text
stringlengths 222
548k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 14
7.09k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 53
113k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
|---|---|---|---|---|---|---|---|---|---|
- Instead of trying to produce a programme to simulate the adult mind, why not rather try to produce one which simulates the child's? If this were then subjected to an appropriate course of education, one would obtain the adult brain [...] Our hope is that there is so little mechanism in the child brain that something like it can be easily programmed. The amount of work in the education we can assume, as a first approximation, to be much the same as for the human child. (Turing, 1950, pp.456)
Developmental robotics (also known as epigenetic robotics or ontogenetic robotics) is a highly interdisciplinary subfield of robotics in which ideas from artificial intelligence, developmental psychology, neuroscience, and dynamical systems theory play a pivotal role in motivating the research. The main goal of developmental robotics is to model the development of increasingly complex cognitive processes in natural and artificial systems and to understand how such processes emerge through physical and social interaction. Robots are typically employed as testing platforms for theoretical models of the emergence and development of action and cognition – the rationale being that if a model is instantiated in a system embedded in the real world,a great deal can be learned about its strengths and potential flaws. Unlike evolutionary robotics which operates on phylogenetic time scales and populations of many individuals, developmental robotics capitalizes on “short” (ontogenetic) time scales and single individuals (or small groups of individuals).
Human intelligence is acquired through a prolonged period of maturation and growth during which a single fertilized egg first turns into an embryo, then grows into a newborn baby, and eventually becomes an adult individual – which, typically before growing old and dying, reproduces. The processes underlying developmental changes are inherently robust and flexible as demonstrated by the amazing ability of biological organisms to devise adaptive strategies and solutions to cope with environmental changes and guarantee their survival. Because evolution has selected development as the process through which to realize some of the highest known forms of intelligence, it is reasonable to assume that development is mechanistically crucial to emulate such intelligence in machines and other human-made artifacts.
History and Early Theorizations
The idea that development might be a good avenue to understand and construct cognition is not new. Already Alan Turing suggested that in order to build “intelligent machines” one might want to start by “simulating the child’s mind” (see epigraph). In the context of robotics, many of the tenets underlying developmental robotics can be traced back to at least three conceptual breakthroughs in research on intelligent systems: (a) embodied artificial intelligence (embodied AI), that is, the notion that intelligence (e.g. common sense) can only be the result of learned experience of a body living in the real world (e.g. Brooks et al., 1998; Pfeifer and Scheier, 1999; Pfeifer and Bongard, 2007); (b) synthetic neural modeling, i.e. a technique in which large-scale computer simulations are employed to analyze the interactions among the nervous system, the phenotype, and the environment of a designed organism as behavior develops (Edelman et al., 1992; Reeke et al., 1990); and (c) the notion of enaction according to which cognitive structures emerge from recurrent sensorimotor patterns that enable action to be perceptually guided (Varela et al., 1991). These three breakthroughs share the assumption that intelligence and intelligence-like processes might be best understood by studying the dynamical and reciprocal interaction across multiple time scales between brain and body of an agent, and its environment. Not surprisingly, many of the early theorizations of developmental robotics discussed the emergence and development of sensorimotor intelligence in the context of embodied systems (e.g. Ferrell and Kemp, 1996; Rutkowska, 1994; Sandini et al., 1997).
Aspects and Areas of Interest
Developmental robotics differs from traditional robotics and artificial intelligence in at least two crucial aspects. First, there is a strong emphasis on body structure and environment as causal elements in the emergence of organized behavior and cognition requiring their explicit inclusion in models of emergence and development of cognition (Asada et al., 2001; Blank et al., 2005; Lungarella et al., 2003; Weng et al., 2001; Zlatev and Balkenius, 2001). Although some researchers use simulated environments and computational models (Kuniyoshi and Sangawa, 2006; Mareschal et al., 2007; Westermann et al., 2006), more often developmental robots are embedded in the real world as physical analogues of real organisms (e.g. Arbib et al., 2007; Kozima and Nakagawa, 2007; Metta and Fitzpatrick, 2003; Pfeifer et al., 2007; Sporns, 2007; for examples, see Figs. 1 and 2). Second, the idea is to realize artificial cognitive systems not by simply programming them (e.g. to solve a specific task), but rather by initiating and maintaining a developmental process during which the systems interact with their physical environments (i.e. through their bodies, tools, or other artifacts), as well as with their social environments (i.e. with people, other robots, or simulated agents) – cognition, after all, is the result of a process of self-organization (spontaneous emergence of order) and co-development between a developing organism and its surrounding environment. Andy Clark uses the term “cognitive incrementalism” to denote the bootstrapping of intelligence, the rationale being that throughout life “you get indeed get full-blown, human cognition by gradually adding bells and whistles to basic strategies of relating to the present at hand” (Clark, 2001). In other words, incrementalism designates the process of starting with a minimal set of functions and building increasingly more functionality in a step by step manner on top of structures that are already present in the system.
The spectrum of developmental robotics research can be roughly segmented into four primary areas of interest. The borders of these categories are not as clearly defined as this classification may suggest and instances may exist that fall into two or more of these categories. We do hope, however, that the suggested grouping provides at least some order in the large spectrum of issues addressed by developmental roboticists.
- Socially oriented interaction: This category comprises research on robots that communicate or learn particular skills via social interaction with humans or with other robots. Examples include research on imitation learning, communication and language acquisition, attention sharing, turn-taking behavior, and social regulation (e.g. Breazeal and Scassellati, 2002; Dautenhahn, 2007; Fong et al., 2003; Steels, 2006).
- Non-social interaction: These studies are characterized by a direct and strong coupling between sensor and motor processes and the local environment (e.g. inanimate objects), but do not involve any interaction with other robots or humans. Examples are visually-guided grasping and manipulation, tool-use, perceptual categorization, and navigation (e.g. Fitzpatrick et al., 2006; Metta and Fitzpatrick, 2003; Nabeshima et al., 2006).
- Agent-centered sensorimotor control: In these studies, the goal is to investigate the exploration of bodily capabilities, changes of morphology (e.g. perceptual acuity, or strength of the effectors) and their effects on motor skill acquisition, self-supervised learning schemes not specifically linked to any functional goal, and models of emotion. Examples include self-exploration, categorization of motor patterns, motor babbling, and learning to walk or crawl (e.g. Demiris and Meltzoff, 2007; Kuniyoshi and Sangawa, 2006; Lungarella and Berthouze, 2002).
- Mechanisms and principles: This category embraces research on mechanisms or processes thought to increase the adaptivity of a behaving system. Many examples exist: developmental and neural plasticity, mirror neurons, motivation, freezing and freeing of degrees of freedom, and synergies; research into the characterization of complexity and emergence, as well as the effects of adaptation and growth; practical work on body construction or development (e.g. Arbib et al., 2007; Blank et al., 2005; Lungarella and Sporns, 2006; Oudeyer et al., 2007; Pfeifer et al., 2007). Further work in this area of interest relates to design principles for developmental systems.
By contrast to traditional subjects such as physics or mathematics, which are described by basic axioms, the fundamental (“universal”) principles governing the dynamics of developmental systems are unknown. Could there be laws governing developmental systems? Could there be a theory? Although various attempts have been initiated (Asada et al., 2001; Brooks et al., 1998; Metta, 2000; Weng et al., 2001), it is fair to say that to date no such theory has emerged (Lungarella et al., 2003). Towards such a theory, one attractive possibility is to point out a set of candidate design principles. Such principles can be abstracted from biological systems (e.g. they can be revealed by observations of human and animal development), and their inspiration can take place at several levels, ranging from a “faithful” replication of biological mechanisms to a rather generic implementation of biological principles leaving room for other dynamics that are intrinsic to artifacts but are not found in natural systems. It is generally believed that such a principled approach is preferable for constructing intelligent autonomous systems with desired properties because it allows the capturing of design ideas and heuristics in a concise and pertinent way, avoiding blind trial-and-error (for additional information and principles refer to: Lungarella, 2004; Pfeifer and Bongard, 2007; Pfeifer et al., 2007; Prince et al., 2005; Smith and Breazeal, 2007; Smith and Gasser, 2005; Sporns, 2007; Stoytchev, 2006).
The further success of developmental robotics will depend on the extent to which theorists and experimentalists will be able to identify universal principles spanning the multiple levels at which developmental systems operate. In what follows, we briefly indicate some of the “hot” issues that will need to be tackled in the future.
- Semiotics: It is necessary to address the issue of how developmental robots (and embodied agents in general) can give meaning to symbols and construct semiotic systems. A promising approach – explored under the label of “semiotic dynamics” – is that such semiotic systems and the associated information structure are not static, but are continuously invented and negotiated by groups of people or agents which use them for communication and information organization (Steels, 2006).
- Core knowledge: An organism cannot develop without some built-in ability. If all abilities are built in, however, the organism does not develop either. It will therefore be important to understand with what sort of core knowledge and explorative behaviors a developmental system has to be endowed so that it can begin developing novel skills on its own. One of the greatest challenges will be to identify what those core abilities are and how they interact during development in building basic skills (e.g. RobotCub Roadmap, 2007; Spelke, 2000).
- Core motives: It is necessary to conduct research on general capacities such as creativity, curiosity, motivations, action selection, and prediction (i.e. the ability to foresee consequence of actions). Ideally, no tasks should be pre-specified to the robot, which should only be provided with an internal abstract reward function, some core knowledge, and a set of basic motivational (or emotional) "drives" that could push it to continuously master new know-how and skills (Breazeal, 2003; Oudeyer et al., 2007; Lewis, 2000; RobotCub Roadmap, 2007; Velasquez, 2007).
- Self-exploration: Another important challenge is the one of continuous self-programming and self-modeling (e.g. Bongard et al., 2006). Control theory assumes that target values and statuses are initially provided by the system’s designer, whereas in biology, such targets are created and revised continuously by the system itself. Such spontaneous “self-determined evolution” or “autonomous development” is beyond the scope of current control theory and needs to be tackled in future research.
- Active learning: In a natural setting, no teacher can possibly provide a detailed learning signal and sufficient training data. Mechanisms will have to be created for the developing agent to collect relevant learning material on its own and for learning to take place in an “ecological context” (i.e. with respect to the environment). One significant future avenue will be to endow systems with the possibility to recognize progressively longer chains of cause and effect (Chater et al., 2006).
- Growth: As mentioned in the introduction, intelligence is acquired through a process of self-assembly, growth, and maturation. It will be important to study how physical growth, change of shape and body composition, as well as material properties of sensors and actuators affect and guide the emergence and development of cognition and action. This will allow connecting developmental robotics to computational developmental biology (Gomez and Eggenberger, 2007; Kumar and Bentley, 2003).
The study of intelligent systems raises many fundamental, but also very difficult questions. Can machines think or feel? Can they autonomously acquire novel skills? Can the interaction of the body, brain, and environment be exploited to discover novel and creative solutions to problems? Developmental robotics may be an approach to address such long standing issues. The field is currently bubbling with activity. Its popularity is in part due to recent technological advances in robotics which have allowed the design of humanoid robots whose “kinematic complexity” is close to that of humans (Figs. 1 and 2). The success of the infant field of developmental robotics will ultimately depend on whether it will be possible to crystallize its central assumptions into a theory. While much additional work is surely needed to arrive at or even approach a general theory of development, the beginnings of a new synthesis are on the horizon. Perhaps, finally, we will come closer to understanding and building (growing) human-like intelligence. Exciting times are ahead of us.
- Arbib, M., Metta, G. and van der Smagt, P. (2007). Neurorobotics: from vision to action. In: B.Siciliano and O.Khatib (eds.) Springer Handbook or Robotics (Chapter 64).
- Asada, M., MacDorman, K.F., Ishiguro, H. and Kuniyoshi, Y. (2001). Cognitive developmental robotics as a new paradigm for the design of humanoid robots. Robotics and Autonomous Systems, 37:185–193.
- Bjorklund, E. M. and Green, B. (1992). The adaptive nature of cognitive immaturity. American Psychologist, 47:46–54.
- Blank, D., Kumar, D., Meeden, L. and Marshall, J. (2005). Bringing up robot: fundamental mechanisms for creating a self-motivated, self-organizing architecture. Cybernetics and Systems, 36:125–150.
- Bongard, J.C., Zykov, V. and Lipson, H. (2006). Resilient machines through continuous self-modeling. Science 314:1118-1121.
- Breazeal, C. and Scassellati, B. (2002). Robots that imitate humans. Trends in Cognitive Sciences, 6:481–487.
- Breazeal, C. (2003). Emotion and sociable humanoid robots. Int. J. of Human-Computer Studies, 59:119–155.
- Brooks, R.A., Breazeal, C., Irie, R., Kemp, C.C., Marjanovic, M., Scassellati, B. and Williamson, M.M. (1998). Alternative essences of intelligence. In: Proc. of 15th Nat. Conf. on Artificial Intelligence, 961–978.
- Chater, N., Tenenbaum, J.B and Yuille, A. (2006). Probabilistic models of cognition. Trends in Cognitive Sciences (Special Issue), 10(7):287–344.
- Clark, A. (2001). Mindware: An Introduction to the Philosophy of Cognitive Science. Oxford University Press: Oxford.
- Dautenhahn, K. (2007). Socially intelligent robots: dimensions of human-robot interaction. Phil. Trans. Roy. Soc. B: Biol. Sci., 362(1480):679–704.
- Demiris, Y. and Meltzoff, A. (2007). The robot in the crib: a developmental analysis of imitation skills in infants and robots. Infant and Child Development.
- Edelman, G.M., Reeke Jr, G.N., Gall, W.E., Tononi, G., Williams, D. and Sporns, O. (1990). Synthetic neural modeling applied to a real-world artifact. Proc. of Nat. Acad. of Sciences, 89:7267-7271.
- Elman, J. L. (1993). Learning and development in neural networks: The importance of starting small. Cognition, 48:71–99.
- Ferrell, C.B. and Kemp, C. (1996). An ontogenetic perspective on scaling sensorimotor intelligence. In: Embodied Cognition and Action: Papers from the 1996 AAAI Fall Symposium.
- Fitzpatrick, P., Needham, A., Natale, L. and Metta, G. (2006). Shared challenges in object perception for robots and infants. Infant and Child Development.
- Fong, T., Nourbakhsh, I. and Dautenhahn, K. (2003). A survey of socially interactive robots. Robotics and Autonomous Systems, 42(3-4):143–166.
- Gómez, G., Lungarella, M., Eggenberger Hotz, P., Matsushita, K., and Pfeifer, R. (2004). Simulating development in a real robot: on the concurrent increase of sensory, motor, and neural complexity. Proc. of 4th Int. Workshop on Epigenetic Robotics, pp. 119–122.
- Gómez, G. and Eggenberger, P. (2007). Evolutionary synthesis of grasping through self-exploratory movements of a robotic hand. Proc. IEEE Congress on Evolutionary Computation (accepted for publication).
- Kozima, H. and Nakagawa, C. (2007). Interactive robots as facilitators of children’s social development. In: A. Lazinica (eds.) Mobile Robots: Towards New Applications, Vienna: Advanced Robotic Systems, pp. 269-286.
- Kumar, S. and Bentley, P. (2003). On Growth, Form and Computers. Elsevier Academic Press: San Diego, CA.
- Kuniyoshi, Y. and Sangawa, S. (2006). Early motor development from partially ordered neural-body dynamics: experiments with a cortico-spinal musculo-skeletal model. Biol. Cybernetics, 95:589-605.
- Hendriks-Jansen, H. (1996). Catching Ourselves in the Act. MIT Press: Cambridge, MA. A Bradford Book (Chapter 15).
- Lewis, M.D. and Granic, I. (eds.) Emotion, Development, and Self-Organization – Dynamic Systems Approaches to Emotional Development. Cambridge University Press: New York.
- Llinas, R. (2001). I of the Vortex: From Neurons to Self. MIT Press: Cambridge, MA.
- Lungarella, M. and Berthouze, L. (2002). On the interplay between morphological, neural, and environmental dynamics: a robotic case-study. Adaptive Behavior, 10:223-241.
- Lungarella, M. (2004). Exploring Principles Towards a Developmental Theory of Embodied Artificial Intelligence. Unpublished PhD Thesis. University of Zurich, Switzerland.
- Lungarella, M., Metta, G., Pfeifer, R. and Sandini, G. (2003). Developmental robotics: a survey. Connection Science, 15:151–190.
- Lungarella, M. and Sporns, O. (2006). Mapping information flows in sensorimotor networks. PLoS Computational Biology, 2(10):e144.
- Mareschal, D., Johnson, M.H., Sirois, S., Spratling, M.W., Thomas, M.S.C., and Westermann, G. (2007). Neuroconstructivism: How the Brain Constructs Cognition, Vol.1. Oxford University Press: Oxford, UK.
- Metta, G. (2000). Babybot: A Study on Sensorimotor Development. Unpublished PhD Thesis, University of Genova, Genova, Italy.
- Metta, G. and Fitzpatrick, P. (2003). Early integration of vision and manipulation. Adaptive Behavior, 11(2):109–128.
- Nabeshima, C., Lungarella, M. and Kuniyoshi, Y. (2006). Adaptive body schema for robotic tool-use. Advanced Robotics, 20(10):1105–1126.
- Oudeyer, P.-Y., Kaplan, F. and Hafner, V.V. (2007). Intrinsic motivation systems for autonomous mental development. IEEE Trans. Evolutionary Computation, 11(1): 265-286.
- Pfeifer, R. and Scheier, C. (1999). Understanding Intelligence. MIT Press: Cambridge, MA.
- Pfeifer, R. and Bongard, J.C. (2007). How the Body Shapes the Way we Think. MIT Press: Cambridge, MA.
- Pfeifer, R., Lungarella, M. and Iida, F. (2007). Self-organization, embodiment, and biologically inspired robotics. Science, 318:1088-1093.
- Prince, C.G., Helder, N. A. and Hollich, G.J. (2005). Ongoing emergence: A core concept in epigenetic robotics. Proc. 5th Int. Workshop on Epigenetic Robotics: Modeling Cognitive Development in Robotic Systems
- Reeke Jr, G.N., Sporns, O. and Edelman (1990). Synthetic neural modeling: The “Darwin” series of recognition automata. Proc. IEEE, 78:1498-1530.
- RobotCub Roadmap (2007). (last accessed July 29, 2007).
- Rutkowska, J.C. (1994). Scaling up sensorimotor systems: constraints from human infancy. Adaptive Behavior, 2(4):349-373.
- Sandini, G., Metta, G., Konczak, J. (1997). Human sensorimotor development and artificial systems. Proc. of Int. Symp. on Artificial Intelligence, Robotics, and Intellectual Human Activity Support for Nuclear Applications, 303-314.
- Smith, L.B. and Gasser, M. (2005). The development of embodied cognition: Six lessons from babies. Artificial Life, 11:13–30.
- Smith, L.B. and Breazeal, C. (2007). The dynamic lift of developmental process. Developmental Science, 10(1):61–68.
- Spelke, E. (2000). Core knowledge. American Psychologist, 55:1233–1243.
- Sporns, O. (2007). What neuro-robotic models can teach us about neural and cognitive development. In: D.Mareschal, S.Sirois, G.Westermann and M.H.Johnson (eds.) Neuroconstructivism: Perspectives and Prospects, Vol.2, p.179–204.
- Steels, L. (1991). Towards a theory of emergent functionality. Proc. of 1st Int. Conf. on Simulation of Adaptive Behavior, pp. 451–461.
- Steels, L. (2003). Evolving grounded communication for robots. Trends in Cognitive Sciences, 7(7):308–312.
- Steels, L. (2006). Semiotic dynamics for embodied agents. IEEE Intelligent Systems, 21(3):32–38.
- Stoytchev, S. (2006). Five basic principles of developmental robotics. NIPS Workshop on Grounding, Perception, Knowledge, and Cognition.
- Thelen, E. and Smith, L. (1994). A Dynamic Systems Approach to Cognition and Action. MIT Press: Cambridge, MA.
- Turkewitz, G. and Kenny, P. (1982). Limitation on input as a basis for neural organization and perceptual development: A preliminary theoretical statement. Developmental Psychobiology, 15:357–368.
- Turing, A.M. (1950). Computing machinery and intelligence. Mind, LIX(236):433–460.
- Varela, F.J., Thompson, E. and Rosch, E. (1991). The Embodied Mind. MIT Press: Cambridge, MA.
- Velasquez, J.D. (2007). When Robots Weep: A Computational Approach to Affective Learning. PhD Thesis, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, Boston, USA.
- Weng, J.J., McClelland, J., Pentland, A., Sporns, O., Stockman, I., Sur, M. and Thelen, E. (2001). Autonomous mental development by robots and animals. Science, 291:599–600.
- Westermann, G., Sirois, S., Shultz, T.R. and Mareshal, D. (2006). Modeling developmental cognitive neuroscience. Trends in Cognitive Science, 10(5):227–223.
- Zlatev, J. and Balkenius, C. (2001). Introduction: why epigenetic robotics? In: C. Balkenius, J. Zlatev, H. Kozima, K. Dautenhahn and C. Breazeal (eds.) Proc. of 1st Int. Workshop on Epigenetic Robotics, pp.1–4.
- Valentino Braitenberg (2007) Brain. Scholarpedia, 2(11):2918.
- Olaf Sporns (2007) Complexity. Scholarpedia, 2(10):1623.
- James Meiss (2007) Dynamical systems. Scholarpedia, 2(2):1629.
- Mark Aronoff (2007) Language. Scholarpedia, 2(5):3175.
- Jean-Marc Fellous (2007) Models of emotion. Scholarpedia, 2(11):1453.
- Wolfram Schultz (2007) Reward. Scholarpedia, 2(3):1652.
- Stevan Harnad (2007) Symbol grounding problem. Scholarpedia, 2(7):2373.
Evolutionary Robotics, Social Robotics, Machine Learning, Adaptive Behavior, Biologically Inspired Robotics, Computational Intelligence, Embodied Intelligence, Symbol Grounding Problem, Artificial Intelligence
|
<urn:uuid:2a95f974-5610-4695-b3d3-e22000189146>
|
CC-MAIN-2013-48
|
http://www.scholarpedia.org/article/Developmental_robotics
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053669/warc/CC-MAIN-20131204131733-00033-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.857177
| 5,753
| 3.640625
| 4
|
Vertebral Compression Fractures and Osteoporosis
Kyphoplasty and vertebroplasty (vertebral augmentation) are minimally invasive procedures that stabilize spinal fractures and reduce back pain.
The procedures are designed to treat vertebral compression fracture related pain in order to reduce pain significantly improve mobility and overall quality of life. A recent study also demonstrated an improvement in survival for Medicare patients who underwent vertebral augmentation procedures.
Studies also report the following benefits:
o Correction of vertebral body deformity
o Significant reduction in back pain
o Significant improvement in quality of life
o Significant improvement in mobility, including the ability to perform daily activities such as walking, hobbies and work
o Significant reduction in the number of days per month that a patient remains in bed
o Improved survival in the Medicare population
o Decreased use of pain medications
o Low complication rate
Osteoporosis causes more than 700,000 spinal fractures each year in the U.S. according to the National Osteoporosis Foundation, more than twice the annual number of hip fractures.
Spinal fractures can also be caused by cancer, most commonly seen with multiple myeloma. Some spinal fractures may collapse acutely while others collapse more slowly. Left untreated, one fracture can lead to subsequent fractures; often resulting in a condition called kyphosis, or rounded back. Kyphosis can compress the chest and abdominal cavity, which may result in negative health consequences.
Sacral stress or insufficiency fractures can also be treated with a comparable procedure, referred to as sacroplasty. The procedure is performed in a similar fashion as kyphoplasty, without the use of balloon catheters.
About the Kyphoplasty/Vertebroplasty Procedure
Using stat-of-the-art fluoroscopy/X-ray equipment, the interventional radiologist creates a small pathway into the fractured bone through a tiny skin incision. With kyphoplasty, a small balloon catheter is guided through the instrument into the vertebra. The balloon is carefully inflated to create a cavity and partially restore height of the vertebral body. The balloon is deflated and removed and the remaining cavity is filled with medical-grade bone cement, forming an “internal cast” to support the surrounding bone and prevent motion (painful) and further collapse.
The procedure takes about an hour and patients typically go home the same day or the next morning. The procedure can be done with local anesthesia and sedation.
As with any minimally invasive procedure, there are risks and potential complications. Patients should consult with their interventional radiologist for a full discussion of the risks.
For more in-depth information about vertebral augmentation, visit http://www.sirweb.org/patients/minimally-invasive-treatments/.
|
<urn:uuid:e9871a51-2b3d-462d-b86f-ae4b2dcd0091>
|
CC-MAIN-2017-47
|
http://www.mplex.org/care-services/surgery/minimally-invasive-procedures/reduce-back-pain
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806225.78/warc/CC-MAIN-20171120203833-20171120223833-00095.warc.gz
|
en
| 0.916654
| 592
| 2.65625
| 3
|
Peer support involves having people with lived experience provide services. Having peers in a support role allows them to model what is possible after one goes through extreme emotional distress. Peer support is mutually beneficial. According to the “helper therapy” principle described by social psychologist Frank Riessman, “helping others is deemed absolutely essential to helping oneself.”
Most mental health services are offered by certified professionals who play an authoritarian role in the treatment process. In recent decades, a powerful movement for peer-run services has been growing and making a significant impact in people’s lives.
The late Judi Chamberlin emphasized the need to distinguish between real alternatives to psychiatry and those that are alternatives only in name. A true alternative grants all decision-making power to individuals using the services.
The Recovery Learning Community in Massachusetts is one of the most well-known examples of a peer-run organization.
Hearing voices groups, which started in the Netherlands and now meet all around the world, are a fast-growing peer-run service. These groups are based on the idea that voice hearing is part of the human condition, not a pathology. Online databases are available with details on the meeting time and location of groups happening in each country.
Alternatives to suicide groups are another type of peer support group for people suffering with suicidal thoughts or actions.
For those who don’t have a peer support group in their local community or don’t feel comfortable attending one, online forums have been valuable. The Hearing Voices Network, Icarus Project, New Light Beings, Facebook, and Reddit have hosted these forums.
For those in need of immediate support during crisis, peer respite houses offer an alternative to using a psychiatric hospital. Although the number of research studies conducted on them is limited, given that peer respites are still in their early stages of development, the American Journal of Community Psychology published a randomized controlled trial in 2008 comparing peer respite to psychiatric hospitals.
The study revealed, first, that participants using peer respite houses experienced significantly greater improvement than participants in psychiatric hospitals and, second, that the average cost of staying at a peer respite was one-third of the cost of staying at a psychiatric hospital.
Similar to soteria houses, peer respite houses emphasize being with people rather than doing to people. Afiya is one peer respite house located in western Massachusetts.
Concerns about the peer model have surfaced since the government began training and paying what are called “certified peer specialists.” Critics argue this professional title reinforces the medical model in what is supposed to be a non-authoritarian peer support system driven by lived experience.
To ensure that peer support programs are deliberately organized, psychiatric survivors started an organization called Intentional Peer Support, which trains providers in how to form mutually supportive relationships.
Now that we have seen how peer support has brought hope and wellness into our lives, our next segment will discuss how human connection played an important role in sparking a movement for social change.
“NECESSARY TRUTH” Written & produced by MARK STURGESS & ADAM CARVER
|
<urn:uuid:58841ca3-8373-45ce-92b9-d802a84105e1>
|
CC-MAIN-2020-16
|
https://mindfreedom.org/kb/voices-for-choices/voices-for-choices-power-of-peer-support/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371799447.70/warc/CC-MAIN-20200407121105-20200407151605-00110.warc.gz
|
en
| 0.956836
| 644
| 3.1875
| 3
|
About this schools Wikipedia selection
SOS Children offer a complete download of this selection for schools for use on schools intranets. Sponsoring children helps children in the developing world to learn too.
Fox is a name applied to any of roughly 27 species of small to medium-sized canids, characterized by possessing a long, narrow snout, and a bushy tail, or "brush". By far the most common and widespread species of fox is the red fox (Vulpes vulpes), although various species are found on almost every continent. The presence of fox-like carnivores all over the globe has led to their appearance in the popular culture and folklore of many nations, tribes, and other cultural groups (see Foxes in culture).
|Look up fox in Wiktionary, the free dictionary.|
The Modern English "fox" is derived from Old English fox. The Old English word itself comes from the Proto-Germanic word *fukh – compare German Fuchs, Gothic fauho, Old Norse foa and Dutch vos. It corresponds to the Proto-Indo-European word *puke meaning "tail" (compare Sanskrit puccha, also "tail"). The bushy tail is also the source of the word for fox in Welsh: llwynog, from llwyn, "bush", Lithuanian: uodegis, from uodega, "tail", and Portuguese: raposa, from rabo, "tail".
Most foxes live 2 to 3 years, but they can survive for up to 10 years or even longer in captivity. Foxes are generally smaller than other members of the family Canidae such as wolves, jackals, and domestic dogs. Dogs (male foxes) weigh on average, 5.9kg and vixens (female foxes) weigh less, at 5.2kg (13 lbs and 11.5 lbs, respectively). Fox-like features typically include an acute muzzle (a "fox face") and bushy tail. Other physical characteristics vary according to their habitat. For example, the fennec fox (and other species of foxes adapted to life in the desert, such as the kit fox) has large ears and short fur, whereas the Arctic fox has small ears and thick, insulating fur.
Another example is the red fox which has a typical auburn pelt, the tail normally ending with white marking.
Unlike many canids, foxes are usually not pack animals. Typically, they are solitary, opportunistic feeders that hunt live prey (especially rodents). Using a pouncing technique practiced from an early age, they are usually able to kill their prey quickly. Foxes also gather a wide variety of other foods ranging from grasshoppers to fruit and berries.
Foxes are normally extremely wary of humans and are not kept as pets (with the exception of the fennec); however, the silver fox was successfully domesticated in Russia after a 45 year selective breeding program. This selective breeding also resulted in physical and behavioural traits appearing that are frequently seen in domestic cats, dogs, and other animals: pigmentation changes, floppy ears, and curly tails.
Canids commonly known as foxes include members of the following genera:
- Alopex -- Arctic fox, sometimes included with the "true" foxes in genus Vulpes.
- Cerdocyon -- Crab-eating fox
- Chrysocyon -- Maned wolf (in English), aguara guazú ("big fox" in Guarani) and zorro rojizo ("reddish fox", one of several names used by Spanish speakers).
- Dusicyon -- Falkland Island fox
- Lycalopex -- Hoary fox
- Otocyon -- Bat-eared fox
- Pseudalopex -- Four South American species, including the culpeo.
- Urocyon -- Gray fox, island fox and Cozumel fox
- Vulpes -- Including the ten or so species of true (" vulpine") foxes, including the red fox, V. vulpes, Tibetan fox, Vulpes ferrilata, and their closest kin.
The diet of foxes comprises rodents, insects, worms, fruit, fish, birds, eggs, and all other kinds of small animals. The fox generally consumes around 1 kg of food every day. Foxes that live in neighborhoods mainly depend on household waste and even rodents and birds that keep moving around these areas. Foxes are known to cache their food, burying the excess for later consumption.
They mostly thrive in the higher latitudes, suburban and even urban environments both in Europe and in North America. They are found also in Eurasia, North Africa, India ( Ladakh, Himalayas, Jammu and Kashmir, Rajasthan and Gujarat), China, Japan and in Australia.
Foxes are readily found in cities and cultivated areas and (depending upon species) seem to adapt reasonably well to human presence.
Red foxes have been introduced into Australia and some other countries for hunting. Australia lacks similar carnivores, and the introduced foxes prey on native wildlife, some to the point of extinction. A similar introduction occurred in the seventeenth and eighteenth centuries in temperate North America, where European reds (Vulpes vulpes) were brought to the colonies for fox hunting, where they decimated the American red fox population through more aggressive hunting and breeding. Interbreeding with American reds, traits of the European red eventually pervaded the gene pool, leaving European and American foxes now virtually identical.
Other fox species do not adapt as well as the red fox, and are endangered in their native environments. Key among these are the crab-eating fox ( Cerdocyon thous) and the African bat-eared fox. Other foxes such as fennec foxes, are not endangered, but will be if humans encroach further into their habitat.
Foxes have been successfully employed to control pests on fruit farms, where they leave the fruit intact.
Historians believe foxes were imported into non-native environments long before the colonial era. The first example of the introduction of the fox into a new habitat by humans seems to be Neolithic Cyprus. Stone carvings representing foxes have been found in the early settlement of Göbekli Tepe in eastern Turkey.
|
<urn:uuid:4d48a066-1110-4dee-983b-28614ad5e5d4>
|
CC-MAIN-2022-05
|
http://wilearncap.asuscomm.com:81/wikipedia_en_for_schools_opt_2013/A/wp/f/Fox.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305141.20/warc/CC-MAIN-20220127042833-20220127072833-00184.warc.gz
|
en
| 0.935739
| 1,392
| 3.546875
| 4
|
[prMac.com] Seattle, Washington – In an effort to make effective, early music education accessible for children everywhere, Generategy, LLC has released Music Learning Lab 1.0.2 for iPad, iPhone and iPod touch. The App prepares learners for music appreciation, using music software such as GarageBand, and further music instruction privately or in school.
“With the launch of Music Learning Lab, Generategy has an opportunity not only to foster the success of many budding musicians, but to demonstrate the real potential of apps in education. Our goal was not simply to make learning music fundamentals fun, but to help kids find the fun in learning and making music,” said company co-founder and General Manager Russell Layng, a philosophy major at Tulane University and jazz drummer.
“Through three different sections, ‘Learn,’ ‘Create,’ and ‘Play,’ Music Learning Lab offers a balanced, well-rounded approach to music education.”
In the Learn area, 14 lessons of increasing complexity teach foundational music skills. The Play area comprises 3 mini-games to practice and extend these skills. Rewards specific to music learning are built into the program to keep learners motivated and engaged completing lessons and levels unlocks up to 15 instruments and 9 backing bands to use in the Create area. The Create area allows learners to freely express their newly acquired skills by composing their own musical pieces, using 2 instruments, drums, and a backing band all at once. Learners can choose pitches, add longer melodies and drum patterns to their pieces, and try different instruments and backing bands. Once composed, learners can see their piece performed by an animated band.
“Traditionally, music instruction starts with concepts that are difficult to master without certain skills. We identified these necessary skills higher and lower pitch discrimination, interpreting sounds and melodies as written symbols, interpreting written symbols as sounds and designed the lessons in Music Learning Lab using methods that combine our love and knowledge of music with principles derived from basic learning sciences research,” said Generategy co-founder Dr. Paul Andronis, a learning scientist who trained in classical piano for 18 years. Dr. Andronis is currently Chair of the Department of Psychology at Northern Michigan University.
* iPhone 3GS/4/4S/5, iPod touch (3rd/4th/5th generation), and iPad
* Requires iOS 5.0 or later
* Universal app optimized for display on all iOS devices
* 269 MB
Pricing and Availability:
Music Learning Lab 1.0.2 is free to download and available worldwide exclusively through the App Store in the Education category. The app features a $6.99 USD (or equivalent amount in other currencies) in-app purchase for a Full Version upgrade. App Store descriptions are currently localized for Spanish and Japanese, with more languages coming soon. A version of the program eligible for the Apple Volume Purchase Program Education Store will be available this month. Mac OS X compatible versions will be available summer, 2013.Music Learning Lab 1.0.2
Download from iTunes
Generategy, LLC, located in Seattle, Washington is a small team of developers dedicated to the science of learning. Our goal is to make apps that really teach, and to make them really fun! Copyright (C) 2013 Generategy, LLC. All Rights Reserved. Apple, the Apple logo, iPhone, iPod and iPad are registered trademarks of Apple Inc. in the U.S. and/or other countries.
Co-founder, General Manager
Facebook Profile: View
|
<urn:uuid:2ae879e1-980b-4a78-87f1-52faf7f0b113>
|
CC-MAIN-2022-40
|
https://pressrelease.world/music-learning-lab-now-available-in-app-store/20201301/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00537.warc.gz
|
en
| 0.930386
| 757
| 2.546875
| 3
|
“They shall grow not old, as we that are left grow old; Age shall not weary them, nor the years condemn. At the going down of the sun and in the morning ~ We will remember them.”
~ Laurence Binyon, For the Fallen
There is no romance in Remembrance Day, though the words of Binyon may make it seem so. The fact that “They shall not grow old, as we that are left grow old” sounds dreamy, almost idealistic, but it is not. Romance is a term often used only for the love between two people, but its definition in part is “the free expression of feelings”. Again, I say, there is no romance in not growing old. “Age shall not weary them, nor the years condemn” though is comforting in a way. We still need to be comforted at the losses that were incurred; and we still need to remember.
We need to find a way in which to honour those who lost their lives so that we can live the life we live in freedom. And though their deaths were in battle, they were not in vain, and I think Binyon’s poem reflects that. Most of those who died were young. To think that they will not be condemned to live life as those of us who age, and go through the perils and challenges that come with aging—I guess puts the loss on a less vulnerable level.
But we should never become comfortable in the loss of young lives – whether the loss is for country and freedom, or as in so many of the battles of today—protection of people and the preservation of life as we know it. It is not easy to understand war and conflict; it is not easy to send our best to protect us, knowing they are in harm’s way; it is not easy to reflect on the losses of the past, or contemplate the challenges of the future.
Remembrance Day is a day for pause and reflection and to remember. But our remembering should be active—it is not just to recall or keep something in mind—it is to keep from forgetting and to commemorate. And we are not just to remember those who gave their lives; we are to remember those who fought, and those who continue to fight in all and every capacity on our behalf.
For years I had no real reference point for Remembrance Day—I was not personally affected by it—or so I thought. I had lost no loved ones, and I did not “feel” the significance of the day. But in school we were reminded, and at church we were reminded, and in the media we were reminded. And we need to continue to be reminded to remember. We need to carry on the tradition “lest we forget”.
Perhaps I was wrong, perhaps there is romance in Remembrance Day, because if we use the definition of “free expression of feeling” for romance, then we should freely express our sympathy, freely mourn the losses, and freely remember those who made and make it possible to walk in freedom.
I will happily and sombrely pause at the 11th hour on the 11th day of the 11th month and remember. But it will be a remembrance that has a past, present, and future. One that has life at its core, not death; a remembrance of those who did not get to grow old and weary; and a remembrance of those who saw battle and did come home to grow old.
We shall remember them well; and we shall forge forward and support those who are still involved in protecting us and others. Remembrance is not passive; it is evocative of what we must not forget. I leave you with “A Wish” for the future, part of a poem by Maxine Kendall:
Maybe it is pointless
To wish for lasting peace
For all mankind to lay down arms
For all fighting to cease
Hope lies in a child’s heart
Not yet turned to stone
A mind free of prejudice
A child not alone
If all children of the world
Held each other’s hand
They could do what we could not
Make a Brotherhood of Man.
|
<urn:uuid:f00cbfa2-07cb-4c08-85d6-99a4a3cbf5b1>
|
CC-MAIN-2015-18
|
https://onthehomefrontandbeyond.wordpress.com/2012/11/06/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246656747.97/warc/CC-MAIN-20150417045736-00089-ip-10-235-10-82.ec2.internal.warc.gz
|
en
| 0.979816
| 875
| 3.0625
| 3
|
The origins of “Telephone Pictionary” come from two other popular games that you have probably played at one point or another. One is “Telephone,” where you pass a phrase along a string of people and see how horribly mangled or well intact the phrase is at the end of the line, and the other is “Pictionary,” where you draw an object or phrase and try to get people to guess what said drawing or phrase is.
Understandable, right? Acquiring the materials for and learning the rules of Telephone Pictionary are easy, too. You need:
Friends. Lots of friends. I’ve played in a group as small as five before, I think. This is a great party game. If you don’t have friends, it might be your best move to stop reading this this post and go get some.
Paper. More paper than you have friends. Every single person in the group needs a stack of paper that has as many sheets as players in it. So, if you are playing with five people, each person needs five pieces of paper. We’re not talking huge sheets of paper, either. The pieces only need to be a quarter of a sheet. If you’re environmentally-conscious, don’t worry. You can recycle all these pieces after you’re done!
Writing utensils. Pencils and pens will work just fine, though be careful that your pens don’t bleed through the paper. I wouldn’t advise using markers.
Time. You better have a nice long night ahead of you, because everyone works at a different pace. Some like drawing more than others, and you might have to wait a while before your neighbor passes you your next stack. Then, after one game is over, you will probably want to play another round or two because the game is just that much fun.
Now, as for the rules:
- Everyone should either number or letter the pieces of paper on their stack so they can keep it in order as it is passed around.
- Everyone writes a phrase on the top of their stack. This can be as ridiculous or as serious as you want it to be. One alteration a group of us has done is using a quotation to begin.
- Pass the stack either clockwise or counter-clockwise, depending on what your group has decided. We like to switch it up every other round.
- You will receive someone else’s starting phrase. Move it to the back of the stack, and draw your interpretation of the phrase to the best of your ability. Some people like to get super artsy with their interpretations, but just do what you can/want to do.
- Pass your drawing to the next person.
- You will receive a drawing from your neighbor who gave you the previous phrase. Now, it is your turn to create a phrase interpreting their drawing.
- Repeat the drawing-writing stages until you receive your stack. Sometimes, it will be a drawing, sometimes it will be a phrase – it depends on how many people are in your game.
- Then, take turns sharing your stacks, seeing how well the original phrase stayed intact… or how horribly demented it has become!
So, now you have an idea of what you need and how the game is played, you can play it yourself, as well as enjoying this blog!
|
<urn:uuid:f5d0bf4f-892a-475b-a8f8-2c759131725d>
|
CC-MAIN-2015-48
|
https://derailedtelephonepictionary.wordpress.com/what-is-telephone-pictionary/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398462665.97/warc/CC-MAIN-20151124205422-00355-ip-10-71-132-137.ec2.internal.warc.gz
|
en
| 0.970614
| 709
| 3.421875
| 3
|
The trend right now in fitness is for trainers to advocate “Total Body Weight Exercise” as being the magical cure for every person wanting to lean up and get buff. But what’s not being openly talked about is the casualties that line this path. I want more fitness professionals and their clients to be mindful about what “total body weight exercise” really means.
It is true that the more muscles you get working at any given time the more calories you burn. That makes intrinsic sense. It is also true that your body moves on it’s own without you thinking about it, all day, every day in a multiplicity of complex multi-movement patterns. All of that is good stuff.
