text stringlengths 222 548k | id stringlengths 47 47 | dump stringclasses 95 values | url stringlengths 14 7.09k | file_path stringlengths 110 155 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 53 113k | score float64 2.52 5.03 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|
See also Beth Shemesh
beth-she’-mesh, beth’-shemesh (beth-shemesh; Baithsamus, "house of the sun"): This name for a place doubtless arose in every instance from the presence of a sanctuary of the sun there. In accordance with the meaning and origin of the word, it is quite to be expected that there should be several places of this name in Bible lands, and the expectation is not disappointed. Analysis and comparison of the passages in the Bible where a Beth-shemesh is mentioned show four places of this name.
1. Beth-shemesh of Judah:
The first mention of a place by this name is in the description of the border of the territory of Judah (Jos 15:10) which "went down to Beth-Shemesh." This topographical indication "down" puts the place toward the lowlands on the East or West side of Palestine, but does not indicate which. This point is clearly determined by the account of the return of the ark by the Philistine lords from Ekron (1Sa 6:9-19). They returned the ark to Beth-shemesh, the location of which they indicated by the remark that if their affliction was from Yahweh, the kine would bear the ark "by the way of its own border." The Philistines lay along the western border of Judah and the location of Beth-Shemesh of Judah is thus clearly fixed near the western lowland, close to the border between the territory of Judah and that claimed by the Philistines. This is confirmed by the account of the twelve officers of the commissariat of King Solomon. One of these, the son of Dekar, had a Beth-shemesh in his territory. By excluding the territory assigned to the other eleven officers, the territory of this son of Dekar is found to be in Judah and to lie along the Philistine border (1Ki 4:9). A Philistine attack upon the border- land of Judah testifies to the same effect (2Ch 28:18). Finally, the battle between Amaziah of Judah and Jehoash of Israel, who "looked one another in the face" at Beth-shemesh, puts Beth-Shemesh most probably near the border between Judah and Israel, which would locate it near the northern part of the western border of Judah’s territo ry. In the assignment of cities to the Levites, Judah gave Beth-shemesh with its suburbs (Jos 21:16). It has been identified with a good degree of certainty with the modern `Ain Shems.
It may be that Ir-shemesh, "city of the sun," and Har-cherec, "mount of the sun," refer to Beth-shemesh of Judah (Jos 15:10; 19:41-43; 1Ki 4:9; Jud 1:33,35). But the worship of the sun was so common and cities of this name so many in number that it would be hazardous to conclude with any assurance that because these three names refer to the same region they therefore refer to the same place.
2. Beth-shemesh of Issachar:
In the description of the tribal limits, it is said of Issachar (Jos 19:22), "And the border reached to Tabor, and Shahazumah, and Beth-shemesh; and the goings out of their border were at the Jordan." The description indicates that Beth- shemesh was in the eastern part of Issachar’s territory. The exact location of the city is not known.
3. Beth-shemesh of Naphtali:
A Beth-shemesh is mentioned together with Beth-anath as cities of Naphtali (Jos 19:38). There is no clear indication of the location of this city. Its association with Beth-anath may indicate that they were near each other in the central part of the tribal allotment. As at Gezer, another of the cities of the Levites the Canaanites were not driven out from Beth- shemesh.
4. Beth-shemesh "that is in the Land of Egypt":
A doom is pronounced upon "Beth-shemesh, that is in the land of Egypt" (Jer 43:13). The Seventy identify it with Heliopolis. There is some uncertainty about this identification. If Beth-shemesh, "house of the sun," is here a description of Heliopolis, why does it not have the article? If it is a proper name, how does it come that a sanctuary in Egypt is called by a Hebrew name? It may be that the large number of Jews in Egypt with Jeremiah gave this Hebrew name to Heliopolis for use among themselves, Beth-shemesh. being a translation of Egyptian Perra as suggested by Griffith. Otherwise, Beth- shemesh. cannot have been Heliopolis, but must have been some other, at present unknown, place of Semitic worship. This latter view seems to be favored by Jeremiah’s double threat: "He shall also break the pillars of Beth-shemesh, that is in the land of Egypt; and the houses of the gods of Egypt shall he burn with fire" (save place). If Beth-shemesh were the "house of the sun," then the balancing of the state ment would be only between "pillars" and "houses," but it seems more naturally to be between Beth-shemesh, a Semitic place of worship "that is in the land of Egypt" on the one hand, and the Egyptian place of worship, "the houses of the gods of Egypt," on the other.
But the Seventy lived in Egypt and in their interpretation of this passage were probably guided by accurate knowledge of facts unknown now, such as surviving names, tradition and even written history. Until there is further light on the subject, it is better to accept their interpretation and identify this Beth-shemesh with Heliopolis. | <urn:uuid:14f50895-da2d-471c-badb-280a2eb0ab5d> | CC-MAIN-2019-47 | https://www.biblicaltraining.org/library/beth-shemesh-0 | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669454.33/warc/CC-MAIN-20191118053441-20191118081441-00384.warc.gz | en | 0.968121 | 1,283 | 3.109375 | 3 |
Quicksand is an area of wet, moving sand unable to bear the weight of a man. Quicksands are not extensive, often occur in estuaries, and are generally of temporary nature in the British Isles.
A beach may have quicksands one year and not the next ... Morecambe Bay in North-west England is a notoriously dangerous bay ...
... its quicksand extends across the estuary, which can be crossed using an ancient and potentially lethal tidal crossing.
Believe it or not there is a royal appointed guide: The Queen’s Guide to the Sands: since the 16th century.
Until the building of the railway in 1857, the cross sands way had been a major transport route in the area ... it is now a challenge walk for charity fundraisers.
However sadly the bay is known for its quicksands and fast moving tides (it is said that the tide can come in “as fast as a horse can run”): ten years ago 23 Chinese immigrant cockle pickers, run by gang-masters, drowned after being cut off by the tides. An appalling and dreadful scenario.
|Granite rocks at Land's End|
Q is for Quartz – silicon is the most abundant element in rocks.
Crystallised as quartz, it provides the material for sand grains, flints, and man-made glass and helps to build granite and other massive rocks.
|Quartz sand grains|
In rocks, it is mixed with other minerals, but can also appear as veins.
Quartz is a hard and durable material, resistant to chemical erosion and weathering. Sand grains are fragments of older rocks that are worn down to granules in river beds, or on the seashore.
|Rose quartz - not from the UK|
Coloured varieties of quartz are valued as gems and include violet amethysts, dark red jasper, and the rare rose quartz ...
|Clear Quartz Rock|
Crystal Jug - c 1,000 AD
not from the UK
White quartz veins are a guide to gold in some regions, as in Wales ...
A translucent form of quartz with small crystals is chalcedony – a semi-precious stone ...
|New Quay - a fishing village on|
the west coast of Wales
A Quay – until the early 19th century, a fishing village would be a few thatched cottages surrounded by agricultural land, the natural harbour providing a safe mooring for fishing boats and a few small trading vessels.
As trading activity increased ... slate and coal in Wales, minerals and fish from Cornwall ... stone piers were constructed to enclose the harbour, giving greater protection to the ever larger vessels ...
That is Q for quivering, querulous quicksands, quickening quartz and quadripartite quays with their stone piers, promenades, fishing boats and small cottages ... now commercial centre – large or small ... from Aspects of British Coasts ...
Positive Letters Inspirational Stories | <urn:uuid:e1958acd-340b-4962-8055-9949e7174ed5> | CC-MAIN-2017-22 | http://positiveletters.blogspot.com/2014/04/q-is-for-quicksand-quartz-quay.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609605.31/warc/CC-MAIN-20170528062748-20170528082748-00264.warc.gz | en | 0.948097 | 629 | 3.265625 | 3 |
The first duke of Bragança was Afonso (d. 1461), an illegitimate son of the Portuguese king John I. When Portugal gained its independence from Spain in 1640, João II, 8th duke of Bragança, ascended the Portuguese throne as John IV. Thereafter the title duke of Bragança was borne by the heir presumptive to the throne. The new dynasty lasted until the death of Maria II in 1853. Her two sons (Peter V and Louis), grandson (Charles), and great grandson (Manuel II), all of the House of Saxe-Coburg-Gotha-Koháry (their father’s dynastic house), ruled until the end of the monarchy in 1910.
Meanwhile, after Brazil declared its independence from Portugal in 1822, two successive members of the House of Bragança ruled Brazil as emperors until the formation of the Brazilian republic in 1889. | <urn:uuid:0d440114-d780-4ff5-a2eb-97753d57c9d8> | CC-MAIN-2015-27 | http://www.britannica.com/topic/House-of-Braganca | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096991.38/warc/CC-MAIN-20150627031816-00161-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.954485 | 193 | 3.109375 | 3 |
The U.S. Food and Drug Administration has approved a new seasonal flu vaccine made using animal cells instead of chicken eggs, a move experts say will cut vaccine production times in the event of an outbreak.
The vaccine, called Flucelvax and made by Novartis, is approved for flu prevention in people 18 and older. The drug manufacturing process is similar to the half-century-old method of growing the vaccine in an egg. But it's faster - meaning Flucelvax production could be quickly ramped up in response to a pandemic.
"This cell-based technology removes hens and roosters and eggs from the vaccine manufacturing process, which means the vaccine could be made more rapidly, and that's a terrific advantage," said Dr. William Schaffner, president of the National Foundation for Infectious Diseases and chairman of preventive medicine at Vanderbilt University Medical Center in Nashville, Tenn. "It also removes any lingering concern about egg allergies."
Click here to see 12 flu myths debunked.
Unlike the egg-based method, in which samples of seasonal flu virus are injected into chicken eggs and incubated, cell-based technology combines small amounts of virus with nutrients and cells in large fermenting tanks.
"All the time it takes for chickens and roosters to do their business is cut short by having this stockpile of frozen cells ready to go," said Schaffner, describing how complicated it is to produce eggs while also maintaining sterility. "When you're dealing with chickens and eggs, of course there are rigorous processes to disinfect the eggs to make sure no there's no bacteria. But you avoid all that with cell-based vaccine production because the cells are kept sterile from very beginning."
The vaccine is isolated from the cells and purified, just as it would be in the egg-based method, according to Schaffner.
"Once the vaccine is produced it's just like the old vaccine," he said.
In a clinical trial of about 7,700 people, Flucelvax was 83.8 percent effective in preventing flu compared to a placebo, according to the FDA.
Click here for tips on staying healthy during holiday travel.
Cell culture technology has been used for several decades to produce other vaccines in the U.S., according to the FDA. But Flucelvax is the first flu vaccine to be produced using the newer method.
"It's a proven technology, a more modern technology, and now we're applying it to the flu vaccine," said Schaffner. "It means you can get more vaccine in the pipeline and into people more quickly." | <urn:uuid:5446c857-9819-4d32-b6ae-dddd38c0ce4c> | CC-MAIN-2015-22 | http://abcnews.go.com/blogs/health/2012/11/21/new-flu-shot-cracks-egg-problem/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928817.87/warc/CC-MAIN-20150521113208-00113-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.968345 | 532 | 3.4375 | 3 |
Christo Smit, a former researcher at the Agricultural Research Council, is working on developing a sustainable biofuel industry from the diesel tree.
The South African government lost interest in biofuels when oil prices fell from about US$150 (approximately R1 780) to $40 (R474) a barrel at the start of the global recession in 2008.
But Christo Smit still believes biofuels will play a crucial role in South Africa’s future.
Christo worked as a researcher on alternative crops at the Agricultural Research Council until his retirement in 1995, then started his own nursery near Citrusdal in 2000.
Here he is carrying out trials on the diesel tree (Millettia pinnata), so named as diesel can be extracted from its seeds through pressing, to select the best plant material grown from imported seed.
“The market might not justify biofuel production yet, but in a few years, rising concern over greenhouse gas emissions and looming carbon taxes might force South Africa to use more environmentally-friendly fuel sources.
It’s better to prepare for this eventuality than to wait for it to be thrust on you,” he says.
An added advantage is that the diesel tree would give farmers an opportunity to diversify production and mitigate climatic risk.
“Diesel trees perform best when planted in good-quality soils, but they’re more saline-resistant than most other crops, making them suitable for marginal soils.”
The same mills used for pressing soya and sunflower could be commissioned to press diesel tree oil seeds.
“In Australia, producers in the same neighbourhood often join forces to set up a mill,” he says.
To be used as biodiesel, the oil component of the product has to be esterified (purified, in simple terms).
The straight oil (raw un-esterified but cleaned oil) may, however, be used in specially adapted diesel engines for electricity generation or pumping water.
Finding the right plant material has been a challenge, but Christo managed to obtain some from a nursery in Gauteng 10 years ago.
However, the trees did not produce high yields and the pods were bitter, which would render oilseed press cake, a byproduct of the production process, unsuitable for the feed market.
The nursery closed down after a while, so Christo had to source plant material from abroad.
Attempts to obtain seed from high-quality genotypes used for commercial production in Australia and India proved unsuccessful as these countries were unwilling to share trade secrets.
“Diesel tree seed are heterozygous, so you don’t really know what you’re getting until the trees are in their second or third leaf.
Some of the trees produce plenty of oil, while others struggle to flower.
I was looking for plant material that produced bunches of pods, as this is associated with higher oil volume, as well as seed that wasn’t bitter,” he explains.
success at last
Eventually, Christo managed to make contact with a nursery in Islamabad, Pakistan, that went out of its way to accommodate him.
It sourced seed from the type of trees he was after, helping to ensure that it contained at least some of the genetic characteristics of these trees.
They also supplied him with cuttings last year, but none of these survived as they arrived in South Africa in winter, and Christo does not have heating facilities to stimulate root development.
“I didn’t realise the cold would be a problem when I ordered the cuttings,” he admits.
With some seed that arrived two years ago, Christo started selecting material based on its physical appearance.
By chance, he discovered that seed with a high oil content tends to float, while that with a low content sinks.
So he removed all the seed that sank as well as all the small seed from the selection.
He then treated a batch of the seed with hot water to induce germination, and gamma-irradiated it in an effort to produce varieties with low levels of the bitter flavonoid substances.
From there, the seed was planted out in a trial aimed at selecting the best plant material, based on the bunching habit of the trees, the bitterness of seed, and the growth and flowering habits.
Although keen to establish more seedlings in 2017, Christo decided to wait for the drought to end.
The region has been receiving below-average rainfall for the past three years, and has been subjected to severe water restrictions over the past year.
“I planted the seed closer together than one would do under normal conditions, in order to obtain a larger population with increased chances for getting useful selections,” he says.
“Millettia plants out well, which makes it easy to remove weak seedlings and transplant seedlings with high potential.”
Christo uses the Australian biofuel industry, of which M. pinnata is an important component, as a model for what he would like to achieve.
According to him, biodiesel production in that country increased nearly ninefold between 2005 and 2009, from 21 million litres to 180 million litres, and is becoming increasingly popular.
“For an industry growing this strongly, there must be a strong enough profit incentive,” he stresses.
The vigour of the trees is comparable to that of citrus trees.
To enable mechanical harvesting and convenient tree skirting, trees are planted in hedgerows at a relatively high density of 357 trees/ha, at an intrarow spacing of about 4m, and interrow spacing of 7m.
Christo says the trees initially had drooping branches, similar to the shape of a weeping willow, and had to be pruned to a box shape just after harvesting to optimise pod set.
The pods are harvested in spring, around October, when the trees shed their leaves while retaining their pods.
In Australia and elsewhere, a variety of pod harvesters are employed; these include machines used in the olive and tree-nut industries, such as the Colossus and umbrella-type harvesters.
The trees are able to withstand some water stress, but need access to supplementary irrigation, as most areas suitable for Millettia production in South Africa do not get enough rainfall throughout the year.
Christo says that oil yields are relatively high: “According to Australian literature, oil yield averages between 10t/ha and 15t/ ha under dryland conditions in Queensland, and as high as 18t/ha under favourable production conditions. Palm oil production, in comparison, averages around 10,5t/ha, while Jatropha production averages 9,5 t/ha.”
Christo is also branching out in other directions; he has produced three new commercial granadilla cultivars and is developing a large fruited pecan selection and cold-tolerant papaya hybrid. | <urn:uuid:690c2678-7d37-49e8-9bd6-3840543d255a> | CC-MAIN-2023-40 | https://www.agribusinessinfo.com/articles/diesel-tree-fuel-alternative-energy-sector/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00399.warc.gz | en | 0.963521 | 1,450 | 3.015625 | 3 |
The discussion on nature versus nurture is one that pits two philosophical frameworks against each other. Nature is the concept that biologically and in personality, humans possess gifts, traits, and abilities that make them the distinct individuals whom they are in society. Nurture is the concept that individuals learn different traits, abilities, and gifts that define them in society.
In criminal justice, one must consider the following question: Is criminal behavior naturally a part of human beings since conception, or is criminal behavior a learned behavior?
Please post an answer to the following questions. Support your answers with academic or real-life criminal justice examples to accentuate your point:
Based on research and your reading assignment, discuss the merits of the idea that genetics are a source for criminal behavior. You should discuss the nature versus nurture debate as it relates to personality.
Be sure to provide examples that can be found through research studies and that have evidence linking genetics and crime, including twin studies, adoption studies, and testosterone studies.
Also, in addition to the items above, discuss your opinion of whether the environment is responsible for someone committing a crime or if it is a personâ€s genetic makeup. Examine genetic and biological evidence as well as psychological and sociological theory when making your case.
What are some of the strengths and weaknesses of the evidence surrounding genetics and crime?
Do you feel that police departments should consider or dismiss such findings?
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
The post theories of crime causation appeared first on Nursing Writers Hub. | <urn:uuid:6f78ebe8-6140-462e-8497-e8b75233b5a5> | CC-MAIN-2023-14 | https://essayproeditors.com/theories-of-crime-causation/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949035.66/warc/CC-MAIN-20230329213541-20230330003541-00627.warc.gz | en | 0.943477 | 381 | 3.21875 | 3 |
READING NOTES FROM DEMOCRACY IN CHAINS
In Democracy in Chains, Nancy MacLean illustrates how libertarian economist James Buchanan’s ideas were translated into the kinds of right-wing public policies that the Koch network would eventually help implement. An illustration of applying Buchanan’s “public choice” economic principles to real world issues lies in his response to campus unrest (the Black Power movement & antiwar activism) in the late 1960s and early 1970s at UCLA and Virginia Tech—the subject of Chapter 7, “A World Gone Mad,” (102-111).
MacLean’s take on Buchanan’s views:
The problem with the university . . .began with its distinctive structural features: “ (1) those who consume its product [students] do not purchase it [at full-cost price]; (2) those who produce it [faculty] do not sell it; and (3) those who finance it [taxpayers] do not control it” (104).
Buchanan saw both the problem and solution in terms of incentive-affecting institutional structures. As MacLean put it:
The cure flowed from the diagnosis. Students should pay full-cost prices, and universities should compete for them as customers. Taxpayers and donors should organize “as other stockholders do” to monitor their investments. “Weak control” by governing boards must end. . .(105)
MacLean’s dissection of Buchanan’s thinking goes further, identifying Buchanan’s analysis of the university’s structure as a “blueprint for the right’s current fight to radically transform public higher education: to turn state universities into dissent-free suppliers of trained labor, run with firm managerial hands and with little or no input from faculty, and at the lowest possible cost to taxpayers (105).” The authors of Academia in Anarchy, “in essence,” argue “that if you stop making college free and charge a hefty tuition, ideally enough to cover the entire cost of each education, you ensure that students will have a strong economic incentive to focus on their studies and nothing else—certainly not on trying to alter the university of the wider society. But the authors were also arguing for something else: educating far fewer Americans, particularly lower-income Americans who could not afford full-cost tuition. And they were telling the businesspeople who tended to dominate governing boards that it was time to get tough with their wards, faculty and students alike (105).
What attracted the Koch team to Buchanan initially (mid-1970s) was his analysis arguing against appeasement of campus protests as well as their shared commitment “to school privatization at every level” (137).
A final note: Public higher education policy remains a hot topic today, with several presidential candidates on the Democrat side, far from advocating privatization, backing free education instead. There are pros and cons to the issue. One summary is at https://www.collegeraptor.com/find-colleges/articles/affordability-college-cost/pros-cons-tuition-free-college/
Notes: Buchanan’s book about solving the problems of the American university (co-authored with Nicos Devletogou) was Academia in Anarchy, published by neoconservative Irving Kristol (1970). | <urn:uuid:f5a81952-3f65-48f7-b6d0-0ec6b7dfc666> | CC-MAIN-2021-04 | https://unchaindemocracy.org/more-notes | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704835901.90/warc/CC-MAIN-20210128040619-20210128070619-00341.warc.gz | en | 0.948999 | 708 | 2.53125 | 3 |
Teacher will begin class by having them read along as she reads an excerpt from an article that discusses about "snots." Students will highlight parts of the reading that pertain to how the respiratory system prevents foreign invaders.
1.Teacher will perform a demonstration of how filters work together to prevent foreign invaders.
a.Before class, the teacher created a filter using an empty container that was filled with twine, string, and petroleum jelly to signify the three main filters.
b.Three students will be asked to volunteer to describe the three sections of the filter to the class.
c.Teacher will explain each section and as for predictions on what will happen when the teacher blows black pepper flakes into the tube.
d.Teacher will perform experiment and show students the results.
2.Students will discuss the three main filters in the respiratory system( nose hairs, mucus, cilia).
3.Students will draw the three types of filters on a drawing of a head.
4.Teacher will relate information to sneezing and coughing.
Warm, Moist Air
1.Teacher will ask students write down characteristics of the air that is found in our mouth to our lungs.
2.Teacher will have students breath on hand and describe how it feels.
3.Teacher will have students breath on a mirror and describe what happens.
4.Class will discuss answers and explain where each characteristic comes from.
Filter Tube: Take a clear container, such as an empty bubble container. Cut the bottom off and save for later. With the remaining container, cut into three sections. Place twine in the first section using hot glue. This will signify the nose hairs. Take the petroleum jelly and place it into the second section. This will signify the mucus. Take the string and glue it onto the the last section. Make sure that you make the string and twine dense so that it catches the black pepper.
I had my students describe the different sections. After they had made their prediction, I place some Petroleum jelly at the bottom section that was previously cut off. This will catch any of the remaining black pepper.
The article I used from a fun book called "Oh, Yuck! The Encyclopedia of Everything Nasty" by Joy Masoff.(Workman Publishing, New York: 2000.) | <urn:uuid:709d4f53-0690-4e15-a1d1-b807477e8418> | CC-MAIN-2017-13 | https://teachers.net/lessons/posts/2875.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189462.47/warc/CC-MAIN-20170322212949-00395-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.924333 | 481 | 3.75 | 4 |
MPEG stands for Moving Picture Expert Group in charge of the development of standards for coded representation of digital audio and video. There are several audio/video formats which bear this group's name, such as MPEG1, MPEG2, MPEG4. View MPEG to DVD Burner and AVI to MPEG Converter.
MPEG1 format is often used in digital cameras and camcorders to capture small, easily transferable motion video clips. It is also the compression format used to create Video CDs. In addition, The well-known MP3 audio format is part of the MPEG1 codec. View DVD to MPEG1 Ripper.
MPEG2 format, a video standard developed by MPEG group, is often used in digital TVs, DVD movies and in SVCDs. It is not a successor for MPEG1, but an addition instead. both of these formats have their own purposes in life. MPEG1 is meant for medium-bandwidth usage and MPEG2 is meant for high-bandwidth/broadband usage. View DVD to SVCD Ripper.
MPEG4, the latest compression method standardized by MPEG group, is used for both streaming and downloadable web content, and is also the video format employed by a growing number of portable video recorders. One of the best-known MPEG4 encoders is DivX which since version 5 has been fully standard-compliant MPEG4 encoder. View DVD to MPEG4 Ripper.
MPEG7 doesn't itself offer any new encoding features and it is not meant for representing audio/video content, unlike its siblings MPEG1, MPEG2 and MPEG4. Instead, it offers metadata information for audio and video files, allowing searching and indexing of audio/video data based on the information about the content instead of searching the actual content bitstream.
MPEG7 is based on XML and therefor is universal and all the existing tools that support XML parsing should be able to read the data as well, provided that they can ignore binary parts of the file.
MPEG7 is not used at the moment, but it is under serious development and standardization process at the moment and hopefully we see first fully featured MPEG-7 tools within few years. | <urn:uuid:52a2235f-dc60-43ab-8b2c-8796ade11909> | CC-MAIN-2018-43 | http://dvd-tool.com/glossary/mpeg.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511897.56/warc/CC-MAIN-20181018173140-20181018194640-00203.warc.gz | en | 0.922731 | 450 | 2.734375 | 3 |
The government should mandate that education in America be conducted in English as it is the primary language of the nation. English is also the original and founding language of the country. To support or promote bilingual education would be dangerous as it would erode the fabric from which the nation was founded - fabric built on English speaking forefathers.
The government should step in on the question and controversy of bilingual education. This is because of the fact that bilingual education is an issue that has remained unresolved in our educational system. We should decide weather or not bilingual education is a valid thing to have and the government should intervene.
The government must take a decisive stand on the issue of bilingual education. Such education has proven to be very beneficial in getting students from other lands to assimilate into the educational system, and into the American culture. But various bigots don't like this, and they have influence. The government must remind them that education and assimilation must not be interrupted just because they freak out when a kid speaks Spanish in their presence.
State governments have a say in how their funds are spent and what is taught in their classrooms, but much of it is dictated by the federal government through grants. Neither of these agencies are allowed to say what can be included in a curriculum, only what must be in it. They cannot dictate what a private school teaches beyond the core curriculum. If a catholic school can teach the bible, another school can teach Greek history entirely in Latin. | <urn:uuid:1ff9c5ec-d5a5-45bd-acd7-eaa25e53c5e2> | CC-MAIN-2022-21 | https://www.debate.org/opinions/should-the-government-step-in-on-the-question-and-controversy-of-bilingual-education | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662512249.16/warc/CC-MAIN-20220516204516-20220516234516-00248.warc.gz | en | 0.981349 | 296 | 2.75 | 3 |
Scribd es red social de lectura y publicación más importante del mundo. Write narrative speech types of research methods for master thesis discovery logon what to write a research paper on. Methods of research in many disciplines there is also a large body of research that exists in either a thesis or dissertation form. Get expert answers to your questions in quantitative research, sampling methods, research design and statistical testing and more on researchgate, the professional. How to write your thesis (including subtitle), author, institution, department, date of delivery, research mentor(s) methods what belongs in the.
Professorial lecture thesis research methods of in the first phase included two broad categories scholarship that describes a new phenomenon to most of these. Helping third world countries essay research methods for thesis where can i buy a personal statement how to write a high school application essay opinion. 44 chapter 3 research methods this chapter provides information on the research methods of this thesis the survey research method has been chosen to determine the.
Research methods are the techniques you will use to answer your research question and determine how your research question or problem has been studied in the past. Here you can find information on research methodology thesis, methodology thesis paper, download free sample methodology thesis, methodology section thesis.
Research and thesis writing 3 thesis structure guidelines these disciplines, detailed description of the methods used in the research allows the. Sample methods you should discuss since this thesis is going to be at the top why (the research was done using a particular approach. A look at the different types of dissertation (qualitative, quantitative and mixed methods) and their characteristics leading to the different routes you can take.
There are so many factors to take into account and evaluate when selecting smong different research methods. Research paper on law master thesis research methods a2 history coursework help essay for university admission.View | <urn:uuid:66835f4f-a599-4afc-be76-c9d097b16fb4> | CC-MAIN-2018-22 | http://lvassignmentpcen.health-consult.us/methods-of-research-in-thesis.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865023.41/warc/CC-MAIN-20180523004548-20180523024548-00580.warc.gz | en | 0.911159 | 377 | 2.828125 | 3 |
Predicting Physical Appearance From DNA
News Feb 06, 2015
Susan Walsh, a forensic geneticist in the School of Science at Indiana University-Purdue University Indianapolis, has been awarded a $1.1 million grant from the U.S. Department of Justice's National Institute of Justice to develop and improve "DNA intelligence" tools that may help identify unknown suspects, perpetrators and missing persons.
Walsh's work, formally known as forensic DNA phenotyping, focuses on the prediction of externally visible characteristics such as eye, hair or skin color from genetic material.
Using DNA from biological samples such as blood, Walsh's new "DNA intelligence" tools will help forensic scientists determine physical appearance information. The tools will be especially useful in cases where conventional DNA profiling is non-informative and an investigation cannot move forward.
"Predicting quantitative color -- not just blue or brown but the precise shade or pigment -- in terms of eye, hair or skin color of an unknown individual provides law enforcement, archaeologists and other investigators with information that can help identify a specific person or determine a potential pool of suspects that may or may not be of interest," Walsh said.
"The tools we are developing will be especially useful in cases where conventional DNA profiling does not provide useful information and an investigation stalls because it's the individual's first crime or the first crime where DNA has been found, hence a profile is not in the DNA database. These new tools will help investigators that lack genetic clues."
DNA profiling -- typically used by law enforcement to identify a suspect and by archaeological researchers such as those who identified the remains of Russian Tsar Nicholas and his family -- compares DNA discovered at a crime scene or archaeological find with DNA stored in a reference database. But DNA profiling is not helpful when no reference DNA exists to test a sample against. The new genetic phenotyping tools that Walsh is developing will let the discovered DNA act as a "biological witness that can do the talking."
Walsh is an assistant professor of biology in IUPUI's School of Science. Her appointment to the IUPUI faculty in 2014 followed a year as a post-doctoral associate at the Yale Molecular Anthropology Laboratory at Yale University. Originally from Ireland, Walsh earned her Ph.D. in forensic genetics from Erasmus University in The Netherlands under Manfred Kayser, a pioneer in forensic DNA phenotyping work. She also holds a master's degree in DNA profiling from the University of Central Lancashire in England.
As a doctoral student in 2013, she was awarded the prize for best oral presentation at the 25th Congress of the International Society for Forensic Genetics in Melbourne, Australia, for her presentation “Predicting skin color from DNA using a model based approach.” She has also been invited to present her work at the next international conference in 2015 in Krakow, Poland.
Walsh is a co-author of a much-discussed study published in December 2014 in the journal Nature Communications. The study confirmed that bones found in 2012 in Leicester, England, are indeed those of King Richard III, who died on the battlefield in 1485. She is a co-developer of HIrisPlex, a forensic DNA phenotyping test used to analyze 11 genes known to contribute to hair and eye color, that was used to predict the king's hair and eye color from ancient bones.
"Our work funded by the National Institute of Justice will be conducted with contributions from undergraduate and graduate students at IUPUI as well as collaborators in the Netherlands, Ireland and Greece," Walsh said. She is a faculty member of the School of Science's highly respected Forensic and Investigative Sciences Program. | <urn:uuid:9f6c8b0f-6ebc-44dc-8932-e5dd9a73f829> | CC-MAIN-2018-43 | https://www.technologynetworks.com/applied-sciences/news/predicting-physical-appearance-from-dna-205829 | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511365.50/warc/CC-MAIN-20181018001031-20181018022531-00330.warc.gz | en | 0.948055 | 745 | 3.078125 | 3 |
Researchers have uncovered new information about the pathogenetic similarities and differences between cutaneous psoriasis and psoriatic arthritis in a recent study.1
“We were able to identify genetic differences between psoriasis of the skin and psoriatic arthritis. Psoriasis is often used as a term that doesn’t discriminate the two conditions, and that has been a barrier to research,” said the study’s senior author James T. Elder, M.D., Ph.D., Kirk D. Wuepper professor of molecular genetic dermatology, department of dermatology, at the University of Michigan, Ann Arbor.
What makes this study different than earlier studies, according to Dr. Elder, is the researchers studied thousands of people based on two disease definitions. They created a working definition for purely cutaneous psoriasis — a subject who, at the time of study enrollment, had cutaneous psoriasis for 10 years without having developed joint complaints. They also created a working definition for psoriatic arthritis — a person who has psoriasis but a rheumatologist has also characterized the nature of their arthritis and determined the arthritis is due to psoriasis.
Dr. Elder and colleagues then looked for small differences between the frequency of alleles, or genetic variations, between those groups.
They found a number of interesting differences in several genes that are relevant to immune function.
“The major effect has to do with genes in a region of the genome, or chromosome 6, that’s called the Major Histocompatibility Complex (MHC). It contains about 200 genes. About six of them, called HLA genes, are particularly important in individualizing each person’s immune response,” Dr. Elder said.
About one fourth of people who develop psoriasis, overall, eventually go on to develop psoriatic arthritis, according to Dr. Elder.
“Doctors who care for psoriasis patients would really like to know which ones will develop the arthritis and which will not. The reason that is important is maybe they would treat somebody slightly differently, perhaps more intensively, if they knew the person was destined to get arthritis,” he said. “We feel that the genetic differences that we’ve outlined in this paper and also in our 2014 paper, will, when combined with other studies … someday, before too long, result in a test that would help doctors know which patients would get the arthritis and which would not.”2
That’s the implication for dermatologists, he said. For scientists, the study points to different biological pathways that could influence whether or not a person gets the disease, and that’s useful for understanding the disease, he said.
“As doctors have known, these two diseases have a lot in common, but there are some differences that have to do with what gene versions people happen to get,” Dr. Elder says.
Disclosure: Dr. Elder reports no relevant disclosures.
1. Stuart PE, Nair RP, Tsoi LC, Tejasvi T, Das S, Kang HM, Ellinghaus E, Chandran V, Callis-Duffin K, Ike R, Li Y, Wen X, Enerbäck C, Gudjonsson JE, Kõks S, Kingo K, Esko T, Mrowietz U, Reis A, Wichmann HE, Gieger C, Hoffmann P, Nöthen MM, Winkelmann J, Kunz M, Moreta EG, Mease PJ, Ritchlin CT, Bowcock AM, Krueger GG, Lim HW, Weidinger S, Weichenthal M, Voorhees JJ, Rahman P, Gregersen PK, Franke A, Gladman DD, Abecasis GR, Elder JT. Genome-wide Association Analysis of Psoriatic Arthritis and Cutaneous Psoriasis Reveals Differences in Their Genetic Architecture. Am J Hum Genet. 2015 Dec 3;97(6):816-36.
2. Okada Y, Han B, Tsoi LC, Stuart PE, Ellinghaus E, Tejasvi T, Chandran V, Pellett F, Pollock R, Bowcock AM, Krueger GG, Weichenthal M, Voorhees JJ, Rahman P, Gregersen PK, Franke A, Nair RP, Abecasis GR, Gladman DD, Elder JT, de Bakker PI, Raychaudhuri S. Fine mapping major histocompatibility complex associations in psoriasis and its clinical subtypes. Am J Hum Genet. 2014 Aug 7;95(2):162-72. | <urn:uuid:e0d06d1b-89ba-417a-9c3d-cb8299bcc859> | CC-MAIN-2018-26 | http://www.dermatologytimes.com/dermatology-times/news/cutaneous-psoriasis-psoriatic-arthritis-genetic-differences-revealed | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860570.57/warc/CC-MAIN-20180618144750-20180618164750-00123.warc.gz | en | 0.929143 | 985 | 2.875 | 3 |
Using animals for science is more involved than it used to be.
June 2010-A decade ago, Johns Hopkins investigators who wanted to take care of their own laboratory mice might keep them in cages on a lab bench or tucked in a corner.
Today, things are different. Most mice are housed in a central facility on campus, and investigators who want to keep mice in their own facilities need to meet strict standards for satellite housing. To ensure pathogen-free colonies, a visitor entering these areas first must don a paper gown and shoe covers, step on a sticky floor mat and pass through a sealed door. Inside, the air is filtered. Other animal welfare rules dictate that the temperature and humidity in the satellite housing area be within set limits and recorded daily. The mice themselves must be checked every day.
Johns Hopkins earned the highest
possible commendation from AAALAC,
the organization that accredits
institutions using animals for science.
Photograph by Rama
“You can’t just leave a large amount of food and water for the mouse to last over the weekend, or even from Christmas Eve to December 26,” says Nancy Ator, the chair of the university’s Animal Care and Use Committee.
More rigorous attention to satellite housing is one of many changes that the university has instituted in its lab animal program in recent years—changes that reflect its efforts to meet high standards for the care and use of these animals.
This past year, those efforts led the university to earn the highest possible commendation from AAALAC International, the private organization that accredits universities and other institutions using animals for science. Following its triennial site visit in June 2009, AAALAC—the Association for Assessment and Accreditation of Laboratory Animal Care International—awarded the university full continued accreditation and concluded that Hopkins had no issues requiring corrections.
Accreditation is no small feat. Hopkins houses almost 150,000 laboratory animals across its campuses, 97 percent of which are mice and rats. In its site visits, AAALAC examines everything from the size and cleanliness of animal cages to the expiration dates on bottles of drugs. A few expired bottles of a sedative or analgesic designated for animal use could jeopardize accreditation, Ator says.
"Regulations are kept to the word," says Chris Zink, director of the Department of Molecular and Comparative Pathobiology, which includes veterinarians responsible for the care and welfare of Hopkins' research animals.
The university is also subject to at least annual unannounced inspections by the Animal and Plant Health Inspection Service of the U.S. Department of Agriculture (USDA), the agency that enforces Animal Welfare Act regulations. These rules, which must be strictly followed, cover most warm-blooded species but exclude rats and mice that have been bred for research.
For many at Hopkins, it may seem as though the bar has been rising steadily. But is that the case?
Yes and no, explains Ator.
She says regulations themselves have not changed significantly in the past decade. However, external inspectors frequently shift their emphasis or change internal rules to influence what is required.
For example, while USDA regulations mandate "good veterinary practice," what that constitutes isn't spelled out. So the agency issues interpretative rules—for instance, forbidding analgesics to be administered after the expiration date.
"AAALAC and USDA both are continually tweaking their expectations in response to new information about what animals need," Zink says.
Other external factors include pressure from animal rights groups, which have influenced regulatory bodies to enforce animal research laws more vigilantly.
Hopkins' own efforts over the last decade to enforce federal requirements internally have also added to the sense of rising expectations.
As the result of a 2000 site visit, AAALAC placed the university on probation, citing a lengthy list of problems related to the structure and oversight of Hopkins' animal program. The next year, Hopkins overhauled its program.
It consolidated three animal care and use committees—from Medicine, Public Health and Homewood—into one university-wide body, a merger that eliminated inconsistent standards in the groups responsible for overseeing animal research protocols. Hopkins also separated the leadership of the Animal Care and Use Committee from the leadership of the animal services program.
Previously the same people were running both groups, says Ator, “so inspection by the committee was like being called on to check your own house.”
Among other changes, the administration also increased the number of full-time positions for animal care workers and supervisors and boosted the salaries for those positions to try to reduce what had been a high turnover rate. And it introduced mandatory training classes and examinations for animal caretakers.
Overall, many who use animals for research or oversee their care say the higher expectations brought about by such changes are a good thing, both for animals' well-being and for science.
“Overwhelmingly, things have improved,” says Professor of Physiology Roger Reeves. “Animals now are better cared for. And science is done better when animals are cared for better.”
Rodents used as sentinels, for example, are tested for a broad array of pathogens, including some organisms that don't pose a threat to animal health but could compromise scientific results.
In addition, says veterinarian Robert Adams, director of laboratory animal medicine for Research Animal Resources, “all our mice are kept in sterile cages. That’s not mandated by law; it’s mandated by us because disease can derail your research.”
But many who use lab animals or oversee lab animal programs also say certain policies and expectations are unnecessary or even contrary to the mission of the humane use of research animals.
Scientists such as Reeves, for example, question the merits of a policy on the method for sacrificing mice. According to NIH requirements, scientists usually must first anesthetize a mouse before sacrificing it through cervical dislocation. But anesthesia itself distresses the mouse, says Reeves. Cervical dislocation alone “takes less than one second,” he says, and is a practice that many scientists consider the most humane way to sacrifice a mouse.
Another issue involves the use of environmental enrichment required by the Animal Welfare Act. Research facilities must provide enrichment (such as toys and social housing) for nonhuman primates and exercise opportunities for dogs. At Hopkins, several other species routinely receive enrichment.
But AAALAC has ramped up those expectations and is scrutinizing enrichment for a longer list of animals, such as laboratory frogs.
Ator points out that the emphasis of AAALAC site visitors has shifted as various aspects of animal care—such as satellite housing—have improved. "It’s the perfectibility factor,” she says. “Like in a house, when the carpeting is replaced and looks good, then the curtains look terrible.”
Ator and others in the field expect new issues to be addressed in an updated version of the "Guide for the Care and Use of Laboratory Animals." Published by the National Research Council, the guide is the gold standard for designing appropriate programs for animal research, and recipients of federal research funding must follow it. A National Academy of Sciences committee has spent the past two years on the update, which is intended to incorporate new scientific knowledge acquired since the last guide was issued, in 1996.
Many scientists in the field anticipate significant changes, such as an expanded section on enrichment and a longer list of species recommended to receive it. The updated guide is expected to be published sometime this year.
The Mouse Model: Less than Perfect, Still Invaluable | <urn:uuid:01038c4e-b9cf-4297-9ce5-27651164e734> | CC-MAIN-2013-20 | http://www.hopkinsmedicine.org/institute_basic_biomedical_sciences/news_events/articles_and_stories/model_organisms/201006_raising_bar_animal_care | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005723/warc/CC-MAIN-20130516133005-00094-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.950693 | 1,568 | 3.078125 | 3 |
Flames crackled in the dry grass and gray smoke arose over the Mayacmas Mountains on Friday as Pepperwood Preserve attempted to burn to death a weed with the unappealing name of medusahead.
Three Cal Fire engine crews were on hand to ignite — and closely monitor — a 7-acre controlled burn on a slope near the highest point in the 3,200-acre preserve, with clear views of Mount St. Helena, Fitch Mountain and even a bit of Warm Springs Dam on Lake Sonoma in the distance.
The burn was timed specifically to catch the medusahead, a purplish grass that flowers in the spring, with a tight cluster of seeds atop each stem. If the timing and behavior of the fire is right, a controlled burn can destroy 98 percent of the seeds, said Sasha Berleman, a UC Berkeley doctoral candidate in fire ecology.
“I think it did exactly what we wanted,” she said.
Michael Gillogly, the preserve manager, said it was “kind of exciting for all of us” to apply an age-old technique to cope with a contemporary nuisance. Medusahead, which grows in dense patches throughout Pepperwood’s 900 acres of grassland, is a nonnative, invasive species that tends to dominate the landscape, he said.
The cattle that graze at Pepperwood to reduce wildfire fuel won’t eat it, and medusahead eventually creates a blanket of dry thatch that covers the ground, suppressing growth of other plants and creating a “monoculture” as well as a fire hazard, Gillogly said.
Native Americans burned grasslands to promote growth of food and basket material, he noted. “Reintroducing fire to the environment is a big deal,” Gillogly said of the property’s first controlled burn since the preserve was established in 1979.
Michelle Halbur, the preserve ecologist, spent two weeks surveying the burn area to pinpoint the concentrations of medusahead and other vegetation, including Harding grass, another nonnative, invasive species with dense, spike-like flowering heads.
“I got grass seeds in my socks every day,” Halbur said.
Berleman said she was interested in seeing if the fire could diminish Harding grass by killing the roots of the perennial grass that stands 3 feet high.
Large green patches left on the otherwise charred burn area were Harding grass that may or may not have died, she said. But even if only one year’s growth of grass was eliminated, “that would be a plus,” she said.
The burn seemed to have devastated the medusahead, but Berleman said the ultimate test will come when the plant’s seeds are collected off the ground at the end of summer and planted in a greenhouse at UC Berkeley to determine how many will germinate.
Cal Fire crews conducted the burn, using drip torches to ignite the grass and patrolling the road with hand tools and three engines carrying water.
A Cal Fire bulldozer on a flatbed truck was on standby at Pepperwood in case the fire should escape from the burn area, said Megan Scheeline, a Cal Fire vegetation management forester who designed the fire plan.
“We’re working with Pepperwood to meet their ecological goals,” she said, noting that a controlled burn is also a good training exercise.
“Watch yourself. Eyes on the fire at all times,” a Cal Fire supervisor advised his crew as the flames began to spread. | <urn:uuid:b8ef4b80-b025-4a58-8351-fdddb3da971e> | CC-MAIN-2017-22 | http://www.pressdemocrat.com/news/5722397-181/pepperwood-preserve-holds-first-controlled?artslide=0 | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607120.76/warc/CC-MAIN-20170522211031-20170522231031-00242.warc.gz | en | 0.95692 | 735 | 2.6875 | 3 |
Definition: An instrument used to estimate the amount of butterfat in milk.
[lacto- + G. krino, to separate]
Always consult your healthcare provider to ensure the information displayed on this page applies to your personal circumstances.
© Copyright 2018 Wolters Kluwer. All Rights Reserved. Review date: Sep 19, 2016.
Search Stedman's Medical Dictionary
Examples: glitazone, GI cocktail, etc. | <urn:uuid:212a67e2-5077-4c49-865a-03be02fab9f8> | CC-MAIN-2018-47 | https://www.drugs.com/dict/lactocrit.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746171.27/warc/CC-MAIN-20181119233342-20181120015342-00143.warc.gz | en | 0.685577 | 93 | 2.625 | 3 |
TUESDAY, Nov. 7, 2017 (HealthDay News) — Facebook, Instagram, Twitter, texting: Sometimes it seems today's young adults are online more often than not.
But new research suggests that the amount of time young adults spend on social media doesn't seem to affect their risk for mental health problems.
The finding came from a study of 467 young adults who were asked about how much time each day they used social media, the importance of it in their lives and the way they used it. They also were asked about mental health issues such as social anxiety, loneliness, decreased empathy and suicidal thoughts.
The researchers found little association between the amount of time spent on social media and mental health problems. The results were published online Nov. 1 in the journal Psychiatric Quarterly.
The only area of concern was what the researchers called "vaguebooking," which refers to social media posts that contain little actual and clear information but are worded in a way meant to trigger attention and concern in those who read the posts.
Young people who tended to write such posts were lonelier and had more suicidal thoughts than others, according to the study.
That finding suggests that "some forms of social media use may function as a 'cry for help' among individuals with pre-existing mental health problems," lead author Chloe Berryman, of the University of Central Florida, said in a journal news release.
"Overall, results from this study suggest that, with the exception of vaguebooking, concerns regarding social media use may be misplaced," she said.
"Our results are generally consistent with other studies which suggest that how people use social media is more critical than the actual time they spend online with regards to their mental health," Berryman concluded.
The American Academy of Family Physicians has more on mental health.Let's | <urn:uuid:d3215876-de14-43f1-9692-a240509b388b> | CC-MAIN-2020-40 | https://www.eveningwashington.com/2017/11/07/does-all-that-social-media-time-harm-young-minds/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402093104.90/warc/CC-MAIN-20200929221433-20200930011433-00614.warc.gz | en | 0.971763 | 372 | 2.96875 | 3 |
The Cyber Robotics Coding Competition CRCC
What is the Cyber Robotics Coding Competition (CRCC)
CRCC is an innovative robotics tournament that excites and engages students in coding. Schools can compete and involve students through gaming and competition in STEM, coding and tech literacy. No previous experience is necessary, everyone can participate. CRCC is cloud-based, can be accessed from any computer and uses simulation of virtual 3D Robots that perform complex tasks and missions. By learning to program, planning and strategizing the virtual robot to participate, students will compete within their class, grade, school, district and state to win stages and progress to the finals. | <urn:uuid:ba638694-a619-4472-8362-16b1404be148> | CC-MAIN-2019-30 | https://gocoderz.com/crcc/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524548.22/warc/CC-MAIN-20190716115717-20190716141717-00209.warc.gz | en | 0.949172 | 132 | 3.03125 | 3 |
Researchers from NVIDIA, Aalto University, and MIT have developed an AI that can remove noise from grainy photos and automatically enhance them. This technology can be beneficial in several real-world situations where it is difficult to obtain clear image data like MRI scans, astronomical imaging, and more.
Existing noise-reduction AI systems require both noisy and clean input images, but NVIDIA’s AI can restore images without being shown what the noise-free image looks like. It just needs to look at examples of corrupted images. The researchers trained the AI on 50,000 images and the deep-learning algorithm was able to produce impressive results. Check them out below.
