text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
7.09k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
David Hudson asked: Why do things burn up on entering Earth's atmosphere? Dave - The main reason why things heat up when they hit the Earth’s atmosphere is they've got huge amounts of kinetic energy - they're going incredibly fast. When they bash into the Earth’s atmosphere, most of the heating is actually because the air they bash into hasn’t got time to get out of the way, so the air gets compressed; and when you compress air, it gets hotter. You may have noticed this if you've ever pumped up a bicycle tyre very, very quickly: the end of the pump gets hot. So, the air in front of the inbound object - such as a meteor or even an asteroid - heats up, and that starts to erode the surface of the object and you get this tail of hot, burning material, which you see as a shooting star. With very small things, because the friction is so much larger compared to their mass, they tend to lose their speed much more gently very high up in the atmosphere, so they slow down more gently and don’t get as hot. And once they slow down enough, they just drift down like dust through the atmosphere. So, it is conceivable that something like bacteria clinging to a small dust grain could survive re-entry from space, whereas a big lump of rock would melt very quickly. It's also to consider that the faster a gas is going the more kinetic energy it has and increase in kinetic energy means an increase in temperature Pmb, Sun, 20th Oct 2013 Regarding the two explanations given above, they are completely equivalent. One is based on a microscopic level and the other on a macroscopic level. It doesn't matter what I understood. "Of course it does. You confused ram pressure with fluid pressure in this particular case." By the way. For those of you who have a problem with using the term "temperature" other than as the scalar (i.e. Cartesian scalar/invariant) that one uses in thermodynamics, i.e. as in reentry temperatures I strongly suggest that you not get bogged down with concerns about who used a word correctly or not and train your thoughts back to the real question, i.e. Why do objects burn up on entering the Earth's atmosphere? Back in the depths of ancient history, what you said was this Having read this thread with interest, I suspect that if anyone asks me this question I shall say "friction". Naive? Perhaps, but it may be what the person is looking for. can u go very slow and not heat up dd, Sun, 21st Dec 2014
<urn:uuid:47f32d04-949c-4452-a635-4eb7386f4d8b>
CC-MAIN-2015-18
http://www.thenakedscientists.com/HTML/questions/question/3007/
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246642012.28/warc/CC-MAIN-20150417045722-00019-ip-10-235-10-82.ec2.internal.warc.gz
en
0.953536
558
2.84375
3
In this article, we are dealing with the trends in the post-Mauryan art and architecture as a part of the Indian Culture series based on the NCERT textbook ‘An Introduction to Indian Art’- Part 1. We have already discussed the arts of the Mauryan period in the previous article. This post gives a detailed description about the Post-Mauryan Schools of Art and Architecture such as Gandhara, Mathura, Amaravati, etc. and also the cave traditions that existed during the period. This post also deals with some of the important architectural sites such as Sanchi, Ajanta, Ellora, etc. Indian Architecture after the Mauryan Period - From the second century BCE onwards, various rulers established their control over the vast Mauryan Empire: the Shungas, Kanvas, Kushanas and Guptas in the north and parts of central India; the Satavahanas, Ikshavakus, Abhiras, Vatakas in southern and western India. - The period also marked the rise of the main Brahmanical sects such as the Vaishnavas and Shaivas. Places where important sculptures are seen Some of the finest sculptures of this period are found at Vidisha, Barhut (M.P), Bodhgaya (Bihar), Jaggaypetta (Andhra Pradesh), Mathura (UP), Khandagiri-Udayagiri (Odisha), Bhaja near Pune (Maharashtra). - Barhut sculptures are tall like the images of Yaksha and Yakshini in the Mauryan period. - Modelling of the sculpture volume is in low relief maintaining linearity. - Relief panels are depicted by narratives and clarity in the narratives are enhanced by selecting main events. - Narrative panels are shown with fewer characters, but as the time progress, apart from the main character in the story, others have also started appearing in the picture space. - Availability of space is utilized to the maximum by the sculptors. - Narrative reliefs at Barhut show how artisans used the pictorial language very effectively to communicate stories. - One such narrative shows Queen Mahamaya/Mayadevi’s (mother of Siddhartha Gautama) dream. - The queen is reclining on the bed, whereas an elephant is shown on the top heading towards the womb of the queen Mayadevi. - On the other hand, the depiction of a Jataka story is very simple – narrated by clubbing the events according to the geographical location of the story like the depiction of Ruru Jataka where the Bodhisattva deer rescuing a man on his back. - Such Jataka stories became part of stupa decoration. - With the rise in the construction of stupas in various parts of the country, regional stylistic variations also began to emerge. - The next phase of cultural development at Sanchi stupa-1, Mathura and Vengi in Andhra Pradesh is noteworthy in the stylistic progression. - Stupa-1 at Sanchi has upper as well as lower pradakshinaptha or circumambulatory path. - It has four beautifully decorated Torans (Gateways) depicting various events from the life of Buddha and Jataka stories. - Figure compositions are high in relief, filling up the entire space. - The depiction of posture gets naturalistic and there is no stiffness in the body. - The narration gets elaborated and carving techniques appear more advanced than Barhut. - Symbols continued to be representing Buddhas or past Buddhas (according to the textual tradition there are 24 Buddhas, but only first one, Dipankar, and the last six are pictorially represented). - Even though narrative gets more elaborated, the depiction of the dream episodes remains very simple (the dream of queen Mayadevi). Stupa-1, Sanchi (Madhya Pradesh): - Sanchi near Bhopal, Madhya Pradesh, is a World Heritage Site. - Along with other relatively small stupas, there are three main stupas. - Stupa-1 is presumed to have the relics of the Buddha. - Stupa-2, the relics of ten less famous Arhats belonging to three different generations (In Theravada Buddhism, an Arhat is a perfected person who has attained Nirvana. In other Buddhist traditions, the term is used for people far advanced along the path of Enlightenment, but who may not reach full Buddhishood). - Stupa-3 has the relics of Sariputta and Mahamoggallana/Mahamougalayana (disciples of Gautama Buddha). - Stupa-1 is the finest example of stupa architecture and is known for the carvings on its gateways (torans). - Originally it was a small brick structure which expanded over a period and was covered with stone, vedika (fence) and the torans. - There is also the upper pradakshinapatha which is unique to this site (i.e., totally two pradakshinapathas). - The four gateways are decorated profusely with sculptures. - Buddha is shown symbolically as an empty throne, feet, chhatra, stupas etc. - Torans are constructed in all four directions. - Their stylistic differences indicate their possible chronology from the first century BCE onwards. - Though stupa-1 is the oldest stupa, the carvings of images at the vedika of stupa-2 are earlier than those on stupa-1. - Jataka stories also became an important part of the narratives. - The figures in Sanchi despite being small in dimension are very naturalistic. - There are guardian images on sculptors and salabhanjika sculptures are remarkable in their volume (salabhanjika are sculpture of ladies holding the branch of a tree/plate etc). - Each torana consists of two vertical pillars and three horizontal bars on the top. - Each horizontal bar is decorated with different sculptural themes on both sides. - Supporting the extension of the lowermost horizontal bar from below are the images of salabhanjikas. Mathura, Sarnath, Amaravati and Gandhara Schools - In the first century CE onwards, Gandhara (now in Pakistan), Mathura in UP and Vengi in Andhra Pradesh emerged as important centres of art. - Buddha in the symbolic form got a human form in Mathura and Gandhara. - The sculptural tradition in Gandhara had the confluence of Bactria, Parthia (both were Indo-Greeks) and the local Gandhara tradition. - The local sculptural tradition of Mathura became so strong that the tradition spread to other parts of northern India. The best example is the stupa sculpture found at Sanghol in the Punjab. - The Buddha image at Mathura is modelled on the lines of earlier Yaksha images, whereas in Gandhara it has Hellenistic features. [Hellenistic art is the art of the Classical period dating from the death of Alexander the Great in 323 BCE to the emergence of ancient Rome]. - Images of Vaishnava and Shaiva faiths are also found at Mathura, but Buddhist images are found in large numbers. - The images of Vishnu and Shiva are represented with their Ayudhas (weapons). - Characteristics of the different architectural schools are explained below with a suitable example from each. Seated Buddha, Katra mount, Mathura: - A large number of images dating back to the Kushan period are from Mathura. - The image of Buddha from Karta Mount belongs to the second century CE. - It represents the Buddha with two Boddhisattva attendants. - The Buddha is seated in Padmasana and the right hand is in the Abhayamudra. - The face of the Buddha is round with fleshy cheeks. - The Ushanisha (hair knot) is shown with a vertical raised projection. - Mathura sculptures from this period are made with light volume having a fleshy body. - The sanghati (garment) covers only one shoulder. - The attendant figures are identified as the images of Padmapani and Vajrapani Bodhisattvas as one hold lotus and the other a Vajra (Thunderbolt). - The halo around the head of Buddha is very large and is decorated with simple geometric motifs. - There are two flying figures placed diagonally above the halo. Seated Buddha at Sarnath, UP: - The image of Buddha from Sarnath made of chunar sandstone belongs to the late fifth century CE. - The Buddha is shown seated on a throne in Padmasana. - It represents Dhammachakrapravartana (first sermon) as can be seen from the figures on the throne. - The panel below the throne depicts a Chakra (wheel) in the centre and a deer on either side with his disciples. - Thus, it is the representation of the historic event of Dhammachakrapravartana or the preaching of dhamma. - It is the finest example of Sarnath School of sculpture. - The face is round, the eyes are half closed, the lower lip is protruding, and the roundness of cheeks has reduced as compared to the earlier images from the Kushana period at Mathura. - The hands are shown in Dhammachakrapravartana Mudra. - The Ushanisha has circular curled hairs. - The aim of the sculptures in ancient India had always been to represent the Buddha as a great human being who achieved Nibbana (cessation of anger and hate). Buddha Head, Taxila, Gandhara: - The Buddha head from Taxila in the Gandhara region, now in Pakistan, dates back to the second century CE and belongs to the Kushanas period. - It shows the hybridized pictorial convention that developed during the Gandhara period. - It has Greeko-Roman elements. - The Buddha Head has typical Hellenistic elements. - The curly hair of Buddha is thick having a covered layer of shape and linear strokes over the head. - The forehead plane is large having protruding eyeballs, eyes are half closed and the face and cheeks are NOT round like the images of other parts of India. - There is a certain amount of heaviness in the figures of Gandhara region. - The ears are elongated, especially the ear lobes. - The treatment of the form bears linearity and the outlines are sharp. - The surface is smooth and the image is very expressive. - The expression of calmness is the centre point of attraction. - Modelling of face enhances the naturalism and three-dimensionality. - Assimilating various traits of Acamenian, Parthian and Bactrian tradition into the local tradition is a hallmark of Gandhara style. - The source of development of Buddha images as well as other has its genesis in its peculiar geopolitical conditions. - It may also be observed that the north-western part of India, which is now in Pakistan, always had continuous habitation from proto-historic times. It continued in the historic period as well. Amaravati stupa, Andhra Pradesh: - Vengi in Andhra Pradesh has many stupas like Jagayyapetta, Amaravati, Bahattiprolu, Nagarjunakonda, etc. - Amaravati has a Mahachaitya and had many sculptures. - Like Sanchi stupa, Amaravati stupa also has pradakshinapatha enclosed within a vedika on which many narrative sculptures are depicted. - The domical stupa structure is covered with relief stupa sculpture slab which is a unique feature. - The torana of the Amaravati stupa has disappeared over a period of time. - Like Sanchi, the early phase is devoid of Buddha images but during the later phase (2nd and 3rd CE); the Buddha images are carved on the drum slabs and at many other places. - The sculptural form in this area is characterized by intense emotions. - Bodies are shown with three bends (Tribanga), and the sculpture composition is more complex than Sanchi. - The Dream of Queen Mayadevi has also been depicted here. - Independent Buddha images are also found at Amaravati, Nagarjunakonda and Guntapalle. - Guntapalle is a rock cut cave near Eluru, Andhra Pradesh. - In Karnataka, Sannati is the largest stupa excavated yet. - Along with the images of Buddha, other Buddhist images of Bodisattvas like Avalokiteswara, Padmapani, Vajrapani, Amitabha, and Maitreya Buddha started getting sculpted. Cave tradition in western India - In the western India, many Buddhist caves dating back to the second century BCE onwards have been excavated. - Mainly three architectural types were executed: - Apsidal vault-roof chaitya hall (found at Ajanta, Pitalkhora, Bhaja) - Apsidal vault-roof pillar-less hall (found at Thana-Nadsur) - Flat roofed quadrangular hall with a circular chamber at the back (found at Kondivite) - In all the chaitya caves, a stupa at the back is common. - In the first century BCE, some modifications were made to the standard plan of the apsidal vault-roof variety where the hall becomes rectangular with a stone screen wall as facade. - The biggest rock cur chaitya hall was excavated in Karla, Maharashtra. - Viharas are excavated in all the caves. - The plan of vihara consists of a veranda, a hall and cells around the walls of the hall. - Many of the early vihara caves are carved with interior decorative motifs like chaitya arches and the vedika designs over the cell doors of the cave. - A stupa was added in the back of the vihara in the later period and it became Chaitya- Vihara. - Junnar (Maharashtra) has the largest cave excavations – more than 200 caves around the hills of the town – whereas Kanheri in Mumbai has a hundred and eight excavated caves. - Vihara cave excavated at Junnar is popularly known as Ganeshi because of an image of Ganesh belonging to a later period was installed in it. - Earlier it was believed that because of the absence of the Buddha images, the caves were considered belonging to the orthodox faith of Buddhism, Theravadins. - But with the discovery of Konkan Maurya inscription mentioning the Saka era 322 (400CE), it is now satisfactorily proved that the caves activity in western Deccan was an ongoing process and many caves had been carved with Buddha image where the image does not exist anymore. - It may also be noted that many caves are converted into modern Hindu shrines and have become popular worship sites. - The famous cave site in western India is Ajanta. - It is located in Aurangabad district of Maharashtra. - It has 29 caves, including 4 chaitya caves. - It has the large Chaitya-Vihara and is decorated with sculpture and paintings (murals). - Ajanta is the only surviving example of the painting of the first century BCE and the fifth century BCE. - Some of the vihara caves here are unfinished. - The important patrons of Ajanta were Varahadeva, the Prime Minister of Vakataka king Harisena; Upendragupta, the local king of the region and feudatory of Harisena; Buddhabadra and Mathurasena. - Major paintings are in cave Nos. 1, 2, 16 and 17. - The paintings have a lot of typological variations. - Figures in the paintings are heavy like the sculptures of western India. - Cave excavation and painting were a simultaneous process and dating of the paintings follows the date of the cave excavation. - Almost in all the finished excavations, pictures have been painted, but very few have survived. - Various skin colours in the paintings represent multi-coloured society. - The themes of the paintings are events from the life of Buddha, the Jatakas and Avadanas. - Events happened in the jungle and events happened in the palace are separated by their locations. - Images of Padmapani and Vajrapani are very common in Ajanta. - It is a painting which dates back to the late first century CE. - The Bodhisattva is holding a padma (Lotus) has large shoulders and has three bents in the body creating a movement in the picture space. - The modelling is soft and the outlines are merged with the body volume, creating the effects of three-dimensionality. - Light red, brown, green and blue colours are used in the picture. - On the other side of the image, Vajrapani Bodhisattva has been painted. - He holds a vajra in his right hand and wears a crown. - Bodhisattvas are painted as shrine guardians - Similar pictures can be seen in other caves too. However pictures in cave no.1 are among the best survived paintings of Ajanta. Mara Vijaya, Ajanta cave no. 26 - The theme of Mara Vijaya has been painted in the caves of Ajanta, but only cave no.26 has a sculptural representation, sculpted on the right wall. - The panel shows the image of the Buddha in the centre, surrounded by Mara’s army. - The event is the part of enlightenment and Mara represents desire. - It is the personification of mind which the Buddha went through at the time of enlightenment. - The Buddha is shown with his right hand indicating towards the earth as a witness to his generosity. - The image of Mara is shown contemplating how to disturb Siddhartha, the name of Buddha before enlightenment. - Another important cave site located in Aurangabad is Ellora. - It is located 100kms away from Ajanta. - There are 32 Buddhist, Brahamanical and Jain caves. - It is unique art historic site in the country as it has monasteries associated with the three religions dating from fifth century CE onwards to eleventh century CE. - It is also unique in terms of stylistic eclecticism, i.e., the confluence of many styles at one place. - There are 12 Buddhist caves having many images belonging to Vajrayana Buddhism. - Buddhist caves are big in size and are of a single, double and triple storey. - The triple storey of Ellora is a unique one. - Pillar designs grow from Buddhist caves and when they reach Jain caves (9th century CE), they become very ornate and the decorative forms gain heavy protrusion. - Most of the caves of Brahamanical faith are dedicated to Shaivism. - The different avatars of Vishnu are also depicted here. - Cave no.16 is known as Kailas Leni/ kailasa temple. - It is a rock cut temple which is carved out of a single rock. - It was built in the 8th century CE. - The grand sculpture of Ravana attempting to lift Mount Kailash, with his full might is a landmark in Indian art. Elephanta caves and other sites: - Elephanta caves located on Elephanta Island near Mumbai were originally a Buddhist site which was later dominated by the shaivite faith. - It is contemporary with Ellora. - The other noteworthy cave site is Bagh located near Indore, MP. - The Bagh cave also contains paintings and a painting which represents a group of dancers resembles the Garba Dance of North India (originated in Gujarat). - The tradition of rock-cut cave continued in the Deccan and they are found not only in Maharashtra but also in Karnataka, mainly at Badami and Aihole, executed under the patronage of the Chalukyas; in Andhra Pradesh in the area of Vijayawada; and in Tamil Nadu, mainly at Mahabalipuram, under the patronage of the Pallavas. - When the early history of the country depends on collective public patronage, the post sixth century CE depends more on political patronage. - The sculpture of Maheshmurti (Shiva at centre and heads of Bhairava and Uma on either side) is located here. Cave tradition in Eastern India - Like in western India, Buddhist caves have been excavated in eastern India, mainly in the coastal regions of Andhra Pradesh and Odisha. - One of the main sites in Andhra Pradesh is Guntapalle in Eluru district. - Guntapalle is among unique sites where the structural stupas, viharas and the caves are excavated at one place. - Apart from Guntapalle, the other important site is Rampaerrampallam. - In Ankapalli, near Vishakapattanam, a huge rock-cut stupa was carved out of the hillock during 4th-5th century CE. - It is a unique site as it has the biggest rock cut stupas in the country. - Another important cave site is the Udayagiri-Khandagiri caves located in Odisha. - These caves are scattered and have inscriptions of Kaharvela Kings. - According to the inscription, the caves were meant for Jain monks. - There are numerous single cell excavations here. - The upper part of the cell is decorated with a series of Chaitya arches and narratives that still continue in the folklores of the region. - While construction of stupas continued, Brahmanical temples and images of gods also started getting constructed. - Myths mentioned in the Puranas became part of narrative representation. - Each temple had a principal image of god. - The shrines of the temple were three kinds: - Sandhara type: with pradakshinapatha. - Nirandara type: without pradakshinapatha. - Sarvatobhadra type: which can accessed from all sides. - Some of the important temple sites of this period are Deogarh (UP), Eran, Nacha-kuthara and Udayagiri near Vidisha in MP, etc. - These temples are simple structures consisting of a veranda, a hall and a shrine at the rear. Article compiled by: Jijo Sudarsan
<urn:uuid:4398843c-8310-46f8-8229-5f2392a2901a>
CC-MAIN-2019-18
https://www.clearias.com/post-mauryan-art-architecture/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529813.23/warc/CC-MAIN-20190420120902-20190420142902-00436.warc.gz
en
0.944802
4,915
3.4375
3
Junior debt, also known as subordinated debt, is debt that is unsecured and is lower on the debt hierarchy than other debt claims. Junior debt is provided without any collateral to back it and is often subject to an inter creditor agreement with the senior lender. When a company goes bankrupt, junior debt is low on the repayment food chain. Since it is subordinate, it means that the loan will most likely not be paid back if the company goes bankrupt, and other debts that are of higher importance will be paid back first. Junior loans are very high-risk debt, and generally have higher interest rates than senior debt to compensate for this high risk. It has a risk profile close to an equity security, due to the fact that it is uncollateralized and that its principal is only repaid upon the long term growth of the business. If a company is liquidated, it is repaid after senior debt and government tax agencies are repaid. Shareholders and parent companies are generally the ones who purchase junior debt. The reason the shareholders and parent companies are looking to purchase junior debt is because they have close relationships with the companies and they are willing to provide it at lower interest rates due to their knowledge and familiarity with the company. Another name for junior debt is mezzanine debt. While it is a risky loan for a lender, it is a growing and increasingly popular form of borrowing for mid-market companies. With junior debt and mezzanine debt, the lender’s incentives are very much aligned with the long term interests of the shareholders and management.
<urn:uuid:d3cda774-8650-4c1e-8f7d-ee780ce22fc4>
CC-MAIN-2022-21
https://www.attractcapital.com/what-is-junior-debt.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662510117.12/warc/CC-MAIN-20220516104933-20220516134933-00554.warc.gz
en
0.974443
322
2.734375
3
Carabus cancellatus Illiger, 1798 |Threat status Europe||Not evaluated (IUCN)| The EUNIS species component has very limited information about this species. The main focus of the EUNIS species component is to provide relevant information about the European species protected by Directives, Conventions and Agreements. The species assessed in the European Red Lists prepared by the IUCN for the European Commission are also included. See here what is Europe from a geographical point of view. Other resources available below may have more information. Common names and synonyms |Fauna Europaea search||Fauna Europaea| |GBIF||Global Biodiversity Information Facility| |ITIS search||Interagency Taxonomic Information System| |NCBI search||National Center for Biotechnology Information| Files delivered through Reportnet with relevance to this species. |2011-10-17||Poland||National Report on Derogations under the Birds and Habitats Directives (2009-2010)||habitat derogations| Summary of derogations for species EU member states are required to report derogations from protection efforts of species. |Lubelskie||2010-10-29||2011-02-28||uncnown the number of local populations||Capture for keeping in captivity||none| |Lubelskie||2010-10-29||2011-02-28||uncnown the number of local populations||Deliberate destruction in the wild||none| |Lubelskie||2010-10-29||2011-02-28||uncnown the number of local populations||Deliberate picking in the wild||none|
<urn:uuid:817fd94f-7a32-422f-877a-b31a19da3062>
CC-MAIN-2018-39
https://eunis.eea.europa.eu/species/114567
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156252.31/warc/CC-MAIN-20180919141825-20180919161825-00423.warc.gz
en
0.723283
355
3.375
3
Our topic this half term is 'Plants and flowers'. in this lesson we were looking pollination. We used a real life tulip to look at all the parts needed for pollination. Once we had discussed each part, we then dissected the tulip and label each part. We ended our lesson by drawing and writing about the pollination process. Our science topic this half term is 'Animals including Humans'. A skeleton come to visit us and we had fun labelling all his bones. We now know the names of lots of our bones and discovered lots of facts such as the longest bone in our body is the femur and that the adult human body has 206 bones in it.
<urn:uuid:1b8430bf-e9d0-4206-aa9f-41e2c8b4793a>
CC-MAIN-2022-21
https://www.sjps.lancs.sch.uk/science-26/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663011588.83/warc/CC-MAIN-20220528000300-20220528030300-00337.warc.gz
en
0.963083
145
3.3125
3
|Contact: Lynn Yarris, [email protected]| |In 1987, on the Samoan island of Savaii, what is now known as the Falealupo Rain Forest Preserve was about to be clear-cut out of existence by a logging company — and along with it a small tree, known to the natives as the mamala tree, to botanists as Homalanthus nutans. An ethnobotanist named Paul Alan Cox saved the mamala trees and their forest. Now, if the research of Jay Keasling, who heads the Synthetic Biology Department in Berkeley Lab’s Physical Biosciences Division, goes according to the plan, AIDS victims all over the world will have cause for celebration. Working through Keasling, who is a professor of chemical engineering at the University of California at Berkeley and a faculty affiliate with the California Institute for Quantitative Biomedical Research, or QB3, UC Berkely recently signed a landmark agreement with the Samoan government. The aim is to isolate the gene for prostratin, a chemical compound contained in the bark and stemwood of the mamala tree that holds enormous therapeutic potential as an anti-AIDS drug, and to share any royalties from the sale of a gene-derived drug with the people of Samoa. Under this agreement, Keasling and his research group will seek to genetically engineer a strain of Escherichia coli bacteria that can cheaply synthesize and mass-produce prostratin. “A microbial source for prostratin will ensure a plentiful, high-quality supply if it is approved as an anti-AIDS drug,” Keasling says. “I think this agreement with the Samoan government could set a precedent both for biodiversity conservation and for genetic research, by including indigenous peoples as full partners in royalties for new gene discoveries that result from their ancient medicines.” The story begins with Cox, who was once named a “Hero of Medicine” by Time magazine and is now the director of the Institute for Ethnobotany at the National Tropical Botanical Garden in Hawaii. Ethnobotanists study the ways in which indigenous cultures use plants for medicine. Which is why in 1987 Cox, then a researcher at Brigham Young University, was sitting in a thatched hut with an elderly Samoan woman named Epenesa Mauigoa. A tribal healer, she was describing for him the 121 herbal remedies she knew. Cox became particularly interested in remedy number 37. This called for boiling the bark from the mamala tree and giving the liquid to those suffering from what Samoans call fiva sama sama and we know as viral hepatitis. Drugs with potential antiviral properties are in high demand in the medical communities of developed nations, so Cox sent samples of remedy number 37 to the National Cancer Institute. In 1992, NCI researchers identified prostratin as the active ingredient in the mamala bark and found that it was indeed an effective treatment for hepatitis. However, they also found that it had powerful and unique therapeutic effects against AIDS: not only did prostratin prevent the AIDS-causing human immunodeficiency virus (HIV) from infecting human cells, it also forced dormant HIV virus particles out from hibernation within human immune cells, where they are protected from virus-killing medicines. Today’s best anti-AIDS drugs can reduce a patient’s HIV populations to safe levels, but as soon as the patient stops taking the drugs, dormant viruses emerge from their immune cell sanctuaries and quickly restore HIV populations to dangerous levels. Prostratin flushes out these “viral reservoirs” so that anti-AIDS drugs can eradicate the HIV population entirely. What’s more, unlike other compounds from the same chemical family, which have been known to promote the growth of cancerous tumors, prostratin was shown to be a tumor suppressor. Preserving the mamala tree population in Samoa was a critical first step, but there is still a crucial need to be able to mass-produce prostratin in quantities far beyond what the bark and stemwood of the trees could supply. Enter Keasling and his synthetic biology research group, who have opened the door to adding new genes to E. coli bacteria by creating an E. coli strain with a new and specially designed metabolic pathway. Prostratin is a member of the huge isoprenoid family of chemical compounds, which are used in a wide variety of applications including as anti-cancer and anti-malarial drugs — plus as an assortment of flavor and fragrance additives. Genetic control mechanisms within the E. coli‘s natural metabolic pathway would interfere with the bacteria’s ability to synthesize isoprenoid compounds, but Keasling and his colleagues get around this barrier by giving their E. coli strain a second metabolic pathway derived from yeast. This alternate pathway can be used to transform the E. coli into living factories designed to mass-produce a desired isoprenoid. Keasling and his research group first used their engineered strain of E. coli to produce a precursor to artemisinin, one of the most promising of all the antimalarial drugs. The success of this work led Keasling to Cox and his work with prostratin. Artemisinin and prostatin both belong to the terpene class of isoprenoids. “The basic superstructure of the bug we engineered to produce the antimalarial drug will work for producing prostratin,” says Keasling. “Of course, we will need to add a few additional genes, but having the basic structure in place will save us both time and money.” Keasling and Cox were both involved in the negotiations with the Samoan government. They traveled to Samoa this past August and met with the leaders of three Samoan villages where the mamala tree grows. “We gave a PowerPoint presentation in the Samoan language” — projected onto a white sheet hung in an open air village hall — “to the councils of the three villages and then to the Samoan federal government,” Keasling says. “UCB was very generous in sharing 50 percent of any royalties received on the genes from the mamala tree. Since in this particular case the Samoan healers are actually the inventors, it is only right that they receive a large fraction of the royalties for their invention.” The agreement was announced on September 30, in Apia, the capital of Samoa. Signed by Samoan Prime Minister Tuila’epa Aiono Sailele Malielegaoi and UC Berkeley’s vice chancellor for research, Beth Burnside, it recognizes Samoa’s assertion of national sovereignty over the gene sequence of prostratin and the intellectual contribution of the healers of Samoa. Any proposed licensing agreement between the university and a pharmaceutical company using the results of Keasling’s research will require the company to make the drug available in the developing world either free, at cost, or at “very nominal profit,” according to Carol Mimura, director of UC Berkeley’s technology licensing office. Cox, who in 2001 had negotiated a royalty agreement between the Samoan government and AIDS Research Alliance, a nonprofit medical organization that is sponsoring clinical trials of prostratin as an anti-AIDS therapy, hopes the UC agreement will set a precedent. In announcing the signing, he said: “This is a very positive example of how a biodiverse-rich country has partnered with a major university to develop its genetic resources. I think other nations may seek to establish similar partnerships.” For Keasling, the scientific work is just beginning. Samples of malama tree bark will be collected, probably by the end of this year or early next. These samples will be frozen in liquid nitrogen to preserve their genetic material and brought back to Berkeley, where Keasling and his group will begin their search for the genes that are responsible for prostratin biosynthesis. Once identified, the relevant genes will be inserted into their special strain of E. coli. “As part of the agreement, we intend to bring some Samoan researchers to Berkeley to learn the latest technologies in genetic engineering and synthetic biology. They will then be able to take this information back to Samoa.” In addition to the enormous potential medical benefits to be realized from use of E. coli to mass-produce prostatin, Keasling sees enormous potential ecological benefits as well. “If prostratin makes it through clinical trials and is used to treat HIV-AIDS, there will be a great
<urn:uuid:efd519e3-15a9-471e-926c-4a1e800adf50>
CC-MAIN-2023-23
https://newscenter.lbl.gov/2004/11/05/samoas-gift-to-the-world/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00768.warc.gz
en
0.948826
1,802
2.90625
3
So you heard about Pact and want to get started. This guide should hopefully get you going in the right direction. What is Pact? The Pact family of testing frameworks (Pact-JVM, Pact Ruby, Pact .NET, Pact Go, Pact.js, Pact Swift etc.) provide support for Consumer Driven Contract Testing between dependent systems where the integration is based on HTTP (or message queues for some of the implementations). They are particularly useful for µ-services, where there can be lots of inter-dependent services and integration testing quickly becomes unfeasible. Before we can get deeper into Pact, you need to get an understanding of Consumer Driven Contracts. What are Consumer Driven Contracts? Consumer Driven Contracts is a pattern or methodology where contracts between inter-dependent services are designed from the perspective of a service consumer. The main article for it is Consumer-Driven Contracts: A Service Evolution Pattern, but it is a bit dated with respect to technology (it talks a lot about XML and Schemas). But the concepts expressed in the article are relevant to the computer systems we build today. I find a lot of the time the teams who are building µ-services or internal APIs follow the same thinking as for external or public APIs. The service provider or API team think of all the things that any consumer of their service would need (making many assumptions along the way) and then provide the service along with documentation on how to use it. They build it and hope the consumers will come. When they later need to change it, they make the changes and then publish it along with instructions that all consumers need to follow to use the updated API. They may include multiple versions of the service to protect consumers from breaking changes. I witnessed first-hand two teams developing and consuming an API. It took them a number of days to get the interaction working in a integration testing environment after building the consumer and provider because the consumer team assumed the API would be based on posting a JSON document (it was being invoked from a web browser), while the provider team implemented an application/x-www-form-urlencoded POST API. But the irony is in the case for internal APIs and services, it is not that hard to work out who all the consumers of your service are and what their requirements may be. Most of the time, they all work for the same organisation. Consumer Driven Contracts turns this all around. The contract for the interaction is developed by the consumer of a service. The benefits to this approach are that you know who all the consumers of your service are, you’ll know when you make breaking changes so it is easier to make changes and the contract is also a form of documentation. Secondly, you’ll know exactly what functionality needs to be provided so you can implement the right services needed by your consumers and can follow the YAGNI principle. The development of the interaction starts from the consumer side, hopefully with a test. The consumer team defines the contract for the interaction and implements the service consumer based on the contract. This contract is then provided to the provider team (in some cases it is the same team) and the provider service is implemented to fulfill the contract. What do I need to do to get started? Most of the information can be found on the Github pages for the various Pact implementations. The Ruby Pact one has a lot of information in the wikis. - Ruby Pact: https://github.com/realestate-com-au/pact - JVM Pact: https://github.com/DiUS/pact-jvm - .Net Pact: https://github.com/SEEK-Jobs/pact-net - Pact Go: https://github.com/pact-foundation/pact-go - Pact.js: https://github.com/pact-foundation/pact-js - Pact Swift: https://github.com/DiUS/pact-consumer-swift - Pact Python: https://github.com/pact-foundation/pact-python In particular, to get an understanding of how Pact works, read: https://github.com/realestate-com-au/pact#how-does-it-work. Start with a Consumer Test It is all about the Consumer, so start there. There is support for a number of test frameworks, so depending what test tooling you use, read up on the docs for that. For Ruby and RSpec, read Simplifying micro-service testing with pacts for an example. For JVM based test frameworks (JUnit, Groovy, etc.), have a look at https://github.com/DiUS/pact-jvm#service-consumers. The JUnit one seems to be the most popular. There are lots of example tests. Once you have a running consumer test, you should have pact files being generated. These are the contracts in the Consumer Driven Contracts sense. You can publish these files in a number of ways. Common ways would be to commit them to your source repository, upload them to a file server, store them as artifacts in your CI build or upload them to a Pact Broker (recommended). The Broker allows you to be able to verify your providers against pact files from different versions of your consumer, statically check the compatibility of consumers and providers, and automate key CI and CD workflows. NOTE: The Pact Broker is an open source tool that requires you to deploy, administer and host it yourself. If you would prefer a plug-and-play option, we’ve created Pactflow, a fully managed Pact Broker with additional features to simplify teams getting started and scaling with Pact and contract testing. You can get started quickly and for free on our Developer Plan Verify your provider The second half of the approach, is to verify that your provider actually behaves in the way that the consumers expect. For each consumer that has implemented a consumer test, you should have a pact file published somewhere. Typically, you want to verify your provider in its CI build, so you’ll know when changes have broken the interaction with a consumer, and you’ll also know which consumer you have impacted. Given a set of published pact files, there are two main ways to verify that your provider adheres to the contracts encapsulated in the pact files. Using a build plug-in to verify pacts The first way is to use a build plug-in that can execute the requests in a pact file against your provider. In some cases (like the Ruby Rake tasks), the provider is started from within a test harness (Rack Test for ruby), the requests are replayed and then the responses compared to the expected responses from the pact file. In other cases (like the Maven and Gradle plugins), the actual provider needs to be running and the build plug-in makes the actual requests to the running provider. For an example of using the Ruby Rake tasks for a Ruby provider, read “The Provider” section of Simplifying micro-service testing with pacts. The readmes for the JVM build plug-ins (Maven, Gradle, Leiningen and SBT) contain more information on how to use those tools. In most cases, you need to be able to start your provider beforehand and stop it afterwards, and have a way of providing test data required by the pacts. Refer to the Service Providers section of the Pact-JVM read-me for more information. Pact has a state change mechanism for controlling the state of the provider during the verification test run. Essentially, this is a hook that can be called before each request with a description of what the expected state that provider needs to be in to be able to successfully handle the request. Examples would be things like “User Andy should exist” or “The order table should be empty”. The Ruby implementation allows setup and tear-down blocks to be defined, while the JVM build plug-ins allow a state change URL to be defined which will receive a POST request with the state description before the actual request is made. Using a testing framework to verify pacts The biggest disadvantage in using some of the build plug-ins, is that you need to have your provider running, and you need to be able to setup test data. This involves either preloading fixture data required by all the pacts beforehand or using the state change mechanism to change the provider’s state on the fly. Both methods require a fair amount of orchestration, especially in a CI environment. Thanks to a community contribution, a Pact JUnit provider runner is available for people using a JVM based provider. It allows you to exercise only the portion of your provider code that deals with handling the requests, and you can use the JUnit setup and tear-down mechanisms as well as a state annotation marker to setup data required for the pacts. You can also use the standard mocking frameworks to stub out dependencies, although I would add a caution to make sure you are not affecting behavior with your mocks and stubs. The README contains more information. Where can I get support? As with most open-source projects, Pact has a vibrant online community. I would recommend first joining our Slack Channel where you’ll find an active and friendly group ready to help you with your journey. Here are some of the key places to engage with us:
<urn:uuid:e726d18f-5619-42f2-8004-4e44d3b74524>
CC-MAIN-2022-27
https://dius.com.au/2016/02/03/pact-101-getting-started-with-pact-and-consumer-driven-contract-testing/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103917192.48/warc/CC-MAIN-20220701004112-20220701034112-00299.warc.gz
en
0.928389
1,965
2.640625
3
Keeping a lion as a pet is never easy. Jack and Ella find a lion in their backyard, a lion that can perform backflips and somersaults on the trampoline! They, of course, want to keep him. Sneaking him by their parents is simple (they are busy, and the role reversal portrayed in their jobs is refreshing). And although Grandpa seems to sense something is up, he lets them be. Jack and Ella feed the lion a steady diet of chips and snacks. When they go to school, they make sure he is occupied with plenty of electronic games. Unsurprisingly, the once-boisterous lion turns listless and lethargic. Barshaw shows him tragically slumped on the floor, barely able to lift one claw to place on the touch-screen of his device. He has no desire to go outside and play. Even when his circus past is discovered, Leopold does not want to perform anymore. Luckily, Jack and Ella (with some help from Grandpa) realize how wrong they were. Lions (and children, by extension) need a healthy diet and exercise. The lesson is obvious, but it’s delivered with a light touch. Details such as the children’s pictorial list of “good pets to get” and a packet of freeze-dried wildebeest (“made with pride”) keep the illustrations lively. Jack, Ella, and their family are portrayed with dark skin and hair, with no obvious ethnic markers, allowing for a wide range of identification. An essential look at the importance of an active lifestyle sneakily disguised as a fanciful feline tale. (Picture book. 4-7)
<urn:uuid:48e17fc7-ea37-4034-8e77-3244fb131d10>
CC-MAIN-2018-09
https://www.kirkusreviews.com/book-reviews/denise-brennan-nelson/leopold-the-lion/
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813608.70/warc/CC-MAIN-20180221103712-20180221123712-00244.warc.gz
en
0.974623
354
3.03125
3
China will have 110 operational nuclear reactors by 2030, making it one of the largest nuclear energy users in the world by then, a leading power plant builder said on Dec 3. Power Construction Corp of China Ltd, also known as PowerChina, said that the total scale of nuclear power generation from reactors both under construction and in operation in the country will reach 88 gigawatts by the end of 2020, according to estimates in the draft 13th Five-Year Plan (2016-2020) for the power industry. According to the draft plan, China will set aside 500 billion yuan ($78 billion) for setting up nuclear power plants using its homegrown nuclear technologies and add six to eight nuclear reactors every year from 2016 for the next five years. Though it is only a draft proposal, it will “set the tone during the annual legislative and political advisory sessions in 2016”, the State-owned firm said. During the first nine months of this year, the listed firm saw its revenue rise 24.7 percent to 145 billion yuan from the same period a year earlier, according to a regulatory filing. The Beijing-based company, founded in 2011, provides services including planning, investigation, design and construction to a wide range of sectors of the industry like hydropower, thermal power and nuclear. It claims to have built about one-third of the nuclear reactors that are currently operating in China. The company’s claims come at a time when China is embarking on a clean energy drive to reduce emissions, with nuclear being one of the major beneficiaries. At the same time, China is also looking to popularize its homegrown pressurized-water nuclear technology known as Hualong One both at home and abroad. In May, work on a pilot project involving Hualong One started in Fuqing, Fujian province, indicating that China is ready to export its nuclear technologies, experts said. Sun Qin, chairman of China National Nuclear Corp, said the third-generation nuclear technology meets the highest requirements for global safety standards and has a competitive edge over others in terms of economic performance and reliability. Chinese nuclear companies are already making huge inroads in global nuclear markets such as the United Kingdom, Argentina and Kenya. CNNC has clinched deals with Argentina to build two nuclear reactors-one using heavy-water technology developed by Canada’s Candu Inc with an estimated cost of about $6 billion and the other possibly using the Hualong One technology. There are 22 nuclear reactors in operation and 26 under construction in China, according to the National Energy Administration.
<urn:uuid:0c0c11e9-e603-4156-bded-2a74852e5789>
CC-MAIN-2017-47
http://english.gov.cn/news/top_news/2015/12/04/content_281475247722040.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807044.45/warc/CC-MAIN-20171123233821-20171124013821-00209.warc.gz
en
0.948128
529
2.703125
3
Agricultural Production Contracts & the Legal Rights of Producers Under production contracts, farmers and ranchers agree with agricultural contractors on the production of commodities. These arrangements help each side control risks and reduce uncertainty. Common terms in agricultural production contracts include the parties, the price and method of payment, the quantity and quality of the goods, and production practices. Contractors use production contracts to gain a measure of control over the production process, making their products more consistent and more attractive to consumers. They also can control their supply of a commodity, which allows them to manage the costs of labor and equipment for processing it. Since production contracts usually define producers as independent contractors, the contractor does not face liability for events during the production process. For example, they will not be responsible for the environmental impact of production methods. On the other hand, a contractor bears the risk of any changes in the market price of a commodity, since they are paying the producer a set price. How Production Contracts Affect Farmers and Ranchers Producers benefit from the set price mentioned above, which shields them from fluctuations in the open market. They can rest assured that they will have a buyer for their products. In some cases, a contractor may provide a producer with technology or other support that helps them produce a commodity more efficiently, cheaply, or effectively. (Contractors often protect these forms of technology under intellectual property laws.) In addition, the contractor may provide resources to a farmer or rancher, such as seeds or livestock. This can reduce the capital investment required of a producer. Financing may be easier to find, since lenders may be more willing to issue loans to farmers or ranchers who receive steady income through production contracts. Sometimes a producer might be able to get funding directly from the contractor. However, production contracts hold certain disadvantages for farmers and ranchers. Some producers prefer greater control over their operations, including their farming practices. A production contract may tie a farmer or rancher to technologies or materials that they must purchase from the contractor. A producer also may need to build certain facilities on their property to comply with the contract terms. They may not be able to easily repurpose these facilities or recover the cost of building them if the contractor terminates the contract. A producer may not receive payment as soon as they would if they sold their commodity on the open market, and this debt may not be secured if the contractor faces financial trouble. In some cases, a contractor has the discretion to determine whether a commodity meets its quality requirements. This may affect the level of payment issued to the producer. Unequal Bargaining Power The relative lack of competition among contractors means that they may have substantially greater bargaining power than farmers and ranchers. As a result, production contracts may be weighted in favor of contractors. Rules Governing Production Contracts Federal and state laws protect the rights of producers entering into these contracts. For example, the federal Farm Security and Rural Investment Act of 2002 does not allow production contracts to contain confidentiality clauses under certain situations. Also at the federal level, the Perishable Agricultural Commodities Act protects producers of fresh fruits and vegetables, while the Packers and Stockyards Act provides certain rights to livestock producers. The Agricultural Fair Practices Act prevents contractors from discriminating against producers that join producer associations or contract with them. State laws governing production contracts vary, but some common requirements include: Disclosure of material risks Honesty and good faith in negotiations Cooling-off period of three days, during which the producer can cancel the contract without penalties Ban on retaliation or discrimination against producers for whistleblowing or exercising other statutory rights of producers Priority liens for producers against the processed commodity, funds received from it, or the assets of the contractor Private right of action for producers to sue for violations of state law Alternative dispute resolution, such as mediation, before going to court to resolve a dispute over the contract Liability of parent companies for subsidiary contractors Outside specific federal and state statutory protections, producers may have standard rights under the Uniform Commercial Code. This is because production contracts often can be classified as sales contracts, which the UCC governs. A violation of a sales contract can open the door to UCC remedies.
<urn:uuid:704f4b94-f840-4de6-803a-abf17368511b>
CC-MAIN-2023-40
https://www.justia.com/real-estate/agricultural-law/agricultural-production-contracts/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510888.64/warc/CC-MAIN-20231001105617-20231001135617-00770.warc.gz
en
0.949743
857
3.109375
3
Professors of different subjects define the same word in different ways: Prof. of Computer Science: A kiss is a few bits of love compiled into a byte. Prof. of Algebra: A kiss is two divided by nothing. Prof. of Geometry: A kiss is the shortest distance between two straight lines. Prof. of Physics: A kiss is the contraction of mouth due to the expansion of the heart. Prof. of Chemistry: A kiss is the reaction of the interaction between two hearts. Prof. of Zoology: A kiss is the interchange of unisexual salivary bacteria. Prof. of Physiology: A kiss is the juxtaposition of two orbicular ors muscles in the state of contraction. Prof. of Dentistry: A kiss is infectious and antiseptic. Prof. of Accountancy: A kiss is a credit because it is profitable when returned. Prof. of Economics: A kiss is that thing for which the demand is higher than the supply. Prof. of Statistics: A kiss is an event whose probability depends on the vital statistics of 36-24-36. Prof. of Philosophy: A kiss is the persecution for the child, ecstasy for the youth and homage for the old. Prof. of English: A kiss is a noun that is used as a conjunction; it is more common than proper; it is spoken in the plural and it is applicable to all. Prof. of Engineering: Uh, What? I’m not familiar with that term.
<urn:uuid:9762ee5b-6629-4233-8588-91132d769078>
CC-MAIN-2016-26
http://thatwasfunny.com/professors-defenition-of-a-kiss/400
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393093.59/warc/CC-MAIN-20160624154953-00147-ip-10-164-35-72.ec2.internal.warc.gz
en
0.907779
329
3.15625
3
July 30th was the 70th anniversary of the death of Sir Flinders Petrie. On [July 30, 2012] the Israeli Antiquities Authority conducted an unusual memorial service, to mark the 70th anniversary of the death of the British archaeologist and Egyptologist Flinders Petrie. Only one of the people who attended the ceremony at the Protestant Cemetery on Jerusalem’s Mount Zion, Israeli archaeologist Shimon Gibson, had ever met the deceased – or at least his head. In 1989, while Gibson was working at the Palestine Exploration Fund in London, he was contacted by the Royal College of Surgeons. “They asked me,” Gibson said at the ceremony, “to help identify a head preserved in a jar. They weren’t sure it belonged to Petrie,” Gibson related. Gibson explains how he was able to identify Petrie’s head. Petrie was born in England in 1853 and died in Jerusalem in 1942. His headless body was buried in the Protestant Cemetery on Mount Zion. He is widely regarded as the progenitor of modern archaeology. He laid the foundations for Egyptology, the study of ancient Egypt, and was the first biblical archaeologist in Palestine. The story of how it came to be that Petrie’s body is in Jerusalem, and his head in London, is explained briefly in the Haaretz article here. Petrie is sometimes described at the “father of archaeology.” He is noted for his discovery of the Merneptah Stele in Egypt. This is the stele that contains the name of Israel. For the importance of the stele to biblical studies, see here. But Petrie’s most important contribution to archaeology is the knowledge that pottery can be used to date the layers of a tell (archaeological mound). Today I visited the Jerusalem Protestant Cemetery to see the tomb of Petrie, as well as several other well-known persons of the past. Here is a photo of Petrie’s grave marker. Besides the simplicity of the marker — only his name, there are two other things I find interesting. There is an ankh symbol (the life symbol) from ancient Egypt above the name. When Jews visit a tomb, small stones are left to show respect. Instead of stones, this marker has potsherds, pieces of broken pottery, on the top of it. I suspect that these were left by the visitors on the anniversary of his death. In another post, perhaps later, I plan to tell you about some of the other persons of interest who are buried in the same cemetery
<urn:uuid:f5b9b0b1-ed5d-42fa-9a85-b9dfdc13409d>
CC-MAIN-2014-23
http://ferrelljenkins.wordpress.com/2012/09/19/the-archaeologist-who-lost-his-head/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510257966.18/warc/CC-MAIN-20140728011737-00034-ip-10-146-231-18.ec2.internal.warc.gz
en
0.972311
548
3.4375
3
?What is a Smart Home The terms smart homes has been used for more than a decade to introduce the concept of networking devices and equipment in the house. The best definition of smart home technology is: the integration of technology and services through home networking for a better quality of living. This better quality of living would be achieved by automating mundane and repetitive daily tasks. Example: Automatically adjust ambient temperatures for your home based on when you are home or away. You could remotely turn on lighting for your home. Access a centralize control system of various home entertainment equipment from any room in your home. Smart home technology can be broken in to 5 key components / applications of use Safety and Security A smart home provides its occupants a safer environment. Security systems can protect the residents and their belongings from intruders. They can also warn homeowners in case there is any emergency, by letting them know how to take care of themselves. Smart homes could connect with town/local area warning systems for news on natural disasters. In case of a fire, the alarms would wake up the household, illuminate escape routes, and the doors are immediately unlocked. With the increasing costs and depletion of energy worldwide, it is becoming more important to be energy efficient. A smart home makes heating and cooling systems go on and off as needed, and the house is never too warm or too cold. Lights, computers and appliances are on only when someone is actually using them The smart home of the future will be especially convenient for older individuals. It will be able to tell the resident that it is time to take his/her medicine, call 911 in case of emergency and keep a record of the foods eaten and when. The house will also turn off the lights when not in use, shut off the running water and turn off the hot stove Many houses are already smart when it comes to the Internet. Computers around the house are all part of a network to share files among users and the Wi-Fi system, so laptops can be moved anywhere. You can also plug into your house computer from the road to easily communicate with everyone With a smart house, the residence will be prepared for getting the best sound and/or visuals on the stereo system, television and Internet. Ultimately multiples users could access the centralized home theatre features to view or listen to anything they want from any location in the home. The TVs in your home could also be used to access other features of the smart home system like: your video security system and emails
<urn:uuid:5896f841-1393-49f5-946c-19d3fba92ebd>
CC-MAIN-2016-50
http://woarch.blogspot.com/2012/11/inelegant-home.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543567.64/warc/CC-MAIN-20161202170903-00030-ip-10-31-129-80.ec2.internal.warc.gz
en
0.939021
507
2.765625
3
Wireless humidity sensors in food manufacturing Learn more about how humidity affects perishables and frozen foods, and Therma’s wireless humidity sensors Humidity is the amount of moisture present within a given environment, and it negatively contributes to the longevity and safety of perishable and frozen food. Humidity presents specific challenges to food manufacturing, including: High variability based on product and transport conditions Perishable goods require different environments for different items. In general, fruits and meats prefer drier climates, while vegetables prefer more humid environments. Food manufacturers aim to provide consistent environmental conditions, but unsealed entryways, ice-buildup on equipment, and varying production temperatures create challenges maintaining uniform humidity levels. Quality assurance and product loss Fungi and bacteria thrive in humid conditions, creating opportunities for quality assurance incidents and product loss. Freezer energy consumption Humidity drives ice build-up in equipment, increasing energy costs through excess defrosting cycles. This article will dive deeper into how humidity management affects both perishable and frozen foods and how humidity monitoring equipment can help food manufacturers manage their facilities. How does humidity affect perishables? Poor humidity management affects perishables by encouraging the growth of fungi and bacteria. Fungi appear like mold growing on groceries, and when operators notice fungal growth, the contaminated product is thrown away. Another way humidity affects perishables is through bacterial growth. Bacteria is invisible to the eye, so manufacturers perform microbiological testing on their products. However, manufacturers rely on samples to perform these tests. Sampling is an effective method to ensure food safety, but given the manufacturing scale, there is always the risk that contaminated products may go unnoticed. One particular bacteria, Salmonella, thrives in food stored in humidity-intensive environments. Salmonella is one of the leading causes of foodborne illness in the United States, causing 1.35 million infections every year. The repercussions of a Salmonella outbreak are expensive, with the average recall costing about $10 million. While QA checks won’t always reveal Salmonella’s presence, monitoring storage for conditions that increase its likelihood allows manufacturers to re-inspect potentially spoiled items before it’s too late. How does humidity affect frozen foods? Humidity also affects frozen food quality and facilities. Product quality is affected when an excess of moisture is present in processing. At warmer temperatures, food is more porous and absorbs moisture. When the product falls below the freezing point, ice crystals form from the absorbed moisture, negatively affecting products’ taste and texture. Ultimately, customers can taste how humidity affects frozen food. “It tends to be on the chewy or tough side” said Bob Schrader, a consultant for food humidity solution, MicroGold. Poor humidity management causes various challenges in frozen facilities, such as ice build-ups on equipment. To combat ice build-up, operators rely on freezer defrost cycles, which generate power surges that drive up electricity costs. The chart below illustrates the occurrence of defrosting cycles over 24 hours from a Therma customer in food manufacturing: Therma’s wireless humidity sensors To verify optimal storage conditions, food manufacturing staff should perform environmental checks every hour. However, traditional thermometers don’t always give accurate readings, and staff can’t monitor facilities after-hours. Therma’s wireless humidity sensors provide automated, NIST-certified reporting and alerts for cold storage conditions. Our customers, such as NOW Foods, use Therma’s wireless humidity sensors in the following ways: - Therma’s alert system prompts staff to perform thorough area inspections when environmental conditions start to vary, allowing them to identify factors like moist air seeping through doors and other entryways. - A spike in humidity often indicates a cooler breakdown. When this happens, Therma’s alerts allow staff to relocate inventory to alternate storage areas. Additionally, these alerts provide insights into whether inventory was stored in conditions that promoted bacterial growth. In this situation, further microbiological testing can be performed before manufacturers distribute spoiled food. - With Therma’s automated humidity reports from freezers, operators can decrease the frequency of energy-intensive defrost cycles. Interested in working with Therma? To see how Therma° can help increase the quality and longevity of your frozen inventory, click below to buy sensors online.