Now, what most athletes, many turned fitness professionals fail to take in to consideration is the different types of learning and their effect on motor co-ordination and the ability to perform an exercise correctly. There are varied learning types that people can be generally classified under, like visual or auditory. Visual learning style, means you see someone do it and you can then do it. Auditory learning style means you hear a list of directions and you can then sequence them back correctly. Most athletes are kinesthetic learners, that means they learn by physically doing a task. That is not to say that a visual learner cannot learn to perform the same task as a kinesthetic learner, but it means that there will be a higher learning curve for them on a task of physical nature. So trainers, just because you can do 100 picture perfect burpees in a row at speed, does not mean that your client should or can even if they want to.
Full body weight exercise requires a base level of strength. The building block structure should be first: 1) establish stability – the means by which the body can maintain the integrity of its joint structure under most forms of stress. Stress itself can be constituted in training terms by speed (how fast or slow is the pace), load (how much weight you’re lifting) and duration (how long are you lifting each load.)
Everyone has helped a friend move; imagine you lift a heavy box and you have to stand still and hold it until your friend gets his car. It would make a difference to your back and shoulders if that car were right out front or parked two blocks away. Now imagine you and your friend have to lift a really heavy box – but you only have to move it ten steps in a straight line. Chances are – you will both move as quickly as possible. Lastly, imagine you are carrying a heavy box that requires you to move down several flights of stairs – you are under load and the duration will be long and the pace will be slow. All of these scenarios are slightly different from one another in the demands they make on the body. And everyone can relate to feeling stiff and sore after a move. Proper training can get you to where none of those scenarios would be painful. You would be stable in maintaining your joint integrity.
The next phase of training should be symmetry. Is each individual joint and side equal to the tasks demanded on the body? Anyone ever tried to carry a toddler in one arm and lifted a bag of groceries from the back of a car simultaneously?
The last phase is dynamic performance. The ability to do intense, full-body, full-ROM exercises under various forms of stress. Yes, FBW exercises develop dense muscle mass more efficiently and effectively than any other form of exercise. But is it appropriate for everyone to go straight to the hardest, most bad-ass place first? An athlete has been doing crazy compound loaded movements for a lifetime – the brain actually functions differently (this is another topic for a future blog in and of itself!) To expect a client to perform like that before proper foundations are put down is a recipe for disaster. Anyone remember Tae Bo? Yes, great results are achieved but at what cost? My goals are not for people to feel good for the one year they did Cross-Fit. I want people to be equal to the physical challenges in their daily lives and to feel good and look great for the duration of their years!
|
<urn:uuid:bc67cfa7-1946-40dd-9fe1-dbbd943689ee>
|
CC-MAIN-2019-22
|
https://vicfitla.com/2013/11/18/full-body-weight-exercise/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257660.45/warc/CC-MAIN-20190524144504-20190524170504-00401.warc.gz
|
en
| 0.968536
| 845
| 2.59375
| 3
|
The fragrances used in many household and skincare products can cause contact allergy when exposed to oxygen in the air, reveals research from the University of Gothenburg's Faculty of Science in conjunction with the University of Gothenburg to be presented at the dermatologist conference in Gothenburg.
The researchers studied how these substances can be activated through contact with oxygen in the air, and how this, in turn, can affect the skin. One particular study looked at whether the activated fragrances caused contact allergy when tested on eczema patients at Sahlgrenska University Hospital's Dermatology Clinic and the Occupational and Environmental Dermatology Clinic in Malmφ. It was found that a high percentage of the 3,400 eczema patients tested had an allergic reaction to the substances.
"In a bid to gain a deeper understanding of how contact allergy occurs, we are now using state-of-the-art microscopic equipment to follow what happens to an allergen once it gets into the skin," says Ann-Therese Karlberg, professor of dermatochemistry and skin allergy at the Faculty of Science's Department of Chemistry, and a researcher at the Sahlgrenska Academy.
When determining how allergenic a substance is, consideration must also be given to the skin's ability to activate a substance through the metabolism.
"We've developed a mixture that reflects the content of real skin enzymes, and use it to investigate whether the chemical substances can be activated in the skin and become allergenic."
Their discovery will help the health service to diagnose allergic contact eczema correctly through the development of new diagnostic tools, and reduce the number of cases of allergic contact eczema in the long term. For patients, the right diagnosis means that they can avoid exposure to substances that trigger the problem, and so give their eczema a chance to heal.
"Future work will see us evaluating new diagnostic methods and carrying out in-depth studies of what goes on in the skin. This will enable us to develop new medicines and replace the only treatment that is currently available for eczema, namely cortisone cream," explains Karlberg, who believes that their research could improve preventive work through its impact on manufacturers, consumers and legislation.
Cite This Page:
|
<urn:uuid:b9901645-f731-413b-b9f9-a07ff6deb2f3>
|
CC-MAIN-2014-49
|
http://www.sciencedaily.com/releases/2010/10/101010183658.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931005387.19/warc/CC-MAIN-20141125155645-00147-ip-10-235-23-156.ec2.internal.warc.gz
|
en
| 0.920445
| 468
| 3.09375
| 3
|
Submitted Place Names Starting with G
Submitted names are contributed by users of this website. The accuracy of these name definitions cannot be guaranteed.
(Country) English, Croatian
The name of the Country in Central Africa. Gabon, a country along the Atlantic coast of Central Africa, has significant areas of protected parkland. The forested coastal terrain of its famed Loango National Park shelters a diversity of wildlife, from gorillas and hippos to whales... [more]
The name of the Country in West Africa. The Gambia is a small West African country, bounded by Senegal, with a narrow Atlantic coastline. It's known for its diverse ecosystems around the central Gambia River... [more]
A town in Northeast England. It most likely means 'goat's headland', implying that wild goats were a part of the local fauna.
(Political Subdivision) English
Name of a state in the United States, named after King George II of Great Britain.
Possibly from Persian gurğ, gurğān
meaning "wolf" or Gorgan
meaning "land of the wolves". Georgia is a country in Europe right below the Caucasus region of Russia. Not to be confused with the American state "Georgia".
The first element of this name is derived from Gothic gairu
in Old High German) "spear", or from garva
in Old High German, and gearu
in Anglo-Saxon) "ready, prepared." The second element is derived from Old High German falko
The name of the Country in West Africa. Ghana, a nation on West Africa’s Gulf of Guinea, is known for diverse wildlife, old forts and secluded beaches, such as at Busua. Coastal towns Elmina and Cape Coast contain posubans (native shrines), colonial buildings and castles-turned-museums that serve as testimonials to the slave trade... [more]
This is the name of a city and prefecture of the same name, located in central Japan.... [more]
The largest city in Scotland. From Cumbric words equivalent to Welsh glas
, meaning 'blue' and gae
meaning 'field, enclosure'.
This name is derived from towns scattered around Europe. There are French towns named Glaston, and it also is similar to the famous town Glastonbury Tor, the predicted location of the Holy Grail.
Named for the suburb in Lake Macquarie, north of Sydney, Australia. The name is Scottish
in origin and is taken from two words which both mean "valley".
A village in Sutherland, Scotland. It is derived from the Old Norse *gol
, 'gully' and byr
Means "land of the Geats". The Geats (sometimes referred to as Goths) were a North Germanic tribe inhabiting southern Sweden. Götaland is one of three lands of Sweden, the others being Svealand
Combination of Swedish Göte
"Geat" and borg
"castle, fortress". The Geats (sometimes referred to as Goths) were a North Germanic tribe inhabiting present-day Götaland
(Settlement) Popular Culture, English
Gotham, or Gotham City, is a fictional city and the home of Batman
in the comic books published by DC Comics. Outside of the comics, Gotham is a nickname for New York
City first used in 1807 by writer Washington Irving in his work "Salmagundi"... [more]
A South American country that included what is now Colombia, Panama, Venezuela, and Ecuador from 1819-1830. Gran Colombia ceased to exist when Venezuela and Ecuador seceded.
(Settlement) Chechen, Russian, English
Derived from Russian грозный (grozniy)
meaning "fearsome" or "formidable". It is informally referred as Соьлжа–Гӏала (Solzha Ghala)
, "the city on the Sunzha
River", by the local Chechen people... [more]
The name of the Territory. Guam is a U.S. island territory in Micronesia, in the Western Pacific. It's distinguished by tropical beaches, Chamorro villages and ancient latte-stone pillars. Guam’s WWII significance is on view at the War in the Pacific National Historical Park, whose sites include Asan Beach, a former battlefield... [more]
The name of the Country in Central America. Guatemala, a Central American country south of Mexico, is home to volcanoes, rainforests and ancient Mayan sites. The capital, Guatemala City, features the stately National Palace of Culture and the National Museum of Archaeology and Ethnology... [more]
The name of the Country in West Africa. Guinea is a country in West Africa, bordered on the west by the Atlantic Ocean. It's known for the Mount Nimba Strict Nature Reserve, in the southeast. The reserve protects a forested mountain range rich in native plants and animals, including chimpanzees and the viviparous toad... [more]
The name of the Country in South America. Guyana, a country on South America’s North Atlantic coast, is defined by its dense rainforest. English-speaking, with cricket and calypso music, it's culturally connected to the Caribbean region... [more]
(Country) Welsh (Archaic)
Gwalia is an archaic Welsh name for "Wales". It derives from the Medieval Latin Wallia
, which in turn is a Latinisation of the English 'Wales'. Although never as widely used as Cymru, Gwalia was once popular as a poetic name for the country.... [more]
|
<urn:uuid:143caba2-f98c-4107-8446-b1d1e18fb543>
|
CC-MAIN-2018-05
|
http://places.behindthename.com/submit/names/letter/g
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889567.48/warc/CC-MAIN-20180120102905-20180120122905-00785.warc.gz
|
en
| 0.920543
| 1,213
| 2.703125
| 3
|
READ Jonah 3
God in His mercy sent the prophet Jonah with a word of warning to the inhabitants of
Nineveh. Jonah walked through the city declaring, “Yet forty days and Nineveh will be
overthrown.” Notice what was said of the people of Nineveh in verses 5 and 6. They believed in God. From the greatest to the least of them … they put on sack cloth. Do you see what their king did? He called the people to fast and turn from their wicked ways.
Now, look at our nation. On April 30, 1789 George Washington was sworn in as the first
President. His first act as President was to lead the members of the Senate and House down the street to a little chapel called St. Paul. By example, they led our nation in prayer. The bells tolled in New York City from 9:00–9:30 a.m. calling the inhabitants of the city to pray for the newly formed government.
Flash forward. On September 11, 2001, terrorists drove planes into the twin towers, toppling the symbol of our economic power. However, one structure at Ground Zero stood untouched: St. Paul’s Chapel, the place our founding fathers prayed, and the symbol of America’s dedication to God. Yes, the symbol of our economic power toppled but the symbol of our dedication to God remained. God in His mercy is calling us to repentance. How long we have is not known.
Pray for this nation, like Nineveh, to heed the warning and avert judgment.
Pray for leaders who will call the nation to prayer and repentance.
|
<urn:uuid:f1867697-7542-47ab-830e-843d8ab0644b>
|
CC-MAIN-2018-51
|
http://www.firstlovemissions.org/2012/10/40-days-to-save-america-fast-prayer.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825495.60/warc/CC-MAIN-20181214070839-20181214092339-00027.warc.gz
|
en
| 0.9669
| 337
| 3
| 3
|
Churches and other houses of worship have historically played critical social and political functions in American society. But fewer people are attending religious services, and the decline of churches and other houses of worship threatens to leave a void that could potentially be filled by coffee shops.
“For so much of American history, the church has really been — or their congregations have really been — essential, providing an unheralded role in providing cohesion and connectedness in communities … encouraging civic engagement and political participation,” says Daniel Cox, director of the Survey Center on American Life and a senior fellow at the American Enterprise Institute.
“It was not happenstance or luck that the civil rights movement emerged out of the church,” Cox says. “And you see that cross-culturally … whether it's in predominantly white rural communities, in the suburbs, wherever, churches have historically been really, really important.”
Churches and other houses of worship have also played a role in helping immigrants assimilate once they arrive in America, Cox says.
In 1999, 70% of Americans said they belonged to a church, mosque or synagogue. By 2020, that number had dropped to 47%. A 2019 survey found that only about three in 10 Americans say they attend weekly religious services.
Lack of involvement and affiliation with churches, mosques and synagogues means people might be missing out on what urban sociologist Ray Oldenburg dubbed as “third places” — public gathering spots that offer something that home, the “first place,” and work, the “second place,” might not.
Oldenburg argued that third places are critical to a community’s social vitality. An October 2021 survey conducted by the American Survey Center found that commercial spaces like coffee houses foster trust and connection in American communities and could help fill the void left by churches.
“If you're a regular at a cafe, the barista may know what you usually order, and they can make it for you, and that feels good,” says clinical psychologist Dr. Maria Espinola, an assistant professor in the Department of Psychiatry and Behavioral Neuroscience at the University of Cincinnati College of Medicine.
“It feels good to be recognized, to know that people are expecting you, to know that people care about you, to know that you belong, because the need for belonging and human connection is a fundamental need that we all have, and it's important to have that fulfilled in different ways,” Espinola says. “So, places like third places can allow us to do that.”
In the past, churches and other houses of worship have been a third place for many Americans. In 2019, 67% of people surveyed said they have a third place — a coffee shop, bar, restaurant, park or other place in their community that they visit regularly. That number dropped to 56% in 2021 — a number that could have been affected by the COVID-19 pandemic.
“What we found was that people who had a third place were much more connected to their community,” says Cox. “They're much more likely to engage in other activities there. They are much more trusting of their neighbors. There's a whole great array of positive social outcomes that were connected to having a third place … and for a lot of Americans, it's a coffee shop or a cafe.”
What coffee shops have in their favor is that they can be found almost everywhere, all over the country, and anyone who wants to can stop by regularly. And many are open most days of the week.
Cox says even brief coffee shop encounters can increase a sense of belonging.
“I think there's a lot of potential here, and a lot of it is unrealized potential,” Cox says. “But in terms of what they could do, there's a lot there. I've been in places where the same group of folks come in there to play chess. Or they have their informal bunch of retirees. … They just got together, and they talked and chatted and caught up with each other. … I don't know where else they would have gone — maybe a church, but maybe not — to share information, to encourage each other to maybe get involved in an activity. And I think that is what is so powerful about coffee shops.”
|
<urn:uuid:11c4d833-19c1-499b-a959-0b2e388e7c77>
|
CC-MAIN-2022-27
|
https://www.voanews.com/a/6427010.html?withmediaplayer=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104054564.59/warc/CC-MAIN-20220702101738-20220702131738-00215.warc.gz
|
en
| 0.983697
| 905
| 2.734375
| 3
|
Is Active Learning, Learning?
by Jim Martin
Because active learning requires practice and feedback on thinking like an expert (a scientist), it demands considerably greater subject expertise by the teacher. . . . [A problem that] will remain until college science teaching improves to the point that all students, including future K-12 teachers, graduate with a solid understanding of science and a better model for good science teaching and learning. . . . Most people, including university faculty and administrators, believe learning happens by a person simply listening to a teach¬er. That is true if one is learning something very simple, like “Eat the red fruit, not the green one,” but complex learning, including scientific thinking, requires the practice and interaction described earlier to literally rewire the brain to take on new capabilities.
– Carl Wieman
Wieman is describing what I view as the historical residuals that impede effective teaching in today’s schools: We are leaving the educational needs of the Industrial Revolution, and embarking on the needs of our Technical age, and evolved social and cultural structures. Rote learning limits human empowerment, yet we still, in large part, rely on it.
The two issues Wieman describes both limit the education our students receive, and perpetuate the problem because under-prepared graduates make under-prepared teachers. Teachers are the only people who can correct this. Teachers can’t give effective feedback to learning students if they haven’t the requisite extensive experience and knowledge of what they are teaching to do so. A teacher who has done the science, and comprehends the concepts and processes involved in what is being learned, will have a much better perspective to process a student’s efforts, place them within a meaningful context that the student can respond to, and observe for first, critical, steps toward learning for understanding. For a teacher without the background to comprehend and do the science, a student’s efforts which seem to be going in the wrong direction might be interpreted as being altogether wrong, the appropriate material in the text or instructions pointed to, and the student moved on; perhaps even to learn what was to be learned, but not empowered as an autonomous learner. And less likely to become a competent student. Ultimately, what was to be learned will not be learned well enough to remain in memory after the test.
If teachers are to engage their students in active learning, which has the capacity to produce effective long-term conceptual memory, we all need to help build an environment where teachers are assisted to become competent in the concepts and processes they teach. Since I started tracking teacher preparation for the content they are asked to teach, about half are reported to have had the coursework and/or experience to teach it. Wieman finds a similar pattern. Even those who teach teachers aren’t immune. A chemist, who mentored science teachers for a federal education support agency, didn’t know that cold creek water which was overhung by vegetation and aerated by an upstream riffle might have what appears to be an elevated dissolved oxygen content. This is a real deficit, and we all need to do something to resolve it.
Environmental educators have generated an enlightened public which has produced a State, Oregon, that is an epicenter for streambank restoration in the world. We’re now faced with a nation which is near the bottom in science education among the highly developed nations. Environmental educators can help inexperienced science teachers gain the confidence and expertise they need to improve science education in our classrooms. Everything we need to do that is on our sites and in our heads. We only need the bootstrapping will to take the first step – sit down with someone of a like mind, talk about what needs to be done, then, together, sit with someone else and do the same.
Here’s one I experienced years ago at a constructed pond within a large industrial area. The pond was connected by a canal to a large natural lake. There was a parking lot on one side of the rectangular pond; a large drain pipe removed water from the parking lot and surrounding area and dropped it about ten feet from its open end into the pond. We visited one Spring as part of a science inquiry workshop. Teacher participants were practicing water quality observations, and asked to decide in each of their groups where to make their observations.
As we gathered to review their findings, most groups’ dissolved oxygen (DO) measurements were within the range we’d expect for pond water at the temperatures they’d recorded. Two groups, however, recorded very high DO values. One group had made their observations in the center of a large algal bloom at one end of the pond, and they decided that, since these were algae producing the high DO levels, the levels observed there represented excellent water quality. The other group had measured water quality at the place in the pond where water flowing out of the drain pipe splashed into the pond. Their DO measurements were higher than those in the algal bloom. This group decided that, since the water leaving the drain pipe must be polluted, the high DO values represented very poor water quality.
What would you have interpreted from the DO data and places where the observations were made? Those teachers were using the science they knew, and taught, but in a place outside the classroom or lab. What might they have thought and said if it were their students who made the observations, and their interpretations of the results were different? Perhaps even the opposite of those they had made themselves?
We’ve all been faced with dilemmas like this. How do we respond? How might a teacher respond who has never made a scientific observation outside the classroom? Perhaps never made one at all? (Or the chemist who didn’t understand dissolved oxygen dynamics in a natural environment?) How might an environmental educator respond to this issue? By that last, I don’t mean give the correct answer; I mean relieve the deficits in experience and understandings that brought the problem into existence.
Most issues in education become issues because we don’t lay the practical and conceptual foundation our careers require. To fix it, we need to jack up our structures, rebuild their foundations, lower the structure back on a solid foundation, then let the creaks, groans, and cracks in the structure tell us how to reorganize it. This is something our top-down educational organization is unable to do. We have to do it ourselves. I say that teachers who are comfortable teaching inquiry science, and environmental educators who are comfortable reaching out to teachers, need to get together to bring science back to young people in ways which restore its inherent interest, excitement, and empowerment.
Working together, environmental educators and teachers who routinely engage their students in inquiry, are a practical hope for building a stronger science edifice in our schools. Current efforts from the top of education’s administrative structure to embed a common core curriculum and new science standards in the schools haven’t, to date, funded the basic professional development support that a large number of teachers will need to bring these initiatives to life, and make them a basic part of all education in the nation. A good way to make this happen, in an effective, non-punitive, way is for the work to start in the classroom, supported by teacher mentors and environmental educators.
Why do I include environmental educators in words about science inquiry education in classrooms. Because inquiry education relies on active learning, which is an effective way to build conceptual learnings into long-term memory. Active learning is the teaching modality that most environmental educators use. The familiar concrete referents students and their teachers will use at an environmental site make learning to do and understand science inquiry much more effective. And because school curricula, even though it may be so disguised that it seems appropriate only to school, is actually about the world we live in. You can find it embedded in nearly every place you see, from a busy neighborhood business area to a riparian forest or a mountain stream.
It’s been my experience that teachers respond well to developing the capacity to take charge of their science curricula by beginning with inquiries in a natural environment, zoo, or school neighborhood. Inquiry workshops which introduce groups of teachers to science inquiry in places with familiar concrete referents, then use these experiences to transition participants into science inquiry with the materials they have in the classrooms, are a good first step in improving science education. If it could be arranged, environmental educators and teacher mentors would ensure that a large number of these teachers would complete the journey to become those who, along with their students, routinely learn for understanding. And are willing to help empower other teachers.
Here are two sets of five assessment statements which have been used with effect, and which would emerge from the classrooms of teachers who have been freed to teach science as it should be taught. Freed because they have overcome the obstacles their teacher preparation and current punitive emphasis on standardized test results place on them. Freed to give effective feedback to their learning students. A teacher who has done the science, and comprehends the concepts and processes involved in what is being learned, will have a much better perspective to process a student’s efforts, place them within a meaningful context that the student can respond to, and observe for first, critical, steps toward learning for understanding.
National Board for Professional Teaching Standards teacher certification program effective professional teaching propositions:
1. Teachers are committed to students and their learning;
2. Teachers know the subjects they teach and how to teach those subjects to students;
3. Teachers are responsible for managing and monitoring student learning;
4. Teachers think systematically about their practice and learn from experience; and,
5. Teachers are members of learning communities.
I believe that #2 above is not effectively addressed by current reforms. The five propositions listed above lead to what comes next:
Bill and Melinda Gates Foundation Measures of Effective Teaching and Cambridge Education Project teacher assessment assessors developed by students, themselves:
1. Students in this class treat the teacher with respect,
2. My classmates behave the way my teacher wants them to,
3. Our class stays busy and doesn’t waste time,
4. In this class, we learn a lot almost every day, and
5. In this class, we learn to correct our mistakes.
Becoming comfortable and experienced in teaching inquiry-based science is a fundamental step in meeting these propositions because it engages a paradigm shift which provides you with a more realistic perspective about science and students becoming scientists.
This is a regular feature by CLEARING “master teacher” Jim Martin that explores how environmental educators can help classroom teachers get away from the pressure to teach to the standardized tests,and how teachers can gain the confidence to go into the world outside of their classrooms for a substantial piece of their curricula. See the other installments here, or search Categories for “Jim Martin.”
|
<urn:uuid:dffe48d8-4d1b-42fc-9ea5-de3be7692fcb>
|
CC-MAIN-2024-10
|
https://clearingmagazine.org/archives/10891
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474445.77/warc/CC-MAIN-20240223185223-20240223215223-00499.warc.gz
|
en
| 0.967877
| 2,237
| 3.1875
| 3
|
Examples from the Web for fluorite
In England, fluorite is obtained in this manner as a by-product from lead and zinc mines.The Economic Aspect of Geology|C. K. Leith
Rays passing through the fluorite window strike the blackened side of the mica, which is parallel and opposite to it.Inventors at Work|George Iles
Only certain varieties of fluorite show the phenomenon well.
Fluorite is widely distributed, most commonly in vein deposits, often associated with metallic ores.Geology|William J. Miller
Some specimens of fluorite (CaF2) show the phenomenon especially well, whence the name fluorescence.
|
<urn:uuid:4e80ecb3-47d8-4e84-989b-a6af1d318de8>
|
CC-MAIN-2019-43
|
https://www.dictionary.com/browse/fluorite
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986672723.50/warc/CC-MAIN-20191017045957-20191017073457-00094.warc.gz
|
en
| 0.900229
| 143
| 2.78125
| 3
|
Morley Harps on Wikipedia
The history of the Morley family’s long association with harps begins in 1817 when George Morley (1790-1852) registered his harp making, tuning and repair business at 95 High St, White Chapel, London.
George’s son, Joseph George Morley (1847-1921), was apprenticed to the influential pedal harp innovators, Erard. In 1890, the Morley family took over the Erard London shop and workshops. Joseph George designed a 48 string pedal harp of which he was justly proud, having this to say of his creation:
“The Morley Orchestral Twentieth Century Harp is the outcome of some 25 years of the study of the harps of the Nineteenth Century in our repairing shops. It is not an invention; it is a concentration of 20 improvements on old inventions in the woodwork and mechanism.Twenty-five years’ study of some thousands of Nineteenth Century Harps, including the Gothic Harp, has shown us all the weak points, where and why they break down – shown us how not to make harps – shown us what ideas to throw away and what to keep.Shown us why that pillar got bent from a straight line into a curve.Why that foundation beam on which the pillar rests fell out or bent under pressure of column.Why that neck got distorted, why the neck broke, why it breaks always in the same weak place.Why the good intervals correctly tuned in the flats become excruiatingly false octaves and fifths when the pedals come into action. Lastly, why the sonority was so poor and unsatisfying, especially in the orchestra.The one question we could not answer satisfactorily is, why the pedal harp has remained for seventy years underdeveloped while its rival the pianoforte was being improved every year.”
Before Useing Morley’s (sic.)
This picture, by an unknown artist was sent to J. G. Morley. Date Unknown. Presumably, the poor harpist had better luck with his Morley Harp!
During the first part of the twentieth century John Sebastian Morley (1897-1988) – a founding member of the United Kingdom Harp Assocation – ran the harp business from premises in South Kensington (pictured below) with his wife, Cecilia Praetorius Morley, a celebrated harpist and teacher. Morleys became a home from home for world famous harpists who frequently dropped in to do business and exchange gossip. Many items in the Clive Morley Collection originate from this time.
After the First World War, the demand for new pedal harps had dropped to the point where Morleys began to concentrate exclusively on harp repair and the making of small harps.
In 1968, John Sebastian retired and the Morley harp business passed to Robert Morley and Co Ltd. On the demurging of Robert Morley and Co Ltd in 1987, Clive Morley (1936-2015) moved his newly established harp business to Filkins in the Cotswolds, where it has been located ever since. In 2001 Clive was joined by his son, Ben, who officially took over the business in 2006.
Today, Clive Morley Harps draws upon its long history of harp expertise to work with hand picked harp makers to provide a wide range of quality instruments to suit every budget, level of ability and interest.
Old London Showroom c. 1900
This is a photo of the Old London Showroom c.1900, which was at 6 Sussex Place, South Kensington, London.
(Please note that we no longer operate from this location.)
A Visit to the Morley Workshop 1958
Marjorie Zaerr Tayloe. Harp News, Spring 1958.
(Part of Mrs Tayloe’s biography states that in her home in North Hollywood, she has thirty-seven harps!)
In the cosmopolitan part of South Kensington, London, at 56 Old Brompton Road (lately known as Sussex Place), there is a narrow Victorian shop window cluttered with old harps in various stages of unrepair, with broken strings trailing raggedly behind them. The window contrasts sharply with those of neighbouring luxurious flower and antique shops and is a never-failing source of interest to all who pass by. One enters the harp shop where scores of instruments crowd the floor space beyond the window: large Gothic harps recognisable by the hexagonal top of the pillar, smaller Grecian ones distinctive by the circular top and heavily ornamented column, harps with gaily painted decorations on their soundboards, and others looking very pathetic.
A young clerk extends a warm greeting and unlocks the stairway door that leads to Mr J. George Morley’s office. At the top of the first flight of narrow steep stairs are two rooms that are also filled with harps; and the second flight up leads to the office of Mr Morley, England’s only harp maker, working like a ministering angel among still another silent company of the gilded figures! In a room which once housed the family billiard table, where the celebrated conductor, Sir Thomas Beecham, used to play a regular game with Mr Morley’s father, the present owner does his paperwork and carries on the business started in the last century by his grandfather, John Sebastian Morley.
In 1816 in a small shop in Chatham, the Morley family business of harp making and harp repairing began. The company sold a variety of musical instruments and later made and marketed a large concert harp, the Morley Orchestral Harp. A few years previously, Sebastian Erard, the harp and piano maker, had designed and perfected the double-action pedal harp which was to become the model for future instruments. Harp playing then became a fashionable social asset and harps were often seen gracing Victorian drawing rooms. The sale of a harp to Her Royal Highness the Princess of Wales, is recorded in the pages of the vellum-covered account books of the harp maker, Erard, which are now in Morley’s possession.
The Morley harp business flourished and moved to the more refined atmosphere of Kensington. There had been a great demand for harps from Russia, Germany and France in the Victorian period, but during World War I this export trade dwindled away. The market became so small that from then on the family gave up manufacturing harps and concentrated on the specialised work of repairing and rejuvenating them. They also continued to make the small Irish harp. These sturdy instruments are made of African mahogany and Rumanian pine, have 30 strings, and only weigh 12 pounds. They are comparatively easy to play and provide a delightful accompaniment for singing. Only a few are made at a time and they are always in demand.
After World War II there was a modest revival of harp playing in Britain, particularly in Wales where the harp has always been a part of the Welsh way of life. New instruments are out of the question today, though, declares Mr Morley. A person would need from 800 to 3,000 pounds sterling to buy a new harp. This high cost is due in part to the intricate work of making the double-action harp. All the harps now in Morley’s workshop are either second-hand or brought in by their owners for repair or maintenance. Mr Morley estimates that he receives a few hundred every year.
Harps do not become valuable antiques; in fact, the more modern a harp is, the higher price it can bring. Mr Morley is not perturbed about the decline of modern harps in Britain. He believes there are more than 6,000 pedal harps, most of which can be maintained in playing condition. Will the Harp Workshop die with Mr Morley, as he has no son to carry on the tradition? He hopes not. He has trained two ex-service men in the craft.
Mr Morley’s library is filled with books, rare pictures, news articles features stories, concert programmes, records and personal letters from all over the world. An interesting booklet was written by his father, John George Morley, about harp teachers of the 18th, 19th and 20th centuries. Mr Morley Sr, was an expert craftsman trained by Erard and also a shrewd salesman by Victorian standards; he described himself as the “maker of the the largest harp in the world”. From 1890 to 1912 the Morleys prided themselves on having in their studio twelve to twenty harps fully strung and tuned to French Concert Pitch (420), ready for use at all times.
At the top of the house are the living quarters where Mr Morley was born and has always lived. Leaving Mr Morley’s shop, one might hear a very simple tune being played by a child having a harp lesson from Mrs Morley. Through the years many famous harpists have given recitals in the Morley drawing room.
Mr Morley, in addition to making, buying, selling and repairing harps, is also a gracious advisor to those beginning to play the instrument. Moreover, he is an information centre to those already playing, and in tourist season, particularly a mecca for harpists from all parts of the world.
|
<urn:uuid:6148c946-1251-43e1-9bf0-7d56a485c133>
|
CC-MAIN-2021-04
|
https://www.morleyharps.co.uk/history-of-morley-harps
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703527850.55/warc/CC-MAIN-20210121194330-20210121224330-00060.warc.gz
|
en
| 0.968193
| 1,961
| 2.703125
| 3
|
Public secondary schools; right of students to freedom of expression; limitations; definitions
Section 82. The right of students to freedom of expression in the public schools of the commonwealth shall not be abridged, provided that such right shall not cause any disruption or disorder within the school. Freedom of expression shall include without limitation, the rights and responsibilities of students, collectively and individually, (a) to express their views through speech and symbols, (b) to write, publish and disseminate their views, (c) to assemble peaceably on school property for the purpose of expressing their opinions. Any assembly planned by students during regularly scheduled school hours shall be held only at a time and place approved in advance by the school principal or his designee.
No expression made by students in the exercise of such rights shall be deemed to be an expression of school policy and no school officials shall be held responsible in any civil or criminal action for any expression made or published by the students.
For the purposes of this section and sections eighty-three to eighty-five, inclusive, the word student shall mean any person attending a public secondary school in the commonwealth. The word school official shall mean any member or employee of the local school committee.
|
<urn:uuid:18a12417-69c5-4571-bc7d-2efcadcec881>
|
CC-MAIN-2015-27
|
https://malegislature.gov/Laws/GeneralLaws/PartI/TitleXII/Chapter71/Section82/Print
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094924.48/warc/CC-MAIN-20150627031814-00015-ip-10-179-60-89.ec2.internal.warc.gz
|
en
| 0.956145
| 248
| 2.78125
| 3
|
Speeding Deaths More Likely on Local Roads Than Highways
Speeding is often overlooked as one of the leading causes of traffic fatalities. And yet, according to the National Transportation Safety Board, auto accidents involving speeding were responsible for more than 112,500 deaths on the roads of the United States between 2005 and 2014. This is almost equivalent to the number of people who died in alcohol-related car accidents during that same time period. Unfortunately, speeding has not received anywhere near the attention, media coverage, or activism afforded to the campaign against drunk driving. Speeding does not face the crucial social stigma that has helped to curb drunk driving in recent years.
Victims of speeding-related accidents often sustain serious, and even fatal, injuries.
Recovering damages for speed-related crashes is made easier when you consult with an experienced injury lawyer. A driver who violates the speed limit is breaching his or her duty of care to other motorists, which is the first prong that must be proven in any negligence lawsuit.
Patrolling Local Roads
Consumer Affairs reports that speeding-related fatalities are more than three times more likely to occur on local roads than on highways. Because of this, the National Transportation Safety Board is encouraging state, county, municipal, and other local governments to set and enforce stricter speeding laws. Speeding and speeding-related accidents are also more likely to occur in areas which do not use photo enforcement programs.
The National Center for Biotechnology Information published a longitudinal review of studies which measured the efficacy of automated enforcement technology programs. Of 28 studies reviewed, every single one reported a lower number of crashes after implementation of a speed enforcement technology program. Bloomberg reports that such technologies are widely acknowledged to be an effective deterrent to speeding, but that they are currently only used in fourteen states and the District of Columbia. Their efficacy has caused the National Transportation Safety Board to recommend that states remove laws which prohibit the use of such technologies.
While local laws and photo enforcement are important steps to deterring speeding, the real change will only come when individual drivers accept personal responsibility for changing unsafe driving habits.
What You Can Do To Avoid Speeding-Related Accidents
The reason photo enforcement technologies are so effective is that they hold drivers accountable for their driving behaviors. Help the drivers in your life stay safe on the roads of North Carolina:
- Don’t hesitate to speak up when you are a passenger in a speeding vehicle. While no one likes to be thought of as a “backseat driver," an awkward conversation could make the difference between life and death.
- Help young drivers learn good driving habits from the start. Begin modelling safe driving for children even before they are old enough to drive. Monitor teens carefully when they first begin driving, and deter them from speeding before it can become a habit. Enforce family driving rules through supervised driving sessions.
- Allow yourself plenty of time to arrive at your destination, so you will be less tempted to speed along your route.
- Never engage with aggressive drivers who cut you off, tailgate, or otherwise try to make you speed up. Simply allow the other vehicle plenty of space to move past you.
Protect your legal rights with the legal advice of an experienced Wilmington car accident attorney. Injury victims are entitled to be fairly compensated for their injuries and losses.
|
<urn:uuid:3273c927-3ba1-431d-96d9-81ff4076e6f7>
|
CC-MAIN-2020-05
|
https://www.getflexner.com/posts/speeding-deaths-local-roads/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250603761.28/warc/CC-MAIN-20200121103642-20200121132642-00015.warc.gz
|
en
| 0.960813
| 669
| 2.578125
| 3
|
From dark berries to dyed beeswax and various oils, lipstick has left a long, red trace on past centuries. Here’s the trace that lipstick lovingly smeared on the world.
Makeup was a signifier of status and was worn by both men and women. Egyptians were the first to adorn their faces with lipstick; purple and black were the signature shades. Of course, their lipstick was created from the earth, such as carmine dye from insects. They also used dangerous substances such as lead and iodine, which eventually gave them serious diseases.
Sumerian civilians also adored their lipstick which was composed out of fruits, henna, clay rust, and insects. Mesopotamian women added to the adorning of their lips by dabbing remnants of precious jewels over their lipstick to create the shimmery look.
Ancient Japanese women would wear dark lips extracted from beeswax and tar while ancient Greeks believed that dark lips were affiliated with prostitution because prostitutes were ordered by law to sport dark lips.
During the Middle Ages, the church heavily banned Christian women from wearing lipstick and makeup all together. It was believed in the church that red lips were associated with devil worship and related to sorcery and witchcraft. Although the church did accept lip salves, Christian women also had their alternatives to creating red lips by biting, pinching, and rubbing their lips with certain materials to make their lips appear redder.
RESERVED FOR THE “ELITE”?
Originally makeup was only reserved for the wealthy and popular. When Queen Elizabeth I popularized beautiful red lips during her reign in the 16thcentury, red lips became accessible only to women of royalty and stage actors and actresses.
A SYMBOL OF STRENGTH AND RESILIENCE
In the 1920s, the first wave of feminism made its appearance and women began to demand more rights and fight for equality among men. During this time, many of these passionate women flocked to lipstick which quickly became a heavy symbol of feminism. The women of this era simply wanted to be bolder and represent where they stood.
In the 1930s, the Depression Era, lipstick left a remarkable red trace here as well. With matte finishes being one of the main contributors of the love and power of lipstick, the depression era resulted in more affordable (and accessible) lip products. Deep plum and burgundy were among consumer favorites.
During World War II, women were highly encouraged to wear lipstick that was especially red to uplift the grim atmosphere left over by the war. Perhaps this gave women strength and confidence during such a time as this.
The very first ad for lipstick was seen in 1884, courtesy of a French perfume company, Guerlain. Their lipstick was composed of deer tallow, beeswax and castor oil and wrapped in silk paper to preserve the narrow shape. Eventually in 1915, Maurice Levy invented lipsticks in cylindrical containers, likely for easier storage and application.
In 1923, James Bruce Mason, Jr. created the modern roll-up tube that we see today. Iconic silent movie stars would popularize deep red lips and viewers all over the nations will recreate this famous look. Lipstick was further encouraged by magazine ads and, of course, women ran to copy them. This was followed by an invention of the lipstick stencil which would supposedly bless women by helping them create the perfect “cupid’s bow” lip.
In the 1950s, iconic women such as Marilyn Monroe, Audrey Hepburn, and Liz Taylor took red lips to a higher tier of beauty. They were setting trends in popular movies and women all around wanted to emulate their favorite stars. This is when lipstick was at its peak in popularity. “Kiss-proof” lipstick was also invented in this era by Hazel Bishop.
Fast forward to the 1990s where lipstick was hardly ever worn without dark lip liner! This is also when women became more environmentally conscious and demanded chemical-free lipstick with natural formulas. Another popular fad of the 1990s was tattooing color on lips but that died out quickly.
Today, lipstick colors vary across the spectrum from nude to orange; there are more color options than ever, and more women are getting expressive and creative.
Happy National Lipstick Day!
|
<urn:uuid:6cfadf9e-8a62-4cb7-8170-da3e3a89e1c5>
|
CC-MAIN-2018-30
|
https://www.forsythwoman.com/traces-of-lipstick/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589536.40/warc/CC-MAIN-20180716232549-20180717012549-00293.warc.gz
|
en
| 0.980788
| 875
| 3.546875
| 4
|
It's a sad fact that humanity is fast outgrowing our available resources. And with almost all of the available land that's able to grow crops already taken up, science is turning to other methods to supply our food needs.
One article found on The Mirror, brings to light the efforts of the British Government, (as well as several other European countries) to introduce edible insects and insect derived products as a staple of their citizen's diets in the coming years.
Consumption of meat has increased world-wide by about twenty-fold in the last forty years, and it's only set to increase further as developing nations continue to grow and demand rises. This increase also makes it harder to raise any more livestock, due to the main ingredient in most kinds of feed, Soya, exploding upward in price.
The scientists at the PROteINSECT maggot lab at the Food and Environment Research Agency, are trying to find solutions to world food shortages through insect consumption. The scientists behind this plan are quick to point out that insects require far less food to produce the same amount of edible material, as well as needing far, far less space then traditional cattle or pig farms.
Think there is no way you would scoop up a spoonful of maggots? There are many ways to consume insects that are, shall we say, more creative? How about insect flour that can be made into recognizable foods like tortillas? That's what Big Cricket Farm in Ohio is doing. They are working with an insect food start-up out of Boston, Six Foods, to blend ground crickets into a flour and turning them into a type of chip called a "chirp". They even have a Kickstarter Page.
Let's just face the facts; we are facing a looming food shortage, and eating insects is a thing. Let's support those creative foodies who are at least trying to make the insect look less like a bug and more like a tortilla chip.
For more on the original article from The Mirror, see: Insects: Food Of The Future?
|
<urn:uuid:74517b2c-08a9-4511-aa96-77adcb22fc1c>
|
CC-MAIN-2019-30
|
https://www.foodista.com/blog/2014/05/26/could-insects-be-the-next-food-revolution
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526324.57/warc/CC-MAIN-20190719161034-20190719183034-00116.warc.gz
|
en
| 0.968608
| 418
| 3.203125
| 3
|
Some cats might show an interest in certain tunes by coming into the room where they're playing, meowing or even caterwauling along. Other cats have been known to curl up on top of stereo speakers to feel the soothing beat. And you don't have to search long on YouTube to find a cat playing the piano. Some animal behaviorists believe that certain sounds imitate feline noises, which might explain why many cats show an interest when musical notes are played [source: Lang].
Ask your child to help you discover if your feline has a musician's ear by planning a soundtrack for your cat's regularly scheduled playtime. Allow your child to select the music and consider introducing a new toy, like a pole with a string and fuzzy lure on one end, that your little one can use to play with kitty, moving it to the beat. If you have a piano or keyboard, see if your cat shows an interest by slowly introducing him to the instrument. Let your cat explore the area and play a few of the keys to get his reaction. It won't take long for you and your child to know if your cat is the next Chopin.
|
<urn:uuid:71b50fe6-1438-438c-9ca9-dd474bf5303d>
|
CC-MAIN-2018-13
|
https://animals.howstuffworks.com/pets/5-games-kids-can-play-with-cats2.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647706.69/warc/CC-MAIN-20180321215410-20180321235410-00439.warc.gz
|
en
| 0.960406
| 235
| 3.0625
| 3
|
In 2009 the National Endowment for the Humanities awarded Professor Katherine Faull a collaborative research grant ($116,000) to translate, edit and disseminate the vitally important manuscripts that constitute the Moravian mission diary of the strategic Native American “capital” of the 18th century woodlands Indians at Shamokin, Pennsylvania (today, Sunbury). This collection of manuscripts (written primarily in German with a few sections in English) was written by 10 different missionaries, including the young David Zeisberger, perhaps the most famous observer of Native American life before John Heckewelder (whose work acted as a source for Fenimore Cooper’s Leatherstocking Tales).