6. The AI can remove text as well
Watch the AI in action below
00:11 – Train a denoiser without clean targets
00:24 – Poisson Noise
00:34 – Gaussian Noise
00:43 – Monte Carlo Rendering
00:48 – Impulse Noise
00:53 – MRI
00:57 – Text Removal
What do you think of NVIDIA’s new technology? Share this post with a designer or a photographer and voice your views in the comments below. Source: PetaPixel | <urn:uuid:ab10b11d-bbfc-475e-9845-513050e6d855> | CC-MAIN-2021-17 | https://digitalsynopsis.com/design/nvidia-ai-removes-noise-grain-watermarks-from-photos/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038066981.0/warc/CC-MAIN-20210416130611-20210416160611-00322.warc.gz | en | 0.901824 | 247 | 2.734375 | 3 |
عنوان مقاله [English]
Today there is rarely any applied science or branch of activity on earth that has no need to understanding the environment, geographic position and natural conditions and potentials. Geographic information is the most important decision-making tool in different activities on earth.
The knowledge of mapping (surveying, remote sensing, and geographic engineering) has benefited from the blessings of the glorious Islamic Revolution more than any other science. The dramatic changes and advances that have been made in earth sciences in recent years have been influenced by the need for quick and accurate access to better understanding of the land and potentials of the country in the field of defense and developmental construction. | <urn:uuid:d7b3825c-23c3-4147-b040-86180676da42> | CC-MAIN-2021-43 | http://www.sepehr.org/article_28528.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583083.92/warc/CC-MAIN-20211015192439-20211015222439-00077.warc.gz | en | 0.917401 | 141 | 3.109375 | 3 |
August 13, 2012 by Verse By Verse Quran Study Circle
Name: The Surah takes its name from the word, ‘Al-Asr’ occurring in the first ayah.
Period of Revelation:
It subject matter testifies that it must have been sent down in the earliest stages of Islam at Makkah. This was the time when the message of Islam was being presented in brief but highly impressive sentences so that the listeners who heard them once could not forget them even if they wanted to, for they were automatically committed to memory.
Theme and Subject Matter:
This Surah is a matchless specimen of comprehensiveness and brevity. A whole world of meaning has been compressed into its few brief words. In clear words it has been stated what is the way to true success for man and what is the way to ruin and destruction for him.
Imam Shafi has rightly said that if the people only considered this Surah well, it alone would suffice them for their guidance. How important this Surah was in the sight of the Companions can be judged from the tradition cited from Abdullah bin Hisn ad-Darimi Abu Madina, according to which whenever any two of them met they would not part company until they had recited Surah Al-Asr to each other. (Tabarani)
How Amr bin Al-As was Aware of the Quran’s Miracle due to this Surah
They have mentioned that `Amr bin Al-`As radhiAllahu ‘anhu went to visit Musaylimah Al-Kadhdhab after the Messenger of Allah salAllahu ‘alayhi wa sallam was commissioned (as a Prophet) and before `Amr had accepted Islam. Upon his arrival, Musaylimah said to him, “What has been revealed to your friend (Muhammad ) during this time?” `Amr said, “A short and concise Surah has been revealed to him.” Musaylimah then said, “What is it?” `Amr replied;
وَالْعَصْرِ – إِنَّ الإِنسَـنَ لَفِى خُسْرٍ – إِلاَّ الَّذِينَ ءَامَنُواْ وَعَمِلُواْ الصَّـلِحَـتِ وَتَوَاصَوْاْ بِالْحَقِّ وَتَوَاصَوْاْ بِالصَّبْرِ
“By Al-`Asr. Verily, man is in loss. Except those who believe and do righteous deeds, and recommend one another to the truth, and recommend one another to patience.”
So Musaylimah thought for a while. Then he said, “Indeed something similar has also been revealed to me.” `Amr asked him, “What is it?” He replied, “O Wabr (a small, furry mammal; hyrax), O Wabr! You are only two ears and a chest, and the rest of you is digging and burrowing.” Then he said, “What do you think, O `Amr?” So `Amr said to him, “By Allah! Verily, you know that I know you are lying.”
I saw that Abu Bakr Al-Khara’iti mentioned a chain of narration for part of this story, or what was close to its meaning, in volume two of his famous book Masawi’ ul-Akhlaq. The Wabr is a small animal that resembles a cat, and the largest thing on it is its ears and its torso, while the rest of it is ugly. Musaylimah intended by the composition of these nonsensical verses to produce something which would oppose the Qur’an. Yet, it was not even convincing to the idol worshiper of that time. | <urn:uuid:550d3eb0-8a3a-4389-8a24-d51a968b1ef5> | CC-MAIN-2016-50 | https://versebyversequranstudycircle.wordpress.com/2012/08/13/surah-103-al-asr-the-declining-day-the-time/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541864.44/warc/CC-MAIN-20161202170901-00219-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.97363 | 895 | 2.640625 | 3 |
Pressure and wind belts
Atmospheric pressure, also called barometric pressure, force per unit area exerted by an atmospheric column (that is, the entire body of air above the specified area). Atmospheric pressure can be measured with a mercury barometer (hence the commonly used synonym barometric pressure), which indicates the height of a column of mercury that exactly balances the weight of the column of atmosphere over the barometer. Atmospheric pressure is also measured using an aneroid barometer, in which the sensing element is one or more hollow, partially evacuated, corrugated metal disks supported against collapse by an inside or outside spring; the change in the shape of the disk with changing pressure can be recorded using a pen arm and a clock-driven revolving drum.
The atmosphere is held on the earth by the gravitational pull of the earth. A column of air exerts weight in terms of pressure on the surface of the earth. The weight of the column of air at a given place and time is called air pressure or atmospheric pressure. Atmospheric pressure is measured by an instrument called barometer. Now a days Fortin’s barometer and Aneroid barometer I are commonly used for measuring air pressure.
Atmospheric pressure is measured as force per unit area. The unit used for measuring pressure is called millibar. Its abbreviation is ‘mb’. One millibar is equal to the force of one gram per square centimetre approximately. A pressure of 1000 millibars is equal to the weight of 1.053 kilograms per square centimetre at sea level. It is equal to the weight of a column of mercury which is 76 centimetre high. The international standard pressure unit is the “pascal”, a force of one Newton per square meter. In practice atmospheric pressure is expressed in kilopascals, (one kpa equals 1000 Pa).
Wind belts on earth
Inter-Tropical Convergence Zone (Doldrums)
Since air is heated and rises at the equator, a zone of low pressure is formed. This zone is referred to as the equatorial trough. Air moves towards the equatorial trough, where it converges and moves aloft as a part of Hadley cell. Convergence occurs in a narrow zone, called the inter-tropical convergence zone (ITCZ).
It is the belt of equatorial calms and winds lie over the equatorial trough of low pressure. Average location of doldrums is 5°N and 5°S from the equator and this belt lies between two trade winds. As the horizontal pressure gradient is weak, therefore winds are light and variable.
Because of the convergence of winds, convective activity is dominant. Convection becomes vary strong in the late afternoons carrying warm moist air, often forming huge cumulus clouds, which results in heavy thunderstorms.
Because of the enormous amount of latent heat released by these clouds, the atmosphere becomes hot, oppressive and sultry. Since it is the meeting zone of north easterly and south easterly trade winds, it is also called Inter Tropical Convergence Zone (ITCZ) or doldrums.
Trade Wind Pattern
This belt extends roughly from 5° to 30° N & S of equator. Here, at the surface wind flows from poles towards the equator and in the upper atmosphere, flow is towards the poles. These trade winds originate because of the pressure gradient force from sub-tropical high to equatorial low. In the northern hemisphere, the trades are north-easterly and in the southern hemisphere, these are south easterly. These winds are regular (steady) and flow in constant direction.
The trade wind belt is also called Hadley cell after the name of the scientist as it resembles the convective model used by Hadley for the whole earth. The energy to derive this cell is believed to come from the release of latent heat during the formation of cumulonimbus clouds in the equatorial region.
The poleward moving winds in the upper atmosphere in this cell begin to subside between 20°-35°N & S latitudes. The subsidence over here may be due to the radiational cooling, because at upper levels it makes the air heavy and at the same time it begins to converge at higher levels over the middle latitudes around 30°. This convergence (piling up) of air aloft increases the mass of air above the surface.
Because of accumulation of air mass at higher levels, it starts descending around 30° latitude in both the hemispheres. This zone of descending air produces sub-tropical high pressure belts and is also known as ‘horse latitudes’ where like the doldrums the winds are light and variable.
The descending air over the sub-tropical high, is dry and warm. As a result, subsiding air produces clear sky and high temperature. Major deserts of the world like Sahara are located in this region.
Subtropical High Pressure (Westerlies Belts)
These lie between 30° and 60°N & S latitudes in both the hemispheres. The winds move from poleward margins of sub-tropical high pressure belts. While moving to higher latitudes, these winds are deflected and become south-westerlies in northern hemisphere and north- westerlies in southern hemisphere. The westerlies of middle latitudes are more variable than trades both in direction and intensity.
These westerly winds are frequently over-powered by polar air masses and cells of cyclones and anti-cyclones are formed in these areas. The surface flow of the westerlies may be interrupted by storms and irregular winds blowing from different directions, but in the upper atmosphere these are steady and blow in westerly direction.
The westerlies prevail throughout the year, but are stronger in winter season, especially over North Atlantic and North Pacific oceans. This is because of the steep pressure gradient from the Aleution islands and icelandic low pressure areas towards the extremely cold continental interiors where the pressure is very high.
These two semi-permanent lows are the cause of a number of cyclonic storms moving along the westerlies across the globe. In the southern hemisphere, between 40° & 60° latitudes, westerlies are persistent and powerful over water, sailors call them roaring forties, furious fifties and screening sixties.
Polar easterlies are the winds which move from polar highs towards sub-polar lows. Winds blowing from north pole are not regular. Because the polar high is not considered as quasi (semi)-permanent feature of arctic circulation. However, there are prevailing outflowing winds from the green land.
In winter, the easterly winds are observed from anticyclones of Siberia and Canada. The winds in these areas generally blow from various directions and these are largely controlled by local weather disturbances. But on the poleward side of the depressions (cyclones) that form in the northern Atlantic and northern Pacific, the easterly winds do occur.
The easterly winds in southern hemisphere are well defined and are coherent (semi-permanent) and regular. Easterly winds blow from the anti-cyclonic systems formed over the plateau of eastern Antarctica. The Indian ocean near the Antarctica experiences such easterly winds.
Little is known about the atmospheric motion at upper levels in high latitudes beyond 70° or 75° (i.e. 70, 80 or 90°) in both the hemispheres due to lack of the meteorological information. | <urn:uuid:0822a61d-430a-4ce9-b7f8-4e9b43598ed9> | CC-MAIN-2022-49 | http://uttarakhand.pscnotes.com/main-notes/paper-iv/world-geography-paper-iv/pressure-and-wind-belts/?amp=1 | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710972.37/warc/CC-MAIN-20221204104311-20221204134311-00002.warc.gz | en | 0.92696 | 1,573 | 4.25 | 4 |
DO YOU WANT QUALIFICATIONS THAT ARE ACCEPTED BY UNIVERSITIES AND EMPLOYERS AROUND THE WORLD?
A-levels are internationally recognised qualifications that are required for entry into many university courses and professional training opportunities. Students typically study A-levels between the ages of 17 and 18. A-levels can help you:
- get a place at college or university at home or abroad
- start the career you want
- explore the subjects you love.
Every year, the British Council helps more than two million people take international exams. We are here to help you at every stage of your education – from choosing subjects to registering for exams. | <urn:uuid:46d199d5-e2f2-46fa-89d2-1fe18c924d37> | CC-MAIN-2023-40 | https://www.britishcouncil.co.ke/en/exam/igcse-school/choosing/why-a-as-levels | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00021.warc.gz | en | 0.932122 | 134 | 2.65625 | 3 |
War History Online presents this guest blog by Guest Blogger James Maloney
Albert Jacka was the first Australian soldier to receive the Victoria Cross during the First World War. As a result he also became one of Australia’s most recognizable faces during the First World War period.
Jacka was born in Layard, Victoria in 1893 before moving to Wedderburn where he worked as a laborer before the outbreak of war in 1914.
He was among one of the first to volunteer to join the Australian Imperial Force (AIF), where he was assigned to the 14th Battalion of the 4th Brigade. He completed his training in Victoria and then spent time in Egypt before arriving at Gallipoli, one day after the landings, on April 26th, 1915.
Less than a month later came arguably Jacka’s finest moment as the Turkish troops launched an assault that managed to capture some the ANZAC lines, including Courtney’s Post. Outnumbered 7 to 1 by Turkish troops, Jacka managed to hold them off until reinforcements arrived when he attacked the Turks from the rear and killed five by rifle fire and two by bayonet.
Jacka’s actions that day would earn him the first Australian VC of the war.
The citation for that day reads as follows:
“For most conspicuous bravery on the night of the 19-20th May, 1915, at Courtney’s Post, Gallipoli Peninsula. Lance-Corporal Jacka, while holding a portion of our trench with four men, was heavily attacked. When all except himself were killed or wounded, the trench was rushed and occupied by seven Turks. Lance-Corporal Jacka at once most gallantly attacked them single-handed and killed the whole party, five by rifle fire and two with the bayonet.”
Jacka became an instant celebrity amongst the Australian troops, with his face being used on recruitment posters, stories of his exploits appearing in newspapers and the renaming of the 4th Brigade as ‘Jacka’s Mob’. Instead of using his celebrity to return home, Jacka refused to return believing that he had stick with his mates and continue the fight.
Following the ANZAC withdrawal from Gallipoli, Jacka then saw action on the Western Front where he received the Military Cross and a Bar to boot.
In August 1916 at Pozieres he received the Military Cross where he, along with 7 fellow soldiers managed to recapture a section of trench that had been taken by German soldiers, freeing around 40 recently captured ANZAC soldiers and in turn forcing the capture of 50 German soldiers.
Australian War Historian Charles Bean described the actions of Jacka at Pozieres that day as ‘the most dramatic and effective act of individual audacity in the history of the AIF’.
In April 1917 near Bullecourt he would then be awarded a Bar to his Military Cross. Jacka led a group of soldiers into no man’s land where they cut through German wire entanglements, and then returning out and capturing a two-man German patrol singlehandedly.
In 1918 towards the end of the war Jacka was badly wounded by a sniper at Ploegsteert Wood, and was then gassed at Villiers-Bretonneux and was sent to England for surgery.
He would eventually return home in 1920 where he continued to live an extraordinary life. He set up an electrical goods business in before marrying in 1921. In 1931 during the Great Depression his business collapsed, however he had already been elected Mayor of St. Kilda.0
In January 1932, just days after his 39th birthday, Albert Jacka died of kidney failure. He was given a state funeral which was attended by 50,000 people and among his pallbearers were 8 other Victoria Cross recipients.
The actions of Albert Jacka made him an Australian hero. He also showcased many of the values that Australians still hold close to their hearts to this day. His adventurous spirit, mateship, larrikinism, courage and bravery under fire made him the model soldier of a young country looking to prove itself on the world stage.
Albert Jacka was the first Australian soldier to receive the British Commonwealth’s highest military award, and he is a figure who is still remembered in Australia to this day.
Author: James Maloney | <urn:uuid:08b97bc9-d7fd-4fad-ac5e-ebe696c1def2> | CC-MAIN-2019-04 | http://m.warhistoryonline.com/guest-bloggers/captain-albert-jacka-first-australian-vc.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658681.7/warc/CC-MAIN-20190117020806-20190117042806-00283.warc.gz | en | 0.983277 | 898 | 2.921875 | 3 |
Several functions return information about processes.
list-processes&optional query-only buffer
This command displays a listing of all living processes. In addition,
it finally deletes any process whose status was ‘Exited’ or
‘Signaled’. It returns
The processes are shown in a buffer named *Process List* (unless you specify otherwise using the optional argument buffer), whose major mode is Process Menu mode.
If query-only is non-
nil, it only lists processes
whose query flag is non-
nil. See Query Before Exit.
This function returns a list of all processes that have not been deleted.
(process-list) ⇒ (#<process display-time> #<process shell>)
This function returns the process named name (a string), or
nil if there is none. The argument name can also be a
process object, in which case it is returned.
(get-process "shell") ⇒ #<process shell>
This function returns the command that was executed to start
process. This is a list of strings, the first string being the
program executed and the rest of the strings being the arguments that
were given to the program. For a network, serial, or pipe connection,
this is either
nil, which means the process is running or
t (process is stopped).
(process-command (get-process "shell")) ⇒ ("bash" "-i")
process-contactprocess &optional key
This function returns information about how a network, a serial, or a
pipe connection was set up. When key is
nil, it returns
(hostname service) for a network connection,
(port speed) for a serial connection, and t
for a pipe connection. For an ordinary child process, this function
always returns t when called with a
If key is t, the value is the complete status information
for the connection, server, serial port, or pipe; that is, the list of
keywords and values specified in
make-pipe-process, except that
some of the values represent the current status instead of what you
For a network process, the values include (see
make-network-process for a complete list):
The associated value is the process buffer.
The associated value is the process filter function. See Filter Functions.
The associated value is the process sentinel function. See Sentinels.
In a connection, the address in internal format of the remote peer.
The local address, in internal format.
In a server, if you specified t for service, this value is the actual port number.
:remote are included even if they were not
specified explicitly in
For a serial connection, see
serial-process-configure for the list of keys. For a pipe
make-pipe-process for the list of keys.
If key is a keyword, the function returns the value corresponding to that keyword.
This function returns the PID of process. This is an
integral number that distinguishes the process process from all
other processes running on the same computer at the current time. The
PID of a process is chosen by the operating system kernel
when the process is started and remains constant as long as the
process exists. For network, serial, and pipe connections, this
This function returns the name of process, as a string.
This function returns the status of process-name as a symbol. The argument process-name must be a process, a buffer, or a process name (a string).
The possible values for an actual subprocess are:
for a process that is running.
for a process that is stopped but continuable.
for a process that has exited.
for a process that has received a fatal signal.
for a network, serial, or pipe connection that is open.
for a network, serial, or pipe connection that is closed. Once a connection is closed, you cannot reopen it, though you might be able to open a new connection to the same place.
for a non-blocking connection that is waiting to complete.
for a non-blocking connection that has failed to complete.
for a network server that is listening.
if process-name is not the name of an existing process.
(process-status (get-buffer "*shell*")) ⇒ run
For a network, serial, or pipe connection,
returns one of the symbols
The latter means that the other side closed the connection, or Emacs
delete-process. The value
stop means that
stop-process was called on the connection.
This function returns non-
nil if process is alive. A
process is considered alive if its status is
This function returns the symbol
network for a network
connection or server,
serial for a serial port connection,
pipe for a pipe connection, or
real for a subprocess
created for running a program.
This function returns the exit status of process or the signal
number that killed it. (Use the result of
determine which of those it is.) If process has not yet
terminated, the value is 0. For network, serial, and pipe connections
that are already closed, the value is either 0 or 256, depending on
whether the connection was closed normally or abnormally.
This function returns the terminal name that process is using for
its communication with Emacs—or
nil if it is using pipes
instead of a pty (see process-connection-type in
Asynchronous Processes). If process represents a program
running on a remote host, the terminal name used by that program on
the remote host is provided as process property
process represents a network, serial, or pipe connection, the
This function returns a cons cell
(decode . encode),
describing the coding systems in use for decoding output from, and
encoding input to, process (see Coding Systems).
set-process-coding-systemprocess &optional decoding-system encoding-system
This function specifies the coding systems to use for subsequent output from and input to process. It will use decoding-system to decode subprocess output, and encoding-system to encode subprocess input.
Every process also has a property list that you can use to store miscellaneous values associated with the process.
This function returns the value of the propname property of process.
process-putprocess propname value
This function sets the value of the propname property of process to value.
This function returns the process plist of process.
This function sets the process plist of process to plist. | <urn:uuid:118359da-364a-4dca-90a3-f665d99d1d8f> | CC-MAIN-2019-13 | http://ergoemacs.org/emacs_manual/elisp/Process-Information.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201953.19/warc/CC-MAIN-20190319093341-20190319115341-00392.warc.gz | en | 0.803719 | 1,390 | 2.796875 | 3 |
Form and function
Adult anurans are easily recognized, by the layperson and specialist alike, by the short body and elongated hind limbs, the absence of a visible neck, and the absence of a tail. The compact body has been attained by a reduction of the number of trunk vertebrae and the fusion of tail vertebrae into a single rodlike bone, the coccyx, or urostyle (tail support). The lengthening of the hind limbs has been attained in part by the elongation of two bones (astragalus and calcaneum) in the foot. Considering the variety of habitats occupied by anurans, there is remarkably little gross variation in body plan. The female is usually larger than the male. In most frogs the tympanic membrane is visible as a prominent disk on each side of the head. Correlated with a sound-oriented existence, the larynx is also well developed, often accompanied by single or paired inflatable resonating sacs.
All frogs have poison glands in the skin, well developed in many diverse groups. In the Dendrobatidae the skin secretions are especially toxic (see poison frog). Dendrobates and Phyllobates are small, diurnal frogs living in Central and South America that are brilliantly coloured solid red, yellow, or orange or patterned with bold stripes or crossbars. These bright patterns are believed to act as warning colours to ward off predators. One nonpoisonous South American leptodactylid, Lithodytes lineatus, mimics the dendrobatid P. femoralis, thus gaining protection from predators.
Read More on This Topic
...groups to diverge from ancestral fish-tetrapod stock during the evolution of animals from strictly aquatic forms to terrestrial types. Today amphibians are represented by frogs and toads (order Anura), newts and salamanders (order Caudata), and caecilians (order Gymnophiona). These three orders of living amphibians are thought to derive from a single radiation of ancient amphibians, and...
The biochemical properties of amphibian skin toxins are highly varied, most being complex nitrogenous compounds. The toxically active ingredients are of various types, from local irritants to convulsants, hallucinogens, neurotoxins (nerve poisons), and vasoconstrictors (acting to narrow blood vessels). The medical importance of these ingredients is now being investigated. Although these skin secretions irritate human skin and mucous membranes, they do not cause warts.
The skin toxins of most frogs do not provide security from predators; in fact, frogs are a basic food for many snakes, birds, and mammals. Edible anurans rely on modifications of shape, skin texture, and colour, supplemented by behaviour, to escape detection. These modifications may reach remarkable extremes. Hylids of the South American genus Hemiphractus live on the forest floor among leaf litter and have flattened bodies that enable them to blend well with dead leaves. Several tree frogs, rough-skinned and greenish gray, resemble lichens when flattened out on tree trunks. The coloration of many frogs changes from night to day. In most species the colour is darker and the pattern more distinct by day than by night, but the reverse is true for some tree frogs that inhabit semiarid regions. Colour change is brought about through the stimuli of light and moisture, which create a physiological change and result in contraction or expansion of the melanophores (pigment cells) in the skin.
More difficult to comprehend is the striking array of colours on the hidden surfaces of frogs. Many frogs that are rather dull or uniformly coloured when in a resting position have bright colours or patterns on the flanks, groin, posterior surfaces of the thighs, and belly. For example, the South and Central American hylid Agalychnis calcarifer, when observed sleeping by day, is nothing more than a green bump on a leaf. The eyes are closed, the hind limbs drawn in close to the body, and the hands folded beneath the chin. Upon moving, the frog creates a striking appearance, previously hidden surfaces showing a deep golden orange interrupted by vertical black bars on the flanks and thighs. These so-called flash colours are common in frogs and are thought to serve in species recognition or in confusing predators. Some colour patterns obviously do confuse predators. The South American leptodactylids of the genus Eupsophus have a pair of brightly coloured “eyespots” on the rump. When approached by a potential predator, the frog lowers its head and elevates the rump, thus confronting the predator with a seemingly much larger head.
Structural modifications allow certain specialized frogs to survive dry periods. Some arboreal frogs hide in bromeliad plants, which hold water in the axils of their leaves. Among the Hylidae are genera that have the head modified into a bony casque (“helmet”) and the skin co-ossified with the underlying bone. The head is used by some species to plug the constricted base of the bromeliads and by others to plug up holes in trees, the frogs surviving the dry season by using what little moisture is trapped in the cavity.
Test Your Knowledge
Apples and Doctors: Fact or Fiction?
Most toads of the genus Bufo and many genera in the families Rhinophrynidae, Pelobatidae, Myobatrachidae, Leptodactylidae, Hylidae, Ranidae, and Microhylidae burrow in sand, soil, or mud. Many of these species have the tubercles (small, round nodules) on the middle (metatarsal) part of each foot, modified into a spade-shaped digging organ. The animals are highly resistant to desiccation and conserve water in the body by the mucous skin secretions that tend to make the skin impermeable. This modification is carried to the extreme in some desert frogs, which secrete a cocoon formed of numerous layers of hardened molted skin.
Distinguishing taxonomic features
The superfamilies and families of the Anura are based on anatomical, developmental, and behavioral characteristics. Important anatomical features include the following: the type of vertebrae present, especially with respect to the articulating surfaces, which may be concave on the anterior end of each vertebra (procoelus) or on the posterior side (opisthocoelus) or on both ends (amphicoelus); the presence or absence of intercalary cartilages (between the terminal and penultimate bones of the digits); the state of the pectoral girdle (that is, whether it is firmisternal, with the cartilages of the two epicoracoid bones fused together, or arciferal, with these cartilages separate and overlapping); the presence or absence of an anterior projection, the omosternum, on the pectoral girdle; the presence or absence of teeth on the maxillary bone; and the presence or absence of Bidder’s organ (a rudimentary ovary) in the male. The type of egg and anatomy of the tadpole are often important features. The key behavioral characteristics are primarily those involved with reproduction, such as the type of amplexus and method of egg deposition.
This classification is taken from Ford and Cannatella (1993), the most recent comprehensive classification of higher categories of anurans; extinct groups are not listed. The descriptions of each group are an amalgamation of recent views by various specialists, none of whom has surveyed the entire order. Bombinanura and Pipanura, as specified by Marjanović and Lauren (2007), are node-based names marking significant points of divergence within Anura, and Pipanura is nested within Bombinanura. Families Ascaphidae and Leiopelmatidae are not grouped with other Anuran families. A scanty record of meaningful fossils and inadequate knowledge of the morphology and mode of life history of many kinds of frogs result in inconclusive evidence for the classification of many families; consequently, the following classification must be considered to be tentative.
- Order Anura
- Amphibians lacking a tail in the adult stage; 5 to 9 presacral vertebrae; postsacral vertebrae (posterior to the pelvis) fused into a bony coccyx; hind limbs elongated, modified for jumping; fertilization normally external; eggs laid in water or not; an aquatic larval stage present in most; males usually with vocal cords, vocal sac (resonating chamber), and a voice; about 5,400 living species.
- Family Ascaphidae (tailed frogs)
- 9 presacral vertebrae (i.e., anterior to the pelvic girdle); parahyoid and caudaliopuboischiotibialis (“tail-wagging”) muscles present; stream-adapted tadpoles; northwestern North America; 1 genus (Ascaphus), 2 species; adult length about 5 cm (2 inches).
- Family Leiopelmatidae
- 9 presacral vertebrae (i.e., anterior to the pelvic girdle); parahyoid and caudaliopuboischiotibialis (“tail-wagging”) muscles present; direct development; New Zealand; 1 genus (Leiopelma), 4 species; adult length about 5 cm (2 inches).
- Family Bombinatoridae
- Family Discoglossidae (midwife toads)
- Eocene (55.8 million–33.9 million years ago) to present; usually 8 presacral vertebrae; parahyoid tongue muscle and caudalipuboischiotibialis muscle absent; still-water tadpoles; Eurasia, North Africa, and Philippines; 4 genera, 16 species; adult length to about 10 cm (4 inches).
- Suborder Mesobatrachia
- Superfamily Pipoidea
- Vertebrae opisthocoelous; pectoral girdle arciferal; ribs absent or fused to transverse processes of vertebrae; amplexus inguinal; larvae with paired spiracles and simple mouthparts or with direct development.
- Family Rhinophrynidae (burrowing toad)
- Oligocene (33.9 million–23.03 million years ago) to present; 8 presacral vertebrae; ribs absent; coccyx free, with 2 articulating surfaces; tongue free and protrusible; body robust; burrowing; aquatic larvae present; Mexico and Central America; 1 species; adult length to about 7 cm (3 inches).
- Family Pipidae (tongueless frogs)
- Cretaceous (145.5 million–65.5 million years ago) to present; 6 to 8 presacral vertebrae; ribs present and free in larvae, but fused to transverse processes of vertebrae in adults; coccyx fused to sacrum or free and monocondylar (i.e., with 1 articulation); tongue absent; body flattened; aquatic, direct development or aquatic larvae present; Africa south of Sahara and tropical South America east of Andes; 5 genera, 27 species; adult length 5–20 cm (2–8 inches).
- Superfamily Pelobatoidea
- Vertebrae procoelous with labile centra; pectoral girdle arciferal; ribs absent; amplexus inguinal; larvae with single spiracle on the left and with complex mouthparts.
- Family Megophryidae (South Asian frogs)
- Family Pelobatidae (spadefoots)
- Late Cretaceous to present; 8 presacral vertebrae; coccyx fused to sacrum or free and monocondylar; 9 genera, 88 species; adult length 4 to about 15 cm (1.5 to about 6 inches); 2 subfamilies: Megophryidae (Southeast Asia, Indo-Australian archipelago, Philippines) and Pelobatinae (Europe and North America).
- Family Pelodytidae
- Eocene to present; 8 presacral vertebrae; coccyx free, bicondylar; astragalus and calcaneum fused; western Europe and southwestern Asia; 1 genus, 2 species.
- Suborder Neobatrachia
- Superfamily Bufonoidea
- Vertebrae procoelous; pectoral girdle arciferal (in some, secondarily firmisternal); ribs absent; amplexus axillary; larvae usually with single spiracle, on the left, and complex mouthparts or with direct development.
- Family Allophrynidae
- Family Brachycephalidae
- No fossil record; 7 presacral vertebrae, pectoral girdle partly firmisternal; intercalary cartilages and omosternum absent; Bidder’s organ present in Psyllophryne, absent in Brachycephalus; maxillary teeth present; direct development; southeastern Brazil; 2 genera, 2 species; adult length about 2 cm (1 inch).
- Family Bufonidae (true toads)
- Paleocene (65.5 million–55.8 million years ago) to present; 5 to 8 presacral vertebrae; pectoral girdle arciferal or partly or even completely firmisternal; intercalary cartilages and omosternum absent; Bidder’s organ present; maxillary teeth present or absent; aquatic larvae, direct development, or live birth (Nectophrynoides only); worldwide, except the eastern part of the Indo-Australian archipelago, Polynesia, and Madagascar; Bufo marinus introduced into Australia and some Pacific islands; 27 genera, about 360 species; adult size 2 to about 25 cm (1 to 10 inches).
- Family Centrolenidae
- No fossil record; 8 presacral vertebrae; pectoral girdle arciferal; intercalary cartilages present; omosternum absent; Bidder’s organ absent; maxillary teeth present; terminal phalanges T-shaped; astragalus and calcaneum bones of the foot fused; stream-adapted larvae; Central and South America; 3 genera, about 98 species; adult length 3–7.7 cm (1–3 inches).
- Family Heleophrynidae
- No fossil record; 8 presacral vertebrae with cartilaginous intervertebral joints and a persistent notochord; larvae with large mouths lacking beaks; South Africa; 1 genus, 4 species; adult length 3.5–6.5 cm (1–3 inches).
- Family Hylidae (tree frogs)
- Miocene (23 million–5.3 million years ago) to present; 8 presacral vertebrae; pectoral girdle arciferal; intercalary cartilages present; omosternum absent; Bidder’s organ absent; maxillary teeth usually present; terminal phalanges claw-shaped; astragalus and calcaneum not fused; aquatic larvae or direct development; 37 genera and 630 species; adult length 1.7 to about 14 cm (0.7 to 5.5 inches); 4 subfamilies: Pelodryadinae (Australo-Papuan region), Phyllomedusinae (Central and South America), Hemiphractinae (Central and South America), and Hylinae (North and South America, Europe, Asia except Indian subregion, and Africa north of Sahara).
- Family Leptodactylidae
- Eocene to present; 8 presacral vertebrae; pectoral girdle arciferal; maxillary teeth present; Bidder’s organ and intercalary cartilages absent; omosternum cartilaginous or ossified; 49 genera, about 840 species; adult length 2 to about 20 cm (1 to 8 inches); 4 subfamilies: Ceratophryinae (South America), Telmatobiinae (South and Central America, West Indies), Hylodinae (South America), and Leptodactylinae (South America and Central America).
- Family Myobatrachidae and Limnodynastidae
- Eocene to present; 8 presacral vertebrae; coccyx free, bicondylar; 21 genera, 110 species; adult length to about 10 cm (4 inches); 2 subfamilies: Limnodynastinae (New Guinea and Australia) and Myobatrachinae (New Guinea and Australia).
- Family Pseudidae
- No fossil record; 8 presacral vertebrae; sacral diapophyses round; pectoral girdle arciferal; intercalary cartilages present, ossified; omosternum present; Bidder’s organ absent; maxillary teeth present; aquatic larvae (which grow to a much larger size than the adult); South America east of Andes; 2 genera, 3 species; adult length 2–7 cm (1–3 inches), larval length to 25 cm (10 inches).
- Family Rhinodermatidae
- No fossil record; 8 presacral vertebrae, 1st and 2nd fused; pectoral girdle partly firmisternal; maxillary teeth, intercalary cartilages, and Bidder’s organ absent; omosternum cartilaginous; southern South America; 2 species; adult length 2.5 cm (1 inch).
- Family Sooglossidae
- No fossil record; 8 presacral vertebrae; vertebrae procoelous; sacral diapophyses dilated; intercalary cartilages absent; larvae lacking spiracle; Seychelles; 2 genera, 3 species; length about 4 cm (1.5 inches).
- Superfamily Ranoidea
- Pectoral girdle firmisternal; ribs absent; amplexus axillary; larvae with single sinistral spiracle and complex mouthparts or undergoing direct development.
- Family Arthroleptidae
- No fossil record; 8 presacral vertebrae; vertebral column procoelous with Presacral VIII (biconcave); aquatic larvae or direct development; 7 genera, 74 species; adult size 1.5–13 cm (0.5–5 inches); 2 subfamilies: Arthroleptinae (Africa) and Astylosterninae (Africa).
- Family Dendrobatidae (poison frogs)
- No fossil record; 8 presacral vertebrae; pectoral girdle completely firmisternal; intercalary cartilages absent; omosternum present; Bidder’s organ absent; maxillary teeth present or absent. Larvae carried on backs of adults; Central and South America; 9 genera, about 162 species; adult length 1.5–5 cm (0.5–2 inches).
- Family Hemisotidae
- No fossil record; 7 presacral vertebrae; vertebral procoelous with Presacrals I and II fused; body globular with pointed snout; inner metatarsal tubercle large and spadelike; aquatic larvae; 1 genus, 8 species; adult size 4–8 cm (1.5–3 inches); Africa.
- Family Hyperoliidae
- No fossil record; 8 presacral vertebrae; vertebral column procoelous with Presacral VIII usually biconcave; intercalary cartilages present; 3 or 4 tarsals; aquatic larvae; 19 genera, 226 species; adult size 1.5–8.7 cm (0.5–3 inches); 4 subfamilies: Hyperoliinae (Africa and Madagascar), Kassininae (Africa), Leptopelinae (Africa), and Tachycneminae (Seychelles).
- Family Mantellidae
- No fossil record; 8 presacral vertebrae; vertebral column procoelous; intercalary cartilages present; 3 tarsals; aquatic larvae; 3 genera, 61 species; adult size 2–12 cm (1–5 inches). Madagascar.
- Family Microhylidae
- Miocene to present; 8 presacral vertebrae; vertebrae procoelous or diplasiocoelous; intercalary cartilages usually absent; larvae lacking beaks and denticles (except otophrynines and scaphiophrynines) or undergoing direct development; 66 genera, 306 species; 10 subfamilies: Cophylinae (Madagascar), Dyscophinae (Madagascar), Scaphiophryninae (Madagascar), Asterophryinae (New Guinea and Sulu Archipelago), Genyophryninae (Philippines, eastern Indo-Australian archipelago, New Guinea, northern Australia), Brevicipitinae (Africa), Microhylinae (North and South America, Southeast Asia, Sri Lanka, western Indo-Australian archipelago, Philippines, and Ryukyu Islands), Melanobatrachinae (east-central Africa, India), Phrynomerinae (Africa), and Otophryninae (South America).
- Family Ranidae (true frogs)
- Miocene to present; 8 presacral vertebrae; vertebral column diplasiocoelous (mixed amphicoelous and procoelous); intercalary cartilages present or absent; larvae with single spiracle, on left, and complex mouthparts; 39 genera and about 600 species; adult length about 2–25 cm (1–10 inches); 2 subfamilies: Raninae (worldwide except for southern South America, southern and central Australia, New Zealand, and eastern Polynesia) and Petropedetinae (Africa).
- Family Rhacophoridae
- No fossil record; 8 presacral vertebrae; vertebral column procoelous with Presacral VIII biconcave; intercalary cartilages present; 2 tarsals; aquatic larvae; 10 genera, 203 species; adult size 1.5–12 cm (0.5–5 inches); 2 subfamilies: Buergeriinae (Taiwan and Japan) and Rhacophorinae (Africa, Madagascar, and tropical Asia from India to the Greater Sunda Islands and Philippines).
Modern authorities do not agree on all aspects of anuran classification, and further study is needed to clarify the relationships of certain groups. As a result of unfolding DNA evidence and a continuing transition from a strictly Linnean system to one based on cladistics, the most up-to-date classification of anurans was established by Ford and Cannatella in 1993. At the higher levels, this classification uses node-based names to indicate points of evolutionary divergence between one group and another. This classification differs from a widely used system developed by G.K. Noble in 1931, in which five suborders were recognized, based on vertebral characteristics. The superfamilies given above are not exactly equivalent to the suborders of Noble, the following modifications being most noteworthy: (1) The names Ascaphidae and Leiopelmatidae have been used interchangeably and recognized as distinct by various authorities. (2) The family Myobatrachidae and Limnodynastidae includes what were formerly recognized as Old World members of the Leptodactylidae, a family now considered restricted to the New World. (3) The Brachycephalidae, as recognized by Noble, included the dendrobatids and the peculiar mouth-brooding frog (Rhinoderma), now considered distinct families, as well as several genera (e.g., Atelopus) currently placed in the Bufonidae. Most authorities now restrict the family Brachycephalidae to two genera, Brachycephalus and Psyllophryne. (4) The family Atelopodidae (sometimes spelled Atelopidae) of many authors is now relegated to the Bufonidae. (5) Rhinoderma, which other authors have placed in the Atelopodidae, Leptodactylidae, and Bufonidae, is now given family status. (6) Ford and Cannatella place this family in the superfamily Ranoidea. | <urn:uuid:f1217c26-2e43-4e22-b473-10c4e79e7ef6> | CC-MAIN-2017-30 | https://www.britannica.com/animal/Anura/Form-and-function | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423927.54/warc/CC-MAIN-20170722082709-20170722102709-00560.warc.gz | en | 0.837893 | 5,262 | 3.8125 | 4 |
Alaska Native canoe paddles lost in storm return home
Remember the Tlingit and Haida paddlers who lost their canoes on a recent journey through Southeast? High winds and rough seas capsized the watercraft, dumping hand-carved, red cedar paddles into the ocean.
The canoes were found, and later, some of the paddles. They had a homecoming of sorts a few weeks ago in Yakutat, where they were made. The northern Southeast town is on the eastern edge of the Gulf of Alaska.
A half-dozen students sit and stand around a workbench in the Yakutat High School shop. They’re in a youth arts program that’s part of the community’s annual tern festival.
Each holds an angled cedar plank rough-cut into the shape of a ceremonial dance paddle. A pile of raw boards sits on the bench, surrounded by dark, dusty pieces of crumpled sandpaper.
While an adult volunteer uses a power tool to remove the roughest edges, the teens smooth and shape each piece by hand.
Ninth-grader Jasmine Long, working with sandpaper, already has some experience.
“They had a canoe trip recently over to Wrangell and I helped them with those paddles. And I enjoyed it so much I thought I’d come back and do this one,” she says.
“I was thinking of (painting on) an eagle, since that’s my moiety, and a bear,” she adds.
Watching the work is Doug Chilton, who led the paddle-carving effort for the Wrangell journey.
“This is an introduction stage for the next generation,” he says.
The Juneau-based master carver, who’s also the tern festival’s featured artist, moves in to advise the students. Then he steps back, letting them get a feel for the wood on their own.
“These ones are little miniature dance paddles. And we’ll introduce them to the actual usable paddles that we use. Then I can get them into a canoe. And that’s where I’m at. That’s what I love doing,” he says.
Chilton is president of the One People Canoe Society, which promotes the traditional mode of travel, along with cultural awareness and community-building.
The recent canoe convoy from Juneau to Wrangell helped celebrate the rededication of the community’s Chief Shakes Tribal House.
That put Chilton – and some others – in the midst of some very rough seas.
“Bad weather’s bad weather. We got inside the safety boat, try to make sure everybody’s inside where it’s safe and we just kind of kept an eye on it through the window,” he says.
Two canoes and a couple dozen paddles were lost to the wind and waves.
“There’s not really a lot you can do other than just be sad. It was pretty quiet there for a while after the canoe broke loose. Once it went over we knew the paddles were gone,” he says.
“It was heartbreaking. Our spirits got lowered quite a bit,” says Cynthia Petersen, business manager for Yak-Tat Kwaan, the Native corporation that cosponsors tern festival events.
She watches over the sanding students as she talks about being on board the ill-fated Yakutat canoe.
“A lot of us thought that our ancestors gave us so much to begin with, that they were just taking our paddles as part of it. And for eight of them to get returned, when we had eight paddlers on the journey from Yakutat, was amazing,” Petersen says.
And there the paddles are, one broken and others battered – laid out on a nearby shop workbench.
Chilton walks over to the pile.
“This is one of the paddles that was returned to us. And you can see how the edge is busted off. The Fish and Game officer that brought these to us said they had to wait for this one because there was a bear chewing on it,” he says.
More than a dozen Yakutat paddles are still missing. But those recovered have some time in the water.
Chilton and others in the One People Canoe Society head to Washington’s Olympic Peninsula later this summer for what’s called the Intertribal Canoe Journey and Potlatch.
After that, the paddles return to Yakutat, and the sponsors who helped fund the Wrangell trip.
“It’s interesting. They went on their own journey and they came back,” Chilton says.
Back in the high school shop, Jasmine Long continues smoothing the edges of her ceremonial dance paddle. She’s been involved in dance groups in the past and is working on returning.
“I’ve been going to the practices and I’ve been trying to get back into it.”
She says it feels good to create a paddle she’ll use. | <urn:uuid:03d263c4-a9b8-4993-a000-c000551b157c> | CC-MAIN-2014-35 | http://www.ktoo.org/2013/06/23/paddles-return-to-yakutat-inspire-teens-to-make-their-own/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830323.35/warc/CC-MAIN-20140820021350-00071-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.964374 | 1,107 | 2.546875 | 3 |
The USDA school meals programs serve well over 30 million students per day, nationwide. We rely on our partners in the education realm to help us ensure that these programs—not only programs of great magnitude, but also of great public health importance—are implemented appropriately so that children are healthy and ready to learn. This week’s guest blog from the National Education Association is a testament to their members’ commitment to student health, and the important role that school nutrition plays.
By Roxanne Dove, Director, National Education Association, Education Support Professionals Quality
The nearly half-million Education Support Professionals (ESPs) who are members of the National Education Association play vital roles in helping to create great public schools for our students. ESPs work as bus drivers, custodians, secretaries, classroom paraeducators, food service staff, and in many other jobs as part of a unified education workforce that helps ensure that children are safe, healthy, well-nourished, and well-educated.
As readers of this blog may know, our country’s youth are facing twin crises of obesity and food insecurity — limited or uncertain availability of nutritionally adequate and safe foods. Nearly one in three American children are overweight or obese (White House Task Force on Childhood Obesity: Report to the President, 2010) while 16 million face food insecurity (USDA Economic Research Service, 2013). In a sad irony, food insecurity leads to both hunger and obesity. Because they lack access to or can’t afford healthier food, food insecure families may be forced to choose inexpensive, calorie-dense, nutrient-poor foods.
Childhood obesity is linked to a host of physical health problems, including high cholesterol, high blood pressure, and Type 2 diabetes, both when children are young and when they become adults. Overweight and obese children also have lower self-esteem and are more likely to be victims of bullying and social discrimination. There is a growing body of research linking obesity with poorer academic performance.
As educators, NEA members have both the opportunity and the obligation to address these crises. Students may obtain 30% or more of their total calories at school. For some students, the meals and snacks they receive at school may be their only reliable source of food. Good nutrition can help them do well in their classes. Schools can also teach students habits of healthy eating that can serve them for a lifetime.
The National Education Association believes that every student deserves a great public school. A high-quality school nutrition program is not an add-on or ancillary service, but is an integral part of that great school. That is why we strongly support the Healthy, Hunger-Free Kids Act of 2010.
It is not a simple task to operate school nutrition programs that provide students with nutritious meals, while dealing with rigorous financial and time constraints. These high-quality programs should have:
- High participation rates for school breakfast and lunch – especially in districts with a high number of students eligible for free and reduced-price meals
- efficient purchasing of food items, supplies and equipment
- efficient production of high-quality meals, including meals cooked from scratch
- student acceptance of and desire for new foods, minimized tray waste, food service integrated with student learning, and family and community support for the food service program
Our Food Service Support Professionals members are not just “lunch ladies” — they are skilled and dedicated professionals doing difficult jobs. Students succeed when these ESPs are enlisted as partners, bringing their knowledge and personal connections with students and their families to assist with each one of these program elements.
For instance, NEA member Donna West, a school nutrition manager in Scottsboro, Alabama, says that her goals at work have evolved from just making sure she followed all the rules and regulations at the beginning of her career, to helping students make better decisions about both nutrition and manners. “We help them become an overall better citizen,” West explains. “I see my career differently now that I have come to understand that education support professionals are part of the education process,” says West. “I realized that my role in the cafeteria and trying to help the students learn nutrition is just as important as what’s happening in the classrooms.”
The Healthy, Hunger-Free Kids Act of 2010 recognizes the professionalism of food service staff and their need to continually keep up with the changing requirements of school nutrition, by for the first time requiring annual, ongoing professional development for everyone who works in school nutrition programs. We are currently awaiting the issuance by the USDA of the final HHFKA Professional Standards regulations. NEA is looking forward to working with the USDA, school districts, and allies to connect food service ESPs with training that supports their professional needs and aspirations. We want to ensure that this trainings is relevant, accessible, hands-on, and of high-quality. Only working together can we achieve our common goal of having healthy, well-nourished students who are ready to fulfill their potential. | <urn:uuid:3786405c-80d3-484c-bf44-a60a39edcd0a> | CC-MAIN-2016-22 | http://blogs.usda.gov/2014/07/02/education-support-professionals-partners-in-school-nutrition/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464053209501.44/warc/CC-MAIN-20160524012649-00019-ip-10-185-217-139.ec2.internal.warc.gz | en | 0.964861 | 1,025 | 3.40625 | 3 |
“In a quality life, the sense of fulfilment comes from connection. Look to your rain, look to your land, look to the magical seasons of this earth. Listen to the wind, dance in the mud, then plaster your house with it … living intimately and comfortably with the basic elements brings a deep sense of fulfilment” (Amanda and Andy Bramble, 2010, p.154)
Ampersand Sustainable Learning Center is an intriguing mixture of teaching space, collective building, embryonic community, and a remote eco-home. Situated south of the small town of Cerrillos in New Mexico, Ampersand is at the end of several tracks snaking into the hills. In construction since 2003, the buildings here are mostly hybrid, a mixture of straw-bale walls, adobe and earth bags. Many things have been fashioned from reclaimed items such as salvaged windows, reusing wood, or using an old swivel office chair as a base for a solar oven (thus being able to move it to best catch the sun).
