text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
7.09k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
Students began imagining and 3D printing their own designs this week. If you've been searching for a use for our 3D printer in your class, take a hint from the 7th grade math students: students can design and print their own small items on our Makerbot Replicator 2. Ms. Gorman, Palgut's and Davis assigned their students the task of designing and building a game that uses math. The students themselves realized they could 3D print game pieces that would match their game's theme. Several groups of students came to our media center makerspace to design and print their pieces. Here are some useful resources to get started: Tinkercad is a free website students can join to easily CAD (computer assisted design) without any prior experience. They just drag and drop shapes they want then customize their designs and adjust the specs according to their needs. for class projects contact Ms. Gurthie For student projects go here to fill out a request for 3Dprinting http://msgurthie.cmswiki.wikispaces.net/STEAM It's that simple! Kiron says using Tinkecad is "like building in Minecraft: it's that fun!" Donald says "This is the most fun I've ever had in school" Here are Kiron and Donald demonstrating the process of printing their Tinkercad-designed game pieces: Celebrating Piedmont : a blog of Happy Happenings "Celebrating Piedmont" logs only a small fraction of the learning magic the teachers of CMS' Piedmont Middle School, an IB World School. create daily. In that sense, it is authored by all the staff and students of Piedmont. It is curated by Ms. Gurthie who can be reached at the icons above. She'll be happy to brag about Piedmont's teachers and students any chance she gets! Please note this blog has only just begun and we have so much to show off! Come back again soon!
<urn:uuid:cd09f188-a935-4c5c-bd46-5acbb3ad2fcd>
CC-MAIN-2019-22
http://piedmontpd.weebly.com/celebrating-piedmont/latest-3d-printing-update-easy-cadding-and-3d-printing
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258453.85/warc/CC-MAIN-20190525224929-20190526010929-00148.warc.gz
en
0.952788
416
4.125
4
Human Interference: Does It Lead to Sustainable Development? Over the course of the year, human interference has brought drastic change to the environment. Since Homo sapiens first walked the earth, we have been modifying the environment around us through agriculture, travel and eventually through urbanization and commercial networks. At this point in earth’s physical history, our impact on the environment is so substantial that scientists believe “pristine nature,” or ecosystems untouched by human intervention, no longer exist. Despite this change, only through human interference will it be possible to develop new solutions. Addressing climate change and progressing towards sustainable development is dependent on economic growth that works with, rather than against, the environment. The greater and greater attention paid to the intervention tools and techniques obscures somehow the fact that those creating these technical elements and benefiting from them should be made responsible and aware of their role. Therefore, it is important to know whether these human interventions help us in meeting the needs of the present at the same time sufficient enough for the future or it just leads us to lesser sustainability of life. As cited by Bird, et al. (2011) in their study, when the Harvard biologist E.O. Wilson put forward the “Biophilia” Hypothesis, he captured a notion that has long been embedded in diverse cultures around the world. Briefly the idea of Wilson that throughout the evolution of human lives we seek contact with nature. Kusakabe (2012) said that local governments in many countries have been seeking to improve sustainability since the launch of LA 21 in 1992. Sustainability is a moving target, dynamic and ever changing, as the planet is changing. Because of the urge to improve sustainability, humans have conducted lots of activities that affected the environment positively and negatively. Humans have interfered almost every aspect of the environment. A study by Baratt (2018) was executed to evaluate energy budgeting, carbon foot prints, gaseous and soil health under conservation tillage with residue retention for identifying cleaner production technology in rice-maize system. Main energy resources on the other hand come from fossil fuels such as petrol oil, coal and natural gas. Fossil fuel contributes 80% of the world’s energy needs. Most industries use diesel machines for the production process. Transportation sector also consume significant amounts of diesel and gasoline. This situation leads to a strong dependence of everyday life on fossil fuels. However, the growth of the population is not covered by domestic crude oil production. Fossil oils are fuels which come from ancient animals and microorganisms. Fossil fuel formation requires millions of years. Thus, fossil oils belong to non-renewable energy sources. An increase o f the oil price often leads to economic recessions, as well as global and international conflicts (Zhou, et.al 2019). On the economical side, there is ecofeminism with their action of involving females in wise consumption of energy and environmental resources. With an ecofeminist framework, ERC research would take more emancipatory approach. The research agenda would be focused on changing corporate and public policy so that the burden for the ecological crisis would not be placed on women alone. Policy changes would include mandatory ecological labeling for all consumer goods and stricter pollution regulations. Education programs designed to benefit consumers would be developed in order to liberate consumers from the complexities of a marketplace that has profit as its primary motive. These educational programs would be comprised of teaching the consumer not just to consume differently, but to consume less. This redirection would aid in the development of the “green citizen” and not merely the “green consumer” (Dobscha, 2013). Human interference also