text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
7.09k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
This new image from NASA’s Mars Reconnaissance Orbiter shows dark streaks on the walls of Garni Crater on Mars. Astronomers believe these recurring streaks are formed by flow of briny liquid water on Mars. Dark narrow streaks, called “recurring slope lineae,” emanate from the walls of Garni Crater on Mars, in this view constructed from observations by the High Resolution Imaging Science Experiment (HiRISE) camera on NASA’s Mars Reconnaissance Orbiter. The dark streaks here are up to few hundred yards, or meters, long. They are hypothesized to be formed by flow of briny liquid water on Mars. The image was produced by first creating a 3-D computer model (a digital terrain map) of the area based on stereo information from two HiRISE observations, and then draping an image over the land-shape model. The vertical dimension is exaggerated by a factor of 1.5 compared to horizontal dimensions. The draped image is a red waveband (monochrome) product from HiRISE observation ESP_031059_1685, taken on March 12, 2013 at 11.5 degrees south latitude, 290.3 degrees east longitude. Other image products from this observation are at http://hirise.lpl.arizona.edu/ESP_031059_1685. Image Credit: NASA/JPL-Caltech/Univ. of Arizona
<urn:uuid:9af43d8e-6cd2-4417-a9e7-25567a1106fa>
CC-MAIN-2022-05
https://scitechdaily.com/mars-reconnaissance-orbiter-reveals-recurring-water-streaks-on-mars/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304570.90/warc/CC-MAIN-20220124124654-20220124154654-00424.warc.gz
en
0.903724
302
3.921875
4
Media contact: Emily Gresham Wherle, Public Information Administrator, 859.344.5470 or Emily.Gresham-Wherle@nkyhealth.org. Wednesday, July 22, 2015 Cases of common gastrointestinal illnesses have risen in recent weeks in Northern Kentucky, with reports of E. coli, Campylobacteriosis and Salmonella in local residents. All three illnesses can spread through contact with livestock, so the Northern Kentucky Health Department is reminding those who come into contact with animals to use extra caution this summer. The rise has been most noticeable in cases of Campylobacteriosis. Since January, 35 cases of Campylobacteriosis have been reported in Northern Kentucky, compared to 18 cases reported between January and July of 2014. Reports of Salmonella and E.coli are also up this month, but rates of those illnesses have not yet surpassed 2014 levels. Live animals may have germs in their droppings and on feathers, feet, skin and beaks—even if the animal appears healthy and clean. The germs can also get on cages, coops, hay, plants and soil. Additionally, the germs can be found on the hands, shoes and clothing of those who handle the animals or work or play near live animals. “Whether it’s at a private home or a county fair, we often enjoy spending time around animals in the summer,” said Lynne M. Saddler, MD, MPH, District Director of Health. “These three illnesses are common in the summer, but prevention can be simple: Wash your hands after coming in contact with animals. If hand washing facilities aren’t available, use an alcohol-based hand sanitizer.” Further, do not take food or drinks into livestock areas, and be careful with baby items that might end up in the mouth, like pacifiers and bottles, when around livestock. Drinking milk that is pasteurized and thoroughly cooking meats is another important step in prevention of these types of illnesses. Campylobacteriosis is one of the most common diarrheal illnesses in the U.S. It is typically spread through contaminated food, but can also be transmitted through contact with infected animals. It causes diarrhea, abdominal pain, nausea, fever and vomiting. The diarrhea may contain blood and mucus. Infected persons may show mild symptoms or may have no symptoms at all. E. coli is a bacteria that often lives in the intestines of animals. It can be spread through unpasteurized dairy products and contact with infected animals. Symptoms of E. coli include severe, bloody diarrhea and abdominal cramps. Salmonella can be spread through contact with infected poultry or reptiles, as well as by eating poultry that has not been cooked properly. The bacterial infection causes diarrhea, cramps, nausea, headache, fever and sometimes vomiting. “In most people, these three bacteria will cause mild illness and resolve on their own within a few days, but more severe cases can lead to complications such as dehydration,” said Saddler. “People with chronic illnesses and young children are at an increased risk for more severe illnesses.” For more information on Campylobacteriosis, E. coli and Salmonella, please visit http://www.nkyhealth.org/Services/Fact-Sheets.aspx. # # # Media representatives should contact Emily Gresham Wherle at 859.344.5470 or Emily.Gresham-Wherle@nkyhealth.org, about any request or information before calling any other Health Department employee. Your calls and requests will be handled expediently with your deadlines in mind. Thank you for your interest and support in educating the community about public health issues. State of Kentucky News Releases For statewide news releases, please visit the Kentucky Cabinet for Health and Family Services.
<urn:uuid:7847179f-d151-4af0-8363-f75e585e271c>
CC-MAIN-2017-30
http://nkyhealth.org/Blog/News-Releases/Archives/2015/07/Wash-Hands-After-Contact-with-Animals-to-Prevent-Intestinal-Illnesses.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424088.27/warc/CC-MAIN-20170722162708-20170722182708-00694.warc.gz
en
0.94102
805
3.1875
3
Facebook's fake account detection mechanisms can be defeated 80 percent of the time with the help of automated tools, researchers from the UBC (University of British Columbia) have found after an eight-week test. The research team, composed of Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu, created a network of 102 bots designed to mimic humans on social networks, and released them on Facebook with the intent of befriending as many users as possible and collecting private information. [ Find out how to block the viruses, worms, and other malware that threaten your business, with hands-on advice from InfoWorld's expert contributors in InfoWorld's "Malware Deep Dive" PDF guide. ] "Creating a user account on an OSN [online social network] involves three tasks: providing an active email address, creating a user profile, and sometimes solving a CAPTCHA. [...] We argue that an adversary can fully automate the account creation process," the researchers wrote in a research paper which they plan to present at the 27th Annual Computer Security Applications Conference next month. This is not a new type of attack: Malware threats like Koobface have long used automatically created accounts to spam malicious links. This pushed Facebook to develop specialized detection mechanisms over the years. Unfortunately, these defense systems are not effective enough, according to UBC researchers. The social bots they unleashed onto Facebook targeted 5,053 randomly selected users to whom they sent friend requests. The rate at which the targeted individuals accepted these requests was 20 percent on average, with bots using female profiles having better success. However, the rate tripled when the bots started targeting friends of those who had accepted requests. After befriending new users, the automated programs scraped their profiles, news feeds and wall posts for personal information. The collected data included things like gender, birth date, place of employment, names of attended schools, home city, current city, mail address, email address, phone number, IM account IDs and marital status. The researchers stopped their test when the Internet traffic it generated became too heavy. The social bot network sent 3GB of data and received approximately 250GB over the course of eight weeks. During this time, Facebook's real-time protection system only blocked 20 of the 100 fake profiles. However, on closer investigation, it was determined that those profiles were actually flagged as spam by other users. "Our results show that (1) OSNs, such as Facebook, can be infiltrated with a success rate of up to 80 percent, (2) depending on users' privacy settings, a successful infiltration can result in privacy breaches where even more users' data are exposed when compared to a purely public access, and (3) in practice, OSN security defenses, such as the Facebook Immune System, are not effective enough in detecting or stopping a large-scale infiltration as it occurs," the researchers said. Malware experts acknowledge Facebook's efforts to block automated account creation attempts on its social network. According to antivirus vendor BitDefender, the number of threats that use such techniques has decreased considerably during the past two years. "This shift is mostly due to the fact that Facebook is continually working on improving the network's security, but, no matter the effort, cybercrooks still find ways to sneak in," Bogdan Botezatu, a spokesman for the company, said. However, there is still a significant amount of malware that abuses already compromised accounts in order to spread on the social network. "There are numerous variants of different botnets that attempt to login to Facebook in order to spread adware or unwanted software," Adam Thomas, a threat researcher at GFI Software said. In order to protect both their private information and their computers, social networking users should avoid accepting friend requests from unknown individuals and always be wary of links sent to them, even when the people who sent them are friends.
<urn:uuid:8d742731-7d8f-4e9a-8888-1810b680db80>
CC-MAIN-2014-35
http://www.infoworld.com/d/security/facebook-easily-infiltrated-data-harvesting-bots-177856
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829661.96/warc/CC-MAIN-20140820021349-00308-ip-10-180-136-8.ec2.internal.warc.gz
en
0.949575
810
2.703125
3
You don’t have to be involved in many discussions on the issue of gender roles in the New Testament and the church today before someone cites the ‘culture Paul / Peter was writing to.’ They usually argue that the culture ‘back then’ was different. Women weren’t educated, had no opportunities to grow, teach, express themselves, attain to leadership positions. Paul was going along with some of the cultural assumptions he had inherited from the ancient world, so as to earn Christianity a hearing. But our culture now is far more progressive. Things are different now, it is argued, and so our understanding of the roles of men and women must also progress from where it was ‘back then.’ One of the (several) things that is wrong with this argument is that it often assumes a simplistic and monolithic view of gender roles and identity across all swaths of society in the Roman world. But such was not the case then, as it is not the case now. There simply was not ‘one, simple, all-accepted understanding of the roles of men and women’ back then any more than there is now. Clinton Arnold, after spending seven pages surveying the issues and views surrounding the treatment of women in society in Western Asia in the first century, highlights this reality. ‘… there were many changes in the air, and it is fair to ask whether Paul may have addressed these in his instructions to men and women. There are a few observations we can make: (1) There was a variety of ungodly cultural pressures that husbands and wives would have felt in the environment of western Asia Minor. These would have ranged from the traditional roles of the heavy-handed dominance asserted by the paterfamilias and the unquestioning obedience of the wife to the societal trends seen in the new Roman women, who exhibited a defiance of their husbands and the traditional roles. (2) There is no doubt that women in western Asia Minor were finding more opportunities in the civic and religious life of the communities. Some were finding a new degree of freedom from the restraint, control and dominance of men in society, politics, religion, and the household. (3) There were also some fairly radical trends in gender identity, where some men were repudiating their masculinity, appropriating a feminine identity, serving a female goddess, and engaging in sexual relations with both men and women. (4) In light of this diversity of trends in society, Paul writes to many Christians in Ephesus and western Asia Minor to give biblical and christological perspective on what it means to live as husband and wife. His readers come from all segments of society–they are slaves, peasants, and probably many from the urban elite. Some will have held to the traditional Greek and Roman understanding of roles, but others would probably be living the lifestyle of the new Roman women. It would not at all be surprising to find that there were some women who became Christians who once served as priestesses in the local goddess cults. (5) Paul’s remarks to husbands and wives are counter to every cultural pattern represented in that society. His vision for marriage is not a concession to any cultural pattern, but substantially challenges them all. His plan is rooted in the creation design and profoundly informed by the relationship that Christ has with his church. 1 The bottom line is that whatever position you end up taking on the roles of men and women, you cannot simply argue that ‘people thought differently about women back then’ and that ‘things have changed.’ Sometimes that is equally true and untrue. We need to be careful to do our research and not merely assume that we know what things were like ‘back then.’ Especially if it is the criteria we’re using to determine what is pleasing to God right now.
<urn:uuid:23d0a14d-41bc-4e60-b1c4-5f36f1c91ebb>
CC-MAIN-2018-17
http://julianfreeman.ca/doctrine/culture-changed
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945222.55/warc/CC-MAIN-20180421125711-20180421145711-00219.warc.gz
en
0.981555
794
2.578125
3
Volume 8, Issue 4: April 2017 - Training in the Spokane Indian Community Ensures a Safe and Healthful Workplace - Video Promotes Firefighter Health and Safety - Video Series on the NIH Grant Review Process - Learn the Principles of Toxicology with NLM's ToxTutor - FDA and EPA Issue Final Fish Consumption Advice - PEPH Environmental Health Chat Podcast Series - PEPH in the March NIEHS Environmental Factor - Upcoming PEPH-Related Events - Funding Opportunities Training in the Spokane Indian Community Ensures a Safe and Healthful Workplace PEPH is pleased to highlight the efforts of the International Union of Operating Engineers National Training Fund (IUOE NTF) in honor of Workers' Memorial Day on April 28. IUOE NTF is training members of the Spokane Indian Tribe to protect themselves and their community from exposure to hazardous materials during cleanup activities at the Midnite Mine Superfund site in Washington State, located within the Spokane Indian Reservation. These training efforts protect worker health and safety, create jobs, and build training capacity in the community. After 30 years of uranium mining activities, 2.4 million tons of stockpiled ore and 33 million tons of waste rock are at the site, just outside the Spokane Indian Reservation boundary. The site poses a potential threat to people's health and the environment because of the presence of heavy metals and elevated levels of radioactivity. Locals face risk of exposure through residential land use; ingestion of groundwater; and subsistence hunting, gathering, and fishing. Cleanup of the Midnite Mine site began in 2015 and is estimated to take 10 years or more. "Since 2013, IUOE NTF and IUOE Local Union 370 have trained the workers so their health and safety are not compromised during the mine cleanup. With our training, tribal members will know how to do the work safely and how to protect their health in the manner all workers deserve," said Barbara McCabe, Principal Investigator of the IUOE NTF. Hazardous Waste Operations and Emergency Response (HAZWOPER) training is required to get on the mine site. In the HAZWOPER courses, workers learn different skills to protect themselves from the hazardous exposures they will encounter during cleanup. These skills include putting on appropriate personal protective gear and properly using heavy equipment to remove, contain, and transport waste rock. In addition to ensuring a safe and healthful work environment, these courses enable members of the Spokane Tribe to obtain employment at the Midnite Mine cleanup project. According to Clyde McCoy, Director of the Tribal Employment Rights Office, more than 20 tribal members working on the Midnite Mine cleanup received their HAZWOPER training through the IUOE NTF - Spokane Tribe partnership. Through a train-the-trainer model, which teaches workers to become course instructors, IUOE NTF is also building capacity within the community. For example, one Spokane Tribe member became a Peer Trainer in 2015 after attending the 80-hour HAZWOPER train-the-trainer course and now leads HAZWOPER courses in the community. The IUOE NTF's support for Peer Trainers ensures members of the Spokane Tribe receive timely instruction and are prepared to work for the cleanup. IUOE NTF's trainings for the Midnite Mine site cleanup are funded by both the NIEHS Hazardous Waste Worker Training Program – as a consortium member of NIEHS grantee Center for Construction Research and Training (CPWR) – and the NIEHS - Department of Energy Nuclear Worker Training Program. Workers' Memorial Day takes place every year on April 28. It is an opportunity to honor workers and to reflect on the importance of safe and healthful workplaces for all and to highlight the preventable nature of most work-related accidents and health problems. Video Promotes Firefighter Health and Safety Researchers from the NIEHS-funded Environmental Health Sciences Core Center at the University of Cincinnati collaborated with the Cincinnati Fire Department to conduct exposure research and develop intervention strategies to reduce workplace exposures. One result of this collaboration was an awareness video to communicate the health hazards of firefighting. Because of occupational exposure to asbestos, particulate matter, and other chemicals, firefighters have an increased risk of cancer compared to the general population. The video promotes awareness of these health risks and provides three key messages – wear your air, wear your gear, and wash yourself – to help firefighters reduce their exposure. The video was distributed to the Ohio Association of Professional Firefighters, as well as on various social media platforms. This was just one of nearly 20 videos shown at the Environmental Health Science (EHS) FEST Film Festival in December. You can find links to all of the videos from the film festival on the EHS FEST meeting webpage. Video Series on the NIH Grant Review Process The NIH Center for Scientific Review (CSR) video series gives an inside look at how scientists from across the country review NIH grant applications for scientific and technical merit. CSR is the portal for receipt and referral of NIH grant applications and carries out the peer review process for assessing scientific and technical merit for most applications. The videos provide insights and understanding that can help both new and established applicants improve their applications and increase their chances of receiving a more positive review. Check out the videos listed below. NIH Peer Review Briefing for Basic Research Applicants and Reviewers: The NIH Director and other NIH/CSR officials reaffirm NIH's commitment to basic research and help applicants and reviewers do their part in proposing and reviewing basic research. 8 Ways to Successfully Navigate NIH Peer Review and Get an R01 Grant: This briefing covers the key things applicants need to know about the submission and review of their R01 applications. 8 Ways to Successfully Navigate NIH Peer Review and Get a Fellowship Grant: This briefing covers the key things applicants need to know about the submission and review of their fellowship applications. Learn the Principles of Toxicology with NLM's ToxTutor The National Library of Medicine (NLM) has updated its web-based and self-paced toxicology tutorial, ToxTutor. For almost 20 years, students and others have used ToxTutor to explore the fundamental principles of toxicology. It is written in plain language and includes helpful illustrations to provide users with a basic understanding of the subject. ToxTutor introduces toxicology by covering dose and dose response, toxic effects, interactions, toxicity testing methods, risk assessment, and exposure standards and guidelines. Additional topics will be included in future updates. A certificate of completion option has recently been added. FDA and EPA Issue Final Fish Consumption Advice The U.S. Food and Drug Administration and the U.S. Environmental Protection Agency recently issued final advice regarding fish consumption. This advice is geared toward helping women who are pregnant or may become pregnant – as well as breastfeeding mothers and parents of young children – make informed choices when it comes to fish that is healthy and safe to eat. All fish contain at least trace amounts of mercury, which can be harmful to the brain and nervous system if one is exposed to too much of it over time. However, because the nutritional benefits of eating fish are important for growth and development during pregnancy and early childhood, the agencies are advising and promoting a minimum level of fish consumption for these groups. The advice recommends 2 to 3 servings of lower-mercury fish per week, or 8 to 12 ounces. To help consumers more easily understand the types of fish to select, the agencies have created an easy-to-use reference chart that sorts 62 types of fish into three categories: "Best Choices" (eat two to three servings per week), "Good Choices" (eat one serving per week), and "Choices to Avoid." For fish caught recreationally, consumers are urged to check for local and state advisories and to gauge their fish consumption based on those advisories. PEPH Environmental Health Chat Podcast Series In our latest podcast, Wood Burning Stoves and Human Health, hear how researchers at the University of Montana are working in their communities to understand how burning wood for home heating contributes to indoor air pollution and its related health impacts. The researchers are also identifying promising interventions to improve indoor air quality and health in households that use wood burning stoves. PEPH in the March NIEHS Environmental Factor Innovative technology provides safe drinking water in California. New technology developed with NIEHS funding will provide safe drinking water in California, at lower cost and without secondary waste. Rethinking STEM education during Black History Month. Sherick Hughes, Ph.D., discussed the implicit and explicit bias facing black students in science, technology, engineering, and math fields. ECHO – solution-oriented research for health at all stages of life. Matthew Gillman, M.D., wants Environmental influences on Child Health Outcomes (ECHO) research to seek solutions that consider all life stages. Metals symposium draws researchers, students, and community members. Toxic metals were the focus of the North Carolina State University Center for Human Health and the Environment's first annual symposium. Upcoming PEPH-Related Events April 5 - 7, 2017: Children's Environmental Health Translational Research Conference in Arlington, Virginia. Hosted by the Children's Environmental Health Network (CEHN), this event will highlight cutting-edge research on some of the biggest emerging threats to children's environmental health. May 17 - 20, 2017: Citizen Science Association (CSA) Conference in Twin Cities, Minnesota. Join CSA for CitSci2017 and be part of conversations to create a field of citizen science. June 14 - 15, 2017: Highly Fluorinated Compounds - Social and Scientific Discovery in Boston, Massachusetts. This conference will address the social, scientific, political, economic, and environmental health issues raised by per- and polyfluoroalkyl substances (PFASs). To be notified when registration opens, please send your email address to Stephanie Knutson (firstname.lastname@example.org). July 10 - 13, 2017: NEHA Annual Educational Conference (AEC) and Exhibition in Grand Rapids, Michigan. The National Environmental Health Association's (NEHA) AEC is the nexus for environmental health training, education, networking, and advancement. Attendees can also earn Continuing Education credits. August 14 - 18, 2017: NIMHD Health Disparities Research Institute in Bethesda, Maryland. Hosted by the National Institute on Minority Health and Health Disparities (NIMHD), this program supports the development of promising minority health / health disparities research scientists early in their careers. Applications are due May 12. September 18 - 20, 2017: 2017 PEPH Meeting at NIEHS's main campus in Durham, North Carolina. Save the date for the 2017 PEPH Network meeting! This year, we will have in-depth conversations about different engagement approaches and the audiences with whom we work. We are also working with the Disaster Research Response network to discuss the different partnerships required to have an effective response in the aftermath of a disaster. October 15 - 19, 2017: International Society of Exposure Science (ISES) Annual Meeting in Research Triangle Park, North Carolina. Mark your calendars for the 27th annual ISES meeting! Registration will open in early April. October 22 - 25, 2017: American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America Annual Meeting in Tampa, Florida. This year's theme is "Managing Global Resources for a Secure Future." NIEHS grantee Monica Ramirez-Andreotta is co-organizing and moderating a session titled "Community Engagement and Public Participation in Environmental Research." If you are working in this area, please consider submitting an abstract by May 23. November 4 - 8, 2017: APHA Annual Meeting & Expo in Atlanta, Georgia. The American Public Health Association (APHA) is now accepting abstracts for the APHA 2017 Annual Meeting & Expo. This year's theme is "Creating the Healthiest Nation: Climate Changes Health." Visit the PEPH Funding Opportunity Announcements (FOA) page for more PEPH-related funding opportunities. Public Participation in STEM Research. The National Science Foundation (NSF) encourages proposals for (a) Research Coordination Networks to build Public Participation in STEM Research (PPSR) capacity and community; (b) conference proposals to bring together specific communities and to envision future directions for PPSR activities; and (c) PPSR-focused supplements to existing NSF-funded awards that enhance existing research activities through the introduction of PPSR components. Deadline: April 11, 2017. National Academies' Gulf Research Program Research-Practice Grants. This funding opportunity is designed to support research and practice projects on one of two topics: (1) integration of monitoring and evaluation into environmental restoration projects to improve outcomes in the Gulf of Mexico or (2) improving risk-based evaluations to support a public health response to the next oil spill. A webinar will be held April 6, 2017 from 1:30 to 2:30 p.m. EDT to answer questions from potential applicants (register). Deadlines: May 3, 2017 (letter of intent); June 28 (application). Interventions for Health Promotion and Disease Prevention in Native American Populations (R01). The purpose of this FOA is to develop, adapt, and test the effectiveness of health promotion and disease prevention interventions in Native American populations. Deadlines: May 12, 2017 (application); a letter of intent is due 30 days before the application due date. Addressing Health Disparities through Effective Interventions among Immigrant Populations (R01). Supports innovative research to develop and implement effective interventions to address health disparities among U.S. immigrant populations. Deadline: June 5, 2017. Spatial Uncertainty: Data, Modeling, and Communication (R01). Supports innovative research that identifies sources of spatial uncertainty in public health data, incorporates the inaccuracy or instability into statistical methods, and develops novel tools to visualize the nature and consequences of spatial uncertainty. Deadline: June 5, 2017. Environmental Exposures and Health: Exploration of Non-Traditional Settings (R01, R21). Encourages interdisciplinary research aimed at promoting health, preventing and limiting symptoms and disease, and reducing health disparities across the lifespan for those living or spending time in non-traditional settings (i.e., playgrounds and nursing homes). Deadlines: June 5, 2017 (R01); June 16, 2017 (R21). Research to Action: Assessing and Addressing Community Exposures to Environmental Contaminants (R01). Encourages applications using community-engaged research methods to investigate the potential health risks of environmental exposures of concern to the community and to implement an environmental public health action plan based on research findings. Deadline: June 5, 2017. Education and Health: New Frontiers (R01, R03, R21). Supports research that will further elucidate the pathways involved in the relationship between education and health outcomes and in doing so will carefully identify the specific aspects and qualities of education that are responsible for this relationship and what the mediating factors are that affect the nature of the causal relationship. Deadlines: June 5, 2017 (R01); June 16, 2017 (R03, R21). Health Disparities and Alzheimer's Disease (R01). Supports research to study health disparities in Alzheimer's disease (AD) and related disorders. Health-disparities research related to AD should include the study of biological, behavioral, sociocultural, and environmental factors that influence population-level health differences. Deadline: June 5, 2017. Are you enjoying the PEPH Newsletter? If so, please forward this email to your friends and colleagues and suggest they sign up! Do you have an announcement to share with the PEPH community? Send us your news for the next issue of the PEPH Newsletter (email@example.com). To subscribe to our mailing list, remove your name from our mailing list, or submit a question/comment, please email firstname.lastname@example.org. Make sure to follow us on Twitter!
<urn:uuid:5610f7d1-791f-4a64-a135-d5b711fb3207>
CC-MAIN-2021-49
https://www.niehs.nih.gov/research/supported/translational/peph/currentissue/lists/4_17/index.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358233.7/warc/CC-MAIN-20211127193525-20211127223525-00061.warc.gz
en
0.925561
3,353
2.59375
3
November 26, 2018 - 10 years since the launch of the first new-series transport cargo vehicle Progress M-01M with separate modified onboard systems. November 24, 2018 - 15 years since the launch of two telecommunication satellites Yamal-200. November 20, 2018 - 20 years since the launch of the first Russian module of FGB "Zarya", the first ISS block. November 15, 2018 - 30 years since the launch of reusable transportation space system "Energia-Buran". The pioneer flight of orbiter "Buran". Having performed two-orbit flight around Earth, orbiter "Buran" carried on the world's first automatic landing on airfield. November 10, 2018 - 50 years since the launch of planetary sonde Zond-6 which performed circumlunar flight and returned to Earth. October 25, 2018 - 50 years since the launch of unmanned spacecraft Soyuz-2. October 10, 2018 - 70 years since the first successful launch of national ballistic missile R-1. October 4, 2018 - 60 years since the first launch of rocket R-11A. September 23, 2018 - 60 years since the launch of LV Vostok, the first launch of three-stage rocket with block E. September 15, 2018 - 50 years since the launch of planetary sonde Zond-5. The first successful circumlunar flight (September 18, 1968) and return to Earth (September 21, 1968) . Unmanned test flight of lunar spacecraft according to the L1 program. Biological container (including turtles) is returned. June 16, 2018 - 55 years since the launch of space vehicle Vostok-6 carrying the world's first female astronaut V.V. Tereshkova. June 14, 2018 - 55 years since the launch of space vehicle Vostok-5 piloted by B.F. Bykovskiy. May 15, 2018 - 60 years since the launch of the third artificial Earth satellite, the research laboratory. April 28, 2018 - 10 years since the first launch under Land Launch Program from Baikonur Cosmodrome. April 19, 2018 - 65 years since the first successful launch of missile R-5 for a maximum range. April 18, 2018 - 65 years since the first launch of missile R-11. April 15, 2018 - 50 years since the second automatic docking of unmanned spacecraft Soyuz (Kosmos-212 and Kosmos-213). April 2, 2018 - 55 years since the launch of automatic station Luna-4. April 1, 2018 - 60 years since missile R-11M going into service. March 18, 2018 - 55 years since the launch of ballistic missile RT-1 running on solid propellant. March 15, 2018 - 65 years since the first launch of strategic missile R-5. March 2-10, 2018 - 40 years ago the flight of spacecraft Soyuz-28 was performed. For the first time in cosmonautics history, international crew consisting of A.A. Gubarev (USSR) and V. Remek (Czechoslovakia) was delivered to OS Salyut-6. March 2, 2018 - 50 years since the launch of automatic station Zond-4. January 20, 2018 - 40 years since the launch of the first cargo-vehicle Progress 1. For the first time in cosmonautics history, unmanned vehicle made it possible to carry out transport operation to deliver fuel to manned orbital station Salyut-6 for refueling propulsion systems, equipment, hardware and materials to provide crew life support and conduct scientific studies and experiments.
<urn:uuid:e1244ea6-365c-4d6e-9c5d-963ef9358da6>
CC-MAIN-2019-47
https://www.energia.ru/en/archive/dates_2018.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670821.55/warc/CC-MAIN-20191121125509-20191121153509-00391.warc.gz
en
0.903056
757
2.875
3
Pathos is a quality of an experience in life, or a work of art, that stirs up emotions of pity, sympathy, and sorrow. Pathos can be expressed through words, pictures, or even with gestures of the body. Pathos is an important tool of persuasion in arguments. Pathos is a method of convincing people with an argument drawn out through an emotional response. Analyzing examples of pathos, one would come to the conclusion that it differs from other “ingredients of persuasion,” namely “ethos” and “logos.” Ethos means convincing others through the credibility of a persuader, while logos is a method to convince others by employing logic and reason. Common Examples of Pathos For a better understanding of the subject, let us examine a few pathos examples from daily conversations: - “If we don’t leave this place soon, we’ll be yelling for help. There’s no one to help us here, let’s get out of here and live.” – This statement evokes emotions of fear. - The “Made in America” label on various products sold in America tries to enhance sales by appealing to customers’ sense of patriotism. - Ads encouraging charitable donations show small children living in pathetic conditions, to evoke pity in people. - Referring to a country as “the motherland” stirs up patriotic feelings in individuals living in that country or state. - A soft, instrumental symphony may arouse people emotionally. Examples of Pathos in Literature Let us turn to literature to trace some examples of pathos: Example #1: The Adventures of Tom Sawyer (By Mark Twain) Consider this excerpt from chapter 8 of Mark Twain’s The Adventures of Tom Sawyer: He had meant the best in the world, and been treated like a dog—like a very dog. She would be sorry someday—maybe when it was too late. Ah, if he could only die TEMPORARILY! Here, Tom arouses feelings of pity in readers’ minds by telling how the girl, whom he loved, had treated him like an animal, despite his honest feelings for her. He wishes he had died and then she would feel sorry for him. Example #2: Pride and Prejudice (By Jane Austen) Jane Austen’s “Pride and Prejudice” is well known for its pathos. Mr. Collins’ confession to Elizabeth that he wants her to be his future partner evokes feelings of sympathy in readers, as they feel an emotional intensity in his proposal. Believe me, my dear Miss Elizabeth, that your modesty adds to your other perfections. But you can hardly doubt the object of my discourse, however your feminine delicacy may lead you to dissemble. For, as almost as soon as I entered the house, I singled you out as the companion of my future life! Example #3: Romeo and Juliet (By William Shakespeare) Consider this excerpt from Act V of William Shakespeare’s Romeo and Juliet: Then she is well, and nothing can be ill. Her body sleeps in Capels’ monument, And her immortal part with angels lives. I saw her laid low in her kindred’s vault. Romeo’s servant Balthasar invokes pity among the audience, when he informs Romeo – who was waiting impatiently to hear about Juliet – that Juliet is dead and is buried in her family’s vault. We feel sorry for the untimely death of Juliet and her heartbroken Romeo. Example #4: Ol’ Man River (By Paul Robeson) These lines are taken from Ol’ Man River, a lyric composed by Paul Robeson: Darkies work on de Mississippi Darkies work while de white folks play We feel overcome by pity for Black Americans [“Darkies”] who were enslaved to White Americans [“white folks”]. The contrast of the words “work” and “play” shows the social disparity between the two races. Example #5: I Know Why The Caged Bird Sings (By Maya Angelou) In Maya Angelou’s I Know Why the Caged Bird Sings, pathos is created by presenting a contrast between “the free bird” and “a caged bird.” The free bird thinks of another breeze and the trade winds soft through the sighing trees and the fat worms waiting on a dawn bright lawn and he names the sky his own But a caged bird stands on the grave of dreams his shadow shouts on a nightmare scream his wings are clipped and his feet are tied so he opens his throat to sing. In this excerpt, we see the words in bold above are associated with a bird in a cage, which makes us feel pity toward that miserable bird. Function of Pathos We humans are emotional beings, and writers know it very well. They introduce pathos in their works to touch upon our delicate senses of pity, sympathy, sorrow, trying to develop an emotional connection with readers. In addition, emotions are part of real life. Thus, by giving pathos expression in their works, writers bring their narratives, characters, and themes closer to real life. Furthermore, the use of pathos by a debater in an argument appeals to people emotionally, making it a tool to convince people and change their opinions.
<urn:uuid:e9ce7717-8bb2-4d18-87b3-843a9f7e8f4e>
CC-MAIN-2019-30
https://literarydevices.net/pathos/
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195530385.82/warc/CC-MAIN-20190724041048-20190724063048-00143.warc.gz
en
0.947703
1,159
3.984375
4
1. The right to participate in government and electoral process On numerous occasions, the Inter-American Commission on Human Rights has referred to the importance of the exercise of the right to participate in government in a system of representative democracy. The General Assembly of the Organization of American States has also adopted a number of resolutions where the system of representative democracy is considered the one that best guarantees the observance of human rights. Such a system is, moreover, expressly adopted by the member states as stipulated in Article 3.d of the Charter of the Organization, according to which: The solidarity of the American states and the high aims which are sought through it require the political organization of those states on the basis of the effective exercise of representative democracy. One of the key elements of the system of representative democracy is the exercise of the political rights recognized in Article 23 of the American Convention on Human Rights, which are among the rights that, under Article 27 of this Convention, cannot be suspended. In Article 23 of the American Convention, the reference to “genuine” elections implies the existence of a legal and institutional structure conducive to election results that reflect the will of the voters. Election laws and institutions must therefore serve to guarantee that the will of the citizenry will be respected. Still more important is that the fundamental currents of political thought in the country be reflected fully in the drafting of those laws. Given the importance of electoral legislation, it is essential that it be the product of a census rather than the outcome of an imposition by parliamentary majorities. The highest-ranking electoral body is the Electoral Tribunal whose membership and functions are spelled out in Articles 126 and 127 of the Constitution. The Tribunal is composed of three magistrates appointed for seven years; on is selected by the Supreme Court of Justice, another by the National Assembly of Representatives, and the third by the Executive Branch. The functions of the Electoral Tribunal are very important since it is responsible for appointing the members of electoral institutions: the National Teller Board, the Circuit Teller Boards, the District Teller Boards, the Community Teller Boards, and the polling stations. It must also hand down its opinion on the legalization of political parties, voter registration, and the issuance of voter registration cards. The Teller Boards are responsible for counting the votes and forwarding the results to the Electoral Tribunal, which rules only on complaints presented to it. Within the structure of the Panamanian electoral system the electoral comptroller is the officer in charge of monitoring the conduct of those connected with election-related business and investigating complaints. The comptroller’s functions follow from the provisions of Article 128 of the Constitution. For the purposes of the narrative contained in the Chapter, it is relevant to point out that the system introduced by the Electoral Code establishes that the first count will be made at the corresponding polling station and the results will be entered in as many records as there are categories of authorities up for election. Members of the polling stations may also receive copies of those records authenticated by the secretary of the polling station. According to Article 266 of the Electoral Code “copies shall be as valid as the originals forwarded to electoral boards for official tabulation.” In the case of elections for president, vice presidents and legislators, the original record will be sent to the National Teller Board, to the Electoral Circuit Teller Board and to the Electoral Tribunal. The Teller Boards will recount the votes and enter the results in their own records. The overall tabulation of votes in elections for president and vice presidents shall be done by the National Teller Board. During the visit the Inter-American Commission made to Panama from February 27 to March 3, 1989, various sectors expressed reservations about the membership of the Electoral Tribunal as well as certain irregularities they perceived in the way it operated. They also expressed their reservations on the election laws. They noted that the amendments to the election laws approved through Law Nº 9, of September 21, 1988, were introduced by the ruling majority in the House because the opposition parties (Molirena and Democracia Cristiana) were not allowed to state their position. When a reading of minority opinion was barred in the committee that had prepared the amendments, the minority walked out. The election legislation was not, therefore, the product of a democratic process of debate and formulation; instead, it was skewed by the exclusion of the viewpoints of, major opposition sectors. As for the membership of the Electoral Tribunal, a number of persons told the Inter-American Commission that the Chairwoman, Yolanda Pulice de Rodríguez, had been appointed to membership of the Tribunal by the Supreme Court of Justice in 1979; she had been one of the members of the Tribunal in 1984 elections. The Vice Chairman, Lic. Luis Carlos Chen, was appointed in 1985 by then President Del Valle, while the other Magistrate, Lic. Aurelio Correa, had been designated by the National Assembly in October, 1988, after having served for 10 years as Comptroller of the Electoral Tribunal. They also pointed out that at present the Comptroller is Lic. Raúl López, who for 17 years has served as legal counsel for the Defense Forces. Given this composition, they considered that the election authorities were no guarantee of impartiality nor did they allow for opposition participation in decisions that might affect it. The Inter-American Commission was also informed of several decisions of the Electoral Tribunal that dovetailed with tactics attributed to the government, calculated to divide the opposition parties. An episode in 1984 was cited in this connection: a faction of the Panameñista Party broke away and was ultimately recognized by the Electoral Tribunal; as a result, Arnulfo Arias had to form the Panameñista Auténtico Party to surmount the obstacles created when the minority faction that had opposed him was recognized. In December 1988 there was again division in the ranks of the Panameñista Auténtico Party and the Electoral Tribunal again recognized the group most closely aligned with the government’s positions, though most of the party leadership had supported its Secretary General, Guillermo Endara. Endara would go on to become the presidential candidate of the Alianza Democrática de Oposición Civilista in the elections held on May 7, 1989. The Commission also heard that something similar had happened in the case of the Republican Party whose leadership supported ADOC in the elections. Regarding the election laws, the Inter-American Commission heard frequent references to the changes that should be made to the rules on voting by members of the Defense Forces; the view was that the legal provisions adopted permitted them to vote at several polling stations, though no provision is made for the use of indelible ink to identify those who have already voted. It was also mentioned that voting lists were frequently altered. It was also stated that the membership of polling stations worked to the advantage of the party in power, since the chairman is appointed by the Electoral Tribunal and the parties forming the Coalición para la Liberación Nacional (COLINA)--an official line party--constitute the majority that would have to rule on complaints. These charges increased during the period immediately before the May 7 elections. The opposition candidates brought a formal complaint concerning what they considered to be irregularities in the Register of Voters, citing specifically “he unaccountable increase in the voting population, which was almost twice the increase in the voting age population during the same period.” They also denounced “the creation of false voters” which caused “the duplication of over 100,000 voter names; supplying “government supporters with a number of personal identification cards”; “the unlawful practice of transporting thousands of voters to circuits where the opposition was especially strong”; “registering voters in voting districts far from their place of domicile” while a significant number of deceased voters were kept on the Register of Voters. The Inter-American Commission also heard numerous references to the general conditions amid which the electoral process was unfolding, which adversely affected the authenticity of the scheduled elections. There were repeated references to the closing of newspapers, television and radio stations, such as La Prensa, El Siglo, Extra, the weekly Quiubo, Channel 5 and Radio Mundial and Radio KW Continents. According to reports received by the Commission, authorization to publish the new daily Hoy had not been granted either. From what the Inter-American Commission was able to determine, the severe restrictions that opposition sectors encountered in exercising their right to freedom of expression stood in sharp contrast to the way in which government-aligned groups were able to saturate voters with messages in support of their positions. The right to freedom of expression is discussed in another chapter of this Report. Suffice it to say here that the kinds of restrictions placed on the exercise of this right during the electoral process put opposition sectors at a clear disadvantage vis-à-vis the coalition supporting the government. The Episcopal Conference of Panama and the various international observers and human rights agencies all emphasized this point, which weakened one of the conditions vital to he kind of genuine elections called for in Article 23 of the American Convention on Human Rights. Another factor that adversely affected the electoral process, as reported to the Inter-American Commission on Human Rights, was the predicament of various political leaders who had been forced to leave the country. As indicated in the chapter on freedom of movement and residence, the Government of Panama adopted a practice of detaining and harassing the political opposition, seizing their property and forcing them to leave the country. This reprehensible government conduct has prevented a major group from participating in election activities and thus has given the government coalition an advantage. Many journalists and members of the opposition have been detained for long periods without being charged. During those periods they were held incommunicado and were mistreated and tortured, then released and expelled from the country. Violations of the right to personal liberty caused by this conduct on the part of the Government of Panama have been fostered by the attitude taken by the Judiciary, which has not enforced the rights of persons so affected and has become another vehicle for such abuses. During its visit in February, the Inter-American Commission was also informed that serious violations of the right of assembly were occurring. According to reports, a number of legal restrictions were imposed on the exercise of the right of assembly, as a result of which peaceful opposition demonstrations were confronted with various obstacles that had to be surmounted in order to take place. In addition to legal restrictions, there were other restrictions imposed by the government such as threats to the owners of transportation companies that their licenses would be revoked if they allowed their vehicles to be used to drive participants to demonstrations. Such de facto restrictions contrast with the measures taken to enable people to attend COLINA meetings, where public transportation was used and public employees were forced to attend lest they be fired. International observers found that state resources were drawn upon heavily during the ruling party’s campaign and the Catholic Church, through the Episcopal Conference, denounced the use of “civil servants, public funds and government facilities to support certain party segments.” The acts that most seriously impaired the exercise of the right of assembly, however, have been this disproportionate and unnecessary violence used by law enforcement forces against opposition demonstrators who were peacefully and legitimately exercising their rights. As stated in the chapter on the right to humane treatment, the Commission has an abundance of documentary evidence testifying to the disproportionate and excessive violence used by the Defense Forces to put down demonstrations. The Commission also has abundant evidence of the use of birdshot against peaceful demonstrators, which hit mere bystanders or people who happened to be present at the time. The loss of eyes and other wounds caused by birdshot are the very serious consequences of this reprehensible government practice. Paramilitary groups are another tool organized and used by the Government against opposition demonstrations. Such groups, whose ties to the Defense Forces are public knowledge, were initially formed for the alleged purpose of confronting a possible invasion by the United States. In practice, their tactics have been intimidation and gross mistreatment--even death in the case of Endara's bodyguard--of the opposition under the passive stares of the Defense Forces, which did nothing to curb the paramilitary’s excesses. Documentary evidence provided to the Inter-American Commission shows how members of the Traffic Department of the Defense Forces were transformed into a paramilitary group in order to attack an opposition demonstration. Paralleling these grave, arbitrary measures against those who oppose the coalition supporting the government was an effort to use the press and speeches by government officials, to create an atmosphere of tremendous hostility toward opposition candidates. By contrast, high ranking officers in Defense Forces publicly supported COLINA candidates, openly defying Law Nº 20 which regulates the functions of the Defense Forces and requires that they be strictly neutral in political matters. As can be inferred from the facts set forth thus far, the atmosphere in Panama for the exercise of political rights as defined in Article 23 of the American Convention was highly objectionable. Indeed, the legal and institutional system for the organization of elections offered no guarantees of impartial conduct on the part of the organs responsible for implementing the actions related to it. The general conditions in which the process was taking place, rather, were slanted in favor of the ruling party coalition and against the opposition because of the lack of freedom of expression, the serious restrictions on the opposition's right to personal liberty, the grave violations of the right of assembly and the intimidation of members of the opposition and pressures exerted against voters to support the ruling party candidates, both by high-ranking government officials and by officers of the Defense Forces. These were circumstances leading up to the elections of May 7, 1989, which are analyzed in the following section. 2. The May 7, 1989 elections and its aftermath The May 7, 1989, elections were conducted in an atmosphere of great social tension. The elections had been called to elect a President, Vice Presidents and legislators. According to the Constitution, those elected were to take office on September 1st. The opposition’s experience in the 1984 elections, coupled with the tensions on the day prior to the election, made designation of political party representatives at the 4,255 polling stations located in 1,944 voting locations throughout the country, a particularly key issue. Various international observers were present but ultimately they encountered a series of problems that made it difficult for them to perform their task. Concerning the voting itself, the opposition complained of various minor irregularities such as the lack of sufficient ballots for their candidates, delays in getting the balloting under way in some rural areas, multiple voting by soldiers of the Defense Forces and alleged buying of votes. They acknowledged, however, that the voter turn-out was very high; impartial observers acknowledged that the alleged irregularities had not been sufficient to alter the outcome. These observers pointed out that, in general, relations existed between ADOC and COLINA representatives and the officials appointed by the Electoral Tribunal to solve any problem that might arise were good. As a result, the opposition considered that the first tabulation made at the polls was correct. Representatives of the opposition obtained the corresponding records certified by the secretary of the polling station, as stipulated in Article 266 of the above-mentioned Electoral Code. The Inter-American Commission was informed, however, that acts of intimidation and violence occurred in certain places and had been followed by the theft of records by members of the Defense Forces or paramilitary groups. This complaint was filed, for example, by the Penonomé Parish priest and Cocl6 Episcopal Vicar; there were complaints of other acts of violence at the Venezuela School in Panama City, where the apparent intent was to remove the records, tamper with them and return them to the District Courts. The most serious irregularities apparently were committed in voting tabulations at the level of District Teller Boards, where voting records received from polling stations had been sent for a recount that, once completed, was to be reported to the National Teller Board. As widely charged, some places where these District Boards were to function were the target of attacks by paramilitary gangs, while elsewhere such boards were unable to function since, given the total lack of guarantees, their members refused to meet. Voting records for the 40 District Boards were to be sent to the National Board to be re-tabulated and for the winners to be announced. National Board officials are also designated by the Electoral Tribunal. Representatives of the opposition parties described the irregularities observed as follows: In this body (the National Board) “representatives of the three opposition parties encountered an unsurmountable barrier that prevented them from doing their job, i.e., tallying votes. Representatives of the government parties as well as the Panameñista Auténtico Party (PPA) invariably voted against any attempt to examine district voting records with respect to the polling station records. One has to remember that the National Teller Board had at hand copies of the polling station records, whose totals had to appear in the district records. However, checking polling station records against the district records that had been tampered with was not allowed. Opposition representatives were not permitted to show as evidence of fraud the authenticated district records in their possession, even though district records presented at the National Board were not signed by opposition party representatives and had obviously been altered. During the so-called deliberations of the National Board, neither points of order nor explanations of vote were allowed. No discussion of documents other than those provided by the Electoral Tribunal officials was permitted, even if they showed evidence of tampering. Finally, the Chairman of the Board… said that the responsibility of the highest-ranking body of the country was simply “to read and add up” the records of the district boards, regardless of their condition upon arrival, notwithstanding whether they had been shamelessly tampered with or crudely marked up with falsified signatures or simply without the signatures of opposition representatives. Distinguished international observers such as former U.S. President Carter concurred in the complaint of grave irregularities at the National Teller Board. The Catholic Church and 279 international observers from 20 countries also corroborated these complaints. It must be pointed out that opposition and the Archdiocesan Lay Coordination Commission of the Panamanian Episcopal Conference organized two systems for retallying votes. The Church organized a sample count based on statistical techniques successfully used in other elections held under exceptional conditions such as in the Philippines and Chile. The system allowed the Panamanian Episcopal Conference to issue a communiqué on Monday, May 8, declaring the victory of the Alianza Democrática de Oposición Civilista by “a substantial majority” (74.2 percent) over COLINA (24.9 percent). It must be borne in mind that the sample technique had a margin of error of +/- 9 percent. On May 10, 1989, the Electoral Tribunal issued Decree Nº 58 declaring the nullification of the elections held on May 7, at all levels of elective office.” The Electoral Tribunal based its decision on the following: That, once the voting was over at 5 p.m., matters transpired–and still persist–that have significantly altered the final outcome of the elections nationwide. That the normal course of elections was disrupted by the obstructionist acts of many foreigners summoned by national or foreign political forces without benefit of invitation by the Electoral Tribunal; their obvious purpose was to reinforce the theory of election fraud publicized worldwide by United States authorities long before the elections. That the brief summation of these facts, taken from the reports received by the Electoral Tribunal…, shows that ballots were constantly being removed at polling stations, that votes were being bought by political parties and, in particular, that voting records and other documents were missing thereby making it utterly impossible to declare any candidate a winner. Nonetheless, on the basis of records obtained at the polling stations the opposition tabulated its results even though some records could not be obtained because they had either been stolen or destroyed before the end of the tally at the corresponding station. The following June 4, based on records from 80.9 percent of the polling stations, the opposition concluded that it had won with 65% of the votes, whereas COLINA had received 26% of the votes. The corresponding records were delivered to the Panamanian Episcopal Conference for custody. Given the irregular situation, the Alianza Democrática de Oposición Civilista called on its followers to hold peaceful demonstrations to demand, first of all, that the results be turned in, and second, that its victory be recognized. Such peaceful demonstrations were repressed by the Defense Forces with unheard-of violence, allowing and encouraging the action of paramilitary groups that, during the demonstration on May 10, physically attacked the opposition candidates, killing Manuel Alexis Guerra, the bodyguard of candidate Guillermo Endara, and wounding another in the middle of the street, with the Defense Forces standing by impassively. World television then recorded how a member of the paramilitary viciously beat up a bloody Ford, while the men in uniforms standing by did nothing to prevent it. Presidential candidate Guillermo Andara was also beaten over the head; his injuries were so serious that he had to be hospitalized. As said in the first part of this report, events in Panama led to convocation of the Twenty-first Meeting of Consultation of Ministers of Foreign Affairs of the Organization of American States. On August 24, 1989, the President of the Meeting issued a declaration that in paragraph 4 request the Inter-American Commission on Human Rights to conduct another visit to Panama for the purpose of updating the information on the situation of human rights in that country. On September 1, Eng. Francisco Rodríguez took office as President of Panama. His appointment by the General Council of State has no basis in the Panamanian Constitution, as the Panamanian Episcopal Conference pointed out in its September 14, 1989, communiqué. The new President, for his part, said that his government “will call elections and hand over the reins of power as soon as conditions allow;” he then said that the United States must halt its aggression and return to the National Treasury those funds it had arbitrarily retained. He also mentioned that the next elections should be held “without foreign interference or manipulation.” In light of the information available to the Inter-American Commission, as set forth above, the electoral process in which the right to participate in government was exercised in Panama involved legal and institutional factors that furthered conditions that would deprive the election held on May 7, 1989, of any authenticity. Both the legal instruments upon which the process was based as well as the membership of election agencies responsible for the election, were so seriously flawed as to deprive their decisions of any legitimacy. These problems were compounded by the creation of conditions inimical to the opposition factions' free exercise of the rights to freedom of expression and of assembly. The harassment targeted at them included the unlawful deprivation of the freedom of several distinguished members of the opposition who were then either expelled from the country or coerced into exile. The violence unleashed against the opposition included the use of disproportionate and indiscriminate resources, including paramilitary groups, guilty of extremely serious violations of the right to life and humane treatment of persons who were peacefully exercising their right to assemble. This negative situation provoked by the government was in sharp contrast to the assistance provided to the candidates of the ruling party coalition, in whose support both government employees and government resources were used, in violation of the Constitution, and for whom high-ranking officers of the Defense Forces actively campaigned, in direct violation of the law. In spite of the many restrictions that the government imposed on the opposition, the information provided to the Commission indicates that the results of the elections were in favor of the Alianza Democrática de Oposición Civilista, causing the Electoral Tribunal to nullify the elections. The government, however, has not been able to overcome the prevailing situation and has been forced to, resort to formulas lacking constitutional foundation to continue managing the country. The resulting lack of legitimacy, coupled with an obvious absence of popular support, make it likely that under the current government, developments in the areas of human rights in general and of the exercise of political rights in particular will be negative. This situation must be corrected within the framework of observance of the American Convention on Human Rights, which is binding on Panama as a State party. This means that the freely expressed will of the people must be fully respected or accords must be worked out with the interested sectors so that the will of the people may be expressed (at the earliest possible date). As the Permanent Committee of the Panamanian Episcopal Conference has stated: the only justification for a government that calls itself provisional would be to seek directly, immediately and unconditionally, the expression of the will of the people in order to restore constitutional rule as soon as possible, inviting every representative sector of the national population to work to that end. Failure to do so would be tantamount to condemning the Panamanian people to gradual international isolation in hot! the political and the economic fields, with the all too familiar consequences of unemployment, hunger, sickness, poverty, etc. 1. Article 23 of the American Convention on Human Rights says: “Right to participate in government: 1. Every citizen shall enjoy the following rights and opportunities: a. to take part in the conduct of public affairs directly or through freely chosen representatives; b. to vote and to be elected in genuine periodic elections which shall be by universal and equal suffrage and by secret ballot that guarantees the free expression of the will of the voters, and c. to have access under general conditions of equality to the public service of his country. 2. The law may regulate the exercise of the rights and opportunities referred to in the preceding paragraph only on the basis of age, nationality, residence, language, education, civil and mental capacity, or sentencing by a competent court in criminal proceedings.”