The main house
There is a main house – the home of Andy and Amanda Bramble – and then other more collective spaces such as a straw bale guest house, an outdoor kitchen for guests and another guest building to which a new bathroom was being added. There is also an outdoor solar shower. All the spaces are compact – making use of sleeping platforms, open plan design, and careful placement of furniture – and there is a beautiful simplicity to many of the rooms. There is enough for comfort but not clutter and certainly not an excess of things.
The straw bale and a plaster wall design
This simplicity is also evident in the way everything is designed to be efficient and minimise waste. For example, the solar thermal hot water panel is just outside the bathroom meaning it does not have to travel far to the point of use, and they feed used water into the indoor planter to water the growing vegetables – making multiple uses of what they have.
The outdoor shower
Ampersand is completely off-grid – generating all their electricity from photovoltaic panels, using solar thermal to heat water, collecting all their water via rainwater (into a 2,500 gallon tank) and using a solar oven for cooking. They also warm and cool their house passively. The back of the main house is built into the ground with only a couple of very small windows looking north from the pantry. To the front they have a greenhouse, as this heats up they let heat in through internal windows and when it is cold outside the greenhouse acts as a barrier while still letting the sun in. Their water use also is extremely low, about six gallons each per day. Water is then filtered through a Big Berkley system ready for drinking.
Growing food out here is difficult so they have built a large greenhouse to the front of their house with an indoor planter and created a large storage space – a pantry built into the ground at the back of the house. Refrigeration is limited, they “we harvest ice from an open-topped cistern in the winter to keep our food cold” (p.154) but have to use a propane powered fridge at times in the summer.
Ampersand aims to demonstrate “low-tech sustainable systems which people can do themselves, so that they are not reliant on experts” (Amanda Bramble). There is an emphasis here on having the skills and courage to do it yourself and key to this is starting small and simply learning through the experience of building small structures. It is also about building as a collective endeavour.
Inside and outside a straw bale house at Ampersand Learning Center
I can’t help but fall in love with the simplicity of some of the design and materials used here. In the straw bale guest house there is everything you need and no more or less. Everything is low cost, reclaimed, salvaged, adapted and yet it all has a beauty too. When I asked Amanda what barriers might exist in getting mainstream society to understand and value a place as eclectic as Ampersand she argued that the main obstacles are the “mental constructs of what is acceptable beauty and lifestyle”. Of course it can so easily come down to one’s own choice of aesthetics, but to me this is a place made for the future.
If you are interested in visiting Ampersand they run classes in the spring and summer, volunteer days, have open house visit days, and occasional internships. Details are on their website: http://www.ampersandproject.org/
There is also an article written by Amanda and Andy in Sustainable Sante Fe (2010) ‘On being a beneficial influence: Off grid at Ampersand’ | <urn:uuid:922fdd3a-7684-490e-8f3c-21e858f8fbaa> | CC-MAIN-2018-30 | https://naturalbuild.wordpress.com/2011/03/08/ampersand-learning-center-cerillos-new-mexico-usa/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590901.10/warc/CC-MAIN-20180719125339-20180719145339-00440.warc.gz | en | 0.958672 | 984 | 2.6875 | 3 |
On November 14, 2008, the Charlottesville, VA newspaper, Daily Progress, reported on a recent study conducted by Iggy Provencio of the University of Virginia. That study suggests that some who suffer from Seasonal Affective Disorder (SAD) may have a genetic predisposition to the malady.
In the study, 220 people were tested. Of the 220, 130 were diagnosed as having SAD. Also of the 220, 7 of them were found to have two mutated copies of a gene that directly affects the photopigment in the eye called melanopsin*. While a number of people were found to have only one mutated copy of the gene, all 7 of those with the double mutation were among the 130 diagnosed with SAD.
Exactly what this means, or how it will help, is yet to be determined. Standard treatment for people with SAD is bright light treatment with full spectrum lights, but this treatment is purportedly only effective in about half of all cases, which leaves a large portion of those affected without an effective treament. Study into the genetic aspect may help bring about more information on how to more thoroughly treat this disorder.
*Melanopsin is a photopigment found in our eyes that is, by design, reactive to light, whether as part of or when removed from the body. This makes is a Photorecptor. For those of us who graduated from high school before 2002 (melanopsin was first discovered in 1998), we may remember the other two types of photoreceptors in the eye, the rods and cones. Melanopsin joines them as a newly discovered 3rd.
Unlike the cones and rods, however, melanopsin does not seem to be related to the processing of images or motion. Rather, it seems intrinsically linked to automatic and reflexive responses within our bodies. Among these processes, melanopsin seems to be linked to our body’s circadian rhythms. Our circadian rhythms are what tells us when its time to sleep and wake up. They dictate our daily ‘flow’, of which daylight is a major influence.
Melanopsin was originally discovered in the skin of frogs by Ignacio Provencio and his colleagues in 1998. In 2000, Provencio showed that humans and other mammals also produce Melanopsin, and that for us, it is only found in our retinas. | <urn:uuid:a385ef2a-88cc-4428-8027-f06e6d1fdeb3> | CC-MAIN-2017-22 | http://lighttherapyoptions.com/sad-may-have-a-genetic-component/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608953.88/warc/CC-MAIN-20170527113807-20170527133807-00502.warc.gz | en | 0.97361 | 495 | 3.46875 | 3 |
Note that this narrative was created in collaboration with the Auburn Avenue Research Library on African American Culture and History.
Libraries as a Public Good
During the early years of Colonial America, books (which during this era needed to be imported from Europe) were very expensive and rare commodities. Facing this challenge, wealthy men often pooled resources to maximize their own access to materials by creating private book clubs. These membership organizations evolved into lending libraries that functioned by subscription, giving the membership group the privilege of freely borrowing from a range of materials that they would otherwise find difficulty to afford. Another advantage of club membership was that the clubs met regularly to engage in discussion and debate about issues related to religion and morality, education, politics, philosophy, art, and literature. These privileges were not generally available to non-elite groups, including middle and lower socio-economic classes, and the enslaved.
One of the first of these types of organizations in the American colonies was established in Philadelphia in 1727 by Benjamin Franklin and a group of his friends. The Junto (the meeting) was a mutual improvement group known also as the Leather Apron Club (made up mainly of tradesmen and artisans). This group gave rise to the establishment of the Library Company of Philadelphia on July 1, 1731. Franklin gathered 50 founding shareholders who pooled their resources, contributing 40 shillings and agreeing to pay 10 shillings per year, to purchase and build a library collection. After the Revolutionary War, the Library Company served as the Library of Congress while Philadelphia was the seat of national government. After more than 250 years, the Library Company’s collection has continued to grow and evolve. It serves now as an independent research library focused on American life and culture.
This example offers evidence of the commitment of public leaders, such as Benjamin Franklin, to the view that books, learning, and the creation of spaces for cultural and intellectual engagement are valuable for the community and indeed a public good. Franklin demonstrated his commitment to this view, however, in yet another way. In 1790, he donated a collection of books to a town in Massachusetts (that ultimately named their town after him). The residents of Franklin voted for the books “to be freely available for town members, creating the nation’s first public library” (“First Public Libraries”). With the rise of literacy in the newly formed United States of America, these types of free lending libraries became increasingly popular, and especially so after the American Civil War. To be noted, they did not follow a subscription model. Instead they were governed by boards, funded by taxes, did not charge for services, and were specifically focused on “serving the needs of the general public” (“First Public Libraries”). Along these lines, the first totally tax-supported library was established in Petersborough, New Hampshire, in 1833. The first large public library, containing over 16,000 volumes, was founded in Boston, Massachusetts, in 1848.
Surrounding this evolving American story of free and open access to library collections is quite inescapably the history of discriminatory practices across the nation and over almost the entire time of the nation’s existence. A striking example is the exclusionary racist practice in the South of the denial of access to public facilities and institutions to African Americans (which prevailed until the latter decades of the 20th century). Historically in the South, the notion of public became operationalized as having resources and assets that were funded by tax revenues but that were made available habitually for the privileged use of whites only. Even with the American Civil War occurring during the nineteenth century and the ending of chattel slavery, a “public, but not really open” framework ruled the day and actually became institutionalized in 1896 when the Supreme Court upheld the case of Plessy vs. Ferguson. This ruling created a separate-but-equal model that in both social and legal practice centralized the separateness of resources and assets but without critical attention to establishing and maintaining the material equality of them.
Free and Open Access Libraries in Atlanta
In Atlanta and the remainder of the South, African Americans could not use public libraries freely or openly. The first public library in the South for African Americans was indeed a separate one, established in 1905 in Louisville, Kentucky, with funding from Andrew Carnegie. Born in Scotland in 1835, Carnegie migrated with his family to Allegheny, Pennsylvania, in 1848, where over the course of his life and work as an entrepreneur and business person, he accumulated considerable wealth and exercised a robust commitment to philanthropy. A specific focus of his philanthropy was education and, given his love of reading, also libraries. He funded more than 2800 libraries across the country. One of these libraries was the first public library in Atlanta, funded, as the Louisville library had been, in 1905. Access to the Atlanta Public Library, however, was not available to African Americans—even separate access—until an African American branch was opened at 333 Auburn Avenue on July 25, 1921. From that moment forward, the Auburn Avenue Branch started along its distinctive path as an invaluable anchor for culturally-informed public collections in the City of Atlanta. Over the decades, it has functioned as a repository for a full range of books and materials related to African American history and culture, and has now become a premier public research library, joining other research centers nationally in fulfilling critical roles as a cultural asset, not only for African Americans, but for the nation. These cultural assets were both public (those associated with publicly funded libraries) and private (those established as independent organizations or associated with historically African American colleges and universities).
A basic time line for the Auburn Avenue Library includes the following:
- The director of the branch was Alice Dugged Cary (1921-1929).
- In 1934, the Negro History Collection of non-circulating books was established at the Auburn Avenue Branch.
- In 1936, Annie L. Watters McPheeters became the first African American professional librarian to be hired by the Atlanta Public Library. She was appointed Director of the Auburn Avenue Branch, serving from 1936-1949.
- In 1941, the University Homes Reading Room was established under the supervision of Director McPheeters, with Ethel Hawkins, an assistant librarian at Auburn Avenue and a resident of University Homes, volunteering to manage the room. In 1942, the Reading Room was designated the University Homes Branch and operated until 1962.
- In 1949, with the growing African American population in Westside communities, a third African American branch was established, the West Hunter Branch near the Atlanta University Center. Director McPheeters moved to be director the West Hunter Branch and took the Negro History Collection with her. She remained at the West Hunter Branch until 1966 when she left the Atlanta Public Library to take a position as reference librarian at Georgia State College (later Georgia State University). She was the first African American to hold this position, and she remained there until 1975.
- While she was at the West Hunter Branch, McPheeters was an advocate with several others for the desegregation of the Library , which happened in 1959. The Auburn Avenue Branch was closed to the public, and African Americans could enter the Central Library. However, the expectation was that they could read books in the basement of the building.
- In 1961, Irene Dobbs Jackson became the first African American to receive a library card from the Central Library, marking, for all practical purposes, the end of the segregated Atlanta Library System, a change that occurred as Mayor Ivan Allen, Jr., who became known as a more forward thinking leader as a Southern mayor, took office.
- In 1970, the Negro History Collection was transferred from the West Hunter Branch to the Central Library as a special collection. Francine I. Henderson was appointed the first curator of the collection.
- On November 21, 1971, the Negro History Collection was renamed the Samuel W. Williams Collection on Black America in honor of Rev. Samuel W. Williams, former pastor of the Friendship Baptist Church and Professor of Religion and Theology at Morehouse College. N. Louise Willingham was named the curator of a newly established Special Collections Department.
- In 1993, the Atlanta-Fulton County Library System named the West Hunter Library in honor of Annie L. McPheeters, and at the Auburn Avenue Research Library, they named the main exhibition gallery after McPheeters and Alice Dugged Cary, educator and the first librarian of the Auburn Avenue Branch.
- In April 1994, the Samuel W. Williams Collection on Black America was transferred from the Central Library to the new Auburn Avenue Research Library on African American Culture and History under the administrative leadership of Julie V. Hunter. On May 16, 1994, the Auburn Avenue Research Library on African American Culture and History opened to the public, becoming the first public research library of its kind in the Southeast.
- In 2008, the citizens of Fulton County voted in favor of a $275 million library bond referendum for capital improvements to the Atlanta-Fulton Public Library System. In July 2014, the Auburn Avenue Research Library closed temporarily for renovation and expansion.
- The newly renovated and expanded Auburn Avenue Research Library on African American Culture and History reopened on August 4, 2016, under the administrative leadership of Victor E. Simmons, Jr., following in this position: Julie V. Hunter, Joseph F. Jordan, and Francine I. Henderson.
Creating a Cutting Edge
As noted above, in 1921 the Auburn Avenue Branch Library became one of the first libraries in the country designated for African Americans. In 1994, the Auburn Avenue Research Library on African American Culture and History (AARL) became the first public research library on African American culture and history in the South. This distinction places AARL among the top research libraries in the United States with this mission, including in chronological order of origin:
- The Moorland-Spingarn Research Center was established within the holdings of Howard University, founded in 1867. The collection began with the donation of the private library of African American theologian Dr. Jesse E. Moorland in 1914. He was an alumnus and trustee of the university. This collection, which became known as the Moorland Foundation, was a catalyst for the university to centralize materials related to the Black experience. While several librarians were part of the development of the collection, in 1930 Dorothy B. Porter was appointed as the director. Under her guidance over the next 40 years, the collection expanded substantially and flourished. A key donation during this era came in 1946, when attorney and activist Arthur B. Springarn contributed his large collection of books and other materials. In 1973, the collection was re-organized as the Moorland-Spingarn Research Center, named for these two original benefactors.
- The Schomburg Center for Research in Black Culture, New York Public Library was established in 1925 as the Division of Negro History, Literature, and Prints, a special collection of the 135th Street Branch of the New York Public Library.The agreement for the New York Public Library was signed on May 23, 1895, to be anchored by collections from two former libraries that were not public libraries (Astor and Lenox) with funding from three foundations (Astor, Lenox, and Tilden). The signature facility to house the new combined collections was not completed until 16 years later with the building opening its doors on May 24, 1911. In the intervening years the library established the New York Free Circulating Library in February 1901, with Andrew Carnegie providing funding that same year to build a system of branch libraries in partnership with the city. The 135th Street Branch was opened in Harlem on January 14, 1905, and renamed in 1951 for African American poet and teacher Countee Cullen. In 1926, Puerto Rican-born scholar and bibliophile Arturo Alphonso Schomburg contributed his extensive personal library to the Division of Negro Literature, History, and Prints, and served as the curator of the special collection from 1932 until his death in 1938. In 1940, the Division was renamed the Schomburg Collection of Negro Literature, History and Prints. In 1972, the name was changed again, to the Schomburg Center for Research in Black Culture and designated a research library of the New York Public Library System.
- The Auburn Avenue Research Library on African American Culture and History of the Atlanta-Fulton Public Library System was originally established in 1921 as the African American Branch at 333 Auburn Avenue. After several transitions, it officially re-opened its doors at 101 Auburn Avenue as a research library in April 1994. The Samuel W. Williams Collection on Black America (originally the Negro History Collection of non-circulating books) formed the foundation for the collection, along with various other collections, including, for example, a collection acquired through an adult education project jointly sponsored by the American Association of Adult Education, the American Library Association, and the Julius Rosenwald Fund.
- The Amistad Research Center was originally established in 1966 by the United Church Board for Homeland Ministries at Fisk University in Nashville, Tennessee, to house the historical records of the American Missionary Association, an iconic abolitionist and interdenominational organization formed in 1846. In 1969, the Center became an independent non-profit organization and moved to Dillard University in New Orleans, finding ultimately a permanent home at Tulane University in 1987. With the American Missionary Association records forming the foundation for the Amistad Research Center, the collection expanded over the years to include a range of papers from individuals across many walks of life, focusing on the documentation and preservation of materials related to the history of the African Diaspora and civil rights.
From these beginnings, African Americans increasingly gained free and open access to books, information, and materials, and to public spaces that inspire and encourage intellectual engagement. In Atlanta, they were able to do so from 1921 through the Modern Civil Rights Movement in the Auburn Avenue Branch, the University Homes Branch, and the West Hunter Branch of the Atlanta Public Library. These pioneering public, but segregated, sites were an invaluable community resource that transitioned during during the heart of the Civil Rights Movement into the non-segregated sites of the Atlanta-Fulton County Library System. In the 21st Century, these resources now enable free and open access to all. Most distinctively, African American Librarians, who overwhelmingly were women, expanded, developed, and evolved the Negro History Collection of Non-Circulating Books over almost a century into the Auburn Avenue Research Library in African American Culture and History. AARL has become a dynamic space and infrastructure that preserves and protects books and other materials. It encourages the active participation of all stakeholders, regardless of personal identity, in documenting and celebrating the legacies and ongoing progress and prosperity of African Americans, not only in the City of Atlanta, but also the nation and the world. It functions as a site for the archiving, researching, and curating of African American history, life, and culture. It organizes and hosts a variety of programs, exhibitions, workshops, and more. In providing these services, AARL offers to the City of Atlanta and beyond a sustainable space within which to address and engage the changing needs of a vibrant cultural community within a diverse and complex urban environment. In doing so, AARL enacts in policy and practice the belief that these spaces are precious and vital spaces for the public good.
The long line of people who have played important roles in the history and development of the Auburn Avenue Research Library begins with Alice Dugged Cary, the first educator and librarian to direct the Auburn Avenue Branch. The list of key players continues into the 21st Century.
Annie L. Watters McPheeters (1908 – 1994) was the first African American professional librarian in the Atlanta Public Library. Born in Floyd County, Georgia, McPheeters moved to Atlanta to attend Clark College, where she received a B.A. in English. After graduation she received a B.S. in library science and later an M.S. in library science from Columbia University in New York. McPheeters started her career as a teacher in the public schools of Georgia and South Carolina. In 1934, she was appointed in the Atlanta Public Library at the Auburn Avenue Branch as an assistant librarian and immediately began building the Negro History Collection. In 1936, she was appointed a full librarian, becoming the first professional African American librarian in the Atlanta Public Library System. In 1940, McPheeters married Alphonso McPheeters, an educator, with her leadership as a librarian continuing until her retirement in 1975. In addition to her distinctive professional accomplishments, McPheeters also published several books, including: Scarcity of Children’s Librarians in Public Libraries (1960) and a multivolume collection, Negro Progress in Atlanta, Georgia (1964 and 1972). She worked as a library acquisitions consultant for Pergamon Press. She was actively involved in several community organizations, including: Alpha Kappa Alpha Sorority, the Utopian Literary Club; and she remained a supporter of the Auburn Avenue Research Library throughout the remainder of her life. McPheeters’s story of dedication and excellence offers evidence of the larger story of African American women librarians who were trailblazers in creating, shaping, and advancing libraries in the African American community as a common public good. At AARL, the list includes:
- Alice Dugged Cary
- Mildred Gaines
- Anne Rucker Anderson
- Mae Z. Marshall Shepard
- Annie L. Watters McPheeters
- R. Leathers
- Goldie Culpepper Johnson
- Ethel Hawkins
- Francine I. Henderson
- N. Louise Willingham
- Janice White Sikes
- Julie V. Hunter
With this narrative, we celebrate them all and the longer list of all whom they inspired through their love of books, history, and culture.
Irene Dobbs Jackson (1908 – 1999) was born and raised in Atlanta in the Auburn Avenue neighborhood, the eldest daughter of highly respected Atlanta business and political leader John Wesley Dobbs. She was the first of the six Dobbs daughters to receive the B.A. degree from Spelman College. Graduating at the top of her class, she went on to receive an M.A. in French from the University of Grenoble (France). After returning to Atlanta, she married Maynard Holbrook Jackson, Sr., a graduate of Morehouse College who had also received training from the Garrett School of Divinity at Northwestern University. In 1933, he became the pastor of New Hope Baptist Church in Dallas, Texas, where he was very active as well in politics and community action, and where he served as editor of a newspaper. In 1945, he brought his family back to Atlanta when he became the pastor of the iconic Friendship Baptist Church. During this time the Jacksons became the parents of six children, including their eldest son Maynard, Jr. who would later become the first African American mayor of the City of Atlanta. By 1956, Jackson was widowed and decided to return to France with her six children in tow to complete a PhD in French at the University of Toulouse (France). After completing the degree in 1958, Jackson returned to Atlanta and accepted a position at Spelman as Professor French and Chair of the Department. In 1959, she entered the Central Atlanta Public Library and became the first African American to receive a library card.
Samuel W. Williams (1912 – 1970) grew up in Chicot County, Arkansas. He received a B.A. in philosophy from Morehouse College and master of divinity degree from Howard University with further study from the University of Chicago. He was active in several civil rights organizations (e.g., the Southern Christian Leadership Council, where he was a founding member and vice president; the Community Relations Commission, where he was Vice Chair; the Atlanta Summit Leadership Conference, where he was a founder; and the Atlanta Branch of the NAACP, where he served as president). Williams joined the faculty of Morehouse College in 1946 as Chair of the Department of Philosophy and Religion, where he taught future leaders, such as: Samuel DuBois Cook, who would become President of Dillard University; Maynard H. Jackson, Jr., who would become the first African American mayor of the City of Atlanta; and Martin L. King, Jr, who would become the recognized leader of the Modern Civil Rights Movement. In 1947, he became assistant pastor of Friendship Baptist Church and pastor in 1954. After his death in 1970, the Atlanta Public Library renamed the Negro History Collection of Non-Circulating Books the Samuel W. Williams Collection on Black America on November 21, 1971.
- Amistad Research Center. http://www.amistadresearchcenter.org/. 9 August 2017.
- “Andrew Carnegie.” https://www.biography.com/people/andrew-carnegie-9238756. 10 August 2017.
- “Annie L. McPheeters (1908 – 1994).” New Georgia Encyclopedia. http://www.georgiaencyclopedia.org/articles/education/annie-l-mcpheeters-1908-1994. 10 August 2017.
- At the Instance of Benjamin Franklin: A Brief History of the Library Company of Philadelphia. Revised and Enlarged Edition. Philadelphia: The Library Company of Philadelphia, 2015.
- Auburn Avenue Research Library. http://www.afpls.org/aarl. 9 August 2017.
- “Benjamin Franklin’s Junto and Lending Library of Philadelphia.” http://nationalhumanitiescenter.org/pds/becomingamer/ideas/text4/juntolibrary.pdf9 August 2017.
- “A Case Study: Atlanta.” A History of US Public Libraries. Digital Public Library of America. https://dp.la/exhibitions/exhibits/show/history-us-public-libraries/segregated-libraries/case-study-atlanta. 7 August 2017.
- “The Countee Cullen Library.” https://www.nypl.org/about/locations/countee-cullen. 10 August 2017.
- “First Public Libraries.” A History of US Public Libraries. Digital Public Library of America. https://dp.la/exhibitions/exhibits/show/history-us-public-libraries/beginnings/first-public-libraries. 7 August 2017.
- “History of the New York Public Library.” https://www.nypl.org/help/about-nypl/history. 10 August 2017.
- “Irene “Renie” Dobbs Jackson, 1908-1999.” http://sweetauburn.us/rendobbs.htm. 10 August 2017.
- “Jackson, Maynard Sr. (1898-1953).” http://www.blackpast.org/aaw/jackson-reverend-maynard-sr-1898-1953. 10 August 2017.
- The Library Company of Philadelphia. http://librarycompany.org/about-lcp/. 9 August 2017.
- Moorland-Spingarn Research Center. http://library.howard.edu/msrc. 9 August 2017.
- The Schomburg Center for Research in Black Culture. https://www.nypl.org/about/locations/schomburg. 9 August 2017.
- The Spelman College Archives. http://www.spelman.edu/about-us/archives
- Wells, Rosa Marie. “Samuel Woodrow Williams, Catalyst for Black Atlantans, 1946-1970” (1975). ETD Collection for AUC Robert W. Woodruff Library. Paper 687.
- Page Author: Jacqueline Jones Royster, Dean, Ivan Allen College of Liberal Arts
- Building Memories Project Team:
- Jacqueline Jones Royster, Executive Producer
- Steve Hodges, Project Manager
- Gene Kansas,Co-producer, Building Memories Podcast
- Stephen Key, Co-producer, Building Memories Podcast
- Partner: Auburn Avenue Research Library, http://www.afpls.org/aarl | <urn:uuid:5057cdce-3991-4fed-bc20-2ef916775473> | CC-MAIN-2022-49 | https://www.communitieswhoknow.com/project/auburn-avenue-research-library/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711064.71/warc/CC-MAIN-20221205232822-20221206022822-00184.warc.gz | en | 0.955738 | 5,040 | 3.859375 | 4 |
Using this Guide
List of other study guides
R[asipuram] K[rishnaswamy] Narayan (1906-2001) is unusual among Indian authors writing in English in that he has stayed contentedly in his home country, venturing abroad only rarely. He rarely addresses political issues or tries to explore the cutting edge of fiction. He is a traditional teller of tales, a creator of realist fiction which is often gentle, humorous, and warm rather than hard-hitting or profound. Almost all of his writings are set in the fictional city of Malgudi, and are narrowly focused on the lives of relatively humble individuals, neither extremely poor nor very rich.
The Guideis one of his most interesting books, which begins as a comic look at the life of a rogue, but evolves into something quite different. It should be noted that Narayan is not a devout Hindu, and has accused Westerners of wrongly supposing that all Indians are deeply spiritual beings; but it is also true that he was deeply impressed by some experiences he had with a medium after the sudden death of his young wife (described movingly in The English Teacher (1945).
Narayan has stated that the incident of the reluctant holy man was based on a real event which he read about in the newspaper.
Why do you think Narayan chooses such an unusual way to introduce us to Raju? An anna is a very small coin. A maharaja is a traditional Indian prince. After the barber announces that Raju looks like a maharaja, the narrative takes an abrupt turn into the past. The incident of the villager who has come to consult with him in the next paragraph happened long ago.
Narayan further complicates the narrative flow by glancing forward to a time when he will tell this villager, named Velan, his life story, which brings him to Rosie, who will be introduced into the novel later. He then abruptly springs back into the distant past to briefly tell the story of his childhood and then return to Velan and his problem. Note the blank lines he has inserted in the narrative to mark the points at which the setting changes.
Explain the title of the novel. Traditional Indian temple dancers were dedicated to dancing for the gods, particularly Krishna. However, they also traditionally supported themselves through prostitution, and temple-dancing was eventually suppressed. Modern "classical dancers" are often highly respectable women who practice the art out of devotion to dance rather than religion. Look for passages in the novel which portray both negative and positive images of such dancers. "Betel leaf" is the mild stimulant chewed by many Indians and wrongly called "betel nut" because it is often served wrapped around an areca nut. "Parched gram" is roasted lentils, a staple in India. The pyol is a sort of front stoop where Indians often visit with neighbors and watch the world going by. Tamil is one of the many important languages of India, especially common in the south. Narayan has depicted himself as a poor student and a rebellious son, a self-portrait he has repeated over and over from Swami and Friends (1935) forward. What attracts the boy Raju more than his lessons?
The story told about the Buddha is one of the most common lessons attributed to him; but would not necessarily be widely known by Indians, few of whom are Buddhists. What is its meaning? How do you think Raju is able to predict what Velan will say when he begins discussing his troubles? Note that Velan wants to treat Raju as a saint: a theme that will recur later in the novel. Why does Raju hope the girl is uninteresting? Jewelry is a necessity for any woman in India: a form of bank account and a sign of respectability. Thefts of such jewelry are quite rare. Idli are small steamed cakes of ground rice and fermented lentils, usually eaten for breakfast. Raju is posing as a holy man. How good is he at it?
Another flashback returns us to his childhood for a few pages. Fermented lime-pickle, intensely sour, is a favorite Indian condiment, or chutney. What do we learn about his character from this story? Can you see any qualities that he may have inherited from his father? The fact that he never heard the end of the story about Devaka may foreshadow the end of his own story. Devaka was the grandfather of the god Krishna on his mother's side.
"Transmigration" means reincarnation, another life. How useful is Raju's message to Velan?
We now return to Raju's childhood. Recitation aloud is the traditional method of education. What kind of school does he attend? Jaggery is a brown crystalline sweetener made from the sap of the kitul palm.
Raju interrupts the story of his education to return to Velan. A "partition suit" would be a lawsuit involving property lost in the division ("partition") of India at independence, when Pakistan was created out of the northern regions. Marriage with cousins is not uncommon. Almost all weddings are planned with the advice of astrologers. Why does he gain such a reputation as wise man ( yogi )? A "great soul" is a mahatma, the title given to Mohandas K. Gandhi. What do you think are Raju's real motives for seeking isolation and quiet? Note Raju's fear that Velan might suppose that he didn't need food. In fact in the last and holiest stage of a Hindu mystic's life he should voluntarily starve to death. Temples are everywhere in India; it is not at all implausible that someone should show up and announce himself as priest of an abandoned one. There is no formal priesthood, no systematic way to become a holy man: one merely earns the respect and veneration of other worshipers. A plantain is a large, firm, rather bland relative of the banana: a very cheap source of nourishment. What indication is there that the boy is not awed by Raju?
We return again to the narrative of his childhood. Bagpipes were introduced into India by the British, and often played at festive official events. The coconuts are broken on the tracks as an act of sacrifice, but there is also an analogy to smashing a bottle of champagne on the prow of a new ship when it is launched. A jutka is a modest horse-drawn taxi. "Horse gram" is grain to feed the horse. Raju was exposed to fraud early in his life. What effect do you think it had on him?
Back to "the present." Describe Raju's thoughts and behavior during the negotiations with the schoolmaster. The Ramayana is the traditional epic of the heroic deeds of the god Rama, the most popular collection of stories in India.
Again we go back into Raju's childhood. "Biscuits" are baked goods like cookies, rather than what Americans call biscuits. What skills did Raju learn while working in the station shop?
His own exceedingly informal education provides the background for the next scene, where he "teaches" the children. Why does Raju urge independent thought on his listeners. What effects do the villagers' belief in him have on Raju?
Again we return to Raju's youth. Why do you think the novel alternates between the story of Raju's career as a guru and his earlier life? How did he become a guide? What are his opinions of travelers? Parvathi (more commonly "Parvati") is the consort of the god Shiva. According to this legend, she would have voluntarily leapt into a fire, creating the source of the Sarayu River, which flows into the Ganges. This is not a common story about Parvathi. Can you tell me whether Narayan is just making it up? What kind of guide is he? What sorts of techniques does he use? Note how casually Rosie is introduced into the story, long after we have been told about her influence on Raju's life. The dhoti is a common loose, baggy cloth used as trousers by men. A jibba is a sort of shirt. Cobras are actually deaf: what they react to is the swaying of the been , the snake-charmer's instrument here called a "flute." It is actually a rather nasal-sounding reed instrument with a gourd at one end to develop the sound. A tout is a sort of go-between who arranges and promotes business. How does Raju's passion for Rosie develop? Traditional Indian housewives cook and serve while the men eat, then eat their own food afterwards. "Lead, Kindly Light" is the title of a popular hymn. Why did Rosie marry her husband? A dhobi is a laundry. Note that at the time this novel was written Raju's persistence at the end of the chapter would not have been viewed as negatively as it might be today.
Back to the village temple. Dasara (also called Dussehra or Durga Puja) is devoted to the powerful goddess Durga. Deepavali (now usually called Divali ) is the annual festival celebrating the return of the sun after the rainy season, very popular all over Hindu India and celebrates the victory of Rama over Ravana. Since Durga is a famous demon-slayer, both are festivals celebrating victories over demons. More information on Dasara. More information on Deepavali. How is Raju being affected by his life as a holy man? Swamiji: "-ji" is an honorific suffix. The villagers are not as unusually superstitious as one might suppose; many Westerners wondered in the fifties whether jet planes and nuclear bomb tests might have altered the weather. What are the main effects of the drought? Raju got the idea of threatening a fast in order to stop the fighting from Mahatma Gandhi, who put an end to violent conflicts during the struggle for independence by fasting nearly to death. How is his threat transformed? When Velan says "We derive merit from watching your face" he is alluding to the Hindu belief in darshan, according to which witnessing holy objects or persons is a spiritual blessing. Velan's description of the proper procedures for Raju to follow are those used by the real holy man on whose story this novel is based. Sadhu: holy man. Why doesn't Raju run away? At the end of the chapter we learn how Raju came to be telling Velan the story which makes up the rest of this novel.
Jawaharlal Nehru, close associate of Gandhi in the struggle for independence, was India's first prime minister (1947-1964) . Who do you think is most to blame for Rosie's unhappiness? Why? Why do you think Raju has not referred to her dancing again? Nataraja is an incarnation of the creator/destroyer God Shiva, who danced the world into existence. More information about Nataraja. Why does he encourage her dancing? A pundit is a scholar. The Ramayana and the Mahabharata are the two classical epics of Hinduism, filled with tales often enacted by dancers. The main theme of temple dancing is love for a god, expressed in the metaphors of human love between woman and man. This is why Rosie says "Lover means always God"--in this case Krishna, who was born as a human and passed through all the stages of mortal life. What is the effect of her dancing on Raju? What are "Marco's" attitudes toward his wife? What do you think has happened to change Rosie's behavior toward Raju? When Raju talks about suffering "the usual symptoms," what is he referring to? A "tank" is a reservoir such as all Hindus like to have nearby for bathing, washing clothes, etc. According to one legend, the River Ganges tried to destroy the god Shiva, but he absorbed it into his hair.
Discuss Raju's mother's reactions to Rosie and how they change. What was Marco's reaction to Rosie's desire to dance? Othello murdered his wife Desdemona out of (mistaken) jealousy. What does Rosie mean by saying "I thought that Othella was kindlier to Desdemona?" What does Raju's mother think is the solution to dealing with problematic husbands? Savitri succeeded in persuading Yama, the god of death, to restore her husband Satyavan to life. She is the archetype of the devoted wife in Hindu mythology. Just as most students in Narayan's fiction do poorly in school, most of his businessmen go bankrupt. Saithan: devil.
What conflicting feelings does Raju's mother have toward Rosie? A godown is a sort of warehouse. What is Raju's reaction to his legal problems? Note how the power of the extended Indian family sweeps over the individual when Raju's uncle arrives. Pan or Paan is betel leaf wrapped around areca nut, the habitual stimulant of many Indians. "Quit" means "leave." Meena Kumari was a Hindi film star famous for her dancing. It is as if an American actress of the fifties were trying to choose a stage name and her boyfriend suggested "Marilyn Monroe"--hardly original, or practical. Note how Rosie's artistry overcomes the doubts of the Union officials. Temple-dancing was still struggling to overcome its negative reputation.
What effect does it have to alternate the story of Raju's success with Rosie with his troubles as a holy man in the village? Why isn't his life story in strict chronological order? How does Raju react to Rosie's success? Saraswathi is a goddess of knowledge and scholarship. Her image is often placed in libraries. Sabha: village council . How does Raju's tendency to simply forget about troublesome issues complicate his life? What do you make of Rosie's change in attitude toward Marco? Karma is fate.
Brinjalsare eggplants. Which of Raju's personality traits are manifested in prison? What affect does his imprisonment have on Rosie/Nalini?
Finally the narrative times fuse together as Raju finishes telling the story of his life to Velan. What effect does it produce to have this chapter follow the story of his disaster with Nalini? How is Raju changed by his fast? Why does the anti-malaria film fail to deliver its intended message? What do you think of the end of the novel? Is it ambiguous? What tone do you think it has: sad, comic, tragic . . . ? What evidence is there that Raju is deluded at the end?
Notes by Paul Brians, Department of English, Washington State University, Pullman 99164-5020.
For more about Narayan and other South Asian writers, see Paul Brians' Modern South Asian Literature in English .
First mounted May, 1995
Last revised September 24, 2008.
This page has been accessed times since June 6, 1997. | <urn:uuid:8a219121-12c4-4d2d-ae3f-1f551c5d2cdd> | CC-MAIN-2014-15 | http://public.wsu.edu/~brians/anglophone/narayan.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223205375.6/warc/CC-MAIN-20140423032005-00293-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.978396 | 3,136 | 2.515625 | 3 |
Last September, we reported that food additives and colorings were linked to Attention Deficit Hyperactivity Disorder (ADHD) in children. In fact, all children are affected, not just those who develop ADHD. Despite calls from activists to ban artificial food dyes, many of which are derived from petroleum and coal tars, the FDA insists they are safe. Now, the UK is taking these concerns seriously and calling for voluntary ban by next year.
US companies have taken the UK’s voluntary ban seriously by removing additives for the EU market. Mars has removed artificial colors from Skittles and Starbust sold overseas, as has Kraft removed color additives from Lunchables. Sorry American children, but you are still getting these nasty treats filled with artificial ingredients linked to hyperactivity. Kraft claims US consumers are more concerned with calories and fat content than artificial colorings, and thus they remain in the US market.
An out right ban in the UK would require a total ban by the entire EU. Foods Standard Agency chair Dame Deirdre Hutton explained:
The evidence we have suggests it would be sensible for these [colourings] to be taken out of food. We would like to see the use of colours phased out over a period. That does require mandatory action by the EU.
A total EU ban could take several years.
I am beginning to think that children in the UK are safer than their American counterparts. First the EU phases out pthalates, then the US insists they are safe. Now the FDA is ignoring the safety of food additives. Michael F. Jacobson, executive director of the Center for Science in the Public Interest, explains it best, “At the very least, they ought to give some consideration to what the British government is doing.” Thank goodness my kids eat only organic, natural food.
Image: Baltimore Sun | <urn:uuid:0060b8d9-347e-412a-a677-69c497ad0ebf> | CC-MAIN-2014-42 | http://ecochildsplay.com/2008/07/23/will-the-uk-ban-food-colorings-to-reduce-adhd-and-how-will-the-fda-react/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444774.49/warc/CC-MAIN-20141017005724-00121-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.966432 | 378 | 2.53125 | 3 |
Employment and Employability
Previous research on how Information and Communication Technologies (ICT) can support socio-economic inclusion processes for groups at risk of exclusion, namely migrants and youth at risk, provides evidence of the relationships between ICT and employability.
There is, for example, evidence that the adoption of ICT increases the demand for skilled workers and reduces it for unskilled workers. Access and ability to use technology also affects employability by shaping the decision to enter the labour market and to invest in training, and the likelihood of obtaining job offers. Possessing digital skills increases the probability of being employed, especially for older workers. Digital skills significantly increase wage levels; and ICT skills increase the likelihood of older workers remaining employed. Digital skills also increase the opportunities for life-long learning.
Likewise, the rise of the internet has brought about major changes in how individuals look for jobs and the factors that shape their success: job matching services and individual factors, such as a person's motivation and social networks, are crucial.
From another perspective, telework has the potential as well to bring jobs to people who would otherwise be excluded from the labour market because of their life condition, disability, or family commitments to state a few examples.
These partial but encouraging findings have prompted IPTS to pursue a more systematic research approach in order to provide more solid theory and evidence to support policy orientation in the fields of employment, social inclusion and ICT for inclusion (eInclusion).
of Work: policy relevance of trends and socio-technical innovations
A key policy concern of the Members States in the EU is the need to stimulate the creation of employment as part of the 'job rich recovery'. This is happening at a time when the nature and organisation of work is changing rapidly: industry demands more flexible work organisation to maintain competitiveness, globalisation changes the supply and demand for labour and new uses of information and communication technologies (ICTs) change the practices and possibilities of work. (More on The Future of Work...)
Literature review on ICT for employability
As a first step in establishing a policy-oriented research line in ICTs for employability, this study will provide a survey and analysis of contemporary theoretical approaches and frameworks used and developed in research, covering:
- employability, its dimensions and factors affecting it in general;
- employability concepts as developed in relation to groups at risk of exclusion: namely migrants, youth and older workers. These concepts include consideration of the specific barriers and pathways to employment for these groups, with particular attention to the low skilled in each group;
- how and why ICTs affect employability dimensions and employability factors (as described in 1);
- how ICT can contribute to employability, support reducing barriers and create pathways to employment for the three specific groups at risk of exclusion
This review will help IPTS, in conjunction with leading researchers in the field, to provide a map of available evidence, identify research gaps and challenges, and define a programme for developing further research and evidence for policy support.
Final reports of this study:
- Literature Review on Employability, Inclusion and ICT, Report 1: The Concept of Employability, With A Specific Focus on Young People, Older Workers And Migrants (2012). Anne Green, Maria de Hoyos, Sally-Anne Barnes, David Owen, Beate Baldauf and Heike Behle, JRC-IPTS Technical Note (Forthcoming)
- Literature Review on Employability, Inclusion And ICT, Report 2: ICT And Employability (2012). Maria de Hoyos, Anne E. Green, Sally-Anne Barnes, Heike Behle, Beate Baldauf and David Owen, JRC-IPTS Technical Note (Forthcoming)
- Literature Review on Employability, Inclusion And ICT, Report 3: Database of example practices on how ICT can support employability four young people, older people and migrants (2012). Heike Behle, Sally-Anne Barnes, Beate Baldauf, David Owen, Anne Green and Maria de Hoyos
- Literature Review on Employability, Inclusion And ICT, Report 4: Review of available data sets on employability and ICT(2012). David Owen, Heike Behle and Beate Baldauf
If you require pre-publication copies of these reports please e-mail james.stewart(at)ec.europa.eu
- "What can Social Capital and ICT do for Inclusion?" (2007), Author: D Zinnbauer. JRC Scientific and Technical Report: EUR 22673 EN
"Revisting eInclusion: from Vision to Action
" (2006), Authors: A Bianchi, S Barrios, M Cabrera, R Cachia, R Compañó, N Malanowski, Y Punie, G Turlea, D Zinnbauer, C Centeno. JRC Scientific and Technical Report: EUR 22549 EN
Clara Centeno, Clara.Centeno(at)ec.europa.eu
James Stewart, James.Stewart(at)ec.europa.eu | <urn:uuid:7d1fe2d8-e694-4ffb-9c82-b176a936885a> | CC-MAIN-2015-14 | http://is.jrc.ec.europa.eu/pages/EAP/eInclusion/employability.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298889.70/warc/CC-MAIN-20150323172138-00226-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.879716 | 1,059 | 2.671875 | 3 |
In an effort to protect newborns sensitive skin from being damaged by the removal of conventional medical tape, a group of researchers has developed a new design based on the adhesiveness of spider webs. The Chart reports:
… the researchers have designed a tape with three layers. On top is the non-sticky backing, and a sticky layer clings to the skin, as usual. But the middle layer has an anti-adhesive coating. Using a laser, researchers etched a pattern into this middle layer so that they could control how the adhesive and backing interact.
“By controlling those interactions, we were able to define a regime where the adhesive could secure devices very strongly to the skin, but was very easy to remove,” [Jeffrey Karp, PhD, researcher at Brigham and Women’s Hospital in Boston] said.
The concept appears to “offer a major advantage by providing adhesion and anchoring without causing damage to the skin,” said Dr. Michael Katz, interim medical director of the March of Dimes Foundation.
The researchers’ findings (subscription required) were published yesterday in the Proceedings of the National Academy of Sciences. The scientists note that the medical tape design is still conceptual and has yet to be clinically tested. | <urn:uuid:188a8b38-ba1f-4c60-96ce-9fad156efd12> | CC-MAIN-2015-48 | http://scopeblog.stanford.edu/2012/10/30/researchers-turn-to-spider-webs-to-design-improved-medical-tape/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398448506.69/warc/CC-MAIN-20151124205408-00247-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.967116 | 259 | 2.609375 | 3 |
By Megan Doyle
Despite the challenges, the dollar value of annual food waste could be reduced by nearly $700 billion if businesses, governments, consumers, and action groups work together, BCG notes.
Small and midsize enterprises (SMEs) are among the most critical catalysts for widespread change. From food production to consumption, SMEs can be found across the global supply chain. The BCG report recommends a number of initiatives and best practices SMEs can adopt to cut down on how much food is wasted while actually improving their own bottom lines.
Members of the supply chain have little visibility into just how much food is wasted, BCG found. The report notes the role SMEs can play to help educate farmers, producers, employees, and consumers to increase awareness. For example, they can teach farmers how to better protect crops during and after harvest, and they can train employees to effectively manage inventory and recycle and repurpose by-products and waste.
SMEs also can improve awareness among consumers by introducing promotions that highlight the importance of waste reduction. For example, one U.S. grocery chain recently unveiled a “Zero Hunger, Zero Waste” initiative to elicit consumer insight on food waste reduction.2
In addition, improved packaging can be used to better preserve goods. For example, one way to reduce spoilage—and increase profit margins—is to pack fresh fruit and vegetables with ethylene-absorbing strips. This can increase the shelf life of fresh strawberries by up to 50 percent.3
Storage and transportation companies, which comprise a large part of the global food supply chain, could play a major role in reducing waste. With the right infrastructure and equipment—for example, advanced cold-chain containers—perishable food can be preserved for significantly longer periods of time. Yet less than 10 percent of all perishable foods are currently being refrigerated while transported through the supply chain.4
In addition, cold-chain containers can be managed remotely to ensure consistency in temperature, humidity, etc., further reducing food spoilage and waste. According to one shipping container company, remote container management and a controlled atmosphere can extend transit times for some fruits and vegetables by more than a month.5
To date, many supply-chain efficiency efforts have focused on improving manufacturing speed and equipment, not reducing the amount of food wasted. Many companies have been slow to adopt digital supply-chain technologies that can closely track waste, cut costs, and increase efficiency. For example, some digital supply-chain tools can track supply and demand data to prevent overproduction. Other tools can create dynamic pricing schemes to quickly move products through the supply chain before they expire.6
Some major retailers are using automation capabilities to better manage inventory and fill their shelves at a faster pace.7 Another option to improve efficiency and reduce waste is to localize the supply chain, which reduces the amount of time food products spend in transit.8
Collaboration among all parties and stakeholders, from production to consumer, also is key, according to BCG. By working together, food producers, public agencies, and other companies can collect and share data regarding consumer demand. This can improve supply and demand forecasting to match consumer needs without overproduction.9
Research shows companies that are effective at addressing societal challenges like food waste can see margins up to 3.3 percentage points higher than others.10 Businesses working to reduce food waste also could see their costs come down due to greater supply-chain efficiency.
In addition, new revenue streams can be found by transforming wasted food and by-products into new products. For example, one company is using biorefining technology to transform by-products from olive oil mills into cosmetic, agricultural, and construction products. Other companies are repurposing leftover food into animal feed and converting oil waste into biodiesel fuel.11
Food waste is a costly, global issue. Tackling the problem calls for a mix of factors, including awareness and collaboration throughout the global supply chain, infrastructure and equipment updates, and the adoption of digital technologies. SMEs have the opportunity to lead the initiative through a number of techniques and best practices—and could realize business benefits in the process.
Megan Doyle is a business technology writer and researcher based in Wantagh, NY, whose work focuses primarily on financial services technology.
