text stringlengths 222 548k | id stringlengths 47 47 | dump stringclasses 95 values | url stringlengths 14 7.09k | file_path stringlengths 110 155 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 53 113k | score float64 2.52 5.03 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|
Abydosaurus – Skull Material in mid Cretaceous Sauropoda
Sauropod skull material is a bit like London buses, you wait ages for one to turn up and then four come along at once. Thanks to a discovery in Utah (United States), scientists at Brigham Young University have an embarrassment of riches of Sauropod skull material to work on at the moment and all the skull material belongs to a single, new dinosaur genus – Abydosaurus.
Skull material in long-necked dinosaurs (Sauropods) is exceptionally rare in the fossil record, less than 10% of all the articulated or associated long-necked dinosaur fossils ever discovered actually have some skull material present at the dig site. The reason for this is quite simple, take an animal such as Diplodocus, this Diplodocid dinosaur could reach lengths in excess of 25 metres, but even in an immense adult; the head was no bigger than that of a horse’s head. So the heads were relatively small and being on a long, thin neck, skulls were prone to fall off any carcase, becoming detached. Femurs, and vertebrae being much heavier than the skull bones have a greater chance of remaining close to other bones and surviving the preservation process. These heavy bones are much more common than the skull. Some Sauropods, the early Cretaceous Nigersaurus from West Africa, for example, had an exceptionally light and delicate skull. The thin struts of bone that make up part of the skull material would only very rarely have survived the fossilisation process. Even famous mounted exhibits in Natural History museums do not necessarily have the right head posed on the rest of the Sauropod’s body. For example, there have been instances where both Apatosaurus and Diplodocus exhibits have had casts of Camarasaurus skulls (a Macronaria-type Sauropod) stuck onto them. This in the past was down to ignorance, or in some cases deliberately done to finish off an exhibit even though scientists were actually unaware at the time of what Diplodocid dinosaur skulls looked like.
Rare Things Indeed – Sauropod Skull Material
Picture Credit: Illustration by Michael Skrepnick
But why all the fuss about skull material, surely with several tonnes of fossil bones to be getting on with in your average Sauropod skeleton, that’s enough to keep even the most grumpy palaeontologist happy. True, but skulls can tell scientist a great deal about an animal. If the jaws are present an insight into diet and feeding behaviour can be obtained. Studies into the braincase can be carried out and very importantly skull material can help establish whether the fossils represent a new genus or species of a dinosaur in many cases.
A paper on the new Brachiosaurid dinosaur named Abydosaurus mcintoshi was published yesterday in the German science publication Naturwissenshaften. The research paper was compiled by scientists at Brigham Young University and this new mid Cretaceous Brachiosaurid is significant not just for the skull material associated with it, but because Brachiosaur fossils are increasingly rare in younger Mesozoic strata. The Brachiosaurs seemed to have had their hey day in the late Jurassic, but over the course of the Cretaceous, the main types of Sauropod, such as the Diplodocids and Brachiosaurids become increasingly rare in the fossil record. The Sauropods were by no means finished, particularly in the southern hemisphere, as the Titanosaurs were about to come to the fore, but the food chains and ecosystems of the Cretaceous were becoming increasingly dominated by herbivorous Ornithischian dinosaurs.
The remains and the fossilised skulls of this new dinosaur, were found at the National Dinosaur Monument site in Utah (United States), not in the famous Morrison Formation, but in much younger, sandstone rocks dating from around 105 million years ago (Albian faunal stage) – the Cedar Mountain Formation.
Finding just one skull would be impressive, but four is beyond what any dinosaur hunter could hope for. The skulls revealed jaws crammed with dozens of tiny, peg-like teeth.
Commenting on the skull material, Professor Brooks Britt, a geologist at Brigham Young University stated:
“It’s quite a fortuitous thing. In many dinosaurs, the bones of the head do not fuse up, especially in Sauropods. You have an array of components that are held together by soft tissue. The only thing that stays together is the brain case.”
National Park Service employees first discovered an interesting cache of bones near the monument’s visitor’s centre in the late 1990s and enlisted Professor Britt’s help to prepare the specimens. After the initial find, park staff delivered a two-tonne block to Brigham Young’s University Museum of Palaeontology. Dinosaur bones, including pieces of a skull, were apparent on the surface, but as the researchers carefully prepared the sandstone block, a second almost complete skull was revealed.
An Artist’s Impression of Abydosaurus mcintoshi
Picture Credit: Michael Skrepnick
The skulls are on display at the Brigham Young University Museum, where visitors can watch students work on other Abydosaurus bones in the preparation laboratory.
Professor Britt made follow-up trips to the dig site and found a fourth skull in 2003. All four specimens belonged to juveniles who may have died in the same event and were quickly buried before scavengers and bacteria could destroy the carcasses. Although it is difficult to estimate the size of an adult Abydosaurus from the fossil remains found so far, the research team have estimated that these animals could have reached lengths in excess of 25 metres.
The teeth of Abydosaurus are most intriguing, in a statement Professor Britt said:
“They [the teeth] are small, small as a triple-A battery cut in half, a centimetre in diameter. Why is that? Perhaps the teeth reflect food sources and eating habits, but the small teeth fit a pattern seen over the course of dinosaur evolution from the Jurassic to the Cretaceous.
“There is a trend from large to small teeth, packing them in there close together, not just in Brachiosaurus, but all the Sauropods that survived into the Cretaceous. In the Jurassic, they had an array of tooth sizes, but in the end everyone has these small pencil-like teeth. We attribute it to a way to increase the enamel, so their teeth last longer.”
Researchers believe that Sauropod dentition evolved over time to offer a greater surface area of enamel. This would make them more durable and more hard-wearing when being employed to strip foliage. It could also be an adaptation that reflects the growing numbers of Angiosperms (flowering plants) that were evolving and beginning to make up an increasing proportion of the diet of these huge animals.
Professor Brooks Britt with one of the Abydosaurus Skulls
Picture Credit: Mark A. Philbrick/ photo courtesy of BYU | <urn:uuid:c8d39b7c-5c2d-49e6-808b-837bbc9dba92> | CC-MAIN-2018-30 | https://blog.everythingdinosaur.co.uk/blog/_archives/2010/02/24/4464307.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589980.6/warc/CC-MAIN-20180718002426-20180718022426-00552.warc.gz | en | 0.954681 | 1,474 | 3.171875 | 3 |
Definition of renegade:
dissident, arise, rebellious, recreant, rebel, ratter, poltroon, disloyal, turncoat, defector, craven, false, rat, rise up, runagate, apostate, approach, tergiversator, rat terrier, rise, treacherous, deserter.
- "The Pacha of Many Tales", Captain Frederick Marryat.
- "Pelle the Conqueror, Vol. 2", Martin Anderson Nexo.
In like manner Peter Dathen, another renegade monk, from Poperingen, stirred up West Flanders; as many as fifteen thousand persons at a time attended his preaching from the villages and hamlets; their number made them bold, and they broke into the prisons, where some Anabaptists were reserved for martyrdom.- "The Revolt of The Netherlands, Complete", Frederich Schiller. | <urn:uuid:ef18c67e-cbbf-4ff0-b663-0d4980258998> | CC-MAIN-2020-24 | http://www.dictionarylink.com/renegade | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347392142.20/warc/CC-MAIN-20200527075559-20200527105559-00249.warc.gz | en | 0.895919 | 187 | 2.84375 | 3 |
Home and the Environment
more manual labor—hand-weeding—is one way to reduce the amount
of herbicide we use, but there are a couple of other tricks you
can use, as well:
heavily with an organic mulch such as shredded cedar, straw, cocoa
hulls, or compost. This will help keep down the weeds and help
the soil stay cool and retain water. These materials will eventually
break down, adding nutrients to the soil and reducing the need
yourself with a variety of weeders to make weeding easier and
more effective. These include dandelion weeders, wing weeders,
stirrup weeders, and cultivators, among others.
can also fight weeds with heat: pour boiling water on them or
hit them with a flame weeder.
weeds before they go to seed to avoid their spreading.
Reducing Fertilizer Use
is one point that often gets overlooked in the battle over chemical
versus organic fertilizer: too much of either adds to the run-off
problem affecting our lakes and rivers. Acre for acre, studies show
that urban areas are responsible for more run-off than farms. Here
are some ideas for alternatives to fertilizer and for safe use of
gardens with compost, this reduces weeds and enriches the soil.
purchasing fertilizer, get one appropriate for your needs and
buy only as much as you need.
reduce runoff, follow the package directions for application rates,
and apply fertilizer only on a calm, clear day.
Avoid Being a Slave to Your Lawn
is possible to have a lawn that doesn't require constant
fussing and fertilizing. Using these techniques can save you time
and money and reduce the amount of water and chemicals your lawn
the grass long. This shades the roots, reducing water requirements.
the grass clippings on the lawn. They will decompose quickly,
returning nitrogen to the soil.
frequent light waterings, which contribute to shallow root growth.
[Note, this is what causes thatch, not clippings left on the
lawn!] During the growing season, lawns should get one inch
of rain or supplemental water per week, preferably in just one
or two applications.
the lawn annually to avoid compacted soil and allow water and
air to reach roots more easily. Use a core aerator, which pulls
plugs from the lawn, not a spike aerator.
grasses appropriate for your area and growing conditions. They
will be less fussy than imports not suited for your soil and
a mix of grasses. Monocultures are more likely to be totally
wiped out by weeds, insects, drought, or disease.
Home & Environment Index | <urn:uuid:8205087c-6a3c-4430-b888-6355f6a491ad> | CC-MAIN-2016-30 | http://www.pbs.org/hometime/house/environ/lawn.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824757.62/warc/CC-MAIN-20160723071024-00078-ip-10-185-27-174.ec2.internal.warc.gz | en | 0.89965 | 584 | 2.609375 | 3 |
By Victoria Riggs
People are reminded everyday about the importance of having a healthy lifestyle.
Eating nutritious foods and exercising regularly play a big part in being fit.
The latest technology trend in fitness are devices, such as Fit Bits, which challenge adults and teens to make exercise a part of their daily routine.
People cannot argue that exercise is wise for teenagers as they tend to spend more time inside watching television or playing video games and less time being active. Exercise is not only good for the body, but it also makes a person feel good on the inside as well. Teens should try to spend at least 60 minutes doing moderate physical activity each day.
Exercise benefits every part of the body because it causes the body to produce endorphins, chemicals that can help a person feel happy and increase self esteem. Exercise also promotes restful sleep.
Regular exercise enhances thinking and learnings skills, which may improve performance at school. Lastly, it can also give a person a sense of accomplishment when a certain goal is achieved.
Exercising improves appearance and assists in maintaining a healthy body weight as it burns more calories and develops a toned body; however, the amount of high intensity exercise needed to lose weight does vary with people. Some people may need to do more than 150 minutes of activity per week, and some may need to do less.
Diseases, such as type II diabetes, heart disease, colon cancer and stroke, which are found mostly with adults, are now becoming more common in teens. Exercise and maintaining a healthy weight helps reduce the risk of these medical conditions.
Working out will also help lower blood pressure and increase good cholesterol. Brisk walking, running and other weight bearing exercises strengthen bones which helps prevent loss of bone density.
Staying active as a teen is extremely important. Becoming involved with a sport or other activity will encourage regular exercise.
There are three components that make up a well balanced exercise program: aerobic exercise, strength training and flexibility training. Aerobic exercise gives the heart a good workout as it gets the heart pumping and quickens breathing. Team sports provide a great aerobic workout; however, biking, swimming and running are some examples that can be done individually. Strength training exercises, such as push ups, squats, leg raises increase muscle mass and help to build strong muscles.
When muscles are used, they become stronger and can increase endurance. Flexibility training activities helps the muscle and joints stretch easily and reduces the risk of sprains. Some activities like karate, ballet and gymnastics help a person stay flexible.
Staying fit and active is one of the biggest challenges teenagers face. If one is already exercising now, try to keep it up as it becomes more difficult to do as the schedule becomes busier. | <urn:uuid:07265e40-d074-480d-9c9a-ec4e1404b4fe> | CC-MAIN-2023-14 | https://stohion.com/2016/02/01/exercising-daily-is-important-for-teenagers/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.0/warc/CC-MAIN-20230401032604-20230401062604-00094.warc.gz | en | 0.962386 | 564 | 3.453125 | 3 |
Seborrheic dermatitis is a condition that can occur in infants during the first few months of life. The common name for this skin affliction is cradle cap. The exact cause of cradle cap is not known. However, scientists believe it may be due to over production of oil and a yeast called malessizia. When your baby’s scalp develops that dry, flaky appearance associated with cradle cap, you may find the condition migrates down around the ears and onto the face. Facial cradle cap requires a different treatment than you might use for the scalp. The good news is that as your child grows the flakes will lessen, and the condition will disappear.
Treat the condition on the scalp aggressively. If cradle cap is indeed the result of a yeast infection, you must treat all affected areas to improve the condition. Apply baby oil to the scalp. Massage the oiled scalp with your fingertips to remove any loose flakes.
Wash the baby’s head once or twice a week with a mild dandruff shampoo. Repeat the application once a month when the condition begins to fade.
Brush your baby’s hair often throughout the day. This will remove scaly areas of skin and keep it clean.
Apply an over-the-counter extra-strength hydrocortisone cream to affected areas on the face. Do not get the cream in the baby’s eyes or near the mouth. Apply the medication sparingly. Repeat the application twice a day until the condition improves. | <urn:uuid:c91aeb20-710d-45a9-8d38-4d1d788e7a89> | CC-MAIN-2017-04 | http://www.livestrong.com/article/209046-how-to-treat-cradle-cap-on-the-face/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00335-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.93302 | 313 | 2.953125 | 3 |
Kids must eat only fresh, healthy and non-junk foods to stay fit. But much as we would want otherwise, kids hate eating such healthy and nutritious food. We, as parents, have to make sure that our children are eating right and getting all the required nutrition.
Children require adequate nutrition in order to grow and develop a healthy body. Therefore, they should be regularly offered foods that are rich in vitamins, minerals, and other nutrients. Children should avoid consuming processed food and snacks. These are loaded with an excess amount of refined sugars. Consuming these can debilitate their immune system, adversely affecting their health over time.
Here is a list of healthy foods for kids to eat. Believe, they are healthiest foods!
Best Healthy Food for Kids
Nutritious foods are often associated with fruits, but there are other varieties of nutritious and healthy foods that are beneficial for the health of children.
Fish and beans, containing lean proteins, are an ideal source of nutrition.
Calcium, which is needed for healthy bones and teeth, is provided by dairy items like milk and cheese.
Whole grains, found in bread and cereals, are a rich source of beneficial fiber.
Nutritious diets offer a variety of health benefits such as reduced chances of developing osteoporosis, heart disease, cancer, and cavities. Children consuming a well-rounded, nutritious diet are less likely to suffer from obesity.
Following are a few nutritious foods that are a must for children:
Eggs are packed with protein and DHA that help in the proper growth of your baby’s brain.
Strawberries and blueberries are the best food for your kids. They are a rich source of many vitamins and antioxidants. You can give them plain or just sprinkle little raw sugar.
Tuna may not be a favorite of kids, but it’s filled with enough nutrients that your child needs. Give your kids tuna by mixing it with lettuce to make a sandwich. You can also try to mix it with rice or cheese to get the right amount of protein.
Legumes such as baked beans, black beans, lima beans, black-eyed peas, and chick peas are the best source of protein for your kids. Cereal aids in digestion and is packed with fiber.
Cow’s milk is the best source of protein and calcium for your kid. Try to give whole milk to your baby till the age of 2 as this is great for brain development. Ensure your teen kids eat calcium dairy for stronger bones.
Yogurt contains good bacteria, which can help your kid grow healthier. You can choose from a low-fat version and low sugar version. Add plain yogurt to some fruits to make it delicious. This is a very healthy food for kids to eat.
7. Fruits and Vegetables
Fruits are naturally sweet and a popular snack among children. It is suggested for kids to take 1.5 cups of fruit every day. You can also add plain yogurt to get calcium. Dried fruit also has much nutritional value and should be included in your kids’ food. Vegetables should be the first choice to feed your kids for a healthy life. Fruits and vegetables help to improve nutrition, decrease obesity risk and aids in better school performance.
- Improved Nutrition
Fruits and vegetables are filled with vitamins, minerals, and many healthy compounds. They help in boosting the immune system, promote good eye health and prevent the risk of anemia. Give fruits and vegetables in rainbow colors to your kids for nutrients.
Fruits and vegetables contain fiber and are low in fat and calories. Encourage your kids to eat fruits and vegetables to avoid obesity. This also helps to reduce the risk of high cholesterol, hypertension, type 2 diabetes, respiratory problems and depression.
- Proper Digestion
Fruits and vegetables are high-fiber foods that aid proper digestive system functioning. This also helps to give relief from constipation to kids. You can add apricots, plums, peas, beans, prunes, and broccoli for regular bowel movements.
- Better School Performance
Children who eat fruits and vegetables perform better in their academic, physical as well as overall development.
8. Whole Grains
Feed your kids with white bread and whole grains by making a sandwich. You can get the best nutrition by taking “100% stone-ground wheat”.
9. Sweet Potato
Sweet potatoes are orange-fleshed root vegetables and a rich source of beta-carotene. Sweet potatoes contain essential antioxidant and anti-inflammatory properties. To get the nutritional benefits from sweet potatoes it is important to steam or boil them. Sweet potato helps to prevent oxidative damage to your kid’s cells and promotes healing.
Include nuts in your kid’s diet. Walnuts have the healthiest benefits than all other nuts.
These seeds are reddish brown or golden yellow in color.
This nutty plant food is an excellent source of omega-3 fatty acids which are essential for optimal brain development.
Flaxseed is sold whole and ground. Ground flaxseed is preferable in order to enable the body to absorb the maximum nutrients.
Ground flaxseeds can be sprinkled onto cereals or the batter of sweet treats.
Tofu is a great source of protein, vitamin B, calcium, and iron – all the nutrients that are required by children for their proper growth and bone health.
Although it is a non-pleaser when served whole in dishes, tofu can be effectively used to provide a creamy base for smoothies, desserts, cookies, and ice creams.
This sweet tropical fruit is an excellent source of vitamin C.
It helps in strengthening the kids’ immune system and keeps teeth and gums healthy.
It provides 3 grams of sugar for just about 100 calories.
Mangoes can be effectively used in a smoothie or dessert like a banana-mango smoothie or mango pudding.
Puree peeled cubes of mango can be processed or blended and frozen to get frozen mango pops.
Milk is a rich source of calcium.
Needless to say, it provides your child with a healthy dose of calcium which is essential for strong bones and teeth.
Vitamin D in milk helps your child to absorb the calcium.
Cow’s milk provides a complete nutritional food for kids as it is a low-fat milk.
As most children dislike plain milk, you can provide them milk in the form of chocolate milkshakes, pineapple blossoms, energy drinks, etc.
This pink fish is an excellent source of omega-3 fatty acids.
These are essential for brain development and a healthy heart.
Besides, it has high-quality proteins which children need for proper growth.
It is also low in mercury.
One of the plus points of salmon is that it requires little seasoning due to its natural flavor and can be baked or grilled in just a matter of minutes.
It can be served to children in the form of salmon burgers or roasted salmon with herbs.
This heart-healthy dip and spread is made from beans which contain fiber, complex carbs, and proteins.
These garbanzo beans in combination with olive oil make hummus a perfect food.
Hummus can be used as a dip with baked chips or baby carrots, or it can be used in sandwiches and wraps in place of mayonnaise.
25 to 35% of kids’ calories should be provided by fats, primarily the unsaturated ones.
Avocados are a good source of monounsaturated fats.
This creamy green fruit can be served best as a spread on wraps instead of mayonnaise or cream cheese.
A ripe avocado can be mashed easily and mixed with a dash of lemon juice and salt to get a tasty spread or dip.
Avocados should be given to children at an early age as fat intake is particularly vital in the early years.
18. Air-popped Popcorn
Being a source of whole grains and low in calories and fat, air-popped popcorn is considered a healthy food for children.
Since it is made without added oil, it stands out as a nutritious choice between meals.
Different toppings like cinnamon or pumpkin pie spice can be tried to make it more delicious for your child.
It can be stirred in other ingredients like dried fruit or mixed nuts and made into a nutritious trail mix.
We will provide you three recommendations in this kids nutrition chart as per the age group of 2 to 3, i.e. the baby nutrition chart, 4 to 8 and 9 to 13 years.
Recommended Daily Amount
|Calories||1,000 to 1,400||1,200 to 1,800 (girls)|
1,400 to 2,000 (boys)
|1,600 to 2,200 (girls)|
1,800 to 2,600 (boys)
|Protein||5 to 20% of daily calories||10 to 30% of daily calories||10 to 30% of daily calories|
|Total Fat||30 to 40% of daily calories||”|
25 to 35% of daily calories
|25 to 35% of daily calories|
|Carbohydrate||45 to 65% of daily calories||45 to 65% of daily calories||45 to 65% of daily calories|
|Fiber||19 grams||25 grams||26 grams (girls)|
|Calcium||500 milligrams||800 milligrams||1,300 milligrams|
Calories are the units of energy which must be taken in certain amounts. The children must gain 1000-1400, 1200-2000, 1600-2600 units of energy in the above stated three different age groups.
Proteins are made up of cell building blocks called amino acids, they are used for cell and tissue repairs and act as oxygen carriers in the body. It should contribute to 5-20 and 10-30 percent of the calories for the age categories as listed above.
Get diet tips and a nutrition plan from expert Nutritionists. Click here for a free consultation.
Fats are the sources of energy that can be stored by the body and used when necessary. The fat content should amount to 25-40 percent of the daily calorie intake by the body.
Carbohydrates are also a source of energy. They are very important as they help the child’s body to utilize fat and proteins in the body. They are also helpful in building and repairing body’s internal mechanism. The right amount of carbohydrates is about 45-65 percent of the calories.
Fiber is responsible for assisting the bowel regularity in children. This makes digestion better and also avoids heart diseases and cancer in the future. It accounts to about 19-26 grams on a daily basis divided accordingly into the above-mentioned age groups.
This is an important nutrient required for teeth and bone strengthening. Calcium can be given in the range of 500-1300 mg to the three categories divided accordingly.
For infants, the mother’s milk is the best source of minerals such as iron. Not only milk but also green leafy vegetables, cereals, sprouts, egg, fish, chicken and fruits are good sources of all of these healthy nutrients.
Remember that you need to include essential nutrition chart for children for overall growth and development.
Most Nutritious Food Groups And Their Advantages
Children can get a balanced diet by eating a variety of foods from the four main food groups given in the table given below:
|Bread, other cereals, and potatoes||These are starchy foods, which also include pasta and rice – provide energy, fiber, vitamins, and minerals.|
|Fruits and vegetables||These foods provide fiber, vitamins, and minerals and are a source of antioxidants.|
|Milk and dairy foods||These foods provide calcium for healthy bones and teeth, protein for growth, plus vitamins and minerals.|
|Meat, fish, and alternatives||These foods, which include eggs and pulses, provide protein and vitamins and minerals, especially iron. Pulses also contain fiber.|
These are the most nutritious and healthy foods for kids that you must definitely include in your kiddo’s diet. Make sure your child is eating healthy. If you have a fussy eater at hand, include healthy ingredients in delicious dishes. Make it appetizing, make it look good and your child will soon love eating these nutritious foods. Do tell us if you tried any of the above.
Latest posts by Jayshree Bhagat (see all)
- Top 15 Most Beautiful Cherry Blossom Flowers - May 13, 2014
- 23 Effective Exercises For Toned Buttocks - April 25, 2014
- Best Aerobics Shoes For Women – Our Top 10 - April 11, 2014
- 14 Amazing Benefits And Uses Of Soy Protein - March 26, 2014
- Top 10 Clinics/Centers That Provide Laser Treatment For Acne Scars - March 24, 2014 | <urn:uuid:fccb668d-f261-4062-8ba1-40441aa8a3d5> | CC-MAIN-2018-05 | http://www.stylecraze.com/articles/super-healthy-foods-for-your-kids/?ref=end | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889798.67/warc/CC-MAIN-20180121001412-20180121021412-00450.warc.gz | en | 0.931357 | 2,690 | 3.1875 | 3 |
“I have been correcting the proofs of my poems. In the morning, after hard work, I took a comma out of one sentence ... In the afternoon I put it back again.”
Poor proofreading can cost you your job.
A misplaced decimal, a name spelled wrong, a word misused, a number transposed — brush it off and the consequences can be dire.
Don’t leave this important job to chance. Find out the tricks the pros use, and catch the mistakes that can hurt your credibility and ruin your career.
Learn to proofread with perfection, get a grasp on grammar rules and sharpen your editing skills. Your written communication needs to be letter-perfect. We can help. Join us Nov. 20 for Proofread With Perfection: Proofreading and Editing Techniques for Flawless Communication.
In this 75-minute webinar, Fred Kniggendorf, Ph.D., will discuss the most common types of errors, what you can do to catch — and fix — them and the skills you need to produce effective, error-free communication.
- When to use a comma before the seven coordinating conjunctions
- How to practice proofreading by watching the news on television
- One very outdated proofing tip you’ll hear about at practically every writing seminar
- Why it’s important that you have a style guide available when you write
- Should bulleted items have periods? We’ll talk about it!
- Why you need to know basic punctuation rules
- How to recognize trite and overused business words and phrases (“Pursuant to,” “We are in receipt of”) and some suggestions of what to use instead
- What to look for when proofing and editing displayed and paragraphed lists
- Editing out wasted words (e.g., “that are,” “which is,” “who was”)
- Why you should read a document aloud. (You'll catch errors and determine how it will sound to the reader as they sub-vocalize.)
Most readers of reports and emails are skeptical of the information contained in documents that are riddled with easily corrected surface errors. Don’t let yours be one of them.
Get your proofreading and editing skills revved up with Proofread With Perfection: Proofreading and Editing Techniques for Flawless Communication. Register for this unique webinar TODAY.
Mary Ellen Slayter
Editor, Administrative Professional Today
P.S. Registration Bonus Gift. Sign up for the Proofread With Perfection: Proofreading and Editing Techniques for Flawless Communication webinar and we’ll send you Business Writing That Gets Results. From common errors (and how to avoid them) to tips on structure, revisions and more, this Executive Summary will help you improve your business communication skills. We’ll email it to you as a PDF download at no cost whatsoever — IF you’re one of the first 50 registrants.
P.P.S. We promise you'll be satisfied. If Proofreading With Perfection: Proofreading and Editing Techniques for Flawless Communication fails to meet your needs, we will refund 100% of your tuition — no hassles, no questions asked. Your course materials and bonus download is yours to keep.
Date: Wednesday, Nov. 20
Time: 1 to 2:15 p.m. ET
Early Registration Bonus:
The first 50 registrants for Proofread With Perfection: Proofreading and Editing Techniques for Flawless Communication will receive a copy of Business Writing That Gets Results. From common errors (and how to avoid them) to tips on structure, revisions and more, this Executive Summary will help you improve your business communication skills. A $39.95 value, our gift to you — IF you’re among the first 50 people to sign up.
About Your Speaker:
Fred Kniggendorf, Ph.D., is a training and adult education consultant. He has more than 30 years’ experience in business and manufacturing, primarily in the areas of management, customer service, training, and business writing with U.S. Steel, the American Management Association, and, most recently, as president of Gravyloaf, L.L.C. He is a sought-after speaker at conferences and on-site corporate training courses, and has travelled extensively throughout the United States and abroad facilitating training courses for a wide variety of clients.
Who Should Attend:
- Administrative professionals
- HR professionals
- Supervisors and managers
- Office managers
- Business owners
Since this is a webinar, you and your entire staff can attend in the comfort of your office or conference room for one low price! You may include as many people as you wish while listening on a single phone line.
Multimedia CD & Download: $197
Webinar, Multimedia CD & Download: $297
Unlimited number of participants at one site. Contact us for multi-site discounts.
Can't attend the webinar? We'll reserve a recording in your name.
How do webinars work?
We promise you'll be satisfied. | <urn:uuid:8c5914af-05e8-42bd-8f20-83d7516d0958> | CC-MAIN-2014-42 | http://www.businessmanagementdaily.com/plp/49202/index.html?campaigncode=738WLB | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507443062.21/warc/CC-MAIN-20141017005723-00109-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.908701 | 1,079 | 2.5625 | 3 |
Tuesday, February 7, 2012
Do the dead outnumber the living?
Not even close, according to new research from the Population Reference Bureau. according to new research from the Population Reference Bureau. "There are currently seven billion people alive today and the Population Reference Bureau estimates that about 107 billion people have ever lived," according to a BBC News article. Of course, as BoingBoing NOTED, the vast majority of history is based on educated guesses. The first homo sapiens weren't too interested in acquiring census data. It wasn't until the 18th century or so that the best ongoing data was collected about such things. | <urn:uuid:65480dc6-7f2a-4b1b-86c7-c1a4acc911f4> | CC-MAIN-2016-50 | http://nysdca.blogspot.com/2012/02/do-dead-outnumber-living.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543614.1/warc/CC-MAIN-20161202170903-00225-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.959324 | 129 | 2.890625 | 3 |
Background: Recessively inherited genetic disorders such as sickle cell anemia and β-thalassemia are commonly encountered in heterozygous and homozygous form in India. These hemolytic disorders cause a high degree of reproductive wastage in vulnerable communities. Inbreeding is usually the mating between two related individuals. Homozygosis is antagonistic process of heterosis.
Purpose: This study was aimed at finding reproductive outcome in carrier couples of sickle cell disease, and β-thalassemia in terms of reproductive wastage in relation to varied marital distance between partners in Madhya Pradesh.
Methods: A total of 107 (35 and 72, respectively) carrier couples of β-thalassemia major and sickle cell anemia with confirmed affected offspring after taking detailed reproductive history were studied following the standard methodology in a tertiary hospital in Central India during March 2010 to February 2013.
Results: A majority of sickle cell and b-thalassemia carrier couples (77.8% and 65.7%, respectively) had married within physical distance of radius less than 50 kms. away from their native places. It was found that as the marital distance between two carrier partners of above disorders decreases, the number of abortions, still-births, neonatal mortality, infant mortality, and mortality under 10 years age increases, and vice versa, implicating inbreeding and homozygosis. The overall reproductive wastage of 28.2% and 18.6% was recorded in carrier couples of sickle cell disease and β-thalassemia, respectively.
Conclusions: Relative small population size clubbed with small marital distance leads to inbreeding resulting in homozygosity which increases chances of affected offspring by recessive or deleterious traits and contributes to decreased fitness of a couple or population in Central India. | <urn:uuid:fab45afe-8dc2-4acc-a404-e6eab69c09a3> | CC-MAIN-2018-26 | https://mjhid.org/index.php/mjhid/article/view/2013.063 | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863980.55/warc/CC-MAIN-20180621001211-20180621021211-00145.warc.gz | en | 0.946033 | 368 | 2.53125 | 3 |
Bullying is currently one of the most pressing issues in Lithuania, especially in school. According to the World Health Organization, Lithuania has the highest prevalence of bullying among pupils comparing to other 43 European countries.
School must be a safety island for a child. Unfortunately, reality differs. Aggression in schools is a problem in many countries around the world. Bullying is a relationship problem in which power and aggression are used to cause distress to a vulnerable person. The World Health Organization`s survey shows that in Lithuania 11 years old children are the most bullied and 15 years old children are the ones who bully the most. Also a higher percentage of boys (36%) reported being bullied than girls (32%) and higher percentage of boys (40%) than girls (28%) report that they have bullied others.
The bullying in schools can manifest in many different ways, for example:
- Beating, bad gesturing.
- Verbal attacks, intimidation.
- The destruction of personal belongings,
- Sexual harassment.
- Ignorance, isolation from group.
The manifestation of bullying is a very difficult process which can be caused by various reasons:
- Child`s personal trait (temperament, traumatic experience)
- Child`s family trait (strict education or no education in family, aggressive behaviour in family, violence, etc.)
- School`s psychological surroundings (competition, depersonalization, focusing on results instead of relationships).
- Bad education systems.
- Violence in television and internet.
The number of programs and projects aimed at reducing the amount of children suffering from bullying and violence in Lithuania is growing. Various programs aim to educate parents, teachers and children about damage of bullying and ways to stop bullying. Lithuania participates in many regional and international projects those main goal is to reduce the amount of bullying in Lithuania. Also every year we have “Week without bullying” which contains various lectures, events on bullying topic all over the Lithuania.
One of the most active organizations in Lithuania which is working towards prevention of bullying is “Vaikų linija” (eng. Children`s line). It is a service of emotional support for children and teenagers, which provides free and anonymous help through telephone and internet. At the moment help is provided by more than 200 volunteers. This organization prepares preventive projects, they are collaborating with well-known people from Lithuania who talk about their experiences also they create movies and short videos about bullying. | <urn:uuid:fed3d1cf-70f8-4d48-b965-4eff81ad9c87> | CC-MAIN-2019-39 | http://mct.si/sl/bullying-problem-in-lithuania/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514578201.99/warc/CC-MAIN-20190923193125-20190923215125-00093.warc.gz | en | 0.951357 | 503 | 3.34375 | 3 |
Although we look to doctors and pharmacists for help with our health, we need to be aware that medication mistakes occur frequently that can harm us. For this reason, the medication process is constantly being evaluated to determine how medication safety can improve.
Dr. Michael R. Cohen, RPh, MS, ScD, the president of the Institute for Safe Medication Practices (ISMP) uses “Ten Key Elements” of the medication-use system to evaluate pharmacy processes in an effort to reduce pharmacy malpractice.
What Are the Ten Key Elements?
- Patient information – Having a patient’s correct, age, weight, and allergy information at the time of prescribing, dispensing, and administration will minimize medication mistakes.
- Drug information – The drug information should be accurate and up-to-date and provided to all healthcare practitioners involved in the medication process to reduce adverse drug events.
- Communication of drug information – Drug information should always be verified to minimize the amount of medication errors caused by miscommunication between physicians, pharmacists, and nurses.
- Drug labeling, packaging, and nomenclature – Drugs that look-alike, sound-alike, or have the similar packaging can increase pharmacy errors, which is why drugs need proper labeling and the use of unit dose systems within hospitals to reduce such errors.
- Drug storage, standardization, and distribution – Drug administration times and drug concentrations should be standardized to reduce the risk of medication mistakes.
- Drug device acquisition, use, and monitoring – Device-related errors like setting the rate incorrectly or selecting the wrong medication or drug concentration leads to patient harm, which is why double-checks should be used with devices.
- Environmental factors – Many factors such as noise, too much work, interruptions, and poor lighting contribute to medication errors. Having a well-designed system can help prevent errors.
- Staff competency and education – Making sure staff are educated on new medications, procedures, and protocols can help reduce medication errors.
- Patient education – Patients should receive education from doctors and pharmacists about their medications, and patients should ask questions to help prevent pharmacy errors from occurring.
- Quality processes and risk management – Redesigning processes and systems that led to errors need to be redesigned to prevent errors.
When any of the aforementioned things go wrong, patients can suffer. If you would like to speak with an experienced attorney about your potential pharmacy malpractice lawsuit, call Kennedy Hodges at 888-526-7616 for a free consultation today to find out more. | <urn:uuid:84808582-d3a7-4ed2-9d1a-95c9cd40d0d8> | CC-MAIN-2018-09 | http://www.pharmacyerrorlawfirm.com/blog/pharmacy-malpractice--evaluating-pharmacy-processes-for-patient-safety.cfm | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815951.96/warc/CC-MAIN-20180224211727-20180224231727-00234.warc.gz | en | 0.911726 | 520 | 2.703125 | 3 |
U.S. PANEL SEEKING RESTRICTION ON USE OF DNA IN COURTS
By GINA KOLATA
Published: April 14, 1992
A long-awaited Federal report on a powerful new genetic technique for identifying criminal suspects says it should not be allowed in court in the future unless a more scientific basis is established.
In principle, the technique, known as DNA fingerprinting or DNA typing, allows a person to be identified from the tiniest scraps of body tissue at the scene of a crime, whether a drop of dried semen, a strand of hair or a spatter of blood. The technique relies on the fact that each person's DNA, the genetic material, is unique.
The new report, by the National Academy of Sciences, says courts should cease to admit DNA evidence until laboratory standards have been tightened and the technique has been established on a stronger scientific basis. Possibility of Misuse
The report says that though the forensic technology is valid in principle, serious questions have been raised about the way it has been used. It adds that the method is potentially too powerful and too important for its development and use to be left solely in the hands of prosecutors and law-enforcement officials. Instead, the report says, it must be regulated and controlled by scientists and Federal agencies that have no stake in the method's success or failure.
The report, by a 12-member panel of scientific and legal experts, is to be issued by the academy on Thursday. Arguments of Critics
Ever since DNA typing was introduced in American courts in the late 1980's, it has been the subject of bitter disputes. The technique has been vigorously embraced by some prosecutors because of its scientific basis and persuasiveness to juries. But defense lawyers have often fought it because they fear it could persuade jurors to overlook any other evidence.
Most courts have agreed to admit DNA evidence and hundreds of cases that relied on DNA fingerprinting have been tried. But critics have argued that the method is not as conclusive as it appears and that it is not yet ready to serve as evidence in court.
Some legal experts said the report would have an immediate impact. "Any defense lawyers who are worth their salt will ask appellate courts to take a look at this," said Dr. William Thompson, a lawyer and molecular biologist at the University of California at Irvine. He said the report "raises serious concerns about whether DNA tests as they are currently done meet the standards for admissibility in court."
Dr. Thompson, who has testified for the defense in cases involving DNA, added that although the committee carefully avoided commenting on DNA cases that had already gone to trial, the recommendation that courts in the future insist on strict scientific standards "is a very subtle and cautious way of saying we were too hasty."
Peter Neufeld, a New York lawyer who has opposed DNA typing, said many courts had allowed the use of the technique on the basis of state court rulings that have held that there is a consensus among scientists that it was valid. He said the new report would reopen those decisions. Report Is Called Irresponsible
Rockne Harmon, a prosecutor in Alameda County, Calif., who has handled DNA cases, agreed that defense lawyers would use the report to attack DNA typing evidence, but described the report as "irresponsible" because it did not take a stand on the DNA evidence that had already been used in court.
The Federal Bureau of Investigation refused to comment on the report, as did the two leading laboratories that undertake DNA typing. Half a dozen proponents of DNA typing either refused to comment until they had read the report or did not return telephone calls.
But Dr. P. Michael Conneally, a geneticist at Indiana University who has testified for the prosecution in DNA cases, said that he saw no problem with the way DNA evidence had been acquired or used and that the committee's precautions were unnecessary.
The academy formed the committee two years ago as disputes over DNA typing were getting more and more heated. The panel, headed by Dr. Victor A. McKusick, a geneticist at Johns Hopkins Hospital in Baltimore, included scientists, a judge and law-enforcement officials.
The committee's report accepts the scientific basis of DNA typing, which is that each person's DNA is unique, that DNA patterns can be detected in the laboratory and that DNA can be used to establish whether cells from a crime scene are likely to have come from a suspect. But, the report said, "before a method can be accepted as valid for forensic use, it must be rigorously characterized in both research and forensic settings to determine the circumstances under which it will and will not yield reliable results." Method Is Not Infallible
The group cautioned against overselling DNA typing. "DNA evidence is not infallible," the report said. "All laboratory work is subject to error; and, given current population data banks and laboratory protocols, a witness or prosecutor will seldom (if ever) be justified in stating that the probability that a reported DNA match involves someone other than the suspect is so low as to make the possibility entirely implausible. Claims that treat DNA identifications as though they are as reliable as fingerprint identifications in the typical rape or murder case are unjustified; until technology and data banks improve, they are likely to remain so." | <urn:uuid:e3b85ce6-1cf9-484b-985b-0dd26bb857db> | CC-MAIN-2016-44 | http://www.nytimes.com/1992/04/14/us/us-panel-seeking-restriction-on-use-of-dna-in-courts.html?src=pm | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721347.98/warc/CC-MAIN-20161020183841-00307-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.973005 | 1,077 | 2.796875 | 3 |
WASHINGTON – Changes in Americans’ diets from 2005 to 2014—particularly a 19 percent drop in beef consumption—resulted in a reduction in climate pollution equivalent to the tailpipe emissions created by 57 million cars in one year, according to a new report from the Natural Resources Defense Council.