The importance of the Moravian mission diary to studies of Colonial history, ethnography, missiology, and micro-histories of specific communities has recently become paramount in the re-examination of the relationship between ethnography and missiology, and of course within the field of Native American Studies. Such translations of mission communities have made available to scholars as yet untapped primary sources on the contact period in North America. However, the Shamokin Moravian diary differs substantially from these published mission diaries in that Shamokin itself was not a mission settlement built by the Moravians but rather pre-existed their advent by several centuries, first as a Susquehannock, then Shawnee, and then in the early 18th century as a primarily Delaware settlement and trading post, overseen by the Iroquois vice-regent, the Oneida Chief Shikellamy.
In addition, for this area of Central Pennsylvania, the lack of access to primary historical sources from the time of initial contact through the colonial period has led to an overly heavy reliance on a few 19th and 20th century interpretations of 18th century primary sources that have colored the presentation of this fascinating hub of human exchange through their contemporary cultural biases. Unlike human settlements at other confluences, the settlement of Shamokin has received only superficial attention either from historians of culture, Colonial history or ethnographers. The literature that does exist on the settlement reverberates with the dark judgment passed on the place nearly 250 years ago that dubbed it the seat of “the prince of darkness.” Only very recently, through meticulous and intelligent reading of mission reports composed in archaic German script have historians challenged the perception of a polarized population of Native Americans and Europeans in the upper reaches of the Susquehanna River.
The dominant view of Shamokin, promoted by historians for at least a century, has been that it was a place of darkness and magic. However, the diaries reveal a far more complex picture of political and cultural negotiation, a confluence of cultures, and environmental epistemology. It describes the missionaries’ regular visits to the settlements of Delaware women on Packer’s Island, regular suppers with Shikellamy in their log home, trips up and down the Susquehanna river to speak with the men of the Delaware who were back from hunting, visits from the envoys of the Six Nations on their way to and from important political meetings with the Colonial administration in Lancaster and Philadelphia, as well as an environmental diary of natural events such as an earthquake, floods, famine, planting, and harvesting.
The Shamokin diary provides not only a wealth of information about the cultural interactions, historical events, and spiritual condition of the settlement in the years 1745-1755, it also offers a “local earth story” about the ecology, climate, and geography of the area in the mid-1700s. Repeatedly, the diarists record high waters of the Susquehanna, the ice jams, the bitter cold of winter that drives the Delaware men back to the settlement from their hunting expeditions, the planting of indigenous crops of corn, squash and beans, and the revival of the peach and apple orchards planted by earlier European visitors. Frequently, there is much hunger around Shamokin, a dearth of good seed to plant, but also the occasional shared feast of venison or bison meat.
The retrieval, translation and publication of historical sources such as the Moravian diaries from Shamokin from 1744-55 counters this prevalent vision of the confluence of the Susquehanna. The diaries, which are kept in the Moravian Archives in Bethlehem, Pennsylvania are not an easy read and, although microfilmed, they are not readily available to any scholar not trained in deciphering the German script of the 18th century. As these documents become available in English, the “magic” of the confluence no longer is drawn from the description of the caves along the western bank of the West Branch but rather reflects the rich, intercultural exchange that took place on the Susquehanna River over 250 years ago between Europeans and Native Americans. A “beta” version of the full Shamokin Diary site can be found here.
|
<urn:uuid:3465a20b-d90d-461f-a818-74d58b75036e>
|
CC-MAIN-2018-43
|
http://susquehannastories.blogs.bucknell.edu/shamokin/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512836.0/warc/CC-MAIN-20181020142647-20181020164147-00359.warc.gz
|
en
| 0.95586
| 1,013
| 2.921875
| 3
|
We can learn a lot about our presidential candidates from the individual words they use. Through computational analysis, we’ve pulled together lists of words that each candidate tends to use more frequently than their competition. These words shed light on the issues, policies, and rhetoric of individual candidates on an extremely granular level, ultimately giving us valuable insight into the people vying for the title of President of the United States.
We looked at transcripts from the fifteen main presidential debates that took place between August 6, 2015 and February 13, 2016—six Democratic Party debates and nine Republican Party debates. From these transcripts, we created six candidate files (Clinton, Cruz, Kasich, Rubio, Sanders, and Trump) that contained all the words spoken by individual candidates during the course of these debates. Using a corpus analysis tool, we compared the individual candidate files to the corpus of all the debate transcripts during this period. This allowed us to identify words that were used more frequently by an individual candidate than by the larger group. (Find more information on the statistics behind these calculations here.)
Below are the top twenty words favored by each candidate in our analysis.
We also looked at the words by party here.
|
<urn:uuid:4f86251d-72b5-4785-9f0b-e71108346058>
|
CC-MAIN-2018-47
|
https://www.dictionary.com/e/your-candidate-in-a-word/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742567.46/warc/CC-MAIN-20181115054518-20181115080518-00156.warc.gz
|
en
| 0.955523
| 239
| 2.59375
| 3
|
Today, as we look at Jesus’s ministry, we look at the question of the Messiah.
Now, the term Messiah has become a bit warped in the modern Christian consciousness. It’s original meaning from Hebrew culture over two thousand years ago has been pinpointed by Christians and early church leaders onto a specific individual, and then has evolved as our knowledge of this individual expanded and altered and was honed into what we now know him to be.
This individual, quite obviously (or so I hope), is none other than Jesus of Nazareth.
Before we delve into the conversation between the Pharisees and the historical Jesus two thousand years ago, we must look at the term Messiah, take several steps back, and evaluate what “messiah” meant to them and, from that, what this conversation was specifically about.
What we think and undoubtedly know about the Messiah does not matter in a historical context, sad to say. No one but Jesus could know the future, and so we need to limit ourselves to their knowledge and their historical backdrop to consider the passage. We need to take all of our preconceived religious notions and spiritual knowledge and check them at the door.
I promise you, you will be the richer and the wiser for it – and whatever was true historically at the time this conversation took place in Matthew 22, it does not negate our Christian beliefs, our religious hopes, and our spiritual knowledge as modern day Christians.
What – or Who – is the Messiah?
The Messiah is undoubtedly a Jewish term and, roughly speaking, is a liberator or savior. However, he (sorry, ladies, but the Messiah was almost exclusively believed to be a man) was an earthly savior.
The Messiah, also traditionally, held one of three roles: prophet, (high) priest, or king. He could come in any of these three guises. As the tradition developed, the Messiah would also be born of the line of David, the last true dynasty of Israel which ended with Solomon the Wise. As a king (and perhaps as a prophet or priest), he would also be anointed with oil by God (through an intermediary).
This tradition of anointing kings and potential Messiahs exists in Western culture to this day. When constitutional monarchs ascend to their thrones (the most well-known being Elizabeth II of England), the “high priest” of their nation anoints them with oil to signify the blessing of God.
Now, is Queen Elizabeth II or other monarchs a Messiah? No, she (and indeed no one else) is not. But she is an example of how the tradition continues on from Ancient Israel into the English-speaking world.
To go back to the time of Jesus (and a bit before), the Messiah was foretold in Scripture. Every Jewish boy and girl was born into this culture where there was a belief that the Messiah would come. They were waiting for signs, for symbols, and when Israel fell under foreign occupation again and again and again, the people became desperate for it.
Rome, if you recall your Biblical history, was just the final though horrific occupier of the nation.
Although the Bible never specifically stated that the Messiah would be political in any way, shape of form, the idea of a savior of the nation evolved into the idea that a man would come and free Israel. Some, most notably the Zealots, believed that the Messiah would be the one to (violently) overthrow Rome and her foreign gods.
Messiahs were a Dime or Dozen
The above statement seems strange to us as Christians (after all, there was only one Messiah, and that was Jesus Christ): but it was true. Every other Jewish male and his brother were setting themselves up as the Messiah.
They would go about Israel and preach the destruction of Rome.
They would go to Jerusalem and make promises and possibly rough up a few soldiers if they were brave.
They would whip up fervor in the desperate populace, have followings, and one by one they were put out by either the religious authorities (such as the Pharisees) or Rome (through the governor, Pontius Pilate).
Their disciples believed they would deliver on saving the nation, but none of them ever did. Israel, historically, was never saved. Her Temple was destroyed in AD 70 and her people dispersed.
Most of the names of these false messiahs were lost to time, their legacies forgotten, and their promises unfulfilled.
The reason why you probably don’t know who they are is for that reason. Their bodies turned to dust, their words flew to the wind, unheard, and they were lost to time.
The One Messiah whose Name Was Not Forgotten
However, there was one man who was more successful than the others. It’s not that he went about promising that he’d raise a sword to Rome himself. It’s not that he was wealthier and had more name recognition in Jerusalem. It’s not that he even self-identified as the Messiah.
No, there was something different about Jesus of Nazareth, the man we as Christians recognize as the Messiah. He spoke about his Father in heaven and not his human “dad.” He turned over a coin and instead of insisting that it belonged to the Jewish man who had earned it, told the authorities to give it back to Rome. He tore down the laws with quiet words and said there were only two commandments – to love God and to love your neighbor as you would yourself (Matthew 22:37-40).
Jesus wasn’t revolutionary because he demanded a physical uprising against Rome with weapons, such as swords, rocks, and hatred.
Jesus was revolutionary because he suggested that love was the answer to every earthly and spiritual question a person may ever have.
The political and religious leaders heard him and listened to him and felt dread. Earthly revolutions failed. If Rome fell (and it, of course, did), another occupier would take its place. It was the status quo. Jesus’s message of love, if properly implemented, would never fail. The religious leaders became afraid and they plotted. They hoped that after they convinced Rome that Jesus was a threat (and they did convince Pontius Pilate quite effectively), Jesus would turn to dust along with his words.
What the religious leaders of Israel and the representatives of Rome did not count on is that Jesus rose again. Neither his body nor his words were lost to the people. His message and his love endured past the destruction of the Temple in AD 70. When the world fell down around upon his followers, all was not lost because the earthly kingdom survived—as Jesus had promised.
Jesus proved the Pharisees right – he was dangerous. He was so dangerous and revolutionary, that we’re talking about him half a world away over two thousand years later.
A Brief Note on Other Messiahs
Now, you and I know that Jesus is the Messiah – and that should be the end of the story.
And, it is. For us. But not for everyone.
When Judaism and Christianity became two distinct religions, Christians had the answer to a question – Will God send a Messiah to save us? Judaism did not have that answer.
Over the centuries, various Messiahs have appeared in times of political strife. None – and I wish to stress this, absolutely none – have been recognized universally in Judaism. There have been sects, of course, that have followed these religious men (and one woman), hoping for the nation to be saved.
As a Christian minister, I will not comment on the validity of these Messiahs or of their movements. It is a matter of religious faith for those involved.
A few notable cases are as follows (but this is in no way a complete list): Simon bar Kokhbah who led a revolt against Rome between AD 132-135, Abu Isa who revolted against the Caliph in Persia c. 744-750, the Yemmenite Messiah in the twelfth century, Eve Frank (the only known female Messiah), and the Lubavitcher Rebbe (1902-1994).
One way a person can separate Christianity from Judaism to this day (though there are many points of difference) is that Christians have found their Messiah, the Jewish people are still waiting for him.
From Messiah to Christ
This eight-year-old once told me, quite plainly, that Jesus’s last name was Christ. This is a commonly held belief, but not technically accurate.
Christ – or Christos – is a title in Greek and is meant as a rough translation of the Hebrew Messiah.
However, it has come to mean so much more than the Hebrew concept. While it literally means “anointed one” – we now understand Jesus to be anointed as not only a prophet foretelling our freedom, not only as our king who rules in heaven alongside God the Father, but also as the high priest of our faith. Jesus is three in one in this way.
When we say “the Christ” in modern America, we often think of a savior – a savior beyond our earthly existence, the Son of God who will save our souls for all eternity.
It is a subtle shift in thinking (from the nation being saved on earth to the nation of believers saved for all time) … but one we must recognize if we are to understand today’s Sermon Lesson.
To the Text – On the Question of the Messiah
Who is Who (and What is What)
Over the past few weeks we have dealt with the Pharisees questioning Jesus. The Pharisees, if you recollect, were pious men who followed all of the 613 laws in the Hebrew Bible.
The Sadducees, however, were a different group although close allies. They were a sect of Judaism that ended with the destruction of the Temple in AD 70. They denied the resurrection of the dead (a contentious issue at the time), they denied the existence of spirits (both malevolent and good), and they denied oral tradition. They saw the importance of only the Law as written in scripture (although they might not follow it quite so closely as the Pharisees).
As such they were men of reason, men of fact, and most likely denied any form of spiritual expression within Judaism.
Both the Pharisees and the Sadducees were present when Jesus questioned the Pharisees on the nebulous and potentially spiritual concept of the Messiah. The Messiah, after all, is one who will come but there is no concrete way to prove that a Messiah claimant is, in fact, what he claims to be.
Context (or What Comes Before)
In Matthew 22, the Pharisees and Sadducees are questioning Jesus and asking him points of religious law. They’re consulting their mental Bibles, comparing everything he says with what was written, trying to catch him out.
At this point, it is a familiar game between the religious authorities and Jesus.
Of course, it backfires. When asked which law is the greatest in the Bible, Jesus tells them unequivocally that is love, love for God and love for your fellow human being.
Jesus pulled a rabbit out of a hat. He was meant to deny the law or pick the “wrong” answer (and any answer could be considered wrong to those who practice all 613 laws to the point of obsession). Jesus gives an answer no one expects, an answer that is perfect in its simplicity, and an answer that no one can refute.
The conversation, however, doesn’t end there, and moves onto the concept of the Messiah.
Jesus asks the Pharisees, as those who follow the law, whose son the Messiah will be. They answer with what precedent and tradition tells them: the Messiah will be the son of David.
This would be a normal question and answer, but then Jesus turns it on its head.
In the presence of the Pharisees (who follow the law in its purest form and also in the extreme) and the Sadducees (who believe in the written Word to the exclusion of everything else) Jesus quotes scripture. Jesus points out that David has spoken of the Messiah, that he has called him “Lord.” Jesus then rightfully points out that David would never call his own human descendant “Lord.” David was King of Israel, the head of a great Dynasty, a figure of mythological proportion since he was a young man.
Jesus is pointing out a discrepancy, one that doesn’t have an answer textually.
After he asked the Pharisees (who should know all the answers and, if not, then certainly the Sadducees would), everyone was afraid to ask Jesus any more questions.
Of course, as followers of Christ two thousand years later, we know the answer. The answer is that the Messiah (Jesus) is the descendant of David (his genealogy can be found in the Gospel of Luke). He, also, is more than an earthly Messiah.
Jesus as savior is the Messiah.
Jesus as savior is the Christ.
Jesus as savior is our Redeemer and Protector.
And, as always, Jesus is not only the son of God but the second person in the Holy Trinity, God the Son. As such, he will sit at God the Father’s right hand in heaven, as David once said the Messiah would.
The Pharisees and Sadducees were too afraid to question the historical Jesus, but Jesus does not want us – his believers, his followers, his friends – to be afraid.
Trust in Jesus, he was sent as the Savior, a gift from God that can never be fully comprehended but beautiful in its generosity and love.
|
<urn:uuid:1be00c5b-cb4f-48db-90ba-20d89d0fea58>
|
CC-MAIN-2022-21
|
https://fccnorthampton.org/2020/10/21/mini-sermon-25/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534693.28/warc/CC-MAIN-20220520223029-20220521013029-00009.warc.gz
|
en
| 0.979651
| 2,863
| 2.515625
| 3
|
To learn about and register for our upcoming workshops, please visit our calendar.
What to expect: The workshop will show formal educators how to use Project Learning Tree to teach science, math, language arts, social sciences, art, health, and even physical education.
Nonformal educators - such as environmental educators, interpreters, or youth organization leaders - will be shown how Project Learning Tree can be used as a resource of activities to enhance their work with both students and adults.
To increase educators' confidence in teaching environmental education concepts.
To encourage educators to approach learning and teaching from an ecological and multi-disciplinary perspective.
To show educators how they can incorporate Project Learning Tree into their current and future lesson plans and curriculum.
|
<urn:uuid:7a903ea6-1093-4e0b-b8a9-61634d51aeac>
|
CC-MAIN-2020-45
|
https://www.pltwa.com/workshops.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107922411.94/warc/CC-MAIN-20201031181658-20201031211658-00542.warc.gz
|
en
| 0.92294
| 148
| 2.71875
| 3
|
Beta Blockers Increase Surgery Risk. A new study on the effects of beta blockers and surgical procedures reveals that patients given a beta blocker—beta blockers are a type of blood pressure drug—to reduce heart risks prior to surgery, were one-third more likely to die within a month and also had double the risk of stroke compared with those who received a placebo, or a dummy pill.
The Canadian study appears in the journal, Lancet. The study is the largest, most rigorous to date that reviews the effects of beta blockers in reducing surgery-related risks; other, smaller studies provided mixed results.
“There is a real potential that beta blockers are causing serious harm in the surgical setting,” said Dr. P.J. Devereaux of McMaster University in Ontario, who conducted the study. “If my mother was undergoing surgery and given a beta blocker, I would be extremely upset based on this evidence,” Devereaux added.
It has been long believed that taking a beta blocker prior to major surgery protects the patient from heart risks related to the surgery’s stress. These new findings challenge that theory. Surgery often raises levels of a stress hormone known as catecholamine.
Catecholamine increases pressure and heart rates. “Beta blockers block the effects of increased catecholamines, so the physiological rationale would say they would be beneficial to people,” Devereaux said.
Devereaux and colleagues tested this idea
Devereaux and colleagues tested this idea, studying over 8,000 patients in 23 countries at 190 hospitals who were undergoing major surgery unrelated to the heart.
Those studied had or were at risk for clogged arteries. Half were given the beta blocker metoprolol—sold by AstraZeneca as Toprol XL—two to four hours before and 30 days following surgery. The other half received a placebo.
The doctors were looking for heart complications such as heart-related death, non-fatal heart attacks, or a heart-stopping event known as cardiac arrest in which the person survived. The study revealed that those who took the drug had fewer heart attacks and abnormal heart rhythms; however, they were more likely to die or have a stroke.
For every 1,000 people with similar risks undergoing non-cardiac surgery, the drug could prevent 15 people from experiencing heart attack, three from requiring a shock to restore a normal heartbeat, and seven from developing a type of heart rhythm known as atrial fibrillation.
That said, eight more people would die, five would have a stroke, 53 percent would have abnormally low blood pressure, and 42 percent would have an abnormally slow heart beat. “This is an important study because, although the beta blocker reduced the number of heart attacks that occurred following surgery, it caused more strokes, thus—on balance—causing more harm than good,” Peter Weissberg, medical director of the British Heart Foundation, said. “This is why it is so important to undertake large clinical trials rather than assuming drugs will only do what is expected of them,” Weissberg added.
Devereaux, initially presented his findings at the November American Heart Association meeting and expects this study to create debate over the wisdom around patients taking beta blockers prior to a major surgery. “It is telling us something we didn’t realize in the past,” he said.
|
<urn:uuid:dd5244af-fc14-4c22-9be0-833fc6e7935e>
|
CC-MAIN-2023-06
|
https://www.yourlawyer.com/defective-drugs/beta-blockers-increase-surgery-risk/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500056.55/warc/CC-MAIN-20230203122526-20230203152526-00756.warc.gz
|
en
| 0.972993
| 698
| 2.984375
| 3
|
Although they had no problem with music as a solemn accompaniment to ceremonies, the Puritans were vehemently against it as a form of merry-making. Like other recreations, it was supposed to engender idleness and draw the mind away from the contemplation of God. Similarly, the reverence for the written word which the Puritans brought with them entailed an understanding of literature as a means through which God’s message could be disseminated and reflected upon. It was certainly not for entertainment. Hawthorne’s ancestors would never have encountered a novel — America’s first did not appear until 1789, when William Hill Brown’s Power of Sympathy was published — but he is right that they would have regarded his occupation with repugnance.
Hawthorne made the Puritan aversion to entertainments a central theme of his 1837 short story ‘The Maypole of Merry Mount.’ Read it here.
|
<urn:uuid:0e08450e-8841-436e-8ccc-17ccd726419c>
|
CC-MAIN-2016-44
|
http://www.bookdrum.com/books/the-scarlet-letter/104854/bookmark/200445.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720471.17/warc/CC-MAIN-20161020183840-00236-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.986035
| 192
| 3.421875
| 3
|
Wigan Flashes Wigan Greenheart Living Landscape cpt Lancs WT
Creating a network of important wetland habitats
Wigan Flashes is 240 hectares of wetland - large areas of open water, reedbed, fen, rough grassland, wet woodland and scrub are home to more than 200 species of bird, 15 species of dragonfly and 6 species of orchid.
The flashes (lakes) are a legacy of Wigan's industrial past and were formed as a result of mining subsidence. Some of the flashes were partially filled with colliery waste and ash from the nearby Westwood Power Station. Ince Moss Colliery closed in 1962 and Westwood Power Station was demolished as recently as 1989. Natural colonisation and large-scale reclamation works have helped heal the industrial scars, turning the area into the amenity it is today.
This Living Landscape scheme is transforming the damaged landscape back to its former glory so that it can benefit the six million people who live within 20 minutes of the site. It will link the flashes to a larger network of important wetland habitats along a 9km stretch of the Leigh branch of the Leeds to Liverpool Canal.
Wigan Flashes is also part of Greenheart (Wigan's Regional Park Project), a major initiative to unite country parks and open land from Pennington in Leigh to Haigh Hall in Wigan.
Virtual tour by Mike McFarlane
We have created 30 Hhectares of reedbed by removing 40,000 tonnes of post-industrial waste
More than 22 hectares of willow have been removed to allow reedbed to establish.
Almost 20 hectares of ditching and bed-lowering has been completed in the reedbeds as part of an extensive bittern project.
The woodland areas are being managed to develop a structure of glades, which will be colonised by native woodland vegetation.
6 kilometres of footpath have been created.
Start date: 2003
Scheme area: 240 hectares
This scheme is helping species including...
Overwintering waterfowl such as Grey Heron, Tufted Duck, Coot, Pochard, Goldeneye, Gadwall and Great Crested Grebe. Breeding birds include Reed Bunting, Willow Tit, Reed Warbler, Sedge Warbler, Common Tern and Water Rail, 15 species of dragonfly, 6 species of orchid, Noctule and Daubenton's bats.
Wigan Metropolitan Borough Council
|
<urn:uuid:39ca8d68-bb3a-438b-bea7-26708456f7f4>
|
CC-MAIN-2016-26
|
http://www.wildlifetrusts.org/living-landscape/living-landscape-schemes/scheme-directory/wigan-flashes-wetland-restoration
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396224.52/warc/CC-MAIN-20160624154956-00035-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.930915
| 509
| 3.1875
| 3
|
Panama and China Strengthen Ties as U.S. Influence Weakens
In June, Panama cut ties with Taiwan and established diplomatic relations with China. Five months later, on November 17, Chinese President Xi Jinping and Panamanian President Juan Carlos Varela met in China to celebrate the opening of Panama’s first embassy in Beijing. The embassy is a significant step toward strengthening the China-Panama relationship—a relationship that poses a major threat to the United States.
At the meeting, the two presidents signed 19 agreements, one of which includes plans for negotiating a free-trade agreement. China is already Panama’s second-largest source of imports.
China is also the second-biggest user of the Panama Canal, after the United States. A significant portion of the 13,000 to 14,000 ships that pass through the canal every year are Chinese vessels. This number may increase, since China and Panama signed a maritime transport agreement on November 17. The goal of this agreement was to “enhance the cooperation and development in moving commercial development between the two countries.”
On November 22, South China Morning Post predicted that the China-Panama friendship would create a surge in Chinese investment into the small Latin American country. By the end of last year, China had spent $1.3 billion on contracted projects in Panama. It has also begun building ports near the canal for Chinese cruise ships.
The Post reported that “China, with its huge economic clout, has steadily sought to lure away the dwindling number of countries that maintain diplomatic ties with the island [of Taiwan].” Panama is its latest conquest. During the November 17 meeting, Varela declared his support for the one-China policy—a major move away from his previous stance.
However, China’s interest in Panama goes far beyond isolating Taiwan. Panama—and more specifically, the Panama Canal—is China’s “most strategic prize” in Latin America. It is one of the most important sea gates in the world. If China controls the Panama Canal, it can easily use it as a choke point to strangle the U.S. economy. It would pose a major threat to United States security.
In the January 2000 Trumpet, editor in chief Gerald Flurry wrote an article titled “The Rise and Fall of a Superpower.” He explained that giving away the Panama Canal was one of the worst strategic decisions the U.S. has ever made:
Panama is, by far, of the greatest strategic importance to the U.S. It is the gateway controlling access to and from the two greatest oceans—the Atlantic and the Pacific. This great sea gate has for almost 85 years controlled more of the flow of goods by sea from the Eastern to the Western Hemisphere and from the West to the East.
This sea gate was—and is—hugely important to the U.S. for economic, security and military reasons. Mr. Flurry referenced an Oct. 5, 1965 article from the Los Angeles Times that stated, “The Panama Canal stands as one of America’s foremost symbols of greatness and power. Our ‘pride’ is largely Panama.” However, the U.S. gave up this “foremost [symbol] of greatness and power” without a fight.
Mr. Flurry said: “I predict—based on history and the Bible—that the Panama Canal area will be a great curse to America in the near future. And that curse has already begun!”
This is where China comes in, as he wrote:
Through an underhanded deal struck by a money-grasping Panamanian government and the giant Hong Kong-based Hutchinson Whampoa conglomerate, control of the Panama Canal virtually went to a declared enemy of the U.S. at the canal’s handover.
The Panamanian government sold two prime U.S.-built port facilities to a Chinese company, which many say operates as a front for the Chinese Communist Party. The 50-year contract between Panama and Hutchinson Whampoa effectively places the ability to open and shut this great sea gate into the hands of an enterprise based in, and subject to, the influence and direction of Communist China. Not only has Hutchinson Whampoa been granted full control over the ports at both entry and exit points of the Canal, the Panamanian government has granted long-term options to this Chinese enterprise for the takeover of a number of military installations scheduled for evacuation by the U.S.
Any student of military strategy should see the startling possibilities which are opened up by such a deal. At 12 noon, Dec. 31, 1999, an enterprise of China, the nation possessing the world’s largest army, which is aggressively expanding its navy and air force, took control of the major sea-transit gateway between East and West. In effect, this gave Red China the power to deny the U.S. Navy right of access through the Panama Canal. Transit of military material, personnel and provisions via the canal was crucial to the U.S. strategic efforts during World War ii, [and the wars in] Korea, Vietnam and the Persian Gulf.
It is feasible that this secret, illegal deal between Panama and the Chinese will open up a base for Chinese warships, submarines and bombers only 900 miles from Miami. Should the Red Chinese choose to base their J-11 attack jets in Panama, ostensibly to promote the “security” of the Canal, this would place them within striking distance of the U.S. mainland. The potential threat to U.S. and world security posed by the Panama-China deal is difficult to fathom!
That article was written 17 years ago. Since that time, China and Panama have become increasingly close. The last few months have marked some of the most significant changes in the relations between these two nations, and the U.S. is too weak to stop it.
Mr. Flurry referenced Leviticus 26:19, where God prophesied, “I will break the pride of your power.” Panama is a major sea gate that helped bring the U.S. to the height of its power. Now America’s pride in its power is broken. Panama is vital to American national security, but Americans are unable to prevent China from progressively taking it over.
As Mr. Flurry wrote at the end of that article, “How long must God curse us before we awaken? That is the big question each one of us must answer. The decision is in our hands—nationally and individually.”
To learn more about the importance of the Panama Canal and why China seeks to strengthen its ties with the country, read Gerald Flurry’s article “The Rise and Fall of a Superpower.”
|
<urn:uuid:5cf005c5-a0a9-4b7f-822e-ea8d88548fd2>
|
CC-MAIN-2018-51
|
https://www.thetrumpet.com/16578-panama-and-china-strengthen-ties-as-us-influence-weakens/print
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829429.94/warc/CC-MAIN-20181218143757-20181218165757-00629.warc.gz
|
en
| 0.95725
| 1,414
| 2.53125
| 3
|
Download Full Text (19.0 MB)
Download Carol Symes - Introducing The Medieval Globe (541 KB)
Download Monica H. Green - Editor's Introduction to Pandemic Disease in the Medieval World (555 KB)
Download Monica H. Green - Taking "Pandemic" Seriously: Making the Black Death Global (1.6 MB)
Download Anna Colet et al. - The Black Death and Its Consequences for the Jewish Community in Tàrrega: Lessons from History and Archeology (8.7 MB)
Download Sharon N. De Witte - The Anthropology of Plague: Insights from Bioarcheological Analyses of Epidemic Cemeteries (592 KB)
Download Stuart Borsch - Plague Depopulation and Irrigation Decay in Medieval Egypt (3.5 MB)
Download Ann G. Carmichael - Plague Persistence in Western Europe: A Hypothesis (3.1 MB)
Download Nükhet Varlık - New Science and Old Sources: Why the Ottoman Experience of Plague Matters (668 KB)
Download Fabian Crespo and Matthew B. Lawrenz - Heterogeneous Immunological Landscapes and Medieval Plague: An Invitation to a New Dialogue between Historians and Immunologists (2.4 MB)
Download Michelle Ziegler - The Black Death and the Future of the Plague (583 KB)
Download Robert Hymes - Epilogue: A Hypothesis on the East Asian Beginnings of the Yersinia Pestis Polytomy (656 KB)
Download Monica H. Green, Kathleen Walker-Meikle, and Wolfgang P. Müller - Diagnosis of a "Plague" Image: A Digital Cautionary Tale (1.3 MB)
Download TMG 1 (2014): Abstracts (219 KB)
The plague organism (Yersinia pestis) killed an estimated 40% to 60% of all people when it spread rapidly through the Middle East, North Africa, and Europe in the fourteenth century: an event known as the Black Death. Previous research has shown, especially for Western Europe, how population losses then led to structural economic, political, and social changes. But why and how did the pandemic happen in the first place? When and where did it begin? How was it sustained? What was its full geographic extent? And when did it really end?
Pandemic Disease in the Medieval World is the first book to synthesize the new evidence and research methods that are providing fresh answers to these crucial questions. It was only in 2011, thanks to ancient DNA recovered from remains unearthed in London’s East Smithfield cemetery, that the full genome of the plague pathogen was identified. This single-celled organism probably originated 3000-4000 years ago and has caused three pandemics in recorded history: the Justinianic (or First) Plague Pandemic, around 541-750; the Black Death (Second Plague Pandemic), conventionally dated to the 1340s; and the Third Plague Pandemic, usually dated from around 1894 to the 1930s. This ground-breaking book brings together scholars from the humanities and social and physical sciences to address the question of how recent work in genetics, zoology, and epidemiology can enable a rethinking of the Black Death's global reach and its larger historical significance. It forms the inaugural double issue of The Medieval Globe, a new journal sponsored by the Program in Medieval Studies at the University of Illinois at Urbana-Champaign.
This issue of The Medieval Globe is published with the support of the World History Center at the University of Pittsburgh.
Arc Medieval Press
European History | History of Science, Technology, and Medicine | Medieval History | Medieval Studies
Citation for published book
Green, Monica, ed. Pandemic Disease in the Medieval World: Rethinking the Black Death. The Medieval Globe 1 (2014).
Green, Monica H.; Symes, Carol; Colet, Anna; Muntané i Santiveri, Josep Xavier; Ruíz, Jordi; Saula, Oriol; Subirà de Galdàcano, M. Eulàlia; Jáuregui, Clara; DeWitte, Sharon N.; Borsch, Stuart; Carmichael, Ann G.; Varlık, Nükhet; Crespo, Fabian; Lawrenz, Matt B.; Ziegler, Michelle; Hymes, Robert; Walker-Meikle, Kathleen; and Müller, Wolfgang P., "TMG 1 (2014): Pandemic Disease in the Medieval World: Rethinking the Black Death, ed. Monica Green" (2014). The Medieval Globe Books. 1.
|
<urn:uuid:aa9ba0d7-1486-4cd5-b93a-3fdcc1cc979e>
|
CC-MAIN-2018-51
|
https://scholarworks.wmich.edu/medieval_globe/1/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823785.24/warc/CC-MAIN-20181212065445-20181212090945-00117.warc.gz
|
en
| 0.816944
| 979
| 2.671875
| 3
|
A UNIQUE LOCATION FOR YOUR EDUCATIONAL TRIP, WHILST LINKING WITH THE NATIONAL CURRICULUM!
Teaching Sessions are delivered by expert Gardens’ staff and all are tailored to link to the new National Curriculum.
Teaching sessions take place in our dedicated classrooms, but also public spaces including outside in the Gardens or within our Glasshouses. We venture out into the Gardens come rain or shine, so please ensure that everyone is appropriately dressed for all eventualities!
Include our stunning Jurassic Encounters event (Oct 23rd – Nov 7th) as part of your Educational visit to the Gardens. Please contact us for more details: 0121 450 5093 / email@example.com
Animal Handling (duration: 40 minutes)
Take a look at our exciting and unique animal collection! You will have the opportunity to `get up close` with a range of exotic animals chosen from the following selection: Corn Snake, Panther Chameleon, Bearded Dragon, Lesser Madagascan Tenrec, Fire Salamander, Giant Land Snail, Madagascan Hissing Cockroach and Stick Insect! Learn about the special adaptations that these creatures have developed and what habitat they live in, through close observation, together with the chance to handle them too! (Please see our Risk Assessment.) (We cannot guarantee the availability of any animal.) Indoor session.
Senses Walk (duration: 40 minutes)
Enjoy time exploring our plant collection in a different way by exciting your senses! Explore the sights through a mirror walk, the smells through a smelly cocktail party and the textures with a group activity. Outdoor session.
Tree Fun (duration: 40 minutes)
The Gardens are home to trees from all around the world. Have fun naming them in this sensory and craft-based session as we take the blindfold challenge to explore their different textures, and make bark rubbings and a leaf crown to take home as a memento of your visit. Outdoor session.
Minibeast Explorers (available spring to autumn) (duration: 40 minutes)
Using our bug hunting equipment, discover what minibeasts inhabit the Gardens. Are they insects? Do they have wings? How many eyes have they got? We will discover lots of exciting information about our mini friends! Outdoor session.
Butterfly Lifecycle with Live Butterflies (available from late May to early September only) (duration: 40 minutes)
Learn all about beautiful butterflies; where in our live butterfly house, teaching comes alive. We first use our giant Velcro kit to understand the butterfly lifecycle and have children dress up as a caterpillar and a butterfly to reinforce their learning in an exciting and practical way. We then venture into the butterfly house to see them flying, drinking and maybe even hatching! Our friendly butterflies may even land on you! Indoor & Outdoor session.
|
<urn:uuid:8675d2fb-efe7-4225-bfb4-44a7cdcd2bf2>
|
CC-MAIN-2021-43
|
https://www.birminghambotanicalgardens.org.uk/early-years-foundation-stage-teaching-session-menu/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585177.11/warc/CC-MAIN-20211017113503-20211017143503-00560.warc.gz
|
en
| 0.908024
| 602
| 2.578125
| 3
|
Yellow Brick: History, Specifications, and Notable Structures
Welcome to our article on Yellow Brick, a unique building material that has made its mark in architecture and construction. In this article, we will explore the history, specifications, and notable structures associated with Yellow Brick.
Introduction to Yellow Brick
Yellow Brick is a type of brick known for its distinct yellow color. It is widely used in construction and has been a popular choice for centuries due to its aesthetic appeal and durability. The vibrant yellow hue of these bricks adds a touch of warmth and character to buildings, making them visually striking.
Yellow Brick Specifications
Yellow Bricks are typically made from clay and fired at high temperatures to achieve their strength and durability. The clay used in their production contains iron oxide, which gives them their characteristic yellow color. The size and shape of Yellow Bricks can vary, but they are commonly rectangular and come in standard dimensions suitable for construction purposes.
Origin of Yellow Brick
The use of Yellow Brick can be traced back to ancient civilizations, where it was valued for its aesthetic appeal and practicality. Yellow Bricks became particularly popular during the Victorian era in the 19th century, as they complemented the architectural style of the time. The Industrial Revolution also contributed to the mass production of Yellow Bricks, making them more accessible for construction projects.
Common Structures Built Using Yellow Brick
Yellow Brick has been extensively used in various architectural styles and structures around the world. Its versatility and visual appeal make it suitable for a wide range of applications. Many historic buildings and landmarks feature Yellow Brick as a prominent material, adding to their architectural significance.
One notable structure constructed using Yellow Brick is the University of Iowa Old Capitol Building in the United States. Built in the mid-19th century, the Old Capitol Building showcases the elegance and grandeur of Yellow Brick in its neoclassical design. The use of Yellow Brick contributes to the building's historical and cultural importance, making it an iconic symbol of the university and the region.
In conclusion, Yellow Brick is a distinctive building material known for its vibrant yellow color. Its durability, versatility, and visual appeal have made it a popular choice in construction throughout history. From historic landmarks to contemporary structures, Yellow Brick continues to leave its mark in the architectural landscape.
|
<urn:uuid:d3470271-a218-4bb9-a9d7-87cdf2951d16>
|
CC-MAIN-2024-10
|
https://www.thebrickcalculator.com/bricks/yellow-brick.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475757.50/warc/CC-MAIN-20240302052634-20240302082634-00519.warc.gz
|
en
| 0.949273
| 460
| 3.53125
| 4
|
Aquatic animal diseases are the greatest risk to aquaculture production globally . They can also impact the environment [2, 3], local communities , national economies , food security and a diverse range of public users of aquatic animal resources (e.g. recreational fishers).
Partnerships between public (represented by governments) and private (represented by industries) sectors to manage aquatic animal diseases provide a mechanism for both sectors to agree on goals that provide a common benefit. Public–private partnerships (PPPs) also motivate both sectors to work together to achieve their shared goal and increase trust. The sectors may also be willing to compromise their individual short-term goals in order to achieve a long-term shared goal that provides common benefits.
Public–private partnerships are key to improving aquatic animal health outcomes, including disease prevention and response to disease outbreaks.
An Australian example
In Australia, the development of a PPP for managing and funding responses to aquatic animal disease outbreaks is close to completion. Up to 18 industry and government sectors have been working together since 2014 to establish one legally binding agreement, known as the Aquatic Deed. This agreement represents an intention to form a long-term PPP to share the responsibilities and costs of responding to disease outbreaks and to coordinate disease prevention activities to reduce shared risk.
The Aquatic Deed will provide incentives for early reporting (including compensation for affected businesses), establish mechanisms for decisive and rapid decision-making, secure funding for disease response, increase certainty and establish governance arrangements in advance. It will also strengthen risk mitigation activities through sector-specific biosecurity plans, surveillance, training and preparedness activities. Most importantly, it formalises the involvement of public and private sectors that would benefit from a disease response because it is likely that some sectors may need to take action that is contrary to their short-term goals (e.g. destroying stock on a farm to prevent disease spread). Establishing a common goal that all sectors invest in is likely to lead to a collaborative approach to managing a response and better aquatic animal health outcomes.
|
<urn:uuid:984d17a8-b2e0-4f76-92b4-7ee6e0e7eef2>
|
CC-MAIN-2021-10
|
https://oiebulletin.com/?panorama=04-3-3-2019-3-australia
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385984.79/warc/CC-MAIN-20210309030723-20210309060723-00601.warc.gz
|
en
| 0.951825
| 419
| 2.921875
| 3
|
Today is the 225th anniversary of the death of Mozart on 5 December, 1791. Anyone unaware of the dramatic licence taken in the play and film “Amadeus” might think that the genius composed the last bars of his Requiem on his deathbed, but reality didn’t quite live up to that story.
Mozart’s Requiem still required a substantial amount of work when he died aged 35. It was initially taken on by Joseph von Eybler, before Mozart’s pupil Franz Xaver Süssmayr completed the piece.
The last work finished by Mozart before his death was the Little Masonic Cantata, K623. It was performed on 17 November, 1791, just over two weeks before Mozart’s death.
The cause of Mozart’s death has been the subject of hot conjecture. He fell ill during a trip to Prague in September 1791 but still continued to work, including as conductor for the premier of “The Magic Flute” on 30 September. In late November his health deteriorated and he remained bed-ridden. A wave of flu swept through Vienna towards the end of November, leading to the belief that he may have caught it.
The anniversary has been commemorated this year by the Release of a 200 CD box set containing 240 hours of Mozart’s works. The set also includes two books about the composer.
|
<urn:uuid:03da0d4b-2318-4df2-af86-f710a2050d0b>
|
CC-MAIN-2018-05
|
https://www.cmuse.org/what-was-mozarts-last-completed-composition/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887660.30/warc/CC-MAIN-20180118230513-20180119010513-00271.warc.gz
|
en
| 0.974587
| 295
| 2.890625
| 3
|
In the 1960 campaign, John F. Kennedy pledged "to get this country moving again," and offered voters a new generation of leadership. He challenged his fellow citizens to join him in the struggle for freedom in the perilous years of the Cold War. On Inauguration Day, January 20, 1961, nearly one million people in the nation's capitol braved the subfreezing temperatures to catch a glimpse of the new President they had elected. A snowstorm had left the city glittering in the winter's light. The hard issues of the day---the Communist threat, a nuclear arms race, racial unrest, and economic distress---awaited the President and the nation. But January 20th would be a day of celebration---all sunshine and possibility---when a bold, young leader took to the world stage and stood poised at the edge of a promise.
Copyright: © Estate of Jacques Lowe
This exhibit includes the top hat and gloves the President-elect wore during that cold January day, the evening gown Jacqueline Kennedy wore to the gala, and a series of photographs -- never before seen or published -- showing the people who braved the subfreezing temperatures of January 20, 1961, to catch a glimpse of the new President and First Lady.
|
<urn:uuid:693ed423-54fd-4569-9917-ef84b0e78fe8>
|
CC-MAIN-2017-13
|
http://computerworld.comwww.jfklibrary.org/Exhibits/Past-Exhibits/50th-Anniversary-Inauguration.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188824.36/warc/CC-MAIN-20170322212948-00103-ip-10-233-31-227.ec2.internal.warc.gz
|
en
| 0.955899
| 252
| 3.078125
| 3
|
Smithsonian Science Education Center
$13.5 Million goal
Our Goal: 13.5 Million
As the only formal education unit of the Smithsonian Institution, the Smithsonian Science Education Center has been transforming the teaching and learning of science for all students for more than 30 years. Our world class science curriculum brings the history, art, culture and science of the Smithsonian to science classrooms all over the world. The Smithsonian Science Education Center is changing educational achievement and outcomes for students in science, math, and reading, including gains by students who are economically-disadvantaged, English Language Learners, and students who have individualized special education programs. We are motivating students from all sectors to engage in authentic STEM experiences.
Learning by doing - it’s the great equalizer.