1. “Tackling the 1.6 Billion-Ton Food Loss and Waste Crisis,” BCG; https://www.bcg.com/publications/2018/tackling-1.6-billion-ton-food-loss-and-waste-crisis.aspx
2. “How Large Food Retailers Can Help Solve the Food Waste Crisis,” Harvard Business Review; https://hbr.org/2017/12/how-large-food-retailers-can-help-solve-the-food-waste-crisis
3. “Tackling the 1.6 Billion-Ton Food Loss and Waste Crisis,” BCG; https://www.bcg.com/publications/2018/tackling-1.6-billion-ton-food-loss-and-waste-crisis.aspx
4. “Cold Chain Critical in Reducing Global Food Waste,” Global Cold Chain Alliance; https://www.gcca.org/cold-chain-critical-reducing-global-food-waste
5. “We care for the fruits of your labour,” Maersk; https://www.maersk.com/solutions/shipping/ocean-transport/refrigerated-cargo/fruit-and-vegetables
6. “Tackling the 1.6 Billion-Ton Food Loss and Waste Crisis,” BCG; https://www.bcg.com/publications/2018/tackling-1.6-billion-ton-food-loss-and-waste-crisis.aspx
7. “How Large Food Retailers Can Help Solve the Food Waste Crisis,” Harvard Business Review; https://hbr.org/2017/12/how-large-food-retailers-can-help-solve-the-food-waste-crisis
8. “Tackling the 1.6 Billion-Ton Food Loss and Waste Crisis,” BCG; https://www.bcg.com/publications/2018/tackling-1.6-billion-ton-food-loss-and-waste-crisis.aspx
10. “Total Societal Impact from Five Industries, BCG; https://www.bcg.com/en-us/publications/2017/corporate-development-finance-strategy-insights-total-societal-impact-five-industries.aspx
11. “Tackling the 1.6 Billion-Ton Food Loss and Waste Crisis,” BCG; https://www.bcg.com/publications/2018/tackling-1.6-billion-ton-food-loss-and-waste-crisis.aspx | <urn:uuid:4d413598-9bb6-459d-aa7a-45de9a95eb03> | CC-MAIN-2019-47 | https://www.americanexpress.com/us/foreign-exchange/articles/food-waste-challenge-to-global-supply-chain/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670162.76/warc/CC-MAIN-20191119172137-20191119200137-00341.warc.gz | en | 0.898271 | 1,487 | 3.1875 | 3 |
Why you should care
Because the electorate is getting younger, and so should our presidents.
Much has changed since the Constitution was written in 1787. America has witnessed the advent of steam engines and microchips, the abolition of slavery and a doubling of life expectancy — which in the late-18th century tapped out at around age 40.
Here’s something that hasn’t changed: our adherence to the constitutional clause that requires presidents to be 35 or older. When we look to the leading parties’ nominees, we don’t just see a misogynistic lunatic and a Democrat. We see a 70-year-old and a 69-year-old with a demonstrated ability to maneuver in (and around) a democracy that many voters no longer trust. Article II, Section 1, Clause 5: You’ve let us down.
Allegedly, the clause was meant to not just ensure our presidents had a certain level of maturity (or, perhaps relatedly, to exclude young Alexander Hamilton from the White House). It was a safeguard against monarchy and, more generally, hereditary rule. Remember the whole fleeing-the-crown-in-England thing? But one look at the political landscape suggests that clause hasn’t done such a great job at preventing family rule. Indeed, should we see a two-term Clinton presidency, it’d mean two American families controlled the White House for 28 out of 36 years.
Arguably, the clause has instead abetted a reverse ageism in the halls of power, signaling, as it does, that those under 35 lack the maturity for the most important of jobs. Congress has its own age floors (30 for the Senate, 25 for the House), and only 27 congressmen and congresswomen, out of 435, are under 40. It’s strange: There’s plenty of public talk about diversity in gender and race, but even though millennials now match boomers as the largest slice of the electorate, there’s hardly any talk about age diversity.
What does this mean for policy? The most pressing issues for millennials — student debt, parental leave, asset creation — are being addressed (or not addressed) by people who no longer worry about such matters. “Young people get screwed by the federal budget, in part because there aren’t more young people” in office, says Alexandra Acker-Lyons, a political consultant on millennials and the youth vote. “We’re spending a lot of more money caring for a shrinking population than investing in a future generation,” says Acker-Lyons. Shouldn’t we be represented equally in our country’s decision-making bodies?
We’re not the only ones thinking this way. This summer, rum maker Captain Morgan started a whole campaign on abolishing the presidential age floor, citing a litany of folks who achieved bigly under the age of 35: Martin Luther King Jr. gave his “I Have a Dream” speech at 34, and Joan of Arc led her campaign at 19. But you need not look to history: Mark Zuckerberg, who has done more than anyone else to revolutionize how we think about community (and became a gazillionaire in the process) is all of 32.
To be sure, certain experiences come only with age. But that’s not always a good thing: In fact, the more experienced you are, especially in politics, the more likely you are to hesitate stepping outside of party dogma. The longer you’re in an institution, the more calcified you become. Indeed, research has shown that millennials are more likely to work in bipartisan ways, Acker-Lyons says. Meanwhile, the biggest Beltway criticism is that it’s stodgy old party politics and the dreaded “establishment.”
Do you think millennials should leave the power to the adults? Have you had enough of the aging establishment? Let us know in the comments. | <urn:uuid:60c9d4c5-e5ae-4cc3-b725-bec930208a02> | CC-MAIN-2019-43 | https://www.ozy.com/immodest-proposal/why-cant-a-millennial-be-president/73770/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987822458.91/warc/CC-MAIN-20191022155241-20191022182741-00005.warc.gz | en | 0.955865 | 829 | 2.546875 | 3 |
The horse traitors
Horses have become the meat of a bitter debate at the Sheldon National Wildlife Refuge
The majestic, free-spirited wild horses of Northern Nevada had sure made a mess of Sheldon National Wildlife Refuge.
They’d stomped all over the creeks, muddying the delicate gravel spawning grounds for the Lahontan cutthroat trout. They’d nibbled away at much of the upland vegetation, robbing the native pronghorn antelope and mule deer of habitat and cover against predators. Sensitive grasslands had been turned to muck from so much of their trampling. Forget for a second that whole idea about horses being some noble, stirring symbol of the West. As U.S. Fish & Wildlife officials tell it, the herds that roam the 575,000-acre Sheldon refuge are more like a bunch of klutzy Clark Griswolds that, for all their harmless intentions, leave destruction in their wake. But it’s hardly a laughing matter.
“It’s a desert out here, and the problem we’re having is that too many horses concentrate on all the water and damage the resources,” says refuge manager Brian Day. “They’re taking all the vegetation off and turning it into a big mudhole.” Not exactly what Mother Nature intended. “These horses are not wildlife,” says Day. “What we consider them is feral domestic livestock.” Today, refuge bosses figure there are about 1,500 of these “feral domestic livestock” lording over the area.
Thus in recent years, wildlife officials began chipping away at the growing herd of wild horses at Sheldon. In the past two years, they took out about 1,100 of them. It’s not a terribly controversial decision in itself. Unlike the Bureau of Land Management, which is bound by law to manage horses on its lands, U.S. Fish & Wildlife is charged with keeping things comfortable for native species—and are required to regularly remove horses for the benefit of those species. In the case of Sheldon, a half-million-plus-acre refuge at the northwest border of Nevada, that includes the sage grouse, pronghorn antelope, mule deer, bighorn sheep and other animals. No spirited symbol of freedom on the list here; horses are deemed invaders.
“The BLM, in my opinion, does a good job of managing wild horses, but that’s not part of our mission,” explains David Johnson, deputy project leader for the Sheldon/Hart Mountain National Wildlife Refuge Complex. “We’re accountable to the American public by following the processes in place and meeting our mission of managing this place for wildlife.”
The June 19-20 roundup of about 330 horses was part of a broader plan. After officials rid the area of destructive cattle in the ‘90s, it was now the horses’ turn to go—not completely, but almost. In a bow to the public’s appetite for oohing and ahhing at wild horses, officials set a goal of keeping about 100 horses on the range.
But what was supposed to have been just a routine culling sparked a stampede of outrage—and accusations of carelessness, callousness and cover-ups. Wild-horse activists say that in their zeal to curb the number of horses on Sheldon, federal officials ignored pleas to postpone the removal and needlessly ran to death several colts and foals. Further, they claim that the department’s scheme for mass adoptions will surely send some horses to the slaughterhouse.
Why hate on the horses?, advocates wonder. It’s nothing personal, officials say; it’s part of the preservation program. Critics characterize the management culture of the wildlife refuge as a place where the view of wild horses isn’t that different from the way most people view rats. And the fact that wild horses are tough to rein in—they’re fast breeders with no predators to keep them in check—has given way to a dismissive, get-rid-of-’em attitude.
“They arbitrarily said they wanted 100 horses on the refuge because that’s what they can tolerate and get away with,” says Jerry Reynoldson, president and founder of preservation group Wild Horses 4Ever. “If they had determined 100 is the right amount due to scientific research, I would support that. But how did they arrive at 100? What is the science behind that?”
But even if wildlife officials’ reasoning was sound, some say their timing of the removal was tragically unsound.
Head ’Em Up, Move ’Em Out
The June horse removal at Sheldon was the latest round in a long, exhausting game of catch-up for U.S. Fish & Wildlife. For the past decade or so, the region’s wildlife managers had focused their work on 278,000-acre Hart Mountain National Antelope Refuge just over the border in Oregon, where the horse population had gotten out of hand.
“Due to limited funding, we had to make a conscious decision to determine where we were going to do our roundups, and we decided to concentrate on getting Hart Mountain horse-free. In the meantime, this population [in Sheldon] went through the roof,” Johnson says. Officials figure that in the mid-'90s, there were about 250 horses in Sheldon; over the next decade, the herds would supersize to more than 1,500.
Day explains: “They don’t regulate their own numbers, and there’s nothing out that regulates them. We just didn’t have the time and resources to do it.” The roundup was a bit of long-overdue housekeeping for the sensitive land.
Depending on with whom you talk, the June 19-20 capture at Sheldon either went off without a hitch or was a vision of horse hell—even to veteran cowhands, who’ve seen their share of roundups and adoptions. The timing was controversial from the start. While the breeding cycles of wild horses vary, by most accounts June is the tail end of foaling season, and the grim prospect of running merely weeks-old horses to death didn’t sit well with wild-horse activists, and even refuge workers were nervous about bad press. Despite pressure from animal welfare groups, including the American Society for the Prevention of Cruelty to Animals, Fish & Wildlife went ahead—after all, the contractor upon whom they relied wasn’t available later.
Paul Steblein, project leader for the Sheldon/Hart Mountain refuges, says only two foals died—one in the corral from injuries, one in the refuge from dehydration and exhaustion.
Not true, says another eyewitness who wished to remain anonymous. Calling it a “disaster,” he says he saw six dead foals; they had apparently strayed during the roundup, got lost and presumably died of exhaustion. Three more found alive were taken to an Oregon veterinarian. It only proves, the witness says, the bad decision to round up near foaling season. He says not even the BLM, whose job is to gather horses, will round them up at such a sensitive time of year. Little wonder, he says, that security for the gather was tightened up this year—guarding the corrals and the horse trap—for fear that activists would try to document an episode in which bad timing becomes animal cruelty. He says that among the 330 or so horses gathered, nearly 60 were foals—about 18 percent—giving the lie to officials’ claim that they’re well out of horses’ birthing season. Despite that tight security, the witness managed to take photos, which are on the Web site of the American Wild Horse Preservation Campaign, an umbrella group of more than 30 horse-welfare organizations. The photos include what appear to be dead foals.
“The numbers [of dead foals] purported [by critics] is very unlikely,” Steblein says when asked about the Web site’s photos. “We covered the area of the gather three times by helicopter [to check for lost foals].” He says that many horse-advocate groups are against any type of gathering and will spin and distort information for alarmist ends.
“Irrespective of the politics of horse roundups, there were some major problems with this one,” counters Virginie Parant, the preservation group’s campaign director. “You’re just looking at pure animal cruelty. They did not have to let it come to this. There are responsible ways of handling things, but instead they let things go awry, and then conducted a completely irresponsible roundup.”
Steblein disagrees. “If you look at their [American Wild Horse Preservation Campaign] Web pages, there are seemingly dozens more dead and injured, and that’s not the case. The injury and mortality rates of this gather are easily comparable to anything previous.”
If the timing of the roundup initially sparked the indignation of horse activists, the Web fed the flames. In weeks leading up to the removal, a viral storm of angry e-mails and Internet postings took shape among wild-horse advocates—and was directed at federal officials.
Talking to wildlife bosses, it’s clear this is largely a bitter propaganda war in which they find themselves hastily posting documents online to counter the sometimes-hysterical claims of overzealous horse advocates. Virginia-based wild-horse campaigner John Holland, for instance, has written that Sheldon broke federal law by not doing proper “environmental evaluation” studies before the June roundup. In response, last week Susan Saul, a regional outreach specialist for U.S Fish & Wildlife, posted three documents online to prove they’re following the National Environmental Policy Act—the 1977 Sheldon Horse Management Plan, the 1980 Sheldon National Wildlife Refuge Renewable Natural Resources Management Plan Final Environmental Impact Statement, and the 2000 Environmental Action Memorandum. “We’re not required to do an individual document for every horse gather,” she explains. She’s also put up fact sheets and articles explaining why the feds need to periodically cull the horses. The government will try to get the last word when it gets started on the Sheldon National Wildlife Refuge Comprehensive Conservation Plan later this year.
And if every last horse happens to disappear from the refuge? Officials point out there are more than 30 BLM herd-management areas within a 200-mile radius of the refuge.
Other critics have said federal officials are being pressured to radically lower the horse count in order to raise the number of game animals—which brings in sought-after hunting-tag revenue. But wildlife officials point out it’s the state, not the federal government, that reaps the benefits, and the state denies leaning on the refuge to get rid of the horses.
“We have always cooperated with our federal partners and provided input into their land-use planning process,” says Dave Pulliam, habitat bureau chief at the Nevada Department of Wildlife. “We have exerted no pressure on them to remove horses but have identified horses as having a negative impact on Sheldon in the past.”
A Semantic Can Of … Horses
According to BLM figures, in 1971—when the Wild Horse and Burro Act was passed—there were 17,300 wild horses in the United States. Their number peaked in 1981 at abouat 52,000—and then it plunged again. As of 2005, there were more than 27,000 wild horses roaming the states, mostly in Nevada. But it’s not as though wild horses are in danger of riding off into the sunset … right?
Jerry Reynoldson of Wild Horses 4Ever says it’s not such a far-fetched notion. He says in 10 states, wild horse populations have dropped by 50 percent—not due to cautious horse management, but due to overzealous gathering that stems from flawed science pegging wild horses as the culprits for all sorts of environmental damage (whereas Reynoldson blames factors such as drought and previous cattle damage).
But he cracks open a broader can of philosophical worms when he questions how government officials can arbitrarily decide what counts as a native species and what counts as a feral invader. Gee, goes the reasoning of the devil’s advocate, can’t humans be considered feral invaders, too? Such cheek aside, the rift in terminology reflects a rift in philosophy. According to officials at Sheldon, which was established in 1931, wild horses aren’t native. This particular refuge’s feral stock took root largely from escaped and freed U.S. Cavalry horses that were no longer needed as the military was gradually mechanized. By Reynoldson’s reasoning, the horses were there before the refuge was officially established, so why aren’t they considered native? Moreover, their connection to horses that evolved in North America over millions of years (and then disappeared about 10,000 years ago, then returned to the continent thanks to Spanish explorers) gives them a sort of grandfathered VIP pass to exist.
“Any species that’s been there for thousands of years, born without any kind of human intervention—what kind of qualifier do they need?” Reynoldson says. “What kind of ecosystem would we be creating if we picked a winner and a loser in certain geographical areas? If something lives out there, was born out there and has been out there for thousands of years, how do you deny it’s wild?”
Case in point: Reynoldson got in an argument recently with a friend over a skunk that lives in the woodpile behind Reynoldson’s house. Reynoldson called it a “wild skunk"; his friend balked at his definition of wild. But to Reynoldson, those all-too-human concepts of time and distance are silly yardsticks by which to judge what’s wild, what’s domestic, what’s feral, what’s natural and what’s not. “How far does the skunk have to live from town before he’s wild?” Reynoldson says. “I don’t know the answer, but it’s a question worth asking.”
Virginie Parant of the American Wild Horse Preservation Campaign calls wild horses a “reintroduced native wildlife species.”
“The argument that they’re non-native is an old and silly argument,” she says. Since their reintroduction to the continent by Spanish explorers, she says, “horses have been evolving on this continent for the past 500 years. These aren’t feral cats we’re talking about here.”
Feral or wild, invaders or natives—it’s all the same to a Frenchman’s palate. Indeed, the most immediate fear of horse advocates is that the 300-plus horses gathered last month from the refuge are in danger of meeting their end not as the surprise birthday gift of a squealing pre-teen girl, but the slaughterhouse. To handle the load of horses, Fish & Wildlife has hired three bulk adopters, who are charged with finding homes for the equines—and are expected to do their own background checks and follow-up work.
“It’s easy to accuse someone of sending horses to slaughter, even if it’s not true,” says the refuge’s David Johnson, anticipating the accusations. In order to counter the image that federal wildlife officers view the horses as mere vermin, he admits that on a previous horse roundup and adoption, 21 horses did end up at a slaughterhouse—but Johnson discovered the mistake in the nick of time and spent more than $20,000 of his own money to buy them back. “I’ve had people accuse me of not caring, and that’s not true. Our whole staff is very committed to seeing these horses don’t end up in slaughter. We’ve worked with these adoption agents, and we’ve screened them.”
One adoption contractor, Gary Graham, has received particular scrutiny from wild-horse advocates because, in the past, he rented a corral in New Mexico that had been previously used to sell horses to “killer buyers,” or slaughterhouse agents.
“If I moved into a bank robber’s house, would that make me a bank robber too? The fact I leased down there had nothing to do with slaughter.” Graham says he’s tired of the shrill accusations and hysteria. “It bothers me that people would stoop so low to make up something like that. I know what the real truth is, and I sleep well every night.”
At least, perhaps, until the fall, when Fish & Wildlife has another roundup planned. This time, officials will be braced for criticism, whether it has a basis or not.
“I think most everyone in the end cares about horses, but some of them want to stop the gather no matter what,” says Steblein. “They think all the horses should be out on the range and doing fine by themselves, which is not the case. They will eat out house and home.” | <urn:uuid:d6136918-fc0f-4553-9fe5-a8be74009872> | CC-MAIN-2021-04 | https://www.newsreview.com/reno/content/the-horse-traitors/70607/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703512342.19/warc/CC-MAIN-20210117112618-20210117142618-00581.warc.gz | en | 0.958714 | 3,642 | 2.515625 | 3 |
Runners make many mistakes especially because they have a limited understanding of how their bodies work. Some just choose to ignore their bodies altogether. You need to adapt to every run; your performance needs to be consistent, and improvement needs to be gradual.
1. Not warming up adequately
Your body is usually in a sleep mode before you start out on your runs. Your muscles are relaxed, and so they need time to stretch. If you fail to warm up adequately, your muscles would suffer trauma leading to leg cramps and strained ligaments because they were unprepared. You will, therefore, be vulnerable to injury and experience fatigue sooner.
Warm up exercises should pick up on speed and intensity. You should do some stretches first, followed by jogs, skips and butt kicks. You should take about five to ten minutes on warm ups or even slightly more if you are going for a long run.
2. Starting too fast
This mistake is usually made by runners who feel confident and energetic. You need to realize that distributing your energy throughout your run is the key to endurance. Starting too fast takes up much of your strength, and it is a sure way to get exhausted quickly.
If you start too fast, your muscles would be overworked in just a short time. After a few miles, every muscle in your body would begin to ache, and you will have a slow and painful finish.
3. Not eating enough
Most runners think that adding extra weight would slow them down. A majority of them even try to lose weight through running. While this is not entirely misguided, you should not starve yourself. You are running on the energy that you get from food, and no amount of skill or experience would be useful if you do not eat well. Make sure that you are not going to run on an empty stomach.
You need to eat enough protein to rebuild your muscles. Do not restrain calorie intake too much because this may result in weak bones and stress fractures.
4. Failing to cross-train
Unlike other all-around sports, running strengthens a particular group of muscles especially those on your legs. If the only thing you do is run, you will end up with some areas of your body that are either too tight or too weak. This poor composition of muscle strength makes your body unable to coordinate well. Injuries are therefore likely to crop up often.
You can counter this problem by cross-training. You should do some cycling, swimming, yoga and lift weights at schedule sessions during the week when you are not running. It is also necessary to cross-train so that you do not get bored by the same running routine.
It is crucial to avoid these common mistakes if you are looking to improve your running performance. You will also be able to keep injuries to your joints, feet and leg muscles at bay. Try not to push your body too hard and do not to be slack and inconsistent. You also need to have the right shoes on. The best running shoes for sufferers of plantar fasciitis are most preferable. They have soft inner pads and thick under soles to minimize the tension on your feet. Here are the four common mistakes every runner makes. | <urn:uuid:ce5edc22-d64f-4d49-8cf9-4bc97d1e40d2> | CC-MAIN-2017-04 | http://www.fitnessandpower.com/training/cardiovascular-fitness/4-common-mistakes-every-runner-makes | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00427-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.969129 | 651 | 2.6875 | 3 |
In an era where publications, reviews, and profiles for both individuals and businesses are increasingly found online, defamation law (often called “libel and slander law”) has become ever more relevant and important. This begs the question:
What is defamation?
In short, defamation is a communication about a person or business that is untrue and causes harm to their reputation.
Libel and slander are simply the specific forms of defamation, where libel is a written communication and slander is a spoken communication. Where a case of defamation can be successfully established, a claimant can seek compensation for, among other things, the harm to their reputation and quantifiable losses, such as business losses.
Taking Defamation to Court
In an action for defamation, generally what must be shown in order for a claimant to prove that a statement was defamatory is as follows:
- A statement was made that would have the effect of lowering the reputation of the claimant in the eyes of a reasonable person;
- The statement refers to the claimant; and,
- That statement was published to at least one other.
With the above in mind, it is also important to recognize that a person is permitted to make such statements in appropriate circumstances. In fact, many defamation cases are heavily fought on the issue of whether a defendant’s statement was permissible in the circumstances (also known as defences). Common defences in defamation cases include:
- Truth or justification – this defence is essentially as it sounds;
- Fair Comment – this defence protects the expression of certain opinions based on proven facts; and,
- Qualified privilege – this defence provides certain circumstances in which a person is permitted to speak freely in exercising a duty.
Of course, the specific elements of a case, whether from the claimant’s perspective or the defendant’s, are more nuanced than the brief summary written above. Further, there are additional defences that are open to a defendant to argue, depending on the circumstances.
Recent Defamation Law Case Examples
To help visualize the types of circumstances upon which defamation cases are litigated, here are a few examples of recent issues that have gone before the courts:
- Posting a review of a business online;
- Writing something negative about a person’s reputation on a social media platform (for example, Facebook or Instagram);
- Public comments made about a professional in front of his or her colleagues or actual or potential clients; and,
- Journalistic publications.
For a recent example of a case dealing with publications online, see Level One Construction Ltd. v Burnham et al, 2018 BCSC 1354. In this case, our defamation lawyers Christopher Morcom and James Gill were successful in having a defamation claim brought against their client dismissed. The substance of the allegations concerned a dispute over a construction project, a consumer affairs news report, and a posting online on Yelp. | <urn:uuid:4bc45c92-5201-4a13-91a3-8dc0ef630daa> | CC-MAIN-2023-23 | https://pacificlaw.ca/defamation-law-in-british-columbia/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655446.86/warc/CC-MAIN-20230609064417-20230609094417-00643.warc.gz | en | 0.950975 | 588 | 3.234375 | 3 |
by Robert Guffey
“Electricity comes from other planets.” – Lou Reed, 1968
McLuhan’s main influence was Joyce, and it is the contention of this essay that Joyce’s main imperative with Finnegans Wake was to approximate the hyperlink effect of the Internet in visual space fifty years before the Internet was even invented.
Before Marshall McLuhan became “the High Priest of Popcult and the Metaphysician of the Media,” as Playboy christened him in 1969, he was first and foremost a critic immersed in the world of letters and the traditional arts. He wrote numerous articles examining the fiction and poetry of such writers as G.K. Chesterton, William Faulkner, James Joyce, Edgar Allan Poe, and Ezra Pound. In 1969, after his transformation into a “media guru,” McGraw-Hill published a collection of his early literary criticism under the title The Interior Landscape. Prima facie, one finds little in these essays that hint at the freewheeling, satirical media analysis to come. It is indeed there, however, lurking just beneath the surface if one wishes to find it.
On May 2nd, 1967, McLuhan said, “I once wrote an article, “The Southern Quality” back in ’46 or ’47 where I explained why there was no human life on this planet. Since then human beings have been grown inside programmed media-environments that are essentially like test tubes. That’s why I say the kids today live mythically” (Dobbs, “Android Meme’s Xenochrony” 38). If one goes back and reads the article in question, “The Southern Quality,” an essay primarily dealing with the aesthetics of Southern novelists and poets, one finds in the opening paragraph a brief reference to the disappearance of human life connected to the detonation of the atom bomb in 1945 (McLuhan, Interior Landscape 185). If one was not familiar with McLuhan’s later writing, the comment would appear to be a complete non sequitor. Instead, it probably amounts to one of the most prescient comments he ever made. That he chose to do it in an otherwise straightforward literary essay shows that McLuhan had not yet found the proper outlet for his attitudes and theories.
It was not until he began teaching at the University of Wisconsin, where he came face to face with the cool aloofness of American youth, that he struck upon the answer. He realized that his students couldn’t be less interested in the literary work of esoteric writers dead for more than a hundred years. The only way to connect with his students would be to talk to them in their own language. He began studying pop culture, which led to his fascination with Madison Avenue advertisements and their use of literary and artistic techniques to control public consciousness. Instead of poems and stories and novels, he began bringing the ads to class in order to teach his students the form and function of these literary techniques. To his surprise, he found that a newspaper ad projected onto a classroom wall in the form of a slide would often elicit a hardy round of laughter. If the students had seen the very same ad in a magazine or on a billboard, they would have thought nothing of it. For some reason, removing the ad from its intended context transformed its very nature. Ultimately, this led him to the realization that “the medium is the message” (Understanding Media 23). Content didn’t matter. It led him to write the first scholarly text that attempted to analyze and codify what had once been an invisible art form: advertisements. Of course, there were also practical reasons for choosing to focus primarily on advertisements in The Mechanical Bride. At that time, advertisements were not copyrighted; thus, McLuhan could manipulate them in any way he wished without fearing legal reprisals.
Even as McLuhan extended his analysis to encompass such mundane but transcendental objects as the telephone, the automobile, the telegraph, money, clothing, clocks, comic books, weapons, televisions, and freeways, he never ceased drawing upon his vast knowledge of literary history. His 1962 exploration into the effects of the printed word, The Gutenberg Galaxy, opens with King Lear and ends with Alexander Pope’s The Dunciad. His 1964 book, Understanding Media: The Extensions of Man, employs Shakespeare’s plays As You Like It, Othello, Romeo and Juliet, and Troilus and Cressida, William Burroughs’ novel Naked Lunch, Samuel Butler’s Erewhon, Lewis Carroll’s Alice in Wonderland, Charles Dickens’ The Pickwick Papers, F. Scott Fitzgerald’s The Great Gatsby, E.M. Forster’s A Passage to India, Nikolai Gogol’s The Overcoat, Wyndham Lewis’ Childermass, John Milton’s Paradise Lost, Vladimir Nabokov’s Lolita, and Jonathan Swift’s Gulliver’s Travels, including various works by such diverse writers as W.H. Auden, Charles Baudelaire, Miguel de Cervantes, Agatha Christie, Joseph Conrad, e. e. cummings, John Donne, T.S. Eliot, Franz Kafka, John Keats, D.H. Lawrence, Andrew Marvell, Michel Montaigne, Francois Rabelais, Leo Tolstoy, Paul Valery, and William Butler Yeats. But the writer to whom McLuhan continued to return over and over again, perhaps most prominently in his 1968 book War and Peace in the Global Village, was James Joyce. And the book McLuhan drew upon most obsessively was Finnegans Wake.
In McLuhan’s eyes, Joyce was the true prophet of today’s cybernetic, hypermedia culture. With Finnegans Wake, McLuhan believed Joyce succeeded in crafting “an extremely complex ‘artificial language’ to respond to the challenge of the syncretistic and synaesthetic tendencies of the emerging modes of communicative and expressional technology” (Theall, Virtual McLuhan 161). The technique in Finnegans Wake that McLuhan continually highlighted was Joyce’s synaesthetic fusion of the dream-time and our media extensions, the Menippean ability to mix carnivalesque humor with a scholarly, historical overview of how “the shifts within scientific thought… impinge on human communications” (Theall 176). For the centerpiece of War and Peace in the Global Village McLuhan presents his analysis of Joyce’s ten thunders, those enigmatic one-hundred-letter words that periodically explode from the pages of the Wake, as representing the ten technological stages of mankind.
That it took almost thirty years for a serious scholar to analyze the ten thunders in something more than a transient manner underscores the attitude of ambivalence that most literary critics have displayed toward Joyce’s masterpiece. The relationship that most critics have had with the work could properly be described as one of approach-avoidance. It’s one of the least read entries in the canon of acknowledged classics. To this day literature majors on college campuses all across the globe consider the book to be “unreadable” and avoid it like an envelope dipped in anthrax. If it sits upon one’s shelf, it is assumed by visitors to be nothing more than a dust-covered commodity intended to represent one’s feigned intellectual superiority. The idea that one might actually enjoy reading the work, just as much as the next-door neighbor might enjoy reading the Holy Bible or the latest installment of the Weekly World News, is unthinkable.
This attitude is not new. In 1939, the year the Wake was published, the influential American critic Alfred Kazin wrote in the New York Herald Tribune, “As one tortures one’s way through Finnegans Wake an impression grows that Joyce has lost his hold on human life. Obsessed by a spaceless and timeless void, he has outrun himself. We begin to feel that his very freedom to say anything has become a compulsion to say nothing” (Henderson 54).
It took five years for the first serious study to be published. A Skeleton Key to Finnegans Wake by Joseph Campbell and Henry Morton Robinson drew heavily upon various psychoanalytic theories, particularly those of Dr. Carl Jung, unveiling the book’s archetypal and mythological subtext. Most importantly, Campbell and Robinson demonstrated that the book was not “spaceless and timeless.” It had a traditional plot that could be deciphered if one was diligent enough to try. The only reason the book seemed “to say nothing” to the casual reader was because it refused to be tied down to a single culture. It drew upon hundreds of different mythologies and religions and languages, highlighting the connections among them rather than the elements that divided them. It’s easy to see how the Wake may have inspired Campbell’s later breakthrough work, The Hero With a Thousand Faces, which traced the underlying similarities among myths and fairy tales throughout various cultures and time periods.
A Skeleton Key to Finnegans Wake influenced almost every work of Joycean scholarship that followed. Critics latched onto the mythological interpretation and began searching for archetypal symbols in the book like eager children hunting for Easter eggs. This trend lasted for about a decade, ranging from the publication of William York Tindall’s James Joyce: His Way of Interpreting the Modern World in 1950 to Marvin Magalaner’s Time of Apprenticeship in 1959.
The year 1959 also marked the publication of Richard Ellman’s biography, entitled simply James Joyce, which to this day is considered the definitive text on Joyce’s life. Its influence on Joycean critics was enormous, for it shifted the focus away from fastidious dissections of archetypal symbols to less lofty studies of the autobiographical content in the Wake. The impact of Ellman’s biography can be detected in the most important critical studies of the ‘60s, including S.L. Goldberg’s The Classical Temper and Robert M. Adam’s James Joyce: Common Sense and Beyond.
The year 1963 marked the founding of the James Joyce Quarterly. In 1967 came the international James Joyce Symposia. Not surprisingly, these two developments helped facilitate a deeper maturation of Joyce criticism. The work became longer and more complex, as with Arnold Goldman’s application of Kirkegaard’s philosophical theories to the Wake in his 1966 book The Joyce Paradox (Lernout 23-24).
The major breakthrough in Joyce criticism came in 1968 with the publication of Marshall McLuhan’s War and Peace in the Global Village. Its concise overview of the ten thunders would later serve as the outline for Eric McLuhan’s 1982 PhD. Thesis Menippean Thunder at Finnegans Wake. Eric, Marshall’s son, was raised on his father’s breathless monologues expounding on the significance of the Wake. Fifteen years later, his thesis would evolve into the book The Role of Thunder in Finnegans Wake. In the preface to this book, Eric McLuhan writes:
“Many of the discoveries and insights that make up this essay are latent or were foreshadowed in [Marshall McLuhan’s] writings and observations about culture and technology. He was never reticent about the debt he owed to Joyce in particular, and frequently uttered and published such statements as this: ‘Nobody could pretend serious interest in my work who is not completely familiar with all of the works of James Joyce….’ Such statements were intended to be taken quite literally: a full appreciation of McLuhan’s work is impossible without the sort of perceptual training that such familiarity instills [. . .]. He once remarked to me, as I know he did to many others, that his work on media and culture was, in the main, ‘applied Joyce.’ Conversely, then, it might be fair to say that no one can claim a serious appreciation of Joyce’s work without a complete familiarity with the full spectrum of McLuhan’s work. (xi-xii)”
Many critics seem to agree. McLuhan’s work in the field of communications has inspired such later Joycean scholars as Umberto Eco (The Aesthetics of Chaosmos, 1982), Robert Anton Wilson (Coincidance, 1988), Robert Dobbs (Phatic Communion, 1992), and Donald Theall (James Joyce’s Techno-poetics, 1997). To a greater or lesser extent, each of them has applied McLuhanesque theories not only to Joyce’s work, but to other works of literature as well. Given McLuhan’s broad spectrum of interests, his theories can be applied to almost any man-made artifact. After reading enough McLuhan, it becomes increasingly difficult to distinguish between “art” and “artifact.” Robert Dobbs has applied McLuhanesque critical theories not only to the music of Frank Zappa and the films of David Lynch, but also to crop circles and the destruction of the World Trade Center (Dobbs Interview). With somewhat less erudition, I have applied McLuhanesque theory to the Wachowski Brothers’ science fiction film The Matrix (see “Synchronistic-Linguistics in The Matrix” in Paranoia #22 or at www.paranoiamagazine.com/matrix.html).
Because he was a generalist, McLuhan’s work seems to speak to a vast number of people outside academia, to professionals and non-professionals alike. The present author is acquainted with a 53-year-old man whose expertise in the field of communications far outweighs that of any tenured PhD., and yet he works as a janitor at a high school in Reseda, CA; he’s currently writing an eccentric, McLuhanesque interpretation of the films of Walt Disney. As McLuhan himself once demonstrated, “Professionalism is obsolete” (The Medium Is the Massage 92-93). And yet the paradox is this: numerous professionals, particularly those working at the cutting-edge of computer technology, consider McLuhan to be the Patron Saint of the Wired World: “[. . .] many recognized writers on the subject of hypertext and/or virtual reality—such as Michael Heim, George Landow, Richard Lanham, Stuart Moulthrop, Jay Bolter, Michael Benedikt, and Howard Rheingold—specifically include McLuhan as one of the important anticipators of the contemporary cyberculture [. . .]” (Theall 162).
This shouldn’t be surprising since McLuhan’s main influence was Joyce, and it is the contention of this essay that Joyce’s main imperative with Finnegans Wake was to approximate the hyperlink effect of the Internet in visual space fifty years before the Internet was even invented. Further, it is the contention of this essay that there are twelve thunders in Finnegans Wake, not ten; the eleventh represents the final technological development of the 20th century. The twelfth represents something even more staggering: an evolutionary jump in the future consciousness of the human race.
The first thunder (bababadalgharaghtakamminarronnkonnbrontonnerronntuonnthunntrovarrhounawnskawntoohoohoordenethurnuk!) appears on p. 3 of the Wake. Like all the thunders, it is peppered with various words for “thunder” from a wide variety of cultures throughout the ages. On a surface level, it is “the noise made by the thumping of Finnegan’s body tumbling down the ladder,” a noise that is “identical with the Viconian thunderclap, the voice of God’s wrath, which terminates the old aeon and starts the cycle of history anew” (Campbell 31). But when does history begin? For Joyce, as for McLuhan, the history of mankind begins with the history of technology. The first thunderclap contains numerous references to the earliest forms of technology. For example, “bad” is German for “wheel” and “ghara” is Hindu for “a wheeled cart.” “Thur” is Arabic for “revolution,” which evokes the function of a wheel as well as the recorso structure of the entire novel. “Nor” is Arabic for “fire,” perhaps the earliest of all technologies. “Narro” is Latin for “tell” or “report,” which evokes the function of speech, yet another embryonic technology. “Hoor” is Danish for “flax,” a plant whose stem provided the threadlike fibers that enabled early man to weave the earliest forms of clothing (McLuhan, The Role of Thunder 50-55), which is an appropriate segue into the second thunder.
The second thunder (Perkodhuskurunbarggruauyagokgorlayorgromgremmitghundhurthrumathunaradidillifaititillibumullunukkunun!) appears on p. 23 in the section on “the Prankquean,” the underage seductress who combines elements of Lilith, Cleopatra, the witch Isolde, and the infamous Irish pirate Grace O’Malley. According to Robert Dobbs, the Prankquean represents the beginnings of visual space.
“[. . .] the beginnings of piracy, exploitation, pillaging and creating wealth reservoirs. Then clothing comes in as social weaponry. Clothing becomes fashion, or aggression [. . .]. So before that you just had non-visual man, he was not visually designing himself. The second thunder starts to bring in the visually designing levels of social organization and social power. (“On the Ten Thunders 1)”
Clothing as weaponry: transforming one’s house into a suit of armor. The references to clothing in the second thunder are numerous. “Odhus” refers to Cornelius Otis, an actress famous for having thrown her clothes off while on stage. “Dhus” refers to Eleanora Duse, another actress similar to Otis. “Husk” refers not only to clothing, but to the beginnings of agriculture, another nascent form of technology. “Orlayor” refers not only to a “layer” of clothing, but also to the fact that everybody in Dublin wants to “lay her” (“her” being the Prankquean). Not coincidentally, this is followed by “grom,” which is Arabic for “love.” “Thrum” is Old English for “waste threads,” which ties back into the first thunder where we encountered the Danish word for thread, “hoor,” which sounds suspiciously like a certain English word often used to denigrate women like the Prankquean. Returning to the second thunder: “Ara” could very well refer to Aran, an isle where cloth was woven and ships were built. “Diddle” is, of course, English slang for sexual intercourse, an act that most often occurs only after one has removed his or her clothes. “Unuk” sounds suspiciously like “eunuch,” which represents the role reversal of matriarchal sexual dominance, a superior status the Prankquean has attained by using her clothes against men as if it were a weapon (McLuhan, The Role of Thunder 70-74).
The third thunder begins with the syllable “klik” (Joyce 44). This refers to the beginning of “cliques,” when priests begin to run society.
The fourth thunder begins with the syllables “Bladyyughfoulmoecklenburg” (Joyce 90). “Foulmoecklenburg” literally refers to dirt-ridden medieval “burgs” (towns) filled with “moeck” (muck). We’ve now progressed from the Egyptian B.C. times of priest castes to the medieval era when economic systems began to dominate “patterns of nature” (McLuhan, War and Peace 47). The penultimate syllable in this thunder is “nach,” which is Arabic for “cash.” The preceding, overlapping syllable is “anach,” which is Gaelic for “path,” referring to the building of roads. This thunder represents the beginning of market gardens, “carts and oxen delivering food to a market” (Dobbs, “On the Ten Thunders” 2).
The fifth thunder begins with the syllables “Thingcrooklyexineverypasture” and ends with “mindlookingated” (Joyce 113). This brings us to the distortion of human thought patterns via the invention of the printing press. We’ve reached the industrial age of the photo, the newspaper, and assembly-line reproduction. This is a crucial section, in which Belinda the hen retrieves the Letter from the dung heap and a Kafkaesque jury sits in judgement of its supposed “obscene” contents, no doubt mirroring Joyce’s earlier legal entanglements surrounding Ulysses. The subtext, however, is far more complex. The first syllable (“Thing”) is Norwegian for “tribal council” (i.e., the jury). “Inger” evokes the French word “encre,” which means “ink” (i.e., the printed word). “Crook” is an English word meaning “thief,” which refers to the visual/spatial concept of plagiarism, an Occidental bias that words (i.e., ideas made of “ink”) are actual physical objects, “things” that can be stolen like bags of food or money. Synchronistically, the word “crookly” is Norwegian for “print.” “Yex” evokes the French word “yeux,” which means eyes (i.e., visual space) (McLuhan, The Role of Thunder 126-27).
The last four syllables of the fifth thunder examines the theme of visual space even further. The word “mindlooking” seems to evoke the concept of ESP. Thus, the word “mindlooking” literally means that the rise of the printed word has suppressed (“gated”) mankind’s facility for direct mind-to-mind communication; a concept often written about by occult writers such as Madame Blavatsky, whose works were well-known to Joyce (Ellmann 179).
The sixth thunder begins with the syllables “Lukkedoerend” (Joyce 257). “Luk” refers to visual space once again. “Lukke” evokes the name of the Norse god Loki, thus referring to the return of tribal gods. “Lukked” is not too far from “lukket,” which is a Danish word for “closed.” “Lukkedoer” sounds very similar to the English phrase “lock the door,” while the word “oerend” sounds like “era end” (the end of an era). Embedded in the middle of the thunder we find the word “looshoofer” (Lucifer), which overlaps with the word “oofer” (evoking the Arabic word for bird, “asfour”), which overlaps with “ofermo” (inferno). Inferno-bird=fire-bird=phoenix. This thunder refers to the metamorphosis of visually biased man with the introduction of electric environments: the death of the old gods, and from their ashes the birth of the new fire (electricity) (McLuhan, The Role of Thunder 146-48).
Though it would be advantageous to study each thunder in extreme detail, space constraints prevent such an in-depth level of analysis. By this point the reader will probably have begun to understand the general structure of each thunder. Thus, out of necessity, the following summations will be more concise. Thunder seven appears on p. 314, thunder eight on p. 332, thunder nine on p. 414, and thunder ten on p. 424.
“[. . .] seven is the beginning of the first electric technologies (the telegraph and radio era). Number eight is the wedding of sight and sound, the silent movie with the radio talkie, the radio soundtrack, the radio acoustic. So you have the integration of sight and sound again. Thunder nine deals with the technologies of the airplane and the automobile. Thunder ten deals with television. Those are the last five thunders, but number six gives the general pattern of the metamorphosis caused by those electric technologies [. . .]. (Dobbs, “On the Ten Thunders” 3-4).”
At least one thing that should be clear from the preceding overview of the thunders is the way in which various words link to one another, exactly as on the Internet, overlapping and forming new concepts that sometimes contradict the definition of the previous meaning. This technique is not limited to the thunders; it occurs all throughout the Wake. The book is one gigantic mass of chaotic paradoxes. It doesn’t seem possible that any single book could contain every element in the Wake at one time, and yet somehow the structure manages to hold. Conversely, the entire story is stored within each individual element. As early as 1944, Campbell and Robinson pointed out that the first four paragraphs of the Wake contain the book’s entire contents in embryonic form. One might propose that Joyce structured the book to behave like a hologram. Just as a fraction of a hologram contains all the information of the original image, the entire structure of the Wake is contained within each page, each paragraph, each sentence, each word. Joyce intended the Wake to be a summation of the entire universe, so it shouldn’t be a surprise that the field of quantum physics would later propose a theoretical model of the universe as a hologram. If each element of the universe contained the entirety of the whole structure, then such “paranormal” phenomena as ESP and precognition would seem quite plausible (Talbot 205-13).
As Marshall McLuhan wrote in his last book The Laws of Media, when pushed to extremes every technology flips into its opposite function (9). Thus, every man-made artifact has a recorso structure, like the Wake. It makes perfect sense, then, that mankind’s precognitive and telepathic abilities wiped out by the rise of the printed word would be retrieved through the ubiquity of the electronic environment. In his 1972 book Take Today, McLuhan wrote:
“ESP IS OLD HAT WHEN EFFECTS PRECEDE CAUSES. The patterns of formerly hidden processes now begin to obtrude on every hand. Prescience, prophetic vision, and artistic awareness are no longer needed to establish an understanding of the most secret causes of personal and social processes. Mere electric speed-up makes X-ray awareness natural. (193)”
The electric environment, which formerly divided the human population into solipsistic bubbles of existential angst and urban despair, is now bringing disparate minds together at a speed just below that of thought itself. The Internet is a technological approximation of ESP. The electric environment, just as McLuhan predicted, has flipped into its opposite extreme. McLuhan would never have been able to make this prediction if he hadn’t been a devoted student of Joyce. With Finnegans Wake, Joyce predicted the effects of the Internet on mass consciousness. The Wake was Joyce’s attempt to approximate that effect in terms of visual space.
How could Joyce have known about the coming computer revolution? Res ipsa loquitor. How could he have known about the invention of L.S.D., three letters that recur throughout the Wake (pp. 68, 107, and 260 are only three examples), or the detonation of the atom bomb (on p. 353) and the subsequent destruction of Nagasaki (“nogeysokey” on p. 315)? Robert Anton Wilson, co-author of the best-selling Illuminatus! Trilogy, has even gone so far as to suggest that Joyce anticipated the structure of DNA in Ulysses over thirty years before Watson and Crick made their discovery (Wilson 169-70). But why should that be a surprise? After all, we know for a fact that Joyce discovered the quark (Joyce 383).
Gerry Fialka, who leads a Finnegans Wake reading group at the Venice Beach Public Library the first Monday of every month, once asked Robert Dobbs, “Did Joyce have ESP?” Dobbs responded as follows:
“ESP is something most poets have in a slight way. But it is not important to have ESP. He had a cultural ESP [. . .]. When you understand the effects and see where the causes of those effects come from, you are seeing things from beyond any cultistic [perspective]. Part of the reason [Joyce was] suppressed was his message: his message was the death of the visual medium by the new modern 20th century electric technologies. FINNEGANS AWAKE. It’s a headline. A warning. Finn’s awake! The electric environment is here to whip us out. Part of Joyce’s ethos was media ecology. [He] knew the electric environment was a new ramparts, a new battle cry, a new fire from outer space, that was consuming the whole planet. And it did happen. It ended with the bomb. For some literate scientists, the atomic bomb was predicted by Finnegans Wake. They saw the title as a phrase that expressed what happened to man when he ended history with the atomic bomb (Dobbs, “On the Ten Thunders”16-17).”
The idea that Joyce possessed ESP has been hinted at by Joyce himself. He often referred to himself as an “amanuensis” (Dick, Piper in the Woods), a word Webster defines as follows: “one whose employment is to write what another dictates, or to copy what another has written.” But from whom was Joyce taking dictation? Perhaps the answer is “the uncreated conscience of [his] race” (Joyce, Portrait 218), what Dobbs referred to as “cultural ESP,” what Joyce’s colleague Ezra Pound was referring to when he called the artist “the antennae of the race” (McLuhan, Understanding Media xi). It’s interesting to note that Pound chose to use the word “antennae,” which immediately evokes images of television, a medium that plays a significant role in the Wake.
On p. 52 of the Wake Joyce wrote, “Television kills telephony in brothers’ broil.” What Joyce meant by this statement was that each new medium inevitably comes in conflict with the old one. As McLuhan wrote in War and Peace in the Global Village, “Every new technology necessitates a new war” (98). Television is the tenth thunder. Inevitably, it must come into conflict with the eleventh thunder. But aren’t there only ten thunders in Finnegans Wake?
The eleventh thunder is the Internet. At a time when one can read e-mail messages on a wristwatch, it’s almost unnecessary to point out that the Internet is the zenith of “nanotechnology.”1 However, this concept was once considered laughable even in the realm of science fiction (with the possible exception of Isaac Asimov’s 1965 novel Fantastic Voyage).
I am in possession of a rare copy of one of the earliest “alien contactee” books entitled Other Tongues, Other Flesh (http://www.sacred-texts.com/ufo/otof/index.htm), within the pages of which George Hunt Williamson relates the following information allegedly given to him by extraterrestrials: in the future, spacecraft will be powered by sentient crystals that have the ability to make decisions independently and house whole libraries within a storage space as wide as the tip of one’s index finger (290-92). This at a time (1953) when the most sophisticated science fiction authors were still writing about futuristic “central computers” the size of cities. The idea of “miniaturization” was simply not a popular one at the time. It’s appropriate, then, that Joyce chose to represent the Internet as an abbreviated form of the word “thunder”: “Thud” (Joyce 612). The miniaturized thunder. The Wake, too, is an early form of nanotechnology: the entire universe compacted in a book no thicker than three centimeters.