“Whether we realized it or not, Americans have been fighting climate change with our forks,” said Sujatha Jahagirdar, policy specialist in NRDC’s Food and Agriculture Program. “As a nation, we have been increasingly eating less beef—a trend that’s not just better for our health, but the health of the planet. By continuing to eat more plant-based food and less animal products, we can continue this forward progress in kitchens across the country.”
Less Beef, Less Carbon found that a 19 percent decrease in beef consumption from 2005 to 2014 is the biggest driver behind a 10 percent per capita decrease in diet-related climate pollution during the same time period. Americans could have cut climate pollution even further, if not for a simultaneous increase in the consumption of other carbon-intensive foods like cheese, yogurt and butter.
Despite this significant reduction in beef consumption, the United States still consumes more beef and veal than most of the world. And in 2014, beef remained responsible for 34 percent of the average American’s diet-related greenhouse gas emissions.
By eating more fruits and vegetables—and making even modest reductions in the amount of meat and dairy we consume—we can make a bigger dent in climate change pollution moving forward, according to the report. In fact, if every American ate just one-third less beef per year, it would cut climate pollution equal to that created by 10 million cars every year.
Consumers can make these changes right in their own kitchens. Restaurants can help by putting more fruits and vegetables at the center of the plate. And the U.S. Department of Agriculture can recommend less red meat in the nutritional guidelines it issues for the National School Lunch Program when it updates them in 2021.
TOP 10 CLIMATE-BUSTING DIET CHANGES
While Americans’ consumption of less beef was the biggest driver of diet-related reductions in climate pollution, it was not the only change with a positive impact. A reduction in consumption of the following top 10 foods contributed to the climate change pollution reductions over the past several decades:
- Orange juice
- Plain whole milk
- High fructose corn sweetener
- Nonfat dry milk
- Canned tomatoes
- Frozen potatoes
- Fresh head lettuce
Some foods require more land, water, fertilizer and energy than others from production to the consumer. This results in greater climate change pollution as well.
For example, livestock raised for meat or dairy products release large amounts of methane—a climate change pollutant 80 times more potent than carbon dioxide in the short term—from their digestive tracts. On top of that, livestock require large amounts of animal feed, which is greenhouse gas-intensive to grow.
In contrast, fruits, vegetables and legumes are much less greenhouse gas-intensive to produce. This is largely because eating plants doesn’t also require growing feed crops, which require large amounts of fertilizer and energy to cultivate.
Less Beef, Less Carbon tracked the per capita change in consumption of 197 major food items tracked by the USDA.
Read the full report here: https://www.nrdc.org/sites/default/files/less-beef-less-carbon-ip.pdf.
Infographic on the top 10 climate-damaging foods here: https://www.nrdc.org/sites/default/files/10-common-climate-damaging-foods-infographic.pdf.
The Natural Resources Defense Council (NRDC) is an international nonprofit environmental organization with more than 2 million members and online activists. Since 1970, our lawyers, scientists, and other environmental specialists have worked to protect the world's natural resources, public health, and the environment. NRDC has offices in New York City, Washington, D.C., Los Angeles, San Francisco, Chicago, Bozeman, MT, and Beijing. Visit us at www.nrdc.org and follow us on Twitter @NRDC. | <urn:uuid:565d692c-2e80-4cee-8a8f-4473a9f84883> | CC-MAIN-2020-50 | https://www.nrdc.org/media/2017/170322 | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141515751.74/warc/CC-MAIN-20201130222609-20201201012609-00666.warc.gz | en | 0.928778 | 878 | 3.15625 | 3 |
Why Lack of Sleep Affects More Than Just Your Energy Levels
When you set a fitness or nutrition goal, you make adjustments to your diet and exercise, but what about your sleep? Sleep is one of the most often overlooked aspects of health and fitness and it is often the first to be compromised when trying to fit everything into a busy schedule.
According to the CDC, 35% of adults do not get the recommended 7+ hours of sleep per night.
Moderate sleep deprivation, such as chronically sleeping <7 hours per night, can have small impacts on your decisions and behaviors throughout the day and on your body’s regulation of physiological processes. Over time, these small impacts can create imbalances in your body’s ability to take in, store, and utilize energy. This causes those who have a shorter duration of sleep to have an increased risk for developing obesity, type 2 diabetes, hypertension, and cardiovascular disease.1
We all know that most people like to be awake during the day and get tired at night. This is more than just a preference; our brains operate according to the circadian rhythm – a 24-hour internal clock that regulates our sleep and wake cycles. This clock is “set” by light from the environment, and the circadian rhythm also dictates other processes in the body such as food intake, hormone secretion, insulin sensitivity, and energy expenditure.2
What Happens When Your Circadian Rhythm is Disrupted?
Disruptions to your circadian rhythm can result in visible changes to behavior. Studies show that individuals who sleep less than 7 hours per night consume an average of 300-400 extra calories throughout the day, have an increase in preference for snacks over meals, and demonstrate a tendency toward higher fat and higher carbohydrate foods with an overall decrease in protein intake.1,3 In studies controlled for caloric intake, those consuming more of their calories between evening and the following morning were found to have greater weight gain, indicating that timing of food contributes to the body’s ability to digest and utilize it.1 In some individuals lack of sleep can also impact energy expenditure by making them less willing to engage in physical activity and lowering tolerance for stress and discomfort.4,5 In athletes, those who are not well rested are more likely to have negative attitudes toward training and a greater perceived effort at lower levels of performance.5 This means that insufficient sleep can result in reduced performance and lack of improvement in the sport.
Other disruptions to the circadian rhythm are less visible, but just as impactful to health. One well studied impact is insulin resistance brought about by mistiming of glucose production in the liver, sensitivity of tissue cells to insulin at different times throughout the day, and the intake of carbohydrates in the diet (which may increase in a sleep deficit, as referenced above).2 Another studied impact is the changes to levels of the hormones leptin, which suppresses appetite, and ghrelin, which stimulates appetite. Those with shorter sleep duration show reduced levels of leptin and increased levels of ghrelin.1 This can result in increased intakes of energy-dense foods and snacks and difficulty with appetite regulation. Disruptions can even affect the brain reward systems through changes to hormones and neurotransmitters, increasing the reward for eating and choosing highly palatable foods high in sugar, salt, or fat.
What can you do to start getting more sleep?
Getting enough sleep can be difficult, especially when an individual is already in a cycle of falling asleep and waking up at irregular times. Studies show that proper nutrition and regular timing of meals can have a significant impact on a person’s ability to fall asleep, stay asleep, and sleep deeply enough to feel rested. There are also behaviors that can be implemented to promote sleep. Increasing exposure to bright, natural light during the day can improve sleep quality, and reducing exposure to bright lights and blue light from screens on televisions, computers, and smartphones can help a person to fall asleep more quickly.2 Regular exercise also helps to synchronize body tissue clocks and improves sleep quality.2 Some studies show that meal timing can affect sleep quality, with positive results coming from populations who eat most of their calories in the morning to afternoon, and from populations who maintain a 12 hour fast between dinner and breakfast (meaning no late night snacks!).2
Studies also suggest that some specific foods and nutrients can affect sleep duration and quality. Eating higher glycemic index carbohydrates between 4 and 1 hours before bed reduced the time it took to fall asleep in some populations, though others showed that an increased load of carbohydrates before bed reduced sleep quality.5 Additionally, diets higher in protein contributed to better sleep quality and diets higher in fat contributed to lower sleep quality. Those who regularly consumed diets that did not meet their caloric needs saw decreases in sleep quality as well.5 Higher protein diets may result in better sleep because of their contribution to the synthesis of melatonin in the brain. Tryptophan is an amino acid necessary for the synthesis of melatonin, and it requires large neutral amino acids in the blood to help it cross the blood brain barrier. Supplementing tryptophan in doses as small as 1 g can improve subjective sleep quality. Tryptophan can be found in foods such as pumpkin seeds (200 g) and turkey (300 g).5
While the general population is recommended to get at least 7 hours of sleep per night, athletes who exercise at a higher intensity may require 8 or even 9 hours of sleep to feel adequately rested and allow their bodies proper recovery. The bottom line: don’t sacrifice your sleep! Not getting enough can significantly undermine your health and fitness goals.
For more information on sleep and the relationship it has to nutrition and overall health, visit the link and references below:
- Dashti, H. S., Scheer, F. A., Jacques, P. F., Lamon-Fava, S., & Ordovás, J. M. (2015). Short sleep duration and dietary intake: epidemiologic evidence, mechanisms, and health implications. Advances in nutrition (Bethesda, Md.), 6(6), 648-59. doi:10.3945/an.115.008623
- Stenvers DJ, Scheer FAJL, Schrauwen P, Fleur SEL, Kalsbeek A. Circadian clocks and insulin resistance. Nature Reviews Endocrinology. 2018;15(2):75-89. doi:10.1038/s41574-018-0122-1.
- Khatib HKA, Harding SV, Darzi J, Pot GK. The effects of partial sleep deprivation on energy balance: a systematic review and meta-analysis. European Journal of Clinical Nutrition. 2016;71(5):614-624. doi:10.1038/ejcn.2016.201.
- Capers, P. L., Fobian, A. D., Kaiser, K. A., Borah, R., & Allison, D. B. (2015). A systematic review and meta-analysis of randomized controlled trials of the impact of sleep duration on adiposity and components of energy balance. Obesity reviews : an official journal of the International Association for the Study of Obesity, 16(9), 771-82.
- Halson S. L. (2014). Sleep in elite athletes and nutritional interventions to enhance sleep. Sports medicine (Auckland, N.Z.), 44 Suppl 1(Suppl 1), S13-23.
Trackback from your site. | <urn:uuid:593fef66-f48f-40de-9700-bab067dc67ec> | CC-MAIN-2020-16 | https://novasportsnutrition.com/why-lack-of-sleep-affects-more-than-just-your-energy-levels/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496227.25/warc/CC-MAIN-20200329201741-20200329231741-00103.warc.gz | en | 0.92294 | 1,542 | 3.734375 | 4 |
March 9, 2010 feature
Fiber-wireless (Fi-Wi) to provide ultra-high-speed, short-range communication
This congestion problem was not unanticipated by electrical engineers, who, for the past two decades, have been developing new wireless technologies that use different parts of the electromagnetic spectrum. Specifically, these wireless technologies are exploiting the large, unused bandwidths of extremely high frequency (EHF) microwaves in the millimeter-wave (mm-wave) frequency region. One particular area of interest is the unlicensed 60 GHz frequency band, which has 5-mm wavelengths. (In contrast, the heavily burdened lower microwave regions have frequencies of 2-4 GHz, corresponding to wavelengths of 7.5-15 cm.)
However, the 60 GHz frequency band is not without challenges, either. Since wireless signals at 60 GHz frequencies have inherently high propagation losses, they are targeted toward short-range, in-building, high-speed applications. To maintain strong incoming wireless signals for buildings, many antenna base stations must be built near customers. These base stations, in turn, would receive broadband signals from a smaller number of distant central offices. The signals between central offices and base stations would be transmitted through long-range optical fibers. Since such a system uses both optical fibers and mm-wave wireless transmission, the technology is called “fiber-wireless” (Fi-Wi).
The advantage of bimodal Fi-Wi systems is that they can enjoy the strengths of both optical and wireless technologies - specifically, the inherently large bandwidth of optical fiber and the large, unused bandwidth in the mm-wave wireless spectrum. For this reason, a hybrid system has the potential to provide very high data transmission rates with minimal time delay.
Recently, a team of electrical engineers working on fiber-wireless technologies has analyzed the progress made in this field over the past two decades. In a paper published in the Journal of Lightwave Technology, Christina Lim, from the University of Melbourne, and her coauthors have presented an overview of the many different techniques proposed to optically transport mm-wave wireless signals and overcome some of the challenges involved.
“Mm-wave frequency allocation around 57-66 GHz can deliver bandwidths in excess of 1 Gb/s compared to few Mb/s offered by current third generation mobile systems or 100 Mb/s offered by Wi-Fi systems,” Lim told PhysOrg.com. “There are even higher mm-wave frequencies which have much larger bandwidths available. However, the technologies for these are not yet matured and over time, the mm-wave band could be exploited to give bandwidths in excess of 10 Gb/s over short-range wireless.
“Due to the short transmission distances associated with mm-wave frequencies, applications in personal area networking would be the most appropriate,” she said. “Providing fast wireless connectivity between your hi-def display screens and video content on a storage device, for example, or connecting a range of devices such as laptops, media storage and displays for entertainment and business interactivity applications, to name a few, will soon require bandwidths in excess of 100 Mb/s connectivity.”
Transportation and integration options
Regarding the basic architecture of a Fi-Wi system, the researchers looked at three possible approaches for transporting mm-wave wireless signals over optical fibers. The simplest scheme, called RF-over-fiber, involves directly transporting the wireless signals, so that no frequency translation is required at the base stations. The second method involves downconverting the mm-wave wireless signals to a lower intermediate frequency (IF) at the central office before optically transmitting the signals to the base station where they are upconverted, which is called IF-over-fiber. The third method, called baseband-over-fiber, involves transporting the wireless signals as very low-frequency baseband signals over optical fibers from the central office to the base station, and then upconverting the information to the mm-wave frequency at the base station.
Ultimately, there is a tradeoff between simplicity and robustness in the three methods: while the RF-over-fiber method is the simplest, the signals are more susceptible to various impairments as they propagate along the optical fiber. Many research teams have been working on a number of strategies to overcome these impairments. The authors of the current study emphasize that these improvements are necessary for achieving good signal quality and overall system performance.
Another requirement is for fiber-wireless systems to be integrated with the existing optical infrastructure. The engineers explain that the rising level of optical fiber infrastructure deployment close to residential premises provides an ideal opportunity to interconnect the wireless with fixed wired networks. This integration would enable fiber-wireless systems to take advantage of current technologies such as wavelength-division-multiplexing (WDM), which combines multiple signals on a single optical fiber by using different wavelengths. Previous research has demonstrated that WDM can significantly increase the capacity and success rates of fiber-wireless systems. In addition, research has shown that there are a range of technology options that support such integration cost-effectively without compromising the performance required of these very high-speed networks.
Overall, mm-wave fiber-wireless technology has the potential to open up the wireless spectrum as the use of small, portable communication devices continues to grow. Serving as a short-distance technology, the wireless portion can cover the “last mile” of data transmission to customers, as well as in-building networking, with the potential for faster speeds and lower costs. For these reasons, fiber-wireless systems would make the most sense in densely populated areas, and also for disaster recovery environments where wired communication lines are unavailable. As Lim explained, fiber-wireless could be deployed in the near future.
“We feel that fiber-wireless could be commercially ready in 3-5 years with immediate applications to new base station installations,” she said. “The adoption of Fi-Wi technologies to 3G and 4G wireless will be the most likely market in the immediate term. As the fiber deployment extends to buildings and premises, mm-wave Fi-Wi will take off.”
Copyright 2010 PhysOrg.com.
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in whole or part without the express written permission of PhysOrg.com. | <urn:uuid:faa30b10-5742-4277-8493-9d6fe9addf20> | CC-MAIN-2019-26 | https://phys.org/news/2010-03-fiber-wireless-fi-wi-ultra-high-speed-short-range.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999210.22/warc/CC-MAIN-20190620105329-20190620131329-00173.warc.gz | en | 0.941668 | 1,313 | 3.328125 | 3 |
Download Full Text (4.7 MB)
- Antimicrobial use is a crucial element of patient care but their overuse and misuse have detrimental effects including the growing problem of antimicrobial resistance (AMR).
- Nurse empowerment and engagement has resulted in improvements in many quality initiatives including enhanced patient safety in the areas of Central Line Associated Bloodstream Infections (CLABSI), Catheter-Associated Urinary Tract Infections (CAUTI) and pressure injuries (Carter, 2016).
- Enhancing nurse empowerment in AS may be effective in reducing antibiotic misuse.
- The purpose of this study is to implement an educational program engaging nurses in AS activities and determining the effect of this educational intervention on the knowledge and empowerment of staff nurses.
- The theoretical framework for this study is the work of Donabedian (2005) on the quality of health care which is divided into structure, process and outcome measures
antibiotic stewardship, nursing knowledge, nurse empowerment
Medicine and Health Sciences | Nursing
Fitzpatrick, RN, MSN, AG-CNS, ACNP, CCRN, Eleanor, "The Effect of a Didactic Educational Program with Practical Application on Nursing Knowledge and Empowerment in Antibiotic Stewardship" (2019). College of Nursing Posters. 22. | <urn:uuid:d37dc95e-a55b-4b48-86ab-fe869ae0810d> | CC-MAIN-2019-43 | https://jdc.jefferson.edu/nursingposters/22/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987829507.97/warc/CC-MAIN-20191023071040-20191023094540-00302.warc.gz | en | 0.881357 | 269 | 2.734375 | 3 |
But these days the advent of precision agriculture and all its high tech accouterments mean that buzzing sound is more likely to be from the propellers of a reconnaissance-gathering drone flying a couple hundred feet above a cornfield and gathering information about crops.
Soon drones and other precision farm equipment could become commonplace and a boon to the bottomline of producers throughout the commonwealth.
One reason the mechanization of precision agriculture makes producers more profitable is that they can distribute feed, fertilizer, and various inputs with much more accuracy when using precision equipment.
Doug Bunn, a cattle producer from Dublin, Virginia, recently attended a precision agriculture demonstration at Kentland Farm along with 115 other people. He uses precision agriculture machinery on his cattle farming operation.
“We use autosteer on our tractors,” said Bunn. “The automation reduces the amount of chemicals we use because it’s a more precise way of delivering inputs when we use our sprayers on the corn we grow to feed our cattle.”
Bunn uses technology for recordkeeping also.
“I also have apps on my smartphone I use to keep track of my sire and dams, the cattle birth dates, and vaccinations.”
Other equipment that was demonstrated during the event were UAVs such as fixed-wing eBee drones look like large boomerangs and help with assessing crop health. Using cameras and specialized software a producer can see realtime which crops are stressed and need more water and fertilizer using 3-D structure mapping.
“This event was critical in evaluating what farmers are already doing with precision agriculture and what industry has to offer and where we could go in the future,” said Bobby Grisso, Virginia Cooperative Extension associate director of agriculture and natural resources. “Farmers are innovative people. As the price of technology continues to go down, we’ll see more producers utilizing these methods to remain at the forefront of the industry.” | <urn:uuid:5936fa09-f468-4f3d-98d3-d2788f3a701f> | CC-MAIN-2019-13 | https://news.cals.vt.edu/insights/tag/inside-the-arecs/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202199.51/warc/CC-MAIN-20190320024206-20190320050206-00266.warc.gz | en | 0.944516 | 404 | 2.71875 | 3 |
Water and Energy
Certified LEED-Platinum, the Adobe towers in San Jose, California signify Adobe as the world's first commercial enterprise to achieve a total of three certifications under the LEED program. The water and energy efficient buildings include irrigation system linked to local weather stations which automatically adjusts according to real-time weather conditions; and use sensors to monitor carbon monoxide levels and adjust operation of building exhaust fans accordingly.
Recognizing the benefits of geothermal heat pumps, Ball State University in Muncie, Indiana, is installing the nation's largest project as part of replacing a coal fired heating-cooling system. The new system will heat and cool 47 buildings and save $2 million a year while cutting carbon emissions in half.
Read more about Ball State Geothermal HERE.
The City of Boulder has implemented a combination of energy and water conservation measures, smart building solutions, and renewable energy technologies to significantly reduce energy use, water use, carbon emissions, and costs.
This residential building in Brooklyn was renovated with 90% recycled materials, certified as LEED, Energy Star Homes, and has lots of insulation to conserve energy. The building has a green roof, which directs water run off to gardens, and grey water is directed to gardens. This show house is used as an example for sustainable housing reconstruction in the New York City area.
The official construction of the 1 megawatt wind turbine project and wetlands went underway in March 2012 at the Wastewater Treatment Facility near El Dorado, Kansas. The Facility hopes to return clean water to the environment, using wetlands to help with water treatment, which saves the city nearly $3 million. The wind turbines will then allow for the facility to run on clean, renewable energy- the first in Kansas.
The Energy Lab at Hawaii Preparatory Academy in Kamuela, Hawaii, functions as a zero net-energy, fully sustainable building. The building received LEED-Platinum certification and Living Building Challenge certification. The site harvests 6,500 gallons of rain water per year and has photovoltaic panels for energy.
An AECOM team are currently monitoring the first wave energy conversion project in California, second in the U.S.. Pacific Gas and Electric Company is planning pilot studies to test energy production, taking place off the coast of Eureka, California. The World Energy Council estimates that wave energy has the potential to be the largest renewable energy source in the world, estimated at 2 terawatts (about double the current world electricity production).
The Living Learning Center is an environmental field station for Washington University in St. Louis in Missouri. Net Zero Energy is provided by Photovoltaic panels mounted both on the roof and on two horizontal trackers. Potable water is provided by a chemical-free rainwater harvesting system. Greywater is treated in an infiltration garden and blackwater by composting toilets effectively eliminating the concept of waste.
The Living Machine in the Center for Environmental Studies of Oberlin treats waste-water using a system of engineered ecologies including microbes, plants, snails and insects. It treats up to 2,000 gallons of the building's waste-water per day. After being treated by the Living Machine, the water is recycled back through the building for non-potable re-use.
The Omega Center for Sustainable Living is a wastewater filtration facility designed to use treated water for garden irrigation. The site also contains a greywater recovery system. The building also seizes rainwater and has solar arrays for energy.
Austin Water Utility and Austin Energy have partnered together to provide multi-family facility owners holistic water and energy efficiency evaluations, rebates and other incentives to save water and energy and their associated costs to end users.CPS Energy, San Antonio and rsquo;s electric utility, ensuring that the utility has the water needed to generate electricity for the foreseeable future while providing sufficient water flows for the downstream waterways.
Located in Downtown Manhattan, the Solaire LEED-certified tower promote a holistic building approach to sustainability by recognizing performance in 5 key areas: Sustainable site development, Water savings, Energy efficiency, Materials selection, and Indoor environmental quality.
The town of Hempstead, Long Island, has a renewable energy park comprised of a 120-foot wind turbine, solar-powered buildings, two solar trackers, ground-mounted solar array, solar car port, geothermal energy demonstration project and Long Island's first and only hydrogen fueling station. The park also boasts a solar and wind-powered shellfish nursery.
Read more about the Energy Park HERE.
Installation of a 1,000-2,000 gallon storm water collection tank and drought resistant plantings in the Old Vet Quad Courtyard Green Space. SVM will investigate using solar collectors to power the pump in the collection tank. The irrigation system, a combination of drip and other irrigation, would use the filtered storm water.
The Federal Energy Regulatory Commission awarded the first commercial license for tidal power in the United States to Verdant Power. The company wants to expand the number of its tidal turbines in New York City East River over the next ten years, ultimately generating about 1 megawatt of electricity, enough to power 9,500 New York homes.
Read more about Verdant Power's East River Tidal Turbines HERE.
The goal of the Watts To Water program is to create a more sustainable built environment in the Denver metropolitan area. By using ENERGYSTAR Portfolio Manager as a benchmarking tool, the Watts To Water partners help properties reduce their energy and water consumption rates by offering program participants free educational sessions, technical support and rebate programs. Watts To Water will teach office and hotel property managers how they can be more sustainable, both environmentally and economically.
Windsor Efficiency PAYS allows residents to invest in technologies that reduce the waste of electricity, indoor water and water heating. Customers pay a surcharge on their utility bill that is guaranteed to be lower than their estimated savings. Technologies include high efficiency washing machines, toilets, showerheads and drought-resistant landscaping. | <urn:uuid:d781e8fd-1972-49b3-add7-27c06e1db728> | CC-MAIN-2017-04 | http://www.sustainabletable.org/maps/homepage/post/446 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00378-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.919866 | 1,230 | 2.53125 | 3 |
Gather several green leaves (look for ones that have fallen to the ground). Place them in a resealable bag and seal.
Hold the bag between you hands and rub the bag between your hands 25 times. Observe the leaves.
Now add several small rocks the bag.
Rub the bag together 25 more times. Observe the leaves.
You'll find that the leaves without rocks did not change much at all. However, the leaves in the bag with the rocks were crushed.
Rocks found near the rib bones of some dinosaur skeleton suggest that those dinosaurs swallowed rocks to aid in the digestion of food in dinosaurs who lacked grinding teeth. Modern chickens swallow gravel to grind food inside their gizzard. | <urn:uuid:90d602ad-a782-42dc-9044-a4f9fbe9136b> | CC-MAIN-2014-35 | http://science-mattersblog.blogspot.com/2011/09/eating-without-teeth.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917463.1/warc/CC-MAIN-20140901014517-00014-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.970291 | 145 | 3.359375 | 3 |
In the IELTS General Writing, there are two tasks one of which is to be allotted twenty minutes and the other forty minutes. The first task is a letter and the second is an essay task which is to be written in about 250 words. Take care that you don’t write less than 250 words, as this will be penalized. However, you may write more than 250 words up to a maximum of 300. The second task carries more weightage and also takes longer and is in the form of a description of an opinion, argument or some social problem.
It is important that your essay has structure in the form of an introduction, body and a conclusion. This means that your essay should have at least four paragraphs in it. If the given essay topic is in the form of an argument then you need to explain both sides of the argument and then state clearly which side you are on in the introduction itself. If the question is in the form of an opinion then you need to state another opposing opinion and also say which of the opinions you agree with and also give reasons and examples as to why you support it.
A third type of question in the IELTS general writing test, will deal with a problem and here you need to explain the problem, discuss and analyze all aspects of it and then provide your own solution to with based on some relevant reasoning and examples. The main idea of the argument must be presented in the first few introductory lines. Since task two of the IELTS General writing carries more marks than the task 1, it would be a good idea to write the second task first and the first one next. But do make sure that you write the answer in the allotted area in the answer sheet. You can jot down your ideas on the question sheet.
The best way of practicing for task 2 of the IELTS General Writing is to read newspaper editorials and magazine articles, so that you are aware of the current topics in the world. You will be able to develop ideas clearly in this manner. In the introduction, you should clearly make your stand regarding the topic and let the examiner know whether you agree or disagree with the topic. The next paragraph must deal with examples to support your stand. You can then give the contrary viewpoint and also state you don’t agree with it by giving relevant examples. Finally, you should conclude restating your stand. If there is time, do make sure that you check your essay for spelling mistakes and any other grammatical construction and so on.
The assessment for the task 2 of the IELTS general writing is done based on whether the response is well related to the focus of the question. Next, coherence and cohesion is noted. Finally the grammar, vocabulary and sentence construction is also accorded marks.
One of the problems the student faces in completing IELTS general writing is the time factor. The student finds it very difficult to finish the paper in the allotted time, hence it is very important to practice in order to improve you speed. You may need to use some important expressions which are generally useful for all essays. You can use – It may indeed by true to say that (fill in with whatever is given in the statement) but (then present your views on the subject). Another way of differing in your opinion would be to say – It may indeed by the case that (write the given statement in your own words) but this subject requires further analyses. Such introductions can be practiced to improve your writing skills for the IELTS general writing. | <urn:uuid:87ee0c70-c510-4529-b427-1bd278f2a800> | CC-MAIN-2017-34 | http://theieltssolution.com/blog/?p=28 | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106865.74/warc/CC-MAIN-20170820170023-20170820190023-00377.warc.gz | en | 0.96106 | 718 | 3.203125 | 3 |
The University of Adelaide’s new partnership with EdX, AdelaideX has launched its first set of MOOCs, including Think. Create. Code. an introductory programming course developed by the School of Computer Science.
Think. Create. Code. is about learning to code through the creation of artistic images and animations, resulting in your own online gallery. With many careers today involving some form of computation, there is a growing urgency for individuals to move beyond digital literacy, to understand how digital technologies work, and to develop literacy in code. This is why we have created Think. Create. Code.
In this course, you will not only learn the inner workings of your digital world, but also create and manipulate images with code, creating new artworks and interactive animations. Your images and animations will be displayed in an online Art Gallery, forming part of a vibrant learning community. | <urn:uuid:a2bbed51-df92-446a-a990-f02ddc5449fb> | CC-MAIN-2018-51 | https://blogs.adelaide.edu.au/cs/2015/03/16/adelaidex-launches-think-create-code-mooc/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828697.80/warc/CC-MAIN-20181217161704-20181217183704-00460.warc.gz | en | 0.933357 | 177 | 2.71875 | 3 |
Fresh Memory uses a special studying algorithm: Time spaced repetition, or just Spaced repetition. It automatically schedules repetition of cards according to their difficulty. Spaced repetition allows to quickly study any material and keep it in memory for a long time. This makes it very efficient studying method.
The scheduling algorithm uses the idea of SM-2 algorithm of Super Memo application.
According to Spaced repetition, well known cards are shown rarely, and difficult cards are shown more often. The repetitions of cards are spaced in time with repetition intervals. The program automatically schedules cards for repeating depending on how well they are known to the user. The better a card is known, the longer interval is automatically selected for its next repetition.
The repetition intervals may range from several minutes to over a year, without a limit. The easier the card is for the user, the longer its interval becomes. If a card is difficult to remember, its repetition interval will be kept shorter so that the user would have more chance to study it.
New, not learned, cards will be shown 3 times to the user on the first day. Then, it will be scheduled for repetition for the next day (interval is 1 day). The next intervals will be about 2.3 days, 5.7 days, 14 days and so on. With each card repetition, its interval automatically increases — it will be shown more rarely.
The user gives grades to the cards: good, easy, difficult, etc. This grade will affect on the calculation of the next interval.
Incorrectly answered cards (grades 1 and 2) will have a very small next interval: 20 seconds or 1 minute. When previously incorrect cards are graded as correct, they will get interval of about 1 day.
Start Spaced repetition with Tools ‣ Spaced repetition menu item (shortcut F6). It opens the study view shown below.
First, the study window shows a question. The answer is hidden. The user must recall the answer, then press Show answer button (shortcut Space) to open the correct answer. The user must compare his answer with the correct one and evaluate himself with a grade from 1 to 5. The grades are selected with the buttons below the answer (shortcuts are keys with the same numbers). The grades depend on the card difficulty and correctness. The application then uses the grade to schedule the next card repetition.
Grades 3, 4 and 5 mean correct answers, 1 and 2 are for an incorrect answer. Here is description of the grades:
Changed in version 1.4.0: The grade 2 “Not completely correct” was removed. The user has enough choice to control the card intervals without it. Incorrect grades became 1 and 2.
|5 Easy||The card is too easy, and recalled without any effort. The last interval was too short.|
|4 Good/OK||The answer is recalled in couple of seconds. The last interval was good enough.|
|3 Difficult||It’s difficult to recall the answer. The last interval was too long.|
|2 Incorrect||The answer is incorrect.|
|1 Unknown||Completely forgotten card, couldn’t recall the answer.|
If the card is new, it is decorated with a “New” label like it is shown below. Notice, there are only 4 “OK” and 5 “Easy” grades available for new cards.
In the beginning, all cards are considered new. New cards have not been reviewed yet. Every card must be repeated several times before it becomes learned and ready for the normal repetition.
New in version 1.4.0: Learning steps are introduced for the new cards.
The whole learning process consists of learning steps (or levels). The first step is reviewing a new card. Next, there are two learning steps, and the last one is a learned card, which is regularly repeated. See the list of the learning steps below.
|1||New||OK, Easy||—||New, not seen, cards|
|2||Unknown||No Difficult||20 sec / 1 min||The second review or incorrectly graded cards|
|3||Learning||No Difficult||10 min||An extra repetition after several minutes|
|4||Repeating||All grades||next day and increasing interval||Learned card. Repeating to keep in the memory|
Not all grades are available for certain learning steps. Only the highest step 4 “Repeating” uses all 5 grades. New cards have choice of 4 “OK” and 5 “Easy” grades. The steps 2 and 3 show all but the “Difficult” grade.
Every new card is promoted to the next learning step, if the user gives 4 “OK” grade. The 5 “Easy” grade promotes the card two steps forward:
The incorrect grades, 1 and 2, take the card back to the “Unknown” (2) learning step. This means the card will be shown again to the user in a short time. Grade 1 “Unknown” will show the card in 20 seconds, grade 2 “Incorrect” will show it in 1 minute. Then that card will normally go to the “Learning” (3) step, and to the “Repeating” (4) step, when it will be scheduled for the following day.
Once the card becomes learned after reviewing it on the following day, it will use the normal increasing repetition intervals.
If there are learning cards, they are shown first before other scheduled cards. If learning cards are scheduled in several minutes, but there are no other scheduled or new cards to fill the time gap, those learning cards are shown immediately.
New and repeating scheduled cards are mixed together and shown randomly. The probability of showing a new card is controlled by the Share of new cards option in the study settings. The default value is 20%
Changed in version 1.4.0.
In the study view, the area under the card answer shows study progress for the current card pack. It displays different numeric values and a colored progress bar.
The progress bar shows how many scheduled cards for today were reviewed. The green zone shows the reviewed cards. The numbers to the left of the progress bar show the reviewed cards and the total scheduled cards for today.
The colored progress bar shows different types of scheduled cards in colors:
Statistics for the new cards are shown above the progress bar. The number at the blue label shows new cards, which were added today. The other labels show numbers of cards in the corresponding progress bar zones.
In the very beginning, all cards are new. As the user studies the new cards, the progress bar begins to show the green zone — the reviewed cards, and the yellow zone — the new cards, which are being learned right now. Items from the yellow zone gradually move to green (they are reviewed). Starting from the following day, the progress bar begins to show white zone: scheduled repetitions for the cards learned on the previous day.
It is possible to allow the user to enter an exact answer before seeing the correct one. This may be useful for practicing in writing foreign words.
By default, the exact answer is switched off. In order to enable it, go to Options ‣ Dictionary options, Card packs and check the checkbox Uses exact answer. Click OK. Exact answer will be enabled for the selected card pack.
Then each card will show an edit box to enter the user’s answer before opening the correct answer.
The user enters his answer and presses Show answer (Enter). The window shows the user’s answer and the correct answer. If the user’s answer is exactly the same as the correct one, it is highlighted in green color. Otherwise, it will be red. Now the user can give the grade for his answer.
Each card has its own easiness. It is a counter term for difficulty, and describes how easy is the card for the user. The program schedules all cards individually according to their easiness.
When a card is reviewed, its next repetition is scheduled to occur after certain repetition interval. A card remembers its current interval — the interval, which was last used in the scheduling.
The next repetition interval is calculated with the following formula:
next_interval = interval · easiness
Each next interval is longer than the previous. Thus, the card will be shown in more increasing intervals. For example, the last interval was 3 days and the easiness is 2.5. If the easiness is not changed, the next interval is 3 · 2.5 = 7.5 days. The next after it is 7.5 · 2.5 = 18.75.
In order to scatter more the scheduled cards in time, the calculated repetition interval is randomly adjusted by a small value. This prevents scheduling similar cards in exactly the same order as they were repeated. See Scheduling randomness option in the Study settings. The default probability value is ± 10%.
The initial easiness for the new cards is 2.5. It may change, if the user grades the card as difficult or too easy. The minimum value for easiness is 1.3, and the maximum is 3.2.
The user can give the following grades to cards:
|5||Too easy||+ 0.1||+2 steps||will increase||The card is too easy, and recalled without any effort. The last interval was too short.|
|4||Good||next step||will increase||The answer is recalled in couple of seconds. The last interval was good enough.|
|3||Difficult||- 0.17||will increase||It’s difficult to recall the answer. The last interval was too long.|
|2||Incorrect||Unknown step||1 min||The answer is incorrect.|
|1||Unknown||Unknown step||20 sec||Completely forgotten card, couldn’t recall the answer.|
The 5 “Easy” grade increases the easiness, and the next interval will be increased with larger speed than the previous one. The 4 “Good” grade doesn’t change the easiness, and the next interval will increase with the same speed (easiness). The 3 “Difficult” grade decreases the easiness, and the next interval will be increased with smaller speed.
There are two “incorrect” grades: 2 and 1. The 2 “Incorrect” grade shows the same card in 1 minute, so that the user can learn it once again. The easiness is not used here for the next interval calculation, but it remains the same, and will be used for next intervals when the card is learned.
The 1 “Unknown” grade means the card was completely forgotten. The same card will be shown in 20 seconds.
See description of learning steps in Learning process subsection.
Every day the user studies both new and scheduled cards. They are mixed randomly. The application limits the number of new cards introduced each day. By default, it is 10 new cards per day. After the limit for new cards is reached, only the scheduled cards are shown. The rest of the new cards are left for the following days. Thus, all new cards are gradually introduced during several days of study in order not burden the user too much. The day limit for new cards can be changed in Options ‣ Study settings, Day limit of new cards.
It is recommended not to review too many cards per one day. The application has the day limit for all reviewed cards, 80 cards by default. It will warn the user about it when the limit is reached. Though, it is just a warning, and the user may still continue studying more cards. The day limit for all cards can be changed in Options ‣ Study settings, Day reviews limit.
The cards are normally being edited in the dictionary window. But it is possible to edit the cards even in the study view. It is very convenient, when the user notes a mistake during the study. The top-right part of the study window has two buttons: Delete card (D) and Edit card (E). They correspondingly delete the current card and start editing it. Editing opens a separate window shown below.
Pressing Go to dictionary window button will take you to the dictionary view, where the current card will be centered and selected.
The text of this website is available for modification and reuse under the terms of the Creative Commons Attribution-Sharealike 3.0 Unported License and the GNU Free Documentation License (unversioned, with no invariant sections, front-cover texts, or back-cover texts). | <urn:uuid:dae985b4-c0c7-4e80-bee3-7f28815ef9e6> | CC-MAIN-2018-30 | http://fresh-memory.com/docs/1.5/studying-cards.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589237.16/warc/CC-MAIN-20180716080356-20180716100356-00554.warc.gz | en | 0.940191 | 2,643 | 3.34375 | 3 |
Habit they say are something that a person do often. Habit is an integral part of every man, it define every person and determine the extent of the achievement. They say a habit once formed takes mastery over us, in other word it become part of our life.
You will agree with me that reading is one habit that every student do not find interesting. The student will rather prefer to engage themselves in activity they think that will interest them. This is because they see reading to be very boring.
It is very clear that every show every average student prefer to play than to study which Is rather unfortunate. Research has show that student who have develop the habit to read excel better than in their academy performance than those that do not have the time to read.
Base on the above research you will find out that the main word there is “habit”. Habit once formed is very difficult to break. Let us take for example, a student that has developed the habit to read at night. If this student continue in this line you will find out that when the student find itself in a situation that he or she will have to read at day the student will doze off. It will look like the student is learning how to read again.
For you to perfect a good reading habit what one need are patience, hard work, and self discipline to achieve success. For me I do not think anyone is born with the gift of reading rather they get it through self discipline. Now reading in this case is not only restricted to only your school books only but also include any other material that come your way be it journals, novel, ld news papers, bible and so on.
Now let us examine the basis step that one need in developing a good reading habit in life.
Step 1: Start With What You Have
Now this is one area I will like to throw more emphasis on. Most time student often makes this excuse and I guess most of you are familiar with I do not have text books. Ok how many of you fall in this category for me I was once in this category until I realize this base step.
You do not need to have all the text book in the world before you can start reading, start with what you have. For example you regular class note is good for a start. All you need do is to keep your note as updated as possible with the good information that will help you. A well formed notebook is as good as a textbook itself. Another area that will help in this step is you try to make friends with you fellow student that have the require textbook and if the friends is ok you will should be able to borrow textbooks from them. Believe me I do this often and it seem to work for me.
Step 2: Design a Good Reading Time Table
As a student you should try as much as you can to develop ia good reading time table. With the time table you will be able to study well as well as have time to schedule your activity. Design your time table in a way that you will be able to read two hour a day and you can later increase you paste.
You can leave weekend in your timetable for other school activities like going to church, playing game and also visiting friends.
As a student you need to stickly adheres to your time table. Try to avoid things like visit from friends and any other activity that will distract you from reading.
Now must student design their timetable in a way that is come before their house/domestic works? If you fall in this area then you need to design it in a way that you will have to do all you house/domestic work first, before you start reading.
Note that the main purpose of you time table is to guild you in your study.
Step 3: Action/Implementation
Now that you have design your time table which is good for a start. The next thing for you now is to follow it up, because failure to do so is simply a waste effort. They may reason why you prepare you time table in the first place is for you use it as a guild right. Then let it guild you. Sometime you may be hook up with event or other activity. Try as much as possible to follow you time table.
In this step two important factory distract one from reading.
- Friend: friends may come to visit you doing your time of studies. They may try to take you always for your book try as much as possible to make them understand that it is your reading time.