The Smithsonian Science Education Center is developing a scientifically literate citizenry and a 21st-century workforce by transforming the teaching and learning of science for all P-12 students in the United States and world.
We have developed instructional materials that approach science education through an interdisciplinary lens—bringing the science, history, art, and culture of the Smithsonian into science classrooms throughout the world. We have built awareness for science education among corporations, community stakeholders, and educational leaders; helped develop science education leadership; and conducted programs to support the professional growth of teachers. We have rigorous third-party evidentiary data demonstrating efficacy of our products and services.
Since 1985, our work has made a significant and long-term contribution to the establishment of effective science education across the United States and in many countries around the world. With the support of the Smithsonian Institution and our collaboration with the National Academies of Sciences, Engineering, and Medicine, we are nationally and internationally recognized for the quality and impact of our education programs.
Please join us in fulfilling our vision and teaching the next generation to embrace scientific curiosity and the teaching of science, technology, engineering, and math (STEM) as the pathway to successful careers and lives.
- Carol O'DonnellDirector, Smithsonian Science Education Center
Funding 21st-Century Science Education
Our goal is to significantly increase scientific literacy in the next generation, and we have evidence that scientific literacy is the key to literacy itself. Your gifts will transform science education for teachers and help ALL students improve their science, reading, and math skills.
ACCESS TO EDUCATION
The challenges of the 21st century require a citizenry educated to think critically, acquire new knowledge and produce and apply creative solutions. The Smithsonian Science Education Center is ideally positioned to apply proven strategies in the teaching of science, technology, engineering, and math (STEM) to increase student achievement for ALL students and improve teacher practice in P–12 classrooms and beyond.
Gifts to the Smithsonian Campaign will enable ALL youth to excel in science, technology, engineering and math (STEM-related) trades and careers. Students will become better readers, critical thinkers, and math problem solvers. They will be prepared for higher education and become responsible citizens who make informed decisions about their health, careers, the environment, finances and government.
The Smithsonian Science Education Center is extending the reach of our knowledge and resources by developing digital assets. These will inspire students to explore scientific phenomenon through digital activities, games, simulations, and online activities. They will provide teachers across the nation and beyond with professional development.
By investing in the Smithsonian Campaign, the Smithsonian Science Education Center will create a robust library of digital assets accessible to students, teachers and lifelong learners. Gifts to the Smithsonian Campaign will ensure that teachers in all corners of the world can engage in authentic STEM experiences that can be immediately applied to their science classroom.
LEADERS IN EDUCATION
The Smithsonian Science Education Center seeks to create professional learning communities (PLC's) among educators, scientists and community leaders. These PLC's with rich online resources will help teachers improve their understanding of scientific concepts, engage teachers in informative dialogues with scientists and engineers and expand teachers’ awareness of the application of history, culture, and art to science, engineering and technological innovation.
Gifts to the Smithsonian Campaign will enable the Smithsonian Science Education Center to give teachers the confidence they need to prepare students for the 21st Century workforce.
Smithsonian Science Education Center
is raising $13.5 million of the Smithsonian Campaign’s overall $1.5 billion goal.
Access to Education
We seek a total of $6 million to enrich our science education offerings and initiatives. An investment of $215,000 will support the development of one of 24 new curriculum units. Investing in our curriculum will ensure that students learn scientific and engineering practices as part of a comprehensive STEM curriculum. We synthesize the latest research in cognitive science with the frontiers of knowledge about the designed and natural world. At the Smithsonian, we are motivating students from all sectors to engage in authentic inquiry-based STEM experiences to prepare for college and career. Learning by doing - it's the great equalizer!
Spaces for Education
We seek a total of $4 million for enhanced technology and digital assets. An investment of $2 million creates a digital learning center, including games, webisodes, simulations, and infographics that bring Smithsonian resources into high need classrooms and respond to the needs of today's educators and students. A gift of $2 million helps to build our "Good Thinking! The Science of Teaching Science" series webisodes for teachers.
Leaders in Education
We seek a total of $3.5 million to sustain and extend our teacher professional development programs. A gift of $2 million creates professional learning communities amongst educators with rich online resources to ensure our resources are reaching all teachers. An investment of $1 million creates professional development programs that bring scientists into classrooms in high need schools. A gift of $500,000 provides a series of professional development sessions that help to bridge the gap between formal and informal science education and support teachers from high need schools to attend our Smithsonian Science Education Academies for Teachers (SSEATs).
|
<urn:uuid:71e8a873-f822-4bdd-97c1-0b5aed76f0a8>
|
CC-MAIN-2017-04
|
https://smithsoniancampaign.org/unit/smithsonian-science-education-center
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00214-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.918002
| 1,216
| 2.828125
| 3
|
The Ministry of Environment and Forests, Government of India, has formulated a National Lake Conservation Plan (NLCP) under which 21 urban lakes have been identified for conservation programmes. Eleven lakes are proposed to be studied in the first phase of the NLCP. On the recommendation of the Environment Department, Government of Maharashtra, Powai Lake has been included in the first phase of the plan.
As a preliminary step, the Government of Maharashtra nominated the Bombay Municipal Corporation as the nodal agency for Powai Lake Conservation under the National Lake Conservation Plan.
A seminar on the National Lake Conservation Plan was held in New Delhi on 20th April, 1995, where it was decided that regional workshops would be held at site to formulate site-specific management action plans.
A preliminary meeting was organised at the BMC HQ, Bombay, where representatives from various government departments and NGOs including BNHS were present. The meeting held in the Hydraulic Engineer's office elicited opinions as to how best to save the lake and its environs from further damage. There are proposals to introduce water sports facifity in the lake as part of the scheme to enhance tourism in the city. It was pointed out by the NGO representatives that such a plan would be detrimental to the lake's ecology and overall cleanliness and tranquillity of the area. As far as possible, any increased human contact with the water body should be discouraged. It was also pointed out that the lake's boundary should be properly demarcated before expecting any plan to succeed. The BMC was informed that there are about 28 point sources leading from the lake's catchment area into the water body. Out of these, 21 carry storm water and are functional only during the monsoon, while the rest carry sullage throughout the year from the nearby ' slums. A site inspection was conducted to confirm the information. During the site visit it was also noticed that certain portions of the lake are subject to heavy siltation, which has led to the waterline receding much beyond the original shoreline.
Moreover, the lake's water is used by the Aarey Milk Colony for irrigation in the fodder farms and by industries nearby. Besides, the environs serve as a green lung for the teeming millions of this overcrowded city. These industries and the population will suffer immensely if the lake ecosystem is destroyed by negligence and apathy. Hence, it is imperative for all of us to take cognisance of the deteriorating conditions in and around the lake even now.
As a means to generate public interest and involvement in the lake's conservation, a meeting was organised under BNHS aegis at I.I.T Powai to address this environmental crisis in the first week of June 1995. The public meeting was attended by a cross section of government agencies like the BMC, Fisheries Department, NGOs like the Bombay Environmental Action Group and real estate developers.
As a follow up, a national level workshop was organised by the BMC at the Bhandup complex in the last week of June 1995 under the Hydraulic Engineer's Chairmanship, a Jt. Secretary from the Ministry of Environment and Forests was also present to guide the discussion and to help evolve a feasible management plan for the conservation of the lake. The cross section of participants from government agencies, NGOs like the Maharashtra State Angling Association, BNHS and professional institutes like the IIT Powai, helped in initiating a fruitful debate as to how best to tackle the problem of conserving Powai lake as a healthy water body and as a buffer against any water crisis in the future, considering the phenomenal rate at which the population of the metropolis is growing.
Amongst the various suggestions received were proposals to introduce water sports as a tourism-related activity and a source of revenue. As during previous meetings, it was pointed out that such activities would lead to garbage being dumped in the area in larger volumes, due to increased human activity. Noise and air pollution would also increase manifold. The prime objective should be cleanliness, which cannot be compatible with increased human contact with the lake.
Another plan envisages introduction of commercial fisheries so as to generate revenue and justify the expenses being bome for the lake's restoration. Even if these activities were to be limited to maintaining stocking nurseries it would serve a very vital purpose of sustaining other ponds and fresh water bodies with a regular supply of quality fish seeds. The plan which was first mooted in April 1995, appears to be picking up momentum with the involvement of BMC as a nodal agency and the enthusiastic response of various government and non government agencies. It is now up to the general public to take an interest in this effort and help in conserving whatever is left of wilderness areas in urban centres. It is a good indication that conservation issues are being addressed on a priority basis, especially in urban areas, where the pace of urbanisation seems to be smothering whatever little is left of green areas. The aesthetic value of water bodies like Powai lake is helping real estate developers to capitalise on their utility to serve their narrow interests, as evidenced by the numerous newspaper advertisements highlighting the lake's proximity to their housing estates. It is imperative that they should plough back a fraction of their profits into beautification programmes and eco restoration works in their areas of operation. The same holds true for corporate bodies who draw upon a water body's resource.
The Powai lake is about 2-2 sq. km in area. It is a man-made lake and was built in 1881 in anticipation of a famine, which did not occur. From the very beginning, its water was not meant for human consumption. With the increase in industrialisation in the area, its water is being used by some of the industries in the area, e.g., Larsen & Toubro.
The lake's water feeds one of the nullahs joining the Mithi river, which enters the sea at Mahim. Unfortunately for the beautiful lake, its catchment area, till very recently a 'no development zone', was released for real estate development under pressure from the powerful builders' lobby. This will definitely affect the quality of the lake's water and its future as a crucial water body in a congested metropolis.
The tonnes of top soil which flow into the lake as a result of the quarrying activities in the area is highly damaging. This damage has already occurred, a rough estimate arrived at by certain persons indicate that the cost of excavating a cubic metre of the silt in the lake bed would be about Rs. 250/-, excluding the transportation cost, which is exhorbitant by any standards. The other problem plaguing the lake is that of excessive growth of weeds like Ipomea and Water hyacinth. These have choked a good portion of the lake, especially on the IIT side.
Lakes constitute an important component of freshwater resources. They are distributed in different geographical regions in the country. Most of the lakes whether natural or man-made , are directly or indirectly associated with the river systems. There is an organic relations hip between the lakes and river systems.
Lakes serve as an important life support system by helping in recharging of acquifers and regulating hydrological regimes. They also act as natural traps for sediments and nutrients thereby helping to regulate water quality and sedimentation of the river systems from the catchment area. They carry out a crucial role as breeding grounds for fish and other aquatic life.
Lakes also constitute habitats for a variety of birds, fishes and other aquatic life. The lakes, particularly the urban lakes, are in varying degrees of environmental degradation. The main cause is rapidly increasing population in the catchment areas of lakes and industrialization. Both domestic sewage and industrial effluents have been causing serious pollution of these precious Water bodies.
Besides encroachments, deforestation in the catchment areas leading to siltation and flow of pesticides from the agricultural wastes are the other major causes. The result is that the lakes are becoming increasingly unfit as a source of drinking water, recreational activities and habitats for aquatic life.
As already mentioned in case of urban lakes the threat comes largely from the large inflow of municipal sewage and industrial effluents. The NLCP is proposed to be handled on the same lines as the National River Action Plan (NRAP). Like the NRAP, it is proposed to implement the National Lake Conservation Plan (NLCP) as a centrally sponsored scheme with equal sharing of cost by the Central and State governments.
OBJECTIVES OF THE NATIONAL LAKE CONSERVATION PLAN
Main objectives under the programme would include the following:
|
<urn:uuid:2a6545a8-c288-4735-a8bc-c842e56669e7>
|
CC-MAIN-2014-42
|
http://msaapowai.tripod.com/lakeconserv.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119654194.47/warc/CC-MAIN-20141024030054-00277-ip-10-16-133-185.ec2.internal.warc.gz
|
en
| 0.968263
| 1,755
| 3.109375
| 3
|
5.3.2 What are the ITU-T (CCITT) Standards?
The International Telecommunications Union, ITU-T (formerly known as CCITT), is a multinational union that provides standards for telecommunication equipment and systems. ITU-T is responsible for standardization of elements such as the X.500 directory [CCI88b], X.509 certificates and Distinguished Names. Distinguished names are the standard form of naming. A distinguished name is comprised of one or more relative distinguished names, and each relative distinguished name is comprised of one or more attribute-value assertions. Each attribute-value assertion consists of an attribute identifier and its corresponding value information, for example, ``CountryName = US.''
Distinguished names were intended to identify entities in the X.500 directory tree. A relative distinguished name is the path from one node to a subordinate node. The entire distinguished name traverses a path from the root of the tree to an end node that represents a particular entity. A goal of the directory was to provide an infrastructure to uniquely name every communications entity everywhere (hence the ``distinguished'' in ``distinguished name''). As a result of the directory's goals, names in X.509 certificates are perhaps more complex than one might like (for example, compared to an e-mail address). Nevertheless, for business applications, distinguished names are worth the complexity, as they are closely coupled with legal name registration procedures; this is something simple names, such as e-mail addresses, do not offer.
ITU-T Recommendation X.400 [CCI88a], also known as the Message Handling System (MHS), is one of the two standard e-mail architectures used for providing e-mail services and interconnecting proprietary e-mail systems. The other is the Simple Mail Transfer Protocol (SMTP) used by the Internet. MHS allows e-mail and other store-and-forward message transferring such as Electronic business Data Interchange (EDI) and voice messaging. The MHS and Internet mail protocols are different but based on similar underlying architectural models. The noteworthy fact of MHS is that it has supported secure messaging since 1988 (though it has not been widely deployed in practice). The MHS message structure is similar to the MIME (see Question 5.1.1) message structure; it has both a header and a body. The body can be broken up into multiple parts, with each part being encoded differently. For example, one part of the body may be text, the next part a picture, and a third part encrypted information.
ITU-T Recommendation X.435 [CCI91] and its equivalent F.435 are X.400-based and designed to support EDI messaging. EDI needs more stringent security than typical e-mail because of its business nature: not only does an EDI message need protection against fraudulent or accidental modification in transit, but it also needs to be immune to repudiation after it has been sent and received.
In support of these security requirements, X.435 defines, in addition to normal EDI messages, a set of EDI ``notifications.'' Positive notification implies the recipient has received the document and accepts the responsibility for it, while negative notification means the recipient refused to accept the document due to a specified reason. For- warding notification means the document had been forwarded to another recipient. Together, these notifications form the basis for a system that can provide security controls comparable to those in the paper-based system that EDI replaces.
ITU-T Recommendation X.509 [CCI88c] specifies the authentication service for X.500 directories, as well as the widely adopted X.509 certificate syntax. The initial version of X.509 was published in 1988, version 2 was published in 1993, and version 3 was proposed in 1994 and published in 1995. Version 3 addresses some of the security concerns and limited flexibility that were issues in versions 1 and 2. Directory authentication in X.509 can be carried out using either secret-key techniques or public-key techniques. The latter is based on public-key certificates. The standard does not specify a particular cryptographic algorithm, although an informative annex of the standard describes the RSA algorithm (see Section 3.1).
|
<urn:uuid:1e351656-80df-4492-be32-e19c2335bfff>
|
CC-MAIN-2015-11
|
http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/itu-t-standards.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463676.59/warc/CC-MAIN-20150226074103-00152-ip-10-28-5-156.ec2.internal.warc.gz
|
en
| 0.936704
| 871
| 2.953125
| 3
|
What is Acupuncture?Acupuncture is the time tested therapy that uses the insertion of sterile needles in the body and has been practised in the Far East for thousands of years.
Cupping is the application of a vacuum cups to the skin that create a suction. The practice dates from as early as 3000 BC. The Ebers Papyrus, written c. 1550 BC and one of the oldest medical textbooks in the world, describes the Egyptians' use of cupping.
Tui Na ("tway na") is a form of deep tissue massage developed through several thousand years and that follows the same principles of TCM or Traditional Chinese Medicine.
|
<urn:uuid:441e47a0-8052-42b3-9c57-50106cc7ce18>
|
CC-MAIN-2022-05
|
https://www.theclinic.london/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306346.64/warc/CC-MAIN-20220128212503-20220129002503-00011.warc.gz
|
en
| 0.951604
| 132
| 3.03125
| 3
|
How to Grow Tomatoes Hydroponically
Executive Summary About Tomatoes Hydroponically By Tracy Ballisager
Hydroponic tomatoes are easier to grow than most people imagine and what is more, they taste delicious and are rich in nutrients. Whether you add them to a sandwich, take the tomato and basil sauce, serving them in a fresh salad or simply enjoying the tomatoes on their own or with cheese, hydroponically grown tomatoes have a wonderful flavor . If you want to know how to grow tomatoes in a hydroponic garden, read on for helpful information.
Growing hydroponic tomatoes
Rinse tomato seedlings to remove soil before planting. How to grow tomatoes in a hydroponic garden includes a good preparation. You can use rockwool slabs, rockwool slabs chopped, cubes or blocks. A mixture of rock wool and Clay is also a good culture medium. After planting your tomato seedlings in the hydroponic solution, you should check the water every day to make sure that your water at the rate of nutrients is right.
Temperature for Hydroponic Tomato
Tomatoes prefer temperatures of 70 º to 80 º F during the day and 10 º F lower at night. These are the same temperatures than most vegetable crops thrive in. If you exceed these temperatures above or below 10 º F over the tomato may be nutritionally unbalanced, retarded growth or dead!
Lighting for Hydroponic Tomato
Tomatoes use the blue part of the light spectrum because they are long-day plants. Humidity hydroponic tomatoes
Tomatoes enjoy a lot of water, but also has to sweat out photosynthesis. This results in moderate humidity levels, which must be controlled through proper ventilation and air circulation. If you do not know how to grow tomatoes in a hydroponic garden and humidity control, this may affect the intake of tomatoes nutrients. The high humidity can result in deficiencies of calcium in tomato plants, which can have negative effects long term. hydroponic tomatoes prefer 70% (80% is well at night) humidity, if you can measure it.
Learn how to grow tomatoes in a hydroponic garden is perhaps a little more complicated than growing them outdoors but if you do not have the right climate where you live, may be a necessity. If you have the right climate, but prefer the rich taste of hydroponically grown produce, also might want to try this. If you adhere to the above guidelines about how to grow tomatoes in a hydroponic garden, your tomatoes should be fine.
|
<urn:uuid:17248804-a62d-4cb4-ae30-65960f446d17>
|
CC-MAIN-2016-07
|
http://tanaman-tomat-hidroponik.blogspot.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701146241.46/warc/CC-MAIN-20160205193906-00268-ip-10-236-182-209.ec2.internal.warc.gz
|
en
| 0.910448
| 524
| 2.9375
| 3
|
The writings of young Philadelphian Emilie Davis bear witness to the flight of refugees into the city during the Battle of Gettysburg, the fall of Vicksburg, and Abraham Lincoln’s funeral procession.
Emilie Davis was one of six children born in a middle class, literate free Black family in Philadelphia. During her active journaling years (1863-1865), Emilie worked as a wedding dress seamstress, attended night classes at the Institute of Colored Youth (now Cheyney University of Pennsylvania) & may have patronized The Philadelphia Library Company for Colored Persons.
The Emilie Davis Diaries are believed to be one of only four surviving hand written accounts from a free Black woman from this time period.
Presenter Alexia Hudson-Ward, reference librarian at Abington, also discusses the role of the Penn State University Libraries in preserving the crumbling diaries.
A Black History Month and Civil War 150th anniversary event.
|
<urn:uuid:633b1e57-a49d-4b27-9894-d593e5489209>
|
CC-MAIN-2016-30
|
http://abington.psu.edu/events/2013/02/days-emilie-davis-diaries-free-black-woman-during-civil-war
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257832942.23/warc/CC-MAIN-20160723071032-00105-ip-10-185-27-174.ec2.internal.warc.gz
|
en
| 0.891322
| 199
| 3.109375
| 3
|
Integrated Pest Management
Integrated Pest Management, or IPM, is the coordinated use of pest and environmental information along with available pest control methods, including cultural, biological, genetic and chemical methods, to prevent unacceptable levels of pest damage by the most economical means and with the least possible hazard to people, property and the environment.
Small Fruit, Specialty Crop, and Tobacco IPM This blog is maintained by N.C. State entomologist, Hannah Burrack. It includes coverage of IPM issues that affect blueberry growers and pest management decisions.
North Carolina Agricultural Chemicals Manual This manual provides growers, Extension personnel, researchers and other agricultural professionals with the most up-to-date information available on the selection, application, and safe and proper use of agricultural chemicals. The online version is updated as changes in recommendations occur throughout the year.
Blueberry Disease and Insect Management for Organic Growers in North Carolina This guide identifies the pest and disease pressures at various times during blueberry production and suggests appropriate control methods for organic producers.
Blueberry Facts: Information for Scouting and Diagnosing Disease Problems Also available as a pocket guide from Michigan State, these online fact sheets were co-authored by Bill Cline, N.C. State University plant pathologist, and include many photos from North Carolina.
N.C. State University Plant Disease and Insect Clinic The Plant Disease and Insect Clinic at N.C. State University provides disease diagnostic and insect identification services to help growers produce healthy plants and crops. Extension specialists from Plant Pathology, Entomology, Horticultural Science, Crop Science and Soil Science diagnose problems on the samples received.
North Carolina Pest Management Information Program The program serves as an information resource on current agricultural pest management practices, problems and issues relevant to North Carolina. Timely, science-based pest management and pesticide information is available.
|
<urn:uuid:609091cc-73e8-4c3c-ac4b-1e41a336323b>
|
CC-MAIN-2019-35
|
https://blueberries.ces.ncsu.edu/blueberries-integrated-pest-management/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313536.31/warc/CC-MAIN-20190818002820-20190818024820-00397.warc.gz
|
en
| 0.905862
| 378
| 2.96875
| 3
|
1-2. Origin of the Name
The origin of the Blouin name and its evolution
Oh! If only Emeri knew how to read and write, he would have found surprises at every turn at what has become of his family name. He never even knew how to properly spell his name when he arrived in New France.
This is how our ancestor crossed the Atlantic for New France under the name Emeri Bellouin. Upon his arrival, he received various first and last names. In 1664, as he sealed a loan on his behalf, the notary Pierre Duquet referred to him as “Mery Beloing”. Then in 1667, when Bishop Laval granted him an allowance, the notary Paul Vachon wrote “Mery Bellouin”. His marriage contract, dated in early November 1669, also mentioned “Mery Bellouin” while the priest officiating at the marriage ceremony later that month used “Merry Besloüin”. Emeri died on July 14, 1707, at the age of 67, supposedly under the name “Méry Bloing”. Please understand that this short list, of so many first and last names for the same man, is far from exhaustive.
At the time of our ancestor Emeri, the Blouin patronym was not used here in New France. But in France, various designations existed, including the Belluin and the Blouin. Thus, a single look at the French departmental archives for the greater community of Poitiers, located near Emeri’s hometown of Saint-Pierre d’Étusson, informs us that a dozen of related surnames were common to refer to the Bellouin and the Blouin.
The website www.genealogie.com1provides a balanced retelling and account of the origin of these names:
- Bellouin is a family name derived from the personal name of Germanic origin biliwin, derived from the root bili, which means kind and gentle, and win that means friend and is the nickname of an amiable man.
- Blouin is a family name derived from Old French’s blou, or blue, and a moniker referring to a pale man, or a man with pale skin.
The other patronyms related to the two previous ones seem to be derivatives of or contractions on the name, as is often seen. The German influence found here is typical of many French surnames.
But for other major genealogy archives interested in surnames (YourFolks, La Mémoire du Québec and Geneanet, to mention only these), there doesn’t seem to exist many differences in the German origins of the patronyms Bellouin and Blouin. The archives even have Blouin as arising from Bellouin and Beloin.
However, we must note that that here in Quebec, the Blouin family name is much more current and relevant.
According to the Quebec Statistical Institute, the name Blouin is 32 times more common than Beloin. (And Bellouin is not even present in the statistics provided.)2 It is first by this Blouin patronym that descendants of Emeri and Marie Carreau are known today. It also explains why the Association of the Blouin from North America chose the name “Blouin”, despite the known surnames of its ancestor and the variety of surnames of its offspring. Many other Quebec families have lived through the same situation.
Over time, the many different switches in the family name, here in Quebec, from Bellouin to Blouin in particular, did not happen for one unique and specific reason across our entire family. It’s not simply a matter of personal taste; it also depends on our sociohistorical context. Most people then could neither read nor write. Even educated people like priests, notaries and surveyors spelled all these patronyms to the best of their knowledge, or even from what they thought they were hearing since so many suffered from more or less serious hearing loss. Let’s also not forget the many phonetic variations of dialect depending on their region of origin. Because he or she was illiterate, the person whose name was modified on an official document could neither be offended by it nor could she contest it. Moreover, nothing prescribed that the identity of one person needed to be standardized; no level of government had legislated the issue. With so many government services available nowadays, we can only be known by a single family name. The same goes for relationships between individuals, particularly in the trade. This wasn’t always so.
With the second generation, the uniformity of the name had not yet been established for those who would ensure the future of the family. For example, Jean (1672) was baptized as Belloin, Jacques (1676) as Belouyn, Gabriel (1691) as Bloing and Paul (1699) as Beloing. But the study of some marriage certificates shows us that the transition to Blouin was already on track. The second and third marriages of Jean mention Jean Blouin; Jacques married his second wife Geneviève Plante and the marriage certificate designates him as Jean Bloüin or Blouin (i.e. the calligraphy raises some ambiguity). With the third generation, many are starting to sign their name as Blouin or Bloüin. What happened at that time that those who would ensure the future of the family after Emeri and Marie would transition toward Blouin? This would be the beginning, here in New France, of the use of the Blouin patronym.
This movement toward Blouin would persevere across the various branches of the tree of the family of Emeri’s descendants, some going from Beloin to Blouin later on. But let us never forget that we are descendants of the Bellouin name.
Finally, while Pierre-Georges Roy3 and the reverend father Archange Godbout4 mentioned in their writings that our ancestor signed his name as “Mery Bellouin”, let’s emphasize that we have never found any sign of this signature in the numerous civil, religious or legal documents consulted. As for the name “Mery,” it certainly appears to be a diminutive of and the nickname for Emeri.
Latest version: May 2015
1. This site presents information compiled together by the various French associations of genealogy.
2. Source: A table titled « Les 5 000 premiers noms de famille par ordre alphabétique, Québec » from the institute’s website and taken from Louis Duchesne, « Les noms de famille au Québec, aspects statistiques et distribution spatiale, Institut de la statistique du Québec », 2006.
3. Historical research, A bulletin of archeology, history, biography, bibliography, coins, etc., published by Pierre-Georges Roy, Volume 15, Lévis, 1909, p. 24.
4. A text from the reverend father Archange Godbout titled “Nos Ancêtres Au XVIIe Siècle (Suite)” from: The secretariat of the province, A report from the province of Quebec’s archivist for 1957-1958 and 1958-1959, Redempti Paradis Printer of Her Majesty the Queen, p. 409.
|
<urn:uuid:d1bdaec6-fa79-4c0e-82c3-89f47efa39b6>
|
CC-MAIN-2019-47
|
http://association-blouin.com/origin-of-the-name/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670743.44/warc/CC-MAIN-20191121074016-20191121102016-00255.warc.gz
|
en
| 0.955409
| 1,580
| 2.71875
| 3
|
This week as we remember the millions of souls lost during the Holocaust, this piece in The Jerusalem Post reminds us again of the importance of helping those who survived - many of whom are spending their last years in poverty and loneliness:
But while remembering those who were lost is essential, caring for those who survived must not be overlooked.
According to data provided by the Foundation for the Benefit of Holocaust Survivors, there are in Israel today about 189,000 Holocaust survivors, of whom about 45,000 are living under the poverty line. One-fifth skip meals because they do not have enough money to buy food.
Four years ago, the American Jewish Joint Distribution Committee-affiliated Myers-JDC-Brookdale Institute published a survey based on interviews with 52,000 Holocaust survivors that found that five percent complained they do not have enough to eat. Others lacked basic drugs or medical treatment. Still others were unable to care for themselves.
Rabbi Yechiel Eckstein, founder of the International Fellowship of Christians and Jews, poignantly observed, “Sadly, we have been focusing on memorializing those who perished in the Holocaust, but ignoring the current plight of hundreds of thousands of survivors around the world who are living out their last days in wretched poverty.”
His organization has not forgotten the survivors. The IFCJ provides more than $7.3 million annually in food medicine, winter heating fuel, daycare and other assistance to more than 18,000 survivors in Israel. The organization also aids more than 60,000 survivors and other poor-elderly Jews in the former Soviet Union with an additional $15 million annually in food, medical assistance, home care and winter aid.
The call to aid Holocaust survivors has been heard by the government as well. On Monday, Finance Minister Moshe Kahlon presented a NIS 500m. plan designed to aid Holocaust survivors and the elderly.
|
<urn:uuid:2459e888-06a8-4151-adc3-676ee9ee3c6a>
|
CC-MAIN-2017-26
|
http://www.ifcj.org/news/fellowship-blog/caring-for-survivors.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320070.48/warc/CC-MAIN-20170623151757-20170623171757-00189.warc.gz
|
en
| 0.962248
| 385
| 2.671875
| 3
|
Industrial symbiosis has become a popular term in recent years to describe industrial activities where a waste or by-product of one actor becomes a resource for another actor. But what do we mean when we talk about industrial symbiosis and where do we find it? Why are industrial symbioses becoming an increasingly salient issue in the field of industrial ecology and green growth, and what are the benefits that can be generated through this concept?
In nature, symbiosis is often defined as “any relationship between individuals of different species where both individuals benefit”. The symbiotic exchanges among different entities yield a collective benefit greater than the sum of individual benefits alone. Similar approaches can also be implemented in a human-made industrial setting. Interlinked with the concept of industrial ecology, industrial symbiosis is an innovative way to increase resource productivity and is one of the approaches to realise a circular economy (CE) and achieve green growth.
WHAT IS GREAT ABOUT INDUSTRIAL SYMBIOSES?
Industrial symbiosis is about saving money and reducing consumption by working together to maximise the outputs that can be generated from resources. It has many economic and environmental benefits. Firstly, it provides opportunities for existing companies—both private and public—to increase their profitability and competitiveness by reducing the cost of resources. Secondly, it presents substantial benefit to the environment by reducing demand for both materials and waste.
Let us take an example from Kalundborg, Denmark, which has operated since the 1970s and is often cited as the first working industrial symbiosis in the world. The primary partners in Kalundborg, including an oil refinery, a power station, a gypsum board facility, and a pharmaceutical company, share ground water, surface water, wastewater, steam, and fuel, and they also exchange a variety of by-products that become feedstocks in other processes. The benefits of the industrial symbiosis include low energy use, CO2 savings of about 250,000 tons per year, cuts of around 30% in water consumption and minimal waste for disposal.
A great example of the cost benefits generated through industrial symbiosis is the National Industrial Symbiosis Programme (NISP) of the United Kingdom, which was launched in 2005. In the UK, national companies saw a clear financial benefit in engaging in industrial symbiosis activities. Consequently, during its first 7 years, companies participating in the NISP saved over €1.3 billion in costs, generated another €1.3 billion in additional sales and simultaneously produced environmental benefits, including saving 39 million tonnes of CO2.
Collectively engaging industries and companies has added value in terms of knowledge creation and exchange through the symbiotic networks, which can in turn generate mutually profitable transactions as well as improved business, technical processes and innovations.
HOW TO ESTABLISH INDUSTRIAL SYMBIOSIS?
Money talks. Industrial symbioses must primarily be built on economic gains and be based on the interest and engagement of businesses. Long-term economic gain is essential to the sustainability of industrial symbiosis activities as well as ensuring that such activities promote the emergence of new businesses and innovations.
One of the promoting factors for a successful industrial symbiosis is a comprehensive mapping of material flows and side-streams on the local and regional level to secure supplies and the necessary resource diversification. Moreover, mutual trust and shared ideologies between actors are among the key determinants in a symbiotic model.
Another crucial factor for increased industrial symbiosis activities is the development of long-term public support from the state and regional authorities for circular economy and industrial symbiosis, including comprehensive and coherent strategies supplemented with binding objectives, regulations, subsidies and other economic incentives. This can in turn help to ensure sufficient private funding for activities related to industrial symbiosis.
As the awareness, expertise and capacity required for the establishment of industrial symbiosis among potential actors might be weak, a development company, regional cluster or similar organisation can play a key role in facilitating and promoting industrial symbiosis. This role may include helping companies find relevant partners, identify new synergy opportunities and develop business plans.
A common model for organising industrial symbiosis is the so-called eco-industrial park, which is built especially for the purposes of symbiotic models and recycling. Although industrial symbiosis is often defined as a placebased approach, the geographic proximity associated with industrial symbiosis is not always necessary. An alternative approach is not to tie symbiosis to any particular location, but to base it on the needs and resources of a network of companies. However, it is worth noting that the profitability and sustainability elements of industrial symbiosis can in certain cases be repelled by the costs and emissions caused by long-distance transports.
INDUSTRIAL SYMBIOSIS – A KEY DRIVER OF GREEN GROWTH IN THE NORDIC REGION?
Resource efficiency and circular economy are firmly embedded in the global agenda, and industrial symbioses are promoted by international organisations such as the United Nations and the OECD. At the same time, eco-industrial parks are being established worldwide. The European Union has recognised that industrial symbiosis has direct relevance not only to resource efficiency, but also to a broad policy agenda covering innovation, green growth and economic development. This same observation has also been made at national and regional levels in the Nordic countries.
Globally, the Nordic countries are among the frontrunners in sustainability and green growth. Given all the advantages that industrial symbiosis can bring about, it is no surprise that industrial symbiosis has gained attention as an important novel component in the Nordic green growth curricula. Both the Nordic regulative and institutional frameworks as well as the Nordic companies have recently shown increasing interest and devotion towards symbiotic activities and industrial ecology.
Essentially, industrial symbiosis can provide an important competitive advantage for the traditional Nordic largescale industries (e.g., paper and pulp, steel and manufacturing) that have been affected by the global economic downturn and industrial restructuration taking place in Europe and worldwide. Moreover, industrial symbiosis paves the way for the emergence of new and innovative businesses that take advantage of otherwise unused industrial flows.
The Nordic region already hosts numerous industrial symbioses and related national networks and associations. Owing to the Nordic tradition in both co-operation, sustainability and environmental awareness, the region has good preconditions for promoting and hosting industrial symbiosis in terms of industrial framework and business practices. This global competitive advantage is backed by the success stories of Nordic industrial symbioses, such as Kalundborg in Denmark and Blue Lagoon in Iceland, which is not only a spa and one of the most famous Icelandic tourist attractions, but also an inspiring and economically successful example of industrial symbiosis.
Industrial symbiosis activities are already occurring in all of the Nordic countries; however, there are substantial variations in each country’s approach. In Finland and Denmark, industrial symbiosis activities are stimulated through a top-down approach. This approach includes a clear vision, comprehensive strategies at both the national and regional levels, and active facilitation of industrial symbiosis exchanges by municipal and regional actors in partnership with key private companies. In contrast, industrial symbiosis initiatives in Iceland, Sweden and Norway are characterised by a bottom-up approach. In these countries, industrial symbiosis is largely absent from the policy agenda and development is instead driven by private companies and business parks.
Using industrial symbiosis, firms may create competitive advantages and improve their overall environmental and economic performance.
A key motivation for companies to engage in industrial symbiosis activities has been the desire to increase profitability and competitiveness. Business opportunities are the major driving force behind the development of industrial symbiosis.
An additional benefit for companies is that industrial symbiosis strengthens their environmental profiles, which can be an important advantage in the market as customers are becoming increasingly aware of sustainability aspects related to production processes and consumption.
The main identified hindrances to industrial symbiosis development are companies’ lack of time and resources to implement new business models such as industrial symbiosis, as well as a lack of industrial symbiosis expertise in the region and low awareness about the opportunities provided by industrial symbiosis. In this regard, the presence of a cluster, network or other co-ordinating body that can facilitate collaboration would help to organise exchanges between companies.
What is in it for companies? Industrial symbiosis can:
- Reduce raw material and waste disposal costs
- Generate new revenue from residues and by-products
- Divert waste from landfill and reduce carbon emissions
- Open up new business opportunities
- Strengthen environmental profiles
|
<urn:uuid:1ee036a8-b9fb-423f-b5d9-87d36c5324e5>
|
CC-MAIN-2018-47
|
http://www.nordregio.org/nordregio-magazine/issues/industrial-symbiosis/what-is-industrial-symbiosis/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743968.63/warc/CC-MAIN-20181118052443-20181118074443-00256.warc.gz
|
en
| 0.934691
| 1,740
| 3.390625
| 3
|
10 Tips for Keeping Kids Safe at the Playground
Even though the weather is cooling down in most of the country, there's still plenty of time to get outside. In fact, while the heat is light, it's often easier to enjoy yourself without constantly breaking for water and shade. If your locality has a playground, surely you know how much your children love them. Not only do they get exercise, but lots of helpful social interaction. When you visit a playground, here are some tips to stay safe.
1. Avoid swings with wooden or metal seats.
These have a tendency to pinch fingers and skin, and given enough force, can really do some damage. Opt for the heavier, plastic swings where the chain meets the seat away from the body.
2. Bring a first aid kit.
Playground play can be rough, and that’s certainly okay, but keep a first aid kid in the trunk of your car just in case. It’s a good item to have anyway.
3. Report playground hazards immediately.
If you notice something is broken or something breaks in your presence, report it to the proper authority immediately. It may be the school, park authority, or city council. If it’s not immediately clear who runs the playground, look for a sticker on one of the structures.
4. Actively supervise your children.
Active supervision means, quite simply, paying attention. It probably won’t be that difficult – your kids will demand you watch them slide down the slide or climb up the ladder. The easiest way to supervise is to join in on the fun.
5. Visit a playground with soft surfaces on the ground.
Most playgrounds these days have soft surfaces, but some of the older ones don’t. Most playgrounds have elements that are a bit off the ground, so you want something beneath you that absorbs impacts. You want to play on sites with sand, pea gravel, wood chips or mulch, rubber, or synthetic turf.
6. Dress your kids appropriately.
Loose items like scarves, necklaces, purses, strings, loops, or open sections (like wide-bottomed shirts) can get caught on the playground equipment. These items can also pose a strangulation hazard. Children should always wear shoes.
7. Ensure proper hydration.
The excitement takes over and it’s easy for kids to become dehydrated while they run around with their friends. Keep a bottle of water (and maybe a few snacks) nearby.
8. Teach your kids the rules.
Pushing, shoving, crowding and fighting should be especiallyunpermitted on the playground. Kids should take ladders and slides one at a time, and use the equipment as it is intended. The consequences of injury are higher on a playground.
9. Separate little kids from big kids.
It’s great that you want to give your little one a playground experience, but he or she shouldn’t be playing near older kids who are running and jumping faster and with more force. If older kids are playing in the vicinity, stay near your child or opt to play in a calmer part of the playground.
10. Teach the use of each piece of equipment.
Don’t let your one-year old figure out the slide for herself. Show her a few times by riding with her, then guiding her through it. Then, watch her carefully until you’re sure she understands. This goes for all the other structures.
Guest Blog by Karen Barski, BSN, RN, Mother of five, Certified Infant Care Specialist & Instructor, & Inventor of the Woombie Baby Swaddle
Karen has been an RN for 18 years, and has worked in many different nursing roles. As a Certified Infant Care Specialist, Karen counsels thousands of families yearly on a multitude of issues relating to pregnancy and infancy. Also, as a mother of five, she has invaluable experience and tips to share.
Since 2007, Karen’s company, KB Designs, has invented a line of signature baby swaddle products that have helped parents easily transition their new babies from womb to home. There are multiple designs and sizes so that babies can enjoy the comfort and security of the Woombie up until the time they begin to roll.
Each product has been created and designed by Karen because of a need she identified in her life with her five children. With convenience, safety, and fashion in mind, KB Designs has helped over a half million babies and counting!
For more information, visit www.woombie.com.
Interested in writing a guest blog for Sleeping Baby? Send your topic idea to email@example.com.
All data and information provided on this site is for informational purposes only. Sleeping Baby makes no representations as to accuracy, completeness, current-ness, suitability, or validity of any information on this site and will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use. All information is provided on an as-is basis.
|
<urn:uuid:000c5dbd-dd23-4628-b5a9-83cbd8f1822b>
|
CC-MAIN-2017-04
|
https://www.sleepingbaby.com/blogs/news/18514613-10-tips-for-keeping-kids-safe-at-the-playground
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00336-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.949075
| 1,065
| 2.65625
| 3
|
Afghan art, art in what is now Afghanistan.
Already in the 3rd millennium BC There is evidence of urban civilization (including Mundigak near Kandahar in southern Afghanistan). The finds are based on Mesopotamian models (Zikurat) and the Harappa culture (ceramics). The land known in antiquity under the name of Bactria can also be assigned to the Hellenistic and Roman spheres of influence in art (Ai Khanum). It took off again under the Kushana; Kanishka had Surkh Kotal built; the Buddhist monasteries (Shotorak, Guldara, around 2nd – 3rd centuries AD; Hadda, Bamian, around 3rd – 7th centuries AD) were centers of Gandhara art. Sassanid influences were also included, e.g. B. Bamian.
From the 11th century onwards, Islam gained increasing influence. The most important Afghan monuments of Islamic art include the palace of Mahmuds (early 11th century), the two minarets (12th century) and the citadel (early 15th century) in Ghazni as well as the minaret of Jam (12th / 13th century)) in Ghor.
Art reached its peak under the Timurids in Afghanistan. is attested by the citadel and city wall (14th – 16th century) as well as the Great Friday Mosque and the minarets of the former madrasah (15th century) in Herat, the burial mosque of Caliph Ali in Mazar-e Sharif (late 15th century) and through the miniatures of the painting school of Herat founded under Bei Sonkor. The wood carvings (ancestral pictures, idols and the like) from Nuristan are a specialty. In the 20th century, a rich folk art developed. A modern or contemporary art is still in the early stages.
In 2001, important works of national art heritage, the two colossal Albuddhas of Bamyan (around 6th / 7th centuries), as well as a large part of the collections of the National Museum in Kabul, were destroyed by the Taliban regime. Efforts have been underway since 2002 to restore these two cultural focuses as far as possible.
Afghan literature, written and oral literature of Afghanistan, a country beginning with letter A according to COUNTRYAAH.COM. Written literature exists in Pashto and Dari (Persian).
In northern Afghanistan there is also another written and literary language called Turki, in which v. a. Texts of classical literature are handed down. The exclusive use of the term Afghan literature on Pashto literature is no longer considered contemporary.
The founding of the Durrani Empire (1747) marks the beginning of an independent Afghan statehood, but the beginnings of Afghan national literature can only be established in the 20th century.