seeks to improve human quality in relation to the environment. The impact of forests on human health is a specific issue which has not been very visible within the larger framework on biodiversity, climate change, poverty, and human well-being. Forests and trees supply an abundance of ecosystem services that help in creating healthy living environments and in restoring degraded ecosystems. In addition to tangible products, forests for example mitigate floods, droughts, and the effects of noise, purify water, bind toxic substances, maintain water quality and soil fertility, help in erosion control, protect drinking water resources, and can assist with processing waste water. Forests can mitigate climate change and may help in regulating infectious diseases. However, ecosystem services and goods that forests provide are threatened by deforestation, pollution, biodiversity degradation, and climate change. Forests may advance the achievement of the UN Millennium Development Goals, especially combating hunger, poverty, and poor health. (Sarjala, 2009). People have been making such big efforts in order to achieve sustainable development in order to achieve a common goal. With regards to the many assertion that this human interference can bring out, the best quality of life is assured, however its adverse effect to the environment is a variable to be considered knowing that what we have now comes from it. Thus, will this human interference be able to sustain sustainable development or not? The researchers chose this study because it would be of big help to us humans who are living in this beautiful, yet now dying world, identify the human interference to the environment in terms of improving the industry, human quality, economy and agricultural field. By doing this, the researchers will be able to know if the environment/world can still sustain us in the future. In order to address this issue, the researcher tries to gather relevant articles. The researchers aim to offer further information regarding this topic by gathering and to further identify the positive and negative effects of human interference to the environment. This study aims to know the negative and positive effects of human interference on sustainable development. Specifically, its objectives are to identify the existing human interference, the positive and negative impact of these to the environment and make a reasonable conclusion whether these effects leads us to sustainable development. Framework Of The Study One of the first step in conducting this study is to look for articles that discusses the various human interference in the field of agriculture (environment), economy, human and industry. These are the 4 pillars of sustainability as stated by Dave Kepler. Knowledge of the existing human interference to these factor will allow the researchers to weigh in whether these interference will bring positive or negative impact to the environment and allow them to analyze if these human interference will be enough to meet the needs of the present without degrading the quality of the future. Given this, the researches will able to come up with a reasonable conclusion that somehow help identify the effects of the human interference to the 4 pillars of sustainability. Human Interference to the Environment According to Rapport (2009), controlling emissions of gases and particulate matter from agriculture is notoriously difficult as this sector affects the most basic need of humans, i.e., food. He also added that the current policies combine an inadequate science covering a very disparate range of activities in a complex industry with social and political overlays. Moreover, agricultural emissions derive from both area and point sources. Agricultural emissions play an important role in several atmospherically mediated processes of environmental and public health concerns. It also contributes to the global problems caused by greenhouse gas emissions. Given the serious concerns raised regarding the amount and the impacts of agricultural air emissions, policies must be pursued and regulations must be enacted in order to make real progress in reducing these emissions and their associated environmental impacts (Russell, 2013). A global food revolution based on a new paradigm for agricultural development is urgently required. Without this shift, we are unlikely to attain the twin objectives of feeding humanity and living within boundaries of biophysical processes that define the safe operating space of a stable and resilient Earth system. Global sustainability is increasingly understood as a prerequisite to attain human development at all scales, from local farming communities to cities, nations, and the world . The reason is that we have entered a new geological epoch, the Anthropocene, where human pressures are causing rising global environmental risks and for the first time constitute the largest driver of planetary change. Agriculture is at the heart of this challenge. It is the world’s single largest driver of global environmental change and, at the same time, is most affected by these changes. Agriculture is the key to attaining the UN Sustainable Development Goals of eradicating hunger and securing food for a growing world population of 9–10 billion by 2050, which may require an increase in global food production of between 60 and 110 % in a world of rising global environmental risks. Agriculture is also the direct livelihood of 2.5 billion smallholder farmers, and the resilience of these livelihoods to rising shocks and stresses is currently gravely under-addressed (Stone, 2011). The main causes for the depletion of forestry resources in the developing countries are their use by ever growing population for infrastructure and industrial development. The use of forestry resources by human population is done generally in two ways. Firstly, the human population uses forestry resources for its intrinsic growth in the form of fuel, medicine, etc. directly by cutting trees, plants, herbs, etc. without clearing the forest land. Secondly, for the development of infrastructure, forest stands are cut in large