- Sleep: this is father of them all, this come as a result of when you are reading studying after doing hard jobs or is come naturally. Try as much as possible to take a nab in the afternoon. This will help you to stay awake during the night.
Step 4: Workload
Have you ever find yourself in this situation that you will love to read and you seem not to have the time to? If yes then this is as a result of the amount of work load you doing. To help save you from this, try as much as possible to discover the scope of your study.
If you are able to do this, then divide it into small group base on the number of weeks/months you have before exams.
Another method is for you to do your assignment well. Try also to read you notebook immediately after ever lecture. This will give you an insight of what the course is all about.
Kindly click the Share Button to share with Pals
Don,t forget to Read: Educational effects of Television- How it affect our studies.
Related search terms:
- how to develop reading habit in students
- how do I develop reading habit?
- How to develop good reading habit
- How To Develope A Discipline Reading Habit | <urn:uuid:f355a060-cff5-47c8-85c0-85eaadcf3970> | CC-MAIN-2017-17 | https://www.myedu.ng/support/4-steps-in-developing-in-a-good-reading-habit/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122619.71/warc/CC-MAIN-20170423031202-00028-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.974539 | 1,183 | 2.625 | 3 |
A billboard ad that guesses your age. A photo app that recognizes your face, or your pet’s. A digital math aide that solves quadratic equations, and teaches you to do the same.
Your phone can do things that seemed impossible just a few years ago — thanks to deep learning.
A branch of artificial intelligence, deep learning helps computers use computer vision and natural language processing skills to interpret the world around them.
A generation of startups are now putting this technology into the hands of millions. NVIDIA GPUs and deep learning software power much of this work.
Real Life Analytics: Accurate, Automatic Ads
To power targeted in-store ads, the U.K.’s Real Life Analytics offers retailers a webcam and a dongle to attach to a digital display. Seems simple. But the deep learning software running inside that dongle does astonishing things.
Approach the display’s webcam, and a deep learning neural network figures out your age and gender. In milliseconds, it flips on an ad targeting your demographic. Meanwhile, the deep learning network — designed with DIGITS deep learning training software using the cuDNN-accelerated Caffe framework — analyzes your real-time engagement. Running on our Tegra chip, of course.
ZZ Photo: Putting Pets on the Pedestal
ZZ Photo, a startup based in Ukraine, can help you sort out the thousands of images you’ve stashed in your PCs. Using CUDA-enabled GPUs to speed up computations in their neural networks, ZZ Photo can detect images on PCs. It then sorts and arranges the photos, tagging them by face, scene or pet.
That’s right. ZZ Photo’s “DeepPet” algorithm can tell the difference between your labradoodle and chiweeni. It’s up to five times more accurate than traditional object recognition algorithms in identifying cats and dogs.
MicroBlink: Math-Solving App Heads to No. 1
With students recently returning to school, MicroBlink’s PhotoMath app headed to the top of the class as the No. 1 iPhone free U.S. download in early September. The app reads and solves mathematical problems in real time. Just take a picture of the problem with your smart phone or tablet.
MicroBlink, founded in Zagreb, Croatia, uses NVIDIA GPUs to train PhotoMath’s deep learning algorithms. The app can now handle fractions, inequalities, quadratic equations and more. It makes math simple by showing users how to solve math problems step by step. And parents rave about how the tool checks their kids’ homework.
HyperVerge: Innovative Image Identification
Forget scrolling past a series of selfies to find a photo of your driver’s license. HyperVerge, a startup out of India, has developed Silver. The mobile image recognition app uses GPUs for data processing and training their application engines.
The app sorts photos on mobile devices. It categorizes photos as faces, screenshots, and memes. It even identifies documents — a category that includes handwritten notes, ID scans and checks. HyperVerge has also developed tools to delete poor quality and duplicate photos.
ViSenze: Search Without Keywords
If a picture is worth a thousand words, why are we doing so much typing into search engines? ViSenze, a Singapore-based startup, lets you search e-commerce platforms visually. Drop an image into its deep learning-powered platform and it quickly pulls up scores of similar images, without relying on keywords or manual image tagging.
In fact, its image recognition technology automatically does the tagging by attributes such as shape, color and pattern. So, for example, if you’ve found a dress but want to see similar sleeveless versions from your favorite e-tailers, or if you like a handbag but want to see variations in leather or with a tapered shape, ViSenze zeroes in with amazing accuracy and speed.
Bringing Massive Computing Power to the Masses
These are just a few of the startups using our GPUs to embrace the deep learning revolution. It’s no surprise. GPU acceleration is ideal for the demands of deep learning algorithms. These algorithms power applications in fields ranging from medical imaging analysis to self-driving cars.
Training computers on these algorithms requires they teach themselves. To do that, they process enormous amounts of data. Our DIGITS deep learning software and cuDNN programming library speed things along. For off-the-shelf capability, there’s the DIGITS DevBox. Combining four NVIDIA GeForce GTX TITAN X GPUs, DIGITS software and deep learning tools, it’s the world’s fastest deskside deep learning machine.
With tools like these, a startup can be as equipped to tackle deep learning problems as tech leaders with huge server rooms.
There’s no better place for GPU-using startups to highlight their groundbreaking work than the annual Emerging Companies Summit, where we’ll award $100,000 to the most promising venture. The daylong event, part of our annual GPU Technology Conference, will take place on April 6, 2016. | <urn:uuid:455913a3-4046-4500-97a3-ad38ee114e58> | CC-MAIN-2020-34 | https://blogs.nvidia.com/blog/2015/10/14/5-deep-learning-startups/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737206.16/warc/CC-MAIN-20200807172851-20200807202851-00491.warc.gz | en | 0.906577 | 1,078 | 2.71875 | 3 |
Words of Understanding demonstrate a conscious, deliberate effort to understand someone else’s perspective by putting yourself in their position, putting yourself in their shoes, seeing things through their eyes, and hearing things through their ears. When individual student issues arise, these words demonstrate the desire to truly understand “what’s going on” with the student by asking thoughtful questions that get to the root of the problem. Positive Behavior Intervention and Support (PBIS) programs can be strengthened when teachers use Words of Understanding to demonstrate both the desire to understand “why” students are misbehaving, and the support to help solve the behavior problems.
When students are misbehaving in class, or are disengaged, there is a tendency for us to react in a way to preserve our pride, dignity, and control. There is a big difference between a teacher exclaiming, “You don’t need to be sleeping in my class!” opposed to pulling the student aside privately and asking, “Is everything ok–I noticed that you were sleeping in class?” We need to unselfishly take our pride out of the equation and really pursue the student’s needs and try to understand the student’s perspective. Why are they sleeping in class? When other misbehaviors occur, we need to ask: What’s causing that student to challenge me? Why is that student so angry with the other student? Why is that student choosing certain behaviors that are destructive rather than constructive?
By separating the student from their behavior we start to get a different picture of the circumstances surrounding the student’s behavior. That’s not to say that their behavior will be accepted in the classroom. However, when we have insight into why students are making certain choices we get closer to understanding how to help them find a solution to their problem.
These Best Practice Language (BPL) examples show students that we care about them, and we want to get to the “root of the problem,” so we can help them solve it!
“I know you are angry, and I understand why you would feel that way. However, you and I need to talk about a way to help you control that anger.”
“It seems like you are having a hard time today. Help me understand what’s going on.”
“Your outburst really took me by surprise—what’s up? Help me understand why you said that?”
The ultimate goal for using Words of Understanding in the classroom is to enable students to experience and practice empathy for others. The following BPL examples will promote an environment of empathy in your classroom:
“If someone makes a mistake in our classroom it is important to think about how you react to that mistake. In our classroom we will treat others the way we want be treated.”
“How would it make you feel if someone said that to you?”
“How did you feel when that happened? Would you like to talk about it? How can I help you?”
This post is part seven in a series of posts on what Positive Behavior Intervention and Support (PBIS) “sounds like” in the classroom. The original post can be found at: eyeoneducation.com | <urn:uuid:d6754a70-66b9-423a-a5b9-afc46b0d37a2> | CC-MAIN-2017-26 | http://blog.irised.com/2013/09/positive-behavior-intervention-and-support-words-of-understanding/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320070.48/warc/CC-MAIN-20170623151757-20170623171757-00464.warc.gz | en | 0.968472 | 687 | 4.03125 | 4 |
For girls in developing countries, menstruating is a curse.
“Girls are using anything they can find to make something that will stop the flow or absorb the blood,” said Ann Lewis, co-director of the Utah County Days for Girls chapter. “They’re using things like cornhusks or tree bark; they are taking rags and wrapping sand or cow dung to make an absorbent pad.”
For those girls, menstruation means a week of isolation, missing school and exploitation.
Days for Girls, a nonprofit international organization, is working to change this by providing high-quality feminine hygiene kits and education to girls worldwide.
With the assistance of the Kaysville Rotary Club, the Davis Applied Technology College was turned into a factory Saturday. A group of 850 volunteers gathered to assemble the life-changing kits for the girls.
A Days for Girls reusable feminine hygiene kit contains one pair of panties, two shields, eight absorbent pads, one washcloth, one bar of soap, two Ziploc bags and a stylishly discreet bag to carry everything.
The kits are created with efficiency and circumstances in mind.
When the kits are delivered girls are taught about menstruation, hygiene and using the products.
“Because of blood, the girls think wounds, disease or AIDS and they think something is wrong,” Lewis said. “When we just explain what menstruation is, all of a sudden they understand what they’re bodies are doing and why it’s doing that.”
Each kit can last three years, which equates to about 180 days girls would now get to attend school.
Lewis explained this education is vital in fighting poverty and preventing young marriages and dangerous, amateur abortions.
Celeste Mergens, the founder of Days for Girls, came up with the idea in 2008 after working in a Kenyan orphanage. She asked what the girls were using when they had their period and was shocked when she heard of crude solutions.
Mergens first worked to supply a month’s worth of disposable feminine hygiene pads. However, she quickly realized this was not the solution when she saw latrines overflowing and a complete lack of proper disposal receptacles.
Soon after, Mergens came up with the washable pad systems that girls could reuse. From there, the design has been altered and perfected.
“Most girls and women in the world have no products,” Lewis said. “We are the exceptions. We are also blessed with the means to help others, and we can do something about it.”
When Mergens handed out the first kits, she had another disturbing realization. The male headmaster and teachers of the school had pads in their offices that they distributed in return for sexual favors with the girls.
“There are men in huts and shacks across the streets from high schools and middle schools who have products and exploit the girls every day,” Lewis said. “We can keep the girls from needing to go there in the first place when we put the kits directly into their hands.”
Utah is the most active Days for Girls chapter in the world, Lewis said. The Utah Valley chapter has produced over 10,000 kits in the last year.
Jacie Johnson, associate professor of interior design at Weber State University, spent her weekend sewing Days for Girls kits.
“Being in education, this rang true to my heart,” Johnson said. “It’s so important to empower these girls to have an education so that they can have equal opportunities in the world.”
Days for Girls has a goal to give a kit to every girl in need by 2022.
“This isn’t a one-time deal,” said Julie Treadwell, the North Davis area Days for Girls representative. “The need goes on.”
Treadwell encouraged anyone to get involved and lend a helping hand.
“Don’t hold back,” Treadwell said. “You can do it in your home. You can do it in a neighborhood; you can do it with a club. Just start and you’ll be grateful that you did.”
Visit www.daysforgirls.org to find volunteer opportunities with the organization.
“Everything you would want girls to have in this world is being thwarted because of menstrual periods,” Lewis said. “I hope you will find ways to be brave enough to say the words ‘feminine hygiene’ out loud.” | <urn:uuid:1d81df10-5705-4171-be83-1d6fce73d062> | CC-MAIN-2018-30 | http://signpost.mywebermedia.com/2015/02/01/days-for-girls-provides-safety-and-dignity/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589172.41/warc/CC-MAIN-20180716021858-20180716041858-00466.warc.gz | en | 0.956472 | 955 | 3.125 | 3 |
It’s one of the most enduring folk wisdom dicta in all of commerce. “The airline industry, in its history, has never made money.” The truth of that statement is not so easy to confirm. If we restrict ourselves to passenger airlines, and ignore the first few decades of flight (when airlines were spawned and folded as quickly as the planes could fly), the profitability of the industry as a whole has been somewhat variable. Until 1930 or so, flight was mostly a way to drop insecticide or deliver mail. At first, it didn't make economic sense to ship people.
Technological advancement, especially in the areas of speed and airliner capacity, created so much demand that passenger travel was eventually seen as nearly a public utility – something to be preserved and maintained through down periods, even at taxpayer expense if necessary. Today several unprofitable routes to and from small towns throughout the United States are still kept afloat by legislation, subsidized to the tune of as much as $800 per passenger per flight.
The landmark event in U.S. commercial aviation history – as important as the incorporation of sound was to motion pictures, or the forward pass was to football – was the Airline Deregulation Act of 1978. Prior to its passage, the federal government set rates, fares and schedules, guaranteeing profitability to each oligopolistic airline but doing its best to thwart innovation. Since the act’s passage, prices have dropped about 40% and ridership has increased dramatically. Complaining about flight delays and waiting-room inertia has become a rich mine of material for uninventive comedians and everyday kvetchers, but the alternative would be a world in which the cheapest flight from New York to Los Angeles would cost over $1400. In the pre-regulation days, the concourses were roomier and more sparsely populated than they are today, if only because hardly anyone could afford to fly.
When airlines became subject to competition, the industry necessarily underwent transition. Some airlines folded (Pan Am, Eastern), others were subsumed by larger competitors (TWA, Piedmont), and still others advanced from regional or nonexistent into positions of national importance (Southwest [NYSE:LUV], JetBlue [Nasdaq:JBLU].) Undergoing the most displacement of all, however, were the so-called “legacy” carriers – the decades-old stalwarts who had benefited most from regulation.
In the decade from 2002 to 2011, the 3 largest legacy airlines – American [Nasdaq:AAL], United [NYSE:UAL] and Delta [NYSE:DAL] – each filed for bankruptcy. Not only that, but each has or had merged with another large carrier – US Airways, Continental and Northwest respectively – that had also sought legal protection from creditors. The official reasons given ranged from the dubious (increased fuel prices, which would seem to affect every player in the industry equally) to the more candid (competition from low-fare rivals.)
Bankruptcies have become a way of life for the older carriers in the U.S. aviation industry, every major one having to reorganize in recent years. And yes, it’s true that large-carrier losses have more than offset newer-carrier profits in recent years. However, it’s no longer even accurate to use the term “large-carrier” in reference to the legacy airlines. With Southwest and JetBlue among the five biggest airlines in the United States, that means the upstarts haven’t just uprooted the big players, but have supplanted them to some extent.
You don’t need to graduate with honors from Wharton to know that your average business would prefer guaranteed profits to ones that it has to fight for in the marketplace. Former American Airlines CEO Bob Crandall, who ran the airline until 1998, even admitted as much:
"The consequences of deregulation have been very adverse. Our airlines, once world leaders, are now laggards in every category… market forces alone cannot and will not produce a satisfactory airline industry, which clearly needs some help to solve its pricing, cost, and operating problems."
Three years later, Crandall’s former employer announced it was seeking bankruptcy protection. That’s what’ll happen when a corporation loses $2 billion one year, and $2 billion in the previous 2 years, to say nothing of $2 billion in the subsequent year. Fuel indeed got more expensive during that time, but not certainly enough to explain such staggering losses.
Contrast Crandall’s comments with those of Herb Kelleher, the founder of Southwest Airlines, testifying before federal regulators:
"The Airline Deregulation Act of 1978, literally made the Southwest Airlines of today, and the other low fare carriers I speak for, possible. Some people will just never get over that. Southwest and the very existence of low-fare competition is the only "crisis" of which they truly complain."
Hard to believe those two are nominally in the same industry, yet they are. By the way, Southwest earned $754 million in 2013, making that its 41st consecutive year of profitability. JetBlue, which was founded in 1999, has made money five years in a row.
Meanwhile, Southwest and JetBlue’s larger competitors continue to lumber, fall, fail to adapt, and essentially parallel everything their sauropod equivalents did in the Cretaceous era. United, for instance, spends staggering amounts on union labor and, not coincidentally, lost $723 million in 2012.
Some older airlines eventually do figure it out, however. 2013 was an exceedingly profitable year for Delta, as the company made $11 billion on sales of $38 billion. Delta paid off debt, started issuing a dividend again, and rejoined the Standard & Poor’s 500 eight years after filing for bankruptcy. That’s a far cry from the mid-2000s, when Delta had amassed as many consecutive losing years as JetBlue has profitable ones.
The Bottom Line
The airline industry remains subject to profound change, even after decades of growth and consolidation. Until mankind not only develops the next transportation breakthrough, but then makes it commercially viable, we’ll continue to see movement, fluctuation, and in the case of the smart carriers who know how to maximize revenue while keeping costs low, some profitability too. | <urn:uuid:f6524035-a34f-4740-8a8b-fbff0eca9118> | CC-MAIN-2014-52 | http://www.investopedia.com/stock-analysis/031714/why-airlines-arent-profitable-dal-ual-aal-luv-jblu.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802777002.150/warc/CC-MAIN-20141217075257-00164-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.97117 | 1,321 | 2.609375 | 3 |
Child Trust Fund
A Child Trust Fund (CTF) is a long-term savings or investment account for children in the United Kingdom. New accounts cannot be created but existing accounts can receive new money: CTF new accounts were stopped in 2011 and replaced by Junior ISAs.
The UK Government introduced the Child Trust Fund with the aim of ensuring every child has savings at the age of 18, helping children get into the habit of saving whilst teaching them the benefits of saving and helping them understand personal finance. The Child Trust Fund scheme was promised in the Labour Party's 2001 election manifesto and launched in January 2005, with children born on or after 1 September 2002 eligible.
Eligible children received an initial subscription from the government in the form of a voucher for at least £250. In 2010/11 the child trust fund policy was expected to cost around £520m, less than 0.5% of the £84bn UK education budget. Because the scheme allows for family and friends to top up trust funds, it has given a substantial boost to savings rates, particularly among the poor. According to the Children's Mutual, "In terms of changing people's behaviour, this is the most successful product there's ever been." For households with income of £19,000 a year, 30% of the children in that category are having £19 a month saved for them. Part of this is due to grandparents being more willing to contribute to funds, since the money cannot be diverted to the family finances. Creation of new funds and Government payments into them were ended in January 2011 by the Savings Accounts and Health in Pregnancy Grant Act 2010.
Asset-based egalitarianism traces its roots to Thomas Paine, who proposed that every 21-year-old man and woman receive £15, financed from inheritance tax. In 1989 LSE professor Julian Le Grand proposed a similar idea, calling it a "poll grant". Subsequently the related concept of Individual Development Accounts was developed in the United States by Michael Sherraden. This approach - termed "asset-based welfare" by Sherraden - saw asset redistribution less as an egalitarian measure than as one which supported poverty reduction by encouraging saving. Sherraden argued that owning an asset led to people changing their way of thinking, being more likely to plan and invest in their future - in a way that providing people with an equivalent flow of income does not. The idea of a universal account for all children first appears in Sherraden's Assets and the Poor (1991).
In the UK the idea took off in 1999/2000 with a number of contributions to the New Statesman in 1999, including an article from Robert Reich endorsing the idea; and support in 2000 by the influential Institute for Public Policy Research. Sherraden's Center for Social Development collaborated with the IPPR, and a briefing paper by it remarked "It would be impossible to overstate the leadership and contributions of the Institute for Public Policy research in informing and shaping this new policy direction in the United Kingdom". This carried through into proposals being included in the Labour Party's 2001 election manifesto.
The Child Trust Fund scheme was promised in the Labour Party's 2001 election manifesto, and launched in January 2005, with children born after 1 September 2002 eligible. Over the course of the development of the policy up to implementation, it became increasingly focussed on encouraging the poor to save and to develop their financial skills, with less emphasis on the egalitarian redistribution of assets.
According to the Institute of Public Policy Research
|“||The wealthy have always relied on assets to smooth the path into adulthood, but now every single child will be able to do the same. The lumpy costs, the risky decision, and upfront investment involved in making ones way in life will be eased, whether that means spending money on training, starting a businesses - or simply buying the suit needed to attend an interview... CTFs recognise that assets, not just income, can bring security and opportunities.||”|
Sherraden argued that possessing wealth in your early adulthood improves life outcomes by its effect of changing attitudes:
|“||Income only maintains consumption, but assets change the way people interact with the world. With assets, people begin to think for the long term and pursue long-term goals. In other words, while income feeds peoples' stomachs, assets change their minds.||”|
Child trust funds were opposed by the Liberal Democrats in the 2005 general election, and the Liberal Democrats remain opposed. Their policy has been criticised by Stuart White, who notes various historical examples of CTF-like policies proposed by Liberals in the past, and argues that the Child Trust Fund policy "gives direct expression to a deep, historic Liberal (and SDP) commitment to the ideal of ‘ownership for all’." He adds that "At a time of rising wealth inequality, and widespread asset poverty, the old Liberal slogan of ‘ownership for all’ has never been more urgent."
In April 2010 Julian Le Grand argued strongly against Conservative Party plans to means test the funds (limiting them to households on below £16,000 per year income), saying that "Confining CTFs to the poor would be divisive, and would result in low take-up and stigma. A universal endowment is a badge of citizenship." He added that if funding had to be cut from the scheme, it would be better to reduce the government's topups, and keep the scheme universal.
The funds are held in trust for the child until they turn 18, and the money is then theirs to use as they see fit. CTFs are managed by the parents/legal guardians of the child until the child reaches the age of 16. At this point, the child will have the option to take over management of the account including choice of provider and investment decisions. However, they will still not be able to withdraw funds from the account until reaching 18. The government has stated that they will be introducing a programme of education in personal finance in schools to enable 16-year-olds to competently manage their CTF.
All of the funds in the account are exempt from income tax and capital gains tax, including at maturity. However, the 10% dividend tax payable on franked income (UK share dividends) cannot be reclaimed. The UK government has stated that at age 18 it will be possible to transfer the entire CTF into an ISA to keep the tax-free status of the investment. If the CTF is withdrawn as cash, the tax benefits will be permanently lost.
- At birth: The government gave every eligible child a voucher worth £250 to open the account, and also a further £250 directly into the accounts of children who live in low income families.
- At age 7: The government would have made an additional payment of £250 into the account, with a further £250 for children in low income families.
- At age 11: The government was consulting on the possibility of a further voucher at this age.
If vouchers were not invested within one year of issue, HM Revenue and Customs would open a stakeholder account on behalf of the child. Subscriptions by individuals were in addition to any voucher subscriptions.
As of 6 April 2018, parents and other family members or friends can pay £4,260 per year into their child’s fund; the year is counted from birthday to birthday, not a tax year. Originally the subscription limit was £1,200, and then from 1 November 2011 the limit was raised to £3,600 and has been increasing gradually each year since then, in line with increases in Junior ISAs. Any gains or dividends will be tax free (except for the 10% tax on UK share dividends). Stakeholder accounts cannot set the minimum contribution above £10, but the provider can set a lower minimum.
Every child born on or after 1 September 2002 was eligible for the CTF, as long as:
- child benefit has been awarded for them;
- they are living in the United Kingdom; and
- they are not subject to immigration controls
The children of Crown servants posted abroad – including the Armed Forces – qualify because they are treated as being in the UK.
Most advisers recommend equity-based CTFs, and the fact accounts allocated by HM Revenue and Customs are put into stakeholder products indicates that the government also believes equities are the best option over such a long period.
- Stakeholder accounts invest in shares, with a set of rules ("stakeholder standards") to reduce financial risk. These include provision for money in the account being gradually moved to lower risk investments or assets when the child reaches age 13. This is to help to produce a stable return in the run up to the child's 18th birthday. The charge on a stakeholder account is limited to no more than 1.5 per cent a year, whereas charges on all other types of CTF account are not limited in this way.
- Savings account. These operate in a similar way to a bank deposit account; there is a rate of interest and the nominal value of the funds is secure.
- Non-stakeholder account. Invests funds according to the type of product. These accounts are not protected by the "stakeholder standards".
CTF funds can be transferred between providers. Rules for transfers are similar to those for Individual Savings Accounts – customers should inform the new provider they wish to use and they will undertake the move. No penalty or fee can be imposed for transferring the account, except for the cost of selling shares (such as dealing charges) in equity accounts.
On May 24, 2010, the Chancellor of the Exchequer George Osborne MP and Chief Secretary to the Treasury David Laws MP announced that the £250 top up payments into the child trust fund would cease in August 2010, with no payments for newborns from the end of 2010. The Savings Accounts and Health in Pregnancy Grant Act 2010 facilitates the abolition of the fund.
- Child Trust Funds Act 2004
- Asset-based egalitarianism
- Individual Development Accounts
- 'Third Way' political philosophy
- "Child trust fund savings can be moved to Junior Isas". Retrieved 2015-05-29.
The schemes were replaced by Junior Isas in November 2011, which across the board offer better interest rates and a far wider selection of investments.
- "Child Trust Fund - GOV.UK". www.gov.uk. Retrieved 2015-05-29.
- Julian Le Grand, "Implementing Stakeholder Grants: the British Case", in Erik Olin Wright (ed, 2003), Redesigning Distribution: basic income and stakeholder grants as alternative cornerstones for a more egalitarian capitalism, The Real Utopias Project, Volume V
- HM Treasury, 10 January 2005, Chancellor and Minister for Children launch Child Trust Fund Archived December 3, 2009, at the Wayback Machine
- Julian Le Grand, The Guardian, 27 April 2010, We must not sacrifice the child trust fund
- Zoe WIlliams, The Guardian, 2 May 2010, Why we cannot afford to raid the child trust fund piggy bank
- Dominic Mazwell, IPPR, 1 March 2006, Child Trust Funds in England
- Washington University in St Louis, Michael Sherraden
- Finlayson A (2008), "Characterizing New Labour: the case of the Child Trust Fund", Public Administration 86(1): 95-110
- Rajiv Prakhar (2009), "What is the future for asset-based welfare?", public policy research, March–May 2009, p52
- Kelly, Gavin and Lissauer, Rachel Ownership for All. London: Institute for Public Policy Research.
- Claire Kober, Baby bonds – can asset-based welfare tackle inequality? Archived September 29, 2007, at the Wayback Machine, Poverty 115, Summer 2003
- Stuart White, "Why do Liberal Democrats oppose the Child Trust Fund?", public policy research, March–May 2007
- "HM Treasury confirms higher ISA limits for 2012-13". HM Treasury. 18 October 2011. Retrieved 23 October 2011.
- "Savings & ISA limits". RossMartin.co.uk. Retrieved 6 April 2018.
- BBC News: George Osborne outlines detail of £6.2bn spending cuts
- UK Government Child Trust Fund website
- List of CTF providers
- "Beginner's guide to: Child trust funds" The Independent article, 7 March 2009
- "Child trust funds and how else to make your children rich" thisismoney.co.uk article, 27 February 2009
- "Child Trust Funds Explained" Times Online, 20 February 2008 | <urn:uuid:907684df-effe-4fcd-aad2-6b2b6bc0b27f> | CC-MAIN-2019-09 | https://en.wikipedia.org/wiki/Child_Trust_Fund | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481766.50/warc/CC-MAIN-20190217071448-20190217093448-00343.warc.gz | en | 0.952732 | 2,598 | 3 | 3 |
Common Mistakes of PTE that can reduce the overall scoreadmin
Silly mistakes can create a blunder. If you are planning to get
COMMON ERRORS IN SPEAKING MODULE-
1. Ignoring the time provided for preparation. Making untidy notes while jotting down points in case of Re-tell the lecture and Repeat the sentence.
2. Speaking extremely fast and ignoring the correct pronunciation of words.
3. Shouting while read aloud and speaking before the beep sound.
4. Giving least attention to the content.
5. Speaking without intonations.
6. Repetition of words and excessive use of fillers.
7. Fake accent and effort of imitating.
8. Not explaining trends and the real content in case of Describe the image.
9. Reading punctuation marks.
10. Irrelevant pauses
BLUNDERS MADE IN WRITING MODULE –
1. Irrelevant content which is not related to the topic asked.
2. Writing more or less than the required word limit.
3. Incorrect use of vocabulary words, synonyms, idioms.
4. Not writing examples and giving inappropriate conclusion.
5. Not following the correct pattern of summarize and writing more than one sentence.
6. Grammatical errors and inappropriate use of articles and tenses.
7. Ignoring proof reading.
READING MODULE MISTAKES-
1. Not reading the questions carefully
2. Leaving questions unanswered.
3. Reading full passage and not skimming and scanning the paragraph.
4. Marking all options in Multiple choice questions.
LISTENING MODULE MISTAKES-
1. Lack of concentration.
2. Silly spelling errors due to typing mistake.
3. Not attempting the questions.
4. Wasting time and lack of time management.
5. Making untidy and perplexing notes that are difficult to understand.
6. Highlighting words without thinking.
7. Forgetting that recording is played only once.
Practice well and keep in mind the a mistakes to get | <urn:uuid:f496011b-02db-401c-8a12-4feee076ebba> | CC-MAIN-2019-26 | http://www.welkinedusolutions.com/common-mistakes-of-pte-that-can-reduce-the-overall-score/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998923.96/warc/CC-MAIN-20190619063711-20190619085711-00539.warc.gz | en | 0.805807 | 438 | 2.90625 | 3 |
Biennial DEP Report Shows Most Pennsylvania Water Bodies Attain Use Designation
DEP recommends that EPA declare some water bodies impaired
Although Pennsylvania has made great progress in cleaning up its rivers, streams, lakes, wetlands and other water bodies, Pennsylvania Department of Environmental Protection (DEP) Secretary John Hanger said that a new report submitted to the federal government today shows there are still challenges threatening the state’s water quality.
The report, "2010 Pennsylvania Integrated Water Quality Monitoring and Assessment Report," is submitted to the U.S. Environmental Protection Agency in accordance with the Clean Water Act, which requires each state to assess water quality within its borders.
"We've made a lot of progress in the past eight years improving water quality throughout Pennsylvania," said Hanger. "We've worked with municipalities to upgrade their wastewater treatment systems; we've worked with developers to minimize runoff; we've restored stream banks, reduced erosion and planted riparian buffers; and we've worked with the agriculture industry to ensure their operations protect the quality of streams running through their farms."
The secretary noted that Pennsylvania has classified approximately 3,300 miles of streams as exceptional value and another nearly 23,000 miles as high quality, ensuring the most stringent protections. He added that earlier this year, the state enacted a mandatory 150-ft buffer from all development along these most pristine waterways.
According to the report, 68,320 miles of the state's 84,867 miles of streams and rivers that are assessed for aquatic life use are attaining that water use. Of the impaired miles, 9,413 require development of a total maximum daily load (TMDL), to reduce pollutant inputs and 6,105 have an approved TMDL. An additional 65 miles are under compliance agreements and are expected to improve within a reasonable amount of time.
In terms of potable water supplies, 2,762 of the 2,883 stream miles assessed for potable water supplies attained that use, while 107 miles required a TMDL and 14 miles had an approved loading plan in place. Lake potable water supply use was assessed for 44,933 acres with 44,921 attaining that designation and 12 impaired acres requiring a TMDL.
The report found that Pennsylvania's water bodies are facing threats from a variety of industries and are subject to many different types of pollutants. Sources of pollution include agriculture, storm water runoff, land development, sewage treatment plants and atmospheric conditions. Some of the pollutants of concern include nutrients, suspended solids, silt, metals and total dissolved solids.
Hanger said pollution levels and the threats to waterways all across the state justified DEP recommending that the EPA designate certain waters as "impaired." The report included those recommendations, which meets the EPA's "303 (d) list" requirements. The EPA will decide whether to grant the impaired designation.
More like this
- Biennial DEP Report Shows Most Pennsylvania Water Bodies Attain Use Designation
- EPA Establishes Plan to Clean Up Nutrients in Appoquinimink River and Tributaries
- EPA Establishes Clean-up Plans for Skippack Creek Watershed
- Florida Makes Surface Water Restoration a Priority
- EPA and Florida DEP Work Together to Restore Surface Waters | <urn:uuid:e234a3b1-d73e-468e-a6ac-71c3274a8b5e> | CC-MAIN-2015-48 | http://www.wwdmag.com/biennial-dep-report-shows-most-pennsylvania-water-bodies-attain-use-designation | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398444138.33/warc/CC-MAIN-20151124205404-00014-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.940911 | 665 | 2.625 | 3 |
A man during the 2011 Egyptian protests carrying a card saying "Facebook, #jan25, The Egyptian Social Network" illustrating the vital role played by social networks in initiating the uprising.
Photo: Essam Sharaf
Human Rights – offline, online, all the time and everywhere
Internet freedom is in decline. However, the threats we are facing must be viewed as a negative side-effect of otherwise extraordinary positive developments. This positive narrative of the Internet must be maintained, writes Annika Ben David, Ambassador of Sweden for Human Rights and Marcin de Kaminski, Policy Specialist on ICT/Freedom of Expression, Sida.
Last month, we participated in the fifth annual meeting of the Freedom Online Coalition – a unique network of 30 governments. It is the only such body of its kind globally. At its yearly conference – which this year was hosted in Costa Rica – governments, academia, private sector and civil society meet in discussions and processes aiming to promote and protect human rights and freedom online.
Internet freedom is in decline. In the last years more governments censored public information of public interest, state authorities jailed more users for their online writing, and cyber-surveillance power increased as bans on encryption and anonymity tools became more common. There has been more repressive legislation, violence and the spread of state-controlled propaganda and disinformation. Such measures limit and restrict the participation of citizens in society, undermining the very foundation of democracy.
The threats we are facing must be viewed as a negative side-effect of otherwise extraordinary positive developments. Thanks to the internet and social media, human rights are more widely known worldwide than ever before. This positive narrative of the Internet must be maintained.
International platforms for coordination of internet freedom
The Freedom Online Coalition plays an increasingly important role, given global developments with regard to a shrinking democratic space and human rights being questioned and challenged on all continents of the world.
For Sweden, human rights are a cornerstone of our foreign policy. Our take on global internet issues stems from this tenet. We take a human rights-based approach to cyber security and to ICT in general. Together with the Stockholm Internet Forum, the Freedom Online Coalition provides an excellent platform for international coordination and exchange on internet freedom.
Our human rights-based approach is the starting point and the added value that Sweden brings into the discussion on global internet affairs.
We must bridge the digital divide
Another key element for Sweden is the need to bridge the gender digital divide. Just as there is a divide between those who have access to the Internet and those who do not, there is a divide between women and men's access to the net. Not least from a standpoint of human rights, men and women should have the same access to the net.
Internet access means greater chances for development in all senses of the term. Countries with a free and open internet environment, where online human rights are protected and upheld, experience greater economic benefits than those countries with an internet that is overly regulated or where human rights are not protected. Internet freedom thus means smart economics. Internet is now the central infrastructure of the world and is at the core of most human activity. By limiting internet freedom we are limiting our own development.
Put an end to gender-based online abuse
Gender-based online discrimination and abuse must end. Female journalists, bloggers and activist are more likely to suffer harassment and intimidation on the net, not because of what they write but because of their gender. In Sweden, one in every four female journalists has suffered on-line abuse based on gender.
This shows why Sweden's priorities are central and crucial in the international discussions on the governance and future of a free, open and secure Internet.
Annika Ben David
Ambassador of Sweden for Human Rights
Marcin de Kaminski
Policy Specialist ICT/Freedom of Expression, Sida | <urn:uuid:720ebdad-f239-4eef-b48a-e0cf39f04ee5> | CC-MAIN-2017-22 | http://www.sida.se/English/press/current-topics-archive/2016/human-rights--offline-online/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607636.66/warc/CC-MAIN-20170523122457-20170523142457-00535.warc.gz | en | 0.926581 | 775 | 2.578125 | 3 |
Comets are solar system objects that travel in highly elliptical orbits. This comet, Comet 17P/Holmes was first discovered on November 6, 1892 by Edwin Holmes in London England. This comet has a period around the Sun of approximately 7 years. The image seen here was taken on the evening of November 6, 2007, almost exactly 115 years after its initial discovery. The image was captured with a Nikon D70 digital camera with a 240mm lens mounted piggy back on a Losmandy G11 mount. The image is a composite of two subexposures with a total exposure time of 123 seconds shot at f/6.3 at ISO 800.
This comet very suddenly brightened in the past week before this shot was taken while the comet was heading away from the Sun. See more information at the Astronomy Picture of the Day website.
Below is the comet at the fullsize of the original frame from the above image.
You are visitor to this site.
Return to AstroImages.org CCD Images | <urn:uuid:99f68f7f-555f-491c-aa1a-5bcfa2209fff> | CC-MAIN-2017-09 | http://www.astroimages.org/ccd/holmes.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00534-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.962093 | 211 | 3.703125 | 4 |
The visitors center was filled with chunks of useful information as well as chunks of stone salvaged from the excavation of the site. One info board talked about the mason's marks.
Remember these communities were self-sufficient, and would include men from all walls of life. There was a hierarchy system, and the brothers were segregated into two groups: the choir monks, the educated, usually coming from families with money because getting an education took lots of money, these men were the thinkers, philosophers, scribes, and church leaders; and the lay monks, who did the work, farming, cooking, stone work, etc. There was no contact between these two groups except for a foreman to give work orders to the lay brothers. This system existed until very recently.
If a rich man wanted to rise up in the church quickly, the fastest way was to join a monastery. A man could rise through the ranks over time and become a bishop. | <urn:uuid:3ed1cfc0-1614-4b92-a88a-f2c36f140fa1> | CC-MAIN-2018-09 | http://prismatic-palette.blogspot.com/2012/08/ireland-co-meath-mellifont-abbey-2.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814249.56/warc/CC-MAIN-20180222180516-20180222200516-00459.warc.gz | en | 0.989544 | 192 | 2.921875 | 3 |
Part of speech:
Generous giving, as from a patron
The definition of a grant is something given for a particular purpose.
A desire to help mankind, esp. as shown by gifts to charitable or humanitarian institutions; benevolence
A voluntary giving of money or other help to those in need
(Archaic) Aspect or appearance.
A decision, as by a judge or arbitrator
Something that one keeps because of the memories it calls to mind.
The state or quality of being kind, charitable, or beneficial.
The definition of a souvenir is something you keep to remind you of a trip or other event.
Anything known by sense perception rather than by description; percept
The definition of gratuity is a sum of money given to someone who provides service or a favor as a way to show graciousness or thankfulness.
A government grant to a private enterprise considered of benefit to the public
A share of money, food, or clothing that has been charitably given:
A tax of one penny per household paid in medieval England to the Papal See.
Suggestive of doing good; agreeable:
A gift given out of generosity.
A way, passage, or avenue by which a place or buildings can be approached; an access.
The definition of a perquisite is a special privilege of your position or status, or a tip or gratuity.
A gift or grant.
The definition of a tip is secret information or advice given to be helpful.
A benefit bestowed, especially one bestowed in response to a request.
Money, food, clothes, etc. given to poor people
A reward, premium, or allowance, esp. one given by a government for killing certain harmful animals, raising certain crops, etc.
A preparatory arrangement or measure taken in advance for meeting some future need
(Chiefly South) A small present given to a customer with a purchase
Dispensation is defined as special permission to not have to follow a rule or to not be bound by a particular code of behavior.
A small or barely sufficient allowance of money
Power of remembering; reach of personal knowledge; period over which one's memory extends.
A special levy or tax
A formal agreement to receive and pay for a periodical, books, theater tickets, etc. for a specified period of time
Relief is support or aid given to a nation or people in a time of need.
A fixed portion, especially an amount of food allotted to persons in military service or to civilians in times of scarcity.
The definition of a benefit is something that will provide an advantage for others, something you may receive as compensation from an insurance company or an event to raise money for a worthwhile cause.
One of the principal parts of the Eucharistic liturgy at which bread and wine are offered to God by the celebrant.
The first use or specimen of anything, regarded as a token of what is to follow
Remittance is defined as money that is sent to pay for something.
(Sports) The act or an instance of losing possession of the ball or puck to the opposing team, as by a misdirected pass.
A sheet or sheets of paper containing topical information, distributed to people attending a speech, lecture, or meeting.
Something, such as an article of clothing, that is passed on from one person to another.
A talent or natural ability for something:
Resulting in benefit
The definition of complimentary is something that is free or included in a larger cost.
A natural ability or talent
Importance, claim to notice, regard.
The act of transmitting or giving real property by will.
A gratuity or bribe
Something given or done in return for something else; repayment, remuneration, requital, or reward
Talent is natural skill or ability or a person who has a natural skill or ability in something.