<urn:uuid:2915eb05-19de-43d1-8ff6-97741e457bda>
CC-MAIN-2014-49
http://www1.umn.edu/humanrts/iachr/country-reports/panama1989-ch8.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931010590.31/warc/CC-MAIN-20141125155650-00210-ip-10-235-23-156.ec2.internal.warc.gz
en
0.974162
5,299
3.21875
3
Crescent ♍ Virgo Moon phase on 27 July 2006 Thursday is Waxing Crescent, 2 days young Moon is in Virgo.Share this page: twitter facebook linkedin Previous main lunar phase is the New Moon before 2 days on 25 July 2006 at 04:31. Moon rises in the morning and sets in the evening. It is visible toward the southwest in early evening. Moon is passing first ∠0° of ♍ Virgo tropical zodiac sector. Lunar disc appears visually 6.3% narrower than solar disc. Moon and Sun apparent angular diameters are ∠1774" and ∠1889". Next Full Moon is the Sturgeon Moon of August 2006 after 12 days on 9 August 2006 at 10:54. There is low ocean tide on this date. Sun and Moon gravitational forces are not aligned, but meet at big angle, so their combined tidal force is weak. The Moon is 2 days young. Earth's natural satellite is moving from the beginning to the first part of current synodic month. This is lunation 81 of Meeus index or 1034 from Brown series. Length of current 81 lunation is 29 days, 14 hours and 39 minutes. It is 1 hour and 56 minutes shorter than next lunation 82 length. Length of current synodic month is 1 hour and 55 minutes longer than the mean length of synodic month, but it is still 5 hours and 8 minutes shorter, compared to 21st century longest. This New Moon true anomaly is ∠131.2°. At beginning of next synodic month true anomaly will be ∠158.8°. The length of upcoming synodic months will keep increasing since the true anomaly gets closer to the value of New Moon at point of apogee (∠180°). 13 days after point of perigee on 13 July 2006 at 17:35 in ♒ Aquarius. The lunar orbit is getting wider, while the Moon is moving outward the Earth. It will keep this direction for the next 2 days, until it get to the point of next apogee on 29 July 2006 at 13:02 in ♍ Virgo. Moon is 403 998 km (251 033 mi) away from Earth on this date. Moon moves farther next 2 days until apogee, when Earth-Moon distance will reach 405 405 km (251 907 mi). 11 days after its ascending node on 15 July 2006 at 20:25 in ♓ Pisces, the Moon is following the northern part of its orbit for the next 2 days, until it will cross the ecliptic from North to South in descending node on 29 July 2006 at 16:58 in ♍ Virgo. 11 days after beginning of current draconic month in ♓ Pisces, the Moon is moving from the beginning to the first part of it. 4 days after previous North standstill on 22 July 2006 at 14:34 in ♊ Gemini, when Moon has reached northern declination of ∠28.515°. Next 9 days the lunar orbit moves southward to face South declination of ∠-28.594° in the next southern standstill on 6 August 2006 at 04:11 in ♐ Sagittarius. After 12 days on 9 August 2006 at 10:54 in ♒ Aquarius, the Moon will be in Full Moon geocentric opposition with the Sun and this alignment forms next Sun-Earth-Moon syzygy.
<urn:uuid:6085788a-0dea-4d3f-acfc-92976bb9386c>
CC-MAIN-2019-47
https://lunaf.com/lunar-calendar/2006/07/27/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668712.57/warc/CC-MAIN-20191115195132-20191115223132-00421.warc.gz
en
0.907591
716
2.734375
3
Life moves at a fast pace and we are forced to leave parts of our pasts behind. As the Internet serves as the vehicle that seamlessly connects people all over the world, staying connected through space is no longer an issue. However, with the vast archiving capabilities of the Internet, it has become possible to stay connected through time as well. Old newspapers may be left forgotten but old news does survive – in online archives. Old news archives are available in digitized formats, therefore, old news articles and newspapers can be seen in their original formats. You can read an old newspaper article which reported the sinking of the Titanic if you chose to without ever needing to manually hunt through sheets and sheets of old newsprint. This kind of online ‘preservation’ goes a long way in preserving information that would have otherwise been lost as the pages of history are irreversibly turned. Also, because of this, spotting changes in publishing trends or presentation is quite an easy task and all this information can be used in assessing social changes that have taken place. Changes in people’s expression become visible and such data can provide quality research material for anthropological or sociological studies. Now, when it comes to reading old news articles, Google leads the way as it has digitized old publications of many different newspapers such as the St. Petersburg Times, Pittsburgh Post-Gazette, Today’s News-Herald, Quebec Chronicle-Telegraph etc. stored in its news archives, available for access through simple online searches. Reading old news articles from an old newspaper online makes life a lot easier for people who are trying to trace their ancestry. Newspapers often report births, deaths, engagements and weddings, going to the extent of listing names and locations of the people involved. This is extremely helpful as these unofficial ‘records’ help fill gaps in information when official documents such as birth or death certificates are not available. It is as though the past were carefully woven into a digital tapestry that one can turn to whenever required. Getting hold of a free newspaper online has never been simpler, especially with the high quality archiving facilities of various search engines being put to play. Once you know what you are looking for, it is only a matter of typing a few words into a search engine and letting technology bridge the gap between the past and the present.
<urn:uuid:8befdc2c-ead2-44b3-9b1e-35378796aadc>
CC-MAIN-2018-22
http://blogote.com/ideas/read-old-newspaper-articles-online/3364/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866107.79/warc/CC-MAIN-20180524073324-20180524093324-00534.warc.gz
en
0.960746
480
2.953125
3
Before a department may redistribute, sell, or dispose of computing equipment to another entity, all data must be removed from the storage device(s) to comply with IU Purchasing policy (FIN-PURCH-11). Departments must choose and correctly use a tool that performs at least a 1-pass wipe of the storage device. UISO has verified that the tools that can satisfy this requirement, if used correctly, are DBAN and Mac OS X's Disk Utility. If a storage device is inoperable or cannot be wiped using one of these tools, then remaining options include degaussing and drive destruction. The UISO recommends against degaussing and encourages departments to use the IUB/IUPUI Surplus Data Destruction Service (see Destruction section below). When a file is deleted using the usual methods inherent in an operating system, these methods typically only remove the pointers to the files -- NOT the actual files themselves. The data remains on the hard drive as unallocated space and can easily be recovered with readily available tools. Another common misconception is that using system utilities like fdisk and re-formatting a hard drive will securely delete all data on the hard drive. Like rm and del, these utilities modify file system attributes but do not remove the actual data. CD-ROM's, since they are read-only, introduce a different challenge in that there is no way to programmatically and securely delete the contents of the CD. Inoperable hard drives are also a challenge since they cannot be connected to a system and accessed through software. Disk wiping is a term used to describe a method that writes a series of 1's and/or 0's over the disk to securely remove the data. Since tools that do this have to overwrite the entire disk, this process can be time-consuming. For tools that securely wipe of hard drives see KB doc - How can I securely wipe disk drives? For media that has contained highly sensitive data or for media that cannot be wiped (e.g., inoperable hard drives, DVD's) or degaussed (e.g., CD-ROM's), destruction of the media is the most effective means of ensuring that the data cannot be recovered. The University has data destruction services available. In order to be effective, the destruction has to be thorough. For example, a simple whack with a hammer leaves the majority of data on the media readable. Degaussing is a process by which magnetic storage media is subjected to a powerful magnetic field to remove data on the media. Since a degausser that meets the performance requirements set forth by the National Security Agency/Central Security Service, NSA/CSS, can be cost prohibitive, and is ineffective with optical media such as DVDs and CDs, the UISO recommends that departments take advantage of the Data Destruction Service offered by IUB/IUPUI Surplus (linked above). Shred it! Information classified as Critical, when stored in paper form, must be properly destroyed. For low volume paper document destruction, units may consider purchasing a small cross-cut paper shredder. For high volume needs, a document destruction vendor may be the best solution. The Office of Procurement Services maintains a list of contracted vendors for document destruction. I have an inoperable hard drive that contains sensitive data. What should I do? Since disk wiping can’t be used, physical destruction is the best alternative. I have a computer that is being replaced by a newer model and I would like to transfer this machine to another user in my department. The system has been used to store FERPA protected student records. What should I do? Disk wiping is the best alternative. I have a computer that is being replaced by a newer model and I would like to transfer this machine to another department on campus. The system was bought new and used as a public access terminal. It has never maintained sensitive data, but it does have applications installed on it that were licensed from a software vendor. What should I do? Since data storage is not an issue, the simplest method would be to fdisk the system and reformat the hard drive. This process will ensure that any individually licensed software I have a computer that is being replaced by a newer model and I would like to transfer this machine to another department on campus. The system has been used to store sensitive data. What should I do? Once again, secure disk wiping is probably the best alternative. I have a computer that has reached the end of its life and I cannot find another department at the University that wants it. What should I do? University Purchasing has two policies that discuss this: I have a hard drive containing sensitive data that has a mechanical failure, and the computer manufacturer is requesting that the drive be returned for replacement under warranty. What should I do? Try informing the manufacturer that the drive contains sensitive data and that would prefer not to return it. If the manufacturer subsequently insists on return of the damaged drive before sending a replacement, then request a formal letter from the manufacturer stating that they will ensure all data is securely removed from the hard drive. If the vendor continues to refuse, purchase a replacement drive and destroy the damaged disk using one of the university’s destruction services (IU's Surplus Data Destruction Service). I have a very large volume of media to be retired that contains sensitive data. What are my options? University Purchasing can work with a professional shredder company that can come on campus and shred the media. When finished, they will also provide a certificate of destruction. Contact your campus Purchasing department for additional information. I will no longer be using my BlackBerry or iPhone/iPad/iPod Touch. Must I remove all of my personal data from it? If so, how do I do that? Yes, all data must be removed from smartphones, tablets, and other mobile devices that have been used to access, store, or manipulate institutional data. Please consult the following Knowledge Base documents: I may have sensitive data cached in my office copier or multifunction device. What do I do? Read our article on Protecting Data in Copiers and Multifunction Devices. Contact the Office of Procurement Services with any specific questions about equipment or related purchases.
<urn:uuid:1f201146-0b06-4ca5-916b-841b6c848ace>
CC-MAIN-2021-17
https://informationsecurity.iu.edu/personal-preparedness/data-removal.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038067870.12/warc/CC-MAIN-20210412144351-20210412174351-00025.warc.gz
en
0.934544
1,297
3.15625
3
Prior to an Alzheimer’s disease diagnosis, benzodiazepines and related drugs are commonly used and become more even more common after diagnosis. The research comes from the University of Eastern Finland. Benzodiazepines are a line of drugs used for sleep or anxiolytic purposes. Use of benzodiazepines becomes more common in those with a diagnosis of Alzheimer’s disease than those without a diagnosis. Researchers used data from the Finnish Medication Use and Alzheimer’s Disease Study (Medalz). The database includes all Finnish persons diagnosed with Alzheimer’s disease between 2005 and 2011. The researchers examined the use of benzodiazepines and related drugs in 51,981 people diagnosed with Alzheimer’s disease. Over the course of five years, drug use was recorded and follow-up started two-years prior to diagnosis. Findings were compared to individuals not diagnosed with Alzheimer’s disease and matched by gender and age. The research suggests short-term use of such medications can be beneficial for treating behavioral problems associated with Alzheimer’s disease, but the data to support these claims is insufficient. On the other hand, these drugs have been shown to increase the risk of falls and cause cognitive impairment. The research reveals the role of benzodiazepines as it contributes to the delay of Alzheimer’s disease diagnosis and raised concerns about the practice of symptom-based treatment prior and around diagnosis. The findings were published in the Journal of Alzheimer’s Disease.
<urn:uuid:b6541444-1e8e-461a-8dd7-e6a3c0dc1fbc>
CC-MAIN-2021-21
https://www.belmarrahealth.com/benzodiazepines-and-related-drugs-commonly-used-for-alzheimers-diagnosis/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988858.72/warc/CC-MAIN-20210508091446-20210508121446-00190.warc.gz
en
0.936084
307
3.234375
3
If you’re an English-language teacher in Montpellier (or anywhere, really), you’re probably looking for some new and exciting ways to help your students learn English. One really great way to do that is through day trips, because it combines fun activities and practical application of the knowledge. Fun: The best way to learn When your children were first learning to speak, did they use vocabulary books? Did you? Probably not. So, why should it be any different for people, especially children, learning their second language? That’s why Talk to Teach recommends that morning lessons with French students should be followed up with fun afternoon activities – conducted in English – to allow the students to practice what they’ve learnt. The benefits of learning English as a second language through interaction, play, and fun activities, are vast, but importantly, they include: Showing a real-world application for what they are learning Assisting with knowledge retention Encouraging communication; which helps develop speech, listening, and language skills How to choose a fun learning activity These activities, like the lessons that you prepare, should be tailored to the age and ability of the student. If the student is a beginner, then it will probably be more useful to take them on an everyday activity, like to the cinema, where they can practice common words. Not everyone needs to know how to say “petit galop” in English - that’s canter, by the way. More advanced students can be taken on unique activities, where they can practice a wider vocabulary; i.e. words related to horse riding. Similarly, younger students may need tamer activities. While teenagers may relish the idea of learning how to wakeboard or love the thrill of figuring out an escape room, younger children may be out of their depth. It’s also important to keep in mind that the activities need to interest the learner or they won’t get much from the experience. That’s why you should do your best to find out what interests your students before you book an activity – preferably, before they arrive at your house. After all, some young people will love going to an English-language rock concert, but some would be happier having a calm evening with an English-language book and a cup of Earl Grey tea. There are many ways for French students to have fun while learning English, so try a few of those listed below and then try some more to find what works for you. Remember, it’s important to mix up the fun activities, as even something really fun can get boring after a while, both for student and teacher. The best day trips for English-language teachers in Montpellier Hopefully, you’re now convinced about the benefits of teaching and learning through fun activities, so we’re going to show you some of the best day trips (or more likely afternoon excursions) in and around Montpellier that will help your students to learn English whilst having fun. Also, we’re sure that you’ll have a great time too! Visit Le Bookshop If your student loves to read, then why not take them to this English-specialized bookshop? It has a wide collection of English books from every genre and for every age group, which can help inspire your student to learn on their own time by settling down with a good book. Make sure to tell the student in advance, so that they can take some pocket money with them for those inevitable book binges. Le Bookshop also hosts French-English conversation exchanges twice a week. Watch a film at the Gaumont Cinema Occasionally, the Gaumont will show English-language films with French subtitles, which can be an entertaining outing for students; especially if they’ll get to see the latest releases before their friends. Escape from the Xcape Room Escape rooms are all the rage right now and they can be a great place for students to test their English under (controlled) pressure. The Xcape Room offers an English-language version of their quests, which requires problem solving and communication to succeed. Interestingly, these are the same skills needed to learn English. Win a pub quiz at the Shakespeare English Pub There’s nothing more English than a pub and this quaint offering hits all the right spots. They host a regular pub quiz, where you and your students can show off your trivia knowledge. This will really test your student’s English-language skills and knowledge of English culture. Play games at the Baraka Jeux If your student loves games, then this game bar is the place to go. It’s filled with pool tables, an electric car track that takes up the majority of the floor, and over 3,000 board games. This is another activity that will encourage communication, as well as increasing their vocabulary. Arrange a meet up with other English-language speakers The MeetUp website is great for encouraging people to meet up with like-minded people, so why not use it to find fun English language activities that your student might enjoy, where they’ll be surrounded by English-language speakers? This could be anything from yoga to a crochet circle to a bike-riding trip, but it will mean the student gets used to talking with other English speakers, besides yourself. Ride a horse at the Haras du Grés For those students who prefer the great outdoors and love spending time with animals, why not treat them to an English-language horse-riding lesson? These stables cater for a wide range of abilities and offer instruction in English, meaning that your student could learn two new skills during their time with you. Home-based activities to help French students learn whilst having fun The above activities are all tried and tested activities for English learners and their teachers to enjoy in Montpellier, but there’ll always be some days when you want to stay in your own home. That’s why it’s always good to plan some backup activities. Here are some of the best that we’ve found to promote engagement and learning. Watching an English-language film on DVD Close the curtains, make some popcorn, and put the French subtitles on for a fun afternoon of movies and munchies. For the best results, choose a film that your student knows and likes, as they’ll be more engaged. Having a cream-tea at home This is super easy because all you’ll need is some clotted cream, strawberry jam, a couple of scones per person, and a pot of English Breakfast Tea. Teach your students whether they should be putting jam or cream onto their scones first… we wouldn’t dare comment. Completing an art project Whether it’s drawing, painting, or paper mache, you can help French students to learn English through art by encouraging them to talk about their project as they make it (i.e. “I’m drawing my dog” or “I need to use more red paint”). Word games can be great for helping students to form words and expand their vocabulary, particularly attaching prefixes or suffixes to root words in Scrabble. As you can see, learning English can and should be fun, for student and teacher alike. By adding in some of these activities to your traditional teaching routine, you can really improve the learning process.
<urn:uuid:3d4a8a97-a732-4255-be3a-fd046a13f7c3>
CC-MAIN-2020-50
https://talktoteach.com/blog/do-you-teach-english-in-montpellier-ideas-for-great-day-trips
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141746033.87/warc/CC-MAIN-20201205013617-20201205043617-00466.warc.gz
en
0.958117
1,557
2.859375
3
All students need to collate a Digital Research Page for their project forms so that tutors can easily jump to a single page and see your research and sources. You can do this any way you prefer, our preferred choice is Padlet, however, we totally understand that you may have a tool that works better for you and it’s your research and we encourage you to collate things in the method easiest and most useful for you. You’ll be doing a lot of research for your longer form multimedia journalism stories. You’ll need to organise and archive that research. A few sources of information will go directly into in your AdPractice 2 & 3 modules, final visual multimedia stories. those sources will be attributed and in most cases hyperlinked according to good journalism practice. Some sources of information will go into your AdRes research proposal and /or final dissertation – cited according to academic practice. However, the bulk of your research, will not be used directly, rather it will serve as the foundation of knowledge to direct your practice and research. At times the research you do will be specific to either your AdPrac or your AdRes module, but there will also be plenty of crossover becasue theory and practice intertwine and advance each other. You’ll read/watch and listen to, books, articles, research reports, lectures, newspaper articles, documentaries, podcasts and so on. Keeping track and keeping that large volume of information organised is critically important. You’ll need to start at the beginning. It doesn’t really matter how you organise your system, there are plenty of options. Take a read through this guide, pick a method and start archiving. That way later, you’ll be able to find information when you need it. There’s a variety of tools you can use to collate and organise your research. Bookmarking doesn’t tend to work well for such large amounts of material – and also your tutors will want to see your research in the form of your digital research page. You won’t be able to list everything on your story/project forms — as space is limited, so you are expected to have some kind of digital research archive. Again, it really doesn’t matter how you do it, so long as it’s easy for you to refer back to and tutors can view to help assess your sources. Curate, aggregate, highlight, etc… There are plenty of free research apps and web and mobile friendly tools. My personal favorites are Padlet and Evernote. I have the cheapest Evernote subscription — well worth paying 20 RMB a month. You’ll also find plenty of Evernote’s powerful tools for free. I organise all my different projects notes into Evernote’s individual notebooks. With my paid subscription, the app on my computer and phone synch up. That means that I can make and see notes either on my computer or mobile. That way if I’m working online reading news articles or research reports for my story I can copy paste information and sources in — or just attach complete clipping or PDF’s for later reference. Alternatively, if I’m ‘out and about’ and have a thought while I’m eating dinner, I can jot it down, or if I take a relevant picture or video on my phone I can add that straight into my notebook, I can even record an interview right into the app. It doesn’t take long to get to grips with Evernote — it’s a simple but powerful application and I thoroughly recommend it. See an Evernote overview & tutorial here. Another app I like is Padlet, It’s a nice visual tool for clipping articles and pictures — though, for longer projects, it can get a little unwieldily. See how I used it below to collect some good lectures on multimedia journalism: Multimedia tutorials/lectures. See also how I used it here to collect research on a long-form multimedia project. To be honest, with this volume of research, it doesn’t work so well and things start to get lost. However, at least everything is all on one page and I can trawl through to return to things if needed. There’s a handy extension which allows you to clip whatever you are reading. SNWTP Research. There are heaps of other tools too, spend a day taking a look around to find one that suits you! You might choose to make a research magazine with flipboard. Diigo is a powerful tool for curating annotating and highlighting. You might also try — PearlTrees, Listly, Symbaloo, Livebinders, Pinterest, Linoit — I don’t use these, but hear good reviews. Try Google Drive apps and tools too. Try some handy extensions to save time. Many of the tools above have browser extensions, that way if you are reading something you simply click a button in your browser and save it in your chosen app. Another great tool for your AdRes bibliography are citation extensions such as app.refme.com and www.citethisforme.com (See below quickly reference for your bibliography, which will be really useful for your story/project forms and your dissertation.
<urn:uuid:06b54bb2-7a97-49de-ad07-d5491faee8b6>
CC-MAIN-2017-39
https://beijingimmj.wordpress.com/collecting-collating-digital-research-online/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687938.15/warc/CC-MAIN-20170921224617-20170922004617-00076.warc.gz
en
0.920171
1,109
2.515625
3
Flora on La Gomera consists of many specialised plants. The central massif of Garajonay separates the climate as well as the vegetation. Trade wind clouds are responsible for the lush greenery in the north, succulents can be found in the dry south. Almost 300 years have passed since the last volcanic eruption on La Gomera. Since then, its face has been constantly changed by weathering and erosion. The national park, which covers 11% of the island, is the starting place for many spectacular ravines and impressive cliffs. Many Endemic Species Favoured by the climatic and geographic demarcation of the island, many plants adapted to the island’s specific circumstances and evolved further. These particular plants can only be found on La Gomera, or on the other Canary Islands. They are described as endemic plants. The Lush Green North The north is characterised by a temperate climate and high humidity. The trade wind’s clouds rise over the slopes of northern La Gomera and supply the area with moisture. The fascinating national park lies in this mist for most of the year. The canopy of leaves filters the moisture from the clouds and passes it on to the island’s natural water reservations. This assures moisture for springs, streams, reservoirs along with bananas, papayas, mangos, avocados and oranges. Succulents in the South The sunny south is dominated by drought resistant vegetation. Diverse succulents have found their ecological niche here. Among these are the thick-leaved plants and spurge. They are capable of collecting a lot of water in their thick leaves and stalks over a long period of time, to protect themselves from drying out. Less Varied Fauna The Atlantic has always been a great hindrance to animals, stopping them migrating to the island. Because of this, bats are the only mammals with managed to inhabit the island without the help of humans. Goats, rabbits and mice came as companions of humans. The vertebrate fauna mostly consists of birds and reptiles. Many endemic species can be found here also.
<urn:uuid:47869d48-3d4a-444d-b02b-7ef3595b529a>
CC-MAIN-2020-05
https://www.gomeralive.com/nature/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601241.42/warc/CC-MAIN-20200121014531-20200121043531-00158.warc.gz
en
0.947927
448
3.453125
3
One of the most powerful figures in Pyongyang is expected to fall victim to Kim Jong-un’s purges, as the North Korean leader trains his sights on a rival who could give the lie to a key moment in the communist regime’s history. As many as 200 senior officials are being eyed for the latest round of bloodletting, according to sources quoted in South Korea’s Chosun Ilbo newspaper – largely because of their loyalty to Kim’s uncle, Jang Song-taek, who was executed in December for crimes against the state. But Choe Ryong-Hae, the joint chairman of the all-powerful Politburo Presidium and political director of the Korea People's Army, appears to have been singled out for a different reason. Evidence from the 1930s suggests that it was the father of 64-year-old Mr Choe who led an attack against the Japanese later claimed by Kim's grandfather to legitimise the ruling dynasty. North Korea's version of the struggle against the Japanese occupation of the Korean peninsula claims that Kim Il-sung, revered as the founder of the nation, led the June 1937 attack on the Japanese garrison defending the town of Pochonbo. But contemporary media reports suggest otherwise - indicating that Mr Choe's father - Choe Hyon - was actually in command of the guerrilla force. One article in the Asahi Shimbun, a Japanese newspaper, dated June 7, 1937, three days after the skirmish, says: “A little more than 100 men lead by communist bandit Choe Hyon attacked Pochonbo.” Ken Kato, a researcher and human rights activist, said that the stories undermined Kim Il-sung’s reputation as the heroic father of the nation. “Kim Il-sung’s legitimacy came from propaganda that he fought against Japan, symbolised by the Battle of Pochonbo,” Mr Kato said. “Schools in North Korea teach children that the battle was a glorious victory against Japan lead by Kim Il-sung.” North Korean state media helps to reinforce that claim, with the KCNA news agency reporting on the 70th anniversary of the clash that Kim Il-sung – “the legendary hero of the anti-Japanese war” – commanded the insurgents. “The Pochonbo battle made the august name of the president serve as a beacon for the national resurrection for all the Korean people,” it said. North Korea has rarely been averse to reinterpreting the regime’s history, with children in the North taught that the Korean War was started in 1950 by an invasion by the South. They also learn that Kim Jong-il was born in a cabin on the slopes of Mount Paektu. Historians generally accept that the late leader was actually born in a refugee camp in the Soviet Union.
<urn:uuid:5ab7689d-d4c8-46e0-a288-7b846363b44f>
CC-MAIN-2015-40
http://www.telegraph.co.uk/news/worldnews/asia/northkorea/10739324/Rival-to-Kims-regime-among-200-on-verge-of-being-purged.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737962531.78/warc/CC-MAIN-20151001221922-00152-ip-10-137-6-227.ec2.internal.warc.gz
en
0.97317
606
2.609375
3
According to the CDC, car accidents are the number one cause of death and injury in children. AAA reports that when compared with seat belt use, using safety restraints specifically designed for children, like car seats, can reduce the risk of injury by up to 82 percent. The older a child is at the time of an accident, the less difference a child safety seat makes, but the difference is still significant up to certain heights and weights. To ensure your child is safe, safecar.gov recommends the following four steps: - Find the right car seat based on age, weight, and height. There are four main types of safety restraint systems for kids: an infant car seat, a forward facing car seat, a booster seat, and a seat belt. - Make sure it is correctly installed. Sometimes this can be tricky, so make sure to read the instructions carefully. - Register your car seat online. - Receive recall notifications (if any exist) and take the necessary steps to keep your child safe. But, what happens when you’re in an accident? Hopefully, if you’ve followed the above steps, your child is safe. But does a car seat need to be replaced after an accident? If you’ve been in an accident, it’s time to inspect your car seat, do some research, and make an informed decision. Do Car Seats Really Need to be Replaced Following an Accident? One of the basic rules of car accident and child safety has always been that after an accident, always replace your car seat. But as car safety and car seat safety has improved, this rule has become fuzzier. The NHTSA says that in some instances, yes, it should be replaced, while in others, it’s not necessary. They recommend that child safety seats and boosters are replaced after a severe r moderate crash, but after a minor crash, it’s not always necessary. So, what defines a minor crash? - The car was able to be driven away from the site of the accident, - The door nearest to the child safety seat was not damaged in the accident, - The vehicle occupants suffered no accidents, - The airbags did not deploy in the accident, and - There is no visible damage to the child safety seat. If the accident did not meet all of these requirements, it was probably severe enough that the child safety seat needs to be replaced. However, always make sure to look at the safety seat for obvious signs of wear or damage! Your child’s safety is not worth the risk.
<urn:uuid:c126474a-f96b-401b-84ba-96c90d602146>
CC-MAIN-2021-17
https://daltoncollision.com/safe-child-car-seat-practices-in-a-car-accident/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038092961.47/warc/CC-MAIN-20210416221552-20210417011552-00292.warc.gz
en
0.959217
540
2.625
3
Tudors: The History of England from Henry VIII to Elizabeth I In this, the second book in his history of England, Peter Ackroyd takes on the ever-popular Tudor family, from Henry VIII forward. (Henry VII appears in the earlier volume, Foundation). As one would expect of Ackroyd, his book is written with clarity and verve, and is even-handed and clear-eyed, even to the point of making the controversial suggestion that the charges against Anne Boleyn may have been brought in good faith. There are occasional errors – Henry VIII did not marry Jane Seymour the day after Anne’s execution, for instance, but some days later – but this is hardly avoidable in a history of this scope. As Ackroyd explains, the overarching theme of his book is the Reformation, and this book is a valuable aid to understanding this complex and cataclysmic event. Frustratingly, the book contains no citations to sources, but Ackroyd includes a useful list of further reading arranged by topic. 507 (US), 352 (UK)
<urn:uuid:681038cf-b53e-4577-843e-0d66b0a1d6c9>
CC-MAIN-2016-36
https://historicalnovelsociety.org/reviews/tudors-the-history-of-england-from-henry-viii-to-elizabeth-i/
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982298551.3/warc/CC-MAIN-20160823195818-00077-ip-10-153-172-175.ec2.internal.warc.gz
en
0.944139
224
3.09375
3
September is World Alzheimer’s Awareness Month. There are 35 million people affected by dementia, as are their families, around the world. A world-wide effort is needed to stop it! Senior Care Corner is a strong supporter of the fight to end Alzheimer’s, as are such high profile people as the cast of the Big Bang Theory (picture via the Alzheimer’s Association). We love the show and are pleased to see the actors using their popularity to help raise awareness. Each Tuesday this month we’ll present an Alzheimer’s topic to help increase awareness and support for the cause. Our week one topic is Alzheimer’s Awareness & Understanding. Alzheimer’s Disease – What is It? Much is said about Alzheimer’s Disease and everybody by now has heard about it, but does everyone really know what it is? - Alzheimer’s is a form of dementia, the most common form actually. Dementias are diseases that cause memory loss and impair mental abilities to an extent great enough to interfere with individuals’ ability to complete even the most basic of daily tasks. - The symptoms of Alzheimer’s typically develop slowly – you may think you senior loved one is simply becoming forgetful in her “old age” – until eventually those afflicted are unable to even carry on a conversation or get through the day without assistance. - Alzheimer’s is not a normal part of growing old, though increasing age appears to be the single greatest factor in its development. - While most of those with Alzheimer’s are seniors, it is not just a disease of old age. Early onset Alzheimer’s accounts for up to 1 in 20 cases of the disease and strikes patients in their 40s and 50s. - This is not yet a cure for Alzheimer’s, though much research is targeting an end to the disease. Those with Alzheimer’s can receive treatment to make their lives a little better but there is no way yet to stop it from progressing. Facts & Figures About Alzheimer’s The statistics are quite astounding and especially shocking when we remember that those afflicted with Alzheimer’s have no cure for the disease and few treatment options. - The number living with disease is over 5 million right now just in America. - Every 68 seconds someone in the US develops Alzheimer’s. With the aging of the US population, by 2050 it is expected to be every 33 seconds. - Alzheimer’s causes the sixth most deaths overall in the US now. - Among seniors (those 65+) Alzheimer’s is the fifth leading cause of death in the US. - 1 in 3 seniors die from Alzheimer’s or other dementias - The disease impacts the lives of family members near and far, as almost 15% of those caring for someone with Alzheimer’s are long distance caregivers. - It is estimated Alzheimer’s will cost – counting paid care only – the US $203 billion. - In 2012, 15.4 million unpaid caregivers, often family members, provided more than 17.5 billion hours of care. While the official value of this care was put at $216 billion, we think that is an understatement. - 80% of care provided to those with Alzheimer’s in their communities is by unpaid caregivers. - Due to the physical and emotional toll of caregiving, caregivers of those with Alzheimer’s and other dementias had $9.1 billion in additional health care costs of their own in 2012. - The average per-person Medicare cost for those with Alzheimer’s is three times higher than for those without dementia. - Alzheimer’s is the only cause of death among the top 10 in America without a way to prevent it , cure it or even slow its progression. Today, there are no survivors of Alzheimer’s. If you do not die from it, you die with it! (Source: Alzheimer’s Association) Join us as we support the fight to End Alzheimer’s Disease! We invite you back next week to check out our next Topic and encourage you to find ways to join the cause!
<urn:uuid:ec6b6464-8224-4499-9a08-385dfda5f0a1>
CC-MAIN-2017-22
http://seniorcarecorner.com/world-alzheimers-month-week-1-awareness-understanding-the-disease
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609061.61/warc/CC-MAIN-20170527210417-20170527230417-00126.warc.gz
en
0.937843
872
3.109375
3
Artes Del Lenguaje – Oraciones If you were looking for simple and compound sentences, how to write sentences, what is a subject and a predicate, subject and verb agreement and much more, this is your document. This packet has the following: What are sentences? Types of Sentences Example of types of sentences How to write sentences Simple sentences and compound sentences Subject verb agreement Looking for Spanish products or Bilingual Resources? Click here to check out my store: Bilingual Teacher Store Be sure to follow my store! Click the follow me button and discover lots of great Spanish and Bilingual classroom resources! Tags: Spanish | Bilingual | Spanish Resources | Spanish Activities | Spanish Worksheets | Spanish Printables | Spanish Free | Bilingual Activities
<urn:uuid:cfc1e919-beb0-4458-9937-b1bbe6087d99>
CC-MAIN-2023-40
https://thebilingualteacherstore.com/product/artes-del-lenguaje-oraciones/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510575.93/warc/CC-MAIN-20230930014147-20230930044147-00153.warc.gz
en
0.912471
166
3.921875
4
With so many threats to look out for, some business owners make the mistake of thinking that a simple security tactic such as your password is ineffective – but that’s not true. Your password is your first line of defence, keeping hackers and other intruders from accessing devices, resources, and applications that could seriously compromise data. However, trying to decide on a ‘strong’ password has become increasingly complicated. Many of the tricks and tactics suggested by experts over the years have proven to be less than effective. As it turns out, it’s not just the target audience taking this advice to heart; the hackers have been listening, too. It may be easier to cover what doesn’t work these days than what does, so let’s start there: - Long passwords don’t work, because if you impose a specific character limit, most people will select a password that it exactly that many characters. Knowing how many characters are in your password makes it possible for a hacker to narrow the possibilities from billions to thousands. - Complicated passwords don’t work well, either. By forcing a person to include numbers or symbols, there is a tendency for most people to create a similar pattern with the position of capitals, numbers, and symbols within a random string, or make common substitutions with numbers and symbols. Hackers know to looks for these patterns and substitutions. - Surprisingly, setting passwords to expire does more harm than good. It results in people taking shortcuts. For example, using password1, password2, password3 etc. out of sheer frustration at constantly having to update and then try to remember new login information. Passwords start off weaker than would be preferable, and then become even weaker due to the predictable pattern. So where exactly does that leave you? The recommendation going forward is relatively simple; use a password that is unique to you – but not something obvious like a birth date or pet’s name – and don’t use the same password for multiple websites or services. If the idea of having to remember dozens of different passwords does not appeal to you, you should consider using password management software. There are great options on the market for low cost, and you’re able to gain peace of mind knowing you’ve added an extra layer of managed protection. For individual users, software like LastPass, KeePass, Roboform, or PasswordSafe are a good place to start. For businesses, we recommend an enterprise level password security solution, which tracks who has accessed which passwords, for example. Don’t let something as simple as password security slip through the cracks. With so much that’s out of your control in the realm of IT security, this is one thing you can take into your own hands and ensure works to your advantage. To learn more about the most effective ways to protect your business against emerging threats, including cloud-based credential management from Quality IT Solutions, reach out to our team of technology experts. Contact us at email@example.com or (561) 200-8120 .
<urn:uuid:f281c225-5242-4ab9-8c0a-0a91962489c9>
CC-MAIN-2018-09
https://www.qualityitsolutions.net/is-your-password-compromising-your-security
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816462.95/warc/CC-MAIN-20180225130337-20180225150337-00182.warc.gz
en
0.943831
637
2.515625
3
Lashkar-e-Taiba, ( Urdu: “Army of the Pure”) also spelled Lashkar-e-Tayyiba or Lashkar-e-Toiba, Islamist militant group, begun in Pakistan in the late 1980s as a militant wing of Markaz-ud-Dawa-wal-Irshad, an Islamist organization influenced by the Wahhābī sect of Sunni Islam. It sought ultimately to establish Muslim rule over the entire Indian subcontinent. Lashkar-e-Taiba initially operated in the Indian state of Jammu and Kashmir, on the Pakistan-India border, but by the first decade of the 21st century the group had expanded its reach farther into India. Jammu and Kashmir was claimed by both India, a largely Hindu country, and Pakistan, a largely Muslim country, and the dispute gave rise to many armed groups within Jammu and Kashmir. One of the largest groups operating in Jammu and Kashmir, Lashkar-e-Taiba was extremely pro-Pakistan regarding control of the region. The group opposed any concessions to India. Further, its leaders expressed the desire to establish Islamic rule throughout India. The group took part in several attacks targeting non-Muslim civilian populations in Jammu and Kashmir in an effort to create a Muslim state. Many of Lashkar-e-Taiba’s members were Pakistani or Afghan. It was believed that the group had ties with Afghanistan’s Taliban government and with the wealthy Saudi extremist and al-Qaeda leader Osama bin Laden. Fighters from Lashkar-e-Taiba and another militant Muslim group, Hizb-ul-Mujahideen, were killed in August 1998 when U.S. cruise missiles struck bin Laden’s training camps in Afghanistan, and a senior al-Qaeda official was captured in a Lashkar-e-Taiba safe house in Pakistan in March 2002. Lashkar-e-Taiba made its first incursions into Jammu and Kashmir in 1993. In the late 1990s it was alleged that Lashkar-e-Taiba received funding from agencies of the Pakistani government, an allegation the government denied. The group began operating in the Jammu region, which had large numbers of non-Muslims. Working in conjunction with Hizb-ul-Mujahideen, Lashkar-e-Taiba began a program of attacks against Hindus and Sikhs. Lashkar-e-Taiba attacks were often aimed at civilians. Beginning in 1999, Lashkar-e-Taiba conducted a series of suicide attacks against Indian security forces, often targeting seemingly secure headquarters. In such attacks, Lashkar-e-Taiba forces were outnumbered and eventually killed, though not before killing Indian troops and causing extensive damage. In 2000 Lashkar-e-Taiba had a falling out with Hizb-ul-Mujahideen, which had declared a short-lived cease-fire with India. The group lost more allies in 2001, after the September 11 attacks on the United States led to the removal of the Taliban government in Afghanistan by U.S.-led military forces. On December 13 that year, Lashkar-e-Taiba undertook a suicide attack on India’s parliament complex in the capital, New Delhi, in conjunction with Jaish-e-Mohammed, another militant group. In response, the United States government froze the U.S. assets of Lashkar-e-Taiba and declared it a terrorist organization. Under pressure from the United States to crack down on such militant groups and to avoid a war with India, the government of Pakistan banned the group in January 2002 and arrested its leader, Hafiz Muhammad Saeed, but he was released a few months later. Following a cease-fire accord between India and Pakistan in 2003, Lashkar-e-Taiba was believed to have moved most of its operations to northwestern Pakistan, an area bordering Afghanistan over which the central government did not have control. The organization also increasingly focused its activities on India itself. Lashkar-e-Taiba operatives were believed to have continued their attacks throughout the first decade of the 21st century. Those incidents primarily aimed at Indian security forces. In 2006, however, the group was implicated in a considerably more deadly attack against civilians in Mumbai (Bombay), India’s most-populous city. On July 11 of that year, several bombs tore through Mumbai’s commuter train system during the evening rush hour, killing more than 180 people. The bombs were all placed in first-class train compartments in an apparent effort to target India’s professional class. Following the attack, which India linked to Lashkar-e-Taiba, Pakistan once again detained Saeed and once again released him, claiming that India’s investigation was biased. Two years later, on the evening of November 26, 2008, 10 gunmen landed boats in Mumbai, spread out to popular tourist destinations, and began shooting people. The gunmen, who were well-armed and well-trained, eventually met up in two luxury hotels and a Jewish outreach centre. They took hostages at all three locations and held off Indian police and military for three days. More than 170 people died in the attacks, including nine of the attackers. One was captured alive, however, and confessed that he was a member of Lashkar-e-Taiba, that he had trained in Pakistan, and that the attackers had come to Mumbai by boat from Karachi. He was convicted of murder in India in 2010 and was executed in November 2012. Theretofore, Pakistan had been reluctant to appear to give in to Indian pressure over Lashkar-e-Taiba’s activities, but the solidity of the evidence, combined with pressure from the United States and the United Nations, spurred the country to raid Lashkar-e-Taiba camps and arrest several operatives linked to the Mumbai siege. Pakistan also made public in July 2009 an investigation that reached largely the same conclusions as India’s, acknowledging that Lashkar-e-Taiba had indeed planned and launched the attack from Pakistan. Formal charges were brought against those Lashkar-e-Taiba operatives detained in Pakistan in October 2009; the trial did not begin until May 2012, however, because of various delays and controversies, including accusations that one of the defense lawyers had a fake law degree. The Pakistani government did not link Saeed with the attack conclusively, however, and he claimed to have renounced violence. He was nonetheless repeatedly placed under house arrest. In the aftermath of the Mumbai attacks, the organization continued to be considered a threat, in particular because of its efforts to connect with militant Muslims worldwide. Several people trained in Lashkar-e-Taiba camps were arrested or linked to terrorist attacks in Great Britain. David Headley, an American of Pakistani extraction, was arrested by U.S. authorities in October 2009 on charges that he had helped Laskhar-e-Taiba plan the 2008 Mumbai attacks. He pleaded guilty to a number of charges and in January 2013 was sentenced to 35 years in U.S. federal prison.
<urn:uuid:2629fb68-c820-4fdf-a806-b41747e9ec8e>
CC-MAIN-2015-11
http://www.britannica.com/EBchecked/topic/1499435/Lashkar-e-Taiba
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463658.66/warc/CC-MAIN-20150226074103-00224-ip-10-28-5-156.ec2.internal.warc.gz
en
0.980787
1,466
2.96875
3
Click to learn more about author Gilad David Maayan. Cloud computing is the force behind many successful services, offering companies computing resources at scale. A veteran cloud service leveraged by many IT organizations is the Database as a Service (DBaaS). Database management can be a complex and expensive operation. Agile-minded and DevOps teams aren’t happy with the slow progress of database development. Database as a Service (DBaaS) is here to the rescue, infusing a breath of flexibility into database management and cloud migration. Read on to learn about cloud computing, cloud migration, Database as a Service (DBaaS), and everything you need to know to migrate your database to the cloud. What Is Cloud Computing? Cloud computingis an on-demand model that offers computing services hosted over the Internet. Unlike traditional computing, the cloud model offers computing as a service, eliminating the need to manage computing on-premise. There are four main cloud computing resources offered as services: - Infrastructure as a Service (IaaS): Delivers virtualized computing resources (such as networking and servers) over the Internet. Eliminates the need to set up and manage complex computing in-house. - Platform as a Service (PaaS): Delivers application development resources (such as operating systems and execution environments) over the Internet. Eliminates the need to purchase expensive application development tools. - Software as a Service (SaaS): Delivers software (such as intelligence and analytics) over the Internet under specific licenses. Eliminates the need to download and install software on the computer. - Database as a Service (DBaaS): Delivers database management resources (such as storage and backup) over the Internet. Eliminates the need to maintain data centers in-house. While all four services can be migrated to the cloud, this article will focus on Database as a Service (DBaaS). What Is Cloud Migration? Cloud migration is the process of transferring some or all of the computing resources of the organization to the cloud. You can migrate computing resources from any location to any destination, including: - On-premise migration: From on-premises data centers to public clouds - Cloud-to-cloud migration: From one cloud platform to another cloud provider - Reverse cloud migration: From the cloud to on-premises data centers Why Many Organizations Migrate Their Data to the Cloud Since the inception of cloud computing in the 1960s, the model has grown into a $136 billion industry, encompassing a wide range of sub-categories and services. Cloud adoption has become so popular researchers estimate that by 2020 83% of enterprise workloads will be migrated to the cloud. The following benefits of cloud computing contribute to the popularity the cloud industry has seen over the past years: - Value: Cloud service providers have the ability to offer their customers a high value of services in return for their investment. Pricing models such as on-demand and subscriptions offer organizations and individuals throughout the world access to more services than they could possibly manage on their own. For example, a budding startup could use cloud IaaS on demand rather than throw precious funds on a local data center. - Security: Most cloud service providers have the resources and experience to provide their customers with advanced security controls. Some providers offer built-in security while others offer a variety of security modules. Be sure to research in advance and find the models that fit your business. - Automation: In today’s market, organizations are measured in terms of speed as well as quality. Automation enables organizations to delegate manual tasks to machines. Thus, clearing the time of the personnel for other uses and speeding the processes with powerful machines. Most cloud service providers offer automation as part of their service, while others offer automation at an additional cost. - Accessibility: Cloud service providers offer robust capabilities at affordable costs, all easily accessed over the Internet. When your resources are hosted in the cloud, you can access them from any physical location and any device. As long as you have your identification credentials, you can gain access to your account. What Is Database as a Service (DBaaS)? Database as a service (DBaaS) is a cloud computing service that provides database management resources over the Internet. Database management resources help organizations organize, maintain, secure, and analyze data processes. The core goal of database management is to enforce data control at any stage of the data lifecycle, so that later on the data could be translated into meaningful information. Database as a service (DBaaS) providers offer platforms and systems for the management of some or all of the following tasks: - Storage and integration: Data storage capacity and API integration with a variety of database management systems. - Management console: For managing and monitoring any connected data resource, often including visibility into the performance of data-driven applications. - Security and access: Built-in or separated modules for implementing data security controls and access authorization. - Analytics and automation: Big Data tools that provide insights and automation tools that speed up processes. Database Management and Cloud Migration Best Practices The tips below are organized according to phases for clarity purposes. You are by no means obligated to use the phases linearly. A flexible agile approach can help ease the process of cloud migration and enhance the management of your databases. Phase A—What to Do Before Migrating Your Database to the Cloud 1. Take stock of your resources Create an inventory of all the digital assets you want to migrate to the cloud. Include the license type of each tool, to ensure that your license covers cloud environments. If you can’t bring your own license (BYOL), maybe your service provider offers a pay-per-use license. Check this in advance to avoid compliance issues. 2. Set a budget for cloud migration After taking stock of your resources, take stock of your finances and allocate funds appropriately. You will have the initial costs for the migration process and then a new monthly expense for the use of the DBaaS service and any related tasks. Before moving forward with the migration, ensure that you have enough initial capital to begin the process and the equity to sustain the adoption. 3. Choose a migration strategy A migration strategy serves as the blueprint of the entire operation. It includes all the particulars and determines how the migration will be implemented. You may choose any of the following migration strategies, depending on the needs of the project and the budget. General migration strategies include: - Rehosting: “Lift and shift”—fast cloud-to-cloud migration. - Replatform: “Lift, thinker, and shift”—a version of rehosting that optimizes some of the migrated components. - Repurchase: “Drop and shop”—migrating from on-premise data centers to the cloud. May apply to any of the offered cloud computing services. Migration strategies for ineffective resources: - Refactoring: “Re-architecting”—re-purposing ineffective resources to lower costs and increased efficiency. Requires complex configurations of code. - Retiring: Turning off ineffective resources to avoid wasting space, speed, and performance capacity in the new cloud environment. - Retaining: Saving ineffective resources for later use in the former environment and migrating only active resources. 4. Run performance checks To prevent transferring threats along with your resources, run a performance check before migrating to the cloud. The time and resources invested in this check can save you trouble and overhead in the future. Get rid of any detected vulnerability to protect your cloud. 5. Bring your team into the process The cloud offers many advantages, but it also introduces a change. Before migrating, ensure that your IT team is trained in cloud computing and that your general personnel is versed in the proper use and care of the cloud. It would be wise to create in advance a Policies and Procedures document that explains how cloud environments are to be handled. Phase B—Set Up Your Cloud Architecture, Management, and Security 1. Choose your cloud architecture wisely Migrating to the cloud often offers a fresh new start. You can shed old models in favor of modern designs of cloud architecture. While models such as the multi-cloud architecture have become popular due to the level of flexibility it offers, it might not be the best solution for all businesses. Be sure to model cloud architecture in accordance with the needs of the business. 2. Create a security strategy for protecting data in the cloud Remember that security needs changes between environments. When designing your new security strategy, take into account the security controls offered by the new service provider in correlation with legacy security resources you still have in-house. Current standards of data security promote: - Tokenization for protecting data at rest and in transit - Identity and Access Management (IAM) systems for securing access - VPN and encryption for protecting data in transit Phase C—Automate Cloud Migration, Governance, and Monitoring Processes 1. Set up a monitoring system Continuous monitoring of the cloud enables a healthy cloud environment. You can set up your own monitoring system, or you can use the modules offered by the cloud provider. Whichever the case, ensure that you have basic visibility controls such as audit logs. If possible, use automation and analytics tools to set up regular security and performance alerts. 2. Set up a governance system Most cloud providers offer their own management platform, which serves as your main control room. Make sure that the provider of your choice can integrate with your preferred database management system. Most providers offer integration with the popular MySQL and Postgres management systems. Not all providers offer NoSQL compatibility or pre-built APIs for a large number of systems. 3. Automate cloud migration processes You can increase the speed of migration processes by automating repeated patterns. The automation capabilities are determined by the chosen tool, and may include the following functionalities: - Run automated scripts - Automate the migration processes - Implement controller-level automation - Automate optimization of servers
<urn:uuid:2509e850-14d5-457e-b3c9-daa19955f3a0>
CC-MAIN-2020-34
https://www.dataversity.net/the-complete-guide-to-cloud-database-management-and-migration/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735964.82/warc/CC-MAIN-20200805183003-20200805213003-00315.warc.gz
en
0.917116
2,090
2.78125
3
As the winter chill sets in and furnaces run longer, state health officials are warning Wisconsinites to be wary of carbon monoxide. Carbon monoxide (CO) is a colorless and odorless gas that is most dangerous when it’s allowed to build up. State Environmental Health director Chuck Warzecha says the greatest risk is usually at home, which accounts for more than half of the CO poisonings reported each year. Warzecha says common sources of the gas include malfunctioning furnaces, blocked chimneys, or portable generators used indoors without properly venting the area. Symptoms of CO poisoning include headache, fatigue, and nausea, which can result in death if you get to the point of passing out. Warzecha says the easiest way to safeguard against the danger is to have a working CO detector in your home. Warzecha says they are the only way to be alerted to a buildup, other than starting to feel sick. CO detectors are required by state law in all single and two-family dwellings. If an alarm sounds, Warzecha says you should get out of the home immediately and call 911. AUDIO: Andrew Beckett reports (1:11)
<urn:uuid:72da874c-9028-4285-b6b8-b3756da769ca>
CC-MAIN-2018-51
https://www.wrn.com/2011/11/a-warning-about-carbon-monoxide/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829568.86/warc/CC-MAIN-20181218184418-20181218210418-00229.warc.gz
en
0.933106
249
2.8125
3
Compare yourself to a character in the novel. Use a black line map to show places where characters live and travel in the novel. Prepare a short oral or written report about South Africa in the late 1970s and early 1980s. Create a timeline showing the events in the novel. Dear Mr. Cussler Write or email the author and tell him what you did or did not like about the book. Pitt's Next Adventure Imagine what Pitt's next adventure will be and write about it. A Cussler Novel Read another book by Clive Cussler. On the Scene Imagine that you are a television reporter and do a live on-the-scene report about an incident in the novel. Write an obituary for Patrick Fawkes. With a group, reenact a scene from the novel. Imagine that it is your job... This section contains 292 words (approx. 1 page at 300 words per page)
<urn:uuid:31c8daa7-bfab-46d1-8066-983b07d02c3e>
CC-MAIN-2017-26
http://www.bookrags.com/lessonplan/vixen-03/funactivities.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320685.63/warc/CC-MAIN-20170626064746-20170626084746-00156.warc.gz
en
0.91593
203
3.25
3
Queen Anne of Brittany's Heart Stolen From French Museum Bringing new meaning to the idea of stealing someone's heart, thieves in France made off with a 16th-century gold relic containing the once-beating organ of Anne of Brittany, the only woman to ever have been twice crowned the queen of France. Over the weekend, burglars smashed a window of the Thomas-Dobrée museum in Nantes and lifted the six-inch case from its display, The Telegraph reports. Anne was crowned queen when she was just 12 years old after marrying Charles VIII of France in 1491. After his death in 1498, she married Louis XII and once again ascended the throne, where she stayed until her death at age 36. Although her body was buried at the Basilica of Saint Denis, she requested that her heart be kept alongside her parents’ tomb in Brittany. “The thieves attacked our common heritage and stole an item of inestimable value," Philippe Grosvalet, president of the Loire-Atlantique department, which owns the museum, told The Telegraph. "Much more than a symbol, the case containing the heart of Anne of Brittany belongs to our history.” The gold relic was saved from being melted down after the French Revolution, and it has been kept safe at the Thomas-Dobrée museum for more than 130 years. The case contains an inscription in old French, which translates to: “In this small vessel of pure, fine gold rests the greatest heart of any woman in the world.” This practice of burying the heart apart from the rest of the body was not entirely uncommon among European aristocrats in the Middle Ages. The hearts of both Richard I and Anne Boleyn were kept in lead boxes, and the hearts of 22 former popes are stored in marble urns at Rome's Santi Vincenzo e Anastasio a Trevi church. It's also far from the only instance of relic theft. In a slightly more bizarre case, fragments of the brain of John Bosco, a 19th century Roman Catholic priest, were contained in a reliquary at his basilica in Castelnuovo, central Italy, until they were snatched by a thief in 2017. The reliquary was ultimately recovered by police from the suspect’s kitchen cupboard. [h/t The Telegraph]
<urn:uuid:657d641e-d305-43ca-907f-79d033310291>
CC-MAIN-2022-05
https://www.mentalfloss.com/article/540283/queen-anne-brittanys-heart-stolen-french-museum
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305277.88/warc/CC-MAIN-20220127163150-20220127193150-00146.warc.gz
en
0.970949
493
2.671875
3
Small onion is the members of the Allium genus of flowering plants that also includes garlic, shallots, leeks and chives. Small onion have characteristic pungent flavors and some medicinal properties. The taste of the small onion can range from sweet and juicy to sharp, spicy, and pungent, often depending on the season in which people grow and consume them. This vegetable is particularly high in vitamin C, a nutrient involved in regulating immune health, collagen production, and tissue repair and iron absorption. Small onion will also help to reduce heart disease risk factors, such as high blood pressure, elevated triglyceride levels and inflammation. Small onions are rich in anthocyanins, which are powerful plant pigments that may protect against heart disease, certain cancers and diabetes. *All images are for illustration purposes only. Actual specifications, weight and prices of the product are subjected to changes.