<urn:uuid:766bf647-1c2c-45aa-9ec7-1ed58aa4cd09>
CC-MAIN-2022-21
https://www.dev.hellotherma.com/blog/wireless-humidity-sensors-in-food-manufacturing/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662526009.35/warc/CC-MAIN-20220519074217-20220519104217-00527.warc.gz
en
0.899903
902
2.75
3
Gilbert du Motier, marquis de Lafayette (1757-1834), a French aristocrat and army officer, embraced the republican ideals of the late eighteenth century. He fought in the American Revolution, led the democratic faction in the National Assembly during the French Revolution, and was later exiled from France for his opposition to Napoleon's imperial ambitions. Despite a public renunciation of the peerage in 1790, he is still popularly known in America and France as the 'Marquis de Lafayette'. The American Friends of Lafayette, an organization of professional historians and Francophiles, began campaigning for a commemorative stamp in Lafayette's honor as early as 1934. The Post Office Department finally released the stamp on June 13, 1952, the 175th anniversary of his arrival in America to take-up a major general's commission in the Continental Army. Georgetown, South Carolina, where Lafayette's ship, La Victoire, landed in 1777, hosted the stamp's First Day of Issue ceremony. Some philatelists criticized the stamp's design by pointing out that, though the cannon and ship depicted are correct for the period, the flags are not. The French flag in June 1777 was the white royal standard of the House of Bourbon, and the thirteen-star 'Betsy Ross' American flag was adopted by the Continental Congress the day after Lafayette landed. The Post Office Department responded that "no attempt was made to present the flags that were in use at the time of Lafayette's arrival." The stamp is denominated at 3-cent, which paid the domestic first-class letter rate, and was printed in bright blue ink on the rotary press in sheets of 200. These were divided into four panes of fifty stamps each for shipment to post offices. Victor S. McCloskey, Jr., designed the stamp, and Charles A. Brooks engraved the vignette. John S. Edmonds engraved the frame, lettering, and numerals. National Postal Museum Library, Papers of the Third Assistant Postmaster General, Stamp Design Files, Folder for Scott #1010.
<urn:uuid:8eb69e55-d512-44bf-911b-b5a6a0529a6f>
CC-MAIN-2014-52
http://arago.si.edu/index.asp?con=1&cmd=1&tid=2028936
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768741.35/warc/CC-MAIN-20141217075248-00091-ip-10-231-17-201.ec2.internal.warc.gz
en
0.963624
423
3.015625
3
A study in the September 27 issue of JAMA says that using antibiotic azithromycin to treat trachoma in Vietnam had increased the risk of reinfections.// Trachoma is an infectious disease where scar tissue forms underneath the eyelid. In 1995 the WHO reported that 15 percent of all blindness was caused by trachoma. This was the second biggest cause of blindness after cataract. At that time, the WHO estimated that 146 million individuals were in need of treatment for active trachoma to prevent blindness, 10 million were in need of surgery for trachomatous trichiasis (eyelash[es] touching the eye), and 8 million were already blind, according to background information in the article. In 1996, the WHO designed the SAFE (Surgery for trachomatous trichiasis; Antibiotics for Chlamydia trachomatis (a type of Chlamydia that causes trachoma); Facial cleanliness; and Environmental improvement) strategy with the goal of elimination of blinding trachoma by the year 2020. For the antibiotic arm of the SAFE strategy, the WHO has recommended antibiotic treatment with either topical tetracycline or oral azithromycin for certain categories of patients with active trachoma. Oral azithromycin has become the drug of choice for the SAFE programs because of difficulties concerning administration and adherence with topical tetracycline eye ointment. Despite a number of studies, there has been a lack of sufficient follow-up beyond the final treatment point to determine rates of recurrence of disease and infection and the risk factors that may contribute to each. Berna Atik, M.D., M.P.H., of Children's Hospital Oakland Research Institute, Oakland, Calif., and colleagues evaluated the effect of targeted oral azithromycin treatment of school age children and their household members in Vietnam on active trachoma and C trachomatis infection rates. Vietnam is 1 of 16 priority countries in which the SAFE program has been launched. Three communes, which included 3,18 6 individuals, were randomly selected in Vietnam for the study that was conducted from November 2000 through November 2003. Azithromycin was given to children from 5 through 15 years of age with active trachoma and their household members in SAFE and SA communes at baseline and 12 months over 2 consecutive years with follow-up for 2 years beyond the last treatment. These communes were compared with a S-only control commune that did not receive azithromycin targeted treatment. The researchers found that re-infection rates increased significantly between 12 and 36 months for SAFE (from 1.6 to 29.3 per 1,000) and SA (5.1 to 25.3 per 1,000) communes but not for the S-only commune (13.4 to 6.7 per 1,000) after 24 months. Compared with the S-only commune, analysis showed that re-infection risk was about four times higher for SAFE and SA communes at 36 months. "Collectively, the data are consistent with the hypothesis that systemic azithromycin treatment may interrupt the duration of infection, interfering with host immune responses and, thereby, increase the number of individuals who are susceptible to C trachomatis re-infection. … The strategy of targeting only active trachoma for treatment is likely to be ineffective for long-term trachoma control and may adversely affect disease prevalence over time. While the 'F' and 'E' components of the SAFE program will need to be evaluated for their efficacy in decreasing rates of active trachoma and infection, a vaccine will likely be needed for long-term control," the authors write. RASRelated medicine news :1 . Blindness can be stopped with drug for acne treatment2 . Smoking Linked to Blindness3 . Blindness may be genetic by nature4 . Enzyme Responsible For Congenital Blindness5 . Millions Of Diabetic And Glaucoma Patients Risk Blindness6 . Avastin, anti-Cancer Drug leads to Blindness and Other Complications7 . Genes That Were Responsible For The Cause Of Blindness Identified8 . Investigations Reveal That Infections Due To Contact lens Could Cause Blindness9 . Research into Blindness Cure Goes Digital10 . River Blindness Incidence Reduced With Effective Treatment11 . Blindness cases in China on the rise
<urn:uuid:89b16bb7-b936-4f80-a29d-75ac1f1138b2>
CC-MAIN-2016-30
http://www.bio-medicine.org/medicine-news/Blindness-And-Trachoma-14535-1/
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823996.40/warc/CC-MAIN-20160723071023-00268-ip-10-185-27-174.ec2.internal.warc.gz
en
0.936603
930
3.28125
3
It seems incongruous that a flower as lovely as the sky blue forget-me-not should also be called “Scorpion grass.” Its flower head was thought to look like a scorpion’s tail, which prompted this alternate name. Centuries ago, the forget-me-not was believed to be able to cure the sting of a scorpion, or the bite of a snake or a dog, and certain ailments of horses, too. The stature of the forget-me-not was perhaps best reflected by its inclusion in the historical work of the English horticulturist John Gerard (1545 to 1612) called “The Herball or General Historie of Plants.” The symbolism of the forget-me-not flower dates back to the 1300s in Britain. King Henry IV of England (1367 to 1413) adopted the forget-me-not as his emblem in 1398, when he went into exile. Evidently it brought him luck, for he returned to England in 1399, and retained the forget-me-not as his royal symbol. There were various English superstitions associated with the forget-me-not. In Somerset, it was believed that wearing the forget-me-not was protection against witches, especially during the month of May. It was the custom to present someone embarking on a journey with forget-me-nots. It was also said that the juice of the forget-me-not could enhance the sharpness of steel so that it could cut through stone. The Scottish poet William McGonagall (1825 to 1902) immortalized the forget-me-not in his poem of the same name. The poem recounts the tragic tale of a knight named Edwin and his betrothed bride, Ellen. One day, as they are walking by the waters’ edge, Ellen wonders aloud whether Edwin is true to her. As a sign of his fidelity, Edwin jumps into the water to pick for Ellen flowers growing on the other bank. He drowns in the process, but not before tossing the flowers to his beloved with the parting words, “Forget-me-not.” That’s what Ellen names the flowers. In 1949, the State of Alaska selected the forget-me-not as its official flower. This particular species is the Myosotis Alpestris or alpine forget-me-not. It is one of more than 50 different species of the forget-me-not flower, many of which are native to New Zealand, and have since become part of the landscapes of the United States, Europe and Asia, too. In 1978, President Jimmy Carter officially proclaimed National Grandparents Day, which was to be observed annually in the United States on the first Sunday after Labor Day. This was spearheaded by Marian McQuade (1917 to 2008), a homemaker in Fayette County, West Virginia. She launched a statewide campaign in 1970, and National Grandparents Day was officially adopted nationwide eight years later. McQuade’s objective was to honor grandparents everywhere and to bring about family unity through this family day that is celebrated with events in schools, churches and senior centers. On April 20, 1999, the forget-me-not was adopted by resolution as the official flower of National Grandparents Day. Day Of Celebration Although it is not officially proclaimed, Forget-me-not Day is celebrated on Nov. 10 every year.
<urn:uuid:63f09d51-d808-46a4-8389-92c2ed8d6ecb>
CC-MAIN-2017-51
https://www.gardenguides.com/83414-history-forget-not-flowers.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948595342.71/warc/CC-MAIN-20171217093816-20171217115816-00296.warc.gz
en
0.972052
714
2.984375
3
Want to program your own Java games and applications but don't know beans about object-oriented programming? Never you fear. This free video tutorial from TheNewBostonian will have you coding your own Java apps in no time flat. Specifically, this lesson discusses how to build a simple Java program to sum and find the mean for a list of ten numbers. For more information, including detailed, step-by-step instructions, watch this helpful programmer's guide.
<urn:uuid:8959d2df-f6cc-40a9-9991-e30d94493aa4>
CC-MAIN-2017-51
https://java-swing-jsp.wonderhowto.com/how-to/write-simple-java-program-average-numbers-321185/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948597585.99/warc/CC-MAIN-20171217210620-20171217232620-00319.warc.gz
en
0.881558
92
2.5625
3
Increase Your Reading Speed by Locating Topic Sentences Going straight to the main idea of each paragraph significantly increases your reading speed. This main idea is the paragraph’s topic sentence. You don’t have to read as much to get a firmer grasp of the author’s fundamental ideas if you can find and understand a paragraph’s topic sentence. The question is: How do you recognize the main idea in a paragraph amid all the details? Understanding topic sentences The topic sentence describes the subject of the paragraph and its main idea. If you can develop a nose for locating topic sentences, you can get the main idea from paragraphs quickly and thereby improve your reading speed and comprehension. Typically, the topic sentence comes first in a paragraph, and the remaining sentences elaborate on the topic sentence. In the following paragraph, for example, the topic sentence makes a simple assertion, and evidence for its truth follows on the heels of the topic sentence: Rainfall has been increasing steadily in Yoknapatawpha County since 1995. In that year, annual rainfall was 32 inches. By 2008, it was 40 inches, with an increase each year between 1995 and 2008, except for 1999, when the annual rainfall level fell to 29 inches. But sometimes the topic sentence isn’t the first sentence in the paragraph. Sometimes it’s buried deeper. In this paragraph, the second sentence is the topic sentence: Looking at rainfall in Yoknapatawpha County since 1995, a clear trend is evident. Except for 1999, when the annual rainfall level fell to 29 inches, rainfall has increased steadily since 1995. Between that year and 2008, rainfall rose from 32 to 40 inches annually. The author of the following paragraph is a bit of a windbag and takes his time getting to the main idea. In this paragraph, the topic sentence is the last sentence: Is it getting wetter or drier in Yoknapatawpha County? A quick look at the record gives a clear answer. Between 1995 and 2008, rainfall rose from 32 to 40 inches annually (although in 1999 it dipped to 29 inches). From this information, it’s plain to see that rainfall in the county has increased steadily since 1995. Locating the topic sentence Because the topic sentence can be located anywhere, how can you spot the topic sentence and get to the main idea in a paragraph? Here’s how: Read the first sentence carefully. Three times out of five, the topic sentence is the first sentence. Consider what basic property or characteristic the paragraph describes. This attribute is the paragraph’s main idea, so the sentence that expresses it is your topic sentence. Think about the paragraph’s purpose. The paragraph most likely wants to impart a particular piece of information. If you can figure out what that piece is, you know the paragraph’s topic and can find the sentence that presents it. Observe the author’s writing style to determine where she likes to put the topic sentence in paragraphs. Knowing your author’s style helps you locate the topic sentence faster.
<urn:uuid:e977358a-7f3c-4e58-a405-797f2d5f6778>
CC-MAIN-2016-50
http://www.dummies.com/education/language-arts/speed-reading/increase-your-reading-speed-by-locating-topic-sentences/
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541910.39/warc/CC-MAIN-20161202170901-00243-ip-10-31-129-80.ec2.internal.warc.gz
en
0.937673
640
3.5625
4
My metabolism has really slowed down with age. This is a broken record, heard from just about everyone that comes in to see us for an initial consultation. A lot of people talk about their metabolism issues but they really do not understand what exactly makes up their metabolism. What is the metabolism? Well, the metabolic system is made up of many different components but one of the most important components of the metabolic system happen to be the mitochondria. Mitochondria are called the power plants of cells. They convert nutrients we eat into energy which feeds and allows our cells to function. They are essential to our energy metabolism which means they play a crucial role in our ability to burn fat. For fat loss to occur, fatty acids must be moved from fat stores to the mitochondria and oxidized so they can be used for energy by our cells. We have hundreds to thousands of mitochondria in each of our cells and we have trillions of cells in our body. Our body cannot function without mitochondria and cannot function properly without healthy mitochondria. Most people that come to see us about their weight issues have mitochondrial dysfunction. These are individuals that are unable to burn fat and are dealing with constant fatigue amongst other symptoms. The mitochondria become dysfunctional when they are not utilized properly for burning nutrients we consume. They are also very susceptible to damage by inflammation in the body. If you want functional mitochondria, which ultimately will give you a healthy, functional metabolic system, you have to eat the right foods that allow proper support of the mitochondria. The modern American diet does not support the mitochondria but damages the mitochondria. Most consume too many carbohydrates which causes inflammation in the body. It takes multiple steps for the body to break down carbs before finally entering the mitochondria for energy conversion. This process causes a lot of oxidation and free radicals which inflame the body. As well, some of the carbs consumed can be metabolized without entering the mitochondria so they aren’t even part of the process of energy conversion. What we see is that a high carb diet causes damage to the mitochondria and causes inactivity of the mitochondria. A great recipe for a health disaster. The mitochondria are absolutely built to convert fat into energy. Fat gets directly metabolized by the mitochondria. There are not multiple steps taking place for breaking fatty acids down before shuttled into the mitochondria. This means it’s a very efficient way of energy conversion and a lot less oxidation and free radicals being released by this burning process. Since fat is metabolized directly by the mitochondria, it not only activates the mitochondria but causes mitochondrial biogenesis (creation of new mitochondria). The more mitochondria, the better. One of the greatest side effects of the Protein Pantry diet is the mass improvement in energy most of our dieters feel after a couple of weeks on the system. We massively reduce carbohydrate intake, increase certain fat consumption and the mitochondria respond to it. Our system turns people from fat storing machines to fat burning machines and totally changes the way they feel. We focus on the resolution of mitochondrial dysfunction because we understand this is the basis of health. Source: Health Matrix; Dr. Gabriela Segura, Consultant Cardiologist The Care and Feeding of Your Mitochondria; Pamela Weintraub
<urn:uuid:7e279c66-166a-41ac-b54d-ad5884ec7b04>
CC-MAIN-2021-17
https://www.proteinpantry.net/whatx27s-the-mitochondria-have-to-do-with-it
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038088245.37/warc/CC-MAIN-20210416161217-20210416191217-00512.warc.gz
en
0.929116
673
2.546875
3
Teams are currently setting 2016 learning targets and I have been reading some of the targets set with interest because cognitive applied language proficiency plays an important part in achieving these targets. The year 3 & 4 teachers regularly see a fall in data and often I often hear discussion around the ‘why’. From my previous work as a Ministry of Education verifier I know that reading, writing and mathematics should be reasonably aligned. When I see several sub levels between the two I know straight away that some of the data pieces are incorrect. Also if earlier school data is not maintained then that earlier data has been gathered using student’s basic interpersonal skills. When they reach years 3 and 4, cognitive applied language proficiency becomes the learning norm and often our ELL children have just not YET achieved that in their second language of English. I keep reminding our teachers at Newmarket School of the chart from Thomas and Collier, 1997 that shows children learning English as a second language (L2). The chart shows the process from early production to advanced fluency can take from 5 to 7 years depending on their literacy levels in their home language. The best outcome is when children are able to learn through the curriculum in both languages or through full bilingual education. The challenge can be schools who believe that English only is the pathway for academic success and actively dissuade teachers and children from using their first language. There is a common belief that by immersing the learner in English only will accelerate the learner in their second language. However the longitudinal research proves otherwise. That red thin line falling is one I see regularly. (Thomas and Collier, 1997) The children often appear too high too soon in the early years. Then we see the fall and this usually happens after 3 to 4 years at school. What we should see is a gradual improvement with a goal of meeting benchmark by year 6. Then if that happens the children have a much better outcome in their following years. I also regularly look at this chart to remind myself that the most effective way of learning English is in class and not necessarily when the children are withdrawn for specialist intervention. Finland have this strategy nailed when a second teacher is placed in the class to support with intervention. Notice I said teacher and not teacher support. Most of our ELL children at Newmarket School learn in class with teacher support because that is where we are generally as an education system. We have some learners withdrawn for reading recovery, some for steps and some for intensive support with me if the children come from several classes and have similar literacy needs. Previously we have had other forms of literacy support, especially as we unpack our data against National Standards. However the data I would be particularly interested in is when our children leave Newmarket School and what happens to them particularly at NCEA level 1 & 2. I look forward to seeing this happen because our school is part of the Community of Schools for 2016. Our teachers at Newmarket School have asked for professional learning using SOLO taxonomy to advance writing. All our teams have set this as an inquiry goal for 2016 because our writing data continually appears mismatched against reading and mathematics. In additions some teams will work with emergent learners and have learning support with other students. This will take place in class and I am excited at seeing this change in teacher thinking. Myself I believe our writing data is the most realistic data and regularly remind our staff of our school’s student makeup. In April 2015, Newmarket school had 263 students on the school roll. 86 ESOL funded in the 2015 A round of funding. 74.60% of our children come from homes with another language spoken. Just under half of these are ESOL funded at 24.6% of the school roll. Currently we have 21 different languages at home. Our total Asian group has nearly doubled in the last 7 years from 43% in 2007 to currently 61.5% of our school role. Our biggest ethnic group is Chinese children who make up 28.2% of our school role. SOLO Taxonomy background What is SOLO Taxonomy? SOLO is the Sustained Observation of Learning Outcomes. I was first introduced to this learning framework during my TESSOL diploma in 1997. I selected to present the work of Biggs and Collier during one of my earliest assignments. We had to present our learning in 5 minutes. A decade later I joined Newmarket School and the school was in the second year of an ICTPD contract with Pam Hook. I was incredibly lucky in my second year to oversee the contract therefore was able to have extra learning time with Pam Hook. My understanding of SOLO became embedded in my practice. My earlier attempts at SOLO highlighted that I often focussed on the product and the outcomes of my students and gave little attention to the process. I believe that this has changed as I regularly step through the learning process with the children and have made this process visible. This year, Pam Hook and I wrote SOLO Taxonomy English Language Learners, Making second language learning visible. Our book is now in the last stage before publishing. I have been working alongside Pam for several years and she has been an amazing educator mentor for me. I think she just understands what I say and mean and regularly helps me clarify my thinking by asking probing questions. Several years ago, Pam suggested that we write a book together framed with SOLO and I baulked at the idea because I felt my learning with SOLO Taxonomy was in early stages. However last year after Ginny and I had presented to a school who were asking how to use SOLO with second language learners, I decided that I was on track and went back to Pam and said I felt I was ready. Ginny pushes my pedagogy and is often quite straightforward in her honest feedback. She sometimes pulls me back in my thinking because I have missed a building block and highlights where I need to address the gap. With that seed in mind, I began collecting artefacts that could be suitable. This year I fine tuned an idea about making the writing key words visible using colours. Before that I had the children highlighting words with whatever coloured felts that were available and were not dried out. My thinking wall was usually just a jumble of words hand scribbled on cut out cards as I clarified my thinking. I am one of those teachers who puts something up and by looking at it daily, I can see where I need to develop or see what I still need to do. So my walls have been a hive of activity. Some school terms have seen better wall displays than others. My learning this year around teaching writing has been immense. My own writing has also developed and I have blogged much more. Teachers if you are reading this, bear the following in mind. If you want to teach writing and get results with writing then understand your own learning with writing. I am really clear with description, explanation, sequencing, analogy, part whole thinking and classifying. I can now see how to get to extended abstract thinking in SOLO Taxonomy and I can see the vocabulary that is required for this deeper thinking. This year I was hoping to nail extended abstract thinking. However on reflection I know that my own writing was still developing and currently sits mostly at relational thinking. Every so often I write something amazing and I hope to do so much more of that next year. I created a list of words that help make writing visible against SOLO Taxonomy. Over the past few years this idea has grown and I have tested it out with my writers. This year I colour coordinated the list. and constantly used the same colours for the same key ideas and it has worked. Next year our teachers will be using similar ideas as they continue to unpack writing framed with SOLO Taxonomy. They will make writing visible and the best way that I have found to do this is using consistent colours. So if you are interested in writing and want access to this writing vocabulary list framed using SOLO Taxonomy then very soon our book will be available and this list is part of the package. If you want to know more about how I have unpacked my learning using SOLO Taxonomy and English Language Learners then again this book would be an ideal addition to your staff bookshelf. Finally if you have high numbers of ELL students then again you will find this book of interest and value. In addition next year Bridget Casse and myself are running a TeachMeetNZ meets SOLO Taxonomy session. I am super excited because Pam said she will also be involved. I will share the year I have had making my learning visible. I have convinced Virginia @ginnynz01 to be part of this Teachmeetnz. Over the next few weeks, our SOLO Taxonomy list of presenters will be available as we confirm presenters. The confirmed date is Saturday 16th of April at 2.00pm. Follow me on twitter @vanschaijik and also Bridget @BridgetCasse. You can also watch Pam ‘s feed too @arti_choke. The hashtag is #TeachMeetNZ.
<urn:uuid:ba243f25-167d-42d1-8097-aa20ab705d77>
CC-MAIN-2020-29
https://sonyavanschaijik.com/2015/12/15/what-am-i-learning-how-is-it-going-what-am-i-going-to-do-next/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657169226.65/warc/CC-MAIN-20200716122414-20200716152414-00438.warc.gz
en
0.977207
1,871
2.734375
3
PTR records are enabled but other mail servers cannot send mail to the server. If PTR verification is enabled, the server may be unable to receive mail from some domains because these domains do not have PTR records defined. The following RFC provides useful guidance on which DNS entries should be created for It is best practice to have PTR records defined for A records. An MX record contains an A record and therefore by deduction must have a PTR record associated with its A record. The tools available at www.dnsreport.com and www.dnsstuff.com are useful in diagnosing such issues. What is a DNS PTR record?: Article ME020206 How to set up PTR records under Microsoft's DNS Server: Article ME020115 When sending messages to Hotmail, they appear in the Junk Mail folder: Article ME020241 Unable to send email to some domains, such as Hotmail, Yahoo, etc.: Article ME020003 |Product:||MailEnable (All Versions)| |Class:||TIP: Product Tip| |Revised:||Wednesday, May 4, 2016|
<urn:uuid:26621877-f753-48b9-967c-1f18827dd735>
CC-MAIN-2017-30
http://www.mailenable.com/kb/content/article.asp?ID=ME020180
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424876.76/warc/CC-MAIN-20170724122255-20170724142255-00360.warc.gz
en
0.813776
239
2.5625
3
Peripapillary Retinal Nerve Fiber Layer Thickness by Optical Coherence Tomography in Patients with Unilateral Amblyopia Iraqi Postgraduate Medical Journal, 2021, Volume 20, Issue 1, Pages 91-98 Amblyopia is a common cause of unilateral visual defect, affecting patients with history of strabismus, refractive errors, and those who had visual deprivation in the critical period of visual development. Amblyopia may have an effect on various levels of the visual pathway. Cells atrophy in the lateral geniculate nucleus that receives information from the affected eye, and a shift in the dominance pattern in the visual cortex have been reported. Retinal involvement in amblyopia is controversial. SUBJECTS AND METHODS: This is a cross sectional study carried out in Al-Shaheed Ghazi al-Hareery Teaching Hospital in Medical City at Baghdad, Iraq .Forty-two patients with unilateral amblyopia were selected, 23 males and 19 females with age range of 12-40(mean age of 25.33 years) all of these patients had one amblyopic eye and the other eye normal. OCT scan was done for both eyes of each patient and the RNFLT measured after complete ophthalmological examination ( VA, refraction, slit lamp, and funduscopic examination It has been noticed that the mean of NFLT in normal eyes was higher than that of amblyopic eyes (108.88 versus 105.05) but this difference was statistically not significant (P=0.074). OCT is a sensitive way to estimate RNFLT, we concluded that there is no statistically significant difference in NFLT between the amblyopic, compared to the normal eyes. Also NFLT seems not affected by: type of amblyopia, age of patients and also the severity of amblyopia as all these factors didn’t reach statistical significant. - Valentin Dragoi. Visual processing and cortical pathway (second editioin) 1997:24-33. - Lee Ann Remington. Clinical anatomy and physiology of the visual system (third edition) 2012: 233-52. - Moraes D, Gustavo C. Anatomy of visual pathways. Journal of glaucoma 2013 :S2-S7. - Drs. Paul L. Kaufman, Albert Alm, Leonard A Levin, Siv F. E. Nilsson, James Ver Hoeve, and Samuel Wu. Adler’s physiology of the eye (11th edition) 2011; chapter 40 : 745-46. - National Eye Institute [Online]. 2013 [Accessed 2017. - 6. Available from: URL: https://nei.nih.gov/. - health dictionary [online]. 2002 [accessed 2009 july 12]. - Available from: URL: http://health-acne-info.blogspot.com/2009/07/definition-of-amblyopia-nocturnal.html - Prevalence of Amblyopia and Strabismus - Ophthalmology [Online]. [Accessed 2017 Sep3]. Available from: URL:http://www.aaojournal.org/article/S0161-6420(10)00700-1/fulltext. 10. Vision Screening for Amblyopia. American Academy of Ophthalmology [Online]. 2015 OCT 21. [Accessed 2017 Oct 21].Available from: URL: https://www.aao.org/disease-review/vision-screening-amblyopia. 11. Lempert P. Retinal area and optic disc rim area in amblyopic, fellow, and normal hyperopic eyes: a hypothesis for decreased acuity in amblyopia. Ophthalmology 2008 ;115:2259-61. 12. Referat ambliopia [Online]. [Accessed 2017 Oct 10].Available from: URL: https://emedicine.medscape.com/article/1214603-overview#a6. 14. Hubel DH. Wiesel TN. Receptive fields of cells in striate cortex of very young inexperienced kittens. J Neuropbysiol. 1993 Nov 1 26:994-1002. 15. Crawford ML, von Noorden GK. Optically induced concomitant strabismus in monkeys. Invest Ophthalmol Vis Sci. 2000; 19:1105-9. 16. Arden GB, Wooding SL. Pattern ERG in amblyopia . 1995 ; 26:88-96. 18. Ikeda H, Tremain KE. Amblyopia occurs in retinal ganglion cells in cats reared with convergent squint without alternating fixation. Exp Brain Res. 1999 ;35:559-82. 19. Cleland BG, Mitchell DE, Crewther SG, Crewther DP. Visual resolution of retinal ganglion cells in monocularly-deprivated cats. Brain Res 2005 ; 192:261-66. 20. Cleland BG, Crewther DP, Crewther SG, Mitchell DE. Normality of spatial resolution of retinal ganglion cells in cats with strabismic amblyopia. J Physiol. 1992 ;326:235-49. 21. Lempert P, Porter L. Dysversion of the optic disc and axial length measurements in a presumed amblyopic population. J AAPOS. 1998 ;4:207-13. 22. Lempert P. Optic nerve hypoplasia and small eyes in presumed amblyopia. J AAPOS. 2000 4:258-66. 23. Lempert P. Retinal area and optic disc rim area in amblyopic, fellow, and normal hyperopic eyes: a hypothesis for decreased acuity in amblyopia. Ophthalmology. 2008 ;115:2259-61. 24. American Academy of Ophthalmology. Basic and Clinical Science Coarse; section 6 Pediatric Ophthalmology & Strabismus 2009- 2010:67-75. 25. Cathy Williams. Amblyopia. BMJ Clinical evidence. 2009 ; 16: 0709. 26. Bagga H, Greenfield DS, Feuer W, Knighton RW. Scanning laser polarimetry with variable corneal compensation and optical coherence tomography in normal and glaucomatous eyes. Am J Ophthalmol. 2003 ;135:521–529. 27. Gürses-Ozden R, Liebmann JM, Schuffner D, Buxton DF, Soloway BD, Ritch R. Retinal nerve fiber layer thickness remains unchanged following laser-assisted in situ keratomileusis. Am J Ophthalmol. 2001 Oct 132:512–516. 29. Joshua Yuen, Brad Johnson. OCT scanning. Northern eye surgeons. [ Accessed 2013 Oct 4] available from URL: http://www.northerneyesurgeons.com.au/ 30. Donald L. Budenz, Symmetry between the Right and Left Eyes of the Normal Retinal Nerve Fiber Layer Measured with Optical Coherence Tomography. Trans American Ophthalmol Soc. 2008; 106: 252–75. 31. Hess RF, Thompson B, Gole G, Mullen KT. Deficient responses from the lateral geniculate nucleus in humans with amblyopia. Eur J Neurosci. 2009;29:1064–70. 32. Pascual M, Huang J, Maguire MG, et al; Vision in Preschoolers (VIP) Study Group. Risk factors for amblyopia in the vision in preschooler’s study. Ophthalmology. 2014;121:622–29.e1. 33. Webber, A. L. and Wood, J. Amblyopia: prevalence, natural history, functional effects and treatment, Clin. Exper. Optomet. 2005; 88: 365–75. 34. Yoon SW, Park WH, Baek SH, et al. Thicknesses of macular retinal layer and peripapillary retinal nerve fiber layer in patients with hyperopic anisometropic amblyopia. Korean J Ophthalmol. 2005;19: 62-67. 35. Atakan M, Çulfa S, Çalli U, Penbe AD, Atakan TG, Özertürk Y. Evaluation of Retinal Nerve Fiber Layer and Macular Thickness in Amblyopia. J Clin Exp Ophthalmol. 2015;6:2. 36. Kasem MA, Badawi AE. Changes in macular parameters in different types of amblyopia: optical coherence tomography study. Clinical ophthalmology (Auckland, NZ). 2017; 11:1407. 37. Kee SY, Lee SY, Lee YC. Thicknesses of the fovea and retinal nerve fiber layer in amblyopic and normal eyes in children. Korean Journal of Ophthalmology. 2006 ;20:177-81. 38. Repka MX, Kraker RT, Tamkins SM, Suh DW, Sala NA, Beck RW. Retinal nerve fiber layer thickness in amblyopic eyes. American journal of ophthalmology. 2009;148:143-7. 39. Huynh SC, Samarawickrama C, Wang XY, Rochtchina E, Wong TY, Gole GA, et al. Macular and nerve fiber layer thickness in amblyopia: The Sydney Childhood Eye Study. Ophthalmology. 2009;116:16. - Article View: 418 - PDF Download: 152
<urn:uuid:5857ac13-5344-4310-b0f2-6da3c5a27579>
CC-MAIN-2022-49
https://ipmj.net/article_167831.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711017.45/warc/CC-MAIN-20221205132617-20221205162617-00816.warc.gz
en
0.757491
2,052
2.53125
3
I remember working years ago as an ergonomic consultant for Milco Industries (transferring principles of motion efficiency — learned at the piano keyboard — to industrial application). During the course of the day, the CEO told me that his best employee had a music background. She was the one who found the most creative solutions to problems and didn’t stop until a project was fully completed. She never needed supervision and often exceeded his expectations. It was then that I began thinking about the wider implications of a music education: could it be used to teach specific concepts and skills to people preparing for non-music professions? Could a new teaching pedagogy develop from such an idea and be used in both K-12 and college levels? Yes! (I am working on one now – and will post more about it as it develops.) Here are a few quotes of people from a wide range of disciplines speaking to the benefits of music training. “The theory of relativity occurred to me by intuition, and music is the driving force behind this intuition. My parents had me study the violin from the time I was six. My new discovery is the result of my music perception.” Albert Einstein. “Music has shaped my life from an early age. I think of my life as a series of increases in personal discipline. It started with piano lessons.” Jeremiah Brown, Olympic medalist in rowing. “I owe it all to my bassoon teacher.” Thomas Südhof, neuroscientist, bassoonist and 2013 Nobel Prize winner for his work in the Physiology of Medicine field. “Most corporate CEOs will tell you they would love to have experts who can find creative ways to solve problems, who have the self-discipline and self-motivation to improve their own work skills while mastering skills to collaborate and cooperate with others to get the job done. Sound like a musician who learns to practice on his or her own and then merge his or her skills with others to produce an orchestrated performance?” Lawrence E. Bethune, VP for Student Affaires and Dean of Students, Berklee College of Music. “Our data have confirmed a rapid transfer of cognitive benefits in young children after only 20 days of music training. The strength of this effect in almost all of the children was remarkable.” Dr. Sylvia Meoreno, Rotman Research Institute. “Musical activity involves nearly every region of the brain that we know about, and nearly every neural subsystem.” David Levitin, This is Your Brain on Music (book). The evidence is overwhelming: music teaches life skills amazingly well. Let’s harness this knowledge to push the music field further. We have new frontiers to explore!
<urn:uuid:df143818-e7f0-46ad-ba0c-ac0d2586af9b>
CC-MAIN-2022-27
https://whatsmusicgottodowithit.com/yet-more-evidence-on-the-necessity-of-including-music-in-our-educational-programs/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103271864.14/warc/CC-MAIN-20220626192142-20220626222142-00259.warc.gz
en
0.972285
565
2.59375
3
Electric toothbrushes are battery-powered or rechargeable toothbrushes with spinning, vibrating, or oscillating bristles that help clean the teeth. Because of these additional features, they are often perceived as being more effective in cleaning teeth with minimal effort. Despite these beneficial aspects of electric toothbrushes, they do offer a certain amount of danger if used incorrectly. In fact, according to Dr. Chris Mott, continuously using such a brush incorrectly can leave your teeth in worse shape than before. Below are some of the possible dangers of using these types of toothbrushes: Danger to the Enamel Brushing vigorously with an electric toothbrush can exert enough pressure to wear away your protective tooth enamel. This can be attributed to the abrasion that is caused by the spinning, vibration, or oscillations of the bristles when brushing hard with an electric brush. Dr. Chris Mott an experienced local dentist recommends moderation and light handed control in the use of these toothbrushes. In fact in extreme cases, the patient may be advised to stop using these types of toothbrushes altogether. After long-term use, you may also begin to notice that your gums are also receding. This is particularly common with the bottom front teeth. It often results in excessive sensitivity, where you experience pain whenever you drink something cold or hot. You may also begin to experience excessive bleeding when brushing your teeth. The teeth may also begin aching whenever you start brushing them. If you initially had healthy teeth, you may want to switch back to a normal brush and visit your dentist to assess the damage. Over brushing the Teeth Electric toothbrushes are very powerful gadgets. For this reason, brushing your teeth using these devices requires you to be extremely careful. However, so many people damage their teeth because they either brush them too often or too hard. Ideally, brushing your teeth vigorously or for more than two minutes can result in complications. In fact, this is the main cause of gum problems and abrasion cavities with these toothbrushes. This can be particularly challenging with children using these types of toothbrushes as they might not be aware of how hard they are brushing. To be on the safe side, Dr. Chris Mott advises that you supervise your little ones when they are brushing their teeth using these gadgets. In spite of all these shortcomings, electric toothbrushes do have their own merits. For instance, besides being quite effective in their performance, they are also known to reduce incidents of gingivitis, a serious dental condition which is characterized by gum inflammation. If left untreated for long, this condition can even lead to the loss of teeth. Although they are known to be more effective in removing plaque from teeth, electric toothbrushes need to be handled with great care. You do not need to apply excessive force in order to remove the plague. Instead, you need to be gently and let the bristles do their job. Just guide the brush and everything else will go well. Taking all these precautions will ensure that you have good dental health and you are not prone to irreversible teeth enamel damage or gum recession. If you have noticed any unusual dental problems, you can consult Dr. Chris Mott a local Shreveport Bossier dentist who provides quality advice and dental care to those people with dental issues.
<urn:uuid:883fd75c-797c-49c7-bdd1-2224a73922bf>
CC-MAIN-2018-26
https://www.drchrisamott.com/3-possible-dangers-of-using-electric-toothbrushes/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867304.92/warc/CC-MAIN-20180624234721-20180625014721-00154.warc.gz
en
0.952958
682
2.859375
3
“Perhaps the greatest breach in nature,” wrote William James in The Principles of Psychology (1890), is “the breach from one mind to another.” He went on to describe two brothers waking up in the same bed, each reconnecting to the thoughts he had had before falling asleep. Peter may be able to conceive of Paul’s last twilight state of mind—Paul might tell him about it—but he cannot remember or feel it with any of the “warmth and intimacy and immediacy” of his own inner experience. James called this chapter of his book “The Stream of Thought,” specifically defining consciousness as a stream rather than a chain or a train: “It does not appear to itself chopped up in bits…. It is nothing jointed; it flows…. In talking of it hereafter, let us call it the stream of thought, of consciousness, or of subjective life.” [Italics in original] How does thought appear to itself? Over one hundred years later, it remains as exhilarating to follow William James’s forthright march into a new “science of mind” as it is to read the novels in which his brother Henry broke open the form of nineteenth-century fiction to portray his characters’ interior experience, their private streams of consciousness—beginning with The Portrait of a Lady in 1881. After Henry James, literary modernists dispensed with linear time and conventional plot, capturing the flow, drift, and tumbling associations of their characters’ minds. That William and Henry James directed their formidable gifts to the subject of consciousness itself is perhaps not entirely surprising—although genius always is. Their father, Henry James Sr., an eccentric, independently wealthy Swedenborgian, devoted his life to his ideas—one of which was to provide his children with as free, liberal, and “sensuous” an education as he had felt his own to have been constricted and severe. By “sensuous,” he meant immersion in the arts, culture, history, foreign travel, and languages. He dragged his large troupe—five children, his wife, her sister, and a maid—back and forth across the Atlantic in search of a perfect education that existed only in his mind. They stayed nowhere long enough for the children to make real friends, and the rarefied, isolated world of the family became their whole world. William in effect described them all when he said years later that Henry was “really a native of the James family, and has no other country.” Henry Sr. probably bequeathed to all his offspring a predisposition to depression. And though he encouraged them constantly to offer up their private perceptions and sensations for public (family) consumption, he imposed bizarre limits on what they could actually know about themselves. He defined morality according to his own anguished fight against powerful demons—“The natural inheritance of every one who is capable of spiritual life, is an unsubdued forest where the wolf howls and every… This article is available to subscribers only. Please choose from one of the options below to access this article: Purchase a print subscription (20 issues per year) and also receive online access to all articles published within the last five years. Purchase an Online Edition subscription and receive full access to all articles published by the Review since 1963. Purchase a trial Online Edition subscription and receive unlimited access for one week to all the content on nybooks.com.
<urn:uuid:04aab51c-8401-4ee9-bb91-009c05b5da83>
CC-MAIN-2016-18
http://www.nybooks.com/articles/2012/11/22/why-did-isabel-go-back/
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111865.15/warc/CC-MAIN-20160428161511-00178-ip-10-239-7-51.ec2.internal.warc.gz
en
0.977153
726
2.59375
3
Pneumatic tyres may soon become a thing of the past thanks to tweel airless tyres being developed by Michelin, one of the leading tyre manufacturers in the world. While the concept of building tyres without air may seem unlikely, in reality tweel tyres have been tested and demonstrated by Michelin on several occasions. The tweel derives its name from the tyre and wheel – which come together to bring a revolutionary concept in tyre design. Construction of a Tweel Tyre (Source: Wikipedia) Unlike traditional pneumatic tyres that are mounted on a rim, filled with air and sealed, tweel ones consist of a hub with flexible spokes. The tread of tweel tyres is made with rubber and is bonded to the polyurethane hub. The spokes are fused with the tread and as they are flexible, they can change shape along with the tyre tread. The spokes of the tweel can return to the original shape instantly and absorb shocks while rolling. To complete the construction of a tweel tyre, a sheer band along with a layer of rubber is wrapped around the tyre providing grip on the roads. Although tweel tyres have a different design and construction as compared to pneumatic tyres, they have similar characteristics including load carrying capacity, comfort, traction, resistance and road holding. One of the biggest benefits of tweel tyres is undoubtedly the robustness that they offer. With tweel airless tyres, punctures are impossible. Therefore, they are safer and more convenient for the driver. According to Michelin, the tread of the tweel tyres is designed to last up to three times longer than that of regular tyres and can be retreaded just like conventional tyres. Tweel tyres from Michelin will take some time before they are out on the roads. Still under research, Tweel tyres can only run at about 50 miles per hour comfortably. At higher speeds, tweel tyres begin to vibrate excessively, producing high levels of heat and noise. Therefore, they are not yet suited for high-speed, long-distance travel. However, tweel tyres are being used in construction vehicles and other applications where speeds are low. Recently, Michelin tested the Tweel on the Audi A4 and demonstrated its use on personal mobility devices for physically challenged people. However, the possibilities of use for the tweel tyres are immense in rough terrain areas like military use and agriculture. Michelin does not plan to roll out the tweel tyres for consumers very soon and when it does, there are still several challenges that have to be overcome. Although the production costs of the tweel might be less as the tweel tyres have only four components as compared to twenty three components of conventional tyres, manufacturers may not been keen to redesign and rebuilt their facilities to produce Tweel tyres. Michelin is not the only tyre brand to research airless tyres and will face competition from other companies who are developing similar tyres like Resilient Technologies. Tweel tyres from Michelin are one of the most revolutionary concepts in tyre technology that has the potential to change the way the world travels.