segments to construct farm houses, housing colonies, health and recreation centers, to set up industrial units, to use land for agriculture, etc. The number of such projects related to development increase immensely as population density increases leading to augmentation of industrialization. If the focus is on the wood based industries, forest trees are used for manufacturing logs, planks, wooden tiles, furniture etc. by cutting forest stands. (Horwitz, 2009). Rapid economic growth, industrialization, and urbanization have led to extremely severe air pollution that causes increasing negative effects on human health, visibility, and climate change. It may be noted here that due to excessive increase in population density many kinds of precursors, both social and environmental, appear in the habitat. One environmental precursor is pollution, the effects of which on forest resources have been studied by many investigators. The other is population pressure which is caused by excessive increase in population density in and around industrial units in forest habitat leading to augmentation of industrialization. There are very good local assessments of social vulnerability and exposure to environmental hazards. According to Modak et. al (2019) a serious problem, especially in Eastern and some Southern EU Member States, is the on going use of coal as a source of domestic heating. This causes significant air pollution. There are, however, various national programs of subsidies supporting the switch from coal-based domestic heating to gas and other less polluting sources that target the poorest households. In Geldermann et al. (1999), the environmental impact of kerosene burning during the flight of an aircraft is examined with an LCA. The ecological evaluation shows the substances which contribute to the potential environmental impacts caused by the kerosene burning. Brentrup et al. (2004) describe an LCA method to evaluate the environmental effects which are relevant to crop production. The study summarizes the environmental impacts into the following two indicators: human health and resource depletion and impacts on ecosystems. Human Interference to Sustainable Development The term ‘sustainable development’ is increasingly in frequent use in a wide range of settings, but it can be a nebulous and ambiguous concept. Although sustainable development is often interpreted as being driven by a purely environmental agenda, one of its key features is that it focuses on the relationship between social justice, human health and well-being, and economic development. In essence, it is about an integrated approach to development that aims to improve quality of life and meet the needs of current and future generations, whilst simultaneously protecting and enhancing the natural environment upon which we all depend. Protecting and preserving the natural eco-system's resources has been considered a main priority of decision-makers and top managers in various business fields according to Howard-Grenville et. al (2014). Creating a balance between resource consumption and economic development is considered a challenge that obliges firms to implement environmentally friendly business activities that improve their economic, social, and environmental performance (Chan et. al. 2012). Rapid increase in pollution from industrial practices, accompanied by a decline in natural resources, has driven governments, governmental associations, environmental agencies and society as a whole to push firms and corporations to adopt green practices on a larger scale, where implementing such practices will lead to operational development, economic gain, and improvement of organizations environmental performance and competitive advantage (Mousa and Othman, 2019). Even if cleaner technology can be implemented will the reductions in pollution be enough? John Fien (2015) argues that they will not, if production continues to grow. Unless substantial change occurs, the present generation may not be able to pass on an equivalent stock of environmental goods to the next generation. “Firstly, the rates of loss of animal and plant species, arable land, water quality, tropical forests and cultural heritage are especially serious. Secondly, and perhaps more widely recognized, is the fact that we will not pass on to future generations the ozone layer or global climate system that the current generation inherited. A third factor that contributes overwhelmingly to the anxieties about the first two is the prospective impact of continuing population growth and the environmental consequences if rising standards of material income around the world produce the same sorts of consumption patterns that are characteristic of the currently industrialized countries. Even if people put their faith in the ability of human ingenuity in the form of technology to be able to preserve their lifestyles and ensure an ever increasing level of the needs for everyone, they cannot ignore the necessity to redesign our technological systems rather than continue to apply technological fixes that are seldom satisfactory in the long term. The main objective of the study is to identify/determine the human interference to the environment. This is pretty important to the study in the sense that we need to know the good and bad effects of our actions to the environment. And also to help us know if said actions will help us sustain the environment or the world so that the world can still sustain us in the future and not finding the need for us to migrate from this world/planet. Based on the findings, the burning of fossil fuels in the industrial sector, the emissions of gases and particulate particles from the agricultural sector, and pollution are the most notable human interference in the environment. Among the three, it was discovered that the burning of fossil fuels and pollution has the most destructive effects to the environment which call for some drastic measures to be taken in regards to the two. While genetic modification is the most notable human interferences in the positive spectrum/least negative effect in comparison to what we have mined.