<urn:uuid:622050d0-f365-4f46-99bc-08ebe5549b3e>
CC-MAIN-2020-50
https://marketboy.sg/products/small-onion
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141515751.74/warc/CC-MAIN-20201130222609-20201201012609-00245.warc.gz
en
0.939482
180
2.796875
3
How to measure flour Measuring flour accurately can make the difference between cookies that dazzle or fizzle. Follow these steps to measure correctly. Bakers recommend sifting flour, including “presifted” flour. Sifting eliminates lumps and aerates the flour, making it easier to blend into a batter. Sifted flour also weighs 20 to 25 percent less per cup than unsifted. Posting a comment to our website allows you to join in on the conversation. Share your story and unique perspective with members of the azcentral.com community. azcentral.com has switched to the Facebook comment system on its blogs. Existing blog comments will display, but new comments will only be accepted via the Facebook comment system. To begin commenting, you must be logged into an active personal account on Facebook. Once you're logged in, you will be able to comment. While we welcome you to join conversations, readers are responsible for their comments and abuse of this privilege will not be tolerated. We reserve the right, without warning or notification, to remove comments and block users judged to violate our Terms of Service and Rules of Engagement. Facebook comments FAQBack to Article
<urn:uuid:89e59205-f810-4708-8010-674649b86182>
CC-MAIN-2015-22
http://archive.azcentral.com/food/articles/20121204how-to-measure-flour.html?from=global
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928015.28/warc/CC-MAIN-20150521113208-00336-ip-10-180-206-219.ec2.internal.warc.gz
en
0.916268
239
2.515625
3
By Kathy Hubbard Henry VIII had it. So did Benjamin Franklin, Alexander the Great, Beethoven, both of my brothers, my father and my friend, Jim. Although post-menopausal women can get it, it isn’t as common as men having a flare-up of this inflammatory arthritis called gout. “The signs and symptoms of gout almost always occur suddenly, and often at night,” Mayo Clinic tells us. “It’s characterized by sudden, severe attacks of pain, swelling, redness and tenderness in the joints, often the joint at the base of the big toe.” Ouch. Gout isn’t just about toes, either. It can affect any joint commonly ankles, knees, elbows, wrists and fingers. The pain is most severe within the first four to twelve hours after it starts. “After the most severe pain subsides, some joint discomfort may last from a few days to a few weeks. Later attacks are likely to last longer and affect more joints,” Mayo says. What causes it? Let’s turn to Medicinenet.com for their explanation: “Gout is caused by too much uric acid in the bloodstream and accumulation of uric acid crystals in tissues of the body. Uric acid crystal deposits in the joint cause inflammation of the joint leading to pain, redness, heat, and swelling. “Uric acid is normally found in the body as a byproduct of the way the body breaks down certain proteins called purines. Causes of an elevated blood uric acid level (hyperuricemia) include genetics, obesity, certain medications such as diuretics (water pills), and chronic decreased kidney function.” There are four stages of gout. The first is asymptomatic hyperuricemia when the blood uric acid levels are high, crystals are forming in the joints, but you have no symptoms. D’uh. Asymptomatic. The second is acute gout or gout attack which we’ve already described. Interesting to note, is that as many as 84 percent of sufferers may have another gout attack within three years. The third level is called interval gout which is the time between attacks. The patient has no pain, but the low-level inflammation is still there and damaging the joints. “Chronic gout develops in people with gout whose uric levels remain high over a number of years,” Arthritis Foundation explains. “Attacks become more frequent and the pain may not go away as it used to. Joint damage may occur, which can lead to a loss of mobility. With proper management and treatment this stage is preventable.” Without a flare-up it’s unlikely you would know if your uric acid levels are high. And, even if you knew that they are, it doesn’t guarantee that you’ll have a gout attack. Confusing? Add to that the fact that you can have low uric acid and still have a gout attack is really baffling. Your healthcare provider will put you through some tests to diagnose whether or not you actually have gout. They include a blood test; a joint fluid test where a needle draws fluid from the affected area and examined under a microscope; x-rays; ultrasound and/or a CT scan. There are medications today that can help ease the pain of the attack and to prevent future ones. Your medico will walk you through the choices available to you and discuss how you want to proceed. One thing is for certain, you will want to prevent another attack and that prevention will require you to make some lifestyle changes primarily in your diet. “Reaching and maintaining a proper weight is an important part of managing gout. Not only does losing weight help reduce the uric acid in the blood, it can lessen the risk of heart disease or stroke, both common in people who have gout, Arthritis Foundation says. They also say that keeping active is important and that you and your medical team should make a plan of action, literally. Gout used to be called the rich man’s disease because it can be exacerbated by eating lots of red meat, organ meats, shellfish such as shrimp and lobster, sugary beverages and excessive alcohol. If you’ve ever had, or thought you had a gout attack you’ve probably read all the info on what you can eat and drink to avoid another attack, if you’re interested search “gout diet” for lots of good advice. Kathy Hubbard is a member of Bonner General Health Foundation Advisory Council. She can be reached at email@example.com.
<urn:uuid:884a0726-6246-4509-ad25-99d6fa555d19>
CC-MAIN-2023-40
https://bonnergeneral.org/all-about-gout/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506429.78/warc/CC-MAIN-20230922234442-20230923024442-00237.warc.gz
en
0.961673
994
2.546875
3
Geneve Lilia February 27, 2021 worksheets Benefit-6 – Specially-designed age appropriate graded level worksheets give kids the opportunity to reinforce the application of knowledge they gained in their classrooms. Benefit-7 – Worksheets for kid’s suit all age groups, as these can be upgraded easily they are suitable for different capabilities and applications of each individual child depending on their learning needs. Benefit-8 – Worksheets for kids are an essential resource for teaching fundamental concepts of various subjects. Therefore, starting early with nursery worksheets can strengthen the foundation of knowledge for kids from 3 years to 7 years. Benefit-9 – Worksheets for kids are widely used by parents in the form of monthly subscription based program,specially designed for nursery kids, LKG, HKG, 1st Grade and 2nd Grade levels. Following a plan with rewards introduced at various levels of completion can motivate the kids to complete their tasks and enjoy the learning process Benefit-10 – Preschool worksheets for kids are a great way to reinforce the learning done in class for important subjects such as EVS, English, phonics, Maths, Life skills and GK. 4. Math worksheets are not accessible. Some students are unable to access tools that many of us take for granted when they try to complete worksheets. They may be unable to grasp pencils, control their movements within the limited spaces provided on the sheet, or be able to simply stabilize their paper while writing. Other students, including those for whom English is not their primary language or who struggle with reading, have difficulty reading the directions, words, and math terminology on the worksheets. Still other students require different visual representations or methods of engagement in order acquire an understanding the content. Most math worksheets do not provide information in multiple formats so they are inaccessible to students with a wide variety of learning styles and abilities. Well-designed technology can provide these students with access to excellent content. For example, these fractions tools and supplemental curriculum allow students with physical disabilities to access fractions content using a variety of assistive technology devices. Instructions, prompts and feedback can be read aloud, while visual models, cues combined with sounds support a wide range of learning styles and abilities. Tip #3 – Use Worksheets Sparingly. Since free multiplication worksheets are so easy to find, it’s tempting to give your child too many. You mean well, but it just seems like a good idea to have them do several at a time. Little brains can only take so much. Keep learning fun by sprinkling worksheets into their curriculum as a fun break from their usual textbook. Tip #4 – Keep it Fun. If you happen to have a competitive child, chances are he will love worksheets always trying to beat his last time. This is great and if this is the case, let him work all of the worksheets he wants. Just be sure that it is ”child-driven” not ”parent-driven” meaning – let it be his idea. As long as he is having fun and asking for more, let him have all he wants. Are you the parent of a toddler? If you are, you may be looking to prepare your child for preschool from home. If you are, you will soon find that there are a number of different approaches that you can take. For instance, you can prepare your child for social interaction by setting up play dates with other children, you can have arts and crafts sessions, and so much more. Preschool places a relatively large focus on education; therefore, you may want to do the same. This is easy with preschool worksheets. When it comes to using preschool worksheets, you will find that you have a number of different options. For instance, you can purchase preschool workbooks for your child. Preschool workbooks are nice, as they are a relatively large collection of individual preschool worksheets. You also have the option of using printable preschool worksheets. These printable preschool worksheets can be ones that you find available online or ones that you make on your computer yourself. Here are five reasons why math worksheets don’t work if you want students to understand math, enjoy math, and think mathematically. 1. Math worksheets are not engaging. Numerous research studies have found that when students are actively engaged with the content, they have a much better chance of understanding and remembering what they have learned. Unfortunately, math worksheets tend to bore most students, especially those who need the most help in math. Engagement entails much more than rote repetition of a procedure. Math worksheets tend to present very similar problem types over and over, leading to mundane practice of disassociated skills. For students who understand the material and successfully complete an assignment, another worksheet becomes meaningless. On the other hand, for the students who don’t understand the material, an alternative method of instruction is what’s needed. Another worksheet simply adds to the student’s frustration, or worse, contributes to a belief that ”I’ll never understand math.” A cute image or a ”fill-in-the-blanks” riddle does nothing to increase engagement or learning (and let’s face it, those riddles are not funny!). Instead, teachers need to increase engagement by providing students with exercises in which they discover patterns and relationships, solve problems, or think creatively about math relationships. No matter what materials you choose, it is most important that you supervise your child constantly so that mistakes get caught rather than practiced. I learned this particular lesson the hard way. When my daughter was young, she did something that needed ”attention.” I no longer remember what it was that she did, but I told her to write the sentence ”I will not disobey my parents again” 50 times. I should have known better, but I didn’t check on her at the beginning and then I got busy. So, sometime later, she brought me 50 sentences of ”I will not disobey my parents agen.” She had just practiced misspelling ”again” as ”agen” — 50 times! I’m not certain that we ever really got that fixed. This issue of NOT practicing mistakes is extremely important. Parents shouldn’t give worksheets as busy work and teachers should only use them if you are going to have a non-math teacher substitute. White boards with supervision are always a better way to practice skills. If you need some time to do chores, your child will get much more benefit by helping you with the chores. And maybe you can work in a little discussion of numbers or counting while you do chores together. Tag Cloudeducational worksheets for 6 year olds year 2 math worksheets free counting coins for kids algebra ii help free preschool math games free printable worksheets for english teachers basic multiplication 9th grade algebra test geometry grade 6 multiplication fun sheets mathematics with business applications worksheets answers everyday math 5th grade fundamentals of mathematics year 3 math division worksheets math research 6 digit addition with regrouping worksheets private tuition fees free basic math help gcse geometry worksheets a level math exam
<urn:uuid:bf74d775-b74f-4ba6-837b-86eac8df2190>
CC-MAIN-2021-21
https://onedayinsandiego.org/1e43om96u/aS63916xD/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991537.32/warc/CC-MAIN-20210513045934-20210513075934-00418.warc.gz
en
0.950531
1,512
3.203125
3
The Obama administration launched data.gov in April 2009, stating that all government data "that is not restricted for national security reasons can be made public" through data feeds. It promised to spearhead the federal open government movement and provide government-as-a-service that efficiently leveraged talents across the country. Data.gov received mixed reviews. By a number of accounts, it has failed to be the transformative force it was slated to become. Why? Many claim the platform was not as open as it could be, in some cases requiring proprietary software to make use of the data. While such a public-private partnership can sometimes be efficient, a system that grants everyone equal access to content, regardless of the method, is vital for long-term success. If you doubt this, imagine websites that can only be visited by a certain browser. This brings us to GeoNode, which is, in effect, a data.gov that you can host. It allows for the publishing, sharing, and dissemination of geospatial data and maps. It has built-in security settings, graphical map editing, and endless mashup potential. Most importantly, GeoNode operates entirely with openness in mind. GeoNode publishes data and maps using open standards, all the data is designed to be open and distributed (in any format you choose), and the code base itself is completely open source as well. Agencies are starting to see the value of GeoNode. The World Bank has been using and advocating for GeoNode for some time now. And it's not just the government sector, as we talked about back in February, Harvard’s Center for Geographic Analysis has been using GeoNode to extend the collaborative potential in its WorldMap application. The demise of Data.gov is not, by any means, a blow for transparency. The problem that Data.gov was designed to solve still remains across all levels of government and we can learn some lessons from Data.gov. Government-as-a-service is in many ways still a nascent idea and the bugs are still being worked out. GeoNode can foster exactly the sort of openness and transparency that Data.gov was designed to accomplish. Posted at - April 4, 2011, 10 a.m.
<urn:uuid:01e4970d-cf5d-4f47-9891-ffed57c72d1c>
CC-MAIN-2020-05
http://geonode.org/blog/2011/04/04/data-gov-is-dead-long-live-open-data/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594603.8/warc/CC-MAIN-20200119122744-20200119150744-00207.warc.gz
en
0.961813
455
2.875
3
majority of settlers came to the colonies for economic opportunity and land or to avoid political and religious unrest at home. Many colonies were founded by private ________________, owned by individuals who had received permits from the English monarch to colonize lands claimed by England. is a document issued by a king or queen giving the charter holder (person or company) the right to establish a colony. Pilgrims (also known as separatists) came to the New World in 1620 to worship their own way, after cutting ties to the Church of England or Anglican The New England Colonies were: Connecticut, Massachusetts, New Hampshire, and Rhode Island and had rocky soil, timber and good fishing. The Middle Colonies were Delaware, New Jersey, New York, and Pennsylvania and had large farms with surpluses of corn, wheat, and other agricultural products used for export. Fundamental Orders of Connecticut limited government power, expanded the idea of representative government, and gave the vote to all men to who property owners. was a movement that believed in the ability of man to reason and use logic to solve problems. routes were a series of colonial trade routes between Africa, New England, and the West Indies. (Slave trade was a major part.) signed a contract to work for several years to pay for their passage to the New World. Qualifications for voting included property ownership and sometimes religion, white males over 21 who owned property. is an economic theory that believes a nation can become strong by building up its gold supply and expanding trade with other countries. were a series of laws aimed at strengthening the English government's control over colonial trade.
<urn:uuid:740f4cda-8cb8-4dac-8fdf-6db54bccc9b9>
CC-MAIN-2014-35
http://quizlet.com/5872831/13-colonies-flash-cards/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500815861.64/warc/CC-MAIN-20140820021335-00197-ip-10-180-136-8.ec2.internal.warc.gz
en
0.957527
351
4.3125
4
What does the Marcellus Shale industry mean to the Lehigh Valley and all of Pennsylvania? Aside from a handful of groups that rely on permanent crisis for support, people in this state realize the importance of this new energy resource. The natural gas being extracted from the shale two miles underneath us is providing jobs, energy independence and, to the surprise of many, tax revenues — $1.4 billion in state and local taxes during 2009-10 alone. Some critics talk about how Gov. Tom Corbett should make the drillers "pay their fair share." But what does this term, "fair share," mean? Is it the more than $76 billion that shale gas contributed to the gross domestic product in 2010 that is expected to increase to $231 billion in 2035? Or the 600,000 jobs the industry supported in 2010 — expected to grow to more than 1.6 million by 2035? Or is it the spinoffs that have created a boom in support industries, ranging from engineering to environmental services to pipe manufacturing to residential and commercial construction? When critics say "fair share," they mean they want dollars from the prosperous gas industry to pay or subsidize other industries and projects. Some critics are falsely saying the state is providing billions in subsidies to the fossil fuels industry. Some are saying to focus subsidies on expensive renewable sources of energy. But what about the impact on commonwealth families? Philadelphians are already enjoying lower energy bills. In the Lehigh Valley, engineering firms and support businesses are expanding because of jobs in the Marcellus fields — while reducing carbon emissions. With record low prices and home heating bills that have dropped by 40 percent this winter, some folks still think another tax will solve our problems. On behalf of the 5,000 member businesses and organizations — employing 140,000 people — the Greater Lehigh Valley Chamber of Commerce recognizes the economic benefits and opportunity for energy independence that shale gas formations can bring to Pennsylvania's businesses, commerce and communities. We also understand the need to protect our environment, natural resources and infrastructure from adverse consequences from developing and extracting shale gas. What "fair share" should mean is a per-well impact fee — precisely the approach the Corbett administration and the Legislature have been discussing — not an additional tax. The impact fee would focus money on the towns and counties that actually host the drilling sites, ensuring repairs for wear and tear on the area and underwriting increased environmental enforcement. But the value of the industry extends beyond the impact fee. As a jobs report by President Obama's administration put it: "Of the major fossil fuels, natural gas is the cleanest and least carbon-intensive for electric power generation. By keeping domestic energy costs relatively low, this resource also supports energy intensive manufacturing in the United States." The Chamber believes that an impact fee on natural gas extracted from shale gas formations should be established, subject to the following conditions: •This fee should be used solely to address direct and indirect impacts, both present and future, associated with natural gas extraction. This includes, but is not limited to, remediation of environmental contamination, infrastructure repair and maintenance, public safety issues, and increased regulatory agency costs associated with properly overseeing the associated industries, and a reasonable fund to address non-recoverable and unexpected costs that are not otherwise covered by responsible parties. •This fee should be imposed, collected and managed at the state level so that all impacts, including those that may occur "downstream" from well locations, may be addressed in an equitable and consistent manner. •Funds raised through this assessment should not be added to the state's general fund nor be available for any other purpose, but instead should be set aside in a trust fund and used solely for purposes outlined above. Slowly, everybody's catching on. In Pennsylvania, we got this one right. The Chamber encourages its current and future members to explore the business opportunities Marcellus Shale presents to Pennsylvania. The members of the Greater Lehigh Valley Chamber of Commerce are committed to working with Gov. Corbett's administration, our public officials and the gas industry to ensure all Pennsylvanians prosper and grow for generations to come. T. Anthony Iannelli is president and CEO of the Greater Lehigh Valley Chamber of Commerce.
<urn:uuid:fc20435e-9d03-4029-bfdc-d2cee4eb34fc>
CC-MAIN-2014-23
http://articles.mcall.com/2012-01-30/opinion/mc-marcellus-shale-gas-ianelli-yv-0129-20120130_1_shale-gas-marcellus-shale-impact-fee
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997881423.31/warc/CC-MAIN-20140722025801-00124-ip-10-33-131-23.ec2.internal.warc.gz
en
0.946341
873
2.578125
3
Water tech innovation and the future of renewables A study led by the University of Reading found that the amount of winter rain and snow in the western Himalayas could vary by almost 50% depending on the air pressure gradient over the Atlantic Ocean between the Azores and Iceland. Scientists have spent decades trying to establish the causes of a link between the two regions. This new study provides important evidence that could lead to better forecasting of winter precipitation levels in India, months in advance. The results could be used to improve yields of important crops, such as wheat and barley, and to help manage vital water supplies in the country.
<urn:uuid:a9b6bb06-1004-4fdc-a19f-dd724e266010>
CC-MAIN-2022-49
https://bluerloop.com/article/water-tech-innovation-and-the-future-of-renewables
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710698.62/warc/CC-MAIN-20221129132340-20221129162340-00026.warc.gz
en
0.951174
138
2.84375
3
Vertigo Treatments at Euclid Medical Group Vertigo is a common condition that affects a surprisingly large percentage of adults. Vertigo is often times thought of as another word for dizziness. However, dizziness can mean either vertigo or lightheadedness and it’s important to know the difference. Unlike Vertigo, lightheadedness is a feeling that you are about to faint or pass out. With lightheadedness, you do not feel as if the environment around you is moving. Vertigo is a condition where you feel like you or your surroundings are spinning even though you are in a stationary position. What is Vertigo Vertigo is a result of conflict between signals sent to the brain by various sensory systems of the body that control balance and position. Your brain relies on the input from 4 Sensory Systems working in harmony with one another to maintain balance. These Sensory Systems are as follow: - Sensory Nerves: Nerves throughout your body constantly track position and orientation and communicate with your brain to make adjustments in order to keep balance. - Vision: Your eyes tell your brain where you are in relationship to your environment and what adjustments need to be made. - Skin Pressure: This sensation provides information to your brain about your body’s relationship with gravity. - Inner Ear: Your inner ear plays a vital role in detecting motion, changes in position and communicating that information to your brain to maintain balance. Causes of Vertigo Causes of vertigo typically stem from problems with one of the 4 Sensory Systems. When one or more of these systems is not working properly, the information being supplied to your brain becomes distorted and vertigo can develop. Vertigo may be caused by such things as: - Injuries or trauma to your ears, eyes or head. - Damage to your Central Nervous System. - Inhaling or ingesting chemicals (including medications) - Disorders including: Meniere’s Disease (Disorder of the Inner Ear) Labyrinthitis (Inflammation of the Inner Ear) Migraine Headaches (when associated with Vertigo is termed Vestibular Migraines or Migrainous Vertigo) Vertigo caused by problems with the inner ear is called Peripheral Vertigo. Any cause of inflammation in the inner ear such as a common cold or bacterial infections may cause Peripheral Vertigo, as may chemicals and physical trauma. Vertigo stemming from the brain is called Central Vertigo. Central Vertigo is typically milder than Peripheral Vertigo but involves neurological problems such as slurred speech and double vision. Problems with the central nervous system including migraine headaches and multiple sclerosis may lead to vertigo. Benign paroxysmal positional vertigo (BPPV) is the most common form of vertigo. BPPV is usually initiated by moving your head in certain directions or sudden head movements. These may include tipping your head up or down, and by lying down, turning over or sitting up in bed. You may also feel out of balance when standing or walking. Benign paroxysmal positional vertigo can be a bothersome problem. Symptoms of Vertigo Symptoms of Vertigo include spinning and a sensation of motion or disorientation. Symptoms may also include one or all of the following: - Vision problems - Abnormal eye movements - Hearing loss - Ringing in the ears - Speech problems These symptoms can last from as little as a few minutes to many hours. The symptoms may also be chronic. At Euclid Medical Group, we’ve been distinguishing the difference between vertigo and lightheadedness for years and have great vertigo treatments. This enables us to implement the proper treatment plan to relieve your dizziness. Our treatments are safe, effective and do not involve the use of prescription medications.
<urn:uuid:ad34f2fe-8020-4211-9113-2ef6aac77244>
CC-MAIN-2021-25
https://euclidmedicalgroup.com/vertigo-treatments/
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487617599.15/warc/CC-MAIN-20210615053457-20210615083457-00605.warc.gz
en
0.92585
805
3.71875
4
FACT: Affirmative action promotes equal opportunity for women and people of color. Women and people of color are paid less, given fewer chances to access higher education, and are denied job opportunities. Affirmative action works to level the playing field by allowing policymakers to consider race and gender–without quotas–when making decisions about contracts, hiring and education. FACT: California is out of step with the nation on ensuring equal opportunity — but we can change that. In states that allow affirmative action, women and people of color compete on equal footing for government contracts. But California is one of just 9 states that bans affirmative action. Proposition 16 will put California in alignment with the rest of the country and level the playing field so we all have opportunities to succeed. FACT: Colleges and universities CANNOT and WILL NOT use racial quotas to fill their classes and achieve diversity. Passing Proposition 16 cannot and will not lead to quotas. The Supreme Court ruled in UC Regents v. Bakke that racial quotas are unconstitutional, and quotas have not been used in college admissions since 1978. Proposition 16 will be subject to strict oversight and will be monitored by California’s Department of Justice to ensure it expands opportunity without allowing quotas or discrimination. FACT: Studies show that income is a faulty basis for policy aimed at ensuring equity. Even when income levels are equal, Black and Latino families face unique challenges that limit their access to high-quality schools and good-paying jobs. While a Black family and a white family may have the same household income, for example, each has wildly different experiences and circumstances that can affect educational and professional opportunities much more than income. FACT: Passing Prop 16 will empower California’s Asian American students, business owners, women, and families. Studies show Asian American students and businesses are better off in states that have equal opportunity policies like affirmative action. Contrary to popular belief, Asian American and Pacific Islander admissions to the University of California fell after the ban on affirmative action went into effect. Meanwhile, universities that practice affirmative action outside of California have seen greater gains in Asian American enrollment. Passing Prop 16 would also unlock billions of dollars in economic opportunities for Asian American small business owners. Research shows Asian American businesses earn more public contracting dollars in cities where affirmative action is legal, such as Chicago and Atlanta, compared to cities where affirmative action is banned, like San Francisco. That’s why Prop 16 is endorsed by the California Asian Pacific Chamber of Commerce, Asian Americans Advancing Justice, State Treasurer Fiona Ma, State Controller Betty Yee, and dozens of other Asian American community leaders and associations. FACT: California is missing out on a nation-wide boom among women business owners. Studies show women-owned businesses create more jobs and have higher revenue growth than average. Fortunately for our economy, in the last five years, the U.S. has seen a dramatic increase in the number of women-owned businesses. But California is missing out on the prosperity that women-owned businesses create. We know women often hire other women as employees and subcontractors creating more opportunities for all Californians, but women-owned businesses only receive 29 cents for every dollar they should from government contracting. FACT: A few wealthy donors are trying to use race to divide us. If we commit to rejecting their tactics and pushing for a truly equitable future, we can make history by coming together. For too long, a wealthy few in this country have tried to divide us on race and gender so they can rig the rules to their benefit — and it’s those wealthy few who are opposed to Proposition 16 now. By banning affirmative action years ago, these wealthy few have successfully put a roadblock to equal opportunity in California, keeping the best opportunities for themselves and people who share their backgrounds. By rejecting division and coming together to demand affirmative action and a level playing field for all Californians, we can make history, and finally deliver on the promise of equal opportunity for all. FACT: Passing Prop 16 is California’s strong and effective response to the racist policies and rhetoric of the Trump White House. What matters to Californians is standing up to racism, sexism, and those who use race and gender to divide us. Passing Proposition 16 is our way of saying we don’t have to put up with the hateful rhetoric of Donald Trump and his allies that shows no concern when Black people are shot in our streets, denigrates women and their rights, demonizes Latino immigrants, and incites hate crimes against Asian Americans. This November, we can do something about it. One powerful step is passing Proposition 16 and restoring affirmative action so we can stand up to Trump and everything he stands for by starting to dismantle structural racism and sexism.
<urn:uuid:851ce89c-a9ab-4b4a-9593-a4e0b2cb7a66>
CC-MAIN-2021-25
https://voteyesonprop16.org/why-prop-16/facts/
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487630175.17/warc/CC-MAIN-20210625115905-20210625145905-00594.warc.gz
en
0.946943
973
3.390625
3
This post is part of a series. In Part I, we were introduced to the Wesleyan Quadrangle, a tool with which to understand the elements that go into developing sound theology. One element, Scripture, is to be held in supremacy over the rest, but each of the other three, tradition, reason, and experience, should be examined in their relationship to Scripture. In this post, I examine the diad of Scripture and tradition. Scripture v. Tradition Traditionally, this is where the Protestant reformation differed with Catholicism – the latter emphasized the importance of Church/Papal authority over scripture, or at least, their interpretation of scripture. But like all heresy, they held these concepts in a poor balance, and ended up abusing believers in many ways. First, and most egregious, they misrepresented and obscured he gospel by teaching a gospel of good works, or grace plus works, rather than by grace through faith. Often, those works consisted of saying prayers, giving alms, or even being baptized (which is in part why they still baptize children to this day, teaching that is has some salvific effect). This error caused reformers to respond with two of the five solas, sola gratia and sola fide (grace alone, faith alone). Second, not only did they elevate this false gospel over the true, they elevated their extra-biblical traditions and interpretation of the scriptures over the scriptures themselves. So if a believer tried to reason from scripture in opposition to their authoritative interpretation, they persecuted and killed such. The reformer’s response to this error of elevating church tradition and authority over scriptures was sola scriptura (scripture alone). Third, Catholicism made no room for personal liberty of conscience, and freedom in non-essential doctrines. In fact, by elevating tradition and church teachings over scripture, they practically negated any freedom of interpretation of scripture in non-essential matters. Though oft attributed to St. Augustine, the Lutheran (i.e. Protestant reformer) Rupertus Meldinius penned a more generous approach to orthodoxy: In the essentials, UNITY; in the non-essentials, LIBERTY; in all things, CHARITY But the 17th century Catholic doctrinal errors are only one example of tradition, specifically, church authority, superceding scripture and causing bad theology to prosper. These examples illustrate how we can elevate Catholic authority and tradition over scripture, but Protestants do the same thing. Church traditions, be they the “order of worship,” the type of music played or not played, our traditions around the holy days, or even our Christian jargon (“how are you brother”) can be a stumbling block to deeper spirituality, esp. if they interfere with us actually living out the gospel. While traditions often capture valuable concepts and values, they can also be set up by self-righteous and doctrinally errant religious authorities, as the Pharisees did. Here’s what Jesus said about their traditions: Mark 7:6-9 Well did Isaiah prophesy of you hypocrites, as it is written, “This people honors me with their lips, but their heart is far from me; in vain do they worship me,teaching as doctrines the commandments of men.’ You leave the commandment of God and hold to the tradition of men. And he said to them, “You have a fine way of rejecting the commandment of God in order to establish your tradition! People who value tradition over scripture are often really not serving God, but serving religion, and often, their own sense of being righteous through observing such rituals. In fact, this is the great danger of tradition, and why we should be willing to buck tradition in order to maintain a vibrant faith. When we react strongly to people violating our traditions, we should become aware that perhaps we are no longer serving God, but religion. Paul the apostle also warned that often, traditions don’t even reflect godliness, but worldly principles masquerading as faith: Colossians 2:8 Beware lest anyone cheat you through philosophy and empty deceit, according to the tradition of men, according to the basic principles of the world, and not according to Christ. Traditions may contain valuable things from our past, but they also contain peril to those who want to pursue God, and placing them above Scripture is unwise. Traditional rituals and accepted teachings can interfere with our obedience to God, fool us into thinking we are actually living out the commands of Jesus, and lead us to unnecessarily exclude others who don’t follow our traditions. The sacred cows of tradition must be occasionally tipped so that the scriptures, and the God of the scriptures, may be heard, experienced, enjoyed and obeyed. Now, on to Part III – Scripture and Reason.
<urn:uuid:d6cf222d-471e-4ee9-a74d-a54c2981657e>
CC-MAIN-2023-50
https://www.wholereason.com/2007/02/the-weslyan-quadrangle-ii-scripture-and-tradition.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102469.83/warc/CC-MAIN-20231210123756-20231210153756-00288.warc.gz
en
0.951231
1,001
2.875
3
Please register or log in. If you're a new user If you're a returning user Oops, something went wrong! Past Simple Tense; a student has to solve verb TO BE, put sentences negative and make questions. Ideal for grammar drill of Past Simple. Easy, ideal for young students. Fully editable. Upload date: 2017-02-17 19:22:32
<urn:uuid:d791932b-d41b-46f8-808c-9d65c29504b5>
CC-MAIN-2018-26
https://en.islcollective.com/resources/printables/worksheets_doc_docx/past_simple_-_to_be__negative__questions/past-simple-tense/95776
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267859766.6/warc/CC-MAIN-20180618105733-20180618125551-00020.warc.gz
en
0.908332
83
3.578125
4
The International Committee of the Red Cross says it is significantly stepping up its humanitarian operation in Somalia to respond to the deepening crisis there. It says hundreds of thousands of Somalis face life-threatening food and water shortages due to escalating fighting and severe drought in the central part of the country. Lisa Schlein reports for VOA from ICRC headquarters in Geneva. The International Committee of the Red Cross calls this the worst tragedy in the past decade. It says Somalis have been hit by a number of unfortunate events and these factors have combined to make their lives a misery. Red Cross Spokeswoman, Anna Schaaf tells VOA many people have been forced to flee their homes due to a recent escalation of fighting, adding to the already large numbers of internally displaced. She says hundreds of thousands of people are going hungry. They also lack water because of the drought that has robbed people of rainfall for the past two years. "In addition to these factors, there is a very high inflation rate and the worldwide rise in commodity prices, especially for key imports such as fuel and food are very much aggravating the situation today," said Schaaf. "The fact is also that the fighting that is escalaing in Mogadishu, but also in other towns inside Somalia in recent weeks, have displaced even more people. And, these people really do not have any strength anymore to be able to cope with the situation," she continued. Schaaf says people are completely exhausted from the non-stop struggle to survive in the past weeks and months. The International Committee of the Red Cross reports many civilians have been wounded or killed and hundreds of thousands have been displaced. It says the majority of the displaced people now are living in the open or in makeshift camps, far from any medical facilities. Schaaf says conditions in these squalid, overcrowded camps are deplorable. "Those who are living on the outskirts of Mogadishu are living in a place that is really burnt from the sun," she said. "There are not many trees around, there is not much shade and it is very hot." "And, these people have just tried with what they had to build small huts. So, some of them have just used rugs they had. Some of them had actually received tarpaulins from humanitarian organizations and were able, together with sticks and pieces of wood they could just find alongside the road, make their own little huts," she added. The Red Cross says the worsening security situation and extremely fragile economy are making it increasingly difficult for many rural communities to survive. Because of the drought, it says food shortages are severe and livestock are weakening from lack of grazing land. The agency says it is increasing its aid to include half a million people. It says it will distribute four months worth of dry-food rations, as well as water and relief goods including household items and shelter materials. Red Cross Officials say they will be increasing support for medical and health facilities in the country.
<urn:uuid:51576cbb-9747-4a34-a247-b29e9cc7bce6>
CC-MAIN-2017-13
http://www.voanews.com/a/a-13-2008-06-04-voa26/401845.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190753.92/warc/CC-MAIN-20170322212950-00117-ip-10-233-31-227.ec2.internal.warc.gz
en
0.980201
613
2.5625
3
Battle of Guadalcanal: Photos from Second World War combat It was a battle for a tiny island in the South Pacific no bigger than Delaware, but it became a turning point in the Allied fight against Japan during World War II. Nearly 7,000 Americans died fighting for control of Guadalcanal for six months between August 1942 and February 1943. During the campaign, one horrifying image stood out — helping to define the grueling combat as 60,000 Aliied soldiers and Marines tried to pry the island away from 36,000 determined, dug-in Japanese defenders. More images via Battle of Guadalcanal: Mail Online.
<urn:uuid:66e3cef6-b0ac-4870-a96e-cd79450ce45e>
CC-MAIN-2017-09
http://riehlworldview.com/2012/10/battle-of-guadalcanal-photos-from-second-world-war-combat.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174157.36/warc/CC-MAIN-20170219104614-00080-ip-10-171-10-108.ec2.internal.warc.gz
en
0.938683
132
2.984375
3
Estimated reading time: 3 minutes, 29 seconds As law students, it might be a good time to get to grips with exactly what legal negotiation is and what this shift in the curriculum might mean for your studies. There are a number of factors influencing the BSB and Law Society’s decision to make negotiation and alternative dispute resolution (ADR) part of the traditional timetable for law students: Having been on the Harvard Negotiation Project, I had the chance to develop my practical skills in negotiation outside of the classroom. Here are some tips I picked up that I hope will be of use to you. Take the discussion over who is washing the dishes tonight. Or, who decides what to watch on TV? All of these are examples of negotiation in different forms. They require the use of soft and hard power, the use of words and the use of force, the carrot and the stick. In legal studies, negotiation focuses on soft power or persuasive arguments using evidence and reason. Whereas hard power – threats – are not used as they can be considered as duress and make negotiations settled invalid. What legal studies uses more is negotiation strategy which boils down to “competitive, collaborative and co-operative”. In other words , this means applying both a hard stance to negotiations and taking a soft stance to negotiations when applicable. Take 30 seconds to sign up to TLP and you’ll receive free, tailored information for your aspirations and stage straight to your inbox, as well as be the first to know about new, free events – what are you waiting for? What do you want to achieve, what could you lose? In negotiation, there’s a cost benefit between what you are trying to achieve and what you are willing to lose to achieve that. Negotiation is about reaching a point of agreement and compromise for the parties between the point they walk and settle. Negotiations exist on a sliding scale. They are bargaining in its purest form, like a buyer and a seller in a Turkish bazar. The seller wants to make the most profit, the buyer the best bargain. If the seller knew the higher amount the buyer would pay, they could get the max profit, equally, if the buyer knew the lowest price he could get, he could get the best bargain. In legal settings, this could be the difference between what a defendant will pay out or do and what a claimant is seeking or willing to settle for. In law, it’s required that clients be made aware of the BATNA (Best Alternative to Negotiated Agreement) and WATNA (Worst Alternative to Negotiated Agreement). Essentially, BATNA is the point at which it is better to go to court for a better return and WATNA the worst-case scenario of going to court. Understanding the general legal process is useful in order to apply it flexibly. Try to understand how to defuse a situation, the emotion at play, and learn how to write contract and develop soft skills to get you ready for the course. The scope of negotiation is wider than what undergraduate law teaches, and understanding this will help better prepare you for a legal career. For more related articles, go here: Author: Cameron Haden Loading More Content
<urn:uuid:c4ac148a-8d2c-4d3d-8c6a-6a978b357a2c>
CC-MAIN-2022-40
https://www.thelawyerportal.com/blog/back-to-basics-legal-negotiation-explained/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337723.23/warc/CC-MAIN-20221006025949-20221006055949-00426.warc.gz
en
0.957621
672
2.703125
3
Caption: Osteoclast cells (red) carve a path through a knee joint (purple and white), enabling a blood vessel to supply the cells (yellow) needed to build new bone. Credit: Paul R. Odgren, University of Massachusetts Medical School Bones are one of our body’s never-ending remodeling projects. Specialized cells, called osteoclasts, are constantly attaching to old bone and breaking it down, using acids to dissolve the calcium. In the wake of this demolition, bone-building cells, called osteoblasts, move in and deposit new minerals to patch and remodel the bone, maintaining its strength and durability. Normally, these two types of cells strike a delicate balance between bone destruction and formation. But if this balance goes awry, it can lead to trouble. With osteoporosis, for example, bone removal exceeds formation, yielding progressively weaker bones that are prone to fracture. Paul Odgren, a cell biologist at the University of Massachusetts Medical School in Worcester, is exploring whether disrupting osteoclasts may open the door to new ways of curbing the bone loss that occurs in in osteoporosis, rheumatoid arthritis, and periodontal disease. While pursuing this strategy, Odgren created this gorgeous image, which recently was named one of the winners of the Federation of American Societies for Experimental Biology’s 2014 BioArt competition. In this snapshot of bone formation, you can see osteoclasts (red) carving a path through the cartilaginous knee joint of a mouse (purple and white). Inside the tube carved by the osteoclasts, a new blood vessel carries blood cells (yellow) and other cells vital to bone building: bone marrow stem cells and osteoblasts. The views, opinions and positions expressed by these authors and blogs are theirs and do not necessarily represent that of the Bioethics Research Library and Kennedy Institute of Ethics or Georgetown University.
<urn:uuid:8261d8d3-4ef7-47c0-8de9-f5931896804b>
CC-MAIN-2020-40
https://bioethics.georgetown.edu/2014/11/snapshots-of-life-inside-a-bone-remodeling-project/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402128649.98/warc/CC-MAIN-20200930204041-20200930234041-00305.warc.gz
en
0.905371
401
3.15625
3
For Parents: Shopping for Healthy Foods for Your Child Shopping for nutritious food is the first step in practicing healthy eating habits. Your child can help pick out healthy foods with you. Read on to learn more about what to look for while you shop. What to look for Here are some foods to look for at the grocery store: Colorful fruits and vegetables Lean meats, such as chicken, turkey, and fish Whole-grain breads and crackers Low-fat or nonfat milk, yogurt, and cheese What kids can do At the store, kids can help pick foods the family will eat together. Ask them to pick one or two fruits or vegetables. They will learn that their food choices are important. They may also be more interested in eating new foods that they chose themselves. As the parent, you still control what kinds of foods will be brought into the house. Stop the nagging before it starts Kids often beg and nag for junk foods at the store. In the past, you may have given in just to get some quiet. How do you stop the nagging? Remember: You are the parent. Your role is to see that healthy foods make up the biggest part of your food list. Set the rules and stick to them. Let your child pick one food item for him- or herself. Don't restrict what kind of food your child picks, even if it is a sugary snack. But do limit the item to a small size. Allow your child to pick one small food item per week if you shop for food more often. Shop when the store is not so crowded, like midmorning or later at night. You and your child won't spend as much time in line in front of the candy bars. Also, don't shop hungry. Try to shop after a regular meal or filling snack. To learn more These websites can tell you more about food groups and what to look for when you go shopping:
<urn:uuid:c3d84c36-1830-4b0f-afb2-0508374e65e0>
CC-MAIN-2022-49
https://baycare.org/health-library/for-parents-shopping-for-healthy-foods-for-your-child
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710926.23/warc/CC-MAIN-20221203075717-20221203105717-00440.warc.gz
en
0.961692
439
3.171875
3
Acupuncture pain management is a somewhat alternative form of pain relief that is used in many different cultures around the world. This form of pain and stress relief has been used for centuries in many different countries, so it should come as no surprise to learn that it is actually quite useful in relaxing the body. The process of acupuncture treatment involves the use of needles on various pressure points around the body. The theory behind acupuncture pain treatment is that you will be allowing energy to flow more freely through your body after the treatment is complete. Your acupuncturist will be poking holes through pockets of energy in your body, which makes it easier for your body to relieve tension and forget about stress. There are many different reasons as to why someone would get acupuncture treatment, and millions of people around the world have already benefited from its positive results. This kind of treatment first originated in China over 3000 years ago, so it’s easy to say that it is something that has worked for many people over the years. People would not still be using this kind of treatment these days if it didn’t work, so it’s definitely at least worth a try for relieving pain. There are a lot of positive things that can come out of acupuncture treatment for pain, and it is quite strange that this type of treatment is not completely accepted in the mainstream. How does acupuncture pain treatment work? Most of the research that has been done on acupuncture pain treatment has shown that this kind of pain management can lead to an increase in the amount of endorphins and dynorphins released in the body. These are the body’s natural tools to fight against pain, so it is basically the most natural form of pain relief that can be found in the world today. You don’t need to pop any pills because the materials used to numb pain are already available in your body. There is also an effect to be found on pain receptors in the body after acupuncture, but this is an area where more research needs to be completed on the topic. There are actually many different ways that acupuncture can help the body, but only a few of these positive benefits have been fully examined. Effects on the nervous system and how it can relieve stress over a long period of time are another aspect that have not been fully researched, but you can learn a lot by asking people who have received treatment for stress with acupuncture. The World Health Organization endorses acupuncture Acupuncture pain treatment is slowly becoming more acceptable around different parts of the world, and its status as an alternative form of treatment is slowly fading away. More and more people are realizing the positive benefits to be had from acupuncture, and that is why the World Health Organization decided to endorse this treatment as a way of relieving chronic pain.
<urn:uuid:81083f20-2366-4eff-9cf5-bec89d8cc800>
CC-MAIN-2019-13
http://www.altmedicinezone.com/acupuncture/acupuncture-pain-management/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202324.5/warc/CC-MAIN-20190320085116-20190320111116-00404.warc.gz
en
0.968559
563
2.609375
3
Hold on to your hats, fountains of the deep discovered In a fantastic news story that is sure to be leveraged by young earth flood proponents, we learn that a giant body of water was discovered beneath Asia with a size of approximately the Arctic Ocean. The news story states: Scientists scanning the deep interior of Earth have found evidence of a vast water reservoir beneath eastern Asia that is at least the volume of the Arctic Ocean. The discovery marks the first time such a large body of water has found in the planet’s deep mantle. The finding, made by Michael Wysession, a seismologist at Washington State University in St. Louis, and his former graduate student Jesse Lawrence, now at the University of California, San Diego, will be detailed in a forthcoming monograph to be published by the American Geophysical Union. But don't get your hopes up too quickly flood fans! This is not a giant pool of water ready to be unleashed on the earth to kill the next generation of evil people. Although the amount of water contained in this region may be equivalent to the volume of the Arctic Ocean, you would not be able to fill your pool with the water because it's locked up in ancient oceanic crust that has subducted back into the mantle. As the oceanic crust dives back into the mantle, the water contained in the slab is released. Near the subduction zone some of this water is released and lowers the melting temperature of the surrounding mantle causing volcanism above the slab. In other cases, the slab continues down and the water is released more slowly and incorporated into the surrounding rock. Dubbed the Beijing anomaly because of its prominence there, the water was released during the heating of the subducting slab (see image).
<urn:uuid:b0c707b6-0c26-4d21-a78e-30c0e3383900>
CC-MAIN-2017-13
http://scienceantiscience.blogspot.com/2007/03/hold-on-to-your-hats-fountains-of-deep_03.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188132.48/warc/CC-MAIN-20170322212948-00345-ip-10-233-31-227.ec2.internal.warc.gz
en
0.958127
358
3.046875
3
Episode 127: Capacitors in series and parallel Lesson for 16-19 - Activity time 80 minutes - Level Advanced The derivation of formulae for capacitors in series and parallel will help to reinforce your students’ understanding of circuits involving capacitors. - Discussion: Deriving the formulae (20 minutes) - Worked examples: Using the formulae (10 minutes) - Student questions: Using the formulae (30 minutes) - Student experiment: Checking the formulae (20 minutes) Discussion: Deriving the formulae Your students will have encountered the idea of replacing resistors in series and parallel by a single resistor which has the same effect in the circuit. Remind them of this as an introduction but be ready to dispel any confusion that may arise because the formulae are reversed for capacitors. For capacitors in parallel the pd across each is the same. For capacitors in series, it is the charge stored that is the same. Worked examples: Using the formulae Choose a couple of simple examples; say, 20 mF and 30 mF in parallel (50 mF), and then in series (12 mF). Point out that capacitors in parallel combine to give a greater capacitance; in series, the resultant is less than either. What about equal capacitors? (In series, half the capacitance of either.) Student questions: Using the formulae Questions 1 and 2 can reinforce the above discussion. Questions 3 and 4 give practice in using the formulae. Student experiment: Checking the formulae If a capacitance meter is available, the results of some of the calculations above can be checked experimentally and/or further combinations can be tried. Provide students with two (or more) capacitors whose values they can measure. They can then connect them together, first in parallel and then in series. Does the meter reading agree with calculated values?