<urn:uuid:7d07371a-5bb6-41d9-bd70-91eb5c85c5e1>
CC-MAIN-2014-41
http://indiatransportportal.com/2013/02/airless-tweel-tyres-from-michelin/
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663365.9/warc/CC-MAIN-20140930004103-00305-ip-10-234-18-248.ec2.internal.warc.gz
en
0.953902
625
2.640625
3
CHAPTER I INTRODUCTION Background of the Study Communication is one of the most important things for us to live in this world wherein people express different views, opinions and viewpoints about the current issues in our lives (Thompson, 1967). It is important because of the fact that there are billions of people living in this world and it is very impossible for us to communicate with others simultaneously. And for that reason, different modes of communication are invented and innovated. One of the most, if not the only, used form of communication today is through the use of our internet. From your internet, you can access incredible amounts of information including texts, graphics, audio and video. You can search databases at the Library of Congress, view masterpieces by Michelangelo, take an aerial tour of the Philippines, or dissect a virtual frog. You can send email, receive electronic newsletters and “chat” with others online. This is a new medium in education requiring strategies and new learning is happening increasingly using an interconnection of networks that links together millions of computers worldwide. The internet, according to Visual Basic 6: Proficiency in Application Development, is a huge system of voluntary linked networks with millions of documents, records, databases and variety of information. It can be referred to as the “information superhighway”. That is why it is one of the most accessible forms of information gathering and dissemination. But internet in our generation is not just simply for researching, emailing or chatting purposes. This is also a form of interactive socialization with our family, friends and even to the people we are not familiar to. This is the wonderful world of social networking sites; and the most famous of them all, FACEBOOK. Facebook is a social network service and website launched in February 2004 that is operated and privately owned by Facebook, Inc. The users may create a personal profile, add other users as friends and exchange messages, including automatic notifications when they update their profile. Furthermore, users may join common interest user groups, organized by workplace, school, or college, or other characteristics. The name of the ervice stems from the colloquial name for the book given to students at the start of the academic year by university administrations in the US with the intention of helping students to get to know each other better. Facebook allows anyone who declares them to be at least 13 years old to become a registered user of the website (www. wikipedia. org). Here in our country alone, according to Lim of Sun Star Cebu, the Philippines ranks eighth among the countries in the world with the most number of Facebook users. In fact, in September last year, there were only 4,832,040 Facebook users in the country, putting the Philippines in 13th place in the world in terms of number of users, said Vera Files trustee Luz Rimban during a seminar-workshop last week at Waterfront Cebu City Hotel and Casino. But the number of Filipinos on Facebook continues to rise and helps the Philippines keep its position as the fifth largest in the world’s leading social networking site. Facebook analytics company SocialBakers reports that, as of Feb. 2011, there are now 22,515,820 Filipinos on Facebook. This means 1. -million Filipinos signed up on Facebook in a month and represents an increase of seven percent from 20,802,540 in Jan. 2011, as reported by Philippine tech company Yehey! , also citing SocialBakers. (Cruz, 2011) As what was said in the definition of Facebook, it originated for the sole purpose for teenagers, college students in particular, to be familiar to their new environment and as well as their new classmates. During the first day of classes, college students have this “culture shock” because they see that everything is new: new school, new classrooms, new teachers and new classmates. If one is not that independent, they might be nauseous and not enter their classrooms anymore. They feel that way because they seem to realize that they do not know anybody from the room and it’s like everyone’s watching your every move once you enter the class. This might be the initial reaction that we feel, but as soon as we start introducing ourselves to our seatmate and eventually our classmates, we tend to build friendship during the first day and probably the very last thing that we want to know is his/her number or Facebook account. This is the first step to friendship. Next, we chat with them and ask about the given requirements of the professors, though we knew about it, just to have conversation. The nature of these social exchanges is characterized by either one-on-one or one-on-many communication scenario. Bryant and Oliver (2009), found out that people who are shy but wish to be social were able to develop a closer and more satisfactory relationship with others online, compared to those who are characterized by high shyness/low sociability, low shyness/high sociability. Other scholars’ finding suggests that only when online relationships were built on shared interests or sincere disclosure of one’s true self, then a healthy and perhaps lasting relationship could potentially flourished. Other scholars’ finding suggests that only when online relationships were built on shared interests or sincere disclosure of one’s true self, then a healthy and perhaps lasting relationship could potentially flourished. Indeed, teenagers learn that friendships must be kept through effort and behavior that indicates a commitment towards preserving the relationship and satisfying the relational needs of both partners. For example, Oswald and Clark (2003) found that when transitioning to college, high school best friends experience decreased satisfaction, commitment, rewards, and investments with increased costs and alternatives. However, students who maintained their best friends from high school during their first year in college reported engaging in more maintenance behaviors — positivity, supportiveness, self-disclosure, and interaction – than students in best friendships that did not survive the transition to college. Although maintaining high school best friendships required increased effort, partners reported benefits such as reduced social loneliness. Accordingly, a need exists to explore how relationship maintenance strategies are utilized in various venues to enable the survival of various teenage relationships during the college years. The Internet’s ability to aid in the maintenance of relationships has been noted (McKenna & Bargh, 2000). The Internet might be an especially useful tool for college students who report using email and instant messenger to communicate with friends and preserve feelings of intimacy and closeness (Cummings, Lee, & Kraut, 2006). ). Online social networking sites have also become increasingly popular venues for young adults to interact and build profiles that “((re)present their public persona (and their networks of connections) to others” (Acquisti & Gross, 2006, p. 2). Facebook, allows members to create personal profiles that portray their identity through information such as their interests, favorite activities, religious affiliation, political orientation, jobs, relationship status, and even users can post pictures, videos and communicate with their friends by leaving message on each photo. Through the existence of social networking sites especially the Facebook, people, most especially the students, are able to establish and maintain friendship not just through personal contact, but also through the cable wires of new technology, the technology of FACEBOOKING. CHAPTER II REVIEW OF RELATED LITERATURE This chapter includes the purpose of the literature review, a review of the literature on the effects of subliminal advertising on moralities of the Filipinos, subliminal messages, perceptions and other literature sources. The chapter highlights human effects of the advertising research review. Purpose The purpose of the study has been demonstrated or to show the effectiveness of subliminal messaging and advertisement to prime individual responses and stimulate mild emotional activity. It often based them on the persuasiveness of the message. We suggest that subliminal messages have an effect when the messages are goal-relevant. This chapter presents the review related research of how the said study affects to the children and high school students who spend most of their time watching television. The literature about the personal message, effects of the advertisement and relationship learned after watching the videos, to the primary and secondary students. Also concluded that “the cultural implications of subliminal indoctrination which is a major threat to human rights throughout the world”. Meaning of Subliminal Advertising In previous conducted research of prominent figures in the mass society, it had been keyed in that Subliminal Advertising has massive effects on the society especially to those who had been greatly exposed to it. The advertising industry, a prominent and powerful industry, engages in deceptive subliminal advertising, which most us are unaware of. By bypassing our unconscious mind using subliminal techniques, advertisers tap into the vulnerabilities surrounding our unconscious mind, manipulating and controlling us in many ways. Since the 1940’s, subliminal advertising blossomed until now, when you can find subliminal in every major advertisement and magazine cover. Legislation against the advertisers has had no effect in curbing the use of subliminal. In this Information Age, it seems people are no longer in control of the people. The ones in control are the ones with knowledge (as usual). In this case, the advertisers have it; you don’t. Subliminal Messages A subliminal message is a signal or message embedded in another medium, designed to pass below the normal limits of the human mind’s perception. These messages are unrecognizable by the conscious mind, but in certain situations can affect the subconscious mind and importantly, the unconscious mind, and can negatively or positively influence subsequent later thoughts, behaviors, actions, attitudes, belief systems and value systems. The concept subliminal is archaic, although it is in daily use. The main problem is its necessary bound to the idea of a well-defined perceptual threshold, a concept now in disuse by the first appearance of the signal detection theory into cognitive sciences. However, we’ll remain to use this term, (so as the word “trance” in the field of hypnosis), due to the fact that it is deep-rooted in the minds of both public and the scientists. The isolated term means “below a threshold,” however there is no clearly defined threshold to sensory perception. Indeed, there are many different perceptual features processed and detected before they are brought to our awareness, with the assistance of our attention. This makes the concept highly flexible in what and how we can integrate perceptual impressions into our awareness. In scientific usage, we can call a stimulus subliminal only if it is faint enough, brief enough, or somehow cannot stimulate the senses enough to induce us to notice its presence, yet subsequent tests can register its presence. But, a more scientifically accurate word for this concept would be slightly perceptible. The mainstream meaning of the word “subliminal” is any effect that influences our perception from outside of our awareness. Subliminal Stimuli It could be any sensory stimuli below an individual’s absolute threshold for conscious perception. Visual stimuli may be quickly flashed before an individual may process them, or flashed and then masked, thereby interrupting the processing. Audio stimuli may be played below audible volumes, similarly masked by other stimuli, or recorded backwards in a process called back-masking. Subliminal perception This occurs whenever stimuli presented below the threshold or limens for awareness are found to influence thoughts, feelings, or actions. The term subliminal perception was originally used to describe situations in which weak stimuli were perceived without awareness. In recent years, the term has been applied more generally to describe any situation in which unnoticed stimuli are perceived. The concept of subliminal perception is of considerable interest because it suggests that peoples’ thoughts, feelings and actions are influenced by stimuli that are perceived without any awareness of perceiving. One way is simply to ask observers whether or not they are “aware” of a stimulus. If the observer denies any awareness, then the stimulus is, by definition, below an awareness threshold. Using this approach, unconscious perception consists of demonstrating that observers can be affected by stimuli whose presence they do not report. Another way to define “awareness” involves require observers to distinguish between two or more stimuli that are presented successively. With fast exposure durations, observers may be unable to distinguish between stimuli, or between a stimulus’s presence and absence. Effect of Subliminal Advertising on the moralities of Filipinos According to the research psychologists, subliminal messages do not produce a powerful, enduring effect on behavior but to the research laboratories, it reveals little effect beyond a subtle, fleeting effect on thinking. Subliminal is a term commonly used to actually mean several distinct types of hidden messages. • Artistically or Blatant concealed messages suggestive of instinctual drives • Images of contrived social exchanges and explicit body language • briefly or faint flashed images or words Metaphor or other “hypnotic” patterns • acoustically backward messages or masked in music songs Of all these various types of “subliminal” effects, psychologists refer only to the flashed words or pictures, and the acoustic masking of a message, when they discuss about subliminal or marginal perception. Putting it in other words, the scientific experimenters involved in research into subliminal priming agree that it do exists, however they are of the opinion that it consists of relatively fleeting and weak effects of mainly theoretical interest. This is probably true of unconscious lexical priming. However, according to the research on the effects of subliminal perception, the most effective are words and pictures that are flashed in between video scenes and subliminal messages embedded in songs. These were found to be really powerful stimuli that have certain psychological effects, which mean this technology does have the ability to affect the psychological state of a person. Experts also found that the psychological effects of subliminal advertising are quite temporary, though very real. This is why for subliminal suggestions to be successfully persuasive; they have to be applied repeatedly and regularly until the desired action is achieved. Another finding is that unlike other advertising techniques marketers use, subliminal happen to be the only ones that have the power to influence behavior, albeit indirectly. Whether all of these elements has an “unconscious” influence is rather a matter of empirical evidence, however whether there are effective influences is a matter or more investigation. Lumping all these elements together into a main category with faint and brief messages used in psychology experiments indeed makes it impossible to select things like social influence, emotional appeal, suggestion, preconscious processing, and associative conditioning. Subliminal lexical priming It is the influence of flashed words on subsequent words in a multiple choice test. It lasts about 90 milliseconds and it does not influence the next trial or the next experiments. All subliminal lexical priming is the result of a flashed picture on basic preferences in a choice test, and it is more robust. This is known as the “simple exposure effect”. Some variations of the simple exposure effect have been proven to achieve emotional areas of the brain, specially the amygdale, without conscious awareness. This is probably some kind of “classical conditioning” of feelings and memories without conscious awareness. It begins to enter into the area of something that can be produced into propaganda messages, especially if it is used as reinforcement. Subliminal psychological activations are one of the main methods, or at least the most intriguing. All subliminal stimuli enter into our dreams and waking pictures in a disturbed way, it influences later recalls and perceptions, and remarkably it even can influence our social acting. But, it is indeed the most difficult to prove, presumably because its main feature is that it is the most vulnerable to individual differences and the mental states of the recipients, besides the vagaries’ of individual interpretations of results. The most efficient methods in practice imply both unconscious and conscious elements; both coordinated to appeal to emotions and exploit natural information processing way and common biases, as well as carry our unconscious thinking processes in a determined way. Becoming somehow aware of subliminal effects generally reduces the influence of these, in both the exposure and psychological experiments. The whole combination of unconscious and conscious elements is carefully coordinated, however not duplicated (conscious elements are not transformed into unconscious). The main reason why these methods are effective, compared to others relying or emphasizing on hidden pictorial messages, is due to the fact that hidden messages influence the feelings and thinking of test subjects, but they do not cause behavior, at least they don’t do it by any known effect. The subliminal influences behavior indirectly, principally by influencing perception, feeling and thinking. Conscious thinking triggers and organizes behavior, even though some aspects of behavior are not conscious, such as the main details of some movements or the expression of nonverbal communication. Also hypnosis research has proven that compulsions and illusions can be created through simple suggestion under special conditions with particular people, without awareness of the source. These hypnotic suggestions are highly limited by the main expectations of the test subject, the relationship established with the hypnotist, or the characteristics of the situation. The higher are the expectation, the more the subject can be controlled, or the greater their sense of practice the more involuntary they conduct their response. It is the degree to which messages can produce a similar type of dissociated control that is at the main point of the most potential threat of subliminal persuasion. Without the expectancy factors that make suggestion effective, it is quite difficult to see how the comparison can be made. Unless they are tailored to the individual, there is no evidence of any elaborate effect from preconscious processing of hidden messages, or that they are worth following as an aid to ads. Achieving this type of effect through a combination of subliminal messaging and hypnotic means is a theoretical possibility under some conditions. At issue is the problem of creating the cooperative relationship needed for it, creating the expectancy that we can be controlled, and the differences in the way individuals respond to suggestion. The threat of subliminal influence seems quite limited at this time due to the weak reinforcement of messages, however the combination of effects can be hard to determine. A message employing subliminal methods, like any one, can often have effects on the listener depending on their psychological needs and mind. CHAPTER III METHODOLOGY This chapter focuses on the method of research used, the methods in collecting our data, the sampling design performed, its statistical treatment and likewise the procedure. Method of Research For this kind of research, the best method to use is the descriptive method. It is because the study focuses on the effects of subliminal advertising to the morality of High School students. In a descriptive research, the question “what is? ” is to be answered. Now, we have to know the perception of High School students when it comes to subliminal advertising. Once the respondents give their answers, the researchers will be able to analyze whether subliminal advertising has an effect on the morality of High School students. Methods of Collecting Data There are a lot of means of collecting data for the research and this time the researchers made use of two methods: questionnaire and interview. First, questionnaire is so far the most convenient and most reliable source of collecting data. High School students both from public and private schools are the target respondents for this research. Questionnaires will be istributed if the target respondent is in a hurry. The second method used in this research is the interview. Besides the questionnaire, interviews were conducted while the researchers show a video of a sample advertisement with subliminal message and then ask them some questions about the video and how it affected them. As much as possible, all students from all year levels in High School (both private and public) must be part of the research to be fair. Sampling Design For the sampling design, this research made use of purposive sampling. It is because the focus of the study is High School students only. The respondents are randomly selected according to their year level and only 10 per year level are to be selected. The purposive sampling aims to focus on a particular group of people related to the study. In this case the High School students are gathered to be prospective respondents. Procedure To be able to accomplish this research, the researchers gathered High School students from the public and private schools. From each year level, the researchers will gather 10 students so there will be 40 respondents all. Because we are to interview both public and private High School students, for the sake of impartiality, for each level, there will be 5 students from public and likewise 5 students from the private schools. On the questionnaire part, the researchers will show a video commercial with subliminal message and give them the questions. It will also be in a form of interview because after the questionnaire, if they still have time, they will be asked few questions about the topic. It will then be recorded by the interviewer. If the needed respondents are already satisfied, then they will proceed to the organization of results, the analysis, interpretation and the conclusion and recommendation. References: http://www. selfgrowth. com/experts/eldon_taylor. html Eldon Taylor, Official Guide to Subliminal Messages & Subliminal Learning http://www. selfgrowth. com/subliminal. html http://sites. google. com/site/feorillodemeterio/thefilipinostructureofmorality Personal development articles From A. E. Kazdin (Ed. ), Encyclopedia of Psychology (Vol. 7, pp. 497-499). New York: Oxford University Press, 2000. Eagle, M. 1987. “The Psychoanalytic and the Cognitive Unconscious. ” In Theories of the Unconscious and Theories of the Self, edited by R. Stern. Hilledale, N. J. : Analytic Press. Greenwald, A. G. , E. R. Spangenberg, and J. Eskenazi. 1991. Double-blind tests of subliminal self-help audiotapes. Psychological Science, 2:119-122. —-. 1988. Subliminal auditory tapes: An evaluation. Psychology & Marketing, 46: 355-372. Merikle, P. , and H. E. Skanes. In press. “Subliminal Self-help Audiotapes: A Search for Placebo Effects. Journal of Applied Psychology. Moore, T. E. 1982. Subliminal advertising: What you see is what you get. Journal of Marketing, 46: 38-47. —. 1988. The case against subliminal manipulation. Psychology & Marketing, 46:297-316 Cruz, Tonyo. (2011, February 16). Philippines 5th biggest Facebook nation: Users up 1. 7m in a month. http://asiancorrespondent. com/48544/ph-is-5th-biggest-facebook-nation-users-up-by-1-5m-in-a-month/ Lim, Cherry Ann T. (2010, February 13). RP has 8. 38M Facebook users. Sun. Star Cebu http://www. sunstar. com. ph/network/rp-has-838m-facebook-users
<urn:uuid:3af01619-445a-424d-addf-af8ec1275449>
CC-MAIN-2017-34
https://e-hipokrates.com/the-effects-of-facebook-on-filipino-teenagers/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105326.6/warc/CC-MAIN-20170819070335-20170819090335-00002.warc.gz
en
0.939363
4,797
3.515625
4
When teeth are missing for an extended period of time, the bone around the empty tooth socket can begin to recede in a process called “resorption.” For the placement of dental implants to be successful, the bone surrounding the implant must be the proper height, width, and quality. Oral surgeons can perform bone grafting procedures to restore bone loss and prepare the mouth for dental implant placement. All bone grafting procedures generally involve the placement of bone grafting material over the area of bone that is lacking in size, shape, or quality of bone necessary for dental implant placement. Bone graft material is made up of tiny granules of bone suspended in a gel that contains growth factors to help the bone naturally integrate with your jaw. The bone grafting material can be taken from your own body or a tissue bank. Bone Grafting Prior to Dental Implants Not everyone will need bone grafting, but the treatment necessary will depend on the patient’s bone shape and the desired location of the dental implants. There are many different types of bone grafting procedures, and we have outlined below a few of the most common bone grafting procedures patients receive in preparation for dental implant placements. A sinus lift or sinus augmentation procedure adds bone between the jaw and the sinus, which lies just above your back molars on either side of your nose. The sinus is a hollow cavity, and when the bone between the sinus and the mouth is too thin, there is not enough bone to place a dental implant without entering the sinus, which can cause serious complications. The sinus lift procedure increases the amount of bone behind the upper molars to protect your sinus and support your dental implant. Socket preservation grafts are used immediately after a tooth extraction to prevent the rapid bone loss that occurs after losing a tooth. The bone graft material is typically placed into the tooth socket immediately after the tooth is extracted, eliminating the need for multiple different procedures. When bone loss has already occurred, ridge augmentation or ridge expansion grafts can restore the lost bone to make room for a secure dental implant. The alveolar ridge is the bone beneath the gums that holds all of your teeth. Ridge expansions increase the bone width to allow for a secure dental implant placement. In some cases, immediate dental implants can be placed during a ridge splitting procedure. In some severe cases of bone loss, a bone grafting procedure called nerve repositioning is necessary to protect the inferior alveolar nerve, which gives sensation to the lower lip and chin. Sometimes placing dental implants in the lower jaw can increase the risk of damaging this nerve, but oral surgeons can reposition the nerve and place a bone graft to keep it in place. Bone Grafting at Indianapolis Oral Surgery & Dental Implant Center Our practice uses advanced treatments that drastically speed up the healing and bone regeneration process, allowing you to receive your dental implants quickly and safely. We offer platelet-rich plasma (PRP) and bone morphogenetic protein treatments that use your body’s own growth and healing factors to speed up the healing process. Contact our office to schedule your consultation and learn more about these time-saving treatments.
<urn:uuid:355ddf4d-ba93-4b3d-8a70-2881c19516dd>
CC-MAIN-2017-47
https://indianapolisoralsurgery.com/procedure/bone-grafting-dental-implants-indianapolis/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809419.96/warc/CC-MAIN-20171125051513-20171125071513-00168.warc.gz
en
0.880549
657
2.578125
3
IMPORTANT INFORMATION FOR PARENTS REGARDING INFLUENZA FROM THE FLORIDA DEPARTMENT OF HEALTH The Florida Department of Health (DOH) reports that influenza, or "flu," activity levels have begun increasing across the state in recent weeks. This increase in activity is typical for this time of the year. Flu is a contagious respiratory disease caused by influenza viruses. It can cause mild to severe illness. Serious outcomes of flu infection can result in hospitalization or death. Some people, such as young children, the elderly, and people with certain health condit ions are at high risk for serious complications from flu. DOH is encouraging families to get vaccinated for flu now. Vaccination is the best way to protect against the flu and severe complications from the flu. Vaccinat ion is most crucial for children with underlying health conditions such as asthma, diabetes, heart disease, and neurological and neurodevelopmental conditions. The flu vaccineis offered in many locations including pharmacies, clinics, employers, and schools. Contact your physician, county health department, or visit http://www.floridahealth.gov/programs-and-services/prevention/flu-prevention/locate-a-flu-shot.html?utm_source=articleResource to find a flu vaccine center near you. The flu vaccine is safe. The national Adv isory Committee on Immunization Practices (ACIP) recommends that all individuals six months of age and older receive the flu vaccine each year. Since infants under six months of age are too young to get vaccinated against influenza, it is important that family members (including pregnant or breastfeeding mothers) and other caregivers for these children be vaccinated to help protect them from the disease. It is especially important that parents keep sick children at home to prevent spreading the flu virus to others. Additional flu prevent ion steps include staying away from people who are sick, covering sneezes or coughs with a tissue or your elbow , avoid touching your eyes , nose and mouth, and frequent handwashing. If your child becomes sick with flu-like illness, contact your health care provider soon after symptoms begin to discuss medical care options. Symptoms of the flu often include fever, cough, sore throat, runny nose, body aches, headaches, or fatigue .Ant iviral medication for flu has been shown to reduce severity and length of disease, decrease the risk of complications from influenza, and reduce the risk of death among hospitalized patients, particularly in those that start treatment early in their illness. The best way to keep yourself and your family safe and healthy during flu season is to: 1. get vaccinated, 2. keep sick family members home, 3. contact your health care provider if you or your child are experiencing flu-like symptoms, and 4. follow your physician's guidance on treatment.
<urn:uuid:b5d27477-0989-4203-9d05-92508b08a037>
CC-MAIN-2020-29
https://www.collierschools.com/Page/7817
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657151761.87/warc/CC-MAIN-20200714212401-20200715002401-00111.warc.gz
en
0.950794
585
3.21875
3
BLACK PSYLLIUM Overview Information Black psyllium is a weed that grows aggressively throughout the world. The plant was spread with the colonization of the New World and was nicknamed "Englishman's foot" by the North American Indians. People use the seed to make medicine. Be careful not to confuse black psyllium with other forms of psyllium including blond psyllium. Black psyllium is used for chronic constipation and for softening stools in conditions such as hemorrhoids, cracks in the skin around the anus (anal fissures), surgery on the rectum, and pregnancy. It is also used for diarrhea, dysentery, irritable bowel syndrome (IBS), reducing high cholesterol, and treating cancer. How does it work? Black psyllium adds bulk to the stool which might help with constipation, diarrhea, and irritable bowel syndrome. It also increases the elimination of cholesterol from the body before it can be absorbed and enter the bloodstream. - Constipation. Black psyllium works as a bulk laxative and reduces constipation. Possibly Effective for: - Improving high cholesterol. - Irritable bowel syndrome (IBS). - Other conditions. BLACK PSYLLIUM Side Effects & Safety Black psyllium, when taken with enough water, is safe for most people. Mild side effects include bloating and gas. In some people, black psyllium can cause allergic reactions such as runny nose, red eyes, rash, and asthma. Black psyllium might lower blood sugar. If you have diabetes, check your blood sugar carefully. Be sure to take black psyllium with plenty of water. Otherwise, you might choke. The concern is so important that the U.S. Food and Drug Administration (FDA) requires that psyllium be labeled: "WARNING: Taking this product without adequate fluid may cause it to swell and block your throat or esophagus and may cause choking. Do not take this product if you have difficulty in swallowing. If you experience chest pain, vomiting, or difficulty in swallowing or breathing after taking this product, seek immediate medical attention.” Black psyllium seeds contain a substance that can cause kidney damage. Commercial preparations of black psyllium usually have this substance removed. Do not use black psyllium seeds unless they have had special processing to make them less toxic. Special Precautions & Warnings:Pregnancy and breast-feeding: Taking black psyllium during pregnancy or breast-feeding seems to be safe, as long as enough water is taken with the dose. Diabetes: Black psyllium can lower blood sugar levels in people with type 2 diabetes by slowing down absorption of carbohydrates. Monitor blood glucose levels closely if you have diabetes and use black psyllium. Doses of your medications for diabetes may need to be adjusted. On the other hand, some black psyllium products can contain added sugars and other carbohydrates that might increase blood sugar levels. Check labels for added sugar, and again, be sure to monitor your blood sugar levels. Intestinal problems: Don’t use black psyllium if you have impacted stools, a complication of constipation in which the stool hardens in the rectum and can’t be moved by usual movement of the bowel. Don’t use black psyllium if you have a condition called gastrointestinal (GI) atony, narrowing of the GI tract, bowel blockage or conditions that can lead to bowel blockage such as spastic bowel. The concern is that when black psyllium absorbs water and swells up, it might block the GI tract in people with these types of conditions. Allergies: Some people are severely allergic to black psyllium. This is more likely to happen to people who have been exposed black psyllium on the job. These people shouldn’t use black psyllium. Phenylketonuria: Some black psyllium products might be sweetened with aspartame (Nutrasweet). If you have phenylketonuria, avoid these products. Surgery: Because black psyllium might affect blood sugar levels, there is a concern that it might interfere with blood sugar control during and after surgery. Stop using black psyllium at least 2 weeks before a scheduled surgery. Swallowing disorders: People who have trouble swallowing might be more likely to choke on black psyllium. If you have a swallowing problem, don’t use black psyllium. Moderate Interaction Be cautious with this combination - Carbamazepine (Tegretol) interacts with BLACK PSYLLIUM Black psyllium contains large amounts of fiber. Fiber can decrease how much carbamazepine (Tegretol) the body absorbs. By decreasing how much carbamazepine (Tegretol) the body absorbs black psyllium might decrease the effectiveness of carbamazepine (Tegretol). - Digoxin (Lanoxin) interacts with BLACK PSYLLIUM Black psyllium is high in fiber. Fiber can decrease the absorption and decrease the effectiveness of digoxin (Lanoxin). As a general rule, any medications taken by mouth should be taken one hour before or four hours after black psyllium to prevent this interaction. - Lithium interacts with BLACK PSYLLIUM Black psyllium contains large amounts of fiber. Fiber can decrease how much lithium the body absorbs. Taking lithium along with black psyllium might decrease the effectiveness of lithium. To avoid this interaction take black psyllium at least 1 hour after lithium. - Medications for diabetes (Antidiabetes drugs) interacts with BLACK PSYLLIUM Black psyllium might decrease blood sugar by decreasing how much sugar your body absorbs from foods. Diabetes medications are also used to lower blood sugar. Taking black psyllium with diabetes medications might cause your blood sugar to be too low. Monitor your blood sugar closely. The dose of your diabetes medication might need to be changed. Some medications used for diabetes include glimepiride (Amaryl), glyburide (DiaBeta, Glynase PresTab, Micronase), insulin, pioglitazone (Actos), rosiglitazone (Avandia), chlorpropamide (Diabinese), glipizide (Glucotrol), tolbutamide (Orinase), and others. BLACK PSYLLIUM Dosing The following doses have been studied in scientific research: - As a laxative for constipation: The typical dose of black psyllium seed is 10-30 grams per day in divided amounts. Mix 10 grams of seed in 100 mL water, and then drink at least another 200 mL of water. It's important to take enough water. Otherwise, black psyllium might cause choking. Take at least 150 mL water for each 5 grams of black psyllium. The FDA labeling recommends at least 8 ounces (a full glass) of water or other fluid with each dose. Black psyllium should be taken 30-60 minutes after eating a meal or taking other drugs.
<urn:uuid:ece7a08b-b2e4-4c19-98e7-a920bf68fd15>
CC-MAIN-2013-48
http://www.webmd.com/vitamins-supplements/ingredientmono-97-BLACK+PSYLLIUM.aspx?activeIngredientId=97&activeIngredientName=BLACK+PSYLLIUM&source=0
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052469/warc/CC-MAIN-20131204131732-00035-ip-10-33-133-15.ec2.internal.warc.gz
en
0.879233
1,486
2.796875
3
Presentation on theme: "Spanning Tree Protocol"— Presentation transcript: 1 Spanning Tree Protocol Module 3Spanning Tree Protocol 2 Spanning Tree Protocol (STP) STP allows L2 devices to communicate with each other to discover physical loops in the network.STP specifies an algorithm that L2 devices can use to create a loop-free logical topology.STP creates a tree structure of loop-free leaves and branches that spans the entire Layer 2 network. 4 L2 Loops Broadcasts and Layer 2 loops can be a dangerous combination. Ethernet frames have no TTL fieldAfter an Ethernet frame starts to loop, it will probably continue until someone shuts off one of the switches or breaks a link. 5 L2 Loops - Flooded unicast frames Where’s Host B? FLOODWhere’s Host B? FLOODWhere’s Host B? FLOODWhere’s Host B? FLOODAnd the floods continueRemoved from the network 6 STP Prevents LoopsThe purpose of STP is to avoid and eliminate loops in the network by negotiating a loop-free path through a root bridge.STP determines where the are loops and blocks links that are redundant.Ensures that there will be only one active path to every destination. 7 Spanning Tree Algorithm STP executes an algorithm called STA.STA chooses a reference point, called a root bridge, and then determines the available paths to that reference point.If more than two paths exists, STA picks the best path and blocks the rest 8 Two-key STP ConceptsSTP calculations make extensive use of two key concepts in creating a loop-free topology:Bridge IDPath Cost 9 Bridge ID (BID) is used to identify each bridge/switch. The BID is used in determining the center of the network, in respect to STP, known as the root bridge. 10 Used to elect a root bridge Lowest Bridge ID is the root.If all devices have the same priority, the bridge with the lowest MAC address becomes the root bridge. 11 Path CostIEEE modified the most to use a non-linear scale with the new values of:4 Mbps (cost)10 Mbps (cost)16 Mbps (cost)45 Mbps (cost)100 Mbps (cost)155 Mbps (cost)622 Mbps (cost)1 Gbps (cost)10 Gbps (cost) 12 BID and Path CostBID and Path Cost are used to develop a loop-free topology .But first the Four-Step STP Decision Sequence 13 Four-Step STP Decision Sequence When creating a loop-free topology, STP uses:Four-Step decision SequenceStep 1 - Lowest BIDStep 2 - Lowest Path Cost to Root BridgeStep 3 - Lowest Sender BIDStep 4 - Lowest Port IDBridges use Configuration BPDUs during this four-step process. 14 Four-Step STP Decision Sequence BPDU key concepts:Bridges save a copy of only the best BPDU seen on every port.When making this evaluation, it considers all of the BPDUs received on the port, as well as the BPDU that would be sent on that port.As every BPDU arrives, it is checked against this four-step sequence to see if it is more attractive (lower in value) than the existing BPDU saved for that port.Only the lowest value BPDU is saved.Bridges send configuration BPDUs until a more attractive BPDU is received.Okay, lets see how this is used... 15 Three Steps of Initial STP Convergence The STP algorithm uses three simple steps to converge on a loop-free topology:STP ConvergenceStep 1 Elect one Root BridgeStep 2 Elect Root PortsStep 3 Elect Designated Ports 18 STP Convergence Step 1 Elect one Root Bridge When the network first starts, all bridges are announcing a chaotic mix of BPDUs.All bridges immediately begin applying the four-step sequence decision process.Switches need to elect a single Root Bridge.Switch with the lowest BID wins!Note: “highest priority” is the “lowest” BID value.This is known as the “Root War.” 19 STP Convergence Step 1 Elect one Root Bridge Cat-A has the lowest Bridge MAC Address, so it wins the Root War!All 3 switches have the same default Bridge Priority value of 32,768 20 STP Convergence Step 1 Elect one Root Bridge Its all done with BPDUs! 21 STP Convergence Step 1 Elect one Root Bridge At the beginning, all bridges assume they are the center of the universe and declare themselves as the Root Bridge, by placing its own BID in the Root BID field of the BPDU. 22 STP Convergence Step 1 Elect one Root Bridge Once all of the switches see that Cat-A has the lowest BID, they are all in agreement that Cat-A is the Root Bridge. 24 STP Convergence Step 2 Elect Root Ports A bridge’s Root Port is the port closest to the Root Bridge.Bridges use the cost to determine closeness.Every non-Root Bridge will select one Root Port!Bridges track the Root Path Cost, the cumulative cost of all links to the Root Bridge. 26 Cat-A sends out BPDUs, containing a Root Path Cost of 0. Step 1Cat-A sends out BPDUs, containing a Root Path Cost of 0.Cat-B receives these BPDUs and adds the Path Cost of Port 1/1 to the Root Path Cost contained in the BPDU.Step 2Cat-B add Root Path Cost 0 PLUS its Port 1/1 cost of 19 = 19 27 BPDUCost=0BPDUCost=0BPDUCost=19BPDUCost=19BPDUCost=19BPDUCost=19BPDUCost=38 (19=19)BPDUCost=38 (19=19)Step 3Cat-B uses this value of 19 internally and sends BPDUs with a Root Path Cost of 19 out Port 1/2.Step 4Cat-C receives the BPDU from Cat-B, and increased the Root Path Cost to 38 (19+19). (Same with Cat-C sending to Cat-B.) 28 BPDUCost=0BPDUCost=0BPDUCost=19BPDUCost=19Root PortRoot PortBPDUCost=38 (19=19)BPDUCost=38 (19=19)Step 5Cat-B calculates that it can reach the Root Bridge at a cost of 19 via Port 1/1 as opposed to a cost of 38 via Port 1/2.Port 1/1 becomes the Root Port for Cat-B, the port closest to the Root Bridge.Cat-C goes through a similar calculation. Note: Both Cat-B:1/2 and Cat-C:1/2 save the best BPDU of 19 (its own). 30 STP Convergence Step 3 Elect Designated Ports A Designated Port functions as the single bridge port that both sends and receives traffic to and from that segment and the Root Bridge.Each segment in a bridged network has one Designated Port, chosen based on cumulative Root Path Cost to the Root Bridge.The switch containing the Designated Port is referred to as the Designated Bridge for that segment.To locate Designated Ports, lets take a look at each segment.Root Path Cost, the cumulative cost of all links to the Root Bridge. 31 Root Path Cost = 0Root Path Cost = 0Segment 1Segment 2Root Path Cost = 19Root Path Cost = 19Root PortRoot PortRoot Path Cost = 19Root Path Cost = 19Segment 3Segment 1: Cat-A:1/1 has a Root Path Cost = 0 (after all it is the Root Bridge) and Cat-B:1/1 has a Root Path Cost = 19.Segment 2: Cat-A:1/2 has a Root Path Cost = 0 (after all it is the Root Bridge) and Cat-C:1/1 has a Root Path Cost = 19.Segment 3: Cat-B:1/2 has a Root Path Cost = 19 and Cat-C:1/2 has a Root Path Cost = 19. It’s a tie! 32 Root Path Cost = 0Root Path Cost = 0Segment 1Segment 2Designated PortDesignated PortRoot Path Cost = 19Root Path Cost = 19Root PortRoot PortRoot Path Cost = 19Root Path Cost = 19Segment 3Segment 1Because Cat-A:1/1 has the lower Root Path Cost it becomes the Designate Port for Segment 1.Segment 2Because Cat-A:1/2 has the lower Root Path Cost it becomes the Designate Port for Segment 2. 33 Both Cat-B and Cat-C have a Root Path Cost of 19, a tie! Segment 1Segment 2Designated PortDesignated PortRoot Path Cost = 19Root Path Cost = 19Root PortRoot PortRoot Path Cost = 19Root Path Cost = 19Segment 3Segment 3Both Cat-B and Cat-C have a Root Path Cost of 19, a tie!When faced with a tie (or any other determination) STP always uses the four-step decision process:1. Lowest Root BID; Lowest Path Cost to Root Bridge;3. Lowest Sender BID; 4. Lowest Port ID 34 2) Root Path Cost for both is 19, also a tie. Segment 1Segment 2Designated PortDesignated PortRoot Path Cost = 19Root Path Cost = 19Root PortRoot Port32,768.CC-CC-CC-CC-CC-CC32,768.BB-BB-BB-BB-BB-BBRoot Path Cost = 19Root Path Cost = 19Designated PortSegment 3Non-Designated PortSegment 3 (continued)1) All three switches agree that Cat-A is the Root Bridge, so this is a tie.2) Root Path Cost for both is 19, also a tie.3) The sender’s BID is lower on Cat-B, than Cat-C, so Cat-B:1/2 becomes the Designated Port for Segment 3.Cat-C:1/2 therefore becomes the non-Designated Port for Segment 3. 36 Port Cost/Port ID0/20/1Assume path cost and port priorities are default (128). Port ID used in this case. Port 0/1 would forward because it’s the lowest.If the path cost and bridge IDs are equal (as in the case of parallel links), the switch goes to the port priority as a tiebreaker.Lowest port priority wins (all ports set to 128).You can set the priority from 0 – 255.If all ports have the same priority, the port with the lowest port number forwards frames. 37 STP Convergence RecapRecall that switches go through three steps for their initial convergence:STP Convergence Step 1 Elect one Root Bridge Step 2 Elect Root Ports Step 3 Elect Designated PortsAlso, all STP decisions are based on a the following predetermined sequence:Four-Step decision SequenceStep 1 - Lowest BIDStep 2 - Lowest Path Cost to Root BridgeStep 3 - Lowest Sender BIDStep 4 - Lowest Port ID 39 Spanning-Tree Port States Blocked:All ports start in blocked mode in order to prevent the bridge from creating a bridging loop.Port are listening (receiving) BPDUs.No user data is being passed.The port stays in a blocked state if Spanning Tree determines that there is a better path to the root bridge.May take a port up to 20 seconds to transition out of this state (max age). 40 Spanning-Tree Port States Listen:The port transitions from the blocked state to the listen stateAttempts to learn whether there are any other paths to the root bridgeListens to framesPort is not sending or receive user dataListens for a period of time called the forward delay (default 15 seconds).Ports that lose the Designated Port election become non-Designated Ports and drop back to Blocking state. 41 Spanning-Tree Port States Learn:The learn state is very similar to the listen state, except that the port can add information it has learned to its address table.Adds addresses to MAC Address TableStill not allowed to send or receive user dataLearns for a period of time called the forward delay (default 15 seconds) 42 Spanning-Tree Port States Forward:The port can send and receive user data.A port is placed in the forwarding state if:There are no redundant linksorIt is determined that it has the best path to the root 43 Spanning-Tree Port States Disabled: The port is shutdown. 44 Results of BPDU exchange A root port for each switch and a designated port for each segment is selected.These ports provide the best path from the switch to the root switch (usually the lowest-cost path).These ports are put in the forwarding mode.Ports that will not be forwarding are placed in the blocked state.These ports will continue to send and receive BPDU information but will not be allowed to send or receive data. 49 Configuring STPConfiguring Port PrioritySwitch(config)# spanning-tree [vlan vlan-list]priority priority* Default = (0-255)The port with the lowest priority value forwards frames for that vlan.This command can be very useful for load balancing vlans across multiple paths. 50 Verifying STP Switch# show spanning-tree [vlan] Switch# show spanning-tree mod/num 52 STP Timers Forward Delay Timer The default value of the forward delay (15 seconds) was originally derived assuming a maximum network size of 7 bridge hops, a maximum of three lost BPDUs, and a hello-time interval of 2 seconds.Forward delay is used to determine the length of:Listening stateLearning state 53 STP Timers Max Age Timer Max Age is the time that a bridge stores a BPDU before discarding it.Each port saves a copy of the best BPDU it has seen.If the device sending this best BPDU fails, it may take 20 seconds the a switch transitions the connected port to Listening. 54 STP Timers Modifying Timers Do not change the default timer values without careful consideration.Modify the STP timers only from the root bridgeThe BPDUs contain three fields where the timer values can be passed from the root bridge to all other bridges in the network. 55 STP Timer ExampleIt can take seconds for a switch to adjust to a change in topology. 60 In Figure , bridge A has priority 8192 and is the root for the VLAN. Bridge B haspriority and is the backup root bridgefor the same VLAN. Bridges A and B,connected by a Gigabit Ethernet link,make up a core of the network. Bridge Cis an access switch and has PortFastconfigured on the port connected to deviceD. Given the other STP parameters beingdefault, bridge C port that connects to bridgeB will be in STP Blocking state.Device D (PC) is not participating in STP.The red arrows indicate the flow of STPBPDUs. 61 Now, consider that device D started to participate in STP (for example, a Linux-based bridgeapplication was launched on a PC).If the priority of software bridge is zero orany value below that of root bridge, the softwarebridge will take over the root bridge function(as bridge with lowest priority), and the Gigabitlink connecting the two core switches willtransition into blocking mode, thus causing allthe data in that particular VLAN to flow via the100 Mbps link. If there is more data flowing viathe core in the VLAN than the link canaccommodate, the dropping of frames willoccur, leading to a connectivity outage.STP PortFast BPDU guard feature wouldprevent such a situation by disabling the portas soon as STP BPDU is received from device D. 69 Not seeing BPDU from Cat-B Ages out BPDU and goes into Listening mode X FailsAges out BPDU and goes into Listening modeHubCat-B:1/2 fails. Cat-C has no immediate notification because it’s still receiving a link from the hub. Cat-C notices it is not receiving BPDUs from Cat-B. 20 seconds (max age) after the failure, Cat-C ages out the BPDU that lists Cat-B as having the DP for segment 3. This causes Cat-C:1/2 to transition into the Listing state in an effort to become the DP.Hub 70 X FailsForwarding ModeListening ModeHubBecause Cat-C:1/2 now offers the most attractive access from the Root Bridge to this link, it eventually transitions all the way into Forwarding mode. In practice this will take 50 seconds (20 max age + 15 Listening + 15 Learning) for Cat-C:1/2 to take over after the failure of Cat-B:1/2.Hub 71 STP Topology ChangesThe STP change process requires the switch to clear the table faster in order to get rid of unreachable physical addresses.If a switch detects a change, it can send a Topology Change Notification (TCN) BPDU out its root port.The topology change BPDU is forwarded to the root switch, and from there, is propagated throughout the network.TCN does not start a STP recalculation. 72 STP Topology Changes A Bridge originates a TCN BPDU in two conditions: 1. It transitions a port into Forwarding state and it has at lease one Designated Port or Root Port.2. It transitions a port from either Forwarding or Learning states to the Blocking state.On bridges with Designated Ports accept and process TCN BPDUs.The Root Bridge will send out Configuration BPDUs 73 TCN BPDU Much simpler than a Configuration BPDU. Only three fields, Protocol ID, Version, and Type (TCN). 74 STP Enhancements Implementation of : Rapid Spanning Tree Protocol 802.1w (RSTP);Per VLAN Spanning Tree 802.1q (PVST +);Multiple Spanning Tree 802.1s (MST);Load balancing across links;BPDU guard;Root Guard; andUni-Directional Link Detection (UDLD) 75 RSTPThe IEEE 802.1w specification, Rapid Spanning Tree Protocol, provides for subsecond reconvergence of STP after failure of one of the uplinks in a bridged environment.802.1w provides the structure on which the 802.1s features such as multiple spanning tree operates.There are only three port states left in RSTP corresponding to the three possible operational states Learning ,Forwarding and Discarding.Rapid Transition to Forwarding State is the most important feature introduced by 802.1w:RSTP actively confirms safe port transition to forwarding without relying on timers;There is now a real feedback mechanism that takes place between RSTP-compliant bridges.In order to achieve fast convergence on a port, the protocol relies upon two new variables: edge ports and link type. 76 RSTP The RSTP role is now a variable assigned to a given port: Root PortDesignated PortsAlternate PortsBackup PortsRSTP calculates final topology using exactly the same criteria as 802.1d.There is now a difference between the role the protocol has determined for a port and its current state. 77 When STA selects a port to become a designated port, under 802 When STA selects a port to become a designated port, under 802.1d it waits twice <forward delay> seconds (2x15 by default) before transitioning it to the forwarding state.In RSTP a root bridge aware of a change in the topology, sets the TC flag on the BPDUs it sends out, which are then relayed to all the bridges in the network. 78 BPDU are sent every hello-time (not simply relayed anymore). A few changes have been introduced by RSTP to the BPDU format. Only two flags, Topology Change (TC) and TC Acknowledgment (TCA), were defined in 802.1d, however RSTP now uses all six remaining bits of the flag byteBPDU are sent every hello-time (not simply relayed anymore).BPDUs are now used as a keep-alive mechanism between bridges. A bridge considers that it has lost connectivity to its direct neighboring root or designated bridge if it misses three BPDUs in a row. 79 The following developments in Spanning Tree Protocol are examined: Per-VLAN Spanning Tree (PVST) is a Cisco-proprietary implementation requiring ISL trunk encapsulation.PVST+ provides Layer 2 load balancing for the VLAN on which it runs.MST (IEEE 802.1s) extends the IEEE 802.1w Rapid Spanning Tree (RST) algorithm to multiple spanning-trees.Enhanced PVST + or Multiple Instance of Spanning Tree Protocol (MISTP), a compromise between PVST+ and MST
<urn:uuid:26ce7e03-1869-480f-9f52-8d96974a4e82>
CC-MAIN-2017-47
http://slideplayer.com/slide/3346970/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804518.38/warc/CC-MAIN-20171118021803-20171118041803-00280.warc.gz
en
0.873362
4,511
3.859375
4
M101 in 60 Seconds Narrator (Megan Watzke, CXC): This image of the spiral galaxy Messier 101 is a composite of observations from NASA's three Great Observatories: the Chandra X-ray Observatory, the Hubble Space Telescope, and the Spitzer Space Telescope. Chandra's view in X-ray light is seen as blue and reveals multi-million-degree gas, exploded stars, and material colliding around black holes. In red, Spitzer's view in infrared light highlights the heat emitted by dust lanes in the galaxy where stars can form. The yellow shows Hubble's data in visible light. Most of this light also comes from stars, and they trace the same spiral structure as the dust lanes. Such multi-wavelength images allow astronomers to see how features in one wavelength match up with those in another, and give everyone a more complete picture of this beautiful galaxy.
<urn:uuid:921628e8-d230-4627-9230-4385cce8c56a>
CC-MAIN-2014-23
http://chandra.harvard.edu/resources/podcasts/ts/ts100209.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267824.47/warc/CC-MAIN-20140728011747-00186-ip-10-146-231-18.ec2.internal.warc.gz
en
0.896874
182
3.546875
4
It seems like the news lately is brimming with stories of wildlife crossing paths with people and our domesticated pets. From coyotes encroaching on neighborhoods in Decatur, to a grizzly bear mauling a man to death in Denali National Park, to roaming house cats posing a threat to wild animals. We need to coexist with nature to be good citizens of this planet. How can we do that? Tuesday, September 4th is National Wildlife Day. How can we appreciate the creatures who roam free in our neighborhoods while being respectful? In general, the best way to get along peacefully with wildlife is to live and let live; that is, leave it alone. This Morgan County, Georgia newsletter has some information on local species and how to handle an encounter with each. People have suggested removing coyotes from woods on the edges of neighborhoods. The problem with this strategy isn’t just the difficulty, time, or cost involved. Once a colony of wild animals moves out, another one will move in. The same applies to feral cats. If an area is ideal for the survival of one group of animals, it will be occupied. That’s why the best way to deal with a colony of cats is through Trap, Neuter, Return. This keeps the group under control and limits breeding while providing rodent control for the area. Coyotes in general leave people and their pets alone, unless directly confronted. This implies the avoidance strategy as being best. Birds don’t actually have scents until they are fully grown. Predators are unable to find babies who have fallen or been pushed out of a nest. Sometimes a mother bird will lead a predator away from their baby by letting them follow her scent. Mothers also push their young offspring out of the nest to teach them flight and survival skills. If you see a bird that is in a roadway or some other dangerous spot, move it out of harm’s way and leave it alone. The parents may well be nearby and able to help. Outdoor cats do kill many species of wildlife. They attack birds, rodents, snakes, and anything else they can catch. Since roaming felines are unsupervised there is no way to know how many or what types of animals your pet may exterminate. Indoor cats live much longer lives and avoid the troubles of fights and car injuries. Some cats, however, have trouble becoming accustomed to living inside at all times. If you have questions about acclimating your cat to indoor living, consult your veterinarian. As for the Denali incident, the hiker who was killed had been trained to stay a quarter mile away from any bears he encountered and to back off if he came close to one. Instead, he took photos of a bear grazing a mere 50 yards away from him for almost 10 minutes. Unfortunately his disregard for the park regulations and education cost him his life. If you encounter an animal and are unable to leave it alone, call the Wildlife Resources Division of the Department of Natural Resources. They should be able to help with questions about the wildlife you see and what to do. The phrase “Let nature take its course” is sometimes disheartening, but it is how animals have lived for centuries without our interference, and it can prevent unfortunate consequences for the people and the animals involved. For volunteer opportunities that will benefit animals living in nature around us, the DNR has resources to help. More information and resources:
<urn:uuid:c9352c3a-d1ae-4169-8eeb-156723c6c81f>
CC-MAIN-2018-39
https://www.briarcliffanimal.com/2012/08/29/celebrate-national-wildlife-day/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159938.71/warc/CC-MAIN-20180923232129-20180924012529-00227.warc.gz
en
0.961226
702
3.03125
3
Next time you get set to make hot cocoa on a chill winter afternoon, consider this: if you make your own marshmallows, you can mix up some very interesting third grade chemistry lessons while you're at it! Here's the deal: marshmallows depend on gelatin, a common household ingredient. But for third grade scientists, gelatin is also a great way to demonstrate how molecules can rearrange to change matter from one state to another. Follow the directions below to see just what can happen when gelatin meets some sugar, cornstarch, and heat. What You Need: - 2 envelopes of plain, unflavored gelatin - ½ cup cold water - 1 cup light corn syrup - ½ cup granulated sugar - 1/3 cup cornstarch - ½ teaspoon vanilla - 1/3 cup confectioner's sugar What You Do: - In a small bowl, combine the cornstarch and confectioner's sugar. Grease the sides of a 9” square baking pan, and place a sheet of parchment paper or wax paper, cut to size, along the bottom and then grease that, too. Use a bit of the cornstarch mixture to dust the bottom and sides of the greased pan. - Now place the contents of the two packets of gelatin into a small saucepan, and mix in the ½ cup of cold water. Let it stand for one minute, and then cook and stir over low heat until the gelatin is fully dissolved. (What's happening? The water has spread out the special protein fibers that make up the gelatin, and the heat has dissolved their original bonds. That's why the gelatin seems to “dissolve” into the water.) - Now pull out a mixing bowl, and blend the granulated sugar, corn syrup, and vanilla. Add the gelatin mixture, and beat the whole mixture thoroughly—for up to 12-15 minutes—with an electric mixer. Watch the mix become thick and creamy. Pour it into the greased baking pan, and let it stand at room temperature for at least 4 hours. (What happens: the protein bonds will begin to re-form as the gelatin cools…but now it's mixed with other ingredients, so it will hold them together, too, in classic “marshmallow” texture. - After four hours, or overnight, place the white sheet on a cutting board which has been sprinkled with the remaining cornstarch-sugar mixture. Cut into cubes with a knife (hint: it's helpful to dip the knife into hot water first, to keep marshmallow goo from sticking!) - Roll the cut-up marshmallows in the cornstarch mixture to keep them dry to the touch…and then devour! Julie Williams, M.A. Education, taught middle and high school History and English for seventeen years. Since then, she has volunteered in elementary classrooms while raising her two sons and earning a master's in school administration. She has also been a leader in her local PTA.