Any thunder that follows the invention of the atom bomb (“The abnihilisation of the etym,” as Joyce writes on p. 353 of the Wake) would inevitably seem anti-climatic. Thus, Joyce chose to represent the penultimate thunder as a lingering echo of the explosion that ended history: “Thud.” The period that follows the exclamation point. The whisper that follows the scream.
A recurring theme in UFO literature is the idea that the aliens began their surveillance of Earth due to the detonation of the atom bomb (e.g., Williamson 157). Indeed, a remarkable increase in UFO sightings occurs at that very point. One need only check the headlines of the L.A. Times at that time period; hardly a day goes by without a dramatic flying saucer report emblazoned on the front page. Given Marshall McLuhan’s conception of the atom bomb as the end of history, it seems darkly ironic to think of the aliens arriving the day after the world ended. (We needn’t stretch our imagination too far to come up with an alternate theory: that the completion of the Wake drew the aliens to Earth, but it took them seven years to arrive.)
Perhaps this is why Joyce included communication with Martians as mere marginalia in Part II of the Wake (263): “Mars speaking.” It’s as if Joyce is saying: Mars is speaking, but nobody’s listening. (Joyce could also have been referring to McLuhan, whose close friends knew him by the nickname “Mars.” Of course, nobody listened to him either.) The possibility of communication with extraterrestrials has fascinated mankind long before the work of Wells, Welles, or Williamson. A recurring theme in “contactee” lore is the idea that the aliens behave as an insectoid “hive mind” who communicate with one another through telepathy (Chapman 13, 75). If so, perhaps these beings were not always capable of such advanced forms of communication. Perhaps their technology made them that way.
“When a man-made environment circumvents the entire planet, moon, and galaxy, there is no alternative to total knowledge programming of all human enterprise. Any form of imbalance proves fatal at electric speeds with the superpowers released by the new technological resources representing the full spectrum of the human senses and faculties. Survival now would seem to depend upon the extension of consciousness itself as an environment. This extension of consciousness has already begun with the computer and has been anticipated in our obsession with ESP and occult awareness. (McLuhan, Take Today 14)”
Joyce anticipated the effects; we’re providing the causes. Perhaps when the new digital environment has subsumed and merged with the old electric environment, Finnegans Wake will be as easy to read as the Holy Bible or the Weekly World News.
In a recent issue of the latter publication, aliens from Zeti Reticuli were interviewed about their predictions for the coming year. One alien, named P’lod, was quoted as saying internet companies would enjoy a remarkable increase in profits in the early months of 2007 (Foster 49). McLuhan would not be surprised to hear that the economic “THUD” of the dot-com world was only a transitory setback in the digital revolution. Nor would he be surprised to learn that “Thud” is just one letter away from “thur,” the penultimate syllable in the first thunder, as well as the Arabic word for “revolution.” Thus, like the Wake itself, our own personal revolution has spun us back to the beginning.
We need add only one more thought in order to complete this journey. If Joyce could predict the discovery of DNA and the invention of lysergic-acid-25, the atom bomb, and the internet, then it should be possible for a modern day reader to predict future societal trends using the Wake as a divinatory tool. What comes after the global consciousness facilitated by the internet? Joyce’s protégé, Samuel Beckett, once wrote, “Every word is like an unnecessary stain on silence and nothingness.” In the near future human beings might very well communicate without the need for any form of technology, including speech.
The twelfth thunder is silence (Joyce 629).
©2007 Robert Guffey. Robert Guffey is a graduate of the Master of Fine Arts Program at California State University at Long Beach. He is also a graduate of the Clarion writer’s workshop in Seattle, WA. His first published short story “The Infant Kiss” received an Honorable Mention in the 2001 edition of The Year’s Best Fantasy & Horror (Vol. #14). His short stories, articles and interviews have appeared in such magazines and anthologies as After Shocks, The Chiron Review, The Fortean Times, Like Water Burning, Modern Magic, Mysteries, New Dawn, The New York Review of Science Fiction, Paranoia, The Pedestal, Riprap, Steamshovel Press, The Third Alternative and UFO Magazine. He is currently teaching English at CSU Long Beach. He can be contacted at [email protected]
Campbell, Joseph and Henry Morton Robinson. A Skeleton Key to Finnegans Wake. New
York: Harcourt, Brace and Co., 1944. The first serious work of scholarship analyzing James Joyce’s final book.
Chapman, Douglas. “The Abduction Enigma.” Strange Magazine 1 (1987): 10-18, 74-77.
An overview of possible explanations for the “alien abduction” phenomena.
Dick, Philip K. Interview. Piper in the Woods. By Gregg Rickman. Audio cassette. Rickman,
1987. Dick discusses the philosophical subtext of his work.
Dobbs, Robert. “Android Meme’s Xenochrony.” Flipside 117 (March/April 1999): 38. A
single installment in an on-going series of diary entries featuring conversations between Dobbs and many influential thinkers such as Marshall McLuhan, Mae Brussell, Reinhard Gehlen, William Taub, and Frank Zappa.
—. “Bob On the Ten Thunders of Finnegans Wake.” Venice Beach: n.p., 1992. Later
published under the revised title “Bob Dobbs Explains Finnegans Wake Via the Ten Thunders.” Flipside 98 (October/November): 64-74. A concise summary of the McLuhanesque view on the Ten Thunders.
—. Telephone interview. 11 September 2001. An hour-long dialogue focusing on Dobbs’
McLuhanesque interpretation of the terrorist attacks on New York City.
Ellmann, Richard. James Joyce. New York: Oxford U P, 1959. This is widely regarded as the
best and most comprehensive biography of Joyce ever written.
Fort, Charles. The Books of Charles Fort. 1941. New York: Henry Holt, 1957. A collection of
Fort’s four books of speculative journalism including The Book of the Damned (1919), New Lands (1923), LO! (1931), and Wild Talents (1932).
Foster, Mike. “P’lod Predicts the Future!” The Weekly World News 25 Sep. 2006: 49. A
tabloid article that purports to feature an interview with an extra-terrestrial from the Zeti Reticuli star system.
Henderson, Bill. Rotten Reviews. New York: Viking Penguin, 1987. Collects early negative
reviews of novels that are now acknowledged to be classics.
Joyce, James. Finnegans Wake. 1939. New York: Viking, 1968. An attempt at approximating
the hyperlink effect of the internet in visual space.
Lernout, Geert. The French Joyce. Ann Arbor: U of Michigan P, 1990. Traces the history of
Joyce criticism from 1939 onward.
McLuhan, Eric. The Role of Thunder in Finnegans Wake. Toronto: U of Toronto, 1997.
Interprets the Ten Thunders in Finnegans Wake in terms of the ten technological stages of mankind.
McLuhan, Marshall. The Gutenberg Galaxy. 1962. New York: Signet, 1969. Posits that the
invention of the printing press radically altered the consciousness of mankind.
—. The Interior Landscape. New York: McGraw-Hill, 1969. A collection of McLuhan’s
literary criticism dating from 1943 to 1962.
—. The Mechanical Bride. 1951. Boston: Beacon P, 1967. A Menippean satire of Madison
Avenue’s advertising techniques.
—. Understanding Media. New York: Signet, 1964. Probes the effects of electronic
communications upon man and the twentieth century.
McLuhan, Marshall and Eric McLuhan. The Laws of Media. Toronto: U of Toronto P, 1988.
Introduces the concept of the tetrad, a four-step process that can be performed upon any man-made artifact to determine their present and future effects upon society.
McLuhan, Marshall and Barrington Nevitt. Take Today: The Executive as Dropout. New York:
Harcourt Brace Jovanovich, 1972. Explores the programming of human consciousness
via retrievals and replays of the tribal unconscious.
McLuhan, Marshall and Quentin Fiore. War and Peace in the Global Village. New York:
Bantam, 1968. A fusion of photographs, ads, illustrations, and text meant to expose the absurdity of modern consumer culture through Menippean satire.
Talbot, Michael. The Holographic Universe. New York: HarperCollins, 1991. An in-depth
application of quantum theories, particularly those proposed by David Bohm and Karl Priban, to the field of the “paranormal.”
Theall, Donald. James Joyce’s Techno-Poetics. Toronto: U of Toronto P, 1997. Analyzes
Joyce’s work in the context of contemporary cyberculture.
—. The Virtual Marshall McLuhan. Montreal: McGill-Queen’s U P, 2001. The best and most
recent biography of Marshall McLuhan.
The Velvet Underground. VU. Polygram, 1984. A collection of previously unreleased
recordings dating from Feb. 1968 to Sep. 1969. Includes the song “Temptation Inside Your Heart,” from which the opening epigraph of this essay is derived.
Williamson, George Hunt. Other Tongues, Other Flesh. Amherst, WI: Amherst P, 1953. An
autobiographical account of Williamson’s encounters with an apparent non-human intelligence.
Wilson, Robert Anton. Coincidance. Phoenix: Falcon P, 1968. An anthology of various
articles, the centerpiece of which is a four-part essay examining synchronicity and isomorphism in Finnegans Wake.
1 In using this word I’m simply referring to the “miniaturization of technology,” not necessarily the “nanotechnology” that Eric Drexler writes about in such books as Engines of Creation. | <urn:uuid:154ff6dc-6673-479c-9d80-ff0e55fed532> | CC-MAIN-2014-35 | http://www.paranoiamagazine.com/2013/01/the-twelfth-thunder-beyond-the-digital-environment-of-finnegans-wake/?like=1&source=post_flair&_wpnonce=bc4cf9c758 | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830903.34/warc/CC-MAIN-20140820021350-00119-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.931623 | 9,516 | 2.546875 | 3 |
New antibiotics needed: Streptococcus pneumoniae
Posted on November 22, 2019 by Matt Bassett
As part of World Antibiotic Awareness Week, we are continuing our New Antibiotics Needed blog series detailing the twelve pathogens thought by the World Health Organisation (WHO) to pose the greatest threat to human health. Next on the list is Streptococcus pneumoniae.
S. pneumoniae was first isolated by both George Sternberg and Louis Pasteur in 1881. Alexander Fleming discovered penicillin in 1928 and by 1942 it was being used to treat infections. In his Nobel Prize acceptance speech, Fleming warned about the possibility of bacteria developing immunity to penicillin. It took just two decades before clinical isolates of S. pneumoniae that were non-susceptible to penicillin were recorded. These strains are now common worldwide. The Centers for Disease Control and Prevention estimate that antibiotic resistant strains of S. pneumoniae cause 1.2 million infections in the USA every year, resulting in 7000 deaths annually.
In healthy individuals, S. pneumoniae live as commensals – a relationship where the bacteria benefit but the host is unaffected – in and around the nose, sinuses and respiratory tract, particularly in young children. In those with weakened immune systems, like the elderly and young children, the bacteria can become pathogenic and cause disease. Infections caused by S. pneumoniae are the cause of substantial antibiotic consumption in children; the bacteria are one of the main causes of acute otitis media – inflammation in the middle ear and associated ear infection – which effects 80% of children under three years old.
S. pneumoniae causes a variety of diseases; if the bacteria colonise the alveolus, the body’s inflammatory response causes plasma, blood and white blood cells to fill the alveoli, causing pneumonia. S. pneumoniae is the leading cause of community-driven pneumonia – pneumonia contracted by a person with no, or little, contact with a hospital. As well as pneumonia, S. pneumoniae can cause meningitis and, in extreme cases, sepsis.
Vaccines to the Rescue?
To help with the fight against growing antibiotic resistance in S. pneumoniae, vaccines have been developed, the first of which was developed in the 1980s. It was hoped that the vaccines would cause a significant, sustained reduction in antibiotic resistance. However, genomic analysis showed that although there was an initial dip in disease caused by antibiotic resistant strains of S. pneumoniae, this was only temporary.
Genomic surveillance has been vital in understanding the impact of the vaccines, and many countries are now routinely performing whole-genome sequencing for vaccine surveillance. Scientists are hoping genomics will play a vital role in the evaluation of new vaccines and treatments that may be used to reduce disease caused by antibiotic resistant strains of S. pneumoniae.
Genomic epidemiology of penicillin-non-susceptible Streptococcus pneumoniae is part of the New Antibiotics Needed collection in Microbial Genomics. Written by Tamsin Dewe, Joshua D’Aeth and Nicholas Croucher. The review highlights the role of genomics in improving our understanding of how penicillin-non-susceptible S. pneumoniae evolved, enhancing our ability to trace their transmission and developing new methods of predicting how pneumococci will respond to treatment with different forms of penicillin. | <urn:uuid:adf5de87-9819-46b6-b03f-c1ab025631e0> | CC-MAIN-2021-21 | https://microbiologysociety.org/blog/new-antibiotics-needed-i-streptococcus-pneumoniae-i.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991650.73/warc/CC-MAIN-20210518002309-20210518032309-00168.warc.gz | en | 0.937035 | 704 | 3.859375 | 4 |
How many hydroelectric plants are in Brazil?
158 hydroelectric plants
Brazil currently has 158 hydroelectric plants in operation, which total more than 89 gigawatts (GW), with 9 additional plants under construction and another 26 authorized. The 11-GW Belo Monte plant, when complete, will be the third-largest hydroelectric power plant in the world.
How many hydro dams are in Brazil?
201 hydroelectric power stations
According to the Associação Brasileira de Distribuidores de Energia Elétrica (ABRADEE) there are 201 hydroelectric power stations in Brazil with a nameplate capacity of more than 30 MW; the total capacity of these power stations in 2015 was 84,703 MW.
How many power plants are there in Brazil?
Brazil has at least 34 natural gas-fired power plants with a total generating capacity of 11,026 megawatts (MW). Natural gas production has been growing as Brazil develops its vast offshore natural gas reserves, most of which are concentrated in the south off the coast of Rio de Janeiro.
Where do the largest hydroelectric dams lie in Brazil?
The Belo Monte Dam (formerly known as Kararaô) is a hydroelectric dam complex on the northern part of the Xingu River in the state of Pará, Brazil.
How does Brazil generate hydroelectricity?
Brazil has the perfect geography for hydroelectric production. The elevation changes, large rivers, and high levels of precipitation qualify Brazil for hydroelectric success. The high levels of precipitation provide a consistent water flow, which allows a consistent production of electricity.
How do hydroelectric dams help Brazil?
The government also maintains that hydropower is a clean source of energy that helps fight climate change, and in the rain-rich Amazon, hydro dams provide a steady source of electricity not plagued by the intermittency problems of wind and solar energy.
How does Brazil make use of hydroelectric power?
The large rivers and elevation changes provide opportunities to build dams and use gravity to control the flow of water. The high levels of precipitation provide a consistent water flow, which allows a consistent production of electricity. Over 80% of Brazil’s electrical energy comes from hydroelectricity.
Where does Brazil get most of its electricity?
In total electricity generation, in 2019 Brazil reached 170,000 megawatts of installed capacity, more than 75% from renewable sources (the majority, hydroelectric plants). In 2013, the Southeast used about 50% of the load of the National Integrated System (SIN), being the main energy consuming region in the country.
What company built the Itaipu dam?
Itaipu Binacional, a company jointly owned by Brazil and Paraguay, was created by the Treaty of Itaipu to build and operate the dam. The construction of the dam began in February 1971 and cost USD17.
Why is Brazil good for hydropower? | <urn:uuid:726fe602-62fb-4c50-8b3f-ec509a66d0b0> | CC-MAIN-2023-50 | https://thisisbeep.com/how-many-hydroelectric-plants-are-in-brazil/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00314.warc.gz | en | 0.938267 | 601 | 3.296875 | 3 |
Research topic: Musical cognition
Musical cognition is a major field of research encompassing various aspects of the processes associated with experiencing and creating music.
Musical cognition is also a cross-disciplinary research field that draws on elements from other fields such as acoustics, computer sciences, medicine, movement research, psychology, philosophy and sociology. The objective is to understand how music is created, experienced and integrated into our lives.
Some of the principle research areas within musical cognition include:
- Sound perception: the perception of sound, tones, rhythms, instruments, styles and genres.
- Music and physical movement in relation to musicians and dancers, as well as listeners in a range of situations.
- Music and multimedia: how the senses interact when experiencing music
- What music means to people: music and emotions, music and everyday life, music and meaning. | <urn:uuid:0e4584be-8cc1-4732-8d14-46b4a58851f3> | CC-MAIN-2019-09 | https://www.hf.uio.no/imv/english/research/subjects/musical-cognition/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247503249.58/warc/CC-MAIN-20190221071502-20190221093502-00132.warc.gz | en | 0.926199 | 174 | 3.28125 | 3 |
Looking at all the tall and new buildings in Bonifacio Global City, you may be mistaken into thinking that this is just a new cosmopolitan city that was built on an empty lot. If you dig deeper, however, you will discover a past that has all the ingredients of an epic movie.
According to the Bases Conversion and Development Authority, a tunnel, called the Bonifacio War Tunnel, was constructed by the Americans in the eastern portion of BGC on 15 October 1941 in preparation for the anticipated attacks of Japanese forces against the Philippines. BGC used to be part of Fort Bonifacio, formerly known as Fort McKinley.
“The tunnel was further expanded by the Japenese during their occupation of the Philippines and was later used as a bomb shelter against American air raids from October 1944 to March 1945. Fort McKinley was later transferred to the Philippine Government after the Philippines gained its independence from the Americans in 1949. The fort was renamed Fort Bonifacio and became the headquarters of the Philippine Army. Of the original full 2.2 kilometers length of the tunnel, an estimated 730 meters remain unaffected by the development of Fort Bonifacio as of 2013.”
On the other hand, reports about the rehabilitation of the tunnel that came out in 2012 have apparently piqued the interest of many would-be adventurers. For example, a blogger has posted a very detailed report on the tunnel, as well as his own attempt to find the tunnel, here.
Hiring some local guides, the blogger managed to get close to several of the entrances of the tunnel. Thanks to him, we can see a map in which the conditions of the entrances as in early 2014 are details. Source: link.
BCDA announced on October 22, 2013 that it had entered into an agreement to develop the tunnel into a historical museum and tourist site with Tourism Infrastructure and Enterprise Zone Authority (TIEZA), National Historical Commission of the Philippines (NHCP) and the National Museum. There is no update since then, so we do not know when this project will complete, but if the project does materialize, it would be a great attraction not only for BGC but for Metro Manila. Meanwhile, we can only satisfy our craving for adventure with walking tours of BGC. | <urn:uuid:2a4d3e8f-43db-4317-8f6d-66a0ea3b76dd> | CC-MAIN-2019-22 | https://www.thefortcity.com/article/recommended/fort-bonifacio-war-tunnel | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259757.86/warc/CC-MAIN-20190526205447-20190526231447-00269.warc.gz | en | 0.973891 | 464 | 2.78125 | 3 |
Unique opportunity for students to get hands-on experience in organic farming…
- Understand the real time consequences of intensive farming.
- Learn to make organic fertilizers and pesticides from the experts.
- Compare organic farming with intensive farming.
- Analyze the soil health using insect sampling
- Prepare top soil using a tiller.
- Harvest organic products.
- Learn about different methods to prevent soil erosion.
- Conduct soil and water quality tests.
- And a lots more… | <urn:uuid:7115b145-81ca-471b-a779-ef185106118f> | CC-MAIN-2019-22 | https://www.envirotrips.in/how-to-plan-school-trip/green-farming-soil-health-and-groundwater-quality/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259327.59/warc/CC-MAIN-20190526165427-20190526191427-00235.warc.gz | en | 0.780494 | 101 | 3.09375 | 3 |
Deformed wing virus (DWV) is a highly viral disease transmitted by Varroa destructor. The disease is commonly found in colonies infested with mites. Deformed Wing Virus is regarded as deadly due to its ability to spread fast in any colony. It causes massive wing deformation in bees making it difficult for them to live normally. DWV which is regarded as a low-grade infectious disease is commonly triggered by mite infestations. It has a reputation for being massively destructive leading to the decimation of well-established colonies globally. The deformed wing virus is common in late summer and early fall. A high concentration of mites can be overwhelming for any bee colony.
Read the full article here: Deformed Wing Virus — Prime Bees – College Station Bee & Honey Farm | <urn:uuid:3f33ce93-c090-40b7-bb2f-87c50599d680> | CC-MAIN-2020-16 | https://sassafrasbeefarm.wordpress.com/2018/08/08/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371824409.86/warc/CC-MAIN-20200408202012-20200408232512-00416.warc.gz | en | 0.963795 | 161 | 2.796875 | 3 |
School Health Programs That Target Obesity May Cause Eating Disorders
A US nationwide poll done by the C.S. Mott Children’s Hospital National Poll on Children’s Health examined children were exposed to school based obesity prevention programs and found that nearly 30 percent of parents reported behaviors that are linked with eating disorders.
David Rosen, M.D., M.P.H., Clinical Professor of Pediatrics, Internal Medicine and Psychiatry for the University of Michigan Medical School, agrees that childhood obesity is a serious problem. But he also says that, “When obesity interventions are put in place without understanding how they work and what the risks are, there can be unintended consequences. Well-intentioned efforts can go awry when children misinterpret the information they’re given.
“Many of these behaviors are often dismissed as a phase, But given what we know about the association of these behaviors with the development of eating disorders and knowing that eating disorders are increasing in prevalence, they should be taken very seriously.” Rosen is also Chief of Teenage and Young Adult Medicine in the Pediatric Department at the University.
They survey also found that 11 percent of parents said their children were “too physically active.” Another 7 percent said that their children were shamed at school because of what and how much they were eating. | <urn:uuid:408b0cca-81ee-4ddf-b37f-c010172a4afc> | CC-MAIN-2023-23 | https://eatingdisorders.com/news/studies-and-research/school-health-programs-that-target-obesity-may-cause-eating-disorders | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646652.16/warc/CC-MAIN-20230610233020-20230611023020-00473.warc.gz | en | 0.979261 | 298 | 2.78125 | 3 |
"That means the decisions we’re making today — to continue along a path that’s almost entirely carbon-dependent — are locking us in for long-term consequences that we will not be able to change but only adapt to, at enormous cost. To protect New York City from rising seas and storm surges is expected to cost at least $20 billion initially, and eventually far more. And that’s just one coastal city."
Its aim is to move the debate in the US, which has become characterised by partisan divisions, into a more practical assessment by business and political leaders of how to manage the risks posed by climate change. The study looks only at the US, and only at potential costs, rather than possible solutions.The project is chaired by Hank Paulson, who was Treasury secretary under President George W Bush; Michael Bloomberg, the former mayor of New York; and Tom Steyer, the former hedge fund manager turned environmental campaigner.
Mr Paulson, who was chairman and chief executive of Goldman Sachs, the investment bank, between 1999 and 2006, and then led the US administration’s response to the financial turmoil of 2008, drew a parallel between climate change and the “failure of risk management” that led to the crisis. “We are experiencing a climate bubble,” he said. “In the run-up to the financial crisis, we incentivised lending. Today we are encouraging the overuse of fossil fuels.”
A June 8 article discussing this in the Financial Times also reveals that the analysis, based on work by Rhodium, a consultancy, and academics at Rutgers and Berkeley universities, attempts to calculate financial values for climate risks including flooding and storm damage, heat-related deaths, working hours and energy demand, broken down by state and locality. Because of the large uncertainties involved in predicting both how far temperatures will increase and what the effects of those higher temperatures will be, the estimates of potential damage come in wide ranges.What turns up in many of these estimates is that the greatest potential costs come from flooding in Florida and Louisiana and heat-related deaths in California, Arizona, Texas and Florida.
Back in 2012, tracking the hottest year on the planet at that time, the Daily Kos outlined the destructive path of climate change and raised the alarm that the US is ground zero for climate change in the southern part of the country. This is due to the carbon emissions that are forcing temperatures into extremes not seen before, and we are rapidly burning into the remaining "safe" budget of total carbon emissions:
"What most U.S. politicians and the the political junkies here don't understand is that the U.S. is ground zero for climate change. Most of the additional heat from global warming is going into the oceans and the north Atlantic is taking up the most heat of all the world's oceans. That heat is moving the big high pressure north and east towards Europe. That shift of the high pressure dries out the western and central U.S. Our bread baskets heat up and dry up."
California Senator Dianne Feinstein has expressed her awareness of this issue in her public missive earlier this month in "A Time to Act", emphasizing that legislation must be set into place immediately to address the dangers ahead of us. | <urn:uuid:4cb45fc2-bbab-401d-9b97-34d410a5cce1> | CC-MAIN-2017-26 | http://greenswardcivitas.blogspot.com/2014/06/a-time-to-act.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323801.5/warc/CC-MAIN-20170628204133-20170628224133-00586.warc.gz | en | 0.96183 | 667 | 2.890625 | 3 |
The Code and Resolutions aim to protect and promote breastfeeding and to ensure the safe use of breastmilk substitutes if these are necessary.
In a UNICEF press release Roger Wright, UNICEF’s Representative for Iraq, called on Iraq’s government to reinforce national compliance with the International Code on Marketing of Breastmilk Substitutes. He also urged Iraq’s communities to give new mothers special care and support to help them breastfeed successfully. “Exclusive breastfeeding is the single most powerful means of protecting the health of Iraqi babies during this time of crisis,” he said.
According to UNICEF, free formula is being distributed to all infants as food rations as part of Iraq's Public Distribution System (PDS).
---UNICEF press release extract
Dr. Nidhal, Manager of the Breastfeeding Programme for Iraq’s Ministry of Health, noted that Iraq’s rate of exclusive breastfeeding was worryingly low, at just 25 per cent for infants under six months. The free distribution of infant formula through the PDS is a negative factor in contributing to these low rates, discouraging the traditional and much better exclusive breastfeeding.
“Breast milk is the best possible nourishment for children and contains everything they need to be healthy for the first six months,” she said. “It protects against diarrhoea from contaminated water, and also provides vital antibodies against pneumonia and other illnesses that could affect many Iraqi children during infancy. Mothers must not risk any other food or additional water for their young babies.”
---extract endsThe situation for mothers and babies in particular is very difficult in Iraq. According to UNICEF about one in 10 children under five in Iraq are underweight and one in five are short for their age, this report states:
Baby Milk Action and our partners in the International Baby Food Action Network (IBFAN) have long worked as part of the Emergency Nutrition Network on raising awareness of appropriate infant feeding support in emergency situations.
During the response to the asian tsunami at the end of 2004 we had to resort to warning the public in the UK that they were breaking the law if they sent free formula to the region as labels would not be in the appropriate language. It is far better for any required formula to be sourced locally so the instructions are in the correct language and distribution can be appropriate and accompanied by training. See:
However, in an Indian survey in Pondicherry it was found that infant formula was distributed by Non-Governmental Organisations (NGOs) indiscriminantly and: "The occurrence of diarrhea was three times higher among children who were fed with free breast milk substitutes (BMS) than in those who were not fed with the same."
Our IBFAN partners, the Breastfeeding Protection Network of India (BPNI) reviewed this and other studies at its national convention in December 2005. The proceedings can be downloaded by clicking here:
A survey on the response to the tsunami in Tamil Nedu, where Nestlé formula was routinely distributed by NGOs, found that "64% NGOs, 76% social workers, 32% paramedical staff and 87% victims" were unaware of the importance of breastfeeding in emergency situations.
The importance of promoting the benefits of breastfeeding before an emergency and enforcing the International Code and Resolutions (implemented comprehensively in India as the Infant Milk Substitutes Act) was stressed.
Also important is training of field workers on supporting mothers who may experience difficulties with breastfeeding due to stress and, in extreme cases, their own poor diet (though undernourished mothers are able to breastfeed). The Emergency Nutrition Network produces training modules for field workers.
IBFAN has a guide for the public, warning not to send donations of formula. With the tragic situation in Peru, which has just been hit by an earthquake, we are making our banner advertisement to this live to help to stop a bad situation being made worse by well-meaning people sending formula. See:
Feel free to copy the banner to your site, with the above link:We have worked closely with organisations such as Save the Children and Oxfam in the past. Both are responding to the Peruvian earthquake and have good operational guidance to make sure interventions are appropriate. Oxfam reports that 150,000 people are affected and so the effort to provide assistance will be considerable. You can donate following the links to the organisations. | <urn:uuid:10116413-8962-4ba2-8837-8356bd01e0e2> | CC-MAIN-2017-22 | http://boycottnestle.blogspot.com/2007/08/iraq-peru-emergencies.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609605.31/warc/CC-MAIN-20170528062748-20170528082748-00138.warc.gz | en | 0.95685 | 903 | 2.90625 | 3 |
Narayan Kavach / Why to recite Narayan Kavach/ Benefits of Narayan KavachNarayan Kavach means the armour of Lord Natayan. It is a prayer in the form of a Kavach (an armour) for the protection of oneself.
This Narayan Kavach appears in the sixth Skand of the eighth chapter of Shree Madabhaagavad. The first three shlokas ( verses ) of this Narayan Kavach are introductory shlokas. In these shlokas the king Parikshit asks, " Kindly tell me the Narayan Kavach through which Indra drove away the soldiers of his enemy and was able to get victory in the battle field. "
At this Shree Shukhdev says, " When the gods appointed Vishvaroop their priest then Vishnu roop taught Indra, the Narayan Kavach. "
Benefits of reciting Narayan Kavach -
The following are the benefits of reciting Narayan Kavach -
1. This Narayan Kavach protects the person from enemies if he recites it with full faith and devotion.
2. The person who reads Narayan Kavach is protected from all the dangers.
3. In the shlok 36 it is said that if the wearer of this armour ( in other words the person who recites this Narayan Kavach ) sees any one with his eyes or touches him with his feet, that person is immediately free from all kinds of fears.
4. In the shlok 37 of Narayan Kavach, it is said that the person who reads this Kavach, has no fear from the king, the robbers, the evil spirits and wild animals.
5. In the shlok 41, it is said that the person who reads this Narayan Kavach or even listens to it, all the beings respectfully bow down before him and he is free from all kinds of fears.
6. In the shlok 42, it is said that Indra learnt this knowledge from Aacharya Vishvaroop and Won the Asurs in the battle field and enjoyed Trailokya Lakshmi i.e. the wealth of the three worlds.
Other related Posts -
(14) Important and useful Mantra and Stotra
(14.9.1) Ramrakshastotra / Benefits of Ramrakshastotra
(14.9.1/1) Katyayani Mantra for a good and desired husband
(14.9.2) Vishnu sahastranam /Benefits of Vishnu Sahastranam stotra
(14.9.3) Narayan Kavach / Benefits of Narayan Kavach
(14.9.4) Ram Mantra for removing calamities
(14.9.5) Padmavati Mantra for progress in business
(14.9.6) Padmavati Mantra for getting ambitions fulfilled
(14.9.7) Padmavati Mantra for getting a good son
(14.9.8) Padmavati Mantra for getting money and prosperity
(14.9.9) Ram Mantra for wealth and prosperity
(14.9.10) Ram Mantra for happiness and happiness
(14.10.1) Om Namo Bhagawate Vaasudevaay - Benefits | <urn:uuid:88887d28-c1b8-4aff-ac3f-3da357c09767> | CC-MAIN-2017-34 | http://www.astromuhurat.com/2015/03/1493-narayan-kavach-benefits-of.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886126017.3/warc/CC-MAIN-20170824004740-20170824024740-00161.warc.gz | en | 0.899506 | 720 | 2.53125 | 3 |
(Best months for growing Strawberry Plants in USA - Zone 7a regions)
Strawberries are low-growing leafy plants which grow 12-15cm (about 6 inches) tall and will spread to about 50-100cm (20-40 inches). They have five petalled white or pink flowers. The flowers are followed by the delicious red fruits (which have their seeds on the outside).
Later in the season the plants send out runners like thin stems across the garden which will take root to form new plants. Cut them off and leave the parent growing. You can transplant the runners or let them grow where they rooted to produce new plants.
At the end of fruiting, trim off old yellow leaves and clean up any mouldy fruit still attached.
Strawberries like well drained soil with plenty of humus. To prepare your bed, dig in some compost before planting and possibly use a liquid fertiliser during the growing season. Well fed strawberries taste better.
To protect the fruit from moulds and mildew use some form of mulch around the plants. Straw, pine needles, or black plastic are all suitable. Mulch will also help suppress weeds.
Protect your plants with some sort of netting or bird scarer or you will lose most of your crop!
Strawberry plants often need replacing after a few years as they get affected by viruses and stop producing well.
Pick strawberries and eat them straight from the garden warm from the sunshine - delicious!
Strawberries can be used in any dessert needing soft fruit or berries. Summer pudding (which also has raspberries and blackberries or boysenberries), mousse, trifle, dipped in melted chocolate or just with cream.
Sprinkle a bowl of strawberries with balsamic vinegar and a little sugar to enhance the flavour and colour.
A quick jam of diced strawberries cooked in the microwave with an equal weight of sugar until completely soft won't keep but can be used right away.
This planting guide is a general reference intended for home gardeners. We recommend that you take into account your local conditions in making planting decisions. Gardenate is not a farming or commercial advisory service. For specific advice, please contact your local plant suppliers, gardening groups, or agricultural department.
The information on this site is presented in good faith, but we take no responsibility as to the accuracy of the information provided.
We cannot help if you are overrun by giant slugs. | <urn:uuid:3c8cbdb1-fd3b-42cb-ad48-a2cff206366e> | CC-MAIN-2023-06 | https://www.gardenate.com/plant/Strawberry+Plants?co=ALL&format=i&page=1&reply-to=38005&zone=10 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499946.80/warc/CC-MAIN-20230201144459-20230201174459-00044.warc.gz | en | 0.932639 | 536 | 3.359375 | 3 |
Sixty-two years ago, the U.S. Supreme Court ruled “the doctrine of ‘separate but equal’ [had] no place. Separate educational facilities are inherently unequal.” Yet if two recently released studies are to be believed, for too many children our public education system is becoming more segregated along both racial and economic lines.
On Tuesday, May 17th, the Government Accounting Office released a report on school enrollment patterns that found “from school years 2000-01 to 2013-14 (the most recent data available), the percentage of all K-12 public schools that had high percentages of poor and Black or Hispanic students grew from 9 to 16 percent.” Seen from another perspective, that of the Los Angeles Times, U.S. Department of Education data shows that “in the 2000-01 school year, 7,009 public schools were both poor and racially segregated. That number climbed to 15,089 by 2013-14.”
Just one day earlier, UCLA’s Civil Rights Project published a briefing paper from its ongoing look at race and public education. Their analysis of school data came to the following conclusion:
The share of intensely segregated nonwhite schools (which we defined as those schools with only 0-10% white students) more than tripled, rising from 5.7% to 18.6% of all public schools. Even as the resegregation was taking hold, there was a sharp decline in the percent of segregated white U.S. schools that have a tenth or fewer nonwhite students, dropping from 38.9% to 18.4%. The result of these diverging trends is that whites can perceive an increase in interracial contact even as African American and Latino students are increasingly isolated, often severely so.
When we recognize the connections between poverty, residential patterns, and race, these findings raise bright red flags when effective education is seen as the key to future success. According to Rep. Bobby Scott (D-VA), ranking member of the House Committee on Education and the Workforce, which had asked the GAO to conduct its study, “Segregation…[is] getting worse, and getting worse quickly, with more than 20 million students of color now attending racially and socioeconomically isolated public schools.”
A recent op-ed in Education Week underscores the critical importance of this new data. “Policymakers increasingly recognize that stresses related to student poverty—hunger, chronic illness, and, in too many cases, trauma—are the key barriers to teaching and learning.”
Decades ago, the Supreme Court struck down the legal structures that enforced racially segregated schools. These new studies show that other factors have allowed new barriers to be built. Changing residential patterns, a still-unfair economic framework, and the growth of alternate forms of public education have combined to allow inequality to rear its ugly head. Disturbingly, the authors of the UCLA CRP brief see little effort being made to reverse course:
The challenge of segregation grows each year and takes on more urgency as nonwhite students make up half of all students, yet it has been a long time since it was approached with vision to further integration and to provide the needed resources to do so. Instead, we have spent decades trying another approach: policies that have focused on attempting to equalize schools and opportunity though accountability and high-stakes testing policies, not to mention the federal subsidization of entirely new systems of school choice, like charter schools, without any civil rights provisions. These policies have not succeeded in reducing racial segregation or inequality.
The resistance to change is well illustrated in local, state, and federal battles to fund schools in less affluent communities sufficiently to provide the same level of education as can be offered in more affluent areas. The intertwining of race and economic status now pits white, affluent communities against poorer communities of color in a competition for a limited amount of educational funding. And that argument is bitter.
Should funds be prioritized for those at greatest risk and in districts with the least resources to spend on education, even if it means some districts will receive reduced funding? Just this week, Sen. Lamar Alexander, chairman of the Senate’s Health, Education, Labor and Pensions (HELP) Committee battled with U.S. Secretary of Education John B. King over how the federal government allocates funds specifically for boosting the education of low-income students. (Overall, the federal government provides about 10 percent of education funding, with the balance of funds provided evenly split between local and state governments). King’s proposed changes would result in more affluent districts losing current funds in order to assist areas in greater need, a change Alexander opposes vehemently. Randi Weingarten, president of the American Federation of Teachers, described the dilemma a fixed education pie puts in front of policymakers: “We don’t want to hurt one school to help another school. We have to help all schools.”
If separate is truly unequal, then we must either be willing to spend more money so that no one needs to have less in order for some to get more, or we must accept the pain of those whom segregation has favored giving up some of their benefits to even the playing field. The social and economic barriers that separate our children cannot be allowed to remain and sentence some of our children to dim futures. It will take courage and investment, but it must be done.—Martin Levine | <urn:uuid:1e9bc39f-7444-464a-8c7a-3df2f5f49a50> | CC-MAIN-2019-18 | https://nonprofitquarterly.org/2016/05/20/brown-v-board-education-decades-later-equality-still-elusive/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530505.30/warc/CC-MAIN-20190421080255-20190421102255-00141.warc.gz | en | 0.961804 | 1,111 | 3 | 3 |
All-electric vehicles (EVs) run on electricity only. They are propelled by one or more electric motors powered by rechargeable battery packs. EVs have several advantages over conventional vehicles:
- Energy efficient. EVs convert about 59%–62% of the electrical energy from the grid to power at the wheels. Conventional gasoline vehicles only convert about 17%–21% of the energy stored in gasoline to power at the wheels.*
- Environmentally friendly. EVs emit no tailpipe pollutants, although the power plant producing the electricity may emit them. Electricity from nuclear-, hydro-, solar-, or wind-powered plants causes no air pollutants.
- Performance benefits. Electric motors provide quiet, smooth operation and stronger acceleration and require less maintenance than internal combustion engines (ICEs).
- Reduced energy dependence. Electricity is a domestic energy source.
EVs do, however, face significant battery-related challenges:
- Driving range. Range is typically limited to 60 to 120 miles on a full charge although a few models can go 200 to 300 miles.
- Recharge time. Fully recharging the battery pack can take 4 to 8 hours. Even a "fast charge" to 80% capacity can take 30 min.
- Battery cost: The large battery packs are expensive and may need to be replaced one or more times.
- Bulk & weight: Battery packs are heavy and take up considerable space.
Researchers are working on improved battery technologies to increase driving range and reduce charging time, weight, and cost. These factors will ultimately determine the future of EVs.
EV energy use estimated by ORNL as follows:
- Electric motor efficiency—including inverter and gear reduction losses—assumed to be 76.4%–80.2%, using estimates from Miller et. al. (SAE 2011-01-0887) and adjusting downward by 4% for parasitic losses.
- Battery and charger efficiency are assumed to total 81% (roughly 90% each) based in part on estimates from published studies (Chae et. al., 2011; Gautam et. al., 2011). | <urn:uuid:67dbf459-b7dc-4714-9af3-9e419636ac2a> | CC-MAIN-2017-26 | http://www.fueleconomy.gov/Feg/evtech.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321961.50/warc/CC-MAIN-20170627235941-20170628015941-00637.warc.gz | en | 0.922022 | 427 | 3.828125 | 4 |
Comenzó con una pizza ebook
Guided Rd. Level S
Interest Level 3-12
Find the answers to all kinds of questions using mathematical equations! Translated in Spanish, this e-book teaches readers that they can use their understanding of variables, expressions, and equations to answer questions about anything from food to space! Create an equation to calculate how much pizza two boys eat! Create an equation to calculate how many baby teeth a growing child has left! Mathematical equations can provide the answers to so many questions. This Spanish-translated e-book shows readers how practical and useful their mathematical and STEM skills can be, encouraging them to look for math everywhere! With vibrant images, easy-to-read informational text, and simple practice problems, this digital resource will make equations fun and easy!
In this section you can find reviews from our customers, or you can add your own review for this particular product.
Customer reviews help other visitors to read feedback from users who have already purchased and are using TCM’s products. | <urn:uuid:9d0a2dc4-4465-4c0e-930c-6e5651a5018c> | CC-MAIN-2021-49 | https://www.teachercreatedmaterials.com/librarians/p/comenzo-con-una-pizza-ebook1/24944E/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363135.71/warc/CC-MAIN-20211205035505-20211205065505-00270.warc.gz | en | 0.871941 | 243 | 3.34375 | 3 |
noun, plural: sperms
A sperm is a cell consisting of a round or cylindrical nucleated cell, a short neck, and a thin motile tail. Its structure is vital to its mobility and function (i.e. sexual reproduction). The compacted nucleus contains half of the genetic information. It fuses with an ovum (the female gamete) to form a zygote. In mammals, the sex is determined by the sperm cell. If it bears Y chromosome, the resulting offspring is a male. If X chromosome, the offspring is a female.
Word origin: Greek, from sperma, spermat-, seed. | <urn:uuid:59cc016c-488c-4025-9064-bdf42b8690e4> | CC-MAIN-2018-39 | https://www.biology-online.org/dictionary/Sperm | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155817.29/warc/CC-MAIN-20180919024323-20180919044323-00233.warc.gz | en | 0.876635 | 137 | 3.53125 | 4 |
A recent study published in the journal JAMA Psychiatry shows that light therapy may actually help with depression, which affects about seven percent of American adults each year. Researchers studied a small group of adults with this condition, which yielded some compelling results.
Study participants who used light therapy sat in front of a light box for 30 minutes a day right after waking up. Among the 32 patients who did light therapy alone and the 29 who combined light therapy with Prozac, 44 percent and 59 percent experienced remission after eight weeks, respectively. By comparison, only 19 percent of the 31 patients who just took Prozac saw favorable results.
Many questions remain about how light therapy could affect depression. But according to Dr. Richard S. Schwartz, professor of psychiatry at Harvard Medical School, it’s likely related to shifting circadian rhythms so that your body thinks it’s earlier in the day.
In addition to depression, emerging evidence shows that light therapy may also help with bipolar disorder, chronic pain and improve sleep for those who suffer from dementia. | <urn:uuid:59d944ae-54e7-4ff4-b1d0-dc967222a615> | CC-MAIN-2022-05 | https://lifewavesplash.com/light-therapy-provides-a-brighter-outlook-for-many-in-need/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300810.66/warc/CC-MAIN-20220118092443-20220118122443-00497.warc.gz | en | 0.944517 | 209 | 2.8125 | 3 |
Let’s Milk a Cow – Learn about the differences between beef and dairy cows. Feel what it’s like to milk our simulated cow, Belinda. Discuss the products that come from milk. Recommended for ages 3 – 8. This meets state education standards for science for grades K – 3. $8/child
Egg Hunt - Come join us at Legare Farms for a chicken & egg adventure. Learn all about chickens and eggs and how they hatch. Visit our animals in our barnyard. We will then follow-up with an egg hunt and free time to play on our playground. $10/child
Egg hunt details: Cost is $10.00 per child (there is no charge for chaperones). We recommend one chaperone for every 6 children. Each field trip includes 8 – 10 eggs per child. Please contact us by phone at 843-559-0788 or email at email@example.com to schedule your Egg Hunt or for more information.
Seed Search - Learn about the different kinds of seeds, both farm plants and wild plants. Go on a seed collection walk and see how many different kinds of seeds you can find. Study the inside of a seed and see how it grows. This meets state education standards for science grades 3 – 5. $8/child
Fiber Fun - Learn about cotton, wool, flax and silk. Learn where they come from, how they are harvested and prepared.
Spring on the Farm - Learn about what happens on the farm in the springtime. Learn about planting and caring for seeds. Plant your own seeds to take home. Meet the new chicks and other baby animals. This meets state education standards for science for grades K – 4. Available March 15 through April 30. $8/child
Pet our sheep and learn about their unique names and why they are a threatened species. This meets state education standards for science for grades 3 – 5. $8/child
Pumpkin Patch - Learn about pumpkins and how they grow. Each child will pick a pumpkin from our patch to take home. Take a hayride to feed the cows. This meets state education standards for grades K – 4. Available in October. $10/child
Thanksgiving on the Farm - Learn about the first Thanksgiving and what the pilgrims ate. Discuss these foods and compare them to what we eat today. Visit our animal barnyard and talk about what animals we have today and what animals the Pilgrims had. Take a hayride out to feed the cows. This meets state education standards for social studies and history for grades K – 5. Available November. $8/child
On the farm, here are some animals you might see:
- Chicken - Our chickens are 1 to 2 year old layers.
- Donkeys - We have 3 donkeys: Coco, Aurora, and Borealis.
- Goats - We have 3 goats: Olive, Butterscotch, and Oscar.
- Horses - Our horses are named Ginger, who is a 26 year old Arabians, Blaze, who is a Quarterhorse, Buddy, a mix paint and Quarterhorse, and Lacey, who is 28 years old.
- Pig - We have a large variety of Heritage breed pigs. Choose a pig and you can name it.
- Rabbits - Our rabbits are Peter Rabbit and Cottontail. They are 1 years old.
- Sheep - All of our sheep are Jacobs sheep. This breed is black and white spotted and can have from 2 to 6 horns.
- Turkey - Our Turkeys are red bourbon turkeys. | <urn:uuid:13e34b3d-d1ee-47b9-85c4-ec844e303261> | CC-MAIN-2021-39 | https://legarefarms.com/pages/field-trips | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057861.0/warc/CC-MAIN-20210926114012-20210926144012-00363.warc.gz | en | 0.921704 | 744 | 2.984375 | 3 |
Of Waves and Dragons
There are typically four ways in which a Knight will gain a manor, from their Lord, inherited from their family, as a dowry through marriage and through conquest.
The most common way knights gain their lands is from the Lords. After they are knighted the Lord is expected to provide for the new knight and will write out a charter. The charter outlines what the land the Lord is handing out, what he is expecting in return from the land and when if ever the land returns to the Lord.
After naming the land or lands to be handed out the Lord must decide if they are to be Gifted or Granted. Gifted land is land that a knight is to oversee in return for his service, he is paid a wage (usually 4 libra) and is expected to care for the land and see that its income is brought to the lord. Knights with Gifts can improve their land and keep the extra income gained from the improvements (That is the base income of the improvements. See Winter Phase for more details). A Knight will typically not be in control of more than one Gifted land, any lands past their first must be Granted. Granted land is land that a Knight has full reign over. He is not expected to return any money to his lord but also does not receive a wage for overseeing the land. He is also free to build any improvements on the land.
Once it is decided if the land is Gifted or Granted then the service expected is addressed. Typically this entails how many men the Knight must bring in times of war. In the case of Gifts typically one Knights service is expected along with the income from the land. Grants will often demand more from the land holder. This is usually one knight service along with a number of foot soldiers, typically around 10.
After deciding the terms of service from the land the Lord then must decide how long the knight will hold the land. This is always either until the knights death or to remain in his family.
The second way a knight gains lands is through inheritance. If the Knights father possessed land that was either chartered to remain in his family or not under the control of a Lord then he would gain control of the land upon his father’s death or retirement.
The third way is marriage. Particularly wealthy or widowed noble women can often bring lands to a Knight upon their marriage. This is somewhat uncommon as even among nobles owning enough lands to hand out on your daughter’s wedding is rare. The Knight is still bound by any charters that come with the lands but usually these charters are not strictly enforced.
War is the final way in which a Knight can gain land. Land gained in this way are typically clear of any charters and obligations to the Knights lord and so are Knight to do with as they please. These lands will typically be too far away from the Knights home for them to oversee properly and so it may be prudent to Gift or Grant these lands away.
Knights that gain a number of lands within the same country are often named Vassals of their Lord. This brings a Glory bonus depending on the standing of the Lord along with more sway in their Lords court.