<urn:uuid:e56b845b-68c5-4595-9ac3-6c669861a35f>
CC-MAIN-2021-49
https://spark.iop.org/episode-127-capacitors-series-and-parallel
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363405.77/warc/CC-MAIN-20211207170825-20211207200825-00368.warc.gz
en
0.887654
417
3.984375
4
Homegrown carrots are much more flavorful than store-bought. If you want the best crop you’ve ever had, consider companion planting with carrots. Some herbs, veggies, and flowers will enhance the flavor and others help repel pests. Let’s be real. Carrots can be a little fussy and take up quite a bit of real estate in the garden. So anything that makes growing them easier is worth it. If you’re ready to plant some carrots, and want to make the best of your crop, let’s talk companion planting with carrots. Good Companion Plants to Grow With Carrots First, let’s look at the vegetables that go well with carrots. This is a classic combination and works for a number of reasons. Both plants help each other out and should be the first duo to consider. Tomatoes produce solanine which is a chemical that repels a number of pests. Carrots, on the other hand, attract a parasitic wasp that attacks tomato hornworms and caterpillars. Direct sow carrot seeds when you transplant tomato plants. Try planting tomato plants in the center of the garden bed, and plant the carrots toward the edge of the garden. This way the tomatoes can provide a little shade to the carrots, but not cover them completely. Make sure you provide the carrots with plenty of water or the tomatoes will take it. Carrot flies are a pest that can decimate a carrot crop. Onions emit a sulfuric odor that repels these pests. Onions take longer to reach harvest, so timing is important when combining them with carrots. Sow carrots two to three weeks after the onions. Make sure the onions are six inches away so you won’t disturb the carrots if you harvest the onions first. Onions are a shallow-rooted plant, but you don’t want to disturb your carrots when they take a while to grow. 3. Bush Beans If you put fertilizer in the carrot patch that is too high in nitrogen, you will end up with cracked carrots. The beauty of bush beans is they slowly release a form of nitrogen from their roots. This should help to keep the carrots healthy and maximize the yield. When you plant the carrot seeds, plant the bush bean seeds at the same time. Keep the beans about six inches from the carrots and make sure you take the sun into account. You don’t want the beans to prevent the sun from getting to the carrots. Beets don’t provide great benefits to carrots, but they do help a little bit. They don’t have any negative effects, so in the world of companion planting, that’s a bonus. Beets loosen the soil as they grow, which enables carrots to grow bigger. Plant both carrots and beets at the same time, but be wary of the green tops of beets. They can grow quite big and can shade the carrots. Keep beet and carrot rows at least 10 inches apart and you have a happy team. People used to consider turnips an old-fashioned crop, but new varieties are sweet and have wonderful flesh for eating. Turnips are a shallow crop compared to carrots, which can grow much deeper depending on the variety. Some turnip greens have a mustard odor that repels pests like certain species of aphids. Try sowing Japanese-type turnips at the same time as you sow carrots. The Japanese type is generally smaller, so you won’t disturb the carrots when you harvest them. Keep the turnips at least six inches away from the carrots when planting them as companion plants. Cabbage is a low-growing brassica, but can grow a bit wide. I plant cabbage and sacrifice the outer cabbage leaves to lure away pests from the carrots. Although cabbages don’t do anything for carrots, they don’t do them any harm and can handle their outer leaves being eaten more so than carrots can handle the tops being eaten. Give carrots plenty of space because some cabbages grow 18 inches or more across. Like onions, leeks repel carrot flies due to the odor they give off. They may keep other pests away by masking the smell of carrots as well. Timing is key to planting carrots and leeks together. Leeks are a long-season crop, needing up to 150 days to mature. You may mound your leeks as well to blanch them if you have a variety that requires this long. Sow your carrot seeds when you transplant the leeks. This way you should get two carrot harvests while the leeks continue to grow. When you harvest the first crop of carrots, use that time to mound up your leeks. Then, plant your second crop of carrots. Keep carrots at least 12 inches from the base of the leeks when using these as companion plants. Although lettuce doesn’t add benefits to carrot harvests, it does no harm. Lettuce also doesn’t take up much space and is a very light feeder, which suits carrots well. For this reason, you can plant carrots and lettuce close together at about four inches apart, especially if you have pic-and-come-again lettuce you regularly keep small. If you plant one-crop lettuce like an iceberg, give a little more space because you will need to harvest it before the carrots. Scallions are a swift-growing crop and suit carrots because they have shallow roots and very little foliage. Like other alliums, scallions deter pests thanks to their odor. They also maximize space in the carrot garden. Leave six inches between the rows of carrots and scallions, or better yet, plant the scallions around the perimeter of the carrot bed to maximize their pest defense properties. Herbs That Grow Well With Carrots If you prefer to go the herb route, there are lots of options for planting them as companion plants for carrots: Oregano contains strong essential oils like carvacrol and thymol. Nematodes and various fly species hate them and are deterred by oregano. Many gardeners believe oregano enhances the flavor of carrots when they are planted together. They certainly go well in the kitchen at harvest time. Direct sow oregano at the same time as carrots. A good method is to plant the carrots in rows and then plant oregano at each corner of the carrot patch. Make sure to leave at least 12 inches from the oregano and the carrot they are closest to. Although I wouldn’t recommend parsley family (Apiaceae) companions for carrot plants, cilantro is an exception due to the benefits it provides the carrots as they grow. If you allow cilantro to bolt to seed, the flowers are like a forcefield for carrots. Cilantro flowers attract predators to the carrot fly, aphids, nematodes, and rust flies. Cilantro likes cooler weather like carrots, so plant them both at the same time as companion plants. Rosemary is a companion plant to keep at a reasonable distance from carrots. It gets large and can shade anything around it, and can be very deep-rooted. Rosemary masks the smell of carrots and deters carrot pests. Plant rosemary on the very edges of the garden where you plant carrots, or in a garden right next door. Sage is good for us and good for carrots too. Sage deters cabbage moths and nematodes. It can grow large in some environments, so treat it like rosemary and give the carrots plenty of space. In warmer areas, sage can be a great annual that you trim back in winter and regrow in the spring. Flowers That Grow Well With Carrots Most people think veggies and herbs when they think about companion planting, but if you have a carrot crop, there are also flowers worth having around. Marigolds are the star of companion planting. They get on with just about anything including carrots. If you want to deter carrot rust fly and psyllids, marigolds will do that, and provide a burst of color among the greens of carrot tops. Marigolds can take up to 100 days to mature so plant them before the carrot seeds. Wait for them to push through the surface so you know where you planted them. Plant carrots at least 12 inches from the nearest marigold. Daffodils aren’t the flower you would normally think about when planting carrots, but they really are useful, as well as pretty. Daffodils are poisonous to deer, mice, and squirrels. The bulbs have a taste and odor hated by rodents. For this reason, it’s a good idea to plant daffodils around the outside perimeter of your carrot garden to stop rodents from tunneling into the garden. Plants to Avoid When Growing Carrots Not all plants get along, so here’s what to avoid: As yummy as fennel is, carrots do not like it, so don’t use fennel as a companion plant. Fennel produces chemicals in the soil that can stunt the growth of carrots. Fennel also attracts a lot of pests, so it’s best to keep them well away from your carrots. Coming from the same family as carrots, parsnips attract the same pests and diseases. It’s best to plant them at a distance from each other. This includes pumpkin, cucumber, squash, and watermelons. All of these plants take up a lot of space, eat a lot, and will smother carrots quickly. Dill is a member of the carrot family and so is likely to attract the same pests and diseases so they make terrible companion plants. It also releases a compound in the soil that isn’t beneficial to carrots.
<urn:uuid:213dd666-e468-4eb4-814a-902b9606e2eb>
CC-MAIN-2023-23
https://morningchores.com/carrot-companion-plants/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00046.warc.gz
en
0.933735
2,159
2.796875
3
The sea angel is not a single organism, but rather a group of marine sea snails called Gymnosomata. They are pelagic gastropods, meaning they favor open waters. They are transparent invertebrates. It is believed that there are around 8 families of sea angels throughout the animal kingdom. They prey on very similar animals called sea butterflies. Featured image credit: NOAA Photo Library (CC BY 2.0) Across the sea angel group, a wing-like structure has developed, which enables them to become mobile through the water. They can swim at speeds up to 0.22 mph. The wings are a decapod foot, which can flap and allows them to be free-swimming marine creatures. These wings contribute to their ‘angel’ appearance. Sea angels can get confused with their prey, sea butterflies, due to their similar appearance. However, the latter keep their shells after the larval stage, whereas the sea angel sheds its shell after only a few days. The sea angel group are typically small, transparent creatures, averaging up to 5 cm in length. Credit: NOAA Photo Library (CC BY 2.0) The sea angel feeds solely on other smaller marine animals called Thecosomata, or sea butterflies. They are so in sync with their prey that their feeding style has adapted over time to effectively navigate the thecosomata shell. They use small hooks and tooth-like instruments to eat their prey. Their hunting strategies can vary from day to day. They switch between being ambush predators and more active hunters. They have perfected these strategies over many years. Sea angels are spread all across the world, living across a broad spectrum of oceanic habitats. They can thrive equally in polar regions, and warmer tropical oceans alike. They tend to occupy the upper section of the water column, normally living at around 20 m depth. The reproductive method of the sea angel is very interesting, as they don’t need any external influence to fertilize their eggs. They fertilize their eggs internally and then release them into the water column. They are hermaphrodites, as they have both gametes, the egg, the sperm, and both reproductive organs. This allows the mating process to become extremely efficient. Credit:Wakamin, CC BY-SA 3.0 Like many sea slugs and sea snail species, there are always threats from bigger marine animals, and they need to develop strategies to defend themselves. The sea angel is no different. A polar species called Clione antarctica, has developed a toxin called pteroenone, which acts as a chemical deterrent. Interestingly, other animals have been known to utilize them for their own defense, carrying them around as a toxic shield. Facts about the Sea Angel - Sea angels feed purely on sea butterflies. - They are hermaphroditic creatures, meaning they have both male and female sex organs. - Sea angels can be found all over the world in pelagic zones. - Some sea angel species are capable of toxic defense. - Sea angels are thriving and are currently not under threat on the IUCN list. Are sea angels poisonous? Although some species of sea angels use toxins to defend themselves against predation, they are generally harmless and not highly toxic. Can you have a sea angel as a pet? Despite sea angels being very interesting, unique creatures, in order to keep them as a pet, they would need perfect conditions. So, it would extremely difficult to sustain them. Are sea angels carnivores? Sea angels are carnivorous creatures and have a very select diet. They feed on other sea snails but tend to focus on the sea butterfly. Are sea angels endangered? Currently, sea angels are not considered endangered or near extinction. They are widely distributed and are thriving.
<urn:uuid:873e00a7-e758-4cd1-ae27-c66b06235360>
CC-MAIN-2023-14
https://oceaninfo.com/animals/sea-angel/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00740.warc.gz
en
0.957428
814
3.78125
4
Supporters Say All The Wrong Things to Try and Pass CISPA Ever since reintroducing CISPA, the so-called "cybersecurity bill," its supporters promote the bill with craftily worded or just plain misleading claims. Such claims have been lobbed over and over again in op-eds, at hearings, and in press materials. One "fact sheet" by Rep. Rogers and Ruppersberger titled "Myth v. Fact" is so dubious that we felt we had to comment. To stop this type of misinformation—and to stop CISPA—we urge you to tell your members of Congress to stand up for privacy. Here are some of the statements supporters of CISPA are pushing and why they're false: Supporters of CISPA say, "There are no broad definitions" Supporters are keen to note that the bill doesn't have broad definitions. In the "Myth v. Fact" sheet, the authors of CISPA specifically point to the definition of "cyber threat information." Cyber threat information is information about an online threat that companies can share with each other and with any government agency—including the NSA. In hearings, experts have said that they don't need to share personally identifiable information to combat threats. But the definition in the bill allows for any information related to a perceived threat or vulnerability—including sensitive personal information—to be shared. Cyber threat information should be a narrowly defined term. Another example of a broad (or missing) definition is the term "cybersecurity system." Companies can use a "cybersecurity system" to "identify or obtain" information about a potential threat ("cyber threat information"). The definition is critical to understanding the bill, but is circular. CISPA defines a "cybersecurity system" as "a system designed or employed" for a cybersecurity purpose (i.e. to protect against vulnerabilities or threats). The language is not limited to network security software or intrusion detection systems, and is so broadly written that one wonders if a "system" involving a tangible item—e.g., locks on doors—could be considered a "cybersecurity system." In practical terms, it’s unclear what is exactly covered by such a "system," because the word “system” is never defined. The best example of a dangerous undefined term in the bill is found within the overly broad legal immunity for companies. The clause grants a company who acts in "good faith" immunity for "any decisions made" based off of the information it learns from the government or other companies. Does this cover decisions to violate other laws, like computer crime laws? Or privacy laws intended to protect users? Companies should not be given carte blanche immunity to violate long-standing computer crime and privacy law. And it is notoriously hard to prove that a company acted in bad faith, in the few circumstances where you would actually find out your privacy had been violated. Supporters of CISPA say, “The bill is not a government surveillance program” Supporters are adamant CISPA doesn't create a wide-ranging "government surveillance program." It’s true the bill doesn't create such a surveillance program like the one described in the ongoing warrantless wiretapping lawsuits. But the trick here is what is meant by “government surveillance.” We think that if the bill aims at having our information flow to the government, it’s tantamount to government surveillance, whether or not the government initially collected the information. The bill creates a loophole in the privacy laws that prevented companies from disclosing your information to the government and gives companies broad legal immunity for sharing information with the government. As a result, CISPA makes it more likely that companies will surveil their own users and then disclose that information. The sly wording dodges the key issue: that CISPA encourages companies to conduct surveillance on their networks and hand “cyber threat information” to the government. In short, the bill encourages a de facto private spying regime, with the same end result. Supporters of CISPA say, "The government can't read your private email" Reps. Rogers and Ruppersberger are adamant CISPA doesn't grant the government access to read private emails. The claim was recently repeated by James Lewis, a fellow at the Center for Strategic and International Studies. But the broad definitions do allow for personal information to be gathered by companies and then sent to the government without any mandatory minimization of personal information. And under the vague definitions an aggressive company could claim that private messages are related to the threat, obtain them, and share then with the government. If Reps. Rogers and Ruppersberger didn't want the content of emails to be disclosed under CISPA, it would be easy enough for them to exclude this content by including language in CISPA. Supporters say, "CISPA follows advice from privacy and civil liberty advocates" In his introduction of the bill, Rep. Rogers assured the audience that he has listened to the privacy and civil liberties community. This year’s CISPA does contain some language added after privacy and civil liberties advocates complained in 2012. But those changes didn’t address some big issues that were raised last year, and this year’s privacy and civil liberties complaints about CISPA remain unaddressed. Let's Stop CISPA Reps. Rogers and Ruppersberger are on a strong publicity offensive to make sure the bill passes. The American public deserves full explanations and clear meanings about what CISPA can do and the extent to which it can do it. The public doesn't need carefully worded messaging materials that obfuscate and mislead a discussion on CISPA. The issues at stake—like the broad legal immunity and new spying powers that allow for companies to collect private, and sensitive, user information—are too serious. Recent DeepLinks Posts Aug 1, 2015 Jul 31, 2015 Jul 30, 2015 Jul 30, 2015 Jul 30, 2015 - Fair Use and Intellectual Property: Defending the Balance - Free Speech - Know Your Rights - Trade Agreements and Digital Rights - State-Sponsored Malware - Abortion Reporting - Analog Hole - Anti-Counterfeiting Trade Agreement - Bloggers' Rights - Broadcast Flag - Broadcasting Treaty - Cell Tracking - Coders' Rights Project - Computer Fraud And Abuse Act Reform - Content Blocking - Copyright Trolls - Council of Europe - Cyber Security Legislation - Defend Your Right to Repair! - Defending Digital Voices - Development Agenda - Digital Books - Digital Radio - Digital Video - DMCA Rulemaking - Do Not Track - E-Voting Rights - EFF Europe - Encrypting the Web - Export Controls - FAQs for Lodsys Targets - File Sharing - Fixing Copyright? The 2013-2015 Copyright Review Process - Genetic Information Privacy - Hollywood v. DVD - How Patents Hinder Innovation (Graphic) - International Privacy Standards - Internet Governance Forum - Law Enforcement Access - Legislative Solutions for Patent Reform - Locational Privacy - Mandatory Data Retention - Mandatory National IDs and Biometric Databases - Mass Surveillance Technologies - Medical Privacy - National Security and Medical Information - National Security Letters - Net Neutrality - No Downtime for Free Speech - NSA Spying - Online Behavioral Tracking - Open Access - Open Wireless - Patent Busting Project - Patent Trolls - PATRIOT Act - Pen Trap - Policy Analysis - Public Health Reporting and Hospital Discharge Data - Reading Accessibility - Real ID - Search Engines - Search Incident to Arrest - Section 230 of the Communications Decency Act - Social Networks - SOPA/PIPA: Internet Blacklist Legislation - Student and Community Organizing - Surveillance and Human Rights - Surveillance Drones - Terms Of (Ab)Use - Test Your ISP - The "Six Strikes" Copyright Surveillance Machine - The Global Network Initiative - The Law and Medical Privacy - TPP's Copyright Trap - Trans-Pacific Partnership Agreement - Travel Screening - Trusted Computing - Video Games
<urn:uuid:eee20a4e-7cd9-4e68-9475-73e80be27e05>
CC-MAIN-2015-32
https://www.eff.org/es/deeplinks/2013/03/supporters-say-all-wrong-things-try-and-pass-cispa
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042989301.17/warc/CC-MAIN-20150728002309-00017-ip-10-236-191-2.ec2.internal.warc.gz
en
0.904283
1,700
2.625
3
Leaders don’t matter. That might seem hard to believe. Any large group needs a leader to function, right? How good can an orchestra be without a conductor? From Zubin Mehta to Leonard Bernstein, great conductors seem an integral component of great classical music. Someone needs to make sure the woodwinds don’t come in too early and the percussionists don’t drown everyone else out. The Orpheus Chamber Orchestra, though, has received multiple Grammies and is regarded as one of the finest orchestras in the world — without a conductor. It turns out that professional musicians can organize themselves without a formal leader just fine. That’s all well and good for an orchestra, but surely a company the size of GE couldn’t function very well for very long if it didn’t have a CEO. That’s true. But the fact that GE needs a CEO doesn’t mean that it matters who the CEO is. There are three reasons — first laid out in a classic article by sociologists Stanley Lieberson and James F. O’Connor — why the identity of the leader probably matters less than you think. 1. External Constraints. Most organizations have competitors. The United States, for example, is the world’s most powerful country, but other countries always make themselves felt. They can and will counter many of the things the United States might want to do. In the corporate world, the strongest company in any industry almost always has competitors who are close to being peers. Unless you’re a monopoly, you can’t set prices at whatever level you want, for example. So whatever a leader, be it a president or CEO, might want to do, her options are limited by external pressures. 2. Internal Constraints. Large organizations also have internal politics that can limit a leader’s freedom. Whatever President Obama wants to do, what he can do is limited by Republican opposition in the House and Senate. Most CEOs have more authority over their companies than the President does over the government, but no matter how determined she might be to make radical changes, a CEO usually needs to take into account the internal dynamics of the company she leads. 3. Leader Selection Systems. Despite internal and external constraints, we can all think of situations where a leader has plenty of room to make choices. That’s why successful companies put so much effort into choosing their leader and why directors often describe choosing a new CEO as their most important job. The problem is that it’s precisely all the effort that goes into picking leaders that makes any individual leader’s identity unimportant. Let’s say your company spends years evaluating candidates to be its next CEO. It observes every one of them closely in their positions, it interviews all of them over and over again, it even asks the candidates to rank each other. All that effort means that you should be confident that whoever gets picked will be good at the job. If she isn’t very capable, how did she pass all those tests? But let’s take a look at the candidate who came in second. If your second choice almost made it to the top during the rigorous review process, how different could he be from your first choice? Your system for selecting leaders was looking for something particular, and even though the second candidate didn’t fit as well as the first one did, if you’re drawing from a large enough pool of candidates, he is almost certainly pretty close. So the difference between the person who got the job and the person who almost got the job is probably pretty small. Throw in external and internal constraints, and the marginal difference in outcomes for your organization, depending on which one you chose, is tiny. The leader you choose might be enormously skilled, but, most of the time, that leader is also quite replaceable. With some exceptions, researchers from organizational behavior to economics to political science have come to this conclusion. If leaders don’t matter, though, how do we explain people who really do seem to have changed history? From demonic politicians like Adolf Hitler to dazzling executives like Steve Jobs, we can all think of people who reshaped the world and were not, in any sense, replaceable. That will be the topic of my next blog post.
<urn:uuid:c5ba1531-0a00-4735-9403-49945ca01c8a>
CC-MAIN-2015-22
https://hbr.org/2012/08/leaders-dont-matter-most-of-th.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927634.1/warc/CC-MAIN-20150521113207-00042-ip-10-180-206-219.ec2.internal.warc.gz
en
0.966135
898
2.671875
3
William Henry White Settlers 1,038 wordsHistory has not been kind to Tenskwatawa, otherwise known as Lalawethika or The Prophet. He is inevitably compared to his heroic brother Tecumseh and fails to measure up in both physical and moral stature. He seems hidden in the shade of his brother's name, whereas his brother would never have had the stature he received if it were not for The Prophet's religion of classical Indian heritage. Lalawethika seemed to be plentiful of both physical and social shortcomings. An unimpressive-looking man ... Free research essays on topics related to: tecumseh, william henry, white culture, white settlers, prophet The American Indian Genocide 1,448 wordsTextbooks and movies are still hiding the genocide of Native American Indian cultures, which began five centuries ago. There were many friendly and close relationships between early immigrant settlers and native peoples, but these were not the main current in their relations. U. S. history is destroyed by acts of genocide against native people, made worse by the deadly impact of new diseases spread by contact between new settlers and native Americans. Many aggressive attempts were made to reform... Free research essays on topics related to: native americans, 200 years ago, ways of life, u s government, bureau of indian affairs White Settlers Three Parts 457 wordsMany years ago, groups of hunters organized together and lived in the area now known as Zimbabwe. Over time this group of hunters were slowly taken over by a more powerful group of people called the Shona who spoke on of the many Bantu languages. The Shona moved in to Zimbabwe around the time of Christ. They raised livestock and farmed on land that they used the slash and burn technique to clear. By 1500 A. D. Zimbabwe was ruled by the Shona by kings known as Munhumutapa's. These rulers ruled un... Free research essays on topics related to: zimbabwe, white settlers, settlers, three parts, ruled Oregon Territory White Settlers 1,112 words... using white colonization of the Oregon Country was closing the connections between the Cayuse Indians and the Whitman mission. With the number of whites now living in the former Cayuse land came many diseases that were unfamiliar to the Indians. Common sicknesses that whites were accustomed to were killing the Natives. The Cayuse became unresponsive to the Whitman's because the couple helped the people who were killing them. In 1847, Narcissa said something about the continued white settleme... Free research essays on topics related to: oregon territory, oregon, dec 1998, whitman, white settlers British Rule Southern Africa 1,512 wordsThe people known today as Zulu are formed together about 165 years ago. Many independent clans combining, all of whom had lived in the eastern coastal parts of South Africa for centuries, formed them. The name "Zulu" itself was originally the name of one man whose descendants made up the Zulu clan. In 1816 this small clan gained a new ruler by the name of Shaka (Chaka). An expert militarist, he led the small Zulu clan in a conquest of his neighbors. The Zulus soon became a very powerful empire r... Free research essays on topics related to: southern africa, british rule, main body, white settlers, south africa State Of Georgia Trail Of Tears 1,582 wordsThe Removal of the Cherokee from their land in the 1830 's remains a national disgrace today. How could our great conscientious country have done such a thing? The Cherokee were brutally moved west with disregard for the laws that existed. It showed that the United States government felt it had the power to do as it wished (Wright 280). The fate of the Cherokee was to befall most of the other Indian nations The U. S. encountered (Hudson 460). It is however, unfortunate that the Cherokee were her... Free research essays on topics related to: trail of tears, indian territory, cherokee nation, andrew jackson, state of georgia U S Government Lewis And Clark 1,662 wordsThe American Indians Between 1609 To 1865 The Native Americans or American Indians, once occupied all of the entire region of the United States. They were composed of many different groups, who speaker hundreds of languages and dialects. The Indians from the Southwest used to live in large built terraced communities and their way of sustain was from the agriculture where they planted squash, pumpkins, beans and corn crops. Trades between neighboring tribes were common, this brought in additional... Free research essays on topics related to: u s government, lewis and clark, american indians, native americans, mississippi river Native Americans White People 765 wordsCultural Diversity The most important reason why many White people in United States hold more benevolent attitudes towards Native Americans than they do such other subordinate groups as African Americans and Latinos is because their historical memory associates Indians with danger. Natives always remained a freedom loving people, who actively resisted the colonial expansion of White men. Many Indian tribes proved to be immune to the spiritual corruption of Christianity. They never considered Whi... Free research essays on topics related to: independence day, white settlers, native americans, white people, white men Native American Tribes U S Government 1,903 wordsCHEROKEE/CHOWTAW PEOPLE The Indian Removal Act of 1830 In 1830, the United States Congress passed the Indian Removal Act of 1830, the main objective of which was to remove all the Native American tribes living in the southeast and force them to settle in lands west of the Mississippi River, in what is now known as the state of Oklahoma. The main sections of the Act had the following items: 1. There will be an exchange of lands with the Indians in any of the states or territories and will be prov... Free research essays on topics related to: u s supreme court, native american tribes, united states of america, united states government, u s government Indian Removal Native Americans 1,885 words... essentially trading-based, and not currency-based (King, 1885). Another event that was catastrophic for these tribesmen was the loss of one of their sources of food, the buffalo. After exposing the land to white settlers, the buffalo was excessively hunted by them for its meat and hide. In the beginning of the 18 th century, it was thought that there was approximately 40 million heads of buffalo roaming the country. After uncontrolled hunting and gaming, the population of these animals decre... Free research essays on topics related to: african americans, andrew jackson, removal act, native americans, indian removal Four And A Half Trail Of Tears 1,531 wordsThe Cherokee Nation is the second largest Indian tribe in the United States. There are more than 200, 000 members. Almost 70, 000 of these Cherokees live in the 7, 000 square mile area of the Cherokee Nation which is not considered a reservation, but a jurisdictional service area that includes all of the eight counties and portions of six in northeastern Oklahoma. The big question is how and why they moved from their homeland, Georgia. The Cherokee have always had a proud heritage, and that is w... Free research essays on topics related to: white settlers, andrew jackson, trail of tears, cherokee nation, four and a half U S Government United States Of America 1,532 words... civilized than the whites. Many whites would sneak into the Indians' camps and scalped them. Whites would kill women and children for not getting gold or valuables quick enough. When the war broke out between the French and the British the Cherokee Indians decided the help the British. They were afraid that if the French would beat the British then the white settlers would take more and more land. There were many Indian tribes that helped the French. When some of the Cherokee Indians rode th... Free research essays on topics related to: u s government, indian removal, united states of america, supreme court, cherokee nation Sam Houston White Settlers 1,090 wordsWhatever you Want The Texas War for Independence was fought from October 2, 1835 to April 21, 1836. It came as the result of White anglo-season settlers' continuing frustration with Mexican government, which was striving hard to rid them of their ancestral traditions by enforcing Catholicism. They rightfully considered such practice as the ultimate tool of making them to disappear in the racial melting pot that became of Mexico. It took less than ten years for the Protestant colonists to increas... Free research essays on topics related to: sam houston, mexican government, civil war, white settlers, mexican war White Settlers White Americans 673 wordsThis book brings to light, and places front and center, possibly the most significant event in American history. That is, the genocide and displacement of the native inhabitants of what was, or would become, the United States of America, thus enabling the formation of the worlds most powerful republic. It is difficult to imagine how most readers, particularly those who are American citizens, would not have their personal perspective or opinion altered, in some small measure at least, by the hist... Free research essays on topics related to: white americans, nez, white men, valley, white settlers U S Government United States Of America 1,716 wordsThe Indians had many little confrontations with the white settlers and the white government. The Indians didn? t always get along with the white people. Even though the Cherokee Indians were a very peaceful tribe they had wars with the whites. All the wars that the Indians went through they lost land or something valuable to them like faith, homes, life styles and sometimes their life. The first major war with the white people the war between 1775 and 1795. (Fremon, Page 17) They lost all of the... Free research essays on topics related to: indian removal, u s government, supreme court, united states of america, cherokee nation Dances With Wolves White Settlers 1,477 wordsIndians were the original occupants of this land we call America. They lived off the land and were quite content. But, when white settlers came here to colonize, it became inevitable that the Indians ways were going to end. The white settlers were more interested in spreading out and starting new homes than the tradition that stood in their way. Having better weapons and better technology, the white settlers killed Indians at the drop of a hat. Since communication was difficult, treaties, if att... Free research essays on topics related to: white settlers, didn t, dances with wolves, white men, white man Rift Valley Indian Ocean 833 wordsKenya is a country on the eastern coast of Africa, right on the equator. It is a land of striking landscapes, ranging from snow-capped Mount Kenya to rich farmlands, barren deserts and tropical beaches. A former British colony, Kenya is now made up of eight provinces in that range in geographical size from the small Nairobi Province to the much larger Eastern and Rift Valley Provinces. The Provinces also range in population from the densely populated Nairobi Province, to the sparsely populated N... Free research essays on topics related to: rift valley, colonial government, white settlers, indian ocean, labor force United States Government World War 2 1,467 wordsMany things have influenced the United States in its history. Morality, one of these influences, has been both observed and ignored in this history. This essay will show different periods in history when the United States acted in a immoral fashion. The United States treated the Japanese Americans immorally in World War 2 and acted immorally toward Native Americans especially at Wounded Knee. Another of the immoral acts that the US has committed was the My Lai Massacre. In 1940, the United State... Free research essays on topics related to: lai massacre, world war 2, women and children, native americans, united states government Early Twentieth Century 1960 And 1970 2,337 wordsNative American Environmental Issues Traditionally Native Americans have had an immediate and reciprocal relationship with their natural environments. At contact, they lived in relatively small groups close to the earth. They defined themselves by the land and sacred places, and recognized a unity in their physical and spiritual universe. Their cosmologies connected them with all animate and inanimate beings. Indians moved in a sentient world, managing its bounty and diversity carefully lest the... Free research essays on topics related to: state and federal, 1960 and 1970, indian lands, early twentieth century, nineteenth century Fell To The Ground Native Americans 565 wordsColin Calloway has done a masterful job of selecting and presenting an array of speeches, letters, documents, and drawings that tell compelling stories about the Plain Indians in the 1800 s. His introduction alone has just the right level of information and links basic themes and events to the documents presented in the text. In short, a model of how an introduction should be done. Colin Calloway's intentions were to focus on the humanistic study of the Plain Indians views on how the West was lo... Free research essays on topics related to: native americans, fell to the ground, white man, calloway, white settlers
<urn:uuid:b8f178b2-9233-4cd6-948a-4f9e5a0d7257>
CC-MAIN-2019-18
https://essaychief.com/research-essay-topic.php?tid=3871647&topic=white-settlers
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00444.warc.gz
en
0.963974
2,756
3.203125
3
Edited By: PS Martin, D Yetman, M Fishbein, P Jenkins, T Van Devender and RK Wilson 558 pages, B/w photos and Illus, tabs, map This new book updates and amends Gentry's Rio Mayo Plants. Undertaken with Gentry's support and participation before his death in 1993, it reproduces the original text, which appears here with annotations, and contains information on over 2,800 taxa - more than twice the 1,200 species first described by Gentry. The annotated list of plants includes information on distribution, habitat, appearance, common names, and indigenous uses. A new introduction provides historical background and a review of geography and vegetation. It also describes changes to the land and river wrought by agricultural development, expanded grazing, and lumbering. There are currently no reviews for this product. Be the first to review this product! Your orders support book donation projects Your customer service is outstanding, and I'll definitely refer friends and colleagues to you. May all go well for your company. Search and browse over 110,000 wildlife and science products Multi-currency. Secure worldwide shipping Wildlife, science and conservation since 1985
<urn:uuid:75ef55f5-657e-4691-83b7-16a86a6876b0>
CC-MAIN-2017-13
http://www.nhbs.com/title/88807?title=gentrys-rio-mayo-plants
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189734.17/warc/CC-MAIN-20170322212949-00364-ip-10-233-31-227.ec2.internal.warc.gz
en
0.91898
247
2.921875
3
Photo Credit: U.S. Fish & Wildlife Service SCIENTIFIC NAME: Mephitis mephitis DESCRIPTION: Striped skunks (Mephitis mephitis) are the largest of the skunk species and have long stocky bodies on short thick legs with powerful claws. The head is small and elongated with small eyes and small rounded ears. They cannot see very well, but have excellent hearing. Weight varies from six to 14 pounds, while length varies from 20 to 31 inches, excluding the tail which varies from seven to 16 inches. Striped skunks are typically black with two white stripes extending from the base of the neck down the back to the tail. Often the tail has two white stripes, but occasionally is just a mix of white and black hairs without a distinct pattern. The top of the head sports a white cap, while a white stripe runs from the nose to the forehead. Skunks are boldly patterned to advertise to potential enemies that they are to be left alone. However coloration can vary drastically, from almost black to almost white. The most notorious feature of the striped skunk is the scent glands that produce a fowl smelling yellowish musk. The spray can reach 12 to 15 feet, and the odor can be detected up to a mile. The musk is actually used as a base for perfumes. DISTRIBUTION: Striped skunks are found only in HABITAT: The striped skunk lives in a variety of habitats. It prefers open areas with a mixture of woodlands. It is seldom found more than two miles from a water source. FEEDING HABITS: Striped skunks are omnivorous, feeding on both meat and plants. They are very opportunistic feeders and have a diet consisting of grubs, insects, small mammals, fish, fruits, crayfish, eggs, carrion (dead animals) and anything else it can find. The striped skunk gorges itself in the fall in preparation for a lean winter. Nowak, Ronald M. Walker’s Mammals of the World: Volume 1. Wilson, Don E., and DeeAnn M. Reeder. Mammal Species of the World. AUTHOR: Jim Schrenkel, Wildlife Biologist, Division of Wildlife & Freshwater Fisheries
<urn:uuid:9c463694-b59f-4494-9a7d-368a19162c7c>
CC-MAIN-2014-23
http://outdooralabama.com/watchable-wildlife/what/Mammals/Carnivores/sk.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894865.50/warc/CC-MAIN-20140722025814-00044-ip-10-33-131-23.ec2.internal.warc.gz
en
0.924733
480
3.4375
3
Lion's mane (hericium erinaceus) is one of the edible mushrooms widely distributed in Japan and China. I've been seeing it for sale in grocery stores, so I decided to see if had any remarkable benefit. Nerve growth factor (NGF) belongs to a family of proteins that play a part in maintenance, survival and regeneration of neurons during adult life. As we age, NGF declines, resulting in less efficient brain functioning. In mice, its absence leads to a condition resembling Alzheimer's disease. In 1986, two scientists won a Nobel Prize in Physiology / Medicine for the discovery and isolation of NGF. Since its discovery, researchers have been interested in ways of enhancing the uptake of NGF. Because NGF is unable to cross the blood brain barrier, it cannot be administered as an oral drug. Accordingly, scientists directed their attention to finding bio-active chemicals with a low molecular weight that could penetrate the BBB and could be taken orally to induce synthesis of NGF in the brain. Enter lion's mane. A class of compounds called hericenones in lion's mane has been discovered to stimulate production of NGF, causing neurons to regrow: Study: The Inducer of the Synthesis of Nerve Growth Factor From Lion's Mane (Hericium erinaceus) Other compounds in lion's mane are also believed to be bio-active. A fat-soluable fraction isolated from lion's mane, called Amyloban, was found to protect against endoplasmic reticulum stress and/or oxidative stress dependent neuronal cell death caused by toxic beta amyloid peptide: Patent Application: Anti-dementia substance from hericium erinaceum and method of extraction Beta amyloid peptide is the main component of plaque that develops in the brains of Alzheimer's disease patients, causing destruction of neurons as it progresses. So far, Amyloban has been found to contain bio-active dilinoleoyl-phosphatidylethanolamine (DLPE) benzoate compounds: Study: Dilinoleoyl-phosphatidylethanolamine from Hericium erinaceum protects against ER stress-dependent Neuro2a cell death via protein kinase C pathway. Study: An endoplasmic reticulum (ER) stress-suppressive compound and its analogues from the mushroom Hericium erinaceum. Study: Endoplasmic reticulum (ER) stress-suppressive compounds from scrap cultivation beds of the mushroom Hericium erinaceum. The question remains, has it been tested in humans or animals? It turns out it has been tested. A study at a Chinese pharmaceutical university compared a lion's mane extract standardized to contain hericenones and Ambyloban with a common Alzheimer's drug. One hundred rats were injected with with beta amyloid peptide to create an Alzheimer's type dementia. The rats were then divided into groups to receive either lion's mane extract or the drug once a day for four weeks. At four weeks, an assessment of learning and memory related behavior was made for seven days. Results showed that rats given the the extract performed a water maze test equally to or better than those given the Alzheimer's drug, depending on dosage. Sacrificing the rats after the examination, it was found the rats who received the lion's mane extract produced significantly more NGF. Study (in Chinese): Anti-dementia effects of a low polarity fraction extracted from Hericium erinaceum A clinical study using lion's mane was conducted to investigate its effectiveness against dementia in a rehabilitation hospital in Japan. Study: Compounds for dementia from Hericium erinaceum Results showed that after six months of taking lion's mane, six out of seven patients experienced improvements in their overall functional independence measure. In particular, three bedridden patients were able to get up to eat meal after administered. Another study, this one a double blind, placebo controlled study, demonstrated that lion's mane is effective in patients diagnosed with mild cognitive impairment. Study: Improving effects of the mushroom Yamabushitake (Hericium erinaceus) on mild cognitive impairment: A double-blind placebo controlled clinical trial. It was observed that the lion's mane group's score increased with the duration of the intake, and four weeks after terminating the supplement, their scores decreased significantly. Laboratory tests showed no adverse effects of lion's mane. These studies are very encouraging!
<urn:uuid:6305e391-eba2-42d5-91ad-cc8ce9497a72>
CC-MAIN-2017-04
http://www.longecity.org/forum/topic/41784-lions-mane-for-your-brain/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00311-ip-10-171-10-70.ec2.internal.warc.gz
en
0.936351
955
2.640625
3
Encyclopaedia IndexBack to start of article Subgrid-scale (SGS) turbulence models are used in Large-Eddy Simulations (LES) of turbulent flows. The LES approach ( see for example Schumann ) is a combination of Direct Numerical Simulation (DNS) of turbulence and conventional turbulence modelling. The large scales (eddies) are simulated directly, and the small (subgrid) scales are modelled with a SGS turbulence model. The flow variables are therefore decomposed in terms of: The SGS stresses are similar to the Reynolds stresses which result from time- or ensemble- averaging; but they differ in that they are consequences of spatial averaging and go to zero if the mesh interval goes to zero. PHOENICS provides the simplest and most commonly-used SGS model, namely the Smagorinsky eddy-viscosity model. Since turbulence is inherently 3-dimensional, strictly speaking LES simulations must also be 3-dimensional, even though the time-mean flow may be of lower dimensionality. Nevertheless, some workers have used SGS turbulence models in 2- dimensional problems with reasonable results (see for example, the results of Petersen for transient 2-phase flow in bubble columns, and those of Murakami et al and Ochoa and Fueyo for flow past square-sectioned obstacles). In addition, time-dependence is an essential feature of LES, even when the time-average flow is independent of time. In summary, true LES is a 3-dimensional time-dependent calculation in which the large-scale motions are calculated directly, and the SGS turbulence is modelled. The size of such a calculation is inevitably large, and therefore computationally very expensive for practical engineering calculations. Consequently, on practical grounds, its use should only be considered in flows that are inherently 3D and transient, and in challenging applications for statistical turbulence models, such as for example, bluff-body aerodynamics, vortex shedding and aeroacoustics. Another drawback is that problems arise from the need to introduce appropriate randomness into the initial and boundary conditions ( see for example Richter et al ). The advantage of LES is that it is largely free from arbitrary closure assumptions. Spatially-Averaged Navier Stokes Equations The LES model in PHOENICS resolves each flow variable into a large-scale (resolved) component, which is still time-dependent even in flows that are stationary in the average, and into a subgrid (unresolved) component. Following Schumann and Ciofalo , explicit filtering of the local and instantaneous quantities is replaced by volume averaging on each grid cell, so that the equations describing the resolved flow and scalar (e.g.thermal) fields are: RHO,t + (RHO*Ui),i = 0 .... (220.127.116.11) (RHO*Ui),t + (RHO*Uj*Ui),j = - p,i + (2.*RHO*ENUL*Sij),j - (TAUij),j .... (18.104.22.168) (RHO*Cp*T),t + (RHO*Cp*Uj*T),j = (k*T,j),j - (Qj),j ....(22.214.171.124) in which TAUij are residual stresses and Qj are residual heat fluxes which have to be expressed by means of a closure model (for details, see Ciofalo ). The Subgrid-Scale Stresses The SGS stresses TAUij are calculated from: TAUij = - 2.*RHO*ENUT*Sij .... (126.96.36.199) where RHO is the density and ENUT is the SGS kinematic eddy viscosity, and Sij is the mean rate-of-strain tensor for the resolved scales: Sij = 0.5*(dUi/dxj+dUj/dxi) .... (188.8.131.52) The Subgrid-Scale Model PHOENICS is equipped with three variants of the Smagorinsky model for the SGS eddy viscosity ENUT: namely: ENUT = (LM)**2 * (2*Sij*dUi/dxj)**0.5 .... (184.108.40.206) where LM is the characteristic length scale of the resolved eddies. The three model variants differ in their prescription for LM, as described below. The basic Smagorinsky model computes LM from: LM = Cs*H .... (220.127.116.11) where Cs is the Smagorinsky constant (=0.17), and H is a representative mesh interval. The Smagorinsky constant Cs is known to vary with application, with values reported in the literature ranging from 0.1 to 0.25. The default value in PHOENICS is 0.17. For the Smagorinsky WD Model, LM = MIN(Cs*H,k*WDIS) .... (18.104.22.168) where k is von Karman's constant (=0.41); and WDIS is the normal distance to the nearest wall, calculated via the solution of an elliptic differential equation for the variable LTLS (see the PHOENICS Encyclopaedia entry DISWAL). According to Schumann , the MIN(...) operator makes the model valid for coarse grids, in particular near walls, where the mixing length (k*WDIS) may become smaller than the mesh interval H. The Smagorinsky VDWD model calculates LM from: LM = Cs*H*FMU .... (22.214.171.124) where FMU is the Van Driest damping function, given by: FMU = (1.-EXP[-(Y+/26.0)**m])**n .... (126.96.36.199) The dimensional wall distance y+ is computed using the normal distance to the nearest wall, WDIS. The empirical exponents m and n are defaulted to unity in PHOENICS. Equation (188.8.131.52) is an alternative to equation (184.108.40.206) for partially taking into account wall effects by appropriately reducing the length scale Cs*H in the proximity of walls. The Grid Filter Width, H The representative mesh interval H is computed from: H = V**1/3 .... (220.127.116.11) where V is the local cell volume. An alternative commonly encountered in the literature is also provided as an option in PHOENICS: H = [ S (DXi**2)/N ]**(1./N) .... (18.104.22.168) where the summation is over the three coordinate directions and DXi is the cell width in the direction i. The Subgrid-Scale Heat Fluxes The SGS heat fluxes are modelled by: Qj = - Kturb*T,j .... (22.214.171.124) where Kturb=RHO*ENUT*Cp/PRT(TEM1) and PRT(TEM1) is the subgrid Prandtl number which is the LES analog of the turbulent Prandtl number. In the LES literature, a broad range of values has been proposed for this parameter, from 0.25 to 0.9 ( see for example Ciofalo ). The default in PHOENICS is the Smagorinsky WD model, which may be activated from the Q1 input file via the PIL command TURMOD(SGSMOD), which is equivalent to: Here, EL1A equals Smagorinsky's constant and EL1B von Karman's constant. The basic Smagorinsky model is activated by setting and if no walls are present, by deactivating the PIL command DISWAL via SOLUTN(LTLS,N,N,N,N,N,N) and SOLUTN(WDIS,N,N,N,N,N,N). The Smagorinsky VDWD model is activated by setting where EL1C=n and EL1D=m in equation (126.96.36.199). If the user puts STORE(FMU) in the Q1 input file, the field values of the damping function FMU are written to the PHOENICS RESULT and PHI files. The default grid filter width H is given by (188.8.131.52); but the alternative (184.108.40.206) can be activated by setting the Smagorinsky coefficient to a negative value, e.g. EL1A=-0.17 . Compared with conventional turbulence modelling, LES requires finer spatial resolution and smaller time steps, and consequently significantly more computer time. Typically, the time step should be in the range 1/200 to 1/50 of the large-eddy turnover time. PHOENICS uses fully-implicit backward time-stepping (1st order Euler) and hybrid differencing for the combined effects of advection and diffusion. This scheme reduces to the central-differencing scheme recommended by most workers for LES when the cell Peclet number is less than 2. Otherwise, it reverts to the upwind scheme. Therefore, smaller time steps and finer meshes are desirable. Higher-order convection schemes are available in PHOENICS as built-in options, such as for example MINMOD and the Linear Upwind Scheme. There is no built-in option for a higher-order temporal differencing scheme, although PHOENICS is flexible enough for the user to introduce his own temporal scheme such as Crank- Nicholson. For example, Ochoa and Fueyo implemented the 3rd-order implicit Adam-Moulton scheme in PHOENICS via GROUND coding. The only purpose of using LES is to simulate turbulent flows more realistically than can conventional models; but they can do so only if: What 'not too coarse' and 'not too large' imply, in any newly-considered flow, can determined only by trial-and-error, i.e. by performing the calculations with a range of mesh sizes, time steps and Smagorinsky constants, and comparing the results. Such systematic grid-refinement is rarely performed, because of its expense; indeed the need for it is often disregarded by LES practitioners. There is not even any consensus as to how the results with different numerical inputs should be compared. However, the following advice appears to be reasonable: M.Ciofalo, 'Large-Eddy Simulation: A Critical Survey of Models and Applications', In Advances in Heat Transfer, Vol.25, p321, Academic Press, (1994). J.S.Ochoa and N.Fueyo, 'Large-Eddy Simulation of the flow past a square cylinder', PHOENICS 10th International User Conference, Melbourne, Australia, CHAM Limited, London (2004). K.O.Petersen, 'Etude experimentale et numerique des ecoulements diphasiques dans les reacteurs chimiques', PhD Thesis, L'Universite Claude Bernard - Lyon, (1992). K.Richter, R.Friedrich and R.Schmitt, 'LES of turbulent wall boundary layers with pressure gradient', p22-3-1, 6th Symp. on Turbulent Shear Flows, Sept. 7-9, Toulouse, France, (1987). S.Murakami, A.Mochida, W.Rodi and S.Sakamoto, 'Large-Eddy Simulation of turbulent vorttex shedding past 2D square cylinders', p113-120, FDE-Vol.162, Engineering applications of LES, ASME, USA, (1993). U.Schumann, 'Subgrid scale model for finite-difference simulations of turbulent flows in plane channels and annuli', J.Comp.Phys., Vol.18, p376, (1975). U.Schumann, 'Direct and Large-Eddy simulation of turbulence', Introduction to the modelling of turbulence, VKI Lecture Series 1991-02, March 18-21, VKI, Belgium, (1991). J.Smagorinsky, 'General circulation experiments with the primitive equations', Monthly Weather Review, Vol.93, No.3, p99, (1963). E.R.Van Driest, 'On turbulent flow near a wall', J.Aerospace.Sci., Vol.23, No.11, p1007-1011, (1956). See also numerous papers in: Hanjalic K, Nagano Y and Jakirlic S (Eds.) "Turbulence, Heat and Mass Transfer", Begell House Inc., New York and Walingford (UK),
<urn:uuid:a23ce4c8-5c78-4a5e-9034-de5b5b254812>
CC-MAIN-2014-42
http://www.cham.co.uk/phoenics/d_polis/d_enc/turmod/enc_tu51.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507454577.44/warc/CC-MAIN-20141017005734-00377-ip-10-16-133-185.ec2.internal.warc.gz
en
0.866336
2,824
3.125
3
Also called: Mender, Sail Maker, Sail Repair Person, Seamstress What they do:Repair tears, holes, and other defects in fabrics, such as draperies, linens, parachutes, and tents. On the job, you would: - Measure and hem curtains, garments, and canvas coverings to size, using tape measures. - Operate sewing machines to restitch defective seams, sew up holes, or replace components of fabric articles. - Spread out articles or materials and examine them for holes, tears, worn areas, and other defects. - customer service Manufactured or Agricultural Goods - manufacture and distribution of products Arts and Humanities - English language Education and Training - teaching and course design - thinking about the pros and cons of different ways to solve a problem - noticing a problem and figuring out the best way to solve it Hand and Finger Use - hold or move items with your hands - keep your arm or hand steady - use your arms and/or legs together while sitting, standing, or lying down - quickly change the controls of a machine, car, truck or boat People interested in this work like activities that include practical, hands-on problems and solutions. They do well at jobs that need: - Attention to Detail You might use software like this on the job: Electronic mail software Operating system software
<urn:uuid:b13c38d7-64a3-4ac0-b854-fa92041e08c0>
CC-MAIN-2019-51
https://www.mynextmove.org/profile/summary/49-9093.00?print=1
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540542644.69/warc/CC-MAIN-20191212074623-20191212102623-00312.warc.gz
en
0.859427
296
3.234375
3
What is CITES? The international trade in wild animals and plants is worth billions of dollars every year. Levels of exploitation and rates of wild capture can have a serious detrimental impact on the future survival of thousands of animal and plant species across the globe. The United Nations Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) is an international agreement between governments, which provides varying levels of protection for species that are or may be in danger of extinction from international trade. 179 countries (or ‘Parties’) are members of CITES. It is viewed by many as the world's most important Multilateral Environmental Agreement, and is legally binding upon the Parties. Contraventions of the Convention can lead to trade suspensions and can have a serious economic impact on the countries involved. The United Nations Environment Programme administers CITES through a Secretariat. Among its many functions the Secretariat has a coordinating, advisory and servicing role in the working of the Convention. How does CITES regulate international trade ? CITES has more than 30,000 species of plants and animals listed on three Appendices: Appendix I includes species that are threatened with extinction and that are or may be affected by international trade. Commercial international trade in species listed on Appendix I is prohibited. Appendix II includes species that, although not necessarily threatened with extinction, may become so unless trade is strictly regulated. Species may also be listed on Appendix II if their parts or products cannot be readily distinguished from those of other species listed on CITES Appendix I or II. Commercial international trade in Appendix II species is permitted, but is subject to strict controls. Parties may only grant a permit to export such species, or their products, after it has determined that the export will not be detrimental to the survival of the species. Appendix III includes species that any Party has identified as requiring regulation within its jurisdiction, and that needs the cooperation of other Parties to monitor international trade in the species. Parties may unilaterally add species to Appendix III at any time and such listings are not legally binding. What happens at CITES meetings? The Conference of the Parties (CoP) is an event which takes place every three years. At each CoP, Parties submit Proposals to add or move species between Appendix I and II based on a set of biological and trade criteria. They may also propose that species be removed from the Appendices. These Proposals are discussed and then, if no consensus is reached, submitted to a vote. CoPs also provide an opportunity for Parties to consider and vote on Decisions, Resolutions and other documents which relate to compliance, implementation and enforcement of the Convention. For example, at the 15th CoP (CoP15) in March 2010, Tanzania and Zambia tried to reduce the level of protection their elephants are afforded (by moving them from Appendix I to Appendix II) and additionally sought to gain approval for a one-off sale of over 110,000kg of their stockpiled ivory to China and Japan. Although these Proposals went against the spirit a nine year moratorium on ivory trade which had been agreed by Parties in 2007, the final wording of that moratorium unfortunately had a loophole which Tanzania and Zambia tried to exploit. However, due to the hard work of many, including the African Elephant Coalition (composed of the majority of African elephant range States), CITES rejected both Tanzania's and Zambia's Proposals. CoP16 took place in Bangkok between 3 and 15 March 2013. Tanzania had again been planning to seek approval to sell ivory - this time over 101,000kg of it - but following widespread opposition to this move, withdrew its Proposal in December 2012. The CoP16 agenda still had many issues potentially affecting elephants both negatively and positively - see here for a summary of the outcomes of CoP16. CITES Parties also meet annually at Standing Committee (SC) meetings in Geneva (Switzerland). The members of the SC are Parties representing each of the six major geographical regions (Africa, Asia, Europe, North America, Central & South America and the Caribbean, and Oceania). The SC provides guidance to the CITES Secretariat on the implementation of CITES and oversees the management of the Secretariat's budget. Where required it also coordinates and oversees the work of other committees and working groups, carries out tasks given to it by the CoP and drafts Resolutions for consideration by the CoP. The membership of the SC is reviewed at each CoP meeting. See here for an overview of the outcomes of the last SC.