<urn:uuid:1a5d5193-8d84-4f9a-8602-ba9d7920b93d>
CC-MAIN-2023-23
https://hubpages.com/politics/Human-Interference-Does-it-Lead-to-Sustainable-Development
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648000.54/warc/CC-MAIN-20230601175345-20230601205345-00066.warc.gz
en
0.942572
2,967
3.234375
3
BY FREEK COLOMBIJN Every human settlement has to think of a way to dispose its solid waste, but each place finds its own particular ways to do this. I was once again forced to think about this simple fact on holiday in Sicily. Two peculiarities of Sicily are its rugged terrain, with old fortified towns up in the hills, and the many tourists that visit the island who are perhaps more careless away than they would be at home. How does Sicily deal with these challenges? Castelbuono is a picturesque town with a medieval core, hundred kilometres from Palermo. The town is built on a hill, with a castle on its top. The main street follows the rim of the hill and is the only street that runs in a straight line for more than 100 meters. The street begins at the castle and ends at the central sloping square. Many streets are one way for the simple reason that not even two Fiats Topolino could pass each other. Other alleys consist of stairs made in stone and are not passable for any vehicle at all. Yet in this medieval lay-out, the residents produce modern volumes of waste with plastics, cans, cardboard, and so on. The question arises: How to remove waste from this urban environment? I spoke with local residents to find out. The municipal cleansing department uses mini trucks to pick up the waste, but even then many streets and certainly the streets that have stairs are not accessible. The cleansing department has found a solution in a time-honoured means of transportation: the donkey. Residents are expected to separate the waste at home and place plastics, paper, and glass outside on particular days of the week. The waste is carried off on the back of the donkeys and brought to the mini trucks that wait at the nearest point they can get to. Is this an old-fashioned system of waste management? On the contrary. Outside the medieval core, there is an isola ecologica (literally an ecological island), a separation plant, sponsored by WWF and Electrolux, where the waste is further processed. The donkeys are well adjusted to the circumstances and not at all used for nostalgic reasons. Castelbuono has found an apt modern system for local conditions, while also reinterpreting their historic human-animal relationship to create a technological solution. Siracusa is another place in Sicily, much bigger than Castelbuono, and as a port-town existing since Ancient Greek times, very easily accessible. Siracusa does not struggle with steep alleys, but with mass tourism. It has tackled this challenge with a public awareness campaign. Billboards and signs on public buses remind the visitors that: “Responsible tourists love the places they visit. A responsible tourist doesn’t waste food, reduces packaging, drinks tap water, differentiates waste, preserves the marine ecosystem, and asks the others to do the same.” The call ends with the words: “Follow the Urban Waste Project recommendations and make Siracusa a better place.” Here, waste management is seen as a complex sociological/behavioural problem with multiple aspects. A responsible person should not only not waste food, but must also reduce the production of waste by drinking tap water instead of buying bottled water. Moreover, the pedagogic effort does not stop between municipality and visitor, but visitors must also address each other when the one sees the other misbehaving. Siracusa’s policy includes another promising element: it combines an appeal on responsible behaviour with the self-interest of the visitor. People can download the WasteApp, play a game and win prizes when they scan the QR codes found on trash bins. This smart playful idea entices residents and tourists to look for a trash bin to dispose of their waste and not drop it on the street. Both cities are looking for ways to handle waste in a manner appropriate for local circumstances. Where Siracusa integrates new digital technologies with (global) social responsibility to create behavioural changes, Castelbuono cleverly reinvents elements of its cultural past. As a social scientist I am inclined to favour social solutions over technological solutions, but here, without having done further research on the matter, I hypothesize that the cultural-technological solution with donkeys in Castelbuono has more effect than the social approach in Siracusa. Simply because people are rarely motivated by ideological reasons alone to behave in a pro-environmental manner. Tourists who take a time-out from their ordinary life probably even less so. Freek Colombijn is Senior Lecturer at the Department of Social and Cultural Anthropology, Vrije Universiteit Amsterdam.
<urn:uuid:d98746ae-c1ee-455c-ab33-e4c08515d9fb>
CC-MAIN-2022-05
https://standplaatswereld.nl/collecting-waste-in-sicily-old-and-new-ways/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302740.94/warc/CC-MAIN-20220121071203-20220121101203-00427.warc.gz
en
0.947827
958
3.0625
3
Worse Air Quality In Phoenix Communities Of Color Could Mean Higher COVID-19 Risk As coronavirus spreads across the country, it’s hitting certain demographic groups disproportionately hard, and air quality is likely playing a role on which communities are hit hardest. COVID-19 is riskiest for people who have underlying health conditions such as asthma. And the list of conditions that can make the respiratory virus more deadly closely overlaps with the kinds of conditions made worse by exposure to air pollution. And in the Phoenix area, air quality is very poor. “Maricopa County is actually one of the most contaminated counties in the country," said Laura Dent, executive director of Chispa, a Latino-focused environmental organization. Chispa has focused efforts on air pollution in the Valley for years, but Dent is especially concerned right now. “In some of these harder-hit areas, the impacts of the COVID-19 crisis will be even more exacerbated," Dent said. A new study from Harvard University's T.H. Chan School of Public Health shows exposure to air pollution worsens outcomes for COVID-19. An increase of just one-millionth of a gram of fine particulate matter per cubic meter of air increases the chance of death from the virus by 15%. All of Maricopa County experiences air pollution. But busier streets and topography that causes pollution to settle contribute to even dirtier air in south and west Phoenix. And residents of those heavily polluted neighborhoods are primarily Latino or African American. “Latinos and communities