Note: Players who have a number of lands may need to write their own charters giving control of land typically to NPC Knights. When doing this they should understand that while Gifting Lands can bring in a fair sum of libra Granting lands will improve the Knights loyalty to the player and their drive to improve the land. This is even more so if the land is to remain in their family. This means that when you require their service the knight will be more skilled, have more soldiers and respond more quickly. They may even be more willing to stay on the campaign past the usual 40 days. | <urn:uuid:5ba761ef-8692-4c65-926b-49e255ef6db4> | CC-MAIN-2018-43 | https://ofwavesanddragons.obsidianportal.com/wiki_pages/gaining-manors | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511365.50/warc/CC-MAIN-20181018001031-20181018022531-00311.warc.gz | en | 0.972735 | 771 | 2.765625 | 3 |
Chemistry Outcomes Review: Chapter 11
In this final chapter, we tried to bring together much of what you already had learned in order to propose chemically reasonable pathways for chemical reactions. In addition, we introduced new concepts, based on measurements of reaction rates, to help in developing and understanding reaction pathways. We found that rates of reaction can be described in terms of rate laws that involve the concentrations of species in the reaction system and a proportionality constant, the rate constant. The species in the rate law are those that enter the reaction pathway before or during the rate-limiting step for the reaction. The rate constants for reactions are temperature dependent and their increase with increasing temperature is described by the Arrhenius equation.
The form of the Arrhenius equation is a consequence of the necessity for reactants to encounter one another in the right orientation and with enough energy to overcome an activation energy barrier and of the distribution of energy among encounters in the reacting system. Absorption of light by a reactant molecule is a way to initiate reactions that require more energy than is available thermally at room temperature.
We have to keep in mind that only reactions that are thermodynamically favorable, under the conditions specified, can occur spontaneously. Whether they will actually be observed to occur depends upon the kinetics of the reaction pathway(s) available.
Your understanding of the ideas in this chapter by reviewing these expected outcomes of your study.
You should be able to:
- Determine the initial rate of a reaction in units of Ms-1 from data for the concentration (or a property that is directly proportional to concentration, such as gas pressure or absorbance) of a reactant or product as a function of time [Section 11.2].
- Use initial rate and concentration data to determine the order of a reaction with respect to the concentrations of species in the solution and write the rate law for the reaction [Section 11.3].
- Explain in words and/or with drawings how the rate of a reaction depends only on the rate of the rate-limiting step in the reaction pathway [Section 11.3].
- Derive the rate law for a reaction whose pathway (mechanism), including knowledge of the rate-limiting step, you are given [Sections 11.4 and 11.5].
- Propose a pathway (mechanism) for a reaction that is similar or analogous to one whose pathway you know [Sections 11.4 and 11.5].
- Use data for concentration (or a property that is directly proportional to concentration) of a reactant or product as a function of time for a first order reaction to determine the rate constant and half life for the reaction [Section 11.5].
- Use rate constants and/or half lives for radioactive decay to determine how long a sample of a radioisotope has been decaying from some known initial radioactivity [Section 11.5].
- Determine whether a reaction is zeroth or first order in the concentration of some species by plotting appropriate functions of its concentration vs. time [Section 11.5].
- Explain what is meant by "flooding" a reaction and use rate and concentration data for a reaction that is flooded with respect to a species to find the order of reaction with respect to the concentration of that species [Section 11.5].
- Use the temperature variation of the rate constant (or variables directly proportional to the rate constant, such as rates with the same concentrations of all species) to determine the activation energy for a reaction [Section 11.6].
- Use rate constant and activation energy values to determine the Arrhenius frequency factor for a reaction [Section 11.6].
- Construct and interpret an activation energy diagram, given information about the activation energy and enthalpy change for the reaction [Section 11.6].
- Describe how encounters between reactants in solution differ from collisions between reactants in the gas phase [Section 11.6].
- Describe the origin of the temperature dependence of the rate constant and why the dependence is so strong when the average energy of molecular encounters does not increase so rapidly [Section 11.6].
- Explain how light can initiate reactions that would not otherwise occur at low (room) temperature [Section 11.7].
- Describe how competing photochemical and thermal reactions can lead to a steady state concentration of a reactive species in a system [Section 11.7].
- Explain why some reactions that are highly favored thermodynamically are not observed to occur [Section 11.8].
- Describe factors that can be changed to provide favorable kinetics for spontaneous reactions that are not otherwise observable [Section 11.8].
- Relate the temperature dependence of an equilibrium constant to the temperature dependences of the forward and reverse rate constants for the reaction [Section 11.8]. | <urn:uuid:fa936e95-fdbe-436b-9250-76b41466f299> | CC-MAIN-2014-41 | http://www.acs.org/content/acs/en/education/resources/undergraduate/chemistry/outcomes/outcomes-review-chapter-11.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657133564.63/warc/CC-MAIN-20140914011213-00106-ip-10-196-40-205.us-west-1.compute.internal.warc.gz | en | 0.915157 | 995 | 3.875 | 4 |
The campaigns of 1755 began when Britain’s ranking military leaders in North America met in Alexandria, Virginia with the colonial royal governors of Maryland, Massachusetts, New York, Pennsylvania, and Virginia, at the home of prominent Ohio Company member, John Carlyle. On April 14-15, 1755, in what became known as the “Carlyle House Congress,” the newly minted commander in chief of His Majesty’s Forces in North America, Major General Edward Braddock, presented London’s military objectives for that coming spring and summer. The Crown’s strategy, on paper, was simple: capture and hold key French fortifications within the boundaries of New York, Nova Scotia, and Pennsylvania before the enemy could concentrate his strength. This plan was intended to oust the French from His Majesty’s colonial possessions on the continent before a large-scale conflict could commence.
The task of subduing the French, Canadians, and their Native American auxiliaries in these regions fell upon a mixed contingent of British Regular soldiers, colonial provincial troops, and British-allied Native American warriors. How each group would be utilized depended upon how the respective expeditionary field commander chose to execute his orders by moving, supplying, and fighting his men.
In the orders laid out by the Captain-General of His Majesty’s Forces, the Duke of Cumberland, Edward Braddock was to capture Fort Duquesne, located at the Forks of the Ohio River. William Shirley, the royal governor of Massachusetts and second-in-command in North America, was to advance to Lake Ontario and besiege Fort Niagara. “[Shirley] express’d the greatest Readiness to engage in it …,” Braddock recorded following the Alexandria meeting, “I therefore order’d him to take his own Regiment [50th Regiment of Foot] which is compleat, and Sir William Pepperell’s [51st Regiment of Foot] … and to proceed upon it as soon as possible with my orders to reinforce the Garrison at Oswego … and put the Works in such Repair as to preserve the Garrison and secure his Retreat and Convoys.” William Johnson, of New York, was tasked with securing Lake George in the Adirondack Mountains and subsequently moving north and ousting the French from Crown Point along Lake Champlain. Finally, Lt. Col. Robert Monckton’s orders destined him to rid Nova Scotia of French influence by targeting forts along the Chignecto Isthmus. William Shirley had been working closely with Nova Scotia’s royal governor, Charles Lawrence, on this piece of Britain’s strategy for 1755. They had settled on an expeditionary force consisting predominantly of New England provincial troops to undertake the operation “for repelling the French from their new Encroachments on the Bay of Fund[y],” Braddock remembered, “which I approv’d of, and immediately sent orders to Lt. Colonel Monckton to take upon him that Command and carry it into execution.”
Braddock’s army of over 2,400 men was the centerpiece of the four-pronged offensive during the summer of 1755. The colonies of Pennsylvania, Maryland, and Virginia were ordered to raise volunteer companies to assist Braddock. His campaign was to be a tremendous logistical undertaking. The 300-plus mile advance west through Maryland, Pennsylvania, and Virginia was something not accomplished by any fighting force on the continent up to that point in history. Once his army had captured Fort Duquesne, its job was not yet complete. The Duke of Cumberland’s orders for the general represent the unrealistic approach to waging war in North America that the British carried with them overseas during the first full year of the French and Indian War. Following the capitulation of Fort Duquense, the Captain-General advised Braddock:
If you should find, that the two British Regiments [Braddock’s 44th and 48th Regiments of Foot] will be sufficient for performing the service at Niagara, you may, then, employ the two American Regiments [the 50th and 51st Regiments of Foot with Shirley], at the same time, in dispossessing the French from their Post at Crown Point, on Lake [Champlain], which is the next point you will endeavor to gain; But no positive instructions can be given you, upon this head, as you can only judge, hereafter, whether such a separate operation can be undertaken, at the same time, that you are making yourself Master of that most material one, at Niagara. However after you shall have possessed yourself of the Niagara Forts, and shall have opened a safe communication betwixt that, and Oswego (which will not only secure the Back settlements, but likewise, bring back those Indians, who have fallen off from Our interest, and joined the French); It is our will and pleasure, that the next service upon which you shall proceed, shall be … The reducing of the Fort at Crown Point, and entering another upon the Lake [Champlain], in such place as you shall find most effectual for bridling the French Indians in those parts and for securing and protecting, our neighboring colonies.
These orders to Braddock involved a tremendous amount of moving pieces, which seemingly relied solely on the success of his army’s expedition against Fort Duquesne. As asserted within the proposed plan, when Braddock secured the Forks of the Ohio River he was then to advance his army north to assist William Shirley in capturing Forts Niagara and Frontenac (if the former surrendered without much inconvenience). If Braddock’s two regular regiments proved “to be sufficient for performing the service,” then the two units already with Shirley were to march to reinforce Johnson at Lake Champlain or Lake George. Not taken into account by the Duke of Cumberland were the hundreds of extra miles that would need to be traveled in order for Braddock’s and Shirley’s men to reach their secondary destinations. It was an unrealistic approach to the great logistical undertaking necessary to move armies and supplies in North America, more specifically in regions where roads did not exist. Braddock did not reach the Forks until July, Shirley’s vanguard did not arrive at its jump-off point, Fort Oswego, until the middle of August, and Johnson’s force did not begin encamping at the southern end of Lake George until the end of August and the beginning of September. The idea that Braddock could capture Fort Duquesne, advance to Lake Ontario, drive the French from the region, dispatch the 50th and 51st Regiments to Lake George, and then capture Crown Point all before the changing seasons ended campaigning for that year is inconceivable. This was a prime example of Britain’s initial ignorance toward the true nature of warfare in North America and the continent itself as a whole.
An interesting aspect about Braddock’s orders was the focus placed on the importance of the Native Americans. Securing a foothold along Lake Ontario and establishing communications with western Pennsylvania (again, after Fort Duquesne capitulated) was believed to be a prime method of persuading the Native Americans of those occupied regions, such as the Shawnee, Delaware, Ottawa, Wyandot, and Potawatomi, to open diplomatic talks with the British. Further east, once the French at Crown Point had been subdued, Braddock was ordered to search for “such place as you shall find most effectual for bridling the French Indians in those parts …..” This, of course, implied the construction of a fort as a show of force to pry the Native Americans away from the French, giving the British complete control of and influence over the tribes south of New France’s border. William Johnson had been appointed Superintendent of Indian Affairs for the Northern Colonies by Braddock, so it was his duty to obtain military assistance from the Natives or see to it that they should remain neutral. He succeeded in securing the help of over 200 Mohawk warriors under Theyanoguin, the sachem known to the British as “Chief Hendrick,” for his expedition against Crown Point. However, Braddock was only able to muster the support of less than a dozen Ohio Iroquois for his own campaign.
It has been argued by historians that the British failed to appreciate the impact of the Native Americans during the first few years of the war. While they did struggle to expand their alliances and enhance their influence among the Native Americans, the evidence in Cumberland’s written orders demonstrates that London understood that the French held the advantage in the contested regions, and that it was imperative to sever the ties between the enemy and his Native allies.
The objectives for the spring and summer of 1755 had been laid out in their entirety. It was only a matter of each respective commander fulfilling his duties and successfully executing his orders. It began with Braddock and his march to destiny near the Forks of the Ohio River.
Stanley Pargellis, ed., Military Affairs in North America, 1746-65: Selected Documents from the Cumberland Papers in Windsor Castle (New York, NY: D. Appleton-Century Company, 1936), 82.
Ibid., 81.
E.B. O’Callaghan, ed., Documents Relative to the Colonial History of the State of New-York, vol. 6 (Albany, NY: Weed, Parsons and Company, 1853), 116. . | <urn:uuid:0a32683e-eccc-4921-930b-ddbe763ea2b0> | CC-MAIN-2020-40 | https://emergingrevolutionarywar.org/2018/04/11/the-carlyle-house-congress-and-britains-military-objectives-for-1755/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400187899.11/warc/CC-MAIN-20200918124116-20200918154116-00062.warc.gz | en | 0.965315 | 1,974 | 3.6875 | 4 |
In case you’re taught a research paper should be limited to one or two pages, then you are sadly mistaken. Research papers could be lengthy, even when limited to one page. It depends not only on how much time you want the paper to function but also on the topic you choose to write on. The length of the research paper is going to be set by a number of factors such as the subject you choose to research but in addition, paper writings it depends on your abilities and skills as a writer.
A research paper is generally an extended written composition that presents either your own research or monitoring or an end or review of prior studies on precisely the same topic. You may either decide to research in your topic or to read and review articles written on the same topic. When you compose an article, you normally use what you already know and have considered about a particular topic. However, when you write a research paper, you make an effort to research and read about topics of your choice and build on what you know.
In writing research papers, it is also important to add secondary sources which may be more relevant to your subject. These secondary sources are meant to complement or build on the work performed in the principal source. The primary source has to be well researched and presented for the secondary sources to be of significance.
To be able to guarantee the success of your research paper, you must follow an instructor’s directions. Directions given to you through the research process won’t always yield the desired benefits. It’d be better to change your directions to suit the requirements of the instructor. However if you’ve already read through your instructor’s notes and have opted to move anyway, then here are a couple of tips that will help you on the way.
Among the best advice for succeeding in an assignment is to avoid plagiarizing. Plagiarism is equated to stealing since it’s a process of taking ideas and presenting them as your own. Though there are strict regulations and rules relating to this, many nevertheless plagiarize. If you have the opportunity, do not plagiarize. Rather, find a resource which shows a similarity into your research paper and use this instead to your work.
Along with avoiding plagiarism, you also need to do a bit of research concerning the scholars or groups you are drawing reference from. This may include checking the web for previous studies which may include your topic. Past studies may provide you with a sense about how scholars of yesteryear have introduced similar ideas. You also need to attempt to check at the citation page of the source so you will have an idea about the amount of information supplied.
The last part of your research paper is that the discussion section. Though it is generally a brief part of your newspaper, there’s a big importance of the discussion section. This section needs to be quite careful and thought out. The most important purpose of the discussion section is to discuss your paper with other scholars and also to see their responses. You ought to take their opinions seriously because these are the men and women who are reviewing and commenting on your work.
You should also do an analytical research paper analysis. Analytical research papers frequently have distinct objectives. If you merely want to present information, you need to go back to the drawing table and analyze the information yourself. On the other hand, if you want to examine and interpret information, you should first ask questions and seek clarifications from individuals who know the answers. After you have done your analytical research paper, it’s then time to write your conclusion. However, before writing your decision, you need to ensure all your data, resources, and investigations are cited. | <urn:uuid:dd5743a0-449b-4c9e-bb0f-f71b12b660d2> | CC-MAIN-2022-40 | https://airkinggroup.com/tips-for-writing-an-analytical-research-paper/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338001.99/warc/CC-MAIN-20221007080917-20221007110917-00228.warc.gz | en | 0.956534 | 751 | 2.515625 | 3 |
Ankle Replacement is surgery to replace the damaged bone in the ankle joint. Artificial joint parts (prosthetics) are used to replace the bones. Still ankle replacement is not a common procedure and the research is ongoing to improve the results. In India the surgery is done by joint replacement surgeons who have trained in ankle replacement. Ankle replacement is a surgery where in a patient speific implant is put in place of the old ankle.
How Does The Ankle Replacement Surgery Work?
Ankle replacement involves replacing the natural surfaces of the ankle joint which have degenerated with an artificial cover known as prosthesis. The ankle replacement has three components. Two of the components cover the joint and in the middle there is a third, mobile component. This allows for greater movement and reduces the stress between the bone and the implants.
The component which covers the part of the ankle joint known as the tibia is flat. It is integrated into the bone with a short stem. The component which covers the part of the ankle joint known as the talus is curved and fixed into place with pegs. All the components are covered in a bioactive coating which encourages the patient’s own bone to grow into the artificial fixtures.
Advantages of Ankle Replacement Surgery:-
- Relieve pain and restore joint function in patients with end-stage degenerative joint disease resulting from osteoarthritis, traumatic arthritis or rheumatoid arthritis.
- It helps protect the surrounding joints (eg. subtalar joint) compared to an ankle fusion
- Gives a good useable range of movement of ankle
- Encourages a more normal walking gait pattern | <urn:uuid:c49ec196-8cc3-4c4b-8946-470ef3a71da0> | CC-MAIN-2022-40 | https://drashishrana.in/ankle-replacement/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00119.warc.gz | en | 0.930895 | 344 | 2.96875 | 3 |
Brain teasers for children comes in great shape. Encouraging these to have fun with puzzles develops their cognitive thinking skills. Riddles cause them to become think in unconventional ways with given constraints in your mind.
1. Memory Brain Games
These games challenge their memory, concentration and observation skills. Convey a couple of picture cards and allow the kids recall the cards for time. Close them and keep these things recall the picture cards. The amount of cards and also the time is determined by the power degree of the children. Another extension of the game is to remove one card and get them which picture card is missing.
2. Visual brain teasers for children
These games develop visualization skill. With respect to the ability from the kids, possess a puzzle group of 10-20 pieces. Remove several pieces and get the children to slot in the missing pieces. Another classical game would be to place the variations between 2 identical pictures but several products are missing from among the pictures.
3. Physical learning games
These games develop their physical and imaginary skills. Farmville develops their feeling of touch. Show several toys towards the kids. Allow them to touch, hold and explore the toys. It’s best once the toys have different shapes and textures like smooth, rough, furry and leatherlike surfaces. Place the toys inside a cloth bag. The children need to take their hands within the bag to you know what the toy is as simple as feeling it. Cause them to become describe what they’re touching. An execllent game to enhance their feeling of sight would be to describe a product inside a room and get the children to locate it.
4. Language brain teasers for children
These games develop literacy skills because the kids have to consider and manipulate words and letters. Write the children names around the board and keep these things create words while using letters within their names. A good example, Sara, John and Peter – the children can make words like ran, hen, near or tear. Another fun game to rehearse spelling and speaking skills is playing the classical crossword puzzle. The children can get fulfillment when they’re led initially so they understand what they do in order to fill the empty grid boxes.
5. Logic brain teasers for children
Riddles develop problem-solving skills because it trains the children to determine how making relationships between items of information might help them solution-find plus they engage the children in a huge number of thinking activity.
When kids receive stimulation through positive interactions with caring adults throughout their early years, connections between neurons and synapses are created because they learn so when appropriate brain teasers for children are utilized, they’re because of the chance to build up their thinking and employ remarkable ability to question and reason once they learn and these types of important options that come with great thinkers. | <urn:uuid:ea866c9c-7101-4760-85d5-0e272a43c420> | CC-MAIN-2019-22 | http://www.krisoul.com/easy-and-fun-brain-teasers-for-children.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255562.23/warc/CC-MAIN-20190520041753-20190520063753-00357.warc.gz | en | 0.955029 | 575 | 3.78125 | 4 |
Before the war on drugs, and before marijuana culture in America, cannabis was a popular drug for thousands of years and many ancient civilizations used cannabis for ceremonial and medicinal purposes. In 2013 scientists discovered the earliest case of marijuana use ever found in Pakistan where a man was burried in the Hindu Kush Mountains. The prehistoric tomb had cannabis seeds, resin, and ash in a pit, which researchers believe were used for ritual purposes. Before the tomb was discovered in Pakistan, China was home to the oldest grave of 2,700 years ago when a shaman was buried with a 2-pound stash of marijuana. Interestingly enough, the 2-pound stash featured no male plants, which are less psychoactive, showing both education and forethought towards the drug. Ancient Egyptian culture also highly regarded marijuana both medically and spritually. Egyptian scrolls and even the oldest known complete medical textbook reference medical uses for the plant way back in 3,000 BC.
Genetic and chemical analysis revealed that the herbs found in the grave were cannabis. It was also found that all the male plants which are less psychoactive than their female counterparts were picked out of the 2-pound stash.
This may indicate that the ancient civilization was aware of and made use of the psychoactive properties associated with the plant. The individual found with the 2-pound stash was said to be a member of the Gushi civilization around the age of 45 and a shaman.
An ancient Egyptian papyrus scroll dating back to 1700 BC was found to contain some of the first known medical references to marijuana. Hemp which is made from the male cannabis plant was used in ancient Egypt as a material to make things like rope and fine linens. | <urn:uuid:7dcc05d6-b33f-4875-88fc-6042fdc55dc6> | CC-MAIN-2019-09 | https://wheresweed.com/blog/fun/2016/jun/marijuana-use-dates-back-almost-5000-years | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494449.56/warc/CC-MAIN-20190220044622-20190220070622-00296.warc.gz | en | 0.983259 | 337 | 3.3125 | 3 |
Bears hibernate in spans of a few weeks to several months, depending on the species, the weather, and available food stores. During that period, their metabolism drops to about a third of normal. There is a shift away from protein and carbohydrate metabolism toward fat breakdown. These processes result in a few notable changes in renal function: creatinine rises (from an average of 1-1.5 mg/dL to 3 mg/dL, thought to be due to decreased renal perfusion), and urea:creatinine ratio falls (as a result of decreased protein metabolism). A small amount of urine, about 100 mL, is produced, and the water and nitrogenous breakdown products are reabsorbed through the bladder. How does this happen? No idea. Urea is degraded, again by an unknown mechanism: one theory is that urease-producing bacteria in the gut aid in breakdown. Nitrogen is also thought to be shunted toward protein anabolism. The amazing result is that blood from hibernating bears does not contain an elevated level of urea, uric acid, amino acids, or ammonia. They replenish the water lost via respiration via lipolysis, where water is an end product. Interestingly, despite increased fat metabolism, bears do not develop a ketosis. Again, not sure why (may be related to increased glycerol metabolism).
So, next time you see a bear foraging through garbage pails, or sniffing around your campsite, remember: he may be looking for food, but he does not need to find the latrine. | <urn:uuid:fce30482-fe6a-466e-88d2-88d1a37e9fc7> | CC-MAIN-2021-31 | https://www.renalfellow.org/2010/09/29/do-hibernating-bears-urinate/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153897.89/warc/CC-MAIN-20210729203133-20210729233133-00268.warc.gz | en | 0.943471 | 326 | 3 | 3 |
In the late Cretaceous Period (75 million years ago), the landscape was very different. The climate was subtropical, with lush forests covering a coastal plain. Rivers flowed east, across the plain into a warm inland sea.
The conditions were perfect for the preservation of dinosaurs' bones as fossils. After a century of excavations, over 150 complete dinosaur skeletons have been discovered. Disorganized concentrations of bones, called "bone beds", have also been discovered. Over 50 dinosaur species have been found here, joining a list of another 450 fossil organisms.
These ancient remains give us the world's most complete record of the late Cretaceous Period. Dinosaur Provincial Park has been designated a UNESCO World Heritage Site.
The distinct landscapes of Dinosaur Provincial Park (badlands, riverside and grasslands) host a unique diversity of plants and animals.
Towering cottonwood trees grow by the river where there is abundant water and fertile soil. The trees form a canopy, filtering heat and light. This living roof supports an understory that nurtures the moisture-loving residents of the forest floor. The narrow riverbank corridor (called the riparian zone) creates ideal living spaces, especially for birds. Although the smallest habitat in the park, it hosts the greatest concentration of life.
The three distinct habitats of Dinosaur Provincial Park support many plants.
Alberta's distinct landscapes are our Natural Regions. Each of the six Natural Regions is further divided into Subregions based on more specific landscape, climate and species distinctions.
Dinosaur Provincial Park preserves a representative sample of the environmental diversity of the Dry Mixedgrass Subregion of the Grassland Natural Region.
The Grassland Natural Region is characterized by cold winters, warm summers, high winds and low precipitation. The region is a flat to gently rolling plain with a few major hill systems. It is punctuated by exposed bedrock, carved sandstone cliffs, ancient boulders and other reminders of the last ice age. Unique landscapes known as badlands exist where wind and water have carved the bedrock. Plants have adapted to the severe moisture shortage of mid-to-late summer.
Dinosaur Provincial Park is located in the Dry Mixedgrass Subregion of the Grassland Natural Region. This is the warmest and driest subregion in Alberta. Permanent streams are relatively rare. The ones that do exist are deeply carved into the bedrock in some places. This has exposed Cretaceous shales and sandstones, creating extensive badlands in some areas. | <urn:uuid:b6632a02-a320-4729-9fd6-87a49e2b1d66> | CC-MAIN-2019-51 | https://albertaparks.ca/parks/south/dinosaur-pp/information-facilities/nature-history/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540500637.40/warc/CC-MAIN-20191207160050-20191207184050-00234.warc.gz | en | 0.92469 | 503 | 4 | 4 |
The web its comfortable design is attained through Cascading Stylesheets (CSS). The CSS has developed in recent years, and the web will look attractive to an individual’s eye without it. In the ancient times, the website styling was achieved through the HTML usage. Currently, both HTML5 and CSS usages are applied to attain excellent results in application design, web design and also in rare cases of software design. The styling language is evolving. The advanced features like filters are incorporated directly into the website pages with the aid of CSS3.
The following are examples of the reputable and well trusted CSS frameworks available today;
Material design involves applying proven concepts which are scientific into a short and simple web design concept. Since the specification was released by Google, it has resulted in the rise of material design. It has led to some tutorials sprout and frameworks which assists or aids the web developers to incorporate the full possibility of material design in their apps, software, projects, platforms, and websites. The majority of developers prefer material framework because it is easier to use. It only uses CSS, so an individual requires to load the real CSS library and revert into documentation.
Leaf is the type of CSS framework available which is very flexible. The CSS library approach is utilized by leaf, and multiple ways are provided to integrate material design elements within a developer website pages and web design concepts. The leaf’s capabilities can be learned from navigation menu within the component tab.
Essence is a lightweight framework that uses the style guide from material design spec which is official, and the standard ReactJS library is integrated with it. For attractive and reliable web and mobile app user interfaces plus the build up to be fast, a person should tap into the potential of Essence. Its components and styles are driven with ease to use syntax that will aid an individual to proceed with his or her next design within a shorter duration of the learning process.… | <urn:uuid:1fcc8668-f92a-45f0-b74a-3f4cc22f5506> | CC-MAIN-2021-25 | https://www.qbell.net/tag/css/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488556482.89/warc/CC-MAIN-20210624171713-20210624201713-00596.warc.gz | en | 0.938868 | 390 | 2.71875 | 3 |
Every July 4th Americans celebrate the signing of the Declaration of Independence, the document that broke the 13 colonies away from Great Britain and launched the greatest experiment in representative government that the world had ever seen. But 242 years after the Declaration was issued, can Americans still say that they are really free?
The Declaration of Independence didn’t arise out of a vacuum, it was a response to decades of abuses suffered at the hands of the British crown. The irony, however, is that today our own government abuses us far more than the British government ever did, yet not only do most people accept that abuse, they even celebrate it and wish for more.
There’s a hilarious cartoon that sadly illustrates just how far the government intrudes into our lives.
For those who can’t read the cartoon, it reads:
Hope all is well in Iraq. We are so proud of you for going over there to fight for our freedom. A lot has happened since you left… Our home was taken by the feds for back taxes we owed, and then the family business was condemned by the city so they could build a football stadium. Mom was arrested for carrying a gun in her purse and your brother is in prison for smoking a joint. At least your sister is okay, though she has to go to court for not wearing a seatbelt. We wish you were here to help pay for all the legal fees, but just knowing you are over there fighting for the liberties we cherish makes it all worthwhile.
The cartoon originally ran in 2004, but it’s just as poignant today as it was then. Rather than defending our liberties and protecting the citizenry from harm, the government has turned into an overweening mother, attempting to “keep us safe” even against our will, by passing law after law and regulation after regulation to modify our behavior.
Half the population or more doesn’t bat an eye when government has the gall to try to tell people what to do. From trying to ban guns, to enacting taxes on plastic shopping bags and sugary drinks, to taxing the very land we supposedly “own,” the government today is far more destructive of liberty than George III ever was. Yet people not only welcome it, they celebrate how the government is “trying to keep us safe and healthy.”
And despite how bad those laws get, people who consider themselves constitutional conservatives often defend the very people who uphold those laws, the police. If it weren’t for police willing to enforce those unconstitutional and immoral laws, they wouldn’t be able to be enforced and would therefore have no effect.
Police are the modern-day redcoats, enforcing whatever rules the government forces down our throats because “it’s the law,” yet so-called conservatives will bend over backwards to defend them. Could you imagine George Washington, Thomas Jefferson, or Patrick Henry saying: “We don’t have a problem with the redcoats for enforcing the Stamp Act, the problem is with Parliament for passing the Act. We support our local redcoats and we’ll just wait for a new Parliament and things will get better.”
Freedom is as much as matter of internal disposition as it is a lack of external restrictions. In order to be truly free, people need to throw off an internal mindset that has made peace with tyrannical government and embrace the same revolutionary mindset of the Founding Fathers, combating government overreach wherever they see it rather than reflexively defending unexamined attitudes they may have been accustomed to for years or decades. | <urn:uuid:5a9cc966-db7a-4a05-963b-707378bedc0f> | CC-MAIN-2018-47 | http://redtea.com/america-now/is-america-still-free/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743963.32/warc/CC-MAIN-20181118031826-20181118053826-00096.warc.gz | en | 0.969738 | 739 | 2.765625 | 3 |
| rhythm guitar | guitar chords
Guitar Lessons: Beginner
Learn how to put chords and notes together to play a song you can recognize.
main question is I know chords and I can strum but I'm having
problems understanding how to put cords and notes together to play
a song you can recognize. I need to see both hands at the same
time. I've read every thing I can get my hands on but I still do
not understand. Thank You for any help you can give me. Maybe I'm
just to old to be trying to play the guitar!! I like your program
and I am just about ready to buy it but I wanted to wait to see if
I could even play the guitar first.
Most guitarists start out by learning
a few chords and singing along with their guitar accompaniment.
When a person approaches learning the guitar in this manner they
sing the melody (i.e their voice is providing the melody) whilst
their guitar playing is supporting the melody with rhythm and
Another option is to learn to read standard music notation, that
gives the guitarist the benefit of being able to play single note
melodies.This is an excellent skill to acquire and a lot fun with
two guitars (one guitarist plays the melody and the other
guitarist plays the chords).
A third option is to play the melody and harmony on the one
guitar(the technical name for this stlye of playing is CHORD
MELODY), this is more involved, requiring a higher level of skill,
nonetheless it is a very rewarding way to play the guitar.
We have devoted a special section of our course to reading music
(SIGHT READING MAGIC) Express Guitar - http://ww.guitarCoaching.com
this is the way professional guitarist approach this very
How to Play Guitar
Rave Reviews for Express Guitar:
|As a student of Mike Hayes since 1999, I have found his teaching methods and products to be first class. Whatever style or area of music I have been interested in, he has provided me with useful information, advice and study materials. His style of teaching and teaching products enabled me to progress through his guitar course far quicker than I ever imagined. He also helps in teaching yourself to find and develop your own style of music. Mikeís teaching gives his studentís the ability to become useful musicians, not just guitarists.
Stephen J Reid
Guitarist & Musician
This course teaches us how to learn, how to retain, and how to recall information quickly. This entire program is built around "connected learning" with key phrases, picture words ( yes there is such a thing ) and the most dynamic personal motivator I have ever had the pleasure of knowing.
Ken C Simpson
Business Owner & Guitarist
The course is varied, in-depth and well-structured, making learning and comprehension fast, thorough and enjoyable. Itís a great way of learning, as you can pace yourself and move onto the next stage when you feel competent. I find this course both innovative and inspirational. I find myself leaving Mikeís lessons with the determination to reach my new
Karl J Ricker
Sunshine Coast, Australia | <urn:uuid:6a9e124d-7b95-4023-b4cc-8c8606237f03> | CC-MAIN-2017-39 | https://www.guitarcoaching.com/faq/q40.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695439.96/warc/CC-MAIN-20170926103944-20170926123944-00692.warc.gz | en | 0.954732 | 669 | 2.71875 | 3 |
What does LCM mean?
The LCM (least common multiple) is the smallest positive whole number exactly divisible by two or more given whole numbers. Example: the LCM of 14 and 35 is 70 because 70/14=5 and 70/35=2, and no number smaller than 70 is exactly divisable by 14 and 35. and its the smallest number out of them all
+ 33 others found this useful
Was this answer useful?
Thanks for the feedback!
Why did you decide to audition for the role of Han Lee in "2 Broke Girls"?View Full Interview
Example: 30 and 42 List the multiples. 30, 60, 90, 120, 150, 180, 210 42, 84, 126, 168, 210 Once you hit the same number, you've found the LCM.
LCM = Lowest Common Multiple. This is the smallest number that is common amongst the multiples of two of more other numbers. For example: The multiples of 3 are: 3, 6, 9…, 12, 15, 18, 21, 24, 27, 30, 33, 36, 39, 42, 45, 48, ... The multiples of 5 are: 5, 10, 15, 20, 25, 30, 35, 40, 45, 50, ... The common multiples of 3 and 5 are: 15, 30, 45, ... The lowest common multiple of 3 and 5 is the smallest of these, namely 15. An example of its use is for adding fractions as using the lowest common multiple of all the denominators ensures the numbers do not get too big (and cumbersome) (MORE)
This article explains how to measure and adjust inventory using the lower-of-cost or-market rule.… (MORE)
While the Lutheran Church is one of the larger denominations of Christianity, what many people do not realize is that there is a number of different synods which define this r…eligion. The differences in these synods ranges, from barely noticeable, to large schisms that keep the churches from being in fellowship with one another. There are three large main synods, as well as a countless number of splinter denominations. Each group has their own set of beliefs, despite the fact that each of them looks to the writings of Martin Luther for guidance in how they conduct their religion. Also called ELCA, this synod is the largest of the Lutheran Churches. ELCA is the only one of the synods to have entered into full fellowship with non-Lutheran churches, and is a member of the World Council of Churches. One of the biggest differences between ELCA and other synods is that ELCA allows for the possibility of errors and cultural limitations within the Bible, and believes it needs to be interpreted. ELCA allows for women to be ordained, which many of the synods do not allow, and is more accepting of homosexuality and abortion than most of the synods are. The Book of Concord, which is the book of rules by which Lutherans have lived since the 16th century, is regarded as more of a guideline by the ELCA for its members, and is thought to be outdated for modern living.This synod is most often referred to as LCMS, and is the second largest branch of Lutheranism. The Missouri synod is more conservative than the ELCA, and holds more closely to the Book of Concord and the teachings of the Bible. Unlike ELCA, the LCMS synod does not allow anyone to take communion within their churches unless they have been accepted as a part of their group and are an LCMS member. LCMS does not ordain women, but they do allow women to be officers in the church. Perhaps the biggest difference between the two main branches is that LCMS believes that the Holy Scriptures should be taken as literal. Also called WELS, the Wisconsin Synod is considerably smaller than the two largest synods, but is still the third largest Lutheran Church. WELS is also the most conservative of the three branches in the United States. WELS considers the Bible to be the unerring word of God and that it should be taken literally. They take a strong stand against both homosexuality and abortion, believing in the sanctity of the marriage union and of life. Women are not allowed to be ordained nor to be officers in the church, however they are allowed to take nonvoting positions where they are not in authority over men. The AFLC was formed from those members of the Lutheran Free Church who did not want to join the ALC when they were merged back in 1962. A smaller organization, they are a fellowship of independent congregations who have chosen not to join with other synods. Their beliefs are also conservative, and most importantly they believe that the Bible scriptures are still relevant to today's current issues of morality and ethics. AFLC also believes that the scriptures of the Bible are inerrant and are the only infallible source of God's wisdom to us. As such women are not allowed to be ordained, and the AFLC takes a strong stand against homosexuality and abortion. The biggest difference between AFLC and other synods is that AFLC is not actually a synod, and each church has more autonomy in its individual teachings than do other churches. ELS is a small synod that was originally known as the Norwegian Synod. It is the only synod in full fellowship with the WELS synod. Like WELS, this synod is very conservative, and follows the writings of Luther as guidance for its beliefs. They also have a strong belief in the spiritual purity of the Bible and their teachings are guided by a desire to adhere to the Bible in all things. They do not allow women in any position of authority much like many of the conservative synods. They also take a strong stand on homosexuality and abortion. Collectively there are millions of Lutherans around the world, but many of these groups are split up by differences in theology. The belief that living in a modern world changes how we should interpret the writings of the Bible and Luther is the main point of division in most of these synods. The other division exists from just how closely we should adhere to the scriptures, and where time and culture differences end and spiritual mandate begins. In many cases the differences between the smaller branches is small and not something laity need to be concerned about. Lutheranism dates back to the 16th century, when Martin Luther pushed for reform in a corrupt medieval Catholic Church. From the push for reform came not only the Lutheran Church but also access to the Bible for the masses. Bibles were not only translated out of Latin and into the languages of the people, the printing press made the Holy Scriptures available to anyone who wanted to read them. (MORE)
commented on this article
The Lutheran religion is a denomination of Protestantism named after Martin Luther. It is the oldest form of Protestantism and was essentially formed in "protest" to the Catho…lic church of the time. Martin Luther was a German monk of the 16th century, and he also did not approve of his name as it was eventually attached to the religion.Luther felt that various practices of the Catholic church at the time conflicted with Biblical teachings. He wrote about those things and tried to expose the abuses and corruption of the church. However, he did not intend to divide from the church and in fact, embraced many other Catholic teachings. Church reform turned out to be useless, despite Luther's best efforts. He was eventually excommunicated, and his beliefs gave root to the Lutheran religion.Many rituals and church practices in Lutheranism are similar or identical to those in Catholicism. However, there are some fundamental differences between the two religions. Perhaps the biggest one is that the Lutherans do not have a pope or pope equivalent. Luther preached that people need to rely on the Bible for salvation, not the pope. Similarly, Lutherans believe that faith in Jesus Christ is all they need to be saved, while Catholics believe that good works and love are also necessary.Lutheranism spread out from Germany and primarily affected the areas of Scandinavia and eventually those immigrants who went to America. Germany remains mostly Lutheran, and Norway, Denmark, Iceland and Sweden call it their state religion. In Finland, more than 80 percent of citizens belong to the Lutheran church. Immigrants from these countries came to the United States in the 17th and 18th centuries, and many eventually settled in the Midwest.The two main bodies of Lutheranism in America are the Evangelical Lutheran Church in America (ELCA) and the Lutheran Church -- Missouri Synod (LCMS). The former is understood to be somewhat more liberal than the latter. The ELCA also accepts communion and fellowship with many other non-Lutheran churches, while the LCMS continues to hold to the belief that Lutherans must not commune with other religions.The Lutheran religion remains one of the largest Protestant denominations and counts more than 60 million members across the globe. The majority of these are in Europe, with the next largest numbers being in Africa and North America.In contrast to the Lutheran church's 60 million members, the Methodist church has 75 million congregants, the Baptist church has 105 million, and the Catholic church has 1.2 billion members. (MORE)
Though not traditionally the "cutest" of animals, these little pachyderms have stolen our heart with their innocence and antics.Getting some serious family time. Thi…s little guy is still learning how to swim. Just keep up with mom! I'm faaaaabulouuus! Friends for life! Excellent ball control. "Got your nose!"Stay together.He's so happy! "Come and get it". "My turn!"Imitation is the most sincere form of flattery. Baby elephant in its natural element. Now what?Those ears. So cute.Working on that trumpeting. "I don't want to get up"."Dogpile!" The preferred drink of elephants everywhere. Streeeetchhhh.Anytime is the best time to nap. "Aw yiss".Nothing like a little bit of rough housing. This is the cutest thing ever. Straight from the heart. Kiss on the cheek! (MORE)
While New Orleans is an ideal locale for bachelor parties, romantic weekends, and other adult diversions, it can also be a fun place for families on vacation. Beyond a plethor…a of kid-friendly events and activities, the city boasts several parks, museums, and attractions perfect for young travelers. (MORE)
Least Common Multiple of Two Numbers The "least common multiple" is the smallest integer that contains both numbers as factors. It is the product of the two numbers divided b…y any common factors. To determine the least common multiple of two numbers, determine the prime factors of both numbers. Then, determine the prime factors they have in common. Multiply the numbers together, and divide by the prime factors they have in common (the product of these is their "greatest common factor"). Example: Find the least common multiple of 12 and 15. The prime factors of 12 are 2 , 2, and 3 (12 = 2 x 2 x 3) The prime factors of 15 are 3 and 5 (15 = 3 x 5) The only prime factor in common is 3. The least common multiple is (12 x 15) divided by 3. This is 180 / 3 = 60 The least common multiple is 60. Example: Find the least common multiple of 9 and 11. The prime factors of 9 are 3 and 3. The prime factors of 11 are only 11. There are no prime factors in common. The least common multiple is 9 x 11 = 99. Example: Find the least common multiple of 30 and 42. The prime factors of 30 are 2, 3, and 5. The prime factors of 42 are 2, 3, and 7. The prime factors in common are 2 and 3. The least common multiple is (2 x 3 x 5) x (2 x 3 x 7) / (2 x 3) = 210. By representing it as a calculation with prime factors, you can cancel out the divisors, so you have as your reduced calculation 5 x 2 x 3 x 7 rather than 30 x 42 ÷ 6. Least Common Multiple of Three or More Numbers For one method, check the related question "How do you find the least common multiple of three numbers?" in the links below. If you are determining the least common multiple for three or more numbers, it is more complicated because you must divide by prime factors that all or even just a pair of the numbers have in common. This paragraph is not a thorough description of the process, but only intends to give an idea of using prime factors to determine the LCM of three or more numbers. Another method to find the least common multiple of more than two numbers is to take two numbers and determine their least common multiple. Then, take that number and one of the other numbers and determine their least common multiple. Continue calculating the least common multiple, two numbers at a time. If there are four or more numbers, you can find the least common multiple for each pair of numbers, and then the least common multiples of those results. Example: Find the least common multiple of 4, 7, and 9. The prime factors of 4 are 2 and 2. The prime factors of 7 are 7. There are no prime factors in common, so the least common multiple of 4 and 7 is 4 x 7 = 28. Now, find the least common multiple of 28 and 9. The prime factors of 28 are 2, 2, and 7. The prime factors of 9 are 3 and 3. There are no prime factors in common, so the least common multiple of 28 and 9 is 28 x 9 = 252. The least common multiple of 4, 7, and 9 is 252. Example: Find the least common multiple of 2, 3, 7, 8, and 10. Start with the first pair of numbers, 2 and 3. The prime factors of 2 are 2. The prime factors of 3 are 3 There are no prime factors in common, so the least common multiple is 2 x 3 = 6. Take the next pair of numbers, 7 and 8. The prime factors of 7 are 7. The prime factors of 8 are 2, 2, and 2. There are no prime factors in common, so the least common multiple is 7 x 8 = 56. Now, find the least common multiple of both results, 6 and 56. The prime factors of 6 are 2 and 3. The prime factors of 56 are 2, 2, 2, and 7. The prime factors in common are a single 2, so the least common multiple is 6 x 56 ÷ 2 = 168. To finish, find the least common multiple of 168 and the final number, 10. The prime factors of 10 are 2 and 5. The prime factors of 168 are 2, 2, 2, 3, and 7. The prime factors in common are a single 2, so the least common multiple is 168 x 10 ÷ 2 = 840 The least common multiple of 2, 3, 7, 8, and 10 is 840. Least Common Multiple - Exponential Method The LCM (least common multiple) is the smallest positive whole number exactly divisible by two or more given whole numbers. Example: the LCM of 14 and 35 is 70 because 70/14=5 and 70/35=2, and no number smaller than 70 is exactly divisible by 14 and 35. The LCM can also found be for more complex numbers by taking the multiple of the highest power of prime factors from both numbers. For example, the LCM of 72 and 90 is 360, which is the multiple of the highest power of prime factors from both numbers (23 x 33 x 5 = 2 x 2 x 2 x 3 x 3 x 5 = 360). Example: LCM 0f 9 and 25 is 225, which is the multiple of the highest power of prime factors in 9 and 25 (32 x 52). For more than two numbers, LCM can be found by taking the multiple of the highest power of prime factors from all numbers. For example, the LCM of 28, 70, and 98 is 4,900, which is the multiple of the highest power of prime factors from all three numbers (22 x 52 x 72 = 2 x 2 x 5 x 5 x 7 x 7 = 4900). (Factors: 28 = 22 x 7; 98 = 2 x 72; 350 = 2 x 52 x 7) Least Common Multiple of One Number There is no "least common multiple" for a single number, because the least common multiple is the smallest multiple that two or more numbers have in common. Start by taking the prime factorizations of the numbers. Now, for each unique prime, take the maximum number of times it shows up in your original numbers, and multiply these together. Example: LCM of 45, 50, and 16: 45 = 3 * 3 * 5 50 = 2 * 5 * 5 16 = 2 * 2 * 2 * 2 2 shows up at most 4 times 3 shows up at most 2 times 5 shows up at most 2 times so LCM is 2 * 2 * 2 * 2 * 3 * 3 * 5 * 5 = 3600 (MORE)
This is a trick question. When referring to the Lowest Common Multiple, you are comparing two numbers and finding the lowest multiple that they both have in common. As there …is only 1 number, it isn't comparing it. The LCM of 43 and itself would be 43, because 43 is a multiple of itself. (MORE)
The LCMs (Lowest Common Multiples) for 13 depend upon the other numbers (with which 13 has common multiples), but they will always be a multiple of 13, namely one of: 13, 26…, 39, 52, 65, 78, 91, 104, 117, 130, 143, 156, 169, 182, 195, 208, 221, 234, 247, 260, 273, 286, 299, 312, 325, 338, 351, 364, 377, 390, 403, 416, 429, 442, 455, 468, 481, 494, 507, 520, 533, 546, 559, 572, 585, 598, 611, 624, 637, 650, 663, 676, 689, 702, 715, 728, 741, 754, 767, 780, 793, 806, 819, 832, 845, 858, 871, 884, 897, 910, 923, 936, 949, 962, 975, 988, 1001, 1014, 1027, 1040, 1053, 1066, 1079, 1092, 1105, 1118, 1131, 1144, 1157, 1170, 1183, 1196, 1209, 1222, 1235, 1248, 1261, 1274, 1287, 1300, ... (MORE) | <urn:uuid:178038dc-08c0-4801-b335-03d47f24e5b3> | CC-MAIN-2015-11 | http://www.answers.com/Q/What_does_LCM_mean | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461216.38/warc/CC-MAIN-20150226074101-00300-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.960274 | 3,931 | 3.453125 | 3 |
Let’s face it, everything is better in pink. If there are two cupcakes, one with white icing and one with pink, which one do you pick? Hostess snowballs? Definitely better in pink. If your Mom bought you and your sister notebooks, she had better have made sure both or neither were pink. Party dresses? Don’t even go there.
If you are familiar with white noise, you know it to be that pleasant buzzing that often occurs when the radio loses reception. It is often used in healthcare to block out noise caused by hearing impairments or as a sleep aid, but did you know about pink noise? Although it may sound like the latest psychedelic rock movement, pink noise is more accurately the latest proposed solution to sleep interruption. And, according to a recent study, it may actually help to improve memory as well.
Sound Stimulation and Sleep
According to recent research done at Northwestern University, when gentle sound stimulation is synced up to the rhythm of brain waves, it can not only lead to a better sleep in older adults, but can also improve their ability to remember specific words.
Why Deep Sleep Is important
Memory loss typically occurs throughout the process of aging; so does the gradual decrease in deep sleep. Scientists suspect a connection. Because deep sleep is a critical component in the consolidation of memory, it is believed that a reduction in one may be responsible for a reduction in the other. Therefore, scientists believe that using sound stimulation to induce deep sleep may be the solution to memory loss.