<urn:uuid:9f05540e-6213-4273-8d9e-1fbac7ed5128>
CC-MAIN-2015-27
http://www.bloodyivory.org/cites
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096209.79/warc/CC-MAIN-20150627031816-00019-ip-10-179-60-89.ec2.internal.warc.gz
en
0.95378
952
4.21875
4
Alzheimer's disease is a common form of brain disease that usually occur in individuals aged above 65 years. It is estimated that 5.4 million Americans have been suffering with Alzheimer disease and for every 70 seconds, some or the other individual will be diagnosed for the symptoms of Alzheimer disease. The disease is more prevalent among individuals with age above 65 years and nearly 45% of people in America with age above 85 are the victims of Alzheimer disease. Of the total Alzheimer disease patients in America, 2/3rd are women. The common risk factors of Alzheimer disease is aging and other reasons for falling victim to disease are family history, previous brain trauma injury, obesity, cardiovascular disease and chronic high blood pressure. There is no specific treatment procedure to treat person with Alzheimer disease, the best way to extend the life expectancy is to eat low diet meal, reduce red meat, eat cold water fish, reduce dairy products and intake more dark colored fruits and vegetables.
<urn:uuid:7597edee-fef0-44e4-a0cc-24fe912c0b9e>
CC-MAIN-2016-40
http://graphs.net/risk-factors-of-alzheimers-disease.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661778.39/warc/CC-MAIN-20160924173741-00155-ip-10-143-35-109.ec2.internal.warc.gz
en
0.937932
193
3.359375
3
What are fittings? Simply put, a fitting is a structure with an electric power supply (usually a cord) in which a bulb is fitted. So, it’s actually an electro-appliance. And because these appliances contain reusable and rare materials, recuperating the materials through recycling saves us from always obtaining them via polluting mining activity. Recupel removes the hazardous materials and recycles 90% of the other materials − such as plastic, iron, copper and other metals − that serve as the basis for new products. For example: maybe a piece of your old bulb fitting will have a new life as the raw material for a deep fryer! Where to go? 1. Is the fitting broken? To the recycling centre At the recycling centre, never throw fittings in with the scrap metal in a metal container or another container. Take them to the Recupel hut with the other electro-appliances. It’s totally free of charge! Tip: do not cut off the cord or dismantle the fitting, but keep everything nicely intact - this prevents any loss of materials. Here you can find recycling centres in your area. Or to the store When buying a new fitting, you may also leave the old fittings in the store. For fittings smaller than 25 cm, you are also always welcome in stores that are RecyclePoints: here, you don’t have to buy a new fitting, and you can discard your old fittings for free. 2. Does the fitting still work? To the shop specialised in recycled goods Frequently, when moving house or renovating, for example, an old fitting no longer fits in the new interior. Or, what do you do with fittings that you inherit? Usually, there’s no place for them in your house, although they still work properly. Take them to the shop specialised in recycled goods. Someone is always looking for a good bargain. Here you can find shops specialised in recycled goods in your area.
<urn:uuid:40fb5cbb-4d7c-4cfb-82a6-47b7f3ef7df6>
CC-MAIN-2019-51
https://www.recupel.be/en/why-recycle/fittings/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541297626.61/warc/CC-MAIN-20191214230830-20191215014830-00413.warc.gz
en
0.935615
425
2.59375
3
Battle of Cajamarca |Battle of Cajamarca| |Part of the Spanish conquest of Peru| Contemporary engraving of the Battle of Cajamarca, showing Emperor Atahualpa surrounded on his palanquin. |Spanish Conquistadors||Inca Empire| |Commanders and leaders| Francisco Pizarro (wounded)| Juan Pizarro II Hernando de Soto |3,000–8,000 unarmed personal attendants/lightly armed guards| |Casualties and losses| 5,000 taken prisoner The 'Battle' of Cajamarca was the unexpected ambush and seizure of the Inca ruler Atahualpa by a small Spanish force led by Francisco Pizarro, on November 16, 1532. The Spanish killed thousands of Atahualpa's counsellors, commanders and unarmed attendants in the great plaza of Cajamarca, and caused his armed host outside the town to flee. The capture of Atahualpa marked the opening stage of the conquest of the pre-Columbian Inca civilization of Peru. The confrontation at Cajamarca was the culmination of a months-long struggle involving espionage, subterfuge, and diplomacy between Pizarro and the Inca via their respective envoys. Atahualpa had received the invaders from a position of immense strength. Encamped along the heights of Cajamarca with a large force of battle-tested troops fresh from their victories in the civil war against his half-brother Huascar, the Inca felt they had little to fear from Pizarro's tiny army, however exotic its dress and weaponry. In a calculated show of goodwill, Atahualpa had lured the adventurers deep into the heart of his mountain empire where any potential threat could be isolated and responded to with massive force. Pizarro and his men arrived on Friday November 15, 1532. The town itself had been largely emptied of its two thousand inhabitants, upon the approach of the Spanish force of 150 men, guided by an Inca noble sent by Atahualpa as an envoy. Atahualpa himself was encamped outside Cajamarca, preparing for his march on Cuzco, where his commanders had just captured Huascar and defeated his army. The book History Of The Conquest Of Peru, written by 19th century author William H. Prescott, recounts the dilemma in which the Spanish force found itself. Any assault on the Inca armies overlooking the valley would have been suicidal. Retreat was equally out of the question, because any show of weakness might have undermined their air of invincibility, and would invite pursuit and closure of the mountain passes. Once the great stone fortresses dotting their route of escape were garrisoned, argued Pizarro, they would prove impregnable. But to do nothing, he added, was no better since prolonged contact with the natives would erode the fears of Spanish supernaturality that kept them at bay.:171–172 Pizarro gathered his officers on the evening of November 15 and outlined a scheme that recalled memories of Cortés' exploits in Mexico in its audacity: he would capture the emperor from within the midst of his own armies. Since this could not realistically be accomplished in an open field, Pizarro had invited the Inca to Cajamarca.:172–173 The next afternoon, Atahualpa led a procession of "a greater part of the Inca's forces", but Pizarro's fortunes changed dramatically when Atahualpa announced that most of his host would set up camp outside the walls of the city. He requested that accommodations be provided only for himself and his retinue, which would forsake its weapons in a sign of amity and absolute confidence.:174–175 Shortly before sunset Atahualpa left the armed warriors who had accompanied him, on an open meadow about half a mile outside Cajamarca. His immediate party still numbered over seven thousand but were unarmed except for small battle axes intended for show. Atahualpa's attendants were richly dressed in what were apparently ceremonial garments. Many wore gold or silver discs on their heads and the main party was preceded by a group wearing livery of chequered colors, who sang while sweeping the roadway in front of Atahualpa. The Inca himself was carried in a litter lined with parrot feathers and partly covered in silver, carried by eighty Inca courtiers of high rank in vivid blue clothing. Atahualpa's intention appears to have been to impress the small Spanish force with this display of splendor and he had no anticipation of an ambush. The Spaniards had concealed themselves within the buildings surrounding the empty plaza at the centre of the town. Infantry and horsemen were concealed in the alleyways which opened onto this open square. Spanish infantry were deployed to guard the entrances to a stone building in the centre of the square while men armed with arquebuses and four small cannon took place within it. Pizarro ordered his men to remain silent and hidden until the guns were fired. During the hours of waiting tension rose amongst the greatly outnumbered Spanish and Pedro Pizarro recalls that many of his fellows urinated "out of pure terror". Upon entering the square the leading Incans in attendance on Atahualpa divided their ranks to enable his litter to be carried to the centre, where all stopped. An Incan courtier carrying a banner approached the building where the artillery was concealed, while Atahualpa, surprised at seeing no Spanish called out an enquiry. After a brief pause Friar Vincente de Valverde, accompanied by an interpreter, emerged from the building where Pizarro was lodged. Carrying a cross and a missal the friar passed through the rows of attendants who had spread out to allow the Inca's litter to reach the centre of the square. Valverde approached the Inca, announced himself as the emissary of God and the Spanish throne, and demanded that he accept Catholicism as his faith and Charles V, the Holy Roman Emperor as his sovereign ruler. Atahualpa was equally insulted and confused by Valverde's words. Although Atahualpa had already determined that he had no intention of conceding to the dictates of the Spanish, according to chronicler Garcilaso de la Vega he did attempt a brusque, bemused inquiry into the details of the Spaniards' faith and their king, which quickly bogged down in poorly-translated semantics and increased the tension of all the participants. Spanish sources differ as to the specific event which initiated combat, but all agree it was a spontaneous decision following the breakdown of negotiations (such as they were) with Atahualpa. Incan account of events Titu Cusi Yupanqui (1529–1571), son of Manco II and a nephew of Atahualpa, dictated the only Inca account of the events leading up to the battle. According to Titu Cusi, Atahualpa had received "two Viracochas", Pizarro and de Soto, at a date not specified "many days" before the battle, offering them a golden cup containing ceremonial chicha. "The Spaniard poured it out." The Spaniards then gave Atahualpa a letter (or book) which they said was quillca (writing) of God and of the Spanish king. Offended by the wasting of the chicha, Atahualpa threw the "letter or whatever it was" on the ground, telling them to leave.:4,60–61 On November 16, Atahualpa arrived at Cajamarca with "no weapons for battle or harnesses for defense," although they did carry tomes (knives) and lassos for hunting llamas. The Spanish approached and told Atahualpa that Virococha had ordered them to tell the Inca who they were. Atahualpa listened then gave one a gold cup of chicha which was not drunk and given no attention at all. Furious, Atahualpa stood and yelled "If you disrespect me, I will also disrespect you", and said he would kill them, at which the Spanish attacked.:61–62 Titu Cusi's only mention of a Bible being presented and then tossed to the ground is restricted to the encounter which took place before the battle, an omission that has been explained as due either to its relative insignificance to the Inca or to confusion between the events of the two days. His account of the battle itself is heavily influenced by Inca mythology and ritual and is not considered a reliable account. Battle and Atahualpa's capture At the signal to attack, the Spaniards unleashed gunfire at the vulnerable mass of Incans and surged forward in a concerted action. The effect was devastating and the shocked and unarmed Incans offered little resistance. The Spanish forces used a cavalry charge against the Incan forces, in combination with gunfire from cover (the Incan forces also had never encountered firearms before) combined with the ringing bells on the horses to frighten the Inca.:176–180 The first target of the Spanish attack was Atahualpa and his top commanders. Pizarro rushed at Atahualpa on horseback, but the Inca remained motionless. The Spanish severed the hands or arms of the attendants carrying Atahualpa's litter to force them to drop it so they could reach him. The Spanish were astounded that the attendants ignored their wounds and used their stumps or remaining hands to hold it up until several were killed and the litter slumped. Atahualpa remained sitting on the litter while a large number of his attendants rushed to place themselves between the litter and the Spanish, deliberately allowing themselves to be killed. While his men were cutting down Atahualpa's attendants, Pizarro rode through them to where a Spanish soldier had pulled the Inca from his litter. While he was doing so, other soldiers also reached the litter and one attempted to kill Atahualpa. Recognizing the value of the Emperor as a hostage, Pizarro blocked the attack and received a sword wound to his hand in consequence. The main Inca force, which had retained their weapons but remained "about quarter of a league" outside Cajamarca, scattered in confusion as the survivors of those who had accompanied Atahualpa fled from the square, breaking down a fifteen-foot length of wall in the process. Atahualpa's warriors were veterans of his recent northern campaigns and constituted the professional core of the Inca army, seasoned warriors who outnumbered the Spaniards more than 45 to 1 (8,000 to 168). However, the shock of the Spanish attack—coupled with the spiritual significance of losing the Sapa Inca and most of his commanders in one fell swoop—apparently shattered the army's morale, throwing their ranks into terror and initiating a massive rout. There is no evidence that any of the main Inca force attempted to engage the Spaniards in Cajamarca after the success of the initial ambush. Atahualpa's wife, 10-year-old Cuxirimay Ocllo, was with the army and stayed with him while he was imprisoned. Following his execution she was taken to Cuzco and took the name Dona Angelina. By 1538 she was Pizarro's mistress, bearing him two sons, Juan and Francisco. Following his assassination in 1541 she married the interpreter Juan de Betanzos who later wrote Narratives of the Incas, part one covering Inca history up to the arrival of the Spanish and part two covering the conquest to 1557, mainly from the Inca viewpoint and including mentions of interviews with Inca guards who were near Atahualpa's litter when he was captured. Only the first 18 unpublished chapters of part one were known until the complete manuscript was found and published in 1987. Francisco Xerez wrote an account of the Battle of Cajamarca. - MacQuarrie, Kim (2012). The Last Days of The Incas. p70.: Hachette. ISBN 9781405526074. - Jared Diamond Guns, Germs And Steel, Random House 2013 (p76), states that the Inca personnel were purely Atahualpa's personal attendants and nobles, whereas John Michael Francis (2006, Iberia and the Americas: Culture, Politics, and History: a Multidisciplinary Encyclopedia, v1, Santa Barbara, Ca.; ABC-CLIO, p322) states that they were "ceremonially armed guards". - Most sources state that no Conquistadors were killed, while others state that five or fewer were killed.(Spencer C. Tucker, 2010, Battles That Changed History: An Encyclopedia of World Conflict, Santa Barbara, Ca.; ABC-CLIO, p172.) Among modern sources stating categorically that no Spaniards were killed are (e.g.) Kim MacQuarrie, The Last Days of The Incas, Hachette publishing 2012, p84. - Hemming, John. The Conquest of the Incas. Penguin Books 1987. p. 31. - Prescott, W.H., 2011, The History of the Conquest of Peru, Digireads.com Publishing, ISBN 9781420941142 - Hemming, John. The Conquest of the Incas. Penguin Books 1987. pp. 38–39. - Hemming, John. The Conquest of the Incas. Penguin Books 1987. p. 38. - Hemming, John. The Conquest of the Incas. Penguin Books 1987. pp. 39–40. - Yupanqui, T.C., 2005, An Inca Account of the Conquest of Peru, Boulder: University Press of Colorado, ISBN 087081821X - Thomas Cummins Toasts with the Inca: Andean abstraction and colonial images on quero vessels University of Michigan Press 2002 Pg 15 - 19 ISBN 0-472-11051-9 - Cook, Alexandra and Noble (1999). Discovery and Conquest of Peru (Translation of book 3 of a 4 book compilation of interviews with Pizarro's men and Indians by Pedro Cieza de León). Duke University Press ISBN 0-8223-2146-7. - Juan de Betanzos Narratives of the Incas University of Texas Press, 1996 Pg 265 ISBN 0-292-75559-7 - Hemming, John. The Conquest of the Incas. Penguin Books 1987. pp. 42–43. - Juan de Betanzos, Narratives of the Incas, pp. 9-12 - Jared Diamond (17 April 1999). Guns, Germs, and Steel: The Fates of Human Societies. W. W. Norton. pp. 69–. ISBN 978-0-393-06922-8. - Sir Clements Robert Markham (1872). Reports on the Discovery of Peru. Hakluyt Society. pp. 1–. - Works Issued by the Hakluyt Society. The Society. 1872. pp. 1–. - Francisco de Xeres (1872). Reports on the discovery of Peru. i. Report of F. de Xeres, ii. Report of M. de Astete on the expedition to Pachacamac, iii. Letter of H. Pizarro to the royal audience of Santo Domingo, iv. Report of P. Sancho on the partition of the ransom of Atahuallpa. pp. 1–. - . 1970. p. 1 https://books.google.com/books?id=LLhiAAAAMAAJ&q=vassals+invincible+Emperor+Roman+Catholic+Empire+natural+King+Lord+joy+faithful+reason+glory+God+Lord+service&dq=vassals+invincible+Emperor+Roman+Catholic+Empire+natural+King+Lord+joy+faithful+reason+glory+God+Lord+service&hl=en. Missing or empty - Francisco de Xerez; Miguel de Estete; Hernando Pizarro; Pedro Sancho (1970). Works Issued by the Hakluyt Society. The Society. p. 1. - William H. Prescott (2006). History Of The Conquest Of Peru. BiblioBazaar. ISBN 1-4264-0042-X. - Jared Diamond: Guns, Germs, and Steel: The Fates of Human Societies. W.W. Norton & Company, March 1997. ISBN 0-393-03891-2 - Felipe Guamán Poma de Ayala: El primer nueva corónica y buen gobierno. Det Kongelige Bibliotek - Kim MacQuarrie: The Last Days of the Incas. Simon & Schuster, 2007. ISBN 978-0-7432-6049-7. - Michael Wood: The Conquistadors. 2002 PBS
<urn:uuid:f85df1b4-2061-43a7-a488-d771e24ee456>
CC-MAIN-2021-31
https://gateway.ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/Battle_of_Cajamarca.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152144.92/warc/CC-MAIN-20210726183622-20210726213622-00081.warc.gz
en
0.94172
3,577
3.453125
3
From UPSC perspective, the following things are important : Prelims level : EC Act Mains level : Regulation of essential commodities As the Union government announced massive reforms as a response to the coronavirus pandemic. All attention went to three agriculture sector ordinances related to farmers’ trade, contract farming and amendments in the Essential Commodities Act. Try this question for mains: Q.Discuss how Essential Commodities Act works to maintain fair prices of commodities for consumers. Recent amendment to the EC Act - Recently, the Centre notified an Amendment Ordinance to the EC Act. - A new sub-section 1A in Section 3 of the act stipulated control orders — with respect to the supply of certain foodstuffs was added. - It would be issued only under extraordinary circumstances that may include war, famine, extraordinary price rise and natural calamity of grave nature. An order for regulating stock limit of any agricultural produce may be issued only if there is: - A full increase in the retail price of horticultural produce, or - A 50 per cent increase in the retail price of non-perishable agricultural food items over the price prevailing immediately preceding a year or the average retail price in the past five years, whichever is lower The Essential Commodities Act - The EC Act, 1955 was enacted at a time when the country faced an acute shortage of several commodities, especially food items. - Under the act, an ‘essential commodity’ is a commodity specified under the schedule of the Act. - The Union government is empowered to amend the schedule to add or remove a commodity to said schedule in the public interest and in consultation with state governments. - The schedule was amended recently in March 2020, when the Centre declared face masks and hand sanitisers as essential commodities and fixed their prices. Issues over the amendment ordinance: 1. Ordinance route and federalism - Though agriculture is a state subject, the concurrent list empowers the Centre to legislate on production and trade and supply of foodstuffs. - By taking the ordinance route, a clear attempt was made to bypass the parliamentary process. - When a proposed amendment is introduced in Parliament, it is open to debate, scrutiny, comments and valuable inputs from stakeholders before being passed. 2. Surpassing concerns - Critical legislation like this should certainly have been put before Parliament. - The Sarkaria Commission report on Centre-state relations pointed out that the Centre disproportionately empower itself in the sphere of agriculture. - The power of the Centre in agriculture management has certainly increased through this ordinance. - States like Tamil Nadu and West Bengal have repeatedly called for transfer such entities from the Concurrent to the State list. 3. Constitutional validity and Ninth Schedule - The constitutional validity of price fixation under the act was in question before the Supreme Court in the Prag Ice and Oil Mills case, 1978. - It was observed that the dominant purpose of price fixation was to ensure availability of essential commodities to consumers at a fair price. - It was also held that availability of an essential commodity to the common man, at a fair price, must rank higher than any other consideration. - The Essential Commodities Act is enlisted under the Ninth Schedule of the Constitution. This does not, however, mean it is outside the scope of judicial review. 4. EC Act is no exception - The Ninth Schedule came under scrutiny after the landmark IR Coelho, 2007 judgement. - The Supreme Court said the laws inserted in it after April 24, 1973 — the day the Kesavananda Bharti verdict was pronounced — are also open to judicial review if they are violative of the basic structure of the Constitution. - Farmers may approach the Supreme Court if they feel laws such as the Essential Commodities Act violate their fundamental rights under Articles 14, 19, 21 or 32. 5. Questions over the amendment - The ordinance does not expressly define ‘extraordinary circumstances’, which ‘may’ include war, famine, extraordinary price rise and natural calamities of a grave nature. - Even in extraordinary circumstances, the government only ‘may’ choose to exercise regulation. - Such legislative ambiguity makes one question the entire exercise of introducing this particular provision. 6. Farmers stake are still at risk - Drastic changes such as the removal of stock limits and exemption to exporters, traders and value chain participants may not help farmers directly. - Big corporates and MNC may prefer to stock up their quota at the time of harvest when prices are low and, thus, would not need to buy from farmers when prices rise. - If farmers decide to retain produce for later, prices may not go up or the private sector may not enter the market to purchase. - India no longer faces food shortage problems, according to the Economic Survey, 2020. - What is seemingly ignored, however, is the population of India increased to 1.3 billion in 2020 from 360 million in 1951. - There are more mouths to feed and the responsibility of ensuring food security to the masses cannot be shunned. - Sights of migrants scraping for morsels of food during the COVID-19 crisis continue to haunt. - Our policies, thus, must ensure sustainable farm growth taking into consideration factors like climate change, land holdings, consumer capacity and farmers’ interests.
<urn:uuid:5cd742c4-25d5-4fd9-9d86-c86881279d00>
CC-MAIN-2022-21
https://www.civilsdaily.com/news/essential-commodities-amendment-ordinance-a-strong-ec-act-is-still-needed/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517245.1/warc/CC-MAIN-20220517095022-20220517125022-00669.warc.gz
en
0.930757
1,167
3.21875
3
Gait Re-education in Parkinson's Disease - 1 Introduction - 2 Typical gait pattern in Parkinson's Disease (PD) - 3 Pathophysiology - 4 Physiotherapy Management - 5 References Parkinson's Disease (PD) is a progressive neurodegenerative movement disorder caused by a lack of dopamine production in the substantia nigra. The cardinal features of this disorder include bradykinesia, gait disturbance, rigidity and tremor. Impairments of balance and postural stability likely contribute to the increased risk of falls and fractures found in this patient population . In response to perturbations of balance with backward waist pull, individuals with PD demonstrate differences in weight shift, use a modified ankle joint motion before lift-off and land with weight shifted posteriorly compared with healthy age-matched controls . Typical gait pattern in Parkinson's Disease (PD) - hypokinesia (decreased step length with decreased speed) - decreased coordination - festination (decreased step length with increased cadence) - freezing of gait (the inability to produce effective steps at the initiation of gait or the complete cessation of stepping during gait) - difficulty with dual tasking during gait Coupled with these gait impairments are an increased risk and rate of falling. Increased probability of falls not only increases the risk of injury such as hip fracture but also affects an individual's independence and ability to interact within the community. Additionally, fear of falling has psychological consequences and can lead to self-isolation and depression. The changes in gait kinematics include changes in excursion of the hip and ankle joint. Instead of a heel-toe progression, the patient may have a flat-footed or, with disease progression, a toe-heel sequence. The patient with PD appears to have lost the adult gait pattern and is using a more primitive pattern. The flat-footed gait decreases the ability to step over obstacles or walk on carpeted surfaces. The use of three-dimensional gait analysis has shown a decrease in plantar flexion at terminal stance. Changes are also seen in hip flexion, which may alter ankle excursion. However, qualitative aspects of the timing of joint excursion appear intact. One hypothesis is that festinating gait is caused by the decreased equilibrium responses. If walking is a series of controlled falls and if normal responses to falling are delayed or not strong enough, then the individual will either completely fall or continue to take short, running-like steps. The abnormal motor unit firing seen with bradykinesia may also be the cause of ever-shortening steps. If the motor unit cannot build up a high enough frequency or if it pauses in the middle of the movement, the full range of the movement would decrease. In walking this would lead to shorter steps. Festination may also be the result of other changes in the kinematics of gait. Horak et al (1992) demonstrated coactivation (activation of muscles on both sides of the body) resulting in stiffening of the body and is a very insufficient strategy for the recovery of balance. A study by Reuter et al (2011) demonstrated improvement in 12 m and 24 m Webster Walking tests following flexibility exercises and relaxation training. The training focused on stretching, improving balance and range of movements, thrice a week for six months. However, there was more significant improvement in the walking group (warming up, technique training, endurance training and cooling down) and even more significant improvement in nordic walking group. This indicates task specific approach for better results. The systematic review by Lima et al (2013) suggested that progressive resistance exercise can be effective and worthwhile in people with mild to moderate PD but carryover of benefit does not occur for all measures of physical performance. The current evidence suggests that progressive resistance training should be implemented in PD rehabilitation, particularly when the aim is to improve walking capacity. Another review by Tambosco et al (2014) access the efficacy and the limits of aerobic training and strength training included in physical rehabilitation programs and to define practical modalities in the field of PD management. In this review, five literature reviews and 31 randomised trials were selected. The authors concluded that there is evidence that aerobic and strength training improve physical abilities of patients suffering from PD. It is emphasized that exercise training improves aerobic capacities, muscle strength, walking, posture and balance parameters. Rehabilitation programs should begin as soon as possible, last several weeks and be repeated. They should include aerobic training on bicycle or treadmill and a muscle strengthening program. A prospective interventional cohort study by Mhatre et al (2013) assessed the effect of exercise training by using the Nintendo Wii Fit video game and balance board system on balance and gait in adults with PD. The authors conclude that an 8-week exercise training class by using the Wii Fit balance board improved selective measures of balance and gait in adults with PD. However, no significant changes were seen in mood or confidence regarding balance. A single-blind, randomized controlled clinical trial was conducted in china in 2013 by Gu et al to determine the effect of PD-weight bearing exercise for better balance (PD-WEBB) exercise on balance impairment and falls in people. The authors conclude that PD-WEBB training can significantly improve the balance impairment and quality of life to prevent falls. PD-WEBB training is suitable for PD patients in China and is a reasonable, effective and sustainable training of family and community assessment model. External cues can be auditory or visual. Attentional strategies are consciously concentrating on a specific aspect of gait. By using cueing and attentional strategies the defective basal ganglia are bypassed. They no longer automatically have to control the movement as it has now become a cognitive task. A systematic review of 24 studies showed that there is strong evidence that auditory cueing increased speed but there was insufficient evidence for visual and somatosensory cueing . A pilot study by Rodriguez et al (2013) determine the effects of an aquatic-based physical exercise program on gait parameters of patients with PD. A total of nine patients diagnosed with idiopathic PD (stages IIII according to the Hoehn and Yahr scale) carried out an aquatic physical exercise program which lasted for five months with one session per week. At the end of the program, significant improvement in walking speed, stride length and on the relationship between single and double support time (p < 0,05). Although improvements in all tested ranges of motion were obtained, these did not reach statistical significance. Literature review by Earhart and Williams (2012) focused on the research question 'Can treadmill training improve the gait of individuals with Parkinson disease?'. The authors reviewed 8 randomised control trials and randomised contolled crossover trials. Based on the results of this systematic review, they concluded that treadmill training is safe and appropriate for some individuals with mild to moderate PD. These individuals must have the cognitive and physical ability to utilize the treadmill, must understand and use the necessary safety precautions, and have adequate supervision as needed. Treadmill training can be expected to result in improvements in gait speed, stride length and walking distance. Treadmill training does not appear to influence cadence but this finding should not be viewed negatively. The maintenance of cadence following treadmill training, in conjunction with increased stride length, results in faster gait speed which is a positive outcome. The review does not include information to support or refute the effects of treadmill training on other aspects ofgait, such as dual task walking and decreased coordination. In addition, treadmill training may not address reduced arm swing, which is commonly seen in people with PD, as arm swing is limited during treadmill training through use of handrails. Furthermore, generalizability of treadmill training may be limited, as the studies that were reviewed excluded individuals with a history of cognitive, depressive, cardiovascular or orthopedic conditions. Dual Task gait training Difficulty performing more than one task at a time (dual tasking) is a common and disabling problem experienced by people with PD. If asked to perform another task when walking, people with PD often take shorter steps or walk more slowly. A study by D'souza et al (2014) investigated whether treadmill training can improve the performance of gait on dual tasking in people with PD. Three individuals were evaluated in the on-phase of the antiparkinsonian medication regarding the kinematics (Qualisys Motion Capture System) while in gait, simultaneously performing cognitive activities. Subsequently, the subjects performed a 20-minute workout on the treadmill and were reassessed during gait in cognitive activities. There were increases in the length of the cycle (p=0.01), the length of the step (p=0.01) and in total swing time (p=0.03), and a decrease in the total length of support (p=0.03). These results indicate that treadmill training can promote improvement in the performance of dual tasking on gait in individuals with PD. RoboticsA pilot study by Lo et al (2010) examined the potential effect of continuous physical cueing using robot-assisted sensorimotor gait training on reducing freezing of gait episodes and improving gait. Four individuals with PD and FOG symptoms received ten 30-minute sessions of robot-assisted gait training (Lokomat) to facilitate repetitive, rhythmic and alternating bilateral lower extremity movements. All participants showed a reduction in freezing both by self-report and clinician-rated scoring upon completion of training. Improvements were also observed in gait velocity, stride length, rhythmicity and coordination. - Bennett DA, Beckett LA, Murray AM, et al. Prevalence of parkinsonian signs and associated mortality in a community population of older people. N Engl J Med. 1996;334:71–76 - Johnell O, Melton LJ, III, Atkinson EJ, O’Fallon WM, Kurland LT. Fracture risk in patients with parkinsonism: A population-based study in Olmsted County, Minnesota. Age Ageing. 1992;21:32–38. - McVey MA, Stylianou AP, Luchies CW, et al. Early biomechanical markers of postural instability in Parkinson’s disease. Gait Posture. 2009;30:538–542 - Belal Alsabek. Parkinsonian Gait Demonstration. Available from: http://www.youtube.com/watch?v=j86omOwx0Hk [last accessed 09/09/16] - Gray P, Hildebrand K. Fall risk factors in Parkinson's disease. J Neurosci Nurs. 2000;32:222–228 - Morris M, Iansek R, Galna B. Gait festination and freezing in Parkinson's disease: pathogenesis and rehabilitation. Mov Disord. 2008;23:S451–S460 - Plotnik M, Giladi N, Hausdorff JM. Bilateral coordination of gait and Parkinson's disease: the effects of dual tasking. J Neurol Neurosurg Psychiatry. 2009;80:347–350 - Yogev G, Plotnik M, Peretz C, et al. Gait asymmetry in patients with Parkinson's disease and elderly fallers: when does the bilateral coordination of gait require attention? Exp Brain Res. 2007;177:336–346 - Bloem BR, Hausdorff JM, Visser JE, Giladi N. Falls and freezing of gait in Parkinson's disease: a review of two interconnected, episodic phenomena. Mov Disord. 2004;19:871–884 - Reuter, I., Mehnert, S., Leone, P., Kaps, M., Oechsner, M and Engelhardt, M. (2011). Effects of a Flexibility and Relaxation Programme, Walking, and Nordic Walking on Parkinson’s Disease. Journal of Aging Research, 2011, 232473. doi:10.4061/2011/232473 - Physical Therapist Assistant. Parkinson's Disease Gait Training. Available from: http://www.youtube.com/watch?v=v008VgRgJt8 [last accessed 09/09/16] - Lidiane Oliveira Lima, Aline Scianni and Fátima Rodrigues-de-Paula ;Progressive resistance exercise improves strength and physical performance in people with mild to moderate Parkinson's disease: a systematic review ;Journal of Physiotherapy,Volume 59,Issue 1 , 7 - 13.fckLRDOI: http://dx.doi.org/10.1016/S1836-9553(13)70141-3 - Tambosco L,Percebois-Macadré L,Rapin A, Nicomette-Bardel J, Boyer FC ;Effort training in Parkinson's disease: a systematic review.Ann Phys Rehabil Med. 2014 Mar;57(2):79-104. fckLRdoi: 10.1016/j.rehab.2014.01.003. - Clare's Fitness Pages. Parkinson's Exercises Balance. Available from: http://www.youtube.com/watch?v=Zdmuaexs9kY [last accessed 09/09/16] - Mhatre PV, Vilares I, Stibb SM, Albert MV, Pickering L, Marciniak CM, Kording K, Toledo S.fckLRWii Fit balance board playing improves balance and gait in Parkinson disease.PM R. 2013 Sep;5(9):769-77. fckLRdoi: 10.1016/j.pmrj.2013.05.019. - Gu S,Song Z,Fan X,Chen R,Zheng W,Yan W ;Effect of PD-WEBB training on balance impairment and falls in people with Parkinson's disease;Zhong Nan Da Xue Xue Bao Yi Xue Ban. 2013 Nov;38(11):1172-6. doi: 10.3969/j.issn.1672-7347.2013.11.015. - The Lancet TV. Freezing of gait. Available from: http://www.youtube.com/watch?v=3-wrNhyVTNE [last accessed 09/09/16] - Lim, I., Van Wegen, E., de Goede, C., Deutekom, M., Nieuwboer,A., Willems, A., Jones, D., Rochester, L and Kwakkel.G. (2005) 'Effects of external rhythmical cueing on gait in patients with Parkinson's Disease: a systematic review', Clinical Rehabilitation, 19(7), 695-713 - Rodriguez P , Cancela JM, Ayan C, do Nascimento C, SeijoMartínez M.Effects of aquatic physical exercise on the kinematic gait pattern infckLRpatients with Parkinson's disease: a pilot study:Rev Neurol. 201 3 Mar 1 6;56(6):31 520. - physicaltherapyvideo. How to Help Parkinson's Freezing Episodes: 3 Great Tips. Available from: http://www.youtube.com/watch?v=VwUoAMAis1g [last accessed 09/09/16] - Gammon M. Earhart, April J. Williams:Treadmill Training for Individuals With Parkinson Disease;Phys Ther. 201 2 Jul; 92(7): 893–897.fckLR doi: 1 0.2522/ptj.201 1 0471 - Sousa Angélica Vieira Cavalcanti de, Santiago Lorenna Marques de Melo, Silva Raphaella Elias de Oliveira da, Oliveira Daniel Antunes de, Galvão Élida Rayanne Viana Pinheiro, Lindquist Ana Raquel Rodrigues. Influence of treadmill training in dual-task gait in people with Parkinson's Disease: a case report. Fisioter. Pesqui. [serial on the Internet]. 2014 Sep [cited 2015 Mar 03] ; 21( 3 ): 291-296. Available from: http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1809-29502014000300291&lng=en. http://dx.doi.org/10.590/1809-2950/60221032014. - Albert C Lo , Victoria C Chang , Milena A Gianfrancesco , Joseph H Friedman, Tara S Patterson ,Douglas F Benedicto ;Reduction of freezing of gait in Parkinson’ s disease by repetitive robot-assisted treadmill training: a pilot study ;Journal of NeuroEngineering and Rehabilitation 2010, 7:51
<urn:uuid:f357ca76-55b9-4669-9704-407cb130bbfc>
CC-MAIN-2019-43
https://physio-pedia.com/Gait_Re-education_in_Parkinson%27s_Disease
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986654086.1/warc/CC-MAIN-20191014173924-20191014201424-00512.warc.gz
en
0.887528
3,546
2.84375
3
Critical thinking is the ability to think clearly and rationally about what to do or what to believe. It includes the ability to reflect and think independently. These skills enable us to understand the logical connections between ideas, identify, construct and evaluate arguments, solve problems systematically besides being able to reflect on one’s own beliefs and values. These are the skills that also enable us to take a well thought out and informed decisions. Learning to think critically is one of the most important skills that the children will need in future and hence need to be developed right from a young age. It is important for parents and teachers of preschoolers to enable the child to think critically. Though there is no one way to teach these skills, guiding the child to think critically improves her problem-solving ability. To build a foundation for critical thinking we need to provide them ample opportunities for play. Children need to explore ‘cause and effect’. Opportunities for open-ended play e.g. pretend play, indoor and outdoor space give a chance to children to try out something and see the result. The child also has the freedom to try something different and see if yields a new result. It is important that the adults do not intervene too soon. If needed they should ask open-ended questions again providing an opportunity to the child to think, reflect and evaluate. We need to encourage children to develop hypotheses by asking questions like, “If we do this, what do you think will happen?” or “Let’s predict what we think will happen next.” By allowing them to think differently, we also help them develop problem-solving skills and enhance their creative thinking. It also provides an opportunity to learn that there may be more than one way to solve a problem and they chose the way that helps them the most. Critical thinking often happens when children have time to practice making choices, plan their time, or create from nothing. Taking time to allow your child to navigate problems is integral to developing your child’s critical thinking skills in the long run. These are the skills they will require to select the subjects they want to study further, the profession they want to pursue and will help them to take all important decisions in their life.
<urn:uuid:7bea3127-c963-4e3c-865c-dce910c7db6b>
CC-MAIN-2021-10
https://www.indibeam.com/Critical-Thinking-Skills-In-Pre-Schoolers-1525174747
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369721.76/warc/CC-MAIN-20210305030131-20210305060131-00320.warc.gz
en
0.959967
458
4.59375
5
Discovering ABA Form West High School TI:ME Technology Areas Addressed: Electronic Musical Instruments Electronic Keyboard, Computer Station, Play Back Ability, Notation Software Prior Knowledge and Skills: Some students with basic piano skills and basic notation software skills. All students should be familiar with AB Form. NAfME Standards of 1994 Addressed: NAfME Standards of 1994: Composing and Arranging Music within specified guidelines. NAfME Standards of 1994: Reading and notating music. NAfME 2014: Creating NAfME Standards of 1994: Listening to, analyzing and describing music. NAfME 2014: Responding A teacher generated handout with simple melodies in ABA Form and AB Form using notation software. 1. Students will be able to analyze simple melodies on handouts to determine repeating and contrasting sections. 2. Students will be able to label contrasting musical sections with the letters “A” and “B”. 3. Students will be able to aurally identify contrasting sections in simple melodies. (Pass out musical examples to performers prior to lesson day to practice if needed) 1.The students will analyze simple melodies on handouts to determine when repeating and contrasting sections occur. 2. The students will label contrasting musical sections with the letters “A” and “B”. Not all examples may be in ABA form. 3. Students with piano skills will play musical examples that have been identified as ABA form. 4. Non-performing students in the class will raise their hand when they heard contrasting sections. Students will be prompted as whether it is a similar or contrasting section. 5. The example will be played multiple times while the students follow the example on the handout noting the different sections. 6. Teacher lead discussion will follow about the number of measures in each section and how each section appears. 7. The teacher will play a short musical recording in ABA Form that uses full orchestra, band or chorus. 1. Teacher will review each student’s handout. 2. Teacher will monitor visually the students’ response during ABA examples. 3. Teacher will re-teach ABA concept in future classes. 1. Use different timbres from the electronic keyboard for the different sections of the melodies. 2. Review AB Form. 3. Have non-performers stand when they hear contrasting sections in the music. 4. Have students write and perform their own ABA melodies. 5. Set up a rhythm track under the melodies and vary the timbres in each contrasting section. Items to Purchase: The teacher should have an electronic keyboard, a CPU and a notation program such as Finale NotePad (free download).
<urn:uuid:73bd6a9b-b8f9-4b4e-a048-209da0058bd1>
CC-MAIN-2023-40
https://ti-me.org/discovering-aba-form-1/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508977.50/warc/CC-MAIN-20230925115505-20230925145505-00065.warc.gz
en
0.830644
646
4.21875
4
Intradermal allergy testing is another method of skin testing to help determine whether an individual is allergic to a specific allergen. The test involves injection of a small amount of the suspected allergen under the surface of the skin. After about 20 minutes the area is examined for a reaction at the site. A typical reaction looks like a small hive with swelling and redness. The intradermal test is more sensitive than the skin prick test and can usually provide more consistent results. |Review Date: 7/17/2007| Reviewed By: Donald Accetta, MD, MPH, President, Allergy & Asthma Care, PC, Taunton, MA. Review provided by VeriMed Healthcare Network. The information provided herein should not be used during any medical emergency or for the diagnosis or treatment of any medical condition. A licensed medical professional should be consulted for diagnosis and treatment of any and all medical conditions. Call 911 for all medical emergencies. Links to other sites are provided for information only -- they do not constitute endorsements of those other sites. © 1997- A.D.A.M., Inc. Any duplication or distribution of the information contained herein is strictly prohibited.
<urn:uuid:d658145a-0216-40f1-9205-ec4e770c25e0>
CC-MAIN-2015-32
http://www.wdhospital.com/body.cfm?xyzpdqabc=0&id=11&action=detail&AEArticleID=19345&AEProductID=Adam2004_1&AEProjectTypeIDURL=APT_2
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988860.4/warc/CC-MAIN-20150728002308-00110-ip-10-236-191-2.ec2.internal.warc.gz
en
0.897322
243
3.109375
3
Take some thick oyster shells, wash them, and calcine by keeping them red hot in an open fire for half an hour: then, select the clearest and whitest parts, and reduce them to powder. Mix three parts of this powder, with one of the flour of sulphur; fill a crucible with this compound, pressing or beating it down as hard and solid as may be, without breaking the crucible. Set the crucible in the fire, and heat it moderately at first, but increase the heat gradually for an hour, in which time it must approach nearly to a white heat. Then let it cool, and again select from the mass, the whitest and purest parts, which must be preserved in a phial with a glass stopper. This powder has the peculiar property of imbibing the rays of the sun in the day time, and emitting them again in the night; or if the phial containing it, be exposed for a few minutes to the direct rays of the sun and then carried into a dark room, light enough will be evolved to render it distinctly visible.
<urn:uuid:ad480eb1-7f9e-4088-b8c3-e1bdcdba4744>
CC-MAIN-2017-30
https://formulapot.com/formulas/to-make-a-dry-phosphorescent-powder
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424945.18/warc/CC-MAIN-20170725002242-20170725022242-00377.warc.gz
en
0.945417
225
2.9375
3
|search Mr. R.'s world of math and science free and accessible educational resources for all| Nose Poem: sense of smell If you smell, The nose is the organ responsible for the sense of smell (or olfaction). Fish have noses and do posess a sense of smell, but breathe through their gills, not their nostrils. Dogs have a highly developed sense of smell. It is believed dogs can smell anywhere from 1,000 to 10,000 times better than humans. Elephants have a very special nose- it makes up part of their trunk, which they can use for many purposes including eating, protection, and for sucking up water that they can spray into their mouths or over their bodies.