<urn:uuid:95fad943-ca57-497d-aa5e-ab6089b85767>
CC-MAIN-2015-32
http://www.education.com/activity/article/marshmallow_science/?coliid=192862
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988930.94/warc/CC-MAIN-20150728002308-00157-ip-10-236-191-2.ec2.internal.warc.gz
en
0.927905
629
3.515625
4
According to Monica Elliott, plant pathology professor at the University of Florida's Fort Lauderdale Research and Education Center, the palm's anatomy is more similar to that of a corn plant than that of an oak tree, with each stem having a single bud or heart. Once that tissue is damaged, death is likely. "Palms cannot repair injuries to their stems, and diligent effort must be made to prevent injuries that create opportunities for insect or pathogen invasion of the trunk," she said. Ganoderma butt rot and Phytophthora bud rot are just two of the most problematic diseases of palms. Ganoderma butt rot, caused by the fungus Ganoderma zonatum, is prevalent in Florida, where it has been found on more than 50 palm species. "Ganoderma butt rot is always a lethal disease of palms," said Elliott. "By the time symptoms develop, usually more than half of the lower trunk has been killed by the fungus," she said. In Florida, palm trees of 58 species have died from this fungus and no effective controls are known for this disease. Phytophthora bud rot can be caused by several species of Phytophthora, and occurs in most places where palms are grown. This pathogen has been reported on palms from more than 20 countries as well as from California, Florida, Hawaii, and Puerto Rico. In total, the species of Phytophthora have a broad host range and have been reported to attack more than 25 palm species. "Bud rot is always fatal to coconut trees, but other smaller palms Contact: Amy Steigman American Phytopathological Society
<urn:uuid:62ed2628-06f0-4d57-a598-8cad3a8ccd8f>
CC-MAIN-2017-04
http://news.bio-medicine.org/biology-news-2/Ornamental-palms-vulnerable-to-disease-2262-1/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00448-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966079
334
3.328125
3
Everyone is talking about the European Union‘s (EU) General Data Protection Regulation (GDPR) which takes effect today. Recent news reports about misuse of personal data suggest that rules to protect personal data are essential in today’s interconnected (online) world. But what is the GDPR exactly? And why should you care about an EU law if you live in the United States? In the EU, the protection of personal data and the respect for private life are fundamental rights, codified in the EU Charter and in the Treaty on the Functioning of the European Union (TFEU). The GDPR is the result of a long legislative process with the aim to replace and update current data protection rules and adapt them to the digital age. It covers the processing of all personal data, irrespective of the means of transmission. Personal data is defined as “any information relating to an identified or identifiable natural person (‘data subject’).” (GDPR, Art. 4 (1)). Examples of personal data include name, home address, email address, location data, genetic data, health data, or data concerning criminal convictions. The GDPR is complemented by the ePrivacy Directive which states how data protection principles apply to the electronic communications sector to ensure the confidentiality of communications. A proposal to update and replace the ePrivacy Directive with an ePrivacy Regulation is currently being debated in the European Parliament and the Council and is slated to go into effect in the summer of 2018. Unlike the GDPR, the ePrivacy rules are applicable to personal and non-personal data. The GDPR has a broad material and territorial scope. “Processing” personal data is any operation performed on personal data such as collection, recording, organization, structuring, storage, consultation, use, dissemination, or destruction, among others. (GDPR, Art. 4(2)). Examples provided by the European Commission include staff management and payroll administration; access to or consultation of a contacts database containing personal data; sending promotional emails; shredding documents containing personal data; posting or putting a photo of a person on a website; or storing IP addresses or MAC addresses. One of the reasons why an EU law might affect businesses and organizations in the U.S. is the broad territorial scope of the GDPR. Its rules apply not only to businesses that have an establishment in the EU, but to all businesses, regardless of location, that offer goods and services to consumers located in the EU or that monitor the behavior of EU consumers. Monitoring behavior means tracking an EU resident on the internet as well as the potential subsequent use of personal data processing techniques to profile that person to analyze or predict her or his personal preferences, behaviors, and attitudes. Rights and Principles Individuals are guaranteed certain rights with regard to their personal data, such as receiving information in clear and plain language on what personal data is stored, why, and how long; the right to access data; the right to object to the processing; the right to correct incorrect data; the right to have data deleted (“right to be forgotten“); the right to move personal data to a different company (data portability); and the right to have a decision based solely on automated processing (an algorithm) be made or reviewed by a natural person instead of a computer, for example the refusal of an online credit application. Controllers processing personal data must ensure that the processing complies with the principles set out in the GDPR, in particular lawfulness, meaning there needs to be a proper legal basis for the processing. “Controllers” of personal data include search engines and social networking services. Most of the time, data is processed because of consent given by the individual. The notion of consent is given a prominent place in the GDPR. Consent is only valid if it is freely given, specific, informed, and an unambiguous indication of a person’s agreement to the processing by means of a statement or clear affirmative action. (GDPR, Art. 4(11)). That means that silence, pre-ticked boxes (checked by default), or inactivity do no constitute valid consent. Furthermore, withdrawing consent needs to be as easy as giving consent. Businesses are obligated to notify the national data protection authorities of a data breach without undue delay and additionally notify the individual if there is a high risk that rights and freedoms are violated. Failure to notify such a breach may result in fines, in addition to or instead of other corrective measures such as a warning, reprimand, or the suspension of the processing of personal data. Certain breaches may result in fines of up to €20 million (about US$23.5 million) or 4% of a company’s global turnover. However, the GDPR only sets the maximum amount for a fine. It is up to the national data protection authorities to determine an effective, proportionate, and dissuasive sanction which should be equivalent across the EU. Transfer of Personal Data Outside the EU Why else should anyone in the U.S. care about the GDPR? The GDPR contains rules about the transfer of personal data to countries outside of the EU. Such a transfer is only possible if the European Commission determines that the foreign country offers an “adequate level” of data protection. In general, the U.S. data protection rules only fulfill these requirements if the data is transferred within the framework of the EU-U.S. Privacy Shield, an approved data transfer mechanism. Companies that are not self-certified to the Privacy Shield principles can instead use approved standard contractual clauses or adhere to approved binding corporate rules to transfer personal data outside of the EU. In order to enforce the data protection rules of the GDPR internationally, the GDPR obligates the EU Commission and the national supervisory authorities to develop international cooperation mechanisms, provide international mutual legal assistance, engage relevant stakeholders, and promote the exchange and documentation of personal data legislation. (GDPR, Art. 50). This blog post is intended to provide a brief overview of the GDPR and why it may affect a company or an organization in the U.S. If you would like to find out more about the GDPR and data protection in the EU as well as in the EU Member States France, Germany, Italy, the Netherlands, Portugal, Spain, Sweden, and the United Kingdom, and how it compares to the data protection laws in Australia, Canada, Israel, and Japan, I suggest consulting the recently published Law Library of Congress report Online Privacy Law (2017 Update). The report updates two earlier reports from 2012 that reviewed the right to personal data protection and the right to privacy on the web in the EU and in selected countries.
<urn:uuid:efaeca84-9346-4404-91e1-3c78282c89ac>
CC-MAIN-2020-40
https://blogs.loc.gov/law/2018/05/personal-data-protection-and-the-eu-gdpr/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401601278.97/warc/CC-MAIN-20200928135709-20200928165709-00282.warc.gz
en
0.910807
1,368
3.171875
3
Calculate CGPA or Percentage as per your choice CGPA is referred to as a cumulative grade point average. It was introduced in the CCE or Continuous and Comprehensive Evaluation System for Class X. CGPA gives the average grade point of the student performance in all the subjects excluding the additional Subject. The subject wise performance of the students is recorded in forms of Grades. Before 2011, the Central Board of Secondary Education had criteria for rewarding marks. In 2011, it replaced the criteria to the CGPA system. The CGPA is used to denote the overall performance of the student in the academic session as grades. The CGPA system was introduced to ease the burden of marks and the stress of the examinations among students. Due to this reason, the CGPA system is also used in some of the bachelor's and Master's Degree. The CGPA system defines the grades of a student in its academics. Although, it has some pros and cons. GPA is grade point average which signifies the grades obtained by the student in the semester or term. CGPA is different from GPA as CGPA is the grades obtained by the student over the course or an entire year. Though GPA and CGPA both evaluate the measure of abilities of a student, CBSE has the curriculum which determines the CGPA only but not the GPA. While the colleges which use the CGPA system calculate the GPA of the students too. Different colleges have different criteria for giving GPA to the students. The basic feature of the GPA and CGPA remains the same that GPA is for Grades obtained over a term and CGPA is Grades obtained over the course or whole year. It can't be concluded that one of the systems is good or bad, but some facts can be taken into consideration. Both the systems have its pros and cons. The Central Board of Secondary Education has a curriculum where 5 subjects are compulsary and one is optional. • TO CALCULATE AVERAGE CGPA Assume the grade points of the 5 subjects as: Subject 1 Grades= 10 Subject 2 Grades=9 Subject 3 Grades=10 Subject 4 Grades=8 Subject 5 Grades=10 • TO CALCULATE PERCENTAGE USING CGPA OBTAINED • TO CALCULATE CGPA USING THE PERCENTAGE |91 to 100||A1||10| |81 to 90||A2||9| |71 to 80||B1||8| |61 to 70||B2||7| |51 to 60||C1||6| |41 to 50||C2||5| |33 to 40||D||4| |21 to 32||E1||0| |00 to 20||E2||0| There are several grading systems used around the world which are similar to the CGPA system used by the CBSE.
<urn:uuid:7b563ede-1520-4a7e-9a69-eefecbe4e3e7>
CC-MAIN-2021-21
https://uniformapp.in/cgpaconverter.php
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988796.88/warc/CC-MAIN-20210507150814-20210507180814-00028.warc.gz
en
0.922629
603
3.484375
3
Today we were delighted to learn about and take part in a traditional English folk dance, known as Morris Dancing. Historically, people living on farms were very aware of the inconsistency of farming and how some years crops may be very prosperous and other years, they may not be so fortunate. Therefore, Morris Dancers created a ritual dance that they believed could magically impact a successful crop season! Certain dance movements were used to send away any bad spirits who could would ruin the crops - using bells and hankes. They would also jump high to encourage the crops to grow up and strong. The Morris Dances would typically have different dancers for certain seasons but it traditionally began on May Day (the first day of May) - Vancouver's first day of summer in the agricultural world. Different dances for different times of the year but traditionally it would start on May Days for the summer. Morris dancers on May 1st get up before dawn and perform these ritual dances to ensure that the sun comes up for the next year and to celebrate the beginning of summer. We also learned about Mummers plays, which were practiced in countries like England and Ireland, and even Canada - specifically Newfoundland. Around holidays like Christmas and Easter, people would get dressed up in costume and disguise and surprise people in their homes with a play - involving morris dances and songs that everyone knew already. We learned that in Vancouver you can see a comical play similar to the traditional mummers plays. After we learned about the history of Morris Dances, we were fortunate enough to have Morris Dancers come to the Orchard Garden and teach us a couple dances. To end the day we got to weave ribbon together by weaving in and around each other. I couldn't help but think how great this activity would be for a community building lesson in the schools - insinuating a close knit community within the classroom.
<urn:uuid:99118b57-e9ab-459e-ab23-8de6799b29ec>
CC-MAIN-2018-34
http://theorchardgarden.blogspot.com/2018/04/morris-dancing-cfe-day-4-written-by-anh.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209884.38/warc/CC-MAIN-20180815043905-20180815063905-00150.warc.gz
en
0.978924
379
3.34375
3
When your computer hurts your vision With constant VDU work, your eyes suffer from lack of movement. Experts advise preventive measures so that they don’t become diseased. Constant, focused staring at a monitor. Made worse with the dry air in an air conditioned office. These are particularly bad conditions for your eyes. Your eyes are designed to look around, focus on near and distant objects, and to compensate for different light conditions. With VDU work, your eyes suffer from lack of movement And there’s another problem. When you stare at a monitor, your brain forgets to make your eyes blink, which normally moistens your eyeball and clears it of tiny dust particles. Office eye syndrome is very common All in all, these conditions can trigger what is known as office eye syndrome. Your eyes feel tired, are red and burn. Many sufferers constantly feel that there is a foreign object in their eye, and their dry eyes react to this with excess tears and by oozing sticky secretions. The irritated eye is more prone to inflammation. The German Ophthalmologist Association warns against ignoring the symptoms. Dry eyes are a serious illness. More than 15 percent of the population are affected by the syndrome, which is classified as a widespread disease. Relaxation for the eyes—what to do As a precaution, experts urgently recommend that you take regular breaks from computer work—ideally at an open window, to let fresh air blow through your eyes while you stare into the distance. Humidity and lighting conditions in the office also make a difference. Humidifiers and regular airing are advisable, as well as a mixture of ceiling and desk lighting. Light reflections in the screen must be prevented. In rooms with windows, desks should be at right angles to the windows. Further recommendations: Use large monitors that should be placed at a distance of 50 to 80 cm from your eyes. If the symptoms of office eye syndrome are already present, see an ophthalmologist. Often, the use of ocular lubricant is enough, but it is important to find out whether you have an eye inflammation that requires treatment.
<urn:uuid:f6bbac73-5740-4226-9517-e2bc4f653075>
CC-MAIN-2019-18
https://productronica.com/trade-fair/information/newsletter/business-life/when-your-computer-hurts-your-vision.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578596571.63/warc/CC-MAIN-20190423094921-20190423120921-00269.warc.gz
en
0.956693
438
3.0625
3
Training implies enhancing the skills and knowledge of the employees for performing a specific job. Training tries to improve employees’ performance in current job and prepares them for future job. The crucial consequence of training is learning. Objectives of Employee Training Programmes To prepare employees to meet the varying and challenging needs of the job and organization To provide knowledge and skills to new entrants and to help them to perform their role and job well. To coach employees for more complex and higher level jobs. To educate employees new and innovative ways and techniques of performing job. Benefits of Trained Employees Training is a significant tool for employee development. Training has assumed great importance because of exceptional rate of change in the internal and external organizational environment. The importance/benefits of trained personnel towards organizational development are as follows- Trained employees do not require tight control and supervision as they are well aware of how to perform a job. Trained employees can show higher performance by making optimum and best utilization of the materials, tools, equipments and other resources provided to them. Trained employees minimize wastages of resources in the organization and work both efficiently and effectively. Training makes employees more committed to an organization as the employees are provided with growth, advancement and learning opportunities. Training develops a line of proficient and skilled managers as it prepares employees for complex and higher level tasks. Trained employees adjust to the job better and there are fewer rates of absenteeism and turnover. Trained employees produce quality and quantity output. Trained employees enable the organization to face competition from rival firms. Trained employees can respond and adapt to the changing technology well. Trained employees become more proficient and, thus, their earning potential increase. Steps in Employee Training Programme Training programme involves the following steps: Identifying the training needs- The training needs of each employee should be identified. Programmes should be developed that are best suited to their needs. Prepare the trainer- The trainer must do his home work well. He should know both what to teach and how to teach. Time management is required by the trainer. Training should be delivered in such a manner that the trainee should not loose the interest in the job. Prepare the trainee- The trainee should remain active during training. He should know that why is he being trained. He should put across the trainer questions and doubts. The trainee should be put at ease during the training programme. Explain and demonstrate the operations- The trainer should explain the logical sequence of the job. The trainee should perform the job systematically and explain the complete job he is performing. His mistakes should be rectified and the complex step should be done for him once. When the trainee demonstrates that he can do the job in right manner, he is left to himself. Through repetitive practices, the trainee acquires more skill. Follow up and feedback- The trainee should be given feedback on how well he performed the job. He should be asked to give a feedback on the effectiveness of training programme.
<urn:uuid:acc373d7-f7ac-4268-89dc-3d60952f0833>
CC-MAIN-2020-34
https://forum.daffodilvarsity.edu.bd/index.php/topic,7448.0.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736902.24/warc/CC-MAIN-20200806091418-20200806121418-00135.warc.gz
en
0.954248
625
2.890625
3
|What is microcredit? by Muhammad Yunus| The word "microcredit" did not exist before the seventies. Now it has become a buzz-word among the development practitioners. In the process, the word has been imputed to mean everything to everybody. No one now gets shocked if somebody uses the term "microcredit" to mean agricultural credit, or rural credit, or cooperative credit, or consumer credit, credit from the savings and loan associations, or from credit unions, or from money lenders. When someone claims microcredit has a thousand year history, or a hundred year history, nobody finds it as an exciting piece of historical information. I think this is creating a lot of misunderstanding and confusion in the discussion about microcredit. We really don't know who is talking about what. I am proposing that we put labels to various types of microcredit so that we can clarify at the beginning of our discussion which microcredit we are talking about. This is very important for arriving at clear conclusions, formulating right policies, designing appropriate institutions and methodologies. Instead of just saying "microcredit" we should specify which category of microcredit. Let me suggest a broad classification of microcredit : A) Traditional informal microcredit (such as, moneylender's credit, pawn shops, loans from friends and relatives, consumer credit in informal market, etc.) B) Microcredit based on traditional informal groups (such as tontin, susu, ROSCA, etc.) C) Activity-based microcredit through conventional or specialised banks (such as, agricultural credit, livestock credit, fisheries credit, handloom credit, etc.) D) Rural credit through specialised banks. E) Cooperative microcredit (cooperative credit, credit union, savings and loan associations, savings banks, etc.) F) Consumer microcredit. G) Bank-NGO partnership based microcredit. H) Grameen type microcredit or Grameencredit. I) Other types of NGO microcredit. J) Other types of non-NGO non-collateralized microcredit. Whenever I use the word "microcredit" I actually have in mind Grameen type microcredit or Grameencredit. But if the person I am talking to understands it as some other category of microcredit my arguments will not make any sense to him. Let me list below the distinguishing features of Grameencredit. This is an exhaustive list of such features. Not every Grameen type programme has all these features present in the programme. Some programmes are strong in some of the features, while others are strong in some other features. But on the whole they display a general convergence to some basic features on the basis of which they introduce themselves as Grameen replication programmes or Grameen type programmes. General features of Grameencredit are : a) It promotes credit as a human right. b) Its mission is to help the poor families to help themselves to overcome poverty. It is targeted to the poor, particularly poor women. c) Most distinctive feature of Grameencredit is that it is not based on any collateral or legally enforceable contracts. It is based on "trust", not on legal procedures and system. d) It is offered for creating self-employment for income-generating activities and housing for the poor, as opposed to consumption. e) It was initiated as a challenge to the conventional banking which rejected the poor by classifying them to be "not creditworthy". As a result it rejected the basic methodology of the conventional banking and created its own methodology. f) It provides service at the door-step of the poor based on the principle that the people should not go to the bank, bank should go to the people. g) In order to obtain loans a borrower must join a group of borrowers. h) Loans can be received in a continuous sequence. New loan becomes available to a borrower if her previous loan is repaid. i) All loans are to be paid back in instalments (weekly, or bi-weekly). j) Simultaneously more than one loan can be received by a borrower. k) It comes with both obligatory and voluntary savings programmes for the borrowers. l) Generally these loans are given through non-profit organizations or through institutions owned primarily by the borrowers. If it is done through for-profit institutions not owned by the borrowers, efforts are made to keep the interest rate at a level which is close to a level commensurate with sustainability of the programme rather than bringing attractive return for the investors. Grameencredit's thumb-rule is to keep the interest rate as close to the market rate, prevailing in the commercial banking sector, as possible, without sacrificing sustain-ability. In fixing the interest rate market interest rate is taken as the reference rate, rather than the moneylenders' rate. Reaching the poor is its non-negotiable mission. Reaching sustainability is a directional goal. It must reach sustainability as soon as possible, so that it can expand its outreach without fund constraints. m) Grameencredit gives high priority on building social capital. It is promoted through formation of groups and centres, developing leadership quality through annual election of group and centre leaders, electing board members when the institution is owned by the borrowers. To develop a social agenda owned by the borrowers, something similar to the "sixteen decisions", it undertakes a process of intensive discussion among the borrowers, and encourage them to take these decisions seriously and implement them. It gives special emphasis on the formation of human capital and concern for protecting environment. It monitors children's education, provides scholarships and student loans for higher education. For formation of human capital it makes efforts to bring technology, like mobile phones, solar power, and promote mechanical power to replace manual power. Grameencredit is based on the premise that the poor have skills which remain unutilised or under-utilised. It is definitely not the lack of skills which make poor people poor. Grameen believes that the poverty is not created by the poor, it is created by the institutions and policies which surround them. In order to eliminate poverty all we need to do is to make appropriate changes in the institutions and policies, and/or create new ones. Grameen believes that charity is not an answer to poverty. It only helps poverty to continue. It creates dependency and takes away individual's initiative to break through the wall of poverty. Unleashing of energy and creativity in each human being is the answer to poverty. Grameen brought credit to the poor, women, the illiterate, the people who pleaded that they did not know how to invest money and earn an income. Grameen created a methodology and an institution around the financial needs of the poor, and created access to credit on reasonable term enabling the poor to build on their existing skill to earn a better income in each cycle of loans. Text from www.grameen-info.org
<urn:uuid:f4e1bf6e-145c-46ec-bdd5-988206d9853c>
CC-MAIN-2019-43
https://www.microsfere.org/microcr-dit/quest-ce-que-le-microcr-dit-par-muhammad-yunus.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986677964.40/warc/CC-MAIN-20191018055014-20191018082514-00283.warc.gz
en
0.950582
1,435
2.625
3
Vitamin E belongs to the group of fat-soluble vitamins, which means that it is processed by the body only in combination with fat. Above all, vitamin E is good for skin, hair and the mucous membranes. But it is also involved in building the muscles, the connective tissue and the blood vessels. The body requires vitamin E to develop an intact immune system. Vitamin E protects cell walls against aggressive oxygen compounds by catching and neutralising so-called free radicals. Vitamin E protects the cells Why is vitamin E so important? Good suppliers of vitamin E Vegetable crop products that are also rich in fat are mostly good sources of vitamin E. Wheat germ, safflower and sunflower oils, almonds and nuts are among the best sources of vitamin E. Wholemeal products also contain small amounts of vitamin E. Dry, wrinkly skin is normally the first sign of a vitamin E deficiency, and at the same time you feel tired and tetchy. The metabolism of the muscles does not fully work, and the formation of red blood cells might also be reduced.
<urn:uuid:31fe9165-0694-46d3-952a-6344688df4a8>
CC-MAIN-2019-09
https://www.hipp.hk/index.php?id=17507
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247505838.65/warc/CC-MAIN-20190221152543-20190221174543-00349.warc.gz
en
0.934164
225
3.328125
3
It has become clear to many within the communications industry that wireless technology is the next frontier for IP telephony and VoIP. Wireless VoIP refers to VoIP running over a wireless LAN. These are usually compliant with the 802.11 standard. Provided that callers are within range of a WLAN access point and are using a VoIP compatible handset, they will be able to make and receive calls via the wireless network. This technology has been gaining acceptance of late in vertical industries such as retail and healthcare. However, four different factors have slowed the adoption of wireless VoIP . One is the fact that the 802.11 standard poses scalability challenges for enterprise-class VoIP deployments. Secondly, wireless networks have often lacked quality of service . Third, it can be time-consuming and expensive to implement and maintain a wireless VoIP solution. And finally, in order to operate in a seamless manner, wireless VoIP requires fast roaming As the wireless VoIP trend grows, security issues also need to be addressed. There are obvious risks, such as eavesdropping and spam. The primary concern here is the need to adequately secure the wireless portion of the network. Wireless VoIP communications that are insecure can be intercepted by unauthorized third parties. Brian Solomon is a Web Editor for TMCnet, covering news in the IP communications, call center and customer relationship management industries. To see more of his articles, please visit Brian Solomon’s columnist page. Don't forget to check out TMCnet’s White Paper Library, which provides a selection of in-depth information on relevant topics affecting the IP Communications industry. The library offers white papers, case studies and other documents which are free to registered users.
<urn:uuid:120dafda-fcd7-4e52-a14d-6617f7aecafe>
CC-MAIN-2017-09
http://www.tmcnet.com/channels/small-business-voip/articles/13096-lowdown-wireless-voip.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170992.17/warc/CC-MAIN-20170219104610-00521-ip-10-171-10-108.ec2.internal.warc.gz
en
0.945831
352
2.65625
3
Fragmentation of care can lead to poor treatment adherence in patients with chronic medical conditions which can, in turn, lead to adverse health consequences, poor quality of life, and patient dissatisfaction. Poor treatment adherence may be due to lack of sufficient patient education, time delays in delivery of care, lack of adequate healthcare coordination, or difficulty accessing various healthcare providers across a front desk which serves as a "healthcare bottle-neck". Better efficiency in healthcare delivery, with greater connectivity through knowledgeable and trained peer volunteers and inexpensive cell-phones integrated by a smart telephone exchange may alleviate some of the care and communication burden faced by the healthcare system. Specifically, such community health education volunteers ("peer-buddies") who are experienced in managing their disease condition may be able to impart knowledge and confidence to a recently diagnosed patient in a much more personalized manner than that of a group therapy session. An additional important advantage is the peer-buddy's ability to relate to the patient in a manner consistent with their social, ethnic, and cultural believes without language barriers or differences that may stem from socioeconomic strata. We will use sleep apnea as an example condition to test the effect of a peer-buddy helper (combined with the universal availability of personal cell phones) on the problem of poor care coordination and treatment adherence to the "CPAP" treatment for sleep apnea. Sleep apnea is a very common condition that affects 7-12% of the US population, and if left untreated, can lead to poor health and even death through its effects on high blood pressure, heart disease, stroke, and motor vehicle accidents. Fortunately, CPAP therapy can lead to a 3-fold reduction in such consequences, but patient adherence to such CPAP treatment is generally poor. We have recently completed a small study that demonstrated improved usage of CPAP treatment by patients receiving help from a peer-buddy with excellent results. We propose to further enhance the "peer-buddy" community-volunteer concept in our proposed research by combining this with cell-phone technology and a telephone exchange that improves access to healthcare providers, technicians, and home care companies. We hope to show that active community participation by experienced "lay individuals" assisted by the universal availability of cheap cell-phones can improve the reach and effectiveness of our healthcare system in improving the health and well-being of our patients. If successful, such an innovative and community-based approach can be applied to other chronic medical conditions. University of Arizona
<urn:uuid:c685c794-35de-42e7-9e3c-0f3d3664e041>
CC-MAIN-2023-06
https://airways.uahs.arizona.edu/research/trials/peer-driven-intervention-sleep-apnea-pcori
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499888.62/warc/CC-MAIN-20230131154832-20230131184832-00831.warc.gz
en
0.948899
517
2.859375
3
Health and Illness as Bases for Understanding Curriculum Embodiment This is an advance summary of a forthcoming article in the Oxford Research Encyclopedia of Education. Please check back later for the full article. Curriculum means complex relations between teachers and students. Discourse on health and illness involves these relations. Health and illness are phenomenological states of being that can be fragile. Health might mean longevity, while illness could mean finality. It is not so clear, though, where health slips into illness. Illness can return in a circular fashion. So the line between health and illness is not entirely clear. When illness strikes, people’s narratives get interrupted; these narratives embody our identities. Narratives are stories that we tell ourselves. Narratives such as autobiography and biography have a long history in curriculum studies. In this field, autobiographies and biographies of teachers have historically been about happy occasions, occasions of triumph, and happy endings. Narratives of critical illness—which few curriculum scholars have dealt with—are without happy endings. Critical illness narratives concern grief, loss, and unhappy endings. Grief, bereavement, and melancholy have no timeline, no frame of reference, and sometimes no ending at all. Curriculum scholars have written about melancholy in mental illness but have not written much about it in the face of physical illness. During times of illness, some turn to the spiritual, some turn away. The spiritual can be put to use either to better understand endings or to avoid endings and deny what is happening. For some, avoidance helps the journey along. For others, facing head-on the catastrophe at hand becomes necessary. For those who slip from health into illness, radical Otherness is at hand. Being very sick isolates. Alterity, then, is key when thinking about such experiences. A phenomenology of alterity is key when thinking about health and illness. Chronic illness differs from a sudden onset of illness. People can be relatively healthy and yet suffer from chronic illness. People can be, on the other hand, very sick with chronic illness for many years. Some chronic illnesses are invisible. Grief over invisible illnesses tends not to be taken seriously by others because the illness is not visible. On the other hand, if there are physical symptoms that others can see, grief over that illness tends to be taken more seriously by others than illnesses which are invisible. Curriculum, or lived experience, is about health and illness because this is life’s trajectory. One cannot become educated in a disembodied way. Education happens in bodies that exist on a continuum between health and illness.
<urn:uuid:56ea6a2c-9728-45cb-ba73-13871e288a59>
CC-MAIN-2019-43
https://oxfordre.com/education/abstract/10.1093/acrefore/9780190264093.001.0001/acrefore-9780190264093-e-1115?rskey=5UAxSd&result=116
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986664662.15/warc/CC-MAIN-20191016041344-20191016064844-00262.warc.gz
en
0.957383
535
2.671875
3
A daggerboard is a retractable centreboard used by various sailing craft. While other types of centreboard may pivot to retract, a daggerboard slides in a casing. The shape of the daggerboard converts the forward motion into a windward lift, countering the leeward push of the sail. The theoretical centre of lateral resistance is on the trailing edge of the daggerboard. Daggerboards are often long and thin, thus providing a better lift-to-drag ratio. Daggerboards are usually found in small craft such as day sailers, where their size is easily handled by a single person. Daggerboards are not usually ballasted, but are locked in place by a clip. They are raised vertically unlike a centreboard which can be set at different angles to the hull of the boat. When a daggerboard is extended through the keel, it improves a ship's stability. Daggerboards can be raised when the a ship enters a shallow harbor, allowing the boat (for example) to load and unload cargo in locations that would not otherwise be accessible to larger ships. One problem with such boats is that if one were to hit shore, it would be quite easily damaged. Boats with daggerboards In 2008, a 55-foot-long (17 m) daggerboard ship was found in Lake Ontario, using deep scan sonar equipment off the lake's southern shore, the only one known to have been found in the Great Lakes. Vessels of this type were used for a short time in the early 19th century. According to one source there are only four non-custom manufacturers of catamarans which use daggerboards: Catana, Outremer, Sud Composites, and Dolphin. One reason might be its construction cost, estimated to be about $30,000 for a 45-foot (14 m) catamaran. - "Upstate NY explorers ID rare boat in Lake Ontario". Associated Press. December 13, 2008. - "Daggerboards vs. Keels". |Wikimedia Commons has media related to Daggerboards.| |Look up daggerboard in Wiktionary, the free dictionary.|
<urn:uuid:11bc04ee-7246-4e91-9fc4-8963e2931e02>
CC-MAIN-2014-42
http://en.wikipedia.org/wiki/Daggerboard
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507446525.24/warc/CC-MAIN-20141017005726-00336-ip-10-16-133-185.ec2.internal.warc.gz
en
0.934128
442
3.125
3
By Josie Borlongan, Garden Guides Contributor About Animal Trapping Animal trapping is a method by which animals are caught with the use of traps and baits. Animals are being trapped for sports, food and pest control. The most common reason is the latter, due to the nuisance and diseases some stray animals can cause if not controlled. Furthermore, pests could damage a garden or farm, which can cost a lot of money to repair, not to mention the loss of livelihood for farmers. Animal trapping should only be done as a last recourse if repelling, fencing and scaring them away do not work. Also choose the humane types of trapping if you ever resort to this type of pest control. Prevention and Control Live trapping is a humane way of trapping animals. The trap itself doesn't harm the animals, and once caught, the animals are released far away. The problem with this trapping is that at times, when animals are released away from their natural habitat, they become disoriented and are unable to cope in their new environment, causing them to die due to starvation. It is best to call the Humane Society or local state officer to let them know you have a trapped animal and to ask if they can handle its release. These organizations would know what's best for these animals. Better yet, prior to setting animal traps, check with these organizations regarding the laws in your state. Some animal species are protected from trapping by law in various states. Exercise caution when handling animals that had been trapped. Wild animals may have rabies and can carry diseases that would affect humans and domesticated animals and livestock. Furthermore, there are self defenses that some animals do when frightened, like a skunk spraying or a woodchuck nipping. Methods for Trapping Specific Animals Oftentimes, stray cats can pose a nuisance. Using fish, meat or cat food as bait can be very effective. * Chipmunks and squirrels Use metal traps; chipmunk and squirrel have sharp teeth that can bite or chew wood. Add bait to your animal trap; use nuts, peanut butter or seeds. Place your animal trapping close to a water source, such as a bird feeder, or close to the path they normally use, such as tree branches. Check the animal trap a few times a day. Stray dogs can be trapped using a trap baited with dog food, meat or bones. Foxes can be trapped with baits of chicken entrails, prepared scented bait or mice. * Gophers and moles Animal trapping with bait can be used, but is not as effective as using lethal traps. It is best to trap these gophers and moles during the spring or fall when they are highly active. Adding bait is not necessary in lethal traps. If you prefer to use a more humane way of controlling these animals, pouring gasoline and kerosene through the holes is known to be effective. The animals hate the smell and would not go through that hole again. Unfortunately, the gophers or moles will just dig new holes, so having kerosene or gasoline handy can be a temporary way to keep them away until you block the other holes. * Martins and minks Use chicken entrails, fish, liver, vegetables, apples or crisp bacon as bait. Use apples, carrots or parsnips as bait. Use apples, salt or carrots as baits. Watch out for the sharp needles this animal uses for self-defense. Rabbits are known to invade vegetable gardens. If fences and nettings do not work, you can add a trap with fresh vegetables like Brussels sprouts, cabbage, carrots, lettuce, apples and bread as bait. * Raccoons and opossums You would need bigger traps for these animals. Use sardines, cat food or any food that emits a strong smell as bait. Place the bait at the back of the trap so that these animals would not be able to turn around easily to escape. Place the trap close to a food source, such as your shed where you store your garden picks or close to an open garbage cans which they are known to frequent in search of food. Make sure to use caution when you release these animals for they are known to attack human beings. Use mouse traps with peanut butter, cheese, grain or meat as bait. Skunks love the smell of fish, so using fresh fish as bait is very effective. You can also use an opened can of sardines or seafood-flavored cat foot as an alternative for fresh fish. To protect from the skunk's spray, cover your trap. If for some reason you get sprayed, take a shower immediately, wash your self thoroughly and wash your clothes as well. To help remove odor, you can use vinegar, hydrogen peroxide, orange-peel extracts or even tomato juice. Be careful when you release this animal, for it may spray again. At this point, it may just be best to call the animal control people to take care of the release of the animal. Use fish, fresh liver or chicken entrails as baits. For bait, use garden crops such as lettuce, carrots, beans and apples. The best place to place the trap is right at the entrance of their burrow. Trap only during summer; avoid spring for a burrow full of young woodchucks will be orphaned too soon. Avoid fall as well since they are about to hibernate. Use caution in trapping woodchucks for they can be very aggressive and can bite. Animals being trapped in this segment are known to invade different crops in the garden or farm as well as livestock. Damage caused by these animals to garden crops and livestock can be very costly.
<urn:uuid:36a2ded1-342f-4dec-a1b7-d24cd84ba5b2>
CC-MAIN-2017-04
http://www.gardenguides.com/749-safely-trap-animal-pest-pest-control.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00369-ip-10-171-10-70.ec2.internal.warc.gz
en
0.945245
1,184
3.234375
3
The Classroom "is a living place, full of children in search of themselves and their world." -Dr. Maria Montessori The Classroom environment is critical to fostering the independence found in the Montessori learning experience. The 'prepared environment' is specifically created to inspire each child to realize his or her own academic, personal, and social potential. "Never give more to the mind than to the hand." states Dr. Montessori. Children in this age range learn in a sensorial manner. Concrete materials, therefore, are provided so that the child may explore the world in a hands-on, purposeful fashion. The children formulate a connection between manipulation of material and the learning experience. Proper preparation of the classroom environment is crucial to fostering the independence found in the Montessori experience. The prepared environment is specifically created to inspire each child to realize their own academic, personal, and social potential. Furnishings, tools, and materials are proportioned for the child's successful use, and materials are located neatly on shelves at the child's height. The Work Period The work period is a time of purposeful work and concentration. During this time, children work individually, in pairs, or in small groups. Children are free to choose from any material in the classroom. The teachers observe as the children work, intervening only as necessary to help problem-solve, or to provide lessons on materials. Lessons may be 1-on-1, or in small groups. Children share experiences, talk about the day, sing songs, participate in music & movement activities, and listen to stories. Daily lessons related to curriculum or Montessori materials are presented to the group. Children are involved in gross motor activities, using tricycles, swings, slides, etc. They may participate in organized group games, or develop social and collaborative skills by playing in small groups. According to the season, various art projects, water play, sandbox, and gardening are available.
<urn:uuid:de7fb722-4754-4012-b642-d8eaff18a188>
CC-MAIN-2019-04
http://www.rocklinmontessori.com/our-montessori-classroom/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583656897.10/warc/CC-MAIN-20190116052151-20190116074151-00560.warc.gz
en
0.940577
407
3.9375
4
A giant sun eruption was captured on video by NASA, showing the sheer size and raw power of the star at the center of our solar system. As Space.com noted, the giant sun eruption was seen on Friday as an explosion of super-hot plasma came in back-to-back solar storms. Known officially as a solar prominence, the giant sun eruption was seen at 1 am EST, followed by a second event four hours later. The eruptions were so large that they were caught by NASA’s Solar Dynamics Observatory. The video shows a giant loop of red plasma erupting from the sun, blasting away from the sun so far that it shoots out of frame. “The red-glowing looped material is plasma, a hot gas made of electrically charged hydrogen and helium,” officials with NASA’s Goddard Space Flight Center, which oversees the SDO mission, explained in a description. “The prominence plasma flows along a tangled and twisted structure of magnetic fields generated by the sun’s internal dynamo. An erupting prominence occurs when such a structure becomes unstable and bursts outward, releasing the plasma.” NASA has also captured past solar explosions. At the end of August, a filament of solar material exploded out of the sun at 900 miles per second, with the Solar Dynamics Observatory again catching the sun eruption on camera. The giant sun eruptions also created some amazing sights for people at high latitudes, creating bright and colorful Northern Lights displays. While solar flares have the potential to disrupt satellites and electrical systems on Earth, the giant sun eruption captured by NASA was aimed away from Earth and shouldn’t cause any problems, Red Orbit reported.
<urn:uuid:d39f0ad3-8d99-4474-8479-ee1f62bd44ee>
CC-MAIN-2015-27
http://www.inquisitr.com/402949/giant-sun-eruption-caught-on-video-by-nasa/
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095423.29/warc/CC-MAIN-20150627031815-00124-ip-10-179-60-89.ec2.internal.warc.gz
en
0.942967
347
3.28125
3
For a variety of reasons, some people feel strongly about refusing blood transfusions and blood products. Bloodless medicine is an emerging medical practice that seeks to provide full medical care, including surgery, for these patients without the use of transfusions. There are many legitimate reasons why a patient might wish to refuse blood products. Perhaps the most well known are the religious beliefs of certain groups, especially Jehovah’s Witnesses. But religious beliefs are not the only reason someone might choose bloodless medicine. Some of these reasons include: - Ethical decisions about the limited supply of blood available - Patients with rare blood types may not have access to donor blood - Fear of receiving the wrong blood type, which can cause a significant allergic reaction - Concerns about infectious diseases that could possibly infect the blood supply, such as HIV, Hepatitis B, Epstein-Barr, or Mad Cow Disease When it comes to surgery, bloodless medicine succeeds by increasing the amount of red blood cells a patient produces before surgery, replacing any lost blood with fluids, carefully managing the patient’s health during surgery, and meticulously controlling blood loss so that as little bleeding as possible occurs. Preparation begins by increasing the number of red blood cells the patient produces, so that any loss during surgery will not be as harmful. Patients may be instructed to eat iron-rich foods, given iron supplements, or given medications to increase their hemoglobin. The least invasive surgical procedures available will be chosen, as they require tiny incisions. During surgery, patients are often positioned on a slope with their head lowered, to protect their brain from any blood loss. Their blood pressure may be lowered and their body temperature raised to reduce bleeding. They may be given 100% oxygen to help a reduced number of red blood cells carry sufficient oxygen to their body. Modern surgical tools are used that cauterize any broken blood vessels as soon as they are cut, in order to minimize blood loss. Sometimes, a technique known as hemodilution is used. A portion of blood is removed from the patient at the beginning of surgery and replaced with fluids, diluting the blood circulating within the body. If bleeding occurs during surgery, the blood lost is this dilute blood, and not as critical. After surgery, the pure blood is replaced. In some cases blood that is lost during surgery can also be collected, cleaned, and returned to the patient. Not all surgeries can be performed bloodless, but most can, including: - Open heart surgery - Liver transplants - Urinary tract surgery - Hip and knee replacements - Brain surgery Despite all the precautions taken, during any surgery there is the possibility of unexpected hemorrhage. A hemorrhage, or severe episode of bleeding, can be life threatening without the help of transfused blood. Before any surgical procedure, it is important to make a plan with your physicians about what steps you would like them to take, or not take, in case the unexpected happens.
<urn:uuid:e1aa736e-edb8-42be-9893-d7b05fee1201>
CC-MAIN-2017-30
https://www.docspot.com/d/TX/cypress/specialty-interest/bloodless-medicine-transfusion-free-surgery/humana-silver.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423901.32/warc/CC-MAIN-20170722042522-20170722062522-00609.warc.gz
en
0.947214
609
3.140625
3
There are five factors that need to be considered when assessing floor safety: 4. Slip resistance 5. Cleaning and maintenance When assessing how safe a floor is, it is important to know that these factors are all interrelated, and if one or two of the factors are not properly addressed—for instance, the floor is not appropriately cleaned and maintained to address the type of soiling it receives—an accident may occur. However, it can be assumed that as more factors are not addressed, the likelihood of a slip-and-fall accident is increased. Consider floor activity Let’s assume we have two different floors. One is a walkway in a medical building that serves about 100 people a day. The other is a walkway in a train station that serves about 2,000 people a day. In the medical building, people typically walk slowly and many are wearing sports shoes or footwear with a fairly solid grip. Typically, they continue down the walkway on a steady path and turn only when they reach their destination or to turn into another hallway. However, in the train station, most walkers are going to work in a rush—many are even running—and most wear dress shoes that have little or no traction. Further, they may have to start and stop, depending on traffic, and make sudden turns in order to avoid running into someone. In these scenarios, it becomes fairly clear that the slip resistance needs of the medical building are considerably less than those of the train station floor. The train station floor will require the use of a floor finish with greater slip resistance (referred to as coefficient of friction). Further, as mentioned previously, because these factors are interrelated, concerns about the soiling on the train station floor, how it is cleaned and maintained, as well as the durability of the floor finish would also be key factors that must be considered. We can assume that if grease, oil, and moisture are commonly walked onto a floor on a regular basis, the likelihood of a slip-and-fall accident would increase. In such cases, more attention to the slip resistance of the finish as well as the cleaning and maintenance of the floor would be necessary. But what if two floors receive mostly dry soiling—dust, gravel, light debris, etc.—but one floor receives considerably more dry soiling than the other? In general, the presence of more dry soiling will increase the likelihood of a slip-and-fall accident because the dry soil, as it builds up, can have a lubricating effect on the floor. And in some cases, the finer the dry soiling, the more it can mar the finish and further reduce friction on the floor. In such situations, the way to prevent slip-and-fall accidents would likely include a combination of things: using a finish with a higher slip resistance, increasing floor cleaning frequencies, considering the use of a backpack vacuum cleaner to ensure dry soil is fully removed; and in a worst case scenario, blocking the floor until it can be effectively cleaned and be made safe. Floors and footwear Unfortunately for property managers and cleaning professionals, the type of footwear worn by the people walking on a floor is often beyond their control. However, should a slip-and-fall accident occur, the manager or cleaning crew often will be blamed. In order to keep the floor safe for all types of footwear, other factors—such as how well the floor is cleaned and maintained, how the floor is used, and the durability and slip resistance of the floor finish—must be addressed. Slip resistance and durability Floor finishes are certainly not all the same, and some will prove more durable—and slip resistant—over time than others. Many of the factors already discussed, such as foot traffic and soiling, will impact the durability of the finish. What is more important for managers and cleaning professionals to know is that the slip-resistance properties of the finish can change over time. This is especially true at key entrances to a floor because they usually receive the largest amount of foot traffic and are the first floor surfaces encountered when walking into the facility from the outside. Floors need to be monitored accordingly, and scrubbing and recoating frequencies may need to be increased in these areas. Cleaning and maintenance Without question, proper cleaning and maintenance are key considerations when it comes to improving floor safety. The chemicals used to clean and maintain the floor must be those recommended for that type of surface. A chemical or finish used for a VCT (vinyl composition tile) floor, for instance, may not be the right chemical/finish to use on a stone floor and could increase the chances of an accident. The actual equipment and procedures also play a crucial role. We have already mentioned that it is preferable, where possible, to use a backpack vacuum cleaner to more effectively remove soils from floors, especially dry soils that can get lodged in tile and grout pores. However, it is also advised to use mechanical floor cleaning systems, such as automatic scrubbers, instead of mopping floors, which can leave a residue or film on a floor that can contribute to a slip-and-fall accident. An automatic scrubber agitates, cleans, and dries the floor all in one process. Some systems are relatively small multi-wash machines that can be used on both carpets and hard surface floors. However, some of the most common automatic scrubbers that work in most settings are walk-behinds with either a 14-, 17- or 20-inch cleaning path. A final issue that should also be addressed is proper training. There have been cases where a floor has been well maintained by well-trained cleaning professionals using the right chemicals and finishes, and few if any accidents were experienced. But when there is a change of personnel and a less trained cleaning worker takes over, this is when accidents often occur. Regardless of a floor’s safety assessment, cleaning workers have a critical role to play in preventing slip-and-fall accidents. They must be proficient in floor care and up-to-date on the most effective floor care methods so that floors can be clean, and most of all, safe. Debby Davis is a floor care expert and an industry veteran. She is currently product manager for Powr-Flite, a leading manufacturer of floor care equipment.
<urn:uuid:e4a2dde9-5448-4b0d-9361-b6d85253204d>
CC-MAIN-2020-50
https://servicesmag.org/online-digital-magazine/digital-archives/item/630-preventing-slip-and-fall-accidents-assessing-floors-for-safety
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141202590.44/warc/CC-MAIN-20201129184455-20201129214455-00079.warc.gz
en
0.961211
1,291
2.859375
3
If you're convinced your dog has a powerful hold over you, then this will certainly explain why. Staring into a dog's eyes can increase oxytocin levels, making owners more affectionate and devoted to their pet. Researchers revealed that puppy dog eyes have a similar affect emotionally to that of a mother and her children, which they believe might be the reason why human-dog bonds are so strong. Oxytocin is a hormone produced in the brain, which is secreted by the pituitary gland. It is usually released to regulate two female reproductive functions: childbirth and breast-feeding. But it can also affect specific areas of the brain that are involved in emotional, cognitive and social behaviours. The study, conducted by researchers from three different Japanese Universities - Azabu, Jichi and Tokyo, measured the relationship between the hormone and the effects on the relationship between pets and their owners. The first study involved measuring the oxytocin levels of 28 dogs and their humans, before monitoring their interaction for 30 minutes. The researchers then screened their oxytocin levels and found they'd increased in the owners and pets who had gazed at one another. For the second experiment, the researchers sprayed saline or oxytocin in the noses of 54 dogs. In this instance, female dogs treated with oxytocin spent more time gazing at their owners, which after 30 minutes boosted the levels of their owners' oxytocin. "Gazing behaviour from dogs increased urinary oxytocin concentrations in owners, which consequently facilitated owners’ affiliation and increased oxytocin concentration in dogs," wrote the authors of the study. They found that dogs use eye contact as a communication tool so that they can alert their owners to their particular needs. They believe this behavioural technique has evolved over time, as dogs have learnt more and more about the way humans interact. "Owner-dog bonding is comparable to parent-infant bonding," Takefumi Kikusui from Azabu University in Japan told Today. "And this is surprising to us… because there is not a reproductive relationship between humans and dogs." The study was published in the journal Science.
<urn:uuid:68398b0a-6e46-4695-b754-965885df8b26>
CC-MAIN-2018-39
https://www.huffingtonpost.co.uk/2015/04/17/science-behind-puppy-eyes-oxytocin-hormone_n_7085028.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155814.1/warc/CC-MAIN-20180919004724-20180919024724-00514.warc.gz
en
0.973918
443
2.796875
3
Writing Standards for Grade 6 Source: http://www.corestandards.org/ELA-Literacy/W/6/ Text Types and Purposes: Write arguments to support claims with clear reasons and relevant evidence. Introduce claim(s) and organize the reasons and evidence clearly. Support claim(s) with clear reasons and relevant evidence, using credible sources and demonstrating an understanding of the topic or text. Use words, phrases, and clauses to clarify the relationships among claim(s) and reasons. Establish and maintain a formal style. Provide a concluding statement or section that follows from the argument presented. Write informative/explanatory texts to examine a topic and convey ideas, concepts, and information through the selection, organization, and analysis of relevant content. Introduce a topic; organize ideas, concepts, and information, using strategies such as definition, classification, comparison/contrast, and cause/effect; include formatting (e.g., headings), graphics (e.g., charts, tables), and multimedia when useful to aiding comprehension. Develop the topic with relevant facts, definitions, concrete details, quotations, or other information and examples. Use appropriate transitions to clarify the relationships among ideas and concepts. Use precise language and domain-specific vocabulary to inform about or explain the topic. Establish and maintain a formal style. Provide a concluding statement or section that follows from the information or explanation presented. Write narratives to develop real or imagined experiences or events using effective technique, relevant descriptive details, and well-structured event sequences. Engage and orient the reader by establishing a context and introducing a narrator and/or characters; organize an event sequence that unfolds naturally and logically. Use narrative techniques, such as dialogue, pacing, and description, to develop experiences, events, and/or characters. Use a variety of transition words, phrases, and clauses to convey sequence and signal shifts from one time frame or setting to another. Use precise words and phrases, relevant descriptive details, and sensory language to convey experiences and events. Provide a conclusion that follows from the narrated experiences or events. Production and Distribution of Writing: Produce clear and coherent writing in which the development, organization, and style are appropriate to task, purpose, and audience. (Grade-specific expectations for writing types are defined in standards 1-3 above.) With some guidance and support from peers and adults, develop and strengthen writing as needed by planning, revising, editing, rewriting, or trying a new approach. (Editing for conventions should demonstrate command of Language standards 1-3 up to and including grade 6 here.) Use technology, including the Internet, to produce and publish writing as well as to interact and collaborate with others; demonstrate sufficient command of keyboarding skills to type a minimum of three pages in a single sitting. Research to Build and Present Knowledge: Conduct short research projects to answer a question, drawing on several sources and refocusing the inquiry when appropriate. Gather relevant information from multiple print and digital sources; assess the credibility of each source; and quote or paraphrase the data and conclusions of others while avoiding plagiarism and providing basic bibliographic information for sources. Draw evidence from literary or informational texts to support analysis, reflection, and research. Apply grade 6 Reading standards to literature (e.g., "Compare and contrast texts in different forms or genres [e.g., stories and poems; historical novels and fantasy stories] in terms of their approaches to similar themes and topics"). Apply grade 6 Reading standards to literary nonfiction (e.g., "Trace and evaluate the argument and specific claims in a text, distinguishing claims that are supported by reasons and evidence from claims that are not"). Range of Writing: Write routinely over extended time frames (time for research, reflection, and revision) and shorter time frames (a single sitting or a day or two) for a range of discipline-specific tasks, purposes, and audiences.