of color, in Arizona, but across the country are disproportionately impacted by respiratory issues related to contamination and pollution and there’s so much history that leads to that," Dent said. Decades of discriminatory housing practices, for example, meant people of color in Phoenix were very limited in which parts of the city they could live. Darshan Karwat is an aerospace engineer at ASU. His research gives a score to Phoenix neighborhoods based on access to services and environmental factors. "Latinos and communities of color, in Arizona, but across the country are disproportionately impacted by respiratory issues related to contamination and pollution and there’s so much history that leads to that." — Laura Dent, executive director of Chispa “Research has shown over decades that when communities are burdened with one thing, they’re probably burdened with a lot of different things," Karwat said. Karwat’s research shows correlations between neighborhoods’ poverty levels, percentage of minority residents, and pollution levels. And those correlations appear to have health implications. High-poverty Phoenix neighborhoods see more asthma hospitalizations. Dr. Joanna Andujar is a pediatrician with Mountain Park Health's clinic in West Phoenix's Maryvale neighborhood. She sees those effects firsthand. “When the air quality gets worse we do see more kids coming in with an exacerbation of asthma," Andujar said. As coronavirus spreads, its impact on different communities has been similarly uneven. Across the country, African Americans are dying of COVID-19 at disproportionately high rates. In Arizona, some Native American reservations have been especially hard-hit. “COVID-19 is a lens through which we see even better what has happened as a result of the lack of being concerned about health disparities," said Olga Davis, a professor at ASU's Hugh Downs School of Human Communications. Davis has researched public health issues among Phoenix African Americans. Race and location data on Arizona coronavirus cases is still incomplete. But Davis fears lower income communities of color may eventually prove to be disproportionately affected in the Phoenix area too. She said, unfortunately, these outcomes are predictable. “I’m very sad that it is still a reality after so much has been done so much has been written," Davis said. Dozens of factors, from educational opportunities to access to healthy food, create public health disparities across demographic groups. Air pollution is only one component, but it’s something Karwat said has the potential to improve. With so many cars off the road as people stay home during the pandemic, Phoenix’s air has been much cleaner for the past few weeks. Karwat sees that as a rare opportunity for air quality research along with ASU colleague Jennifer Vanos. “If we can measure it, then we can manage it better, then we can potentially fix it and see, could we get back to cleaner air? What policies made the biggest changes?" Vanos said. Vanos and Karwat are applying for grant funding, hoping to be able to place dozens of air quality monitors around the city while air is cleaner than usual. Then, as social-distancing orders are gradually lifted, they’d be able to track which policy changes make the biggest impact on which neighborhoods—information that could be helpful for addressing disparities in Phoenix pollution levels in the future. For now, those economic and environmental inequalities remain Dent said coronavirus is making them alarmingly clear. “All of these challenges come together to hurt and impact populations in a really different way," Dent said. She hopes that frame is part of the way we seek policy solutions, when coronavirus is behind us.
<urn:uuid:c80072d2-3313-4758-ab51-ef4a7130b340>
CC-MAIN-2020-29
https://kjzz.org/content/1541391/worse-air-quality-phoenix-communities-color-could-mean-higher-covid-19-risk
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655933254.67/warc/CC-MAIN-20200711130351-20200711160351-00109.warc.gz
en
0.958617
1,091
2.96875
3
When you rewind the history of Canada, you will find that there has been a rich and varied history of sports in the country. In fact, you can categorize the Canadian sport’s history into subsections from the Indigenous to the modern-day sports. In between the two extremes, you can identify organized competition, the establishment of national organizations, and growth of sports both in the amateur and professional categories. Indigenous games and sports The era of indigenous games and sports prior to or early19th century can be termed as the survival or utilitarian purpose and recreational purpose. The wrestling, archery, spear throw, baggataway or Lacrosse or other dancing variants inclined towards religious influence. These activities were mainly through the European settlements. A close association with the local population by the voyageurs helped the growth of activities along with the use of some equipment or instruments. First Nations Games Subsequently, the development of sports in the form of owl games, cat’s cradle, besides the ring and pole along with snow snake to name a few had seen the light of the day. The introduction of games like the birch bark cards and dice by the First Nations not only served the purpose of fun but also gambling to a certain extent. In order to train the youth for cooperative existence, tug of war, arm pull or similar self-testing games gained more importance. Beginning with the mid 19th century, Montreal’s contribution in establishing a number of sports organizations needs a special mention. The organizations like Montreal Lacrosse Club, Snow Shoe Club, etc. followed by the first sports organization like the Montreal Amateur Athletics Association in the year 1881. In addition to encouraging sports, gymnasium, swimming, etc., the club was also popular for reading and meeting room. The late 19th century has also witnessed the development of baseball, football, hockey, and basketball too. The growth of industries in combination with urbanization resulted in a spurt in the sports field. The hockey was recognized as a national game substituting the Lacrosse. Though the baseball was very popular among the Canadian population, it took more than half a century to witness a league franchise. The soccer, softball also are popular games of the country. The Canadian sportsmen representation commenced with the Olympic Games in the year 1908. The Paralympic sports are also very close to the Canadian citizens from the year 1960 and a Paralympic Committee was established in the year 1989. The Lacrosse is the national sports of summer and the Hockey (Ice Hockey) rule the roost as the national game of winter in Canada.