<urn:uuid:b124a284-f968-4c44-b2af-31137eafb730>
CC-MAIN-2014-23
http://sciencepoems.net/sciencepoems/nose.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997869720.10/warc/CC-MAIN-20140722025749-00021-ip-10-33-131-23.ec2.internal.warc.gz
en
0.970624
155
3
3
Melanoma and neural system tumor syndrome is an extremely rare tumor association characterized by dual predisposition to melanoma and neural system tumors (typically astrocytoma; see this term). Prevalence and incidence rates are not known. Fewer than 20 affected families have been reported to date. Cases have been reported from France, Italy, the UK and the USA. In reported families, affected individuals had cutaneous melanoma in association with dysplastic nevi, astrocytoma, benign or malignant peripheral nerve sheath tumor, neurofibroma, medulloblastoma, glioblastoma multiforme, ependymoma, glioma, and meningioma (see these terms). In some cases, melanoma was described first followed by nervous system tumors, and in other cases, melanoma was a secondary cancer. The etiology of this tumor association is unknown. Genetic mutations or germline deletions are thought to underlie this cancer susceptibility syndrome. Male-to-male transmission was reported in one family but inheritance patterns are not clearly characterized. The increased risk appears to be found in both first- and second-degree relatives. Last update: March 2015
<urn:uuid:491941a7-66b0-432a-9818-0f719697a18a>
CC-MAIN-2015-48
http://www.orpha.net/consor/cgi-bin/OC_Exp.php?lng=EN&Expert=252206
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398445080.12/warc/CC-MAIN-20151124205405-00186-ip-10-71-132-137.ec2.internal.warc.gz
en
0.943864
250
2.609375
3
ARCHIVED - USQUE AD MARE A History of the Canadian Coast Guard and Marine Services by Thomas E. Appleton This information has been archived because it is outdated and no longer relevant. Information identified as archived on the Web is for reference, research or recordkeeping purposes. It has not been altered or updated after the date of archiving. Web pages that are archived on the Web are not subject to the Government of Canada Web Standards. As per the Communications Policy of the Government of Canada, you can request alternate formats by contacting us. In the long catalogue of mans adventure on the sea, nothing has exceeded the hardihood of the Newfoundland seal hunters. Whatever be the merits of the current controversy surrounding sealing, time was when the existence of many families in Newfoundland depended on the exertions and courage of their men in pursuit of seals. In three months of ever present danger between March and June, thousands put to sea in sailing ships or low powered steamers, crowded together in wretched conditions, eager to hunt the rough ice fields north of Newfoundland as the seals came south to bear their young. The wooden walls of Newfoundland. The sealing fleet at the ice edge. (Pacific Archives) Sometimes men would walk a hundred miles or so from out ports and inland settlements, to be advanced a few dollars for an outfit from the owners of some vessel which, little bigger than a coaster, would fill 150 berths before leaving Conception Bay or the harbour of St. Johns for the ice edge called the front. These men had much at stake; leaving wife and family to keep house and hearth together in the bitter winds of winter and early spring, the gamble was to earn enough to tide them over, in the simplest necessities of life, until the inshore fishing or the prospects of a few brief months of summer work. The rewards, if lucky, might run to the modest wages of country life. All nursed a hope for better, though often the voyage would bring little more than would cover the advance. Some there were, every year, who never did come back. The masters of the sealing ships, shrewdest gamblers of them all, pitted their skill and courage and scanty savings in a business where none could lead who had not followed; in the art of handling wooden ships in northern seas and ice, they were supreme. Many Newfoundlanders played a part in the development of the eastern Arctic, not only as owners, masters and crew of the whalers and sealers which pushed the boundaries of the sea industry far beyond the borders of civilization, but also as we have seen, in ships such as the Neptune, chartered from Job Bros. of St. Johns, which introduced the administration of Canadian sovereignty in the North. In the western Arctic which, by reason of the vast distances and the tremendous pressure of polar ice in the Beaufort Sea and Arctic Ocean, was a tougher proposition, Canadian involvement began a decade later. It was left to Stefansson, greatest Canadian name in exploration, to fill this gap. Vilhjalmur Stefansson was born at Armes, Manitoba, in 1879 and became a Harvard anthropologist. By 1913, when he left on a Canadian government expedition which entailed the longest sojourn of white men living in the Arctic entirely from natural resources, Stefansson was the leading authority on the ethnology and anthropology of the North and had discovered Eskimo groups who had not seen a white man for half a century. A firm believer that men could live in relative sufficiency from seals as food and fuel, he engaged a Newfoundland sealing captain with a brilliant record in Arctic exploration, Captain Bob Bartlett, to command the ship from which he based his journey. Born at Brigus in Conception Bay, Robert Abram Bartlett came of a line of Arctic shipmasters and was brought up in the hard school of fishing and sealing before taking to the British merchant service as a career. In 1898, with a brand new masters ticket burning a hole in his pocket, he forsook the immediate chances of command to sign on as mate with his Uncle Sam, Captain S. W. Bartlett, then master of Peary's exploration ship Windward. Peary, who had previously attempted to reach the Pole by journeying across the Greenland ice-cap, was then commencing a period of arduous probing by ship as far as possible up the east coast of Ellesmere Island, from whence he proposed to commence sledging. Like Stefansson, Peary based his operations on Eskimo methods and had learned to support himself and his dogs on long foot journeys in very low temperatures. In this phase Bartlett remained a ships officer but, working with the indomitable Peary for four long years of hard endeavour, and soaking up an intensive knowledge of Eskimo habits, he became firmly committed to the lure of Arctic exploration and to service with the great American leader. Captain Robert A. Bartlett. This photograph was taken on board the U.S. Coast Guard Cutter Bear after Captain Bartlett had completed his march of 700 miles in 37 days from the camp on Wrangel Island. In 1905, Captain Bartlett was appointed to command the Roosevelt, a vessel then specially fitting out for Peary, which continued the Polar survey without success until 1908 when the ship again sailed from New York on the voyage which would bring triumph. By this time Bartlett was not only master of the Roosevelt but a hardy and accomplished Arctic traveller who would play a great part, by sledging supplies to 87º 47 North, in Peary's victory in reaching the North Pole with Henson and his Eskimo hunters in 1909. For this achievement Captain Bartlett was awarded the Hubbard Medal of the National Geographic Society and became recognised internationally as an explorer. The Hubbard Medal, which has been awarded 23 times in 62 years, was established in honour of Gardiner Greene Hubbard, first president of the society. Originally presented to Peary in 1906, other winners were Amundsen, Byrd and the Lindbergh's and, in more recent times, astronaut John H. Glenn and the conquerors of Mount Everest, Sir Edmund Hillary and Sherpa Tenzing Norgay. Lost in the ice 80 miles from Wrangel Island in the Canadian Arctic Expedition of 1913. In the Stefansson expedition of 1913, the object was to find out whether a new continent existed north of Alaska and the Beaufort Sea. The plan envisaged sailing north along the 141st meridian until land was discovered or progress was interrupted by ice. A base was then to be established with a view to surveying eastwards towards the southwest corner of Prince Patrick Island or, failing that, the west coast of Banks Island. As a secondary objective, the expedition would test certain theories on Arctic drift and current. Both these objectives were attained, although hardly along the lines projected, as Stefansson ultimately discovered new land and much was learned about ocean drift. The expedition had been financed originally by the National Geographic Society, but as the territory to be explored was wholly within the bounds of Canada, the Society relinquished its direction of the enterprise at the request of the Canadian government who placed it, for administrative purposes, under the Department of the Naval Service. The Naval Minister, the Hon. J. D. Hazen, was also the Minister of Marine and Fisheries. By the time that Captain Bob had accepted the command of Stefansson's ship, the vessel had been chosen and was fitting out in the Naval Dockyard at Esquimalt. Built at San Francisco as a carrier for the Alaska salmon fisheries in 1884, the Karluk was a wooden brigantine with a steam compound engine. Although she had been strengthened for service in ice, she was in no way equivalent to the wooden walls of Newfoundland to which Bartlett was accustomed and, with some inward reservations about his ship, the new captain took train for Ottawa and Victoria. Sailing from Esquimalt on June 17, 1913, the Karluk had on board a large and well equipped scientific staff, among them leading men of the day in their various specialties, some of whom were well experienced in the Arctic or Antarctic. Once through the Bering Straits the ship ran into ice sooner than had been expected and, by the middle of August, it was doubtful whether she would reach Herschell Island and certain that there would be no prospect of steaming northwards that year. On September 20 with the Karluk fast in the ice off the mouth of the Colville River, Stefansson left the ship on foot with a shore party, the intention being to stock up with a supply of fresh caribou meat Stefansson's men never suffered from scurvy and to contact Eskimos who might wish to join the expedition as hunters. The leader expected to be away for ten days or so and left written orders for Bartlett in his absence. In fact it would be five years before Stefansson returned to civilization. Within a couple of days of this departure, strong easterly winds carried the Karluk, still fast in extensive ice fields, towards the west and, by the beginning of October, the vessel was off Point Barrow and drifting offshore into deep water. Although Stefansson and Bartlett had made plans for this eventuality, the rate of drift was much faster than had been expected and it became certain that, for better or for worse, Stefansson was now started on his northern journey on foot much sooner than had been intended, and from a starting point much further South. As for the ship, Captain Bartlett well knew that few vessels of the day, let alone the little Karluk, were likely to last long in the intensive pressures of ocean ice which, subject to no restraint from land, was now forced into tortuous ridges which gave way with shattering fractures under enormous shear forces. With this grim prospect in the minds of all, but in good spirits under their stout-hearted captain, Christmas and New York were celebrated with good cheer and all hands resolved to make the best of things. As a precaution against accidental fire in the ship, as well as a safeguard against her crushing, supplies were placed on the ice and equipment assembled. At 7:30 p.m. on January 10, there came a sound of splitting and crashing from the engine room and, squeezed in a vice-like grip, pipes and pumps began to break asunder as the bottom and side timbers splintered upwards. It was time to abandon ship. Supported by the closing ice the wreck remained above the surface as preparations continued throughout the night and in the following day. At 4:00 p.m. on January 11, 1914, Captain Bartlett set his phonograph to play the music of Chopin's Funeral March and, hoisting the Canadian Blue Ensign to the main masthead, he stepped over the level rail for the last time. In the continuous darkness of a winters day, the men of the Karluk watched in awe as their ship was slowly engulfed, the floe closing in to snap off the topsail yards before the ensign disappeared forever. Bartlett could only bare his head. There was no despair. Twice before had their captain been shipwrecked, and in his deep under-standing of survival in the Arctic he knew that they were camped on an indestructible ice-floe with igloo, tents, food, fuel and dogs. After thirty-six hours of strain and fatigue, Bob Bartlett turned in, thinking thus, and slept for twelve hours. The temperature, in the Captains words, "was not severe". It was forty below zero and the nearest land, Wrangel Island, lay some eighty miles away. Not all his men were strong enough for continuous sledging and, to reduce the risk, four men were sent off on an advance party to establish caches of food for a larger and later effort. On the 25th, a first glimpse of the sun, absent for three months, peeked above the horizon to encourage hope. Not all the survivors shared their Captains views as to be best means of escape, and some who had served with Shackleton in the Antarctic elected to try for the coast of Alaska direct. Bartlett gave them a proportionate share of dogs and food and, on February 5, Dr. Forbes Mackay of Edinburgh, oceanographer James Murray of Glasgow, anthropologist Dr. Henri Beuchat of Paris, and Able Seaman Stanley Morris, left camp with supplies for fifty days. They were never seen again. On February 10, the shore movement was started in earnest by two parties, each with a sledge and four dogs. It was a nightmare journey in ice of awful roughness, high ridging, impassable debris and temperatures of forty-five and fifty below. After a terrible time all made Wrangel Island on March 12, a barren and mountainous island some eighty miles long; at least, for men who had been months on sea ice, it was solid. The problem now was how to proceed. Some of the party were in bad shape and the group was too big to travel as one. Apart from Bartlett, there were no leaders sufficiently experienced to take the smaller groups. There was nothing for it but to dig in as best they could while their captain, travelling light, made for the Siberian Coast. On March 18, with his faithful Eskimo, Katiktovick, for sole companion, Captain Bartlett set out to cross the 110 miles between Wrangel Island and Siberia. They had food for forty-eight days, a somewhat lesser quantity for their seven dogs, and one sledge. This journey, from its commencement in a howling blizzard of drifting snow, across moving sea ice which cracked and opened constantly, sometimes right through their tent, was difficult beyond belief. Once the two men ate raw polar bear meat, freshly killed; always they suffered agonies of acute pain from snow blindness and cold. In addition, the brave Eskimo was distressed from a deep seated conviction, false as it turned out, that the Siberian Eskimos were hostile to his tribe and would kill him. At last, on April 4, they stepped on land again to be received kindly by a party of Siberian Eskimos. No-one could speak the language of any other, except that of universal friendship, and the little party progressed from one igloo to another, in many stages, until they reached civilization after covering 700 miles in 37 days marching. Crossing to Nome in Alaska, Captain Bartlett eventually returned to Wrangel Island, thanks to the United States Coast Guard who placed their famous ship the Bear, herself a former Dundee built Newfoundland whaler, at his disposal. On September 8, 1914 the survivors were picked up. George Malloch a stratiographer from Yale, Bjarne Mamen the Norwegian forester, and Fireman G. Beddy had been unable to survive the cold and hardships of the eight months which had elapsed since the loss of their ship. Stefansson went on, with various companions, till 1918. In more than five years continuous travelling beyond the Arctic circle, the longest expedition on record, he sledged for months over moving ice living exclusively from nature. On his return he reported that no undue hardships had been met, and that his party could have lived for years on an ice floe. In this period he discovered Borden, Brock, Meighen and Lougheed Islands among others. The survivors of the Karluk went their various ways from Esquimalt at the end of October. Captain Bartlett resumed his seafaring career and commanded United States transport ships in the first world war. Thereafter, he piloted an expedition to the Aleutians in 1928, returning later to cruise extensively in Labrador and Arctic waters in his own fishing schooner Effie M. Morrissey. He died at New York in 1946 after a long and adventurous career. In his short period in command of the Karluk, Bob Bartlett turned disaster into triumph in the finest feat of leadership in Canadian marine history. - Date modified:
<urn:uuid:16309d11-1c38-4eec-943d-58d0e0185931>
CC-MAIN-2017-26
http://www.ccg-gcc.gc.ca/eng/CCG/USQUE_Bob_Bartlett
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320070.48/warc/CC-MAIN-20170623151757-20170623171757-00429.warc.gz
en
0.979814
3,295
3.03125
3
AP European History Course Information AP European History Simplified Course Syllabus This class introduces students to the political, economic, religious, social, intellectual, and artistic trends that shaped Europe from 1450 to the present. Students should acquire knowledge of the basic chronology of events and movements from this period as well as develop the ability to analyze historical documents and express historical understanding in writing. As part of the Advanced Placement program, the course prepares students for the AP European History exam. All students are expected to take the exam. Topics of study are listed towards the bottom of this page. There will be limited issuance of passes to the bathroom and to see other teachers during class time, unless called out by the deans, office staff, or guidance. No bathroom pass will be issued during the first or last 15 minutes of class. There is nothing more important than staying in class and learning. After a call or two to the student's parents, all discipline will be handled by the Deans as set forth by the Polk County Code of Conduct. Students will be expected to respect other people and property at all times. Students are also expected to do their own work to the best of their ability, come to class prepared, and take responsibility for their own actions. If previously informed all tests, quizzes, projects, and assignments missed will be made up and turned in on the day returned. If not previously informed or the assignment was given on the day of absence, one additional day will be added for each day absent to have the assignment completed and turned in. All make-up work is the student's responsibility and should be completed in a reasonable time frame. You, the student, are responsible for checking the website to see what you have missed during your absence. Students choosing to “miss" class to go to the Choice Room for the period a project or an assignment is due, is still required to turn the assignment in on that day. Make-up work is only for students who miss the school day, not the period. So... earning a trip to the choice room, or accidentally missing class, does not excuse you from any assignment given in class that day. Students should not come asking to make-up all work from a grading period because now he or she wants a higher grade. There will be no freebies or bailouts, nor will extra credit be given to improve a grade at the end of a grading period. Click here for grade recovery information. As per the George Jenkins attendance policy, students have 3 school days upon returning to campus to request that their absence be excused. Students are allowed four unexcused absences in a 9 weeks before they will be denied credit for their makeup work. I will be available after school on Wednesdays and Thursdays for make up work or extra help. If you have a low grade, this is the time to fix the problem! Zero class-time will be used to discuss missed work due to an unexcused absence. Choice Room / Discipline action will be taken for the following infractions: -- Lack of respect toward me or others -- Tardies- If the tardy bell has rung, and you are not in class, proceed directly to the choice room unless you have a pass. Electronic Device Policy Rationale: Faculty, staff, and administration consistently observe that electronic devices (primarily cell phones) are a significant deterrent to student achievement. A more enforceable *electronic device policy will greatly eliminate student distractions during class time, will reduce academic dishonesty issues, and will reduce thefts on campus. The proposed policy will enable teachers to engage students in more rigorous academic tasks, with the goal of increasing student achievement. *For the ease of discussion, “electronic devices” will be referred to as cell phones throughout the remainder of this document. However, tablets, personal laptops, mp3 players, etc. will all fall under the same policy. Cell phone/tablet use may occur frequently for classroom educational purposes. Engaging in texting, social media, watching videos, or listening to music during class time is not permitted and will result in disciplinary action. Students shall not charge electronic devices in the classroom. Student should not have headphones on, or earbud in their ears, at any time when they come into class, regardless of whether or not they are plugged in or the electronic device is on. 1. Teachers will receive a supply pencil pouches for their classrooms. These pouches will be placed at every student work center in the classroom. 2. As soon as a student enters his teacher’s classroom for his assigned class period, he must place his cell phone in the pouch and zip it closed. The cell phone is to remain in the pouch, in the possession of the student, for the duration of the class period, or until a time that the teacher instructs the students that they may use their cell phones to complete an assigned instructional task. The cell phone is to be set to silent or turned off in the classroom. 3. Students do not have the option of keeping their cell phones in their pockets/purses/backpacks/etc. 4. It is George Jenkins’ policy that students are not permitted to listen to music, watch personal videos, or play games, consult the time on their phones during the class period, including ENN/Home Room, announcements, the last ten minutes of class, etc. The only time students are permitted to use their phones during the class period is to engage in an academic task, at the behest of the teacher. 5. Students are permitted to access their phones before/after school, at lunch, and during the transition from one class period to the next. 1. If a student refuses to put his phone in the envelope as soon as he enters the classroom, the student will be referred to the Choice Room. 2. If a student takes his phone out of the envelope during the class period without teacher or staff permission, he will be referred to the Choice Room. 3. If a student argues with the teacher/staff or otherwise detracts from the instructional class period due to accessing his electronic device or due to the device ringing/vibrating/etc., the student will be referred to the Choice Room. 4. Students referred to the Choice Room for electronic device infractions will be subject to the same progressive discipline measures as students sent to the Choice Room for other infractions. This room is not the lunchroom. Each assignment is weighted as listed below. Quizzes and Homework 20% Classwork and Daily Focus 20% EOC's and EOY's will count as directed by current county or state policy. AP European History does not currently have an EOC/EOY, but a final/mid term exam will be administered. Finals and mid terms grades will be assessed as per county/school policy. Other classroom procedures will be discussed in class as deemed necessary. AP European History simultaneously: 1. Divides the material into four sections, which we will tackle in two parts accordingly: ◦ 1450–1648 (1450–1556, 1556–1648) ◦ 1648–1815 (1648–1750, 1750–1815) ◦ 1815–1914 (1815–1871, 1871–1914) ◦ 1914–Present (1914–1945, 1945–Present) 2. Explores Six Major Themes: - Interaction of Europe and the World (INT) - Poverty and Prosperity (PP) - Objective Knowledge and Subjective Visions (OS) - States and Other Institutions of Power (SP) - Individuals and Society (IS) - National and European Identity (NI) 3. Develops Four Historical Reasoning Skills: - Skill 1: Contextualization- Understanding the larger context of a document or individual’s actions. - Skill 2: Comparison- Understanding the similarities and differences between different accounts and periods. - Skill 3: Causation- Recognizing causes or effects of a specific historical development or process. - Skill 4: Continuity and Change over Time- Recognizing how continuity and change may both be present in any era. Unit I: A Society Awakens, 1450 – 1556 • Renaissance Society: Political, Economic, Cultural Causes • Major Voices: Machiavelli, Castiglione, Valla, Della Mirandola • Northern and Southern Renaissance Art Works • New Monarchs and Their Tactics (Louis XI, Henry VII, Ferdinand and Isabella) • European Exploration: Causes and Consequences (Columbian Exchange, Price Revolution) • Problems of the • Voices of Reform: Erasmus, More • Luther’s Reformation and the Growth of Protestantism (Calvin, Anabaptists, Henry VIII) • The Revolution in Science: Copernicus Speaks from the Grave • The Empire Strikes Back: The Catholic Church’s Counter Reformation—Jesuits, Trent, Index of Books • Protestant Reformation’s Effect on Daily Life Unit II: The Age of Religious Tension, 1556 – 1648 • Two Key Issues: Absolutism and Religious Uniformity ◦ French Wars of Religion, Bourbon Rule (Henry IV, Louis XIII) ◦ Elizabeth vs. Philip II ◦ The Stuarts vs. Parliament in Great Britain ◦ The Dutch Golden Age ◦ Thirty Years’War • Business: Mercantilism, joint stock, rise of cities • Scientific Inquiry: Kepler, Galileo, Newton, Vesalius, Harvey, Bacon, Descartes • Witch-hunting • Mannerist/Baroque Art Unit III: Society in Transition, 1648 – 1750 • Louis XIV’s Absolutist France • Absolutism in the East: Prussia, Russia, Austria (and not Poland) • Rejecting Absolutism: Great Britain and • Enlightenment Thinkers (Locke, Smith, Montesquieu, Voltaire, Diderot, Rousseau, Beccaria) ◦ Women’s roles in ◦ Enlightened absolutists in Eastern Europe • Rococo and Neo-Classical Art • Compare the lives of the popular classes and the elite class • War of the Austrian Succession/Seven Years’ War • Agricultural Revolution, cottage industry, banking Unit IV: An Age of Revolution, 1750 – 1815 • Industrial Revolution in Great Britain • Issues of Industrialization: Urbanization, Sanitation, Labor Movements • French Revolution ◦ Prelude: Three Estates, Debt, Discontent ◦ 1789 ◦ Moderate achievements: Civil Constitution, Declaration of the Rights of Man, const. 1791 ◦ Radical politics: Republic, Economic Policies, Cultural Revolution, CPS, Thermidor ◦ Napoleon: Child of the Enlightenment or Last Enlightened Despot • Congress of Vienna: Metternich and Unit IV ½: Introduction to the Age of Isms, 1815 – 1830 • Continental Industrialization • Conservatism, Interventionism ◦ Metternich ◦ Burschenschaften, Decembrist Revolts ◦ Tory vs. Whig (Peterloo Massacre) ◦ Greek Revolt • Liberalism ◦ Bentham, Mill, Malthus, Ricardo • Socialism ◦ Saint-Simon, Owen, Fourier • Romanticism ◦ Goethe, Shelley, Friedrich, Delacroix, Beethoven Unit V: An Age of Change, 1830 – 1871 • British Reform 1832 ◦ Factory Acts ◦ Corn Laws Revoked ◦ Chartist Complaints • The Modern (Middle Class City) ◦ City Features • 1848 Revolutions; History Fails to Turn • Louis Napoleon ◦ Economic Reform, Political Stability, Rebuild of Paris (Modern City) • Challenges to conventional thought: Marxist Socialism, Darwinian theory • Crimean War Destroys the Concert System, Allows for Unification Movements • Realist politics ◦ Cavour’s Italian Campaign ◦ Bismarck’s Realpolitik ◦ Hungarian Challenges to Austria; Dual Monarchy ◦ Alexander II’s Reform in Russia • Medical Improvements: Pasteur, Lister • Realist Art and Literature. Unit VI: An Age of Questioning, 1871 – 1914 • Second Industrial Revolution ◦ Economic Changes, Effects on Working Class, Gender Roles ◦ Conditions of the Modern City, Reform Movements • Handling Discontent at Home ◦ Britain: Home Rule for Ireland? ◦ Germany: Kulturkampf, Rise of the Social Democrats ◦ France: Third Republic, Paris Commune, Dreyfuss Affair ◦ Russia: Conservative Rule • Challenging Intellectual Conventions ◦ Atomic Age: Curie, Planck, Einstein ◦ Nietzsche • Impressionist and Post-Impressionist Art • Women’s Rights? Pankhursts, Fawcett, Emily Davison • Jews: Dreyfuss, Herzl • Diplomatic Issues: ◦ Bismarck’s Alliances and the Balance of Power ◦ Bismarck Fired, Wilhelm II’s Rise ◦ Balkan Instability • Imperialism: Motives, Proponents, Opponents, Technological Advantages, Resistance • Russian Revolution of 1905 Unit VII: A Time of Crisis, 1914 – 1939 • Long and Short Term Causes of the Outbreak of WWI • Fighting of WWI (Technology, Tactics) ◦ Total war on the Home Front ◦ Social Causes Shelved (Women’s Rights, Irish Nationalism, Individual Rights) • Versailles Conference and Peace • Russian Revolutions of 1917 ◦ First and Second Revolutions ◦ Bolshevik Consolidation of Power/Civil War ◦ Rules of Lenin and Stalin • Instability of the 1920s ◦ Economic Problems (Depression, Dawes Plan) ◦ Political Uncertainty (Versailles, League Of Nations) ◦ Fragile Coalition Governments Adopted Keynesian Economic Theories ◦ Totalitarian States Emerged (Fascist Italy, Nazi Germany, Franco’s Spain) • Culture of the 1920s (Lost Generation, Dadaism, Surrealism, Bauhaus) Unit VIII: A Time of Tragedy and Triumph, 1938 – 2010 • Aggression and Appeasement—Road to War • Major Events of WWII • Nazi Policies on Race and Conquered Territories ◦ Holocaust • War Conferences: Seeds of the Cold War • US and Soviet Influences on Europe ◦ Truman Doctrine, Containment, Airlift, NATO ◦ COMECON, Warsaw Pact, Iron Curtain politics ▪ Khrushchev’s policies • Decolonization: Algeria, India, Palestine • European Economic Unity • Society post 1945: Feminism, Cradle to Grave Care, Green Parties, Right Wing Movements • Collapse of the Soviet Order (Gorbachev) ◦ Eastern Europe Collapses • Yugoslavia’s Ethnic Issues • Putin’s Rule of Russia • Crisis in the Ukraine
<urn:uuid:43ded7e9-61c1-4c95-8fb2-3d8182de0594>
CC-MAIN-2019-04
https://osieja.weebly.com/ap-euro-course-information.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583661083.46/warc/CC-MAIN-20190119014031-20190119040031-00288.warc.gz
en
0.87694
3,214
2.8125
3
A Platoon is when two players share a position. The most common platoon uses a left-handed batter against right-handed pitching and a right-handed batter against left-handed pitching. Other kinds of platoons, like a good fielder/weak hitter and a weak fielder/good hitter are possible, but it's safe to assume a left/right platoon unless otherwise specified. The key to a traditional left/right platoon is that most batters hit better against opposite-handed pitching than against same-handed pitching. There are several reasons why this is the case. One major reason is that batters have an easier time seeing the ball when it's thrown by an opposite-handed pitcher. Another important reason is that breaking balls tend to break away from same-handed batters and in toward opposite-handed batters, and most batters have an easier time adjusting to inward than outward break. The difference between a batter's performance against opposite handed pitching and same handed pitching is his platoon split; a right-handed batter who has a .300 batting average against lefties and .250 against righties has a .050 platoon split for batting average. A batter whose platoon split is negative has a reverse platoon split. A batter with a normal platoon split who is hitting against an opposite-handed pitcher has the platoon advantage; in contrast, if both the batter and the pitcher are working from the same side, the pitcher is the one who has the advantage. Baseball players have understood the advantages of platooning from the very early days of the game. Switch hitting, a strategy that only makes sense in light of the platoon advantage, was in use from the beginning of the National Association. Although players understood that they had an advantage against opposite-handed pitching, early teams' rosters were too small to take advantage by having formal platoons. The first really noteworthy example of platooning was the 1914 "Miracle" Braves. The Braves took advantage of enlarged rosters to platoon at several positions in the outfield, and unexpectedly won the pennant and the World Series. Braves' manager George Stallings was hailed as a genius, and platooning swept through baseball. Despite its advantages, platooning became less popular in the 1930s and 1940s until it was reintroduced by Casey Stengel of the New York Yankees. Not surprisingly, Stengel, as a lefthanded-hitting outfielder, had himself been platooned during the 1920s, a strategy which worked very well. Stengel's time with the Yankees was when the strategy got its name. While platooning's popularity has waned and waxed since Stengel's day, it has never gone away completely. Nowadays, platooning occurs most often between pitchers, as managers will switch once or twice an inning late in the game from a righthanded pitcher to a lefthander in order to gain the platoon advantage, while the batting team often has few opportunities to make a counter-move, because there are fewer substitute position players available. Most teams now have a couple of LOOGYs on their roster to implement this strategy, which was made popular by Tony LaRussa. - Bryan Soderholm-Difatte: "The 1914 Stallings Platoon: Assessing Execution, Impact, and Strategic Philosophy", The Baseball Research Journal, Vol. 43, number 2, Fall 2014, pp. 18-28. - Bryan Soderholm-Difatte: "The Stallings Platoon: The 1913 Prequel", The Baseball Research Journal, SABR, Volume 45, Number 2 (Fall 2016), pp. 15-25.
<urn:uuid:27127e58-7ab2-4ac8-9b84-d4e2f53a76b0>
CC-MAIN-2021-31
https://aws.baseball-reference.com/bullpen/Platoon
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151672.96/warc/CC-MAIN-20210725111913-20210725141913-00569.warc.gz
en
0.97323
736
3.234375
3
“The purposes of the Association shall be to advance anthropology as the science that studies humankind in all its aspects, through archeological, biological, ethnological, and linguistic research; and to further the professional interests of American anthropologists, including the dissemination of anthropological knowledge and its use to solve human problems.” Seems unambiguous, right? Anthropology’s largest professional association says we are a science. So, why did the New York Times report on December 9 that the American Anthropological Association had “deepened a rift” by dropping the word science from its long-range plan? Nicholas Wade, author of the New York Times’ original article and a follow-up a few days later, claimed that the change in the wording of the long-range plan “reopened a long-simmering tension between researchers in science-based anthropological disciplines — including archaeologists, physical anthropologists and some cultural anthropologists — and members of the profession who study race, ethnicity and gender and see themselves as advocates for native peoples or human rights.” But the simmering isn’t actually so very clear to many of us. As Katherine MacKinnon of Saint Louis University (PhD UC Berkeley 2002, and as a primatologist, safely within Wade’s definition of scientists) said in an article in Inside Higher Education, “The audience at large (including students) might have the impression that most anthropologists are embroiled in a vicious debate about defining our field, and also that there are rampant turf battles in every anthropology department or program in North America… In my experience this is not true, and this depiction is hardly fair to those broadly trained anthropologists who are doing cutting edge, cross-subfield work that is pushing boundaries and furthering the discipline in a positive way.” In his follow-up article, Wade substituted an even more noxious pair of contrasting terms: on one side, he says, are “evidence-based researchers”; on the other, “those more interested in advocating for the rights of women or native peoples”. Clearly, for Nicholas Wade, there can be no mixing human rights and science; or the study of race and gender and science. Which is a pretty bizarre constraint to impose on a field that has just produced a highly successful public education initiative that looks at race “through the eyes of history, science and lived experience” and “explains how human variation differs from race, when and why the idea of race was invented, and how race and racism affects everyday life”. (The traveling exhibit that formed part of the program was on exhibit at Berkeley’s Lawrence Hall of Science for the first four months of 2010.) For us anthropologists, it isn’t an either/or: understanding humanity requires both the approaches of the sciences and those of interpretive disciplines. But of course, that’s not as fun a story for the media. As Greg Downey at Neuroanthropology on PLOS (for my money the site of the smartest discussions of the uproar around) says To me, the people doing much of the most outrageous arguing are anthropologists with well-ground axes or are outsiders who have some sort of interest in stirring up a ruckus in our field, like vandals who take advantage of a social protest to smash a few windows and have a bit of a lark. Or maybe a better analogy is a pack of enthused spectators hoping two angry drunk guys can be goaded into a punch-up if the spectators just keep shouting, ‘Fight! Fight! Fight!’ It’s all fun, but someone’s liable to wind up with a headache in the morning. So what do we anthropologists do if we don’t want to be the angry drunk guys? What do you do if you don’t want to be one of the irresponsible spectators egging the drunks on? Well, first, let’s act like scholars and consider the facts. However neat Nicholas Wade’s story seems to be, it was not actually evidence-based. Ironically, it is entirely an interpretive exercise that assumed motivations and treated assertions as if they were facts. There was no move to “exclude” science in the long-range plan; the mission of the American Anthropological Association continues to describe the discipline as a science; and there aren’t two teams, one the right-thinking, evidence-based scientists and the other advocates who, as Wade also says, are more interested in “more interpretive subjects, like research on race and sex”. Exemplifying the problem with Wade’s manufactured controversy is the fact– unacknowledged in the media coverage — that four archaeologists and a physical anthropologist were part of the group that approved the rewording in the long-range plan. The Archaeology Division of the American Anthropological Association (of which I am President-Elect) debated the facts and came to the conclusion that the AAA Executive Board (EB) acted with the intent to include, not exclude, scientific approaches when it accepted the now-controversial wording in a preface to the Long Range Plan, a document that essentially addresses public outreach. Second, we might consider what is at stake that caused Wade and others in the media to leap on this story. Anthropology is not important enough on its own to justify the degree of coverage for what, really, was a tempest in a teapot encouraged by a little paranoia and a lot of imputing motivations where none could really be shown. That brings me back to Nicholas Wade’s disdain for advocacy, which he uses as the opposite of science in his somewhat odd characterization of tensions in my chosen field. Anthropology is a discipline that, from its science-based wings in archaeology and biological anthropology, to its interpretive edges (that can be found in almost every subdiscipline, pace Nicholas Wade’s world-view), is deeply committed to working out the morally ambiguous positions that taking human beings as objects of study can produce. In the contemporary world, we bring those insights back into society. And that means we make people uncomfortable about their certainties. So I agree with Greg Downey at Neuroanthropology again: many people outside our field still want to use anthropology as a surrogate battlefield, often to enact some ritualized intellectual combat that is over and done in their own home…. It’s also much easier to criticize when you don’t yourself have to wade into the mess – trying to do consulting for development projects, government advising, or social research is very, very messy and compromised at times….. One reason I’m glad to be an anthropologist is that I constantly learn new stuff. A crucial reason that I constantly learn new stuff – in addition to a mild attention deficit issue – is that everyone in my field is not doing the same thing as me…. If you want to be in a field with intellectual consensus on every key point, you probably want to stay away from anthropology; we’re a glorious hodgepodge of all sorts of theoretical and research traditions… my differences with a fellow researcher (scientist, pseudo-scientist or non-scientist) pale in comparison to my common cause in the face of attacks on independent research, of upper executives’ preening sense of entitlement and self-importance, of corporatization of universities, and of overall hostility in the public to intellectuals. And it is, in part, anthropology’s continuing commitment to debate, to public outreach, and yes, to advocacy, that makes my discipline what it is: a master example of engaged social science. And that’s what we need in the changing world we are living in.
<urn:uuid:8f63567a-3523-4f14-9fa7-2bb0b70129ab>
CC-MAIN-2019-30
https://blogs.berkeley.edu/2010/12/29/anthropology-engaged-social-science-in-a-changing-world/
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526386.37/warc/CC-MAIN-20190719223744-20190720005744-00038.warc.gz
en
0.956124
1,627
2.640625
3
- Journal Article Abstract: Because the Russian economy relies heavily on exports of fossil fuels, the primary source of human-induced greenhouse gas (GHG) emissions, it may be adversely impacted by Paris Agreement-based climate policies that target reductions in GHG emissions. Applying the MIT Economic Projection and Policy Analysis (EPPA) model to assess the impacts on the Russian economy of the efforts of the main importers of Russian fossil fuels to follow the global goals of the Paris Agreement, we project that climate-related actions outside of Russia will lower the country’s GDP growth rate by about one-half of a percentage point. The Paris Agreement is also expected to raise Russia’s risks of facing market barriers for its exports of energy-intensive goods, and of falling behind in the development of low-carbon energy technologies that most of the world is increasingly adopting. Key policy insights: - Regardless of its domestic emissions reduction efforts, Russia will not be able to sustain its current trajectory of fossil fuel export-based development due to climate policies worldwide. - To address the challenge of climate-related energy transition, Russia needs a new comprehensive development strategy that accounts for the post-Paris Agreement global energy landscape. - The key elements of such a strategy include diversification of the economy, moving to low-carbon energy sources, and investing in human capital development. - Our diversification scenarios show that redistribution of income from the energy sector to the development of human capital would benefit the economy. - The largest impact of investment re-orientation from the fossil fuel sector would be on manufacturing, services, agriculture and food production.
<urn:uuid:9029cdcc-5579-4233-b2d2-cba5a7bcfce0>
CC-MAIN-2020-29
https://globalchange.mit.edu/publication/17456
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657145436.64/warc/CC-MAIN-20200713131310-20200713161310-00282.warc.gz
en
0.912015
331
2.78125
3
“Letter from Birmingham Jail” (1963) A letter that Martin Luther King, Jr., addressed to his fellow clergymen while he was in jail in Birmingham, Alabama, in 1963, after a nonviolent protest against racial segregation (see also sit-ins). King defended the apparent impatience of people in the civil rights movement, maintaining that without forceful actions like his, equal rights for black people would never be gained. King upheld the general use of nonviolent civil disobedience against unjust laws, saying that human rights must take precedence over such laws. He claimed that “one who breaks an unjust law must do it openly, lovingly”; such a person, King said, is actually showing respect for law, by insisting that laws be just.
<urn:uuid:af681e76-a1af-44d6-8921-28d6b3ebb72d>
CC-MAIN-2019-43
https://www.dictionary.com/browse/letter-from-birmingham-jail
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986655310.17/warc/CC-MAIN-20191014200522-20191014224022-00513.warc.gz
en
0.959803
152
3.6875
4
Definition of smokestack in English: 1A chimney or funnel for discharging smoke from a locomotive, ship, factory, etc. and helping to induce a draft. - Jutting from the murky orange sunset behind them, the cathedral's three steeples, flanked by the cupola of the old colonial garrison and the little dome of the city hall, tower over the masts and the smokestacks of ships at anchor. - Instead of viaducts and smokestacks, the dockside arts complex that bears his name is built with shards of sunlight and steel. - He changed power-plant rules affecting emissions, a move favored by industry, and has balked at forcing big ships to clean their smokestack pollutants. 1.1 [as modifier] Pertaining to heavy industry: America’s smokestack cities and blue-collar suburbs More example sentences - The prevailing winds are from the west, thus the location of a city's smokestack industry is downwind. - Nyofco currently operates under Title V of the Clean Air Act, which requires it to self-monitor and submit the results of smokestack tests to the city and local community board every six years. - The tech industries have some organizing problems and challenges not shared with rustbelt, smokestack America. Words that rhyme with smokestackBlu-Tack • thumbtack Definition of smokestack in: - British & World English dictionary What do you find interesting about this word or phrase? Comments that don't adhere to our Community Guidelines may be moderated or removed.
<urn:uuid:828159c2-958e-4c78-a562-5857a37d8e17>
CC-MAIN-2015-32
http://www.oxforddictionaries.com/definition/american_english/smokestack
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988718.8/warc/CC-MAIN-20150728002308-00276-ip-10-236-191-2.ec2.internal.warc.gz
en
0.911492
349
2.6875
3
Max Fisher discusses the data reported in a newly published Carnegie Endowment paper, which upends traditional ideas about car usage. It turns out that car ownership rates are higher in nearly every Western European country than in the United States. "The U.S. is ranked 25th in world by number of passenger cars per person, just above Ireland and just below Bahrain," observes Fisher. "There are 439 cars here for every thousand Americans, meaning a little more than two people for every car." So what explains this state of affairs? "The Carnegie paper explains that car ownership rates are closely tied to the size of the middle class," explains Fisher. "In fact, the paper [titled "In Search of the Global Middle Class: A New Index"] actually measures car ownership rates for the specific purpose of using that number to predict middle class size." So does the data indicate that the US has a disproportionately small middle class? Fisher isn't convinced: "Still, it's also possible that the answer has less to do with Americans adhering to Carnegie's thesis about car ownership predicting middle class size and more to do with other, particularly American factors. Young Americans are spending less of their money on cars, as Jordan Weissmann explained, as they get driver's licences at lower rates and spend more of their money on, say, high-tech smart phones."
<urn:uuid:9f76df0a-00ad-4357-a42c-983f22ab86b0>
CC-MAIN-2014-23
http://www.planetizen.com/comment/19697
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997891176.68/warc/CC-MAIN-20140722025811-00046-ip-10-33-131-23.ec2.internal.warc.gz
en
0.967849
276
2.59375
3
The Norfolk Broads are the northern part of The Broads National Park, Location: – East of England. A southern part of the national park lies within Suffolk, and so the Broads are sometimes collectively referred to as the Norfolk and Suffolk Broads, but many people simply call the entire system the Norfolk Broads. They are a man made creation, resulting from peat being excavated for use as fuel. These workings were then flooded by the rising water table. The Norfolk Broads are best known as a boating centre, and rightly so. They are made up of a multitude of broad, shallow lakes lying along five major rivers. The lakes are the result of peat “harvest” during the Middle Ages. The water level rose, and flooded the peat diggings, creating lakes that are home to many rare plant and animal species, as well as a multitude of birds. Not surprisingly, then, the Broads are blessed with several popular wildlife reserves. Many footpaths run alongside the Broads’ 40 shallow lakes and five rivers, so fishing, bird watching, cycling and exploring couldn’t be easier. Norfolk has a fantastic choice of attractions for visitors of all ages, from wonderful stately homes and gardens to family fun parks. Take a guided boat trip from one of the many boatyards. Or better still hire a cruiser – they and other hirecraft are available by the week, day or even hour. These easy to handle boats accommodate from two to twelve people, and offer the ultimate in self-catering freedom. If sailing is your passion or something you have always meant to try, the Broads are the perfect setting to hone your skills or learn to sail. You can try your hand at a whole range of non-powered watersports including windsurfing, kayaking, canoeing, dinghy sailing and fishing at Whitlingham Country Park on the outskirts of Norwich between Easter and September. Consisting of the Great and Little Broads, the park was designed to attract wildlife as well as people and a variety of birds flock to the Great Broad. |There are plenty of waterside pubs and restaurants along the Broads, villages with picturesque cottages and shops, and there are Norfolk’s famous medieval churches to visit. The vibrancy of the arts in the Norwich area has established it as the arts and entertainment capital of the East of England. See below a few more attractions in the area of the Norfolk; Bure Valley Railway. – Norfolk’s longest narrow gauge heritage railway, through 9 miles of beautiful Norfolk countryside between Aylsham and Wroxham. City Boats – Variety of scheduled cruises daily from 15 mins to 3¼ hrs. Visit Norwich and the Broads in one day via ‘Norwich Discovery’. Fairhaven Woodland & Water Garden.-180 acre natural garden and wildlife sanctuary in the Norfolk Broads. Inspire Discovery Centre -Explore science at East Anglia’s only hands-on discovery centre. Housed in a medieval church in central Norwich. Norwich Castle Museum & Art Gallery – One of the city’s most famous landmarks, Norwich Castle is packed with treasures to inspire and intrigue visitors of all ages Pensthorpe Get closer to nature at Pensthorpe. 500 acres of unspoilt Wensum Valley. Miles of nature trails. Beautiful lakes, home to Europe’s finest collection of water birds. Thrigby Hall Wildlife Gardens Find rare tigers, huge crocodiles, noisy gibbons and many more exciting animals in the old grounds of Thrigby Hall. How to get there Norwich is home to a major regional airport, Norwich International, with over 300 worldwide connections via Manchester and Amsterdam. London Stansted is within easy reach by road (85 miles). Major trunk roads to the Norwich Area are the M11, A11, A12, A140 and A14 from London, the South East of England, ferry ports and the Channel Tunnel. The A14, A11, A47, A17 and A1 serve the Midlands and the North. Intercity ½ hourly services, between Norwich and London Liverpool Street, with local connecting services within East Anglia. Average journey time from London is 1hr 50 mins. Car and passenger ferries operate daily between Harwich and the Hook of Holland. Cuxhaven to Harwich, and Esberg to Harwich. Daily services from all major cities are operated by National Express and Jetlink provides regular connections from Stansted, Heathrow and Gatwick airports. Norwich’s award-winning Park & Ride service is the most convenient way of getting into the city centre Wymondham Music Festival – A festival of many different types of musical events throughout the summer. Many are free. Wymondham, Norfolk. Worstead Festival – is the largest village festival in Norfolk- Worstead, the origin of “worsted” wool in the 14th century, is located in North Norfolk, about 13 miles (21km) north of Norwich (England).(village square live music, over 150 craft, charity and trade stalls, working heavy horses in action, weaving and spinning demonstrations, vintage cars, tractors, and agricultural implements plus more entertainment. Eating Dining Shopping There are many restaurants/pubs and shopping areas in every town. The Broads originated in the Middles Ages, during the 9th to 13th centuries, as shallow pits from which generations of Norfolk people dug peat for heating and cooking purposes. Roman mercenaries, Saxon settlers and Norman conquerors all took what they needed, but it was not until the Middles Ages that peat-cutting became organized. The monks of St. Benet’s acquired all the rights as well as the services of the peasants, to the peat-cutting, consequently the Abbey became very wealthy. The amount of fuel needed was massive. During the 14th century the sea level rose, the area flooded, and this natural accident formed the broads as we know them today. Useful telephone numbers Emergency Number; 999 Airport Information: (Norwich) Tel; 01603 420653 Train station: National Rail Tel 08457 48 49 50 Tourist Office: (Norwich) Tel 01603 727927 Holiday rents online: National Transport Line
<urn:uuid:014c6269-5ded-4d41-9bdb-cdcbfc50ff60>
CC-MAIN-2018-47
https://letsfixit.co.uk/travel/norfolk-broads/
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742963.17/warc/CC-MAIN-20181115223739-20181116005739-00450.warc.gz
en
0.943026
1,327
2.5625
3
the impact of the recession on young people In the previous Household Labour Force Survey Investigation Report1 we looked at why men were more affected by recessions than women. In this quarter’s report we will take a closer look at how young people are being affected by the recession. Youth (those aged 15-24 years) are typically one of the most affected groups during labour market downturns and this recession is no different. This group is of particular concern because their long-term labour market outcomes may suffer from not being able to enter the labour market easily given limited job opportunities during a recession. In the last two years there has been a substantial number of job losses for youth. Some young people who have lost their jobs have continued to look for work, causing the youth unemployment rate to increase. Others have decided to leave the labour force altogether, with many of these youth returning to study. Youth have experienced disproportionate jobs losses Most of the jobs that have been lost in the downturn were held by young people. Between December 2007 and December 2009, employment of 15-19 and 20-24 year olds declined by 34,400 and 11,300 respectively, while employment for the rest of the population (25 years and older) increased by 13,200. This pattern was seen for all ethnicities except for the Asian/MELAA2 ethnic group. Maori youth employment fell by 17% between December 2007 and December 2009, followed by Europeans (down 14%) and Pacific (down 12%). Why have youth lost a greater share of jobs compared to older workers? Is it because they are more likely to be laid off (e.g. due to lack of experience or skills), or because they happen to work in industries where there have been many job losses? Youth are over represented in five3 out of the 16 industries in the economy. These five industries accounted for just over 50% of total youth employment in December 2007. Four of these five industries have experienced disproportionate job losses over the course of the downturn. These four industries are hospitality, retail trade, communication services and construction. Additionally, Figure 1 shows that youth have experienced job losses at a greater rate than older workers (25 years and older) in ten4 out of sixteen main industries. So overall, it seems that youth have been concentrated in affected industries and are more likely to lose their jobs more generally when compared to older workers. Figure 1: Change in employment for youth (15-24 years) and older workers (25 years and older), Dec 07 –Dec 09 with industries with a high proportion of youth on the left hand side Source: Statistics New Zealand How have youth responded to losing their jobs? Most youth have continued to look for work over the course of the downturn, causing the youth unemployment rate to increase over the last two years. The Household Labour Force Survey (HLFS) shows that the unemployment rate for youth has roughly doubled (8.7% to 18.4%) over the December 2007 to December 2009 period. While the youth unemployment rate has increased substantially, they make up the same share of all unemployed. At the start of the recession, youth represented 46% of total unemployment (December 2007 quarter). This figure was unchanged two years later in the December 2009 quarter. How does this compare to the early 90s recession? The 9.6 percentage point increase in youth unemployment is so far less than that seen in the early 1990s recession of 13.1 percentage points. However, because youth make up a sizeable proportion of total unemployment this means that the number of unemployed youth is large and now stands at 72,700 (up 60,300 since December 2007). This is slightly less that the December 1991 figure of 77,400. The share of youth (those aged 18 to 24 years) receiving the unemployment benefit has increased since December 2007 Figure 2 shows that the number of people receiving the unemployment benefits has increased across all age groups. What is of concern is that the share of youth (those aged 18-24 years) receiving the unemployment benefit has increased from 23% in December 2007 to 34% in December 2009, while the shares for the rest of the population have remained relatively stable or declined. Figure 2: Counts and share of unemployment benefits by age group, December quarters Source: Ministry of Social Development There has been a substantial increase in youth taking part in education While unemployment for youth increased at about the same rate as older workers, a higher share of youth have left the labour market entirely. Table 1 shows that youth not in the labour force increased by 12% between December 2007 and December 2009. This figure is higher than that for older workers, which increased by 1% during the same period. It is likely that youth are more easily able to leave the labour force as they generally do not have the same financial responsibilities as older workers that force them to remain in the labour market. Table 1 shows that the number of youth not in the labour force that are participating in formal study has risen by 21% since December 2007. While the number of youth in informal study rose by 62% over the same period. This means that a total of 175,000 out of 231,000 youth not in the labour force were either studying or at school in the December 2009 quarter. While participation in education has grown throughout the recession, there remains a significant number of youth not in employment, education or training (NEET). The number of NEET rose by 42% over the last two years to reach 95,000. As they are neither working nor training, this group remains a particular concern. Not in the labour Force (NILF) |25+ years Dec-09 Dec 07-Dec 09 |25+ years % change Dec 07-Dec 092| |Engaged in Formal Study||57.9||35.2||21%||18%| |Engaged in Informal Study||16.5||10.4||62%||-19%| |Student still at school||100.9||1.2||0%||-33%| |Total NILF in study or at school||175.3||46.8||10%||5%| |Total NILF (all study statuses)||231.3||833.3||12%||1%| |Not employed or in education or training (NEET)||95.3||863.7||42%||6%| Source: Statistics New Zealand This note has looked at employment impacts on young people and their subsequent decisions. There have been significant job losses for youth as they are more likely to be laid off (due to their low level of experience and skills), compared with older workers and because youth are heavily employed in industries that have been particularly affected in the recession. While employment has certainly fallen, there has been a substantial increase in youth taking part in education or training during the downturn and means that they will be better placed for the economic recovery. 2 Middle Eastern, Latin American and African (MELAA) ethnic grouping 3 Hospitality, Retail trade, Cultural and Recreational Services, Communication Services and Construction. 4 Hospitality, Retail trade, Communication Services, Construction, Manufacturing, Finance and Insurance Services, Property and Business Services, Wholesale Trade, Transport and Storage and Government. 5 May include people that are undertaking caregiver or home duties
<urn:uuid:0e95a081-aa34-447e-9d5b-139e2d7e0929>
CC-MAIN-2015-27
http://www.dol.govt.nz/publications/lmr/hlfs-investigation-reports/recession-impact/index.asp
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096061.71/warc/CC-MAIN-20150627031816-00092-ip-10-179-60-89.ec2.internal.warc.gz
en
0.967823
1,520
2.984375
3
Two angles in a triangle are 90° and 60°. Has triangle at least two equal sides? Leave us a comment of example and its solution (i.e. if it is still somewhat unclear...): Showing 0 comments: Be the first to comment! To solve this example are needed these knowledge from mathematics: Next similar examples: - 3-bracket 2 May be the smallest angle in the triangle greater than 40°? May be the largest angle in the triangle less than 20°? - Triangle P2 Can triangle have two right angles? The triangle is one outer angle 56°30' and one internal angle 46°24'. Calculate the other internal angles of a triangle. An isosceles triangle has two sides of length 7 km and 39 km. How long is a third side? For how many integer values of x can 16, 15 and x be the lengths of the sides of triangle? Triangle whose sides are midpoints of sides of triangle ABC has a perimeter 45. How long is perimeter of triangle ABC? Calculate the length of the base of an isosceles triangle with a circumference 96 cm if the arm length is 29 cm. Solve the inequation: 5k - (7k - 1)≤ 2/5 . (5-k)-2 How many elements have union and intersection of two disjoint sets when the first have 1 and secodn 8 elements. The hotel has a p floors each floor has i rooms from which the third are single and the others are double. Represents the number of beds in hotel. Alley measured a meters. At the beginning and end are planted poplar. How many we must plant poplars to get the distance between the poplars 15 meters? - Pizza 4 Marcus ate half pizza on monday night. He than ate one third of the remaining pizza on Tuesday. Which of the following expressions show how much pizza marcus ate in total? Teacher Rem bought 360 pieces of cupcakes for the outreach program of their school. 5/9 of the cupcakes were chocolate flavor and 1/4 wete pandan flavor and the rest were vanilla flavor. How much more chocolate flavor cupcakes than vanilla flavor? The following numbers round to the thousandth: - Round it 0.728 round to units, tenths, hundredths. - Passenger boat Two-fifths of the passengers in the passenger boat were boys. 1/3 of them were girls and the rest were adult. If there were 60 passengers in the boat, how many more boys than adult were there?