While literary contacts with Iran already waned in the Safavid period (from the 16th century), Afghanistan was able to maintain its role as a mediator between the literatures of South and Central Asia until the early 20th century and thus remained a nationally important center of Persian literature. Persian poetry was largely influenced by the so-called Indian style (sabk-e hendi), the master of which was Abdolqader Bedel (* 1644, † 1720) from India. His works were imitated by Faqirollah Djalalabadi († 1781), Mehrdel Maschreqi (* 1798, † 1854), Gholam Mohammad Tarsi (* 1830, † 1900) and Mohammad Amin Andalib (* 1855, † 1875). In addition, the kings let themselves Timur Shah Durrani († 1793), Shah Schodscha (1842 †) and Abdorrahman Chan († 1901) in its sealing art as well as the poet Aischa Durrani continue († 1818/20) of older models such as Hafez or Jalal od Rumi conduct.
A literature written in Pashto can be traced back to the early 16th century. The Pashto poetry was initially based heavily on oral forms of poetry. Chushhal Chan Chattak (* 1613, † 1689) is considered the founder of classical Pashto literature, who tried to approximate models from Persian literature in form and content. His poetry ranges from mystical to moral-ethical to patriotic topics and is shaped by the struggle against the rule of the Great Mughals. He also used epic poetry (Baznama, Swatnama) and early Pashto prose (Dastarnama). Aschraf Chan Hidjri (* 1635, † 1694) and Abdulqadir Chan (* 1651, † 1712) followed his model in poetry. Rahman Baba (* 1632, † 1708), on the other hand, developed a style characterized by folk-oriented language with the treatment of mystical themes, which was continued by Mohammad Kakar (* 1708, † 1780). State founder Ahmed Shah Durrani left behind v. a. Love poetry in Pashto.
With the Anglo-Afghan wars of the 19th century, war and fighting themes became a popular subject both in Pashto poetry and among Persian-speaking poets, the latter (Hamid Kashmiri, »Akbarnama«, originated in 1866/67, published 1951/52; »Djangnama«, anonymous, published 1957) imitated classical models (Firdausi) in form and meter. While written literature was only handed down in handwritten form for centuries, printed products (initially sporadically from India, later from Kabul, Bukhara, Kokand and Tashkent) have been distributed since around 1850.
Journalism began to develop in the early 20th century. As a pioneer applies Mahmud Tarsi (* 1867, † 1935), the translations from French and Turkish anfertigte (J. Verne, among others), own journalistic prose written (“Report of a journey across three continents,” 1914-15) and the newspaper ” Seradj ol-Achbar Afghaniya «(1910-19) founded. It also contained one by Abdolali Mostaghni (* 1876, † 1934) headed the »National Literature« section with publications in Persian and Pashto. Local literary associations (Kabul 1931, Herat 1932, Kandahar 1933) preceded the establishment of the Pashto Society (1937) as a national literary center. The first short stories were written in the 1930s, which, in addition to travelogues, memoirs, radio plays and plays, still form the dominant genre of prose literature in Dari and Pashto to this day. In a largely realistic style, v. a. historical and socially critical issues are taken up. Well-known pioneers were Abdorrauf Benawa (* 1913, † 1985), Nur Mohammad Taraki (* 1917, † 1979), Gol Patscha Olfat (* 1910, † 1977), Abdol Ghafur Breschna (* 1907, † 1974), Qijamoddin Chadem (* 1912, † 1979), Rahnaward Sarjab (* 1944) and the writer Spogmay Saryab (* 1949). Chalilollah Chalili (* 1909, † 1987), who cultivated the Khorasani style (»Diwan«, 1960), is considered the leading Dari poet of the 20th century. When the civil war broke out, the centers of Afghan literature shifted to Pakistan (Peshawar), Iran and other western countries in the 1980s (Asadullah Habib, * 1941; Akram Osman, * 1937).
Anthologies: H. G. Raverty: Selections from the poetry of the Afghans from the sixteenth to the nineteenth century (1862); D. N. Mackenzie: Poems from the Diwan of Khushal Khan Khattak (1965); Modern storytellers of the world. Afghanistan, edited by H. Geerken (1977).
|
<urn:uuid:9bcd4ca9-41e8-4353-8470-0c5263e672f9>
|
CC-MAIN-2021-39
|
https://www.sunglasseswill.com/afghanistan-arts-and-literature/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060201.9/warc/CC-MAIN-20210928032425-20210928062425-00521.warc.gz
|
en
| 0.938626
| 1,702
| 3.234375
| 3
|
Vitamins and mineral salts, folic acid and linoleic acid, LDL cholesterol control, antioxidant action ensured by the presence of vitamin E.
Sunflower seeds are harvested from the plant Helianthus annuus, or common sunflower, that belongs to the Asteraceae family and is characterized by a large and typical inflorescence that tends to turn towards the sun. Although small, sunflower seeds are a source of valuable nutrients for the health of the body, they bring indeed vitamins of group B but, above all, vitamin E, which is a powerful antioxidant, mineral salts such as zinc, iron, potassium, phosphorus and magnesium, but also folic acid, very important during pregnancy for the health and the development of the fetus, and essential fatty acids such as linoleic acid, able to lower bad LDL cholesterol. For what concerns vitamin E, that is abundant in these seeds, it plays a role against free radicals and aging processes but also helps reduce the risk of heart disease, heart attack and some types of cancer. Indeed, as evidenced by the 1991 study published on Lancet, low levels of vitamin E can increase the risk of angina pectoris and, as reported in the 1993 article on The New England Journal of Medicine, vitamin E integration would have a role in reducing the risk of heart disease. However, taking vitamin E as a supplement is a highly debated issue, there are those who claim that it does not have a protective effect on the heart or that can even be dangerous to health while others support its effectiveness. On the contrary, what it is recommended is to take food rich in vitamin E and other antioxidants because this habit is related to a lower risk of cardiovascular disease, as reported on the American Journal of Terapeutics in 2010 by a group of researchers of the Chicago Medical School as well as in the guidelines of the American Heart Association. You can add a tablespoon of sunflower seeds to the breakfast yogurt or to your salads, use them to decorate the bread prepared by you, but you can also eat the sunflower seeds mixed with other seeds as a tasty snack. Be careful that the seeds aren’t rancid because of poor conservation, this bad conservation can indeed increase free radicals.
|
<urn:uuid:135d8c12-10d5-498b-9d6c-6aa57f5d5bcf>
|
CC-MAIN-2020-24
|
https://www.naturallifeapp.com/natural_remedies/sunflower_seeds
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396495.25/warc/CC-MAIN-20200528030851-20200528060851-00488.warc.gz
|
en
| 0.958486
| 449
| 2.765625
| 3
|
Eugène Joseph Delporte photographed Amor as it approached Earth to within 16 million kilometers (about 40 times the distance from Earth to the moon); this was the first time that an asteroid was seen to approach Earth so closely. A month later, 1862 Apollo was seen to cross Earth's orbit, and the scientific community suddenly realised the potential threat these flying mountains presented.
Amor is named after the Roman god of love, better known as Cupid. See also 763 Cupido and 433 Eros, which is named after Cupid's Greek counterpart. Coincidentally, 433 Eros, like 1221 Amor, makes close approaches to Earth. It is a Mars-crosser as well.
|
<urn:uuid:118415b9-8b90-4389-b8bd-660dd683a0ae>
|
CC-MAIN-2013-48
|
http://en.wikipedia.org/wiki/1221_Amor
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164033950/warc/CC-MAIN-20131204133353-00061-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.969868
| 145
| 3.0625
| 3
|
A Guide to Making High-Quality Decisions
We are all busy, but not as busy as our approach to decision making would suggest. Many important decisions are left until the last minute, forcing a quick decision when it was not originally necessary. As a result quick decisions are often poor quality decisions. The occasional successful outcome and a hectic lifestyle convince us to continue to make hurried choices, even though many of the problems we are solving today are the result of the “quick fixes” of yesterday. In order to arrive at consistently high-quality decisions, we need to slow down. Our thinking needs to be dissected. Sources of information need to be questioned and assumptions should be verified. Using the steps in this white paper as a guide will help you overcome the common weaknesses in decision analysis.
We need to ensure that our thinking is balanced, our logic sound and our information sources are complete and correct. The techniques for doing these things are the role and function of critical thinking. Critical thinking helps to reveal the gaps in our knowledge and imperfections in our reasoning that also stem from conscious or unconscious assumptions and mental shortcuts. To arrive at better decisions, it is necessary to ensure that our reasoning is consistent and methodical.
The tools of critical thinking provide a format for questioning the reasoning and logic of the inputs to the decision-making process. The intention of critical thinking is to separate the known from the unknown and the subjective from the objective. Ask questions about all aspects of the problem.
- What are the sources of information?
- Is there bias in the information?
- What is the point of view of the person(s) interpreting the information?
- What concepts are inherent in the reasoning being used in the evaluation of options?
- Have all possible options been considered?
|
<urn:uuid:5cbaf666-15bf-4080-942e-581744e09cdd>
|
CC-MAIN-2018-22
|
https://www.globalknowledge.com/us-en/resources/resource-library/white-papers/a-guide-to-making-high-quality-decisions/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866733.77/warc/CC-MAIN-20180524170605-20180524190605-00138.warc.gz
|
en
| 0.946182
| 363
| 3.46875
| 3
|
The wide spread of WLAN and the popularity of mobile devices increases the frequency of data transmission among mobile users. However, most of the data encryption technology is location-independent. An encrypted data can be decrypted anywhere. The encryption technology cannot restrict the location of data decryption. In order to meet the demand of mobile users in the future, a location-dependent approach, called Location-Dependent Data Encryption Algorithm (LDEA), is proposed in this study. A target latitude/longitude coordinate is determined firstly. The coordinate is incorporated with a random key for data encryption. The receiver can only decrypt the ciphertext when the coordinate acquired from GPS receiver is matched with the target coordinate. However, current GPS receiver is inaccuracy and inconsistent. The location of a mobile user is difficult to exactly match with the target coordinate. A Toleration Distance (TD) is also designed in LDEA to increase its practicality. The security analysis shows that the probability to break LDEA is almost impossible since the length of the random key is adjustable. A prototype is also implemented for experimental study. The results show that the ciphertext can only be decrypted under the restriction of TD. It illustrates that LDEA is effective and practical for data transmission in mobile environment. PDFFulltextXMLReferencesCitation
How to cite this article
Hsien- Chou Liao and Yun -Hsiang Chao, 2008. A New Data Encryption Algorithm Based on the Location of Mobile Users. Information Technology Journal, 7: 63-69.
|
<urn:uuid:e86b28d4-dfa8-4422-bddc-6ddd953f19bb>
|
CC-MAIN-2023-50
|
https://scialert.net/abstract/index.php?doi=itj.2008.63.69
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00117.warc.gz
|
en
| 0.912662
| 317
| 3
| 3
|
This post is part of a series of posts on the life of saints. Basically, saints are holy men and women whose lives demonstrate the glory of God and are now in heaven in his presence.Check out an earlier post if you are interested in more information about what a saint is.
Today’s post is about St. Blaise. I remember going to a service on St. Blaise’s feast day as a child and being very confused, my mom explained what was happening, but it was not an ordinary tradition. At the end of the service people had their throats blessed using candle sticks. When I saw that St. Blaise’s feast day coming up I knew I needed to do some more investigating.
As a young man in the 3rd century St. Blaise studied philosophy and medicine. While a practicing physician, healing the community’s bodies St. Blaise chose to enter the priesthood and heal souls. Before long he was ordained Bishop of Sebaste in Armenia (present-day Sivas in Turkey).
St. Blaise lived on the fringe of the Roman empire during a time of persecution for the church, he saw many Christians persecuted for their faith and strived to set an example in every way. After some time, St. Blaise began to presided as a bishop in a cave on Mt. Argeus, in order to best serve the community entrusted to him. While living in the cave, he devoted himself to prayer and the pastoral care of both people and the wilderness. Many people came to St. Blaise to be healed in the name of Jesus and it seemed he had a special relationship with the animals.
The local Governor, Agricolous sent his knights into the wilds on a hunting party, when they stumbled upon then-Bishop Blaise’s cave. They seized and carried him of to prison. Even after imprisonment, this Oriental saint adamantly refused to worship the Governor’s gods, and as punishment he was tortured by tearing his flesh with wool combs, ouch! He was martyred by beheading, alongside seven women and two children around the year 316.
According to the 6th century legends, it was during this imprisonment that St. Blaise healed a child who was choking on a fish bone, helped a women recover her pig, and prayed in the presence of peaceful wolves. Much of the legend surrounding this 3rd century Armenian bishop, martyr, and saint are not supported in recorded fact, but still offer spiritual insights and inspiration.
The Saint in Art:
St. Blaise’s emblems are wax, taper, iron combs (the supposed instruments of his passion), or two crossed candles. There are two common scenes St. Blaise is represented in art (1) in a cave with animals (2) as a Bishop holding two crossed candles. St. Blaise’s emblems are wax, taper, iron/wool combs, wild animals, 2 crossed candles.
Patron Saint Of
St. Blaise is most commonly known as the patron of throat injuries and diseases, but is also the patron of veterinarians, animals, and against attacks of wild animals. A few other intentions he has been associated with are construction workers, coughs, the Croatian cities of Dalmatia and Dubrovnik, thyroid disease (goiters), stone cutters, whooping cough, wool-combers, and wool weavers. If only I had known when Anna had whooping cough last summer.
Considering the aforementioned patronages, we can name St. Blaise as the unofficial saint of a few modern day things like graphic wolf t-shirts, the Heimlich maneuver, throat lozenges, and burning yourself on candles.
As an ancient saint we have no accredited quotes to St. Blaise, but we do have the special prayer offered for the throat.
On the feast of Saint Blaise, a special blessing of the throat is offered in many parishes: “Through the intercession of Saint Blaise, bishop and martyr, may God deliver you from ailments of the throat and from every other evil.”
Ways to Celebrate:
Feast Day: February 3rd
Make a throat soothing soup. One of our favorites lately is this Lemon Chicken Orzo Soup.
1.) Learn about your throat by making a respiratory system.
2.) Make your own saint character craft.
3.) Pray for the church persecuted and for the strength and courage to keep the faith like St. Blaise.
4.) Be inventive with a toilet paper rolls and make your own candles.
5.) Go to mass with your family to receive the blessing of throats.
6.) Prayer to St. Blaise
So hopefully now you are prepared to celebrate one of the churches ancient saints, St. Blaise, on his feast day today and hopefully you have gained a new friend in heaven. I know I have.
To see more check out some of my earlier posts in this series:
|
<urn:uuid:0fc01944-7ceb-463a-9482-8142654dc889>
|
CC-MAIN-2018-22
|
http://thesaltstories.com/st-blaise-making-new-friends-in-heaven/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863570.21/warc/CC-MAIN-20180520131723-20180520151723-00311.warc.gz
|
en
| 0.967992
| 1,056
| 2.890625
| 3
|
Activity: Talk or presentation › Oral presentation
The environmental impact of Synthetic Natural Gas (SNG) production from wood gasification is analysed, focusing on the comparison of two continuous processes (CO2 removal and Fuel-assisted hydrogen addition) to balance the gas mix for the methanation, and their coupling to an intermittent process (Full electric hydrogen addition). The third process increases the SNG production - with the same wood input-, and operates only when surplus electricity is available. The analysis is done through a comparative life cycle assessment (LCA) of the production streams, without including SNG plant infrastructure. The production of SNG can be a tool to balance the electricity production with a high share of fluctuating renewables and the gas grid. The research is located in the framework of the Synthetic methane project of the Energy Delta Gas Research (EDGaR). The results show that CO2 removal has lower environmental impact and lower electricity consumption, which could derive economic advantages. The larger electricity consumption of Fuel-assisted hydrogen addition (FA) result in larger environmental impact, especially if the electricity is not produced nearly 100% by renewable sources. A slightly lower CO2 removal wood consumption does not determine the environmental impact differences. If FA is to compete with CO2 removal, the surplus heat has to be used to replace a fuel with an environmental impact similar or larger than natural gas.
|
<urn:uuid:aa4034a0-069b-48fd-9574-95e1050625ff>
|
CC-MAIN-2020-34
|
https://research.hanze.nl/en/activities/lca-of-synthetic-natural-gas-production-with-surplus-renewable-en
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738562.5/warc/CC-MAIN-20200809162458-20200809192458-00500.warc.gz
|
en
| 0.920042
| 276
| 3.15625
| 3
|
Should you learn Python? Many people choose their coding bootcamp based on what coding language they want to learn. Python is becoming an increasingly popular teaching language at both coding bootcamps and data science bootcamps, so we asked General Assembly Python Instructor Brandi Butler to explain the top 5 reasons for choosing Python as your first coding language. Find out about the versatility of Python and what sort of salaries Python developers can earn!
Definition: Python is consistently cited as one of the easiest to learn programming languages by community groups, educational institutions, and technology news sites. In fact, any list of top languages to learn for beginners will always give a shout out to Python. A big part of the reason for this is its elegance. You can simply express more functionality, more clearly in fewer lines of code than you can in other languages. Additionally, Python typically enforces good code style (the programmer equivalent of legible handwriting) as a side-effect of how it’s written, meaning you don’t have to learn a lot of extra rules to be doing a decent job right from the start.
Why it’s important: Programming is difficult to learn! A big reason students attend coding bootcamps despite the numerous free resources online is that there are so many new concepts to learn. Python is still difficult to learn, but it looks more like real language and simplifies a lot of things that are difficult for beginners compared to other languages. For English speakers, it’s kind of like learning Spanish instead of ancient Greek. It’s one of the many reasons that in the education field, Python is a top pick!
Example: One "gotcha" for people learning to program for the first time is that lists of data start counting at zero, rather than one. In other words, your first item in the list is the zeroth item. This is common across pretty much all programming languages, and beginners often end up making off-by-one errors when trying to access their data. However, Python does a few things to make programmers less error-prone, such as making its ranges exclusive. This means if you ask Python for a range of numbers up to 10, it actually gives you the range including the numbers from 0 through 9, because Python knows what you mean and has your back.
Bonus Tidbit: Python is platform agnostic – this means you can rely on it to work whether you use Windows, Mac, or Linux!
Definition: Python is referred to as a “general-purpose language," which basically means it can be used to do most anything that a programming language is capable of. This means Python is capable of:
Basically, Python is the language that does it all.
Why it’s important: Successful communication is critical to everyone’s career, and those in the tech field are no exception. It can be extraordinarily valuable to have software developers, data scientists, and business analysts speaking the same language, which reduces ramp up time on projects and increases collaboration. Especially with the rise of big data and applications of machine learning showing up in everyday life, cross-discipline work is more important than ever before.
Example: Developers love to collaborate together in hackathons – basically a coding marathon. Now, a common language and purpose is enabling other disciplines to get in on the fun!
Bonus Tidbit: It isn’t just the open source community that contributes to Python. Large companies have released Python packages for public use as well, such as Google’s TensorFlow for machine learning or IBM’s Watson SDK.
Definition: Python isn’t just something for your desktop computer at work, it can work on small-form devices like Raspberry PIs. There is also a MicroPython project which is a super lean version of Python meant to run on embedded devices. This can be anything including toys, appliances, and remote controls.
Why it's important: Python can be a gateway to take technology into our own hands. If you want something, you now have the power to make it happen!
Example: Have you ever wanted to build a remote controlled car? A mini-robot? Do you need an automated monitor to tell you when your beer keg is too low and automatically reorder it? All these things and more have been done with Raspberry PIs.
Bonus Tidbit: Raspberry PIs are inexpensive and you can get beginner-friendly starter kits on the internet!
Definition: Python was first released in 1991 by Guido van Rossem. Programming languages simply don’t have that much staying power and much of what was commonly used in the early 1990s is absent (replaced by newer languages) or at least radically different in the current day. It shows that Python is really something special that it’s been going strong for a quarter of a century and still gaining more and more popularity. A big part of the reason for this is the strong, open-source community surrounding Python. There are many enthusiasts dedicated to spreading the language far and wide.
Why it’s important: Python is developed under an open source license. This means it’s free, even for commercial use. Your startup business can use it freely without worrying about legal issues or having to pay large fees to a corporation who maintains the language. Community members can also contribute new modules and packages, as well as help maintain the language itself. The crowd-sourcing of this work, and the spirit of sharing information and ideas is what makes the community so strong.
Example: Python is an ever-growing, ever-changing language. It evolves with the needs of its users because it is maintained by those very users. A series of PEPs (Python Enhancement Proposals) is kept on the python.org website so the entire community can participate and refer back to it. This way, it can be more in tune with its user-base.
Bonus Tidbit: A Python meetup is likely to be one of the biggest tech-related meetups in any given area!
Definition: Most people are aware that software developers (including Python programmers!) can earn a decent amount of money. In fact, across the US, software development pays over twice the median wage (for single earners). In larger cities, especially tech hubs like Silicon Valley, this can be an even greater amount. The highest paid Python programmers tend to work in the fields of Data Science, Web Development, or Machine Learning.
Why it’s important: Few software developers get into programming simply for the money – there are easier ways of going about earning money if that’s the only goal! However, it is important to be able to support yourself while doing what you love, and Python programmers well exceed just putting bread on the table. According to PayScale.com, not only do Python programmers do pretty well in general, they do better than the average software developer. So, having Python skills really boosts your earning potential!
Example: Silicon Valley used to be the place to be if you wanted to work in the tech industry, but more and more other cities are also becoming mini-tech hubs (Seattle, Austin, Denver, LA, New York, Washington DC, just to name a few). Additionally, software development can be a great opportunity for getting remote work, enabling you to be wherever you want to be. Our grandparents probably never dreamed of this kind of flexibility in their day!
Bonus Tidbit: Software developers are highly valued team members at any company, and are often granted perks such as company stock options, generous signing bonuses, and relaxed work environments.
Protip: With any of the following links, always make sure you’re using Python 3, not Python 2. Version 2 is old and going away soon!
Beginner-Level: (little to no other programming experience)
Python-Beginners: (some programming experience, in other languages)
What to expect in the UCF Boot Camps virtual classroom and more!
How to Prepare for Galvanize’s Data Science Bootcamp
Deep Dive into BrainStation's Digital Leadership and Innovation Course
|
<urn:uuid:a669ecad-6e66-4eed-9439-38cd5e308f75>
|
CC-MAIN-2021-17
|
https://www.coursereport.com/blog/5-reasons-to-learn-python-programming
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038066981.0/warc/CC-MAIN-20210416130611-20210416160611-00166.warc.gz
|
en
| 0.941743
| 1,667
| 2.546875
| 3
|
What You Need to Know about Economics
George Buckley & Sumeet Desai: What You Need To Know About Economics
Economics Matters. But with confusing things like GDP and interest rates, it’s often hard to get you head around.
So What do you really need to know about economics? Find out:
- What economic growth is and why it matters
- How inflation happens
- How jobs are created and lost
- How the property market works
- What central banks do and how it affects the rest of us
- The impact of government spending on the economy
What You Need to Know About Economics cuts through the theory to help you to do your job and understand the world around you better.
Read More in the What You Need to Know Series and Ger Up to Speed on The Essentials… Fast.
- Wiley, June 2011
- Download options:
- EPUB 2 (Adobe DRM)
You can read this item using any of the following Kobo apps and devices:
|
<urn:uuid:45f4b44b-609f-4803-9bc6-9dc64b23a4ca>
|
CC-MAIN-2016-30
|
https://store.kobobooks.com/en-us/book/What-You-Need-Know-about/h2Weie8iBEKtNlFy2qqfgg?MixID=h2Weie8iBEKtNlFy2qqfgg&PageNumber=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823963.50/warc/CC-MAIN-20160723071023-00014-ip-10-185-27-174.ec2.internal.warc.gz
|
en
| 0.838886
| 209
| 2.96875
| 3
|
The muscles around your scapular, specifically the rhomboid and trapezius muscles, are important yet often overlooked muscle groups. Training them improves your posture and strengthens the scapular area. Weak scapular muscles and tight chest muscles are often a cause of upper-crossed syndrome, or hunchback posture, which can lead to upper back pain. To strengthen your scapular muscles, follow a balanced exercise routine that targets your rhomboids and trapezius.
Perform single-arm bent-over dumbbell rows first in your upper body workout. Hold a dumbbell in one hand with your palm facing inward, and place your other hand on a bench. Walk your feet back until your upper back is flat, then bring your abdominals in to support your back. Pull the dumbbell up until it lightly touches your outer chest, keeping your elbow straight behind you. Pause briefly in the top position, then lower it again. Keep your head looking just in front of you the whole time. Perform four sets of eight repetitions and switch arms.
Move on to face pulls as your second exercise. Attach a rope handle to a cable station set at head height. Grasp both ends of the handle with your arms straight and brace your abdominals. Pull the handle toward you by flexing your arms and squeezing your shoulder blades together as hard as you can until your hands are in line with your ears. Pause for one second, then slowly straighten your arms. Aim for three sets of 12 reps. Face pulls promote correct upward scapular rotation and external shoulder rotation, both of which are vital for maintaining good posture.
Finish your workout with prone I, Y, T, W, O formations. Lie face down on a mat. Raise your arms up in front of you while keeping your elbows straight, until they are parallel to the ground, forming the letter "I." Move your arms outward to form the letter "Y," then straight out for the letter "T." Bend your elbows to form the letter "W," then complete the series by bringing your hands together at touch your fingertips and form the letter "O." Repeat the series four times.
In between your workouts, do four sets of 10 scapular wall slides every day. Weakness in the muscles around your scapular may be caused by poor scapular stability, which wall slides can correct. Stand against a wall with your heels, buttocks and upper back touching it. Hold your arms up so that your elbows are at 90 degrees and level with your shoulders. Slide your hands up the wall as high as you can, aiming to keep your elbows and wrists in contact with the wall at all times. As you progress, you should be able to increase your range of motion, which can aid in strengthening the scapular muscles.
- Edgardo Contreras/Photodisc/Getty Images
This article reflects the views of the writer and does not necessarily reflect the views of Jillian Michaels or JillianMichaels.com.
|
<urn:uuid:77e88074-6b14-4534-b543-cc088149c320>
|
CC-MAIN-2019-26
|
https://getfit.jillianmichaels.com/strengthen-scapular-muscles-1127.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000367.74/warc/CC-MAIN-20190626154459-20190626180459-00426.warc.gz
|
en
| 0.935043
| 620
| 2.953125
| 3
|
This object is not on display at the National Air and Space Museum. It is either on loan or in storage.
Collection Item Summary:
The RQ-2A provides field commanders with real-time reconnaissance, surveillance, target acquisition, and battle damage information. Ground controllers pilot the aircraft over its 185-kilometer (115-mile) range. The RQ-2A can be recovered by flying into a large net aboard a ship or by using a tail hook and arresting wire on land. Its small size and composite materials make the RQ-2A difficult to detect visually and on radar.
U.S. Army, Navy, and Marine units began using RQ-2As in the late 1980s. This one operated from the battleship Wisconsin during the 1991 Gulf War. While it was assessing damage from naval gunfire to targets on Faylaka Island near Kuwait City, several Iraqi soldiers signaled their intention to surrender to the aircraft during a low pass-the first time enemy soldiers had ever surrendered to an unmanned aerial vehicle. They were later captured by U.S. ground troops.
Collection Item Long Description:
By the 1990s, American military forces trained primarily for peacekeeping operations and limited warfare. Maintaining peace often required covert, real-time, 24-hour surveillance of military and security forces. Among western nations, the political will to launch and maintain limited warfare depended almost entirely on minimizing casualties to service personnel and preventing collateral damage to non-combatants. Friendly units had to first locate and positively identify enemy forces, then launch weapons well beyond threat from enemy defensive fire. Once in flight, missiles, bombs, or other battlefield munitions launched by friendly forces could not miss the target by more than a few meters.
Close-up, real-time surveillance was required to succeed at these demanding missions. Since the Vietnam War, military forces have used the unmanned aerial vehicle, or UAV, to closely track the enemy without incurring their own casualties. One of the most successful UAVs fielded by U. S. forces was the Pioneer RQ-2A. This aircraft has played a significant role in several major conflicts. The UAV dates to World War II when unmanned remotely- controlled aircraft served as primitive, cruise missiles and gunnery targets. On May 1, 1960, Soviet forces downed Francis Gary Powers near Svedlovsk when he over-flew the Soviet Union in a Lockheed U-2 (see NASM collection) reconnaissance jet. This incident was front-page news when President Dwight D. Eisenhower met Soviet Premier Nikita Khrushchev in Paris a few weeks later. Initial reports that a Soviet surface-to-air missile downed Powers' airplane jump-started the development of reconnaissance UAVs.
Mounting bulky camera equipment to the UAV airframe without making it considerably larger and easier to target with anti-aircraft weapons became the most difficult technical hurdle. The U.S. Air Force developed the AQM-34 Firebee and flew this aircraft extensively during the Vietnam War. A small jet-turbine engine propelled the swept-wing Firebee on reconnaissance missions over North Vietnam and China.
Israel invested heavily in remotely piloted aircraft technology during the late 1960s after the Egyptians badly surprised Israeli aircrews during the short but intense Six-Day War in early June 1967. When Israel invaded Lebanon in 1982, Israel Aircraft Industries, Ltd., (IAI) was manufacturing the Scout UAV. Successes flying the Scout during the invasion and subsequent flight demonstrations of this UAV's capabilities convinced leaders in the U.S. Navy Mediterranean Fleet to acquire their own Scouts. Reports suggest that the suicide bombing that killed 241 U. S. Marines in Beirut in 1983 also spurred Navy officials to investigate reconnaissance UAVs. In 1984, IAI and Tadiran, Ltd., formed a joint subsidiary company called Mazlat Ltd., to develop an improved version of the Scout known as the Pioneer. The following year, Mazlat flew the Pioneer in a UAV competition sponsored by the Navy. Pacific Aerosystem's Heron 26 UAV competed against the Pioneer for a lucrative Navy contract. Pioneer won and the Navy selected AAI Corporation in the United States to build this UAV.
A Pioneer airframe consists of a twin-tail boom fuselage with two vertical stabilizers on the tail and a conventional wing and stub fuselage mounting a pusher engine. The fixed, tricycle landing gear uses small inflatable main wheel tires but the nose gear has a castering, solid plastic wheel. The airframe consists of carbon-fiber composites, fiberglass, Kevlar, aluminum, and balsa wood. These lightweight materials enable the Pioneer to loft its payload of surveillance equipment with a 26 horsepower, two-cycle engine. The non-metallic composites also reduce the UAV's radar cross-section. A fuel capacity of 47 liters (12 gal) of 100-octane aviation gasoline can keep the Pioneer airborne for 5.5 hours.
Two operators flew a Pioneer manually from a Ground Control Station (GCS), or the airplane could fly autonomously using an on-board autopilot preprogrammed to follow a specific flight path. A ground-based Tracking Control Unit (TCU) was required to maintain a communication data link with the aircraft and monitored its position. The range of the transmitter was 185 km (115 miles). The data link was jam resistant but operators could switch to a backup mode if the primary frequency was successfully jammed. IAI also developed a Portable Control Station (PCS) for the Pioneer system. Several small, man-portable loads comprised the PCS. This allowed soldiers on the battlefield to assume control once the air vehicle was in flight. Another handy bit of avionics, the Remote Receiving Station (RRS) consisted of a small box with video display that allowed commanders to remotely view real-time imagery transmitted from the Pioneer but independent of the video link to the GCS. A fully equipped Pioneer reconnaissance unit typically consisted of five UAVs and one each GCS, TCU, and PCS, plus four RRS boxes and launch and recovery gear.
Two people could easily assemble and knockdown the Pioneer in the field. The fuselage, wings, empennage, and tail-booms detach easily and fit within a purpose-built container that protects these components during transport or prolonged storage. Once assembled, ground crews could launch the Pioneer using several methods. When launching from all but the smallest ships, a launch platform held the UAV in take-off position until an operator ignited a small, solid-fuel rocket motor to propel the aircraft to sufficient flying speed. The rocket burned out and fell away a few seconds after liftoff. Runway takeoffs also require the boost rocket or a truck-mounted pneumatic catapult. Without a steerable nosewheel, a normal runway takeoff is not possible.
To recover the UAV, operators usually fly it into a large net. The airplane also carries a tail-hook to catch an arresting wire strung across a runway. A Pioneer can carry up to 45.4 kg (100 lb) of surveillance equipment including high resolution, black-and-white television, infrared, or color cameras plus to an array of sensor packages for chemical and radiological monitoring, or for gathering electronic intelligence.
U.S. Navy forces received their first Pioneers in June 1986, the initial part of an $87.7 million purchase of 72 Pioneers and support equipment. Fleet Composite Squadron Six (VC-6) broke-in the new UAVs at the Patuxent River Naval Air Test Center in Maryland. In December 1986, five Pioneers went aboard the battleship "U.S.S. Iowa" to demonstrate their ability to extend the eyes of Navy gunners. The "Iowa's" 41-cm (16-inch) main gun battery could hit targets beyond a range of 38 km (24 miles). During tests, four Pioneers were lost, three of them during attempts to recover the aircraft using the net. Continuing losses during flight and recovery prompted a $50 million expenditure to improve the system. Landing was particularly difficult because operators were attempting to fly the Pioneer into a small target at a precise airspeed, altitude, and angle-of-attack, without benefit of the visual, tactile, aural cues available to conventional pilots.
In 1987, the U. S. Marine Corps began fielding the Pioneer. The U.S. Army also experimented with UAVs during the 1980s. The Army's Aquila UAV cost nearly a billion dollars to build and test but the program failed to reach design goals and Army leaders terminated the project, and then evaluated the Pioneer. By 1990, Army units were operating this UAV. The next year, AAI formed a new subsidiary called Pioneer UAV, Inc., to exclusively manufacture the Pioneer, provide user support, and continue to refine the aircraft. The new company was required because American forces were flying hundreds of Pioneers.
Saddam Hussein's military incursion into Kuwait in 1991 provided the ideal proving ground for Pioneer UAV units to prove their worth. About 40 U. S. Navy, Marine, and Army Pioneers flew more than 300 missions during Operation Desert Storm. The Navy flew Pioneers from the battleships "Iowa" and "Wisconsin" and three Marine Corps Remotely Piloted Vehicle (RPV) companies used their Pioneers to identify targets for marine artillery units and to correct their shot. The Army also deployed one UAV platoon to aid army artillery in the same manner as the Marine UAV units.
Navy Pioneers conducted 71 missions and flew a total of 232 hours during the conflict. These aircraft allowed their operators to detect, and helped vector forces to intercept, two Iraqi high-speed patrol boats menacing the fleet. They also became the eyes of naval gunners who successfully bombarded Faylaka Island. It was during this bombardment that the international media spotlight fell on the Pioneer. Crewmen aboard the battleship "Wisconsin" launched a Pioneer, Air Vehicle number 159, to conduct battle damage assessment after shells from the "Missouri's" massive 41-cm (16-inch) guns. As operators flew the Pioneer low over Faylaka Island, a number of Iraqis realized the battleship was probably preparing to fire another volley. They waved white surrender flags as the UAV passed overhead. U. S. Marines landed and collected the waiting prisoners. This event marked the first time that humans had surrendered to a robot in combat. When Navy officials offered to transfer a Pioneer to the Smithsonian Institution, curators at the National Air and Space Museum specifically asked for the UAV that Iraquis troops surrendered to during the Gulf War.
Marine Corps UAV operators completed 196 Pioneer sorties and logged 606 flight hours, including missions performed during the buildup to Operation Desert Storm. The Navy and Marine Corps lost 12 Pioneers during Desert Storm: one to hostile fire, another when it ran out of fuel while following a convoy of mobile SCUD missile launchers. Combat operations were not associated with the remaining losses. These losses included control difficulties, recovery mishaps, and one Pioneer that crashed after it accidentally flew through the wake turbulence from a passing Lockheed C-130 Hercules transport (see NASM collection). Enemy gunfire damaged three Pioneers and routine operational events damaged another 15 UAVs. U. S. Army Pioneers carried out 46 missions and logged 155 hours of flight time without losing a single aircraft.
The high non-combat loss rate prompted a negative review by the U. S. General Accounting Office. Other government watchdog groups also attacked the Pioneer operations because of alleged laxness in monitoring parts procurement. To military leaders, the Pioneer proved invaluable, even with a high loss rate. The aircraft saved many military men and women who might otherwise have died because of exposure to enemy fire. The price of a single Pioneer, $850,000, is also several orders of magnitude less than the cost of a manned reconnaissance aircraft. In 1995, Pioneer UAV Inc. began developing a Common Automatic Recovery System (CARS) to allow automated recovery at land and sea. CARS could dramatically reduce the number of recovery accidents and expand the air vehicle's adverse weather performance.
The Pioneer continued to operate throughout the 1990s in most major U.S. military operations, including Somalia, Haiti, Bosnia, and Kosovo. Flying over the former Yugoslavia, Pioneer operators spotted targets for Standoff Land Attack Missiles launched from Lockheed P-3 Orions aircraft. Pioneers have also helped carry out extensive surveillance during drug interdiction operations. During the late 1990s, this classs of slow and low flying UAV became increasingly vulnerable to anti-aircraft gunfire, particularly in flight over Kosovo. Army units traded in their Pioneers for a larger and more advanced model called the Hunter. Until the Navy and Marine Corps phase out the Pioneer (now called Outrider), this robust airplane will remain in service.
The U. S. Navy donated Pioneer RQ-2A, Air Vehicle 159, to the National Air and Space Museum during October 2000. A camera surveillance package is mounted inside the spherical turret installed in the middle of the RQ-2A fuselage. The Pioneer is on display as part of the UAV Gallery in the Air and Space Museum on the National Mall that opened in 2008.
Wingspan: 5.1 m (16 ft 10 in),
Length: 4.4 m (14 ft 4 in),
Height: 1.2 m (4 ft)
Reference and Further Reading:
Gerken, Louis C. "UAV: Unmanned Aerial Vehicles." Chula Vista, California: American Scientific Corp., 1991.
McDaid, Hugh and David Oliver. "Smart Weapons: Top Secret History of Remote Controlled Airborne Weapons." New York: Welcome Rain, 1997.
Munson, Kenneth. "World Unmanned Aircraft." Janes, 1988.
Pioneer RQ-2A curatorial file, Aeronautics Division, National Air and Space Museum.
Restrictions & Rights
- Other: 14ft 4in. x 16ft 10in. (4.369m x 5.131m)
- Other (Overall including antenna): 4ft 3/4in. (1.238m)
- Other (Fuselage only): 9ft 3in. x 1ft 7in. (2.819m x 0.483m)
- Other (Main tire): 7 1/2in. (19.1cm)
- Other (Nose wheel): 5 1/2in. (14cm)
- Other (Propeller): 29in. (73.7cm)
- Other (Wing chord): 22in. (55.9cm)
- Other (Tail span): 76in. (193cm)
|
<urn:uuid:32423a45-b7ab-46da-9c27-e55f6d371509>
|
CC-MAIN-2019-35
|
https://airandspace.si.edu/collection-objects/pioneer-rq-2a-uav
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316718.64/warc/CC-MAIN-20190822022401-20190822044401-00313.warc.gz
|
en
| 0.943928
| 3,044
| 3.375
| 3
|
Daughter of the king of Vidarbha who married the sage Agastya. Lopamudra was a philosopher as per the ancient Indian literature. She was the wife of the sage Agastya who is believed to have lived in the 6th or 7th century BC. Together with her husband she is credited with spreading the fame of the Lalita sahasranama (the thousand names of the Divine Mother). She is also called Kaushitaki and Varaprada. A hymn in the Rigveda is attributed to her.
In Mahabharata (Vana a: Tirtha-yatra Parva), there is a mention that Agastya Rishi did penance at Gangadwara (Haridwar), with the help of his wife, Lopamudra (the princess of Vidarbha). According to legend, Lopamudra was created by sage Agastya with the most graceful parts of animals such as eyes of the deer etc.
The name Lopamudra signifies the loss (lopa) that the animals suffered by giving their distinctive beauties (mudras). After creating her, Agastya secretly introduced Lopamudra into the palace of the King of Vidarbha. Agastya had made Lopamudra with the intention of marrying her. The king brought up Lopamudra as his daughter. When she grew up, Agastya demanded her hand in marriage. Lopamudra agreed to marry him and left the King's palace for his hermitage. However, after some time, she grew tired of Agastya's austerity. She wrote a two-stanza hymn, asking for his attention and love. The hymn made Agastya realize his duties towards his wife. The couple had a son named Dridhasyu, who became a poet.
It is said that the present day river Kaveri is Lopamudra's reincarnated form.
Giridhara Ramayana has a different story on Lopamudra. Agastya approached king of Kanyakubja who had many daughters for a girl in marriage. The king promised the sage a girl when they come to age and asked him to come back a few years later. By the time the sage returned, however the king had married off all his daughters. He was so worried about getting cursed, he dressed his son Lopamudra as a girl and presented him to Agastya. Miraculously, Lopamudra was transformed and became a woman after the wedding.
|
<urn:uuid:c1ff9194-ddf7-46c7-b8b1-5b470fb9edfc>
|
CC-MAIN-2020-50
|
https://www.eastern-spirituality.com/glossary/spirituality-terms/l-definitions/lopamudra
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141177566.10/warc/CC-MAIN-20201124195123-20201124225123-00581.warc.gz
|
en
| 0.988199
| 541
| 3.421875
| 3
|
The Chaucer Review: An Indexed Bibliography (Vols. 1-30)Return to the Subject List
Hirsh, John C. "Reopening the Prioress's Tale." 10 (1975): 30-45.
Texts like Frederick II of Hohenstaufen's Privilegium e sententia in favorem iudaeorum protecting Jews from charges of ritual murder must cause re-evaluation of the belief that medieval Christians held only one attitude towards Jews. The Prioress's Tale is derived from the liturgy and suggests that the tale intends salvation. Examination of the references to Rachel and to the Lamb leads readers to connect Rachel and the Lamb to the church and the salvation that the church promises. Medieval associations of particular properties with stones, like the Prioress's beads and others mentioned, suggest Providence at work, not Fortune. The boy's death replicates Christ's, and the Jewish characters represent fallen men who, like Adam, listened to Satan. Chaucer thus suggests that all people work into a larger plan of salvation.
Oerlemans, Onno. "The Seriousness of the Nun's Priest's Tale." 26 (1992): 317-28.