During deep sleep, brainwave production is reduced to a rate of one per second, quite a bit slower than the 10 oscillations that happen during the seconds when one is awake. Giovanni Santstasi, co-author of the study was able to create an algorithm capable of transmitting audio during the rising of slow wave oscillations, to boost the synchronization of neural activity.
The study was comprised of 13 individuals aged 60 and up recruited from Northwestern’s Cognitive Neurology and Alzheimer’s Disease Center. It targeted individuals suffering from low levels of sleep and memory loss.
The aim of the study was to monitor brain waves in individuals using a breakthrough audio system that can lock in audio stimulation at the moment when specific neuron communication occurs during deep sleep.
Participants were exposed to a night of acoustic stimulation followed by a night of false stimulation. The two stimulations were identical, except for the fact that the individuals did not hear noise in the false stimulation. Upon awakening, the subjects were given memory tests, with another set given the following morning.
The study found that while memory recall ability rose by a couple of percentage points following the false stimulation, those who listened to the pink noise showed a vast increase in memory recall. In fact, those who were subjected to the acoustic stimulation showed three times as much improvement as their counterparts. These finding suggest that slow wave sleep can indeed have a significant impact on memory.
What Does This Mean?
For those suffering memory loss, the new is good. It suggests that there might be a way to safely improve memory without the use of expensive, side effect inducing medicine. “Pink noise” may offer a completely safe and simple alternative.
What do you think about the latest findings? Is pink the new white? Let us know! | <urn:uuid:c1f02d63-8224-425d-9a3a-6152640ef661> | CC-MAIN-2018-17 | https://resveralife.com/tag/anti-stress/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947803.66/warc/CC-MAIN-20180425115743-20180425135743-00311.warc.gz | en | 0.958871 | 674 | 3.078125 | 3 |
It may be that by increasing the already substantial blood-flow to your brain, exercise can help build your IQ and work to keep you safe from neurological conditions that result from old age. Although your brain accounts for only two percent of your body weight, it takes one-fifth of the oxygen you inhale. When exercise increases the blood-flow to the brain, new neurons are created that cannot only boost your current intelligence but also help protect you against the onset of diseases like dementia thanks to what scientists call a "brain reserve."
Studies have also found that exercise can help brains which have already deteriorated as a natural result of the aging process:
"[O]ne German study found that older people who enjoy mild exercise – such as gardening – are half as likely to suffer from cognitive impairment as they age. Another experiment found that pensioners asked to take a leisurely walk a few times a week scored better on attention and memory tests."
In the future, your office might combine physical exercise regimens along with new training sessions in order to get the most out of your mind. But for now, if you're hoping to sharpen your outlook, it may be time to put the book down and go for a jog.
Photo credit: Shutterstock | <urn:uuid:95b87425-9fad-4d29-bda3-51713c1c5f15> | CC-MAIN-2018-05 | http://bigthink.com/ideafeed/how-exercise-builds-brain-power-and-prevents-disease | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887660.30/warc/CC-MAIN-20180118230513-20180119010513-00048.warc.gz | en | 0.971405 | 251 | 2.5625 | 3 |
How do you grep for filename recursively?
Solution 2: ‘grep -r’
- The -r option says “do a recursive search”
- The -l option (lowercase letter L) says “list only filenames”
- As you’ll see below, you can also add -i for case-insensitive searches.
How do I find a word recursively in Unix?
You can use grep command or find command as follows to search all files for a string or words recursively.
How do I search for a grep file in Unix?
The grep command searches through the file, looking for matches to the pattern specified. To use it type grep , then the pattern we’re searching for and finally the name of the file (or files) we’re searching in. The output is the three lines in the file that contain the letters ‘not’.
What is the Search command in UNIX?
The find command in UNIX is a command line utility for walking a file hierarchy. It can be used to find files and directories and perform subsequent operations on them. It supports searching by file, folder, name, creation date, modification date, owner and permissions.
How do I search for a file in UNIX?
You need to use the find command on a Linux or Unix-like system to search through directories for files….Syntax
- -name file-name – Search for given file-name.
- -iname file-name – Like -name, but the match is case insensitive.
- -user userName – The file’s owner is userName.
How do I find a directory recursively in Linux?
How to get a recursive directory listing in Linux or Unix. Try any one of the following command: ls -R : Use the ls command to get recursive directory listing on Linux. find /dir/ -print : Run the find command to see recursive directory listing in Linux.
How to use grep recursively?
The -R option is use to grep all files in a folder Recursively.
How to grep, then search and replace on the output?
grep And sed. grep is a command-line utility for searching plain-text data sets for lines matching a regular expression. sed (stream editor) is a command-line utility that parses and transforms text. Put the two together by piping the output from grep to sed and you’ve got a command-line search and replace tool! How To Search And Replace
Can I use grep to find?
grep is a powerful tool for searching files in the terminal. Understanding how to use it gives you the ability to easily find files via the terminal. There are more options attached to this tool. You can find with man grep. Frontend Web Engineer and Technical Writer.
How to search multiple files with grep?
Search for Multiple Exact Matches in a File. If you want to find exact matches for multiple patterns, pass the -w flag to the grep command. grep -w ‘provide|count’ sample.txt. For example, the output below shows the difference between searching without -w and with it: As you can see, the results are different. | <urn:uuid:c25f20af-ac00-4ce5-8f10-d7bcf6b9e269> | CC-MAIN-2023-06 | https://www.meltingpointathens.com/how-do-you-grep-for-filename-recursively/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499634.11/warc/CC-MAIN-20230128121809-20230128151809-00620.warc.gz | en | 0.840605 | 687 | 2.640625 | 3 |
Shays' Rebellion lasted for a little more than a year and ended with Shays' defeat by General Benjamin Lincoln's state militia. Although it was relatively short-lived, Shays' Rebellion played a key role in the formation of some of the most crucial legislation in the early United States. Even the Constitution was created in part because of Shays' Rebellion.Know More
After the American Revolutionary War, the United States suffered from a crushing economic decline. Former international trading partners were lost, the U.S. market diminished, and many U.S. citizens found themselves falling into debt. In the 1780s, farmers in Massachusetts, one of the hardest hit areas, pleaded state governments to enact pro-debtor laws to reduce the economic strain. When the government ignored these pleas, many farms were seized and farmers who could not pay their debts were imprisoned. These actions caused growing discontent in the local population and led to protests and demonstrations.
In 1786, the demonstrations and protests grew into an armed uprising led by Daniel Shays. The Shaysites, however, were not well-equipped or trained. The governor of Massachusetts, James Bowdoin, organized a militia led by General Benjamin Lincoln which quickly crushed the rebellion in the winter of 1787. Even though Shays' Rebellion did not last long, the discontent among farmers and citizens continued. The rebellion shocked politicians and was used as justification for political reform ending with the Articles of Confederation being replaced by the Constitution.Learn more about US History
The outcome of the Battle of Trenton was a victory for General George Washington's colonial army. Almost 1,000 Hessians in the employ of the British army were killed, wounded or captured. The triumph, coming after a string of defeats, encouraged and unified the Continental Army.Full Answer >
The outcome of the Revolutionary War allowed the original 13 colonies to join together as one nation and become the United States. The U.S. would become free from British rule, which made it possible to pursue freedom and express new ideas from the Declaration of Independence.Full Answer >
The Whiskey Rebellion was triggered by a tax imposed on distilled liquors in 1791, which farmers in western Pennsylvania believed was unfair. It resulted in a strengthening of the recently established United States because the federal government demonstrated its ability to keep the union together.Full Answer >
Shay's Rebellion convinced American politicians and citizens that the Articles of Confederation needed to be heavily revised. When lawmakers began to write the Constitution, Shay's Rebellion was cited during the debates that helped establish the document.Full Answer > | <urn:uuid:b5f88988-6940-4fe2-a964-b8189bb71d6e> | CC-MAIN-2015-35 | http://www.ask.com/history/outcome-shays-rebellion-6ea089e5ed4140c1 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065241.14/warc/CC-MAIN-20150827025425-00265-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.972502 | 521 | 4.21875 | 4 |
The glorified calculator that is Excel can help you build financial calculators, automate your processes, or solve complicated problems. It is safe to say that pretty much all business professionals are familiar with Excel. Although everyone can write formulas, not all can write them well.
You might be asking yourself, why does it even matter? Excel accepts my formulas and giving me the results I want. Well, you are right, but your calculations are probably taking a few seconds to run. You start truly feeling the difference in bigger models. Habits die hard and if you learn to write efficient formulas from get-go, you will appreciate it once your workbooks start getting bigger.
Excel is typically pretty flexible with what it accepts in formulas. You can enter static values, cell references, nest things in other formulas, named ranges, or even entire tables. There’s usually more than one way to reach your target. Let’s take a look at some common practices.
Static Values vs Cell References
One of the most common errors when writing Excel functions is to use static values inside a formula. For example, most people simply prefer entering the column index when creating a VLOOKUP formula. The same goes for SUMIF, AVERAGEIF, or similar formulas. You will get the correct result regardless of how you build these formulas. Formulas return the correct results, however things might get ugly if you try copying that formula into other fields.
Let’s see this with an example. In the table below we have a list of employees and their salaries. You can download the sample workbook here. Let’s assume that our HR department wants to find the average salaries by department. An AVARAGEIF formula can prove useful in this scenario. We’re first going to need to enter the department column J, the enter “R&D” to define the department we’re looking for, and finally the range of values we’re looking into (salary – column G).
This formula will give us what we were looking for, the average salaries of the R&D department. After this point, we could copy and paste this formula for the other departments. One small issue with that is Excel won’t recognize the fact that we want the formula to adapt to the other ‘departments’. Of course, we could copy the formula and edit it for each department. For example, for the ‘administration’ group, the formula needs to be,
However, this is a time consuming task and you really wouldn’t want to do this for repetitive formulas with several differences.
A better way to do this is to use relative cell references. Using cell references may sound like more work, but this method is reliable and far more flexible. Going back to our example, the AVERAGEIF formula can be replicated within seconds, when using cell references. You need to write formula only once, and then you can copy it to apply to all sections without making any other changes.
When you copy down to the formula for the other rows, the cell reference section of the formula will be automatically updated for Administration (L3), Human Resources (L4) and the rest of the departments.
Using cell references becomes far more important when you’re dealing with 2-dimensional ranges. Taking our previous example, let’s assume that we need the average salaries by department and state. With static values we could use this formula, =AVERAGEIFS($G$2:$G$318,$J$2:$J$318,”R&D”,$D$2:$D$318,”GA”)
This formula contains both department and state references as static values. Again, you’re going to need to copy and paste this formula and then update the names in each function. Only this time, we’re going to have 9 * 3 = 27 cells that need editing. Moreover, there are 2 static values in each cell, and that means 27 * 2 = 54 changes. Good luck with that.
Thanks to relative cell references, you can simply copy and paste (or hold the lower right corner of the call and drag) to generate formulas for the other cells. In our sample workbook, we’re using P2 for departments and Q1 for states. Before you start applying the formula to other fields, keep in mind that if you copy the cell with P2 reference and paste it to 1 cell left and 1 cell below, reference will be changed to Q3. Both columns and rows will be updated accordingly.
Here, we need data from the column P (departments) and 1st row (states). When we copy this to the next rows, we don’t want the state reference row to change. Copying from left to right, the department reference columns should remain as is. To do this, we’re going to need to ‘lock’ column and cell references. You may have seen this before as dollar sign “$” used with a cell reference. This means that what comes after that sign will be locked and have an absolute value.
- $P$2 means both row and column are absolute, so reference is not changed after you copy cell into another cell
- $P2 means only column is absolute and stays still while row can be changed
- P$2 means only row is absolute and cannot be changed.
You can either type “$” with your keyboard, or press F4 key when cursor is on cell reference to change between relative/absolute status. This formula can be copied to the following rows to give us the values we’re looking for,
After we copy formula to cell S10 it will become, =AVERAGEIFS($G$2:$G$318,$J$2:$J$318,$P10,$D$2:$D$318,S$1)
$P2 becomes $P10 and Q$1 becomes S$1.
The ability to assign a name to a range in Excel is a powerful ability. By defining names to a cell or a range of cells, you can create formulas that are easy to read and manage. Names ranges work with cell ranges, functions, constants, and even tables. Let’s name the data from our workbook as follows,
- $G$2:$G$318 : BaseSalary
- $J$2:$J$318 : Department
- $D$2:$D$318 : State
As a result, we can create the same formula as,
Now it looks simple and intuitive, right?
Tables are widely used in many Excel models as they have lots of advantages like growing dynamically as you enter data, automatically format options, connect data, and allow filters. Here, we’re going to use tables for their Structured References feature.
Excel automatically defines names for all columns created in a table. Unlike regular named ranges, these column names are defined with the table itself and you can get a list of these fields when you start typing a formula.
In our example, the table is named “EmployeeTable”. When you enter “[“ and start typing the table name, you will get the list of columns from this particular table, as well as special lists like headers or totals. Combining tables and names ranges, our function becomes,
Everyone can write formulas and create spreadsheets for daily use. However, this doesn’t mean that every Excel user can create ‘efficient’ formulas. Just like teaching your body young when you’re doing sports, making a habit of keeping these tricks in mind can help you create Excel models that run faster and save you time and frustration. | <urn:uuid:05316a6c-515c-40f8-8b38-0b41d9d14e6e> | CC-MAIN-2019-30 | https://www.spreadsheetweb.com/efficient-formulas/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524290.60/warc/CC-MAIN-20190715235156-20190716021156-00361.warc.gz | en | 0.897299 | 1,633 | 2.796875 | 3 |
When we did our “math biographies” project a few weeks ago I asked the kids to tell me about something in math that they heard was true but that they do not believe is true. My younger son mentioned the seemingly strange property of the Koch Snowflake having an infinite perimeter but a finite area, and my older son brought up this series:
1 + 2 + 3 + . . . . = -1/12
The “math biographies” project is here:
Our two projects about the Koch Snowflake are here:
And a little bit of my thoughts leading up to the project today are here (including the 4 screen shots of passages in G. H. Hardy’s book “Divergent Series”):
I think that explaining to kids how the series 1 + 2 + 3 + . . . can possibly equal -1/12 is practically impossible. You might actually be able to explain the idea to high school calculus students – and it would be fun to try – but, anyway, today’s project doesn’t quite go all the way to an explanation.
Instead what I tried to do was show some other strange results with infinite series that would seem to not have a sum and then walked the boys through some of the philosophical ideas in Hardy’s book.
We started with two infinite series that they were already familiar with:
(1) 1 + 1/2 + 1/4 + 1/8 + . . . = 2, and
(2) 0.99999999….. = 1.
Listening to what both kids have to say about these two series, I’m actually pretty happy with how they understand them.
For the second part of the project I extended the idea in the “proof” that the boys used to show that 0.99999…. = 1 and applied it to the series
9 + 90 + 900 + 9000 + . . . .
They were surprised to see that using exactly the same idea that they had just used, this series “sums” to -1.
I loved that my younger son immediately recognized that this strange number:
….99999.999999…. has to equal zero!
Now me moved on to looking at geometric series and finding a close formula for the series:
Looking at the formula we found, we see (possibly surprising) explanation for the results that we’ve seen previously in this project.
I love the questions that the kids had during this part of the project.
Finally we looked at some of the passages in G. H. Hardy’s “Divergent Series” book. I wanted to go through these passages so that (i) the boys could see how a professional mathematician like Hardy thinks about these seemingly strange results, and (ii) more simply, so that the boys could see these strange results in writing.
Some of the ideas are probably a little too philosophical for the boys to understand, but I thought it would still be important for them to see them.
So, that’s my best effort 🙂 Maybe several years from now when my older son is learning Calculus, we’ll revisit the topic. It was fun to think about how to share these ideas with kids, and especially nice to hear my younger son say at the end of the last video that this project was “pretty fun.” | <urn:uuid:4f4a659c-43f3-458e-a1ab-ade8954fb2e9> | CC-MAIN-2017-43 | https://mikesmathpage.wordpress.com/2016/09/10/talking-about-infinite-series-with-kids/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824824.76/warc/CC-MAIN-20171021171712-20171021191712-00024.warc.gz | en | 0.964785 | 706 | 2.5625 | 3 |
Oversize houses aren't just architecturally offensive; they also generally require more energy to heat and cool than smaller ones, even with efficient appliances. And in the U.S., big houses are becoming the norm, even though a relatively inefficient small house consumes less energy than a greener large house and uses fewer building materials, which expand the carbon footprint. A typical new single-family home in the U.S. is nearly 2,500 square feet today, up from about 1,000 square feet in 1950, even as the average household has shrunk from 3.4 to 2.6 people.
If you really want to live small, visit Jay Shafer. The former art professor dwells alone in a home fit for a hobbit, 100 sq. ft. in northern California that he designed and built himself in 1999. Shafer now runs Tumbleweed Tiny House and sells custom designs for miniature dwellings that range from 70 sq. ft. to 350 sq. ft. He made his move because he felt guilty about the size of his residential carbon footprint, and now prefers life tiny and tidy. "If I throw my jeans down on the floor, I can't get across the room."
This is an extended version of the article that originally appeared in TIME Magazine. | <urn:uuid:d200699b-3eda-4e98-b68e-44aafeeec6e4> | CC-MAIN-2014-23 | http://content.time.com/time/specials/2007/environment/article/0,28804,1602354_1603074_1603123,00.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776439950.90/warc/CC-MAIN-20140707234039-00064-ip-10-180-212-248.ec2.internal.warc.gz | en | 0.97174 | 259 | 2.578125 | 3 |
Reposted from National Geographic: National Geographic’s Great GEC Blog
The Americas are undergoing a transition in the energy sector that will have global geopolitical ramifications. At the same time as the United States is touted to become the world’s largest oil producer by 2020, and a net exporter by 2030, Brazil, Nicaragua, and Panama show the most promise in becoming regional hubs not only for clean energy investment, but for sustained low-carbon economic growth (see related story: “U.S. to Overtake Saudi Arabia, Russia as World’s Top Energy Producer“).Although Latin America and the Caribbean lag behind the United States and Canada in terms of implemented clean energy policy and project funding, 7 percent of the region’s total installed capacity today is renewables, and it is expected to grow faster in years to come. (See related interactive map: “The Global Electricity Mix“) Faced with ever-changing economic and political realities, regional collaborations for knowledge-creation and -sharing are crucial for fostering lasting partnerships that can make ‘sustainability science’, well, sustainable.
International partnerships that lead to concrete action are often the clearest signs of innovation. At the state to state level, the Energy and Climate Partnership for the Americas (ECPA) and at the person-to-person level, the Fulbright NEXUS program provide clear evidence regional collaborations that are clearly changing the modes of engagement within the hemisphere. One of us just returned from a partnership-building ECPA sponsored trip to Nicaragua, facilitated by both the U. S. Embassy team and a local NGO, blueEnergy, which is discussed below and here, focused on community energy. Just two years after its launch by President Obama in 2009, ECPA has moved beyond its initial focus on knowledge sharing around cleaner and more efficient energy, and now also supports sustainable forest and land use initiatives as well as climate change adaptation strategies. Governments and institutions such as the Organization of American States (OAS), the World Bank, and the Inter-American Development Bank (IDB), have all worked together to support regional technical workshops, business strategies, and other initiatives for new and cleaner ways to provide energy. ECPA has also become a vehicle for leaders in sustainability research and practice to work at the institutional level to link industry, university, and civil-society groups in the New World.
The two-year-old Fulbright NEXUS program has already become a regional model for the support of scholars from around the hemisphere committed to applied research and collaboration on sustainability science. At a recent meeting in Banff, Canada, the 20 NEXUS fellows focused equally on individual and group projects to assess and address environmental issues plaguing the Western Hemisphere. Interestingly, the focus was on solutions science, not just in quantifying the extent of environmental change. During the coming year, the Fulbright NEXUS Fellows will be working across the region on projects ranging from forest health and productivity in Alberta, Canada, to local perceptions and strategies for climate change adaptation in the High Andes of Peru, to understanding the interactions between climate mitigation and adaptation strategies for Brazil’s power sector.
As a group, however, this class of Fulbright NEXUS fellows have embraced the challenge of mixing their individual research projects with a series of novel team efforts designed to build lasting partnerships. The first is an effort to link and map the measurable impacts that climate change is having on a variety of ecosystems (reefs in Belize, glaciers in Peru and Bolivia, forests in Canada, and deserts in Utah) and tell the story of communities that depend on the health of these systems for their survival. The second, a group comprised of researchers from Argentina, Brazil, Colombia, and the United States, is working with blueEnergy, an NGO in the Caribbean Coast of Nicaragua, to understand the regional implications for land use, water, and energy, under a variety of agricultural growth scenarios.
With the remarkable rise and relevance of ICTs in development, our third group will focus on the opportunities that exist for these technologies in areas such as early warning disaster systems, pollution monitoring, and agricultural management in Chile, Colombia, Jamaica, Mexico, and Uruguay. The fourth is a study linking national funding available for applied environmental problem solving research, environmental degradation, and economic growth. Although recent initiatives such as the USAID-National Science Foundation PEER program, the Inter-American Institute for Global Change Research, and the recently proposed creation of a South American Council for Science, Technology, and Innovation, have begun encouraging regional collaboration and partnerships, there is still a great need to support and fund ‘use-inspired, basic research’ initiatives that build on scholarly advances with a strong eye for the on-the ground impacts. These collaborations will be facilitated through bi-weekly conference calls and work products managed on shared web sites and web-based data sets.
In April 2013 the group will hold another integrative meeting in Medellin, Colombia, where our fellows will present advances in their individual and group research projects to stakeholders, and our final meeting in Washington D.C, will give us the opportunity to meet members of the U.S Government with whom we will discuss strategies for continuing this dialogue across The Americas. It is true that we are entering a new economic, environmental, and political reality, but through collaboration, there is no doubt that we will make of the future, a much less uncertain one.
Diego Ponce de Leon Barido is a doctoral student in the Energy and Resources Group at the University of California, Berkeley, who has done research in Latin America, India, and in Minnesota on water management and on the valuation of ecosystem services. Daniel M. Kammen is the Class of 1935 Distinguished Professor of Energy at the University of California, Berkeley. | <urn:uuid:de96aff2-5cdf-40ec-aaee-d91d945d7d3b> | CC-MAIN-2021-43 | http://dleonb.com/?p=927 | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588113.25/warc/CC-MAIN-20211027084718-20211027114718-00599.warc.gz | en | 0.941608 | 1,184 | 2.578125 | 3 |
It is quite common for construction and engineering-related businesses to have a unique set of regulations, regulations that are designed to protect the industry’s primary customers, namely the general public. These regulations, known as the “Code of Practice,” are sets of rules and guidelines intended to be followed by anyone involved in the construction and engineering industry. They are designed to ensure that they follow the correct procedures and that they are not doing anything that could present a risk to the public. In the construction industry, numerous regulations are enforced upon contractors and subcontractors. These regulations vary depending on the type of project being worked on, the client, and the job itself. It is essential to know the rules regarding the different types of projects and what you need to know to stay compliant with these regulations.
Difference Between Federal, State and Local Regulations
Construction is a complex industry. It involves raw materials, labor, labor management, process, production, waste management, safety, etc. These factors are critical to construction projects, which is why construction companies have to comply with the federal governments’ and state governments’ regulatory requirements. Many different agencies enforce laws and regulations from a government agency to a local government agency, state, province, or other levels of government. Each agency has its own rules, regulations, and laws. There’s a lot of confusion about local, state, and federal regulations. Some people think that federal law is the only law, when in fact, it is not. Federal law and regulations must meet specific criteria imposed on the population in a particular state or locality. Regarding construction, building codes are usually made at the local level. These codes will often cover:
- Structural integrity and general welfare.
- The integrity of mechanical systems such as:
- Water supply.
- Control and prevention of fires.
- Conservation of energy.
Each local administration will have a different set of regulations and codes relevant to the area and climate. For example, local governments in California will have stricter fire control codes than a local government in wetter states that are less prone to forest fires.
Health and safety
OSHA only enforces its rules in a handful of industries, and construction is a high priority. Although the rules are meant to protect workers from all kinds of hazards, the agency usually focuses on safety for those working with power-driven machinery. In the construction industry, OSHA does not usually regulate individual jobs, nor does it require employers to carry OSHA’s worker protection coverage.
OSHA is the federal agency that is responsible for workplace safety and health. Its mission is to assure safe and healthful working conditions for all employees and promote safe and healthy working conditions. Occupational Safety and Health Administration (OSHA) is the primary department that deals with occupational health. It is involved with the management of health problems and workplace injuries among workers. It is concerned with workers’ health and well-being and is concerned with preventing the workplace from becoming unsafe for workers. Essentially the main aim is to reduce the risk of injury or illness from workplace hazards, both tangible and invisible, that may cause or contribute to injury or illness.
The construction industry is vital to the maintenance and growth of the country. It would be hard to imagine a city without a thriving construction industry. However, the construction industry does face a few problems. The building industry is a multi-billion dollar industry, and it has the benefit of being a lucrative business to be in. Still, like any other business, it has its share of corruption in the industry. It is a subject that is often pushed aside and overlooked, as the building industry is mainly under the control of the local administrations. With most of the industry coming out of the major cities in America, it is tough to detect corruption in the building industry. It is challenging to differentiate between fraud and corruption when in a large corporation.
Construction has always been a high-risk industry for the FCPA due to its nature of work and the nature of the people involved. Since construction companies are so large and conduct business worldwide, they frequently conduct business in countries where lax enforcement makes it easy to steal. One of the most commonly used methods is bribery. Therefore FCPA Compliance for construction companies has become something that all companies must be aware of. In most cases, a law firm with experience in this industry will be required to assist a construction business through the legal process as they must meet many regulations. Companies don’t want to be associated with corruption, in particular, so everything must be in order.
Building material regulations are a critical component of maintaining a healthy industry. Without regulations for building materials, there would be concerns over the price and quality of materials being used in construction. Currently, the US Department of Housing and Urban Development (HUD) published the code for building materials. The code is divided into various sections, each of which is focused on specific aspects of building material. There are general rules that must be followed when building, such as using heat-treated wood when in contact with a concrete floor or a surface that could experience moisture.
In the United States, zoning laws are established by local governments. These laws determine where and how construction companies can build a particular building in a specific area. They also dictate how many or how few people can live in a building. The zoning laws in the US are different than they are in other countries, which can make it difficult for travelers to figure out how to reside in a new area legally. In the US, state governments establish zoning laws, with the federal government only playing a minor role.
Construction industry regulations are the rules and guidelines that apply to the construction industry. They are designed to protect the safety of construction workers, the environment, and the general public. In addition to these aspects, corruption and bribery are being incorporated into existing rules to reduce the amount of crime associated with this traditionally notorious industry. | <urn:uuid:6dc68481-8179-4430-971f-2524f82d430c> | CC-MAIN-2022-27 | https://citi.io/2021/06/02/learn-the-most-important-rules-of-the-construction-industry-in-2021/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104054564.59/warc/CC-MAIN-20220702101738-20220702131738-00569.warc.gz | en | 0.964499 | 1,228 | 3.46875 | 3 |
The study of mindfulness as it relates to health is an exciting, emerging field. This study discusses how mindfulness affects a variety of health outcomes.
I love the way the researchers define mindfulness: “Mindfulness is defined as a person’s awareness of his or her mental and physical states — one’s thoughts, emotions and needs.”
Too often, people confuse mindfulness with a heightened state of present-focused awareness. This often becomes interpreted as a hyper-focus on raw experience, which can be exhausting. Rather, mindfulness is more expansive and more akin to self-awareness, which encompasses emotions, memories, goals, etc.
One researcher hypothesizes that when people are more self-aware, their choices are more aligned with their values and goals.
One common theme across the field is that mindfulness is a practice. It is something that can be learned (a skill), and that must be practiced regularly to be effective (just like any other skill). And good news for those losing weight: it is correlated with a lower BMI.
How do you practice mindfulness? Share in the comments below. | <urn:uuid:2e0ad273-a001-49c0-91b7-868d95ed540b> | CC-MAIN-2019-04 | http://weightlosswestchesterny.com/weightlossblog/mindfulness-health/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657555.87/warc/CC-MAIN-20190116154927-20190116180927-00276.warc.gz | en | 0.965086 | 226 | 3.015625 | 3 |
Super Typhoon Choi-wan had just become a monstrous Category 4 super typhoon on the morning of September 15, 2009, when the Moderate Resolution Imaging Spectroradiometer (MODIS) on NASA’s Terra satellite captured this photo-like image. Choi-wan is a perfect circle with bands of clouds pin-wheeling around the dense center. The dark blue surface of the Pacific Ocean is visible through the clear eye, which is defined by a towering wall of clouds.
At the time the image was taken, Choi-wan had sustained winds estimated at 230 kilometers per hour (145 miles per hour or 125 knots), according to the Joint Typhoon Warning Center. Choi-wan was strengthening. Twenty-four hours later, the storm reached Category 5 status with sustained winds of 260 km/hr (160 mph or 140 knots). The Joint Typhoon Warning Center expected the storm to intensify a little more.
While the storm raked across the Northern Mariana Islands and was targeting the small islands of Iwo To and Chinchi Jima, it was not forecast to hit any major land mass. In this image, Super Typhoon Choi-wan is centered over the northern arc of the Mariana Islands in the western Pacific Ocean, with the larger islands of Guam, Saipan, and Tinian located on the southern edge of the storm. The islands north of Saipan are volcanic and are either unoccupied or sparsely populated.
The large image provided above is at MODIS’ maximum resolution of 250 meters per pixel. The MODIS Rapid Response System provides the image in additional resolutions.
- Joint Typhoon Warning Center. (2009, September 15). Typhoon 15W (Choi-wan) Warning NR 016. Accessed September 15, 2009.
- Unisys Weather. (2009, September 15). Super Typhoon-4 Choi-Wan. Accessed September 15, 2009.
- U.S. Census Bureau. (2001, July 3). Census Bureau releases census 2000 population counts for the Commonwealth of the Northern Mariana Islands. United States Department of Commerce. Accessed September 15, 2009.
NASA image by Jeff Schmaltz, MODIS Rapid Response Team, Goddard Space Flight Center.
- Terra - MODIS | <urn:uuid:7062bb99-612e-4ee1-8cf6-9583d1b2cfb7> | CC-MAIN-2016-40 | http://earthobservatory.nasa.gov/IOTD/view.php?id=40186 | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661155.56/warc/CC-MAIN-20160924173741-00045-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.902596 | 453 | 3.03125 | 3 |
Wolfgang Amadeus Mozart Facts
Wolfgang Amadeus Mozart (1756-1791) was an Austrian composer whose mastery of the whole range of contemporary instrumental and vocal forms—including the symphony, concerto, chamber music, and especially the opera—was unrivaled in his own time and perhaps in any other.
Wolfgang Amadeus Mozart was born on Jan. 27, 1756, in Salzburg. His father, Leopold Mozart, a noted composer and pedagogue and the author of a famous treatise on violin playing, was then in the service of the archbishop of Salzburg. Together with his sister, Nannerl, Wolfgang received such intensive musical training that by the age of 6 he was a budding composer and an accomplished keyboard performer. In 1762 Leopold presented his son as performer at the imperial court in Vienna, and from 1763 to 1766 he escorted both children on a continuous musical tour across Europe, which included long stays in Paris and London as well as visits to many other cities, with appearances before the French and English royal families.
Mozart was the most celebrated child prodigy of this time as a keyboard performer and made a great impression, too, as composer and improviser. In London he won the admiration of so eminent a musician as Johann Christian Bach, and he was exposed from an early age to an unusual variety of musical styles and tastes across the Continent.
Salzburg and Italy, 1766-1773
From his tenth to his seventeenth year Mozart grew in stature as a composer to a degree of maturity equal to that of his most eminent older contemporaries; as he continued to expand his conquest of current musical styles, he outstripped them. He spent the years 1766-1769 at Salzburg writing instrumental works and music for school dramas in German and Latin, and in 1768 he produced his first real operas: the German Singspiel (that is, with spoken dialogue) Bastien und Bastienne and the opera buffa La finta semplice. Artless and naive as La finta semplice is when compared to his later Italian operas, it nevertheless shows a latent sense of character portrayal and fine accuracy of Italian text setting. Despite his reputation as a prodigy, Mozart found no suitable post open to him; and with his father once more as escort Mozart at age 14 (1769) set off for Italy to try to make his way as an opera composer, the field in which he openly declared his ambition to succeed and which offered higher financial rewards than other forms of composition at this time.
In Italy, Mozart was well received: at Milan he obtained a commission for an opera; at Rome he was made a member of an honorary knightly order by the Pope; and at Bologna the Accademia Filarmonica awarded him membership despite a rule normally requiring candidates to be 20 years old. During these years of travel in Italy and returns to Salzburg between journeys, he produced his first large-scale settings of opera seria (that is, court opera on serious subjects): Mitridate (1770), Ascanio in Alba (1771), and Lucio Silla (1772), as well as his first String Quartets. At Salzburg in late 1771 he renewed his writing of Symphonies (Nos. 14-21).
In these operatic works Mozart displays a complete mastery of the varied styles of aria required for the great virtuoso singers of the day (especially large-scale da capo arias), this being the sole authentic requirement of this type of opera. The strong leaning of these works toward the singers' virtuosity rather than toward dramatic content made the opera seria a rapidly dying form by Mozart's time, but in Lucio Silla he nonetheless shows clear evidence of his power of dramatic expression within individual scenes.
In this period Mozart remained primarily in Salzburg, employed as concertmaster of the archbishop's court musicians. In 1773 a new archbishop took office, Hieronymus Colloredo, who was a newcomer to Salzburg and its provincial ways. Unwilling to countenance the frequent absences of the Mozarts, he declined to promote Leopold to the post of chapel master that he had long coveted. The archbishop showed equally little understanding of young Mozart's special gifts. In turn Mozart abhorred Salzburg, but he could find no better post. In 1775 he went off to Munich, where he produced the opera buffa La finta giardiniera with great success but without tangible consequences. In this period at Salzburg he wrote nine Symphonies (Nos. 22-30), including the excellent No. 29 in A Major; a large number of divertimenti, including the Haffner Serenade; all of his six Concertos for violin, several other concertos, and church music for use at Salzburg.
Mannheim and Paris, 1777-1779
Despite his continued productivity, Mozart was wholly dissatisfied with provincial Austria, and in 1777 he set off for new destinations: Munich, Augsburg, and prolonged stays in Mannheim and Paris. Mannheim was the seat of a famous court orchestra, along with a fine opera house. He wrote a number of attractive works while there (including his three Flute Quartets and five of his Violin Sonatas), but he was not offered a post.
Paris was a vastly larger theater for Mozart's talents (his father urged him to go there, for "from Paris the fame of a man of great talent echoes through the whole world," he wrote his son). But after 9 difficult months in Paris, from March 1778 to January 1779, Mozart returned once more to Salzburg, having been unable to secure a foot-hold and depressed by the entire experience, which had included the death of his mother in the midst of his stay in Paris. Unable to get a commission for an opera (still his chief ambition), he wrote music to order in Paris, again mainly for wind instruments: the Sinfonia Concertante for four solo wind instruments and orchestra, the Concerto for flute and harp, other chamber music, and the ballet music Les Petits riens. In addition, he was compelled to give lessons to make money. In his poignant letters from Paris, Mozart described his life in detail, but he also told his father (letter of July 31, 1778), "You know that I am, so to speak, soaked in music, that I am immersed in it all day long, and that I love to plan works, study, and meditate." This was the way in which the real Mozart saw himself; it far better reflects the actualities of his life than the fictional image of the carefree spirit who dashed off his works without premeditation, an image that was largely invented in the 19th century.
Returning to Salzburg once more, Mozart took up a post as court conductor and violinist. He chafed again at the constraints of local life and his menial role under the archbishop. In Salzburg, as he wrote in a letter, "one hears nothing, there is no theater, no opera." During these years he concentrated on instrumental music (Symphony Nos. 32-34), the Symphonie Concertante for violin and viola, several orchestral divertimenti, and (despite the lack of a theater) an unfinished German opera, later called Zaide.
In 1780 Mozart received a long-awaited commission from Munich for the opera seria Idomeneo, musically one of the greatest of his works despite its unwieldy libretto and one of the great turning points in his musical development as he moved from his peregrinations of the 1770s to his Vienna sojourn in the 1780s. Idomeneo is, effectively, the last and greatest work in the entire tradition of dynastic opera seria, an art form that was decaying at the same time that the great European courts, which had for decades spent their substance on it as entertainment, were themselves beginning to sense the winds of social and political revolution. Mozart's only other work in this genre, the opera seria La clemenza di Tito (1791), was a hurriedly written work composed on demand for a coronation at Prague—and it is significantly not cast in the traditional large dimensions of old-fashioned opera seria, with its long arias, but is cut to two acts like an opera buffa and has many features of the new operatic design Mozart evolved after Idomeneo.
Mozart's years in Vienna, from age 25 to his death at 35, encompass one of the most prodigious developments in so short a span in the history of music. While up to now he had demonstrated a complete and fertile grasp of the techniques of his time, his music had been largely within the range of the higher levels of the common language of the time. But in these 10 years Mozart's music grew rapidly beyond the comprehension of many of his contemporaries; it exhibited both ideas and methods of elaboration that few could follow, and to many the late Mozart seemed a difficult composer. Franz Joseph Haydn's constant praise of him came from his only true peer, and Haydn harped again and again on the problem of Mozart's obtaining a good and secure position, a problem no doubt compounded by the jealousy of Viennese rivals.
Mozart disparaged many of his less gifted contemporaries in scathing terms; Leopold often entreated him to write in a simple and pleasing style ("What is slight can still be great"). Replying to such a plea, Mozart (letter of Dec. 28, 1782, from Vienna) wrote of his own work in a way that might apply to much of his music: "These concertos [K. 413-415] are a happy medium between what is too easy and what is too difficult … there are passages here and there from which only connoisseurs can derive satisfaction; but these passages are written in such a way that the less learned cannot fail to be pleased, though without knowing why."
The major instrumental works of this period encompass all the fields of Mozart's earlier activity and some new ones: six symphonies, including the famous last three: No. 39 in E-flat Major, No. 40 in G Minor, and No. 41 in C Major (the Jupiter-a title unknown to Mozart). He finished these three works within 6 weeks during the summer of 1788, a remarkable feat even for him.
In the field of the string quartet Mozart produced two important groups of works that completely overshadowed any he had written before 1780: in 1785 he published the six Quartets dedicated to Haydn (K. 387, 421, 428, 458, 464, and 465) and in 1786 added the single Hoffmeister Quartet (K. 499). In 1789 he wrote the last three Quartets (K. 575, 589, and 590), dedicated to King Frederick William of Prussia, a noted cellist. The six Quartets dedicated to Haydn undoubtedly owe something to Mozart's study of the earlier work of Haydn, perhaps most to the self-asserted "new and special manner" of Haydn's Op. 33 of 1781, a phrase that may refer to the complete participation in these works of all four instruments in the motivic development. Mozart's works entirely meet the standards set by Haydn up to now, and surpass it.
Other chamber music on the highest level of imagination and craftsmanship from Mozart's Vienna years includes the two Piano Quartets, seven late Violin Sonatas, the last Piano Trios, and the Piano Quintet with winds; and in the last five years of his life, the last String Quintets and the Clarinet Quintet. This decade also saw the composition of the last 17 of Mozart's Piano Concertos, almost all written for his own performance. They represent the high point in the literature of the classical concerto, and in the following generation only Ludwig van Beethoven was able to match them.
A considerable influence upon Mozart's music during this decade was his increasing acquaintance with the music of Johann Sebastian Bach and George Frederick Handel, which in Vienna of the 1780s was scarcely known or appreciated. Through the private intermediacy of an enthusiast for Bach and Handel, Baron Gottfried van Swieten, Mozart came to know Bach's Well-tempered Clavier, from which he made arrangements of several fugues for strings with new preludes of his own. He also made arrangements of works by Handel, including Acis and Galatea, the Messiah, and Alexander's Feast.
In a number of late works—especially the Jupiter Symphony, Die Zauberflöte (The Magic Flute), and the Requiem—one sees an overt use of contrapuntal procedures, which reflects Mozart's awakened interest in contrapuntal techniques at this period. But in a more subtle sense much of his late work, even where it does not make direct use of fugal textures, reveals a subtlety of contrapuntal organization that doubtless owed something to his deepened experience of the music of Bach and Handel.
Operas of the Vienna Years
Mozart's evolution as an opera composer between 1781 and his death is even more remarkable, perhaps, since the problems of opera were more far-ranging than those of the larger instrumental forms and provided less adequate models. In opera Mozart instinctively set about raising the perfunctory dramatic and musical conventions of his time to the status of genuine art forms. A reform of opera from triviality had been successfully achieved by Christoph Willibald Gluck, but Gluck cannot stand comparison with Mozart in pure musical invention. Although Idomeneo may indeed owe a good deal to Gluck, Mozart was immediately thereafter to turn away entirely from opera seria. Instead he sought German or Italian librettos that would provide stage material adequate to stimulate his powers of dramatic expression and dramatic timing through music.
The first important result was the German Singspiel entitled Die Entführung aus dem Serail (1782; Abduction from the Seraglio). Not only does it have an immense variety of expressive portrayals through its arias, but what is new in the work are its moments of authentic dramatic interaction between characters in ensembles. Following this bent, Mozart turned to Italian opera, and he was fortunate enough to find a librettist of genuine ability, a true literary craftsman, Lorenzo da Ponte. Working with Da Ponte, Mozart produced his three greatest Italian operas: Le nozze di Figaro (1786; The Marriage of Figaro), Don Giovanni (1787, for Prague), and Cosi fan tutte (1790).
Figaro is based on a play by Pierre Caron de Beaumarchais, adapted skillfully by Da Ponte to the requirements of opera. In Figaro the ensembles become even more important than the arias, and the considerable profusion of action in the plot is managed with a skill beyond even the best of Mozart's competitors. Not only is every character convincingly portrayed, but the work shows a blending of dramatic action and musical articulation that is probably unprecedented in opera, at least of these dimensions. In Figaro and other late Mozart operas the singers cannot help enacting the roles conceived by the composer, since the means of characterization and dramatic expression have been built into the arias and ensembles. This principle, grasped by only a few composers in the history of music, was evolved by Mozart in these years, and, like everything he touched, totally mastered as a technique. It is this that gives these works the quality of perfection that opera audiences have attributed to them, together with their absolute mastery of musical design.
In Don Giovanni elements of wit and pathos are blended with the representation of the supernatural onstage, a rare occurrence at this time. In Cosi fan tutte the very idea of "operatic" expression—including the exaggerated venting of sentiment—is itself made the subject of an ironic comedy on fidelity between two pairs of lovers, aided by two manipulators.
In his last opera, The Magic Flute (1791), Mozart turned back to German opera, and he produced a work combining many strands of popular theater but with means of musical expression ranging from quasi-folk song to Italianate coloratura. The plot, put together by the actor and impresario Emanuel Schikaneder, is partly based on a fairy tale but is heavily impregnated with elements of Freemasonry and possibly with contemporary political overtones.
On concluding The Magic Flute, Mozart turned to work on what was to be his last project, the Requiem. This Mass had been commissioned by a benefactor said to have been unknown to Mozart, and he is supposed to have become obsessed with the belief that he was, in effect, writing it for himself. Ill and exhausted, he managed to finish the first two movements and sketches for several more, but the last three sections were entirely lacking when he died. It was completed by his pupil Franz Süssmayer after his death, which came on Dec. 5, 1791. He was given a third-class funeral.
Further Reading on Wolfgang Amadeus Mozart
The most important source materials on Mozart available in English are The Letters of Mozart and His Family, Chronologically Arranged, edited by Emily Anderson (3 vols., 1938; 2d ed. 1966); and Otto Erich Deutsch, Mozart: A Documentary Biography (1964). The most comprehensive study in English of Mozart is Alfred Einstein, Mozart: His Character, His Work (1945).
Studies of individual works or groups of works include Edward J. Dent, Mozart's Operas: A Critical Study (1913; 2d ed. 1947); Georges de Saint-Foix, The Symphonies of Mozart (1947); C. M. Girdlestone, Mozart's Piano Concertos (1948); Siegmund Levarie, Mozart's Le Nozze de Figaro: A Critical Analysis (1952); and The Mozart Companion, edited by H. O. Robbins Landon and Donald Mitchell (1956). A wide variety of analysis is in the special Mozart issue of the Musical Quarterly (1956), reprinted as The Creative World of Mozart, edited by Paul Henry Lang (1956). For analyses of his works see Felix Salzer, Structural Hearing (2 vols., 1952; rev. ed. 1962). | <urn:uuid:bc69442a-c429-45ee-9cdc-cd65766fcdd6> | CC-MAIN-2016-40 | http://biography.yourdictionary.com/wolfgang-amadeus-mozart | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662159.54/warc/CC-MAIN-20160924173742-00269-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.970903 | 3,930 | 3.515625 | 4 |
In recent years, many scholars have explored the degree of polarization between red and blue states (red states are those carried by Republicans at the presidential level; blue states are those carried by Democrats). Some claim that red- and blue-state citizens are deeply polarized, while others disagree, arguing that there are only limited differences between the two groups. All previous work on this topic, however, simply uses difference-of-means tests to determine when these two groups are polarized. We show that this test alone cannot determine whether states are actually polarized. We remedy this shortcoming by introducing a new measure based on the degree of issue-position overlap between red- and blue-state citizens. Our findings demonstrate that there is only limited polarization—and a good deal of common ground—between red states and blue states. We discuss the implications of our work both for the study of polarization itself and for the broader study of American politics.
Generating a statistical construct of the distribution of liberalism and conservatism on social and economic issues the authors produced a set of plots which illustrate the differences between “red” (conservative) states and “blue” (liberal) states. In the figures below the blue line represents “blue states/regions” while the red dashed lines represents “red states/regions.”
Let’s drill down to the level of two extreme cases: New York state vs. Utah.
How about looking at a more finer-grain? The congressional district level:
You see a bit more separation, as states are more moderate than the districts, but still a great deal of overlap. The author’s point is that despite our stylized conception of polarization and a great sorting of America there’s an incredible amount of overlap.
The authors conclude:
But this finding raises an important point: If red- and blue-state citizens are themselves so similar, why are their elected officials and laws so often quite different? A detailed answer to these issues would take us too far afield, but we suspect this points to the key role played by electoral institutions. The effects of factors like primary elections; single-member, simple-plurality districts; and the like mean that even small shifts in opinion can translate into large differences in outcomes (Fiorina and Levendusky 2006). But it is worth noting that each of these institutional features probably responds not only to the mean level of opinion, but also to the heterogeneity of constituency opinion. This suggests an important avenue for future scholarship to explore. To understand how a relatively moderate mass public generates polarized elected officials, we should focus our attention on how electoral institutions magnify relatively small differences in citizen preferences, not on finding an increasingly ideological public.
The institutional issue is straightforward: in the United States we have a first-past-the-post single-district voting system, the person with the most votes in a locality always wins. In most contexts even if you have less than 50% you win; there’s no runoff. This means small differences in the mean which are consistent are going to result in a repeated outcome for one faction, barring massive systematic nationwide shifts which change the whole playing field.
But I don’t think it’s just institutional. Certainly proportional representation voting systems don’t necessarily result in a plethora of moderate parties. On the contrary, they often allow for the emergence of coalitions of very specific sets of interests. In theory first-past-the-post tends to favor moderation insofar as candidates have to appeal to the “median voter.” I suspect part of what’s going on is that it’s not too useful to think of the whole electorate as relevant.