<urn:uuid:29d9f1e3-2267-4f58-be47-d36fb5788e67>
CC-MAIN-2018-22
https://www.hackmath.net/en/example/311
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794869732.36/warc/CC-MAIN-20180527170428-20180527190428-00120.warc.gz
en
0.941254
551
3.25
3
ACCESS TO CLASSIFIED INFORMATION The national interest requires that certain information is maintained in confidence through a system of classification in order to protect our citizens, our democratic institutions, and our participation within the community of nations. The unauthorized disclosure of information classified in the national interest can cause irreparable damage to the national security and loss of human life. Security policies designed to protect classified information must ensure consistent, cost effective, and efficient protection of our Nation’s classified information, while providing fair and equitable treatment to those Americans upon whom we rely to guard our national security. This order establishes a uniform Federal personnel security program for employees who will be considered for initial or continued access to classified information. NOW, THEREFORE, by the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows: PART 1 DEFINITIONS, ACCESS TO CLASSIFIED INFORMATION, FINANCIAL DISCLOSURE, AND OTHER ITEMS Section 1.1. Definitions. For the purposes of this order: (a) “Agency” means any “Executive agency,” as defined in 5 U.S.C. 105, the “military departments,” as defined in 5 U.S.C. 102, and any other entity within the executive branch that comes into the possession of classified information, including the Defense Intelligence Agency, National Security Agency, and the National Reconnaissance Office. (b) “Applicant” means a person other than an employee who has received an authorized conditional offer of employment for a position that requires access to classified information. (c) “Authorized investigative agency” means an agency authorized by law or regulation to conduct a counterintelligence investigation or investigation of persons who are proposed for access to classified information to ascertain whether such persons satisfy the criteria for obtaining and retaining access to such information. (d) “Classified information” means information that has been determined pursuant to Executive Order No. 12958, or any successor order, Executive Order No. 12951, or any successor order, or the Atomic Energy Act of 1954 (42 U.S.C. 2011), to require protection against unauthorized disclosure. (e) “Employee” means a person, other than the President and Vice President, employed by, detailed or assigned to, an agency, including members of the Armed Forces; an expert or consultant to an agency; an industrial or commercial contractor, licensee, certificate holder, or grantee of an agency, including all subcontractors; a personal services contractor; or any other category of person who acts for or on behalf of an agency as determined by the appropriate agency head. (f) “Foreign power” and “agent of a foreign power” have the meaning provided in 50 U.S.C. 1801. (g) “Need for access” means a determination that an employee requires access to a particular level of classified information in order to perform or assist in a lawful and authorized governmental function. (h) “Need-to-know” means a determination made by an authorized holder of classified information that a prospective recipient requires access to specific classified information in order to perform or assist in a lawful and authorized governmental function. (i) “Overseas Security Policy Board” means the Board established by the President to consider, develop, coordinate and promote policies, standards and agreements on overseas security operations, programs and projects that affect all United States Government agencies under the authority of a Chief of Mission. (j) “Security Policy Board” means the Board established by the President to consider, coordinate, and recommend policy directives for U.S. security policies, procedures, and practices. (k) “Special access program” has the meaning provided in section 4.1 of Executive Order No. 12958, or any successor order. Sec. 1.2. Access to Classified Information. (a) No employee shall be granted access to classified information unless that employee has been determined to be eligible in accordance with this order and to possess a need-to-know. (b) Agency heads shall be responsible for establishing and maintaining an effective program to ensure that access to classified information by each employee is clearly consistent with the interests of the national security. (c) Employees shall not be granted access to classified information unless they: (1) have been determined to be eligible for access under section 3.1 of this order by agency heads or designated officials based upon a favorable adjudication of an appropriate investigation of the employee’s background; (2) have a demonstrated need-to-know; and (3) have signed an approved nondisclosure agreement. (d) All employees shall be subject to investigation by an appropriate government authority prior to being granted access to classified information and at any time during the period of access to ascertain whether they continue to meet the requirements for access. (e)(1) All employees granted access to classified information shall be required as a condition of such access to provide to the employing agency written consent permitting access by an authorized investigative agency, for such time as access to classified information is maintained and for a peroid of 3 years thereafter, to: (A) relevant financial records that are maintained by a financial institution as defined in 31 U.S.C. 5312(a) or by a holding company as defined in section 1101(6) of the Right to Financial Privacy Act of 1978 (12 U.S.C. 3401); (B) consumer reports pertaining to the employee under the Fair Credit Reporting Act (15 U.S.C. 1681a); and (C) records maintained by commercial entities within the United States pertaining to any travel by the employee outside the United States. (2) Information may be requested pursuant to employee consent under this section where: (A) there are reasonable grounds to believe, based on credible information, that the employee or former employee is, or may be, disclosing classified information in an unauthorized manner to a foreign power or agent of a foreign power; (B) information the employing agency deems credible indicates the employee or former employee has incurred excessive indebtedness or has acquired a level of affluence that cannot be explained by other information; or (C) circumstances indicate the employee or former employee had the capability and opportunity to disclose classified information that is known to have been lost or compromised to a foreign power or an agent of a foreign power. (3) Nothing in this section shall be construed to affect the authority of an investigating agency to obtain information pursuant to the Right to Financial Privacy Act, the Fair Credit Reporting Act or any other applicable law. Sec. 1.3. Financial Disclosure. (a) Not later than 180 days after the effective date of this order, the head of each agency that originates, handles, transmits, or possesses classified information shall designate each employee, by position or category where possible, who has a regular need for access to classified information that, in the discretion of the agency head, would reveal: (1) the identity of covert agents as defined in the Intelligence Identities Protection Act of 1982 (50 U.S.C. 421); (2) technical or specialized national intelligence collection and processing systems that, if disclosed in an unauthorized manner, would substantially negate or impair the effectiveness of the system; (3) the details of: (A) the nature, contents, algorithm, preparation, or use of any code, cipher, or cryptographic system or; (B) the design, construction, functioning, maintenance, or repair of any cryptographic equipment; but not including information concerning the use of cryptographic equipment and services; (4) particularly sensitive special access programs, the disclosure of which would substantially negate or impair the effectiveness of the information or activity involved; or (5) especially sensitive nuclear weapons design information (but only for those positions that have been certified as being of a high degree of importance or sensitivity, as described in section 145(f) of the Atomic Energy Act of 1954, as amended). (b) An employee may not be granted access, or hold a position designated as requiring access, to information described in subsection (a) unless, as a condition of access to such information, the employee: (1) files with the head of the agency a financial disclosure report, including information with respect to the spouse and dependent children of the employee, as part of all background investigations or reinvestigations; (2) is subject to annual financial disclosure requirements, if selected by the agency head; and (3) files relevant information concerning foreign travel, as determined by the Security Policy Board. (c) Not later than 180 days after the effective date of this order, the Security Policy Board shall develop procedures for the implementation of this section, including a standard financial disclosure form for use by employees under subsection (b) of this section, and agency heads shall identify certain employees, by position or category, who are subject to annual financial disclosure. Sec. 1.4. Use of Automated Financial Record Data Bases. As part of all investigations and reinvestigations described in section 1.2(d) of this order, agencies may request the Department of the Treasury, under terms and conditions prescribed by the Secretary of the Treasury, to search automated data bases consisting of reports of currency transactions by financial institutions, international transportation of currency or monetary instruments, foreign bank and financial accounts, transactions under $10,000 that are reported as possible money laundering violations, and records of foreign travel. Sec. 1.5. Employee Education and Assistance. The head of each agency that grants access to classified information shall establish a program for employees with access to classified information to: (a) educate employees about individual responsibilities under this order; and (b) inform employees about guidance and assistance available concerning issues that may affect their eligibility for access to classified information, including sources of assistance for employees who have questions or concerns about financial matters, mental health, or substance abuse. PART 2 ACCESS ELIGIBILITY POLICY AND PROCEDURE Sec. 2.1. Eligibility Determinations. (a) Determinations of eligibility for access to classified information shall be based on criteria established under this order. Such determinations are separate from suitability determinations with respect to the hiring or retention of persons for employment by the government or any other personnel actions. (b) The number of employees that each agency determines are eligible for access to classified information shall be kept to the minimum required for the conduct of agency functions. (1) Eligibility for access to classified information shall not be requested or granted solely to permit entry to, or ease of movement within, controlled areas when the employee has no need for access and access to classified information may reasonably be prevented. Where circumstances indicate employees may be inadvertently exposed to classified information in the course of their duties, agencies are authorized to grant or deny, in their discretion, facility access approvals to such employees based on an appropriate level of investigation as determined by each agency. (2) Except in agencies where eligibility for access is a mandatory condition of employment, eligibility for access to classified information shall only be requested or granted based on a demonstrated, foreseeable need for access. Requesting or approving eligibility in excess of actual requirements is prohibited. (3) Eligibility for access to classified information may be granted where there is a temporary need for access, such as one-time participation in a classified project, provided the investigative standards established under this order have been satisfied. In such cases, a fixed date or event for expiration shall be identified and access to classified information shall be limited to information related to the particular project or assignment. (4) Access to classified information shall be terminated when an employee no longer has a need for access. Sec. 2.2. Level of Access Approval. (a) The level at which an access approval is granted for an employee shall be limited, and relate directly, to the level of classified information for which there is a need for access. Eligibility for access to a higher level of classified information includes eligibility for access to information classified at a lower level. (b) Access to classified information relating to a special access program shall be granted in accordance with procedures established by the head of the agency that created the program or, for programs pertaining to intelligence activities (including special activities but not including military operational, strategic, and tactical programs) or intelligence sources and methods, by the Director of Central Intelligence. To the extent possible and consistent with the national security interests of the United States, such procedures shall be consistent with the standards and procedures established by and under this order. Sec. 2.3 Temporary Access to Higher Levels. (a) An employee who has been determined to be eligible for access to classified information based on favorable adjudication of a completed investigation may be granted temporary access to a higher level where security personnel authorized by the agency head to make access eligibility determinations find that such access: (1) is necessary to meet operational or contractual exigencies not expected to be of a recurring nature; (2) will not exceed 180 days; and (3) is limited to specific, identifiable information that is made the subject of a written access record. (b) Where the access granted under subsection (a) of this section involves another agency’s classified information, that agency must concur before access to its information is granted. Sec. 2.4. Reciprocal Acceptance of Access Eligibility Determinations. (a) Except when an agency has substantial information indicating that an employee may not satisfy the standards in section 3.1 of this order, background investi-gations and eligibility determinations conducted under this order shall be mutually and reciprocally accepted by all agencies. (b) Except where there is substantial information indicating that the employee may not satisfy the standards in section 3.1 of this order, an employee with existing access to a special access program shall not be denied eligibility for access to another special access program at the same sensitivity level as determined personally by the agency head or deputy agency head, or have an existing access eligibility readjudicated, so long as the employee has a need for access to the information involved. (c) This section shall not preclude agency heads from establishing additional, but not duplicative, investigative or adjudicative procedures for a special access program or for candidates for detail or assignment to their agencies, where such procedures are required in exceptional circumstances to protect the national security. (d) Where temporary eligibility for access is granted under sections 2.3 or 3.3 of this order or where the determination of eligibility for access is conditional, the fact of such temporary or conditional access shall be conveyed to any other agency that considers affording the employee access to its information. Sec. 2.5. Specific Access Requirement. (a) Employees who have been determined to be eligible for access to classified information shall be given access to classified information only where there is a need-to-know that information. (b) It is the responsibility of employees who are authorized holders of classified information to verify that a prospective recipient’s eligibility for access has been granted by an authorized agency official and to ensure that a need-to-know exists prior to allowing such access, and to challenge requests for access that do not appear well-founded. Sec. 2.6. Access by Non-United States Citizens. (a) Where there are compelling reasons in furtherance of an agency mission, immigrant alien and foreign national employees who possess a special expertise may, in the discretion of the agency, be granted limited access to classified information only for specific programs, projects, contracts, licenses, certificates, or grants for which there is a need for access. Such individuals shall not be eligible for access to any greater level of classified information than the United States Government has determined may be releasable to the country of which the subject is currently a citizen, and such limited access may be approved only if the prior 10 years of the subject’s life can be appropriately investigated. If there are any doubts concerning granting access, additional lawful investigative procedures shall be fully pursued. (b) Exceptions to these requirements may be permitted only by the agency head or the senior agency official designated under section 6.1 of this order to further substantial national security interests. PART 3 ACCESS ELIGIBILITY STANDARDS Sec. 3.1. Standards. (a) No employee shall be deemed to be eligible for access to classified information merely by reason of Federal service or contracting, licensee, certificate holder, or grantee status, or as a matter of right or privilege, or as a result of any particular title, rank, position, or affiliation. (b) Except as provided in sections 2.6 and 3.3 of this order, eligibility for access to classified information shall be granted only to employees who are United States citizens for whom an appropriate investigation has been completed and whose personal and professional history affirmatively indicates loyalty to the United States, strength of character, trustworthiness, honesty, reliability, discretion, and sound judgment, as well as freedom from conflicting allegiances and potential for coercion, and willingness and ability to abide by regulations governing the use, handling, and protection of classified information. A determination of eligibility for access to such information is a discretionary security decision based on judgments by appropriately trained adjudicative personnel. Eligibility shall be granted only where facts and circumstances indicate access to classified information is clearly consistent with the national security interests of the United States, and any doubt shall be resolved in favor of the national security. (c) The United States Government does not discriminate on the basis of race, color, religion, sex, national origin, disability, or sexual orientation in granting access to classified information. (d) In determining eligibility for access under this order, agencies may investigate and consider any matter that relates to the determination of whether access is clearly consistent with the interests of national security. No inference concerning the standards in this section may be raised solely on the basis of the sexual orientation of the employee. (e) No negative inference concerning the standards in this section may be raised solely on the basis of mental health counseling. Such counseling can be a positive factor in eligibility determinations. However, mental health counseling, where relevant to the adjudication of access to classified information, may justify further inquiry to determine whether the standards of subsection (b) of this section are satisfied, and mental health may be considered where it directly relates to those standards. (f) Not later than 180 days after the effective date of this order, the Security Policy Board shall develop a common set of adjudicative guidelines for determining eligibility for access to classified information, including access to special access programs. Sec. 3.2. Basis for Eligibility Approval. (a) Eligibility determinations for access to classified information shall be based on information concerning the applicant or employee that is acquired through the investigation conducted pursuant to this order or otherwise available to security officials and shall be made part of the applicant’s or employee’s security record. Applicants or employees shall be required to provide relevant information pertaining to their background and character for use in investigating and adjudicating their eligibility for access. (b) Not later than 180 days after the effective date of this order, the Security Policy Board shall develop a common set of investigative standards for background investigations for access to classified information. These standards may vary for the various levels of access. (c) Nothing in this order shall prohibit an agency from utilizing any lawful investigative procedure in addition to the investigative requirements set forth in this order and its implementing regulations to resolve issues that may arise during the course of a background investigation or reinvestigation. Sec. 3.3. Special Circumstances. (a) In exceptional circumstances where official functions must be performed prior to the completion of the investigative and adjudication process, temporary eligibility for access to classified information may be granted to an employee while the initial investigation is underway. When such eligibility is granted, the initial investigation shall be expedited. (1) Temporary eligibility for access under this section shall include a justification, and the employee must be notified in writing that further access is expressly conditioned on the favorable completion of the investigation and issuance of an access eligibility approval. Access will be immediately terminated, along with any assignment requiring an access eligibility approval, if such approval is not granted. (2) Temporary eligibility for access may be granted only by security personnel authorized by the agency head to make access eligibility determinations and shall be based on minimum investigative standards developed by the Security Policy Board not later than 180 days after the effective date of this order. (3) Temporary eligibility for access may be granted only to particular, identified categories of classified information necessary to perform the lawful and authorized functions that are the basis for the granting of temporary access. (b) Nothing in subsection (a) shall be construed as altering the authority of an agency head to waive requirements for granting access to classified information pursuant to statutory authority. (c) Where access has been terminated under section 2.1(b)(4) of this order and a new need for access arises, access eligibility up to the same level shall be reapproved without further investigation as to employees who were determined to be eligible based on a favorable adjudication of an investigation completed within the prior 5 years, provided they have remained employed by the same employer during the period in question, the employee certifies in writing that there has been no change in the relevant information provided by the employee for the last background investigation, and there is no information that would tend to indicate the employee may no longer satisfy the standards established by this order for access to classified information. (d) Access eligibility shall be reapproved for individuals who were determined to be eligible based on a favorable adjudication of an investigation completed within the prior 5 years and who have been retired or otherwise separated from United States Government employment for not more than 2 years; provided there is no indication the individual may no longer satisfy the standards of this order, the individual certifies in writing that there has been no change in the relevant information provided by the individual for the last background investigation, and an appropriate record check reveals no unfavorable information. Sec. 3.4. Reinvestigation Requirements. (a) Because circumstances and characteristics may change dramatically over time and thereby alter the eligibility of employees for continued access to classified information, reinvestigations shall be conducted with the same priority and care as initial investigations. (b) Employees who are eligible for access to classified information shall be the subject of periodic reinvestigations and may also be reinvestigated if, at any time, there is reason to believe that they may no longer meet the standards for access established in this order. (c) Not later than 180 days after the effective date of this order, the Security Policy Board shall develop a common set of reinvestigative standards, including the frequency of reinvestigations. PART 4 INVESTIGATIONS FOR FOREIGN GOVERNMENTS Sec. 4. Authority. Agencies that conduct background investigations, including the Federal Bureau of Investigation and the Department of State, are authorized to conduct personnel security investigations in the United States when requested by a foreign government as part of its own personnel security program and with the consent of the individual. PART 5 REVIEW OF ACCESS DETERMINATIONS Sec. 5.1. Determinations of Need for Access. A determination under section 2.1(b)(4) of this order that an employee does not have, or no longer has, a need for access is a discretionary determination and shall be conclusive. Sec. 5.2. Review Proceedings for Denials or Revocations of Eligibility for Access. (a) Applicants and employees who are determined to not meet the standards for access to classified information established in section 3.1 of this order shall be: (1) provided as comprehensive and detailed a written explanation of the basis for that conclusion as the national security interests of the United States and other applicable law permit; (2) provided within 30 days, upon request and to the extent the documents would be provided if requested under the Freedom of Information Act (5 U.S.C. 552) or the Privacy Act (3 U.S.C. 552a), as applicable, any documents, records, and reports upon which a denial or revocation is based; (3) informed of their right to be represented by counsel or other representative at their own expense; to request any documents, records, and reports as described in section 5.2(a)(2) upon which a denial or revocation is based; and to request the entire investigative file, as permitted by the national security and other applicable law, which, if requested, shall be promptly provided prior to the time set for a written reply; (4) provided a reasonable opportunity to reply in writing to, and to request a review of, the determination; (5) provided written notice of and reasons for the results of the review, the identity of the deciding authority, and written notice of the right to appeal; (6) provided an opportunity to appeal in writing to a high level panel, appointed by the agency head, which shall be comprised of at least three members, two of whom shall be selected from outside the security field. Decisions of the panel shall be in writing, and final except as provided in subsection (b) of this section; and (7) provided an opportunity to appear personally and to present relevant documents, materials, and information at some point in the process before an adjudicative or other authority, other than the investigating entity, as determined by the agency head. A written summary or recording of such appearance shall be made part of the applicant’s or employee’s security record, unless such appearance occurs in the presence of the appeals panel described in subsection (a)(6) of this section. (b) Nothing in this section shall prohibit an agency head from personally exercising the appeal authority in subsection (a)(6) of this section based upon recommendations from an appeals panel. In such case, the decision of the agency head shall be final. (c) Agency heads shall promulgate regulations to implement this section and, at their sole discretion and as resources and national security considerations permit, may provide additional review proceedings beyond those required by subsection (a) of this section. This section does not require additional proceedings, however, and creates no procedural or substantive rights. (d) When the head of an agency or principal deputy personally certifies that a procedure set forth in this section cannot be made available in a particular case without damaging the national security interests of the United States by revealing classified information, the particular procedure shall not be made available. This certification shall be conclusive. (e) This section shall not be deemed to limit or affect the responsibility and power of an agency head pursuant to any law or other Executive order to deny or terminate access to classified information in the interests of national security. The power and responsibility to deny or terminate access to classified information pursuant to any law or other Executive order may be exercised only where the agency head determines that the procedures prescribed in subsection (a) of this section cannot be invoked in a manner that is consistent with national security. This determination shall be conclusive. (f)(1) This section shall not be deemed to limit or affect the responsibility and power of an agency head to make determinations of suitability for employment. (2) Nothing in this section shall require that an agency provide the procedures prescribed in subsection (a) of this section to an applicant where a conditional offer of employment is withdrawn for reasons of suitability or any other reason other than denial of eligibility for access to classified information. (3) A suitability determination shall not be used for the purpose of denying an applicant or employee the review proceedings of this section where there has been a denial or revocation of eligibility for access to classified information. PART 6 IMPLEMENTATION Sec. 6.1. Agency Implementing Responsibilities. Heads of agencies that grant employees access to classified information shall: (a) designate a senior agency official to direct and administer the agency’s personnel security program established by this order. All such programs shall include active oversight and continuing security education and awareness programs to ensure effective implementation of this order; (b) cooperate, under the guidance of the Security Policy Board, with other agencies to achieve practical, consistent, and effective adjudicative training and guidelines; and (c) conduct periodic evaluations of the agency’s implementation and administration of this order, including the implementation of section 1.3(a) of this order. Copies of each report shall be provided to the Security Policy Board. Sec. 6.2. Employee Responsibilities. (a) Employees who are granted eligibility for access to classified information shall: (1) protect classified information in their custody from unauthorized disclosure; (2) report all contacts with persons, including foreign nationals, who seek in any way to obtain unauthorized access to classified information; (3) report all violations of security regulations to the appropriate security officials; and (4) comply with all other security requirements set forth in this order and its implementing regulations. (b) Employees are encouraged and expected to report any information that raises doubts as to whether another employee’s continued eligibility for access to classified information is clearly consistent with the national security. Sec. 6.3. Security Policy Board Responsibilities and Implementation. (a) With respect to actions taken by the Security Policy Board pursuant to sections 1.3(c), 3.1(f), 3.2(b), 3.3(a)(2), and 3.4(c) of this order, the Security Policy Board shall make recommendations to the President through the Assistant to the President for National Security Affairs for implementation. (b) Any guidelines, standards, or procedures developed by the Security Policy Board pursuant to this order shall be consistent with those guidelines issued by the Federal Bureau of Investigation in March 1994 on Background Investigations Policy/Guidelines Regarding Sexual Orientation. (c) In carrying out its responsibilities under this order, the Security Policy Board shall consult where appropriate with the Overseas Security Policy Board. In carrying out its responsibilities under section 1.3(c) of this order, the Security Policy Board shall obtain the concurrence of the Director of the Office of Management and Budget. Sec. 6.4. Sanctions. Employees shall be subject to appropriate sanctions if they knowingly and willfully grant eligibility for, or allow access to, classified information in violation of this order or its implementing regulations. Sanctions may include reprimand, suspension without pay, removal, and other actions in accordance with applicable law and agency regulations. PART 7 GENERAL PROVISIONS Sec. 7.1. Classified Information Procedures Act. Nothing in this order is intended to alter the procedures established under the Classified Information Procedures Act (18 U.S.C. App. 1). Sec. 7.2. General. (a) Information obtained by an agency under sections 1.2(e) or 1.3 of this order may not be disseminated outside the agency, except to: (1) the agency employing the employee who is the subject of the records or information; (2) the Department of Justice for law enforcement or counterintelligence purposes; or (3) any agency if such information is clearly relevant to the authorized responsibilities of such agency. (b) The Attorney General, at the request of the head of an agency, shall render an interpretation of this order with respect to any question arising in the course of its administration. (c) No prior Executive orders are repealed by this order. To the extent that this order is inconsistent with any provision of any prior Executive order, this order shall control, except that this order shall not diminish or otherwise affect the requirements of Executive Order No. 10450, the denial and revocation procedures provided to individuals covered by Executive Order No. 10865, as amended, or access by historical researchers and former presidential appointees under Executive Order No. 12958 or any successor order. (d) If any provision of this order or the application of such provision is held to be invalid, the remainder of this order shall not be affected. (e) This Executive order is intended only to improve the internal management of the executive branch and is not intended to, and does not, create any right to administrative or judicial review, or any other right or benefit or trust responsibility, substantive or procedural, enforceable by a party against the United States, its agencies or instrumentalities, its officers or employees, or any other person. (f) This order is effective immediately. WILLIAM J. CLINTON THE WHITE HOUSE, August 2, 1995.
<urn:uuid:5ff29ebb-82e6-4187-9fa2-1649a9b6d8c8>
CC-MAIN-2017-47
http://fedglobe.org/index.php/category/uncategorized/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934808742.58/warc/CC-MAIN-20171124180349-20171124200349-00347.warc.gz
en
0.924206
6,797
2.546875
3
Last night I ventured out for the first public event I’ve attended since my surgery — Blue Mounds Area Project’s presentation in Mount Horeb, A Geologic Romp through the Driftless Area by Dr. Richard Slaughter, UW Geology Museum Director. I’m always ready to learn more about the geology of the Driftless Area in southwestern Wisconsin. The gathering was held at the Wisconsin Geological and Natural History Research Collection and Education Center. Before the very engaging talk by Dr. Slaughter, we heard from Patrick McLaughlin, geologist for the Wisconsin Geological and Natural History Survey, who told us about the facility where we were meeting. I was blown away! I had no idea such a collection existed or that I had been driving a block away from it for years. Here’s what is sitting silently in a very large, very anonymous building: Rock cores (most about an inch in diameter) - Cores from more than 2,000 drill holes throughout the state are cataloged and available for study. - These cores comprise more than 600,000 linear feet of subsurface rock samples from mineral, engineering, and geologic investigations. - Cuttings from more than 11,000 individual water-wells throughout the state are available. - These cuttings include 570,000 individual samples, each covering a 5-foot interval, collectively representing approximately 2.7 million linear feet of drilling Individual rock samples - More than 51,000 hand-size rock samples are labeled and stored. McLaughlin said that when the Wisconsin Geological Survey acquired this warehouse and office building about five years ago, it took 20 semi truck loads to transfer this subsurface collection. He calls it a kind of library and estimates the present-day replacement cost of the collection is conservatively estimated to be $120-140 million. These samples represent hundreds of investigations of the geology of Wisconsin, and many of these samples are irreplaceable. For example, some come from a project in the 1980’s when Milwaukee was designing a deep tunnel project under the city to handle rain water overflow. It would be impossible to recollect these cores now. Many of the cores come from mining operations in northern Wisconsin. The deepest cores come from oil exploration. There is one core that pierced almost 5,000 feet into the earth. Collecting cores today costs about $60 a foot, so a 1,000 foot costs $60,000. Sometimes these can be funded by the U.S. Geological Survey grant, but as most of them have been donated by industry, it’s an amazing bargain. Wisconsin has one of the largest collections in the Midwest, but the state with the biggest collection is Texas due to the extensive oil and gas drilling activity there. This collection represents a record of what is under our feet, and it is used for many studies, primarily ground water flow. As it explains in the website, protecting these materials is vital because - geologists frequently re-analyze existing samples whenever new environmental issues come to the forefront - advances in technology and equipment allow for different types of analyses - geologic theory evolves The Wisconsin Geological and Natural History Research Collection and Education Center seems almost as underground as the source of its collection. You could walk by it every day and not know it is there. But it is, and we are lucky it is. Who knows what vital knowledge is waiting quietly in those shelves and shelves of carefully stored cylinders of rock?
<urn:uuid:54adc8e2-51b5-4607-a6b3-cd069736fa06>
CC-MAIN-2021-31
https://digginginthedriftless.com/2012/01/27/rock-solid-science-the-wisconsin-geological-and-natural-history-research-collection/?shared=email&msg=fail
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155529.97/warc/CC-MAIN-20210805095314-20210805125314-00306.warc.gz
en
0.950378
724
2.75
3
It’s summer here in Toronto. During this time of year, it can be easy to note things that those around us have: - More vacation time - Children may express that they wish we had a cottage we could go to - Neighbours may seem to have less responsibility or commitments to juggle, or - Siblings seem to have the favour of our parents, no matter the circumstance. What is Envy? Envy is often described as a feeling of discontent or resentment that is triggered by someone else’s possessions, qualities, or luck. The physical experience can often include: - increased arousal in our head, neck and upper torso. Often people experience feelings of shame about their envy, as though we “shouldn’t” be feeling this way. How Envy Can be Useful Envy however, like many of our other emotions, is an interesting and useful signal. Our emotions carry important messages. One question to ask is: “what is it that envy trying to convey?” Perhaps we may have certain thoughts about ourselves, such as we aren’t good enough to achieve what someone else has achieved. Or perhaps we have thoughts about the world, such as the world not being a fair place. In these cases, examining these thoughts using an evidence-based approach can help us determine if there may be another way to think about these situations. Another Way of Looking at Envy We can also think of envy as recognition of what we are setting our course toward. The “pang” of envy may be a sign that we want an experience, recognition, or achievement, and that others have achieved it while we are still pursuing it. As such, we can use this experience as a way of setting new goals, and problem-solving solutions toward what we want. Ultimately, envy can be an acknowledgement of what matters to us, so there is no reason to feel shame about this! But if envy seems to be derailing your mood, morale or enjoyment of time with others, a therapist can be helpful in sorting out to use this feeling to make meaningful life changes for you. The content of this blog is for informational purposes only, and is not intended to be a substitute for professional medical or psychological advice, diagnosis or treatment. Always seek the advice of your mental health provider or physician with any questions that you have regarding mental health concerns. If you think you have an emergency, please call 911 or visit your nearest emergency room.
<urn:uuid:0c48c816-7aea-476f-b345-8ad622a41c4f>
CC-MAIN-2022-40
https://downtownpsychologyclinic.com/the-lighter-side-of-envy/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00566.warc.gz
en
0.964288
526
3.0625
3
How to Hold an Office Hour Prepare a skit that demonstrates proper (or improper) approaches to holding an office hour. Details for Mentoring in your office hour: As well as Lab or Discussion section, we focus the office hours toward Problem Solving. Many of the strategies of tutoring are similar with those you use in those sections. i. Make sure that students know where they are having difficulties The first thing you have to do is to determine the source of a student’s difficulty. Often the student cannot tell you this directly. Remember some students come to the office hour to just get the correct answers without really doing problems. You need make sure that they have made an honest attempt to do the problem before you give them any help. Always ask to see their work. Students might ask you about problems for other classes. Because you might be not familiar with the other classes, you will have to read their Lab manual or textbook. Make sure that the student shows you what they have done. If you have only one student in your office hour, you have time to do that. However, if you have several students in your office hour, you might not be able to spend much time with one student. If this happens, explain to the student that you must help the others and that they might get more effective help from a TA who is more familiar with their class. Do not turn a student away just because you are not teaching their class. This is demoralizing to student who interpret this action as rejection of them as a person. ii. Give some hints to their questions After determining the student’s difficulty, give the student some hints instead of just telling them how you would proceed toward the correct answer. If you determine that the student has a misconception, you could ask her/him some questions to try to get them to see a contradiction with something else they believe (like the 'skeptic' in the group solving). Again, do not just give the correct answer. Give the students the chance to go through their own thought processes. One suggestion is that you do not write anything down. Let the student do all of the writing. This help make the student a more active participant. If the TA does all the writing, the student tends to be just an observer. iii. Do not show the entire procedure to the final answer After giving some hints and/or questions and finding the student is on 'the right track', you can leave him/her and tutor the next student who is waiting for you. Our duty is not to give the correct final answers but to help each students learn problem-solving that fits their own thinking. Your procedure to the final answer is not likely to be the exact one that the student would use. You will not be there when the student takes a test.
<urn:uuid:fb437002-e276-40f5-b12c-6dfa2166b731>
CC-MAIN-2020-45
https://studylib.net/doc/18215948/how-to-hold-an-office-hour
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107880878.30/warc/CC-MAIN-20201023073305-20201023103305-00164.warc.gz
en
0.969833
567
2.546875
3
While thinking about dangerous pronouns, I was alerted to an article in The New York Times about microaggressions. “Microaggressions,” I learned, are “common verbal, behavioral, and environmental indignities, whether intentional or unintentional, that communicate hostile or negative slights to marginalized groups.” One example in The Times article, however, “You’re really pretty … for a dark-skin girl,” seemed to me not “micro” but outright racist – because of the words “for a.” We hear and use “for a” even as children on the playground. “Your hair is awfully long for a boy” or “You’re pretty strong for a girl.” Do we even notice the stereotypes about boys and girls in these comparisons? No, probably we accept them. Instead, we focus on the criticism or compliment directed to the individuals in these sentences. Perhaps we should also think about what the “for a” says about our expectations for boys and girls – the box “for a” puts them in. A feminist talking with a male acquaintance who expresses sympathy for her cause says, “You’re pretty smart for a man.” Does this remark raise eyebrows? I doubt it. She’s putting men down but also satirizing the stereotype of men as insensitive, macho types. Besides, men are so powerful already that no one needs to stick up for them. But again, what does the “for a” reveal about her expectations for men? Conversely, if a white person says to a black woman “You’re really pretty,” is the “for a” implied? I was told it was politically incorrect to say “Obama is so articulate” because it implied “for a black man.” I was perplexed. In my mind I was comparing Obama to George W. Bush. No race imagined or implied. I guess I could get in trouble if I said “You said that so well” to an Asian or Latino person, even if I meant the clarity of his or her reasoning, not the ability to speak English. It’s hard to think of a compliment that isn’t really a judgment, a comparison to a group or norm. “You sing beautifully” implies better than others. It’s unfortunate if someone hears an unintended and limiting “for a” in that compliment, but such is the burden of our history of discrimination. Certainly we can and should stop using “for a” aloud. The goal, if we are ever to achieve a post-racial society, is for all of us to stop thinking it.
<urn:uuid:8a793967-39dd-4f72-938f-58cc2024e4d6>
CC-MAIN-2017-51
https://whyalwaysblackandwhite.com/2014/04/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948612570.86/warc/CC-MAIN-20171218083356-20171218105356-00271.warc.gz
en
0.96085
578
3.09375
3
Mention the term dermatology and most individuals think of an area of medicine that deals with various skin conditions. Although dermatologists deal with skin disorders, hair, scalp, nails and other parts of the body, including the sweat glands, are also discussed. In certain situations, a dermatologist diagnoses and treats different conditions and even performs surgery.I strongly suggest you to visit West Dermatology Hillcrest to learn more about this. A Dermatologist Becoming One must first attend 4 years of medical school and earn a degree in general medicine to become a dermatologist and then attend a residency program focused on specializing in dermatology. A dermatologist may decide to enroll in a second residency program after completing his residency program to specialize in one of the different branches of the profession, such as working solely as a pediatric dermatologist or becoming a cosmetic dermatology specialist. What are Dermatologists Doing? The skin is a vital part of the body and it is the duty of dermatologists to help you keep your skin safe so that it can perform its task of protecting the body, keeping your calm, and preserving all the other functions that it is meant to do. This means that common skin diseases such as skin cancer, warts, fungal infections, dermatitis, psoriasis, acne, eczema, and cold sores are treated. As well as those not so common skin conditions. Dermatologists are individuals who are trained in a variety of medical fields and are able to examine skin problems and determine exactly what the cause might be and recommend the appropriate course of action. It is not just skin diseases that dermatologists treat. Cosmetic surgery procedures such as laser hair removal, wart removal, acne surgery, tattoo removal and chemical peels can be performed by certain dermatologists. Although a dermatologist deals with non-life-threatening diseases in most situations, his expertise is an integral aspect of the medical profession. His job often involves not only dealing with physical problems, but also with the mental and emotional well-being of the patient dealing with these kinds of medical problems. In helping to treat different disorders and diseases, a dermatologist also enlists the aid of other medical professionals. The role of dermatologists in the treatment of certain medical conditions is often essential not only to cure or treat the disease itself, but also to help the patient understand their condition, learn how to cope with it, and feel better about themselves and how they look. In several ways, a dermatologist’s work not only allows the patient to feel better physically, but also emotionally. For many patients, they can help restore a patient’s self-confidence and help provide them with a better quality of life.
<urn:uuid:aadd5b62-d286-44e3-be7d-b88da2741059>
CC-MAIN-2021-10
http://www.rustysnails.com/the-true-essence-of-dermatology/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178363809.24/warc/CC-MAIN-20210302095427-20210302125427-00181.warc.gz
en
0.968611
550
2.71875
3
Raleigh Hand Center 3701 Wake Forest Rd Raleigh, NC 27609 What is carpal tunnel syndrome? Carpal tunnel syndrome (CTS) is the most common compression neuropathy in the upper extremity. It results from increased pressure on the median nerve at the wrist, within the carpal tunnel. Basically, it is a type of "pinched nerve." The word "carpus" is derived from the Greek word karpos, which means "wrist." The carpal tunnel is a passageway in the wrist through which the median nerve and flexor tendons of the hand travel. The carpal tunnel is a narrow, confined space: the floor of the tunnel is made up by the carpal bones of the wrist, and the roof is created by the transverse carpal ligament. The median nerve is at risk for compression within this tunnel. If there is abnormal swelling, altered wrist anatomy, or injury to this area, median nerve function may be affected. Patients may experience symptoms such as numbness, tingling, weakness, and pain. The median nerve is responsible for providing sensation to the thumb, index, middle, and half of the ring finger. The median nerve also innervates most of the muscles at the base of the thumb (thenar muscles). What causes carpal tunnel syndrome? In most cases, the cause of CTS is unknown. Thyroid disorders, rheumatoid arthritis, pregnancy, vitamin deficiencies, diabetes, and fluid retention can be associated with CTS. Wrist fractures and swelling of the tendons (flexor tenosynovitis) can cause carpal tunnel syndrome. Women are more commonly affected than men. Repetitive forceful gripping and heavy use of vibratory tools may increase a person's risk of CTS. To date, prolonged computer use has not been proven to be a cause of CTS. How do I know if I have carpal tunnel syndrome? Patients with CTS commonly report "numbness" and "tingling" in the fingers. Some patients notice that the fingers feel cold, swollen, "asleep" or report "poor circulation" in the hands. Symptoms can awaken patients at night and patients tend to shake their hands for relief. Some patients report increased symptoms while gripping a steering wheel or reading a book in bed. Dropping objects, clumsiness with the hands, or a weak grip are also common complaints. In severe or long-standing cases, the muscles at the base of the thumb (thenar muscles) can become weak and atrophy, sometimes permanently. If you think you may have carpal tunnel syndrome, please visit www.raleighhand.com or call 919-872-3171 to be evaluated at the Raleigh Hand Center. Often the diagnosis can be made on the basis of your symptoms, medical history, and physical examination. During the office visit, I routinely examine the neck, shoulder, elbow, wrist, sensation in the hand, and muscle function in the hand. I also test the irritability of the median nerve. This involves tapping along the course of the nerve (Tinel's test), holding the wrist flexed (Phalen's test), and gently pressing on the carpal tunnel (carpal compression test). When surgical treatment is being considered, an electrodiagnostic study (nerve conduction study and/or electromyogram) is often recommended. This test is valuable to confirm the diagnosis, assess the severity of median nerve compression, and rule-out other potential causes of hand numbness. Not all hand pain or numbness is caused by carpal tunnel syndrome. The nerves of the upper extremity can be compressed or "pinched" anywhere along their pathway from the cervical spine (neck) to the fingers. Therefore it is important to identify the location of the nerve compression. In some cases, a nerve is compressed at two separate locations along its course, known as the "double-crush" syndrome, which can make the symptoms worse. What are the treatment options? Not everyone with carpal tunnel syndrome needs surgery. Fortunately, many people with CTS improve with non-operative treatment. Many people sleep with the wrist bent, which puts more pressure on the median nerve. Wearing a wrist brace at night supports the wrist in neutral alignment and takes pressure off the nerve. Modifying daily activities – particularly avoiding prolonged wrist flexion, forceful and repetitive gripping or vibratory tools – may help. Corticosteroid injections in the carpal tunnel ("cortisone shot") provide an anti-inflammatory effect and can be effective in over 60% of patients. Some patients may benefit from tendon gliding exercises, range of motion exercises, and stretching programs. Taking B6 vitamins may also help some patients. Should these measures fail to improve the condition, or if nerve compression is severe, surgery may be recommended. A carpal tunnel release (CTR) is performed to decrease pressure on the median nerve. During this procedure, the "roof" of the carpal tunnel (transverse carpal ligament) is divided through an incision at the base of the palm. Cutting the tranverse carpal ligament increases the size of the carpal tunnel and provides more room for the median nerve. What is the recovery from surgery? The surgery is performed on an outpatient basis usually under local anesthesia (numbing medicine). Patients may use their hands for light activities immediately, and I encourage gentle finger and thumb range of motion. Most people can return to light duty work in a few days. Normal use of the hand is resumed as comfort permits. Pain medication is often weaned in a few days. The soft surgical bandage can be removed after 5-7 days. Afterwards the wound should be covered with a large band-aid and kept dry. The skin sutures are removed in clinic in 10-14 days. Most patients do not require physical therapy or a brace after surgery. I recommend avoiding heavy lifting, pulling, pushing or gripping for approximately 3-4 weeks after surgery. What are the results from carpal tunnel surgery? Most patients are satisfied with their result after carpal tunnel surgery. Many patients report dramatic improvement in their numbness, tingling and pain in just a few days, but others may take longer to heal. Some patients do not have complete relief of symptoms, especially in severe or long-standing cases. In some severe cases, the nerve may not recover and the numbness does not improve, even with surgery. Soreness in the palm at the incision is common after surgery for several weeks. What are the complications from surgery? No surgery is risk-free. However, major complications from carpal tunnel release are uncommon. Possible complications include persistent symptoms, pain, bleeding, infection, hand stiffness, poor wound healing, and damage to the median nerve. Other complications are possible but uncommon. What does the incision look like? The length and type of incision varies among surgeons; however, the common goal is to reduce pressure on the median nerve. The length of incision needed to perform this procedure has decreased in size since CTR was initially described decades ago due to advancement in surgical techniques. Some surgeons use an endoscope to perform this procedure. The photos below demonstrate the less-invasive incision I typically use for open carpal tunnel release. The hand on the left is 2 weeks after carpal tunnel release surgery. The hand on the right is 8 weeks after surgery. The scar often fades with time. Dr. Erickson treats patients with carpal tunnel syndrome from the NC Triangle area including Raleigh, Durham, Cary, Wake Forest, Garner, Clayton, Fuquay-Varina, Apex, Morrisville, and Chapel Hill, North Carolina. If you have hand numbness, tingling, hand pain, or weakness, please call the Raleigh Hand Center at 919-872-3171 to schedule a consultation with a hand and upper extremity specialist. Read more about Dr. Erickson on the AAOS website A Nation in Motion Updated on 12/20/2012 For additional information There are thousands of websites related to carpal tunnel syndrome on the internet. Feel free to visit these reliable websites for accurate information: American Academy of Orthopedic Surgeons (AAOS) current guidelines for CTS American Society for Surgery of the Hand: www.assh.org American Academy of Orthopaedic Surgeons (AAOS): www.orthoinfo.org Copyright 2014 Erickson Hand Surgery Raleigh Hand Center 3701 Wake Forest Rd Raleigh, NC 27609
<urn:uuid:d27e6bd7-66a7-4266-80c4-5afe3ece462a>
CC-MAIN-2014-23
http://ericksonhandsurgery.com/patient_information/carpal_tunnel_syndrome
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894319.36/warc/CC-MAIN-20140722025814-00186-ip-10-33-131-23.ec2.internal.warc.gz
en
0.928021
1,778
3.015625
3
In mathematics, particularly in the branch known as functional analysis, a Hilbert space is a complete inner product space. As such, it is automatically also a Banach space. Due to the presence of an inner product, a Hilbert space has additional useful geometric properties that are not found in a Banach space; these properties may be exploited to simplify analysis or to obtain stronger results. For example, in a Hilbert space there exist projection operators onto closed subpaces of the Hilbert space. This makes Hilbert spaces extremely important in certain branches of mathematics such as optimization and approximation theory. As another example, any complex (real) continuous linear functional over a complex (real) Hilbert space can be expressed as the inner product of elements of that space with some fixed element of the space (this is known as the Riesz representation theorem). In mathematical terms, one says that a Hilbert space is isomorphic to its dual and is actually its own dual if the Hilbert space is real. In physics, Hilbert spaces play a fundamental role in the physical theory of quantum mechanics. The state (in the so-called Schrödinger picture) of a quantum mechanical system is postulated to be a unit vector (i.e., a vector of norm 1) in some Hilbert space, and physical quantities or "observables" are postulated as self-adjoint operators on that Hilbert space. States serve to assign statistical properties to observables of the system.
<urn:uuid:19ab79a9-3249-4db8-a7ca-2a62d2d091c3>
CC-MAIN-2023-06
http://test.citizendium.org/wiki/Hilbert_space
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.16/warc/CC-MAIN-20230203055519-20230203085519-00135.warc.gz
en
0.923837
295
3.4375
3
We at LED Waves have blogged before about the dangers of mercury exposure from fluorescent bulbs, as well as passed along Energy Star’s procedures for safely disposing of a broken CFL. Folks reluctant to switch to mercury-free LED lights have countered that the amount of the toxic heavy metal inside CFLs is negligible, some even going so far as to say that the Energy Star disposal guidelines are alarmist and unnecessary. This is obviously a sticky issue, especially as CFLs seem to be standard “gateway” lamp of choice for eco-conscious consumers before switching to LED lighting systems. For what it’s worth, we agree that mild exposure to a single broken CFL will probably not harm you that much – though we’d still recommend following the Energy Star guidelines (especially if you’re pregnant or nursing). So what is the problem? Well, in spite of the recycling efforts of some consumers, mercury exposure is still happening during the production and disposal of CFLs – and other such industrial products – and the toxic metal appears to be accumulating in the environment at a substantial rate. Consumer Reports recently conducted testing on canned tuna products. In a report released in their January 2011 issue, they found that the average mercury content of a white tuna sample was 0.427 parts per million. This is up from the 0.353 ppm found in the Food and Drug Administration’s sample testing from 2002-2004. Consumer Reports also noted that, while “white” tuna is generally believed to contain more mercury than “light” tuna, some light tuna contained enough that a woman of childbearing age who eats less than a can a week would still exceed federal recommendations for mercury consumption, as the metal can affect fetal development. WebMD says tuna can cause mercury poisoning in kitties, as they find the stuff addicting. So not only would upgrading to LED lights help save the planet through lower energy use and carbon emissions, but cutting out CFLs – and educating ourselves about the other mercury-tainted goods in our lives – will also help save the planet through more satisfying lunches. Please don’t deprive me of my spicy tuna rolls.
<urn:uuid:6899db83-e686-42ca-98d0-7f2853be7aa9>
CC-MAIN-2013-48
http://www.ledwaves.com/blog/2010/12/16/mercury-in-cfls-it-all-adds-up/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164000905/warc/CC-MAIN-20131204133320-00048-ip-10-33-133-15.ec2.internal.warc.gz
en
0.956028
446
2.703125
3
The tune of Yankee Doodle is thought to be much older than the words, and many peoples knew the melody, including those of England, France, Holland (modern Netherlands), Hungary, and Spain. The earliest words of "Yankee Doodle" came from a Middle Dutch harvest song (which is thought to have followed the same tune), possibly dating back as far as 15th century Holland. It contained mostly nonsensical and out-of-place words, both in English and Dutch: "Yanker, didel, doodle down, Diddle, dudel, lanther, Yanke viver, voover vown, Botermilk und tanther." However, farm laborers in Holland at the time received as their wages "as much buttermilk (Botermilk) as they could drink, and a tenth (tanther) of the grain". The term Doodle first appeared in English in the early seventeenth century, and is thought to be derived from the Low German (a language close to Dutch) dudel, meaning “playing music badly” or Dödel, meaning "fool" or "simpleton". The Macaroni wig was an extreme fashion in the 1770s and became contemporary slang for foppishness.Dandies were men who placed particular importance upon physical appearance, refined language, and leisurely hobbies. Historically, a dandy who was self-made often strove to imitate an aristocratic lifestyle, especially in late 18th- and early 19th-century Britain, despite coming from a middle-class background. They were members of the Macaroni Club in London at the height of the fashion for dandyism, so called because they wore striped silks upon their return from the Grand Tour and a feather in their hats. They also wore two fob watches—"one to tell what time it was and the other to tell what time it was not" ran their joking explanation. Their love of horse racing at Cheltenham and Bibury (both in England) can still be recognised today in the names of the 18th Century Macaroni Farm and Macaroni Woods near Eastleach, Gloucestershire, UK. The verse implies that Yankees were so unsophisticated that they thought that simply sticking a feather in a cap would make them the height of fashion. Peter McNeil, professor of fashion studies, claims that the British were insinuating that the colonists were womanish and not very masculine. Traditions place its origin in a pre-Revolutionary War song originally sung by British military officers to mock the disheveled, disorganized colonial "Yankees" with whom they served in the French and Indian War. The British troops sang it to make fun of their stereotype of the American soldier as a Yankee simpleton who thought that he was stylish if he simply stuck a feather in his cap. It was also popular among the Americans as a song of defiance. As per the American Library of Congress, the Americans added additional verses to the song, mocking the British troops and hailing the Commander of the Continental armyGeorge Washington. By 1881, Yankee doodle had turned from being an insult to being a song of national pride. "Upon their return to Boston [pursued by the Minutemen], one [Briton] asked his brother officer how he liked the tune now, — 'Dang them', returned he, 'they made us dance it till we were tired' — since which Yankee Doodle sounds less sweet to their ears." The earliest known version of the lyrics comes from 1755 or 1758, as the date of origin is disputed: Brother Ephraim sold his Cow And bought him a Commission; And then he went to Canada To fight for the Nation; But when Ephraim he came home He proved an arrant Coward, He wouldn't fight the Frenchmen there For fear of being devoured. (Note that the sheet music which accompanies these lyrics reads, "The Words to be Sung through the Nose, & in the West Country drawl & dialect.") For this reason, the town of Billerica is the "home" of Yankee Doodle, and claims that at this point the Americans embraced the song and made it their own, turning it back on those who had used it to mock them. There is another version attributed to Edward Bangs, a student at Harvard College, who wrote a ballad with fifteen verses which circulated in Boston and surrounding towns in 1775 or 1776. Yankee Doodle was also played at the British surrender at Saratoga in 1777. On February 6, 1788, Massachusetts ratified the Constitution by a vote of 186 to 168. To the ringing of bells and the booming of cannon, the delegates trooped out of Brattle Street Church. Before many days had passed, the citizens sang their convention song to the tune of "Yankee Doodle." Here are the lyrics to their song: President John F. Kennedy from Massachusetts bought a pony for his daughter Caroline while he was in the White House. The family named it "Macaroni" after the song Yankee Doodle, although the name refers to the feathered cap rather than the pony. The children's cartoon series Roger Ramjet (1965) adapts "Yankee Doodle" as its theme song: "Roger Ramjet and his Eagles/Fighting for our freedom/Fly through in and outer space/Not to join 'em, but to beat 'em/Roger Ramjet, he's our man/Hero of our nation/For his adventures, just be sure/and stay tuned to this station". Ramjet's four child sidekicks, the "American Eagle Squadron", are named Yank, Doodle, Dan, and Dee. A Sesame Street parody of the song was done by music writer Don Music, who centered the song around cooking macaroni. In the song, Yankee Doodle stayed at home and cooked macaroni in a pot for his pony. ^Luzader, John F. (2008). Saratoga: A Military History of the Decisive Campaign of the American Revolution. New York: Savas Beatie. p. 335. ISBN978-1-932714-44-9. ^Gen. George P. Morris - "Original Yankee Words", The Patriotic Anthology, Doubleday, Doran & Company, Inc. publishers, 1941. Introduction by Carl Van Doren. Literary Guild of America, Inc., New York, NY. ^Berg, Jerome S. (1999). On the Short Waves, 1923-1945: Broadcast Listening in the Pioneer Days of Radio. McFarland. p. 104. ISBN0-7864-0506-6.
<urn:uuid:be6d6a78-6f96-46a0-91ff-ad4116b217d4>
CC-MAIN-2016-26
http://www.mashpedia.com/Yankee_Doodle
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00183-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968782
1,395
3.296875
3
Discover the cosmos! Each day a different image or photograph of our fascinating universe is featured, along with a brief explanation written by a professional astronomer. 2009 August 30 Explanation: These bacteria could survive on another planet. In an Earth lab, Deinococcus radiodurans (D. rad) survive extreme levels of radiation, extreme temperatures, dehydration, and exposure to genotoxic chemicals. Amazingly, they even have the ability to repair their own DNA, usually within 48 hours. Known as an extremophile, bacteria such as D. rad are of interest to NASA partly because they might be adaptable to help human astronauts survive on other worlds. A recent map of D. rad's DNA might allow biologists to augment their survival skills with the ability to produce medicine, clean water, and oxygen. Already they have been genetically engineered to help clean up spills of toxic mercury. Likely one of the oldest surviving life forms, D. rad was discovered by accident in the 1950s when scientists investigating food preservation techniques could not easily kill it. Pictured above, Deinococcus radiodurans grow quietly in a dish. Authors & editors: Jerry Bonnell (UMCP) NASA Official: Phillip Newman Specific rights apply. A service of: ASD at NASA / GSFC & Michigan Tech. U.