<urn:uuid:7f7b16e3-bd38-4037-bf89-9ded5eac3aa4>
CC-MAIN-2019-04
https://www.makeitseven.ca/know-the-sustained-growth-of-canadian-sports-culture/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583795042.29/warc/CC-MAIN-20190121152218-20190121174218-00174.warc.gz
en
0.960218
532
3.375
3
In this section we describe functions for creating, accessing and altering syntax tables. This function creates a new syntax table. If table is nil, the parent of the new syntax table is table; otherwise, the parent is the standard syntax table. In the new syntax table, all characters are initially given the “inherit” (‘@’) syntax class, i.e., their syntax is inherited from the parent table (see Syntax Class Table). This function constructs a copy of table and returns it. If table is omitted or nil, it returns a copy of the standard syntax table. Otherwise, an error is signaled if table is not a syntax table. modify-syntax-entrychar syntax-descriptor &optional table This function sets the syntax entry for char according to syntax-descriptor. char must be a character, or a cons cell of the form (min . max); in the latter case, the function sets the syntax entries for all characters in the range between min and max, inclusive. The syntax is changed only for table, which defaults to the current buffer’s syntax table, and not in any other syntax table. The argument syntax-descriptor is a syntax descriptor, i.e., a string whose first character is a syntax class designator and whose second and subsequent characters optionally specify a matching character and syntax flags. See Syntax Descriptors. An error is signaled if syntax-descriptor is not a valid syntax descriptor. This function always returns nil. The old syntax information in the table for this character is discarded. ;; Put the space character in class whitespace. (modify-syntax-entry ?\s " ") ⇒ nil ;; Make ‘$’ an open parenthesis character, ;; with ‘^’ as its matching close. (modify-syntax-entry ?$ "(^") ⇒ nil ;; Make ‘^’ a close parenthesis character, ;; with ‘$’ as its matching open. (modify-syntax-entry ?^ ")$") ⇒ nil ;; Make ‘/’ a punctuation character, ;; the first character of a start-comment sequence, ;; and the second character of an end-comment sequence. ;; This is used in C mode. (modify-syntax-entry ?/ ". 14") ⇒ nil This function returns the syntax class of character, represented by its designator character (see Syntax Class Table). This returns only the class, not its matching character or syntax flags. The following examples apply to C mode. (We use string to make it easier to see the character returned by ;; Space characters have whitespace syntax class. (string (char-syntax ?\s)) ⇒ " " ;; Forward slash characters have punctuation syntax. ;; Note that this char-syntaxcall does not reveal ;; that it is also part of comment-start and -end sequences. (string (char-syntax ?/)) ⇒ "." ;; Open parenthesis characters have open parenthesis syntax. ;; Note that this char-syntaxcall does not reveal that ;; it has a matching character, ‘)’. (string (char-syntax ?\()) ⇒ "(" This function makes table the syntax table for the current buffer. It returns table. This function returns the current syntax table, which is the table for the current buffer. This command displays the contents of the syntax table of buffer (by default, the current buffer) in a help buffer. This macro executes body using table as the current syntax table. It returns the value of the last form in body, after restoring the old current syntax table. Since each buffer has its own current syntax table, we should make that with-syntax-table temporarily alters the current syntax table of whichever buffer is current at the time the macro execution starts. Other buffers are not affected.
<urn:uuid:e90160c7-a479-4140-8ec6-4cfb04246d4a>
CC-MAIN-2017-47
http://ergoemacs.org/emacs_manual/elisp/Syntax-Table-Functions.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805049.34/warc/CC-MAIN-20171118210145-20171118230145-00218.warc.gz
en
0.710002
856
3.4375
3
- 18.07 (released) ... CodeDom: Getting Started Before you start writing ASP.NET pages in Eiffel, you should be familiar with the ASP.NET technology itself. If you haven't already, it is strongly recommended that you follow the ASP.NET quickstarts available online at http://samples.gotdotnet.com/quickstart/aspplus/ . Apart from a few Eiffel specific points described in Using Eiffel, writing ASP.NET pages in Eiffel follows the same rules as writing ASP.NET pages in any other language. Writing ASP.NET pages in Eiffel also requires to be familiar with the Eiffel programming language itself. There are no changes in the language when using it to write ASP.NET pages: the same parser and compiler are used to parse and compile standard Eiffel source code and ASP.NET generated source code. Documentation on the Eiffel programming language can be found on the Eiffel documentation web site . The Samples folder of the Eiffel for ASP.NET delivery includes ASP.NET pages written in Eiffel. To run the samples you can either click on the corresponding link in the Start menu or open the page http://localhost/EiffelSample in your internet browser. Each sample comes with an extensively commented source code.