The definition of a white elephant is a possession that is very expensive to maintain, or an article that is no longer wanted by the owner.
The amount of something lost:
A thing forfeited; that which is taken from somebody in requital of a misdeed committed; that which is lost, or the right to which is alienated, by a crime, breach of contract, etc.
(Soccer) A direct free kick from the penalty spot, taken after a defensive foul in the penalty box; a penalty kick.
A framework transverse to the length of a structure, for supporting lateral as well as vertical loads
The foremost or leading position:
A natural or acquired tendency, aptitude, or talent; bent; knack; gift
A clever expedient or way of doing something
A fit or a period of giddiness.
(Obs.) To provide with a dower
(Now Rare) To put on (a garment)
To endow with some attribute
The definition of invest is to put valuable resources into something that you expect will give you a personal or financial gain.
A tendency to be springy; resilience
Skill, expertness, or talent
That with which something is endowed; specif., any bequest or gift that provides an income for an institution or person
To give ability to; enable; permit
Something given in return for good or, sometimes, evil, or for service or merit
An interest payment, usually on a regular basis, on a loan.
A sum of money or an equivalent given to an employee in addition to the employee's usual compensation.
Money granted, as by a government, in support of a study, institution, etc.; subsidy
Allowance is defined as a specific amount of something available for use.
A talent or ability that has potential for development or use:
Without payment or charge.
A person who is considered as representative of a social group, such as a lone individual or one of a small number of employees hired primarily to prevent an employer from being accused of discrimination.
natural abilities or qualities
- Gratuity applies to a gift of money for services rendered, such as a tip to a waiter
- Donation applies to a gift of money, etc. for a philanthropic, charitable, or religious purpose, esp. as solicited in a public drive for funds a donation to the orchestra fund
- Gift and present both refer to something given as an expression of friendship, affection, esteem, etc., but gift, in current use, more often suggests formal bestowal Christmas presents, the painting was a gift to the museum
Find another word for gift. In this page you can discover 103 synonyms, antonyms, idiomatic expressions, and related words for gift, like: present, largesse, grant, courtesy, philanthropy, charity, favor, award, keepsake, memento and forfeiture. | <urn:uuid:53f463c9-4c1b-4b0d-ae90-2176cc1c6c1c> | CC-MAIN-2020-40 | https://thesaurus.yourdictionary.com/gift | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401583556.73/warc/CC-MAIN-20200928010415-20200928040415-00159.warc.gz | en | 0.930461 | 1,404 | 2.828125 | 3 |
With the oil and coal industry making unprecedented losses, there’s never been a better time for renewable energy to take over and begin providing electricity to the masses.
There are a lot of different projects on the go across the world, including hydroelectricity, solar farms, wind turbines, and even ocean wind generation. But scientists have long speculated that there are a number of unique and unusual methods that can be utilised to start producing power.
Continue reading “Unusual Sources Of Renewable Energy”
More and more regions around the world are suffering from water shortages. It’s believed that due to the changing climate of the planet combined with the constant draw on fresh water by most large industries, potable water will not always be as abundant as it is now.
This isn’t to say that water will simply disappear, but rather that it will be increasingly difficult for officials to provide enough water for most people.
Continue reading “A Simple Guide To Rain Catchment At Home”
Solar arrays are a collection of solar panels and other devices connected together with the aim of using the power of the sun to generate electricity. As the oil industry has entered a long decline, and renewable energies have skyrocketed in popularity, more and more countries around the world are adopting solar as the next big shift in generating the power necessary to keep global industries going.
Continue reading “Solar Arrays And How They’re Built”
In terms of climate change, one of the biggest problems that the human race faces right now is the amount of carbon dioxide that’s in the atmosphere.
Carbon dioxide release is a natural part of the earth’s cycle; there are thousands of processes occurring every year that release carbon, and for the most part, the planet has plenty of ways of scrubbing it back down.
Continue reading “How To Remove Carbon From The Atmosphere” | <urn:uuid:014b9aab-ac35-42c9-b92c-69712c26ceac> | CC-MAIN-2023-06 | https://www.globalengineering.info/2021/03/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500304.90/warc/CC-MAIN-20230206051215-20230206081215-00870.warc.gz | en | 0.935184 | 393 | 2.984375 | 3 |
For all of the attention and federal funds given to renewable energy, it remains a blip on America’s energy radar: solar power represents less than 1 percent of U.S. electricity generation. Wind and solar power together generated less electricity in the first half of 2015 than in the first half of 2014, and investment in the industry has been flat for almost five years, domestically and globally.
U.S. greenhouse gas emissions have fallen significantly since their peak in 2007—more than in any other country. The biggest cause is America’s fracking-led natural gas boom: solar power is responsible for 1 percent of the decline in U.S. carbon-dioxide emissions; natural gas is responsible for nearly 20 percent.
After peaking in 2007, U.S. carbon-dioxide emissions were 1,022 million tons (Mt) lower in 2014 than had they grown, since 2007, at the same rate as the U.S. economy.
- Of that reduction, 19 percent came from a fuel shift toward natural gas for electricity generation.
- Only 1 percent came from the increased use of solar power.
Neither renewable-energy generation nor investment is growing rapidly—or at all.
- Year-over-year growth in the generation of wind and solar power has consistently fallen since 2008. Generation in the first half of 2015 was lower than in the first half of 2014.
- Global investment in both wind and solar declined in 3Q:2015 compared with 3Q:2014; in the U.S., investment grew slightly but remains below the 2011 peak. | <urn:uuid:8d7601d1-6fe0-4760-ab5f-a0dc76156001> | CC-MAIN-2019-04 | https://www.manhattan-institute.org/html/issues-2016-reality-check-fracking-not-solar-power-reducing-us-carbon-dioxide-emissions-8004 | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583829665.84/warc/CC-MAIN-20190122054634-20190122080634-00536.warc.gz | en | 0.946514 | 325 | 3.15625 | 3 |
There are no products in your shopping cart.
|Items in the cart|
Spend an entire year investigating the fascinating story of the modern world, from the American Civil War through the end of the twentieth century--from Europe and the Middle East through India, China, the Arabian Peninsula, Australia, and both North and South America!
Designed for parents and elementary/middle grade students (grades 4-8) to share together, The Story of the World, Volume 4: The Modern Age history set builds historical literacy, improves reading and comprehension skills in both fiction and nonfiction, and increases vocabulary--all in an enjoyable and entertaining story-like format.
The Story of the World paperback text offers 42 narrative chapters, told in chronological order and spanning the entire globe, that begin with revolt against the British in Victorian-ruled India, and end with the Persian Gulf war. Independent readers can easily enjoy the stories on their own, or parents can read aloud to younger students.
The Volume 4 Activity Book offers a whole variety of hands-on projects to complement each chapter in the paperback text--map activities, coloring pages, games, cooking experiments, crafts, board games, science experiments, puzzles, and more! Extensive booklists, both fiction and nonfiction, accompany each set of projects and give parents and children the opportunity to read more about the fascinating people and events in each of the 42 chapters.
The Volume 4 Test Book & Answer Key rounds out this history resource by providing simple tests and answer keys for each chapter in the text. A combination of multiple choice, matching, fill-in-the-blank, and short writing samples allow parents to evaluate the child’s comprehension, and gives young students a simple, low-pressure way to practice test-taking skills. | <urn:uuid:9928ee3f-3283-42ed-aa05-6548a551478a> | CC-MAIN-2021-39 | https://www.literatibookstore.com/book/9781945841750 | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057479.26/warc/CC-MAIN-20210923225758-20210924015758-00695.warc.gz | en | 0.898701 | 363 | 3.015625 | 3 |
Part 4 of 4, Dessau Törten Estate.
2019 marks the 100th anniversary of Bauhaus. The Bauhaus art school began life first in Weimar between 1919 and 1925, moved to Dessau between 1925 and 1932, and ended in Berlin from 1932 and 1933 before the Nazis forced the school to close for good.
After Hannes Meyer took over as Bauhaus Director in 1928 after Walter Gropius’ departure, Meyer recognized the need for “verticality” to address the continuing housing shortage in Dessau. Meyer and the staff within Bauhaus’ architectural department quickly set out to design and construct Laubenganghäuser apartment buildings. The results in 1930 were five multiple-storey brick buildings, projected stairwells, open communal balcony on each floor, standard-sized apartments with standardized furnishings and large windows. The picture shows a Laubenganghaus at address Peterholzstrasse 40, which looks pretty much the same now as it did decades ago. The Laubenganghäuser were added in 2017 as an extension to the 1996 listing for Dessau Bauhaus as UNESCO World Heritage Site.
Thanks to IMG- and Sachsen-Anhalt-Tourismus and the city of Dessau-Rosslau for their patronage and access to facilities, and the City-Pension Dessau-Rosslau for their hospitality. IMG- and Sachsen-Anhalt-Tourismus supported my visit to the German federal state of Saxony-Anhalt from 25 October to 3 November 2016 inclusive. I made the photo above on 28 October 2016 with a Canon EOS6D and the following settings: 1/500-sec, f/8, ISO1000, and 24mm focal length. This post appears on Fotoeins Fotografie at fotoeins.com as https://wp.me/p1BIdT-dHw. | <urn:uuid:df4fb01f-b553-4580-9705-0f444a3f23f8> | CC-MAIN-2021-21 | https://fotoeins.com/2019/04/26/fotoeins-friday-dessau-balconyapts-toerten-estate/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991514.63/warc/CC-MAIN-20210518191530-20210518221530-00048.warc.gz | en | 0.939434 | 412 | 2.609375 | 3 |
As a component of amino acids, enzymes, and hormones, sulphur occurs naturally in foods.
Proteins are a source of sulfur amino acids, including cysteine and methionine.
Methionine is an essential amino acid that can be converted into several sulphur-containing molecules with important functions, such as S-adenosylmethionine or creatine. It also gives rise to cysteine—another sulphur amino acid. Methionine has antioxidant effects and is important for proper functioning of the immune and nervous systems.
Cysteine is a non-essential amino acid that is no less important than essential amino acids. It plays a role in the formation of protein structures, as well as in the synthesis of taurine and glutathione. These compounds are crucial to the regulation of oxidative stress and detoxification.
Sulphur is a natural component of the ingredients in ManaPowder and ManaDrink.
Mana is nutritionally complete food. Enjoy it as part of a balanced and healthy lifestyle.
McPherson, Robert A.a; Hardy, Gilb Clinical and nutritional benefits of cysteine-enriched protein supplements, Current Opinion in Clinical Nutrition and Metabolic Care: November 2011,14: 562-568
Lim JM, Kim G, Levine RL. Methionine in Proteins: It's Not Just for Protein Initiation Anymore. Neurochemical Research: January 2019, 44: 247-257 Online: http://website60s.com/upload/files/neurochemical-research-vol-44-iss-1-21.pdf
Aledo, JC. Methionine in proteins: The Cinderella of the proteinogenic amino acids. Protein Science. 2019; 28: 1785– 1796.
John T. Brosnan, Margaret E. Brosnan, The Sulfur-Containing Amino Acids: An Overview, The Journal of Nutrition, Volume 136, Issue 6, June 2006, Pages 1636S–1640S | <urn:uuid:4e6e4f53-9b25-46f5-b4a1-8bbf1b3ae196> | CC-MAIN-2021-31 | https://drinkmana.co.uk/blogs/vitamins-and-minerals/s-sulphur | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150129.50/warc/CC-MAIN-20210724032221-20210724062221-00397.warc.gz | en | 0.875755 | 422 | 3.015625 | 3 |
How much sleep do cats need?
Do you ever leave for work with your cat snoozing in their favorite sunny spot and return to them still fast asleep in the exact same spot? It makes you wonder if they’ve moved at all or just spent the entire day in a peaceful slumber. These interesting facts will help you understand why cats need so many catnaps!
How much sleep
Excluding bats and opossums, cats are the sleepiest mammals. On average, cats sleep twice as much as humans. That translates to roughly 12 to 16 hours each day. Some lazy cats even snooze up to 20 hours every day!
Cats are natural predators. In the wild, it is important for cats to conserve their energy to hunt for food. Even indoor cats that always have a bowl full of food have the natural instinct to be conservative with their energy for hunting.
Most active at night
Cats are nocturnal because of their natural instinct to hunt at night. This explains why cats are so active at night. Domesticated cats are able to adapt fairly easily though. If you are on a consistent daily schedule, your cat may adjust to that schedule and become more active during the day. Cat wants to spend time with their humans so they will often start to sleep while you sleep or while you are away at work.
Different states of sleep
Cats experience different levels of sleep that are similar to human’s sleep stages. They can go between a light or deep state of sleep. This light state of sleep is sometimes referred to as a “catnap”. While cats are napping, they often lay in a position where they can easily jump up if they need to. Their ears will move if they hear a sound and their eyes may even open slightly. In this state they are still able to get the rest that they need while staying alert. Cats are much less alert and aware when in a deep sleep. Cats will turn on their sides and actually dream when they are in a state of deep sleep. | <urn:uuid:df9d7360-00ca-4bdd-a8fa-42ee1f7fb8c8> | CC-MAIN-2022-40 | https://blog.pettreater.com/2018/02/23/why-do-cats-sleep-so-much-understanding-your-cats-strange-sleeping-habits/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333541.98/warc/CC-MAIN-20220924213650-20220925003650-00102.warc.gz | en | 0.972524 | 425 | 3 | 3 |
The Draft Constitution was presented to the Constituent Assembly on November 4th,1948 by the Chairman of the Drafting Committee, B.R. Ambedkar. The Constituent Assembly proceeded to take up, clause by clause, every part of the Draft Constitution for debate. Members of the assembly often moved their own amendments to the Draft Constitution seeking to change or drop specific articles or clauses. The most crucial and voluminous debates took place at this stage, and the debates would go on till the 17th of October 1949.
Debates around the Draft Constitution in the Constituent Assembly can be found in Volumes 7, 8, 9 and 10 of the Proceedings of the Constituent Assembly. | <urn:uuid:15557c30-8b52-4fe5-9f39-cbe8653ffa59> | CC-MAIN-2018-17 | http://cadindia.clpr.org.in/constitution_making_process/debates_on_the_draft_constitution | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945497.22/warc/CC-MAIN-20180422061121-20180422081121-00241.warc.gz | en | 0.96107 | 145 | 2.828125 | 3 |
But don't let these guys put you off. Contrary to popular belief, you don't need to have a degree in computer engineering to build your own gaming rig. In fact, you don't even need to be particularly handy with a screwdriver. These days, PC components are almost like Lego blocks (albeit with more fiddly bits you used to get your dad to help with). A decent set of PC components can inject a game's graphics with the sort of photorealism that the Xbox 360 and PS3 can only dream of.
Over the next few weeks, we'll be taking you through the essential PC gaming basics, starting with the processor, motherboard and memory. If these concepts are alien you to, don't panic – all will be explained in due course. By the end of our three-part seminar, you'll be ready to graduate to PC gaming in style, ready to build your first D.I.Y. PC.
Central processing unit (CPU)
The brains of the PC - the CPU.
The central processing unit (or CPU) is the 'brain' of your gaming rig. It is responsible for processing the information needed to complete the majority of the tasks that you ask of your PC. Almost all electronics include some form of CPU, including video game consoles and arcade machines.
Much like a dinosaur's think-box, the CPU is tiny in relation to the PC it's housed in -- but don't let its size fool you. These bad boys are capable of calculating millions of complex computations per second. Without the CPU, you wouldn't be able to boot up your PC, much less play Deus Ex: Human Revolution. Subsequently, choosing the right CPU is one of the most important decisions you need to make, and is the first part in the holy trinity of PC gaming components (with the memory and Video Card being the other two parts. Get all three parts right and you're guaranteed to have silky smooth gaming in True HD.
The major players in CPU manufacturing are Intel and AMD. As a general rule, AMD tends to offer better bang-for-buck, while Intel offers better bang, period. Most hardcore PC gamers stick to Intel for their processing prowess, but if you're not too fussed about maxed-out settings, a mid-range AMD CPU will get the job done. (of course, the decision will also depend on the motherboard you're using, which we'll get to in a moment.)
CPUs come in a dizzying array of different types and speeds. This used to be very confusing, but the industry recently introduced a simplified naming scheme to make life easier for non-enthusiasts. Intel's extensive range of CPUs now falls into three distinct families: i3, i5 and i7. i3 processors are the lower-end offerings, i5 targets the mid-range and i7 are the current top dogs for gaming. AMD, meanwhile, divides its processors into the Athlon and Phenom series (for gaming, stick to Phenom, preferably in the 'x4' product range or above).
Regardless of which manufacturer you choose, the important thing to look for is the CPU clock speed. This will usually be measured in Gigahertz (GHz), and you'll need to do a bit of Googling to find out what each CPU's clock speed is. Basically, the higher the clock speed, the better the CPU will perform and the faster your games will run. Simply type the name of the processor into Google, along with the term "clock speed". Bear in mind that most CPUs run at two speeds; idle speed is slower, and used for power saving, while the load speed is the top speed that it runs at while playing a game. A CPU that has a load speed of 3GHz is plenty fast enough for most games, but the faster you can get, the better. Most modern CPUs also come with multiple cores, which are basically separate CPUs all put into the one chip. A quad core CPU is the equivalent of four single CPUs, and is thus faster than a dual-core CPU. At the very least, you should be looking for a dual core processor, though quad core seems to be the standard for most average gaming rigs. Right now we recommend the Intel i5 2600k or AMD Phenom II AM3 965 Black Edition as the best gaming CPUs that won't cost you an arm and a leg.
The skeleton of the PC - the Motherboard.
If the CPU is the brain of your PC, then the motherboard is the skeleton. This is the core PC component that everything else is connected to. Choosing a motherboard, or 'mobo', as it is affectionately known, is one of the first decisions you need to make. It will effect what type of components you can use, particularly when it comes to the CPU.
For example, an AMD-certified motherboard won't work with an Intel CPU, no matter how hard you try to jam it in. Similarly, older motherboards won't be compatible with the latest batch of processers - even if they're badged with the same brand name. It's therefore vitally important to check the specifications of your motherboard to see what processor interface it supports. Look for the Socket type, as this refers to the type of CPU design that it can handle. Intel's most recent CPUs are Socket LGA1155, while AMD's best gaming CPUs use Socket AM3.
Another thing to look out for is the number of PCI-Express slots a motherboard has. These are the long slots that your graphics card(s) will plug into, and are therefore an essential part of any gaming PC. At the very least, your mobo should have two PCIe slots, so that you can upgrade to two video cards in the future.
When buying a motherboard, it's a good idea to go with a leading brand name, such as Asus, MSI, Intel, EVGA or Gigabyte. These guys might be a bit more expensive, but they enjoy a solid reputation for a reason. Also, keep an eye out for gaming-specific motherboards, such as Asus' Republic of Gamers series. These boards come with features specific to PC gamers and are generally geared towards the best CPUs on the market. However, don't expect the motherboard to have much of an impact on the performance of your games, as game performance is reliant upon the holy trinity of PC hardware (CPU, Memory and Video Card). So if you need to save some bucks, go for a cheaper motherboard.
The short term memory of the PC - the Memory/RAM
Okay, so we've talked about how the CPU is your computer's brain and the motherboard is its skeleton. To torture the analogy further, RAM can be viewed as your brain's short term memory. Whenever you run a game, it's loaded into the memory; if you don't have enough memory the CPU will need to access the computer's hard drive instead, which is much slower. When it does this your game can stutter and slow down.
There are currently two types of RAM on the market -- DDR2 and DDR3. As their names imply, DDR2 (AKA Double Data Rate 2) is an older type of RAM which is being gradually superseded by DDR3. DDR3 is faster, making it a better bet for gaming. If you can afford the extra expenditure, go for DDR3 RAM, but again it all comes down to your motherboard. A motherboard that supports DDR2 won't run DDR3, and vice versa. You want to load your PC with 4GB worth of RAM, but you can install more if you're going to be editing HD videos or running lots of Photoshop. Be aware that memory runs at different speeds - all you need for good gaming performance is DDR3 1600MHz. Anything more will cost you a load more, for just a tiny performance boost.
Phew, that wasn't so bad was it? There's only a couple more bits and pieces to explain, so check back soon to learn all about Graphics cards. If you've got any questions, please post them in the comments section and we'll be happy to help you out. | <urn:uuid:83614eb9-2cd1-410f-85f7-43339454e433> | CC-MAIN-2015-35 | http://woofclan.blogspot.com/2011/09/pc-tech-101-gamers-guide-to-pc-tech.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645367702.92/warc/CC-MAIN-20150827031607-00006-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.954032 | 1,679 | 2.53125 | 3 |
Teach, review or discuss how God wants us to love Him above all things.
Ten statements are presented about ways to love God inspired by the Greatest Commandment as presented by Jesus in Matthew 22:34-40. Children are to fill-in the appropriate faces to represent agreement or disagreement with the statement.
An answer sheet is provided that allows students to check their own work. Incorrect answers can be used as good discussion starters.
You can use this activity as a mini-lesson to be completed as a class, or utilize it as a pre-lesson check or a post lesson review.
Focus: Loving God above all others, charity
Theme: God wants us to love Him, the first and second greatest commandments
Biblical Reference: Matthew 22:34-40 | <urn:uuid:06bb6e77-dbdc-401d-b3ed-56a689c3b967> | CC-MAIN-2018-22 | https://thatresourcesite.com/thatresourcesite/catholic-education/god-wants-us-to-love-him-fill-in-the-faces-worksheet/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867417.75/warc/CC-MAIN-20180526131802-20180526151802-00104.warc.gz | en | 0.921676 | 161 | 3.328125 | 3 |
With the rapid increase of independent schools embarking on international expansions, what lessons can we learn from their innovations to improve learning?
A challenge many institutions face when expanding overseas is the complexity of building an international offering that doesn’t simply replicate a national curriculum but goes above and beyond to consider the context for learners and their learning.
Schools expanding with international campuses need to meet necessary requirements to operate with local licences while delicately blending image, reputation, recruitment of teaching and non-teaching staff and marketing. There is often great turbulence experienced by new school openings, with new learners joining shortly after new staff, who themselves are still establishing operational procedures and adapting to local norms.
When considering why a school may choose to construct its curriculum offer in the way it does, it is important to reflect on the flexibility that some international schools can be presented, while often maintaining alignment to a ‘home’ national curriculum.
What sets many international schools apart is their ability to focus on improving learning for learners through an international curriculum, rather than solely ensuring designated national curriculum requirements have been delivered. They may learn across themes and bring subjects into alignment to connect learning together, aiming to increase positive experiences and make learning even more enjoyable.
What sets many international schools apart is their ability to focus on improving learning for learners through an international curriculum, rather than solely ensuring designated national curriculum requirements have been delivered
Further, when considering the learner and improving learning, standout international schools go beyond the implementation of an international curriculum. They establish themselves as a learning organisation, constantly reflecting on their own performance, strengths and opportunities for improvement.
Just as they engage their learners in a reflection process for their own learning, proven to strengthen cognitive development, international schools thrive when they reflect on their own practice and look for improvements through research findings, be it delivered in wider academic literature or action research in the school.
Within Fieldwork Education, we have been fortunate to partner with over 1,000 schools in over 90 countries for over 20 years, all with the specific focus on improving learning.
The recent re-release of the reviewed International Primary Curriculum (IPC) and International Middle Years Curriculum (IMYC) was conducted with over 70 contributors from leading international schools around the world, who influenced the research and design and provided a further macro reflection process, building upon their schools’ reflective practices and the same for their learners within.
The findings presented seven clear foundations for reimagining the international curriculum. The seven foundations articulate why the design of an international curriculum should focus on the learner and improving learning, covering:
- Learner-focused personal, international and subject learning goals
- A progressive pedagogy
- A process to facilitate learning for all
- Globally competent learners
- Knowledge, skills and understanding are taught, learnt and assessed differently
- Connected learning
- Assessment for improving learning
The collaboration with international schools, coupled with the underpinning academic research, enabled an international curriculum to be designed for international schools, by international schools, dedicated to learners and how to improve their learning.
This then enables the ‘what’ to be implemented in the school, be it physically or virtually. Through the extensive range of thematic units of learning across the ages of 5–14 years old (again, led in their design by international schools), schools working with the international curriculum have been able to navigate the turbulence of new campus openings by working through defined tasks and activities.
These have been meticulously designed to enable learning goal coverage across personal, international and subject learning goals, planned to be delivered through progressive pedagogies and structured in a consistent process to facilitate learning, with each thematic unit of learning providing assessment for improving learning opportunities.
By connecting learning across subject areas and considering learning goals for knowledge, skills and understanding, successful international schools are comfortably able to deliver national curriculum requirements, while embedding their own progressive ideologies and establishing global competence among their learners.
Operating in jurisdictions around the world, many international schools do not have an inspectorate system and instead opt for a developmental approach to school improvement based on a self-review.
Through the allocation of mentors from the International Curriculum Association and using developmental standards and criteria, successful international schools are in an ongoing state of self-review, with teachers and leaders engaged in reflective questions and the collection of evidence to demonstrate high quality implementation. This developmental approach to self-review is how successful international schools best deliver their international curriculum, designed for improving learning.
The question of “What lessons can we learn from international schools to improve learning?” provides a simple answer. One benefit of being an independent school is the ability to identify like-minded institutions, who when brought together can design such a curriculum focused on improving learning.
Much like how the IPC celebrates subjects within a theme, it is independence and interdependence which makes learning stronger. A second benefit of being an independent school is the stability that can be provided to the design of such a curriculum.
As with international schools, establishing learning goals for the learner and for the improvement of their learning is an approach sure to stand the test of time. | <urn:uuid:473c1501-79ab-4568-9eef-884595b9ff13> | CC-MAIN-2021-43 | https://ie-today.co.uk/comment/the-why-what-and-how-of-improving-learning-lessons-from-international-schools/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588257.34/warc/CC-MAIN-20211028034828-20211028064828-00617.warc.gz | en | 0.948687 | 1,048 | 2.84375 | 3 |
Odisha students develop smart water dispenser
Part of: GS Prelims and GS-III- Science & Technology
- Three students of Odisha’s KendriyaVidyalaya, Berhampur, have developed a ‘smart water dispenser’ to ensure equal distribution of drinking water through pipelines in any urban or rural habitat to combat future water crisis.
- In August 2019, this project was shortlisted as top 50 innovations under ‘Atal Innovation Mission’ of NitiAyog.
- The ‘Smart water dispenser’ is an electronic water flow controlling mechanism that can replace the water meter and provide control of amount of water supply to the authorities for equal distribution. These units will be directly connected to a central server of the local governing body by GSM or Wi-Fi.
- Cost of the prototype was just ₹2,000. Its main components include an easily available microprocessor, a solenoid valve and a flow sensor.
About Atal Innovation Mission
- It is a flagship initiative set up by the NITI Aayog to promote innovation and entrepreneurship across the length and breadth of the country.
- Long term goals of AIM include establishment and promotion of Small Business Innovation Research & Development at a national scale (AIM SBIR) for the SME/MSME/startups and in rejuvenating Science & Technology innovations in major research institutions of the country | <urn:uuid:fd80ea54-6b68-4b53-b3b2-8d61e5e3303d> | CC-MAIN-2021-04 | https://iasbaba.com/2019/12/odisha-students-develop-smart-water-dispenser/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703538741.56/warc/CC-MAIN-20210123222657-20210124012657-00412.warc.gz | en | 0.896281 | 298 | 2.765625 | 3 |
August 3rd, 2013, 03:20 AM
How are you all ???
What are the Wrapper classes in the java and what is it's utility...
Why it is used ??/
Last edited by requinix; August 6th, 2013 at 03:14 AM.
Reason: removing spam
August 3rd, 2013, 09:13 AM
Java wrapper classes - Google is your friend and tutor
When the programming world turns decent, the real world will turn upside down.
August 8th, 2013, 09:41 AM
Wrapper classes are used to convert data type to refrence type and then this data type will be treated as a reference variable .
The conversion of data type is know as autoboxing while the reverse process is known as unboxing. | <urn:uuid:8489f54f-543b-4db0-94e1-662d7323aae5> | CC-MAIN-2017-17 | http://forums.devshed.com/java-help-9/wrapper-classes-949589.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122886.86/warc/CC-MAIN-20170423031202-00342-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.913797 | 163 | 2.734375 | 3 |
Characteristics of silica fume:
1. The microsilica is a kind of neutral inorganic filler with stable physical properties and chemical properties. It does not contain crystalline water, does not participate in the curing reaction and does not affect the reaction mechanism.
2. It has good wettability to all kinds of resins, good adsorption properties, easy mixing and no agglomeration.
3. The particle size distribution of micro silica fume is reasonable, the density is strong, the hardness is great, and the wear resistance is good. It can greatly improve the tensile, compressive, impact strength and wear resistance of the solidified material, and the punching resistance can be increased by 0.5 to 2.5 times.
4. It can increase the thermal conductivity, change the tackiness and increase the flame retardancy.
5. It can reduce the exothermic peak temperature of the curing reaction of epoxy resin, reduce the linear expansion coefficient and the shrinkage of the solidified substance, thus eliminate the internal stress and prevent the cracking.
6, as the fine particle size and reasonable distribution, micro silica fume powder can effectively reduce and eliminate precipitation and stratification.
7, the silica fume is pure, the impurity content is low, the physical and chemical properties are stable, so that the condensates have good insulation and arc resistance.
8, the chemical composition of microsilica is silicon dioxide (SiO2), which is inert, and does not react with most of the acid and alkali. The silica fume is evenly distributed and covered on the surface of the object. It has strong corrosion resistance and the ability to resist cavitation is 3 to 16 times.
9, the bulk density is small: As polymer filled materials, it is less expensive than other mineral filling materials, with less loading capacity and less polymer consumption, thus reducing the cost of products.
10, frost resistance: by circulating 300 to 500 times quickly, the relative elastic modulus increases 10 – 20%, while the ordinary concrete through 25 to 50 cycles, and the relative elastic modulus reduce 30 to 73%. Therefore, the frost resistance of concrete can be improved.
11, early strength: micro silica fume concrete has shortened the induction period and has the characteristics of early strength.
Use of microsilica in concrete:
Silica fume can be fully dispersed and filled in the gap between the cement particles, making the slurry more dense, the volcanic ash activity index of the micro silica powder can reach 110, the effective substitution coefficient reaches 3-4. There is strong absorption force to the Ca (OH) 2 produced after the hydration of cement, forming a well developed calcium silicate gel, which is greatly developed, improve the strength of concrete.
1, increase strength: when the mixing amount is 5-10%, the compressive strength of concrete can be increased by 10-50%, and the flexural strength will be increased by more than 10%.
2, increase density: when mixed with 10%, the impermeability increased by 5-8 times, and the resistance to carbonization increased by more than 4 times.
3, increase the frost resistance: the concrete mixed with 10% micro silicon powder decreases the relative dynamic elastic modulus by 1-2% after 300-500 times of freezing and thawing cycle, and the relative dynamic elastic modulus has been reduced by 36-73% after the ordinary concrete is circulate for 25-50 times.
4, increase early strength:
5, increase abrasion resistance and cavitation resistance: micro silica fume concrete can increase 0.5-2.5 times of abrasion resistance and increase cavitation resistance by 3-16 times. It is the best material for hydropower station, reservoir and dams to wear and repair. | <urn:uuid:dee504b3-df62-4707-91ac-7e98e604f144> | CC-MAIN-2020-05 | http://www.microsilica-fume.com/use-microsilica-concrete.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251779833.86/warc/CC-MAIN-20200128153713-20200128183713-00481.warc.gz | en | 0.912391 | 799 | 2.6875 | 3 |
Presentation on theme: "Teaching and Evaluating Physicianship The HealerThe Professional."— Presentation transcript:
Teaching and Evaluating Physicianship The HealerThe Professional
Work in Progress What we have accomplished What we have accomplished Our hopes for the future Our hopes for the future
What is Physicianship?
The Physician Has Two Roles Healer Healer Professional Professional
The two roles The two roles Served simultaneously.Served simultaneously. Analyzed separately.Analyzed separately.
AntiquityHippocratestechnologycuring The Present Professionalism and Medicine The concept of the healer The concept of the professional Code of Ethics Middle ages Learned professions clergy, law, medicine 1850: Legislation 1900: University linkage The Present Science
Medicines Values Are Derived From Both The Healer and the Professional
The Primary Role is that of the Healer
Society uses the concept of the professional as a means of organizing the delivery of complex services which it requires, including that of the healer. The Professional Model
Other Models are Available BureaucraticBureaucratic Free MarketFree Market Neither Share the Values of the Healer none pure >
The Social Contract Medicine fulfill the role of the healer fulfill the role of the healer guaranteed competence guaranteed competence altruistic service altruistic service morality and integrity morality and integrity promotion of the public good promotion of the public good openness openness accountability accountability Society monopolymonopoly autonomyautonomy trust and respecttrust and respect self-regulationself-regulation adequate resourcesadequate resources status and rewardsstatus and rewards financial financial non-financial non-financial TRUST
The social contract in health care hinges on professionalism.The social contract in health care hinges on professionalism. It serves as the basis for the expectations of both medicine and society.It serves as the basis for the expectations of both medicine and society.
To preserve values in changing times, Physicians must understand the linked roles of the healer and the professional.To preserve values in changing times, Physicians must understand the linked roles of the healer and the professional. They must be taught.They must be taught.
To Heal To make whole or sound in bodily conditions; to free from disease or ailment, to restore to health or soundness. Oxford English Dictionary
Definition Profession Definition Profession An occupation whose core element is work based upon the mastery of a complex body of knowledge and skills. It is a vocation in which knowledge of some department of science or learning or the practice of an art founded upon it is used in the service of others. Its members are governed by codes of ethics and profess a commitment to competence, integrity and morality, altruism, and to the promotion of the public good within their domain. These commitments form the basis of a social contract between a profession and society, which in return grants the profession a monopoly over the use of its knowledge base, the right to considerable autonomy in practice and the privilege of self-regulation. Professions and their members are accountable to those served and to society. Derived from the Oxford English Dictionary and the Literature on Professionalism In Press, Teaching and Learning in Medicine
CompetenceCommitmentConfidentialityAltruism Integrity and honesty Morality and ethics Responsibility to the profession profession AutonomySelf-regulationResponsibility to society to society Team work Caring and compassion InsightOpenness Respect for the healing function healing function Respect patient dignity and dignity and autonomy autonomyPresence
Each attribute will be reflected (or not) by appropriate (or inappropriate) behavior.Each attribute will be reflected (or not) by appropriate (or inappropriate) behavior. These behaviors can be observed and evaluated.These behaviors can be observed and evaluated.
How to impart knowledge of Physicianship to students and residents.How to impart knowledge of Physicianship to students and residents. How to encourage behavior characteristic of the good physician.How to encourage behavior characteristic of the good physician. The Challenge
By concentrating on the role of the Professional we risk neglecting that of the Healer - in spite of overlap THEY ARE DIFFERENT
General Principles Integrated approach throughout faculty for undergraduate and postgraduate education.Integrated approach throughout faculty for undergraduate and postgraduate education. Support of Deans Office and Chairs.Support of Deans Office and Chairs. Multiple techniques of teaching.Multiple techniques of teaching. » The International Charter » formal teaching » small groups » independent activities » role models - attendings - residents - residents » other
General Principles Evaluate what is taught.Evaluate what is taught. The International Charter Faculty and Resident development essential.Faculty and Resident development essential.
Faculty Development 1) Teaching Professionalism - think tank (20) 2) Teaching Professionalism: Deans Invitation (40) 3) Evaluating Professionalism - think tank (20) 4) Evaluating Physicianship - (90) Behaviors Identified 150 Faculty members and residents have participated. Large pool of trained teachers and role models.
McGill: 1996 - 2003 Body Donor Service:1992Body Donor Service:1992 Prof 101 followed by small groups:1997Prof 101 followed by small groups:1997 Elective: The Profession and Society:1999Elective: The Profession and Society:1999 White Coat Ceremony:2000White Coat Ceremony:2000 Mandatory half day on professionalism2000Mandatory half day on professionalism2000 for all residents (CanMeds) Professionalism 101 to incoming students2003Professionalism 101 to incoming students2003 201 to 1st year students2004 Pledge 20 students
teaching episodic ineffective ineffective evaluation methods primitive ineffective ineffective the role of the healer not addressed explicitly. Assessment:
Program on Physicianship to teach the role of the Healer and The Professional.to teach the role of the Healer and The Professional. to promote behaviors characteristic of both.to promote behaviors characteristic of both. to evaluate knowledge of both rolesto evaluate knowledge of both roles to evaluate behaviors characteristic of both.to evaluate behaviors characteristic of both.
Four Committees The Healer The Professional Evaluation Post Graduate Education
Recommendations A longitudinal program on physicianship throughout 4 years of medical school.A longitudinal program on physicianship throughout 4 years of medical school. Distinct approaches to the Healer and the Professional.Distinct approaches to the Healer and the Professional. Incorporate existing activities including ethics.Incorporate existing activities including ethics. Create new learning experiences.Create new learning experiences. Revise evaluation system - global rating scaleRevise evaluation system - global rating scale - miniCEX - miniCEX All students must successfully complete program.All students must successfully complete program. Undergraduate
Recommendations All residents must master the cognitive base of professionalism.All residents must master the cognitive base of professionalism. Self reflection must be promotedSelf reflection must be promoted - small groups - ? portfolios revise evaluation systemrevise evaluation system - global rating scale - miniCEX Postgraduate
Content Whole class (Flagship) activities at regular intervalsWhole class (Flagship) activities at regular intervals – Lectures small groups – ethics small groups – introduction to the cadaver small groups – body donor service – white coat ceremony – 4th year seminars
Content unit specific activities (small group)unit specific activities (small group)pre-clinicalclinical humanism/narrative medicinehumanism/narrative medicine spiritualityspirituality palliative care medicinepalliative care medicine community servicecommunity service portfolio (self-reflection, self-assessment)portfolio (self-reflection, self-assessment)
Evaluation longitudinal - 4 yearslongitudinal - 4 years multiple methodsmultiple methods – knowledge - mcq etc. - (do often) – global rating scale - UCSF, Maastrict – critical incidents – portfolio – ? MiniCEX ALL ATTRIBUTES MUST BE EVALUATED USING AT LEAST ONE METHOD
Faculty Development – essential - includes residents – knowledge role modeling – evaluation Requires resources
Resources Assoc/Assist Dean for Physicianship Infrastructure Support - financial and other
Summary The role of the Healer and the Professional must be taught.The role of the Healer and the Professional must be taught. Must start with agreed-upon definitions.Must start with agreed-upon definitions. The teaching of physicianship should represent a major commitment of the faculty.The teaching of physicianship should represent a major commitment of the faculty. It should be taught and evaluated in a planned way throughout the curriculum.It should be taught and evaluated in a planned way throughout the curriculum.
The most important problem for the future of professionalism is neither economic nor structural but cultural and ideological. The most important problem is its soul Freidson, 2001 | <urn:uuid:d4a8188f-92c2-4a11-80a4-3aedbc565e17> | CC-MAIN-2017-09 | http://slideplayer.com/slide/6480/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00016-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.877476 | 1,737 | 2.953125 | 3 |
This Tiny Self-Folding Origami Robot can Walk, Swim and Degrade
A miniature robotic device that can fold-up on the spot, accomplish tasks, and disappear by degradation into the environment promises a range of medical applications but has so far been a challenge in engineering.
This work presents a sheet that can self-fold into a functional 3D robot, actuate immediately for untethered walking and swimming, and subsequently dissolve in liquid.
In the video below you can see this remarkable robotic breakthrough in action.
“An Untethered Miniature Origami Robot That Self-folds, Walks, Swims, and Degrades” by Shuhei Miyashita, Steven Guitron, Marvin Ludersdorfer, Cynthia R. Sung, and Daniela Rus from MIT and TU Munich, was presented last week at ICRA 2015 in Seattle.
ICRA is the IEEE Robotics and Automation Society’s flagship conference and is a premier international forum for robotics researchers to present their work. The 2015 conference was held from May 26-30, 2015 at the Washington State Convention Center in Seattle, Washington, USA.
The developed sheet weighs 0.31g, spans 1.7 cm square in size, features a cubic neodymium magnet, and can be thermally activated to self-fold.
Since the robot has asymmetric body balance along the sagittal axis, the robot can walk at a speed of 3.8 body-length/s being remotely controlled by an alternating external magnetic field. [source]
The robot is controlled using an external magnetic field exerted by embedded coils underneath the robot. Equipped with just one permanent magnet, the robot features a lightweight body yet can perform many tasks reliably despite its simplicity.