<urn:uuid:eb5ff68f-c50c-4fe7-8807-6ba77be67512>
CC-MAIN-2018-22
http://www.boone.kyschools.us/olc/page.aspx?id=24810&s=1052
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868239.93/warc/CC-MAIN-20180527091644-20180527111644-00019.warc.gz
en
0.808907
826
4.375
4
Palms in the genus Phoenix are the main host for Phoenicococcus marlatti but occasionally it has been found infesting other palms. It is widely distributed in areas where palms grow but it is likely that it is native to north Africa. Adult phoenicococcids are nearly circular, up to 1.5 millimetres long and a dark red colour. They are usually found embedded in a white waxy nest at the base of palm fronds. They have no legs and the antennae have a single segment. There are three instars in the female and five in the male phoenicococcid. There are many overlapping generations with scales of all ages being present at any time of year. Development takes about sixty days in warm conditions but is much slower with cooler conditions.
<urn:uuid:0f6b2d3c-73f6-4a4b-83cc-fd65528b6259>
CC-MAIN-2022-40
https://eol.org/pages/622/articles
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337529.69/warc/CC-MAIN-20221004215917-20221005005917-00552.warc.gz
en
0.969337
171
3.328125
3
The placenta is an organ essential for the normal development of the fetus and maintenance of a healthy pregnancy. This organ provides a connection between the developing fetus and the uterine wall, allowing vital exchanges such as nutrient uptake, waste elimination and gas exchange to occur via the maternal blood circulation. In addition, during pregnancy, the placenta is an important source for peptide and steroid hormone secretion, and it has a significant role in preventing the rejection of the fetal allograft. This feto-maternal organ can be separated into two divisions: the fetal placenta (Chorion frondosum) and the maternal placenta (Decidua basalis). The fetal placenta develops from the same blastocyst as the fetus, and the maternal uterine tissue gives rise to the maternal placenta. Here we will look at the various stages of placental development, and discuss the importance of placental hormone production in relation to the endocrine changes that occur during pregnancy. Implantation and Invasion Figure 1 | Blastocyst implantation: (a) Apposition; Adhesion of the blastocyst with the decidua (purple). (b) Cytotrophoblast proliferation during invasion (c) to form an invasive multinucleated syncytiotrophoblast (ST) (Kay et al. 2011). Placental and fetal development begins at the time of fertilisation. The fertilized egg traverses the Fallopian tube, and undergoes numerous mitotic divisions, leading to the formation of the morula, a solid mass of blastomere cells. This ball of cells enters the uterus four days after fertilisation and on the fifth day it accumulates fluids and undergoes polarization, giving rise to a blastocyst. The outer layer of the blastocyst consists of a layer of cells known as the trophoblast. The trophoblast cells form the placenta and fetal membranes, while the inner cell mass of the blastocyst forms the embryo. The continual division of the inner & outer cell masses and enlargement of the fluid cavity leads to the hatching of the expanded blastocyst out of the zona pellucida. Initially the uterine secretions fulfil blastocyst’s metabolic and oxygen needs, but these secretions are not adequate for supporting the long term development of the fetus and the placenta. Thus, by implanting into the uterine lining, the blastocyst gains access to vital substrates (glycogen filled stromal cells) necessary for continued development (Roberts & Myatt 2012). During implantation, the blastocyst migrates to an optimal location within the uterus, after which it starts the process of adhesion (FIG. 1-(a)) and invasion of the uterine wall. The invading cells invade deeper into the decidua to penetrate the uterine epithelium and reside in the decidua (FIG. 1-(b)), during this process small vacuoles form. By day 13 after fertilisation, these vacuoles coalesce and go on to become lacunae (FIG. 1-(c)). Ultimately the lacunar space becomes the intervillous space in the chorioallantoic placenta, where maternal blood will circulate, and from which the fetus will receive nutrients. Figure 2 | Anchoring of the conceptus at the level of decidua is dependent on the interstitial EVT’s invasion of the decidua and myometrium. Endovascular EVTs can either act within the vessel wall (intramural) or act to replace the endothelium (intra-arterial) in their quest to transform narrow spiral arteries (adapted from Roberts & Myatt 2012). The progenitor cytotrophoblast cell is the stem cell that gives rise to the placenta. The cytotrophoblast cells differentiate along one of two possible ways to become either villous cytotrophoblast or extravillous cytotrophoblast. The villous cytotrophoblast later goes on to become syncytiotrophoblasts (outer epithelial covering of the vascular embryonic placental villi), whereas the extravillous cytotrophoblast (inner cellular layer) has a more diverse path of differentiation (FIG. 2). The syncytiotrophoblast carries out key functions such as gas exchange, nutrient transport, waste disposal and secretion of a variety of peptide and hormones necessary for normal regulation of placental, fetal and maternal systems. The extravillous trophoblast (EVT) has different components: the invasive, the proliferative and the migratory. The proliferative and the invasive EVT form the base and the distal portion of columns of erupted EVT respectively; these EVT columns then go on to invade the decidua or invade and remodel the spiral arteries (Kam et al. 1999). Decidua invading EVT is called interstitial EVT, and endovascular EVT is what’s used to address the invading EVT that remodel spiral arteries. During endovascular invasion, the vascular smooth muscle cells and endothelial cells are replaced/displaced, and the narrow spiral arteries are transformed into wide uteroplacental arteries (Roberts & Myatt 2012). The connections between the dilated spiral arteries and endometrial veins result in the formation of maternal sinusoids, which consequently allow blood to enter the low resistance vascular network of the lacunar system, consequently marking the beginning of the uteroplacental circulation. At different stages of EVT invasion, there are specific proteins expressed by these cells, which are essential for differentiation and regulation of invasion. For example, the invasion of the decidua and myometrium by EVT requires degradation of the extracellular matrix, to allow this several members of the metalloproteinase (MMPs) family are employed; these cells themselves are regulated by their tissue inhibitors (TIMPs) such as TIMP-2 which has been detected in decidual cells and EVT; The decidua blocks any uncontrolled EVT invasion through secretion of factors such as protease inhibitors, thus modulating trophoblast invasion (Benirschke et al. 2012). In the early stages of gestation the trophoblast shell plugs the terminal points of the uteroplacental vessels. This results in the placental tissue to develop in a low oxygen environment; where it’s supported by histiotrophic nutrition (Hustin & Schaaps 1987; Burton et al. 2001). Histotroph is the nutrient secreted by the decidual endometrial glands, which occupy the void between the maternal and fetal tissues. The environment created by the histotroph is thought to actively protect the developing embryo from potential harms of oxygen free radicals, including teratogenesis (Burton et al. 2003). The formerly mentioned trophoblast plugs are displaced at around 10 – 14 weeks of gestation allowing blood to flow into the intervillous space, thus allowing hemotrophic nutrition to take place; in other words, it allows gas and nutrient exchange between the maternal and the fetal circulations. However, this transition results in a higher blood flow which also leads to elevated intraplacental oxygen concentration; this increase in oxygen concentration leads to an oxidative stress, and depending on its severity it may even lead to miscarriages in some pregnancies (Jauniaux et al. 2000) (Burton & Jauniaux 2004) . Oxygen is also found to influence trophoblast invasion, such that factors involved in inhibition of invasion such as TGF-β3 and hypoxia-inducible factor 1 are both present at high levels during the first trimester of pregnancy, when there is low placental oxygen tension and trophoblast invasion happening. But consequently the expression of these transcription factors fall during 10-12 weeks of gestation, when the blood flow to the intervillous space is established and oxygen tension rises, thus reducing trophoblast invasion. This observation is also replicated in in vitro studies where hypoxic conditions promote trophoblast differentiation to follow the EVT pathway (Caniggia et al. 2000). Figure 3 | Early villous development: formation of primary (a), Secondary (b) and tertiary (c) villi (adapted from Benirschke et al. 2012). Early villous development involves the invasion of cytotrophoblasts into columns of syncytiotrophoblast trabeculae. During the second week of placental development, a primary villus is formed by the evagination of a layer of syncytiotrophoblast with a core of cytotrophoblast into the lacunar spaces (FIG 3 (a)). As development proceeds, the inner cores of the primary villi are occupied by embryonic mesoderm; this transformation leads to the formation of secondary villi (FIG 3 (b)). A tertiary villus (mesenchymal villi) is formed through the differentiation of embryonic mesoderm into blood vessels, which consequently connect to the developing vessels of the umbilical cord and the embryo (FIG 3 (c)). By the end of the 4th week post-conception, all of the placental villi have differentiated into tertiary villi. The villi can take on different positions, such that some remain anchored to the maternal decidua, whilst others roam freely in the lacuna. Moreover, owing to the placental barrier (layer of trophoblast), the maternal and the embryonic circulation are always kept separate from each other. The placental villi of the first trimester are enveloped by a continuous layer of cytotrophoblast cells (the Langhans layer), which actively contribute daughter cells to the overlying syncytiotrophoblast. Later in gestation, the numbers of villous cytotrophoblasts decline, whereas the syncytiotrophoblast reaches a surface area of around 13 m2. The turnover of this continuous syncytium (syncytiotrophoblast) is maintained by the fusion of the underlying villous cytotrophoblasts and programmed cell death (apoptosis). In humans, syncytin (human derived retrovirus HERV-W-derived protein) is expressed in high levels in the syncytiotrophoblast and has been shown to regulate the rate of cytotrophoblast fusion as well as syncytialisation of the trophoblast (Mi et al. 2000). It has been shown that reduced levels of syncytin are associated with abnormal protein localisation during cell fusion and disturbed placental function in hypertensive disorders of pregnancy (Mi et al. 2000) (Lee et al. 2001). Figure 4 | Schematic representation of the villous tree and the branching villi. Also displaying the rise of the terminal villi from the intermediate villi (Kay et al. 2011). As gestation continues, the numbers of blood vessels occupying the placenta escalate to allow adequate transport of nutrients for optimal development of the fetus. Human placental vascular development can be divided into three phases of: vasculogenesis, branching angiogenesis and non-branching angiogenesis. The two umbilical arteries and the vein undergo various rounds of divisions, primarily resulting in networks of secondary and consequently tertiary vessels prior to their entrance into the main stem villi, which itself originates from the chorionic plate. Further division of these vessels results in the formation of the intermediate villi (rami chordii) and more division result in even finer vascular branches (ramuli chorii). Amongst the ramuli chorri, some find their way towards the terminal villi and terminate there. The terminal villi are the “functional units of exchange” (Burton et al. 2001), and form the final branches of the villous tree (FIG. 4). The terminal villi are most noticeable in the last trimester, where there close proximity to the maternal blood and high ratio of surface to cross-section area allows for optimal nutrient and gas exchange. In addition the capillaries of terminal villi often form capillary loops and sometime sinusoids, which are though to be for reducing resistance and slowing down the flow, so that there is more time for vital exchanges to occur. Placental Hormone Secretion Due to placenta’s lack of innervation, any communications between this organ, the mother and the fetus must be relayed via humoral agents. This means that the placenta secretes signaling molecules, which act locally via autocrine and paracrine regulation. Most importantly, the placenta acts as an endocrine organ, secreting hormones into maternal and fetal circulation. These secretions can be divided into two categories of peptide and steroid hormones. The peptide hormone category of placental secretions are mainly produced by the trophoblast of the chorionic villi and include: human chorionic gonadotrophin (hCG), human placental lactogen (hPL), growth hormone (GH), corticotropin releasing hormone (CRH), cytokines, insulin-like growth factors (IGFs), Vascular endothelial growth factor (VEGF) and placental growth factor (PGF). HCG is a glycoprotein with close structural resemblance (shared the same alpha subunit) to LH, FSH and TSH. HCG is secreted by the syncytiotrophoblast and plays a key role in preventing the involution of the corpus luteum, so that it continues to produce progesterone. HCG levels escalate throughout the first 8 weeks of gestation, and after reaching its peak level during this period, it dramatically falls to a low steady state, this usually occurs around week 13, since at this stage the placenta itself is capable of producing adequate amounts of progesterone for supporting pregnancy. HPL is a trophoblast synthesized peptide hormone. Its principal role includes the up-regulation of glucose supply to the fetus by breaking down the maternal stores of fatty acid by altering the levels of insulin secretion in the mother. Interestingly, it has been shown that hPL deficient women who have successful pregnancies have higher levels of “compensatory prolactin” (Freemark 2006). In addition to secreting hCG, the syncytiotrophoblast also synthesizes CRH. CRH is a 162 amino acid peptide, which is thought to be involved in stimulating adrenocorticotropin (ACTH) release, which results in the release of prostaglandins and cortisol. Placental CRH expression is stimulated by glucocorticoids, but interestingly the same glucocorticoids have inhibitory effects on hypothalamic CRH. Both estrogen and progesterone also inhibit CRH expression. Throughout gestation CRH levels increase, but they are bound by CRH binding protein (CRHBP) produced by the liver, such that they cannot affect maternal pituitary, however, near term CRHBP levels fall, making unbound CRH more available; Given the effects of CRH on prostaglandin secretion, this is thought to be important for the onset of labor. CRH has been previously dubbed as the “placental clock”. This title stems from the observation that women with idiopathic pre term labor often have very rapid surge in CRH levels. CRH in the fetal circulation is thought to drive increased cortisol production, aid fetal lung maturation and may also act as a vasodilator of the fetal-placental circulation (Clifton et al. 1994; Wadhwa et al. 2004). Since placenta is a highly vascular organ, it produces many angiogenic factors to allow vasculogenesis. One such angiogenic factor is VEGF. VEGF is synthesized in villous trophoblast and macrophages. VEGF acts via two receptors: VEGF-R1 and VEGF-R2. These receptors are found in the villous vascular endothelium (Charnock-Jones et al. 1994), and VEGF is thought to act via these receptors in the placenta to facilitate branching angiogenesis. In addition, PGF, a member of the VEGF subfamily, is primarily produced in villous syncytiotrophoblasts (Khalil et al. 2008) during pregnancy, and acts via the VEGF receptors R1 & R2 to possibly take part in late gestation non-branching angiogenesis. Furthermore, oxygen tension seems to be a regulator of VEGF and PGF levels, such that hypoxic conditions in the trophoblast result in increased VEGF and decreased PGF levels (Shore et al. 1997). Furthermore, the placenta is an important source of progesterone production. This hormone is initially produced by the corpus luteum to prepare the endometrium for conceptus implantation; however, usually after the 8th week of gestation, the luteo-placental shift takes place, after which the placenta takes over progesterone production from the ovary. Progesterone is essential for maintenance of uterine quiescence (Kallen 2004); also owing to the anti-inflammatory and immunosuppressive functions of progesterone, it has been postulated to be important in preventing immunological rejection of the conceptus by the mother’s immune system (Kallen 2004). The placenta also produces estrogen, however this is dependent on the production of the precursor dehydroepiandrosterone-sulfate (DHEA-S) by the fetal and maternal adrenal glands. Estrogen has been associated with up regulation of proteins needed for continued progesterone production as well as steroid metabolism. It has also been shown to affect uterine blood flow and more importantly it is involved in preparing the breast for lactation (Kallen 2004). The placenta is a multifaceted organ that is essential for maintaining and protecting the developing fetus. In addition to placenta’s role as an exchange medium between the mother and the fetus, it also acts as an important endocrine organ for regulating various aspects of hormonal regulation during pregnancy. After fertilization, the development of the placenta involves the differentiation and transformation of a variety of cells, of which the trophoblast cells are of key importance. Various phenotypes of trophoblast exist, with each performing specific functions in the placenta. These functions range from the invasion of the decidua by the interstitial trophoblast to the transformation of the spiral arteries by the actions of the endovascular trophoblast. Further investigations into the developmental and structural features of the placenta will not only extend our understanding of placental functions, but will also allow us to better interpret the observations from abnormal pregnancies where there is compromised placental function. - Benirschke, K., Burton, G.J. & Baergen, R.N., 2012. Pathology of the Human Placenta 6th ed, Springer. - Burton, G.J. & Jauniaux, E., 2004. Placental oxidative stress: from miscarriage to preeclampsia. Journal of the Society for Gynecologic Investigation, 11(6), pp.342–352. - Burton, G.J., Hempstock, J. & Jauniaux, E., 2001. Nutrition of the Human Fetus during the First Trimester—A Review. Placenta, 22, pp.S70–S77. - Burton, G.J., Hempstock, J. & Jauniaux, E., 2003. ScienceDirect.com – Reproductive BioMedicine Online – Oxygen, early embryonic metabolism and free radical-mediated embryopathies. Reproductive biomedicine online. - Caniggia, I. et al., 2000. Oxygen and placental development during the first trimester: implications for the pathophysiology of pre-eclampsia. Placenta, 21 Suppl A, pp.S25–30. - Charnock-Jones, D.S. et al., 1994. Vascular endothelial growth factor receptor localization and activation in human trophoblast and choriocarcinoma cells. Biology of reproduction, 51(3), pp.524–530. - Clifton, V.L. et al., 1994. Corticotropin-releasing hormone-induced vasodilatation in the human fetal placental circulation. Journal of Clinical Endocrinology & Metabolism, 79(2), pp.666–669. - Freemark, M., 2006. Regulation of Maternal Metabolism by Pituitary and Placental Hormones: Roles in Fetal Development and Metabolic Programming. Hormone Research, 65(3), pp.41–49. - Hustin, J. & Schaaps, J.P., 1987. Echographic [corrected] and anatomic studies of the maternotrophoblastic border during the… – Abstract – Europe PubMed Central. American journal of obstetrics and …. - Jauniaux, E. et al., 2000. Onset of maternal arterial blood flow and placental oxidative stress. A possible factor in human early pregnancy failure. The American journal of pathology, 157(6), pp.2111–2122. - Kallen, C.B., 2004. Steroid hormone synthesis in pregnancy. Obstetrics and Gynecology Clinics of North America, 31(4), pp.795–816. - Kam, E.P. et al., 1999. The role of trophoblast in the physiological change in decidual spiral arteries. Human reproduction (Oxford, England), 14(8), pp.2131–2138. - Kay, H.H., Nelson, D.M. & Want, Y., 2011. The Placenta. WILEY-BLACKWELL, pp.1–360. - Khalil, A. et al., 2008. PLOS ONE: Effect of Antihypertensive Therapy with Alpha Methyldopa on Levels of Angiogenic Factors in Pregnancies with Hypertensive Disorders. PloS one. - Lee, X. et al., 2001. Downregulation of placental syncytin expression and abnormal protein localization in pre-eclampsia. Placenta, 22(10), pp.808–812. - Mi, S. et al., 2000. Syncytin is a captive retroviral envelope protein involved in human placental morphogenesis : Abstract : Nature. Nature. - Roberts, V. & Myatt, L., 2012. Placental development and physiology. Wolters Kluwer, pp.1–12. - Shore, V.H. et al., 1997. Vascular endothelial growth factor, placenta growth factor and their receptors in isolated human trophoblast. Placenta, 18(8), pp.657–665. - Wadhwa, P.D. et al., 2004. Placental corticotropin-releasing hormone (CRH), spontaneous preterm birth, and fetal growth restriction: a prospective investigation. Am J Obstet ….
<urn:uuid:5b606f61-0d57-4c51-9c11-8dfc63a9a636>
CC-MAIN-2019-43
http://www.projmed.com/2015/06/the-development-function-of-the-placenta-during-pregnancy/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987841291.79/warc/CC-MAIN-20191024040131-20191024063631-00001.warc.gz
en
0.88012
4,907
3.84375
4
Name:Dr. Margaret Wessling Office: CFS 91091 Welcome to astronomy, both the oldest science and one of the most modern. In an astronomy class you’ll learn more about everything than most of the people on this planet. But while you’re learning about planets, stars, galaxies, and the fate of Everything, you’ll also find out how astronomers can be sure that our solar system began 4 billion 567 million years ago, why we are so confident that invisible (dark) matter exists, as well as how the entire Universe started. Through all of this you’ll find out one of the greatest discoveries humans have ever made: that for all the things that happen over billions of years or billionths of a second, that for all the things almost infinitely big or almost infinitely small, the Universe is understandable. And not just by people in white lab coats with fancy degrees typing away at computers ... science makes it understandable by YOU. And on top of all of that, you’ll find that you can then use that science skill you develop here to help you figure out what is going on for the rest of your college career, in your professional life, and even in your personal life. Science is the skill that will give you the power to understand things yourself. Please join us. You won’t look at the world the same way again. Discipline Adviser: Dr. Dale Fields Astronomy 1 – 3 Units – The lecture-based introduction to astronomy. 15 Weeks which covers almost everything that has, does, and will exist in the Universe. Astronomy 2 – 1 Unit – The laboratory companion to Astronomy 1. You’ll find out how astronomers know about this Universe of ours. Astronomy 3 – 4 Units – A combination of both Astronomy 1 and Astronomy 2 all in one package. Note: Taking both Astronomy 1 and Astronomy 2 or taking Astronomy 3 fulfills your physical science requirements for transfer. Astronomy 2 may be taken either the same semester as Astronomy 1 or in a following semester. Dr. Dale Fields Dr. Lee Loveridge
<urn:uuid:e21f722b-c8e0-4633-9ff6-ce1edebe9450>
CC-MAIN-2017-04
http://www.piercecollege.edu/departments/physics_planetary_sciences/astronomy.asp
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282932.75/warc/CC-MAIN-20170116095122-00211-ip-10-171-10-70.ec2.internal.warc.gz
en
0.898367
444
2.625
3
"By leveraging our global scale to become a more efficient company, we are able to lower our expenses and help develop markets for new technologies," said Kim Saylors Laster, Walmart vice president of energy. "Developing and incorporating new renewable energy sources, like thin film, reduces energy price risk and aligns very well with our commitment to solving business challenges through technology." When complete, this project is expected to: supply up to 20 to 30 percent of the total energy needs for each location; produce up to 22.5 million kilowatt hours of clean energy per year – enough to power more than 1,750 homes annually*; avoid producing more than 11,650 metric tons of carbon dioxide equivalent annually, equal to taking more than 3,000 vehicles off the road for a year; add to the 31 current solar installations Walmart has in California and Hawaii. Thin film solar panels look similar to the traditional crystalline panels, but require fewer raw materials to manufacture, resulting in a smaller environmental impact over its life cycle. The Walmart projects are using both copper indium gallium selenide (CIGS) and cadmium telluride thin film. The companys large scale on-site installation of CIGS could help further the development of this technology and bring it to market quicker, while use of cadmium telluride thin film could help make the case for other businesses to adopt the technology for on-site commercial use. SolarCity, which will design, install, own and maintain the new solar power systems on Walmart locations, was selected through an RFP process spearheaded by Walmart and the national environmental group, Environmental Defense Fund (EDF). The goal of the RFP was to identify the most innovative solar technologies that would create benefits on three fronts—to the environment, technology, and financial viability. In addition to the 500 green jobs the project installations will create or support in California and Arizona, these Walmart projects are also supporting green jobs at facilities in Ohio and California, where the majority of the thin film is manufactured. "The combination of Walmarts market power and EDFs rigor could provide the scale and credibility needed to bring next generation solar technology more fully into the marketplace," said Gwen Ruta, vice president for corporate partnerships at EDF. "Its the kind of innovation we need to reduce dependence on foreign oil and cut carbon pollution." Walmart is using a number of technologies around the world to make progress towards its goal of being supplied by 100 percent renewable energy. For example, in the U.S., Walmart purchases wind energy in Texas, and is testing fuel cells and small wind turbines. In Mexico, Walmart is buying energy from a local wind farm for 348 facilities and has installed solar panels on two facilities. In Canada, Walmart is testing geothermal, fuel cells, solar and wind power, and is the largest corporate purchaser of low-emission power through a local provider of clean, renewable energy. "Thanks in part to the economies of scale created by pioneers like Walmart, its now possible for many American businesses and homeowners to adopt solar power and pay less than they currently pay for electricity from polluting sources," said Lyndon Rive, SolarCitys CEO. "This project was made possible in part by financing from PG&E Corporation and National Bank of Arizona, as well as incentives from the APS Renewable Energy Incentive Program(i) and the California Solar Initiative." Wal-Mart Stores, Inc. (NYSE: WMT), or "Walmart," serves customers and members more than 200 million times per week at more than 8,400 retail units under 55 different banners in 15 countries. With fiscal year 2010 sales of $405 billion, Walmart employs more than 2 million associates worldwide. A leader in sustainability, corporate philanthropy and employment opportunity, Walmart ranked first among retailers in Fortune Magazines 2010 Most Admired Companies survey.
<urn:uuid:8ead693d-4647-4d9e-bb2b-bbf82d3af662>
CC-MAIN-2022-27
https://www.evwind.es/2010/09/22/walmart-uses-innovative-thin-film-solar-photovoltaic-technology/7473
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103341778.23/warc/CC-MAIN-20220627195131-20220627225131-00364.warc.gz
en
0.943125
798
2.71875
3
Taken from a booklet titled: Historical Sketches of Berrien County By Robert C. Myers, Curator 1839 Courthouse Museum Eau Claire Excitement April 4, 1922 was certainly one of the most exciting days in Eau Claire’s history, for it was on that day that bandits held up the Eau Claire State Bank. The robbery touched off a wild chase and gun battle between the criminals and a furious posse of citizens. The four robbers were all fellow employees in a Gary, Indiana factory. Their leader conceived the idea of robbing the Eau Claire bank while he was visiting a relative there, and he enlisted the aid of his friends. The four men stole a six-cylinder Pratt touring car in Elkhart and headed north to Eau Claire, where they spent a day or so familiarizing themselves with the town and local roads. At about 9:30 Tuesday, morning the four bandits parked the Pratt in front of the bank. Two of the men got out while the other two, in best bank robber tradition, kept the motor running. Their leader walked into the bank carrying a large leather satchel, approached bank president Homer E. Hess, who was busy making ledger entries, and demanded that he stick up his hands. When he hesitated, the robber stuck two revolvers in his face and Hess complied with the order. His partner, meanwhile, held a gun on two other bank employees. Hess was ordered to stand with the other employees, and as he walked across the room he made a misstep. The robber fired instantly, grazing the bank president’s stomach and also attracting the attention of Eau Claire citizens outside the bank. In the tense confusion the employees somehow managed to step on floor alarm buttons, sounding an alarm in two locations in town. The bandits scooped up $1,185 in cash from the bank till, in their excitement and haste missing $3,000 more which lay in plain sight, and ran to their getaway car. As they sped off a deputy sheriff fired several shots, missing the bandits but punching holes in their touring car. Unfortunately for the robbers, they had not counted on two things: the quick think of telephone operator Mrs. Jack Claxton and the fury of Eau Claire’s citizens. Mrs. Claxton, not knowing which way the bandits were going, simply opened all the telephone lines and cried out, “The Eau Claire bank has been robbed and the bandits are headed your way!” Her message, of course effectively alerted everyone in the area, and the entire countryside was instantly up in arms. Several men pushed a heavy lumber wagon across the road and almost immediately saw the bandits speeding toward it. The big touring car whirled around and retreated the other way, followed by the Eau Claire men in a Ford pickup truck, exchanging revolver fire for shotgun blasts. The getaway car finally ran off the road and mired itself in a mud hole. The robbers fled through a field to a tamarack swamp, pursued by dozens of Eau Claire men armed with an assortment of rifles, pistols and shotguns. One robber was shot in the arm as dashed across the field and was captured, but the others held out for a short time in the swamp until a few close rifle shots induced them to surrender. The four bandits pleaded guilty to bank robbery at their court arraignment two weeks later. On April 24 they were each sentenced to thirty to thirty-five years in prison. Note from RC Ferguson: The Central Office Operator could do this. All Phone in the entire District would ring one loooong ring for emergencies.
<urn:uuid:80e2105e-95ff-46fc-9248-cd37c5acfcbc>
CC-MAIN-2020-24
http://eauclairemi.com/AboutUs/LocalHistory.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347415315.43/warc/CC-MAIN-20200601071242-20200601101242-00367.warc.gz
en
0.97303
749
2.796875
3
What Is Process Piping? Process Piping is critical to the operation of many manufacturing and processing facilities. Typical plumbing systems are used to move liquids and gases for heating and cooling processes or are used to move water and waste through a building. However, process piping is used to convey liquids, chemicals, fuels, gases and other raw materials used in manufacturing enterprises into an end product. Process piping consists of any piping and components not part of the facility’s mechanical systems. These piping components move, mix, distribute, and control the flow of fluids commonly used in many industries, such as the manufacturing of semiconductors, chemicals, paper processing, petroleum products pharmaceuticals, and textiles. These systems require the skill and attention of an expert to ensure they are installed and maintained properly and provide flawless operation. Base Construction has over two decades of experience with process piping. We are experts in general, specialty, industry-specific, and site-specific safety services for manufacturing facilities that utilize process piping as a primary part of their production processes. Our team of highly qualified pipefitters ensures all applicable code requirements are met and provides clients with a diverse range of process piping services, including: - Pipe routing design and implementation - Pipe design support and installation - Piping and instrumentation diagram development and implementation - Pipe material selection - Manual and control valve selection - Pipe installation - Pipe testing - Pipe painting and labeling - Pipe insulation and heat tracing Process Piping Welding Techniques Butt welding is one of the most commonly used welding techniques and can be performed either manually or automatically. Butt welds are used to join pipes together as well as joining them to fittings, flanges, valves, and other equipment. This welding technique is widely used in applications that require a high-quality weld and is usually inspected by X-ray to ensure the quality of the weld. Socket Weld Threaded A socket weld is primarily used for small diameter pipes and is a joint used to insert the pipe into a recessed area of a flange, valve, or fitting. Socket welded joints provide high leakage integrity and great structural strength and are one of the best techniques for most mechanical joining methods. Soldered end joints attach components with the use of a metal filler or solder. The solder has a lower melting point than the adjoining metal, and the joint is created by melting the solder into the joint, permanently attaching the components. A flange joint connects pipes, valves, pumps, and other equipment to a piping system with the use of flanges welded or bolted together with a gasket between the components to prevent leakage. Flange joints provide easy access for cleaning, inspection, or modification. Mechanical Joint Fusion A mechanical joint is a compression joint designed for underground connections of pipes, valves, and fittings. Mechanical joints are both socket and butt joints and allow for some deflection at the joint to accommodate slight misalignments, due to installation issues, while still maintaining a seal under pressure. A fluid coupling or hydraulic coupling is a device used to transmit rotating mechanical power from one shaft to another through the acceleration and deceleration of hydraulic fluid. Hydraulic coupling is based on hydro-kinetic principles and requires that the output speed is less than the input. - Slip-on Glued Contact Base Construction for Your Process Piping Needs Our team at Base Construction is dedicated to providing the highest quality services possible and ensuring customer satisfaction. Our highly skilled craftsmen are experts in the field, ensuring safety and quality on every project. To learn more about our services and how we can fulfill your process piping needs, contact us today.
<urn:uuid:ce061a69-441e-439b-aed4-4394bf9306ce>
CC-MAIN-2023-14
https://www.baseconstructionca.com/process-piping-welding-techniques/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950422.77/warc/CC-MAIN-20230402074255-20230402104255-00332.warc.gz
en
0.934484
772
2.765625
3
So What Happens During a Hearing Test Anyway? When you arrive for your exam, you will be greeted by the front office staff and asked to fill out several forms, including those that record your personal information, medical history and verify your insurance. You will also receive a copy of a Notice of Privacy as mandated by law. As your exam begins, your Hearing Care Professional will review your personal information with you and will ask you some questions that are designed to discover the specific types of environments in which you may be experiencing some difficulty in hearing. Next, the Hearing Care Professional may look into your ears by using an otoscope. This instrument is used to see the ear canal and the ear drum and whether or not there is ear wax obstructing the canal. Sometimes the Hearing Care Professional will have a video otoscope so you can see inside your ear as well! The first test that is conducted is the pure tone hearing test. This is conducted in a quiet environment, sometimes in a soundproof booth. The Hearing Care Professional will place headphones that are connected to an audiometer over your ears. The audiometer transmits a series of tones at a variety of volumes into your ears to determine the exact point or "threshold" at which you can hear various frequencies of sounds. When you hear a sound, you will be asked to say "yes" or raise your hand. The next test is speech testing. The Hearing Care Professional will ask you to listen to a series of one and two syllable words at different volumes and then ask you to repeat them. This will determine the level at which you can detect and understand speech. Another test that may be conducted is a speech in noise test. This test will determine how well you hear sentences in a noisy environment. The results of your tests will be recorded on a form called an audiogram, which the Hearing Care Professional will review with you. The audiogram reflects your hearing loss in frequencies and decibels. You will be shown the type, pattern and degree of hearing loss, as well as the percentage of normal conversational speech that you are still able to hear. Your Hearing Care Professional will then relate these results to your concerns about your hearing. The next step is to consider treatment solutions. Call today to schedule an appointment for your hearing test!
<urn:uuid:c91c8c33-fb08-4e97-a345-748947045a33>
CC-MAIN-2013-20
http://www.sahearingcenters.com/hearing-test/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705953421/warc/CC-MAIN-20130516120553-00040-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953107
468
2.734375
3
Edward Hammond Hargraves Biography, Life, Interesting Facts Edward Hammond Hargraves was born on October 7, 1816. He was an Australian Gold Prospector. He died on October 29, 1891. Edward Hammond Hargraves was born on October 7, 1816, in Gosport, England. He was born to Lieutenant John Edward Hargraves and Elizabeth Hargraves. He was brought up alongside two siblings. He schooled at Brighton Grammar School, England. In 1982, he went to Sydney. He on the latter worked at a property which was at a close distance to Bathurst. In 1833, he engaged in collecting tortoise shells and béche-de-mer back in Torres Strait. He later on the same year moved back to England. In 1834, Edward Hammond Hargraves went to Bathurst. He worked as a property overseer. In 1836, he went to Gosford. In 1839, he worked as an agent in the General Steam Navigation Company. He later constructed the ‘Hill Hotel’ on land that he bought from the dowry he received. He then purchased a property at Manning River. In 1849, he travelled to America due to the Californian gold rush information that reached him. He later turned unsuccessful with his Gold mining mission since he didn’t find any gold. He afterwards went to the Western districts of New South Wales, Australia in the hope of finding gold. In 1851, Edward Hammond Hargraves went to Sydney on a mission to earn a fortune in goldfield and gold mining. In the same year, he moved to Bathurst. He alongside John Lister discovered five specks of gold Lewis Ponds. Later the same year, he returned to Sydney. He after that wrote to ‘Sydney Morning Herald’ on clarification of the facts about the goldfield where Lister and William found four ounces of gold. He then made communications about areas where there is an existence of gold. He received ten thousand euros reward back at Bathurst from the New South Wales Government. Edward Hammond Hargraves later was appointed the Commissioner of Crown Lands. He also received five thousand euros reward from the Victorian Government. In 1853, he retained his title for the first ‘Ophir’ denoting Goldfield discoverer. In 1853, he moved to England where he met Queen of England. In 1855, he wrote and published ‘Australia and its Goldfields’ a book discussing on gold discovery. In 1877, he was granted a two hundred and fifty euros annual pension by the New South Wales Government. In 1836, Edward Hammond Hargraves married Eliza Mackie back in Sydney with whom they had five children. He died on October 29,1891, in Sydney. He was laid to rest at Waverley Cemetery. He died at the age of Seventy-five. More People From England More People From United Kingdom Connie Victoria Elizabeth Talbot Robert Falcon Scott Charles George Gordon
<urn:uuid:7ad53e86-68f1-4ad4-bcf3-72050deaa71d>
CC-MAIN-2020-10
https://www.sunsigns.org/famousbirthdays/d/profile/edward-hammond-hargraves/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146064.76/warc/CC-MAIN-20200225080028-20200225110028-00142.warc.gz
en
0.981805
636
2.796875
3
A lottery is a game of chance in which numbers are drawn and prizes are awarded to those whose numbers are selected. They are often held by governments and other organizations as a way to raise money for a variety of public purposes. The history of lotteries is relatively young, dating back to at least the 15th century in Europe, where town records indicate that various towns held public lotteries to raise funds for city walls and other forms of defense, and to help the poor. It is not known whether the term “lottery” was used in that period, but the word probably derives from Middle Dutch Some people play the lottery because it provides them with a sense of hope against the odds; others may be suffering from financial hardship, and may feel that a small sum of money will be enough to improve their situation. In addition, many people feel that the lottery is a harmless form of entertainment. Understanding lottery numbers and trends is an important aspect of playing the lottery. It can help players boost their chances of winning a large jackpot by analyzing the most common numbers that have been drawn in the past months or years. It also helps to choose rare, hard-to-predict numbers. These numbers are unlikely to be drawn frequently, but if they do, they can make for a bigger payout for the player who guessed them correctly.
<urn:uuid:85b425d6-9f36-4b56-ac99-0d6f2c3be234>
CC-MAIN-2023-40
https://lickids.com/what-is-a-lottery-5/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506658.2/warc/CC-MAIN-20230924155422-20230924185422-00553.warc.gz
en
0.980875
275
3.0625
3
In the intricate tapestry of mental health, trauma can cast a long shadow, impacting various aspects of an individual’s life. A trauma therapist plays a pivotal role in guiding individuals through the process of healing, providing support, understanding, and evidence-based interventions. In this blog, we delve into the crucial role of a trauma therapist, exploring their expertise, techniques, and the transformative journey they facilitate for those on the path to recovery. Understanding Trauma Therapist A trauma therapist is like a guide who helps people who have been through really tough and painful experiences. They create a safe and understanding space where individuals can talk about their feelings without being judged. These therapists use different methods that have been proven to work in helping people heal from trauma. They try to understand the kind of trauma a person went through and make a plan in order to help them get better. The therapist’s job is not just to deal with the past but also to help people become stronger for the future. They teach practical skills to handle difficult emotions, encourage individuals to explore their thoughts and feelings and work on making relationships healthier. If someone is going through a tough time because of the trauma, a trauma therapist is there to offer support, and guidance, and help them slowly but steadily feel better. It’s like having a companion on the journey to healing. The Role Of A Trauma Therapist A trauma therapist assumes a multifaceted role that encompasses various responsibilities aimed at helping individuals navigate and recover from traumatic experiences. Here’s an elaborate breakdown of the key roles and functions: - Expert in Therapeutic Techniques: Trauma therapists are well-versed in a range of evidence-based therapeutic techniques. These may include cognitive-behavioral therapy (CBT), eye movement desensitization and reprocessing (EMDR), or other trauma-focused interventions. Mastery of these techniques allows therapists to guide individuals through the healing process effectively. - Empowerment Facilitator: Beyond immediate healing, a crucial role of the trauma therapist is to empower individuals for the future. This involves helping them develop practical skills to cope with stress, manage emotions, and also build resilience. The focus is on equipping individuals with tools in order to navigate life’s challenges confidently. - Guide Through Emotional Exploration: Trauma therapists serve as guides in the journey of emotional exploration. They encourage individuals to delve into and understand their emotions and thoughts, fostering a deeper level of self-awareness that contributes to the healing process. - Relationship Builder: Recognizing the impact of trauma on interpersonal connections, trauma therapists assist individuals in navigating and improving their relationships. This may involve addressing communication patterns, rebuilding trust, as well as fostering healthier connections with others. - Crisis Intervention Specialist: Understanding the unpredictable nature of trauma, trauma therapists are equipped to handle crisis situations. They provide immediate support during urgent or critical moments, employing strategies to manage and alleviate acute distress. - Champion of Resilience: Ultimately, a trauma therapist acts as a champion of resilience. Beyond healing from past trauma, the therapist guides individuals in cultivating resilience—a fundamental strength that empowers them to face future challenges with confidence and adaptability. Strategies Used By A Trauma Therapist Trauma therapists employ a variety of evidence-based strategies to help individuals navigate and heal from traumatic experiences. These strategies are tailored to the unique needs and responses of each individual. Here are some commonly used strategies: - Trauma-Informed Approaches: Trauma therapists utilize trauma-informed approaches that prioritize safety, trust, collaboration, and empowerment. These approaches acknowledge the pervasive impact of trauma on an individual’s life and also guide the therapeutic process with sensitivity. - Dialectical Behavior Therapy (DBT): DBT combines cognitive-behavioral techniques with mindfulness strategies. It focuses on building skills in emotional regulation, distress tolerance, interpersonal effectiveness, and acceptance. - Narrative Therapy: Narrative therapy involves exploring and reshaping the narrative of one’s life story. Therapists help individuals reconstruct their understanding of the traumatic event, empowering them to view themselves as resilient survivors rather than passive victims. - Somatic Experiencing: Somatic experiencing emphasizes the connection between the mind and body. Therapists guide individuals in tracking and releasing physical sensations associated with trauma, promoting a sense of safety and self-regulation. - Art and Expressive Therapies: Creative expression through art, music, or other forms of creativity can provide an alternative way for individuals to process and communicate their experiences when words may be challenging. - Psychoeducation: Trauma therapists provide psychoeducation about the effects of trauma, coping mechanisms, and the neurobiology of stress. This knowledge empowers individuals by offering insights into their experiences and normalizing their responses. - Culturally Competent Approaches: Trauma therapists consider cultural factors and diversity in their approaches. Culturally competent strategies ensure that therapy is respectful, inclusive, and tailored to the individual’s cultural background. - Interpersonal Psychotherapy (IPT): IPT focuses on addressing interpersonal issues that may arise from trauma. It helps individuals improve communication, build healthier relationships, and establish a supportive social network. Trauma Therapy Techniques And Tips Trauma therapists employ a range of techniques and tips to support individuals on their journey to healing. Here are some key strategies commonly used in trauma therapy: - Establishing Safety and Trust: Before delving into trauma-related issues, therapists prioritize creating a safe and trusting therapeutic relationship. Building a foundation of safety helps individuals feel secure in exploring difficult emotions and memories. - Grounding Techniques: Grounding exercises help individuals stay connected to the present moment, especially when triggered by distressing memories. Techniques may include focused breathing, sensory awareness, or using grounding objects. - Mindfulness Practices: Mindfulness techniques foster awareness of thoughts and sensations without judgment. These practices can enhance emotional regulation and create a sense of calm amid distress. - Resourcing: Identifying and bolstering internal and external resources, such as strengths, supportive relationships, and positive experiences, contributes to an individual’s resilience. - Self-Compassion Practices: Encouraging self-compassion involves fostering a kind and understanding attitude toward oneself. This practice counteracts self-blame and enhances self-acceptance. - Trauma-Focused Cognitive-Behavioral Therapy (TF-CBT): TF-CBT is a structured therapeutic approach specifically designed for individuals with trauma histories. It combines cognitive-behavioral techniques with trauma-focused interventions. - Eye Movement Desensitization and Reprocessing (EMDR): EMDR incorporates bilateral stimulation to assist in processing traumatic memories. It aims to reduce the emotional charge associated with distressing experiences. Choosing The Right Trauma Therapist Choosing the right trauma therapist is a crucial step in the healing journey. Here are some considerations and tips to help you make an informed decision: - Specialization: Consider therapists who specialize in trauma or related areas, such as PTSD, complex trauma, or childhood trauma. Specialization indicates a deeper understanding of trauma dynamics. - Therapeutic Approach: Different therapists may use different approaches. Research and inquire about their therapeutic techniques, ensuring they align with your preferences and comfort level. - Empathy and Connection: A strong therapeutic alliance is crucial. Look for a therapist who demonstrates empathy, understanding, and a genuine connection. Trust your instincts about how comfortable you feel with them. - Cultural Competence: Cultural competence is essential in trauma therapy. Choose a therapist who is sensitive to cultural differences and understands the impact of culture on the experience of trauma. - Client Reviews and Testimonials: Read reviews or testimonials from previous clients. While individual experiences vary, positive feedback can provide insights into a therapist’s effectiveness. - Referrals and Recommendations: Seek referrals from trusted sources, such as friends, family, or healthcare professionals. Recommendations from people you trust can guide you to reputable therapists. - Availability and Accessibility: Consider practical factors such as the therapist’s location, availability for sessions, and whether they offer virtual or in-person sessions. Accessibility is key to maintaining consistent therapy. - Ask About Supervision and Continuing Education: Inquire about the therapist’s ongoing professional development. Therapists who engage in regular supervision and continuing education demonstrate a commitment to staying updated on best practices. - Gut Feeling: Trust your instincts. If, after a few sessions, you feel uneasy or there’s a lack of connection, it’s okay to consider other options. The therapeutic relationship is a crucial factor in the effectiveness of trauma therapy. In conclusion, a trauma therapist plays a crucial role in guiding individuals through the process of healing from trauma. The therapeutic alliance formed is a key factor in this journey, providing a safe space for individuals to confront and overcome the impact of distressing experiences. The collaboration between therapist and client is a catalyst for resilience and empowerment, marking the beginning of a transformative path toward renewed strength and hope. The journey through trauma therapy is a testament to the human spirit’s capacity for renewal and growth. Online therapists are increasingly important in today’s world because they provide a convenient and accessible way for people to receive mental health support and treatment. Visit TherapyMantra for affordable Online Therapy: Book a trial Online therapy session.