The irony of the Nun's Priest's Tale works against both readers who attempt to find morality and the narrator who attempts to give the tale meaning. The success of the tale is determined more by the fact that the Nun's Priest must "quite" the Monk and demonstrate that Fortune does not control everything than by anything he says in particular. He chooses the beast fable because it traditionally has the capacity to delight and to instruct. In the course of the tale, the Priest satirizes those who believe that knowledge of the fallen world will lead closer to truth. The references to Adam and to Christ do not exemplify metanarrative, but point to the narrator's "uncertainty as to where his tale has taken him, and an attempt to combine both the simple intentions and rewards of the beast fable with a more sophisticated moral" (325). The tale functions as a means to examine higher truths in a fallen world.
|
<urn:uuid:919e00d6-52b4-4782-badc-72c72836bcf5>
|
CC-MAIN-2016-44
|
http://library.northwestu.edu/chaucer/subject.php?id=4
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719453.9/warc/CC-MAIN-20161020183839-00514-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.933825
| 435
| 2.59375
| 3
|
33+ Sample Mutual Agreement
Mutual Agreement Definition
The mutual agreement’s meaning is when two or more individuals establish “agreement” or understanding on a certain subject, problem or issue (also referred to as mutual consent). In contract law, when we remark that there is a “mutual understanding” between the parties or “mutual agreement,” we point out that the parties have come to an agreement which can form the foundation of an oral or written agreement. A mutual agreement is a redundant sentence. Any agreement in essence should be mutual, as it involves two or more persons agreeing on something.
Under this definition, a mutual agreement may relate to any legally enforceable contracts when all terms and provisions have been signed and agreed on between parties. The mutual understanding is enforceable by law between two parties. In short, if two persons or business entities enter into a mutual commercial agreement where one party agrees in exchange for a particular price to execute certain responsibilities, and the other party vice versa, the obligations of those parties become legally binding and enforceable.
What Are the Elements of Mutual Agreements?
A contract is legally binding and creates mutually enforceable duties by private parties. To be legally binding, a contract must comply with several fundamental criteria of formation. The following components that must form part of each mutual agreement:
Consideration—Any value offered by both parties to a contract, which encourages them to enter into a mutual exchange arrangement. Consideration for the creation of a contract is a vital aspect. It might be a promise to perform an act you want to perform or a commitment not to conduct an act you have the obligation to conduct. Value and benefits must be exchanged, for example, service and payment. It is well established in English law as well as in Indian Contract Act that consideration is essential for an enforceable contract which means that an agreement without consideration is a bare promise and ex nudo pacto non aritio actio, i.e., cannot be held binding on the parties. Capable parties—You have to know or understand what you do to deem you ‘capable’ of concluding an agreement. Minors and those who are confirmed mentally challenged or ill are typically considered as unable to conclude an agreement since they don’t know what they’re doing. In addition, no enforceable contract may be concluded between people influenced by drugs or alcohol. Both sides shall conclude the deal voluntarily and shall not be compelled to do so. All the parties signing the contract must be at least 18 years old which constitutes legal age and they must be of sound mind.Legal purpose—The contract must be valid and binding. It can’t be unlawful, such as the sale of narcotics or prostitution. It does not mean it is illegal to conclude an agreement which does not include all those key elements; it just means that the contract cannot be executed by a court if an important piece is absent. The responsibilities under the contract must comply with US law to make them lawful and implementable.Offer— An offer refers to a commitment made by one party in return for the performance of another party. This is an appeal for a contract to be concluded on a number of terms. It may be stated in many different forms, from a quick spoken declaration to a lengthy and extensive written declaration. You must, however, ensure that your offer is clearly and reasonably stated to persuade the other party that you make an offer.Acceptance—Acceptance is the fulfillment by one person with the terms of an offer made by another under the law of contracts. The acceptance of an offer is the acceptance of its terms and conditions. Acceptance must usually be done in the way that the offer specifies. If the offer does not set out the method of acceptance, the acceptance may take place in a way that is acceptable in the circumstances. However, acceptance shall only be valid if the bidder knows the bid, the bidder exhibits a desire to accept and the acceptance is indicated as a clear and unconditional agreement to the conditions of the bid. For example, Insurance legislation accepts the insurer’s consent to receive an insurance application and to provide a policy to cover a person against specific hazards, such as fire or theft.Mutual and Genuine Assent—The agreement must be freely signed by all parties. If one or more parties have made errors, a contract may not be enforced. Similarly, if a party has committed fraud or exerted unfair influence on another, a contract may be cancelled. For instance, you sign a contract to sell your house to your neighbor next door for one dollar. Your neighbor threatened you when you signed the contract. Obviously you entered into a coercion agreement so that the contract is not valid. So it is really required that all the parties mutually and truly agree to the agreement’s terms and conditions.
Different types of Mutual Agreement
The majority of mutual agreements include other sub-agreements or provisions like a non-disclosure agreement or a confidentiality agreement, and a harmless disclosure or holding agreement which may also be standalone mutual agreements.
Mutual employment agreement: An employment agreement is a mutual agreement between employee and employer. When a firm or employer enters into an agreement with a person or employee to have the person do a specific work in exchange for a specified wage or compensation. Employment partnerships sometimes begin with an offer letter that outlines specific working structure terms and conditions. However, an Employment Agreement is a more comprehensive and detailed contract which enables the employer to learn about what the employee is expecting and to understand how things like salary increases and holidays are being handled. This is why companies and workers are protected via Employment Agreements. Mutual Business Agreement or Joint Venture Agreement: A joint venture is a form of commercial partnership in which two or more parties agree that all their resources must be brought together to achieve a certain objective. The objective might be a task, a new initiative or a business. All the expenditures, revenues and losses connected with a joint venture are accountable to all partners. However, the enterprise itself is entirely different from other companies of the party. Mutual Non Disclosure Agreement: A mutual non-disclosure agreement or a privacy contract is a contract that legally binds and establishes a confidential connection. The person or parties that sign the agreement undertake not to distribute sensitive information with others. Confidentiality agreements represent an important legal framework for protecting sensitive and confidential information against access to that information from the receiver. Companies and companies utilize this document to make sure that the individuals they bargain with do not steal their valuable ideas. Mutual Reciprocal Release or Hold Harmless Agreement: A hold harmless agreement between the parties is a legal agreement that specifies that one party is not accountable for the other for risk. Hold harmless contracts are usually applicable to physical damage or danger. They can either be one-way agreements (also referred to as unilateral agreements) or mutual agreements (known as reciprocal agreements).
How to Make a Mutual Agreement
Whether you are making a mutual agreement between husband and wife, mutual agreement child support letter or a mutual agreement between supplier and buyer, all of which are mutual agreements. All of these may have different formats but they serve the same purpose to bind the parties lawfully. Here are the steps in making a Mutual Agreement.
Step 1: Meeting between with prospective parties
The prospective partnership or agreement will be formalized at a meeting with all the involved parties. The conference shall also serve as an outlet for discussing, opining or reviewing possible terms and circumstances of the agreement. Always ensure a minutes of meetings to capture and record all talks, action plans and negotiations throughout the meeting.
Step 2: Choose a template
Now that the parties have made up their target goals for the agreement. It is now time to look for templates that match them or almost do. Templates aren’t always catered to the specific needs of a certain partnership agreement but they can help in building ideas. Choose from the many mutual agreement sample templates above and edit it or fill it out with the necessary information. Choose the mutual agreement format that you think is serving the purpose clearly. However, if you want to make your own out of nothing, you can proceed to step 3.
Step 3: Start Drafting
Download the templates above and have a look at them. How are they formatted? What are the components? Carefully examine the mutual agreement templates above to have an idea on how to make your own. Writing is a process, particularly when legal documents are created. Practice writing drafts always since it helps you to grow your thoughts and identify improvement areas whenever you change them. Drafting needs to be handled seriously, since it might lead to the presentation or submission of a comprehensive and professional document.
Step 4: Lay down all the terms and conditions
The terms and conditions specified by both parties should be evident from the mutual agreement. All parts and clauses must be included in the formal document, detailing them. The sections must cover the titles, expiry/effectiveness dates, names, recitals, confidentiality clause, force majeure and signature lines of the parties involved. Cover everything in this contract so that both parties are protected and protected should misunderstandings arise.
Step 5: Check errors and do revisions
Go through the document and update it after producing your initial draft. The process of editing entails an examination of the entire material, structure, clarity and style. Present the paper to a legal professional for evaluation after thorough rewriting and editing. Whether you’ve created a job termination form, tenancy/lease terminations, reciprocal divorce agreements, reciprocal privacy agreements, reciprocal arbitration agreements or mutual non-disclosure agreements, seek legal professionals’ advice to help you find ways to produce effective and legal papers.
Step 6: Have the involved parties sign the agreement
Complete all and ensure that no information is omitted. Once the document has ended, mark your appointment calendar and specify the date for the mutual agreement to be executed. Before signing, both parties should reach good and mutual terms. The parties might continue their business to promote and abide by the agreement after establishing a joint partnership or understanding or agreement. The reason why the signatures are put at the last part is to make sure that the person or party reading the agreement has understood it fully, every single page, and has agreed to everything that has been written down.
What if there is a breach of the mutual agreement from the parties involved?
The effect is that legal action will be settled, depending on the type of contract violation. In other words, if there is no first possible agreement between the parties, the problem must be dealt with by the courts. What if a party infringes a contract? If a party infringes a contract, it is susceptible to legal procedures – and often it is. According to law, the guilty party must rectify the violation after the contract has been violated. The major solutions are damages, performance, or cancelation and repayment of contracts. Compensatory damages: The objective of the indemnity is to ensure that the non-breaker is complete as if the violation never occurred.
What is a Mutual Agreement?
A mutual agreement is when two or more individuals establish “agreement” or understanding on a certain subject, problem or issue (also referred to as mutual consent). In contract law, when we remark that there is a “mutual understanding” between the parties or “mutual agreement,” we point out that the parties have come to an agreement which can form the foundation of an oral or written agreement. A mutual agreement is a redundant sentence. Any agreement in essence should be mutual, as it involves two or more persons agreeing on something. Under this definition, a mutual agreement may relate to any legally enforceable contracts when all terms and provisions have been signed and agreed on between parties. The mutual understanding is enforceable by law between two parties. In short, if two persons or business entities enter into a mutual commercial agreement where one party agrees in exchange for a particular price to execute certain responsibilities, and the other party vice versa, the obligations of those parties become legally binding and enforceable.
What are the remedies for the violation of a mutual agreement
Infringement or breach of a mutual contract is subject to two typical remedies: A court may impose monetary damages, or it may order the violator to do the same as they have indicated in the terms of the contract, which are financially compensable to the opposing party. Verbal agreements can be implemented just as written agreements may be implemented, although a written agreement is obviously easier to enforce.
Can any person sign a mutual agreement and make it valid?
No. The ones signing must be people who are capable. You have to know or understand what you do to deem you ‘capable’ of concluding an agreement. Minors and those who are confirmed mentally challenged or ill are typically considered as unable to conclude an agreement since they don’t know what they’re doing. In addition, no enforceable contract may be concluded between people influenced by drugs or alcohol. Both sides shall conclude the deal voluntarily and shall not be compelled to do so. All the parties signing the contract must be at least 18 years old which constitutes legal age and they must be of sound mind.
A Mutual Agreement, like with any other legal contract, helps parties to collaborate better and binds them legally from their duties. Make sure everyone knows what is said here and acts on it. In other words, to ensure that each of the parties’ protection is guaranteed by a quality agreement. A clear, written mutual agreement shows precisely what the parties are, whether they are an individual or a corporation, what the plans are and their positions are and their mutual goals regardless of the time it takes.
|
<urn:uuid:a5f30938-3885-44af-8972-21cd03bc654a>
|
CC-MAIN-2022-40
|
https://www.sample.net/business/contracts/agreement/mutual-agreement/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00523.warc.gz
|
en
| 0.958954
| 2,788
| 3.171875
| 3
|
Written by Liz Lopez
There are rape laws in different countries around the world that have very different punishments for rape. Some have more stringent punishment than others while some countries have punishments for rapists that many would consider draconian.
In India, the Anti Rape bill was passed in April 2013 in an effort to be tougher on crimes against women. The Anti Rape bill included more crimes such as stalking, acid violence, and voyeurism. It also expanded the definition of rape and states that the absence of a physical struggle does not mean consent. However, marital rape is still legal and controversially raised the age of consent from 16 to 18. The bill mandates the death penalty if the victim dies or is left in a vegetative state.
In China, rapists can receive the death penalty. China also repealed a law that created a rape loophole that mandated a more lenient punishment for men who had sex with girls under the age of 14 if they could “prove” that they paid the girl for sex. It now carries a heavy mandatory penalty with the highest being the death penalty.
Saudi Arabia has the toughest punishments for rapists. Saudi Arabia laws are from Sharia law. Rapists can expect a public beheading as punishment. However, rape victims are also punished- a woman who was gang raped in 2006 was sentenced to receive 200 lashes and 6 months jail time because she was found to be “indecent” and spoke to the media.
The Netherlands mandates 4-15 years of prison time for rapists depending on aggravating circumstances such as the victim’s age. The definition of rape is vast and even French kissing someone without consent constitutes rape. The Netherlands is different from the aforementioned countries that any kind of harassment of a sex worker without consent can carry a sentence of 4 years. Other countries are not concerned with the rape of a sex worker. If a rape victim dies as a result of the rape, the prison sentence is 15 years for the rapist.
In North Korea, rape is common for prisoners. Guards frequently rape women that are held in concentration camps and if they are pregnant as a result, they are killed. Rape is also used a as method of torture in camps. It is common for women to get raped by state officials but rape of minors is punished severely.
Around the world, countries have adopted more stringent laws to punish rapists to be tough on crimes against women. Conversely, there are other countries that also blame and punish victims for something that is not their fault.
|
<urn:uuid:9c3455b4-a778-4137-8e88-64eb52a81fd9>
|
CC-MAIN-2019-47
|
http://affinitymagazine.us/2015/12/07/20151207rape-laws-around-the-world/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668765.35/warc/CC-MAIN-20191116204950-20191116232950-00117.warc.gz
|
en
| 0.973942
| 505
| 2.828125
| 3
|
Continence is the ability to keep urine in the bladder and then empty it when necessary. To be continent, the bladder must contract and expel urine only when necessary.
The urethra must be able to keep the urine in the bladder even when there’s increased pressure in the abdomen (such as coughing). These tissues and organs, including the bladder, vagina and uterus, are supported by a pudding basin of muscles called the pelvic floor muscles. Weakening of these muscles or tissues can lead to the involuntary loss of urine called incontinence.
Pregnancy and vaginal delivery can put pressure on the muscles of the pelvic floor and this can stretch and weaken them so they sag. It can happen in women who haven’t delivered vaginally, too. The two main types of incontinence are stress and urge.
If you’re experiencing problems with stress or urge incontinence after the birth of your baby, go back to those useful pregnancy pelvic floor exercises you did throughout your pregnancy. Clench all the muscles from your back passage to your urethra and vagina (as the midwives say, as if you were stopping a bowel movement and the flow of urine and gripping a tampon, all at the same time); hold tightly for a count of six, then relax. Repeat five or six times every hour.
If the incontinence does not improve, mention it at your postnatal check-up or discuss it with your healthcare professional.
|
<urn:uuid:ee1c7729-6dfd-4e57-b2fa-a2b8f8b70bf5>
|
CC-MAIN-2022-05
|
https://www.everymum.ie/pregnancy/health-and-well-being/pregnancy-incontinence/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303868.98/warc/CC-MAIN-20220122164421-20220122194421-00360.warc.gz
|
en
| 0.937761
| 304
| 2.859375
| 3
|
All of the words you listed can be used as verbs, but "hold" and "win" can also be nouns and "swell" can also be an adjective or noun. I don't know what you mean by "principal parts" of the words.
Try constructing sentences with these words yourself and we will correct your grammar as needed.
Wherever I go, I hear people talking on cell phones. The Lakers did not win last night. etc.
After teaching ESL for a few years, I managed to find a way to teach kids to write sentences. Most people simply don't think about this.
Start with the verb. Most people start with the subject when they try to write a sentence then get stuck, but start with the verb.
Once you figured out the verb, ask "Who (verb)?" There's your subject.
Then you can ask (Subject) (Verb) What? (Direct object).
If you need an indirect object, you can ask, "To whom?" or "To what?"
Then you can ask, "When, Why, How, With whom? How often?" or any other question.
Here's an example using one of your words:
Question: Who hears?
Matt hears ... what?
Matt hears the music.
Matt hears music...where?
Matt hears music at home.
Matt hears music at home...why?
Matt hears music at home because his neighbor's stereo is too loud.
I took one word and made an 11 word sentence. My students used to hate getting assigned writing sentences. Now they just don't care if they do.
|
<urn:uuid:c5133842-d59b-4f1b-b5c9-53850ba2f630>
|
CC-MAIN-2015-22
|
http://www.jiskha.com/display.cgi?id=1262073777
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930866.20/warc/CC-MAIN-20150521113210-00139-ip-10-180-206-219.ec2.internal.warc.gz
|
en
| 0.962109
| 339
| 3.25
| 3
|
The mathematics of a growing debt load
Author: David Stonehouse
September 10, 2018
Trade tensions combined with divergent economic growth trends and a looming currency crisis in Turkey have kept a lid on the rise in government bond yields over the past few months, but the ultimate obstacle in the way of significantly higher rates over the longer term remains the growing global debt load.
As discussed in a recent insight, A secular bear in bonds? Not so fast, the maturing cycle in yields may still have another leg up despite the economic headwinds facing investors today. However, as rates climb higher, the cost of borrowing does too, meaning it will eventually become too onerous for people to service their liabilities.
Let’s take the United States as an example. At last count, the country’s total debt was approximately US$65-trillion across the four major borrower categories of government, non-financial corporate, financial corporate and consumer, according to Ned Davis Research data. That equates to a near record leverage ratio of about 3.5-to-1 (down only modestly from a historical peak of 3.75 just after the Great Recession nine years ago) given the country’s current annual GDP of US$20-trillion.
The interest expense on this debt is about US$2-trillion a year based on an average interest rate of 3% that takes into consideration short and long-term government debt, as well as corporate debt and all types of consumer debt from mortgages and auto loans to credit cards that carry much higher borrowing rates.
This US$2-trillion in annual interest expenses represents a sizeable 10% of annual U.S. GDP. While it has not been sufficient to derail the recovery from the Great Recession, it has exerted an obvious drag on growth, resulting in the most anemic rebound in U.S. history, which has averaged just 2.2% annualized growth since 2009.
Global debt is up almost $150 trillion over 15 years
Source: Institute of International Finance as of July 11, 2018
So what happens if interest rates continue to rise from here? An increase in the average interest rate to 5% from 3%, for instance, would add another US$1.3-trillion in interest expenses, which then would total over US$3.3-trillion and account for more than 15% of annual GDP (up from 10% now).
Said differently, a rise in rates of this magnitude would cause a drag on GDP growth that would be difficult for the U.S. economy to absorb if it only continues to grow at its current nominal pace of 4-5%. In this scenario, the US$800-billion to US$1-trillion added to the country’s total annual GDP of US$20-trillion would be completely subsumed by the annual growth in the country’s debt.
Exacerbating matters, borrowers will eventually be unable to service the increase in their interest expenses, and at some point creditors will stop earning income from loans that borrowers can’t pay back.
Not all of this happens right away, of course. A good deal of the debt outstanding is based on fixed rates, and so higher rates today won’t have an impact on some borrowers until they are required to refinance sometime in the future.
Even so, debt levels are probably too high for the U.S. economy to withstand if rates move too much, too quickly, resulting in a growing wave of defaults. Instead, economic growth would almost certainly slow, leading to a potential recession that inevitably forces the U.S. Federal Reserve (and bond market) to push rates back down again.
And this may only be half the battle. On top of the US$65 trillion in debt, the U.S. economy must also account for another US$60 to US$70 trillion in unfunded liabilities from entitlement programs like social security and Medicare that are starting to come due as the baby boom generation begins to retire.
Nor is the U.S. alone in this situation. Global debt levels are rapidly approaching US$250-trillion as compared to global GDP near US$80-trillion, resulting in a similar mathematical outlook for the rest of the world. As a consequence, we believe there’s limited scope for interest rates to rising significantly higher from here.
David Stonehouse is a senior vice president and portfolio manager at AGF Investments Inc. He is a regular contributor to AGF Perspectives.
Commentaries contained herein are provided as a general source of information based on information available as of August 28, 2018 and should not be considered as personal investment advice or an offer or solicitation to buy and/or sell securities. Every effort has been made to ensure accuracy in these commentaries at the time of publication; however, accuracy cannot be guaranteed. Market conditions may change and the manager accepts no responsibility for individual investment decisions arising from the use of or reliance on the information contained herein. Investors are expected to obtain professional investment advice.
AGF Investments is a group of wholly owned subsidiaries of AGF Management Limited, a Canadian reporting issuer. The subsidiaries included in AGF Investments are AGF Investments Inc. (AGFI), Highstreet Asset Management Inc. (Highstreet), AGF Investments America Inc. (AGFA), AGF Asset Management (Asia) Limited (AGF AM Asia) and AGF International Advisors Company Limited (AGFIA). AGFA is a registered advisor in the U.S. AGFI and Highstreet are registered as portfolio managers across Canadian securities commissions. AGFIA is regulated by the Central Bank of Ireland and registered with the Australian Securities & Investments Commission. AGF AM Asia is registered as a portfolio manager in Singapore. The subsidiaries that form AGF Investments manage a variety of mandates comprised of equity, fixed income and balanced assets.
About AGF Management Limited
Founded in 1957, AGF Management Limited (AGF) is an independent and globally diverse asset management firm. AGF brings a disciplined approach to delivering excellence in investment management through its fundamental, quantitative, alternative and high-net-worth businesses focused on providing an exceptional client experience. AGF’s suite of investment solutions extends globally to a wide range of clients, from financial advisors and individual investors to institutional investors including pension plans, corporate plans, sovereign wealth funds and endowments and foundations.
For further information, please visit AGF.com.
© 2019 AGF Management Limited. All rights reserved.
|
<urn:uuid:c4ad5747-c971-4c6b-aa2a-32f24c2fd4d7>
|
CC-MAIN-2019-26
|
https://perspectives.agf.com/the-mathematics-of-a-growing-debt-load/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998605.33/warc/CC-MAIN-20190618023245-20190618045245-00265.warc.gz
|
en
| 0.949335
| 1,337
| 2.625
| 3
|
About a year ago, my computer started acting funny. It would freeze up, applications would randomly crash, and I even got a BSOD (Blue Screen of Death) or two. After a few hours of suffering through this erratic behavior, I realized it might be due to my CPU overheating. That's when I quickly downloaded and installed Core Temp (free).
Upon running Core Temp, my suspicions were instantly confirmed: My processor was running at a sizzling 80-85° Celsius (158° Fahrenheit)--still below its maximum rating, but only just. It took less than five minutes from the moment I decided I need to know my processor's temperature until I had Core Temp set up and running.
I have a dual core CPU, and Core Temp showed me the temperature of each core separately. Surprisingly, there can be difference of one or two degrees between cores, even though they're both on the same chip. It's hard to imagine this being significant, but it's nice to know you can track each core separately.
Just above the temperature listing, Core Temp lists a value labeled "Tj. Max," with no explanation. I found this part confusing at first, but once I Googled it, I discovered it stands for "junction temperature max," which is electronics-speak for the highest temperature the CPU is rated for (90° C / 194° F in my case). You can use this value to see at a glance how hot the processor really is, relative to its maximum. But just because your processor is 10 degrees under the maximum doesn't mean you're safe. The Core Temp FAQ states that the temperature should be kept around 20° C/68° F or lower below its Tj. Max. value while under full load.
You can leave Core Temp running in the background and go about your business using the computer, maybe doing something CPU intensive. Once you switch back to the application, you would be able to see the highest temperature your processor reached in the meantime. Although temperatures display in Celsius at default settings, you can easily configure Core Temp to display the temperature using Fahrenheit.
If you're running Windows Vista or 7, one thing you should note is that Core Temp requires administrative privileges to run. The Core Temp FAQ (question 11) explains that this is because Core Temp requires direct access to the hardware for reading the temperature and related information.
Speaking of Windows 7, CoreTemp can cleverly use the Windows 7 taskbar to show the processor temperature, frequency or load. It does this by turning its icon into a progress bar, filling it with color from left to right. For example, if the icon is half-full, that means you're at 50% CPU utilization.
After replacing the heat sink and CPU cooler for my processor, I got it from around 70-80C down to 30-45C, and the computer started behaving normally again. CoreTemp helped me save my computer and avoid an unnecessary and costly upgrade to a whole new system.
|
<urn:uuid:d8044f11-15c4-48b0-a8cf-add70a20df58>
|
CC-MAIN-2018-39
|
https://www.pcworld.com/article/231430/Core_Temp.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156305.13/warc/CC-MAIN-20180919200547-20180919220547-00358.warc.gz
|
en
| 0.948122
| 610
| 2.8125
| 3
|
Termites cause DAMAGE!
24/7/365 Termites work all day everyday and all for the colony and Queen. A few facts:
1. Termite consume and recycle decaying cellulose helping soil.
2. Termites are blind.
3. Reproductives or Alates fly out and begin new colonies.
4. Ants are really the biggest predator against the termites (unless you count ProBest Pest Management).
5. Termites cause around 5 Billion dollars of damage each year in the U.S.
|
<urn:uuid:092cb84e-c771-4a3a-b19f-3f075fb5ff89>
|
CC-MAIN-2016-22
|
https://callprobest.com/2012/09/termites-cause-damage/?wpmp_switcher=mobile
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464056639771.99/warc/CC-MAIN-20160524022359-00198-ip-10-185-217-139.ec2.internal.warc.gz
|
en
| 0.819352
| 112
| 2.9375
| 3
|
Thin section preparation for geology.
Thin sections used for petrological and mineralogical observations are made in different sizes and using different techniques for curing, polishing and staining. Our products are made by experienced cutters, using only the finest grinding powders, adhesives, and diamonds. In addition, mineralogical preparations can sink in aluminum rings or ankle carry rocks. Preparations are dedicated to the study of mineralogical, petrological or fluid inclusion. The waiting period is dependent on the quantity ordered preparations. We invite you to cooperation.
We also provide petrographic and mineralogical analysis made preparations. We make observations using a high-quality optical microscope in polarized light. For petrological and mineralogical descriptions we include photographic documentation. We also have excellent access to analytical equipment in the field of X-ray microprobe analysis (EPMA and EDS), the qualitative and quantitative analysis we include photographic documentation made in BSE. We invite you to cooperation.
In optical mineralogy and petrography, a thin section is a laboratory preparation of a rock, mineral, soil, pottery, bones, even metal sample for use with a polarizing petrographic microscope, electron microscope and electron microprobe. A thin sliver of rock is cut from the sample with a diamond saw and ground optically flat. It is then mounted on a glass slide and then ground smooth using progressively finer abrasive grit until the sample is only 30 μm thick. The method involved using the Michel-Lévy interference colour chart. Typically quartz is used as the gauge to determine thickness as it is one of the most abundant minerals.
When placed between two polarizing filters set at right angles to each other, the optical properties of the minerals in the thin section alter the colour and intensity of the light as seen by the viewer. As different minerals have different optical properties, most rock forming minerals can be easily identified.
|
<urn:uuid:b75660f1-6918-4067-a3a1-871aa4629ba3>
|
CC-MAIN-2016-07
|
http://thin-section-preparation.com/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701151880.99/warc/CC-MAIN-20160205193911-00200-ip-10-236-182-209.ec2.internal.warc.gz
|
en
| 0.910267
| 391
| 2.984375
| 3
|
from The American Heritage® Dictionary of the English Language, 4th Edition
- n. Fermentation.
from Wiktionary, Creative Commons Attribution/Share-Alike License
- n. The action of enzymes in breaking down organic substances during fermentation
from the GNU version of the Collaborative International Dictionary of English
- n. The action of enzymes, such as digestion or fermentation; also, the changes produced by such action.
from The Century Dictionary and Cyclopedia
- n. Digestion by means of the non-organized ferments.
- n. Same as zymosis, 1.
from WordNet 3.0 Copyright 2006 by Princeton University. All rights reserved.
- n. a process in which an agent causes an organic substance to break down into simpler substances; especially, the anaerobic breakdown of sugar into alcohol
Along numb manchester britannia hotel and a puritanically zymolysis of gigs, the woozy was groundcover up and arales regularly, and the yukawa vinegarishness glossina.
|
<urn:uuid:0673a901-1319-47e4-b8a6-ed1e5d7eb6f1>
|
CC-MAIN-2016-50
|
https://www.wordnik.com/words/zymolysis
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542680.76/warc/CC-MAIN-20161202170902-00108-ip-10-31-129-80.ec2.internal.warc.gz
|
en
| 0.808794
| 219
| 2.65625
| 3
|
Definition of 'Inflation' The rate at which the general level of prices for goods and services is rising, and, subsequently, purchasing power is falling. Central banks attempt to stop severe inflation, along with severe deflation, in an attempt to keep the excessive growth of prices to a minimum. Example, why something that cost a dollar in 1980 costs $2.37 in 2005-www.investinganswers.comwww.investopedia.com
Bank of Japan to mull 2% inflation target as ABE turns up heat- Bank of Japan is considering adopting a 2% inflation target and ease the monetary policy.
LA Times- $1-million man march
Baseball players salary face hyperinlfation as their salaries soar to outraegeous numbers, outpacing the normal inflation rate.
USA Today- Inflation measure could help 'fiscal cliff'
Budget talks between the White House and Congress are involving changing the way inflation is calculated to slow the costs of entitlement programs like Social Security. Over many years, the government could save billions of dollars by reducing the amount of money paid to the recipients by using the new proposed chained consumer price index formula.
|
<urn:uuid:93a19f27-6dd3-444c-89ef-5089c39747c3>
|
CC-MAIN-2017-26
|
https://tackk.com/m75b14
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320593.91/warc/CC-MAIN-20170625221343-20170626001343-00272.warc.gz
|
en
| 0.942757
| 239
| 3.15625
| 3
|
Structural Biochemistry/Cell Signaling Pathways/Problems in Signaling that cause Cancer
Cancer can occur in many different ways. The overall idea of cancer is that a cell grows and divides erratically on its own, even without a cell signal, resulting in uncontrolled cell growth. The cell cannot die either, causing a build up of excess cells in a certain area c. Such an excess cells is known as a tumor. Cancer is due to multiple cell signaling breakdown. Uncontrolled cell communication also leads to the incorporation of the blood vessels to grow into the tumor, taking up a majority of the nutrients and causing the tumor to grow even larger. More cell signaling allows the cancerous cells to move to other parts of the body. Many mechanisms maintain healthy cell growth. External signals direct cell division, cell-to-cell signaling occurs, and enzymes can repair damaged DNA. Apoptosis is programmed cell death, which is needed to maintain the shape of the organism. When a cell is not repairable, it signals its own death.
When cell communication breaks down, uncontrolled cell growth can occur and often lead to cancer. Cancer often begins when a cell gains the ability to grow and divide even in the absence of a signal from the environment. Ordinarily, the unregulated growth triggers a signal for self destruction, otherwise known as apoptosis. However, when a cell also loses the ability to respond to self-destruct signals, the cell divides uncontrollably and, consequently, forms a tumor.
Overview of the Signal Transduction Pathway
The signal transduction pathway is a chain of events that converts the message of a molecule present in the extracellular environment to a physiological response.
The signal transduction pathway is illustrative of a molecular circuit.
- Primary messenger release is triggered by a stimulus such as a wound or food.
- The primary messenger, also referred to as a ligand, is received by a receptor, forming a receptor-ligand complex. Proteins that span the cell membrane act as receptors that bind the ligands, transmitting extracellular information from the environment to the cell's interior.
- Smaller molecules inside the cell known as secondary messengers relay the information from the protein receptor. Examples of secondary messengers are GMP and calcium ion. Some undesired effects of secondary molecules are the freedom of secondary messengers to diffuse within the cell, which then influences other process within the cell. "Cross talk" alters the concentration of common secondary messengers when multiple receptor signals are processed, and a single activated receptor can yield a large intracellular response through the activation of a generation of secondary messengers.
- The effect of the signaling pathway is to activate or inhibit pumps, enzymes and gene transcription factors, all of which produce physiological changes.
- Termination of the signal is crucial after the response is completed. The signaling process must be terminated or the cell loses responsiveness to new and important signals. One such signal is the signal to self-destruct, which prevents undesirable effects such as uncontrollable cell division and growth.
Cancers Caused by Viruses
Cancer is characterized by inappropriate cell growth, which is associated with defects in signaling pathway of proteins.
The study of cancers caused by viruses has greatly helped the understanding of signal transduction proteins and pathways.
An example of a virus that causes a type of cancer is Rous Sarcoma Virus. The Rous Sarcoma Virus is a retrovirus that causes sarcoma, a cancer of tissues of mesodermal origin such as muscle or connective tissue. The sarcoma virus carries a gene referred to as v-Src and is an oncogene which means that the gene causes a generation of cancer-like characteristics in cell types.
The v-Src gene is similar to a proto-oncogene referred to as the c-Src gene that encodes for a signal transduction that regulates cell growth. The difference between the v-Src gene and the c-Src gene that causes cancer is the substitution of a completely different set of 11 amino acids that lack the key tyrosine residue that is phosphorylated to inactivate the c-Src cell growth signal. Therefore, v-Src is always active. Small differences in the amino acid sequences between the proteins encoded are responsible for the product "oncogene" being swetched into the "on" position. The encoding proteins that are responsible are called protooncogene and oncogene.
Overexpression of Receptors
Tumors are usually caused by commonly mutated genes. An example is the gene encoding for Ras protein which is mutated so that it loses the ability to hydrolyze GTP, keeping the Ras protein to stimulate continuous cell growth.
Overexpressed receptors also lead to tumors. For example EGFR, epidermal growth factor receptor, in human epithelial cancers such as breast and ovarian cancer. The overexpression of the receptor increases the likelihood that a grow and divide signal is sent to the cell. In breast cancer, Her2 may be overexpressed and is breast cancer patients are now being offered testing for this EFGR family member that may stimulate cell proliferation during overexpression.
Apoptosis occurs when a cell is damaged beyond repair, infected with a virus, or undergoing stressful conditions such as starvation. Damage to DNA from ionizing radiation or toxic chemicals can also induce apoptosis via the actions of the tumor-suppressing gene p53. The "decision" for apoptosis can come from the cell itself, from the surrounding tissue, or from a cell that is part of the immune system. In these cases apoptosis functions to remove the damaged cell, preventing it from sapping further nutrients from the organism, or halting further spread of viral infection. In addition to its importance as a biological phenomenon, defective apoptotic processes have been implicated in an extensive variety of diseases. Excessive apoptosis causes hypotrophy, such as in ischemic damage, whereas an insufficient amount results in uncontrolled cell proliferation, such as cancer.Scientists believe that too much apoptosis is at least partly to blame for some neurodegenerative diseases, such as Alzheimer’s, Parkinson’s, and Lou Gehrig’s. On the other hand, unchecked mitosis can lead to cancer. In treating some cancers radiation and chemicals are used to induce apoptosis to stop the continual growth of cancerous cells. Apoptosis is nevertheless necessary for proper healthy development and needed to destroy cells that threaten the organism. Apoptosis works as a balance to mitosis to keep us healthy for example,our skin and hair cells are renewed via a continuous cycle of apoptosis and mitosis.
In apoptosis the cell shrinks and pulls away from its neighbor. Apoptosis causes the cells develop bubble like beads on their surface. The DNA in the nucleus condenses and breaks into regular sized fragments, and soon the nucleus itself,followed by the entire cell, disintegrates. The chromatin in the cell begins to degrade and mitochondria break down with the release of cytochrome c.
Some viruses associated with cancers use tricks to prevent apoptosis of the that they have transformed. Several human papilloma viruses(HPV) have been implicated in causing cervical cancer. One of them produces a E6 protein that binds and inactivates the apoptosis promoter p53. Mutations in the p53 gene are often found in cancer cells where apoptosis is not promoted to begin. Some viruses such as a type causing common colds make proteins mimic the off switch of cellular apoptosis fooling cells. Other viruses such as HIV have an enzyme that can disable a key component of the pathway, bringing the death march to a screeching halt.
Apoptosis Inducing Factor: Apoptosis Inducing Factor (AIF) is a protein that triggers chromatin condensation and DNA degradation in a cell in order to induce programmed cell death. The mitochondrial AIF protein was found to be a capasase-independent death effector that can allow independent nuclei to undergo apoptotic changes. The process triggering apoptosis starts when the mitochondria releases AIF, which exits through the mitochondrial membrane, enters the cytosol, and finally ends up in the cell nucleus where it signals the cell to condense its chromosomes and fragment its DNA molecules in order to prepare for cell death. Recently, researchers have discovered that AIF is in fact dependent upon the type of cell, the apoptotic insult, and its DNA binding ability. AIF also plays a significant role in the mitochondrial respiratory chain as well as in metabolic redox reactions.
Synthesis of AIF:
The AIF protein is located across 16 exons on the X chromosome in humans. AIF1 (the most abundant type of AIF) is translated in the cytosol and is sent in the direction of the mitochondrial membrane and the intermembrane space by the C-terminus of an MLS protein. AIF is transported with the assistance of its bipartite N-terminal MLS protein into the inner and outer mitochondrial membrane enzymes to allow it to enter the organelle. Inside the mitochondria, AIF folds into its functional configuration by the help of the co-factor, flavin adenine dinucleotide (FAD). A protein called Scythe, which is used to regulate organogenesis, can increase the AIF lifetime in the cell. As a result, decreased amounts of Scythe lead to a quicker fragmentation of AIF. The x-linked inhibitor of apoptosis (XIAP) has the power to influence the half-life of AIF along with Scythe. Together, the two do not affect the AIF attached to the inner mitochondrial membrane, however they influence the stability of AIF once it exits the mitochondria.
Role of AIF in Mitochondria:
Researchers believed that if a recombinant version of AIF lacks the first 120 amino acids of the AIF protein, then AIF would function as an NADH and NADPH oxidase. They discovered however, that recombinant AIF that do not have the last 100 N-terminal amino acids have limited NADP and NADPH oxidase activity. Therefore, researchers concluded that the AIF N-terminus may function in interactions with other proteins or control AIF redox reactions and substrate specificity.
AIF Respiratory Chain Complex I:
Mutations of AIF due to deletions have stimulated the creation of the mouse model of complex I deficiency. Complex I deficiency is the reason behind over thirty percent of human mitochondrial diseases. For example, complex I mitochondriopathies mostly affect infants by causing symptoms such as seizures, blindness, deafness, etc. These AIF-deficient mouse models are important for fixing complex I deficiencies. The identification of AIF-interacting proteins in the inner mitochondrial membrane and intermembrane space will help researchers identify the mechanism of the signaling pathway that monitors the function of AIF in the mitochondria.
Unlike apoptosis necrosis is the premature death of cells and living tissue. Necrosis is often caused by external factors, such as infection, toxins or trauma. During necrosis, the cell’s outer membrane loses its ability to control the flow of liquid into and out of the cell. Necrosis is a form of traumatic cell death that results from acute cellular injury. Apoptosis in contrast to necrosis, confers advantages during an organism's life cycle. For instance during the development of the fetus in the mother, the differentiation of fingers and toes occurs because cells between the fingers apoptose with the end result that the digits are separate. Approximately between 50 billion and 70 billion cells die each day due to apoptosis in the average human adult. In a year, this amounts to the proliferation and subsequent destruction of a mass of cells equal to an individual's body weight. Apoptosis differentiates from necrosis as the processes associated with apoptosis in disposal of cellular debris do not damage the organism in apoptosis.
http://learn.genetics.utah.edu/content/begin/cells/badcom/ http://www.wentek.com/jean/research.htm Biochemistry, Sixth Edition. Authors: Jeremy M. Berg, John L Tymoczko, Lubert Stryer http://apoptosisinfo.com/ Inside the Cell. US Department of Health and Human Resources and the National Institute of General Medical Sciences.
Trends Biochem Sci. 2010 May;35(5):278-87. Epub 2010 Feb 6. Life with or without AIF. Hangen E, Blomgren K, Bénit P, Kroemer G, Modjtahedi N. INSERM U848, 94805 Villejuif Cedex, France.
|
<urn:uuid:43cec80e-122b-44b8-b414-f34ae2bdb1f5>
|
CC-MAIN-2018-05
|
https://en.wikibooks.org/wiki/Structural_Biochemistry/Cell_Signaling_Pathways/Problems_in_Signaling_that_cause_Cancer
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890187.52/warc/CC-MAIN-20180121040927-20180121060927-00762.warc.gz
|
en
| 0.93632
| 2,622
| 3.71875
| 4
|
Reusing content lets you reduce content development costs while simultaneously improving the quality of the information. Everyone is familiar with basic reuse—copying and pasting from one document to another. But copying and pasting creates disconnected copies, which then must be updated separately (or recopied after an update). If an organization needs to reuse more than a small amount of content, a better strategy is needed.
- Linked content, where one copy of the information is referenced in multiple locations. For example, a basic topic, “What is a relational database?” might appear in the introductory materials for numerous information products created by a database company. Instead of copying and pasting, the information is stored in a single location, and all of the information products point to the same topic. Reused graphics are nearly always linked.
- Common or boilerplate content, such as copyright pages or warnings. A standard warning (WARNING: Choking hazard) must use identical wording throughout all information products, so it makes sense to provide it in a central location—and restrict changes.
- Reuse across mixed content types, where information is used in different formats (and even departments). For example, a mobile phone manufacturer might have a database of user interface strings (such as Call or Send or their translated equivalents) that are used to build mobile phone software menus. The technical content group could also access this database to insert UI strings into their content. When (not if) the UI designers change the interface labels, the technical content changes with them. Another example of mixed content is the creation of a database for software error messages, which are then delivered both inside the software and in a reference document.
- Reuse across departments, such as technical training and technical communication. The challenges in this area are tied less to technology and more to people. For instance, it is quite common for technical training groups to use technical content as a foundation for classroom training or e-learning materials. They insist, though, that the information needs to be rewritten to meet their requirements. A better strategy is to write content that both groups can use efficiently, but this requires close collaboration and mutual respect.
Reusing information is a powerful way to reduce the overall cost of publishing customized content. Many content strategy projects are justified based on cost reductions via reuse. Effective reuse also drives down the cost of localization because it reduces the total amount of unique content.
|
<urn:uuid:7b524082-b7bf-4e31-8cd1-98b305416914>
|
CC-MAIN-2018-05
|
http://contentstrategy101.com/contents/developing/assessing-the-situation/content-reuse/?replytocom=161334
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891316.80/warc/CC-MAIN-20180122113633-20180122133633-00303.warc.gz
|
en
| 0.91509
| 488
| 3.3125
| 3
|
Few of us have any conception of the enormous timescales of our planet’s long history. Geology professor and Fulbright Scholar Marcia Bjornerud steps onto Town Hall’s stage to outline the ways in which our everyday lives are shaped by processes that vastly predate us—and in turn, how our habits will have consequences that will outlast us by generations. With insight from her book Timefulness: How Thinking Like a Geologist Can Help Save the World she reveals how knowing the rhythms of Earth’s deep past and conceiving of time as a geologist can give us the perspective we need for creating a more sustainable future. Join Bjornerud for a literal history of the world, and a treatise for building a more time-literate and ecologically considerate society.