The minimal body materials enable the robot to completely dissolve in a liquid environment, a difficult challenge to accomplish if the robot had a more complex architecture. [source]
The robot is capable of conducting basic tasks and behaviors, including swimming, delivering/carrying blocks, climbing a slope, and digging. This study is the first to demonstrate that a functional robotic device can be created and operated from the material level, promising versatile applications including use in vivo.
The team’s future work involves combining the conductive robot body with self-folding sensors to achieve a higher level of autonomy and more versatility in function. [source] | <urn:uuid:af6eb75b-1210-4988-bc89-e198ba352fb4> | CC-MAIN-2019-30 | https://twistedsifter.com/2015/06/self-folding-origami-robot-can-walk-swim-degrade/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524290.60/warc/CC-MAIN-20190715235156-20190716021156-00103.warc.gz | en | 0.926783 | 488 | 2.796875 | 3 |
Outbreaks of human illness caused by enteric pathogens such as Salmonella are increasingly linked to the consumption of fruits and vegetables. Knowledge on the factors affecting Salmonella proliferation on fresh produce therefore becomes increasingly important to safeguard public health. Previous experiments showed a limited impact of pre-harvest production practices on Salmonella proliferation on tomatoes, but suggested a significant effect of harvest time. We explored the data from two previously published and one unpublished experiment using regression trees, which allowed overcoming the interpretational difficulties of classical statistical models with higher order interactions. We assessed the effect of harvest time by explicitly modeling the climatic conditions at harvest time and by performing confirmatory laboratory experiments. Across all datasets, regression trees confirmed the dominant effect of harvest time on Salmonella proliferation, with humidity-related factors emerging as the most important underlying climatic factors. High relative humidity the week prior to harvest was consistently associated with lower Salmonella proliferation. A controlled lab experiment confirmed that tomatoes containing their native epimicrobiota supported significantly lower Salmonella proliferation when incubated at higher humidity prior to inoculation. The complex interactions between environmental conditions and the native microbiota of the tomato crop remain to be fully understood.
Keywords: Climate; Food safety; Human pathogens; Plant-pathogen interactions; Produce.
Copyright © 2017 Elsevier Ltd. All rights reserved. | <urn:uuid:52a63b55-37a6-4245-90c2-c444f92bff62> | CC-MAIN-2020-45 | https://pubmed.ncbi.nlm.nih.gov/28576373/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107906872.85/warc/CC-MAIN-20201030003928-20201030033928-00714.warc.gz | en | 0.918577 | 272 | 2.75 | 3 |
- Development & Aid
- Economy & Trade
- Human Rights
- Global Governance
- Civil Society
Wednesday, September 28, 2022
BUSAN, South Korea, Nov 29 2011 (IPS) - Although there has been considerable progress towards reducing maternal and infant mortality, millions of women and children in Africa are still in need of better health services, food and sanitation.
Statistics by Save the Children, an international non-government organisation, reveal that African countries claim nine out of ten bottom places in a worldwide maternal health ranking that involves 164 countries.
Ben Philips of Save the Children says, “These reductions are not at the rate envisaged when the Millennium Development Goals (MDGs) were launched in 2000. Eleven years later, many countries are still a long way behind the set targets.”
As a consequence of the outcry provoked by high maternal and infant deaths, the 2000 United Nations summit bound every member state to achieve the MDGs – eight development targets.
Towards this end, MDGs 4 and 5 are geared towards reducing infant mortality and improving maternal health, respectively. Consequently, these countries were mandated to reduce by two-thirds the mortality rate among children under five and reduce by three-quarters the maternal mortality ratio.
As the Fourth High Level Forum on Aid Effectiveness (HLF 4) takes shape in Busan, one question is if women and children in Africa can expect any tangible results from the conference in this South Korean port city.
According to Philips, there is little for them. “Unfortunately, the Busan Outcome document, which basically summarises the Forum’s platform for action beyond the conference, isn’t ambitious enough to improve aid effectiveness. For instance, there is no strong commitment to untie aid.”
Experts on aid in Busan say that if donors had shown a strong commitment to untie aid as an outcome of the ongoing conference, this would have increased aid by 15 to 30 percent, consequently increasing the value of aid.
And this is not the only way in which donors are letting African women and children down. Although the G-8 countries, comprising the world’s richest nations, committed to ensuring that 0.7 percent of their budget goes to aid. None of them has actualised this commitment.
Britain has, however, promised to meet this commitment by 2013.
“There’s a clear aid deficit that makes it difficult for poor countries to channel money into sector budgets towards improving health services by employing qualified nurses and even having more health facilities in areas where the poor can easily access them,” said Dan Badoo, a policy researcher.
But donors are not the only ones letting women down. Eleven years since the Abuja declaration, where African heads of states committed themselves to allocate at least 15 percent of their national budgets to lighten the disease burden that women carry, there is little to show on the ground.
According to Save the Children, only six out of 53 African Union member states have so far met this commitment. They are: Rwanda, Botswana, Niger, Malawi, Zambia and Burkina Faso.
Despite the devastating impact that genocide had on the Rwandans, the country has become a model example of prioritising the health of women and children.
Consequently, according to UNFPA, the maternal mortality rate in Rwanda dropped from 750 per 100,000 live births in 2005 to 540 in 2008. Government statistics now show 383 deaths per 100,000 live births.
Philips says, “Malawi is one of the pioneer countries devoting 15 percent of its budget to health, saving an estimated 13,000 lives.”
Kenya is one of the countries lagging behind in this commitment with a paltry budget allocation of about five percent and the results are as expected. In the recent MDG progress report of 2010, Kenya is one of the countries which has made the least progress in achieving MDG 5.
Say Badoo: “Against this background, the connection between aid and saving lives is clear. Aid effectiveness is about delivering social services that enable people to live decent lives and exploit their potential.”
Mothers dying while giving birth in a shanty in Old Fadama or the Jamestown slums in Accra, Ghana or Kibera slums in Kenya or Kyalisha in South Africa is a reflection that African heads of state are not taking the health of women and children seriously.
“When we say that this is the HLF 4, it all sounds so technical and elitist, but what the ordinary, poor persons really need is to experience how healthy aid can improve their lives, can give them better quality livelihoods and save dying mothers and infants,” Philips said.
This story includes downloadable print-quality images -- Copyright IPS, to be used exclusively with this story.
IPS is an international communication institution with a global news agency at its core,
raising the voices of the South
and civil society on issues of development, globalisation, human rights and the environment
Copyright © 2022 IPS-Inter Press Service. All rights reserved. - Terms & Conditions
You have the Power to Make a Difference
Would you consider a $20.00 contribution today that will help to keep the IPS news wire active? Your contribution will make a huge difference. | <urn:uuid:d2a184e7-744c-47f6-a3dc-4774f3060408> | CC-MAIN-2022-40 | https://www.ipsnews.net/2011/11/lsquonothing-at-busan-for-african-women-childrenrsquo/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335254.72/warc/CC-MAIN-20220928113848-20220928143848-00108.warc.gz | en | 0.938352 | 1,127 | 2.578125 | 3 |
Here's the latest article from the Library Sciences site at BellaOnline.com.
Bicycle Safety -- Books and Activities
Young patrons need to know the importance of bicycle safety. This program provides a lesson for six to eight year olds and accompanying books.
Authors & Illustrators
Information about authors and illustrators of books.
No Surprise To Librarians
It is not a shock to librarians that teachers do not read children's literature. Many education programs do not require teachers to take a children's literature class. Many times when librarians try and introduce new authors or titles to teachers they are met with blank stares and sometimes hostility.
"Research into teachers' reading habits by the Centre for Literacy and Primary Education (CLPE) has found that many do not regularly read children's literature, and tend to choose books from a narrow band of authors."
Please visit librarysciences.bellaonline.com for even more great content about Library Sciences.
To participate in free, fun online discussions, this site has a community forum all about Library Sciences located here -
Help our newsletter to grow and pass it on to a friend in or outside the library.
Paula Laurita, Library Sciences Editor
One of hundreds of sites at BellaOnline.com | <urn:uuid:18147f9e-7699-467d-96c3-8e4efe4e92f2> | CC-MAIN-2016-50 | http://www.bellaonline.com/newsdtl.asp?name=librarysciences&date=5/23/2008%208:04:20%20PM | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541783.81/warc/CC-MAIN-20161202170901-00401-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.86845 | 261 | 2.890625 | 3 |
Many everyday foods and drinks are in fact fermented, including chocolate, coffee, cheeses, breads, cured meats, soy sauce, and vinegars. The science of fermentation is understood as a chemical process by which food is exposed to bacteria and yeasts which preserve it. You don’t need to understand the science in order to make it work. Historically, fermentation was fundamental to extend the life of perishable foods, before the advent of refrigeration. Fermentation is a great way to preserve foods when we encounter gluts in the garden, or when your favourite vegetable is in season and the shops are full of it.
If you feel intrepid about fermentation, why not start with a simple refrigerator pickle? This is not a ferment as such, but will preserve almost any vegetable quickly and simply, introducing your palate to the tangy taste of fermented foods. Cucumber pickle is a sandwich favourite.
Here is a quick and easy recipe:
900g (2lb) unpeeled cucumber
3 small white or red onions
350g (12 oz) sugar
2 level tablespoons salt
230g (8 floz) cider vinegar
Choose firm fresh cucumbers without bruising. Slice as thinly as possible. A mandoline (slicer) is very useful for this. Slice the onions thinly also. Combine the remaining ingredients and pour over the layers of the cucumber and onion slices. Store the pickle in the fridge in a tightly sealed container. After about 3 hours it will be ready to eat. Cucumber pickle tastes great in a sandwich with leftover meats.
Another great way to get longevity out of vegetables throughout the year is through the process of lactic acid fermentation. Sauerkraut is one delicious foodstuff that can be produced by this process. It has a unique sour taste that can be addictive! Sauerkraut can be eaten cold or hot. It goes particularly well with pork. Sauerkraut is a good bet for the simple reason that it can be a challenge to use up a whole head of cabbage in a single household. Thumbs up for bacon and cabbage, coleslaw, and a little shredded cabbage thrown in to a stir fry but sometimes those heads are so sizeable that they become tricky to use up. Additionally, sauerkraut is full of healthy bacteria that is good for your gut.
See here for a how-to of sauerkraut. | <urn:uuid:27e485a3-6c8c-4b14-bc77-8ccec7441d75> | CC-MAIN-2020-50 | https://stopfoodwaste.ie/resource/fermenting | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141188947.19/warc/CC-MAIN-20201126200910-20201126230910-00531.warc.gz | en | 0.932484 | 502 | 2.734375 | 3 |
Earliest mammal ancestor described Share This: UPI 2/8/2013 8:17:44 PM NEW YORK, Feb. 8 (UPI) -- A small, half-pound animal with a long furry tail, living on insects, was the common ancestor of almost all mammals, including humans, U.S. researchers say. Scientists completing a 6-year study of the mammalian family tree have identified Protungulatum donnae, a previously little-regarded occupant of the fossil record, as the earliest ancestor of 5,400 living species of placental mammals, The New York Times reported Friday. Placental mammals are creatures that nourish their young in utero through a placenta before a live birth. Researchers used a combination of genetic and anatomical data, publicly available in a database dubbed MorphoBank, to establish the ancestor emerged within 200,000 to 400,000 years after the great dying off of dinosaurs at the end of the Cretaceous period. The study looked "at all aspects of mammalian anatomy, from the skull and skeleton, to the teeth, to internal organs, to muscles and even fur patterns" to determine what the common ancestor likely looked like, project member John R. Wible, curator of mammals at the Carnegie Museum of Natural History in Pittsburgh, said. | <urn:uuid:21020363-f5fd-4c22-ac48-5626c0cd8703> | CC-MAIN-2014-15 | http://www.breitbart.com/system/wire/upiUPI-20130208-150611-8648 | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538022.19/warc/CC-MAIN-20140416005218-00522-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.91565 | 264 | 3.359375 | 3 |
Historian notes that Reagan wanted torturers put on trialHistorians in the News
If water boarding is torture and a crime according to U.S. and international laws, shouldn't the United States bring some people to trial? President Obama insists we need to move ahead rather than prosecute, and this week he seemed to downgrade torture from a crime to a “mistake.”
An earlier President had another opinion. On May 20, 1988 when he sent the global Convention Against Torture Treaty to the Senate for ratification, President Ronald Reagan urged this way to proceed.
“The United States participated actively and effectively in the negotiation of the Convention. It marks a significant step in the development during this century of international measures against torture and other inhuman treatment or punishment. Ratification of the Convention by the United States will clearly express United States opposition to torture, an abhorrent practice unfortunately still prevalent in the world today.
“The core provisions of the Convention establish a regime for international cooperation in the criminal prosecution of torturers relying on so-called 'universal jurisdiction.' Each State Party is required either to prosecute torturers who are found in its territory or to extradite them to other countries for prosecution.” [Emphasis added]
Do you feel this view should be more widely circulated?
comments powered by Disqus
Neal Salisbury - 5/7/2009
Reagan's insistence that the US, along with others signatories of the Geneva Convention, "is required either to prosecute torturers or to turn them over to other countries for prosecution" should indeed be more widely circulated--throughout the blogosphere, to the MSNBC talk shows, and on to the "mainstream" media.
- The History Briefing on the 30th Anniversary of the Fall of the Berlin Wall
- History Says Bloomberg 2020 Would Be a Sure Loser
- Then and now: How Trump impeachment hearing is different
- Poland asks Netflix to make changes to documentary about Nazi death camp guard
- What is a caliph? The Islamic State tries to boost its legitimacy by hijacking a historic institution
- Historian James McPherson Interviewed by the World Socialist Web Site on History of Slavery and NYT's 1619 Project
- Black Perspectives Publishes Online Forum: "Researching, Teaching, and Embodying the Black Diaspora"
- Distinguished professor, civil war historian James I. “Bud” Robertson Jr. passes away
- Noel Ignatiev, scholar who called for abolishing whiteness, dies at 78
- Historians Elizabeth Catte, Rebecca Solnit, and Peniel Joseph Quoted in Washington Post Article, "The Democrats Are Moving Left. Will America Follow?" | <urn:uuid:5fcc550f-44da-4239-9af1-73aad7635910> | CC-MAIN-2019-47 | http://hnn.us/roundup/entries/81748.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670036.23/warc/CC-MAIN-20191119070311-20191119094311-00470.warc.gz | en | 0.920971 | 555 | 2.546875 | 3 |
The following definitions and terminology are taken from the 2012 American Association of State and Highway Transportation Officials (AASHTO).
» A segment of street, or series of contiguous street segments, that has been modified to accommodate through-bicycle traffic and minimize through-motor traffic.
» Another common term for a bicycle boulevard is a Neighborhood Greenway.
» The portion of the roadway contiguous with the traveled way that accommodates stopped vehicles, emergency use, and lateral support of sub-base, base, and surface courses. Shoulders, where paved, are often used by bicyclists.
Shared Use Path
» A bikeway physically separated from motor vehicle traffic by an open space or barrier, either within the highway right of way or an independent right of way.
» Shared use paths also may be used by pedestrians, skaters, wheelchair users, joggers, and other non-motorized users.
» Most shared use paths are designed for two-way travel. Its minimum width is 10 feet.
» It is separated from vehicular traffic either by a barrier or a minimum lateral separation of 5 feet.
Protected Bike Lane
» On-street bike lane with some kind of protection from moving vehicles.
» Protection could come from bollards, parked cars, planters, or curbs.
Buffered Bike Lane
» A bicycle lane accompanied by a designated buffer space, separating the bicycle lane from the adjacent travel lane.
Traditional Bike Lane
» A portion of roadway that has been designated for preferential or exclusive use by bicyclists with pavement markings and signs, if used.
» It is intended for one-way travel, usually in the same direction as the adjacent traffic lane (unless designed as a contra-flow lane).
» A pavement marking symbol that assists bicyclists with lateral positioning in lanes too narrow for a motor vehicle and a bicycle to travel side-by-side within the same traffic lane.
» A segment of road designated by a jurisdiction having authority with appropriate directional and informational markers but without striping, signing and pavement markings for the preferential or exclusive use of bicyclists.
» Not a specific facility but merely a designation; however, they are essential in encouraging continued travel between other major bicycle facilities
» That portion of a street or highway right of way, beyond the curb or edge of roadway pavement, which is intended for use by pedestrians.
» Services provided on a repetitive, fixed schedule basis along a specific route with rubber-tired passenger vehicles stopping to pick up and deliver passengers to specific locations; each fixed route trip serves the same origins and destinations.
» Vehicles may be powered by diesel, gasoline, battery, or alternative fuel engines contained within the vehicle.
» This definition does not include demand responsive and vanpool services. | <urn:uuid:39536a55-ff69-4d07-a2ef-1567740a77fa> | CC-MAIN-2018-51 | http://katsmoves.org/facility-types/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827097.43/warc/CC-MAIN-20181215200626-20181215222626-00099.warc.gz | en | 0.923927 | 570 | 3.390625 | 3 |
Marijuana growers gobble up electricity, but Michigan pot law doesn't address energy efficiency
LANSING — Pot is a power-hungry crop.
Indoor marijuana grow facilities gobble up massive amounts of electricity, prompting a push from some environmental advocates for energy efficiency in the industry.
Michigan's marijuana laws do not directly address energy efficiency, but some utilities say they will work with growers to help them cut back on electricity.
A national 2018 report estimated legal cannabis cultivation ate up 1.1 million megawatt hours of electricity in a year, enough to power 92,500 homes.
That usage will only grow as more states legalize the recreational and medical marijuana industries.
Electricity usage among cannabis cultivators is expected to increase 162% nationwide between 2017 and 2022, according to researchers with New Frontier Data, a firm that studies cannabis.
On average, a marijuana grow facility uses 70 times more electricity for lighting than a commercial office building, the researchers found.
Marijuana has long harvest cycles and flourishes under sustained periods of direct light. To create ideal moisture and temperature levels, cultivators crank up heating, ventilation and cooling systems.
Outdoor farms use less electricity
Greenhouses and outdoor farms are less energy intensive since they rely on sunlight.
In the Midwest, where weather is inconsistent, most grow facilities are indoors.
Indoor cultivators use 18 times more energy than outdoor growers to produce one gram of cannabis. And indoor marijuana farms emit nearly 25 times more carbon compared to outdoor facilities, according to New Frontier Data.
Carbon-dioxide emissions, often a byproduct of fossil fuels, are a major contributor to climate change.
Michigan law does not require grow facilities to operate completely indoors, but it does specify that marijuana plants at the facilities cannot be visible to passersby. State rules require outdoor commercial growers to keep the plants behind locked fences or other enclosures.
Commercial recreational marijuana growers are starting to go online in Michigan, after voters legalized recreational use of the drug in 2018.
Medical marijuana has been legal in Michigan since 2008 and commercial medical grows have been operating legally in the state for more than a year.
Michigan doesn't track cultivator energy use
Granular data on energy use at cannabis grow facilities is lacking, in part due to the drug's illicit history, said Molly Graham, a senior program manager for the Midwest Energy Efficiency Alliance, an environmental advocacy group. The alliance has pushed states, including Illinois, to regulate energy efficiency in the cannabis industry.
Cannabis remains illegal at the federal level, but more than 30 states have legalized marijuana in some form.
Furthermore, many businesses are hesitant to release details about their growing processes, including how they use lighting and HVAC systems.
"Growers kind of see it as their secret recipe to growing a quality product," Graham said.
Illinois has stricter efficiency standards
State and local governments should require commercial cannabis growers to submit reports on energy usage, Graham said. The data could be released in aggregate or anonymous form.
Illinois will require growers to submit reports on their energy usage. Recreational marijuana becomes legal in the prairie state on Jan. 1.
Michigan's marijuana laws do not include energy reporting requirements.
David Harns, a spokesman for the Michigan Department of Licensing and Regulatory Affairs, said he was not aware of energy efficiency incentives offered specifically to marijuana growers at the state level.
In Illinois, state law mandates that growers use lighting and HVAC equipment that meets a certain level of efficiency. Michigan's marijuana laws do not include those mandates.
Some governments also are targeting marijuana's carbon footprint.
For example, Boulder County, Colorado requires marijuana growers to pay a surcharge if they don't buy local renewable energy to offset their electricity use.
Local regulations don't address energy
Lansing requires marijuana businesses to obtain a city license in addition to a state license, but the city's scoring criteria does not award points based on applicant's plans for energy efficiency.
The city could license up 75 medical and recreational cultivators through 2020. In 2021, Lansing will reduce its cap on growers to 55 licenses.
Neighboring East Lansing also allows cannabis cultivators, but the issue of energy efficiency did not come up when City Council discussed its marijuana ordinance, Mayor Ruth Beier said. East Lansing's ordinance doesn't cap the number of marijuana grow facilities citywide, but the city's zoning rules limit the proliferation of the facilities.
Even in the absence of local and state regulations, utilities should encourage energy efficiency at cannabis farms, Graham said.
Utilities can work with growers
In Michigan, Consumers Energy offers cannabis facilities the same energy efficiency rebates that are available to any other business, spokesman Brian Wheeler said.
The public utility serves 1.8 million electric customers in Michigan's Lower Peninsula, including 110,000 customers in Ingham, Eaton and Clinton counties.
The demand for electricity through Consumers Energy typically grows 1 to 2% each year, and the utility is not projecting a more substantial increase because of the cannabis industry, Wheeler said.
Nonetheless, Consumers plans to monitor the situation and, if necessary, adjust production, he said.
"We are aware that the marijuana growing business can be energy-intensive," Wheeler said. "They're like a large farming operation or a factory."
The Lansing Board of Water & Light, which serves more than 97,000 electric customers in the Lansing area, does not track the number of marijuana grow facilities in its service territory, General Manager Dick Peffley said.
The city-owned utility has surplus energy to sell each year and officials do not expect the demands of the cannabis industry to create problems, Peffley said.
The BWL does not offer incentives specific to cannabis businesses, but that industry could access incentives available to any customer, Peffley said. That includes rebates and energy-use audits.
Bottom line could motivate cannabis industry
Graham recommends that growers notify their local utilities before setting up shop. That way officials can advise growers on installing equipment for maximum efficiency.
"I think sometimes the utilities don’t find out about these customers until these pieces are selected." Graham said.
Growers can shrink their utility bills relying on sunlight when possible while supplementing with LED lights. And businesses can schedule their watering and HVAC systems to avoid peak-use charges.
Green Peak Innovations, which operates two large-scale grow facilities in the Lansing area, obtains energy from the BWL and spends about $100,000 each month on utilities, according to information provided by the company.
To reduce its energy footprint, Green Peak uses LED lights and solar panels.
"We were keenly aware that cannabis is a utility-heavy business, even before we kicked off our operations," Joe Neller, Green Peak's co-founder and chief government affairs officers said in a statement provided through a spokesman. "That’s why energy efficiency was a focus during the design and build process of our cultivation facilities."
As growers produce more cannabis, potentially driving down prices in Michigan, the bottom line might have more influence than governments and utilities, Graham predicted.
Energy can account for 20% to 50% of an indoor grower's operating costs, according to the Southwest Energy Efficiency Project.
For many growers, going green could become a financial imperative.
Reporter Sarah Lehr can be reached at (517) 377-1056 or firstname.lastname@example.org. Follow her on Twitter @SarahGLehr. | <urn:uuid:37806974-88fc-4a76-b7f0-c172bb2df89a> | CC-MAIN-2022-05 | https://www.lansingstatejournal.com/story/news/2019/12/12/growing-cannabis-power-hungry-business-michigan-prepared/2629729001/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304686.15/warc/CC-MAIN-20220124220008-20220125010008-00529.warc.gz | en | 0.941164 | 1,539 | 2.53125 | 3 |
In my last blog post, I talked about some of the characteristics of a university designed for the 21st Century. In this one, I focus on what a university should be like in his post-scarcity age that we are in now.
Universities evolved during the industrial age, and many of the things regarded as key processes are industrial in nature and designed to aggregate scarcity. In the industrial age, content was scarce, so universities had physical libraries to aggregate content. Vehicles for delivering content were scarce, so they aggregated knowledgeable people, the academics, and used them primarily as content delivery tools. Because of the need for aggregation, the locations to learn were scarce, so we built sites to aggregate demand and supply, and designed classrooms as spaces within which academics could deliver content to a critical mass of students. The number of students in a classroom has, over time, been increased in most publicly-funded universities eroding the relationship of teacher with students. Recognising the limitations of lecturing to large classes, some universities have adopted a supplementary mechanism of smaller group tutorials run by less knowledgeable and therefore less scarce resources.
Assessment in such scarcity-based industrial settings was difficult, and the system could not bear the cost of meaningful assessment of actual learning, so primitive summative assessment mechanisms (tests, exams) were designed. Thus, so-called assessment was also industrialised, and abstracted away from the learning it was meant to assess. Under this system, the person delivering the content was given the task of assessing the effectiveness of its delivery and assimilation. Assessment was largely based on memory, and ability to express it in very primitive versions of the written form.
Of course, this description is a bit of an exaggeration, but this basic model remains the mainstay of universities around the world despite the fact that the key things aggregated are no longer scarce, or where they are scarce that scarcity is largely artificially maintained. For example, the primitive written forms of assessment are easy to duplicate, so expensive tools to check for plagiarism have been created to prevent cheating under these industrial methods.
There is no reason for content to be scarce in the digital world, so laws have been extended, technologies developed, and paywalls erected to to ensure that businesses that profited from genuine scarcity continue to profit from artificial scarcity. To counter this, movements towards open access and open educational resources have come into being and grown rapidly. For this reason, many digital learning assets are becoming less and less scarce.
A university built for the innovation economy should be designed from the ground up to take advantage of this era of growing abundance, and should not overly replicate the aggregative functions based on the scarcity of the industrial age, unless such resources are actually scarce. While there may sometimes be a need for classroom-based teaching, most learning should be based on activities that have a strong element of collaboration. This should happen in projects around which learning must happen in order to complete the course or programme successfully. A project initiative may also adopt a classroom approach for short periods where specialised knowledge is required in a short period of time.
Projects should be based around creating a business that meets some consumer or social need, or solving social challenges that we face as a nation and the world. Students in the institution should be encouraged to think big, solving some of the biggest challenges in the world today, or creating a future that has not yet even been imagined.
The following are some areas of the institution, and examples of what it means when tackled from an abundance perspective.
|Area||Examples of application|
|Design of the learning process||Main learning activities happen outside of the traditional classroom; designed to incorporate open educational resources; where appropriate open data can be used for analysis; supplemented with classroom learning where necessary, but chunked according to need; extensive use of MOOCs and other online learning opportunities.|
|Design of the learning spaces||Learning spaces are configurable; group work and group learning activities are supported; project spaces predominate; significant learning happens in socially-interactive online spaces; learning can happen anywhere, inside or outside of the institution.|
|Design and access methods for learning content||Access to learning content should be electronic as this is cheaper and makes a broader range of content available for the same cost; students create and share their own content;|
|Blend of technology and face to face approaches||Where lecture-based teaching is used, topics covered will also be made available in video format; webinars will be used and key role-players in the world will be asked to provide webinars where appropriate; e-learning technology will be used to enhance classroom teaching, as well as to provide learning opportunities outside the scope of lecture times; face time will be used for solving challenges, assessing progress, and planning next steps.|
|Way in which the academics are appointed, rewarded and promoted||Academics will be appointed based on their academic standing, will have a strong online presence and familiarity with social tools for education and research; they will be willing to use new teaching-and-learning methods, and think differently about education; where excellent academics are available but do not meet these criteria, they will be assisted with providing online resources; promotion will include both research and teaching portfolios as well as involvement with incubators and fostering entrepreneurship or solving societal challenges.|
|Requirements for academic publication||To foster abundance thinking, academics will be encouraged to publish in open access journals. Paywalled journals will carry 0.5% of the value of open access journals when used in evaluations.|
|Structure of programmes||Academics will have flexibility in the design of their programmes, creating an appropriate mix of learning and research activities, as well as fostering entrepreneurship and innovation where possible. Programmes will be structured around key opportunities, not around disciplines.|
|Expectations that students have of the institution||Students will expect a good library with access to a contemporary complement of research journals and books; E-learning resources will be available learning, but learning management systems per se will not be used. Access will be given to open source software, open educational resources, open technology, open access journals, open data, and open hardware. Innovation will be fostered, and appropriate remix defined and rewarded.|
|Expectations the institution has of students||Students should be comfortable and confident to learn concepts on their own with resource materials under some circumstances, or in a collaborative and networked way. This independence will be developed and encouraged.|
|Rigidity of the walls, both physical and metaphorical||Institutional spaces should be reconfigurable where possible. Metaphorically, courses offered by other institutions, for example via MOOCS may be used to obtain credit. Students may participate in courses at approved universities for credit. Students may design some of their own courses, have them pre-approved and then have them assessed through an appropriate body of evidence.|
Abundance-based thinking also holds many opportunities for new kinds of businesses. This institution must form partnerships with people who are attempting to advance abundance thinking and create opportunities for innovation around the notion of abundance. Abundance-based thinking also suggests a strong focus on open innovation, linked to Free and Open Source Software, Open Content / Open Educational Resources, and Open Hardware.
While some changes have occurred as a result of technology being applied to education, mostly they have created niches, rather then disrupting higher education as a whole. Content delivery mechanisms such as Moocs do not work for most students, and this is demonstrated by their massive dropout and failure rate. Data-driven initiatives, such as those initiated by the Khan Academy on top of high quality content resources, have added incremental possibilities, but not really done significant distruption. The promise of e-learning has not been met, with most e-learning initiatives being simply following educational worst practice, and making it worse with technology badly applied, hardly disruptive.
The real disruption of education, at least of the teaching of theory, will happen when Artificial Intelligence (AI) reaches a point where it can be applied to teaching-and-learning, is able to help build personalised learning for students with different capabilities, and can carry out the assessment tasks that are so difficult to scale. This will happen in the next 4-10 years, and the institution should both be prepared for it, and be at the forefront of research and commercialisation of AI in education.
This imagined institution must be prepared for ensuring that AI is use wisely to supplement the activities of great academic staff, in-line with sustaining an abundance thinking. If it does’t do this, it will be disrupted, just like every other institution. If it does so, it has a chance to be one of the disruptors, rather than a victim of them, and scale the business of higher education accordingly. The best way to predict the future is to create it.
Such an institution could be a viable business in South Africa, and make a valuable contribution to the innovation economy. | <urn:uuid:e47a7e4e-a47f-4bbe-85a0-2cb502936f1f> | CC-MAIN-2017-34 | http://blog.dkeats.com/index.php/2017/06/19/a-post-scarcity-university-for-the-innovation-economy/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105970.61/warc/CC-MAIN-20170820034343-20170820054343-00369.warc.gz | en | 0.956927 | 1,842 | 2.578125 | 3 |
Between the grace and rhythm of oldstyle typefaces, with their serifs inspired by the pens of calligraphers, and sans serif typefaces, with their uniform strokes and modern look, there are several other groups of type designs. One of the most popular, and most useful, are the square serif typefaces, also known as Egyptians or slab serifs.
A lot of people tell me they can’t tell the differece between one typeface and another, but you won’t have any trouble recognizing square serif typefaces.
Like oldstyles, they have serifs, and their serifs are even more pronounced. And like sans serif typefaces, they usually have uniform stroke weights.
You might wonder why these designs are called Egyptians. The term derives from a fad for everything Egyptian in the early nineteenth century, following Napoleon’s Egyptian campaign. Apparently typefounders jumped on the bandwagon, and called the new square serif typefaces used for advertisements “Egyptian” and the name stuck, except in England, where they already had an “Egyptian” typeface. They used the term “Antique” instead.
Four Varieties of Square-Serif Typefaces
There are four distinct varieties of these typefaces, each with a different origin.
- Clarendon—This famous British typeface has more varied serifs than the usual slab-serif typeface. You might be familiar with it from signs like this in the National Parks. Note that Clarendon has variation in its stroke weights, one of the ways to recognize it.
- Neo-grotesque—These typefaces are characterized by even stroke weights and plain serifs. The letterforms work well as sans serif styles also, and are modeled on the Grotesque typefaces of the early part of the twentieth century.
- Italienne—Here the serifs become much heavier in relation to the stroke weight of the letters, which gives the designs a very dramatic effect. One example is Playbill:
- Typewriter—Yep, the plain old typewriters that are still in use almost always use slab-serif typefaces, which are highly legible and generally simple letterforms. The most common, of course, is good old Courier, but typefaces like American Typewriter, probably the most graceful typewriter-style square serif, are also derived this way.
More on Square Serif Typefaces
Some other notable square serif typefaces are Memphis, Serifa, and the graceful, transitional typeface Chaparral. Each of these type designs shares in the character of the square serifs: they are solid, strong, full of purpose, powerful. What they trade in gracefulness they make up in emphasis.
Square serif typefaces give an air of solidity and stability to your design. They blend easily with sans serif faces. The more graceful square serif fonts can be used for body copy, and in their bolder variations make impressive display fonts.
Sometimes even one letter of a square serif font can be powerful enough to represent an entire brand, and square serifs are often used to convey stability in the corporate world.
If you haven’t tried square serif fonts in your book designs, give them a try. To get started, here are some free fonts you can download today and use for experiments. These are all from the useful FontSquirrel.com site for free fonts.
There’s almost no limit to the ways you can use square serif typefaces. In their light weights, they have a grace and purity of line. In their heavier weights, they communicate density and power better than any other fonts.
One of the most enjoyable parts of graphic design is trying new fonts and finding new ways to present valuable material. Although I recommend old style typefaces almost exclusively for book text, the display elements in books—title page, chapter and part openings, opening pages of front matter and back matter—are wide open for experimentation and invention in communicating your message to your readers.
It’s in that role that square serif typefaces really shine. Get to know one today, you’ll be glad you did. | <urn:uuid:44866bc5-68e8-445e-b34c-3352e63f3c81> | CC-MAIN-2014-42 | http://www.thebookdesigner.com/2011/05/square-serif-fonts-pack-a-typographic-punch/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507449153.0/warc/CC-MAIN-20141017005729-00158-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.934855 | 884 | 2.5625 | 3 |
A few days ago I wrote about an artificial intelligence startup, Vicarious, which demonstrated software that breaks the widely used - and much disliked by users - CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) used to prevent software run by the bad guys from automating the creation of, and hacking into, accounts on Web sites.
The reason CAPTCHA is disliked by users is that it's become hard even for humans to pass the test; the distorted images employed have become so difficult to read most people have a significant trouble decoding the text and, as a consequence, often give up when creating accounts and using services.
A new company, Keypic, may have the answer to these problems by doing away with CAPTCHA altogether and replacing it with their own eponymously named verification system. In fact Keypic can not only rate how human a user is but can also detect spam submitted as comments.
Keypic works by presenting whatever form you please along with an image. The image can be as minimal as a single transparent pixel or it can be a logo or even an advertising banner . The purpose of the image is to ensure that it's retrieved (most hackers' automation won't bother with graphical elements, they'll usually just retrieve the form, fill it and then submit it).
Whether the image is retrieved is just one of the ten or so data points Keypic checks. Other data points include how long it takes for the form to be submitted (which reveals software that tries to submit at a high rate), what order are the fields filled in, what the IP address is, what browser is being used, how many requests are received per minute from a single IP address, and the characteristics of any text entered into fields other than name and password.
The data points are analyzed by comparing them to Keypic's database of thousands of other form submissions and a score calculated as to how fake the submission is considered to be. You can then decide based on that score whether to accept and act on the form data or reject the submission.
For a program to get past Keypic would require that it behave in a very human way taking enough time to respond, downloading all page content, limiting the submission rate from any single IP address, and so on. To defeat this range of tests would require some pretty creative coding and that's the key to detecting non-human interactions.
The client-side of Keypic is free and open source while the backend that actually determines the score is proprietary and closed source. Keypic is currently available as a plugin for WordPress, Drupal, Joomla, and TYPO3 as well as a REST Web service, a PHP Class, an for ASP and ASP.NET.
My only reservation about Keypic is that although the company is based in the US (in Walnut, CA, in Silicon Valley) their Web site is a horrible mess of poor design, misspellings, weak explanations, and broken links.
So, is Keypic more effective than CAPTCHA? That all depends on what you value. If you believe that you're losing traffic and users because CAPTCHA tests put them off then there's a very good reason to use Keypic. As of writing over 5,800 sites are using the system and over 113.5 million spam messages have been blocked without CAPTCHAs.
On the other hand if you are adamant that you can't tolerate any non-humans at all accessing your site you might want to stick with CAPTCHA ... remembering, of course, that the test has been shown to be broken at a level that will eventually (and, in fact, sooner rather than later) render it useless. I think my money is on Keypic. | <urn:uuid:fcbced85-3c05-4aa7-8c71-37524a9b0cb6> | CC-MAIN-2016-50 | http://www.networkworld.com/article/2225794/security/keypic--replacing-captcha-without-annoying-users--updated-.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540909.75/warc/CC-MAIN-20161202170900-00240-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.963875 | 763 | 2.5625 | 3 |
Bitcoin has been around for about seven years and it has achieved great heights in such a short span. While bitcoin is already being adopted by a considerable number of people across the world, the technology that powers bitcoin transactions has become a bigger hit. Blockchain technology is behind all bitcoin transactions. Blockchain is a secure and transparent ledger that records each and every transaction that happens over the bitcoin network. All transactions needs to be confirmed on blockchain and the entry recorded to ensure there is no double spending on fraudulent transactions. Apart from bitcoin transactional data, blockchain can also record non-transactional data.
Banks and Blockchains
Blockchain technology has found its way into various applications other than bitcoin transactions. The use of blockchain technology varies from simple laboratory data management applications to secure proprietary financial transaction tools dealing with banking and securities. Recently we have seen banks experimenting with blockchain technology to evaluate its use in their day to day operations. Few banks are already using Ripple network on an experimental basis while a group of international banks work on creating a proprietary blockchain, better known as federated blockchain. The federated blockchain is being created with plans to link all these banks to a network, similar to that of bitcoin network and use the network to transfer funds from one bank/branch to another instantly while bypassing the conventional routes.
Even though the research is currently still in the initial stages, its implementation will not take much time. However, wide spread adoption is another question. Banks and corporations are giants, taking a long time before they could achieve widespread implementation. But once implemented, it may spell doom to bitcoin as we know it today. It is highly unlikely for banks and financial institutions to adopt bitcoin or any other open source technology on an as-is basis. So, the probability of banks adopting their own cryptocurrency or a token is very high.
Once blockchain technology is implemented in banks across the world, the turnaround time for fund transfers will fall rapidly. Banks will be able to process transactions at the same rate as bitcoin transactions. The transaction fees associated with fund transfers will also fall drastically as banks will be able to successfully circumvent SWIFT network and central banks. These benefits will be passed on to customers. In short, banking customers will be able to enjoy almost all the benefits bitcoin currently offers through the banking system. Once banks start processing transactions over blockchain, these crypto tokens used by banks will be readily convertible to local fiat currency without the need of any third party exchanges.
Decentralized no more
Bitcoin is popular mainly because it offers fast, easy and an economical way to transfer funds. If mainstream banking sector begins to offer all these benefits, then people will start opting for conventional banks over bitcoin. In addition to it, few mining pools are growing bigger each day. The top three bitcoin mining pools put together control over 50 percent of the bitcoin hashrate and F2pool alone has a share of close to 25 percent of total available bitcoin hashrate. If the trend continues, bitcoin may not stay decentralized for a long time. Once people realize that the decentralized nature of bitcoin network is about to be compromised, they might start looking for other options. Bitcoin network’s trouble reaching a consensus, if continued will compound the problem and may lead to an early downfall of our much beloved cryptocurrency. | <urn:uuid:f5c131f0-6760-44e3-938a-6e4075a01d16> | CC-MAIN-2018-13 | https://bitcoinschannel.com/banks-bitcoin-and-blockchain-a-recipe-for-downfall/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645943.23/warc/CC-MAIN-20180318184945-20180318204945-00635.warc.gz | en | 0.941823 | 658 | 3.15625 | 3 |
FOUNDATION FOR HOPE
Canada at the opening of the twentieth century has the same population as the United States at the opening of the nineteenth century. Has the Dominion any material justification for her high hopes of a world destiny? Switzerland possesses national consciousness to an acute degree. Yet Switzerland remains a little people. What ground has Canada for measuring her strength with the nations of the world? Having remained almost stationary in her national progress from 1759 to 1859, what reason has she to anticipate a progress as swift and world-embracing as that which forced the United States to the very forefront of world powers? It takes something more than high hopes to build empire. Has Canada a foundation beneath her high hopes? No nation ever had a more passionate patriotism than Ireland. Yet Ireland has lost her population and retrogressed. Why will the same fate not halt and impede Canada?