<urn:uuid:7b9b7a5e-1495-4226-86ca-02e72c967afd>
CC-MAIN-2023-50
https://therapymantra.uk/therapist/trauma-therapist/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00510.warc.gz
en
0.898088
1,926
2.5625
3
Understanding Why The Gold Standard Failed John Paul Koning's recent work on the Gold Standard from 1934-1971 is phenomenal. In this two part essay, he details the U.S. Government's attempts to keep the price of gold pegged to $35/ounce. Throughout the work he details how the government's efforts always failed and the drastic measures employed to keep the price pegged, including resorting to military force. He even includes a couple of pretty charts =D [Koning is a financial writer and graphic designer] Some excerpts from Part One: Nineteen fifty-eight marked the first year in which foreign central banks exercised their convertibility rights in significant amounts and returned their dollars for gold. US gold reserves fell 10% from 20,312 metric tons to 18,290 that year, another 5% in 1959, and 9% in 1960. At the same time, the US Federal Reserve continued to increase notes in circulation, resulting in dollars being backed by ever smaller amounts of gold. Since this threatened future potential convertibility, rumors grew that the United States would be forced to devalue the dollar to staunch the outflow. The US government tried to prevent gold from leaving by twisting the arms of foreign central banks to keep their dollars, and, later, setting travel limits on American tourists overseas and US private investment in Europe. By 1958, London gold was trading closer to its $35.18 upper limit rather than the bottom limit at $34.82, which it touched in 1957. Participants in the London market — increasingly dominated by throngs of private investors and speculators — were ever more certain that the United States' plunging gold reserves would force it to dramatically devalue the dollar. In September 1960, the United States experienced its largest weekly decline in reserves since 1931 as foreign central banks went to New York for the metal. At the same time it was becoming evident that presidential challenger John F. Kennedy would win that fall's election. Kennedy's promises to lower interest rates and increase government spending convinced many that gold outflows would only increase. The Dow Jones Industrial Average plunged 12% from the end of August to October 25, hitting its lowest point since 1958. More from Part Two: For instance, in 1959 Eisenhower made it illegal for Americans to buy gold overseas — extending Roosevelt's 1933 ban on American domestic holdings of gold. In 1964 a new tax was imposed by President Kennedy on foreign currency deposits to prevent Americans from investing overseas — the Interest Equalization Tax. In August 1970 President Nixon was given discretionary authority to impose wage and price controls on citizens. Soft nanny state campaigns by the state to discourage tourism and therefore dollar outflows, including Lyndon B Johnson's comments that "We may have to forego the pleasures of Europe for a while," and "I am asking the American people to defer for the next two years all non-essential travel outside the western hemisphere," became common. In 1968 Johnson would also forbid all American investment in Europe and impose limits on investments elsewhere. All this is terribly ironic as Kennedy, Johnson, and Nixon were clamping down on American economic freedoms at the same time that they were waging a war of aggression in Vietnam. By forcing the American public to spend less overseas, Kennedy and Johnson realized they would free up more room for their own overseas campaigns. There are umpteen examples of forceful means being used to reduce the freedom of individuals in order to save the $35 peg from that era. One by one they failed, including the London Gold Pool, only to be replaced by even stronger forms of coercion. The last and probably the most overtly aggressive of these was the South Africa embargo. David in Qatar
<urn:uuid:94fe5c35-dded-412c-8512-1165f12a5a2c>
CC-MAIN-2015-35
http://caps.fool.com/Blogs/understanding-why-the-gold/173502
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064865.49/warc/CC-MAIN-20150827025424-00297-ip-10-171-96-226.ec2.internal.warc.gz
en
0.969064
741
3.09375
3
GIMP/Add Speech Bubbles to a Comic Strip This tutorial will show you how to add text and speech bubbles to pre-made art in The GIMP v2.0 or later. - 1 Getting started - 2 Text - 3 Bubbles - 4 Cleaning up - 5 General practices - 6 Adding thought bubbles Make a copy This step isn't strictly necessary, but it's a good idea that could save you from repeating steps if something goes horribly wrong. It's a very good idea if you're working on the only copy of your source image. (Better yet, don't work on the only copy of your source image.) When you open an image in The GIMP, it automatically becomes the background layer. Anything added to the image will be added as a higher layer, sitting above the background layer. You can combine layers by clicking Layers > Merge Down, and you'll probably want to at some stage, so you can work on multiple added items at the same time. Right-click the Background' layer and select Duplicate. That way, if you accidentally merge the wrong layer down onto a lower one, or perform an operation that seems like a good idea but isn't (and can't be rolled back), you haven't overwritten the only copy of the art you have. Add a filter You'll most likely be adding text in black. If the background is dark as well, the text will be almost invisible and difficult to work with. You can make it easier to view dark text on a dark background by adding a semi-opaque layer between them in a light colour. To do this: Click Layers > New Layer and select a transparent background. To add the filter, select the Fill tool and select white as the colour to use. Reduce the opacity to 50% and click anywhere on the new layer. You'll see the image turn milky, because you're now viewing the background image through a semi-transparent white layer. Any text you lay down on top of this will be easy to see, and after you've added the speech bubbles around it, the filter can be removed, leaving the background looking like it did to begin with. Adding the text To select the Text tool, press T. Select the colour, font and size you prefer. Use anti-alias should be ticked. Jagged edges on your text will make it harder to read, especially if the image is resized. Centre-aligned text is often best, too. After the text box is closed, the text tool automatically changes to the Move tool. At this point, if you try to move the text, you'll see it slide out of the box and vanish completely off the edges of the layer. Since you probably do want to move the text, to get it positioned just right, you'll want to expand the layer to the full size of the image. To do this: Click Layer > Layer to Image Size. Now you can select your text with the Rectangular selection tool. As soon as the mouse is released, the selection tool changes to the Move tool and you can simply drag your text to where it needs to be. The GIMP text tool applies a single style to an entire block of text, so an example of what you can't do is bold or italicise individual words. (In other words, the previous sentence would be impossible.) To mix styles, add all the text of one style in a single layer, taking care to leave the space for the other styled text, then add a second text layer written in the second style, positioning it over the first. Once you have all the necessary text on the screen and in the right position, you can create the bubbles. First, add a new layer, below the text layer. This part of the process will involve painting out a section of the current layer, so if it's the same layer your text is on, you'll lose it. Next, change to the Elliptical selection tool. Once again, make sure to anti-alias. Draw an oval around the text, making sure to leave enough white space so the text isn't crowded. This will become the bubble. To add a stalk pointing to a character, change to the Path tool. (The GIMP's Path tool mirrors the Photoshop Bézier Curve tool.) This allows you to mark out an area to be added to the selection you made with the Ellipse tool. First, click and release the mouse on a starting point just inside the oval. Next, click where you want the point of the stalk to be. If you want a straight line, release and continue to the next step. If you prefer a curve, hold the mouse button down and drag the pointer away from the second point. The line will deform into a curve. It'll take a bit of experimentation to get it exactly where you want it, but it's a nice effect. Click back into the oval to complete the other side of the stalk. Now you have an oval around the text, and on top of that, a stalk. Move back to the dialogues window again, and click the Paths tab. Right-click the uppermost path on the stack and select Add to selection. Now the entire speech bubble including the stalk will have the blinking dashed line around it. At this stage, you can experiment a little bit to add some variety among the different speech bubble shapes you have. For instance, the script-fu menu's selection options offers the distress selection tool, which will make the outline a bit more random. Finally, select an appropriate background colour (white is the classic) and then the Fill tool again. (Make sure you raise the opacity back to 100% unless you prefer the speech bubble to be semi-transparent on top of your background image.) Click inside the selection and it will fill with the selected background colour out to the edges. Your text should now be invisible behind the background colour. Don't try working with the text or any other task yet, because you still need the speech bubble selected. Now that you have the speech bubble filled, you can add a black (or any other colour) border to it. To do this, first select a foreground colour and then: Click Edit > Stroke selection.... The default line thickness is 6 pixels, which is probably too thick. 1px or 2px should be plenty. Click to confirm, and a border in the selected foreground colour will appear around the speech bubble. In order to create a smoother border, first click Select > To Path. Then, click Edit > Stroke Path.... Proceed as stated in the previous paragraph. Text in bubble Now that you have speech bubbles, you want the text in them. To accomplish this, go back to the layers window. There's probably a whole range of layers by now, since each block of text and each speech bubble you created added one (or more) new layer. Use the mouse to drag the speech bubble layers below the text layers and you'll see the words appear in the bubbles. Removing the filter Using the mouse on the layers window, select the semi-opaque layer you created. Right-click and select Delete. You'll see the background image snap back to its original colours behind your speech bubbles. Saving your work If you want to keep the different elements of the image on the separate layers, you'll need to save the image as a .xcf file, which is The GIMP's native file format. To save it in a format you can view in a browser or slideshow program, select the appropriate extension when you save the image and confirm that the file should be exported, (losing the separation between layers in the process). We naturally start reading at the top left-hand corner of a box and proceed towards the bottom right. The first words spoken should be higher and further towards the left unless you have some other way in addition to speech bubble stalks of making it clear which character is speaking. Dark text on a light background is easiest to read. Text and background should never have the same brightness even if they're different colours, since it makes it harder for the eye to distinguish between them. and in general the text should have the 'richer' colour (e.g. red, blue, green) and the background should be a 'washed-out' colour (e.g. white, grey, pale blue). Start big. It's easy to scale large images down, small images scaled up will tend to be pixelated and won't look as good. Don't crowd your images with too much talk. Text should give way to art rather than vice versa. Adding thought bubbles So far a very effective way of adding speech to your work has been showcased. Now it's time to get thinking! Tailoring the text to your preferences A quick note on tool-usage that seems to pass people by: You must open the Tool Option dialogue and use it as above to get the best out of GIMP. In this case the text editor is selected, but you also need it to use all GIMP tools effectively. It is important in the next section. Creating the Bubble Now what you must do is select the tool options as in the screenshot above. This is essential if you want to follow the rest of this tutorial as you will be using it a lot to make sure everything is working correctly. In this instance the Text tool is selected so you can work on all the options such as the font and text size as well as the text justification. This is essential. Now you need to type in your text as for the speech bubble tutorial. So far all is the same. Note: I have used the same sort of filter as in the earlier tutorial. Time to add the selections for the bubble. As before select the elliptical marquee tool. However, this time you need to select the option in the screenshot above from the Tool Options dialogue. This will allow you to draw the several ellipses necessary to create a thought bubble without cancelling the selection each time you click away from it. After this just fill and stroke as for speech bubbles, move stuff around to your satisfaction, remember to delete the filter and - one thought bubble!
<urn:uuid:08fb8b90-8d96-449c-8e98-3cd298e94d15>
CC-MAIN-2017-13
https://en.wikibooks.org/wiki/GIMP/Add_Speech_Bubbles_to_a_Comic_Strip
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189802.72/warc/CC-MAIN-20170322212949-00327-ip-10-233-31-227.ec2.internal.warc.gz
en
0.911779
2,137
2.625
3
“Breathing in… breathing out…” Us humans breathe over 20,000 times a day. Unless our air supply is cut off, we don’t pay this mostly automatic process much attention. But we should. Every breath we take supplies every one of our body’s trillions of cells with life. Breathing also removes harmful carbon dioxide (CO2) to help keep us alive. Controlled breathing is considered a fundamental element in many ancient traditions, including meditation and yoga. Ancient yogis, for example, believed in the healing power of the breath. Both Buddhists and Yogis taught their students the precise methodology with which they were to inhale and exhale – along with the rationale behind intentional breathing. History’s yogis and Buddhists were way beyond their time. As it turns out, proper breathing “counteracts the adverse clinical effects of stress in disorders including hypertension, anxiety, insomnia, and aging.” Fast-forward thousands of years, and scientists are just now confirming many of the benefits espoused by Buddha and the Yogis. Pretty fascinating stuff, right? In this article, we’re going to talk about controlled breathing, what science has uncovered, and how to perform three different methods of controlled breathing. All three methods and easy, quick, and life-changing! Let’s get to it! Here’s what happens when you practice deep breathing: “Controlled breathing is one way to trigger your relaxation response, as it activates your parasympathetic nervous system, which in turn may slow down your heart rate and digestion which helps you feel calm.” ~ Dr. Joseph Mercola: “Breathe, Exhale and Repeat: What Are the Benefits of Controlled Breathing?” Breathing, as you probably already know, is both a voluntary and involuntary response. Provided the heart is pumping blood and the brain is functioning, we will breathe automatically. However, many of us do not breathe ‘correctly.’ Most of us have the innate tendency to chest breathe – or breathe shallowly. Instead, we should breathe with the belly – something called ‘diaphragmic breathing.’ When we consciously engage in a diaphragmic breathing practice, this is called controlled breathing. What is Controlled Breathing? Controlled breathing is to be consciously aware – and control – one’s breathing patterns. Controlled breathing is also a practice with some extraordinary potential health benefits, including healthier organs, a better brain, increased energy, cellular health, and much more. Most of the health gains from controlled breathing are a direct result of curbing the body’s fight-or-flight response. As you know, your body has a “fight-or-flight” (FoF) mechanism that activates when it’s under stress. Our distant ancestors had to contend with many-a-threat: wild animals, starvation, disease, etc. Naturally, as humans evolved, we became more of a “thinking” creature. This fact is evident in the development of the prefrontal cortex (PFC) of the brain, which is responsible for decision-making, attention, and resource management. Of course, we still have the FoF response too. But we can – to a great extent – overrule many FoF annoyances by using our PFC (more on this later on.) This includes, of course, controlled breathing. Controlled breathing and the ‘Relaxation Response’ The Relaxation Response is a term coined by Harvard professor, and pioneer in Mind-Body Medicine at Harvard Medical School, Dr. Herbert Benson. In simple terms, the Relaxation Response is the opposite of fight-or-flight. The fact that such a response exists should get us super excited. We don’t have to be controlled by stress, fear, and anxiety. The Relaxation Response, accomplished through controlled breathing, can help mitigate FoF. In science-y terms, the Relaxation Response activates the para-sympathetic (pronounced like ‘parachute’) nervous system or PNS. The PNS is – you got it – the opposite of the autonomic nervous system (ANS)! The PNS is what enables the Relaxation Response. While the ANS is referred to as the “fight-or-flight” system, the PNS is sometimes referred to as the “rest-and-digest” system. Controlled breathing = PNS activation = Relaxation Response (= Bliss!) Here are three ways to activate the body’s PNS through controlled breathing: The first is called Coherent Breathing, and here’s how to do it: Sitting upright or lying down, place your hands on your belly. Slowly breathe in, expanding your belly, to the count of five. Slowly breathe out to the count of six. Try and work your way up to 10-20 minutes a day. The second controlled breathing method is Core Breathing: Sit up straight on at the edge or your chair or on the floor. Place your hands on your belly. As you inhale, lean forward and expand your belly. As you exhale, squeeze the breath out, curling forward. Exhale until you are out of breath. Repeat 15-20 times. The third and final method is the ‘HA!’ technique: Stand up straight, elbows bent at a 90-degree angle, and palms up. While inhaling fully, draw your elbows back behind you, keeping your palms up. Exhale quickly, thrusting your palms forward and turning them downward; say (or mouth) the word ‘HA!’ Quickly repeat 15-20 times. Enjoy your inner peace!
<urn:uuid:dd4f9810-9bb3-477c-bafd-5667b6fb01c3>
CC-MAIN-2019-35
https://www.powerofpositivity.com/benefits-control-your-breathing/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314752.21/warc/CC-MAIN-20190819134354-20190819160354-00139.warc.gz
en
0.937389
1,234
2.984375
3
We Shall Overcome. Booklet cover from the March on Washington for Jobs and Freedom, August 28, 1963. Select the link for more information. Prints and Photographs LC-USZC4-6525. African American civil rights efforts made gradual progress in the early twentieth century. Before World War II President Roosevelt's administration, pressured by the National Association for the Advancement of Colored People, succeeded in passing a law ordering corporations to desegregate, but enforcement of the law was a problem. During the war, the Army remained segregated. So during the 1950s frustrated African Americans stepped up their efforts in demanding desegregation and the enforcement of laws that guaranteed equal voting rights. The largely northern folk song revival's interest in the songs of African Americans in the south led to awareness among affluent young white Americans of these issues. Spirituals, blues, and Gospel music provided the basis for many of the songs created by African Americans themselves, which became part of the Civil Rights Movement of the 1960s, as well as young people from the north who went to the south to aid the movement. Some spirituals needed little or no changes in their lyrics to be used as inspiration for the movement, such as "This Little Light of Mine" (sung in this example by Doris McMurray on an ethnographic field recording made by John and Ruby Lomax in 1939) and "Nobody Knows the Trouble I've Seen" (performed on this recording by Marian Anderson in 1924). Songs were also used to bring in money for the movement at fund raisers featuring leaders of the movement, such as Rev. Martin Luther King. This presentation also includes a performance of songs from the Civil Rights era from the Washington, DC-based sextet Reverb, consisting of Steve Langley, Victor Pinkney, Chris Hunter, Troy Edler, Kevin Owens, and Jason Deering. The Civil Rights songs performed on this webcast are "Freedom Land" (timecode 00:05:20); "Lift Ev'ry Voice and Sing" (timecode 00:08:55); "Ain't Going to Let Nobody Turn Me Round" (timecode 00:11:20); "Oh, Freedom" (timecode 00:16:00); "I Woke Up This Morning with my Mind on Freedom" (timecode 00:18:30 ); and "Dog, Dog," a song with humorous lyrics that encourages people to along (timecode 00:24:45). The group also sings a modern protest song calling attention to the plight of the poor, "In This Land," composed by group member Steve Langley (timecode 55:15) and contemoporary songs commemorating the contribution of African American soldiers to American history and the difficulty of making their service more widely known: "Tuskegee Airmen," by Bruce O'Neal (timecode 00:35:55) and "Buffalo Soldier," (no composer announced, timecode 50:35:00). - "African American Song" (Songs of America) - "African American Gospel" (Songs of America) - "African American Spirituals" (Songs of America) - "Blues as Protest" (Songs of America) - "The Chicano Civil Rights Movement," (Songs of America) - The Civil Rights Era," Library of Congress. This page forms part of the online exhibit African American Odyssey. - Civil Rights History Project, Library of Congress. This presentation includes interviews with singers Candie and Guy Carawan, Dorothy Cotton, Jamila Jones, and Pete Seeger, as well as interviews with other activists who describe the use of song in the Civil Rights Movement. A resource list of Library of Congress collections, web resources, books, and videos that relate to the movement is also available. - "Making a Way Out of No Way: Martin Luther King's Use of Proverbs for Civil Rights," presented by Wolfgang Mieder, University of Vermont. Library of Congress, February 10, 2011. This talk is related to Mieder's book, "Making a Way Out of No Way": Martin Luther King's Sermonic Proverbial Rhetoric, 2010. - "Songs Related to the Abolition of Slavery" (Songs of America) - "Songs of Social Change" (Songs of America) - Stewart, Kate, 2013. "Tracing the Long Journey of 'We Shall Overcome.'" In Folklife Today. Library of Congress. The essay includes interviews with Jamila Jones and Pete Seeger. - We Had Sneakers, They Had Guns: The Kids Who Fought for Civil Rights in Mississippi, a book talk presented by illustrator and journalist Tracy Sugarman. May 15, 2009.
<urn:uuid:de2f4a86-3aae-4594-a06f-0f2ef65ece3f>
CC-MAIN-2015-11
http://loc.gov/item/ihas.200197396
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00312-ip-10-28-5-156.ec2.internal.warc.gz
en
0.943944
984
2.703125
3
By Mike CollettThe world’s second-largest freshwater lake has become the world, thanks to an eagle river. Gulf of Alaska’s Eagle River was first recorded in the 1880s, and in 1900, the U.S. Geological Survey reported that it was one of the largest rivers in the world. In 2002, scientists from the U,S. Army Corps of Engineers reported that the Eagle River flows at about 20 feet per second and flows at the same speed through the world of alpine lakes. In 2011, scientists in the United Kingdom estimated that the river was about 50 feet deep. Now, with a new study published in the journal Nature Geoscience, the Eagle is once again considered the world champion. The researchers measured the Eagle’s speed at different locations in the northern portion of the lake. The scientists used data collected in 2001 by the U-M Alaska Institute of Science’s Geophysical Fluid Dynamics Laboratory and its Advanced Water Reclamation and Monitoring Experiment to determine how fast the Eagle flows in the spring and fall. According to the authors, the speed of the Eagle has increased since 2003, when it was reported to flow at about 6.2 feet per minute. The Eagle is also reported to be more active in the fall than in the summer. The study found that the rate of water movement has increased in the Eagle since 2004, but not by nearly as much as it did in the late 1980s. According to the researchers, the rate is not that much different in the two years. But, this time, the researchers did find that the springtime rate has increased significantly. They also found that in the last decade, the spring rate has decreased by 30 percent. The Eagle River is one of five lakes in the Gila National Forest, which sits in Alaska’s northwest corner. The other lakes are the Tumwater, Eagle and Kettle lakes, and the Tofino, Alaska, lakes.
<urn:uuid:abfebb3a-2891-4d3d-959c-8a0b5a9d229d>
CC-MAIN-2022-21
https://angoonairporteis.com/2021/09/26/how-the-eagle-river-in-alaska-became-the-worlds-largest-freshwater-lake/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662601401.72/warc/CC-MAIN-20220526035036-20220526065036-00289.warc.gz
en
0.969153
413
3.4375
3
Red Meat Consumption Likely to Get Dietary Nod Following Insufficient Documentation in Disease Contribution In America, for a very long time, physicians and health experts are restricting red meat consumption. Read meat is basically pork and beef. According to researchers, these meat types are leading to cancer and heart failure as well as other dangerous ailments. Recently, some researchers are challenging this popular belief. Hence, they are demonstrating supporting documents and studies to judge the effects of red meat in causing diseases. Additionally, they are also saying that the benefits of eating less red meat are very few. Hence, there is hardly any need to reduce red meat consumption to improve health. Hence, researchers are saying that all the previous documents are not sufficient enough. Therefore, they are strongly questioning restrictions on meat eating. Additionally, the number of such researches is also very low. Mr. Bradley Johnston is working in the Epidemiology department of the University of Canada. He is also strongly refusing this noting of stopping red meat consumption. Therefore, several researchers like him are expressing their doubts on red meat consumption. However, several dietitians are nor believing in this new analysis. They are having problems with various changes that these new analysis reports are suggesting. Several dietitians and researchers are also questioning these new documents. Some of the strongest rejections are coming from notable institutions. Some scientists from renowned institutions are requesting to hold these new publications for some time. Institutions who are supporting plant-based food are fiercely condemning the new analysis. Hence these institutions are also filing complaints about the flaws of this analysis. But, on the flip side, fans of protein-based diets are supporting the findings. Hence, they are quite impressed with new developments and are also favoring evaluations of salts, carbs and other nutrients. However, as more and more people are becoming aware of animal welfare, it is likely that red meat consumption will not remain as popular as expected.
<urn:uuid:15b95ceb-9eb4-4827-8a18-866613ced669>
CC-MAIN-2019-43
https://www.theindustryjournal.com/red-meat-consumption-likely-to-get-dietary-nod-following-insufficient-documentation-in-disease-contribution/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986676227.57/warc/CC-MAIN-20191017200101-20191017223601-00409.warc.gz
en
0.976674
389
2.828125
3
Posted on 2020-03-30, by elegance. Artificial Intelligence Music Creation & Remixing 2020 | Udemy English | Size: 732.32 MB What you'll learn Be able to compose new music with using Artificial Intelligence (AI) technology tools Be able to remix their own created music with using Artificial Intelligence (AI) technology tools Learn to find creative-commons music online for commercial use Learn to find ambient backgrounds and atmospheric music sounds for any creative projects Know how to make music videos with automated Artificial Intelligence technology Discover how to create and generate album art for your music tracks in minutes Giant Tech firms have developed AI software that can compose music on its own. So, the machines will be composing soundtracks using Artificial Intelligence. This game-changing course introduces you to new-age technologies in Artificial Intelligence music creation to help you become a music star in no time with the power of automagical music-making tools. Why learn this music course and how is this a differentiator for music creators in 2020? This course can change your life if you are a music composer. Because, we will tell you the most popular Artificial Intelligence Music Creation tools that can help you compose music tracks without you - having any music knowledge whatsoever. We will also detail about the latest discovery tools in Music Mashups and also we will go through the complete tutorial of Adobe Amper and Jukedeck - great AI music assistants. Welcome to the future as you will be able to know the chords behind every song and just hum to create music like popular artists. I meant - You can just hum to create songs in the style of the great artists. The question is "Are you ready to get into action and embrace the power to leverage artificial intelligence in music creation in 2020?". If yes, plunge into action right away by signing up NOW. There's no time to waste. A mind-blowing experience is in store for you this moment. #Music #CreationofMusic #ArtificialIntelligence #AIMusic Who this course is for: This course is a must for professionals who are in the music industry who want to use Artificial Intelligence (AI) technology for music composition This course is for anyone who is passionate about learning music and looking to create the same with Artificial Intelligence Technology This course is for anyone who is looking to upload unique and new music created with artificial intelligence technology on video platforms like YouTube for earnings Buy Premium Account From Following Download Links & Get Fastest Speed Links are Interchangeable - No Password - Single Extraction - Ebooks list page : 43114 - 2019-12-01Artificial Intelligence Music Creation & Remixing 2020 - 2019-05-28Artificial Intelligence Music Creation & Remixing 2019 - 2019-03-10Artificial Intelligence Music Creation & Remixing 2018 - 2019-03-02Artificial Intelligence Music Creation & Remixing 2018 - 2019-02-12Artificial Intelligence Music Creation & Remixing 2018 - 2018-11-16Artificial Intelligence Music Creation & Remixing 2018 - 2018-09-27Artificial Intelligence Music Creation & Remixing 2018 - 2018-09-20Artificial Intelligence Music Creation & Remixing 2018 - 2021-07-13Udemy Artificial Intelligence Music Creation and Remixing 2020 TUTORiAL-ADSR - 2021-06-26Udemy Artificial Intelligence Music Creation and Remixing 2020 TUTORiAL-ADSR - 2021-06-24Udemy Artificial Intelligence Music Creation and Remixing 2020 TUTORiAL-ADSR - 2021-06-23Udemy Artificial Intelligence Music Creation and Remixing 2020 TUTORiAL-ADSR - 2021-06-21Udemy Artificial Intelligence Music Creation and Remixing 2020 TUTORiAL-ADSR - 2021-07-12UDEMY ARTIFICIAL INTELLIGENCE MUSIC CREATION AND REMIXING 2018 TUTORIAL-H0WT0 - 2021-06-30UDEMY ARTIFICIAL INTELLIGENCE MUSIC CREATION AND REMIXING 2018 TUTORIAL-H0WT0 - 2019-04-07Udemy Artificial Intelligence Music Creation And Remixing 2018 Tutorial Adsr - 2019-03-01Udemy Artificial Intelligence Music Creation and Remixing 2018 TUTORiAL - 2019-01-25Udemy Artificial Intelligence Music Creation and Remixing 2018 TUTORiAL-ADSR - 2018-12-01Udemy Artificial Intelligence Music Creation and Remixing 2018 TUTORiAL - Download links and password may be in the description section, read description carefully! - Do a search to find mirrors if no download links or dead links.
<urn:uuid:f138e095-43b2-4aff-9bc3-72e7f875fcf0>
CC-MAIN-2021-31
https://www.ebookee.net/Artificial-Intelligence-Music-Creation-Remixing-2020-Udemy_4311337.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150266.65/warc/CC-MAIN-20210724125655-20210724155655-00029.warc.gz
en
0.745529
997
2.625
3
Think a minute…It’s truly amazing how the Jewish people have survived after thousands of years of being slaves, persecuted, and even attempted genocide when Hitler’s Nazi’s murdered 6 million Jews! That’s why in 1934, Germany was the wrong place to be a Jew. When Hitler’s teenage gangs took over his village the little Jewish boy, Heinz, was just 11 years old. Heinz’s parents taught their children how important it was to learn self-control. With the Nazi gangs terrorizing their village on the streets daily, Heinz’s parents knew that just one moment of losing control of their anger against their Nazi rulers could mean the death of their family. So Heinz learned to stay out of their way, sometimes crossing the street or taking a different road home. But one day, young Heinz was finally cornered by one of Hitler’s bullies. For the first time, Heinz was forced to talk to a Nazi youth. But by staying calm and carefully choosing his words, Heinz surprised even himself when he talked his way out of trouble and convinced this bully not to hurt him but to let him go. That day, Heinz discovered his survival skill of talking and reasoning with others. It was a major turning point that changed his life—and later changed the world. After a few years, Heinz’s family escaped from Germany and moved to America. But Heinz never forgot how to talk with people and help bring peace between enemies. You see, that 11-year-old boy who had negotiated his first peace settlement with a Nazi bully, later became one of the greatest ambassadors of peace in the world. You’ve probably heard of him…not as Heinz…but by his American name: Henry Kissinger, the former U. S. Secretary of State. Think a Minute…
<urn:uuid:798c90d1-3c51-49ed-8cb0-70139e418403>
CC-MAIN-2021-25
https://www.samoaobserver.ws/category/article/21912
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488257796.77/warc/CC-MAIN-20210620205203-20210620235203-00598.warc.gz
en
0.987328
396
3.359375
3
Texas Department of Insurance History Links to History Documents - Commissioner as Statistician and Historian - Insurance and Banking Merged - Board of Insurance Commissioners Created - First Insurance Code Published - The State Board of Insurance Created - Landmarks in Texas Insurance History - Past Board Members and Commissioners - 1994-Present - Past Board Members and Commissioners - 1957-1993 - Past Board Members and Commissioners - 1930-1956 - Past Board Members and Commissioners - 1876-1930 The recorded history of insurance law in Texas and the predecessors of the Texas Department of Insurance date back to 1876 – the year Mark Twain published "The Adventures of Tom Sawyer" and Colorado became the 38th state. The constitution of Texas adopted that year authorized the Legislature to create the office of Insurance Commissioner when it deemed it necessary. Two years earlier, the state had made its first effort to regulate the insurance business in Texas. The state's economy and population were growing, and wildcat insurance schemes were common. The 14th Legislature in 1874 passed a law regulating the life and health insurance business in the areas of company formation, activities and coverage. The Legislature also gave the State Comptroller of Public Accounts supervisory authority over insurance – one of many duties imposed on him by statute. There was, however, no insurance department in existence at that time. In the early days of statehood, practically all insurance business in Texas was written by companies organized in other states and foreign countries. According to State Comptroller's records, out of 61 companies doing business in Texas in 1874, only four were domestic. Until the 1876 State Constitution was adopted, Texas insurance corporations were created by special act in the various state legislative sessions. These domestic companies ventured into the business – mostly fire and marine insurance – in competition with financially stronger and more experienced out-of-state companies. As a result, most of them either went bankrupt or had to be reinsured and taken over by their out-of-state counterparts.Return to Index Commissioner as Statistician and Historian When the 15th Legislature met in 1876, it took advantage of the authorization given to it by the 1876 constitution and created the Department of Insurance, Statistics and History. In addition to his insurance-related duties, the commissioner was charged with keeping information and statistics on the state's population, wealth and general resources. He also was the state historian. And to make sure that he would not waste his spare time, he was made state librarian and superintendent of public grounds and buildings, as well. About 10 years later, the office of the commissioner was expanded. In 1887, the 20th Legislature added agriculture to the commissioner's authority and renamed the agency the Department of Agriculture, Insurance, Statistics and History. The commissioner also was made an ex-officio member of the Texas A&M College Board of Directors. The business of insurance continued to grow at the turn of the century. By the end of 1900, 138 licensed and admitted insurance companies of all types operated in Texas and premium income on Texas companies reached almost $10 million. In subsequent years, the commissioner's authority continued to be revised by the Legislature. In 1905, the first state banking act was passed, adding the regulation and supervision of state banks to the office of the Commissioner of Agriculture, Insurance, Statistics and History.Return to Index Insurance and Banking Merged In 1907, the 30th Legislature created the office of Commissioner of Agriculture. All duties relating to agriculture were taken out of the old department, which was now renamed Department of Insurance and Banking. Interestingly, the law did not dispose of the functions dealing with statistics and history. Instead, they quietly faded out of the picture and were absorbed by the office of the State Librarian. Just two years later, in 1909, the Commissioner of Insurance and Banking was made chair of the newly created Fire Insurance Rating Board. The Board's primary responsibility was to prevent discrimination in rates. The commissioner also became supervisor of all "building and loan associations" in Texas. The first two commissioners of insurance and banking were attorneys with experience in both fields. Thomas B. Love would later serve in the State Senate and William E. Hawkins would later serve on the Supreme Court of Texas. According to historians, every Commissioner of Insurance and Banking after Hawkins was selected for his banking and not his insurance qualifications. The fire rating board was replaced by the State Insurance Board in 1910 and given authority to promulgate fire rates. The Board was composed of the Commissioner of Insurance and Banking – serving as chair of the Board – and two appointed members. One of these was designated State Fire Marshal. Just three years later, in 1913, the State Insurance Board's name was changed to the State Fire Insurance Commission and its authority broadened. All the while, insurance and banking functions were kept together under one agency, despite repeated urging by the commissioner dating back to 1914 to separate them into two new agencies. In 1923, the 38th Legislature finally made the change, creating the Department of Insurance and the Banking Department, each headed by a separate commissioner. Also in 1923, the Legislature transferred rate-making authority in the area of workers' compensation from the Texas Employer's Insurance Association (TEIA) – which was created as a result of the workers' compensation law passed in 1913 – to the State Fire Insurance Commission.Return to Index Board of Insurance Commissioners Created The 40th Legislature in 1927 passed an act creating the Board of Insurance Commissioners. The Board was composed of the Life Insurance Commissioner (also chairman of the Board), Fire Insurance Commissioner and Casualty Insurance Commissioner. The Legislature that year also gave the insurance commissioner the power to approve and disapprove auto insurance rates and to promulgate uniform policy forms. The Board's first chair, R. B. Cousins Jr., reflected on the previous separation of the Department of Insurance and the State Fire Insurance Commission: "The performance of the several duties of the two departments were so interdependent and inter-related that the effort to operate them as a unit resulted in considerable duplication of effort, working of cross-purposes, and lost motion."Return to Index First Insurance Code Published The next major landmark in the history of insurance regulation in Texas came in 1951, when insurance laws were codified into the Texas Insurance Code. The code retained a format consistent with early law, devoting separate chapters to specific kinds of companies. The insurance industry in Texas also was rocked by insolvency scandals in the 1950's. Twenty-three domestic companies were placed in receivership between 1954 and 1958. As a result, the Legislature passed at least 16 insurance-related bills, among them measures strengthening examination laws, increasing minimum capital and surplus requirements, and giving more control to the Board for the issuing of certificates of authority.Return to Index The State Board of Insurance Created In 1957, the State Board of Insurance was created by the 55th Legislature. The law stated that "the Board will operate as a unit with its members prohibited from dividing or confining their activities or functions into special fields of insurance regulation." It also set out minimum experience for Board members, minimum attendance at meetings, and prohibition of insurance interests while on the Board. The law stated the chair of the three-member Board would be designated by the Governor in January of odd-numbered years. The State Board of Insurance had the responsibility of hiring a Commissioner of Insurance, to serve at its pleasure as chief administrative officer. The Commissioner also served as State Fire Marshal until 1975, when the 64th Legislature created a separate State Fire Marshal's Office. Both the State Fire Marshal's Office and the Office of Consumer Protection (OCP) – created in 1987 by the 70th Legislature to represent consumer interests – became independent of the Board on September 1, 1991, as a result of legislation passed by the 72nd Legislature. OCP is now known as the Office of Public Insurance Counsel. The State Fire Marshal's Office was moved to the the Texas Commission on Fire Protection in 1991, but moved back to the Texas Department of Insurance in 1997. Under terms of sunset legislation passed by the 73rd Legislature in the spring of 1993, most of the Board's authority transferred on September 1, 1993, to a Commissioner appointed by the Governor for a two-year term in each odd-numbered year and confirmed by the Texas Senate. The new law permitted the Board to continue its authority over the areas of rates, policy forms and related matters until August 31, 1994. On November 18, 1993, however, the Board voted unanimously to turn over full authority to the Commissioner as of December 16, 1993.Return to Index For more information contact: Last updated: 10/05/2016
<urn:uuid:0b72ba33-6bd8-4d05-ae1b-3c54b8b1ed80>
CC-MAIN-2016-44
http://www.tdi.texas.gov/general/history.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720154.20/warc/CC-MAIN-20161020183840-00391-ip-10-171-6-4.ec2.internal.warc.gz
en
0.974171
1,776
2.703125
3
|Part of a series on| The gender of God can be viewed as a literal or as an allegorical aspect of a deity. In polytheistic religions, gods are more likely to have literal sexes which would enable them to interact with each other, and even with humans, in a sexual way. In most monotheistic religions, one cannot apply a gender to God in the usual sense, as God's attributes cannot be compared to those of any other being. Thus, the idea of a "divine gender" is ultimately considered an analogy, used by humans in order to better relate to the concept of God, with no sexual connotation. God is an intangible spirit in most religions and is therefore thought to have no gender. The preponderance of references to God in both the Old and New Testaments are in the context of a masculine reference, often "Father". However, there are a significant number of feminine allegorical references to God, most often in some maternal role. In the Hebrew and Christian Bible God is usually figuratively imagined in male terms in Biblical sources, with female analogy in Genesis 1:26-27, Psalm 123:2-3, and Luke 15:8-10; a mother in Deuteronomy 32:18, Isaiah 66:13, Isaiah 49:15, Isaiah 42:14, Psalm 131:2; and a mother hen in Matthew 23:37 and Luke 13:34. Michael Coogan offered his own interpretation of Genesis 1:26-27, according to which the verses say that the elohim were male and female, and humans were made in their image. This hints at the idea that Ancient Hebrews worshiped a godly pair, Yahweh and his wife Asherah, the word "elohim" originally meaning the Canaanite pantheon. Although the gender of God in Judaism is referred to in the Tanakh with masculine imagery and grammatical forms, traditional Jewish philosophy does not attribute the concept of sex to God. At times, Jewish aggadic literature and Jewish mysticism do treat God as gendered. The ways in which God is gendered have also changed across time, with some modern Jewish thinkers viewing God as outside of the gender binary. God the Son (Jesus Christ), having been incarnated as a human man, is clearly masculine. Classical western philosophy believes that God lacks a literal sex because it would be impossible for God to have a body (a prerequisite for sex). However, Classical western philosophy states that God should be referred to (in most contexts) as masculine by analogy. It justifies this by pointing to God's relationship with the world as begetter of the world and revelation (i.e. analogous to an active instead of receptive role in sexual intercourse). Others interpret God as neither male nor female. The Catechism of the Catholic Church #239 states that God is called "Father", while his love for man may also be depicted as motherhood, but he ultimately transcends the human concept of sex, and that "God is neither man nor woman: he is God". In contrast to most other Christian denominations, The Church of Jesus Christ of Latter-day Saints (LDS Church) teaches that God the Father, God the Son, and the Holy Spirit are physically distinct while being one in purpose. The LDS Church also teaches that God the Father is married to a divine woman, referred to as "Heavenly Mother". Humans are considered to be spirit children of these heavenly parents. Gender of the Holy Spirit The New Testament also refers to the Holy Spirit as masculine in a number of places, where the masculine Greek word "Paraclete" occurs, for "Comforter", most clearly in the Gospel of John, chapters 14 to 16. These texts were particularly significant when Christians were debating whether the New Testament teaches that the Holy Spirit is a fully divine person, or some kind of "force". All major English Bible translations have retained the masculine pronoun for the Spirit, as in John 16:13. Although it has been noted that in the original Greek, in some parts of John's Gospel, the neuter Greek word for "it" is also used for the Spirit. The oneness of God is of primary importance in the Quran and Islam. In Qur'an, Allah is most often referred to with the pronouns Hu or Huwa, and although these are commonly translated as him, they can also be translated gender-neutrally, as them. This is also true of the feminine equivalent, Hiya. Qur'an 112:3–4 states: "He begets not, nor is He begotten. And none is like Him [Them]." Other references include the first person pronoun, and the relative pronoun ma (that which), as in the phrase "the heavens and that which created them" (Qur'an 91:5). In Hinduism, there are diverse approaches to conceptualizing God and gender. Many Hindus focus upon impersonal Absolute (Brahman) which is genderless. Other Hindu traditions conceive God as androgynous (both female and male), alternatively as either male or female, while cherishing gender henotheism, that is without denying the existence of other Gods in either gender. The Shakti tradition conceives of God as a female. Other Bhakti traditions of Hinduism have both male and female gods. In ancient and medieval Indian mythology, each masculine deva of the Hindu pantheon is partnered with a feminine who is often a devi. The oldest of the Hindu scriptures is the Rigveda (2nd millennium BC). The first word of the Rigveda is the name Agni, the god of fire, to whom many of the vedic hymns are addressed, along with Indra the warrior. Agni and Indra are both male divinities. The Rigveda refers to a creator (Hiranyagarbha or Prajapati), distinct from Agni and Indra. This creator is identified with Brahma (not to be confused with Brahman, the first cause), born of Vishnu's navel, in later scriptures. Hiranyagarbha and Prajapati are male divinities, as is Brahma (who has a female consort, Saraswati). There are many other gods in the Rigveda. They are "not simple forces of nature", and possess "complex character and their own mythology". They include goddesses of water (Āpaḥ) and dawn (Uṣas), and the complementary pairing of Father Heaven and Mother Earth. However, they are all "subservient to the abstract, but active positive 'force of truth'" (Rta), "which pervades the universe and all actions of the gods and humans." This force is sometimes mediated or represented by moral gods (Āditya such as Varuṇa) or even Indra. The Āditya are male and Rta is personified as masculine in later scriptures (see also Dharma). While many Hindus focus upon God in the neutral form, Brahman being of neuter gender grammatically, there are prominent Hindu traditions that conceive God as female, even as the source of the male form of God, such as the Shakta denomination. Hinduism, especially of the Samkhya school, views the creation of the cosmos as the result of the play of two radically distinct principles: the feminine matter (Prakriti) and the masculine spirit (Purusha). Prakriti is the primordial matter which is present before the cosmos becomes manifest. Prakriti is seen as being "the power of nature, both animate and inanimate. As such, nature is seen as dynamic energy" (Rae, 1994). Prakriti is originally passive, immobile and pure potentiality by nature . Only through her contact with the kinetic Purusha she unfolds into the diverse forms before us. The idea of Prakriti/Purusha leads to the concept of the Divine Consort. Almost every deva of the Hindu pantheon has a feminine consort (devi). This section does not cite any sources. (May 2014) (Learn how and when to remove this template message) The Guru Granth consistently refers to God as "He" and "Father". However, it also says that God is indescribable. Thus, God in Sikhism has no gender. The Akal Purakh ("Timeless Being") is referred to as one of the gender, simply because the Granth is written in north Indian Indo-Aryan languages (mixture of Punjabi and dialects of Hindi) which have no neutral gender. It is described as energy that prevails throughout the universe. Animist religions are common among oral societies, many of which still exist in the 21st century. Typically, natural forces and shaman spiritual guides feature in these religions, rather than fully fledged personal divinities with established personalities. It is in polytheism that such deities are found. Animist religions often, but not always, attribute gender to spirits considered to permeate the world and its events. Polytheistic religions, however, almost always attribute gender to their gods, though a few notable divinities are associated with various forms of epicene characteristics—gods that manifest alternatingly as male and female, gods with one male and one female "face", and gods whose most distinctive characteristic is their unknown gender. Carol P. Christ is the author of the widely reprinted essay "Why Women Need the Goddess", which argues in favor of the concept of there having been an ancient religion of a supreme goddess. This essay was presented as the keynote address to an audience of over 500 at the "Great Goddess Re-emerging" conference at the University of Santa Cruz in the spring of 1978, and was first published in Heresies: The Great Goddess Issue (1978), pgs. 8-13. Carol P. Christ also co-edited the classic feminist religion anthologies Weaving the Visions: New Patterns in Feminist Spirituality (1989) and Womanspirit Rising (1979/1989); the latter included her essay Why Women Need the Goddess. - Gender and religion - Gender in Bible translation - God (male deity) - Goddess movement - "God Is a Girl" (2002) - "God Is a Woman" (2018) - Radha Krishna - Sky father - The Hebrew Goddess Notes and references - Elaine H. Pagels "What Became of God the Mother? Conflicting Images of God in Early Christianity" Archived 4 July 2015 at the Wayback Machine Signs, Vol. 2, No. 2 (Winter, 1976), pp. 293-303 - Coogan, Michael (October 2010). "6. Fire in Divine Loins: God's Wives in Myth and Metaphor". God and Sex. What the Bible Really Says (1st ed.). New York, Boston: Twelve. Hachette Book Group. p. 175. ISBN 978-0-446-54525-9. Retrieved 5 May 2011. humans are modeled on elohim, specifically in their sexual differences. - Coogan (2010:176) - Cf. Herzog, Ze'ev (29 October 1999). "Deconstructing the walls of Jericho". lib1.library.cornell.edu. Ha'aretz. Archived from the original on 10 November 2001. Retrieved 9 February 2019. - Article "Eloah" by Dennis Pardee in Karel van der Toorn; Bob Becking; Pieter van der Horst, eds. (1999). Dictionary of Deities and Demons in the Bible (2 ed.). p. 285. ASIN B00RWRAWY8.s.v. "Eloah" "The term expressing the simple notion of 'gods' in these texts is ilm...". - van der Toorn, Karel (1999). "God". In van der Toorn, Karel; Becking, Bob; van der Horst, Pieter (eds.). Dictionary of Deities and Demons in the Bible (2nd ed.). Brill. p. 360. ISBN 90-04-11119-0. - "G-d has no body, no genitalia, therefore the very idea that G-d is male or female is patently absurd. Although in the Talmudic part of the Torah and especially in Kabalah G-d is referred to under the name 'Sh'chinah' - which is feminine, this is only to accentuate the fact that all the creation and nature are actually in the receiving end in reference to the creator and as no part of the creation can perceive the Creator outside of nature, it is adequate to refer to the divine presence in feminine form. We refer to G-d using masculine terms simply for convenience's sake, because Hebrew has no neutral gender; G-d is no more male than a table is." Judaism 101. "The fact that we always refer to God as 'He' is also not meant to imply that the concept of sex or gender applies to God." Rabbi Aryeh Kaplan, The Aryeh Kaplan Reader, Mesorah Publications (1983), p. 144 - Grudem, Wayne A. 1994. Systematic Theology: An Introduction to Biblical Doctrine. Leicester, England: Inter-Varsity Press; Grand Rapids, MI: Zondervan. Page 226. - Herbermann, Charles, ed. (1913). Catholic Encyclopedia. New York: Robert Appleton Company. . - Aquinas, Thomas (1274). Summa Theologica. Part 1, Question 3, Article 1.CS1 maint: location (link) - of Hippo, Augustine (c. 397). Confessions. Book 7.CS1 maint: location (link) - Lang, David; Peter Kreeft (2002). Why Matter Matters: Philosophical and Scriptural Reflections on the Sacraments. Chapter Five: Why Male Priests?: Our Sunday Visitor. ISBN 978-1931709347. - Achtemeier, P; Longstaff (1996). Harper Collins Bible Dictionary. Harper Collins. pp. 377–378. ISBN 0-06-060037-3. - Wilson, H (January 2006). "Name and Gender of God". Archived from the original on 4 June 2009. Retrieved 14 August 2009. - David Bordwell, 2002, Catechism of the Catholic Church, Continuum International Publishing ISBN 978-0-86012-324-8 page 84 - "Deum humanam sexuum transcendere distinctionem. Ille nec vir est nec femina, Ille est Deus." From "Pater per Filium revelatus", Catechismus Catholicae Ecclesiae. (Citta del Vaticano: Libreria Editrice Vaticana, 1993): 1-2-1-1-2 ¶ 239. (Official English translation Archived 3 March 2013 at the Wayback Machine) - "Aaronic Priesthood Manual 3 – Lesson 1: The Godhead". LDS Church. 1995. - Cannon, Donald Q.; Dahl, Larry; Welch, John (January 1989). "The Restoration of Major Doctrines through Joseph Smith: The Godhead, Mankind, and Creation". Ensign. LDS Church. - Hinckley, Gordon B. (November 1991). "Daughters of God". Ensign. LDS Church. - First Presidency and Council of the Twelve Apostles (23 September 1995). "Gospel Topics – The Family: A Proclamation to the World". LDS.org. LDS Church. Retrieved 11 December 2013. See also: The Family: A Proclamation to the World - Nestle and others, Novum Testamentum Graece, 27th ed., (Stuttgart: Deutsche Bibelgeselschaft, 1993) - John Renard (1999), Responses to 101 Questions on Hinduism, Paulist, ISBN 978-0809138456, pages 74-76 - What is Hinduism?, p. PR17, at Google Books, Hinduism Today, Hawaii - The Concept of Shakti: Hinduism as a Liberating Force for Women - Michael Witzel, 'Autochthonous Aryans? The Evidence from Old Indian and Iranian Texts', Electronic Journal of Vedic Studies 7 (2001): 1–118. - "Religious theism which is central to Hinduism." Robert Lawson Slater, Review of Philip H. Ashby History and Future of Religious Thought: Christianity, Hinduism, Buddhism, Islam. Journal for the Scientific Study of Religion 4 (1964): 117–118. - "We are yet more strongly reminded by the two-fold nature of Phanes of the epicene god-heads, who occur frequently in the Babylonian pantheon." Gauranga Nath Banerjee, Hellenism in Ancient India, (Read Books, 2007), p. 304. - "per Carol P Christ biography for Signs Out of Time Project". - "Goddess Tours Greece-Sacred Sites Tour-Goddess Pilgrimage Crete". - Berke, Matthew. 'God and Gender in Judaism'. First Things 64 (1996): 33–38. - Dorff, Elliot N. Male and Female God Created Them: Equality with Distinction. University Papers. Los Angeles: University of Judaism, 1984, pp. 13–23. - Eller, Vernard. The Language of Canaan and the Grammar of Feminism. Grand Rapids, Michigan: William B Eerdmans Publishing Company, 1982. - Harlow, Jules. 'Feminist Linguistics and Jewish Liturgy'. Conservative Judaism 49 (1997): 3–25. - Johnson, Elizabeth. 'The Incomprehensibility of God and the Image of God Male and Female'. Theological Studies 45 (1984): 441–465. - Platinga, Alvin Carl. "God, Arguments for the Existence of". Routledge Encyclopedia of Philosophy. Routledge, 2000. - Swinburne, Richard G. "God". In Ted Honderich (ed.). The Oxford Companion to Philosophy. Oxford University Press, 1995. |Wikiquote has quotations related to: God|
<urn:uuid:0d53100c-7ea3-4c7e-9611-375cb2e64f62>
CC-MAIN-2020-10
https://www.wikiyy.com/en/Gender_of_God
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144429.5/warc/CC-MAIN-20200219214816-20200220004816-00337.warc.gz
en
0.906122
3,809
3.203125
3