Presented by Town Hall Seattle
|
<urn:uuid:f1b4715b-3bdd-4f3b-b6ca-c1c073e30d7a>
|
CC-MAIN-2019-09
|
https://townhallseattle.org/event/marcia-bjornerud/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247480472.38/warc/CC-MAIN-20190216125709-20190216151709-00415.warc.gz
|
en
| 0.918013
| 173
| 3
| 3
|
The traditional 3D printers used the regular horizontal surfaces to print objects on. But how cool would it be to have a 3D printer that can take away the surface dependency? Basically that means you can virtually print 3D objects anywhere in the air!
This is what the new 3D robotic printer called “Mataerial” can achieve. It’s unique characteristic is to allow users to print 3D objects in the air extending from any surface. It uses the principles of Anti-gravity object modeling and does not require any supporting structures to print objects in air.
This unique method enables users to print natural objects by using 3D curves in free motion.
The material that comes out of the nozzle is already solidified due to a chemical reaction between two source components.
Users can play around with different sizes and shapes giving them good flexibility to print such objects without using any particular surface.
This is a collaborative effort of Petr Novikov, Sasa Jokic and Joris Laarman studio.
Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.
Join us every Wednesday night at 8pm ET for Ask an Engineer!
Learn resistor values with Mho’s Resistance or get the best electronics calculator for engineers “Circuit Playground” – Adafruit’s Apps!
Sorry, the comment form is closed at this time.
|
<urn:uuid:9daea92f-aeec-4d50-9a4c-4a8c860420c6>
|
CC-MAIN-2015-32
|
https://blog.adafruit.com/2013/05/23/create-3d-printed-objects-in-air-3dthursday/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042986625.58/warc/CC-MAIN-20150728002306-00306-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.892925
| 302
| 3
| 3
|
There are basic body needs that maximize the function and efficiency of our immune system. According to Dictionary.com, the immune system is “a diffuse, complex network of interacting cells, cell products, and other cell forming tissues that protect the body from pathogens and other foreign substances, destroys infected and malignant cells, and removes cellular debris.” As human beings, we need fresh air, pure water, energizing food, rejuvenating sleep, beneficial exercise, and a stress-free healthy thought process to keep our immune system functioning at its best.
We all know that air is necessary for life and research shows that spending time in nature surrounded by fresh air can increase energy. “Nature is food for the soul” says Richard Ryan, researcher and professor of psychology at the University of Rochester.
Henry David Thoreau said, “I believe that water is the only drink for a wise man.” Audrey Hepburn commented that “Water is life, and clean water means health.” Our body is made up of 75% water and it helps to regulate all of our bodily functions. Water is the main source of electrical and magnetic energy transport that supplies the power of life to every cell in the body. This explains why water is often referred to as “life”.
It’s possible to eat 3 meals a day (plus snacks) and still have a body that is starving for food. When we feed our bodies highly processed foods, there are no nutrients that the body can utilize as energy. This leads to the body asking for more and more energizing food until it finally ingests something that can be absorbed and used as fuel.
Many feel that sleep is a waste of time and those hours could be better spent increasing productivity. However, obtaining proper quality and quantity of sleep plays a major role in our physical and mental health. Among other things, the body heals and repairs itself as it sleeps and works on maintaining healthy hormone balances and insulin levels.
When it comes to exercise, we are all aware of the many benefits it provides. According to Henry David Thoreau, “An early-morning walk is a blessing for the whole day.” One of the main benefits is that exercise helps to reduce stress and clears the mind leading to a healthier perspective on life. The main motivator is to find the type of movement that works best for you.
A healthy mind leads to a healthy body. Positive thoughts and drowning out the negative chatter in our brains are good places to start in reducing stress. By tuning into our bodies and slowing down, we can begin to understand how stress affects us. Deep breathing, daily meditation, and being present in the moment are all very effective ways to reduce stress in our busy demanding lives.
As an early risk assessment tool, adding thermography to a yearly health routine can provide peace of mind. We all have physical, mental, emotional, and spiritual needs that must be met in order to lead a happy, healthy, and fulfilled life. By taking one step at a time, it is doable without making us feel like we’re on overload.
|
<urn:uuid:4888fe2e-b9cf-4e8b-ac16-311d1681e5e9>
|
CC-MAIN-2023-14
|
https://www.memphisthermography.com/blog/category/reducing-stress
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950247.65/warc/CC-MAIN-20230401191131-20230401221131-00028.warc.gz
|
en
| 0.95734
| 639
| 3.03125
| 3
|
Additional Inquiry Resources
Free Inquiry-based Instruction Resource: WISE
WISE is a simple learning environment where students examine real-world evidence and analyze current scientific controversies. Curriculum projects are designed for grades 5-12. Students do most WISE activities on a computer, using a web browser. WISE (in this free online software environment) provides tools for data visualization, causal modeling, simulations, and assessment.
Free Educational Resources
More than thirty federal agencies formed a working group in 1997 to make hundreds of federally supported teaching and learning resources easier to find.
Women Are Scientists
Several free DVDs that profile women scientists are available upon request from the National Institutes of Health. The "Women Are Scientists" series showcases successful female scientists in their respective specialties, and inform students about educational requirements, rewards, and challenges of careers in the biomedical sciences. This series is designed to motivate students to take more challenging advanced science and math courses and to enable them to successfully direct their own career paths.
Math/Science Nucleus has developed electronic slideshows that transform scientific subjects into pictorials. The templates can be used to teach science and math concepts to children and adults.
Dragonfly TV offers podcasts, interactive games, lessons, and activities designed for elementary students.
Exploritorius: Science Snacks by Subject
The website includes a diverse selection of “Science Snacks” to involve students in grades K-12 in hand-on activities, webcasts, and science news.
Frank Potters Science Gems
Frank Potters Science Gems include content-specific lesson plans, experiments, and activities for students in grades K-12. There are images, slide shows, and additional links to educational resources.
Middle School Science Lesson Plans
This site provides a searchable database of lesson plans and activities for students in grades 5-8.
Science and Mathematics Initiative for Learning Enhancement (SMILE)
The Science and Mathematics Initiative for Learning Enhancement
The SMILE program is designed to enhance the elementary and high school learning of Science and Mathematics through the use of the phenomenological approach.
Good ideas for Lab safety, contact numbers for FREE Reference Manual.
BIGChalk.com-The Education Network
All sorts of stuff for the up-to-date educator!
This site by a former NASA scientist profiles extremes in the natural and animal worlds as well as the scientists who study such phenomena.
Science Fair Central
This site is designed to encourage interest and participation in science fair competitions across the country.
Discovery Channel School
Lesson plans, discussions and lots more on this site.
Project 2061's materials are available on this site as well as ratings for various curriculum materials.
Mineral Information Institute
FREE teaching materials including lesson plans, poster packets, even a FREE Periodic chart!
Free and Nearly Free Stuff
This site from the World Links for Development Program offers information that is free or nearly free for schools.
FREE Federal Resources for Educational Excellence
New science education activities listed on the US Department of Education website.
The Gateway to Educational Materials (GEM)
Announced by U.S. Secretary of Education, Richard Riley, this is a site designed for teachers to type a topic, grade level, and other information into a search screen that then retrieves -from more than 140 websites- lessons, instructional units, and other freeeducational materials on that topic for that grade level.
The Lab Safety Workshop
Site dedicated to making health and safety an integral and important part of science education.
Free copies of Lab Safety Guidelines available on request.
Mississippi Alliance for Gaining New Opportunities through Library Information Access, a collection of databases for elementary children to adults.
Scientific American Frontiers
PBS science series hosted by Alan Alda that shares the newest discoveries of real-life scientists.
Scientific American Online
Past and current articles from this periodical available on-line.
National Science Teachers Association
Offers visitors a wealth of information about the organization itself, programs, convention information and dates, publications, awards, and competitions.
Museum of Science in Boston
Offers resources for local and global communities, including a series of scanning electron micrographs.
National Science Foundation WWW Server
The National Science Foundation World Wide Web Server has lots of resources and reference materials for science education. The site is designed to quickly guide viewers to information in grant and research opportunities, science trends, statistical information, news and media reports, science education, and international activities.
Smithsonian's National Zoological Park
Why wait to go to Washington D.C. to visit our National Zoo?? Discover the excitement of a field trip to the zoo without the lines, spilled drinks and sore feet!
The Franklin Institute
Visit the publications library, where you'll find other science news, activities, and resources. Use their units of study to support your science curriculum. Sample some interesting science programs and demonstrations. Wander through the museum. It's not quite the real thing, but a visit to this online museum should satisfy your yearning for learning about science.
The Exploratorium Science Snacks
Pages full of snacks - but not the kind you eat! Minature versions of some of the most popular exhibits at the Exploratorium.
Exploratorium Home Page
In this virtual Exploratorium, visitors can discover the wonder of genetics and DNA coding first-hand from a throng of mutant fruit flies. Site visitors will find plenty of suggestions for putting together their own experiments and exhibits at home with excerpts from two Exploratorium books, Hands-On Science and The Science Snackbook.
National Air and Space Museum
A very informative web site from the Smithsonian Institution. Information about the exhibition galleries and a calendar of events, along with a "clickable" floor map of the whole building make these pages invaluable to those who are planning to visit the museum and great pictures from the museum make this an interesting site for "armchair" travelers.
Project Learning Tree
This is their national home page. Site visitors will find sample activities, a calender of events, and PLT's curriculum.
National Science Resources Center
Operated jointly by the Smithsonian Institution and the National Academy of Sciences.
A "one stop site" for searching legislation on any topic!
Designed specifically for teachers, parents and Liberians, Science NetLinks is a detailed guide to the best science resources on the internet.
The John F. Kennedy Center at Vanderbilt University
Research and information on what the Kennedy Center is doing to prevent and treat disabilities.
The Annenberg/CPB Channel
Information about the mathematics and science network.
The Science Daily
A free online science newsletter that touches on the latest information in every field of science in a classroom-friendly style.
Insurance Institute for Highway Safety
Source for educational videos dealing with physics and car crashes. Find out about safety facts, news release and more.
|
<urn:uuid:6b8048c9-f71c-46b5-83dd-7a23219af6bf>
|
CC-MAIN-2015-11
|
http://www.mde.k12.ms.us/OCI/science/additional-inquiry-resources
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936465487.60/warc/CC-MAIN-20150226074105-00197-ip-10-28-5-156.ec2.internal.warc.gz
|
en
| 0.840783
| 1,421
| 4.21875
| 4
|
Methadone was originally developed by the Nazis during World War II. When the supply of opium was cut off, Nazi addicts like Hermann Goering (Commander in Chief of the Luftwaffe and Hitler's designated successor) wanted to avoid the possibility of withdrawal. He instructed the German drug companies to produce a wholly synthetic opiate that didn't need to rely on the poppy. The chemists came up with a drug that not only worked, but also lasted a long time. As a result, Methadone has become the drug of choice for doctors who are trying to help users manage their opiate dependency. Heroin wears off after a couple of hours, thus requiring several hits each day. Methadone, on the other hand, lasts anywhere between 24 and 72 hours, depending on the dose that you take and on your individual metabolism.
The first pharmacological studies of methadone were performed by 1946 at which time the compound was found to be a potent narcotic analgesic. Methadone was approved for use in controlling severe pain. In 1963 methadone was introduced as an experimental drug for the treatment of heroin dependence. The drug-known variously as methadone, dolophine, amidone, physeptone, miadone, butalgin, diadone, and polamidone-bears only a remote stereochemical resemblance to morphine; yet its pharmacological properties are qualitatively similar to those of the natural alkaloid. Methadone itself has considerable abuse potential and is classified as a DEA Schedule II controlled substance.
Methadone has several different apperarances: Liquid mixture, orange, yellow, green or clear; Tablets; Ampoules for injection. When pharmaceutically pure, methadone comes in a variety of strengths. Methadone Mixture most frequently is mixed at 1mg/ml (i.e. 1mg methadone hydrochloride in 1ml of liquid). Methadone Mixture is designed to be taken orally; it is mixed with an irritant to deter injecting. Tablets are also designed to be taken orally. However some users grind up tablets and inject them. Concentrated 50mg/ml are not intended for intravenous use, and are actually intended for subcutaneous or intramuscular use.
- Tablets: 5mg tablets.
- Ampoules: Ampoules are usually mixed at strength of 10mg/ml. They come in the following sizes: 1ml (10mg)
- 2ml (20mg)
- 3.5ml (35mg)
- 5ml (50 mg)
- Also available are concentrated ampoules, containing 50mg/ml.
Methadone is usually administered orally and as such is rapidly absorbed. Methadone is metabolized primarily in the liver by demethylation and subsequent cyclization to form 2-Ethylidene-1,5-dimethyl-3,3-diphenylpyrrolidine (EDDP). This cyclization process yields a primary metabolite molecule quite distinct from the parent molecule. The elimination half-life of a 15mg dose is approximately 14 hours. Methadone and metabolites are primarily excreted in the feces. Unmetabolized methadone excretion in the urine accounts for less than 11% of the administered dose. Following a single dose, the metabolite concentration in urine is approximately one half the unchanged concentration.
When you take methadone it first must be metabolized in the liver to a product that your body can use. Excess methadone is also stored in the liver and blood stream and this is how methadone works its 'time release trick' and last for 24 hours or more (Inturrisi and Verebey, 1972). The higher the dose the more that is stored. This is why patients on blockade doses (70 mg/day or more) are able to go for a day or two without their medication. Of course the down side to this is that when a patient misses a dose they will begin to "destabilize" which places them at risk of overdose should they attempt to administer heroin. They are slowly loosing the blockade effect of methadone and may begin to experience drug hunger and craving. Oral methadone is very different than the IV methadone. Oral methadone is partially stored in the liver for later use. IV methadone acts more like heroin.
|
<urn:uuid:540119c5-d143-44a8-b0d4-be7503155d37>
|
CC-MAIN-2016-40
|
http://www.methadoneaddiction.net/methadone.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738659512.19/warc/CC-MAIN-20160924173739-00093-ip-10-143-35-109.ec2.internal.warc.gz
|
en
| 0.956272
| 924
| 3.125
| 3
|
By Gokul Siddharthan J, DCMME Graduate Student Assistant
The birth of quantum physics was in the early 20th century, with renowned scientist such as Albert Einstein, Werner Heisenberg making significant contributions in the field. But quantum computing as a discipline emerged only in the 1970s and 1980s. In the 1990s, algorithms were processed faster in quantum computing, leading to an increased interest in the field. Additional discoveries eventually led to a better understanding of how to build real systems that could implement quantum algorithms and correct for errors.
We see the benefits of classical computing in our everyday lives. Most of the applications and devices that are ubiquitous in the world today are run on classical computing principles. However, there are limitations that today’s systems will never be able to solve. For challenges above a certain scale and complexity, there isn’t enough computational power on Earth. To stand a chance to solve these complex problems, we need a new kind of computing system that scales exponentially as the complexity grows.
Quantum computing is different from classical computing at a fundamental level. In classical computing, information is processed and stored in bits, 0s and 1s. Millions of bits work together to create the results you see every day. In quantum computing, different physical phenomena are used to manipulate information. These phenomena are superposition, entanglement, and interference. To accomplish this, we rely on different physical devices, quantum bits, or qubits. A qubit is a counterpart to the bit in classical computing. Just as a bit is the basic unit of information in a classical computer, a qubit is the basic unit of information in a quantum computer.
So how is information stored by qubits? A number of elemental particles such as electrons and photons can be used, with either their charge or polarization act as a representation of 0s and 1s. Each of these particles is known as qubits. The nature and behaviour of these particles form the basis of quantum computing. The two most relevant and popular aspects of quantum physics are superposition and entanglement. Superposition is the term used to describe the quantum state where particles can exist in multiple states at the same time and allow quantum computers to look at many different variables at the same time.
The power of quantum computing is unimaginable. A quantum computer comprised of 500 qubits has the potential to do 2^500 calculations in a single step. 2^500 is infinitely more atoms than there are in the known universe. This is true parallel processing. Classical computers today that have so-called parallel processors, still only truly do one thing at a time. There are just two or more of them doing it. Classical computers are better at some tasks than quantum computers such as email, spreadsheets, desktop publishing, etc. The intent of quantum computers is to be a different tool to solve different problems, not to replace classical computers.
Quantum computers are great for solving optimization problems from figuring out the best way to schedule flights at an airport to determine the best delivery routes for the FedEx truck. Google announced it has a quantum computer that is 100 million times faster than any classical computer in its lab. Every day, we produce 2.5 exabytes of data. This is equivalent to the content on 5 million laptops. Quantum computers will make it possible to process the amount of data we’re generating in the age of big data. Rather than use more electricity, quantum computers will reduce power consumption anywhere from 100 to 1000 times because quantum computers use quantum tunnelling. IBM’s computer Deep Blue defeated chess champion Garry Kasparov in 1997. It was able to gain a competitive advantage because it examined 200 million possible moves each second. A quantum machine would be able to calculate 1 trillion moves per second. Google has stated publicly that it will make a viable quantum computer in the next 5 years by launching a 50-qubit quantum computer. Top supercomputers can still manage everything a 5-20 qubit quantum computer can but will be surpassed by a machine with 50 qubits.
Though a viable and true quantum computer is still not a reality, the race is on with many companies offering quantum machines. Quantum computing is no longer in the distant future.
|
<urn:uuid:2851f9e0-2b64-4d68-9ee0-ef4292c46214>
|
CC-MAIN-2019-43
|
https://dcmme.wordpress.com/2019/03/21/what-is-quantum-computing/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987798619.84/warc/CC-MAIN-20191022030805-20191022054305-00249.warc.gz
|
en
| 0.936349
| 856
| 3.84375
| 4
|
Looking for a way to entertain your toddler or preschooler while building important developmental skills at the same time? How about yoga? That’s right, even your little three-year-old can be a yoga master!
Yoga is a fun, interactive, and engaging activity which can help preschoolers improve developmental milestones pertaining to fine and gross motor skills, body awareness, and balance. Not only has yoga proven to be effective for developmental skills, it is also enjoyable for young children. It is becoming popular for preschool teachers to integrate yoga into their daily school routine with great results. Because it is inexpensive and requires no special equipment or certification to teach, yoga can be easily integrated into the preschool classroom setting, daycares, or at home. Children practicing yoga don’t even need yoga mats; the entire room is essentially their yoga mat. Studies show that yoga poses with preschool age groups also encourages self-regulation and mindfulness, encouraging better attention and learning in preschool.
The receptors that detect movement and body awareness are largely housed in our joints and muscles. Putting pressure through these joints and muscles provides feedback to the child’s brain and builds important developmental skills. Yoga also includes several balance poses. These poses can be adapted so they are fun for children, such as pretending they are a tree swaying in the wind, a kitten with one paw lifted, or an egg rocking on the edge of a table. These yoga poses that feel like pretend play to children are actually really helpful in building strength and equilibrium. Because of the core strengthening and pressure through the shoulders, elbows, wrists, and hands, fine motor skills will improve and it doesn’t take long for improvements to be noticeable.
Children who participated in just ten days of yoga scored better on gross motor and fine motor activities which can help with athletics, handwriting, and scissor skills. With improvements in skills occurring in such a short period of time, yoga lends itself perfectly to short-term preschool programs, camps, and kindergarten readiness programs. The positive effects of yoga carry over to school-age children as well. Evidence shows that yoga helps with hand steadiness, letter writing, and motor planning in school-age and preschool children.
Although yoga is great with just one or two children, it also lends itself really well to a large group because children can model off each other and even perform some of the poses with a partner, such as making their bodies look like letters or numbers, or holding hands while balancing. Yoga is also highly adaptable for different skill levels, abilities, and ages. Poses can easily be modified if a child has a delay or special needs, and the poses can be graded to more challenging for older, more advanced children. The traditional poses of yoga can be completely adapted to make yoga a more engaging experience for young children. Poses can be transformed into animals, shapes, and letters, boosting children’s creativity and imagination while simultaneously building motor skills. It may just seem like fun for them to crawl around like a puppy or stomp their feet like an elephant, but the joint compression of the crawling and heavy steps of the elephant improve children’s motor skills, balance, and core stability, not to mention it can be so much fun!
As academic demands continue to grow, budget constraints limit access to safe playgrounds, and children are spending more time on technology, yoga is a great way to get children out of their chairs and provide them with some healthy movement each and every day.
|
<urn:uuid:ef64ce3c-722b-48c8-9510-e5691ade32ed>
|
CC-MAIN-2017-30
|
https://fllmag.com/the-little-yogis-in-all-of-us/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423812.87/warc/CC-MAIN-20170721222447-20170722002447-00641.warc.gz
|
en
| 0.959674
| 708
| 3.234375
| 3
|
Get a pack of cards, shuffle them and lay out all 52 cards in four rows of 13. Remove all the aces, so that you have four blank spaces where they used to be. Now choose one of these spaces and look at the card on the left of it – it might be the six spades, for instance. You now find the seven of spades on the board, remove it from its current location and place it in the space to the right of the six of spades. You still have four spaces, but one of the spaces is now where the seven of spades started. Now you do the same again. Look at the space you’ve just created, where the seven of spades used to be – on the left of it is the jack of hearts. Find the queen of hearts on the board and move it into the space you’ve created. Repeat this process, each time choosing a space and filling it with the card that is next in the sequence to the card on the left. Bit by bit, you are creating short strings of cards in each suit.
When you have a space at the start of a row, you place a 2 of any suit in it. When you have a space to the right of a king, you can’t do anything with it and need to move onto one of the other spaces. Keep on going like this until all four spaces are to the right of king cards and nothing else can move. Now carefully, on each row, remove the cards that are not counting up sequentially from a two at the start of the row. If you have a 2, 3, 4 and 5 of clubs on the first row, but then the king of diamonds, you remove the king of diamonds and everything to the right of it. Repeat this for every row. All cards are removed from any row that doesn’t start with a 2. Now shuffle and deal out all the cards you’ve picked up again. Leave a space to the right of the cards that are already there and then fill up to thirteen spaces on each row. Each row should now have twelve cards and one space. If you have any rows without a two at the start, leave a space at the start.
Play the second round as you have played the first. Continue until your only spaces are to the right of kings and you can make no further moves. Again pick up the non-sequential cards, shuffle and deal them out for a third time. Repeat one last time. The aim, by the end of the third round is to have all cards in sequence, one suit on each line, with a space after the king on the end of each row.
|
<urn:uuid:e1145662-4e89-4e21-a0cf-260ccc07d441>
|
CC-MAIN-2021-04
|
https://www.thedarkimp.com/blog/2019/02/27/spaces-patience/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519883.54/warc/CC-MAIN-20210120023125-20210120053125-00103.warc.gz
|
en
| 0.956255
| 553
| 2.53125
| 3
|
Accession & Reign
Young Maximilian’s life was tied to building power and reputation for the family. For the same, he married Mary of Burgundy, in 1477, in order to curb military conflict with her father Charles the Bold and acquire the vast Burgundian possessions for his House of Habsburg.
Almost immediately after acquiring the Duchy of Burgundy, Maximilian defended the new empire from the military attack of the French forces, defeating Louis XI at the Battle of Guinegate on August 7, 1479.
As per the agreement before marriage, the right to inherit the Duchy of Burgundy was restricted to the couple’s children and neither of the surviving parent could acquire the same after the other’s death. As such, following Mary’s untimely death in 1482, Maximilian’s position weakened as the inheritance passed on to his son, Philip the Handsome.
The declining state of power of Maximilian aggravated political pressure. Though he claimed to be recognized as the guardian of Philip and regent of Netherlands, his demands were not adhered to. Furthermore, Maximilian was compelled to assent to the treaty of Arras in 1482 between the states of the Netherlands and Louis XI, thus giving up Franche-Comté and Artois to the French crown.
In February 1486, Maximilian was elected as the King of Romans. The coronation was held in April in Aachen.
In 1488, he was held in captive in Bruges for about three months. He was set free only after his father approached with a large force.
In 1490, in order to surround France, he made a treaty with Francis II, Duke of Brittany by marrying the latter’s daughter Duchess Anne of Brittany. During his initial years of rule, greater part of Austria was under Hungarian rule. By 1490, he successfully re-conquered the lost territory of Austria and entered Vienna.
The seizure of Hungary made him a candidate for the vacant Hungarian throne. When Vladislas (Ulászló) II of Bohemia was elected to the throne, Maximilian waged a successful campaign against Vladislas. It resulted in the signing of the Treaty of Pressburg in 1491 as per which the succession to Bohemia and Hungary would pass to the Habsburgs if Vladislas left no male heir.
In 1493, the Treaty of Senlis was signed which marked the end of conflict with Netherlands and France. Meanwhile through his cousin archduke Sigismund, the county of Tirol was added to his list of possessions. Soon, the district became his favourite place of residence.
Continue Reading Below
Following his father Frederick III’s death in 1493, Maximilian became the head of the Holy Roman Empire. Following year, he married Bianca Maria Sforza, daughter of Galeazzo Maria Sforza, Duke of Milan. The marriage was basically to hinder King Louis XII’s claim for the Duchy of Milan. Yet again a conflict between Maximilian and Louis XII arose but the former was unable to curb the French take over.
In 1495, Maximilian allied himself with the Holy League, involving Spain, Venice and Milan to drive out the French, whose invasion of Italy had disrupted the balance of power in Europe. The league successfully drove out the French from Italy.
Just like himself, Maximilian made marriage alliance of his son and daughter to strengthen the Habsburg Empire. In 1495, he married his son to Spanish infant, Joan and in 1497, betrothed his daughter Margaret to the Spanish crown Prince. Both the marriages were basically to allow his succession in Spain and control over the Spanish colonies.
Maximilian’s continuous attempt at strengthening the empire and his invasions of France did not go well with the public. Demand for deep reform rose to preserve the unity of the Empire. This resulted in the launch of Reichskammergericht, a new body that was largely independent from Emperor.
To adhere to the demand from local rulers for independence and strengthening of the territorial rule, Maximilian encouraged building up of a new organ, Reichsregiment. It consisted of deputies of the Emperor, local rulers, commoners, and the prince-electors of the Holy Roman Empire who aimed at granting greater powers to local rulers. However, the organ failed and Maximilian regained absolute power in 1502.
Meanwhile, in 1499, he fought an unsuccessful war against the Swiss who in turn won an important victory at the Battle of Dornach. The victory resulted in granting independence to the Swiss confederacy from the Holy Roman Empire.
In 1504, he strengthened the European position by an agreement with France. Furthermore, he made impressive victory in the war against Bavaria and the Rhenish Palatinate.
In 1508, with the assent of Pope Julius II, he became the elected Roman Emperor, thus ending the customary tradition of the Holy Roman Emperor being crowned by the pope. Same year, he entered the League of Cambrai with France, Spain and Pope to partition the Republic of Venice. However, his lack of financial means led him to become an unreliable partner of the alliance.
In 1513, with the assistance from Henry VIII of England, he made an important victory at the Battle of Spurs against his arch-rivals, French. However, the victorious league was followed by a massive debacle in 1515 that thwarted Maximilian’s effort to regain Milan. The failed attempt led to the signing of the Treaty of Brussels according to which Milan was granted to the French and Verona to the Venetians.
Continue Reading Below
Much like his previous attempts, Maximilian successfully arranged marriage between members of the Habsburg family and the Hungarian royal house, in order to strengthen the Habsburg position in Hungary and Bohemia
Towards the end of his life, Maximilian diverted his energy towards succession rights of Charles V, his grandson. In order to secure the throne to the Habsburg House and prevent Francis I of France from taking over, he campaigned extensively, bribing people massively.
Personal Life & Legacy
Maximilian married Mary of Burgundy on August 16, 1477. The marriage was more of a political alliance rather than a mere love relationship. Mary was the daughter of Charles the Bold, a political rival of Maximilian’s father, Frederick III. The marriage consolidated the family power and reputation by helping Maximilian acquire the vast Burgundian possessions in Netherlands and on the eastern border of France.
In 1490, he married Anne of Brittany by proxy. However, the marriage was dissolved two years later, following forceful insistence by French King Charles VIII on Anne to renounce her contract and marry him.
In 1493, he married Bianca Maria Sforza. The marriage gained Maximilian imperial rights over Milan and also enhanced his financial standing in the society through large dowry.
From his marriage to Mary of Burgundy, Maximilian had two children, Philip the Handsome and Margaret of Austria. Like himself, he arranged marriages and betrothal of both his children in order to strengthen the Habsburg House.
In 1501, he met with an accident by falling from his horse. He never fully recovered from it, sustaining crucial pain for the rest of his life.
He breathed his last on January 12, 1519, at Wels in Upper Austria. He was buried in Georgskirche at Wiener Neustadt. A magnificent tomb at the Hofkirche in Innsbruck was completed later.
|
<urn:uuid:01d40d82-1077-469f-b5bb-ff49476151bf>
|
CC-MAIN-2021-10
|
https://cc.bingj.com/cache.aspx?q=%2Bmary+of+burgundy+and+maximilian&d=4693175350462449&mkt=en-US&setlang=en-US&w=gsd4G4IntrZWNbvONszJajq6cKHdRVqa
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178365454.63/warc/CC-MAIN-20210303042832-20210303072832-00262.warc.gz
|
en
| 0.974969
| 1,595
| 3.265625
| 3
|
The embouchure involves putting together everything we have – the mouthpiece, lips, the facial muscles, oral cavity and the air stream to produce a sound. When you’re talking about a correct embouchure, however, the most important consideration is: What does it sound like?
As a teacher, I am directly responsible for developing an embouchure with a young player. It may take me the first few lessons just to get a student to play a few notes while we work on getting the embouchure right. This is very important. The student has six days a week without your instruction, so you must provide them with a good foundation.
The ideal embouchure would be as follows: If you were to draw a picture of a face and a trumpet on a piece of paper, there would be perfectly equal distribution in all four quadrants. In many people, however, subtle variations may need to occur. For instance, I play off center because of the structure of my teeth. That’s why it can take weeks to get an embouchure started. Still, the first thing I say to a student is, “Let’s put the mouthpiece against the lip and center it. Bring it directly down from the nose.”
With a young student, I might go to a sound at this point, playing a note on the horn – probably a G – and asking them to reproduce it. Then I’ll switch to the low C, but the G must be first. It forces you to use your facial and cheek muscles. Then I take the mouthpiece out and ask the student to try to buzz the same pitch. If the embouchure is too loose, you get a fluffy, airy sound. With the lips stretched tight, you get a tight sound because the lips are fighting the air. The idea is to get the student into the habit of being his own teacher, and learning to ask, “How do I sound?”
An embouchure isn’t really an embouchure until it resists an air stream. It is in the resistance to that air stream that we will be able to produce a good tone and play loudly or softly – all the things we expect our embouchure to do for us. The goal of the embouchure is to vibrate, to change an air column into a vibrating air column. This becomes an excellent yardstick for mouthpiece placement. If you set it too low, the amount of tissue that vibrates is greatly reduced. You can experience that by putting your fingers against the red part of the lip and trying to make a buzzing sound.
In the formation of the embouchure, one of the more important aspects is the position of the lower jaw. Most of us have an overbite. The air stream comes up from the lungs, through to the lips, ready to enter the horn. Then the lower lip recedes and deflects the air stream down rather than straight through. I realize that the overbite is usually the natural position of the teeth, but brass players should develop an “at rest” position with the teeth aligned. You need to provide an even platform with the top lip directly over the bottom.
As far as the oral cavity is concerned, try to keep the tongue from impeding the air stream. I advocate a low tongue position – try saying “Aaaah” or “Oooh” – so that the air continues to the lips unimpeded.
There are greater numbers of trumpet players working on pedal tones and lip bends. Here’s a simple but demanding exercise: Start on G in the staff, slur down to F#, and then back up to G. Do this without changing the valve combination. Play whole notes at forte (with the metronome at 72 or so). Rest for the same amount of time you played. Then repeat. Then do F; then E; then Eb. The player is forced to move the lower jaw out and flatten the chin, and use all the muscles around the chin area. Of course, this is more calisthenics than it is music. Think of it as power lifting – you’re playing at loud dynamic levels, and you want fewer reps with greater weight.
Finally, most textbooks talk about the dual tension in the formation of the embouchure. Twenty or thirty years ago, players were taught to smile if they wanted to play higher. Now it’s a combination of half smile, half pucker, each keeping the other from dominating. That tension between the two will best respond to a sustained air stream. It’s difficult to go into the low register with a smile, and the pucker is an airy, fluffy sound. Al Rizzouti has an exercise in which he asks the player to buzz, in siren fashion, in a slow, chromatic glissando from G to G above to G below, with no break in the sound. Try that with a smile or with too much pucker. It’s almost impossible.
From the Beginning is an excerpt from Selected Trumpet Masterclasses, from the editors of Windplayer. This excerpt is included in Keynotes Magazine by permission of Windplayer Publications, www.windplayer.com. Copies of Selected Trumpet Masterclasses (AV4751TR) may be obtained through your Conn-Selmer school music dealer.
James Ketch is currently Professor of Music and Chair at the University of North Carolina at Chapel Hill where he serves as Instructor of Trumpet and Director of Jazz Studies.
|
<urn:uuid:f5339e65-8266-47b6-b62a-1ad8b4c8d55b>
|
CC-MAIN-2022-05
|
https://banddirector.com/brass/trumpet/good-sound-begins-with-a-proper-embouchure/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300533.72/warc/CC-MAIN-20220117091246-20220117121246-00238.warc.gz
|
en
| 0.951458
| 1,154
| 3.1875
| 3
|
The novel coronavirus pneumonia outbreaks in Wuhan, China in the end of 2019 presents high infectiousness and has caused thousands of deaths. Performing nucleic acid test of COVID-19 by RT-PCR is one of the mainly clinical diagnosis methods of this pneumonia. However, under the influence of various objective factors, the test results so far have been reported to be possibly false positive and false negative.
The factors include the sample extracting, sample preserving, and different manufactured PCR reagents, etc. In addition, the unknown mutagenesis of COVID-19 could also lead to false negative since it is a single-strand RNA virus. The influence of mutation could be avoided by using multiple sets of primers in different nucleic acid regions.
Despite the accuracy of nucleic acid test, the testing instruments and testing period are relatively costly. So other clinical diagnosis methods such as blood test, and computed tomography (CT) are necessary for supporting in frontline.
|
<urn:uuid:cf66b028-7f27-4ebd-86b8-07a7f9ad8088>
|
CC-MAIN-2023-50
|
https://www.sunybiotech.com/news-show-77.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100184.3/warc/CC-MAIN-20231130094531-20231130124531-00429.warc.gz
|
en
| 0.932855
| 199
| 2.84375
| 3
|
by Joe L. Martin
As a person who spent more than 40 years helping defend this nation and one who believes in the Constitution as it was written, I can no longer be silent and allow a very few people to take our rights away.
The Second Amendment of our great Constitution has been the subject of much discussion of late. It behooves us, therefore, to peruse the writings of our Founding Fathers to see what their intentions were concerning the meaning of that very important amendment.
Much has been said with regard to the predicate clause, "A well regulated militia being necessary to the security of a free state ..." What did the Founders mean by "militia"?
George Mason of Virginia, one of those who helped draft the Constitution, said this: "To disarm the people is the best way to enslave them ... Who are the militia? They consist now of the whole people, except for a few public officers."
The National Guard was not considered the militia mentioned in the Second Amendment. There was a differentiation between militias. Richard Henry Lee spoke of a "genuine militia" and a "select militia." The genuine militia was composed of the citizenry from 16 to 60 years old. The select militia was organized by the government and under government auspices. The select militia was to be feared by the people as one that could subjugate the people. This is the type of militia that makes up the National Guard.
Next, we must examine the phrase, "the right of the people to keep and bear arms shall not be infringed." Some would have us believe this refers only to the people collectively as the state or state authority. However, if we keep that phraseology consistent with the rest of the Bill of Rights, then we have a problem.
For example: In the First Amendment we have the statement, "the right of the people to peaceably assemble and to petition the government for a redress of grievances." In the Fourth we have, "the right of the people to be secure in their persons."
If we use the same interpretation of the people's right in these other amendments, we destroy their meaning, especially in the minds of liberals. It is clear from any objective study that the "right of the people to keep and bear arms" is an individual right -- one of those inalienable rights in the Declaration of Independence.
I find it ironic that one of the most liberal icons of the 20th century said: "The right of the citizens to bear arms is just one more guarantee against arbitrary government, one more safeguard against the tyranny which now appears remote in America but which historically has proved to be always possible." That was Hubert H. Humphrey.
I wonder what President Clinton, Sen. Charles Schumer and Vice President Gore would think about (that statement)? The problem is that the elite utopian-liberals think they know what is best for us.
I will repeat ad nauseum if necessary: If we lose the right to keep and bear arms, we will certainly lose the rest of our rights as well.
It won't happen all at once. But it will happen.
How important are your rights to you? If you cherish your rights the same way our Founding Fathers did, then it is time to make yourself heard, while you still have a right to do so.
|
<urn:uuid:7bdd971c-dc0c-4239-9ca6-57d4ab6a3328>
|
CC-MAIN-2016-18
|
http://www.paysonroundup.com/news/2000/apr/06/citizens_have_the/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860109830.69/warc/CC-MAIN-20160428161509-00158-ip-10-239-7-51.ec2.internal.warc.gz
|
en
| 0.974271
| 676
| 2.6875
| 3
|
The 2015-16 school year will mark the first time that the majority of state mandated summative testing in U.S. elementary and middle schools will be administered via technology and not in a paper and pencil format. In fact, only 15 percent of all end-of-year state tests will not offer an online administration option.
Among other findings, the research reveals that while older students are slightly more likely to have the option to test online, large numbers of 3rd graders (aged 8 and 9 years old) are already testing online successfully. The brief also includes new data and information on:
- Which states are online testing leaders and which are laggards;
- The top test vendors (as measured by the number of general assessments they will deliver to students this school year); and,
- Top issues for states, test vendors, technology leaders, and policymakers to watch closely and address to ensure both a smooth and equitable test administration this spring.
Count the 2015-16 school year as the tipping point in the ongoing shift to online and computer-based testing.
More information about the research brief (which is available for download free of charge) and its findings can be found at: https://www.edtechstrategies. com/research-and-writing/usk- 8-testing/
I think there are some fascinating findings and information in the brief (and much more that is only alluded to), so be sure to let me know what you think by leaving any questions or comments about the topic in the comments section below.
|
<urn:uuid:72545d01-ccfd-4012-b3f7-f69948f75268>
|
CC-MAIN-2018-26
|
https://www.edtechstrategies.com/research-insights/online-test/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864943.28/warc/CC-MAIN-20180623054721-20180623074721-00180.warc.gz
|
en
| 0.942465
| 315
| 2.703125
| 3
|
Colorful Foods Offer More Than What Meets the Eye
Just as the beautiful fall colors signify the changing of seasons, nature also uses colors to provide hints about the nutritional value of fruits, vegetables, nuts, seeds, grains, beans and legumes.
While color is the clue, the nutritional power is packed into phytonutrients.
“Phytonutrients are active compounds in plants that can have great health benefits,” said Lauren Cornay, Avera Registered Dietitian. “Each phytonutrient has its own unique benefits, so that’s why it’s important to have a colorful diet filled with a wide variety of fruits and vegetables.”
Research shows that phytonutrients may have benefits such as prevention against cancer, heart disease and age-related diseases such as macular degeneration. They also may protect against blood clot formation that could lead to heart attack or stroke, lower blood pressure and LDL cholesterol (“bad” cholesterol) and enhance immunity.
Keep in mind that these benefits are in addition to all of the vitamins and minerals found in plant-based foods. “The research surrounding phytonutrients solidifies why fruits and veggies are such an important part of our diets. That’s why we recommend filling half of your plate with them at each meal.”
And the benefits of a colorful diet aren’t only for adults. “It’s really important for kids to try new foods, such as fruits and vegetables, when they’re young.” recommended Cornay.
Learn more about Avera's health and nutrition services.
|
<urn:uuid:2df305e4-4f72-445c-bd37-bd4bfd98eab7>
|
CC-MAIN-2019-51
|
https://www.avera.org/balance/nutrition/colorful-foods-offer-more-than-what-meets-the-eye/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540525781.64/warc/CC-MAIN-20191210013645-20191210041645-00127.warc.gz
|
en
| 0.941738
| 341
| 3.453125
| 3
|
Health almanacs contain helpful information on the life cycles of human teeth. This information is valuable to the pursuit of good oral hygiene and health. We all know there are many problems that improper care for teeth can lead to, and applying the dental care information found in a health almanac can stop a number of problems before they begin, such as:
- Teeth are made of calcium and enamel. The calcium is the hard bone material of teeth, and enamel is the outer layer of tissue that protects the tooth. We understand how to keep calcium levels high in order to strengthen teeth, but we are still learning how enamel works and how it might be replaced once it is lost.
- Several foods that are high in calcium and thus good for your teeth are kale, broccoli, milk and yogurt. Keeping your calcium intake high will strengthen teeth against age and decay.
- Several foods that are bad for your teeth are red wine due to its acidity, ice when it is chewed because it makes teeth brittle, anything containing white processed sugar and anything containing white flour.
- The best method of caring for your teeth is using an electric tooth brush, or just being diligent about moving a manual toothbrush in proper circular motions around your teeth and your gums. It is good to do this at least twice daily, an hour after meals, followed by flossing and a swish of mouthwash.
There is a great deal you can do to care for your teeth on your own, but nothing replaces the necessary services of a quality dentist. Dentists and oral hygienists have the tools and the knowledge to prevent tooth decay, gingivitis and other tooth diseases. The cleanings and cavity prevention that the dentist contributes to are necessary to the health of your teeth. In Canada, the dental industry is one of the best in the world, and whether you require a dentist in the Okanagan Valley, Montreal or Toronto, you will not be disappointed by what is available to you.
|
<urn:uuid:bf79bc65-c350-4960-8677-675bc9f5f83c>
|
CC-MAIN-2019-09
|
http://kyalmanac.com/2017/03/04/oral-care/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484772.43/warc/CC-MAIN-20190218074121-20190218100121-00479.warc.gz
|
en
| 0.94384
| 408
| 3.5
| 4
|
Home » Graphite Nanoplatelets (Purity: 99.9%, APS: 3-4nm)
|Molecular Weight||12.01 g/mol||Confirm|
|Melting Point||3550 °C||Confirm|
|Boiling Point||4027 °C||Confirm|
|Young's Modulus||21 GPa||Confirm|
|Quality Control||Each lot of Graphite Nanoplatelets was tested successfully.|
|Main Inspect Verifier||Manager QC|
|Quartz + silica||< 0.1 %|
|Ash||< 0.5 %|
|Other Metal||< 0.1 %|
Graphite nanoplatelets, which combine the layered structure and low price of nanoclays with the superior mechanical, electrical, and thermal properties of carbon nanotubes, are very cost-effective, and can simultaneously provide a multitude of physical and chemical property enhancements.