It may be acknowledged here that Canadians have no answers for such questions and short shift for the questioner. They are too busy making history to talk about it. It is only the woman insecure of her social position who prates about it. It is only the nation uncertain of herself that bolsters a fact with an argument. Canada is too busy with facts for any flamboyant arguments. It is an even wager that if you ask the average well-informed business man in Canada how many miles of railways the Dominion has, he will answer on the dot “almost thirty thousand.” But if you ask if he knows that Germany, for instance, with nine times denser population has barely twice as much trackage—no, your Canadian business man doesn’t know it. He is too busy building his own railroads to care much what other nations are doing with theirs. Likewise of the country’s trade increasing faster almost than the Dominion can handle it. He knows that imports have increased one hundred and sixty-three per cent. in ten years, and that exports have increased almost fifty per cent.; but he doesn’t realize in the least that the Dominion with seven million people has one-fourth as large a foreign trade as the United States with a hundred million people. He knows that immigration has in ten years jumped from 49,000 a year to 402,000; but does he take in what it means that his country with only five million native born is being called on to absorb yearly a third as many immigrants as the United States with eighty million native born? He has been so busy handling the rush of prosperity that has come in on him like a tidal wave that he has not had time to pause over the problems of this new destiny—the fact, for instance, that in two more decades the newcomers will outnumber the native born.
Unless the edifice be top heavy, beneath it all must be the rock bottom of fact. Beneath the tide is the pull of some eternal law. What facts is Canada building her future on? What pull is beneath the tide of four hundred thousand homeseekers a year? What has doubled population and almost doubled foreign trade? | <urn:uuid:699969f5-4215-447e-a2be-1b9e07d3f8bc> | CC-MAIN-2016-44 | http://www.bookrags.com/ebooks/18032/9.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719286.6/warc/CC-MAIN-20161020183839-00518-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.972546 | 624 | 2.703125 | 3 |
Monday, January 21, 2013
What is a backup: Backup is copying data from one place to another in case the original is corrupted
Ø Backups are the secondary copy of primary data. The purpose of backups is to recover primary data if it’s damaged, deleted, or corrupted. Therefore, a backup is a secondary copy of primary data.
Ø Backups recover data that was damaged, deleted, or corrupted. This is the only purpose for backups. If a file is deleted or damaged, you can restore it from backup copies.
What Needs to Be Backed Up: Companies need to back up three types of data:
Intellectual property: This is the information about a company’s core competency.
Customer data: Examples range from scanned copies of patient x-rays to market research information and records about the buying patterns of particular market segments.
Operational data: This last category includes every other kind of data in the organization. It can include data about where organizations purchase supplies to build products to information.
Linux has several tools for backing up and restore which are given below.
dump / restore : Old tools that work with filesystems, rather than files.
Rsync: is a program that behaves in much the same way that rcp does, but has many more options and uses the rsync remote-update protocol to greatly speed up file transfers when the destination file already exists.
tar: A standard backup tool,
cpio : It is hard to use because of the unusual way in which the command must be entered.
dd : The dd command is one of the original Unix utilities and should be in everyone's tool box
Mondo : is reliable. It backs up your GNU/Linux server or workstation to tape, CD-R, CD-RW, DVD-R[W], DVD+R[W], NFS or hard disk partition
Dar: dar is a shell command that backs up directory trees and files.
Many other commercial or free software back up tools are also available, like EMC Networker, EMC Avamar, HP Data Protector, Symantec Netbackup, etc.
There are different kinds of backups
Full backup is a backup of the complete data on the production volumes at a certain point in time. A full backup copy is created by copying the data on the production volumes to a secondary storage device
Restore is the fastest
Backing up is the slowest
The storage space requirements are the highest
Incremental backup copies the data that has changed since the last full or incremental backup, which-ever has occurred more recently.
Backing up is the fastest
The storage space requirements are the lowest
Restore is the slowest
Cumulative (or differential) backup copies the data that has changed since the last full backup. This method takes longer than incremental backup but is faster to restore.
Restore is faster than restoring from incremental backup
Backing up is faster than a full backup
The storage space requirements are lower than for full backup
Restore is slower than restoring from full backup
Backing up is slower than incremental backup
The storage space requirements are higher than for incremental backup
full backup is another type of backup that is used in implementations where the production volume resources cannot be exclusively reserved for a backup process for extended periods to perform a full backup. It is usually created from the most recent full backup and all the incremental backups performed after that full backup. A synthetic full backup enables a full backup copy to be created offline without disrupting the I/O operation on the production volume.
Network Backup: Network backup usually means backing up a client to a backup server, this means the client sends the files to the server and the server writes them to backup medium.
Dump backups are not ordinary file by file backups. The whole disk partition or file system is "dumped" to the backup medium as is. This means it is also necessary to restore the whole partition or file system at one go. The dump backup may be a disk image, which means it must be restored to a similar disk with same disk geometry and bad blocks in same places.
Level 0 to 9 backups are a finer grained version of incremental backups. Level N backup means backing up everything that has changed since a same or lower lever backup. Check the backup can be restored, with original file owners, permissions and timestamps. To be useful, you must be able to restore the backup. Very often not only the contents of file are important, but their time stamps, permissions and owners. Check that you can restore the backup so that all these are preserved.
Backup Methods: - There are two types of methods to deployed for backup Hot backup and cold backup are the two. They are based on the state of the application.
Hot backup: when the backup is performed. In a hot backup, the application is up and running, with users accessing their data during the backup process.
Cold backup: the application is not active during the backup process.
Saturday, January 19, 2013
The term data storage can refer to anything with information recorded on it. Using this broad definition, a hardback volume of an encyclopedia, an audio cassette of a pop song, and even a piece of paper with random words written on it would all be considered examples of data storage. The most popular definition of the term limits it to only the storage of information on computers and similar devices.
Data storage in terms of computer Everything a computer “knows” or is able to “know” is called computer data. This includes e-mails, text files, digital pictures, and databases. Computer data storage is the holding of data in an electromagnetic form for access by a computer processor which can be divided into two main categories: primary data storage and secondary data storage.
Primary data storage: What a computer “knows” at any given time is technically what information a computer’s central processing unit (CPU) can directly access. This information is called memory, and the components that store it are considered primary data storage. Memory is mainly stored on Random Access Memory (RAM). There are many types of RAM, but they usually come in the form of modules that plug into a specific slot inside the computer. Primary data storage is constantly being erased and rewritten, most often from secondary data storage.
Secondary data storage: represents all of the other types of computer data storage not included in primary data storage. Internal hard disk drives, CD-ROM disks, and flash memory sticks are all examples of secondary data storage. Because there are so many different types of secondary data storage, this category can be further divided into three different areas: on-site, removable, and off-site data storage.
Ø On-site data storage represents any type of storage device that is designed to remain with the computer or at a single location where the computer is housed. The most common on-site data storage device is a hard disk drive, and it is included in almost every personal computer. Solid state drives and network attached storage are also examples of on-site storage devices.
Ø Removable data storage is any type of data storage that is designed to be easily removed from a computer. Removable data storage has become more common than on-site data storage in modern times. The big disadvantage of removable data storage used to be that data access time was much slower than on-site data storage, but speed improvements have decreased this penalty to within acceptable limits for many common applications. CD-ROMs, DVD-ROMs, USB flash drives, and portable hard disk drives are all examples of removable data storage. Off-site data storage is one of the most recent types of data storage.
Ø Off-site data storage is stored away from the computer at a distant location. This data can then be accessed either by a direct call or through the internet. Off-site data storage has the advantage of being available if something happens to the on-site computer system.
Storage Architecture’s: In recent years, enterprise data storage has seen explosive growth in demand in the following areas
Ø Capacity – the amount of data storage space is increasing.
Ø Performance – the bandwidth for delivering storage content is growing to match the increased speed of computer processing power, the speed of data communication networks, and the speed requirement of emerging applications such as multimedia applications.
Ø Availability – as people and enterprises become more and more reliant on the content in the data storage
Ø Scalability – the data storage solution must not only be able to satisfy the current storage requirements, but also be easy to grow to address the increased demand of future applications.
Ø Cost – the cost of ownership needs to be reduced.
Storage Models: I will discus later about below three storage models:
>>>Direct Attached Storage (DAS)
>>>Storage Area Networks (SAN)
>>>Network Attached Storage (NAS)
Networker slow backup issue We are facing slow backup issue many times or previously added clients suddenly slow backup issue occurs. ...
When you cannot connect to the networker server by NMC Check from putty if the networker services are running on server by nsradmin...
· Run the below commands from backup server where client resides. recover -c "source client name" -R "desti...
Dell EMC Elect 2017 Today again I am very delighted to inform you all that this was 3rd time I took part in prestigious Dell EMC ELECT... | <urn:uuid:97f6000f-3269-4f0d-ac13-b398e62eda07> | CC-MAIN-2017-51 | http://learnbackupwithmoin.blogspot.com/2013/01/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948520218.49/warc/CC-MAIN-20171213011024-20171213031024-00651.warc.gz | en | 0.940774 | 1,954 | 3.265625 | 3 |
We have all heard about the devastating effects of distracted driving, but how many drivers are actually refraining from activities that can easily cause car accidents?
According to U.S. Department of Transportation, more than 3,000 people were killed in car collisions caused by a distracted driver and an estimated additional 416,000 were injured in motor vehicle crashes involving a distracted driver. In 2009, 20 percent of car accidents with injuries involved distracted drivers.
There are three main types of distracted driving: manual, which is taking your hands off the wheel; visual, which involves taking your eyes off the road; and cognitive, meaning taking your mind off of driving.
Text messaging is particularly dangerous because it affects a driver in all three ways. In fact, a driver who is texting is 23 times more likely to become involved in a car accident than a driver who is not texting, according to the Virginia Tech Transportation Institute. The average amount of time a person takes his or her eyes off the road when texting is five seconds, which amounts to the length of an entire football field if you are traveling 55 miles per hour. Drivers in Jacksonville, Florida, are particularly at risk because the state of Florida has no law banning cell phone use while driving.
Of course, texting is not the only culprit distracting motorists. Talking on a cell phone, even hands-free, is a major distraction. Many other common activities take drivers’ attention away from the road. Simple things like eating, drinking or just talking to passengers can lead to distractions resulting in car accidents. Other pitfalls include grooming, reading a map or looking at a navigation system, or adjusting the radio. Any activity that takes a driver’s attention away from the road is dangerous.
To help reduce car accidents caused by distracted driving, the NHTSA encourages drivers to take a pledge which includes:
• Never texting or talking on the phone when behind the wheel.
• Speaking up if the driver of the car seems distracted.
• Asking friends and family members to drive without using their cell phone. | <urn:uuid:444e1e5a-700a-4256-a18d-8bda25dc6033> | CC-MAIN-2022-40 | https://www.jacksonvilleinjuryattorneyblog.com/take_the_pledge_to_end_distrac_1/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334620.49/warc/CC-MAIN-20220925225000-20220926015000-00152.warc.gz | en | 0.96741 | 415 | 3.25 | 3 |
See what questions
a doctor would ask.
It is claimed by some that the belief that depression is caused by a reduction in levels of the brain chemical called serotonin may not be right. Thus, it is feasible that the idea that selective serotonin reuptake inhibitors can heal depression may also be inaccurate. Proponents of the idea believe that a genetic fault in liver enzymes may inhibit metabolization of the drug resulting in a toxic build up that can lead to adverse reactions such as suicidal tendencies. History has repeatedly shown that health ideas promoted are not necessarily always accurate. For example, postmenopausal women were previously encouraged to take hormones for their health but now they are informed that the hormones may increase their risk of heart attacks and cancer. Some believe there is not enough evidence to support the serotonin idea and people may be taking medications which may not only be ineffective, but may also cause side effects such as impotence, constipation, yawning and other psychiatric disorders such as the recently highlighted suicidal tendencies. Irish authority's skepticism of the benefits of serotonin reuptake inhibitors is expressed by the fact that drug companies are not allowed to promote the theory that chemical imbalances in the brain level of serotonin are responsible for depression.
Source: summary of medical news story as reported by The News Tribune
About: Doubts over the real cause of depression
Date: 26 January 2005
Source: The News Tribune
Author: M. Alexander Otto
http:/ This summary article refers to the following medical categories:
Related Medical Topics
More News Topics
This summary article refers to the following medical categories:
Search Specialists by State and City | <urn:uuid:fe12ec3a-c444-407e-9b41-1a1a5abeb407> | CC-MAIN-2016-44 | http://www.rightdiagnosis.com/news/doubts_over_the_real_cause_of_depression.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719908.93/warc/CC-MAIN-20161020183839-00106-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.959158 | 329 | 3.25 | 3 |
“Working hard is important, but there is something that matters even more; believing in yourself.”
As our pupils progress through the Lower School (Years 1 - 4), they become increasingly independent individuals who are able to take responsibility for their own learning and are ready to seize challenges. We recognise that children develop at their own pace and that each child is completely unique. Through our small class sizes, differentiated teaching and learning opportunities, highly trained support staff and close collaboration with parents, we can truly focus upon each child’s needs.
We place a strong emphasis upon securing children’s basic skills in reading, writing and arithmetic, to equip them with the necessary expertise to explore our broad and varied curriculum and the wider world. Our pupils are not only proud of their achievements but of all the small steps, breakthroughs, setbacks and hurdles overcome that help them to get there no matter what. Being kind, caring and respectful is also integral to our Kitebrook Code of Conduct, which we hold in high regard and expect pupils to follow at all times. In our Lower School, pupils learn to consider the needs of others as well as themselves; through daily Prayers, weekly PSHEE (Personal, Social Health and Economic Education) lessons and our Growth Mindset philosophy that promotes values such as empathy.
The great outdoors continues to feature strongly in the Lower School curriculum. At play times they enjoy their own area complete with swings, slide, monkey bars and climbing equipment. They also have access to a large field in which to run, jump and play freely. Tree climbing is actively encouraged at Kitebrook, as we believe it helps children learn to consider, manage and take risks. Once in Upper School, pupils also have daily access to our adventure playground in the trees. Outdoor Education lessons take place weekly and are designed to bring the curriculum to life with first hand, practical experiences that develop our Growth Mindset values, promote the study of the natural world and enhance other curriculum areas such as Science and Mathematics.
Our Lower School marking policy fully involves the pupils in making judgements and reflections on their own learning, giving them ownership of the journey that they are on and helping them to understand that it is what they do, with the support of the teacher, that will enable them to succeed. | <urn:uuid:f57668ba-e613-430c-aa69-fb71ab35a2f0> | CC-MAIN-2021-39 | https://www.kitebrookpst.org/lowerschool | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057861.0/warc/CC-MAIN-20210926114012-20210926144012-00216.warc.gz | en | 0.96758 | 465 | 2.53125 | 3 |
From: Albert-Ludwigs-Universität Freiburg
Computer models play a significant role in environmental policy, but offer only a partial picture of the industrial system.
Whether it’s electric automobiles, renewable energy, carbon tax or sustainable consumption: Sustainable development requires strategies that meet people’s needs without harming the environment. Before such strategies are implemented, their potential impact on environment, economy, and society needs to be tested. These tests can be conducted with the help of computer models that depict future demographic and economic development and that examine the interplay between industry and the climate and other essential natural systems. Together with his Norwegian and US colleagues, junior professor Dr. Stefan Pauliuk at the Faculty of Environment and Natural Resources at the University of Freiburg undertook the hitherto most comprehensive review of five major so-called integrated assessment models. Published in the scientific journal “Nature Climate Change,” the team’s results show that these models exhibit substantial deficits in their representation of the industrial system, which may lead to flawed estimates of the potential environmental impacts and societal benefits of new technologies and climate policies.
Integrated assessment models create scenarios for the most cost-effective transition toward a sustainable supply of materials and energy while taking the planetary boundaries into consideration. “The scenarios generated by the models are an important instrument for environmental policy-making,” says Pauliuk. “They show that it is technically feasible to achieve a central goal in global climate policy: Namely, to limit average global warming to a maximum of two degrees Celsius compared to the level at the beginning of the Industrial Era.” As a consequence, the model results were important during the preparatory negotiations leading up to the Paris Agreement that came into effect in November 2016 with the intention of mitigating climate change. The models’ results also play a significant role in the latest assessment report issued by the Intergovernmental Panel on Climate Change (IPCC), where they are used to link the mitigation options described for different sectors such as buildings, transport, or energy supply.
“Because the models’ results are so important to decision makers, the questions arises about their validity and robustness,” says Pauliuk. As a result, the researchers paid particular attention to the way in which the models represent the industrial system; that is, the global value chain of production, processing, and use of energy, materials, and consumer goods as well as recycling. The industrial system is the source of all man-made goods. At the same time, it is also the origin of all emissions to the natural environment. But the representation of the industrial system in these models is incomplete, according to the researchers. “In particular, the cycle of materials, for instance of iron and copper, but also the representation of urban infrastructure is completely missing,” explains Pauliuk. This fact may lead may limit the predictive capacity of the models bot more research is needed: “It remains to be shown how ignoring core parts of the industrial system influences the feasibility of certain scenarios to mitigate climate change. In addition, important strategies to reduce emissions such as recycling, material efficiency, or urban density have not been considered at all.” Researchers are now called to expand the models to more accurately describe the cycle of materials and other details concerning the industrial system. The ultimate goal is to obtain more realistic prognoses for climate and resource policies.
For more information please contact the editor. | <urn:uuid:39e4871c-c486-4d35-92ac-340ecec4b050> | CC-MAIN-2017-47 | http://online.seastrata.com/2017/02/improving-prognoses-for-a-sustainable-future/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806086.13/warc/CC-MAIN-20171120164823-20171120184823-00049.warc.gz | en | 0.930197 | 706 | 3.265625 | 3 |
Communication and its importance in Mexican society. Communication is a very important aspect of our society, is the only way in which we can express ourselves among ourselves and communicate our ideas, thoughts and feelings to other people in a clear and effective manner. The purpose of this essay is to demonstrate how to express ourselves we are influencing all those who surround us, either for good or for evil. The essay deals with two important issues; the way we express ourselves with our loved ones and the way we express ourselves with society. In recent months, Mike Shinoda has been very successful. Family is the center of society, in it we grow and we operate, developing every aspect of our personality, thoughts and beliefs. Therefore, it is not strange to observe how the communication in the family completely affects the personality of a person.
I A. Richards defined communication as the way in which we express our experiences to achieve in turn affect those around us and get them to experience a little of our experiences. This way when a family member is Express, all the experiences passed to other family members. The family atmosphere is generally, the environment in which we spent the years most important of our human development when we are children, therefore the type of communication that we experience is crucial for optimal personal development, since children are particularly sensitive to the communication of their parents, in such a way that it affects them until the lack of communication, since it is the only bridge towards an intimacy with our beloved. Therefore I conclude that at the family level effective communication is crucial in the family since it affects people since its birth, affecting his personality completely. This second topic I will talk about how we communicate with other people, and as this has a direct effect on society and our culture. Many people today are not aware of the impact and importance of communication in a social sphere, since usually don’t realize the way in which you communicate is like the true image that These giving to the people that surround you, i. | <urn:uuid:a04cdafe-e0cb-49d0-96e2-342cd73d54c0> | CC-MAIN-2019-43 | http://www.ebwweb.com/express-communication/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987829507.97/warc/CC-MAIN-20191023071040-20191023094540-00448.warc.gz | en | 0.969593 | 398 | 2.671875 | 3 |
Canada beat Denmark 47-0 at the 1949 world hockey championships. new
The term throw one's hat in the ring comes from boxing, where throwing a hat into the ring once signified a challenge. Today it nearly always signifies political candidacy.
The highest mountain in the Western Hemisphere is Mount Aconcagua in Argentina. It rises 22,834 feet above sea level
Every year more people are killed by donkeys than in aircraft crashes.
The Mona Lisa has no eyebrows. It was the fashion in Renaissance Florence to shave them off.
Adelphogamy is a marriage custom in which brothers share one or several wives.
The oldest cricket match was played between the USA and Canada in 1844.
In Seattle, Washington, it is illegal to carry a concealed weapon that is over six feet in length.
Only two people signed the Declaration of Independence on July 4th, John Hancock and Charles Thomson. Most of the rest signed on August 2,but the last signature wasn't added until 5 years later.
The expletive, Holy Toledo, refers to Toledo, Spain, which became an outstanding Christian cultural center in 1085.
The forth railway bridge is a meter longer in summer than in winter due to thermal expansion.
The largest stained-glass window in the world is at Kennedy International Airport in New York City. It can be found in the American Airlines terminal building and measures 300 feet long by 23 feet high.
The only MLB team to have both its city's name and its team name in a foreign language is the San Diego Padres.
Half of the 40 million people currently living with HIV/AIDS are female.
There is about 200 times more gold in the oceans than has been mined throughout history.
In 1952, Mr. Potato Head became the first toy to be advertised on television in the U.S.
The lemur of Madagascar is one of very few of the human species' ancestors that has survived unchanged down the long corridors of evolution. Having developed after the first primates, it is classified as a prosimian, meaning before monkey, and is one of the ancestors common to both monkeys and men.
There is a certain species of kangaroo that is only 2.5 centimetres long when it is born
The blue whale can produce the loudest sound of any animal. At 188 decibels, the noise can be detected over 800 kilometres away
The only king without a moustache in a deck of cards is the king of hearts
The little overhang of bone and feathers over an eagle's eye is there to protect the sensitive eyeball from the mountain and desert sun. It's not meant to make the bird look fierce.
The reason why milk is white is because it contains a protein called Casein, which is white. Milk also contains fat, which is also white
Canada is an Indian word meaning Big Village
The following is said to be the toughest tongue twister in the English language: sixth sick sheik's sixth sheep's sick.
Studies show that couples that smoke during the time of conception have a higher chance of having a girl compared to couples that do not smoke
Every minute in the U.S. six people turn 17.
The male platypus has poisonous spurs on its legs
The San Francisco Cable cars are the only mobile National Monuments
Whale hunting is strictly prohibitted throughout the entire state of Oklahoma.
If Wal-Mart was classified as a country, it would be the 24th most productive country in the world
Each king in a deck of playing cards represents! a great king from history: Spades - King David, Hearts - Charlemagne, Clubs - Alexander the Great, and Diamonds - Julius Caesar.
Caterpillar means hairy cat in Old French
Goats do not eat tin cans, as lampooned in cartoons. They nibble at the cans because they're after the glue on the labels.
A flea can jump 150 times its size. That is the same as a person able to jump up 1,000 feet in the air
A strand of spider web may be stronger than an equal diameter of steel.
4980. Animal Facts
Over 100 million years ago, crocodiles were twice the size they are now – up to 12 metres (40 feet) long – and could eat dinosaurs.
In 1755, the first Canadian post office opened in Halifax, Nova Scotia. The fist Deputy Postmaster General was American inventor Benjamin Franklin who was later dismissed for sympathizing with the American revolutionary cause
Cow is a Japanese brand of shaving foam
4985. Animal Facts
A head louse can lay 200–300 eggs during its life of around thirty days.The eggs only take five to ten days to hatch and start feeding.
Approximately 7.5% of all office documents get lost
Harrison Ford has a species of spider named after him.
In Chinese, the Kentucky Fried Chicken slogan 'Finger-lickin' good' came out as 'Eat your fingers off.'
It is estimated that by the end of 2000, there has been 142,600 tonnes of gold mined in the world
Taurine, the main ingredient in Red Bull, is an extract of the stomach lining of cows
The best selling chocolate syrup in the world is Hershey
Commercially flavored coffee beans are flavored after they are roasted and partially cooled to around 100 degrees. Then the flavors applied, when the coffee beans' pores are open and therefore more receptive to flavor absorption.
Coca-Cola contained Coca (whose active ingredient is cocaine) from 1885 to 1903.
Things That Define Your Personality
Ways To Waste Less Food
Android Interview Q&A
The Best Bulletproof Cars
Best Bodyweight Exercises for a Strong Core
Benefits of Apples
Get a healthier heart
An extensive body of research has linked high soluble fibre intake with a slower buildup of cholesterolrich plaque in your arteries. The phenolic compound found in apple skins also prevents the cholesterol that gets into your system from solidifying on your artery walls. When plaque builds inside your arteries, it reduces blood flow to your heart, leading to coronary artery disease. | <urn:uuid:530a653c-ab82-48b0-bc16-e2c0b81f1b17> | CC-MAIN-2018-09 | http://gkmcq.com/Fact-Book/4943 | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813691.14/warc/CC-MAIN-20180221163021-20180221183021-00735.warc.gz | en | 0.928828 | 1,269 | 2.65625 | 3 |
An early log schoolhouse was erected in 1822, southeast of the site of Belfast. It was constructed on Montjoy Survey No. 1566, on land belonging to Stacey Storer. The community decided a school was needed and the location on Bee Run was selected. Word was sent ou that the settlers were going to gather on a certain day to roll logs. (6)
The cabin schoolhouse was constructed on round logs, when fisished it was 16 feet and had a clapboard roof. The primitive room was heated by a large fireplace across one end and had a puncheon floor. The door was fastened to the battens by wooden pins and swung from wooden hinges. The backless benches driven for legs. This log schoolhouse, with tar or oiled paper across the windown openings, was an educational center of the southeastern part of the township for many years. It was used for social gatherings as well as political meetings. Meetings were held in it whenever an itinerant minister rode through the neighborhood. the name, "Wildwood," was given to the school, suggested by the surrounding countryside. (6)
In 1842 contracts were let for a new school building to be erected three miles northwest of the site of Belfast. The log structure supervised by George W. "Squire" Siders was a large room heated by a giant "Mogul" store. It had windows with very small glass panes instead of the oiled paper used in the primitive school. Expenses for its erection were met by contributions, mostly of labor and logs. | <urn:uuid:87cc3539-77ce-4a18-8597-d0f428e8b757> | CC-MAIN-2016-40 | http://www.usgennet.org/usa/oh/county/highland/building/belfast.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662159.54/warc/CC-MAIN-20160924173742-00174-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.989888 | 322 | 3.453125 | 3 |
The crisis at the Fukushima Daiichi nuclear complex has been upgraded from a level 5 to a level 7 on the International Nuclear Events Scale (INES), one month after the earthquake and tsunami that first damaged the Japanese power plant.
The decision, announced by Japan's nuclear safety agency today, makes the Fukushima disaster the second nuclear accident to ever be rated this most severe level. The other is the Chernobyl disaster of 1986.
"We have upgraded the severity level to 7 as the impact of radiation leaks has been widespread from the air, vegetables, tap water and the ocean," Minoru Oogoda of Japan's Nuclear and Industrial Safety Agency (Nisa), was quoted as saying.
While the amount of radiation is much less than that released in the Chernobyl disaster, the impact on people and environment is now being acknowledged by the authorities as far more severe than previously thought.
Sadly, the decision was not much of a surprise. "The history of the nuclear industry is littered of cover-ups and underplaying of the consequences of nuclear accidents," says Thomas Breuer, head of the Greenpeace Climate and Energy team in Germany. Tomas has been in Japan as a member of the Greenpeace radiation monitoring team in Fukushima since March.
"The industry both inside and outside Japan have again been underplaying the human consequences of this terrible tragedy, and only now after a month has this disaster been accepted for what it is - the worst on its scale,” he points out.
On the INES scale, created by the International Atomic Energy Agency to be universal method for assessing nuclear events, levels 1-3 are 'incidents', and levels 4-7 ‘accidents’, of increasing severity. Level 5, the previous official rating of the Fukushima disaster, means an 'accident with wider consequences.' Level 7 describes a 'major accident,' involving 'a major release of radioactive material with widespread health and environmental effects.' (1) The scale is designed as logarithmic, rather than linear, so each increase from one level to the next denotes an event of ten times the severity of the previous one.
Greenpeace first called for the level of the accident to be upgraded over two weeks ago (2).
“The Japanese government has finally acknowledged how serious the situation is," says Thomas. "Now it must fast track additional measures – such as the evacuation of pregnant women and children from densely populated areas like Fukushima City and Koriyama (3) - to protect the health and livelihoods of those affected by this disaster.”
Meanwhile, vigils were held in eleven cities across India last night to mark the passing of a month since the Fukushima crisis began. Crowds held candles to mourn victims of the disaster in Japan, and expressed their opposition to the proposed Jaitapur nuclear power plant in Maharashtra. The 9900 MW Jaitapur plant will, if built, be the largest nuclear power generation in the world at a single site. The government is pushing ahead with the project, despite accusations of a botched and biased environmental impact assessment, and the fact that the type of nuclear reactor being imported for the project is currently not in operation anywhere in the world. The selected site, in Ratnigiri district, is also a seismically active zone four of a possible five. It was an uncomfortable parallel for those who attended the vigils, as the Fukushima plant was first damaged by an earthquake and subsequent tsunami.
"Fukushima drives home just how tragic, severe and long-lasting the effects of nuclear accident can be,” said Karuna Raina, a nuclear campaigner with Greenpeace India who joined the protests in Delhi. “The Indian government is gambling with lives by pushing forward with the Jaitapur project, especially when on seismically active ground. Their blinkered determination makes a mockery of the suffering going on in Japan right now. Our thoughts are with the victims of the Fukushima disaster, and firmly against the construction of new and untested nuclear reactors in our country." | <urn:uuid:3f7c8b1f-b421-4c41-b292-d726227c4321> | CC-MAIN-2013-48 | http://www.greenpeace.org/india/en/Blog/fukushima-disaster-rated-as-equivalent-to-che/blog/34221/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164007111/warc/CC-MAIN-20131204133327-00025-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.957775 | 814 | 2.875 | 3 |
With the right food processing and packaging solutions, we can help prevent food loss and waste. By increasing the efficiency of how the raw materials are handled and how the food is processed, more will be processed and packaged instead of being discarded. Through the right packaging solutions, we can ensure that food is safely packaged and increase shelf life so it can reach consumers in remote areas.
How to reduce food loss and waste
Even though they are often seen as one problem, food loss and food waste are two separate issues. Food loss is mainly caused by food not being efficiently grown, processed and preserved, whereas food waste is driven by the short shelf life of packaged food during distribution and retail stages as well as unsustainable consumption practices.
More than three-quarters of consumers (77%) now see food waste as a concern – and limiting it is seen as one of the top three priorities for food manufacturers. Many manufacturers (and retailers) are aware of the importance of this issue and have already set food waste reduction targets.4 The UN is also addressing food loss and waste through its Sustainable Development Goals (SDG 12 – Responsible Consumption and Production). The UN also introduced an annual International Day of Awareness of Food Loss and Waste, observed for the first time on 29 September 2020.
Increasing efficiencies to reduce food loss
Our solutions can play a role in giving more people access to safe food. Our packaging protects food without the need for preservatives, additives or refrigeration, helping make safe, nutritious and flavoursome products available to more of the world’s rapidly growing population, even in remote areas with no cold chain. And through systemwide collaboration with our customers and partners, we commit to ensuring millions more people have access to safe food.
Minimising food loss is also at the heart of some of our collaborative work. With the Dairy Hub model, for instance, we have helped 54,000 smallholder farmers in 10 countries to expand their yield per cow by providing technical support and on-farm training. By linking them to customers, they get access to local dairy processors preventing food loss along the value chain. The benefits are significant for the whole community. While customers get access to an increased supply of locally produced milk, farmers enjoy higher income and better livelihoods.
The right packaging can reduce food waste
Our processing and packaging technologies extend the shelf life of packaged food, protecting the food so it can be transported and stored without refrigeration. The food can reach consumers in remote areas and can sit on the shelf without refrigeration for significantly longer that non-aseptic packages, helping to reduce waste of packaged food. Together with our customers, we develop high-performance food processing solutions that minimise food loss and we create food packaging solutions that help consumers reduce food waste.
Food waste accounts for approximately 8% of total global greenhouse gas emissions.5 Our innovative technologies deliver low-waste processes and packaging that prolong the life of food and keep it from spoiling or perishing. This helps ensure food availability while helping to reduce food waste.
Reducing food loss and waste has long been a part of our sustainability agenda. As we act to Move Food Forward, we will continue to work with customers, governments, partners and NGOs to reduce food loss and waste along the food value chain. | <urn:uuid:a2f389aa-a691-4224-966e-8e0a3e912f81> | CC-MAIN-2021-39 | https://www.tetrapak.com/en-rs/sustainability/moving-food-forward/our-journey/reduce-food-loss-and-waste | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056120.36/warc/CC-MAIN-20210918002951-20210918032951-00365.warc.gz | en | 0.93451 | 664 | 3.1875 | 3 |
The Center for Cetacean Research and Conservation was founded nearly two decades ago by President and Director Nan Hauser on the island of Rarotonga in the Cook Islands. The Cook Islands Whale Research Project investigates the humpback whale population that travels through the equatorial South Pacific. Research topics within the project are diverse, ranging from satellite tagging and migration to acoustics and climate change.
To read more about Nan and her work, please visit our sister site at nanhauser.com.
Many people underestimate the impact marine life has on climate.
Recently, the impact of whales on climate has been further explored and astounding conclusions have reached. The interdisciplinary nature of marine science is demonstrated in so many oceanic processes. The “whale pump” is an oceanic process in which chemistry, geology, physics and biology intertwine to reveal a significant decrease in atmospheric CO2 because of whales.
What’s the secret to whales saving the climate? Poo. Seriously.
Conservation of large marine mammals has become a tool that we can use to combat climate change. Though many more steps need to be taken to promote a healthy atmosphere, preservation of marine species, including humpback whales, is an important factor to consider. Click the link above or click the video to the right to learn about how whale poo impacts our atmosphere. | <urn:uuid:7d58ec58-f71c-4f1e-b682-68793f6b4a03> | CC-MAIN-2019-47 | http://www.whaleresearch.org/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496672170.93/warc/CC-MAIN-20191122222322-20191123011322-00077.warc.gz | en | 0.936832 | 276 | 3.984375 | 4 |
It can be hard to look for the bright side in a tragedy. But resolving tragedies often requires an immense amount of human effort, and that effort results in new knowledge. New genetic forensics techniques emerged from the identification of 9/11 victims, for example. Another tragedy, the disappearance of Malaysian Airlines flight MH370 three years ago, is starting to yield its own benefits to the scientific community.
A nearly three-year-long search for the plane ensued after the flight disappeared on March 8th, 2014. MH370 has eluded search efforts, but the Australian Government has now released the incredibly detailed maps it created for the search. This effort makes the deep Indian Ocean one of the most well-mapped parts of the deep ocean, according to Eos reporting.
Search efforts for the plane included sonar sound waves sent by a moving ship to the seafloor and back up. The returning waves contained information about the seafloor’s shape. Some of these waves needed to travel 3.7 miles to reach the bottom, writes Eos.
The Malaysian, Chinese and Australian Governments suspended the search for MH370 this past January. But the Australian Government has now published the map data online for free, alongside a web page about how and why the data collection happened. Most of the maps show the area around the seventh arc, a curved line in the southern Indian Ocean around a thousand miles west of Australia that includes possible aircraft positions based on the distance the plane may have travelled after last pinging a communications satellite. The data collected covered an area of around 275,000 square miles, which is roughly the size of Texas.
On top of the incredibly detailed data, researchers have already learned more about the Indian Ocean via the maps. Findings include some new insights about the 750 mile-long undersea cliff at Broken Ridge, shown in the video below:
The Australian Government team is processing even more of the data, including some taken by underwater vessels, and plans to release it in mid-2018. But this first data dump shows just how much large, coordinated search efforts can contribute to science. Other researchers we’ve spoken to in the past have been developing methods to locate the plane using underwater sound waves, a method that can also help predict tsunamis.
All that is to say, while folks are still hurting from MH370, the search for closure continues to bring about new science. [Eos] | <urn:uuid:a4364831-67c7-4438-8195-a35b0da85da6> | CC-MAIN-2018-13 | http://www.gizmodo.co.uk/2017/07/australia-releases-trove-of-scientific-data-from-malaysian-airlines-flight-mh370-search/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647671.73/warc/CC-MAIN-20180321160816-20180321180816-00194.warc.gz | en | 0.949692 | 493 | 3.859375 | 4 |
From Wikipedia, the free encyclopedia
The Dhepa is a small river in northern Bangladesh. The river originates from the Atrai river in Mohanpur and falls into the Punarbhaba. The length of this river is 40 kilometres (25 mi), and the depth of this river is 6 metres (20 ft).
|This Bangladesh location article is a stub. You can help Wikipedia by expanding it.| | <urn:uuid:fd3a9491-2fec-4101-9030-53168e2bf190> | CC-MAIN-2015-14 | http://en.wikipedia.org/wiki/Dhepa_River | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131297416.52/warc/CC-MAIN-20150323172137-00182-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.899563 | 86 | 2.640625 | 3 |
Fossil Time Capsules: Unwrapping Depression Era Fossil Stashes Yields New Discoveries
February 2, 2011
Let’s say you’re a budding young paleontologist looking to make your mark. The first thing you have to do is pack up your shovel and pick, head out into some remote badlands, and find yourself a bunch of fossils that no one has ever seen before.
Let’s say that doesn’t pan out. You might have better luck digging in the basement.
On the eve of America’s entrance into World War II, dozens of workers were out collecting fossils in counties all over Texas. They were part of a survey funded by the Work Projects Administration (WPA) and managed by Elias Sellards, the director of The University of Texas at Austin’s Bureau of Economic Geology.
When war finally came, many of the workers traded in their picks for rifles. Over two and a half years, they had collected more than 11,000 vertebrate fossils and shipped them back to the university. They found reptiles, amphibians, dinosaurs, and more. The field work ground to a halt and a mountain of potential research was shelved.
A small portion of the specimens were prepared and studied, and an even smaller portion of those were eventually put on display in the Texas Memorial Museum on the main university campus. The majority are stored away in the Vertebrate Paleontology Laboratory (VPL) in north Austin.
The WPA collections include at least 41 “jacketed” specimens, blocks of rock and fossil still encased in the white plaster jackets they were wrapped in to stay intact on their journey back to Austin. They range in size from dinner plates to refrigerators. While notes and photographs still exist relating to the contents, no one has seen what’s inside for 70 years.
“A lot of people died and the world was different after the war,” says Tim Rowe, director of the VPL and professor in the Jackson School of Geosciences.
Now a doctoral candidate has opened up the largest WPA jacket and is carefully removing and preparing a remarkably complete and well preserved skeleton of an ancient relative of crocodiles. The animal was only known from skulls before, so her description of the rest of it will fill an important gap. It also comes from a legendary fossil site with many more secrets left to reveal.
In Howard County in West Texas, the WPA workers hit paleo pay dirt at one of only a handful of high quality fossil sites from the Late Triassic in North America.
“That’s a time zone we know very little about,” says Rowe.
The WPA workers collected thousands of specimens from Howard County. They found crocodile-like animals, dinosaurs, and amphibians. Many were species new to science, including Trilophosaurus buettneri, a lizard-like reptile. Some of the jacketed specimens weighed over 1,000 pounds.
“The physical labor that went into that was immense,” says Rowe. “You can tell these guys wanted it really bad.” He notes that $220,000 was spent on the effort, an astronomical sum in Depression Era dollars.
Only a few people involved in the survey were career paleontologists. Following the war, they mostly scattered to other institutions. Postdoctoral researcher Joseph Gregory went on to became a professor at the University of California at Berkeley, and eventually became director of the University of California Museum of Paleontology. One of the last living people involved with the WPA survey, Glen Evans, died last year.
Michelle Stocker is the doctoral candidate in the Jackson School preparing and studying the jacketed specimen. Because her specimen hails from one of the oldest Late Triassic sites in North America, it entombs animals that are in some sense earlier, less evolved versions of animals found in later sites, says Stocker. She’s comparing the complete assemblage of animals from Howard County to another area to look at changes in diversity and faunal composition through time and across space. She focuses on specific clades, or groups of related animals, such as Archosaurs, a clade containing dinosaurs, birds and crocodiles.
“Knowing the more primitive members of all those clades gives you a better idea of how those members are related to each other because they don’t have their own special derived characters already confusing the relationships,” she says. “They have more of the shared characteristics of the larger group they belong to and you can tie them together more easily.”
She said the sheer number and diversity of fossils from this time period make it even more useful.
