here are some key elements highlighted by GMPs: - Sanitation: Maintaining cleanliness throughout all stages of production helps prevent cross-contamination and ensures hygienic conditions. - Quality Control: Implementing robust quality control measures enables companies to monitor and verify that each batch meets specific criteria before it reaches consumers’ hands. - Training and Education: Providing regular training sessions for employees enhances their awareness about potential hazards and equips them with necessary skills to maintain compliance with established protocols. - Traceability: Establishing traceability systems assists in tracking raw materials used in production, identifying sources of contamination if needed, and facilitating efficient recalls if any safety issues arise. By incorporating these principles into daily operations through meticulous planning, monitoring, recordkeeping, and continuous improvement processes, companies can establish effective control over their manufacturing procedures. Looking ahead to our next section on “Benefits of Implementing Good Manufacturing Practices,” we will explore the positive impact GMPs can have on various aspects of food production, ranging from consumer trust to regulatory compliance. Benefits of Implementing Good Manufacturing Practices In today’s increasingly complex and globalized food industry, ensuring the safety and quality of food products has become paramount. One case study that highlights the importance of implementing Good Manufacturing Practices (GMPs) involves a multinational food company. In 2018, this company faced a massive recall due to contamination in one of its popular snack products. The incident not only led to financial losses but also tarnished their reputation. This example emphasizes the need for strict adherence to GMPs and their role in preventing such incidents. Implementing GMPs offers numerous benefits for both manufacturers and consumers alike. Firstly, it ensures compliance with regulatory requirements set by authorities such as the Food and Drug Administration (FDA). By following these guidelines, companies can avoid costly penalties or even legal actions resulting from non-compliance. Secondly, GMPs help maintain product consistency and uniformity throughout production processes, leading to reliable quality standards being met consistently. To further grasp the significance of GMPs, let us consider four key benefits they provide: - Enhanced consumer confidence: Implementing GMPs demonstrates a commitment to producing safe and high-quality food products, which helps build trust among consumers. - Improved product shelf life: Adhering to proper manufacturing practices reduces microbial growth, spoilage, and deterioration of products over time. - Minimized risk of cross-contamination: Through effective cleaning procedures and segregation techniques, GMPs reduce the likelihood of allergen cross-contact during processing. - Strengthened brand reputation: Consistently delivering safe products builds a positive brand image and fosters long-term customer loyalty. Additionally, understanding the various components involved in implementing GMPs is crucial for achieving optimal results. These elements include personnel hygiene practices, sanitation protocols, equipment maintenance schedules, documentation systems, supplier management procedures, training programs for employees on food safety principles – all aimed at creating an environment where consistent adherence to GMPs is prioritized. In the subsequent section, we will delve into the key elements of Good Manufacturing Practices and explore how they contribute to ensuring food safety protocols are effectively implemented. By examining these components in detail, manufacturers can gain valuable insights into establishing robust GMP systems that protect both their consumers and their brand reputation. Key Elements of Good Manufacturing Practices Benefits of Implementing Good Manufacturing Practices (Continued) Implementation of good manufacturing practices (GMP) brings about numerous advantages, ensuring the safety and quality of food and related products. One such example is the case of a large-scale dairy processing facility that implemented GMP protocols to enhance their production processes. By adhering to these practices, they were able to significantly reduce instances of contamination and improve overall product quality. To better understand the benefits associated with implementing GMP, let us explore four key aspects: Enhanced Food Safety: The primary objective of GMP is to maintain high standards in food safety by preventing potential hazards throughout the entire production process. This includes rigorous sanitation procedures, proper handling and storage techniques, as well as comprehensive monitoring systems. By following these guidelines, companies can minimize the risk of microbial growth, cross-contamination, or chemical adulteration. Compliance with Regulatory Standards: Adhering to GMP ensures compliance with strict regulatory requirements set forth by local authorities or international agencies such as the Food and Drug Administration (FDA). Meeting these standards not only helps avoid penalties and legal consequences but also enhances consumer confidence in the brand’s commitment to providing safe and reliable products. Improved Product Quality: Implementation of GMP measures enables companies to establish consistent product quality through standardized operating procedures. Stringent controls over ingredients sourcing, formulation accuracy, equipment maintenance, and packaging integrity contribute towards producing goods that meet defined specifications consistently. Cost Reductions: Although initial implementation may require an investment in training programs and infrastructure upgrades, long-term cost savings are achieved through reduced wastage due to spoilage or recalls caused by non-compliance issues. Furthermore, efficient utilization of resources leads to improved productivity and increased competitiveness within the market. Table 1 highlights some specific benefits derived from implementing GMP protocols: |Reduced Risk||Decreased likelihood of product contamination| |Enhanced Reputation||Strengthened brand image and customer trust| |Increased Operational Efficiency||Streamlined processes resulting in higher productivity| |Improved Employee Morale||Heightened job satisfaction and sense of purpose| In conclusion, the incorporation of good manufacturing practices brings about a range of benefits for food and related product manufacturers. Ensuring enhanced food safety, compliance with regulatory standards, improved product quality, and cost reductions are just some of the advantages that can be achieved through GMP implementation. However, it is crucial to recognize that these benefits can only be fully realized when accompanied by comprehensive training and education on GMP principles. The subsequent section will delve into the importance of training and education in GMP protocols as fundamental components for successful implementation within an organization. By equipping employees with the necessary knowledge and skills, companies can effectively navigate the intricacies of maintaining proper manufacturing practices while ensuring continuous improvement in their operations. Importance of Training and Education in GMP In the previous section, we explored the key elements that form the foundation of Good Manufacturing Practices (GMP) in food and related products. Now, let’s delve into the importance of training and education in ensuring effective implementation of GMP protocols. To illustrate this point, consider a hypothetical scenario where a food manufacturing company neglects to provide comprehensive training to its employees on GMP principles. As a result, there is a lack of understanding regarding hygiene practices and cross-contamination prevention among workers. This leads to several instances of product recalls due to contamination issues, resulting in significant financial losses for the company and potential harm to consumers’ health. Training and education play a crucial role in preventing such scenarios by instilling knowledge and awareness about GMP requirements. Here are some reasons why investing in employee training is essential: - Ensuring compliance: Adequate training equips employees with an understanding of relevant regulations and guidelines governing GMP implementation. This helps organizations maintain compliance with legal requirements. - Enhancing quality control: Well-trained staff can effectively identify deviations from standard operating procedures (SOPs) and take appropriate corrective actions promptly. This contributes to maintaining consistent product quality. - Promoting safety culture: By imparting knowledge about potential hazards and best practices for handling them, training programs foster a safety-conscious work environment. Employees become more vigilant about identifying risks associated with equipment, ingredients, or processes. - Continuous improvement: Regularly updated training programs keep employees informed about emerging trends, new technologies, and improved techniques in manufacturing processes. This enables companies to adapt quickly and implement necessary changes for enhanced efficiency. |Beneficial Outcomes||Training Programs| |Compliance with regulatory standards||Comprehensive orientation sessions covering SOPs| |Enhanced product quality||Periodic refresher courses focused on risk identification| |Improved workplace safety||Hands-on workshops demonstrating safe handling procedures| |Adaptability to industry advancements||Online modules providing updates on new technologies| By investing in training and education, companies can ensure that their employees possess the necessary knowledge and skills to implement GMP protocols effectively. This not only promotes compliance with regulatory standards but also leads to improved product quality, workplace safety, and adaptability to industry changes. Transitioning into the subsequent section about “Ensuring Compliance with GMP Regulations,” it is important to emphasize the significance of establishing robust mechanisms for monitoring adherence to these regulations. Ensuring Compliance with GMP Regulations Building on the significance of training and education in Good Manufacturing Practices (GMP), it is imperative for food manufacturers to ensure strict compliance with GMP regulations. By adhering to these guidelines, companies can uphold high standards of safety and quality throughout their production processes. To illustrate the importance of this compliance, let us consider a hypothetical case study. Case Study Example: Imagine a food processing facility that consistently fails to adhere to GMP regulations. This facility frequently experiences product recalls due to contamination issues, resulting in financial losses and damage to its reputation. In contrast, another facility strictly follows GMP protocols and maintains an excellent track record when it comes to food safety. This stark comparison demonstrates how crucial compliance with GMP regulations is for ensuring consumer trust and safeguarding public health. To achieve compliance with GMP regulations effectively, food manufacturers must focus on several key aspects: Documented Procedures: Establishing well-documented procedures is essential for maintaining consistency and traceability within manufacturing processes. These procedures should cover all aspects relevant to GMP requirements, including personnel hygiene practices, equipment maintenance schedules, and sanitation protocols. Regular Audits and Inspections: Conducting regular internal audits and inspections enables companies to identify any deviations or non-compliance promptly. By proactively addressing these issues through