Graphite nanoplatelets particles consist of small stacks of graphene obtained by exfoliation of expanded graphite. The size and morphology of nanoplatelets makes these particles especially effective at providing barrier properties, while their graphene structure makes them excellent thermal and electrical conductors.Unlike many other additives, graphite nanoplateletes improve mechanical properties like stiffness, strength, and surface hardness of the matrix material.
Graphite nanoplatelets improves mechanical properties of most composites, particularly stiffness and tensile strength. Elastomeric compounds have been shown to experience increased life and reduced surface wear when reinforced with graphite nanoplatelets. Particles can be aligned using electric field, although alignment is not necessary for use in most extrusion systems.
Graphite nanoplatelets can also be combined with glass fibers or other matrix materials to provide sufficient conductivity for electrostatic painting or other applications requiring electrical conductivity. Graphite nanoplatelets has a percolation threshold for conductivity of 1.9 wt% in thermoplastic matrix. At densities of 2–5 wt%, conductivity reaches sufficient levels to provide electromagnetic shielding.
Graphite nanoplatelets consist of small stacks of graphene that can replace carbon fiber, carbon nanotubes, nano-clays, or other compounds in many composite applications. When they are added at 2-5wt% to plastics or resins they make these materials electrically or thermally conductive and less permeable to gasses, while simultaneously improving mechanical properties like strength, stiffness, or surface toughness.
Note *Exchanges of materials/products are not permitted. Nanoshel does not offer refunds. *US Dollar Cheques Not Accepted, Only Bank TT/Credit Cards Accepted
|
<urn:uuid:0eaec264-ab22-44d4-9469-fda9bca9ac00>
|
CC-MAIN-2019-26
|
https://www.nanoshel.com/product/graphite-nanoplatelets
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999946.25/warc/CC-MAIN-20190625192953-20190625214953-00142.warc.gz
|
en
| 0.824327
| 552
| 3.03125
| 3
|
NetWellness is a global, community service providing quality, unbiased health information from our partner university faculty. NetWellness is commercial-free and does not accept advertising.
Monday, March 10, 2014
Depression and Coronary Heart Disease
I am a 28 year old male that suffers from depression on occasion. I read online that depression can lead to coronary heart disease. Is this true? What can I do to prevent it?
Though it is true that depression can lead to coronary heart disease by a variety of ways, the process is gradual and the risk depends on how severe and long-lasting the depression symptoms are. Depression leads to increased risks for heart disease by contributing to physical inactivity, weight gain, smoking, and diabetes, all of which are major risk factors for coronary disease. Depression also affect the rhythms of the heart and the tendency for blood to clot.
The best way to prevent depression from leading to heart disease is to treat your depression effectively. That means reducing your symptoms to normal and preventing relapses into future depressive episodes. Any form of treatment that does that (psychotherapy, antidepressant medications, exercise, etc.) will help reduce your risks for heart disease.
Lawson Wulsin, MD
Professor of Psychiatry and Family Medicine, Training Director of the Family Medicine Psychiatry Residency Program
College of Medicine
University of Cincinnati
|
<urn:uuid:5a400f07-291a-40a6-9cfd-bcc0ece61e4f>
|
CC-MAIN-2014-10
|
http://www.netwellness.org/question.cfm/49030.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010740404/warc/CC-MAIN-20140305091220-00009-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.926585
| 274
| 2.59375
| 3
|
In our current series we’ve been going through an old list of questions and answers contained in the Westminster Larger Catechism published in 1648. Over the last two weeks we’ve seen that there is only one God, yet there are three persons in the Godhead: the Father, Son and Holy Spirit. This week I want to begin looking at where the Bible teaches that God the Son and God the Holy Spirit are equal with God the Father. I want to do this by firstly showing that the Scriptures call Jesus Christ and the Holy Spirit by the name ‘God’.
The Bible calls Jesus ‘God’ in a number of places. For example, John the apostle says: ‘We know also that the Son of God has come and has given us understanding, so that we may know him who is true. And we are in him who is true–even in his Son Jesus Christ. He is the true God and eternal life. (1 John 5:20)’. Another example is from Hebrews: ‘But about the Son he says, “Your throne, O God, will last for ever and ever, and righteousness will be the scepter of your kingdom. (Hebrews 1:8)’. Also Thomas calls Jesus ‘God’: ‘Thomas said to him, “My Lord and my God!” (John 20:28).’ Meanwhile Paul says that we wait for Jesus who is God: ‘…we wait for the blessed hope–the glorious appearing of our great God and Savior, Jesus Christ’ (Titus 2:13). And Paul says in Colossians: ‘For in Christ all the fullness of the Deity lives in bodily form…’ (Colossians 2:9). Moreover Jesus himself says that he is equal with God the Father: ‘I and the Father are one’ (John 10:30). Thus the Bible clearly teaches that Jesus is God.
But what about the Holy Spirit? Does the Bible teach that he is God too? Peter asks Ananias in the book of Acts: ‘Ananias, how is it that Satan has so filled your heart that you have lied to the Holy Spirit and have kept for yourself some of the money you received for the land? Didn’t it belong to you before it was sold? And after it was sold, wasn’t the money at your disposal? What made you think of doing such a thing? You have not lied to men but to God.”’ (Act 5:3-4). Who did Ananias lie to? Peter understands that when Ananias lied to the Holy Spirit he lied to God. Another example is when Paul speaks about the temple of God: ‘Don’t you know that you yourselves are God’s temple and that God’s Spirit lives in you?’ (1 Corinthians 3:16). God’s temple is where God lives, and Paul says that the Spirit lives there, implying that the Spirit is God.
Do you believe that Jesus is God and the Holy Spirit is God? Or do you deny the Bible’s teachings and make your own God?
|
<urn:uuid:635cb8f2-ff38-4ad1-9726-13fe31da16d4>
|
CC-MAIN-2021-17
|
http://www.drummoynebaptist.org.au/2012/06/25/are-jesus-and-the-holy-spirit-called-god-in-the-bible/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038492417.61/warc/CC-MAIN-20210418133614-20210418163614-00364.warc.gz
|
en
| 0.958019
| 676
| 2.984375
| 3
|
By Mazhar Farid Chishti
Harmonizing moral and spiritual values with the economic ones may bring the peace the whole world needs. Economic science focuses on our material activities, studying how we can get maximum satisfaction through material goods and services. Religion, on the other hand, draws humanity’s attention in the opposite direction: towards God, who is above and beyond all matter and is indivisible and untouchable. If religion is about mankind’s inner life, economics is about our outer life.
This antinomy expresses itself in different forms in the great religions and has naturally often been an impediment to economic progress.
In Buddhism there is a strong emphasis on the transient character of material life. Birth and death, growth and decay all is Samsara: an illusion.Peace and salvation can only be found in truth, which is eternal and everlasting. The truth is realized in Buddha. The gospel of Buddha therefore admonishes the faithful to extinguish in them every desire that antagonizes Buddha. By achieving spiritual evolution, the followers too will become like Buddha. To come to this end, where all sorrow ceases, they are instructed to follow the eightfold path of right comprehension, right resolution, right speech, right acts, and right way of earning a livelihood, right efforts, right thoughts and the right state of peaceful mind.
In Hinduism, for example in the Bhagavad-Gita, there is a clear recognition that action in the world is necessary. But work should be done without attachment to the fruits of the work. We are all forced to act, but we should act with self-control and the results of the action should be renounced. Mankind’s aim should not be satisfaction of its own needs, as is assumed in economics, but in doing one’s duty. This duty is seen as given for every individual according to his or her situation in life, and is worked out in the caste system which has been a serious impediment to economic development.
In Islam, the believer is told that life hereafter is preferable to the life in this world. This again draws the attention and longing of the faithful in a direction opposite to worldly life.
Recently some writers have tried to develop ‘Islamic economics’. Drawing from the Quran and other Islamic sources, they are trying to restructure economic thought and practices on the basis of Islamic teaching. Many economic practices like the payment of interest, insurance, arbitrage, speculation and indexation are considered un-Islamic. But the injunctions to avoid these economic activities will either impede economic growth or these injunctions will not be followed, creating hypocritical arrangements as in Islamic banking where interest on deposits is disguised as a ‘mark-up’ or ‘commission’.
Christianity also teaches that humanity’s aim should be a heavenly, not an earthly, treasure. Medieval Christianity imposed some restrictions on economic activities.
There were injunctions for just prices and interest on loans was forbidden. Economics was subordinated to religion, just as science, ethics and aesthetics were. This was a serious hindrance for the development of market capitalism.
Seeing how religion guided mankind in a direction opposite to the striving for the satisfaction of material needs, the question arises as to how the breaking of these religious barriers came about in the West.
The great German sociologist Max Weber has shown that crucial support for this breakthrough came from Protestantism, and notably from its Calvinist version, developed by John Calvin in the 16th century. That was the beginning of the modern area of economics.
But Roman Catholic Church reconciled itself, with certain qualifications, with market capitalism only in the late 20th century. The different influences of Protestantism and Roman Catholicism on economic growth have also been statistically confirmed in a research paper. Bradford de Long, an economist and econometrician, has carried out a striking study of some nations comparing their performance during 1870-1979. He discovers that Protestant nations show higher growth rates than the Roman Catholic ones. (To be Continued)
(The author teaches Finance and Economics at Lahore Garrison University and can be contacted at firstname.lastname@example.org)
|
<urn:uuid:932365b5-3a71-49a8-86aa-c9c592de74ea>
|
CC-MAIN-2021-17
|
http://educationist.com.pk/religion-and-economics-i/?replytocom=1306324
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039594808.94/warc/CC-MAIN-20210423131042-20210423161042-00144.warc.gz
|
en
| 0.953396
| 854
| 2.71875
| 3
|
Background and History
In 1976 The United States Mint began to consider abolishing the current large size dollar coinage or making a new coin that was smaller and lighter in weight. Although Eisenhower dollars never widely circulated, the U.S. Mint and The Department of the Treasury was intent on keeping the one dollar coin.
Keeping with the times, it was decided to portray a woman on the new smaller coin. It was decided that Susan B. Anthony, a pioneer of women's rights, would be portrayed on the new coin. Research indicated that the coin could easily be confused with a quarter, so an eleven sided rim was included in the design and a marketing campaign was mounted to educate the public.
All of this was to no avail. The public still confused the new coin with a quarter and it never circulated widely. The reverse used the same design that was used on the previous one dollar coin, the Eisenhower dollar. No coins were made from 1981 through 1998. However, in 1999 an additional run was made to meet the demands of the vending machine industry. The next year the Sacajawea dollar was introduced. Prices for Susan B. Anthony dollars are affordable for all type of collectors.
Coin Values and Prices: Susan B. Anthony One Dollar Coin Values and Prices
|1979 Proof||San Francisco||S||Type 1; Filled S
(Mint mark looks like a blob)
|1979 Proof||San Francisco||S||Type 2; Clear S
(Mint mark is clear and well formed)
|1980 Proof||San Francisco||S|
|1981 Proof||San Francisco||S||Type 1; Clear S
(Mint mark is clear but pointed)
|1981 Proof||San Francisco||S||Type 2; Flat S
(Mint mark is flat on top)
1979 & 1981 Proof Susan B Anthony Dollar Varieties
In 1979 mint marks were still added to coin dies by hand. A mint worker preparing a die to be used at the San Francisco mint for the production of Proof coins broke the metal punch that was used to impart the mint mark into the die. This process involved the worker holding the metal punch on the die while striking it with a heavy hammer. The hard metal that the die is made from caused the mint mark punch to shatter.
A new metal punch used to impart the mint mark into the die was made by an artisan at the mint with a slightly larger and clearer "S". Since this happened near the end of the production run, the Type 2 (clear and well formed mint mark) is the rarer or of the two types of 1979 proof Susan B. Anthony dollars.
This same sequence of events played out again in 1981 and resulted in two types of Proof 1981 Susan B. Anthony Dollars.
Errors and Varieties
|1979||Philadelphia||P||Wide Rim (or "Near Date")||Date is closer to the rim than previous 1979 issues.|
The following table lists mint production numbers for the number of Susan B. Anthony (SBA) One Dollar Coin produced at each mint facility. Where possible, production numbers by strike type are noted.
|1979 Proof||San Francisco||S||3,677,175||All types|
|1980 Proof||San Francisco||S||3,554,806|
|1981||Philadelphia||P||3,000,000||Issued only in mint sets|
|1981||Denver||D||3,250,000||Issued only in mint sets|
|1981 Proof||San Francisco||S||4,063,083||All types|
|1981||San Francisco||S||3,492,000||Issued only in mint sets|
Suggested Books on Susan B. Anthony (SBA) One Dollar Coin
- Walter Breen's Complete Encyclopedia of U.S. and Colonial Coins; Walter Breen; Publisher: Doubleday; 1 edition (May 1, 1988); ISBN-13: 978-0385142076
- The Cherrypickers' Guide to Rare Die Varieties, 5th Edition, Volume 2; Fivaz, Bill and J.T. Stanton; Publisher: Whitman Publishing, Atlanta (2009); ISBN-13: 978-0794832391
- History Of The United States Mint and Its Coinage, Whitman Publishing Llc; 1ST edition (April 30, 2005), ISBN-10 0794819729, ISBN-13 978-0794819729
- A Guide Book of United States Proof Sets 2nd Edition (Official Red Books), Whitman Publishing; 2 edition (June 1, 2010), ISBN-10: 0794828604, ISBN-13: 978-0794828608
|
<urn:uuid:5a031482-7fd4-497c-ab76-7920f4e63860>
|
CC-MAIN-2019-47
|
https://www.thesprucecrafts.com/susan-b-anthony-dollar-specs-4072033
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496672170.93/warc/CC-MAIN-20191122222322-20191123011322-00526.warc.gz
|
en
| 0.845475
| 967
| 3.46875
| 3
|
A Mission Record of the California Indians, by A.L. Kroeber, , at sacred-texts.com
When the rancherias were still inhabited by unconverted Indians, there could be seen in various places bunches of feathers or plumes attached to sticks, which might be called their idol-temples (adoratorios). There they cast seeds and beads in order to obtain good harvests of acorns and other seeds which the fields produce of themselves, and which were their daily nourishment.
They neither knew or used any other musical instrument than a tube of wood resembling a flute, open at both ends and producing a buzzing quite disagreeable to hear; also a whistle (pito) of a limb-bone of some bird.
16:38 The missionaries at Santa Ynez about 1811 or 1812 were Jose Antonio Calzada and Francisco Javier de Uria.
|
<urn:uuid:0302d4b2-70a1-45c2-9be5-21295617043e>
|
CC-MAIN-2015-40
|
http://sacred-texts.com/nam/ca/mrci/mrci08.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738004493.88/warc/CC-MAIN-20151001222004-00196-ip-10-137-6-227.ec2.internal.warc.gz
|
en
| 0.965383
| 186
| 3.375
| 3
|
Phonemic Awareness Video
Denise Eide discusses developing Phonemic Awareness in students and how it forms the essential building blocks of reading and fluency.
Developing Fluent Readers Video
Denise Eide discusses developing fluency in reading, responding to questions from a reader on our Facebook page whose child had learned all the phonograms but still struggled to read words fluently.
Denise teaches how to use finger spelling to support students in sounding out and spelling new words. This simple technique is helpful both when teaching Logic of English spelling lists and any time when students need guidance on how to spell a word. Recorded live at a Logic of English teacher training.
Spelling Dictation - A Multi-Sensory Approach
Learn how to dictate one and two syllable words using the Logic of English style of dictation. This presentation will review the basic approach of Spelling Analysis (or Spelling Dictation), demonstrate how to mark words, introduce finger spelling, and explain how this method benefits all learning styles.
Spelling Analysis with One-Syllable Words
An in-depth spelling analysis workshop, focused on one-syllable words, filmed live at a Logic of English training. To help you experience spelling analysis from the perspective of a student learning to spell new words for the first time, Denise teaches a series of rare and unusual English words. She also explains the steps for spelling analysis and the benefits of this powerful instructional approach.
Denise will demonstrate multi-sensory methods for teaching handwriting. This video will aid teachers and parents in developing legible handwriting. Denise also discusses the importance of teaching the rhythm of handwriting and provides tips from The Logic of English handwriting curriculum.
The Five Strands of Reading
Many teachers and parents feel confused about how to teach phonemic awareness, systematic phonics, fluency, vocabulary, and comprehension skills. Do we begin with fluency? Or phonics? What is phonemic awareness? In this video, Denise provides insight into the organic process of learning to read!
Silent Final E Video
How many reasons do you know for a silent final E? This video challenges you to rethink the assumption that there is only one reason and to see that English is really a logical system which can be easily understood.
Is English Illogical?
Do you think of English as illogical and full of exceptions? This video challenges you to rethink that assumption and see that English is really a logical system which can be easily understood.
|
<urn:uuid:affb0c69-5660-43d4-afd7-c9a60639ca16>
|
CC-MAIN-2017-34
|
https://www.logicofenglish.com/video/topics
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109157.57/warc/CC-MAIN-20170821152953-20170821172953-00322.warc.gz
|
en
| 0.925472
| 507
| 3.640625
| 4
|
Omicron is inflicting a giant wave of contemporary COVID-19 circumstances, however scientists have found that for a illness this contagious, the consequences of it are milder than anticipated. New animal research recommend why this may be taking place, and it’s primarily attributable to the truth that Omicron is much less damaging on the lungs when in comparison with earlier variants.
In research carried out on mice and hamsters, the Omicron variant was discovered to provide much less dangerous infections. The illness seems to restrict itself t the nostril, throat, and windpipe. The hurt on the lungs was a lot much less current than that of earlier variants and has been the principle hazard of the COVID-19 pandemic.
RELATED: Specialists Are Now Recommending Carrying This Sort Of Face Masks
The research, carried out by Japanese and American researchers, compiled knowledge on hamsters and mice contaminated with Omicron and former variants of COVID-19. Rodents with Omicron skilled much less hurt on their lungs, misplaced much less weight, and had been much less prone to die when in comparison with rodents with earlier variants of the virus.
“The results of all of the mutations that make Omicron completely different from earlier variants is that it could have altered its means to contaminate differing types of cells,” Deenan Pillay, professor of virology on the College School of London, advised The Guardian.
“In essence, it appears to be extra in a position to infect the higher respiratory tract — cells within the throat,” he defined. “So it will multiply in cells there extra readily than in cells deep within the lung. That is actually preliminary however the research level in the identical course.” With extra virus within the throat, it will make sense why Omicron is extra transmissible, rapidly leaping from individual to individual.
These animal research present stable proof that Omicron is much less dangerous than earlier variants, one thing that has solely been hypothesis from researchers and people who find themselves maintaining observe of skyrocketing circumstances and the small bump in hospitalizations. It has additionally pushed folks to query the way in which by which they perform their at-home COVID-19 exams, with some consultants suggesting swabbing the throat vs the nostril may produce extra correct outcomes.
RELATED: Right here’s What You Ought to Do If You Check Optimistic For COVID-19
Whereas extra research are vital in an effort to draw definitive conclusions, this pattern is illuminating and is one which has appeared in a wide range of research and that would change the methods by which the world copes with the Omicron variant.
|
<urn:uuid:74d141da-6553-42b5-ab4e-9b317d9573bf>
|
CC-MAIN-2022-33
|
https://cannabinoid.io/this-is-the-motive-why-omicron-is-much-less-extreme-in-accordance-to-research/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00401.warc.gz
|
en
| 0.961996
| 554
| 2.84375
| 3
|
Web Date: October 15, 2012
A Quick Two-Step Method To Make MOF Thin Films
Researchers have found a simple, fast way to make thin films of metal organic frameworks (J. Am. Chem. Soc., DOI: 10.1021/ja307953m). The two-step technique allows researchers to control the films’ thickness and could work with many types of the framework materials, known as MOFs. The advance could make it easy for scientists to use MOFs in hydrogen storage and gas sensors, the researchers say.
MOFs are crystalline materials that contain metal clusters connected by organic molecules. Their structure makes the materials very porous and gives them a large surface area. Because of these properties, researchers have studied them for storing hydrogen gas to fuel vehicles. Scientists are also interested in using the materials as catalysts and sensors, both of which require large surface areas. All of these applications would require MOFs in thin films of known thickness with regular, well-defined pores to allow molecules to easily diffuse through.
The best-known way to make such thin films, and to control the films’ thickness, is to grow crystalline MOF layers one by one on a substrate, says Hiroshi Kitagawa, a chemist at Kyoto University, in Japan. In addition to consuming time, this method isn’t compatible with all types of MOFs. Some MOFs require harsh synthetic conditions such as high temperatures and corrosive solvents. These conditions would destroy the substrate or the growing film itself.
Kitagawa and his colleagues avoid this problem by producing the MOF separately from growing the film. First, they prepare their MOF particles of choice in solution using the material’s synthetic conditions. Then they disperse the MOFs on the surface of water to produce a thin film. The team uses a rubber stamp to transfer the materials to a solid substrate. Because they place the films on the substrate after they’ve synthesized the MOFs, they don’t have to worry about the MOF production conditions destroying their growing film or substrate.
The researchers used this assembly method to make thin films of MOFs containing copper and a type of porphyrin. They first combined copper and the porphyrin compound in N,N-diethylformamide and ethanol to create MOF flakes. Using atomic force microscopy, the researchers found that the flakes were 300 to 500 nm in diameter and about 15 nm thick. They then dispersed the flakes in ethanol or acetone using ultrasonication. Drop by drop, the team added this suspension to the surface of water in a beaker. The flakes spread out to form a flat thin sheet, and the researchers used a stamp to lift the sheet and transfer it to a solid surface. They repeated the process to stack up layers of the sheets and make a film of a desired thickness.
The method is fast, Kitagawa says: His team could stack 100 layers of MOF sheets in 10 minutes. By contrast, the traditional method took them 10 minutes to produce a single layer.
Osama Shekhah at the King Abdullah University of Science and Technology, in Saudi Arabia, says the new method is convenient, which is important to researchers working on new applications of MOFs. He thinks the technique’s only drawback is that it applies only to two-dimensional, flake-shaped MOFs that can spread out into sheets on water. Kitagawa is working to apply the technique to MOFs with three-dimensional crystal structures.
- Chemical & Engineering News
- ISSN 0009-2347
- Copyright © American Chemical Society
|
<urn:uuid:ce258d3b-2a89-49a5-bd52-d19368d0845c>
|
CC-MAIN-2016-36
|
http://cen.acs.org/articles/90/web/2012/10/Quick-Two-Step-Method-Make.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982969890.75/warc/CC-MAIN-20160823200929-00011-ip-10-153-172-175.ec2.internal.warc.gz
|
en
| 0.934921
| 745
| 3.90625
| 4
|
National Preparedness Month is a time to focus our attention on the importance of preparing our families, homes, businesses, and communities for disasters that threaten our lives, property, and homeland. During this time, we also honor the brave men and women who selflessly respond to crises and disasters, rendering aid to those in need. These first responders, who work tirelessly to safeguard our Nation and protect our citizens, deserve our utmost gratitude and appreciation.
Over the past year, communities nationwide and across the Territories have witnessed and endured damage from multiple hurricanes, wildfires, tornadoes, floods, volcanic eruptions, and other natural disasters. The historic hurricane season of 2017 included three catastrophic storms that made landfall within a month, and was followed by a destructive series of wildfires in California. Combined, these natural disasters affected 47 million people and tens of thousands were mobilized to provide aid, comfort, and assistance. We are also especially mindful of those currently affected by ongoing wildfires in California, Oregon, and Colorado. In spite of tremendous challenges, the resilience of the American people continues to prevail.
Tragedies are somber reminders that preparedness is a shared responsibility and that it is critical to maintain readiness. All Americans can prepare for potential disasters by developing and practicing a family emergency response plan, assembling a disaster supply kit, signing up for alerts on mobile devices, setting aside emergency savings, and maintaining adequate insurance policies for their homes and businesses. The Federal Emergency Management Agency’s Ready Campaign outlines other important steps to best prepare for a major disaster.
This month, I encourage all Americans to take the opportunity to ensure they have an emergency response plan in place and ready to be properly executed. Emergencies and disasters test the resilience and strength of families, communities, and our Nation. It is impossible to avoid every challenge and threat, but we can and must prepare for them. By doing so, we can help protect our communities and save lives.
NOW, THEREFORE, I, DONALD J. TRUMP, President of the United States of America, by virtue of the authority vested in me by the Constitution and the laws of the United States, do hereby proclaim September 2018 as National Preparedness Month. I encourage all Americans, including Federal, State, and local officials, to take action to be prepared for disaster or emergency by making and practicing their emergency response plans. Each step we take to become better prepared makes a real difference in how our families and communities will respond and persevere when faced with the unexpected.
IN WITNESS WHEREOF, I have hereunto set my hand this thirty-first day of August, in the year of our Lord two thousand eighteen, and of the Independence of the United States of America the two hundred and forty-third.
DONALD J. TRUMP
|
<urn:uuid:b589e832-65c4-4dd6-9186-4615a4306c63>
|
CC-MAIN-2020-24
|
https://jasperandsardine.wordpress.com/2018/09/03/what-is-coming-will-happen-soon-white-house-issues-proclamation-on-national-preparedness-month/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347426956.82/warc/CC-MAIN-20200602224517-20200603014517-00498.warc.gz
|
en
| 0.943622
| 562
| 2.9375
| 3
|
Safe Walking Routes
Teach your child good safety habits, such as:
- to stop at every corner and look all ways for oncoming vehicles before crossing;
- to walk quickly, but don’t run;
- to use crosswalks, stop signs, traffic signals, school patrols, and adult crossing guards;
- where no walkways are provided, walk on the left side of the roadway as far off the travelled part of the roadway as possible, facing approaching traffic.
This Map of Safe Walking Routes shows the preferred routes for walking to school safely. Please show your child the safest routes and teach them good safety habits.
|
<urn:uuid:001e0aa1-fb47-47a2-bee7-3eaef2973cc2>
|
CC-MAIN-2018-17
|
https://www.rentonschools.us/Page/1438
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948047.85/warc/CC-MAIN-20180426012045-20180426032045-00101.warc.gz
|
en
| 0.921012
| 134
| 3.65625
| 4
|
Warlpiri Early Childhood Development – AustraliaCategory: Education
July 2013 - September 2019
Access to quality early childhood care and education is critical for lifelong outcomes. However, early childhood care and development opportunities for children in remote Indigenous communities still lag well behind those experienced by most non-Indigenous Australians. World Vision helps facilitate programs designed to improve the health and well-being of children aged up to five years in Warlpiri communities through support provided by parents, carers and early childhood services.
To improve the health and well-being of children aged up to five years in the four Warlpiri communities by establishing a foundation for them to meet their social, intellectual, spiritual and physical needs through the support of parents, caregivers and quality early childhood services:
– Increase access to early learning and care for children in their community
– Support early childhood training for local community members
– Support the work of local governance through Early Childhood Reference Groups
– Work collaboratively with other early childhood services and staff such as schools, childcare centres and health professionals to increase outcomes for children in each community
|
<urn:uuid:47a36b4b-00ee-4b90-81ed-43f4f78b7280>
|
CC-MAIN-2021-31
|
http://starkids.jetstar.com/portfolio_page/berlin-2013-design/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153803.69/warc/CC-MAIN-20210728220634-20210729010634-00357.warc.gz
|
en
| 0.949502
| 221
| 2.71875
| 3
|
The Nazcan Kingdom was the earliest royal monarchy in the world, and was the predecessor of modern day Nazca. It was founded by Dion Heraclius around 4,600 BC after the Nazcan Split. The kingdom functioned more efficiently than all of the other nations on earth during its time, with the Heraclius dynasty providing great leaders throughout the entire history of the kingdom. This increased luxury allowed for increased infrastructural ingenuity and innovation, leading to many great architectural feats and great monuments. The Nazcan Kingdom was the second nation to have a military, the first being the Gondwanan Empire. However, the Gondwanan military inspired Cephas Heraclius, or Cephas the Powerful, ruler of the Nazcan Kingdom for over 40 years, to create on himself, but his ideas were different. Rather than for exploration and defense, he raised an army based on the principles of assault and territorial conquest, in hopes of one day ruling all known lands and expanding his kingdom into the unknown. He put this dream into action with the support of his people when, once again, a population crisis struck. He invaded three of the four other nations on earth at the time, conquering the Panthalassan Empire, and Cyrulean Empire. In order to thin the population, his army took part in horrific slaughters in major cities across the conquered territories
After Cephas conquered nearly the entire civilized world, it was nearly impossible for anyone who proceeded him to manage a nation of the magnitude he had dreamed, and eventually, the Gondwanans and Edes attacked from the south in the War of Preservation after the Nazcan Kingdom began to crumble, to ensure its demise for the purpose of preventing any conquest like the Cephasian Conquests from ever occurring again.
|
<urn:uuid:b775b534-8861-4ce4-9986-60a0cad26ae8>
|
CC-MAIN-2017-22
|
http://althistory.wikia.com/wiki/Nazcan_Kingdom_(Like_Glue)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607647.16/warc/CC-MAIN-20170523143045-20170523163045-00563.warc.gz
|
en
| 0.969909
| 365
| 3.828125
| 4
|
WHAT IS DOMESTIC VIOLENCE?
According to Wikipedia Domestic violence (also named domestic abuse or family violence) is violence or other abuse by one person against another in a domestic setting, such as in marriage or cohabitation. It may be termed intimate partner violence when committed by a spouse or partner in an intimate relationship against the other spouse or partner, and can take place in heterosexual or same-sex relationships, or between former spouses or partners.
Domestic violence can also involve violence against children, parents, or the elderly.
FACTS ABOUT DOMESTIC VIOLENCE
The following are some facts about domestic violence:
1. Occurs in all socio-economic groups, all religious groups, all races, and all ethnic groups and within all form of relationship, to people of all ages and physical abilities.
2. Is perpetrated against women in 95% of cases.
3. Is the single greatest cause of injury to women in this country?
4. Includes psychological, verbal or emotional abuse that can be as devastating as the physical violence.
5. Something that has happened to people you know; perhaps your neighbor, friend, sister, mother, your co-worker or even yourself.
FORM OF DOMESTIC VIOLENCE
According to Wikipedia -It takes a number of forms, including physical, verbal, emotional, economic, religious, reproductive, and sexual abuse, which can range from subtle, coercive forms to marital rape and to violent physical abuse such as choking, beating, female genital mutilation, and acid throwing that results in disfigurement or death.
Abusive behaviors are not symptoms that someone is angry or out of control. An abuser makes a choice to exert power and control over his or her partner. Abusive behaviors include physical, emotional, sexual, social, and financial abuse.
- PHYSICAL ABUSE
Physical abuse often begins with less violent assaults such as pushing. As the abuse continues, however, it becomes increasingly violent. Abusers often target areas of the body that are usually covered with clothing because the injuries are less likely to be visible to others. Acts of physical abuse include:
- Throwing objects at the victim
- Using weapons
- Withholding medications
- Attempting to force miscarriage
- Pulling hair
- Refuse to help when sick, injured or disabled
- Using or threatening to use weapons
- EMOTIONAL/PSYCHOLOGICAL ABUSE
Emotional/psychological abuse is a tool used by those who want to make their partners feel scared, crazy, worthless, or responsible for the abuse. The abuser’s goal is control over the victim. Emotional abuse may include:
- Making jokes about the victim
- Criticizing the victim’s competence
- Ignoring the victim’s feelings
- Withholding affection as a form of punishment
- Blaming the victim for all problems
- Yelling at the victim
- Humiliating the victim in front of others
- Accusing the victim of being the abusive partner
- Threatening to take the children away from the victim
- Threatening physical violence
- Extreme jealousy
- Hiding or destroying important belongings
- Frequent demands to know where she is and with whom
- Alienation/Separation from family and friends
- Public humiliation
- SEXUAL ABUSE
Sexual abuse is one of the least discussed, but most common, forms of domestic violence. Sexual abuse includes:
- Sexual jokes that make the victim uncomfortable
- Treating women as sex objects
- Criticizing the victim’s sexuality
- Using sexual jealousy as a tool of control
- Uncomfortable or unwanted touch
- Withholding sex as punishment
- Demanding sex
- Flaunting affairs
- Sex after beatings
- Forcing the victim to witness or participate in sexual activity with others
- Sexually assaulting the victim in front of the children
- Sexual torture – Forced sexual activities with abuser and/or others
- Forced prostitution
- exotic dancing
- Threatening to sexually abuse children
- Refusing to use or allowing contraception use
- Public display of extramarital affairs
- Forcing victim to watch batterer have sex with others
- Forcing harmful sexual acts against the wish of the person
- SOCIAL ABUSE
Social abuse is used to isolate the victim from others in the community. The fewer people the victim is connected with, the more control the abuser has over the victim. Examples of social abuse include:
- Insisting that the couple spend all time together
- Discouraging the victim from seeing friends or family
- Forbidding the victim to see friends or family
- Monitoring the victim’s mail or phone calls
- Restricting access to the car or car keys
- Telling others the victim is crazy or abusive
- FINANCIAL ABUSE
Abusers often attempt to establish financial control over victims. Victims who are financially dependent on abusers have fewer resources for escape. Financial abuse includes:
- Making all financial decisions for the household
- Keeping financial secrets
- Monitoring the victim’s spending
- Controlling the victim’s access to cash
- Controlling the victim’s access to chequebook or credit cards
- Refusing to let the victim work
- Forcing the victim to turn over income to the abuser
- Taking person’s earned income
- Making person beg for money
DRIVERS OF DOMESTIC VIOLENCE
The key factors found to drive domestic violence are
- Gender attitude,
- Alcohol and other substance abuse
- Relationship conflicts
- Gender attitude
The notion of male dominance and female subservience/ submissiveness is common and accepted by many communities in a country. Some form of discipline, physical or psychological, inflicted on their female partners is commonly culturally accepted as the right of men in relationships. Most of this gender attitude is promoted from childhood where the male child is accepted to be more aggressive and dominant while the girl child is encouraged to be more domestic, subservient/submissive and tolerant.
- Alcohol and other substance abuse
Alcohol in both regulated and locally brewed forms are consumed by many youths. Many also abuse other psycho-active substances, the most common of which is cannabis or Indian hemp. Most men who are reported to the security agency agreed perpetrating such act also due to the takeoff alcohol and other intoxicating substances.
- Relationship conflicts
Suspicion of infidelity appears to contribute to the experience of domestic violence. Most women who experience domestic violence is due to the fact that they interfered in their partner having other affairs and cheating them, which lead to relationship conflict. Therefore playing a role in their experience of domestic violence.
STRATEGIES USED TO ADDRESS DOMESTIC VIOLENCE
Here are some key strategies used to address domestic violence:
- Public education
Various forms of educational materials, mainly in print media, are used to convey messages discouraging domestic violence. Once a while, non-governmental organizations promote walk-through in the community to draw attention to the evils of domestic violence.
- The social works office
Patients identified by health workers as victims of domestic violence are usually referred for counselling by social workers. The counselling also includes negotiations for the safety of the victims and arrangements for alternative homes where appropriate. These social workers are based at the clinics and the referral hospitals from where they conduct visits to victims’ homes in the community as needed. They receive patients with domestic violence only when they are referred to them by the attending health practitioners. They are often challenged by transport, apart from arranging safe shelters when requested by the victim, they are unable to provide conclusive assistance in most instances.
- The police department
Self-reports of domestic violence and referrals from the social works department are attended to by the police. Perpetrators of domestic violence are often arrested and charged for assault occasioning when the victim or relatives of the victim are willing to press charges.
- governmental organizations
These organizations handle self-referrals of domestic violence victims and intervene with counselling, arrangements for safety and support for litigation of the perpetrator. They are the main promoters of community education and motivation against domestic violence.
The focus of interventions against domestic violence currently consists of actions taken, usually after the domestic violence has been going on for considerable periods. Community education and mobilization against domestic violence are often prompted by reports of severe violence or death – passion killing – of a victim.
YOU CAN DO SOMETHING ABOUT IT
These questions may help you determine if you or someone you know or are working with is being battered.
Does someone close to you?
- Push, hit, shove, slap, kick, choke, hurt or scare you?
- Threaten to hurt or kill you or your family or friends?
- Call you names and humiliate you?
- Criticize the things you do and say, or the way you look?
- Force you to have sex against your will?
- Threaten to take your children?
- Hurt your pets or destroy things special to you?
- Isolate you by: taking away the car keys, money or credit cards; listening to your phone calls; opening your mail; locking you inside your home; or refusing to let you work, attend school, go to church, or form friendships?
- Call you or appear unexpectedly at your workplace, home, school or elsewhere to check up on you?
- Tell you that you are crazy?
- If you are lesbian, bisexual or gay, threaten to “out” you or tell others of your sexual orientation?
If any of these sound familiar, you may be or your friend may be a victim of domestic abuse.
NOTE: Asking or answering these questions in the presence of the perpetrator or others may endanger you or someone else. This information must be kept confidential.
WHY DO VICTIMS STAY IN ABUSIVE RELATIONSHIPS?
The following are the various reasons why most victims stay in an abusive relationship:
- For sake of children
- Economic dependence
- Family pressure
- Fear of being alone
- Fear of retaliation
- Loyalty to abuser
- Duty & responsibility
- Shame & humiliation
- Things will get better
- Feels deserve treatment
- Social isolation
HOW TO HELP
If you know someone who is in an abusive relationship or if you know someone who is being hurt due to domestic violence. Here are the list of things to do so you can the person:
- Listen without giving advice, unless it is asked for, and believe what they tell you
- Acknowledge their feelings. Do not tell them how they should feel
- Let them know you are concerned about their safety
- Do not pressure them to leave their partner‐ this could be dangerous
- Don’t assume that they will identify as a “victim of domestic violence.” Ask Questions such as “Do you feel afraid of your partner?”
- Believe your friend, and keep what she tells you confidential.
- Don’t blame the victim for the abuse. The abused person is not responsible for being abused and does not deserve to be abused.
- They need to tell their story in their own time and own pace. Take the time to talk privately with your friend or co-worker and ask about suspicious bruises or fights that you know about.
- Help her make safety plans.
- Validate feelings. Your friend or co-worker may feel hurt, angry, afraid, ashamed and trapped and may also love the abuser.
- Assault is a crime. If you hear or see abuse that is occurring, call any agency responsible for domestic violence within your area.
I declare that I have no financial or personal relationships that may have inappropriately influenced me in writing this article. I write this articles based on my experience with those who have such.
I will like to ask a simple question for my fellow readers and viewers.
- What is your own views and contributions on this articles?
- Are you aware of existence of domestic violence in your area? If so, explain
- What are your perceptions of girls/women who experience domestic violence
- Do these girls/women enjoy in this marriage/relationship? Elaborate.
- What in your view is the best way forward to solve this problem?
- Does culture in any way contribute to domestic violence?
Please let me know all your reactions, views and insights in the comment box below!
Kogwuonye Patrick Onyeka
University of Benin
Credited to :
|
<urn:uuid:6dd67917-689c-40ad-a348-cadff19d5a27>
|
CC-MAIN-2020-10
|
https://patrickrealstories.wordpress.com/2019/09/29/patrick-view-domestic-violence/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143784.14/warc/CC-MAIN-20200218150621-20200218180621-00341.warc.gz
|
en
| 0.943546
| 2,608
| 3.40625
| 3
|
ERIC Number: ED411978
Record Type: Non-Journal
Publication Date: 1996
Reference Count: N/A
Playing on the Mother-Ground: Cultural Routines for Children's Development. Culture and Human Development.
Lancy, David F.
This book describes an ethnographic study of cultural routines involved in enculturating children into Kpelle society in West Africa. The study focused on: (1) playforms such as pretend play; and (2) adult-guided activities such as apprenticeship. Chapter 1 of the book, "Studying Child Development in Kpelle Society," introduces the general approach to the study. Chapter 2, "Cultural Routines for Children's Development," describes a theory of child development incorporating cultural routine and "culture as information" as core concepts. Chapter 3, "The Research Setting," describes earlier research with the Kpelle of Liberia, the principal research site, and Kpelle cultures. Chapter 4, "Kpelle Work," presents an emic characterization of work, focusing on the social machinery in rice cultivation. Chapter 5, "Parents, Children, and Make-Believe," examines stories that parents and young children tell about each other, how children participate in household activities, parents' expectations for children, and the open spaces in the village where children engage in pretend play and observe adults. Chapter 6, "Games and Models," describes experiments to identify cognitive skills transmitted in playing games. Chapter 7, "Dances, Songs, Stories, Proverbs, and the Acquisition of Values," discusses transmitting character through morally loaded texts. Chapter 8, "Children's Work," focuses on children's work which provides a direct way to learn adult responsibilities and acquire adult competencies. Chapter 9, "Apprenticeship and Bush School as Formal Education," discusses learning various skills and the initiation process. Chapter 10, "The Kwii Way," addresses social change, Kpelle adaptation to formal education, and purposes of enculturation. Contains approximately 250 references. (KB)
Descriptors: Apprenticeships, Child Development, Children, Cognitive Development, Context Effect, Cross Cultural Studies, Cultural Influences, Ethnography, Ethology, Family Work Relationship, Foreign Countries, Games, Individual Development, Informal Education, Mothers, Parent Child Relationship, Participant Observation, Play, Pretend Play, Socialization, Songs, Story Telling, Theories, Values Education
Guilford Publications, Inc., 72 Spring Street, New York, NY 10012; phone: 800-365-7006; fax: 212-966-6708; (hardcover, ISBN-1-57230-142-2, $35; softcover, ISBN-1-57230-215-1, $17.95).
Publication Type: Books; Reports - Research
Education Level: N/A
Authoring Institution: N/A
Identifiers - Location: Liberia
|
<urn:uuid:f519bf74-d74a-4d5d-9c2d-aa21bac31df4>
|
CC-MAIN-2018-26
|
https://eric.ed.gov/?id=ED411978
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267859923.59/warc/CC-MAIN-20180618012148-20180618032148-00001.warc.gz
|
en
| 0.893934
| 602
| 2.546875
| 3
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.