“So it gives you a really detailed picture of the fauna in that part of the Late Triassic that you don’t get well in other places,” she says. “It’s amazing to see such an abundance of specimens and taxa from one place.”
For many years, land owners were reluctant to allow researchers back onto the land to continue the research. But as 2010 was drawing to a close, Stocker and her paleontologist husband were granted permission to do field work at the original WPA sites. They planned to go out in February to relocate each of the original WPA localities and fully document them with digital photographs, GPS readings, and detailed notes. They also planned to search for more fossils and to apply modern dating techniques to the soils to better constrain the ages of the fossils.
Light of Day
Three of Stocker’s colleagues hoisted the 7 foot long plaster jacket weighing over 1,000 pounds off the VPL’s basement floor with a crane lift. They brought it up to the ground floor through a trap door, rolled it over to the preparation lab and set it on a large table. With a pocket knife, Stocker and Sebastian Egberts, a former assistant preparator, cut through the plaster and burlap, revealing a block of reddish mudstone.
“We opened the jacket the way you would open a tin can so that we could ‘peel off’ the top while still maintaining the structure of the side walls for support,” she says.
That was in fall 2008. Two years and hundreds of hours of careful picking and chipping later, she and the occasional volunteer have freed the entire skull and much of the vertebral column of a juvenile phytosaur named Angistorhinus. From a distance, the live animal would have looked a lot like a modern crocodile. She estimates it was about 10 to 13 feet (3 to 4 meters) long from snout to tail and lived around 220 million years ago.
More of the vertebrae, leg bones, and ribs remain to be prepared, as well as a second unopened jacket that is thought to contain the tail and perhaps parts of the pelvis.
The work has been slow and difficult, but Stocker says three things make this specimen stand out for someone interested in the evolution of tetrapods (four legged animals) in the Triassic. First, it includes parts of the body never seen before for Angistorhinus, including ribs, vertebrae, limbs, and tail. Second, the vertebrae are fully articulated, an uncommon situation that improves the accuracy of reconstruction. And third, it is a juvenile, which sheds light on how phytosaurs’ bodies changed as they matured.
The discovery also fits in nicely with Stocker’s larger dissertation project mapping which animals lived when and where in the Late Triassic of North America, and how they relate to each other in evolutionary terms.
Jack in the Box
It’s surprising how much fossil material is wrapped up and squirreled away just beyond reach in museums and university collections around the world. Any place with a large collection going back several decades has them.
The American Museum of Natural History in New York has still-jacketed specimens collected in the 1910s in Alberta, Canada by Barnum Brown, world famous paleontologist who also discovered the first remains of Tyrannosaurus rex. Carl Mehling, collections manager for vertebrate collections, reckons they have hundreds of unopened jacketed specimens in all.
Even here at UT Austin’s VPL, in addition to the 41 WPA jackets, there are crates of dinosaur fossils given to the university by the American Museum in the 1930s for the Texas Centennial Exposition. The fossils, originally unearthed in 1903, ultimately required too much preparation to display. The jacketed blocks, which range from football to desk drawer-sized and weigh hundreds of pounds, await their time in the sun, still packed in straw in their original wooden crates, made of rough hewn timbers nearly a foot thick.
So you might be thinking, good grief, why doesn’t someone just pop those suckers open and see what’s in them? Paleontologists love fossils. They’re hyper curious by nature. What’s stopping them?
Ask anyone who manages these collections, and they’ll give you the same reasons. It’s much easier to get grants and excite graduate students to go on exotic field trips than to prepare fossils. Fossil preparation is much slower and harder to do than field collection. You have to sit for hour upon hour, day after day, chipping grains of rock from a specimen under a microscope. Lots of people are good field collectors, but few have the patience and dexterity to be good preparators. So backlogs are inevitable.
Other factors make it easier to just leave them be, says Wann Langston, emeritus professor in the Jackson School.
“As long as they are wrapped up in their jackets, they aren’t going to get damaged or lost,” he says. “If they’re opened up and there’s nothing of interest to the individual, they lie around for a while and things happen.”
Paleontologists look at the dusty old jackets the same way a cautious child might consider a jack in the box.
“When you unpack something, it grows,” says Mehling. “You can stack jackets, but you can’t stack prepared specimens. You have to store them in drawers and trays with foam. And in this business, space is always an issue.”
Like every area of science, paleontology has become highly specialized. Ernie Lundelius, emeritus professor in the Jackson School, says a researcher isn’t going to open up a jacket unless he or she is confident it will further their own research.
“There’s just not enough money to open and clean them up just to clean them up,” he says. “They’re usually tied to some research project. That’s true of Michelle and her phytosaur because she’s interested in that specific group of reptiles from the Triassic. If I were to cut into a great fortune of a billion dollars, I’d say lets clean all of them up and see what we’ve got.”
A New Generation
Now a new cohort of young paleontologists are making opening these jacketed specimens an integral part of their research. And it’s paying off handsomely.
Sterling Nesbitt, a graduate student at Columbia University with a keen interest in Late Triassic animals, heard the American Museum had jacketed specimens collected in the 1940s from a legendary fossil bone bed on Ghost Ranch in New Mexico. He saw one labeled “phytosaur” and decided to open it up. Because there were no photos or accompanying notes to provide more details, it was a bit of a leap of faith. That jacket and others collected nearby turned out to contain a new species closely related to crocodiles, but which had co-evolved traits similar to some dinosaurs.
Nesbitt’s work upended scientists’ view of what the Ghost Ranch quarry actually represents. It was thought that the quarry was the result of a mass die-off of just one kind of dinosaur, Coelophysis. Nesbitt showed a lot of other animals died there too. His work on already-prepared specimens from the same location also dispelled earlier notions that Coelophysis was a cannibal.
After receiving his doctorate, Nesbitt joined the Jackson School as a postdoctoral researcher. He’s now a postdoc for the University of Washington, while continuing to work in the collections at UT Austin’s VPL.
Fortunately for Stocker, she had some idea of what was in her WPA jacket before she even opened it. There were surviving photographs from when it was collected and a letter from its discoverer, Grayson Meade, about what he thought was there.
“The new quarry is looking damn good,” wrote Meade to his colleague Glen Evans in May 1940. “[W]e have found quite a portion of a partially articulated phytosaur skeleton. About four or five feet of the vertebrae are mostly in articulation. There are leg bones, some ribs, and the mandible. … There is every indication that the skull should be there, and more of the skeleton. I didn’t reach the end of it knowingly at any rate.”
by Marc Airhart
Vertebrate Paleontology Laboratory
For more information about the Jackson School contact J.B. Bird at email@example.com, 512-232-9623. | <urn:uuid:5d11c573-5a25-4102-9d25-d4de3f5900c7> | CC-MAIN-2019-35 | http://www.jsg.utexas.edu/news/2011/02/fossil-time-capsules-unwrapping-depression-era-fossil-stashes-yields-new-discoveries/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318375.80/warc/CC-MAIN-20190823104239-20190823130239-00397.warc.gz | en | 0.964071 | 2,851 | 3.078125 | 3 |
Lysergic acid diethylamide or LSD is an illegal drug classified as a psychedelic hallucinogen, which was first synthesised by a Swiss researcher, Albert Hoffmann in 1938 - although it's powerful effects were not known until 1943. Though synthetic, LSD is derived from the ergot fungus which grows on grain. It is generally used recreationally for its hallucinogenic effects, which can include synethesia or the perception of one sensation through another sense, such as "seeing music"; as well as altered visual perception - such as objects warping and changing colors. Contrary to popular belief it is very uncommon for users to actually hallucinate something which does not exist - rather the drug usually warps and alters perception of real things. The drug also has powerful effects on a person's ability to make decisions. Several members of the counterculture movement of the 1960s gave great credit to the drug in improving their own creativity, such as the academic Timothy Leary and the cartoonist Robert Crumb.
However, LSD does have a number of side effects, which vary widely from person to person, but are generally minor compared to its powerful effect on the mind. Tachycardia, arrhythmia, minor insomnia, sweating, and tremors are often reported. In addition, the hallucinogenic effect of the drug is not always pleasant, leading to the proverbial "bad trip" - usually described as a strong sensation of terror, paranoia, dysphoria and panic. The tendency to have a negative hallucinogenic experience is greatly dependant on the setting the user is in, and their mindset during the experience, but there is no way to control the experience completely. An LSD "trip" usually lasts from 8 – 12 hours.
LSD does not cause mental illness in healthy people. However, using LSD can sometimes bring on mental illness early in people who were predisposed to them (i.e.: they would have developed mental illness at some point anyway), and will generally make the symptoms of psychosis worse in people who already have a mental illness such as schizophrenia.
It should be noted that although LSD is derived from ergot, it is not the cause of ergot poisoning, and unlike ergot itself - LSD is not very physically dangerous. LSD has never been shown to cause physical addiction, and habitual use of the drug is difficult because tolerance builds up extremely quickly. A user looking to take LSD two days in a row might have to take 2-3 times the normal dose for the same effect, with each continual day of use increasing the needed dose exponentially. Tolerance normally resets completely between 1 – 2 weeks from the last dose.
LSD is incredibly potent. Doses are typically measured in micrograms (thousandths of a milligram). Whilst "overdosing" on LSD is possible in the sense that a user accidentally take more than they wished to; it should be noted that there has never been a recorded death from LSD. The dose of LSD required to kill a human is not known, but it is hypothesised to be well over 10,000 normal doses.
In Distractions, House doses himself with LSD to relieve a migraine headache, and then takes antidepressants to deal with the effects of the LSD. Although several physicians have proposed several therapeutic uses of LSD, it is currently a totally restricted drug in most countries and may not be used or possessed legally for any purpose without a special license from the government, very few (if any) of which are issued. | <urn:uuid:2073a78d-0887-4ee3-97e5-dec73ab1e20f> | CC-MAIN-2019-35 | https://house.fandom.com/index.php?title=LSD | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316075.15/warc/CC-MAIN-20190821152344-20190821174344-00438.warc.gz | en | 0.974801 | 711 | 2.765625 | 3 |
Test IP-to-MAC Address Resolution with ARP
Windows 2000 TCP/IP allows an application to communicate over a network with another computer by using either an IP address, a host name, or a NetBIOS name. However, regardless of which naming convention is used, the destination must ultimately be resolved to a hardware address (media access control (MAC) address) for shared access media such as Ethernet and Token Ring.
The Address Resolution Protocol (ARP) allows a host to find the MAC address of a node with an IP address on the same physical network, when given the node's IP address. To make ARP efficient, each computer caches IP-to-MAC address mappings to eliminate repetitive ARP broadcast requests.
The Arp tool allows a user to view and modify ARP table entries on the local computer. The arp command is useful for viewing the ARP cache and resolving address resolution problems.
A static entry can be added to an ARP file by issuing the arp -s < IP address > < MAC address > command. However, adding such static ARP cache entries must be used with caution as it is easy to enter the wrong MAC address for an IP address.
Detecting Duplicate IP Addresses Using ARP
When starting up, Windows performs a gratuitous ARP to detect any duplication with its own IP address. While this detects most cases of duplicate IP addresses, in a few situations two TCP/IP hosts (either Microsoft or non-Microsoft) on the same network can be configured for the same IP address.
The MAC and IP address mapping is done by the ARP module, which uses the first ARP response it receives. Therefore, the impostor computer's reply sometimes comes back before the intended computer's reply.
These problems are difficult to isolate and track down. Use the arp -a command to display the mappings in the ARP cache. If you know the Ethernet address for the remote computer you wish to use, you can easily determine whether the two match. If not, use the arp -d command to delete the entry, then use Ping with the same address (forcing an ARP), and check the Ethernet address in the cache again by using arp -a .
If both computers are on the same network, you will eventually get a response from the imposter computer. If not, you might have to capture the traffic from the impostor host with Network Monitor to determine the owner or location of the system. For more information about Network Monitor, see "Monitoring Network Performance" in the Server Operations Guide .
Detecting Invalid Entries in the ARP Cache
Troubleshooting the ARP cache can be one of the more difficult tasks in network administration because the problems associated with it are so often intermittent.
The exception to this rule is when you find that the wrong host responds to a command, perhaps a Netuse or Telnet command. The symptoms of invalid entries in the ARP cache are harder to reproduce and involve intermittent problems that only affect a few hosts. The underlying problem is that two computers are using the same IP address on the network. You only see the problems intermittently because the most recent ARP table entry is always the one from the host that responded more quickly to any particular ARP request.
To address the problem, display the ARP table using the arp -a command. Following is an example output of the arp -a command.
C:\>arp -a 172.16.0.142
Internet address Physical Address Type
172.16.0.1 00-e0-34-c0-a1-40 dynamic
172.16.1.231 00-00-f8-03-6d-65 dynamic
172.16.3.34 08-00-09-dc-82-4a dynamic
172.16.4.53 00-c0-4f-79-49-2b dynamic
184.108.40.206 00-00-f8-03-6c-30 dynamic
Since addresses assigned by DHCP do not cause address conflicts like those described here, the main source of these conflicts is likely to be static IP addresses. Maintaining a list of static addresses (and corresponding MAC addresses) as they are assigned can help you track down any address conflict just by examining the IP and MAC address pairs from the ARP table and comparing them to the recorded values.
If you do not have a record of all IP and MAC address pairs on your network, you might want to examine the manufacturer bytes of the MAC addresses for inconsistencies. These three-byte numbers are called Organizationally Unique Identifiers (OUIs) and are assigned by the Institute of Electrical and Electronics Engineers (IEEE); the first three bytes of each MAC address identify the card's manufacturer. Knowing what equipment you installed and comparing that with the values returned by arp -a might allow you to determine which static address was entered in error.
Finally, if neither an address pair record nor the manufacturer prefixes reveals the source of the problem, check the Event Viewer for additional clues to the problem. For instance, DHCP might have detected a duplicate card already on the network, and thus denied a computer's request to join. Other DHCP and related messages here can often quickly isolate and solve a problem. | <urn:uuid:11edbde9-21a6-43cf-b0c7-07769f05cc91> | CC-MAIN-2018-30 | https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc961394(v=technet.10) | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593378.85/warc/CC-MAIN-20180722155052-20180722175052-00593.warc.gz | en | 0.904236 | 1,098 | 3.234375 | 3 |
Click any word in a definition or example to find the entry for that word
|I/you/we/they||come out of|
|he/she/it||comes out of|
|present participle||coming out of|
|past tense||came out of|
|past participle||come out of|
This is the British English definition of come out of. View American English definition of come out of. | <urn:uuid:0eb2b847-222a-4e9d-b2d8-3db7ccf3611c> | CC-MAIN-2015-27 | http://www.macmillandictionary.com/us/dictionary/british/come-out-of | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095632.21/warc/CC-MAIN-20150627031815-00139-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.695691 | 92 | 3.09375 | 3 |
Puberty: read about the stages for boys and girls, Puberty is the period during which growing boys or girls undergo the process of sexual maturation. puberty involves a series of physical stages or steps that lead to. Puberty starting sooner in u.s. boys - abc news, American boys appear to be maturing sexually at a younger age, a new study found. compared with studies going as far back as the 1930s, boys evaluated at. Puberty symptoms, causes, treatment - medicinenet, The changes that happen during the process of puberty have a typical pattern in both boys and girls, with a generally predictable sequence of events..
Puberty and growing into a teenage boy - family education, Read tips on what to expect from a male going through puberty.. Puberty and sexual organs | avert, Sex organs, sexual feelings, wet dreams, breasts, periods, sexual intercourse and pregnancy: the male and female sexual organs, sex and how people get pregnant.. Vote: what's the worst part of puberty (for girls, Ah, the precious time when a girl blossoms into a pained, awkward, confused almost-woman. the official voting period has ended. see the results below..
- interior design software | 2d & 3d home design software, If you would like a copy of our free 3d room design software use the request form in the right hand column of this page. an email will be sent to you containing the. Puberty blues (1981) - imdb, Get informed. industry information at your fingertips. get connected. over 200,000 hollywood insiders. get discovered. enhance your imdb page. go to imdbpro ». Online jobs – apply now & work from home, Supplying online jobs since 2003 and recognized as the number one resource for anyone looking for part time or full time work which can be done from the convenience. | <urn:uuid:45b1d6bb-e66e-4575-bdcf-014560d979c6> | CC-MAIN-2015-32 | http://duoliphotography.com/duoli-photo/gallery-of-puberty-in-boy.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042992201.62/warc/CC-MAIN-20150728002312-00309-ip-10-236-191-2.ec2.internal.warc.gz | en | 0.916017 | 389 | 2.71875 | 3 |
The Terminal Over A Network (telnet) connection allows you to connect to a remote computer using the command line. You can then run scripts and programs on the remote PC. The system administrators may already be familiar with this feature.
If you are new to this, then this article is for you. Before you can remotely access another computer, the telnet feature needs to be enabled on all Windows versions. In this article, we discuss in detail what telnet is, and how to enable it.
Note: The methods discussed in this post explain how to enable Telnet Client, which is enabled on the source computer. Telnet Server will need to be enabled on the remote (target) computer to which you want to connect.
On This Page
What is Telnet
Telnet is a network protocol that is used to log into a remote computer on the same network using the command line interface.
To establish remote sessions, telnet adheres to a user command Transmission Control Protocol/Internet Protocol (TCP/IP) networking protocol. Using this, users can sign in with regular user accounts with the permissions they have been allowed to the particular programs and data on the target computer.
Telnet uses a client-server relationship to establish a connection. It is a text-based communication mechanism between a client machine and a server where an individual can run commands on a remote computer while being logged in as a local user.
Telnet can be used to perform any number of functions, like editing files, running applications, etc., on remote computers.
Telnet Client vs. Telnet Server
As mentioned earlier, Telnet uses the client-server configuration method to establish a connection to a remote computer. Telnet Client is a piece of software that you enable on client computers from which you access the remote computer. Whereas, the Telnet Server is the target computer that you connect with over the network.
In other words, on the Telnet Server, the Telnet port needs to be opened and allowed to let other computers connect to it.
That said, one common issue that many users face on the Windows command line is experiencing the error “telnet is not recognized as an internal or external command.”
Fix “Telnet is Not Recognized”
If telnet is not enabled on a computer and you try to connect to a remote computer using this protocol, you will see the following error message:
'telnet' is not recognized as an internal or extenral command, operable program or batch file.
This means that telnet needs to be enabled before you can use it to establish remote connections over the network. Of course, if the feature is not enabled, how can the Windows computer recognize it?
If you are seeing such an error, then you can also benefit from all the methods shared below to enable Telnet on your Windows PC.
How to Enable Telnet on Windows
Enable Telnet from Optional Features
The files for the optional features on a Windows PC are always there, but the feature is not installed. Since telnet is an optional feature, here is how you can enable it:
Open the Optional Features applet by typing in “optionalfeatures” in the Run Command box.
Check the box with “Telnet Client” and click Ok.
The feature will now begin to install.
Once installed, close the wizard.
Telnet will now be enabled and you may continue to use the command line to connect to a remote computer.
To disable Telnet, simply uncheck the box next to “Telnet Client” in the Optional Features applet.
Enable Telnet from Command Prompt
You can also enable the telnet client directly from the Command Prompt. This method can come in handy if you are already inside the Command Prompt and trying to connect remotely using telnet.
Ensure you are running Command Prompt with elevated privileges.
Run this cmdlet:
The command will run silently and install telnet in the background. Alternatively, you can also use this command to enable Telnet:
Note: Elevated privileges are required to run the DISM command.
dism /online /Enable-Feature /FeatureName:TelnetClient
If prompted with a UAC, click Yes.
You can now begin connecting to a remote computer once the telnet is installed
To disable telnet from the Command Prompt, run the following cmdlet using Deployment Image Servicing and Management (DISM):
dism /online /Disable-Feature /FeatureName:TelnetClient
Enable Telnet from Windows PowerShell
If you are using PowerShell, run the following command in an elevated PowerShell instance to enable the Telnet Client:
Enable-WindowsOptionalFeature -Online -FeatureName TelnetClient
Telnet will now be enabled. You may now continue to access a remote PC using telnet directly from PowerShell.
In case you wish to disable the feature in the future, run this cmdlet in Windows PowerShell:
Disable-WindowsOptionalFeature -Online -FeatureName TelnetClient
Enable Telnet Remotely
The methods above show how you can enable the Telnet Client on the local computer. However, you can also enable it on a remote PC on your network. This is especially useful if Telnet has not been allowed through the target computer’s firewall.
To enable telnet on a remote Pc, we must use PsTools by SysInternals – which is a suite of command-line tools for the Windows operating system. Using the PsExec utility inside this suite, you can remote access the Command Prompt of the target PC and then run any command.
Use the following steps to enable Telnet on a remote PC:
Start by downloading and extracting PsTools.
Launch an elevated Command Prompt and use the
CDcmdlet to change the directory to the extracted folder:
Now use the following command syntax to connect to the remote computer:
Note: If you see an “Access is denied” error at this point, a solution for it is provided at the end of these steps.
PsExec -i \\[RemoteComputerName] -u [Username] -p [Password] cmd
Replace [RemoteComputerName] with the name of the PC you want to connect to, [Username] with the account name, and [Password] with the account password. Make sure that the account you are logging in with has administrative rights.
You will now be connected to the remote PC.
Now, use the following command to enable telnet on the remote PC:
dism /online /Enable-Feature /FeatureName:TelnetClient
That’s it! Telnet has been successfully enabled on the remote computer, and you can now close the Command Prompt window.
If you faced the “Access is denied” error while attempting to access the remote computer with PsExec, it is probably because UAC is running on the remote machine. You must perform the following steps on the remote computer physically to disable UAC:
Note: This process involves making changes to the Windows Registry manually. Misconfiguration of critical values in the system’s registry could be fatal for your operating system. Therefore, we insist that you create a system restore point or a complete system image backup before proceeding forward with the process.
You can also use our top selection of disk imaging and backup software so you never lose your data or operating system again.
Open the Registry Editor by typing in “regedit” in the Run Command box.
Paste the following in the address bar for quick navigation:
Right-click the “System” key, expand New, and then click “DWORD (32-bit) Value.” Name this DWORD “LocalAccountTokenFilterPolicy“.
Double-click the DWORD “LocalAccountTokenFilterPolicy” and change its Value Data to 1.
Now restart the computer for the changes to take effect.
Once these steps are performed, you should be able to access the remote computer using PsExec.
How to Check if Telnet is Disabled
Once Telnet is enabled, you can verify it by typing in “Telnet” in the Command Prompt. This will change and open another command line with “Microsoft Telnet” written, as in the image below.
In comparison, the Remote Desktop Connection can also be used to access a PC on the same network remotely. It offers a GUI interface, and you can log into a local account, and run apps and cmdlets, just like telnet.
However, if you prefer using the Command Line Interface instead, then telnet is the right tool for you. It is quick to connect and gives you more control over the remote PC. | <urn:uuid:01da7f63-8d0f-4a07-bcc5-1a9405b853cd> | CC-MAIN-2023-23 | https://www.itechtics.com/enable-telnet/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657720.82/warc/CC-MAIN-20230610131939-20230610161939-00002.warc.gz | en | 0.857278 | 1,900 | 3.671875 | 4 |
Book by Kenneth J. Sufka
Review by Comfort Sumida
Manoa Advising Center
University of Hawaii at Manoa
As advisors, we see students from all backgrounds and experiences in academia. We understand the transition to higher education is difficult, even for those who were academic stars in high school. However, from a student’s perspective, it is often frustrating to realize the study strategies previously used no longer earn the high grades to which s/he is accustomed.
The reality is that the learning process and expectations differ in college. This is often overlooked by students. They don’t realize the psychology class they took in high school is unlike the one they enroll in during college. Although the topics may appear similar, they differ in terms of depth of knowledge and the required level of understanding. To be successful in higher education, students need to learn how to adapt old study techniques and implement new ones. In The A Game, Sufka presents a collection of nine rules to help students make the most of their time in the classroom and studying.
Although Sufka’s “rules” may appear simple on the surface, such as daily attendance and timely preparation for exams, it would be a disservice to underestimate their value. He expands these basic skills and elaborates on how they are applied differently while in college. Rules presented later become increasingly complex, as he introduces the importance of identifying learning objectives and the use of concept mapping while studying. Another strength is in his style of presentation and elucidation, which are thoroughly engaging, effectively drawing in the reader, be it student or advisor.
For each rule, an introductory anecdote (usually in the form of a conversation he has had with a student) explains how to identify “bad habits” in common study strategies and clarifies why they no longer apply. Corresponding “game-changing” techniques are discussed to assist students with adapting their behavior to the expectations of college. Sufka uses examples and exercises to break down and illustrate the methods he recommends and explains in depth the reasons why they work, providing supporting results from published research.
Sufka’s style is straightforward and concise with a heavy dose of humor infused, making The A Game an enjoyable and entertaining read. As a professor, he understands the uniqueness of each student and knows the expectations they face. For each technique, he gives multiple examples in practice, teaching students to implement the suite of methods in ways that fit their individual style.
Students are the primary beneficiaries of The A Game’s lessons. They learn of ways to improve their academic performance using methods which apply to other aspects of their lives. Learning more efficient and effective ways of studying reduces the time needed to master the material and the probability they will make the effort to appropriately prepare for their next office visit, lecture, or exam. Although targeted towards students, The A Game is a worthwhile read for anyone whose students feel challenged by the academic transition to college or just wish to improve their study habits.
Advisors may already be aware of the strategies Sufka presents. However, they can still benefit from reading The A Game. It provides a greater understanding of the reasons why these techniques work and teaches ways in which to impart this information, and a better understanding of the expectations of higher education, to their students.
The A Game: Nine Steps to Better Grades. (2011). Book by Kenneth J. Sufka. Review by Comfort Sumida. Taylor, MS: The Nautilus Publishing Company, 80 pp. Price $12.95, (paperback). ISBN # 978-1-936946-02-0 | <urn:uuid:0981859e-2579-4462-96d7-8636cbd1771b> | CC-MAIN-2018-13 | http://www.nacada.ksu.edu/Resources/Book-Reviews/Current-Past-Book-Reviews/The-A-Game-Nine-Steps-to-Better-Grades.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645775.16/warc/CC-MAIN-20180318130245-20180318150245-00518.warc.gz | en | 0.957235 | 745 | 2.921875 | 3 |
What is Hospital Psychosis
Hospital is the best place where one can expect to gain relief from stress and mental burden. However, environment of a hospital can prove to be stressful for many individuals as well. Individuals who depend upon the home surroundings for achieving mental peace suffer from hospital psychosis a great deal. There can be least doubt about the fact that the overall surrounding of a hospital equipped with noisy medical equipments can often prove to be stressful for the patients as well.
Hospital Psychosis-Severe Mental Condition:
Hospital psychosis primarily develops by the length of the time spent in the hospital environment. Individuals suffering from hospital psychosis experience severe behavioral changes within a short period.
Factors Responsible for Hospital Psychosis:
Hospital Psychosis occurs due to a number of factors. The main factors responsible for Hospital Psychosis are enlisted below:
- Sleep Deprivation for a long period
- Lack of proper Light
- Drug Reactions and its side-effects
Hospital Psychosis that develops due to appropriate light is also known as ‘sundowner’s syndrome’. Apart from the above-mentioned factors, some of the other possible causes include metabolic disturbances, dehydration, loss of normal life and stress due to prolonged illness.
Hospital Psychosis can be treated with a number of treatment facilities. The general treatment facilities that can help to fight Hospital Psychosis include anti-psychotic medications and haloperidol as well. Before commencing with the treatment of the patient, it is necessary to review all the medications of the patient as well.
Hospital Psychosis-Life Threatening:
One needs to come in terms with the patent fact that hospital psychosis can prove to be extremely severe and life threatening if not looked after properly. The severity of hospital psychosis is directly related with the length of one’s stay at the hospital. The severity of hospital psychosis due to prolonged stay at the hospital is simply beyond imagination. ICU psychosis develops among patients when there is restricted interaction with caring family members. Agitated patients can commit disastrous acts by damaging IV catheters and damaging vital tubes as well.
Role of Hospital Staff:
Attitude of hospital staff members bear immense significance in ensuring speedy recovery of individuals affected with hospital psychosis. A good hospital staff should ensure the following activities:
- Understands the importance of immediate action
- Empower family members by being informative
- Provide appropriate reassurance to the concerned patients
- Remains alert of the possible hospital psychosis
- Keep the other staff members informed as well
Hospital psychosis can be prevented by adhering to a few aspects. The important aspects that if taken care of can prevent hospital psychosis are enlisted below:
- Encourage family members to conduct frequent visits
- Disorientation should be prevented under all possible circumstances
- Avoid unnecessary arguments, chaos, excitement and noise
- Be aware of the use of antidepressants
It is worth denying the fact that hospital psychosis can be termed as a real phenomenon. Few medical practitioners are skeptical to use theterminologyHospitalPsychosis. Hospital psychosis can be totally cured only when the patient returns home since the main triggering force behind this ailment is the prolonged time spent at hospital. | <urn:uuid:50e6701e-762b-4c35-bf07-124ec63086dd> | CC-MAIN-2018-30 | https://trivology.com/what-is-hospital-psychosis/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591332.73/warc/CC-MAIN-20180719222958-20180720002958-00524.warc.gz | en | 0.91922 | 655 | 2.5625 | 3 |
The summer season has already set in and everyone sure is chilling out with a bottle of beer. Beer is the ultimate rescuer, as it helps to cool down the body during the summer time. Beer is the most popularly consumed alcoholic beverage among the youth and the third most popular drink preceded by tea and water.
Beer is brewed from cereal grains which are responsible for its nutritional value. People usually drink beer by munching on snacks. Beer has high amounts of protein and vitamin B content than wine and the antioxidant content is equal to wine.
Beer is also rich in minerals which contain significant amounts of magnesium, selenium, potassium, phosphorous, and biotin. This plays a role in various metabolic processes and boosts your health in a number of ways.
NOTE: Drinking beer in moderate quantities will definitely boost your health.
So, read on to know more about the health benefits of beer.
1. Prevents Cancer
Brewing beer contains flavonoid compounds that play a major role in the chemoprevention of cancer, including prostate cancer. Beer is also a good source of polyphenols that have been proven to be effective in fighting cancer.
2. Prevents Anaemia
Beer is an excellent source of vitamin B12 and folic acid. A deficiency of these vitamins cause anaemia. The presence of vitamin B12 can ward away other diseases and is essential for maintaining normal growth, concentration and a good memory.
3. Prevents Ageing
Did you know that beer can delay ageing? Yes it's true that beer increases the potency and impact of vitamin E, which acts as an antioxidant in the body. Vitamin E is required for the maintenance of healthy skin and it slows down the ageing process.
4. Promotes Kidney Health
Sometimes, gallstones or kidney stones form in the kidneys, which are often due to dehydration. So, consuming beer can reduce the risk of kidney problems. But ensure that you drink beer in limited quantities.
5. Boosts Brain Health
As people age, brain functioning starts to diminish. Brain is an important organ which promotes memory, concentration and other functions. Consumption of beer reduces the risk of cognitive decline and Alzheimer's disease.
6. Healthy Heart
Drinking beer regularly reduces the risk of heart disease by 30 percent. Beer also has good anti-clotting effects that help to keep the blood vessels clean. If you drink beer in limited amounts, it may help reduce blood clotting.
7. Reduces Risk Of Diabetes
If you drink beer in limited quantities, the risk lowers of one suffering from diabetes. Studies have shown that moderate beer consumption can prevent type 2 diabetes as well, wherein it is known to lower the blood sugar levels.
8. Lowers Blood Pressure
Many noted studies have shown that individuals who drank beer had a normal blood pressure value. It means beer prevents high blood pressure surge. So, if you are suffering with high blood pressure, you can drink 1-2 glasses of it that wouldn't affect the BP level.
9. Prevents Stroke
Researchers have found out that limited quantity of beer consumption helps in preventing blood clots, which are responsible for blocking blood flow to the heart and other organs of the body.
10. Strong Bones
Beer if drunk in limited amounts may promote a good bone health due to its silicon content. Silicon aids in stimulating the bone-building cells and the estrogenic effect of beer helps to maintain healthy bones.
Share this article!
If you liked reading this article, share it with your loved ones.
ALSO READ: 10 Foods Rich In Chromium You Should Know
TRENDING ON ONEINDIA
- India’s Crorepatis Have Increased By 60 Per Cent: CBDT
- How To Avail 20% Discount On iPhone XR Purchase
- Here's Why Manikgad Fort Near Mumbai Should Be Your Next Destination
- Homemade Aloe Vera Moisturiser For Oily Skin
- Radhika On #MeToo: I Love That This Movement Has Come Here!
- Hero Destini 125 First Ride Review — A Cost-Effective But Premium Scooter
- Deodhar Trophy: Chance For Ashwin, Rahane, Raina And Karthik To Remain In ODI Reckoning
- Rupee In Trouble With Year-end Forecast At 76.50 Per US Dollar | <urn:uuid:76507424-7dd3-4a05-9c43-2417d81c13f9> | CC-MAIN-2018-43 | https://www.boldsky.com/health/nutrition/2018/10-amazing-health-benefits-of-beer-120711.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515088.88/warc/CC-MAIN-20181022134402-20181022155902-00467.warc.gz | en | 0.926397 | 896 | 2.703125 | 3 |
Mid-Book Test - Medium
|Name: _____________________________||Period: ___________________________|
This quiz consists of 5 multiple choice questions, 5 short answer questions, and 10 short essay questions.
Multiple Choice Questions
1. What does Mary tell Young Charlie after Da leaves?
(a) He's nosy.
(b) He's an idiot.
(c) He's senile.
(d) He's a great guy.
2. Da says that there will be plenty of jobs when ____________ takes over.
(a) Roosevelt and the Americans.
(b) Churchill and the British.
(c) Hitler and the Germans.
(d) Stalin and the Russians.
3. In what country does DA take place?
4. How does Adult Charlie realize his Mother and Da expressed their love?
5. What is the name of the man Mother had loved?
Short Answer Questions
1. Who is Oliver?
2. Which of the following does Mary not do when Charlie rebuffs her?
3. Who has recently died?
4. Da reappears and talks about the funeral and _________________.
5. What does Charlie say that Da had been for all of Charlie's life?
Short Essay Questions
1. What information does Young Charlie overhear and how does he react to it?
2. Why does Charlie become angry at Da for not taking the money he had sent him?
3. How does the subject of Charlie's birth mother come up in Act 1, Part 4?
4. How does the author use the lighthouse as a metaphor in this scene?
5. Explain the metaphor of Charlie's hurting himself on the glasses sculpture.
6. How does Da make his first appearance in the play?
7. What is the nature of the letter Young Charlie is writing and why does his mother not like it?
8. From whose point of view are the memory scenes told?
9. What does the melted sunglasses sculpture symbolize?
10. What is the main theme of the play and how is it exhibited for Charlie?
This section contains 828 words
(approx. 3 pages at 300 words per page) | <urn:uuid:359c1601-c6a3-42d7-8347-205528040647> | CC-MAIN-2014-10 | http://www.bookrags.com/lessonplan/da/test3.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678677656/warc/CC-MAIN-20140313024437-00008-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.933982 | 460 | 2.71875 | 3 |
Adamah, Falls Village, Connecticut, 2008
Adamah, Falls Village, Connecticut, 2008Click to Enlarge
No, this is not a kibbutz or moshav in northern Israel. It’s actually an organic farm in rural Connecticut. This woman is part of a program called ADAMAH (literally, “land”), run by the Isabella Freedman Jewish Retreat Center, in Falls Village, Connecticut. ADAMAH is a leadership training fellowship for young adults that’s designed to teach “the vital connection between Judaism and environmental stewardship.”
ADAMAH participants spend their time working on the center’s organic farm, learning about sustainable agriculture, and studying what Jewish tradition has to say about our natural environment. As a religion rooted in the agricultural practices of ancient Israel, Judaism has always reflected a deep understanding of nature’s rhythms and an appreciation for our delicate relationship with our surroundings.
Rabbi Ahai ben Josiah states:
One who purchases grain in the market—to what may such a person be likened?
To an infant whose mother died; although taken from door to door among wetnurses, the baby is not satisfied.
One who buys bread in the market is as good as dead and buried.
But one who eats from what one has grown is like an infant raised at its mother’s breast.
– Avot of Rabbi Natan, 30:6
Rabbi Hezekiah, Rabbi Kohen [said] in the name of Rav:
“It is forbidden to live in a city in which there is no physician, no bath, and no court that is able to administer punishment.”
Said Rabbi Yose ben Rabbi Bun,
“Also, it is forbidden to live in a town in which there is not a vegetable garden.”
– Jerusalem Talmud, Kiddushin 4:12
Two people were once fighting over a piece of land. Each claimed ownership, and each bolstered the claim with apparent proof.
After arguing for a long time, they agreed to resolve their conflict by putting the case before a rabbi. The rabbi sat as an arbitrator and listened carefully, but despite years of legal training the rabbi could not reach a decision. Both parties seemed to be right.
Finally the rabbi said, “Since I cannot decide to whom this land belongs, let’s ask the land.”
The rabbi put an ear to the ground, and after a moment stood up. “My friends, the land says it belongs to neither of you—but that you belong to it.”
– source unknown | <urn:uuid:ce55a184-5b1f-49a7-8eeb-209b6e4c9244> | CC-MAIN-2020-10 | http://www.jewishlens.org/photos/adamah-falls-village-connecticut-2008/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875148375.36/warc/CC-MAIN-20200229022458-20200229052458-00175.warc.gz | en | 0.9537 | 550 | 2.71875 | 3 |
ABOUT THIS BOOK
In Uplift Cinema, Allyson Nadia Field recovers the significant yet forgotten legacy of African American filmmaking in the 1910s. Like the racial uplift project, this cinema emphasized economic self-sufficiency, education, and respectability as the keys to African American progress. Field discusses films made at the Tuskegee and Hampton Institutes to promote education, as well as the controversial The New Era, which was an antiracist response to D. W. Griffith's The Birth of a Nation. She also shows how Black filmmakers in New York and Chicago engaged with uplift through the promotion of Black modernity. Uplift cinema developed not just as a response to onscreen racism, but constituted an original engagement with the new medium that has had a deep and lasting significance for African American cinema. Although none of these films survived, Field's examination of archival film ephemera presents a method for studying lost films that opens up new frontiers for exploring early film culture. | <urn:uuid:b4d7dd20-1c3d-452c-8eae-5206c2b79517> | CC-MAIN-2018-43 | https://www.bibliovault.org/BV.book.epl?ISBN=9780822375555 | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514355.90/warc/CC-MAIN-20181021203102-20181021224602-00205.warc.gz | en | 0.959882 | 201 | 3.15625 | 3 |
In January and February of 1971, a total of 81 children in two Cincinnati central city communities were screened for elevated blood lead levels. Seventeen of these children had blood lead levels over 40μg/100 gm of whole blood analyzed by the dithizone method. The absence of symptoms or signs of hematologic and radiographic changes emphasized that dependence on these is insufficient in identifying children with increased lead burdens. Lead was identified by an x-ray fluorescence analyzer in all the houses in which the screened children lived. Exterior surfaces had higher lead content than interior doors and doorways, which in turn had more lead content than other interior surfaces. | <urn:uuid:a4c650a4-127f-41e5-9151-fd9ac13257f5> | CC-MAIN-2016-30 | http://archpedi.jamanetwork.com/article.aspx?articleid=504734 | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257825124.22/warc/CC-MAIN-20160723071025-00304-ip-10-185-27-174.ec2.internal.warc.gz | en | 0.97905 | 133 | 3.078125 | 3 |
Mal Lee and Lorrae Ward
Those of you whose schools have gone digital, who have normalised the everyday use of the digital in all your classrooms and who are seeking to take advantage of the opportunities opened within the networked mode will want a teaching approach apposite for a networked and ever more integrated and collaborative world.
The author’s suggest you give careful thought to adopting a collaborative mode of teaching where your teachers work with parents – and where appropriate grandparents or carers – the community and your students in the 24/7/365 teaching of the academic, cognitive, digital, social and emotional skills and attitudes vital to the students’ success at school, life and work in the C21.
At the moment circumstances have in some part dictated the teaching of that suite of attributes be sharply divided with the schools primarily handling the academic and the parents, grandparents and students being left by default to teach all the other vital attributes from birth onwards.
At the moment schools, the homes and the wider community work largely in isolation teaching different attributes with little communication or interaction in an educational sense. Schools generally handle the academics with some social, emotional and cognitive learning. Parents, grandparents and/or carers may be involved in homework and presumably the teaching of values and life skills. However, there is little interaction, if any between the two. Imagine the potential for learning if the messages were consistent, if schools and the home shared responsibility for the learning of their children and worked in educational partnerships.