ACYCLOVIR SODIUM FOR INJECTION Action And Clinical Pharmacology: Acyclovir, a synthetic acyclic purine nucleoside analog, is a substrate with a high degree of specificity for herpes simplex and varicella-zoster-specified thymidine kinase. Acyclovir is a poor substrate for host cell-specified thymidine kinase. Herpes simplex and varicella-zoster-specified thymidine kinase transform acyclovir to its monophosphate which is then transformed by a number of cellular enzymes to acyclovir diphosphate and acyclovir triphosphate. Acyclovir triphosphate is both an inhibitor of, and a substrate for, herpes virus-specified DNA polymerase. Although the cellular a-DNA polymerase in infected cells may also be inhibited by acyclovir triphosphate, this occurs only at concentrations of acyclovir triphosphate which are higher than those which inhibit the herpes virus-specified DNA polymerase. Acyclovir is selectively converted to its active form in herpes virus-infected cells and is thus preferentially taken up by these cells. Acyclovir has demonstrated a very much lower toxic potential in vitro for normal uninfected cells because: 1 ) less is taken up; 2) less is converted to the active form; 3) cellular a-DNA polymerase has a lower sensitivity to the action of the active form of the drug. A combination of the thymidine kinase specificity, inhibition of DNA polymerase and premature termination of DNA synthesis results in inhibition of herpesvirus replication. No effect on latent non-replicating virus has been demonstrated. Inhibition of the virus reduces the period of viral shedding, limits the degree of spread and level of pathology, and thereby facilitates healing. During suppression there is no evidence that acyclovir prevents neural migration of the virus. It aborts episodes of recurrent herpes due to inhibition of viral replication following reactivation. Pharmacokinetics: The pharmacokinetics of acyclovir has been evaluated in 95 patients (9 studies). Results were obtained in adult patients with normal renal function during Phase l/ll studies after single doses ranging from 0.5 to 15 mg/kg and after multiple doses ranging from 2.5 to 15 mg/kg every 8 hours. Pharmacokinetics was also determined in pediatric patients with normal renal function ranging in age from 1 to 17 years at doses of 250 mg/mor 500 mg/mevery 8 hours. In these studies, dose-independent pharmacokinetics is observed in the range of 0.5 to 15 mg/kg. Proportionality between dose and plasma levels is seen after single doses or at steady state after multiple dosing. Renal excretion of unchanged drug by glomerular filtration and tubular secretion is the major route of acyclovir elimination, accounting for 62 to 91% of the dose administered. The half-life and total body clearance of acyclovir in pediatric patients over 1 year of age is similar to those in adults with normal renal function. Indications And Clinical Uses: For the treatment of initial and recurrent mucosal and cutaneous herpes simplex (HSV-1 and HSV-2) infections and varicella zoster (shingles) infections in immunocompromised adults and children. It is also indicated for severe initial episodes of herpes simplex infections in patients who may not be immunocompromised. Use in other herpes group infections is the subject of ongoing study. The indications are based on the results of a number of double-blind, placebo-controlled studies which examined changes in virus excretion, total healing of lesions, and relief of pain. Because of the wide biological variations inherent in herpes simplex infections, the following summary is presented merely to illustrate the spectrum of responses observed to date. As in the treatment of any infectious disease, the best response may be expected when the therapy is begun at the earliest possible moment. Herpes Simplex Infections in Immunocompromised Patients: A multicenter trial of acyclovir sodium sterile powder at a dose of 250 mg/m(acyclovir) every 8 hours infused over 1 hour (750 mg/mday) for 7 days was conducted in 98 immunocompromised patients with orofacial, esophageal, genital and other localized infections (52 treated with acyclovir and 46 with placebo). Acyclovir significantly decreased virus excretion, reduced pain, and promoted scabbing and rapid healing of lesions. Initial Episodes of Herpes Genitalis: A controlled trial was conducted in 28 patients with initial severe episodes of herpes genitalis with an acyclovir dosage of 5 mg/kg, infused over 1 hour, every 8 hours for 5 days (12 patients with acyclovir and 16 with placebo). Significant treatment effects were seen in elimination of virus from lesions and in reduction of healing times. In a similar study, 15 patients with initial episodes of genital herpes were treated with acyclovir 5 mg/kg, infused over 1 hour, every 8 hours for 5 days and 15 with placebo. Acyclovir decreased the duration of viral excretion, new lesion formation, duration of vesicles and promoted more rapid healing of all lesions. Varicella Zoster Infections in Immunocompromised Patients: A multicenter trial of acyclovir for injection at a dose of 500 mg/mevery 8 hours for 7 days was conducted in immunocompromised patients with zoster infections (shingles). Ninety-four patients were evaluated (52 patients were treated with acyclovir and 42 with placebo). Acyclovir halted progression of infection as determined by significant reductions in cutaneous dissemination, visceral dissemination, or the proportion of patients deemed treatment failures. A comparative trial of acyclovir and vidarabine was conducted in 22 severely immunocompromised patients with zoster infections. Acyclovir was shown to be superior to vidarabine as demonstrated by significant differences in the time of new lesion formation, the time to pain reduction, the time to lesion crusting, the time to complete healing, the incidence of fever and the duration of positive viral cultures. In addition, cutaneous dissemination occurred in none of the 10 acyclovir recipients compared to 5 of the 10 vidarabine recipients who presented with localized dermatomal disease. Healing Process: Because complete re-epithelialization of herpes-disrupted integument necessitates recruitment of several complex repair mechanisms, the physician should be aware that the disappearance of visible lesions is somewhat variable and will occur later than the cessation of virus excretion. Diagnosis: Whereas cutaneous lesions associated with herpes simplex and varicella zoster infections are often pathognomonic, Tzanck smears prepared from lesion exudate or scrapings may assist in diagnosis. Positive cultures for herpes simplex virus offer the only absolute means for confirmation of the diagnosis. Appropriate examinations should be performed to rule out other sexually transmitted diseases. The Tzanck smear does not distinguish varicella-zoster from herpes simplex infections. Contra-Indications: For patients who have hypersensitivity to the drug. Manufacturers’ Warnings In Clinical States: Acyclovir sodium for injection is for slow i.v. infusion only. I.V. infusions must be given over a period of at least 1 hour to reduce the risk of renal tubular damage (see Precautions and Dosage). In severely immunocompromised patients, the physician should be aware that prolonged or repeated courses of acyclovir may result in selection of resistant viruses associated with infections which may not respond to continued acyclovir therapy. This, however, remains to be clearly established and should be considered as a factor when undertaking therapy. The effect of the use of acyclovir on the natural history of herpes simplex or varicella zoster infection is unknown. Precautions: Precipitation of acyclovir crystals in renal tubules can occur if maximum solubility (2.5 mg/mL at 37°C in water) is exceeded. This phenomenon is reflected by a rise in serum creatinine and blood urea nitrogen and a decrease in creatinine clearance. With sufficient renal tubular compromise, urine output decreases. Acute increases in serum creatinine and decreased creatinine clearance have been observed in humans receiving acyclovir sodium for injection who were pooly hydrated; or receiving concomitant nephrotoxic drugs (e.g., amphotericin B and aminoglycoside antibiotics); or had pre-existing renal compromise or damage; or had the dose administered by rapid i.v. injection (less than 10 minutes). Observed alterations in renal function have been transient, in some instances resolving spontaneously without change in acyclovir dosing regimen. In other instances, renal function improved following increased hydration, dosage adjustment, or discontinuation of acyclovir therapy. Administration of acyclovir by i.v. infusion must be accompanied by adequate hydration. Since maximum urine concentration occurs within the first 2 hours following infusion, particular attention should be given to establishing sufficient urine flow during that period in order to prevent precipitation in renal tubules. Recommended urine output is ³500 mL/g of drug infused. When dosage adjustments are required they should be based on estimated creatinine clearance (see Dosage). Approximately 1% of patients receiving i.v. acyclovir have manifested encephalopathic changes characterized by either lethargy, obtundation, tremors, confusion, hallucinations, agitation, seizures or coma. Acyclovir should be used with caution in those patients who have underlying neurologic abnormalities and those with serious renal, hepatic, or electrolyte abnormalities or significant hypoxia. It should also be used with caution in patients who have manifested prior neurologic reactions to cytotoxic drugs or those receiving concomitant intrathecal methotrexate or interferon. Lactation : Acyclovir is excreted in human milk. Caution should therefore be exercised when acyclovir is administered to a nursing mother. Pregnancy : Teratology studies carried out to date in animals have been negative in general. However, in a non-standard test in rats, there were fetal abnormalities such as head and tail anomalies, and maternal toxicity; since such studies are not always predictive of human response, acyclovir should not be used during pregnancy unless the physician feels the potential benefit justifies the risk of possible harm to the fetus. The potential for high concentrations of acyclovir to cause chromosome breaks in vitro should be taken into consideration in making this decision. No data exist at this time that demonstrate that the use of acyclovir will prevent transmission of herpes simplex infection to other persons. Consideration should be given to an alternative treatment regimen if after 5 days of treatment there is no expected clinical improvement in the signs and symptoms of the infection. Strains of herpes simplex virus which are less susceptible to acyclovir have been isolated from herpes lesions and have also emerged during i.v. treatment with acyclovir. Drug Interactions: Co-administration of probenecid with i.v. acyclovir has been shown to increase the mean half-life and the area under the concentration-time curve. Urinary excretion and renal clearance were correspondingly reduced. Please refer to the product monographs of zidovudine, cyclosporine, methotrexate sodium, diltiazem HCl, and netilmycin sulfate for other potential drug interactions. Adverse Reactions: The adverse reactions listed below have been observed in controlled and uncontrolled clinical trials in approximately 700 patients who received acyclovir at sl5 mg/kg (250 mg/m and approximately 200 patients who received sl10 mg/kg (500 mg/m. The most frequent adverse reactions reported during acyclovir administration were inflammation or phlebitis at the injection site in approximately 9% of the patients, and transient elevations of serum creatinine or BUN in 5 to 10% [the higher incidence occurred usually following rapid (less than 10 minutes) i.v. infusion]. Nausea and/or vomiting occurred in approximately 7% of the patients (the majority occurring in nonhospitalized patients who received 10 mg/kg). Itching, rash or hives occurred in approximately 2% of patients. Elevation of transaminases occurred in 1 to 2% of patients. Approximately 1% of patients receiving i.v. acyclovir have manifested encephalopathic changes characterized by either lethargy, obtundation, tremors, confusion, hallucinations, agitation, seizures or coma (see Precautions). Adverse reactions which occurred at a frequency of less than 1% and which were probably or possibly related to i.v. acyclovir administration were: anemia, anuria, hematuria, hypotension, edema, anorexia, lightheadedness, thirst, headache, diaphoresis, fever, neutropenia, thrombocytopenia, abnormal urinalysis (characterized by an increase in formed elements in urine sediment) and pain on urination. Other reactions have been reported with a frequency of less than 1% in patients receiving acyclovir, but a causal relationship between acyclovir and the reaction could not be determined. These include pulmonary edema with cardiac tamponade, abdominal pain, chest pain, thrombocytosis, leukocytosis, neutrophilia, ischemia of digits, hypokalemia, purpura fulminans, pressure on urination, hemoglobinemia and rigors. Symptoms And Treatment Of Overdose: Symptoms and Treatment: Overdose has been reported following administration of bolus injections, or inappropriately high doses, and in patients whose fluid and electrolyte balance was not properly monitored. This has resulted in elevations in BUN, serum creatinine and subsequent renal failure. Lethargy, convulsions and coma have been reported rarely. Precipitation of acyclovir in renal tubules may occur when the solubility (2.5 mg/mL) in the intratubular fluid is exceeded (see Precautions). A 6-hour hemodialysis results in a 60% decrease in plasma acyclovir concentration. Data concerning peritoneal dialysis are incomplete but indicate that this method may be significantly less efficient in removing acyclovir from the blood. In the event of acute renal failure and anuria, the patient may benefit from hemodialysis until renal function is restored (see Dosage). Dosage And Administration: Caution: Acyclovir sodium for injection for slow i.v. infusion only, over a period of at least 1 hour. Herpes Simplex Infections: Mucosal and Cutaneous Herpes Simplex (HSV-1 and HSV-2) in Immunocompromised Patients: Adults: 5 mg/kg infused at a constant rate over at least 1 hour, every 8 hours for 7 days in adult patients with normal renal function. Children: In children under 12 years of age, equivalent plasma concentrations are attained by infusing 250 mg/mat a constant rate over at least 1 hour, every 8 hours for 7 days. Severe Initial Clinical Episodes of Herpes Genitalis in Immunocompetent Patients: The same dose given above-administered for 5 days. Varicella Zoster Infections: Zoster in Immunocompromised Patients: Adults: 10 mg/kg infused at a constant rate over at least 1 hour, every 8 hours for 7 days in adult patients with normal renal function. Children: In children under 12 years of age, equivalent plasma concentrations are attained by infusing 500 mg/mat a constant rate over at least 1 hour, every 8 hours for 7 days. Obese patients should be dosed at 10 mg/kg (Ideal Body Weight). A maximum dose equivalent to 500 mg/mevery 8 hours should not be exceeded for any patient. Patients with Acute or Chronic Renal Impairment: Use the recommended doses and method of administration; and adjust the dosing interval as indicated in Table I. Reconstituted Solutions: The reconsituted and diluted solution should be inspected visually for discoloration, haziness, particulate matter and leakage prior to administration. Discard unused portion. Solutions for Reconstitution: Sterile Water for Injection. Do not use Bacteriostatic Water for Injection which contains benzyl alcohol or parabens Diluted Solutions for I.V. Infusion: The calculated dose of the reconstituted solution should be removed and added to an appropriate i.v. solution listed below at a volume selected for administration during each 1-hour infusion. Infusion concentrations exceeding 10 mg/mL are not recommended. Since the vials do not contain any preservatives, any unused portion of the reconstituted solution should be discarded. Solutions for I.V. Infusion: 5% Dextrose Injection, 5% Dextrose and 0.9% Sodium Chloride Injection, 5% Dextrose and 0.2% Sodium Chloride Injection, Ringer’s Injection, Normal Saline Injection and Lactated Ringer’s Injection. Stability and Storage of Solution: Reconstituted solutions at a concentration of 50 mg/mL should be used within 24 hours if kept at room temperature. Refrigeration may result in the formation of a precipitate which will redissolve at room temperature. Once diluted, the admixtures are to be administered within 24 hours of the initial preparation. The admixtures are not to be refrigerated. Unused portions of the diluted solution should be discarded. Incompatibility: Acyclovir should not be added to biologic or colloidal fluids (e.g., blood products, protein hydrolysates or amino acids, fat emulsions). Availability And Storage: 500 mg: Each vial contains: acyclovir sodium equivalent to acyclovir 500 mg. Nonmedicinal ingredients: sodium hydroxide to adjust pH. Single use vials of 10 mL, boxes of 5. 1 g: Each vial contains: acyclovir sodium equivalent to acyclovir 1 g. Nonmedicinal ingredients: sodium hydroxide to adjust pH. Single use vials of 20 mL, boxes of 5. The pH of freshly reconstituted solution is approximately 11. Store between 15 and 25°C. ACYCLOVIR SODIUM FOR INJECTION Novopharm Antiviral
<urn:uuid:40e5b86b-41d0-4720-95a5-4e035ca6f5ef>
CC-MAIN-2018-34
https://www.rxmed.com/b.main/b2.pharmaceutical/b2.1.monographs/cps-_monographs/CPS-_(General_Monographs-_A)/ACYCLOVIR_SODIUM_FOR_INJECTION.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209856.3/warc/CC-MAIN-20180815024253-20180815044253-00671.warc.gz
en
0.910265
4,022
2.5625
3
(CBS) How much sleep should a child get every night? According to the latest review of a century's worth of sleep recommendations, that answer has changed over the years. But the study found one thing's for sure: Kids aren't getting as much shut-eye as experts recommend, but neither did their great grandparents. "We were surprised that over the last century, the actual amount of sleep that children are getting was consistently about 37 minutes less than what was recommended for them," study author Lisa Matricciani, a researcher at the University of South Australia in Adelaide, told MyHealthNewsDaily. For the study, published online in the Feb. 13 issue of Pediatrics, Australian researchers looked at 32 sets of sleep recommendations that were published between 1897 and 2009, and compared that information to studies and reports on the actual amount of time children slept. The researchers found that on average, children's sleep recommendations decreased at a rate of 0.71 minutes each year, and that decline was almost identical to the annul decline in the amount children slept (0.73 minutes each year). That means for over a century, children haven't slept as much as expert's recommended, despite the recommendations changing. In 1897, experts were recommending that children sleep one hour and fifteen minutes more than what's recommended in 2009. The study authors say sleep guidelines are more subjective than scientific. "Never trust sleep experts," senior study author Dr. Tim Olds, a professor of health sciences at the University of South Australia in Adelaide, told Time Healthland. Experts' and parents' concerns that kids are too stimulated by their surroundings to get enough sleep is nothing new, the study found, and dates back far to before video games existed. Whether it was books, radio, a new thing called television, or modern day cable, internet, and smart phones, experts blamed these advances for cutting into children's sleep. Olds Told HealthDay there probably isn't a sleep standard for kids. "One child may function best on seven hours, another on 11 hours," he said. Olds said just because a child sleeps late doesn't necessarily mean he's not sleeping enough. He compared sleeping to eating - people might eat when they're not hungry, just as they sleep when they're not tired. Dr. David Gozal, a childhood sleep expert at the University of Chicago told Reuters, "We need to do due diligence and do the nitty-gritty effort of measuring sleep in a large group of the population to find out what's normal. That has never been done." Not getting a good night's rest is linked to the development of several chronic diseases, including diabetes, cardiovascular disease, obesity, and depression, according to the CDC. If problems sleeping persist, see a doctor who is familiar with treating sleep disorders.
<urn:uuid:c02b44f0-cf7b-462d-b62d-fdafaa5a1977>
CC-MAIN-2015-48
http://www.wibw.com/home/nationalnews/headlines/Children-Never-Sleep-As-Much-As-Experts-Suggest-Study-Shows-165189576.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398457127.55/warc/CC-MAIN-20151124205417-00147-ip-10-71-132-137.ec2.internal.warc.gz
en
0.970372
576
2.921875
3
NASA will soon, finally, have a way to send its own people to space. And not just space: deep space. Yesterday NASA announced that it had decided to go full steam ahead with the proposed Space Launch System (SLS) program, a heavy-lift rocket designed to carry people, eventually, to Mars. The decision to move SLS from “formulation to development,” says NASA, is “something no other exploration class vehicle has achieved since the agency built the space shuttle.” It's not much of a secret that NASA, long the frontrunner in human spaceflight, has been in a bit of an awkward spot for the past few years. The retirement of the Space Shuttle program left NASA without a way to transport humans into near Earth orbit, leaving the entire American human spaceflight program susceptible to political whims and the progress of private contractors. But long before the Space Shuttle ever came and went, America's ability to send humans far out in to space took a blow. The cancellation of the Saturn V rocket program after the end of the Apollo missions left the U.S. without a heavy-lift rocket, something that could transport people beyond Earth orbit. In the mid-2000s NASA was working on the Constellation program to replace the Shuttle, but it was canceled because of budget problems. The newer SLS rocket was first announced back in 2011, but since then the design has been going through a thorough review process. With yesterday's approval, the rocket is now ready for its next steps. The first test flight, an unmanned mission, is slated for 2018. The SLS program is an important one for NASA, and for America, for more than one reason:
<urn:uuid:9fe59aef-f9e4-4443-b581-40519e5c46c4>
CC-MAIN-2017-47
https://www.smithsonianmag.com/smart-news/meet-newly-approved-rocket-will-take-people-mars-180952510/?utm_source=twitter.com&no-ist
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934803848.60/warc/CC-MAIN-20171117170336-20171117190336-00599.warc.gz
en
0.962428
349
3.078125
3
Hi Everyone! Welcome to Scratches on the Notepad! To get a detailed account of what this blog is about, click the “about this blog” button above. Thanks for visiting and please leave a comment! One of the most confusing things about university or college is that there seems to be a whole new set of vocabulary used. Tests aren’t tests, they’re “midterms”. Instructors are not the same as Professors while TA’s are definitely not lecturers. So what is what? Here is a list of words every incoming student should know before they start university. Terms in each group is ranked in the order of importance (although no group is more important than the others). Memorize this list – it will make your life much easier. List of Terms Every Student Should Know Before Starting University: Group A: People Group B: Courses Group C: First Year Specific Terms Group D: Miscellaneous Professors – Professors are not exactly the university equivalent of teachers. Most professors are P.I.’s (Principle Investigators) who have their own labs and do their own research. Typically, professors are paid to do 3 things: research, teach, and sit on committees. Although most professors are adequate teachers, some really dislike teaching (as they would rather do research) and others are not great at it despite their best efforts (because they have very little training). Professors can be further divided into several other subcategories: associate professors, assistant professors, and emeritus professors. However, different subcategories rarely affect undergraduate students. Instructors – An instructor’s role in university is like that of a high school teacher. Unlike professors, they are paid to teach and not do research (though some instructors do do some research). Instructors typically have at least a ph.D and many years of teaching experience. Therefore, their classes are usually excellent. Lecturers (otherwise known as sessional lecturers) – Lecturers are people hired specificially to teach certain courses. Their positions are usually not permanent and they don’t really do research. Their qualifications are about the same as Instructors. Teaching Assistants (TA’s) – TA’s are upper year undergraduate students or graduate students. They can teach classes or discussion groups, run or help out with labs, mark your assignments and exams, hold office hours, and run demonstrations and experiments. Students become TA’s to help pay for their education. Some TA’s are absolutely great and others could care less about what you do (both of which have their advantages and disadvantages). As well, which TA you get is up to chance, so cross your fingers (or switch classes)! Principle Investigators (P.I.’s) – Researchers who run their own labs. They usually have at least one graduate student working for them along with Post Doc’s, research associates, and undergraduate students. Each P.I. has a specific area of interest. The main objective of a P.I. is to find something new and amazing and publish that finding in a paper. Lab Directors – Lab Directors… direct labs. If you are taking a class with a lab component, these people are the ones who work out the logistics of fitting several thousand undergrad into their respective labs. They won’t be the ones teaching and you’ll probably never see them after lab check-in days. Nonetheless, they play an important role. Deans – A dean is the head of a faculty (or department) at university. They oversee the entire faculty and make some executive decisions. If, for example, you are failing multiple classes, you may get hauled up to the dean’s office. Advisors – There are faculty advisors (people who tell you what you need to do to graduate with a B.A. or B.Sc, or a B.F.A. etc.) and program advisors who tell you what you need to do to graduate with certain specializations (e.g. Major in Psychology, Honors Geology, Minor in English). There are all sorts of other adivisors, but they vary by school. Group B: Courses Midterm – Akin to a test in high school. Any exam (or test) that is not the final exam is a midterm, regardless of when during the academic term they actually happen. Midterms can be worth anywhere between 20 to 50% of the course mark. Finals – Final are final exams in any course. Depending on the length of the course (e.g. 1 semester of 1 year), they can happen in December or April. They are weighed heavily and can be worth up to 100% of the course mark. Quizzes – Are exactly the same as the ones in high school. Some quizzes are computer based. Quizzes in total rarely exceed more than 20% of the grade for any course. Assignments/Homework/Exercises – Questions and readings that may or may not need to be turned in. Most of the time, they do not have to be, but check with your professor/instructor/TA. Labs/Tutorials – For science courses, labs are where students perform experiments. Tutorials are where TA’s guide students through difficult topics, do some exam prep, or answer questions. Some tutorials are optional and their usefulness largely depends on the TA. Office Hours – Just about every professor, instructor, lecturer, and TA has office hours. This time, usually 1 or 2 hours per week, is reserved for students to ask questions, discuss issues, look over exams, and beg for extra marks (or perhaps not). This is a good time to get to know your professor better and hopefully get some hints for exams! Review Sessions – Before a midterm or final, professors will have review sessions in which they go over materials they have covered and take questions from students. Sometimes they give out extra questions people can try. If you can make these sessions, ALWAYS GO. Even if you don’t have any questions. That’s because professors give away a LOT of hints in these sessions. For example, a professor may have just finished writing the exam and he will give out questions which are similar to those on the exam. Other times, students will ask her a question she like so much that that question make it onto the exam. Even if those 2 things don’t happen, review sessions are a good way to consolidate your and help you figure out what topics you need to focus on more. Semester – Usually 4 months in length. Depending on the school, it can be one term or a fraction of a term (or session). Session – Can be synonymous to a semester. However, at some schools, the winter session is 8 months long and runs September to April (with the summer session running from May to August). In these schools, 1 semester would be half a session. The terms semester, session, and term are used interchangeably in some schools and their exact length can be very school-specific. Credit – A unit of exchange indicating how much a certain course is “worth”. For many schools, a course which runs for one semester is worth 3 credits, and a full “year” (2 semester) course is worth 6. Labs can be worth 1 or 2 However, this also varies by school. To graduate, students generally have to obtain a certain number of credits. Tuition is also often calculated on a per-credit basis. Faculty – A group of departments which focuses on one major topic. It is like an umbrella which encompasses a whole bunch of loosely connected topics. For example, the Faculty of Science, the Faculty of Arts, the Faculty of Law, and the Faculty of Music. Department – A division of a faculty. They are far more specific and is concerned with a narrower field. For example, the Department of Earth and Ocean Science, the Department of Economics, and the Department and Mechanical Engineering. Group C: First Year Specific Terms Orientation – An event, lasting anywhere between a few hours to a full week depending on the school, to welcome freshman students. Usually involving campus tours, meeting the professors/deans, pep rallies, and mini-competitions. Frosh or Frosh Week – Frosh is another word for a freshman student. However, when someone asks “are you going to frosh”, the word “frosh” actually means an event specifically for first year students. Frosh Week is a week-long event and can involve all sorts of crazy stunts probably not sanctioned by the university (i.e. dying each other purple, chucking paint balls, throwing rubber chickens, and stealing mascots). Frosh can be synonymous to orientation, be a part of orientation, or be completely separate from it. Not every school or faculty has frosh. Group D: Miscellaneous Clubs – Exactly the same as the ones in high school, except probably involving a lot more people. Fraternities/Sororities – A group of people sharing some common interest. Fraternities are male-only while sororities are female-only. Having never been in either, I can’t say I know too much about them. They do have a reputation for hosting drinking parties, but that is complete hearsay and I don’t actually know what they do. Did I miss any terms? Heard something somewhere and you’re not sure what it means? Leave a note in the comments 🙂
<urn:uuid:ce103ba4-ea1f-488f-bdd1-0ff387c3381b>
CC-MAIN-2017-30
https://scratchesonthenotepad.wordpress.com/2010/09/01/terms-every-student-should-know-before-starting-university/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424961.59/warc/CC-MAIN-20170725042318-20170725062318-00032.warc.gz
en
0.960892
2,000
3.015625
3
AS DESERT Uplands residents and the Bimblebox Nature Refuge sift through thousands of pages from Clive Palmer's Waratah Coal mine supplementary Environmental Impact Statement, their saviour could be a small bird. The $6 billion dollar project's existence relies on securing the "critical" coal reserves on the refuge. Without access to those reserves the coal mine is "unviable", the latest environmental report says. However, the same report warns Bimblebox "contains the last substantial population" of the endangered black-throated finch. The life of a species and a coal mine teeters on the edge of destruction and both rely on having access to the Bimblebox Nature Refuge. It is clear both cannot co-exist and share the 8000ha refuge. Clearing for the open-cut mine and its facilities at Bimblebox is estimated to be 4017ha and a further 3422ha will be affected by subsidence from underground mining. Co-owner of the refuge and local landowner Paola Cassoni is determined to preserve the priceless biodiversity she watches over. "I must protect what is irreplaceable," Paola said. "The future for myself, my family and my community is on the land. "I don't think communities should hold out hope for the economic saviour of mining because time and time again small communities are decimated." Bimblebox became a refuge in 2000 when state and federal governments agreed to protect it. The supplementary EIS is online at waratahcoal.com. Submissions close May 6.
<urn:uuid:c0218bf5-448b-4ce9-8ea7-29f980b3c93d>
CC-MAIN-2014-15
http://www.cqnews.com.au/news/small-bird-could-be-areas-saviour/1835278/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526252.40/warc/CC-MAIN-20140416005206-00003-ip-10-147-4-33.ec2.internal.warc.gz
en
0.936987
327
2.625
3
Treat boils that develop in buttock creases by applying warm compresses to the affected areas and allowing the pus to drain naturally, but severe or deep infections are likely to require medical treatment, explains Mayo Clinic. Medical treatments for boils include antibiotics and incision procedures in which the boil is surgically opened to encourage drainage.Continue Reading While small boils are generally not dangerous, persistent boils that are accompanied by fever, severe pain or swollen limbs require immediate medical attention, according to Healthline. People over age 65, children and people with organ transplants or compromised immune systems should also seek medical treatment if boils develop. In most cases, boils develop when bacteria enter the skin through small abrasions and make their way into the hair follicles, explains WebMD. As the infection progresses, the skin becomes inflamed, and a small bump develops. Within approximately seven days, pus develops on the tip of the boil and forms a white head. In certain cases, the surrounding lymph nodes may become swollen, and additional boils may develop. Following home or medical treatment, keep the affected area clean and covered to encourage healing. Reduce the risk of boils by properly treating skin wounds and maintaining proper hygiene.Learn more about Skin Conditions
<urn:uuid:03c629e6-1598-48e2-a6c6-11366a195270>
CC-MAIN-2017-09
https://www.reference.com/health/treat-boil-crease-buttocks-65e61604c48edb8c
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170521.30/warc/CC-MAIN-20170219104610-00361-ip-10-171-10-108.ec2.internal.warc.gz
en
0.941754
245
3.078125
3
EVERYMAN: The Miracle Play miracle play or mystery play,form of medieval drama that came from dramatization of the liturgy of the Roman Catholic Church. It developed from the 10th to the 16th cent., reaching its height in the 15th cent. The simple lyric character of the early texts, as shown in the Quem Quœritis, was enlarged by the addition of dialogue and dramatic action. Eventually the performance was moved to the churchyard and the marketplace. Rendered in Latin, the play was preceded by a prologue or by a herald who gave a synopsis and was closed by a herald’s salute. When a papal edict in 1210 forbade the clergy to act on a public stage, supervision and control of presenting the plays passed into the hands of the town guilds, and various changes ensued. The vernacular language replaced Latin, and scenes were inserted that were not from the Bible. The acting became more dramatic as characterization and detail became more important. Based on the Scriptures from the creation to the Second Coming and on the lives of the saints, the plays were arranged into cycles and were given on church festival days, particularly the feast of Corpus Christi, lasting from sunrise to sunset. Each guild was responsible for the production of a different episode. With simple costumes and props, guild members, who were paid actors, performed on stages equipped with wheels (see pageant); each scene was given at one public square and drawn on to its next performance at another, while a different stage succeeded it. Named after the towns in which they were performed, the principal English cycles are the York Plays (1430–40), the longest, containing 48 plays; the Towneley or Wakefield Plays (c.1450, in Yorkshire); the Coventry Plays (1468); and the Chester Plays (1475–1500). The Passion play is the chief modern example of the miracle play. The French mystère distinguished those plays containing biblical stories from those about the lives of the saints. The auto, the medieval religious drama in Spain, was acted concurrently with the secular drama throughout the Golden Age and into the 18th cent. Calderón was the greatest composer of the auto sacramental, which dealt with the mystery of the Mass in allegory. In Italy the laudi were basically choral in form and so distinguished from the later sacre rappresentazioni, which became lavish artistic productions comparable to the French mystère. See K. Young, The Drama of the Medieval Church (2 vol., 1933); and anthologies ed. by A. W. Pollard (8th ed. 1927) and V. F. Hopper and G. B. Lahey (1962).
<urn:uuid:50184398-80e9-4d4e-8774-2afb07ed644b>
CC-MAIN-2017-43
https://dyaus81.wordpress.com/2007/10/12/everyman-the-miracle-play/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823229.49/warc/CC-MAIN-20171019050401-20171019070401-00831.warc.gz
en
0.975544
563
3.234375
3
In Design Patterns, the Gang of Four describe the Template Method pattern. In this pattern, a base class method describes the structure of an algorithm or process and calls other methods for the steps. The base class can either force subclasses to implement the step methods or it can contain a default implementation that subclasses can choose to override if necessary. Consider a very simple unit testing framework. We might create TestCase subclasses with the name of the test method to Some subclasses might need to do some setup before running the test, or teardown afterwards. That’s easy enough to accomplish using This works, but is less than ideal. Every subclass that needs setup or teardown now has to override run and remember to call Subclasses that only need setup will have a different variant of run than subclasses that only need teardown. If we decide that we want to do extra work in run, then every subclass needs to be examined to make sure it still works with the new base class teardown should be called even if the test itself fails or raises an exception. Given the design above, we’d have to go through every subclass that implements teardown and change the Instead, we can refactor TestCase to use the Template Method With this version of TestCase, subclasses no longer have to override run. Instead, they just implement whichever of teardown they need. That’s less code to write, less duplication, and more flexibility for the base class. run method from By using the Template Method pattern, Minitest has been able to add more features in its run method without forcing all subclasses to be changed to accommodate the new features: - It handles the INFOsignal to print out information about which test is currently running. - It times each test so that it can provide timing information about the tests being run. - It captures exceptions in a uniform way and turns them into test failures. - It adds more hook methods to the test lifecycle ( The Template Method pattern works really well in concert with the Composed Method pattern. Template Methods should generally be written as Composed Methods. If you are working on a base class and you find that many of your subclasses are going to have to override the same method and call super, consider refactoring to the Template Method pattern instead.
<urn:uuid:6995d4b5-c057-4aac-b839-f8fae9c8d7a8>
CC-MAIN-2017-26
http://randycoulman.com/blog/2014/07/08/template-method-and-inheritance/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319912.4/warc/CC-MAIN-20170622220117-20170623000117-00412.warc.gz
en
0.889325
509
3.4375
3
What is the Orange County Charter? Orange County has what is called a home rule or charter form of government. The Charter is a constitution that sets up the county’s local government structure and function. The Charter Amendment questions and links to more information follow: Orange County Charter/Amendment 1 Local Method Filling Vacancies in Office of Commissioner and Mayor When Authorized Under Florida Law Orange County Charter/Amendment 2 County Charter Amendment Changing Due Date of Charter Review Commission’s Report Orange County Charter/Amendment 3 Effect Within Municipalities of County Ordinances Concerning Simulated Gambling or Gambling Orange County Charter/Amendment 4 County Charter Amendment Authorizing Designation of Unincorporated Villages and Creation of Village Advisory Boards Requiring County and Municipal Approval of Zoning or Comprehensive Plan Amendments Affecting Overcrowded Public Schools About the Orange County Charter Amendments and Special Referendum Who reviews the Charter? A 15-member board of Orange County citizens, appointed by the Board of County Commissioners, solicits public input in reviewing the Charter for proposed updates or improvements. A new review of the Charter is conducted every four years. How many proposed amendments are there this year? Four (4) , plus a special referendum. The first four are from the Charter Review Commission. The fifth is from the Board of County Commissioners. Who determines if a proposal becomes part of the Charter? You, the voters, do. Proposals will become part of the Charter only if they are approved by a majority of Orange County voters. Where will the proposals and special referendum be on the ballot? They follow the proposed amendments to the state Constitution and are identified as Question #1, Question #2, Question #3, Question #4 and Special Referendum. Note: This page pertains to Orange County Charter Amendments and Special Referendum.
<urn:uuid:04bd6962-0034-4486-b13d-f8ac9f0e6fa3>
CC-MAIN-2013-20
http://orangecandidates.com/candidates/orange-county-charterproposed-amendments/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703035278/warc/CC-MAIN-20130516111715-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.901881
396
2.734375
3
Globalization and Educational Rights: An Intercivilizational Analysis This is the first book to explore the meaning of equality and freedom of education in a global context and their relationship to the universal right to education. It also proposes evaluating school systems according to their achievement of equality and freedom. Education in the 21st century is widely viewed as a necessary condition for the promotion of human welfare, and thus identified as a basic human right. Educational rights are included in many national constitutions written since the global spread of human rights ideas after World War II. But as a global idea, the meaning of educational rights varies between civilizations. In this book, which builds on the concept of the universal right to education set forth in Spring's The Universal Right to Education: Justification, Definition, and Guidelines, his intercivilizational analysis of educational rights focuses on four of the world's major civilizations: Confucian, Islamic, Western, and Hindu. Spring begins by considering educational rights as part of the global flow of ideas and the global culture of schooling. He also considers the tension this generates within different civilizational traditions. Next, he proceeds to: *examine the meaning of educational rights in the Confucian tradition, in the recent history of China, and in the Chinese Constitution; *look at educational rights in the context of Islamic civilization and as presented in the constitutions of Islamic countries, including an analysis of the sharp contrast between the religious orientation of Islamic educational rights and those of China and the West; *explore the problems created by the Western natural rights tradition and the eventual acceptance of educational rights as represented in European constitutions, with a focus on the development and prominence given in the West to the relationship between schooling and equality of opportunity; and, *investigate the effect of global culture on India and the blend of Western and Hindu ideas in the Indian constitution, highlighting the obstacles to fulfillment of educational rights created by centuries of discrimination against women and lower castes. In his conclusion, Spring presents an educational rights statement based on his intercivilizational analysis and his examination of national constitutions. This statement is intended to serve as a model for the inclusion of educational rights in national constitutions. What people are saying - Write a review We haven't found any reviews in the usual places.
<urn:uuid:dc663262-89b2-46a9-b3e6-40afd612518b>
CC-MAIN-2014-42
http://books.google.com/books?id=3lobX1DC_i0C&pg=PA92
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637900185.53/warc/CC-MAIN-20141030025820-00102-ip-10-16-133-185.ec2.internal.warc.gz
en
0.961209
465
2.859375
3
The Spirit Lives On: St. Ignatius in Boston On display in the Ford Tower, courtesty of the John J. Burns Library of Rare Books and Special Collections, November 1, 2012 - January 15, 2013 Sponsored by Boston College University Libraries Born Inigo Lopez de Loyola (1491-1556), St. Ignatius developed the Spiritual Exercises, a month-long program of meditations, prayers, and contemplative practices. He was the founder and first leader of the Society of Jesus, a Catholic religious order dedicated to service through education and ministries. The Jesuits in New England faced opposition early on, but they were steadfast and earnest in their mission. Boston College – both in the early days and as the University we know today – represents the spirit of St. Ignatius. This Boston College Sesquicentennial exhibit highlights the early champions of the idea of a Jesuit college in Boston, books used in the Boston College 19th century curriculum, Catholic faith-focused student organizations, and the legacy of Boston College Jesuits. To learn more about the Society of Jesus and the Boston College Sesquicentennial, please consult:
<urn:uuid:2998b616-49bd-4232-9cdc-f537a556297f>
CC-MAIN-2014-52
http://www.bc.edu/libraries/about/exhibits/burns/spiritlives.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802767198.25/warc/CC-MAIN-20141217075247-00141-ip-10-231-17-201.ec2.internal.warc.gz
en
0.930719
241
2.640625
3
As water becomes increasingly precious in Colorado, there’s a growing need to keep track of every drop. That means more emphasis is being put on water accounting, the process of tracking and reporting water resources like water supply, stream flows, and water use. The Colorado Division of Water resources explains it this way: “Whether water is used simply to drink from your household tap or to irrigate hundreds of acres of cropland, everyone in Colorado benefits from the orderly distribution and management of the state’s most precious resource.” How is this orderly distribution and management achieved? Through water accounting and periodic reviews or audits. The words “accounting” and “audit” can cause anxiety, so it helps to generally understand water right accounting. Here are some considerations: - All new water court decrees require the submittal of water accounting to Colorado’s Division of Water Resources. For example, if a city wants to establish a new reservoir, or if a land owner wants to install a pond on their ranch, they must report to the state how and to what extent this is being done lawfully and without injuring other water users. Typically, sample accounting forms are included as an exhibit to the water court decree. This requirement applies to new water rights, changes of water rights, plans for augmentation, and exchanges. Substitution Water Supply Plans also require that accounting be conducted and submitted. - There are a very few exemptions from accounting requirements, but they do exist. If, for example, an agricultural ditch is only running agricultural water with no change in the usage, water accounting is typically not required (although diversion records are often required). - Water accounting is a perpetual obligation for most water users. The frequency you have to submit water accounting reports varies widely, from daily to annually, but most accounting calculations are now conducted on a daily basis. - Accounting requirements continue to become more detailed and stringent and can result in water users having to install more measuring and recording devices and devote more staff to collecting data and making it a part of the accounting. - Many of our clients have installed SCADA (Supervisory Control and Data Acquisition) or telemetry systems to help gather and transmit data from remote locations in order to reduce the effort and manpower required to collect the required information and keep track of water operations more closely. This provides a benefit, and along with the accounting, may indicate if there is a problem in the system such as a malfunctioning pressure transducer or a water leak. - The Division of Water Resources closely monitors accounting records and operations and sometimes goes through an audit or review process on each user's accounting forms. The audit/review helps to ensure that the accounting forms are adequate and/or that the operations are being properly recorded for the State's records. The audit/review may result in required or requested changes to the accounting forms and additional measuring requirements. The good news? You don’t have to handle water accounting alone! We have experts and technology to help simplify the water accounting process and avoid headaches. M&W staff can help by developing new accounting forms, modifying accounting for new or changed operations, conducting the actual daily accounting calculations including those for complicated systems with multiple structures and supplies, utilizing SCADA output to automate accounting operations, and help navigate the audit process with the State. Contact us to learn more.
<urn:uuid:b47dbe25-1ba9-4f65-b945-1643bafbd09b>
CC-MAIN-2018-47
http://www.martinandwood.com/blog/2018/2/12/every-drop-counts
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742666.36/warc/CC-MAIN-20181115095814-20181115121814-00391.warc.gz
en
0.946946
687
2.734375
3
Next up, ellipses. This test turns out much like the rectangle metric. A total of 100,000 objects of random size and color, in random positions on-screen, are rendered during this test. We alternate outline color, fill style, and fill color. As before, the random seed remains constant so that all test runs should produce the same graphics. And again, all ellipses are positioned within the confines of the display area to make clipping superfluous. GDI Functions Called Drawing ellipses directly to the display: Drawing ellipses via the DIB buffer: Drawing ellipses doesn't show the same severe performance impact as drawing rectangles. For direct writes, the two ATI cards are trounced by the Intel Atom/GMA 950 combination. And when it comes to buffered drawing, the test field hits a reasonable level of performance throughout. - Introduction: Why GDI Output For 2D Graphics Remains Relevant - The 2D GDI For Windows XP Through Windows 7, In Detail - 2D Graphics Output Using GDI: Direct Or Buffered? - The Radeon HD 5000's Symptoms And Their Relevance To Windows 7 - Tom2D: Our Simple 2D GDI Benchmark - Tom2D: Text Output - Tom2D: Line Output - Tom2D Splines/Bézier Curves - Tom2D: Polygons - Tom2D: Rectangles - Tom2D: Ellipses - Tom2D: Blitting - Tom2D: Stretching - UPDATE: ATI Steps Up With A Hotfixed Driver
<urn:uuid:c3b6d52e-a15f-414c-bf33-78b5191d74fd>
CC-MAIN-2014-23
http://www.tomshardware.com/reviews/2d-windows-gdi,2547-11.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776405824.29/warc/CC-MAIN-20140707234005-00076-ip-10-180-212-248.ec2.internal.warc.gz
en
0.742955
348
3.109375
3
|BERRES MARK E| Submitted to: Canadian Journal of Botany Publication Type: Peer Reviewed Journal Publication Acceptance Date: 7/10/1995 Publication Date: N/A Interpretive Summary: Rust fungi cause some of the most destructive diseases of small grain crops. Rust fungi are notorious for their ability to overcome resistant cereal varieties by evolving new pathogenic races. Understanding their genetics is one of the keys to learning how to better combat these important pathogens. Unfortunately, the unique biology of rust fungi makes them much more difficult than most fungi to study genetically. Knowledge gained from research on other fungi can accelerate progress in genetic studies of rust fungi if those fungi are closely related through common ancestry. We analyzed these evolutionary relationships among a diverse group of fungi including rust and smut fungi by comparing both molecular and morphological data. Our results show that the rusts are only distantly related to smut fungi. The use of molecular and morphological data complement each other and can be used in concert to identify characters that bias the results, such as characters that have evolved more than once. Technical Abstract: To obtain an understanding of the relationship of the basidiomycetes, especially those with horizontally partitioned metabasidis, and of the evolution of structural characters, members of nine orders and an additional four genera of simple septate fungi (Auriculariales sensu lato) were studied using cladistic analysis of light microscopic and ultrastructural characters. Comparisons were made with the nucleotide sequence from the 5' end of the nuclear large subunit ribosomal RNA gene analyzed with several algorithms, including parsimony and maximum likelihood. Morphological and molecular analyses support similar phylogenetic conclusions, but polarization of some morphological characters was difficult without guidance from molecular data. The Uredinales are shown to be an advanced taxon arising from the simple septate Auriculariales sensu lato, and some characters that they share with the ascomycetes result from convergent evolution. The simple septate Auriculariales consist of more than one clade, and the related gasteroid Pachnocybe ferruginea possesses numerous derived light microscopic characters, including holobasidia.
<urn:uuid:6c7058fc-8113-4d21-86ea-9aa043dd8124>
CC-MAIN-2023-50
https://www.ars.usda.gov/research/publications/publication/?seqNo115=42404
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100599.20/warc/CC-MAIN-20231206130723-20231206160723-00129.warc.gz
en
0.914248
463
3.046875
3
The Primary Emotion of Conflict In another blog, "Why Couples Keep Fighting," I wrote about the engine that drives couples' conflict: FEAR. - ...of being alone, abandoned, unlovable - ...of being unseen, invisible, insignificant - ...of being vulnerable, rejected, hurt - ...of the unknown or uncertainty Anger is the emotion that often does show up when couples fight, but is usually one that comes up AFTER the fear center in the brain has already been activated. Anger and its explosively loud or deadly silent expressions reactively serve to protect and care for the self. Though well-intended, it is misguided; rarely does anger bring about the effects that each person seeks. Conflict is itself not (automatically) a bad thing. In fact, it is unavoidable if the couple relationship has any chance of surviving and thriving, because it is simply the byproduct of two unique human beings joining to co-create a brand new, never-before-seen life. Naturally, the couple will bump elbows and be inconvenienced by each other, but each disagreement serves as a wonderful (though not always pleasant) opportunity to intentionally craft the relationship to reflect their strengths and limitations. Conflict works best when both parties fully show up and address the topic at hand. However, there are some habits that that make conflict more unproductive and hurtful than constructive and beneficial. These habits are: - Fighting on the Wrong Page - Fighting at the Wrong Place (Part II) - Fighting at the Wrong Time (Part III) When the Couple is on the "Wrong" Page Many couples get stuck at a stalemate around certain topics, such as: - how to spend/save money - how many kids to have - whether to move to another city, state, or country - what church to go to - how to discipline the kids When these hot-button topics are brought up, both sides dig their heels into the ground and resist the others' attempts to change their mind. Tension escalates, jaws and fists clench, stomachs churn, loaded words are thrown, reason disappears, and hearts are hurt. One person starts shutting down, while the other starts raising their voice. And on and on they go... Eventually, both parties feel unheard, unvalued, misunderstood, unloved, and defeated. If subsequent attempts also fail, hopelessness takes root, putting the relationship at greater risk. But what if neither is the villain? What if the couple is just on the wrong page, tuned into different channels? What if they really desire the same thing (a better life together), but just have different strategies on how to make that happen? The Life of Jack and Jill What happens if a couple attributes different meanings to the same topic? Take finances, for example. Money means different things to different people: - Money as status/prestige - Money as security - Money as enjoyment - Money as control/power Let's take a look at the relationship between Jack (who sees money as security) and Jill (who sees money as enjoyment). To Jack, having a budget is all about having consistency, predictability, and order so that they can plan and implement big goals for their future life - having a house (or two), kids' college funds, medical coverage, retirement, etc. Jack feels reassured knowing how much money they are bringing in, how much they're saving, and where it's going. Through his lens, Jill's spontaneous spending habits seem threatening. To protect his vision of their life together, he calls her careless and immature. When he sees her avoiding the conversation, he gets frustrated and resentful. He feels like she's intentionally draining the bucket he's desperately trying to fill. To Jill, money is a tool that reduces stress and enhances the emotional quality of the relationship. Purchasing paintings to decorate their living room or getting couple massages is how she tries to create a restful, warm life together where they can enjoy each other's company. Through her lens, Jack's structured spending habits seem cold, rigid, and rejecting of who she is. She initially responds to Jack's criticism by shutting down, and when she can't take it anymore, she lashes out and calls him a coldhearted Scrooge. In the end, Jack feels misunderstood, dismissed, and villainized, while Jill feels deeply rejected and abandoned. The money issue is nowhere close being resolved, and neither gets what they want. Neither side is entirely in the right, but neither side is entirely in the wrong either. Because each side is so invested in seeing things his/her own way, they both miss the message that the partner actually wants the same thing that he/she does: to build a good, lasting, full life together. On the surface, it seems like they are fighting about finances, but they're actually fighting about different strategies to achieve the same vision. Unfortunately, the end result of these kinds of conflict conversations is that the topic (finances) rarely gets resolved, while the relationship itself takes a huge hit. Although each person's strategies are legitimate in their own respective ways, they get misinterpreted by the partner as illegitimate, nonsensical, uncaring, etc. Thus, a practical, impersonal topic becomes deeply personal. Action Step: Bird's-Eye Does this sound like your relationship? Try this. The next time you get into this escalating deadlock with your partner, SAY OUT LOUD: "Hey, I'm sensing that you and I are talking about the same topic (finances, parenting, etc.), but we're not on the same page. Can we take a step back and rewind a bit? I'd like to hear what this topic means to you and why you feel so strongly about it. Help me understand where you're coming from." Notice what happens! Suspend judgment, and be curious. - Where does the conversation lead? Does it end up the exact same way it usually does? What's different? - What's it like to hear your partner share why this topic is so important to them? - What negative outcome is your partner hoping to avoid? What is he/she afraid of? - What positive outcome is your partner trying to create? What does he/she excited for? The goal of this detour is not to have another debate about the topic, because it's not really about the topic, but the personal MEANING behind it. This kind of conversation is meant to SLOW DOWN the couple so that they can realize what kind of pattern they get caught in and learn more about each other at a deeper level. It's about cultivating EMPATHY, the ability to "enter into" another person's experience and see things from their point of view. When both parties feel heard and understood, there's little need for them to use their reactive patterns to get their message across. This frees the couple up to actually brainstorm a creative solution. Does this resonate with you? Stay tuned to learn about the other two stumbling blocks! - Part 2: Fighting at the Wrong Place - Part 3: Wrong Time Need more support? Check the options below: © Copyright 2018 Joanne B. Kim. All rights reserved. Joanne B. Kim, AMFT Joanne is an Associate Marriage & Family Therapist in San Jose, CA, who loves empowering individuals and couples to create emotionally thriving relationships. She fully believes that emotional health and relationship health have everything to do with each other: when one part hurts or heals, so does the other. She holds a special place in her heart for adult survivors of emotional abuse/neglect and for high-conflict couples - those who desire deep connection, but feel stuck, anxious, and frustrated in their significant relationships. What began as her own mission towards wholeness became a passion and calling to accompany others on their own journey to love and be loved. She loves creating a safe space for others to cultivate their curiosity and courage to explore the deeper places that hold the secret to meaningful relationships.