corrective actions, manufacturers can prevent potential risks before they compromise product quality or safety. Training Programs: Continual training programs are vital for keeping employees updated on evolving industry best practices and regulatory changes related to GMP. Properly trained staff members play a crucial role in implementing effective control measures and reducing the likelihood of errors or contamination incidents. Supplier Verification: Verifying suppliers’ adherence to GMP principles is critical in guaranteeing the integrity of raw materials used in production processes. Companies should establish robust supplier verification systems that evaluate vendors based on their own adherence to GMP, quality control measures, and certifications. To further emphasize the significance of compliance with GMP regulations, consider the following table: |Food Safety Incidents||Compliance with GMP||Financial Impact ($)| As evident from this table, non-compliance with GMP guidelines can have severe repercussions for food manufacturers. From financial losses to reputational damage, negligence in adhering to these regulations poses significant risks that should not be underestimated. In conclusion, ensuring strict compliance with Good Manufacturing Practices (GMP) is paramount for food manufacturers striving to maintain high standards of safety and quality. By implementing well-documented procedures, conducting regular audits and inspections, providing comprehensive training programs, and verifying suppliers’ adherence to GMP protocols, companies can mitigate risks associated with product contamination or other safety issues. The next section will delve into the concept of continuous improvement in food safety practices. Moving forward into the topic of continuous improvement in food safety practices… Continuous Improvement in Food Safety Practices Building upon the foundation of compliance with Good Manufacturing Practices (GMP) regulations, it is crucial for food manufacturers to adopt a proactive approach towards continuous improvement in their food safety practices. This not only ensures adherence to industry standards but also enhances consumer trust and confidence in the products they consume. By implementing robust systems and processes aimed at identifying areas of improvement and addressing them effectively, companies can safeguard public health while maintaining high-quality standards. To illustrate the significance of continuous improvement, let us consider a hypothetical case study involving a chocolate manufacturing company. After conducting routine internal audits, the company identified an issue related to cross-contamination between different types of chocolates on its production line. Although corrective actions were taken immediately to rectify this problem, management recognized the need for ongoing improvements to prevent similar incidents in the future. Implementing continuous improvement strategies involves several key elements: Regular Monitoring and Evaluation: - Conducting regular inspections and assessments to identify potential risks or deviations. - Utilizing advanced technologies such as automated monitoring systems or data analytics tools to track performance indicators. - Employing statistical process control techniques to detect any variations that may lead to non-compliance with GMP regulations. Employee Training and Engagement: - Providing comprehensive training programs that emphasize proper hygiene practices, equipment handling procedures, and quality assurance protocols. - Encouraging active employee participation by soliciting feedback, suggestions, and ideas for improving food safety measures. - Recognizing and rewarding employees who exhibit exemplary commitment to upholding food safety standards. Collaboration with Suppliers: - Establishing strong communication channels with suppliers to ensure consistent delivery of safe raw materials. - Implementing supplier qualification programs that assess their adherence to GMP guidelines. - Engaging in collaborative efforts with suppliers for sharing best practices and addressing any potential concerns regarding ingredient safety. Documentation and Record-Keeping: - Maintaining comprehensive records of all processes, inspections, and corrective actions taken. - Regularly reviewing and analyzing these records to identify patterns or trends that may require further improvement measures. - Utilizing electronic systems or software solutions for efficient documentation management. Table: Benefits of Continuous Improvement in Food Safety Practices |Improved Quality Control||Enhanced Brand Reputation||Increased Customer Loyalty| |Benefit 1||Minimizes the risk of product recalls due to quality issues.||Establishes a trustworthy image in the market.||Builds long-term relationships with customers based on confidence in safe products.| |Benefit 2||Reduces customer complaints related to product defects or safety concerns.||Attracts new customers through positive word-of-mouth recommendations.||Encourages repeat purchases and brand loyalty.| |Benefit 3||Enhances consumer satisfaction by consistently delivering high-quality products.||Differentiates the company from competitors as a provider of safe and reliable food products.||Creates opportunities for expansion into new markets or distribution channels.| By embracing continuous improvement practices, companies not only mitigate risks associated with non-compliance but also reap numerous benefits across various aspects of their business operations. This proactive approach fosters a culture of ongoing learning and advancement within an organization, allowing it to adapt swiftly to emerging challenges while maintaining its commitment to ensuring food safety protocols are met. (Note: The table above is best viewed when converted from markdown format.)
<urn:uuid:514387bc-9d71-4f68-b26a-1094f9e9167a>
CC-MAIN-2023-40
https://salonduchocolat-cannes.com/good-manufacturing-practices/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00052.warc.gz
en
0.915132
3,560
3.421875
3
Cold and flu season seems an appropriate time for this bit of time travel. Kleenex really was a new product, first appearing in 1924: “Kleenex — The Sanitary Cold Cream Remover.” Among the things I took for granted was that a product whose name is now synonymous with “paper handkerchiefs” was invented for that purpose. Browsing through old magazines taught me that my assumption was wrong! Online, Mary Bellis wrote about the surprising story of Kleenex tissues here. According to Mimi Matthews’ book A Victorian Lady’s Guide to Fashion and Beauty, cold cream was applied to the face in the late 19th century as a moisturizer after washing with soap and water. However, since my background is the theatre, I know that after the 1860s, actors and actresses wore oil-based “greasepaint” and needed an oil-based remover: cold cream. By the 1920s, many ordinary women who wore powder, rouge, and lipstick had been convinced to clean their faces with “cold cream” instead of soap and water. However, washing a used facecloth with an oily product on it wasn’t convenient. And re-using it day after day without washing it was not very hygienic. In 1924, cellulose-based Kleenex tissues were introduced as a more sanitary way to wipe off cold cream and makeup: soft, disposable tissues. By using disposable Kleenex tissues, women avoided the beauty crimes of 1) re-using soiled towels and rubbing” the germs back into the skin,” and 2) using harsh cloth, which “injures delicate skin fabric — causes enlarged pores, skin roughness, etc.” (I doubt the claims that using Kleenex tissues “lightens a darkish skin several shades or more….[Or] curbs oily skin and nose conditions amazingly.”) Like any new product, “What it is” and how to use Kleenex tissues had to be explained. Free samples were distributed. In 1927, one of those cold cream manufacturers began selling tissues, too. Ads for Pond’s cold cream began to include Pond’s Cleansing Tissues — disposable paper for removing the make-up dissolving cold cream. For an excellent history of the Pond’s company, click here. The battle of the tissues: Kleenex fought to keep its market by creating colored tissues: Pastel tinted Kleenex tissues came in three colors, plus white: The tissue colors were “Sea Green,” “Canary Yellow,” and “Flesh Pink.” [This last was probably a pastel tint of orange, rather than the color of freshly butchered beef….] Applying tissues to a runny nose was apparently an afterthought — one discovered by users of Kleenex and suggested to the manufacturer. After taking a survey of Kleenex users in 1927, the company began mentioning this alternative use in Kleenex ads. According to Mary Bellis, consumers had been writing to the company which made Kleenex Tissues to say they had discovered another use for the Kleenex ‘Kerchief: they were using them to blow their noses! “A test was conducted in the Peoria, Illinois newspaper. Ads were run depicting the two main uses of Kleenex: either as a means to remove cold cream or as a disposable handkerchief for blowing noses. The readers were asked to respond. Results showed that 60 percent used Kleenex tissue for blowing their noses. By 1930, Kimberly-Clark had changed the way they advertised Kleenex and sales doubled proving that the customer is always right.” — Mary Bellis Pond’s cleansing tissues may have been used the same way, but their ads emphasized cosmetic use — with endorsements from prominent society ladies, not doctors and teachers. I’m not sure what happened to Pond’s tissues. Many other manufacturers sell tissues today. I personally prefer the Safeway brand, but when I feel a sneeze coming, I still say, “I need a Kleenex!”
<urn:uuid:ac35525c-7f35-4d9d-b587-65d7f5776635>
CC-MAIN-2021-10
https://witness2fashion.wordpress.com/tag/kleenex-kerchiefs-ad-campaign/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178363809.24/warc/CC-MAIN-20210302095427-20210302125427-00576.warc.gz
en
0.973717
899
2.875
3
The AGRIculture and CANcer (AGRICAN) cohort study: enrollment and causes of death for the 2005–2009 period Objective To elaborate and describe a large prospective agricultural cohort including males and females in France with various agricultural activities and to study causes of death. Methods To date, few large prospective cohorts have been conducted among agricultural population. AGRIculture and CANcer cohort is a large prospective cohort of subjects in agriculture studying cancer among active and retired males and females, farm owners and workers, living in eleven areas of France with a population-based cancer registry. Results Enrollment was conducted from 2005 to 2007 with a postal questionnaire. In January 2008, 180,060 individuals (54 % males, 54 % farm owners, 50 % retired) were enrolled. Mortality was studied until December 2009 (605,956 person-years with standardized mortality ratio (SMR) by comparison with the general population of the areas. Over this period, 11,450 deaths 6,741 in men and 4,709 in women were observed, including 3,405 cancer-related deaths. SMRs were significantly reduced for global mortality (SMR = 0.68, 95 % CI 0.67–0.70 in males and SMR = 0.71, 95 % CI 0.69–0.73 in females) and for death by cancer (SMR = 0.67, 95 % CI 0.65, 0.70 in males and SMR = 0.76, 95 % C: 0.71, 0.80 in females). These results were mainly explained by less frequent smoking-related causes of death (lung cancer, cardiovascular diseases). Nonsignificant excesses of death were observed only for rheumatoid arthritis and arthrosis, suicides (in females), death for event of undetermined intent (in males) and breast cancer in male agricultural workers. Conclusions These first results are the first ones obtained in France based on a large prospective agricultural cohort showing that farmers would be in healthier condition than the general population.