<urn:uuid:f3d48f8a-fb6f-457c-8d67-1defa2d89b2a>
CC-MAIN-2018-34
https://www.eiffel.org/doc/solutions/CodeDom-_Getting_Started
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210040.24/warc/CC-MAIN-20180815083101-20180815103101-00690.warc.gz
en
0.774234
276
2.671875
3
Help horses keep their cool when heat is on Summer will soon officially arrive, bringing the challenge of managing horses during hot weather. Horses can acclimate to hot and humid environments. A 15-day to 21-day acclimation period is recommended for horses originating from cooler or drier climates that are traveling to compete or reside in hot, humid conditions. The acclimation period results in an increased tolerance to both heat and exercise. However, acclimation does not reduce the need for close monitoring of horses during training and competition in these environments. To help reduce the effects of heat and keep horses comfortable, consider the following: - Provide turnout during cooler times of the day—early in the morning, late at night or overnight. - Provide relief from the sun through access to shade from trees or buildings. Remember that shade will change throughout the day, and constructed buildings may block natural air flow. - Watch for signs of sunburn, especially on white or light-colored areas. Use masks to protect the horses’ faces. - Fans help to improve airflow, but be sure to keep cords and plugs out of the horse’s reach to prevent electrocution. - Ensure access to clean, cool water at all times. “Cool” is defined as being 45 to 64 degrees. Depending on feed, an adult horse in a cool climate will normally drink 6 to 10 gallons of water each day while at rest and much more while working or in situations with high heat and humidity. - Water buckets and tanks may need to be cleaned more regularly in hot weather as algae and bacteria grow rapidly in warm water. Blue algae toxicity is more common in ponds or slow-running streams during hot, dry weather. - Free-choice access to salt will encourage drinking. The two electrolytes that most often need to be replaced from sweating are sodium and chloride, which make up salt. Loose salt is preferred to a salt block. Offering free-choice MFA 5% Horse Mineral with Shield also helps to mitigate heat stress. It contains salt as well as essential oils and a proprietary blend of botanical extracts and synbiotics, all of which help boost the horse’s health and immune system. - Consider providing electrolytes to horses that have been sweating heavily or are expected to do so. If electrolytes are added to drinking water, also offer plain water since some horses dislike the taste of electrolytes and will drink less. This situation is similar with people—some like to drink Gatorade. Others do not. - Reduce riding intensity and length. Heat stress can affect any horse but is especially common in older, obese and out-of-condition horses. Young foals also tend to be more prone to heat stress and dehydration. - Clip horses with long hair coats, such as horses with Cushing’s disease, to enhance cooling. - Transport horses during the coolest part of the day. Ensure that trailers are well ventilated. Offer water frequently. Do not park in direct sunlight with horses inside. - Horses that have little or no ability to produce sweat have a condition called “anhidrosis-hypohidrosis,” and are prime candidates for heat stress. Research shows 2% to 6% of horses can develop this issue. They may require additional management strategies to mitigate the effects of heat stress, such as electrolyte therapy. - Avoid riding a horse when the combined temperature in degrees Fahrenheit and percent relative humidity is greater than 150. For example, if it is 80 degrees out, a relative humidity of greater than 70% exceeds the 150 calculation. If a horse must be worked during hot and humid weather, consider adjusting your schedule to ride early in the morning or late at night. Work the horse in shade when possible, and keep the work light. Include frequent breaks that allow the horse to cool down and regain a normal respiratory rate. Do not work the horse beyond its fitness level. Watch for normal sweating. Inside the stable, create airflow, use fans and exploit the “chimney effect,” in which rising warm air forces cooler air to infiltrate through doors, windows or other openings. Provide access to cool, clean water at all times and offer water frequently during work. - Created on . - Hits: 34
<urn:uuid:c8abed61-0c59-488b-b54b-f1e95157e5ed>
CC-MAIN-2019-26
https://todaysfarmermagazine.com/mag/livestock/1577-help-horses-keep-their-cool-when-heat-is-on
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999814.77/warc/CC-MAIN-20190625072148-20190625094148-00127.warc.gz
en
0.951343
880
2.9375
3
Build a rolling robot with an Arduino Uno microcontroller. Using one of our supported kits below, just follow the clear, step-by-step instructions and illustrations in the beginner-friendly text, Robotics with the BOE Shield-Bot for Arduino. This text was written with hobbyists, robotics summer camps, and grade 7-12 classrooms in mind. Paired with a supported robotics kit, it can be used as a California A-G approved elective course; contact email@example.com for details. - Robot Shield with Arduino kit; book is included as of October 2016 (#32335) - Robotics Shield Kit (for Arduino); book not included (#130-35000) - Boe-Bot to Shield-Bot Retrofit Kit; book not included (#32333) - Boe-Bot to Shield-Bot Retrofit Kit with Arduino; book not included (#910-32333) The assembled and programmed robot will be able to navigate by touch, by light, or by infrared distance detection. Each chapter introduces new STEM skills the areas of programming, electronics, robotics, and engineering. A set of questions, exercises, and projects with solutions are included at the end of each chapter. For additional teacher resources, email firstname.lastname@example.org. - Programming the Arduino microcontroller - Calibrating the servo motors and monitoring servo signals with LED lights - Assembling and testing the BOE Shield-Bot - Navigation basics and pre-programmed maneuvers - Tactile navigation with whisker switches - Light-sensitive navigation with phototransistors - Navigating with infrared headlights for object detection - Shadow vehicle navigation with distance detection - Version: 1.0 - Publisher: Parallax Inc. - ISBN: 978-1-928-98261-6 - Dimensions: 7.5 x 8.5 inches (19 x 21.6 cm) page size - Spiral-bound softcover/274 pages/black & white print Robotics with the BOE Shield-Bot for Arduino Tutorial Code - 157.38 KB | updated: 30 Sep 2016 - 3:34 pm Robotics with the Board of Education Shield for Arduino - 11.95 MB | updated: 03 Nov 2016 - 4:11 pm