<urn:uuid:0b7de66c-cc1c-4c09-9c41-f370f538f7c3>
CC-MAIN-2023-40
https://apod.nasa.gov/apod/ap090830.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00793.warc.gz
en
0.919726
292
3.734375
4
Electricity Prices Going Up Or Down We all know how important it is to save money on our bills, but with rising prices on everything from groceries to gas, it can be tough! I’ll tell you the truth. The real answer is no one knows for sure whether power prices will go up or down, as there are a lot of factors that go into how the electricity suppliers set the prices each year. However, in this article, we will walk you through how electricity is priced and the key factors that drive power prices, so you can make an educated guess. It’s interesting, but you might be surprised at how your local energy prices compare to other locations in the country! What Determines Electricity Prices? To understand what affects electricity prices, first, you need to know how ISOs/RTOs operate. Independent System Operators (ISOs) also known as Regional Transmission Organizations (RTOs) are simply responsible for operating the power grid reliably by meeting 100% of the customers’ electricity needs at any given time using the cheapest energy source available. The cheapest source is determined using this simplified formula: Cost Of Electricity = (Cost Of Resource * Heat Rate) + Additional Expenses Here is what each term means: - Cost Of Resource: This is the cost of the raw material that is burned to generate electricity such as coal and gas. - Heat Rate: The heat rate is simply how efficient the power plant is in converting the fuel into electricity, and the lower the heat rate, the cheaper the produced electricity is. Each plant has a different heat rate even if they are burning the same resource. For instance, a coal-fired power plant might have a lower heat rate than a gas-fired power plant while having a higher heat rate than another gas-fired power plant. - Additional Expenses: Those are all the expenses that the plant needs to operate such as transmission, labor, maintenance, in addition to the profit margin. From this equation, you can’t help but notice that electricity from renewable sources is the cheapest, as it requires no fuel (0 cost of resource) and you just have to pay for the labor and transmission fees (additional expenses). Therefore, ISOs/RTOs will use the energy from renewable sources first to meet the grid demand. Unfortunately, renewables can’t meet 100% of the demand yet, so after using all the reliable renewable electricity, ISOs will look for the second cheapest source, which is nuclear reactors. Similarly, there aren’t enough nuclear power plants to meet the remaining grid demand, so after using all the power produced, RTOs will go to the next cheapest source, which is coal. Although we have a lot of coal power plants, the grid demand is much higher, so ISOs turn to the last electricity supplier, which is natural gas. Luckily, there are enough natural gas plants to cover all the remaining consumer electricity needs unless the demand spikes such as the case in the hottest and coldest days. Now after knowing what the cheapest sources are and how they are priced, let’s get into how ISOs operate. As we mentioned before, as an ISO, your job is to meet the grid demand using the cheapest electricity source possible. So, let’s say right now you need 100kW. And a wind farm is offering 10kW, a nuclear plant is offering 30kW, a coal-fired plant is offering 50kW, and a gas-fired plant is offering 30kW. Obviously, the first thing you will buy is the wind farm power, as it’s the cheapest, if the demand is met, then that’s it, you won’t buy any power. However, in this scenario, the wind farm only offered you 10kW and you still need 90kW to meet the demand. Thus, you will turn to the next cheapest source and so on till you meet all the customers’ electricity demand at the given moment. So, how much should you charge the customer for the electricity? Ideally, you should charge your customer the average rate you paid to get this electricity from all the different sources, right? Well, this is not how it works. Instead, the ISO will pay each plant the same rate per kW as the plant that provided the final kW to meet the demand. For instance, if right now you need 100kW, and there is a solar farm that offers 100kW and charges you $0.03/kW, then you will just buy all the solar farm power to meet the grid demand and will only pay $0.03/kW. On the other hand, if the solar farm only offered you 99kW at $0.03/kW, you will then have to turn to nuclear plants to meet the remaining grid demand (1 kW). Assuming that the nuclear plant sells its electricity at $0.07/kW, then you will pay both the nuclear plant and the solar farm $0.07/kW, even though you only bought 1kW from the nuclear plant. Because that’s how the system works, the energy rates will depend on the last plant that meets the demand, which are usually the natural gas plants. This makes natural gas prices one of the strongest -if not the strongest- influencers of the electricity rates. What Affects Natural Gas Prices? In the previous section, we learned how ISOs work and that natural gas is the main driver of electricity prices. In this section, we will go through some of the key factors that affect natural gas prices. 1. Supply And Demand Similar to any market in the world, the energy market follows the principles of supply and demand. The supply will depend on the production and storage, while demand follows both weather (temperature) and industrial activity. For instance, in winter when it’s colder than usual, more people use their heating systems which increases the demand for natural gas to produce heat. On top of that, when there is bad or extreme weather such as hurricanes or heavy snow, it can reduce the production of petroleum, which affects the natural gas supply, resulting in even higher electricity prices. 2. Storage Space Unlike the electricity market where there is a constant demand for power, natural gas can be stored. For instance, in the US and other developed countries such as the UK, Japan, and South Korea there are facilities that store huge amounts of natural gas underground. This allows these countries to maintain their supply and be ready for spikes or changes in the geopolitical environment. In the US, those facilities are called storage regions and there is usually a negative correlation between electricity prices and storage levels in these areas because when there’s less demand for natural gas, the prices will drop, as storage regions will be filled with natural gas and they need to free up some space. When the demand is higher than the production, then the storage regions’ supplies will be depleted, which will drive the prices up. 3. The Capacity Of The Pipeline This is mainly important during demand spikes, as the pipeline capacity will determine the amount and speed the natural gas can be supplied to the power plants to produce electricity. If the pipeline capacity is low, then there will be a shortage of natural gas and electricity prices will skyrocket. On the other hand, if you have more pipelines connected to your region or country, then the demand spike won’t affect power rates as much. 4. Geopolitical Environment The problem is that there are certain areas in the world where political tension between countries can escalate quickly, and also affect natural gas prices. For instance, when Russia and Ukraine got into that disagreement over Crimea, then it almost caused another crisis in Europe due to their reliance on Russian natural gas flowing through pipelines from Ukraine. In addition to this, there are some countries such as Iran where sanctions can affect its oil production which will then lead to a shortage of natural gas and increase the prices. This is also another key factor that can affect natural gas prices. For instance, the US market has always been heavily influenced by politics and regulations since it’s a deregulated market where power providers compete to sell electricity to consumers (this doesn’t apply anymore due to Trump). Thus, if there are any changes in taxes or environmental laws, it can affect the supply of natural gas and electricity prices. For instance, during Obama’s presidency, there were new regulations that taxed carbon emissions which affected both consumers’ power rates as well as the companies who are producing oil or coal. So, will electricity prices go up or down? Right now, all signs indicate that we are heading to the deepest recession since world war ll. It’s quite clear that the central banks are running out of tools, and their ability to lower interest rates will not be enough. That said, there is no doubt in my mind that electricity prices (which are set by oil markets), will go up during this period until an equilibrium can be reached again where all economic indicators improve once more. About the author Kami Turky, CEO of Solar Energy Hackers, solarenergyhackers.com.
<urn:uuid:48000d0a-2b49-41f2-8356-7e8b5be3be24>
CC-MAIN-2023-14
https://en.blog.milkthesun.com/electricity-prices-going-up-or-down/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00106.warc.gz
en
0.941393
1,940
3.171875
3
Monasteries and Patrons in the Gorze Reform Lotharingia C.850-1000 This book explores the prominent role of monasteries in the early medieval period and their relationship to the nobility in Lotharingia throughout the 9th and 10th centuries. It focuses on the evidence from three of the region's greatest abbeys — Gorze, Saint-Maximin, and Saint-Evre — which played a central role in the monastic reform movement. This swept through the region in the 930s and is commonly named after Gorze. Set within the context of the whole social structure and exercise of regional power in the early middle ages, this book demonstrates the vitality and importance of monasteries, focusing on their land transaction as well as their religious roles. Accepted notions of monastic lordship are challenged and the complexity of the two-way relationships between monasteries and their patrons, relationships which ensured the former a central place in the early medieval landscape, is discussed. Oswald, Fleury and Continental Reform British Library Cataloguing in Publication Data A CIP catalogue record for this book is available from the British Library ISBN 0 7185 0003 2 Library of Congress Cataloging-in-Publication Data St Oswald of Worcester : life and influence / edited...
<urn:uuid:0bc70414-8e7a-482b-9f33-daa61179080f>
CC-MAIN-2020-24
https://www.history.ox.ac.uk/people/dr-john-nightingale
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348511950.89/warc/CC-MAIN-20200606062649-20200606092649-00110.warc.gz
en
0.914566
266
2.671875
3
Conservation and management of an endangered marsupial, the Sandhill Dunnart, in a semi-arid environment A project undertaken at the School of Earth and environmental Science, The University of Adelaide, and supervised by Dr Sue Carthew Australia has one of the highest rates of extinction in the world, particularly for mammals of the arid zone. Arid and semi-arid species are subject to a number of threatening processes, including predation from introduced cats and foxes, land clearance for agriculture, changing fire regimes post-European settlement and, more recently, increased mining activities and climate change. Unfortunately, the biology, life history and population dynamics of many semi-arid zone mammal species are little known, making effective management and conservation problematic. One such species is the nationally endangered sandhill dunnart (Sminthopsis psammophila) (Figure 1). The species is known from only a small number of individuals inhabiting three disjointed populations; two in South Australia and one in Western Australia (Figure 2). In order to conserve this species, ecological knowledge is required to predict how it is likely to respond to current and future threats and accordingly what type of management actions are needed to ensure its persistence. This study used a combination of ecological and genetic information from a core population on the Eyre Peninsula (EP) in a semi-arid environment to investigate: The broad scale genetic analyses revealed that the three known core populations of S. psammophila are genetically differentiated, but do not show evidence of long-term population isolation. Within the core population the fine-scale genetic analyses and mark-recapture data indicated that both males and females were relatively mobile during their lives with no significant genetic structure evident within the 24,000 ha study area. The study also indicated that the abundance of S. psammophila was influenced by rainfall events. During the low rainfall year significantly fewer S. psammophila were caught and a higher proportion of individuals were transients (only caught once), most likely in response to a decrease in food resources. The relatively high mobility in this species appears to be an adaptation to a system with variable food resources; individuals need to be mobile in order to track food pulses created by rainfall through the landscape. S. psammophila was found to be positively associated with the number of logs and vertical habitat complexity and negatively associated with the average height of spinifex (Triodia spp.). These associations likely reflect a preference for areas with increased protection from predators and increased foraging opportunities. Implications for conservation Our study concluded that large areas of suitable habitat will need to be protected in order to maintain a viable S. psammophila population. The preference of S. psammophila for complex understorey suggests that recently burnt vegetation may be unsuitable for the species, therefore limiting large scale wildfires may be required to protect the species. Future research should focus on identifying critical habitat for S. psammophila and determining how the species persists during drought years. McLean, AL (2015) Conservation biology of an endangered semi-arid marsupial, the sandhill dunnart (Sminthopsis psammophila).PhD thesis, The University of Adelaide.
<urn:uuid:70aeea7c-bd04-4142-ade8-6e2da51954f6>
CC-MAIN-2019-09
http://apscience.org.au/projects/APSF_11_4/apsf_11_4.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247514804.76/warc/CC-MAIN-20190222074154-20190222100154-00434.warc.gz
en
0.925708
664
3.28125
3
Service Set Identifier (SSID) in Computer Network Service Set Identifier (SSID) is the primary name associated with an 802.11 wireless local area network (WLAN) that includes home networks and public hotspots. Client devices use this name to identification and join wireless networks. For example, while trying to connect to a wireless network at work or school named guest_network you see several others within the range that is called something entirely different names. All the names you see are the SSIDs for those networks. On home Wi-Fi networks, a broadband router or broadband modem stores the SSID but administrators can change it. Routers broadcast this name to help wireless clients find the network. The Service Set Identifier (SSID) is a case-sensitive text string that can be as long as 32 characters consisting of letters or numbers or a combination of both. Within these rules, the SSID can say anything. Router manufacturers set a default SSID for the Wi-Fi unit, such as TP_LINK, D_LINK, JIO_FI, or just DEFAULT. Since the SSID can be changed, not all wireless networks have a standard name like that. Uses of SSID by devices – Wireless devices like phones, laptops, etc scan the local area for networks broadcasting their SSIDs and present a list of names. A user can join a new network connection by picking a name from the list. In addition to obtaining the network’s name, the Wi-Fi scan also determines whether each network has wireless security options enabled or not. In most cases, the device identifies a secured network with a lock symbol next to the SSID. Most wireless devices keep track of the different networks a user joins as well as the connection preferences. Users can also set up a device to automatically join networks having certain SSIDs by saving that setting into their profiles. In other words, once connected, the device usually asks if you want to save the network and reconnect automatically in the future. Most wireless routers offer the option to disable SSID broadcasting to improve Wi-Fi network security as it basically requires the clients to know two passwords, the SSID and the network password. However, the effectiveness of this technique is limited since it’s fairly easy to get the SSID from the header of data packets flowing through the router. Connecting to networks with disabled SSID broadcast requires the user to manually create a profile with the name and other connection parameters. Problem with SSIDs – - If there are no wireless security options enabled on a network then anyone can connect to it by knowing only the SSID. - Using a default SSID increases the chances that another nearby network will have the same name which can confuse wireless clients. When a Wi-Fi device discovers two networks with the same name, it will prefer and may try auto-connecting to the stronger radio signal, which might be the unwanted choice. In the worst case, a person might get dropped from their own home network and reconnected to a neighbor’s who does not have login protection enabled. - The SSID chosen for a home network should contain only generic and sensible information. Some names (like HackMyWIFIIfYouCan) unnecessarily provoke thieves to target certain homes and networks over others. - An SSID can contain publicly visible or offensive language or coded messages.
<urn:uuid:f3a7607d-438e-4861-bfe4-09b2d17cbf44>
CC-MAIN-2023-06
https://origin.geeksforgeeks.org/service-set-identifier-ssid-in-computer-network/?ref=lbp
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499816.79/warc/CC-MAIN-20230130101912-20230130131912-00441.warc.gz
en
0.912781
693
3.140625
3
English: The Great British Trees were 50 trees selected by The Tree Council (UK) in 2002 to spotlight trees in Great Britain in honour of the Queen's Golden Jubilee. Commemorative plaque for the Elizabeth Oak This tree is in Cowdray Park. A sign at the Capon Tree A plaque indicating The Major Oak is one of the Great British Trees Royal Oak commemorative plaque The Great Holker Lime at Holker Hall This apple tree is in the grounds of Woolsthorpe Manor. It grew up from the fallen tree which is said, possibly erroneously, to have bestowed its fruit on Sir Isaac Newton's head, thereby producing the 'Eureka' moment which led to the formulation of a complete theory of gravitational force. The Martyrs tree Under this tree the Tolpuddle Martyrs agreed to form a trade union. In 1834 they were tried at Dorchester assizes and transported for seven years The Royal Oak at Boscobel House, Shropshire, England. A descendant of the oak in which Charles II hid when fleeing after the Battle of Worcester. The Split trunk section of the Llangernyw Yew. The Fortingall Yew (Taxus baccata) Standing near the geographical heart of Scotland and estimated at c.5,000 years old, the Fortingall Yew is possibly the oldest tree, perhaps the oldest living thing, in Europe. The Poem Tree, Wittenham Clumps, Oxfordshire. The Bowthorpe Oak The famous centuries-old oak tree at Bowthorpe Park Farm near Manthorpe south of Bourne. The trunk of the Ankerwyke Yew. The thorn tree at Appleton Thorn, Warrington. The hawthorn at Appleton is supposedly a descendant of the Holy Thorn at Glastonbury One of the oldest trees at Kew is a male maidenhair tree which dates back to 1762 - one of the 50 “Great British Trees”
<urn:uuid:76749fbe-e5c7-48f6-8ac5-b56b5ff86842>
CC-MAIN-2016-30
https://commons.wikimedia.org/wiki/Great_British_Trees
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257831770.41/warc/CC-MAIN-20160723071031-00119-ip-10-185-27-174.ec2.internal.warc.gz
en
0.924054
419
3.15625
3
Back in August 2002, DDJ Contributing Editor Mark Nelson explained Star encoding -- a simple transformation algorithm that can be implemented easily with the help of the C++ Standard Library. by Mark R. Nelson Transformation algorithms are an interesting class of data-compression techniques in which you can perform reversible transformations on datasets to increase their susceptibility to other compression techniques. For instance, the Burrows-Wheeler Transform (see my article "Data Compression with the Burrows-Wheeler Transform," DDJ, September 1996) is a completely reversible sorting algorithm that can create long runs of identical characters in the output text. Using a move-to-front algorithm followed by Huffman or arithmetic coding results in compression that outperforms all but the best algorithms. Likewise, in the JPEG compression algorithm, 8x8 blocks of pixels can be run through the Discrete Cosine Transform (DCT), which transforms the spatial data points to the frequency domain. At that point, lossy compression algorithms can then be effectively applied. The transformations I describe here generally don't compress data at all; instead, they prep the data before compression is applied. Thus, a key factor in using any transform is understanding what compression technique can effectively be used on the output. With the Burrows-Wheeler Transform (BWT), the best results come from a three-stage compressor. The output of the BWT transform is usually piped through a move-to-front stage, then a run-length encoder stage, and finally an entropy encoder (normally arithmetic or Huffman coding). BWT is a sorting algorithm that radically changes the nature of an input file. Star encoding is simpler to understand and can be implemented easily with the help of the C++ Standard Library. Star encoding works by creating a large dictionary of commonly used words expected in the input files. The dictionary must be prepared in advance and must be known to both the compressor and decompressor. Each word in the dictionary has a star-encoded equivalent, in which as many letters as possible are replaced by the "*" character. For example, a commonly used word such as "the" might be replaced by the string "t**". The star-encoding transform simply replaces every occurrence of the word "the" in the input file with "t**". Ideally, the most common words have the highest percentage of "*" characters in their encodings. If done properly, this means that the transformed file will have a huge number of "*" characters. This ought to make the transformed file more compressible than the original plain text. Figure 1(a), for example, is a section of text from Project Gutenberg's version of Romeo and Juliet. Running this text through the star encoder yields Figure 1(b). You can see that the encoded data has exactly the same number of characters, but is dominated by stars. It certainly looks as though it is more compressible. But before you can test the compressibility of the output data, you need to build programs to create the dictionary, star encode a file using a dictionary, and decode the file using an identical dictionary. But soft, what light through yonder window breaks? It is the East, and Iuliet is the Sunne, Arise faire Sun and kill the enuious Moone, Who is already sicke and pale with griefe, That thou her Maid art far more faire then she B** *of*, **a* **g** *****g* ***d*r ***do* b*e***? It *s *** E**t, **d ***i** *s *** *u**e, A***e **i** *un **d k*** *** e****** M****, *ho *s a****** **c*e **d **le ***h ****fe, ***t ***u *e* *ai* *r* f*r **r* **i** ***n s** *43 *1069, *41 *349 *469 *1492 *2583 *12782? *114 *7 *0 *2550, *1 *417 *7 *0 *931, *5359 *193 *902 *1 *521 *0 *1548 *616, *168 *7 *1283 *731 *1 *695 *13 *1042, *34 *21 *27 *938 *144 *3817 *49 *193 *37 *67 Creating the Dictionary MakeDictA.cpp (available electronically; www.ddj.com) creates the dictionary. MakeDictA is invoked with a list of filenames as command-line arguments. It scans through each file looking for tokens, adds them to the dictionary if needed, and updates the token's frequency count. Once the tokens have been counted, the list is sorted by frequency. The program then goes through the list, starting with the most frequent tokens, and assigns them star codes. As a final step, the dictionary is written to standard output. Tokenizing and Scanning Unfortunately, the C++ Standard Library doesn't have a stream tokenizer. If my needs were more complicated, I might use the Boost Tokenizer (http://boost.org/libs/tokenizer/index.htm), but in this case, I simply wrote the code shown in Listing One below. string get_token( ifstream &file ) while ( file ) file >> c; if ( isalpha( c ) || c == '\'' ) token += c; else if ( token.size() ) This function is called repeatedly from main(). The map object named frequency is updated as each token is encountered. If the string is not found in frequency, it is inserted with a count of 1. Otherwise, the count is incremented; see Listing Two below. string token = get_token( infile ); if ( token.size() == 0 ) map< string, int >::const_iterator ii = frequency.find( token ); if ( ii == frequency.end() ) frequency[ token ] = 1; frequency[ token ]++; Sorting and Assigning Codes After all the tokens from all the input files have been scanned, you have a map with an appearance count for every word encountered in the input text. The next step requires that you iterate through all the words, starting at the most frequent and going all the way to the least. Unfortunately, the frequency map is keyed on the word name, not the frequency. So before code assignment can start, you need to reorder the data. You can do this with just a few lines of code by inserting all the string/integer pairs into a map object called counts. Since this map is keyed on the integer value instead of the string, the values are automatically sorted in the form you want; see Listing Three below. for ( map::iterator ii = frequency.begin() ; ii != frequency.end(); counts.insert( pair( (*ii).second, (*ii).first ) ) With the data sorted correctly, the remaining piece of hard work is to iterate over the counts map and assign a code to each one, as in Listing Four below. for ( multimap::reverse_iterator jj = counts.rbegin() ; jj != counts.rend() ; string code = create_star_code( (*jj).second, used_codes ); used_codes.insert( code ); codes[ (*jj).second ] = code; cout << (*jj).second << " " << code << " " << (*jj).first << endl; A couple of interesting things to note show up in this loop. First, each time a new code is assigned to a token, the code value is stored in a set called used_codes. You have to keep track of the used code values during the assignment process so that no star code is inadvertently used twice. Second, you can see that the value of each token and its code is being written to standard output. (I write the frequency count as well, although this is technically not needed. It helps me to keep an eye on the process and ensure it is working as desired.) The Code Assignment Algorithm In MakeDictA, I perform a star-code assignment in a routine called create_star_code(). This algorithm uses a greedy heuristic to assign codes, attempting to use the highest possible number of "*" characters to each token; see Listing Five below. for ( int star_count = token.size() ; star_count > 0 ; star_count-- ) vector pattern( token.size(), '*' ); for ( int i = star_count ; i < token.size() ; i++ ) pattern[ i ] = '-'; string test( token ); for ( int j = 0 ; j < token.size() ; j++ ) if ( pattern[ j ] == '*' ) test[ j ] = '*'; set::const_iterator kk = used_codes.find( test ); if ( kk == used_codes.end() ) } while ( next_permutation( pattern.begin(), pattern.end() ) ); For a token of length N, the assignment routine first attempts to replace all characters in the token with stars, then all but one, then all but two, and so on. The often overlooked next_permutation function from the C++ Standard Library helps with this. To test this program, I went to Project Gutenberg (http://promo.net/pg/) and retrieved the text of eight Shakespeare plays (also available electronically). With allowances for line breaks, the text below shows the command line I used to create the dictionary file: [c:\star] MakeDictA text\AsYouLikeIt.txt text\Hamlet.txt text\JuliusCaesar.txt text\KingLear.txt text\Macbeth.txt text\RomeoAndJuliet.txt text\TheTamingOfTheShrew.txt text\TheTempest.txt > DictA.txt The program creates 16,927 codes in fairly short order, producing DictA.txt (available electronically) shown here in a somewhat abridged form: the *** 4556 I * 4390 and **d 3676 to ** 3218 of *f 2899 you **u 2775 a a 2714 ...[skipping 8500 lines]... vexations ****t**n* 1 vestall **s*a** 1 versall **r**l* 1 verities *** i***s 1 verge v*r** 1 ...[skipping 8500 lines]... 'Twentie *T****** 1 'Saue *S*** 1 'Prethee *P****** 1 'Pre *P** 1 With this somewhat limited vocabulary, you can see that even words that appear very rarely are replaced with a very high percentage of stars. The most frequent words are replaced completely. Compressing and Decompressing the Transformed Data StarEncode.cpp and StarDecode.cpp (both available electronically) transform text files to and from the star-encoded format. Both programs are invoked with the name of the dictionary file on the command line. The programs then transform standard input to standard output. Internally, they simply read the dictionary file into a map object that holds all the encodings. They then read in text, passing special characters through unchanged, and translating tokens whenever possible. Figure 2 is the encoding program in operation, as it encodes Romeo and Juliet using the dictionary created earlier. The result of this encoding should be a file that is now more compressible than the original. To test this theory, I compressed both the original and encoded file in WinZip, with the results shown in Figure 3. The results are encouraging. The compressed file decreases in size by almost 12 percent, with the compression ratio improving from 60 percent to 64 percent-tangible savings with only a small increase in computation. While building the encoder, I started wondering about the structure of my star codes. It seemed kind of arbitrary to insist that every star code have the same number of stars as the word it was encoding. For example, "the" (the most frequent word) was encoded as "***," while "I" (the second most frequent word) was encoded with a single star. Shouldn't the most frequent word get the fewest number of stars? To test this theory, I created a second dictionary builder using a new heuristic for assigning codes. In this heuristic, a star code is simply a single-star character concatenated with a plain-text code number, with the most frequent token being assigned code 0. Using this scheme simplified my encoder. The main loop that assigns codes to tokens no longer needed to keep track of used codes and was simple enough to do code assignment inside the loop, instead of in a separate function; see Listing Six. int star_code = 0; for ( multimap< int, string >::reverse_iterator jj = counts.rbegin() ; jj != counts.rend() ; string token = (*jj).second; if ( token.size() > 1 ) cout << token << " " << " " Comparing the output from Variant B to that described earlier shows how the two strategies create quite different dictionaries: the *0 4556 and *1 3676 to *2 3218 of *3 2899 you *4 2775 ...[skipping 8500 lines]... vexations *8480 1 vestall *8481 1 versall *8482 1 verities *8483 1 verge *8484 1 ...[skipping 8500 lines]... 'Twentie *16899 1 'Saue *16900 1 'Prethee *16901 1 'Pre *16902 1 'Boue *16903 1 One difference, in this case, is that I don't bother to encode strings of just a single character in length, as their encoded values would always be larger. To test this variant, I compiled MakeDictB.cpp, created DictB.txt, and ran RomeoandJuliet.txt through StarEncode.cpp; shown earlier in Figure 1(c). While the text is somewhat harder to read, it is more compact. The character set is much more limited here because every word is star encoded using only the star character and the integers. Comparing A and B Figure 4 is the listing of a Zip file that contains both encoded texts plus the original. In this case, the difference between a standard Zip compressor and Variant B runs nearly 15 percent, quite a nice savings. You can see that Variant B comes out ahead, with a delta that seems worth going for. Recommendations and Caveats Star encoding is a handy way to squeeze some additional fluff out of your files. Of course, there is a catch. For star encoding to be effective, you have to know in advance what the vocabulary of the source files is going to be. There are many times when this is the case; for example, computer-generated reports, e-mail or newsgroup archives, trace or log files, cached web pages, and the like. Still, I doubt star encoding could be used in a general-purpose compressor. A hypothetical archiver called "StarZip" might attempt to create a good dictionary and tokenizer for various file types, but the task seems difficult. While the code presented could form the basis for production code, it needs some hardening. For example, the programs presented here can't cope with something as simple as a star character embedded in the plain text. Caveat emptor. Star encoding was developed by a team at the University of Central Florida working under Professor Amar Mukherjee. The research that led to this work was supported by the National Science Foundation. For More Information Franceschini, Robert and Amar Mukherjee, "Data Compression Using Encrypted Text," Proceedings of the Third Forum on Research and Technology, Advances on Digital Libraries, 1996. Franceschini, Robert et al., "Lossless, Reversible Transformations that Improve Text Compression Ratios" (http://vlsi.cs.ucf.edu/datacomp/papers/textcomp.doc). The VLSI and Data Compression Lab at the University of Central Florida (http://vlsi.cs.ucf.edu/)
<urn:uuid:07166993-958b-4df5-b7c3-9ceb34e7be88>
CC-MAIN-2014-49
http://www.drdobbs.com/database/star-encoding/228701577
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416405325961.18/warc/CC-MAIN-20141119135525-00158-ip-10-235-23-156.ec2.internal.warc.gz
en
0.851173
3,523
3.515625
4
Many students are baffled with the math symbol represented by the Greek letter pi. This article offers some steps to understanding. First, a few simple definitions. The circumference of a circle is the distance around the edge. Think of it as the perimeter. The diameter of a circle is the distance from one edge to the other, through the center. In any circle big or small, if you take the circumference, and divide it by the diameter, you get an answer of about 3.14. We call that value pi (the Greek letter). Pi is used constantly throughout geometry, but that is all it is: The constant ratio of the circumference to the diameter in any circle. Note that 3.14 is just an approximate value of pi. The decimal places go on and on without a pattern. We call that an irrational number. Using basic algebra, we get the formula C = pi times d. In any circle, if you multiply the diameter times pi, you get the length of the circumference. If you know the circumference, you can also compute the diameter. Be sure to memorize that formula. Note that the radius is simply half the diameter. The formula C = 2 times pi times r is equivalent to the above formula, since 2r is just the same as d. You can use either formula. You can also use pi to help you find the area of a circle. To find the area, take the square of the radius (multiply it by itself), and then multiply that result times pi. Memorize that formula. Remember, area involves two dimensions, which is why the formula involves squaring. Circumference is just a length (one dimension), so the formula does not involve squaring. Be sure to memorize the formulas for the area and the circumference of a cirlce. Your teacher or textbook will tell you what value of pi to use in the formulas. Usually we use the approxiate value of 3.14. Sometimes we use the approximate value of 22/7. You might also be asked to use the pi key on your scientific calculator, which usually uses a value of pi that is accurate to at least 10 digits. You will also be told how to round your final answer, for example, to the nearest hundredth.
<urn:uuid:5c8c88c7-a697-4004-b2be-029d8b200054>
CC-MAIN-2019-30
https://sciencing.com/use-pi-compute-area-circumference-4661954.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525133.20/warc/CC-MAIN-20190717081450-20190717103450-00435.warc.gz
en
0.91709
463
4.5625
5
Background Information On Summer Rainfall Predictability Over Texas - The forecast is generated using the methodology described in the TWDB Technical Document on ‘Early warning of summer drought over Texas and the south central United States: spring conditions as a harbinger of summer drought'. - The forecast tool is built on an understanding of the spring drivers of intense summer drought over Texas. How To Use And Interpret The Seasonal Rainfall Forecasts - The forecast maps provide information on whether the average rainfall for the May‒July (MJJ) season will be above-normal, near-normal, or below normal in the MJJ season, where “normal” refers to the average 3-month rainfall observed for MJJ over the time period 1982‒2016. - The forecasts for the MJJ season are made from January through end-April. The forecasts are updated at a bi-weekly (15 day) interval. Therefore, there are eight forecasts in all (mid-January, end-January, mid-February, end-February, mid-March, end-March, mid-April, and end-April). - All but the mid- and end-April forecasts of MJJ rainfall are based on predicted values of select April atmospheric circulation patterns and soil moisture over Texas, which are known to be influential in driving MJJ rainfall. The mid- and end-April forecasts are based on actual observations of these atmospheric circulation patterns and soil moisture over Texas. - The forecast is expressed as probabilities for each of the three possible categories — below-normal, near-normal, or above-normal — occurring. - If there is no clear signal of whether the coming season is going to be wetter or dryer than normal, each category would have an equal likelihood of occurring. Each category would then be assigned a 33.3% probability of occurrence. - If, however, there is a clear signal that the coming season is going to be wetter or dryer than normal, then either the wetter or the dryer category will have a greater probability of occurring. For example, if there is a clear signal that the coming MJJ season is going to be dryer than normal, the probabilities for each forecast category might be 55% for the below-normal category, 20% for the near-normal category, and 25% for the above-normal category. - The forecast provides information on the likelihood of above-, near-, or below-normal MJJ rainfall for each county in Texas. - The forecast does not provide information on how much wetter or dryer than normal each county is going to be in the MJJ season. The forecast only provides an estimate of what the chances are for each county to experience an MJJ season that will be dryer or wetter than the long-term average. - Red color on the map indicates chances for below-normal (dry) conditions, blue color indicates chances for above-normal (wet) conditions, and green color indicates chances for near-normal (average) conditions. - For each county, only the highest probability value will be shown in shading on the map. - Hovering over a county with the mouse opens up a popup, which provides the probabilities associated with each category for the selected county. Probability of Exceedance Graphs - The pop-up graph, known as the Probability of Exceedance Graph, provides information on the point forecast (or predicted average 3-month rainfall) for each county. - The stepped blue curve shows the exceedance probabilities associated with different values of observed rainfall over the MJJ season. The smooth orange curve shows a log-normal fit to the observed rainfall exceedances. These curves convey information on the probability that a given quantity of rainfall will be exceeded. Lower amounts of rainfall (left end of the x-axis) have higher probabilities of exceedance and higher amounts of rainfall (right end of the x-axis) have lower probabilities exceedance. - The Probability of Exceedance graphs can be used to determine the probability that the quantity of rainfall in the coming season will fall within an upper and lower limit or below a certain value (e.g. 10th percentile of climatological rainfall for the season). - The green dot indicates the current forecast rainfall value. Hovering the cursor over the green dot provides information on the forecast rainfall amount, the probability that this value will be exceeded [referred to as Exceedance (%)] on the plot], and the upper and lower limit of the forecast. The upper and lower limit of the point forecast is based on a confidence interval of 60%. This information is provided to convey the uncertainty associated with the point forecast. - This page shows the predictions for MJJ of the current year at the beginning of May of the current year using observations from April of the current year. It also shows the predictions that were issued versus the observed rainfall for MJJ for all years going back to 2015, which was the first time we issued an actual forecast. - The 2010‒2014 hindcasts show what the statistical model generated as the forecast for MJJ 2010, MJJ 2011, MJJ 2012, MJJ 2013, and MJJ 2014 based on April observations from 2010, 2011, 2012, 2013, and 2014, respectively. The observed rainfall for the MJJ season in these five years is also shown. What about rainfall forecasts for other seasons besides May‒July? - The rainfall forecasts provided are only for the MJJ season because the tool is specifically designed to incorporate physical mechanisms in the spring known to influence summer rainfall over Texas. - Further research on drivers of rainfall in other seasons is needed before a tool to forecast rainfall in these seasons can be developed. Limitations, Data Needs, and Potential Opportunities - This rainfall forecast is based on current understanding of factors driving summer rainfall over Texas. As research on this subject continues, and new knowledge on factors driving summer rainfall is generated, we will make efforts to enhance the tool. - The accuracy of datasets used as predictor variables, particularly the soil moisture input dataset, would influence the accuracy of the forecast. Improved soil moisture observations, whether from in-situ stations or from remotely sensed data products, could potentially enhance the accuracy of the forecast. If you have questions or need further information, please contact us. The provision of these rainfall forecasts via this website was made possible through the U.S. Bureau of Reclamation WaterSMART Drought Resiliency funding to the Texas Water Development Board (Grant: R15AP00184; Fiscal Year: 2015).
<urn:uuid:32d68ec6-8acc-438a-b7c5-8b26872d5a48>
CC-MAIN-2019-35
https://waterdatafortexas.org/drought/rainfall-forecast-info
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317516.88/warc/CC-MAIN-20190822215308-20190823001308-00522.warc.gz
en
0.91789
1,354
2.625
3
Samuel Johnson (1749) When Samuel Johnson wrote his poem "The Vanity of Human Wishes," he considered an idea informing all of his writing, whether poetry, fiction, or prose, that false hope produced fantasies rendering man incapable of dealing with the reality of everyday life. At 368 lines in rhyming couplets, this imitation of Juvenal's Tenth Satire proved Johnson's longest poem. His attention to the Latin form and expression is visible in each line, which he attempted to shape in such a way that they would reflect the meaning closest to that of the original. Dense and challenging, the poem dealt, as Johnson often wrote that poetry should, with generalities enabling any reader to apply points to his or her own life. Not to be confused with abstract ideas, the generalities appear in the form of poetic parables about particular famous individuals in history applied to the common man's existence, as well as through personification of emotions, as did medieval morality plays. He achieved this effect by expressing thoughts about abstract values with concrete verbs and strong, clear metaphors. For example, he opens commenting on the necessity of acute observation to man's understanding of his lot, at the same time commenting on what must stand as the exceptional poet's approach to writing: Let Observation, with extensive view, Survey mankind, from China to Peru; Remark each anxious toil, each eager strife, And watch the busy scenes of crowded life; Then say how hope and fear, desire and hate O'erspread with snares the clouded maze of fate. In these lines Johnson writes of everyday scenes, allowing any reader to form an immediate mental image of his or her own daily activities. He personifies hope, fear, desire, and hate as shadowy figures that stalk man, hoping to trap him in his own destiny. Fate becomes not only a maze through which man must wander, seeking his way out with few clues as to proper direction, but also "clouded," seen as if through a veil that distorts reality. That image allows him to suggest a dreamlike state in which man indulges in fantasies that cripple his ability to cope with the many cruel challenges of life. The greatest pitfall for humans, the speaker explains in lines 24-27, is the desire for wealth. He labels it "Wide-wasting pest!" in line 23, then elaborates that it promotes crime among humans: For gold the hireling judge distorts the laws; Wealth heaped on wealth, nor truth nor safety buys, After this caution Johnson launches into lengthy historical descriptions of various once-powerful individuals, noting "How much more safe the vassal than the lord." The speaker explains that the "needy traveler" who moves singing through "the wild heath" enjoys more fortune than a ruler, as "Few know the toiling statesman's fear or care, / The insidious rival and the gaping heir." As did Juvenal, Johnson includes as an example Democritus, representative of a statesman who possesses the power to hear the petitions of others, a power that ultimately breeds his scorn for those who were once friends. And the suppliants who burn "to be great," hoping for Fortune, "mount, they shine, evaporate, and fall" as "Hate dogs their flight, and Insult mocks their end." The speaker does not remain a mere detached voice but engenders a feeling of brotherhood with readers. As the scholar Howard Weinbrot explains, one way that Johnson involves his reader is through abundant rhetorical questions. He also uses the personal pronoun we at several points to be part of his audience and make clear he includes himself in the group that may suffer from faulty perceptions. Consideration moves on to Thomas Cardinal Wol-sey, a onetime favorite of King Henry VIII who falls from grace, mainly because the king feared his power and desired his wealth, and then to George Villiers, duke of Buckingham and onetime favorite of Kings James I and Charles I, eventually assassinated. Also described with details regarding their harsh ends are Robert Harley, earl of Oxford, treasurer for Queen Anne, later impeached and sent to the Tower by the Whigs; Thomas Wentworth, earl of Strafford, once a favorite of Charles I but later impeached and executed; and Edward Hyde, earl of Clarendon, once in favor with Charles II, eventually exiled to Europe. Each finds himself caught up in flattering dreams, which eventually undo him, as they are all ultimately deserted by their fantasies of unending power, through either their own acts or those of others, acts beyond their control. Johnson personifies Virtue, Truth, Science, Reason, Doubt, Sloth, and Melancholy to address the young man who desires to become a part of the college of Learning, so much so that "The young enthusiast quits his ease for fame," lured into an eventual trap, ironically of his own design. However, the speaker is not without sympathy for those foolish enough to allow fate to do them in: The festal blazes, the triumphal show, The ravished standard, and the captive foe, The senate's thanks, the gazette's pompous tale, With force resistless o'er the brave prevail. (174-177) Even courage is not enough to resist the ravages of false pride, suffered by the greatest of men, including Greek and Roman leaders. The speaker includes points from around the world in his cautionary tale, such as Sweden, Moscow, Persia, and Bavaria, where individuals of all backgrounds fall prey to time, which "hovers o'er impatient to destroy, / And shuts up all the passages of joy." Fate is an equal opportunity force, exacting a high price from any who ignore its power. Luxury enslaves, and even favor such as felt by high kings' mistresses dissolves with aging and the loss of beauty. Johnson references Catherine Sedley, mistress of James II, when he writes that "Sedley cursed the form that pleased a king." A strong example of the use of rhetorical questions occurs in lines 343-348 as the speaker asks, Where then shall Hope and Fear their objects find? Must dull Suspense corrupt the stagnant mind? Must helpless man, in ignorance sedate, Roll darkling down the torrent of his fate? Must no dislike alarm, no wishes rise, No cries invoke the mercies of the skies? The speaker answers his own questions with reference to God, bidding man to make his petitions to Heaven, which may hear and "raise for good"; however, mankind must "leave to Heaven the measure and the choice." God may actually be kinder than fate, the speaker suggests, but he also makes clear that simply the stirring of a sense of the sacred and the aspiration of "strong devotion" encourages a healthful mind, suggesting that with faith, man can better accept whatever comes his way. Johnson does emphasize love as part of the answer to man's problem, a common approach for him. As Weinbrot writes, "For Johnson, the source of love far transcends human affection. To love one's neighbour is to love God; to use and not bury one's talent is to use God's gift." Johnson stressed in his essays that pleasures remain imperfect "when they are enjoyed without participation." Thus man "applies to others for assistance." He insisted that "No man is born merely for his own sake." "The Vanity of Human Wishes" strongly supports this conclusion. Was this article helpful? Tap into your inner power today. Discover The Untold Secrets Used By Experts To Tap Into The Power Of Your Inner Personality Help You Unleash Your Full Potential. Finally You Can Fully Equip Yourself With These “Must Have” Personality Finding Tools For Creating Your Ideal Lifestyle.
<urn:uuid:50cb4ca8-da5b-4043-9f98-45d980097fdb>
CC-MAIN-2020-05
https://www.studentwritingcenter.us/figurative-language/vanity-of-human-wishes-the.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00478.warc.gz
en
0.95955
1,607
3.296875
3
Vents, of course, are the locations from which lava flows and pyroclastic material are erupted. Their forms and orientations can be used to determine many characteristics of the eruption with which they were associated. There are two main endmembers in a spectrum of pyroclastic vents in Hawai'i, spatter vents and cinder cones. Their differences are due mostly to the gas content of the magma that is erupted. Additionally, there are satellitic shields formed during eruptions without fountaining and tuff cones formed during phreatomagmatic eruptions. As a dike approaches the surface, it generates a zone of tension at the surface. This tension is usually manifested as a pair of cracks with the ground with the area in between often lower than the surrounding elevation (see below). The first phase of a Hawaiian eruption is usually characterized by breaking to the surface of a dike along one of the two fractures resulting in a line of erupting vents commonly called a "curtain of fire" (e.g. Macdonald 1972). After a few hours or few days most parts of the fissure stop erupting and activity is concentrated at one or more separate vents (e.g. Bruce & Huppert 1989). It is these vent locations that usually persist long enough (hours to weeks and sometimes years) to produce significant near-vent constructs. The change from long continuous erupting fissures to one or a few vents must be remembered when mapping eruptive fissures in remote sensing data and relating them to dike dimensions: The near-surface part of the dike is almost certainly longer than any line of near-vent constructs (see discussion in Munro 1992). Fissures opened in the cinder-covered surface uprift from Pu'u 'O'o in July of 1985. Note that there are two parallel fractures about 50 m apart and forming a small graben. The next morning lava erupted out of the nearest fissure. The ground surface here is covered by a ~2 m-thick layer of Pu'u 'O'o scoria, and this helped to accentuate the cracks - similar to the way that a small hole dug into sand at the beach will eventually look quite large as sand slumps into the hole. In the case shown here the actual cracks in the rock under the scoria were only about 10-20 cm wide but so much scoria fell into them that they were wide enough to barely be jumpable. Spatter refers to blobs of lava thrown a little ways into the air (by expanding gases) that is still molten when it lands. Spatter ramparts and spatter cones are the vent structures formed by this type of activity. Spatter ramparts are elongate along the trace of an eruptive fissure whereas spatter cones occur as discrete mounds. They range between 1 and 5 m high, are steep-sided, and are composed of agglutinated (stuck-together) spatter. They are steep-sided because the hot spatter blobs are able to stick to each other when they land, and don't flow or roll away. Small spatter cones forming near Pu'u 'O'o on the east rift zone of Kilauea in July of 1985. Note that the ability of molten spatter to stick together allows the spatter cones to be steep and even vertical. The pahoehoe toes in the foreground are picking up pieces of scoria that cover the ground in this area, and via a "reverse caterpillar motion" are placing these pieces (the dark spots) on top of themselves - stratigraphy is being reversed. The fountaining associated with the formation of spatter ramparts is usually less than 10 m high. A small spatter cone on Kilauea erupting in 1992. Note the fluid nature of the individual blobs making up the cone, and their ability to form a steep structure. The glowing orifice from which the spatter is erupting is ~30 cm across. The profile of Pu'u 'O'o can be seen in the background. At the end of the eruption, lava often drains back into the fissure, forming prominent drainback features. Even if nobody actually witnessed a particular eruption, if you find spatter ramparts or cones associated with it, you can say that the fountaining that formed the cone or rampart was not very high. Spatter vents from the 1974 eruption of Kilauea along the upper SW rift zone. Note that the last thing that happened was the drain-back of lava into the fissure (red arrows). The higher areas on the left and right are spatter ramparts and are 1-2 m high. At the high-fountaining end of the spectrum are cinder cones. Cinder cones can be quite large in Hawai'i; those on the summit of Mauna Kea (formed during gas-rich alkalic-stage eruptions) are a few hundred meters high, whereas those on Mauna Loa and Kilauea usually range between 20 and 100 m high. Pu'u 'O'o on the E rift of Kilauea, which formed between 1983 and 1986 is unusual in that it reached a height of 255 m above the surrounding surface (Heliker & Wright 1991). To the left is a photo of Pu'u 'O'o cinder cone, Kilauea, viewed toward the west. The prevailing right-to-left tradewind direction is obvious from the way that the plume is being blown. During the eruptions that formed Pu'u 'O'o, these same tradewinds built the cone much higher on the downwind side of the vent than the upwind side. Almost all the lava flows therefore came out of the upwind side (i.e. towards where the photo was taken). As their name suggests, cinder cones consist of cinders, more properly called scoria. Scoria is very vesicular, low density basalt. Lava fountains are driven by expanding gas bubbles; the bubbles are trying to expand in all directions but the only way to relieve the pressure is up out the vent so fountains are usually directed relatively vertically. The Pu'u 'O'o fountains were at times up to 350 m high, and those during the early stages of the Mauna Ulu eruption were up to 500 m high. Because the pyroclasts are thrown so high, they cool before they land and don't stick together. Cinder cones are therefore composed of loose pyroclastics at the angle of repose (~33º). Right is an image of fountaining at Pu'u 'O'o, Kilauea (July 1985). These particular fountains were ~200 m high, and were sending short fast flows in many directions. In plan view, cinder cones tend to be roughly circular. They are usually formed later in an eruption when activity has localized to one or more discrete vents. If the precise location of the vent changes during an eruption, the cone loses its simple circular shape, and becomes more complex. Roadcuts through most cinder cones expose very complicated crosscutting relationships relating to the different locations of the fountain centers. Photos of cinder cones on Mauna Kea (arrows), viewed from the summit of another cinder cone. The reddish color is common to cinder cones and occurs both during and soon after the associated eruption due to the combined efforts of moisture and oxidizing gases. The light blue line marks the Mauna Kea-Mauna Loa boundary. Note that one of the cones (yellow arrow) has been surrounded by (younger) Mauna Loa lavas. Cinder cones can also be distinctly asymmetric if there was a persistent wind blowing during the eruption and/or they form at the heads of major lava flows. In this second instance they are horseshoe-shaped (see below), with the lava flow issuing out of the open end because during the eruption any pyroclasts that landed on the flow were rafted away. A Mauna Kea cinder cone viewed from the air. A lava flow field (white outline) has issued from the base of the cone, giving the cone an asymmetric form. The flow spread almost all the way around the cone (white arrows). Magenta lines mark the rims of older cinder cones nearby. Between the two extremes of spatter ramparts and cinder cones are all gradations. Some pyroclastic constructs consist of alternating layers of agglutinate and cinder, indicating that the vigor of the fountaining varied during the eruption. The early part of an eruption, often called the "curtain of fire", produces mostly spatter ramparts and spatter cones. As the activity becomes localized at one or more points along the fissure, this concentration of activity usually leads to higher fountaining. Cinder cones are built at these points, often at the same time that spatter ramparts are forming at the (less active) ends of the fissure. During the Mauna Loa eruption of 1984, there was a distinct gradation from vigorous fountaining at the main vents, progressing to lower and lower fountaining both up and downrift (Lockwood et al. 1987). At the farthest uprift end of the fissure, only gas was being emitted from a spatter cone that had been active earlier in the eruption. Approximately 50% of Hawaiian eruptions have no pyroclastic activity associated with them at all. Instead, lava is quietly erupted onto the surface. This lava flows away in all directions forming a miniature shield volcano. These vents are called "satellitic" or "parasitic" shields, and produce tube-fed flows. Satellitic shields have diameters of 1-2 km, and can be ~100 m high with slopes of only a few degrees. On the right is an image of Mauna Iki satellitic shield on the SW rift zone of Kilauea. Note the gentle slopes (similar to Kilauea as a whole). The distance from left to right on the horizon is about 5 km While a satellitic shield eruption is going on, a lava pond usually exists at the summit of the shield. Overflows from the pond build the shield. Kupa'ianaha lava shield and pond in September 1986 (~2 months after it formed). Notice the shape of the pond, with a large near-circular part and an elongate extension to the left. The main lava tube was fed from the end of the extension. When this photo was taken the pond was also overflowing to the right. A break-out low on the far side of Kupa'ianaha was feeding another surface flow that in this photo had almost reached the contact with 'a'a flows from Pu'u 'O'o (3 km uprift; at left). There have been 4 major satellitic shields formed on since the arrival of Westerners (Mauna Iki 1919-1920, Mauna Ulu 1969-1974, Kupa'ianaha 1986-1992, and the presently-active vent 1992-who knows?). Including these, 16 satellitic shields have been mapped on Kilauea (Holcomb 1987).
<urn:uuid:af2068bc-e658-452e-af4e-db25429c836a>
CC-MAIN-2015-11
http://volcano.oregonstate.edu/book/export/html/126
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424937481488.49/warc/CC-MAIN-20150226075801-00181-ip-10-28-5-156.ec2.internal.warc.gz
en
0.958866
2,360
3.984375
4