<urn:uuid:c5ea0f8c-566c-4148-b84a-fb1ac69573c2>
CC-MAIN-2019-18
http://www.anma.it/rassegna_biblio/the-agrican-cohort-study-enrollment-causes-death-2005-2009-period/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517682.16/warc/CC-MAIN-20190418141430-20190418163430-00341.warc.gz
en
0.966954
417
2.734375
3
Prof. Sarah Brouillette What is Britain now? Its metropolises are increasingly multicultural. Its hold over its distant colonies is a thing of the past. Its sway within the global political arena is weak. Its command over Northern Ireland, Wales, and Scotland is broken or threatened. What have novelists made of all this? What are they writing as the old empire fades away and as new social and political formations emerge? These are the questions that will concern us in this course. OCW has published multiple versions of this subject. Sarah Brouillette. 21L.488 Contemporary Literature: British Novels Now, Spring 2007. (Massachusetts Institute of Technology: MIT OpenCourseWare), http://ocw.mit.edu (Accessed). License: Creative Commons BY-NC-SA
<urn:uuid:b1f9906f-c6fc-4267-9fc7-cffd3047d233>
CC-MAIN-2016-22
http://ocw.mit.edu/courses/literature/21l-488-contemporary-literature-british-novels-now-spring-2007/
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049274985.2/warc/CC-MAIN-20160524002114-00139-ip-10-185-217-139.ec2.internal.warc.gz
en
0.885663
166
2.703125
3
The 1794 Silver Dollar holds the distinction of being the very first one-dollar coin issued by the United States Mint. In addition to being historically significant as the first silver dollar, the coin is also a prized numismatic rarity. Of the 1,758 pieces struck by the United States Mint, it is believed that just 150 or so have survived in total. All 1794 Dollars are extremely rare, but they are particularly challenging to locate in higher grades. After producing a small run of half dismes (five cent silver coins) in 1792, the U.S. Mint resumed striking silver coins in 1794. That year it debuted two larger silver denominations: the half dollar and the one-dollar coins. Apparently the Mint had difficulty with the large silver dollar, as virtually every specimen exhibits a weak strike. It has been speculated that the dies shifted in position and fell out of alignment, thus resulting in the incomplete striking definition. The Mint also encountered severe issues with consistency. During the Mint’s infancy, individual coins were weighed to ensure that they contained the proper amount of silver. Underweight coins were melted and remade into new blanks, while overweight coins were manually “adjusted.” A Mint employee would file a small amount of silver off the coin, thus bringing it into compliance. Quite a few 1794 Dollars exhibit these adjustment marks, including some higher-grade specimens. While all 1794 Dollars are considered major numismatic items, two specimens are particularly famous—and valuable. The first is a copper prototype that resides in the Smithsonian Institute; it was probably the first coin to come off the dies. The other coin is a beautiful piece graded Specimen 66. Unlike almost every other 1794 Dollar, this SP-66 piece exhibits remarkable reflective surfaces and a perfect strike. It is believed that this was the very first Silver Dollar ever minted. Even in severely worn condition, 1794 Dollars typically trade for high five figure amounts. In lightly worn grades, like XF and AU, they trade for hundreds of thousands. Just a half dozen or so Mint States pieces are known to have survived, including two spectacular coins graded MS66+ by PCGS. An English gentleman put one of these coins aside in 1794 while visiting the United States; the coin would later resurface in a Christies auction in 1964. More recently, in 2015, this exact coin sold for an astounding $4,993,750 at auction.
<urn:uuid:fdc386d7-ea98-401e-ada8-3841dd50dc61>
CC-MAIN-2017-30
https://www.texmetals.com/news/the-1794-silver-dollar/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423809.62/warc/CC-MAIN-20170721202430-20170721222430-00679.warc.gz
en
0.963964
498
3.46875
3
Maldives is a group of islands (1,192 coral islands) situated on the Southern Asian which is surrounded by the Indian Ocean just southwest of India (around 750 kilometers away) and Sri Lanka. The main land of this nation is located across the Equator. Maldives is well known for its most unique way of celebrating their festivals. It is well known for holding ‘Mawlid’, a Prophet’s Muhammad Birthday in the month of October. Many travelers around the world take time for their trip to Maldives to take part in the famous festivals like Ramadan, Eid-Ul Fitr, Bodu Eid, Eid-Ul-Adha, The Day Maladives Embraced Islam, Independence Day of Maldives, National Day and Republic Day. Maldives introduced their pin code system in 1906. In 1994, the Maldives Post was transformed into a limited liability company. At first there was so much controversy over the places which were registered under the postal code office, but then slowly every region in Maldives got its own postal codes. The pin code is segregated in such a way that each of the postal codes. Maldives Post works with a network of 14 Atoll Post Offices and 172 agency offices across the nation providing access to postal service in all inhabited islands. Maldives has been ranked as the 187th largest nation in the world, and it has a total land area of 300 km2, which comes to around a total of 120 mi2. The land area stretches along a length of 871 kilometers from north to south and 130 kilometers from east to west. The lowest level of land is 1.5 meter (around 5 feet) and the highest level is 2.4 meter (around 8 feet). Maldives is surrounded by sea water. The primary source of water for Maldives is rainfall. The rainwater is collected directly during rainfall and filtered with the help of an aquifer and let into the ground. It includes rainwater, groundwater, wetlands, etc. The second greatest source of freshwater is groundwater which can be found under every island. A total of 10 named mountains in the nation of Maldives. The highest and the most prominent mountain is Kuramathi North. The names of mountains are Rasdhoo Madivaru, Veligandu, Dhonfanu Thila, Dhigu Thila, Kuda Gaa, Bodu Gaa and Dharavandhoo Thila. |Postcode type and position 5 digits to the right of the locality name. MALDIVES POST LIMITED X -- (First digit) ---> indicates the postal region X-- (Second digit) ---> indicates the island. XXX-- (Last Three digit) ---> indicate the locality / delivery block. |Each administrative division maintains its own postal code for mail delivery purposes. Having the correct code is essential to your mail delivery. Maldives uses 5 digit pin code system in which 1st digit, 2nd digit, 3rd digit, and the last 2 digits has different indications which is shown below; MALDIVES POST LIMITED (addresse) 26, BODUTHAKURUFANANU(area /street /village) MALÉ 20026(postal code)
<urn:uuid:49a3633b-9794-44a5-8975-267a9c3e087e>
CC-MAIN-2024-10
https://localitypincode.com/md/maldives-zip-code
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474795.48/warc/CC-MAIN-20240229071243-20240229101243-00672.warc.gz
en
0.924374
675
2.796875
3
[C]an the new media itself, in part, be blamed for such cases? We are tempted to think that social-media technology drove the behavior, but as a truly ethical matter, the behavior has to be and should be considered human-driven, not technology-driven, says Scott Foulkrod, a philosophy professor at Harrisburg University of Science and Technology in Pennsylvania. The school recently blocked the use of social media for a week to prompt discussions about its role in everyday life. Other observers of youth culture and media culture believe the media environment including reality shows that use hidden cameras is desensitizing young people to the hurtful effects of their actions. There have been some studies that suggest that it [new media technology] does dissolve some of the human connections: It objectifies people, says Maureen Costello, director of Teaching Tolerance, an education program based at the Southern Poverty Law Center in Montgomery, Ala. One recent University of Michigan study found that college students empathy declined by about 40 percent between 1979 and 2009, with the biggest drop-off occurring after 2000. Were seeing more and more of this callous indifference, Ms. Aftab says. She doesnt want to paint a whole generation with a broad brush, because many young people are using social media only for good. But when malicious intent or even just a notion of entertainment is paired with the instant nature of Web-broadcasting technology, you can do it, and you get caught up in it, she says. Its that lack of time to contemplate the consequences. Nina Montgomery, a freshman at Dartmouth who attended high school with Clementi in Ridgewood, N.J., says her generation of digital natives is getting bored and looking for ways to experiment with new technology. As a result, she believes, more cases as severe as this one at Rutgers will occur. I dont think people understand the great responsibility that comes with the power of the Internet, she says.
<urn:uuid:8a6b59c6-99b7-430b-81ea-6a4b4865118f>
CC-MAIN-2015-40
http://forums.appleinsider.com/t/113675/what-can-be-done-to-end-bullying-in-schools-and-colleges/40
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737913815.59/warc/CC-MAIN-20151001221833-00071-ip-10-137-6-227.ec2.internal.warc.gz
en
0.954592
405
2.6875
3
Elementary school history books in the United States might give young students a slightly misleading impression of what the earliest Puritans in North America—those who history calls the Pilgrims—were really like. If images in these texts are to be believed, the men wore black pants and matching waistcoats that were embellished with plain rectangular lace collars. When feeling particularly formal, these Puritans would often wear a plain black hat that was only decorated with an inexplicable buckle in the front. Puritan women dressed in similarly austere attire, seldom straying from dark, somber clothing. While this may have been true for the earliest Puritans in North America, it is significantly less accurate for the Puritans who came to live in the northeast as the seventeenth century moved onwards. This fallacy is visually demonstrated by portraits completed about 1670 by an unidentified artist called the Freake Painter, an artist so named because of his most well known sitters—members of the Freake family. These two paintings, both begun in 1671, depict John Freake in the first portrait, and his wife Elizabeth and their daughter Mary in the second. In many ways, these pendant portraits eloquently speak as to what it meant to be part of the upper-middle-class elite in Colonial New England during the final decades of the seventeenth century. We can learn much about John Freake (1631-1674), his perception of self, and his place within society through a careful analysis of his portrait. Born in England, Freake immigrated to Boston in 1658 when in his mid twenties and became a merchant and attorney of significant wealth. Indeed, before his death he owned two homes, a mill and brew house, and profitable shares in six mercantile ships. Clearly, he was a man of assets and wealth, and this is reflected in his attire. To begin, Freake wears a fine velvet coat that is dark brown in color rather than the more stereotypical black most of his Puritan brethren may have worn 50 years before. In addition, his coat is decorated with more than two-dozen silver buttons, both along the front of the jacket and atop the pocket flaps. The tailor—either one in colonial Boston or, more likely, one across the Atlantic in England—embellished each buttonhole with expensive silver thread. Freake’s expensive coat is but one indicator of his elevated social and economic status. In addition, Freake wears a fashionable white muslin shirt with puffed sleeves and elaborate crenulated cuffs. His collar is not the plain, rectangular one we might expect on the basis of our elementary school history books, and is instead a highly decorated and elaborate lace collar imported from Europe, likely from Venice, Italy. Rather than descend from his throat to his sternum, this collar instead circles his neck and stretches across both of Freake’s shoulders. The ornate silver broach Freake touches with his left hand and the gloves he holds with his right—in addition to the ring he wears on the pinky of his left hand—all speak to his wealth and his status as a gentleman. Roundhead or Cavalier? Look at the hair! Thus, Freake’s clothing announces something important about his prosperity. Likewise, his hair comments on his sense of religious identity. During the end of the seventeenth century, there were two distinct hairstyles that helped identify those who wore them. If one were to wear their hair in short manner, they announced themselves to be a Roundhead, a visual representation of Puritan austerity. In contrast, long hair—or, the wearing of a wig—announced the man as one who was a morally questionable Cavalier. With these two extremes in mind—the Puritanical Roundhead and the suspicious Cavalier—John Freake comfortably resides in the middle. Neither too short nor too long, Freake’s hair—and it is that, rather than an artificial wig—announces his morality and religiosity squarely in the middle, a kind of hirsute juste milieu (middle ground). Thus, Freake’s clothing and hair does much to identify him during the end of the seventeenth century. His attire is fashionable, but not overly extravagant. Freake was among those who believed that his prosperity in life was due to God’s blessing, and as that was the case, it was not inappropriate to dress in a way that highlighted that divine favor. Likewise, his hair identifies him as religiously moderate; neither excessively devout nor liturgically loose. Similarly, the artist has depicted John’s wife, Elizabeth, in a way that highlights her appropriate wealth—and thus her favorable position within the eye’s of God—and her religious moderateness. Like her husband, Elizabeth wears unexpectedly fine attire. A small amount of blond hair is visible underneath her white lace hood. That hood, tied nearly underneath a slightly protruding chin, brings visual attention to the white collar and the striking white lace that covers most of the bodice of her silver taffeta dress. Underneath her skirt is a striking red-orange velvet underskirt that is embroidered with a gold, lace-like pattern. She wears a white blouse that features lace cuffs on the sleeves, while red and black bows provide a visual splash of color and contrast against an otherwise somewhat achromatic ensemble. Like her husband, Elizabeth’s portrait is filled with baubles that speak to their affluence and to the family’s growth. She wears a triple-stranded string of pearls about her neck, a gold ring on her finger and a beautiful four-stranded garnet bracelet can be seen on her left thumb and wrist. She sits on a fashionable chair, and a Turkey-work rug can be seen resting on the back of the chair. Although Elizabeth currently holds her infant Mary, radiograph x-ray photography shows that she originally held a fan. That the painting has been modified—fan out, new baby who wears a fashionable dress in—tells us much about the extravagant cost of having one’s portrait commissioned in the seventeenth century. It was more practical to have your daughter painted into an old portrait than to pay for a new one. Displays of wealth A twenty-first-century audience might scoff at these images, thinking them, perhaps, too flat, too inanimate, and too serious for our own particular aesthetics. However, this pair of images powerfully speaks to the Freakes’ understanding of their place in their world while at the same time dismissing our mistaken stereotypes of seventeenth-century Puritans. The Freakes are not an austere couple, entirely clad in black. Instead, they display their wealth—both in dress and in accessories—in a moderate and acceptable way that suggests divine blessing. In addition, while we might dismiss this artist as an unaccomplished limner (an artist with no or little formal training), he was instead a talented portraitist who was working within a rich tradition of Elizabethan painting. His images helped situate his sitters within a distinguished and rich traditional of English court portraiture.