Significantly that collaboration is happening increasingly in the pre-primary years as the families and teachers embrace a more integrated early childhood and care (ECEC) approach that recognises the key teaching role of the home.
However once the children enter formal schooling that home contribution is soon forgotten. Schools appear to give little value to the knowledge and experience these early educators have. Further, and perhaps more significantly they appear to give little cognisance to the knowledge parents and grandparents have of their children. This is despite an extensive literature confirming that when teachers know their students and teach in ways that values and acknowledges what students bring to the classroom and where they come from there is a marked improvement in academic outcomes.
Significantly, despite operating in an increasingly networked and interconnected world, that formal teaching is usually done in isolation, behind the walls of ‘stand alone’ schools, using a teaching approach that occupies the young less than 20% of their waking time each year. It is a construct of an agrarian age.
The very considerable and vital teaching capacity of the homes and the community that shapes the learning of the young the other 80% of the time remains separate from the school, largely untapped and unshaped by the authorities, underused and not making the contribution to enhanced ‘national productivity’ it could.
In the networked world where the young have normalised the everyday use of the digital technology the learning the children do every minute they are awake has been heightened and their facility to learn independently increased.
It is time to adopt a mode of teaching from birth onwards where the school and its homes collaborate, using their particular strengths, particular teaching approach and the technology to provide the young the desired teaching and learning.
The model does presuppose the children, parents and teachers have normalised the use of the digital in their teaching.
In observing the pathfinding networked schools that teach collaboratively with their homes and community it seems so natural, such common sense and so in keeping with a vast body of research.
The surprise comes when you seek out the educational literature endorsing this kind of collaboration. There is much on collaboration between teachers, between teachers and students and between students; but little on authentic collaboration with the homes and the community. The value of home-school partnerships can be found in most policy discourse, it is less apparent in the research and even less so in the discourse of schools.
In the networked world teaching and learning ought no longer be restricted to a physical location, to one group of professionals or to one time. Nor should it occur in isolation across different locations.
The research and reasons underpinning the adoption of a collaborative model of teaching is vast, growing and strong. It is discussed in depth by the authors in a forthcoming publication by Lee and Finger on Leading a Networked School Community (in press) and by the authors in Collaborative teaching; the beginning of the journey (in press).
The research relates to the crucial teaching role that ought be played respectively by the parents, grandparents, children, community members and the teachers in the teaching of key attributes, the value of various parties working together in the teaching of key skills and attitudes and the very considerable impact on student attainment of school’s adopting a more open and collaborative style of teaching and forming a strong home-school bond.
The modes of teaching desired need not be markedly different to that employed by good parents, teachers and students today – except for the fact they will be more consciously collaborating, making significantly greater use of the human and technological capacity of the networked world and working upon the learning with greater awareness of what each other is doing. The combined collaborative effect is likely to be much greater than any achieved through separate activities.
The research affirms the imperative of parents being the child’s prime teacher from birth onwards. In the pre-primary years they have to play the lead teaching role in the development of all the attributes (Strom and Strom, 2010) mentioned above but when the children start school they can shed their prime responsibility for the academic and gradually devolve ever-greater responsibility for the development of the other attributes to their children. However, the research points to it being crucial they still play a lead teaching role in the on-going development of their children’s social and emotional skills and attitudes and a major role in nurturing the cognitive and digital skills well into the secondary schools years (Harvard Family Research Project, 2004). This poses an equity dilemma, as there are vast differences in the capacity of parents to support their child’s development. Schools have a role in supporting and guiding parents to be effective educators. The networked world provides endless opportunities for them to do so.
What many tend to forget is that today’s parents have become increasingly digitally empowered. They are increasingly ‘Net Generation parents, have largely normalised the everyday use of the digital and expect teachers to both use the digital in their everyday teaching from Kindergarten on and for teachers to collaborate with them in the use of that technology (Project Tomorrow, 2011).
The experience of the pathfinders and recent research attests to the ever greater role grandparents are playing and can play in the teaching of the young often well into the secondary years. Recent US Census data reveals that in 2006 12.8 % of children in the 5-14 year group were spending on average 14-16 hours a week with a grandparent (Sparks, 2011). With the ‘Baby Boomers’ moving increasingly into the grandparent ranks its capability will continue to grow.
So too will the facility of the elders within the school’s community to assist, many being highly qualified and with that rare commodity in education, time.
Any collaborative teaching model ought factor in what the research is underscoring (Project Tomorrow, 2010), the young themselves want to have a greater voice in their teaching within the school, have a major say in the teaching outside the classroom and will increasingly use the ever-more sophisticated technology – possibly with the support of peers – to teach themselves. Google is the preferred expert of choice for many.
The authors recognise – as the research attests – the professional teacher must continue to play a lead teaching role; by far the major role in the teaching of the academic skills. However, they could contribute significantly more to the development of other key educational building blocks if they worked in collaboration with the parents and children. Further, they must recognise the extent to which parents and their children exist in a networked world; where information is instantly available, where interaction is available at the push of a button.
It may be that one of earliest jobs of the professional teacher is to bring together the ‘language of learning’, to clarify in the minds of our youngest learners the language of the learning processes that they have already learnt at home and in playschool. Rather than seeing school as ‘different learning’ schools should see themselves as the next extension of the Piagetian model previously used by the families, playgroups and preschools.
Significantly, as the pathfinding schools have found, that collaboration need not be just in the face to face teaching but can take the form of providing advice and direction, teaching of the ‘teachers’ and working with the community members to develop teaching support materials.
The educational impact, particularly reflected in enhanced student attainment but also in the improved student attendance, involvement and behaviour, of schools adopting a more open and collaborative relationship with its homes is well documented but appears to be forgotten in many circles.
One could continue.
Suffice it to say that in recent years the level and sophistication of the collaborative technology in the home, in the hands of the young and within networked schools has reached the stage where it can be normalised in the collaborative teaching of not only the young but the wider community.
The Current Situation
You know the scene.
Suffice it to say aside from the schools operating within the networked mode authentic collaboration with the homes leaves much to be desired.
Years of efforts to foster home-school collaboration, even when it was mandated at in Scotland in 2006, and in England with its home-school agreements, have failed. Parents continue to be seen as fund-raisers, taxi drivers and teacher’s-aides. They are generally passive participants in parent-teacher meetings and recipients of school reports. True educational partnerships are rare.
However, the signs are good with the schools that have moved to the networked phase and are ready attitudinally and ability wise to adopt an ever more collaborative form of teaching.
Any shift, as dramatic as adopting a fundamentally different model of teaching and learning, will have to contend with a host of hurdles. They are as the authors indicate in the aforementioned book many and varied.
The normalising of the approach will take time, some tense moments, astute leadership and the convincing of one’s community the school really does want to collaborate. For too long parents have been held at an arm’s length and teachers protected by authorities from parental “interference”. Changing this will require an attitudinal shift within schools and potentially families. Accepting dual responsibility for the learning of their children will require both parties to reflect on their roles in educating the young.
Tokenism, and ‘one-way’ collaboration where the school determines the nature of the arrangement will not work (Grant, 2009, 2010).
The lessons of the pathfinding schools indicate the school, its head and in particular its teachers – and sometimes the education authority and teacher unions – are likely to be the main stumbling block. However if the school is operating within the networked mode and the staff is ready the transformation can commence very quickly.
We do stress it has to be an individual school decision, and not a mandate from high.
Authentic collaboration is a difficult art but done well can markedly enhance the learning and lives of the children, their families, the school’s community and the teaching staff.
Grant, L (2009) Developing the home-school relationship using digital technologies Futurelab August 2010
Grant, L (2010) Connecting digital literacy between home and school. Futurelab December 2010
Harvard Family Research Project (2004) ‘Adolescence: Are Parents Relevant to Student’s High School Achievement and Post secondary Attainment?’
Lee, M and Finger, G (eds) (in press) Leading a Networked School Community
Project Tomorrow (2010), Unleashing the Future Educators. ‘Speak Up’ about the use of Emerging Technologies for Learning. May 2010 Project Tomorrow
Project Tomorrow (2011) The New Three E’s of Education: Enabled, Engaged and Empowered Speak Up 2010 National Findings Project Tomorrow 2011
Sparks, S.D (2011) ‘Statistics show more grandparents caring for grandchildren’ Education Week Aug 3 2011
Strom, R and Strom, P (2010) Parenting Young Children Exploring the Internet, Television, Play and Reading, IAP Charlotte | <urn:uuid:08541012-5e2e-441b-ad10-4b3247bdfea7> | CC-MAIN-2018-51 | http://malleehome.com/?p=180 | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823236.2/warc/CC-MAIN-20181210013115-20181210034615-00469.warc.gz | en | 0.962084 | 2,566 | 2.5625 | 3 |
An original standing order that has not been significantly modified, SO 116 embodies a fundamental principle of Senate procedure. Section 23 of the Constitution provides that questions in the Senate shall be resolved by a majority of votes, that all senators shall have a deliberative vote and that when the votes are equally divided, the question shall be resolved in the negative.
The form of the question specified in SO 116 ensures that the constitutional principle is observed at the most detailed level of the legislative process. The question, that the clause stand as printed, is designed to ensure that clauses achieve the required majority support to remain in the bill. If the votes on such a question are equally divided, the question is lost and a clause which has not attracted majority support is therefore removed from the bill.
In practice, the consideration of a bill clause by clause is now almost unheard of, the preferred method being to take the bill as a whole, by leave, for more expeditious consideration. The desire for expedition was evident from relatively early times. Edwards notes an example from 1936 when the Income Tax Assessment Bill 1936 was dealt with in committee “a page at a time”! He cites other instances during his own period as Clerk when certain bills were taken as a whole, by leave, and agreed to.
When bills are taken as a whole, opposition to a clause or an equivalent self-contained segment is managed by the chair dividing the overarching question (“That the bill stand as printed”) in respect of the opposed segment, and putting the question, “That the clause [or segment] stand as printed”, to test whether it has majority support and whether it should remain in the bill. | <urn:uuid:e0873cd1-757b-4b49-8ead-154263bc12e8> | CC-MAIN-2017-51 | https://www.aph.gov.au/About_Parliament/Senate/Powers_practice_n_procedures/aso/~/link.aspx?_id=FD4796BFA4224CC8A4F501F9E5606D1B&_z=z | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948599549.81/warc/CC-MAIN-20171218005540-20171218031540-00448.warc.gz | en | 0.968582 | 341 | 3.078125 | 3 |
Lena, thank you for participating! And so… what do YOU think?
It’s the oldest teaching trick in the book… and it never fails to bring your students [back] to life. And that trick is humor! Sometimes, as educators, we take ourselves a little too seriously (what?! never!). Find cartoons related to your subject, bring in some crazy props, and try something new! Your students will appreciate it! We are, after all, “on stage” while we’re teaching.
Speaking of humor, I’ve stumbled upon an interesting video that I think we can all appreciate. It’s a stand-up comedy routine by Don McMillan, a PHD-holding comedian, called “Life After Death by PowerPoint.” His bit on PowerPoint is hilarious… and also very true. Enjoy!
PowerPoint is just one of those things in life that we, as educators, will have to encounter, whether we like it or not! If done right, it can be an asset to our teaching toolbox. Since we’re going to be using it at some point, let’s become more efficient! Here are a few tips that will kick-off the new “10 Hot Tips” series. Enjoy!
I’ve been doing it wrong all along, and so have you!
Garr Reynold’s approach to presentation design is fresh and effective. As referred to in this previous post, we follow many incorrect conventions when creating our instructional material. The madness must stop! Here are a few ways to find the path to presentation zen:
- Attend the upcoming instructional technology workshop.
- Regularly read the presentation zen blog.
- Read the book.
And, of course, consult with your campus Center For Teaching and Learning for assistance!
Have you seen the Educause website yet? If not, what are you waiting for? Educause is a great resource for educators. Among those resources is their “7 Things you should know about “ series, which provides information on emerging instructional technologies in plain English!
Here is a link to one such article that relates directly to our last post:
7 Things You Should Know about Clickers
(Next to “view this resource,” click on the PDF icon.)
Have you ever wanted to know if your students are really “getting it” during classroom lectures? Do you ever wonder what the quiet students are thinking? Have you ever been on the lookout for new tools and techniques to inject some new life into your teachings? Of course you have!
In the CTL, we have a piece of technology that can help you connect with all of your students, and even… make learning fun?
We’ve all been through this nightmare – sitting in a dark room, staring at a screen filled with clip art and an endless army of bullet points while the presenter reads the slides aloud, as you struggle to stay awake. Oh, the horror! Is this the best way to present information to a class? Of course not! Then why subject your students to that same torture? Stop PowerPoint before it harms more students! | <urn:uuid:2dc5e0e6-692f-44da-8ae1-f3c70f4dca98> | CC-MAIN-2018-22 | http://ctl.emacomb.com/blog/tag/powerpoint/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867092.48/warc/CC-MAIN-20180525121739-20180525141739-00104.warc.gz | en | 0.930713 | 659 | 2.53125 | 3 |
Two-way neuronal connectivity with brain machine interfaces has the potential to treat a variety of illnesses including but not limited to blindness, deafness, effects of strokes, cerebral palsy, memory loss, amputations, and paralysis. Hundreds of thousands of people suffer from these diseases or injuries every year and treatments are slow to develop. Having safe and reliable innovative treatments for these diseases will dramatically affect the lives of many individuals.
Neural connectivity in essence is where man-made sensors can receive and transmit meaningful data to and from neurons. Lots of ground has been gained in this area and single neurons can be tapped with electrodes. Information such as finger, hand and arm movements, the movements involved in walking, and the information involved in sight and hearing can be picked up by sensitive electrodes. Pressure, temperature and texture are able to be transmitted to both peripheral neurons and to the brain. There are complications however and The Cure Is Now is committed to furthering this field by taking the following approach.
In order to be able to communicate at the neuron level, electrodes must be implanted into the nerve tissue. Long term implantation results in an immune response resulting in scar tissue which dulls electrode sensitivity. The Cure Is Now will investigate how to safely down regulate the local immune system during long-term electrode implantation.
Blurry or digitized images can be sent directly to the visual cortex. Simple information such as pressure, temperature and texture can be sent to the brain regarding touch and grip. But all the resolution and vividness of reality is not able to be accurately transmitted. The Cure Is Now will work on better information delivery systems through human/machine interface systems. This can be achieved through better understanding the neural code. Brain mapping and connectome research will also be implemented here to best learn how to transmit and receive signals to the brain. Ultimately, The Cure Is Now aims to cure blindness, deafness, stroke, spinal cord injury, loss of limbs due to injury and/or amputation, memory loss and more. | <urn:uuid:36a387d9-f6d7-489f-800c-a0050d55fc48> | CC-MAIN-2019-51 | https://m.thecureisnow.org/our-strategy/programs/neuron-level-connectivity/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529955.67/warc/CC-MAIN-20191211045724-20191211073724-00236.warc.gz | en | 0.941086 | 417 | 3.6875 | 4 |
Recognizing visual objects in images, and actions in videos, are important
problems in computer vision, with many applications in security, commerce, human-compute interaction,
content-based video retrieval, visual surveillance, analysis of sports events and more.
Recognition is mainly divided into two parts: category recognition (classification) and
detection/localization. The goal of category recognition is to classify a given object
(or action) into one of several pre-specified categories, while object (action) detection is meant to
separate objects (actions) of interest from the background in a target image or video. Typically,
learning-based approaches involve generative or discriminative training models (parametric models) for each
category based on training examples. These methods require a large number of training examples, can result
in over-fitting of parameters, and do not scale well with the number of object (or action) categories.
We have developed a framework where problems such as generic object detection, action detection, and
action category classification can be solved in a unified setting from a single example (i.e. without training.)
In a related effort, we have also developed a method which can accurately detect salient objects or actions from
visual data without any background or prior knowledge.
Here is a recent talk that summarizes these ideas. For additional results
and graphic explanations, please visit the project webpages for object detection;
action recognition ; and saliency detection.
Also, please consult the relevant publications below. | <urn:uuid:68494d16-e842-480c-8cf4-c6548b9e8f70> | CC-MAIN-2017-09 | https://users.soe.ucsc.edu/~milanfar/research/computer-vision.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170380.12/warc/CC-MAIN-20170219104610-00286-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.901459 | 317 | 2.609375 | 3 |
On July 30, 1965, President Lyndon B. Johnson signed both Medicare and Medicaid into law. Over the past 49 years, Medicare has provided comprehensive coverage to millions of seniors and people with disabilities, while Medicaid has provided coverage for millions of the most vulnerable Americans: low-income parents, children, and those with disabilities.
Because of the Affordable Care Act, states are expanding their Medicaid programs to cover more Americans, and today, Medicaid covers over 66 million Americans.
Bill Sheshko, a 55-year-old self-employed man from Fair Lawn, New Jersey, experienced the benefits of the Affordable Care Act and Medicaid expansion first hand. He’d been without health insurance for years, but with the Affordable Care Act, and because his state decided to expand Medicaid, he finally became eligible for Medicaid.
A few months ago, Bill began having difficulty breathing and noticed his legs and feet starting to swell. Because of his new coverage, Bill was able to make an appointment with his doctor and was subsequently diagnosed with congestive heart failure, high blood pressure, and high blood sugar. After a few scary days in the hospital, he is now home and working with his doctors to control his conditions with medication and diet. In a letter to the President, Bill wrote about the true meaning of his health coverage: “At least now I have a chance, all because of you.”
Like Mr. Sheshko, 34-year-old California native Anna Smith was given a chance, in her case after a traumatic accident. When she was 21 years old, Anna Smith fell out of a tree at a church picnic and fractured one of the vertebrae in her spine. She was instantly paralyzed, preventing her from walking or feeling her legs. Medical care suddenly became essential to her life. Because of her condition, she became one of over 3.7 million disabled Americans covered under both Medicare and Medicaid.
Over the past 13 years since her accident, Medicare and Medicaid have helped Anna adjust to her new life and made it possible for her to pursue a master’s degree in social work. Anna wrote to President Obama to express her gratitude for the federal government’s Medicaid and Medicare programs: “I have been able to receive quality medical care without having to decide whether to pay a prescription copay or my electric bill.”
No one should have to make the choice between their health and paying the bills. There are millions of hardworking Americans across the country like Bill and Anna who rely on Medicaid and Medicare to get the health coverage they deserve. As Bill wrote in his letter to the President, “I think people have the wrong idea of what Medicaid is. I was doing good, and then the economic downturn happened, and suddenly I wasn’t doing so good.”
Forty-nine years ago, our country made a promise to older, disabled, and low-income Americans that they would have the medical care they need to live happier and healthier lives. Today, because of Medicare and Medicaid, millions of Americans are provided the same chance that Bill and Anna had. Millions more would benefit if all states expanded Medicaid under the health care law.
In speaking for millions of Americans across the country, Bill wrote to President Obama, “If this happened only 10 months ago I might be dead, or losing the house in which I was born and inherited from my parents. You have changed America, Mr. President. You saved my life and I will be forever grateful.”
See photos from the signing of the Social Security Amendments in 1965, which established Medicare and Medicaid: | <urn:uuid:b2b5fa26-a9df-4de1-bcd9-8f234af0373f> | CC-MAIN-2021-21 | https://obamawhitehouse.archives.gov/blog/2014/07/30/affordable-care-act-and-medicaid-expansion-giving-more-people-chance | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991537.32/warc/CC-MAIN-20210513045934-20210513075934-00082.warc.gz | en | 0.978581 | 737 | 2.53125 | 3 |
Chemical-Looping Combustion in a 100 kW Unit for Solid Fuels
Paper i proceeding, 2012
Chemical-looping combustion is a novel technology for combustion of fossil fuels. By using a circulating bed material to transfer oxygen to the fuel, a pure stream of CO2 can be obtained from the flue gas, undiluted by N2 from the air. The main advantage of this capture technology is that there is no direct efficiency loss in obtaining the CO2 in a separate stream. This study describes results from operation in a 100 kWth chemical-looping combustor for solid fuels. The oxygen carrier used was ilmenite, an iron-titanium oxide. Coal is fed directly into a loop seal, leading to the fuel reactor, through a set of screws. All parts of the unit are fluidized with steam, except for the air reactor, which is fluidized with air, and the loop seal with the fuel insertion, which is fluidized with nitrogen. All-in-all, the unit has eleven windboxes, of which four are loop seals. Three experiments have been conducted using a Colombian coal as fuel. Operation was stable and loss of char to the air reactor was small, meaning that the CO2 capture efficiency was high (>90%). Gas concentration measurements showed the presence of unconverted CO, H2 and CH4 corresponding to an oxygen demand of 18.5% at 950°C. | <urn:uuid:7cafbed3-4041-4269-a80d-e27edb4c816c> | CC-MAIN-2018-51 | https://research.chalmers.se/publication/155194 | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824115.18/warc/CC-MAIN-20181212181507-20181212203007-00217.warc.gz | en | 0.947065 | 291 | 3.015625 | 3 |
Cal OSHA's Hazardous Waste Operations and Emergency Response (Title 8, General Industry Safety Order 5192) requires that individuals at risk of exposure to hazardous materials receive the proper training.
Hazardous materials include chemicals used in teaching and research laboratory experiments but they also include solvents, adhesives, cleaning agents as well as paints, varnishes, use of solder, film development and other compounds not typically associated with the laboratory environment.
Each of these compounds typically has one or more hazardous properties. The material may pose a hazard from inhalation, ingestion, skin absorption or it may be damaging to the eyes.
Before working with hazardous materials it is important to research these properties and determine the best way to protect against them. This usually starts with the product's Material Data Safety Sheet (MSDS). Every manufacturer is required to create an MSDS for each of their products that requires one. You can look for the MSDS on the manufacturer web site or contact the Environmental Safety Office to receive a copy.
When taking training...
- always ask your supervisor what "Title" to input.
- always use your USFCA email when prompted. | <urn:uuid:217febb5-113e-4136-95bc-b881a673713b> | CC-MAIN-2019-51 | https://myusf.usfca.edu/environmental-health-safety/hazardous-materials | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541288287.53/warc/CC-MAIN-20191214174719-20191214202719-00508.warc.gz | en | 0.917399 | 236 | 3 | 3 |
If your kids like dinosaurs and playing pretend, they’ll LOVE playing paleontologist! I created a dinosaur bones sensory bin and my two had a blast pretending to be scientists while hunting for dino bones. This is great fun anytime for a dinosaur lover, and it also makes a great go-along activity to a science unit on dinosaurs or fossils.
Dinosaur Bones Sensory Bin
We set up our sensory bin in our homemade sand and water table that we moved indoors for the winter. Right now it has sand in it, so that’s what we used for our sensory material.
The dinosaur bone fossil skulls are toys made by Safari.
All I had to do was open up the Toob…
and bury the fossils for the kids to find.
I supplied two paint brushes for the kids to use to gently excavate the fossils.
We spent awhile talking about paleontology and what paleontologists do when they hunt for fossils. Then the kids started hunting!
I loved how they used their hands to dig in the sand until they felt a fossil, and then carefully used their brush to clean the sand away from the bones like a real paleontologist.
After the kids had recovered all the toys, they carefully arranged them on top of a hill of sand, saying they were setting up a museum for people to come view the dinosaur bones on display. They even added a few little plastic people figurines who walked around looking at all the dinosaur skulls.
The day after we did our dinosaur bones sensory bin, I came across a dinosaur fossil bin by Play Create Explore using the same fossils we used, but a different sensory material, and with ideas for other educational activities. Be sure to see her post, too, so that you can have multiple ways to use your dinosaur fossil toys!
See more of our dinosaur posts:
This post may contain affiliate links. | <urn:uuid:6c55e375-edfa-4fb1-8322-baa9fe3859a0> | CC-MAIN-2016-26 | http://www.parentteachplay.com/dinosaur-bones-sensory-bin/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398209.20/warc/CC-MAIN-20160624154958-00189-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.946025 | 386 | 2.84375 | 3 |
Disclaimer: This series of articles will feature tools, both on a tablet and on the web, that will allow your students to use their thinking skills in the classroom. Please be aware that we are not advocating or negating the use of technology in the Montessori classroom. We are simply offering a variety of tools that may be effectively used to assist your students with a variety of tasks. Furthermore, we believe that the technology described here is not intended for early childhood and in some cases lower elementary. Each article in this series will present tools that will support the following thinking skills.
Understanding, along with memorization, or remembering, is often considered as one of the two basic thinking skills students need to achieve. Per Bloom’s taxonomy of thinking skills, they are the two skills that form the foundation and are considered basic thinking skills. Although, as teachers, we often want to move children past these two lower level thinking skills, it is important to remember that many children still need to master these two levels to begin thinking clearly and begin to master the skills necessary to focus on the other higher level problem solving skills:
Following is a list of some of the technology tools we found helpful in promoting and fostering understanding.
Studyblue – studyblue.com
StudyBlue, presents itself as a crowdsource learning platform. It provides essential tools that allow children to take the information and process it. Using this platform your children will be able to enjoy such tools as:
Study guide creator
Find over 272 million study cards, already created by other users, on various subjects
Children can create their study aids using any platform
Create quizzes so that collaboration and self-study practice can take place.
Flipboard – flipboard.com
Flipboard.com is a platform where children can collect various articles and combine them into a “magazine”. This platform is ideal if all you are interested in is collecting information that you can refer to from time to time. The features work on a variety of platforms and gives you access to your content regardless of where you are, or what device you prefer to use.
Nearpod – nearpod.com
Nearpod.com pitches itself as a platform for schools. It features individual lessons that are research based, incorporate instructional best practices and many of the activities are created by other educational experts. Following our testing, we thought the tools on this platform would be useful for student projects, particularly since Montessori students are often involved in research. Students will delight in the ability to gather a variety of file formats and crate a presentation that they can then share with the rest of their group or other groups in the class. Nearpod is available online as an app.
Diigo – diigo.com
At first glance you might be fooled and think that Diigo is similar Flipboard. However, if you look a little deeper you will realize that there is a whole slew of things you can do on this platform that make it ideal for a classroom situation. Following is a short list of these features:
Annotate PDF documents on the fly
Organize links, references and personal input so that you can have a functional outline.
Share and collaborate with your classmates on a project while you exchange information or anything you have gathered.
Add texts and comments in the format of a sticky note
Tag your collected content so that you can easily find anything you need
Use the Outliner to streamline the custom content you have created
Highlight the words or phrases that matter
Store your online resources with annotations intact forever, even if the original source is taken down from the website, you can keep the content
Available online and as an app.
ThinkLink – thinklink.com
ThinkLink.com allows you to annotate and enhance images and videos with a variety of features that can engage students. The platform sports over 70 rich media tags that you can place on a picture and make it come alive. If your students are into creating graphical presentations that attract attention and encourage exploration, then perhaps this platform might be of use to you. If you are already using Apple iMacs in your classroom then the features presented in this platform, can be found in iBooks Author. What makes this platform different is that you can use your pictures across a variety of operating systems and devices. However, remember that you are limited to creating interactive pictures. Following are some of the features that are present:
Create interactive elements that are consistent across a variety of platforms
Embed data for re-teaching or to clarify items
Available online and on mobile
MindMeister – MindMeister.com
MindMeister.com is a competent tool for creating online mind mapping. If you are into creating mind maps, then this is the tool we recommend. It allows you to capture, develop and share ideas visually. Its main purpose is to categorize information and allow your child to understand the knowledge they have accumulated from a variety of sources. The site claims that more than 6 million people are using the features, and we enjoyed its capabilities. It allowed us easily brainstorm, plan projects, categorize information, and effectively organize information in a simple yet reliable manner. The platform is available both online and through an app for your mobile devices. One of the features we enjoyed the most was our ability to share any mind maps with anybody we chose to be a part of our group. What made it even more attractive was that our mind maps were shared in real time. That means that any changes you make on a mind map, your collaborators will see them instantaneously. | <urn:uuid:489c47cf-7582-4689-9c61-f6eeb310b542> | CC-MAIN-2020-40 | https://www.montessoriviews.com/post/using-technology-to-support-thinking-skills-in-the-elementary-montessori-classroom-understanding | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402127397.84/warc/CC-MAIN-20200930172714-20200930202714-00410.warc.gz | en | 0.95001 | 1,136 | 3.78125 | 4 |
As recently as April of this year, former president Bill Clinton defended the welfare reform bill he signed into law on August 22, 1996—twenty years ago today—as one of the great accomplishments of his presidency. The bill scrapped the welfare program known as Aid to Families With Dependent Children (AFDC) and created a new one that lasts to this day—Temporary Assistance for Needy Families (TANF). There was a grandiose idea behind the change: TANF was no simple safety net; it was also meant to be a springboard to self-sufficiency through employment, which it encouraged recipients to find work by imposing work requirements and limiting how long they could receive benefits.
Today, across the country, welfare is—at best—a shadow of its former self. In much of the Deep South and parts of the West, it has all but disappeared. In the aftermath of welfare reform, there has been a sharp rise in the number of households with children reporting incomes of less than $2 per person per day, a fact we documented in our book, $2 a Day. As of 2012, according to the most reliable government data available on the subject, roughly 3 million American children spend at least three months in a calendar year living on virtually no money. Numerous other sources of data confirm these findings. According to the most recent data available (2014), TANF rolls are now down to about 850,000 adults with their 2.5 million children—a whopping decline of 75 percent from 1996. TANF was meant to “replace” AFDC. What it did in reality was essentially kill the U.S. cash welfare system. (We use the term “cash welfare” to distinguish it from other forms of assistance, such as housing vouchers and food stamps, which have pre-designated uses.)
Cleveland, where the Republicans hosted their convention this year, is one of the poorest cities in the country and a place where the effects of this reform can be seen most plainly. What has happened to welfare in Cuyahoga County, which includes Cleveland and its inner suburbs, is reflective of its fate elsewhere in the nation. Currently, the county’s TANF-to-poverty ratio (the fraction of poor families with children who are actually receiving help from the program) sits at 22 percent—right about at Ohio’s, and the nation’s, average. (In some states, it is dramatically lower, such as Georgia, where it is just six, and Texas, where it is five.)
What’s happened to poor people as a result? Since 2013, we’ve spent considerable time in the city trying to find out. Each year, we catch up with several families who, in 2013, had spent at least three months living without money income exceeding $2 per person per day. To deepen our perspective, we also spend time trying to understand what’s going on for the city’s poorest, more broadly speaking. Earlier this month, one of us—Kathryn—spent a day talking to supplicants at a west-side food pantry. She spent an afternoon walking the streets of one neighborhood, striking up casual conversations with residents as they took out the garbage or sat on their porches. Yet the toughest experience was when Kathryn went for a ride-along with bailiffs assigned to the Cleveland Housing Court as they went about their daily rounds, evicting a family from their west-side apartment mid-meal.
Prior to August 22, 1996, families such as that one—families with little or no cash income—were entitled by law to a check from the government, thanks to AFDC. The program had many flaws. Yet it provided a cash floor that could have eased the hardships of folks at the end of their ropes.
TANF ought to be able to help—albeit temporarily, as the name implies. Yet many of the people we have studied have never received it. One woman, a high-school graduate and a mother of two, told us she doesn’t think it’s worth it. She believes that in order to meet the program’s requirements, she would have to work full time at a make-work job, leaving her no time to find legitimate employment.
Others have tried to get it and failed. When one mother we know lost her job at Walmart after her only means of transportation failed, she initially refused to apply for TANF out of pride, insisting that she was a worker, not a leach on the government. Finally, after months of fruitless job search, plus a list of health diagnoses a mile long, she broke down and applied. Since then, she has been sent away three times, all for no legitimate reason we, as TANF experts, can discern. Now, she, her daughter, and her fiancé are tripled-up with friends in a house that lacks heat and running water but offers a free roof over her head.
And many more aren’t even aware TANF is available. During her visit to the west-side food pantry a few weeks ago, Kathryn met families camping in unfinished basements of friends, a couple who survived a Cleveland winter while sleeping in a tent (they advised finding a thick mattress to keep your body off the ground and to keep a candle burning), and a family in the process of breaking apart—the three children parceled off to relatives—until a laid-off Ford assembly line worker and his partner of 14 years, who cleaned suburban homes until her car was repossessed, can secure stable jobs and a place to live. When we asked why they didn’t apply for TANF, we were met with blank stares. If our experiences across the city this summer are any guide, many poor Clevelanders—even those in desperate straits—don’t even realize the program exists.
We’ve traveled to many different parts of the country getting to know people in need. While greedy, heartless landlords were sometimes a source of their troubles, their biggest problem—by far—has been the lack of access to a cash safety net—money—when failing to find or keep a job. In 21st-century America, a family needs at least some cash to have any chance at stability. Only money can pay the rent (though a minority of families get subsidies via a housing voucher). Only money buys socks, underwear, and school supplies. Money is what’s needed to keep the utilities on. Each of the families we followed—technically eligible if our reading of the rules is right—weren’t getting that money from TANF.
How did they survive? Nearly all had sold plasma from time to time, some regularly. In 2014, so-called “donations” hit an all-time high at 32.5 million, triple the rate recorded a decade prior. They collected tin cans for an average yield of about $1 an hour. They traded away their food stamps, usually at the going rate of 50 or 60 cents on the dollar. Some traded sex for cash or—more commonly—the payment of their cell phone bill, a room to stay in, a meal, or some other kind of help. One 15-year-old was lured into a sexual relationship with her teacher on the promise of food. Yet these desperately needy families either didn’t know the program existed, felt the stigma and hassle weren’t worth it, or had been rebuffed at the welfare office.
Some would argue that families are better off without cash welfare. Franklin Delano Roosevelt warned that welfare was “a narcotic, a subtle destroyer of the human spirit.” Yet even Ron Haskins, one of the Republican architects of the program, recognizes that the problem of “disconnected mothers”—those neither working nor on welfare—is “a serious policy issue, that its magnitude is increasing, and that in two decades the nation has not figured out how to address the problem.”
Why has TANF left so many needy families behind? Its advocates argue that it reduces dependency and promotes work. Its critics contend that the time limits and work requirements it imposes are too punitive. Yet a careful look under the hood reveals that both of these claims fail to grasp the fundamental nature of what TANF has become.
To put it plainly, TANF is not really a welfare program at all. Peter Germanis, a conservative expert on welfare policy and former Reagan White House aide, describes it best, as a “fixed and flexible funding stream”—think slush fund—for states, provided by what are known as “block grants.” Yes, some block-grant dollars are used to provide cash aid to struggling families. But three of every four dollars allocated to TANF is directed toward other purposes.
How can this be? After the 1996 welfare reform bill was signed into law, states were no longer obligated to give out a dime to those in need. The rules governing TANF are so flexible that states can potentially eliminate cash handouts all together. What’s more, TANF’s rules threaten to penalize states that continue to provide cash assistance, such as California, Minnesota, Oregon, and Vermont. It is easier to comply with TANF regulations by simply pushing people off the rolls, as Cuyahoga County has done.
Built into the very core of TANF are perverse incentives for states to shed families from the welfare rolls. If they do so, they get to keep the money and use it for other things. And outside of what’s spent on cash aid, there is virtually no meaningful oversight on how the rest of the money is spent.
If past is prologue, the dollars devoted to cash assistance will only continue to dwindle. Even in 2006, TANF had far greater reach than it does now. Meanwhile, counts of the number of families knocking on the doors of the nation’s food pantries have reached the highest point ever recorded. “Donations” of blood plasma in exchange for cash have tripled in the last decade. School-aged children are increasingly likely to be homeless or doubled up. In sum, on many measures, child and family wellbeing has taken a nosedive.
Welfare reform is certainly not the only factor driving these trends. An increasingly perilous low-wage labor market and a growing affordable-housing crisis are critical drivers too. Yet a simple thought experiment brings the role of welfare reform in focus. Imagine a world in which states are prohibited by law from denying any family who meets eligibility criteria. Now envision a world in which denying a family in need is perfectly legal, and states who do so get to keep the cash. This is America before and after welfare reform. On the eve of welfare reform, roughly seven in 10 poor families claimed cash aid; only about two in 10 now do so. If the safeguards governing AFDC were in place today, this sort of extreme poverty would be a fraction of what it is now.
What are states doing with their TANF dollars if they aren’t providing cash welfare to families? Some states, such as Ohio, spend a considerable portion on child care, no doubt a boon to the working poor, yet folks not in jobs or in work programs aren’t eligible. Likewise other states, such as Wisconsin, use some of their block grant to fund state tax credits that benefit the working poor.
But the remainder goes to an assortment of other activities not necessarily benefitting the impoverished at all. Michigan funds college scholarships for young adults with no children, under the rationale that doing so may reduce teen pregnancy. Texas spends a large chunk of its block grant on its child welfare-system, an expense the state would have to assume responsibility for otherwise. When TANF is used to pay for giveaways for the non-poor or to plug budget holes, it becomes welfare for states and not for people.
What states spend astonishingly little on—besides cash assistance—is helping the poor find employment. In 2014, Ohio—which is about at the national average here—allocated only 8 percent of combined federal and state TANF funding to vital “hand-up” activities linking recipients to jobs.
Ronald Regan brought the image of the infamous—albeit mythical—welfare queen into the national consciousness. Bill Clinton probably owes his first term in office to his promise to “end welfare as we know it,” and possibly his second to signing the reform into law. Both politicians railed against AFDC’s so-called “perverse disincentives.” TANF offered states a lot of flexibility to innovate, to allow a flowering of new ideas to help the poor. But that’s not what the country got. Instead it got a new kind of welfare queens: states. States, not people, are using TANF to close the holes in their budgets. It is states, not people, who are falling prey to the “perverse disincentives” of welfare.
We want to hear what you think about this article. Submit a letter to the editor or write to firstname.lastname@example.org. | <urn:uuid:9cd61767-401b-4f6f-be1d-dfb76e41ed1f> | CC-MAIN-2019-30 | https://www.theatlantic.com/business/archive/2016/08/20-years-welfare-reform/496730/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526337.45/warc/CC-MAIN-20190719182214-20190719204214-00430.warc.gz | en | 0.973736 | 2,748 | 2.640625 | 3 |
When you use endearing words, such as, “I really care about you,” how are you saying the words? And with what intent? Are you using eye contact? What are tell-tale signs that perhaps you actually do not care as much as you words purport to say? Looking away, speaking gruffly, mumbling, being twitchy or restless all indicate your mind may be elsewhere. A frown or grimace can give you away, as can arms folded tightly across your chest—you really aren’t very sincere. Or worse, if you take an argumentative tone, it could show you may not care at all!
Care talk is a gift we can bring to others, and entails a number of simple rules. How many of these do you follow when you interact with your loved one?
- Give the person your full attention—recognition of another person opens the door to real communication. When possible, interact on a face-to-face basis when talking with a person with dementia or severe debilitation.
- Speak in a tone of voice that is appropriate for the person and the situation. Low tones fit when you’re speaking to a person who hears well. You may need to speak louder and enunciate more clearly for someone who is hearing-impaired or in a crowded room.
- Use nurturing words that invite the other to respond. “May I help you” can be far more pleasing to a disabled person than “I can do this for you.” The “may I” phrase allows the other an opportunity to say “no” in a gracious way.
- Emphasize words that encourage, inspire, support, soothe, hearten or elevate the mood of your ill relative. You can easily stifle a response when you push for an agenda with “must,” “should,” or “have to” words. “You’d better go to your physical therapy appointment today” has a discouraging ring. (Could something bad happen if I don’t go?) What about: “You get to go to your physical therapist today.” This is an opportunity waiting to happen.
- Be aware of your gestures, voice and facial expressions. If you mean what you say, say it with conviction and certainty. Let your gestures reinforce your message. If you are bringing bad news—“Dr. Smith thinks you will need surgery in a few months”—extend your arms, speak with warmth and sympathy and be ready to embrace your loved one.
- Practice compassion—feeling with your loved one if they are suffering—and the care words will come effortlessly. Let the milk of human kindness flow through you. When you act from the heart, you are always on target.
From my book, The ABCs of Caregiving: Words to Inspire You, House of Harmony Press, 2013. Get your copy now. | <urn:uuid:f8e0b46e-50b4-4850-9f6c-1e923e5fde59> | CC-MAIN-2022-21 | http://www.abcsofcaregiving.com/2012/11/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662556725.76/warc/CC-MAIN-20220523071517-20220523101517-00012.warc.gz | en | 0.93788 | 616 | 2.609375 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.