<urn:uuid:74362680-c998-45d8-9b1e-bf464427364b>
CC-MAIN-2018-34
https://www.olivemecounseling.com/blog/couples-stop-fighting-gridlock
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221218070.73/warc/CC-MAIN-20180821073241-20180821093241-00629.warc.gz
en
0.95608
1,679
2.53125
3
Telecommunications, or telecom, is the transmission of signals over long distances. It began with the invention of the telegraph in 1837, followed by the telephone in 1876. Radio broadcasts began the late 1800s and the first television broadcasts started in the early 1900s. Today, popular forms of telecommunications include the Internet and cellular phone networks. Early telecommunications transmissions used analog signals, which were transferred over copper wires. Today, telephone and cable companies still use these same lines, though most transmissions are now digital. For this reason, most new telecommunications wiring is done with cables that are optimized for digital communication, such as fiber optic cables and digital phone lines. Since both analog and digital communications are based on electrical signals, transmitted data is received almost instantaneously, regardless of the distance. This allows people to quickly communicate with others across the street or across the globe. So whether you're watching TV, sending an email to a coworker, or talking on the phone with a friend, you can thank telecommunications for making it possible.
<urn:uuid:01ae5522-6d04-4cd5-ba1c-c8259a52f898>
CC-MAIN-2015-18
http://techterms.com/definition/telecommunications
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246661364.60/warc/CC-MAIN-20150417045741-00160-ip-10-235-10-82.ec2.internal.warc.gz
en
0.954032
207
3.65625
4
Autism is a neurobiological condition with a strong genetic component. Recent diffusion tensor imaging (DTI) studies have indicated that white matter structure is aberrant in autism. To date, white matter structure has not been assessed in family members of children with autism. To determine whether white matter structure is aberrant in children with autism and their unaffected siblings compared with controls, and to test the hypothesis that white matter structure in autism is correlated with autism spectrum symptomatology. Cross-sectional, case-control, voxel-based, whole-brain DTI analysis using Tract-Based Spatial Statistics. University research center. A sample of 37 children: 13 subjects with autism, 13 of their unaffected siblings, and 11 controls. Controls were age- and intelligence quotient–matched to the unaffected siblings; all groups were age matched. Main Outcome Measure Fractional anisotropy (FA) and axial and radial diffusivities. In addition, behavioral correlation analyses were conducted using the Autism Diagnostic Interview and Autism Diagnostic Observation Schedule subscales and FA values, as well as axial diffusivity values in the autism group. Compared with the control group, both the autism and sibling groups had widespread, significantly reduced white matter FA values (P ≤ .05, corrected) in the frontal parietal and temporal lobes and included, but were not restricted to, regions known to be important for social cognition. Within regions of reduced FA, significant reductions in axial diffusivity, but not radial diffusivity, were observed. There were no significant differences in white matter structure between the autism and sibling groups. There were no significant correlations between autism symptomatology and white matter FA or axial diffusivity. Our findings suggest that white matter structure may represent a marker of genetic risk for autism or vulnerability to development of this disorder.
<urn:uuid:dd61a1ac-cdab-4e10-8927-11ec4c7a21a0>
CC-MAIN-2016-22
http://archpsyc.jamanetwork.com/article.aspx?articleid=210899
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275835.98/warc/CC-MAIN-20160524002115-00116-ip-10-185-217-139.ec2.internal.warc.gz
en
0.946408
384
2.625
3
President Reagan has just returned from a trip to Western Europe, where he met such important world leaders as Prime Minister Margaret Thatcher of Britain in London, President Francois Mitterrand of France in Paris, and Chancellor Helmut Schmidt of West Germany in Bonn. The American President also met with them and a few other world leaders at a special high-level meeting, called a summit, in Versailles, a short distance from Paris. When the President travels abroad -- or any leader of any other country does so -- he is always greeted with pomp and ceremony. The same is true of the President when he stays in the nation's capital of Washington, D.C., and is host to a foreign leader. On these special occasions, the national anthems of the United States and of the country represented by the foreign statesman are played. National anthems were written as official patriotic songs. They are meant to stir patriotism and loyalty to one's country. Many of the world's anthems were written at times of war and other crises to give people a sense of belonging to their country. The oldest anthem in the world is the anthem of the Netherlands. This Dutch anthem was written in the 16th century. It is called ''Wilhelmus van Nassouwe.'' Translated it means William of Nassau. One of the most famous of world anthems is the British anthem ''God Save the Queen,'' or ''God Save the King'' if the monarch is a king. Although it is well-known in many parts of the world, historians cannot make up their minds who definitely wrote it. Some think it was a Henry Carey in 1740. Others believe it was John Bull in 1619. Another possibility is James Oswald, a Scotsman who settled in London in 1745. Many people regard it as the mother of anthems, since the music was adopted by several other countries. Switzerland had used this melody as its anthem, but changed it recently. Even the tune of the American patriotic song ''My Country Tis of Thee'' is taken from ''God Save the Queen.'' The same melody has often been used in classical music. Handel used it in his ''Occasional Oratoria'' and Beethoven in ''Wellington's Victory.'' There seems to have been a lot of borrowing when it comes to national anthems. The famous composer Joseph Haydn originally wrote a tune to be used for the national anthem of Austria. In 1922 Germany took the music for its national anthem, which was ''Deutschland, Deutschland, uber alles.'' (Germany, Germany, before everything.) Next door in France the anthem played at ceremonious occasions or public gatherings is the ''Marseillaise.'' It was written by Claude Joseph Rouget de Lisle during the French Revolution, which lasted from 1789 to 1795. In July 1792 a battalion of volunteers from the important French seaport of Marseilles sang the song as they marched into Paris. And that's how the French anthem got its name. It is not unusual for countries to change their anthems. The United States has done this. At the turn of the 19th century, our national anthem was ''Hail Columbia.'' The national anthem we know today was written during the War of 1812 with Britain. In 1814 Francis Scott Key, a Baltimore lawyer, was sent to the British fleet anchored off Fort McHenry outside Baltimore. He was sent to arrange the release of an American doctor who was being held prisoner on one of the British ships. On the night of Sept. 13, 1814, while he was on board a British ship, the British attacked Fort McHenry. All night long he watched the attack. At dawn he could still see the American flag flying over the fort. He was so moved by the experience that he wrote the words of ''The Star-Spangled Banner'' on an envelope. The day after the battle he went to a tavern in Baltimore where a singer sang the words to the tune of an English song, ''To Anacreon in Heaven,'' which Key had chosen. It was made the official national anthem by an act of Congress on March 3, 1931. Here are the words: Oh say! Can you see, by the dawn's early light, What so proudly we hailed at the twilight's last gleaming? Whose broad stripes and bright stars through the perilous fight O'er the ramparts we watched were so gallantly streaming? And the rockets' red glare, the bombs bursting in air. Gave proof through the night that our flag was still there. Oh say does that star-spangled banner yet wave O'er the land of the free and the home of the brave?
<urn:uuid:bba05651-59ed-42e1-a2a7-e700783f1a7d>
CC-MAIN-2016-50
http://www.csmonitor.com/1982/0614/061438.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542588.29/warc/CC-MAIN-20161202170902-00184-ip-10-31-129-80.ec2.internal.warc.gz
en
0.975814
982
3.421875
3
If your preschooler is bored with math drills, memorization and worksheets, it’s probably time for some math games! This preschool math game can easily – and inexpensively – be made at home so your child can enjoy learning the basic skills they need to succeed in math. And, as all parents and teachers know, when an exciting, hands-on approach to teaching is used (games, for example!), kids are more likely to enjoy what they are learning and have an easier time understanding the concepts being taught. Muffin Tin Math Muffin Tin Math is a great way to teach your preschooler several basic math skills including number recognition, counting and one-to-one correspondence. This preschool math game can easily be adapted for different skill levels. It can also be used to teach concepts such as addition and subtraction, more than/less (for example, does muffin tin number 5 have more or less beans than number 7?), putting like objects together, color matching (instead of numbers on the liners, draw a red circle on one, an orange circle on another and use jelly beans to match the colors) and even money. Get creative! - A muffin tin - Muffin liners - Buttons, dried beans, coins, or other small materials to use as counters - Use the marker to write a number on each muffin liner using the numbers 1 through 10 (or higher for more of a challenge) - Place the numbered muffin liners in the muffin tin. Instructions for Play: Give your child an assortment of dried beans, buttons or other small objects and have him or her put the appropriate number into each muffin tin. Once filled, be sure to have her check her work by dumping out the objects and counting. *Tips for Learning As your child’s counting skills improve, replace the liners with liners that have higher numbers. For example, if you started off using numbers 1 through 6, change the liners to now read 7 through 12, then 13 through 19, and so on. Make sure to work on specific skills such as number awareness by asking your child tell you what each number is, and by asking her what the number is that you are pointing to. You can also work on concepts such as one-to-one correspondence by asking her to: “count out 3 buttons” or “add one more button to make 12.″ Ready to try this preschool math game at home? Give it a go! Looking for more resources to make math lessons fun? Check out these Cool Math Games on Educents!
<urn:uuid:ac1b6d6d-10f9-4a04-affe-22d91e6b77d3>
CC-MAIN-2017-39
https://blog.educents.com/preschool-math-at-home-muffin-tin-math-game/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818692236.58/warc/CC-MAIN-20170925164022-20170925184022-00244.warc.gz
en
0.950095
543
3.8125
4
Newspeak is the fictional language in the novel Nineteen Eighty-Four, written by George Orwell. It is a controlled language created by the totalitarian state Oceania as a tool to limit freedom of thought, and concepts that pose a threat to the regime such as freedom, self-expression, individuality, and peace. Any form of thought alternative to the party’s construct is classified as "thoughtcrime". Newspeak is explained in chapters 4 and 5 of Nineteen Eighty-Four, and in an appendix to the book. The language follows, for the most part, the same grammatical rules as English, but has a much more limiting, and constantly shifting vocabulary. Any synonyms or antonyms, along with undesirable concepts are eradicated. The goal is for everyone except the Proles — the working-class citizens of Oceania — to be speaking this language by the year 2050. In the meantime, Oldspeak (current English) is still in common usage with Newspeak interspersed into conversation. Orwell was inspired to invent Newspeak by the constructed language Basic English, which he promoted from 1942 to 1944 before emphatically rejecting it in his essay "Politics and the English Language." In this paper he deplores the bad English of his day, citing dying metaphors, pretentious diction or rhetoric, and meaningless words, which he saw as encouraging unclear thought and reasoning. Towards the end of the essay, Orwell states: “I said earlier that the decadence of our language is probably curable. Those who deny this would argue, if they produced an argument at all, that language merely reflects existing social conditions, and that we cannot influence its development by any direct tinkering with words or constructions." Newspeak's contracted forms, such as Ingsoc and Minitrue, are inspired by the Russian syllabic abbreviations used for concepts relating to the government and society of the USSR, such as politburo, Comintern, kolkhoz ("collective farm") and Komsomol ("Young Communists' League"), many of which found their way into the speech of Communists in other countries. - 1 Basic principles - 2 Vocabulary - 3 Grammar - 4 Ramifications - 5 See also - 6 References - 7 Further reading To remove synonyms and antonyms The aim of Newspeak is to remove all shades of meaning from language, leaving simple concepts (pleasure and pain, happiness and sadness, goodthink and crimethink) that reinforce the total dominance of the State. Newspeak root words serve as both nouns and verbs, further reducing the total number of words; for example, "think" is both a noun and verb, so the word thought is not required and can be abolished. The party also intends that Newspeak be spoken in staccato rhythms with syllables that are easy to pronounce. This will make speech more automatic and unconscious and reduce the likelihood of thought. (See duckspeak.) In addition, words with negative meanings are removed as redundant, so "bad" becomes "ungood". Words with comparative and superlative meanings are also simplified, so "better" becomes "gooder", and "best" becomes "goodest". Intensifiers can be added, so "great" becomes "plusgood", and "excellent" or "splendid" becomes "doubleplusgood". This ambiguity between comparative/superlative forms and intensified forms is one of the few examples of ambiguity in Newspeak. Adjectives are formed by adding the suffix "-ful" to a root word (e.g., "goodthinkful" – orthodox in thought), and adverbs by adding "-wise" ("goodthinkwise" – in an orthodox manner). This would, of course, not prevent heretical statements such as "Big Brother is ungood," but not only would this statement sound absurd in the ears of the politically orthodox, it would also be impossible to elaborate on or specify exactly what the statement means since all concepts and words that can be used to argue against Big Brother (i.e. liberty, rights, freedom, etc.) would be eradicated from the language. The statement would thus be meaningless. Some of the constructions in Newspeak, such as "ungood", are characteristic of agglutinative languages, although foreign to English. It is possible that Orwell modeled aspects of Newspeak on Esperanto; for example, "ungood" is constructed similarly to the Esperanto word malbona. Orwell had been exposed to Esperanto in 1927 when living in Paris with his aunt Ellen Kate Limouzin and her husband Eugène Lanti, a prominent Esperantist. Esperanto was the language of the house, and Orwell was disadvantaged by not speaking it, which may account for some antipathy towards the language. To control thought According to Orwell, "the purpose of Newspeak was not only to provide a medium of expression for the world-view and mental habits proper to the devotees of IngSoc, but to make all other modes of thought impossible. Its vocabulary was so constructed as to give exact and often very subtle expression to every meaning that a Party member could properly wish to express, while excluding all other meaning and also the possibility of arriving at them by indirect methods. This was done partly by the invention of new words, but chiefly by eliminating undesirable words and stripping such words as remained of unorthodox meanings, and so far as possible of all secondary meaning whatever." The idea that language influences worldview is linguistic relativity. For example, the word "free" still existed in Newspeak but could only be used in terms of something not being possessed, as in "the dog is free from lice," or "this field is free from weeds." It could not be used in terms of being able to do as one pleases, as in "free choice" or "free will" since these concepts no longer existed. Newspeak was designed not to extend but to diminish the range of thought, and this purpose was indirectly assisted by cutting the choice of words down to a minimum. Any redundancies in the English language were removed. As Orwell further states (through the character of Syme, who is discussing his work on the latest edition of the Newspeak dictionary), "By 2050—earlier, probably—all real knowledge of Oldspeak will have disappeared. The whole literature of the past will have been destroyed. Chaucer, Shakespeare, Milton, Byron—they'll exist only in Newspeak versions, not merely changed into something different, but actually contradictory of what they used to be. Even the literature of the Party will change. Even the slogans will change. How could you have a slogan like "freedom is slavery" when the concept of freedom has been abolished? The whole climate of thought will be different. In fact there will be no thought, as we understand it now. Orthodoxy means not thinking—not needing to think. Orthodoxy is unconsciousness." Some examples of Newspeak from the novel include crimethink, doublethink, and Ingsoc. They mean, respectively, "thought-crime", "accepting as correct two mutually contradictory beliefs", and "English socialism"—the official party philosophy. The word Newspeak itself also comes from the language. Generically, Newspeak has come to mean any attempt to restrict disapproved language by a government or other powerful entity. In Orwell's novel, Newspeak attempts to influence thought by consolidating — i.e., decreasing — the expressiveness of the English language. In keeping with these principles, the following words serve as both nouns and verbs. Thus, crimethink is both the noun meaning "thoughtcrime" and the verb meaning "to commit thoughtcrime." To form an adjective, one adds the suffix "-ful" (e.g., crimethinkful) and to form an adverb, "-wise" (e.g., crimethinkwise). There are some irregular forms, like the adjectival forms of Minitrue, Minipax, Miniplenty, and Miniluv (Ministry of Truth, Ministry of Peace, Ministry of Plenty, and Ministry of Love, respectively — all ministries of the active government in 1984). To say that something or someone is the best, Newspeak uses doubleplusgood, while the worst would be doubleplusungood (e.g., "Big Brother is doubleplusgood, Emmanuel Goldstein is doubleplusungood"). The word bellyfeel refers to a blind, enthusiastic acceptance of an idea. “Consider, for example, such a typical sentence from a Times leading article as ‘Oldthinkers unbellyfeel Ingsoc.’ The shortest rendering one could make of this in Oldspeak would be: ‘Those whose ideas were formed before the Revolution cannot have a full emotional understanding of the principles of English Socialism.’ But this is not an adequate translation...Only a person thoroughly grounded in Ingsoc could appreciate the full force of the word bellyfeel, which implied a blind, enthusiastic and casual acceptance difficult to imagine today.” -Orwell’s 1984 appendix Blackwhite has “two mutually contradictory meanings" depending on whether it is applied to an opponent — "impudently claiming that black is white, in contradiction of the plain facts" — or to a Party member — "a loyal willingness to say that black is white when Party discipline demands". However, it is also an example of doublethink, because it represents an active rewriting of the past, which is a key aspect of the Party's control. Indeed, blackwhite is explained as "the ability to believe that black is white, and more, to know that black is white, and to forget that one has ever believed the contrary". This blind faith can stem from respect for authority, fear, indoctrination, critical laziness, or gullibility. Orwell's blackwhite refers only to that caused by fear, indoctrination, or repression of critical thinking, rather than that caused by laziness or gullibility. A true Party member could automatically and without thought expunge any "incorrect" information and neatly replace it with "true" information. Done properly, there would be no recollection of the "incorrect" information. Crimethink is the Newspeak word for thoughtcrime (thoughts that are unorthodox or outside the official government platform), as well as the verb meaning "to commit thoughtcrime". Goodthink, which is approved by the Party, is the opposite of crimethink. Winston Smith, the main character, writes in his diary, “Thoughtcrime does not entail death: thoughtcrime IS death.” Duckspeak is a Newspeak term that means "to quack like a duck" (literal meaning) or "to speak without thinking". Duckspeak can be good or "ungood" (bad) depending on who is speaking, and whether what they are saying aligns with Big Brother's ideals. To speak rubbish and lies may be "ungood", but to do so for the good of The Party may be good. Orwell explains in the appendix: “Ultimately it was hoped to make articulate speech issue from the larynx without involving the higher brain centres at all. This aim was frankly admitted in the Newspeak word duckspeak […]. Like various words in the B vocabulary, duckspeak was ambivalent in meaning. Provided that the opinions which were quacked out were orthodox ones, it implied nothing but praise, and when the Times referred to one of the orators of the Party as a doubleplusgood duckspeaker it was paying a warm and valued compliment.” An example of duckspeak in action is provided in chapter 9, when an Inner Party speaker is haranguing the crowd about the crimes of Eurasia when a note is passed into his hand. He never stops speaking or changes his inflection, but (according to the changed Party position) he now condemns the crimes of Eastasia, which is Oceania's new enemy. "Goodsex" and "sexcrime" Goodsex is any form of sex considered acceptable by the Party. Specifically, this refers only to married heterosexual sex for the exclusive purpose of procreation, and with no physical pleasure on the part of the woman. All other forms of sex are considered sexcrime. Ownlife refers to the tendency to enjoy being solitary or individualistic, which is considered subversive. Winston Smith comments that even to go for a walk by oneself can be regarded as suspicious. An unperson is someone who has been "vaporized" — not only killed by the state, but erased from existence. Such a person would be written out of existing books, photographs and articles so that no trace of their existence could be found in the historical record. The idea is that such a person would, according to the principles of doublethink, be forgotten completely (for it would be impossible to provide evidence of their existence), even by close friends and family. Mentioning his name, or even speaking of his past existence, is thoughtcrime; the concept that the person may have existed at one time and has disappeared cannot be expressed in Newspeak. "Un-" is a Newspeak prefix used for negation. It is used as a prefix to make the word negative, since there are no antonyms in Newspeak. For example, warm becomes "uncold". It is often decided to keep the word with a more unpleasant nuance to it when diminishing vocabulary. Therefore, cold is preferred to unwarm or unhot, and dark is preferred to unlight. The Party's choice for the less pleasant versions of an antonym may be interpreted as a way of rendering its subjects depressive and pessimistic, as well as to limit and suppress unorthodox thought. On the other hand, the Party also controls one's ability to think negatively by sometimes allowing only the positive term preceded by the prefix "un-". For example, the concept of "bad" can be expressed only with ungood. When placed before a verb, "un-" becomes a negative imperative; for example, unproceed means "do not proceed". - "Plus-" is an intensifier, in place of "more" or the suffix "-er"; great or better becomes "plusgood". - "Doubleplus-" further intensifies "plus-"; excellent or best becomes "doubleplusgood". - "-ful" is a Newspeak suffix that turns another word into an adjective (e.g., "speedful" instead of rapid). - "-ed" is the only method of making a non-auxiliary verb past tense in the A-vocabulary. This decreases the number of words required to express tenses by removing irregular conjugations. Ran becomes runned, drank becomes drinked, etc. - "-wise" is a Newspeak suffix used to turn another word into an adverb; for example, quickly would be speedwise. Therefore, "He ran very quickly" would become "He runned plus-speedwise." (Some of these are only part of the "abbreviated jargon — not actually Newspeak, but consisting largely of Newspeak words — which was used in the Ministry for internal purposes" described by Orwell in chapter 4.) - Artsem: Artificial insemination. - BB: Big Brother. - Crimestop: To rid oneself of unwanted thoughts—i.e., thoughts that interfere with Party ideology—in order to avoid committing thoughtcrime. - Dayorder: Order of the day. - Equal: Only used to describe physical equality such as height and weight. It does not refer to social, political or economical equality because there is no such concept as social inequality in purportedly egalitarian Ingsoc - Facecrime: An indication that a person is guilty of thoughtcrime based on facial expression. - Free: Meaning negative freedom (without), in a physical sense. Only used in statements such as "This dog is free from lice", as the concepts of "political freedom" and "intellectual freedom" do not exist in Newspeak. - Goodthink: Orthodox thought. - Ingsoc: English Socialism. - Issue: Children produced by goodsex. - Joycamp: Forced labor camp. - Malquoted: Flawed representations of the Party or Big Brother by the press. - Miniluv: "Ministry of Love" (secret police, interrogation, and torture). - Minipax: "Ministry of Peace" (Ministry of War, cf.: "Department of Defense", "War Department"). - Minitrue: "Ministry of Truth" (propaganda and alteration of history, culture, and entertainment). - Miniplenty: "Ministry of Plenty" (keeping the population in a state of constant economic hardship). - Oldspeak: English; any language that is not Newspeak. - Oldthink: Ideas inspired by events or memories of times prior to the Revolution. - Pornosec: Sub-unit of the Fiction Department of the Ministry of Truth that produces pornography for proles. - Prolefeed: The steady stream of mindless entertainment produced to distract and occupy the masses. The prole in prolefeed is reference to the Marxist concept of the proletariat. - Recdep: "Records Department" (division of the Ministry of Truth that deals with the rectification of records; department in which Winston works). - Rectify: Ministry of Truth euphemism for deliberately altering the past. - Speakwrite: An instrument used by Party members to note or "write" down information by speaking into an apparatus as a faster alternative to an "ink pencil". Speakwrites are used extensively in the Ministry of Truth by both Winston Smith and others in their daily work. - Telescreen: Television and security camera devices used by the ruling Party in Oceania to keep its subjects under constant surveillance. - Thinkpol: Thought Police. - Upsub: Submit to higher authority. In one scene, Winston Smith is instructed to alter a document to conform with the Party line and submit it to his superiors before filing it: (“rewrite fullwise upsub antefiling”; note that this sentence is an example of the Newspeak-influenced bureaucratic jargon rather than official Newspeak). A, B, and C vocabulary The "A" group of words deals with simple concepts needed in everyday life (such as eating, drinking, working, cooking, etc.). It is almost entirely made of words that already exist in the English language. The "B" group of words is deliberately constructed to convey more complicated ideas. The words in this group are compound words with political implications and aim to impose the mental attitude of the Party upon the speaker. For example, the Newspeak word "goodthink" roughly means "orthodoxy". The B words were in all cases compound words. They consisted of two or more words, or portions of words, welded together in an easily pronounceable form. The resulting amalgam was always a noun-verb and inflected according to the ordinary rules. The "C" group of words deals with technical vocabulary and is supplementary to the other two groups. Since the Party does not want its people to have knowledge of more than one subject, there is no Newspeak word for "science"; there are separate words for different fields. The advantages of Newspeak are its means of preserving the secrets of the Party, preventing politically motivated actions, and promoting the use of politically correct terms. Its disadvantages include the Party using censorship and glamorization of themselves, compromised freedom of speech, and the prevention of the flow of ideas for the citizens of Oceania, who are controlled by this reduction in their language. Words created to soften the blow of something taboo quickly absorb any negative connotations they were meant to avoid in the first place. Steven Pinker, a Harvard University linguist, calls this the “euphemism treadmill”, also known as pejoration. By creating such euphemisms, Newspeak only creates a new generation of derogatory terms. As Pinker argues in "The Game of the Name", the euphemism treadmill signifies that "concepts, not words, are in charge: give a concept a new name, and the name becomes colored by the concept; the concept does not become freshened by the name". In expressing their opinions and concerns, the Party exercises the same rights librarians seek to protect when they confront censorship. In making their criticisms known, characters such as Winston and Julia who object to certain ideas are exercising the same rights as those who created and disseminated the material to which they object. Their rights to voice opinions and efforts to persuade others to adopt those opinions is protected only if the rights of persons to express ideas they despise are also protected. Limiting language limits more than just words—it limits thought. Without the means to express thoughts beyond "I feel good or ungood", people lack the means to commit a thought crime. Even if it were committed, it is unlikely that people would understand enough to take action. Free speech diminishes as the dictionary slims down with each new edition. There is not much difference between this action and reducing the population that could actually read the word "dictionary" if the book were placed in front of them. Without the ability to read or write, one is unaware of the concept of "free speech" and unable to know how to prevent its erosion. - 2 + 2 = 5 - Code word - Dumbing down - Language and thought - List of Newspeak words - Loaded language - Distancing language - New Soviet man - Philosophy of Language - Political correctness - Sapir–Whorf hypothesis - Thought-terminating cliché - Soviet phraseology - Thought reform in the People's Republic of China - Hate Speech - General line of the party - LTI - Lingua Tertii Imperii (The Language of the Third Reich) - Orwell, George (1949). Nineteen Eighty-Four. Secker and Warburg. ISBN 978-0-452-28423-4. - "The Principles of Newspeak". newspeakdictionary.com. Retrieved 20 March 2013. - OED: "any corrupt form of English; esp. ambiguous or euphemistic language as used in official pronouncements or political propaganda." - "Pros and Cons of Censorship". buzzle.com. 12 July 2012. Retrieved 20 March 2013. - "Bad Euphemisms, Political Correctness and Censorship". wordpress.com. Retrieved 20 March 2013. - "Intellectual Freedom and Censorship Q & A". ala.org. Retrieved 20 March 2013. - Burgess, Anthony. Nineteen Eighty-Five. Boston: Little Brown & Co, 1978. ISBN 0-316-11651-3. Anthony Burgess discusses the plausibility of Newspeak. - Green, Jonathon. Newspeak: a dictionary of jargon. London, Boston: Routledge & Kegan Paul, 1985, 1984. ISBN 0-7102-0673-9. - "Find in a library: Newspeak: A dictionary of Jargon", by Jonathon Green. Retrieved 21 April 2006. - Klemperer, Victor. LTI - Lingua Tertii Imperii: Notizbuch eines Philologen.. Original German language editions. - Klemperer, Victor & Watt, Roderick H. LTI - Lingua Tertii Imperii: A Philologist's Notebook. Lewiston: E. Mellen Press, 1997. ISBN 0-7734-8681-X. An annotated edition of Victor Klemperer’s LTI, Notizbuch eines Philologen with English notes and commentary by Roderick H. Watt. - Klemperer, Victor & Brady, Martin (tr.). The language of the Third Reich: LTI - Lingua Tertii Imperii: A Philologist's Notebook. London, UK; New Brunswick, NJ: Athlone Press, 2000. ISBN 0-485-11526-3 (alk. paper). Translated by Martin Brady. - Young, John Wesley . Totalitarian Language: Orwell's Newspeak and Its Nazi and Communist Antecedents. Charlottesville: University Press of Virginia, 1991. ISBN 0-8139-1324-1. John Wesley Young wrote this scholarly work about Newspeak and historical examples of language control. - An independent compilation of the Newspeak language - The Principles of Newspeak - George Orwell's 1984 - New Examples of Newspeak
<urn:uuid:6afb4def-54a0-4d56-94d6-bc3368637405>
CC-MAIN-2018-26
https://infogalactic.com/info/Newspeak
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864776.82/warc/CC-MAIN-20180622182027-20180622202027-00175.warc.gz
en
0.945266
5,104
3.09375
3
Discover the cosmos! Each day a different image or photograph of our fascinating universe is featured, along with a brief explanation written by a professional astronomer. 2001 January 18 Explanation: The first and only total lunar eclipse for the year 2001 occured on the evening of January 9/10 as the full Moon glided through Earth's shadow. Unlike a total solar eclipse, a total lunar eclipse is visible for anyone on the night side of the planet during the event. The night side for this geocentric celestial event included Europe, Asia, and Africa where the Moon could be seen immersed in the umbra or dark portion of Earth's shadow for about 62 minutes as it passed just north of the shadow's center. This dramatic telescopic photo of the eclipsed Moon was made near Ankara, Turkey close to the time of midpoint of the total phase. The fact that the northern (top) portion of the eclipsed Moon is clearly brighter, even near mid-totality, demonstrates that Earth's shadow is not uniformly dark. Authors & editors: Jerry Bonnell (USRA) NASA Technical Rep.: Jay Norris. Specific rights apply. A service of: LHEA at NASA/GSFC & Michigan Tech. U.
<urn:uuid:3b2e8724-8f86-4d7a-b708-8f828e1b700f>
CC-MAIN-2013-48
http://apod.nasa.gov/apod/ap010118.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163930735/warc/CC-MAIN-20131204133210-00055-ip-10-33-133-15.ec2.internal.warc.gz
en
0.922903
255
3.453125
3
The Ashtanga yoga system is designed to purify the body, promote the proper functioning of the digestive system, build strength, and restore range of motion to the body. The method of practice taught in Ashtanga relies on linking postures with deep, even breathing and steady gazing with the eyes. The system of linking the breath with movement is known as vinyasa and encourages the blood to circulate properly in the body, while the deep breathing supplies a rich source of pure air, oxygenated blood and allows the removal of unwanted toxins. The gazing point helps to facilitate a state of meditation, having a profound effect on the steadiness of the mind. Vinyasa means movement linked with the breath. For each movement, there is one breath. For example, in Surya Namaskara A there are nine vinyasas. The first vinyasa is inhaling while raising your arms over your head; the second is exhaling while bending forward, placing the hands on the floor. In this way, all asanas are assigned a certain number of vinyasas. Proper vinyasa count helps to stay focused on the present moment and is important for internal cleansing. The combination of breath and movement helps to produce internal heat that cleanses the blood and the resulting sweat further detoxifies the body. Tristhana means the three places of attention that should be practiced simultaneously in asana practice. They include posture (asana), gazing place (dristhi), and breathing technique. When practiced simultaneously, the tristhana method allows the physical practice to be transformed into a moving meditation.Asanas should be performed with proper alignment and under the guidance of a qualified teacher. The postures help to purify, strengthen and give flexibility to the body. Dristhi is the place where you look while in the asana. There are nine dristhis: the nose, between the eyebrows, navel, thumb, hands, feet, up, right side and left side. Dristhi helps to focus the mind. Through dristhi, we are able to improve concentration and awareness.Breathing ‐ Proper breathing technique is done through the nose. The inhale and exhale are steady and even, with the length of the inhale matching the length as the exhale. Long, even breaths strengthen the internal fire and nervous system, increasing heat to burn away impurities. Another important component of the breathing system includes mula and uddiyana bandha. These are energetic locks that give lightness, strength, and health to the body. Parampara is the knowledge that is passed in succession from teacher to student. It is a Sanskrit word that denotes the principle of transmitting knowledge in its most valuable form; knowledge based on direct and practical experience. It is the basis of any lineage; the teacher and student form the links in the chain of instruction that has been passed down for thousands of years. In order for yoga instruction to be effective, true and complete, it should come from within parampara. Knowledge can be transferred only after the student has spent many years with an experienced guru, a teacher to whom he has completely surrendered in body, mind, and spirit. Only then is he fit to receive knowledge. This transfer from teacher to student is known as parampara. In the Ashtanga lineage, the ancient system was originally transmitted through Pattabhi Jois and is now passed down through Pattabhi’s grandson, Sharath Jois, at the K. Pattabhi Jois Ashtanga Yoga Institute in Mysore, India. Content adapted from the K. Pattabhi Jois Ashtanga Yoga Institute website.
<urn:uuid:91a28974-4eca-441e-a39b-2b3f01bb7492>
CC-MAIN-2018-05
https://www.taylorhuntyoga.com/ashtanga-yoga/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891791.95/warc/CC-MAIN-20180123072105-20180123092105-00102.warc.gz
en
0.937108
753
2.796875
3
I was going over his online articles and especially his seminal work – Second Language Acquisition and Second Language Learning. I kept coming back to the feeling I had as a teacher – that comprehensible input was what students needed – needed to be engaged, on task and effectively learning a language. Not memorizing, not manipulating words, not learning grammar rules, not translating, not x or Y or z but only input, input, input – at a comprehensible level. This is why extensive reading is so powerful in helping students acquire a language – but extensive listening is just as powerful yet so seldom done effectively. We need more of that – I’m trying my best at EnglishCentral to make this happen through authentic (but leveled/supported) content. However, input really isn’t all that must happen when a student receives language. They also have to “notice” the language in their conscious mind. That’s when the learning happens and language “sticks”. Krashen has a nice little article where he calls this “The Din in the head” hypothesis (and yes, yet another hypothesis). It is kind of like the ghost inside the machine. Meaning, when language is received, there is a “din” that goes off which links the input to something “there”. Scaffolding is achieved and the language rooted when the language is put into a context. What is this “din”? Essentially it is the student’s bell/brain sparking and going off. An involuntary mental rehearsal of the language. Students notice language. They are no longer fish in water but fish that know they are in water! They take the received and convert it to something and somewhere that it can be produced. It may be relating the incoming language to a known form or L1. It may be repeating it. It may be thinking a thought of something it relates to. It may be a lot of things this din – but it is important. Everything isn’t just input – there has to be some ghost in the machine doing its thing. Here’s what Krashen says, “The Din in the Head hypothesis claims that the din is the result of stimulation of the language acquisition device, a sign that language acquisition is taking place (Krashen, 1983).I noted that the Din experience correlates with less reluctance to speak the language, but did not make any hypothesis about a sudden “critical stage” that leads to a “sudden and massive restructuring” as de Bos claims (p. 173). ” So what does this mean for the working Joe teacher? I think it means that we have to create curriculum that is contextualized strongly and thus offers “comprehensibility”. I think it means we have to think more about the input that happens in our classes and how we can create regularity of it. I think we have to think about how we might get our students to do some metacognitive activities and start practicing “thinking about language”. I know it is a long shot but maybe we can try to get this “din” activating more often in our students? To end. Here’s a screencast I made of the new EnglishCentral “hidden task” feature. Basically a listening cloze activity. I think this kind of activity can support our efforts to activate this “din inside the head”.
<urn:uuid:778ef5fa-aef5-44e2-ba85-78d8e46d8a58>
CC-MAIN-2014-52
http://ddeubel.edublogs.org/2011/03/29/4-keys-to-learning-english-input-input-input-noticing/
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447544739.15/warc/CC-MAIN-20141224185904-00004-ip-10-231-17-201.ec2.internal.warc.gz
en
0.963751
718
3.3125
3
C/2020 F3 (NEOWISE) This article documents a current event. Information may change rapidly as the event progresses, and initial news reports may be unreliable. The latest updates to this article may not reflect the most current information. (Learn how and when to remove this template message) C/2020 F3 (NEOWISE) photographed from France on July 13, 2020 |Discovery date||March 27, 2020| |Orbital characteristics A| |Epoch||2458953.5 (April 14, 2020)| |Observation arc||70 days| |Orbit type||Long period comet| |Aphelion||544 AU (inbound) 720 AU (outbound) |Semi-major axis||272 AU (inbound) 360 AU (outbound) |Orbital period||~4500 yrs (inbound) ~6800 yrs (outbound) |Earth MOID||0.36 AU (54 million km; 140 LD)| |Jupiter MOID||0.81 AU (121 million km)| |Last perihelion||July 3, 2020| C/2020 F3 (NEOWISE), or Comet NEOWISE, is a retrograde comet with a near-parabolic orbit discovered on March 27, 2020, by astronomers using the NEOWISE space telescope. At that time it was a 10th magnitude comet, located 2 AU (300 million km; 190 million mi) away from the Sun and 1.7 AU (250 million km; 160 million mi) away from Earth. By July 2020 it was bright enough to be visible to the naked eye. For observers in the northern hemisphere, in the morning the comet appears low on the northern-eastern horizon, below Capella. In the evening it can be seen in the north-western sky. In the second half of July 2020 it will appear to pass through the constellation of Ursa Major, below the asterism of The Plough (Big Dipper). The comet is notable for being one of the brightest visible to observers in the northern hemisphere since Comet Hale–Bopp in 1997. Under dark skies it can be clearly seen with the naked eye and is expected to remain visible to the naked eye throughout most of July 2020. History and observations The object was discovered by a team using the NEOWISE space telescope on March 27, 2020. It was classified as a comet on March 31 and named after NEOWISE on April 1. It has the systematic designation C/2020 F3, indicating a non-periodic comet which was the third discovered in the second half of March 2020. Comet NEOWISE made its closest approach to the Sun (perihelion) on July 3, 2020, at a distance of 0.29 AU (43 million km; 27 million mi). This passage increases the comet’s orbital period from about 4500 years to about 6800 years. Its closest approach to Earth will occur on July 23, 2020, 01:14 UT, at a distance of 0.69 AU (103 million km; 64 million mi) while located in the constellation of Ursa Major. Seen from Earth, the comet was less than 20 degrees from the Sun between June 11 and July 9, 2020. By June 10, 2020, as the comet was being lost to the glare of the Sun, it was apparent magnitude 7. When the comet entered the field of view of the SOHO spacecraft’s LASCO C3 instrument on June 22, 2020, the comet had brightened to about magnitude 3. By early July, Comet NEOWISE had brightened to magnitude −1, far exceeding the brightness attained by C/2020 F8 (SWAN), and had developed a second tail. The first tail’s color is magenta and made of gas and ions; the second twin tail is a golden color and made of dust, like the tail of Comet Hale-Bopp, this combination resembles comet C/2011 L4(PANSTARRS). The comet is brighter than C/2011 L4 (PANSTARRS), but not as bright as Hale–Bopp was in 1997. According to the British Astronomical Association, the comet brightened from a magnitude of about 8 at the beginning of June to -2 in early July. This would make it brighter than Hale Bopp. However, as it was very near to the Sun, it was reported as 0 or +1 magnitude and remained that bright for only a few days. After perihelion, the comet began to fade at about the same rate as it had previously brightened. From the infrared signature Joseph Masiero estimates the diameter of the comet nucleus to be approximately 5 km (3 mi). The nucleus is similar in size to many short-period comets such as 2P/Encke, 7P/Pons-Winnecke, 8P/Tuttle, 14P/Wolf, and 19P/Borrelly. By July 5 NASA’s Parker Solar Probe had captured an image of the comet, from which astronomers also estimated the diameter of the comet nucleus at approximately 5 km. C/2020 F3 (NEOWISE) photographed on July 9, 2020 through a 11″ telescope Comet C/2020 F3 (NEOWISE) on July 9, over Split, Croatia C/2020 F3 (NEOWISE) moving west across a few stars. Nine 15 second exposures taken over ~5 minutes starting at 4:23 am EDT on July 10th, 2020 from Brampton, Ontario, Canada. FOV: 36.5′ x 36.5′ - Mace, Mikayla (July 8, 2020). “Comet NEOWISE Sizzles as It Slides by the Sun, Providing a Treat for Observers”. Infrared Processing and Analysis Center. Retrieved July 13, 2020. - JPL Horizons barycentric solution for epoch 1950 (before entering planetary region) Goto JPL Horizons Ephemeris Type: Orbital Elements Center: @0 (Solar System Barycenter) Time Span: 1950-01-01 to 2050-01-01 and Step Size: 100 years 1950-Jan-01 is “PR= 1.63E+06 / 365.25 days” = 4462 years (For long period comets on multi-thousand year orbits, asymmetric outgassing will affect the highly sensitive orbital period and eccentricity.) - Seiichi Yoshida. “C/2020 F3 ( NEOWISE )”. Retrieved April 4, 2020. - Siegel, Ethan. “How To See Comet NEOWISE, Earth’s Most Spectacular Comet Since 2007”. Forbes. Retrieved July 13,2020. - “How to see Comet NEOWISE”. EarthSky. Retrieved July 11,2020. - “COMET C/2020 F3 (NEOWISE)”. Minor Planet Electronic Circulars. 2020-G05. April 1, 2020. Retrieved July 13, 2020. On behalf of NEOWISE (C51), J. Masiero reported on March 31 UT that this object showed clear signs of cometary activity. - JPL Horizons closest approach to Earth Goto JPL Horizons Ephemeris Type: Observer Observer Location: 500 (Geocentric) (Closest approach occurs when deldot flips from negative to positive) - “Comet Observation database (COBS)”. Retrieved May 27,2020. “C/2020 F3 (NEOWISE) plot” - “Comet F3 NEOWISE May Perform in July”. Universe Today. Retrieved June 30, 2020. - “ATel #13853: Morphology and Photometry of Comet C/2020 F3 (NEOWISE) from SOHO”. Astronomer’s Telegram. July 2, 2020. - Nick James (July 6, 2020), “Visual observations page”, Comet Section, British Astronomical Association - “JPL Small-Body Database Search Engine: numbered comets and diameter > 4 (km) and diameter < 6 (km)”. JPL Solar System Dynamics. Retrieved July 13, 2020. - Miloslav Druckmuller; Robert Nemiroff; Jerry Bonnell (July 11, 2020), The Tails of Comet NEOWISE, NASA |Wikimedia Commons has media related to C/2020 F3 (NEOWISE).| - C/2020 F3 (NEOWISE) – CometWatch - C/2020 F3 (NEOWISE) – AiM-Project-Group - C/2020 F3 (NEOWISE) – Ernesto Guido & Adriano Valvasori - on YouTube – ISS view (video; 7:00; 7 July 2020) - on YouTube – Tom Polakis; 300frms/20mins (video; 0:10; 7 July 2020) - C/2020 F3 at the JPL Small-Body Database
<urn:uuid:6c0fc95b-5b19-4950-a8b0-c5b0208059c8>
CC-MAIN-2022-05
http://cosmicconvergence.org/?p=36763
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305260.61/warc/CC-MAIN-20220127103059-20220127133059-00574.warc.gz
en
0.900162
2,143
3.171875
3
- Paper Plate - Yellow Paint - Paint Brush - Black construction paper - Multiple colors of construction paper - Black marker - Cut the plate in half. - Paint one half yellow. - Let the plate dry. - Cut strips of paper. (Cut out as many as the number of days untill school!) - Link the strips of paper and attach them to the painted plate. - Cut out shapes. - Glue the shapes on the plate to create the bus. - Cut the wheels and glue on the bus.
<urn:uuid:95cdd62e-b02d-428b-872a-217de7977015>
CC-MAIN-2020-10
https://mrmarksclassroom.com/countdown-to-pre-k-bus/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146123.78/warc/CC-MAIN-20200225141345-20200225171345-00151.warc.gz
en
0.844171
116
3
3
WASP Aromatherapy Treatments YELLOW JACKETS or OTHER INSECT STINGS by Jeanne Rose (Late June 2000, 2007) I live in a Victorian home that has a 100-year history of housing paper wasp nests. During the course of the year, when I teach Aromatherapy Classes and classes and instruct people via the Aromatherapy and Herbal Studies Courses, I have to deal with these pests and instruct my students how now to get bitten, irritated or stung. I have also developed a First Aid Kit to handle such emergencies. Yellow jackets are voracious predators of insect pests such as caterpillars and flies. They are a type of wasp but are often mistaken for bees. Sometimes they are confused with other less aggressive predatory wasps, especially paper wasps. Yellow jackets are relatively short and stout compared to the longer slender paper wasps. Paper wasps also have more dangling legs. Yellow jackets nests are spherical and are enclosed in a papery envelope with a small entrance hole at the bottom. They may also bed in the ground, in old logs or other places where they can burrow and make their nests. They have been found in the logs that I use to line my pathways. Yellow jackets build nests in abandoned rodent burrows and other holes in the ground, in attics (Christmas didnt happen one year in my house because we could not get into the attic for a month, thus we could not get the Christmas ornaments out), in wall voids, in shrubs, in rotting logs lying in the garden and hanging from trees (tree climbers always check our trees for nests as. They release a sort of fragrant glue that will attract them repeatedly to the same property. I have had yellow jacket nests in the rear wall of my home (1970), on the fence (1980), in the Avocado tree (1985), under the porch beams (1990), under the overhang of the greenhouse ledge (1995, killed with Nutmeg oil) and in the attic (1997, in the kitchen wall above the cooler (2001)). And it wasn't until they were removed from the attic that I was told about the fragrant attractant that they release. [That was the year that we had no Christmas tree, as we were afraid to go into the attic to get the ornaments]. Paper wasp nests are usually suspended from eaves or porch ceilings and look like tiny umbrellas filled with hexagonal cells. NATURAL TREATMENTS FOR WASPS, LESS TOXIC CONTROLS and TO AVOID Dont swat at yellow jackets as you will only aggravate them, instead flick them off your skin with the edge of a credit card, key, laminated card that comes in the kit, or other flat surface. Wait until it lands on a flat surface and then trap and remove the creature then either release it or freeze it to get rid of it. Do not strike at a yellow jacket. Slow, gentle motions like a breeze are better. Brush a yellow jacket off with a piece of paper and move slowly Do not squash a yellow jacket. They emit a chemical when dying that can attract and cause other nearby yellow jackets to attack. TIPS DURING YELLOW JACKET SEASON: Wear protective clothing near underground nests Avoid outdoor cooking if you are sensitive to stings Carry an epinephrine kit if you are hypersensitive to insect Outdoors, do not carry sweet drinks or snacks with meat, if you must put them in closed containers with lids. Better to carry plain water and have a nice vegetarian salad. Do not wear perfume. Use unscented body products. Wear socks and shoes. Wear light colored clothing. Move slowly and deliberately near a nest. When distilling, move slowly and don't distill near a nest. Remain calm and do not get nervous and sweat they smell fear. Spray directly into the nest with one of the nerve poisons available at the hardware store. Death sprays include Raid or the direct application of Nutmeg oil (available from any Set traps for yellow jackets in their quiet time - in the dark and well before you want to go outside to eat Traps include Rescue! Yellow jacket; Rescue! Trap; Surefire Deluxe Trap; Victor Yellow DESTROY THE NEST OR HAVE IT REMOVEDD There is a danger of multiple stings when you mess with a yellow jacket nest so it is best to have a professional remove the nest. In my area, we have a company called Beebusters. Also, there are university students doing research on the creatures and sometimes they will remove for free a particularly large nest for homeowners. Seal holes and cracks in foundations, walls, roofs, and eaves. They come back year-after-year to the same locations because of the Cover attic and crawl space vents with fine screen. Clean recyclables before storing them and keep garbage cans clean and tightly covered because Yellow jackets scavenge for meat and PROBLEM: On June 30, 2000, Christine Wenrich and I distilled the Lemon Verbena; I trimmed half of the tree and cut only those branches that had flowers as well as good-looking fragrant leaves. In the past, it has been my experience that Lemon Verbena should be cut in the spring or before flowering so that it will regrow. We harvested and distilled. While sitting awaiting the completion of the distillation, I looked towards the division fence (divides my yard from the dog/still yard) and noticed the new Lemon Verbena from two years ago, had a very dead looking branch. I went to it and reached down the stem of the Lemon Verbena with my left arm towards the place where the plant entered the ground and was swarmed by 6 or so yellow jackets. I did everything wrong. One was caught in my hair, which I managed to brush out. However, one particularly nasty creature had already stung me on the lower left arm about 6 times and another had me on the upper left arm above my elbow. My arm became immediately painful and began to swell I began walking quickly towards the house and warned Christine to get out of the area. CURE: I had available the Tea Tree oil in my First Aid Kit that had been distilled from the flowering Tea Tree in Golden Gate Park and applied this oil liberally to my arm and neck. It eased the pain. I think I should have used meat tenderizer to dissolve the protein of the sting or as someone else suggested, cut half of a Tomato and apply directly to the stings to neutralize the poison. Over the course of the next three weeks, the stings swelled and became two hard knots, one on the forearm and one above the elbow. There was quite a bit of pain involved and for the pain and inflammation I took Advilฎ several times a day. I also continued to apply Tea Tree oil regularly and occasionally tried Lavender (anesthetic use but no healing). Occasionally, I also applied Helichrysum but I think that was just a waste of very valuable oil. After one week, the stings, now one hard knotty mass began to itch unbearably. I would spray them with Lavender hydrosol, which reduced the itching considerably but would often forget and scratch unconsciously. After two weeks, the skin over the hardened knots flaked and finally the swelling subsided. I continued to spray with hydrosols. Now 32 weeks later all that is left is pinprick-sized scabs that are very slowly FUTURE CURE: One should definitely include meat tenderizer (Accent) in your first aid kit if you are near the seashore for jellyfish stings or on land for yellow jacket or hornet stings. Apply cut Tomato to dissolve acid. Bromelain, which is also a meat tenderizer, may work (Pineapple). ADVICE: When around yellow jackets, do not run or sweat. Walk away with purpose and if one lands on you, brush it away, do not swat. They have the ability to bite or sting multiple times. Before sticking your hand into or around a plant, look for a nest. Where yellow jackets have nested in the past, they will nest again as they leave behind an odor that is persistent and will attract new colonies repeatedly. Bibliography: Rose, Jeanne is available at the website. All rights reserved 2007. No part of this article may be used without prior permission from Jeanne Rose. ฉ Authors Copyright Jeanne Rose, 219 Carl St., San Francisco, CA 94117
<urn:uuid:8c8ece49-6541-4d7e-be08-c50e00ae852e>
CC-MAIN-2015-40
http://www.jeannerose.net/articles/wasp_treatments.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737913815.59/warc/CC-MAIN-20151001221833-00128-ip-10-137-6-227.ec2.internal.warc.gz
en
0.943327
1,915
2.890625
3