<urn:uuid:d34fc2d6-1fd5-4f2e-90e4-450318d09adb>
CC-MAIN-2023-40
https://smarthistory.org/portraits-of-john-and-elizabeth-freake-and-their-baby/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00115.warc.gz
en
0.9757
1,480
4.21875
4
Robot-tastic Year 6 This term we have launched an online voting platform, ‘Votes for Schools’. Year 6 have had great fun investigating this week’s question, ‘are robots a danger to humans?’ Pupils wrote their own algorithms for making jam sandwiches and the topic even inspired Saahib to bring his own robot to school. He was able to demonstrate to the year group how he can write his own algorithms and programs. Published on: 4th May 2018
<urn:uuid:3e3d5f97-7c75-4760-8320-d561ef6fd975>
CC-MAIN-2021-43
https://www.hydesville.com/robot-tastic-year-6/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587659.72/warc/CC-MAIN-20211025092203-20211025122203-00171.warc.gz
en
0.979804
107
2.578125
3
A. Tepco fails to halt toxic water inflow at Fukushima No. 1 trenches 22 Nov 2014, The Japan Times News Pasted from: http://www.japantimes.co.jp/news/2014/11/22/national/tepco-fails-to-halt-toxic-water-inflow-at-fukushima-no-1-trenches/#.VHGDLYl0zmg Kyodo: Tokyo Electric Power Co. admitted failure Friday in its bid to halt the flow of toxic water into underground tunnels alongside the ocean at the Fukushima No. 1 plant and said that it will try using a specially developed cement instead. Some 11,000 tons of highly radioactive water have accumulated in the tunnels, trenches dug to house pipes and cables that are connected to the reactor 2 and 3 turbine buildings of the wrecked facility, according to Tepco. There are fears that this toxic buildup, which is being caused by the jury-rigged cooling system and groundwater seepage in the reactor basements, could pour into the Pacific, which is already being polluted by other radioactive leaks. Groundwater is entering the complex at 400 tons a day. (400 tons of water = 96,523 gallons a day –Mr. Larry) Extracting the toxic water is a critical step in Tepco’s plan to build a huge underground ice wall around the four destroyed reactors to keep groundwater out. Initially, Tepco sought to freeze the water in a section of tunnel connected to the No. 2 reactor building. This was intended to stop the inflow and allow the accumulated water to be pumped out. The utility said it took additional measures that also failed. On Friday, Tepco proposed a new technique for the tunnels: injection of a cement filler especially developed for the task while pumping out as much of the accumulated water as possible. Under the new method, however, it would be difficult to drain all of this water and some of it would be left behind, endangering plant workers, Tepco acknowledged. Nevertheless, a Nuclear Regulation Authority panel of experts green-lighted the new strategy at a recent meeting. Some of the experts argued that Tepco should stick to the original plan and draw out all of the water. Others said giving up on it may hamper the construction of the ice wall. Mr. Larry note: A standard 30 ft by 50 ft in-ground swimming pool, 4 ft deep in the shallows to 8-9 ft in the deep end, holds 56,200 to 62,500 gallons water. Rather than actually solving the radioactive pollution and environmental poisoning at the damaged and leaking Fukushima reactor site, highly radioactive water is accumulating at the rate of about 1-1/2 large swimming pools per day, 7 days a week with no end in sight. On a 7 x 365day basis, the volume of 1.5 large swimming pools or a 90,000 gallon storage tank of highly radioactive ground water is accumulating on the Pacific coast of Japan and this is not first class public news? Mr. Larry. B. Worst Spill in 6 Months Is Reported at Fukushima 20 Feb 2014, The New York Times, By Martin Fackler Pasted from: http://www.nytimes.com/2014/02/21/world/asia/worst-spill-in-6-months-at-fukushima.html?_r=0 TOKYO — About 100 tons of highly radioactive water leaked from one of the hundreds of storage tanks at the devastated Fukushima nuclear plant, its operator said Thursday, calling the leak the worst spill at the plant in six months. The operator, the Tokyo Electric Power Company, said the leak, discovered on Wednesday and stopped on Thursday, happened far enough from the plant’s waterfront that none of the radioactive water was likely to reach the Pacific Ocean, as has happened during some previous spills. Still, the leak was an uncomfortable reminder of the many mishaps that have plagued the containment and cleanup efforts at the plant, as well as the hundreds of tons of contaminated groundwater that still flow unchecked into the Pacific every day. The company, known as Tepco, said it had traced the latest leak to a pair of valves that were left open by mistake. The leaked water was among the most severely contaminated that Tepco has reported in the aftermath of the March 2011 disaster at the Fukushima Daiichi plant, when damage caused by an earthquake and a tsunami led to meltdowns in three of the plant’s reactors. Each liter (quart) of the water contained, on average, 230 million becquerels of particles giving off beta radiation, the company said. About half of the particles were likely to be strontium 90, which is readily taken up by the human body in the same way that calcium is, and can cause bone cancer and leukemia. That means the water was about 3.8 million times as contaminated with strontium 90 as the maximum allowed under Japan’s safety standards for drinking water. It also showed levels much more radioactive than a worrisome groundwater reading that Tepco announced earlier this month. That reading — five million becquerels of strontium 90 per liter — which was detected at a location closer to the ocean than the latest spill, prompted criticism of Tepco because the company waited five months to report it publicly. Critics have assailed the company since the accident, saying that it has been slow to acknowledge problems at the stricken plant and that it has disclosed too little information about the conditions inside. Even so, the [Japanese] government has left the company largely in charge of the cleanup work there. Tepco has struggled to deal with the hundreds of tons of groundwater seeping each day into the plant’s damaged reactor buildings, where it is contaminated by the melted nuclear reactor cores. To keep the radioactive water from running into the Pacific, the company must pump it out of the reactor buildings and store it in rows of huge tanks it has erected on the plant’s grounds. So far, Tepco said, about 340,000 tons of water have accumulated in the tanks, enough to fill more than 135 Olympic-size swimming pools. A ton of water is equivalent to about 240 gallons. C. Pentagon Agency Admits It Began Stockpiling Potassium Iodide Due to Fukushima 11 Jan 2014 , by EUTimes, reprinted from Kit Daniels, Infowars.com Pasted from: http://www.eutimes.net/2014/01/pentagon-agency-admits-it-began-stockpiling-potassium-iodide-due-to-fukushima/ “The recent earthquake in Japan in March of 2011 and the resultant nuclear crisis has renewed interest in” potassium iodide, the Defense Logistics Agency said in a solicitation. Radiation leaks from nuclear plant “renewed interest” in iodide, agency said in 2012. A federal bid notice reveals that a Pentagon agency began stockpiling potassium iodide in 2012 due to its concerns over the Fukushima nuclear crisis, shedding light on why the Dept. of Health and Human Services is now ordering 14 million doses of iodide. The Defense Logistics Agency posted a solicitation on FedBizOpps in 2012 asking contractors for 75,000 packages of potassium iodide tablets because the “recent earthquake in Japan in March of 2011 and the resultant nuclear crisis has renewed interest in this item.” “The U.S. Army Medical Materiel Agency has submitted a MILSTRIP (Military Standard Requisitioning and Issue Procedures) for this item to ensure that critical operational forces are protected in the event of nuclear fallout,” the solicitation added. Potassium iodide keeps radioactive iodine from being absorbed by the thyroid gland and therefore it is commonly taken in the event of a severe nuclear emergency, such as the current Fukushima crisis. As Paul Joseph Watson reported on Jan. 1, HHS ordered an unprecedented 14 million doses of potassium iodide for delivery next month. A government source later told Anthony Gucciardi that this purchase is bizarre given the massive amount requested on such a short notice. Although HHS did not list a reason for its order, the DLA’s open admission reveals that it is highly likely that the health department is also stocking up on potassium iodide due to Fukushima. But why would HHS wait until now? Because several oceanographers concluded last August that the radioactive plume from the Fukushima disaster will reach the U.S. coast early this year. Additionally, another major earthquake hitting the already delicate nuclear plant could force tens of millions to evacuate Japan. Yet unlike the Pentagon agency, the health department has been silent on its preparation for such a crisis. When Gucciardi called the procurement office for HHS about the iodide purchase, the representative denied that HHS was stockpiling potassium iodide for any particular reason. “Do you have any concerns about Fukushima?” Gucciardi asked. “I have no idea about any of that… there’s no hidden agenda here,” the representative responded. But given the DLA’s open proclamation that it is in fact stockpiling potassium iodide because of the radiation leaks from Fukushima, it appears that the health representative’s denial is as weak as the duct tape repair work made to the crippled nuclear plant. Duct tape on control rod system pipes (upper left). Notice the rust on the supports and bolts above the tape. Besides the earthquake and tsunami,Tepco had a management and maintenance issue. Tepco’s culture and level of social-economic “responsibility” apparently has not changed. Its politically expedient for politicians, globally, to accept the status quo; fingers and blame can be pointed else where when plutonium 90 contaminates broad areas of mainland Japan and the waters of the Pacific ocean on a large scale. Then folks, we’ll find it was not Tepco, but an act of God that brough golbale radiation problems, God made the support hangers rust and caused the control rod system pipes