Using the General Social Survey, below are the results for vocabulary test scores (out of 10) for people of a given ideology who have attained a bachelor’s degree since 1972. I had to combine 0-4 because there really aren’t that many people who score that low who have at least a bachelor’s degree (this test has a 0.70 correlation with I.Q.). The rows add up to 100% after the first column, so yo ucan see that 35.3 percent of self-described “extreme liberals” with at least a college degree obtained a 10 out of 10, while 11.6 percent of “moderates” did so.
|With at least a bachelor’s degree|
|Vocab Score||Extreme Liberal||Liberal||Slight Liberal||Moderate||Slight Conservative||Conservative||Extreme Conservative|
If you need a visual representation:
A fixation on how most people mostly agree misses the fact that the most eloquent, motivated, and ideologically reflective are least likely to agree. Additionally, much of history has been dominated by motivated and mobilized collective action of a subset of the population. Ideologues on the Left and Right may be outnumbered in raw numbers, but it is totally useless to view society as a matter of pure individual mass action of the totality. The sum of the social parts if you will. Rather, there is a structure within society, nested sets of institutions. These units of political and social coherency tend to bubble up on the edges of the distribution, not the center. The firm and hard-edged margins easily dominate the discussion over the soft center. So it was, and so it will be. | <urn:uuid:18cc7b77-a452-4dab-97de-7d608bf810d2> | CC-MAIN-2015-27 | http://blogs.discovermagazine.com/gnxp/2011/06/the-limits-of-the-mean-and-the-moderate/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098072.11/warc/CC-MAIN-20150627031818-00158-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.931486 | 1,112 | 2.75 | 3 |
from Wiktionary, Creative Commons Attribution/Share-Alike License
- v. Present participle of furrow.
from The Century Dictionary and Cyclopedia
- n. The act of making a furrow.
- n. In embryology, the process of segmentation of the yolk of an egg in some animals, as Amphibia. It is an unequal cleavage, which gives the appearance of furrows on the surface of the germ.
Sorry, no etymologies found. | <urn:uuid:cedbcef4-cd55-4905-b641-b90fdc49beff> | CC-MAIN-2013-48 | http://www.wordnik.com/words/furrowing | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163952819/warc/CC-MAIN-20131204133232-00007-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.791422 | 105 | 2.796875 | 3 |
PANAMA CITY, Fla. -
More than 100 fifth graders from Oakland Terrace, Springfield and St. Andrew Elementary schools came to Gulf Coast State College on Tuesday for a day filled with activities in science, technology, engineering and mathematics (STEM).
The STEM day was called SURGE (Students Understanding the Research and Groundwork of Experiments), and it gave students the opportunity to get hands on with all of the STEM fields.
The kids rotated to several stations with interactive activities including: orgami, operating unmanned vehicles, launching rockets, and learning how to hack and code on computers.
Katie McCurdy, GCSC and Bay District Schools' Stem Administrator, said she hopes the event will help spark an interest that the kids will want to continue to explore.
"We hope it really sparks curiosity in these kids and they want to continue in those STEM aspects in education," she said.
Each of the stations were led by either GCSC faculty and/or retired Navy base engineer, which also exposed students to the type of education they need for high paying jobs with companies like GKN.
"It's allowing us to create that pipeline so that those kids are prepared for these big STEM industries that are coming to Bay County," McCurdy said. "When they leave highschool or leave K-12 and they go on to post-secondary, they have those skills that are needed."
Bay District Schools is planning another SURGE event in the Spring for fifth graders from other Bay County Elementary schools.
LAGOS, Nigeria (AP) - Authorities in Nigeria are releasing hundreds…
ROTTERDAM, Netherlands (AP) - Roger Federer overpowered Grigor…
PEORIA, Ariz. (AP) - A person with direct knowledge of the deal says… | <urn:uuid:a7087fc5-197b-44e7-a1fb-b9c1494bcc1a> | CC-MAIN-2018-09 | http://www.mypanhandle.com/news/gcsc-hosts-stem-surge-day-for-fifth-graders/857469517 | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812247.50/warc/CC-MAIN-20180218173208-20180218193208-00427.warc.gz | en | 0.963007 | 367 | 2.515625 | 3 |
ENCINITAS — Some schools are buying laptops or tablets for all of their students. But the San Dieguito Union High School district opted for a growing alternative — B.Y.O.D. (short for bring your own device.)
With this alternative, teachers have the option of allowing personal devices in their classrooms. Some teachers at San Dieguito are even taking the extra step of asking students to bring in iPads and smartphones to incorporate the technology into lessons. It’s a dramatic difference from just three years ago, when cell phones were forbidden on campus.
B.Y.O.D. was all the rage Monday at Torrey Pines High School in Abby Brown’s advanced math class, where students worked on projects with a variety of their personal laptops, tablets and smartphones.
“One of things that struck me is how many students have a smartphone,” Brown said. “Especially this year, the number of students with technology is just at a whole new level.”
Given that the devices have different operating systems, occasionally a couple of the students in her class won’t be able to run a program or open certain kinds of documents. Brown, however, said “we usually find a quick workaround for that.”
Brown noted that the devices occasionally pose a distraction. She catches students checking their email, for example. But Brown said that’s an exception — students are usually on task.
“I’m constantly surprised by how much they’re learning and their ingenuity with technology,” Brown said.
In 2011, the district officially updated its acceptable use policy to allow devices in classrooms. Yet, B.Y.O.D. really only took off this year due to San Dieguito’s revamped wireless network, and with a push from district officials.
Kevin Fairchild, technology and learning specialist for San Dieguito, said B.Y.O.D. is preparing students for the connected, technology-driven business world. And students in some B.Y.O.D. classes are learning quicker thanks to educational apps they otherwise wouldn’t be exposed to.
Fairchild said there’s another major plus: The price of B.Y.O.D. is much less than buying technology. He said the cost of purchasing devices like iPads for each of its 12,000 students is prohibitive. Also, there’s the risk of the technology becoming outdated in a handful of years.
“We believe this is the best fiscal, as well as educational policy,” Fairchild said.
Fairchild said that an estimated 15 percent of classrooms in the district incorporate B.Y.O.D. into lessons, but that number is expected to ramp up in the coming years.
San Dieguito’s approach toward devices is in contrast with that of the EUSD (Encinitas Union School District), which spent $1.7 million in bond money on 3,500 personal iPads for its third through sixth graders. Currently, EUSD is exploring whether to buy iPads for its kindergarten through second grade students.
Echoing other critics, Richard Clark, professor of educational psychology and technology at the University of Southern California, said both B.Y.O.D. and large-scale school iPad programs are all about technology for technology’s sake.
“You have to ask if this technology is really solving any problems, or if it’s just creating new ones like providing students with another way to be distracted.” Clark said.
Clark added that he’s not against technology — only that districts aren’t putting enough emphasis on the curriculum.
“The content is what’s important — not the technology,” Clark said. “I think school districts have lost sight of that.”
Clark noted B.Y.O.D. is less expensive than buying iPads for an entire district. But with so many different devices, it takes more time to get everyone on the same page — essentially putting technology before education.
However, Joel Van Hooser, technology supervisor for San Dieguito, said that the district recommends apps that are friendly with nearly all devices. In the event that someone can’t connect to the network, San Dieguito has a troubleshooting page that’s a “one-stop shop that solves 99 percent of issues,” Van Hooser said. After that, for those who are still having problems, media techs are available at each of the schools.
Van Hooser said that the district’s wireless network does allow access to much of the Internet. High school students can even search for YouTube videos and login to social media websites like Facebook, yet inappropriate websites are blocked via a service called Lightspeed.
But he acknowledged that students with smart phones who have their own independent wireless network can get around the district’s restrictions.
“It’s up to the parents to filter those devices,” Van Hooser said.
Van Hooser said that he wasn’t aware of another county district emphasizing B.Y.O.D. to the degree that San Dieguito is. Indeed, the district offers teacher training in how to best manage classrooms with different kinds of devices, as well as advice on building technology into lessons.
Van Hooser noted that recently at Canyon Crest Academy, a school with 2,100 students, 2,400 devices were logged onto the network at one time.
“Way more students are using the network this year; the philosophy is, ‘Build it and they will come,’” Van Hooser said.
With B.Y.O.D. becoming more popular, the district plans to expand its network by purchasing new servers and other infrastructure.
Also, schools already have laptops to checkout for students who don’t have their own devices, and San Dieguito is looking at buying 150 more. Because the details of the network upgrades and laptops purchase are still being worked out, Van Hooser said there isn’t a concrete cost at this time.
The cost of San Dieguito’s wireless network for each of the past three years was requested, but was not returned by press time.
Rick Schmitt, San Dieguito’s associate superintendent of business services, said that the district updated its acceptable use policy to accommodate B.Y.O.D. to “bring the district into the 21st century.” Further, he cited results from a recent survey from the education group Project Tomorrow showing that San Dieguito students prefer to use their own devices to complete schoolwork.
To get the word out about B.Y.O.D., Schmitt said the district has educated parents about the approach at back-to-school-nights and at parent-teacher association meetings.
Chris Faist, a seventh grade teacher at Carmel Valley Middle School, said that he’s asked his students to come to class with their devices this year to increase engagement and save paper. Typically, 10 out of 30 students comply with the request, but more would if they had the OK from their parents, he believes. Faist has reached out to parents to let them know about what he sees as the benefits of iPads in education.
“Unfortunately, I think many parents believe the iPad is only for games,” Faist said.
“They don’t want their device in a classroom for that reason,” he added. “I’ve tried to educate parents that iPads have so many apps that help students create, not consume, content.”
Initially, Faist feared that there would be a divide between students who bring in devices and those who don’t. But he said that hasn’t been the case, though he noticed the devices do distract from his lectures once in a while.
Back at Brown’s class at Torrey Pines, senior Kathy Li said that regardless of whether the devices are distracting, students realize that surfing the Web in class means homework later.
“If we don’t use our time wisely in class, we have to make up for that outside of class,” Li said. | <urn:uuid:9b632f12-4eb0-42e8-8489-416efe0fd984> | CC-MAIN-2015-48 | http://www.thecoastnews.com/2013/05/03/district-encourages-students-to-bring-their-own-technology/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398453576.62/warc/CC-MAIN-20151124205413-00316-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.965028 | 1,739 | 2.515625 | 3 |
Views of the News
August 11, 2011 - The Drought that Wouldn't Leave
Declared as the most severe one-year drought in Texas history, the drought has turned Texas and parts of the Plains into a parched moonscape of cracked earth. Texas had less than an inch of rain statewide in July, and more than 90% of the state is in the two most extreme stages of drought. The Landsat 5 images above show San Angelo's O.C. Fisher Lake, a 5,440-acre lake, filled with water on June 18, 2010, and as a dry, cracked lake bed on August 8, 2011.
For more information on this story, please go to the USGS Newsroom. | <urn:uuid:2c9498ee-b7a4-412f-bc2a-9f8025de4994> | CC-MAIN-2015-22 | http://eros.usgs.gov/views-news/texas-drought | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207931085.38/warc/CC-MAIN-20150521113211-00336-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.961115 | 148 | 2.984375 | 3 |
Scriptures of Hinduism
In Hinduism, the philosophy of dharma is extensively described in hundreds
of scriptures and in the writing of our Jagadgurus and great Saints.
The Brihadaranyak Upanishad (2/4/10) states that the prime scriptures of
the Hindu religion or Sanatan Dharma, which are the Vedas, Ramayana,
Mahabharata, Puranas, Upanishads, along with the Sanskrit language and its
vocabulary and grammar, plus all the scriptural verses or mantras - are
all manifested by supreme God on this earth. They are apourushey,
Divine, and not the product of a human mind.
A material human intellect doesn't have the capacity to decipher the deeper
Divine meanings of these sacred writings. The Upanishads advise that if you
are a seeker of God, the proper method of studying them is through a God
realized Saint directly or through his writings.
The Divine knowledge of Sanatan Dharma exists eternally,
and has been on this earth since its inception.
How old is the earth? According to Vedic chronology, 155 trillion years.
Just as we don't have the technology or even the scientific theory to test
this, similarly we don't have the capacity to properly understand and grasp
the Divinity in these scriptural writings. This is possible only through
our own spiritual practice and the grace of a Saint.
The main scriptures of Hinduism are:
Vedas -- This knowledge was received first by the creator of our
world, Brahma, and later it was received in consciousness by many generations
of Saints. When human civilization started it later took the form of a book.
The language of the Vedas and all the prime scriptures of Hinduism is Sanskrit.
There are four sections of the Vedas:
- Rig Veda
- Sam Veda
- Yajur Veda
- Atharva Veda
Originally the Vedas had 1,180 branches comprised of 100,000 verses.
Each branch has three sections, each containing three types of Vedic verses:
- Mantra bhag -- comprised of mantras or Vedic verses and is related
to material attainments
- Brahman bhag -- specifies use of Vedic rituals and is related to
- Aranyak bhag -- specifies styles of formal worship and also includes
the Upanishads which are directly related to God and God realization
Upanishads -- Part of the aranyak bhag of the Vedas. Originally
there were 1180 Upanishads corresponding to 1180 branches of the Vedas.
Today approximately 200 are avialable. Their philosophy relates to the almighty
aspect of God. They generally refer to the liberation of the soul or its blissful
experience in the Divine world. Out of 200 Upanishads, eleven are prominent: Isha,
Kath, Mundak, Mandukya, Taittariya, Shvetashvatar, Mukti, Yogshikha, Tripadvibhushit
Mahararayana, Krishna, Gopal Poorva.
Upavedas -- There are four 'up' or subsidiary Vedas related to the four Vedas:
- Arthveda -- science of sociology and economics
- Dhanurveda -- science of defense and war and weaponry
- Ghandarvaveda -- the science of instrumental and vocal music
- Ayurveda -- medical science
Vedangas -- Vedangas are also part of the Vedas. They include:
- Vyakaran -- Sanskrit grammar
- Jyotish -- Vedic astrology
- Nirtukt -- detailed explanations and meanings of Vedic words
- Shikcha -- correct pronunciation of Vedic mantras
- Chand -- Vedic poetry
- Kalp Sutras -- The Kalp Sturas include:
- Shraut Sutra - the protocal of Vedic rituals
- Grihya Sutra - prescribed rituals for family life
- Dharma Sutra - one's religious, social and moral duties
- Shulb Sutra - how to create an altar for Vedic rituals
Smritis -- The Smritis relate to social living. They describe what are
good and bad actions, define what penances redeem which sin and also describe
the punishment for a particular sin. They also describe the rites and rituals
prescribed for families as well as the right conduct and behavior for the various
orders and stages of life.
Darshanas or Darshan Shastras - The six schools of philosophy a
re also part of Hindu scriptures. They are:
- Poorva Mimansa by Sage Jaimini explains the performance of lower
or apar dharma actions and rituals for material prosperity and
- Nyaya by Sage Gautama is a system of logic for discerning the difference
between maya, matter, and God, who we should desire to attain and know
- Vaisheshika by Sage Kanad is another system of logic for finding
happiness through renouncing worldly desires and attaining absolute liberation
and knowledge of the Divine
- Sankhya by Bhagwan Kapil delineates 24 stages of physical creation
and discriminates between what is material and what is Divine, and explains
that material attachment binds the soul in the cycle of birth and death, and
the understanding of Divine truth (God) releases the soul from that bondage
- Yoga Sutras or Yoga Darshana by Sage Patanjali explain there are
three kinds of evidence for determining the aim of life, perceptual,
inferential and scriptural.
There are five kinds of mental anguish associated with ignorance, ego, attachment,
hatred, and the fear of death. These are eliminated through the practice of yoga
and total renunciation.
The Yoga Sutras define renunciation as the elimination of all the thoughts and the
desires that arise out of direction perception of, or indirect knowledge of this world.
The practice of perfecting this renunciation is ashtanga yoga,
which has 8 stages:
- yama -- moral codes of behavior
- niyama -- disciplines of self-restraint
- asana -- physical postures,
- pranayama -- breath control,
- pratyahara -- sense control,
- dharana -- concentration,
- dhyana -- meditation
- samadhi -- complete absorption in thought-free trance. For success in
perfecting the final state of samadhi, Patanjali advises the practitioner to seek
God's help (Sutra 2/45).
- Uttar Mimansa or Brahm Sutra by Bhagwan Ved Vyas states the prerequisite
for its study is a deep desire to know God, and true liberation is only attained through
surrender to God. God is unlimited and endowed with Divine qualities including a Divine
personal form. It describes the existing state of the universe, the state of a soul under
the bondage of maya, and the greatness of bhakti. It explains that through bhakti God's Grace
is easily attained. The Brahm Sutra conveys the same theme of the Upnishads, which are the
essence of the scriptures of Hinduism.
Puranas by Bhagwan Ved Vyas are 18 in number: Brahm Purana, Padma Purana, Vishnu
Purana, Vayu Purana, Bhagwat Maha Purana, Narada Purana, Markandeya Purana, Agni Purana,
Bhavishya Purana, Brahmaivarta Puran, Linga Purana, Varah Purana, Skanda Purana, Vaman Purana,
Kurma Purana, Matsya Purana, Garuda Purana and Brahmanda Purana.
The important contribution the Puranas make to Hinduism is that they describe the
creation and dissolution of the universe, the succession of Manus or progenitors of
human civilization, and the history of important lineages, successions and dynasties on the earth.
The main focus of the Puranas is to introduce a feeling of bhakti or devotion
towards a personal form of God in the heart of the reader. They praise God and
describe and establish the graciousness of the actions of those Divine personalities
who appeared as Sages, Rishis, and Saints.
The Puranas explain that God's Grace isn't arbitrary nor is it the consequence
of good actions, hatha yoga or the performance of austerities or rituals. It is
automatically experienced through total surrender to God. This loving submission is bhakti.
The Puranas explain the same philosophy as the Upanishads and the Darshana Shastras
in a style that is easy to understand.
Itihasas -- In Hinduism these scriptures refer to the Ramayana, which describes
the descension of Lord Rama, and the Mahabharata, which details the history of the
Puru dynasty and the Pandava family, along with the history of creation, this earth,
general teachings of dharma and devotion to God. The Mahabharata is sometimes referred
to as the 'fifth Veda' of Hinduism because its knowledge and teachings relate to the
Upanishads and Puranas.
Bhagavad Gita -- Part of the Mahabharata, the Bhagavad Gita is considered by
eastern and western scholars alike to be one of the greatest spiritual books in the
world. In a clear and succinct way, Lord Krishna describes in a conversation with His
disciple Arjuna the science of God-realization and the exact process by which a human
being can establish their eternal relationship with God through bhakti, which the Gita
refers to with the term 'yoga'.
Writings of the Jagadgurus - Jagadguru is a title bestowed on a true Saint or
Divine personality by scholars of Hinduism. While on this earth, a Jagadguru's Divine
state of realization and depth of spiritual understanding, and the universal benefit of
his teachings for all the souls make him the supreme spiritual master of that age.
A Jagadguru establishes the path of bhakti and also imparts teachings related to the soul,
the material existence (maya) and God, based on the philosophies of the Brahma Sutra,
Bhagavad Gita and the Upanishads. The most recent Jagadgurus of the last 5,000 years are:
Writings of Saints -- The scriptures of Hinduism include the writings of true Saints
who impart teachings of bhakti also comprise a significant part of the Hindu scriptures.
Two prominent Divine personalities in this category are
Shri Vallabhacharya (1478 CE) who taught the path of pushti, and
Shri Chaitanya Mahaprabhu (1485 CE), who was regarded as a descension of Radha Krishna
love, and who revealed the bliss of the Divine name through his sankirtan (chanting) movement. | <urn:uuid:1dfcfaf8-82f4-4070-aef9-1631b06880aa> | CC-MAIN-2016-44 | http://www.bhakti-yoga-meditation.com/hinduism-scriptures.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722951.82/warc/CC-MAIN-20161020183842-00448-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.902092 | 2,358 | 2.96875 | 3 |
The researchers, from the University of Cambridge, used machine learning to develop ‘HotGestures’ – analogous to the hot keys used in many desktop applications.
HotGestures give users the ability to build figures and shapes in virtual reality without ever having to interact with a menu, helping them stay focused on a task without breaking their train of thought.
The idea of being able to open and control tools in virtual reality has been a movie trope for decades, but the researchers say that this is the first time such a ‘superhuman’ ability has been made possible. The results are reported in the journal IEEE Transactions on Visualization and Computer Graphics.
Virtual reality (VR) and related applications have been touted as game-changers for years, but outside of gaming, their promise has not fully materialised. “Users gain some qualities when using VR, but very few people want to use it for an extended period of time,” said Professor Per Ola Kristensson from Cambridge’s Department of Engineering, who led the research. “Beyond the visual fatigue and ergonomic issues, VR isn’t really offering anything you can’t get in the real world.”
Most users of desktop software will be familiar with the concept of hot keys – command shortcuts such as ctrl-c to copy and ctrl-v to paste. While these shortcuts omit the need to open a menu to find the right tool or command, they rely on the user having the correct command memorised.
“We wanted to take the concept of hot keys and turn it into something more meaningful for virtual reality – something that wouldn’t rely on the user having a shortcut in their head already,” said Kristensson, who is also co-Director of the Centre for Human-Inspired Artificial Intelligence.
Instead of hot keys, Kristensson and his colleagues developed ‘HotGestures’, where users perform a gesture with their hand to open and control the tool they need in 3D virtual reality environments.
For example, performing a cutting motion opens the scissor tool, and the spray motion opens the spray can tool. There is no need for the user to open a menu to find the tool they need, or to remember a specific shortcut. Users can seamlessly switch between different tools by performing different gestures during a task, without having to pause their work to browse a menu or to press a button on a controller or keyboard.
“We all communicate using our hands in the real world, so it made sense to extend this form of communication to the virtual world,” said Kristensson.
For the study, the researchers built a neural network gesture recognition system that can recognise gestures by performing predictions on an incoming hand joint data stream. The system was built to recognise ten different gestures associated with building 3D models: pen, cube, cylinder, sphere, palette, spray, cut, scale, duplicate and delete.
The team carried out two small studies where participants used HotGestures, menu commands or a combination. The gesture-based technique provided fast and effective shortcuts for tool selection and usage. Participants found HotGestures to be distinctive, fast, and easy to use while also complementing conventional menu-based interaction. The researchers designed the system so that there were no false activations – the gesture-based system was able to correctly recognise what was a command and what was normal hand movement. Overall, the gesture-based system was faster than a menu-based system.
“There is no VR system currently available that can do this,” said Kristensson. “If using VR is just like using a keyboard and a mouse, then what’s the point of using it? It needs to give you almost superhuman powers that you can’t get elsewhere.”
The researchers have made the source code and dataset publicly available so that designers of VR applications can incorporate it into their products.
“We want this to be a standard way of interacting with VR,” said Kristensson. “We’ve had the tired old metaphor of the filing cabinet for decades. We need new ways of interacting with technology, and we think this is a step in that direction. When done right, VR can be like magic.”
The research was supported in part by the Engineering and Physical Sciences Research Council (EPSRC), part of UK Research and Innovation (UKRI).
Zhaomou Song; John J. Dudley; Per Ola Kristensson. ‘HotGestures: Complementing Command Selection and Use with Delimiter-Free Gesture-Based Shortcuts in Virtual Reality.’ IEEE Transactions on Visualization and Computer Graphics (2023). DOI: 10.1109/TVCG.2023.3320257 | <urn:uuid:73f17ae7-bdb7-416b-9034-d7caa24ae611> | CC-MAIN-2024-10 | https://www.searchaphd.com/news/story/machine-learning-gives-users-superhuman-ability-to-open-and-control-tools-in-virtual-reality/9335 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474853.43/warc/CC-MAIN-20240229202522-20240229232522-00507.warc.gz | en | 0.929431 | 1,000 | 2.953125 | 3 |
From a distance, it looked at first like a piece of grass, or maybe pine needles that had blown against the wall and stuck.
Closer inspection revealed movement – it is a bug – a walking stick!
The Phasmatodea (also known as Phasmida or Phasmatoptera) are an order of insects, whose members are variously known as stick insects in Europe and Australasia; stick-bugs, walking sticks or bug sticks in the United States and Canada; or as phasmids, ghost insects or leaf insects (generally the family Phylliidae). The group’s name is derived from the Ancient Greek φάσμα phasma, meaning an apparition or phantom, referring to the resemblance of many species to sticks or leaves. Their natural camouflage makes them difficult for predators to detect, but many species have a secondary line of defence in the form of startle displays, spines or toxic secretions. The genus Phobaeticus includes the world’s longest insects.
Members of the order are found in all continents except Antarctica, but they are most abundant in the tropics and subtropics. They are herbivorous with many species living unobtrusively in the tree canopy. They have a hemimetabolous life cycle with three stages: eggs, nymphs and adults. Many phasmids are parthenogenic, and do not require fertilised eggs for female offspring to be produced. In hotter climates, they may breed all year round; in more temperate regions, the females lay eggs in the autumn before dying, and the new generation hatches out in the spring. Some species have wings and can disperse by flying, while others are more restricted. | <urn:uuid:4004765f-99bd-4ed5-bbc6-0f574a836c91> | CC-MAIN-2018-17 | http://elkmountainarea.com/2017/10/06/walking-stick/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945552.45/warc/CC-MAIN-20180422080558-20180422100558-00232.warc.gz | en | 0.944368 | 356 | 3.359375 | 3 |
Hair of the rat gives clues on lead
Lead and cadmium found in the hair of Australian wildlife are revealing they are at higher risk from heavy metal pollution than humans, say experts.
"These two metals accumulate in the hair of animals," says McLean, who did the research while at the University of Newcastle.
McLean says humans are typically exposed to lead and cadmium pollution via the air, especially around sources like smelters.
In the early 1990s, children around a smelter in the Newcastle suburb of Boolaroo, were found to have raised lead levels.
The smelter, which was operated by Pasminco Limited, closed down in 2003.
Much of the contamination from the smelter has since been cleaned up, but McLean says some areas remain polluted.
Lead levels in children were monitored until 2006, which showed that they decreased as the air cleared.
Although at last count, 4% of under 13-year-olds and 7% of under 5-year-olds still had raised levels.
But McLean says, heavy metals have accumulated in the environment and animals, which are more likely than humans to feed off plants and insects, remain at risk.
In autumn of 2007, McLean and colleagues analysed samples of soil and hair from the native brown antechinus and two species of introduced rat in 23 separate sites at different distances from the former smelter.
They washed the animal's hair before testing it to ensure they were only picking up lead that had accumulated in the animal's bodies.
The researchers found the higher the level of soil contamination at a given site, the greater the amount of lead and cadmium were present in the animals' hair.
Evidence from previous studies suggests that the levels present in the animals could interfere with their breeding, says McLean.
He says most studies of heavy metals in animals to date have involved killing the animals, but sampling hair provides a non-invasive method of testing them.
Interestingly, he says, despite differing diets, all three animals showed the same pattern of heavy metal accumulation in their hair.
McLean says the presence of heavy metals in these animals indicates other animals in urban areas - from brush-tailed possums or rainbow lorikeets - could also be contaminated. | <urn:uuid:252553ac-f485-4f8b-83d2-f9a4b103b12d> | CC-MAIN-2019-47 | https://www.abc.net.au/science/articles/2009/03/12/2513956.htm?site=catalyst&topic=latest | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668585.12/warc/CC-MAIN-20191115042541-20191115070541-00349.warc.gz | en | 0.980976 | 472 | 3.296875 | 3 |
Stone Bridge (Skopje)
Ura e gurit
|Coordinates||41°59′49″N 21°25′59″E / 41.996992°N 21.433071°E|
|Total length||214 m|
The Stone Bridge (Macedonian: Камен мост (help·info), Albanian: Ura e gurit, Turkish: Taşköprü) is a bridge across the Vardar River in Skopje, the capital of the Republic of North Macedonia. The bridge is also less frequently known as the Dušan Bridge (Macedonian and Serbian: Душанов мост) after Stephen Dušan, Emperor of Serbia.
The bridge is considered a symbol of Skopje and is the main element of the coat of arms of the city, which in turn is incorporated in the city's flag. It is located in Centar municipality and it connects Macedonia Square to the Old Bazaar.
The Stone Bridge is built of solid stone blocks and is supported by firm columns that are connected with 12 semicircular arcs. The bridge is 214 m (702 ft) long and 6 m (20 ft) wide. The guardhouse has recently been reconstructed.
The current Stone Bridge was built on Roman foundations under the patronage of Sultan Mehmed II the Conqueror between 1451 and 1469. Most of the Stone Bridge originates from the Ottoman period and throughout the centuries, the Stone Bridge was often damaged and then repaired. There is historical evidence that it once suffered during the great earthquake of 1555 which heavily damaged or destroyed four pillars. Renovations were carried out the same year. Some executions have also taken place on this bridge, such as the execution of Karposh in 1689.
In 1944, explosives were placed on the bridge by Nazis. Upon a request from city notables, the Germans gave up at the last minute and the bridge was saved from destruction. The last reconstruction of the bridge began in 1994. Over seven years during the Stone Bridge refurbishment of the 1990s, people were not allowed to cross the structure and for many craftsmen from the nearby Old Bazaar it resulted in negative economic effects. The watchtower shaped like a mihrab was reconstructed in 2008.
Two parts of Skopje that have symbolised its urban contrasts of "Ottoman" or "modern", the "historic" or "socialist", "Albanian" or "Macedonian" are split by the river Vardar and linked by the Stone Bridge. In the twenty first century, members of the majority and minority groups of the capital city view the stone bridge as representing the split between two parts of Skopje.
Stone Bridge and Macedonia Square in the early 1920s
- ^ Knowledge Bank at OSU
- ^ Official portal of the city of Skopje: City symbols. Retrieved 13 May 2009.
- ^ Ragaru 2008, p. 553.
- ^ Stone bridge, Skopje, Macedonia. Archived 2011-05-26 at the Wayback Machine
- ^ Kameniot Most na Vardar, Skopje
- ^ Macedonia, Bradt Travel Guid, Thammy Evans, Bradt Travel Guides, 2010, ISBN 1841622974, p. 139.
- ^ Skopje In Your Pocket 2006-2007, Sco, Jeroen van Marle, In Your Pocket, p. 27.
- ^ Macedonia, Jovan Popovski, Turistička štampa, 1969, p. 66.
- ^ a b c Ragaru 2008, p. 536.
- ^ Ragaru, Nadege (2008). "The Political Uses and Social Lives of "National Heroes": Controversies over Skanderbeg's Statue in Skopje". Südosteuropa. 56 (4): 554. | <urn:uuid:982a9cc2-a4d4-4a45-8e49-fb731fa94d0c> | CC-MAIN-2023-23 | https://en.wikipedia.org/wiki/Stone_Bridge_(Skopje) | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654016.91/warc/CC-MAIN-20230607211505-20230608001505-00033.warc.gz | en | 0.905516 | 955 | 2.5625 | 3 |
Properties and Benefits of Watermelons: It’s summer and the days are long and hot, the sun is scorching and we feel as if we are slowly melting even when we are lingering besides the pool with a refreshing beverage in our hands. When temperatures seem to go through the roof, many of us feel like all our energy is being drained slowly and there seems to be no cure for this.
Fortunately, there is: the wonder-fruit for boosting your energy levels in summertime is the delicious and nutritious watermelon. Watermelons (or Citrullus lanatus) are originally from Africa. Their exterior is light green with long dark green stripes while the interior is a delicious, incredibly juicy and sweet flesh, that ranges in colour from light pink to deep red. However, this is but one variety.
It may come as a surprise, but the interior of a watermelon can also be yellow, orange or white and have a bitter or even savourless taste. These varieties are less popular, yet just as nutritious as our all-time summer favourite, the common watermelon.
Why are watermelons so dearly recommended for consumption during summer? First of all, they are approximately 90% water (and about 6% natural sugars). When the temperatures are high, our body sweats excessively in order to keep cool which means we lose more water than usual. Water is essential for practically every bodily function so it is imperative that we replace all that has been lost as soon as possible.
A great way to accomplish this is to eat a few ‘slices’ of watermelon (well, huge chunks). Not only will you completely rehydrate yourself, but because watermelons are incredibly sweet, chances are you will be able to get more water from the fruit than you would have by merely drinking it. Excess water is quickly eliminated and a slight increase in the frequency of urination is great for our kidneys because they manage to get rid of many toxins this way.
Most people believe that dehydration is not a serious issue which is why they take this matter lightly. But the truth is that when we sweat excessively our body loses not only water, but also important minerals and vitamins. As a consequence, many people end up fainting or have little to no energy or previous medical conditions, such as cardiovascular problems, may worsen.
Watermelons are, once more, a great solution to preventing such unfortunate events. For instance, 100 g of fresh watermelon contain significant amounts of vitamins A and C. Vitamin A is great for vision, while vitamin C is a potent antioxidant and anti-inflammatory. Because the fruit are also incredibly delicious, you will most likely eat more than 100 g and thus have a far greater intake of the vitamins.
Watermelon is also rich in lycopene, a highly potent phytochemical (it gives the flesh of the watermelon its red colour). The joint effects of vitamin C, beta-carotene and lycopene are scientifically proven to reduce cardiovascular disease risks. Basically, if you eat watermelons, these substances will get into your bloodstream and clean the blood vessels, thus reactivating your circulation.
In addition to this, lycopene is said to effectively prevent the formation of a variety of cancers. Though the amounts are not significant, watermelons also contain vitamin B1, B2, B3, B5 and B6, alongside magnesium and potassium. The latter are our heart’s best friends.
Remember, when it is hot outside and you feel low on energy or have a fainting sensation, try eating foods that have potassium and magnesium in them, preferably with a high water content (such as watermelons or bananas). This should relieve your symptoms and help you get through the day smiling. Watermelon seeds are also a great source of important nutrients, ideal for keeping in good health.
Watermelons are especially great if you have children. Because they are incredibly sweet and juicy, there isn’t a child who will say no to a refreshing slice of watermelon or even a large glass of juice. The fruit can easily replace a sweet snack and you will have the certainty that both you and your child stay hydrated.
However, it is not wise to eat too much of anything. Watermelons, for instance, are mild diuretics, therefore if you eat too much, you might have to take several unplanned trips to the bathroom.
Overall, watermelons are incredibly delicious and nutritious, not to mention versatile. For instance, watermelon rind is highly appreciated in many cuisines, where it is cooked and served as a dish-proper or pickled in order to serve as a side dish. In more traditional cuisines, the rind is made into jam. And did you know that watermelon seeds were found in the tomb of Pharoh Tutankhamun himself? The fruit was also depicted in numerous Egyptian hieroglyps. | <urn:uuid:a5058b26-9310-4477-8e72-721e639811a8> | CC-MAIN-2017-51 | http://www.natureword.com/properties-and-benefits-of-watermelons/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948599156.77/warc/CC-MAIN-20171217230057-20171218012057-00234.warc.gz | en | 0.957816 | 1,017 | 2.515625 | 3 |
American flags have been used for centuries, telling stories of the nation's past and representing its collective spirit. With their bold stars and stripes, they are reminders of patriotism, bravery, courage and freedom. In this article, we explore the history behind some of America's most popular flags and give special insight into their unique meanings.
U.S. Flag of 1777
The Flag of 1777 is an iconic representation of American history and patriotism. It consists of 13 stars arranged on a field of blue in the upper left corner, with alternating stripes in red and white on the rest of the flag. The 13 stars represent the original thirteen colonies that declared their independence from Great Britain and formed the United States of America.
These thirteen colonies sewed the first Flags of 1777 themselves. As a result, the flags varied in size and design as each colony was responsible for their own making. These handmade flags commonly featured 5 or 6-pointed stars, stripes of alternating colors, or other patterns that paid tribute to diverse American values and ideologies. The Flag of 1777 has since been immortalized by our nation’s military and remains the symbol of freedom and unity for all Americans today.
Grand Union Flag (1775-1776)
The Grand Union Flag, also known as the Continental Colors, was used by the colonies prior to the adoption of the Star-Spangled Banner in 1777. It has 13 alternating horizontal red and white stripes with a British naval ensign canton featuring the familiar red cross design on a field of blue. This flag stood as a symbol of patriotism and defiance of the king’s authority.
This flag was flown for the first time at the headquarters of George Washington in Cambridge, Massachusetts, on New Year’s Day
Star-Spangled Banner (1814-1815)
The Star-Spangled Banner served as the official flag of the United States from 1814 to 1815. It features fifteen stars and fifteen white and red stripes in honor of the original thirteen colonies. It has become an iconic symbol of American independence, unforgettable for its role in inspiring Francis Scott Key to write the related "Star-Spangled Banner" lyrics while observing it during a battle at Fort McHenry in Baltimore Harbor.
This flag was made by Mary Pickersgill, a Baltimore businesswoman and flag maker. It was commissioned for the fort by William Armistead, the commander of Fort McHenry during the War of
The 38-Star Flag (1877-1890)
The 38-Star Flag was the official United States Flag from 1877 to 1890. It features stars arranged in a circle with thirteen diamonds representing each of the original colonies and 25 states. This flag is especially popular today as it symbolizes an important milestone for the country - when Colorado officially joined the Union in 1876, it marked the first time 13 stripes were featured on the U.S. flag in over 60 years!
The 38-Star Flag, despite its brief & relatively unpopular usage compared to the earlier and more iconic Stars & Stripes, is still venerated by many in the U.S. A great example of this is the Colorado State Capitol Building located in Denver, CO. As a fitting tribute to both the state and the flag, it was built between 1887-1894 while this particular version of America’s banner was in service. Today, visitors to the edifice are treated to red sandstone walls and bronze eagles proudly emblazoned with the 38 stars - a lasting reminder of America’s past and the grandiose journey of nationhood it endured!
The 53-Star Flag (1959-1960)
The 53-Star Flag was the official U.S. Flag from 1959 to 1960, and was flown after Alaska and before Hawaii officially joined the Union. It is composed of nine alternating long stripes featuring five stars at each peak, making a total of 53 stars that placed five rows in an X-formation. It is said to symbolize the dreams and aspirations of a young nation made up of 50 states with unlimited possibilities.
The 53-Star Flag was also an important symbol of hope. Its prominent position in the nation’s capital, atop the Capitol Building in Washington, D.C., was recognition that a bright future for the United States was indeed within its reach. Before it served as the official U.S. Flag, it had been flown by many from coast to coast with gusto and patriotic pride; this continued even after it was replaced by the 50-star flag when Hawaii officially joined the Union. To this day, old 53-Star Flags may still be seen popping up around America as a reminder of a time when their was a sense of promise and opportunity everywhere one looked. | <urn:uuid:feb8b32f-2b2d-4de0-9efd-b90e7bf65fd0> | CC-MAIN-2023-06 | https://yvddesign.com/blogs/blog-page/populair-american-flags | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499899.9/warc/CC-MAIN-20230201013650-20230201043650-00651.warc.gz | en | 0.95173 | 971 | 3.265625 | 3 |
This Black History Month sermon, "I Have Come to Testify to the Truth," is a lesson on why the word of God does not sanction what scholars now call "American slavery." American slavery, a legal and oppressive system of labor that existed from the 17th century to the 19th century, must be distinguished from the form of servitude that God allowed in the scriptures. It is very important to distinguish the two systems because many erroneously equate the two forms of servitude. As a result, many have struggled with their faith by mistakenly believing that God sanctioned American slavery or any form of oppression.
This sermon is in no way an exhaustive look at American slavery nor the scriptures that apply. However, it is meant to at least demonstrate that by his very nature, and by his commands, God did not approve of the form of oppression that was legal in this nation for two centuries. | <urn:uuid:e8576500-55c5-4cce-a0df-a00ba4dc07e8> | CC-MAIN-2023-06 | https://www.dtodayarchive.org/commentary/oneness/item-8973-black-history-month-i-have-come-to-testify-to-the-truth | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500215.91/warc/CC-MAIN-20230205032040-20230205062040-00387.warc.gz | en | 0.978799 | 332 | 2.921875 | 3 |
Types of bicycle valves – how to recognize them?
Valves are an element in inner tubes that allows you to inflate air. At the same time, tube prevents it from getting inside. In order to inflate an inner tube at all, you need to know all types of bicycle valves. The wrong attachment or adapter will not allow you to do this. Therefore, today we will take a close look – quite literally – of the types of valves in use nowadays.
In which aspect excel the Schrader bicycle valves?
The Schrader valve is also called a car valve. This is due to the fact that it is also used in motor vehicles. This valve was created in the 19th century in the United States and was designed by August Schrader. Currently, the element is marked with the symbol AV (Auto Valve).
The design of the valve is very simple. It consists of a metal tube with a diameter of 8 mm threaded both inside and outside. There are also smaller rims intended for the sports industry. In the middle of the AV valve there is a core with a spring and seals protected by a plastic nut. So how do you pump this type of valve for your bike? It is enough to unscrew the cap and – depending on the pump model – clamp the head on the valve or screw the hose onto the tube. Then tighten the nut again.
What do Dunlop bike valves look like?
Dunlop models are slightly older than the Schrader brand, but this is not the main reason for their low popularity. Back in the 90s, these were extremely popular types of bicycle valves, but they have already been replaced by more practical solutions. Today they can be found almost exclusively in children’s bikes and the cheapest two-wheelers for urban purposes. What bothered the cyclists? First of all, it is not possible to check the pressure, it is difficult to bleed air from the inner tube and it is unidirectional.
However, the simple design speaks for the DV valve (Dunlop Valve). It makes bicycle valves almost indestructible. It’s just a tube with a pin with a metal ball inside. Pumping is done in the same way as with Presta valves.
How do I recognize the Presta valves?
FV (French Valve, although you can also see the term SV, i.e. Sclaverand Valve) are currently the most popular solution. The threaded tube has a diameter of 6 mm and is permanently connected to the tube, with a core with a threaded plunger inside. This clearly distinguishes these types of bicycle valves from the competition.
The pumping itself is also different. To do this, unscrew the Presta nozzle by a maximum of two turns. It is not recommended to unscrew it completely, as it is easy to accidentally damage it. The pump tip is placed over the exposed valve. Deflating is also easy. To do this, just unscrew the tip slightly and press the tube with your finger.
These are all the types of valves used on a bicycle. Once you know the differences between them, it’s hard to make a mistake. We hope that the above article will dispel any doubts about how to recognize a specific type of bicycle valve in your own two-wheeler. | <urn:uuid:6f1d531d-3673-4960-bbd6-212e7778442d> | CC-MAIN-2023-23 | https://www.ibombo.eu/article/3_types-of-bicycle-valves-how-to-recognize-them/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653501.53/warc/CC-MAIN-20230607010703-20230607040703-00250.warc.gz | en | 0.967687 | 679 | 2.5625 | 3 |
MORE THAN 1 IN 9 pregnant women in the U.S. drink alcohol while pregnant, and about 4 percent binge drink, according to new survey estimates from the Centers for Disease Control and Prevention.
Estimates of current drinking and binge drinking among pregnant women in 2015-2017 were both slightly higher than in 2011-2013 – when the figures were 10.2% and 3.1%, respectively – according to a new report from the CDC published Thursday. Drinking alcohol at any time while pregnant can be dangerous for fetal development, the CDC says.
Women who binge drink before pregnancy are more likely to do so during pregnancy, the researchers noted, citing a previous study. According to the new report, among pregnant women who said they had binged on alcohol in the last month, the average number of binge drinking episodes was 4.5. On average, the highest number of drinks consumed on one occasion was six.
The researchers defined binge drinking as having four or more drinks on one occasion or more in the past 30 days, and current drinking as having at least one alcoholic drink in the past 30 days.
“Drinking alcohol while pregnant can cause miscarriage, stillbirth, and fetal alcohol spectrum disorders,” the report says. Alcohol in the mother’s blood that passes through the umbilical cord to the fetus can lead to physical issues, behavioral problems and intellectual disability.
“There is no known safe level of alcohol use during pregnancy or when trying to get pregnant,” the CDC says. | <urn:uuid:117d8366-dc30-454e-8b5c-2df898a8b923> | CC-MAIN-2020-45 | https://preventionconversation.org/2019/04/29/drinking-among-pregnant-women-up-in-u-s/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107909746.93/warc/CC-MAIN-20201030063319-20201030093319-00514.warc.gz | en | 0.958548 | 308 | 2.6875 | 3 |
What is unstructured learning?
A typical classroom with set curricular boundaries is the best example of structured learning. Years of experience from educationists give us ample evidence to show that structured learning has not ensured learning within schools. New concepts of collaboration, project based learning are all extensions to enhance and engage students in the learning process.
Why is it important?
Unstructured learning is more of a ‘trial and error’ learning, more focussed on individual interests and abilities. The result of such unstructured learning is proved to be successful always. To learn cycling is an individual’s choice and this learning becomes unstructured as they learn, not only riding a cycle but also other useful norms associated with the process of riding - starting from road signals to level crossing to balancing between wheels. Similarly, Gaming is an important part of unstructured learning. Gaming designs incorporate many valid aspects which are more logical and applicative, hence understanding becomes easy.
Primary sector of education has more of unstructured activities, however it is more designed to develop the ‘motor skills’ among the students rather than to facilitate formal learning. However, when designed in a proper order this type of learning develops other areas of enrichment. The learning adopts not only cognitive and social skills but also environmental awareness which benefits learners in a long run.
It is an established fact that experiential and engaged learning produces better outcome than a routine book based learning. In order to achieve this in our curriculum, we can bring forth addition of games into the classroom. Playing a game online or in the ground should have its own directions towards learning concepts. For example, a football game can be focussed on angles and directions. This type of focus on unstructured activities towards structural learning needs a more vigilant and alert moderator. The teacher focus on learning should now be to list the unstructured work and convert it to structural concepts that allows students to imagine and connect.
The teachers’ work thus becomes to designs such work, in order to do so, need to know the intricacies of the exploration related. Unstructured learning can sometimes take student curiosity to areas beyond their understanding. Careful steering off from such areas without abrupt diversion becomes essential on the part of the teacher. An ordinary fishing activity can allow students to learn about different types of fishes, their habitat, their food and design of fishing rods.
In fact the most tedious job for the teacher is to observe and engage students. Safe environments, parks, shallow fishing grounds will be some of the safe areas to incorporate such learning. Learning is not considered complete without involving parents. Inclusion of willing parents in such activities can also reduce the financial burden of extra person from the school end. It is safer to say that sound knowledge of less items is better than mere degrees which does not support understanding or application.
Today’s world requires action oriented people and not task oriented people. Sustainability needs to become the focus and this can be achieved only when student focus lies on the real world rather than a hypothetical environment of a classroom. | <urn:uuid:c8055795-5e05-4627-846d-231b7f232dc6> | CC-MAIN-2021-49 | https://w.edtechreview.in/dictionary/3091-meaning-and-importance-of-unstructured-learning?tmpl=component&print=1&layout=default&page= | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964360803.0/warc/CC-MAIN-20211201113241-20211201143241-00252.warc.gz | en | 0.964759 | 628 | 3.875 | 4 |
A primary bone tumor is a tumor that starts in the bone itself. The main type of cancers that are true (or primary) "bone" cancers are called sarcomas. Sarcomas are cancers that start in bone, muscle, fibrous tissue, blood vessels, fat tissue, as well as some other tissues. They can develop anywhere in the body.
There are several different types of bone tumors. Their names are based on the area of bone or surrounding tissue that is affected and the kind of cells forming the tumor.
Some types of primary bone cancer are osteosarcoma, Ewing sarcoma, malignant fibrous histiocytoma and chondrosarcoma. Kaposi sarcoma is a type of cancer characterized by the abnormal growth of blood vessels that develop into skin lesions or occur internally.
Some primary bone tumors are benign (not cancerous), and others are malignant (cancerous).
Secondary bone cancer is cancer that spreads to the bone from another part of the body, such as the prostate, breast or lung.
In 2009, there were about 2,500 new cases of bone and joint cancer and 1,470 deaths in the United States.
Risk factors for sarcoma:
- Being a teen or young adult, because sarcomas often form during growth spurts
- Being male
- Having radiation treatment in the past
- Having chemotherapy with anticancer drugs, called alkylating agents, in the past
- Having a certain genetic change
- Having certain rare medical conditions | <urn:uuid:be6a47b5-e72d-40ed-9e0b-a01bb8f4e053> | CC-MAIN-2014-49 | http://www.ohsu.edu/xd/health/services/cancer/getting-treatment/services/sarcoma/about/index.cfm | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400376728.38/warc/CC-MAIN-20141119123256-00082-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.942579 | 320 | 3.75 | 4 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.