to be duck taped rather than repaired too (smile). When the SHTF, Listen for political statements, partial quotes from the future: “What did we know”, “What could we have done?” , “They told us it was under control”. “In a act of God….”, “Questions are being asked.” D. Big quake near Fukushima would ‘decimate Japan, lead to US West Coast evacuation’ 7 November 2013, InfoWars.com, by RT.com Pasted from: http://www.infowars.com/big-quake-near-fukushima-would-decimate-japan-lead-to-us-west-coast-evacuation/ The stricken nuclear plant at Fukushima in northern Japan is in such a delicate condition that a future earthquake could trigger a disaster that would decimate Japan and affect the entire West Coast of North America, a prominent scientist has warned. Speaking at a symposium on water ecology at the University of Alberta in Canada, prominent Japanese-Canadian scientist David Suzuki said that the Japanese government had been “lying through its teeth” about the true extent of the 2011 Fukushima nuclear disaster. He attributed the cover-up to the Japanese government’s collusion with the Tokyo Electric Power Company (TEPCO) that administers the plant. “Fukushima is the most terrifying situation that I can imagine,” Suzuki said, adding that another earthquake could trigger a potentially catastrophic, nuclear disaster. “The fourth [reactor] has been so badly damaged that the fear is if there’s another earthquake of a 7 or above then that building will go and all hell breaks loose,” he said, adding that the chances of an earthquake measuring 7 or above in Japan over the next three years were over 95 percent. “If the fourth [reactor] goes under an earthquake and those rods are exposed, then it’s bye, bye, Japan and everybody on the west coast of North America should be evacuated. And if that isn’t terrifying, I don’t know what is,” Suzuki said. Addressing the Japanese government’s attempts to bring the crisis under control, Suzuki said the scientists charged with the plant’s safety “don’t know what to do.” “The thing we need is to let a group of international experts go in with complete freedom to do what they suggest,” Suzuki said, adding that the only thing impeding this was the “pride” of the Japanese government that was refusing to admit this was necessary. Suzuki referred to the current scheme of freezing the soil around the reactor to prevent radioactive leaks as “cockamany.” TEPCO has accepted the US government’s help in undertaking the risky cleanup operation of the Fukushima site. Teams of experts will begin the removal of fuel rods from the fourth reactor in mid-November in a decommissioning process that is likely to take decades. One wrong move in the delicate operation could result in horrific quantities of radiation being released into the atmosphere or trigger a massive explosion. Dr. Helen Caldicott described the risks of removing the rods to RT as “terribly serious” because of the danger of releasing a large amount of radiation. “Two rods could touch each other in this process which has been done before and there could be a fission reaction and a very large release of radiation.” Suzuki, a prominent environmental campaigner and scientist from the University of British Columbia, whose television science programs and books have gained a wide international audience, has been very vocal in his criticisms of Japan in its handling of the disaster. Despite his prominence in Canada, Suzuki has been criticized in the past by the media for double standards and his credentials as a scientist have been queried. While his television programs encourage society to consume less fossil fuel and adopt a more sustainable lifestyle, Suzuki reportedly lives in one of Vancouver’s most exclusive areas and has faced criticism over his globetrotting airplane travel. However, with regard to the current situation at Fukushima, a number of scientists have echoed Suzuki’s concerns. Nuclear technology historian Robert Jacobs told RT that there could easily be more destruction at the plant’s fourth reactor. “If this building were to collapse, which could happen, it would spill these spent nuclear fuel rods all over the ground which would make the 2020 Tokyo Olympics impossible and could threaten all kinds of health problems throughout northern Japan and Tokyo itself,” Jacobs said. A vision of things to come? Technologically speaking, nuclear power is a modern Tower of Babel (by Pieter Bruegel the Elder-1563). The realization that mankind occasionally over steps his bounds is not new, it surfaces with the growth of large cities and attendant innovation, it is the blow off phase of civilization. Mr. Larry (News & Editorial/Tracking the continued, “quiet” breakdown at Fukushima)
<urn:uuid:8a0792c7-e6cb-45d5-afe6-378c964428fe>
CC-MAIN-2017-17
https://4dtraveler.net/2014/12/01/tracking-the-continued-quiet-breakdown-at-fukushima/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121865.67/warc/CC-MAIN-20170423031201-00562-ip-10-145-167-34.ec2.internal.warc.gz
en
0.952992
3,165
2.734375
3
Discovery of Pictish Fort Reveals Iron Age Look-Out post for Sea Raiders In the fifth or sixth century AD, Picts on the eastern Scotland coast set up a fort on a stone outcrop just offshore, possibly to hold sway over the seas. The ancient people had a reputation for ferocity and were one reason the Romans never established a lasting presence in what is now Scotland. The fort on what is called a “sea stack” may have been one of a series of forts along the coast, archaeologist Gordon Noble of Aberdeen University told the Press and Journal . This particular fort, near Stonehaven, may have been a precursor to medieval Dunnottar Castle, just a few hundred meters (yards) away, on a headland onshore. Dunnottar Castle, Scotland ( Wikimedia Commons ) Excavations by Professor Noble and his team showed the fort was inhabited for extended periods, so it may have been an important place to the Picts. “The Picts were known as sea raiders and forts like this may have helped cement that naval power. It is quite an impressive site. It was pretty hairy climb to get up there and at high tide it is completely cut off. Resupplying the fort when it was inhabited would have been a challenge,” Professor Noble told the Daily Mail . The Romans called Picts “Pictii” because they painted themselves blue when going into battle. No one knows what the Picts called themselves. They lived in east and north Scotland during the late Iron Age and early in the medieval era. They overran Roman positions several times by 200 AD and kept the Romans at bay in Scotland north of the Clyde and Forth. A Pict looking out to sea as depicted in a 19 th century book ( Wikimedia Commons ) “The Roman name ‘Pictii’ means “painted ones,” and the Romans believed the Picts were little more than naked savages. However, it is now thought that this is an exaggeration. Given Scotland’s climate, it is unlikely that the Picts spent a lot of their time undressed. It is believed that they wore clothes colored with natural dyes and used leather for footwear and jackets. The Picts were also thought to be excellent farmers, growing crops and keeping animals for food and clothing. Certainly, horses were important to the Picts as they are depicted on many of their carved stones,” says an article at the BBC website. “The Painted Ones”: Hand-colored version of Theodor de Bry’s engraving of a Pict woman ( Wikimedia Commons ) Picts didn’t have writing, so what we know of them comes from ancient Greek and Roman texts and archaeological digs like the one at Dunnicaer sea stack. The fort on the sea stack at Dunnicaer became known after youngsters climbed it and found rocks with markings on them. They threw some of the rocks into the sea, but one boy went back and retrieved one from the water, the Daily Mail says. Stone with Pictish carving found at Dunnicaer hill fort ( megalithic.co.uk) It’s possible the Picts built a wooden bridge to the sea stack to give regular access, Noble said. The stones of the fort were not local, so it seems likely they had some way to transport them to the sea stack, whether by a wooden bridge or by lifting them with ropes. The team from the University of Aberdeen’s Northern Pict Project excavated what may have been a house and a hearth with some charcoal intact at the site. The house was inside the fort. Noble speculated that there was a community living on the shore near the sea stack, but he said because Picts built their homes from wood it is not possible to find remains of their dwellings. A professional rock climber scaled the sea stack and put ropes in place for Professor Gordon and his team, who did a five-day excavation at the site. Featured image: View over Dunnicaer Promontory Fort from the neighboring clifftops. Credit: Les Hamilton. By Mark Miller
<urn:uuid:820707be-10cd-40c5-b0fb-2a240dfa25b0>
CC-MAIN-2018-17
http://www.ancient-origins.net/news-history-archaeology/discovery-pictish-fort-reveals-iron-age-look-out-post-sea-raiders-002953
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945497.22/warc/CC-MAIN-20180422061121-20180422081121-00156.warc.gz
en
0.977366
862
3.59375
4
Earth Science for Educators II: Role in the ProgramPrepared for SERC by John McDaris in consultation with Heather Petrovic A discussion of the design and implementation of Earth Science for Elementary Educators II, a physical geology course serving pre-service teachers at Western Michigan University. A description of this course and its goals is also available. What Role Does this Course Play in Teacher Preparation? This course is one of six science content courses (two courses each in areas of life science, physical science, and earth science) specifically designed for undergraduate elementary education majors. All students who pursue elementary teaching certification are required to complete four of the six courses with at least one course from each area; students pursuing elementary integrated science certification are required to complete all six courses. All six courses share objectives related to teacher preparation, including: (1) to aid students in developing meaningful and functional understanding of key science concepts; (2) to provide student with opportunities to engage in scientific inquiry that facilitate insight in the nature of science; (3) to explore alternate conceptions of scientific phenomena; and (4) to help students develop more positive attitudes about science and increase their confidence in their ability to do science. How does the Course Address Each Role?The course addresses multiple roles in preparing elementary teachers as follows: - The course content is focused around four key ideas in geology: plate tectonics, earth materials, surface processes, and geologic time. Deeper understanding of the content is promoted through the inquiry-oriented course format. Each in-class activity utilizes a heuristic based on the learning cycle. First, students are engaged in the activity through a series of questions designed to stimulate thinking about the topic and draw out students' prior knowledge. Next prior knowledge is related to the topic and gaps in knowledge are identified. Students are then invited to engage in the day's activity. Interactions with the instructor, discussions among small groups and the whole class, and questions in the student course pack serve to guide students to correct understanding of the concepts. A homework reading and questions serve to reinforce understanding. Finally, students review their understanding in a whole-class discussion format. - In addition to learning content, scientific ways of thinking and the process of "doing" science are emphasized in this course. In many of the in-class activities, students have to collectively decide what evidence to collect, how to collect it, how best to present their evidence, and what conclusions can be drawn from the available evidence. Explicit discussion of these and other aspects help to facilitate student experience and understanding of the nature of science. - Students' prior knowledge can both inhibit and facilite learning new content. Incorrect ideas about scienctific concepts can interfere with learning, yet prior knowledge can be the basis upon which to build new concepts. Each activity in this course uses questions to draw out students' prior knowledge. In addition, students are often asked to reflect upon what ideas children have about specific earth science topics. In a semester project, students interview children to assess their prior knowledge about a specific earth science topics, and develop a lesson to adress and build upon this knowledge. - The course mainly uses group work to help students develop confidence in their ability to do science. Through interaction with peers (as well as interaction between groups and the instructor) students have a non-threatening domain in which to ask questions and explore their ideas. The course also includes many activities which could readily be adapted to an elementary classroom, giving students examples of lessons they could use in their future teaching. How do Students Integrate Learning & Teaching? One goal of the course is that students reflect on how they learn earth science and the implications of learning for their future teaching. In small group and whole class discussions, as well as on assignments, students are asked to discuss how content and experiences from the course might be used in their future teaching. Additionally, the discussions of alternate conceptions (and semester project) bring to light ideas that children often hold and how to address these ideas. How does the Course Transition Pre-service Teachers into the Classroom? The course provides a model of inquiry-based earth science instruction that is adaptable to an elementary classroom. The heuristic used in the in-class activities (engagement, draw out prior knowledge, inquiry, discuss key concepts, review) can be adapted to an elementary classroom. Children's ideas about specific topics in earth science are discusses, and strategies for teaching these topics to elementary children are shared between the instructor and students as well as among students. Individual classroom activities are also adaptable to the elementary classroom. How is the Course Content Aligned with the National Science Education Standards? Each in-class activity is aligned with specific Michigan elementary (K-8) earth/space science content benchmarks; state benchmarks are largely aligned with national standards. How does the Course Meet Certification Requirements? The course is designed to cover earth science content requirements in the Michigan Test for Teacher Certification #93 (Elementary Integrated Science) and #83 (Elementary Professional Education). What Challenges have been Encountered in Teaching this Course? How have they been Resolved? The main challenges in teaching this course include: - Bredth of content coverage versus depth of understanding. State and national benchmarks cover a wide range of content in earth and space science. How can a single course (or one of two courses) cover all of these benchmarks and yet promote deeper understanding of the content covered? The current format of this course attempts to strike a balance between bredth of coverage and deeper understanding by limiting course content to geoscience topics that are either critical to a basic understanding of earth science (e.g., plate tectonics), or most often taught in the elementary grades in Michigan (e.g., minerals and rocks). - "Science phobia" and lack of interest in science among students. Many students come into the course with a poor grasp of basic science concepts, fear of science and/or a belief that they are not good at "doing" science, or misunderstandings about the nature of science. These issues are addressed by bringing up the relevance of what students are learning to their daily lives as well as to their future teaching, work in small groups, and constructive feedback from the course instructor. - Student resistance to inquiry teaching methods. Inquiry teaching requires that students take an active role in their learning; that they participate in class activities and discussions, and that they reflect upon and critically evaluate their thinking. Many students are resistant to this work, and demand to simply be told the "right" answer. At the other extreme, some students think that because the concepts are developed from their thought process, that whatever ideas they have are "right." Striking a balance between the process of science (generating conclusions from evidence) and helping students to understand concepts correctly is a challenge in this course. This challenge is met by addressing both needs in forthright discussion with students - acknowledging all ideas, but coming to consensus on what the science says is "right."
<urn:uuid:b93f1a27-61d6-4f99-88eb-17ed9acf5b2c>
CC-MAIN-2018-05
https://serc.carleton.edu/teacherprep/courses/WMU-ESEE2_role.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888878.44/warc/CC-MAIN-20180120023744-20180120043744-00413.warc.gz
en
0.952104
1,432
3.453125
3
One night, Roman Stocker sat at home and watched his cat, Cutta Cutta, lap milk from a bowl. The MIT engineering professor, who studies the locomotion of microorganisms, began to wonder: How, exactly, did the milk travel from Cutta Cutta's bowl to his mouth? The answer, based on extensive research published online Thursday in the journal Science, came as a surprise. Unlike dogs — who use their tongues like ladles, scooping water into their mouths in a characteristically straightforward manner — cats apply an instinctive understanding of fluid mechanics to take the biggest sips. "Cats know just when to close their jaw to get the most water," said Pedro Reis, a fluid mechanics expert at MIT who collaborated with Stocker. In fact, he said it's as if "they're doing the equations in their heads." The unusual experiments involved four MIT scientists, 10 domestic cats, one "robotic cat" forged from a prototype originally built for the International Space Station, four zoo animals and six videos uploaded to YouTube by people who filmed large cats in zoos, on safaris and elsewhere. The research took 3 1/2 years to complete. Stanford marine biologist Mark Denny praised the work, although he recognized that it lacks much immediate practical relevance. "There's still a part of science that is just plain fun," said Denny, who wasn't involved in the research. "Everyone gives lip service to the scientific method," he added, but "this is a great example of it." To figure out the feline fluid dynamics, the MIT team first made "detailed observations in real cats," Reis said. They filmed Cutta Cutta with a high-speed video camera, spending "many failed evenings" at Stocker's house in Cambridge, Mass., waiting for the cat to drink. They also filmed nine cats at a nearby shelter run by the Massachusetts Society for the Prevention of Cruelty to Animals. Watching the videos, the team saw that the drinking cats' tongues extended downward toward their bowls in a "J" shape. At first, the scientists thought the animals might use their tongues the way dogs do, Reis said. In fact, only the very tips of the cats' tongues touched the water. Their tongues then moved upward at the blazing-fast speed of more than three feet per second, generating a column of liquid. The cats quickly closed their mouths to drink a portion of those columns, the study reported. The team theorized that the cats maximized the amount of water they consumed in each sip by lapping at a precise speed that balanced two forces: the inertia pulling water upward and the gravity pulling it back down. They tested their hypothesis with their robotic cat, which dipped a glass disk — a proxy for the cats' tongues — in and out of water at rapid speeds. They also tested the theory at local zoos. The fluid dynamics equations suggested that a larger cat with a larger tongue would lap less frequently to achieve the needed balance between inertia and gravity. Sure enough, the animals they filmed at the zoos — a lion, a tiger, a jaguar and an ocelot — drank at the slower rates the researchers had predicted. So did the large felines in the YouTube videos: a cheetah, a bobcat, two lions, a tiger and a leopard. The research marked the first time YouTube videos were mined for data in a paper published in Science, Reis said. He suggested that the results could help scientists design "soft robots" — which are less rigid than traditional models — or figure out new ways to manipulate liquids in the laboratory. But mostly, he said, the results were valuable because they were interesting. "Not all studies need to have a clear application," Reis said.
<urn:uuid:bcda0e76-140c-4773-a4ac-7687b76bef3a>
CC-MAIN-2015-14
http://articles.latimes.com/2010/nov/13/science/la-sci-cat-drinking-20101113
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299114.73/warc/CC-MAIN-20150323172139-00194-ip-10-168-14-71.ec2.internal.warc.gz
en
0.963501
787
3.6875
4
National Physical Laboratory [NPL] was established in the year 1943 at New Delhi. The institute was set up by the Governing Body of Council of Scientific and Industrial Research (CSIR) with a view to pave way for using science and technology as a means for industrial growth and development, as well as to give fillip to the fledgling Indian industry. The National Physical Laboratory is the National Metrology Institute of India and a Premier Research Laboratory in the field of Physical Sciences. Pandit Jawaharlal Nehru, the then Prime Minister of India, laid the foundation stone for the laboratory on January 4, 1947 and it was one of the first National Laboratory to be set-up under the CSIR. On January 21, 1950, Sardar Vallabhbhai Patel, the then Deputy Prime Minister of India, inaugurated the NPL building. Over the years, the Laboratory has more than realized its primary mandate as the keeper of Measurement Standards for the nation while also substantially expanding its research activities to emerge as a leading national institution for research in a whole gamut of areas in the Physical Sciences. Facts and Figures ofNational Physical Laboratory [NPL]- Year of Establishment Director of the Institute Dr. Amitava Sen Gupta Institutes Under National Physical Laboratory [NPL] How to Reach 6.5 kms away from New Delhi Railway Station Why to Join National Physical Laboratory [NPL]? Research and Development- The institute aims to strengthen and advance physics-based research and development for the overall development of science and technology in the country Expert Faculty- The faculty at National Physical Laboratory are a team of experts who have gained quality education and have excellent experience in the field of Physics Collaborations- The institute has collaborations with various other technical institutes that offer trainings and workshops for the students
<urn:uuid:f7991663-0942-49a6-ba99-14d80e1857cd>
CC-MAIN-2018-43
https://collegedunia.com/college/16748-national-physical-laboratory-npl-new-delhi
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583518753.75/warc/CC-MAIN-20181024021948-20181024043448-00010.warc.gz
en
0.941844
374
3.015625
3
Insufficient clearance time between conflicting green phases of traffic signals is a major cause of car-bike collisions. Car-bike collisions caused as motorists start or speed up on a new green constitute 5.9% of urban car-bike collisions (quoted from Forester, Bicycle Transportation, using the data from Cross, A Study of Bicycle/Motor-Vehicle Accidents), ranking number 3 of the motorist-caused types. If the car-bike collisions caused by obviously foolish mistakes on the part of cyclists are eliminated from consideration, it is likely that car-bike collisions caused by insufficient clearance time are 15% of the car-bike collisions incurred by cyclists who possess the minimum standard of traffic skills. This cause of car-bike collisions is the largest identified facility-associated cause of car-bike collisions. There are also complaints from bicyclists about signals with inadequate duration of the green phase, typically expressed as "Too little time to get across the street before the green ends and conflicting traffic starts." These persons ask for longer minimum-green phases. While traffic engineers understand that the duration of the green phase should not be determined by the time required to cross the intersection, the typical driver does not. However members of the public word this complaint, it refers to inadequate clearance interval and is a symptom of conditions that cause the type of car-bike collision found in the statistics. The typical situation is when a cyclist is crossing a multi-lane street from a minor street that carries infrequent and slow traffic. The traffic signal provides a green phase for the traffic on the minor street whose duration depends on the number of vehicles waiting in the queue (or on the time for the queue of waiting traffic to clear). If only one vehicle is in the queue a minimum-duration green appears, which is then followed by the yellow, which in turn is immediately followed by the conflicting green. If the single vehicle is a bicycle, the cyclist may well be only half-way across the intersection when the green appears for the main-road traffic. The typical car-bike collision occurs between a cyclist and a motor vehicle from the cyclists' right. The motor vehicle is in one of the lanes nearest the curb while vehicles still stopped are in the lanes nearest the center. The vehicle that becomes involved in the collision has started up, or speeded up, at the new green when the cyclist is hidden from the sight of its driver by the vehicles still stationary in the number one lane. Unquestionably, the colliding motorist has disobeyed the law by entering an intersection on a new green without seeing that traffic already in the intersection has cleared. However, because these accidents occur it is important to understand why they occur and to devise the appropriate countermeasure. The duration of the yellow phase for the minor-street traffic is commonly determined by the speed of the traffic on that street. Its legal meaning is specific. It shows that the red signal is about to appear, so that any driver who sees it must stop lest he enter the intersection on red. However, because it is impossible to stop instantaneously the duration of the yellow is calculated such that the driver who, upon first seeing a new yellow, is so close that he cannot stop without entering the intersection is allowed sufficient time to enter the intersection on the yellow. Any driver who is further away (and traveling at a legal speed) has sufficient distance to stop before entering the intersection. The conflicting green appears when the last vehicle to lawfully enter the intersection is within it. This system produces few collisions between motor vehicles for three reasons. 1. Motor vehicles are typically large and easily seen. 2. The motor vehicle in the intersection rarely is close to the fronts of the vehicles waiting to start from its right, so their drivers have both a better angle of view and some distance to correct a mistake. 3. Because the motor vehicle still in the intersection is moving relatively rapidly it gets within view, or leaves the intersection altogether, before the waiting drivers have reacted to the new green and started their vehicles. This system fails to provide the required safety in the case of bicycles for three opposite reasons. 1. Bicycles are small and are harder to see. In particular, the most visually impressive part of the bicycle and rider is low down where it is easily shielded from view by the hoods of motor vehicles. Sometimes the only part of the cyclist that can be seen by drivers waiting at the stop line with other vehicles on their left is the head of the cyclist. 2. The cyclist crossing a typical intersection is close to the fronts of the line of cars waiting at the stop line on the cyclist's right. This is not good judgement on the part of the cyclist, but so much emphasis has been put on staying far right that this position is typical. 3. The cyclist who is traveling slowly, or, more importantly, is starting from a minimum-duration green, is barely into a wide intersection when the conflicting green appears. The result is a car-bike collision as one of the vehicles in the lanes nearest the curb starts up, or speeds up, and hits the cyclist who suddenly appears in front of it. Two methods are frequently advised or requested to handle this situation and prevent these collisions: increasing the minimum-duration green and increasing the duration of yellow. Neither of these meets the requirements of controlling traffic in the way required by traffic law. While increasing the minimum-duration green helps those cyclists who have been waiting, by allowing extra time to allow for the time lost in starting, it doesn't assist those who have been approaching, perhaps slowly in the hope that the signal will change before they come to a complete stop. These may still lawfully enter the intersection on either green or yellow, so that the situation is much the same as before except that the bicycles don't have to start from a stop. At the speeds typical of urban cyclists they will still move through the intersection slowly, and are likely to be in the position of danger when the conflicting green appears. A lengthy yellow is likely to be met with the same response. Traffic may still lawfully enter an intersection on a yellow, and once cyclists learn that a particular signal has a long yellow they are likely to take advantage of that permission to avoid coming to a stop. Then they will still be near the position of danger when the conflicting green appears. Of course, entering an intersection on a stale yellow is undoubtedly unwise. It is not so unwise for someone traveling fast, because that person may well clear the intersection before the conflicting traffic starts. It is much more unwise for someone traveling slowly, but it is done and it is lawful. Originally the law said that drivers shall stop before entering the intersection upon seeing the yellow unless it was unsafe (or, of course, impossible) to do so, and it also said the driver who was still in the intersection when the yellow phase ended was violating the law. Under that law it was reasonable, indeed proper, for engineers to extend the yellow phase to allow slow vehicles to clear the intersection. However, that law produced many difficulties in enforcement and in determining liability. Therefore, in 1962 (for the Uniform Vehicle Code), the law was changed to require a positive decision point, the time when the signal changed from yellow to red, as the time after which it was unlawful to enter the intersection. That change in traffic law required a change in the logic and duration of the clearance interval, a change that has frequently not been made. Extending the duration of either the green or the yellow to allow intersection clearance time does not meet the requirements of the law as now phrased. The phasing sequence that is required by current traffic law is as follows: 1. Green, which may be very short when only one vehicle is waiting 2. Yellow, of only sufficient duration to allow a stop from maximum legal speed before entering the intersection 3. Red (a 4-way red), for sufficient additional time for traffic to clear the intersection before the conflicting green appears The change in logic that the change in law has made necessary is in some respects disadvantageous because the clearance interval so calculated will often be longer than the extended green plus yellow of the former system, and the total proportion of green will be reduced in accordance. However, the change in green time may not be as severe as might appear, because the greatest effect is when a single vehicle is in the queue, which is when the green is extended even though there is no vehicle present to use the additional green time. In any case, the change in the law was adopted to eliminate the collisions and the resulting difficulties that the former system caused. The calculation of clearance time, as it relates to bicycles, must consider two different situations in which bicycles are concerned: 1. One or more bicycles and less than three cars are waiting in the queue. 2. A bicycle is the last vehicle approaching a green signal and is just unable to stop before entering the intersection when the yellow appears. In the first situation the cyclist must start at the new green, which will be short. Just as a motorist loses about 2.5 seconds when starting, the cyclist will lose some time. This amount of time may be estimated either by adding a single time allowance for starting, or by calculating the acceleration of the cyclist across the intersection. In the second situation, the cyclist who just can't come to a stop before entering the intersection is likely to be closer to the intersection than a comparable motorist when the green changes to yellow. He will thus have a shorter distance to travel to clear the intersection, but will do so at a slower speed than a motorist. If there is a marked crosswalk, the traffic engineer also may consider that the stop line for the cyclist is the far side of the crosswalk. The cyclist who comes to a sudden stop in a crosswalk can easily clear the crosswalk for the pedestrian traffic that may start to use it. The following factors are proposed for performing the calculations required by the above considerations. Use the typical automobile formula of 1 second reaction time plus deceleration to stop at 12 ft/sec/sec. This is 0.37 g, which is conservative for bicycles with 2-wheel brakes. This produces a stopping distance of: S = V*1 + V*V/24 (V in fps). This is calculated by first determining the closest point at which the cyclist can stop before crossing the actual intersection boundary. This is the actual intersection boundary less the stopping distance calculated from above. The distance to clear the intersection is the distance from this point to the center of the furthest lane carrying through traffic. If the cyclist (actually, his front wheel) reaches this position he should be well visible to drivers in the furthest lane, who will therefore delay their start, or slow their approach, to allow him to complete clearing the intersection. This distance is therefore: D = S + W It would be possible to calculate the position of a cyclist during a specified set of steps of acceleration, but this is probably not necessary. For one thing, the starting accelerations of cyclists are less variable than their sustained speeds. Consideration of a small number of data points (collected by Alan Wachtel from Palo Alto) suggests that the typical cyclist requires about 5 seconds longer to cross an intersection from a standing start than from a moving start. This is probably sufficiently accurate. Some further measurements could be made to see whether a more accurate allowance, either a single allowance or different allowances for different types of cyclists and different widths of street, would materially reduce the calculated clearance time for some installations. Tm = (S + W)/V = S/V + W/V = 1 + V/24 + W/V = D/V Ts = 5 + W/V Since Tm = S/V + W/V and Ts = 5 + W/V, Ts > Tm unless S/V > 5. Since S/V = 1.38 for 9 (6 mph) and 2.25 for 30 (20 mph), Ts will always exceed Tm. Therefore, whenever a cyclist starts from a standing start his clearance duration will exceed the clearance duration of a cyclist approaching, but continuing, when the yellow appears. The magnitude of this difference will vary from 3.6 seconds for a slow cyclist to as little as 2.75 seconds for a fast cyclist. If the duration of the green has been short, then the clearance time from a standing start must govern, but if the duration of the green has been long, then the clearance time for a rolling start may govern. The dividing line between the two algorithms is specified by whether the green time has exceeded 5 - (1 + V/24), simplified to (96 - V)/24. The ability to specify two different clearance intervals, depending on the duration of the last green, is likely to save up to 2 seconds on clearance interval for some cycles. The ability to specify a clearance interval that is computed from the difference between the green duration and a pre-specified constant will save more time on a greater proportion of the cycles. The other factor that needs to be considered is cyclist speed. Note that this is the normal sustained speed of a cyclist approaching a green signal, because the 5-second start-up increment is the time difference to clear the intersection between starting from red and starting from green. Of course, the difficult decision is how slow a cyclist should the clearance phase allow for. From study of the data collected by Wachtel I suggest a time that is 1.5 times the average for clearing the intersection after approaching on green, or a speed that is 0.67 times the average speed for that movement. (The data I have received from Wachtel refer to the distribution of times for starting from red. The factor may be altered when the distribution for approaching on green is studied.) The average speed or time for approaching on green and clearing the intersection may be obtained either by measuring at the actual intersection or by estimation from other measurements. The speed will probably vary from location to location depending on the type of cyclist that uses the intersection. Obviously, the fastest cyclists will clear the intersection handily; what is required is a judgement of the standard speed for calculation that will provide adequate clearance time for nearly all cyclists using that intersection. I suggest that for average adults a standard speed of 8 (12 fps) be used, based on an estimated average speed of 12and the 0.67 factor. I suggest that for intersections that are typically used by cyclists who are either extremely young or extremely old the standard speed be reduced to 6 (9 fps). At intersections where nearly all the cyclists are fast cyclists, the standard speed may be raised to 12 (18 fps). In any case, whenever actual observations have been made that information should be used. The formula for clearance interval then becomes: If the controller can allow only one clearance interval: Ci (secs) = 5 + W/V If the controller can allow two different clearance intervals: If the green duration has been less than (96 - V)/24 secs: Ci (secs) = 5 + W/V If the green duration has been more than (96 - V)/24 secs: Ci (secs) = 1 + V/24 + W/V If the controller can compute a clearance interval: Ci (secs) = the larger of: 1 + V/24 + W/V or 5 + W/V - duration of green where W ft. is from intersection boundary to half-way across the last lane carrying through traffic and where V = 12 fps for locations with average adult traffic, V = 9 for locations with child or elderly traffic, and V = 18 for fast adult traffic. The formula probably need not be adjusted for descending or ascending roads because in all cases the clearance time is calculated from a standing start and the intersection that is being crossed will probably be substantially level. Therefore the crossing speed from a standing start will not change appreciably for the distance, even though the crossing time from approaching a green changes greatly. The speed of approach will differ, but on descents the cyclist should not exceed the speed limit and on ascents he won't be able to do so. Therefore the duration of yellow will not normally need to be changed. This suggested procedure for calculating intersection clearance time needs to be checked for adequacy and accuracy by some further measurements in different locations.
<urn:uuid:e8d3fd9d-43c1-4adb-bb03-56e005d43c45>
CC-MAIN-2017-17
http://www.johnforester.com/Articles/Facilities/traffsig.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121528.59/warc/CC-MAIN-20170423031201-00234-ip-10-145-167-34.ec2.internal.warc.gz
en
0.9588
3,357
2.578125
3
What is the course about? This course provides an introduction to the field of research, knowledge and practice concerning attachment within romantic and workplace relationships. It explains attachment-related concepts and how they can be applied to yourself to understand and improve the way you function within romantic and professional relationships. What will we cover? Historical context: the origin and development of attachment theory (through psychology, ethology, systems theory, psychoanalysis) as described by the leading theorists. Explore the language of attachment theory. Biological perspectives; how the experience of attachment shapes the brain. Examine different styles of attachment, their causes and implications. Attachment during different stages of the life cycle: infancy, childhood, adolescence, adulthood, midlife, later life, death and dying. Examine attachment issues and how to create healthy and secure attachment. Identify your own style of attachment and how to apply your knowledge to romantic relationships to create sustaining and satisfying relationships: comparing your attachment style with others; dealing with breakups and making informed choices. Apply attachment knowledge to workplace relationships and organizational dynamics: induction, probation, redundancy, retirement; leader-follower dynamics; relating to groups. Explore the principles of effective communication and conflict resolution for romantic and workplace relationships. What will I achieve? By the end of this course you should be able to... Name two leading contributors in the development attachment theory. List and define at least five attachment-related terms. Identify and explain the four styles of attachment. Describe types of behavior that can lead to secure attachment in romance and at work. Explain the importance of considering people’s attachment styles in understanding the dynamics of romantic relationships. Explain the importance of considering people’s attachment styles in the workplace in making leadership and team-intervention choices. Say what you think is the most important implication for your life personally of what you have learned about the psychology of attachment. What level is the course and do I need any particular skills? No prior knowledge is needed. Proficiency in English is necessary, and a willingness to discuss and share ideas about your experience within the group. This course is designed for people who want to explore and develop their romantic and workplace relationships. How will I be taught, and will there be any work outside the class? There will be teaching input including slides, videos and handouts; group discussion; small group activities; reading and writing activities; and use of games, debating and a fun no-pressure interactive quiz at the end of the course. Reading outside of the class is voluntary (references can be supplied for those interested in extra reading). No formal “homework” will be set, but at the end of each week a topic will be given for consideration by way of preparation for the next week’s class. Are there any other costs? Is there anything I need to bring? No other costs. Bring an exercise book and pen/pencil. When I've finished, what course can I do next? You may be interested in the following courses: PP124 Psychology of addiction PP104 Psychology and counselling PP114 Cross cultural psychology PP128 Child Psychology PP115 Psychology of Trauma. General information and advice on courses at City Lit is available from the Student Centre and Library on Monday to Friday from 12:00 – 19:00. See the course guide for term dates and further details
<urn:uuid:1df5d6fe-b0a4-4deb-9716-cdcb9ce53e43>
CC-MAIN-2018-39
https://www.citylit.ac.uk/courses/psychology-of-attachment
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156622.36/warc/CC-MAIN-20180920214659-20180920235059-00162.warc.gz
en
0.921199
711
2.890625
3
What is an app? An app is a computer programme that usually runs on a mobile phone or tablet. A wide range of apps are available that could support learning and teaching in the field, from geological maps, species identification and data capture to first aid. Some are freely available, some for a charge. Interested in ideas on how to use apps, mobile phones and tablets in the field? Visit the case studies page. The Enhancing Fieldwork group on pinterest brings together a variety of mobile apps and articles useful for geography, biology and earth sciences fieldwork and education. The following list of apps is taken from: Using Mobile Devices to Enhance Undergraduate Field Research (2013), Derek France, W. Brian Whalley and Alice L. Mauchline. CUR Quarterly, 34 (2). These apps could be used on mobile phones and tablets in the field for a diverse range of activities from sharing photos and papers to storing data. - Delicious: Allows students to share interesting web links or bookmarks and save them on the cloud - Dropbox: Cloud-based data storage and file synchronisation, offering users an initial 5GB of storage - Facebook: Best-known social network that connects people and friends over the Internet - Flickr: Photo management and sharing application, allows users to upload photos and videos securely - Fotobabble: Allows users to record and embed an audio file with a photograph - Geospike/ GPS Log: Geographical information system that allows the user to record and plot geo-referenced information, e.g., photographs on a map - Google Drive: Cloud-based data storage and file synchronization that offers all users an initial 15 GB of online space - Goodreader: Enables PDF documents and most common documents to be read on mobile devices and retrieved from cloud-based data storage such as Dropbox - Google +: A social-networking service that integrates several services, e.g., hangouts - iMovie: Video-editing app for mobile devices - Keynote: Alternative presentation software to PowerPoint - Linkedln: A professional social network - Mendeley: Academic software that indexes and organises PDF documents and allows them to be shared - Numbers: Spreadsheet app that allows the user to manipulate data - PaperShip: Allows the user enhanced functionality of Mendeley through management of folders and annotation and sharing of documents - Splice: Allows users to capture, edit, and share video over the web - Storify: Allows creation of digital stories using social media - Twitter: Social networking in 140 characters or less - Yammer: A leading enterprise social network similar to Twitter and preferred by companies worldwide due to options for private group discussions - Youtube: Video-sharing website Do you use apps in fieldwork? Have any apps you would recommend? Contact us…
<urn:uuid:430a8bb5-5146-4255-8aad-844a80173c28>
CC-MAIN-2022-27
https://enhancingfieldwork.org.uk/apps/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103033816.0/warc/CC-MAIN-20220624213908-20220625003908-00684.warc.gz
en
0.852789
589
3.265625
3