<urn:uuid:07bdbc15-f382-4841-911a-c75039680fb5>
CC-MAIN-2020-16
https://www.parallax.com/product/122-32335
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494064.21/warc/CC-MAIN-20200329074745-20200329104745-00092.warc.gz
en
0.863056
472
3.046875
3
Tips on Writing a Dissertation Make clear in both the empirical and conceptual sense what dependent variable(s) your research is based on Set out your argument(s) early in your dissertation, even in the first or second paragraph. This helps the reader know where the rest of your paper is going. A dissertation is not a detective-type story that only unveils the answer in the last chapter! During the process, the writer uses the literature review section to establish their own place in literature rather than to demonstrate they have read all available material. This section should be detailed and critical in the way it shows how previous works have overlooked or misrepresented some important aspect(s). It should be noted, however, that the most essential oversights to draw attention to are those you yourself address in your dissertation. A project like this is not a mechanism for you to show you are capable of critiquing other academic works. Instead, it is your chance to contribute in a valuable way. Critiques are a way of showing how your work adds value. Although it is important the argument you choose is interesting, it can help to begin your dissertation with a puzzle or eye-catching example i.e. something that makes readers wonder why a particular situation is as you say. While much depends on your chosen topic, it can still be quite difficult to write a catchy opening paragraph. Be serious about your own theories. Give detailed consideration to any concepts you use and how you argue the way(s) they are related. Use this careful thinking for the empirical aspects of your paper when you are figuring out how things should be measured. The arguments you choose may only differ in subtle ways from those used by others, but they can still have significant bearing on what is suitable for measuring a concept or theory. It can be good to use graphics The use of graphics often makes a text easier to read and they are good for illustrating various types of data and results. Graphical information is often better than using tables only. While tables are good for providing clear detail, graphics are almost always more effective at showing how variables are related. Do not exceed the word limit. If you have a limit of 10,000 words, stick to it! A word limit should not be treated as a “must reach” target. If your word limit is, say, 10,000 words, and you believe you have included all necessary material, do not be tempted to add “padding” to reach the upper limit. In most cases, 10,000 words are sufficient. Should you feel there is good reason to surpass this word limit, it is probably because you have not done sufficient editing. Including redundant and/or repetitive text, or anything that is not related to your arguments, can lead to you having marks deducted. Make sure you edit your paper, numerous times if necessary, before you hand it in. A written piece can be structured in different ways, and the structure you use will probably depend on your topic and the methodologies you choose. While the following structure is not the definitive one, you may find it useful for reference purposes. It may seem sensible to you to add, remove, or alter some of the sections described below according to your own judgement. - An introductory section: Say what you are writing about and your reasons for doing so. Briefly outline your argument(s), dependent variable(s), examples, questions, etc. - A literature review chapter: Please refer to the section above for more information on this. - A section outlining your argument or theory: Once you have identified any gaps in existing knowledge and/or literature, fill these in and develop your hypotheses. - A section setting out any empirical-type evidence: You can use combinations of these e.g. an evaluation of any dependent and any independent variables, a selection of samples or case studies, your findings and/or the results of any tests on your hypotheses. - A discussion chapter: This is where you discuss the results e.g. how they do or do not support your hypotheses and to what extent. Mention any possible limitations or shortcomings and/or use case study samples by way of illustration. - A concluding section: This sums-up the main points from a dissertation and what has been learnt. It is also used to make suggestions or recommendations for future research. You may find these useful: Dissertation Discussion Help Introduction Chapter for Dissertation Writing of Abstract for Dissertation Results Chapter for Dissertation Dissertation Conclusion Writing Example of Dissertation Hypothesis
<urn:uuid:9ffde7a4-03d0-4107-90e1-d6046085e0b1>
CC-MAIN-2019-39
https://primeessay.org/tips-on-writing-a-dissertation.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573735.34/warc/CC-MAIN-20190919204548-20190919230548-00549.warc.gz
en
0.918315
931
2.796875
3
- What We Do - Who We Are - Calendars & Events - Archaeology Projects - Public Outreach - Equipment & Labs The Dhiban Excavation and Development Project (DEDP) investigates the archaeology, environment, and history of Dhiban, a Middle Eastern town located today in west-central Jordan. Dhiban has been settled intermittently over the past five millennia and is today the largest town on the Dhiban Plateau. Information about the Dhiban 2012 Field School is online. Our laboratory and methodological expertise is what is called paleoethnobotany or archaeobotany--the study of plants used by humans in the past. The main work in the laboratory is with macrobotanical remains (e.g. seeds and tubers) but also on wood as well. The Nemea Center is committed to teaching, research, and public service in an on-going research project at Nemea in Greece. The center is directed by Kim Shelton, Classics professor at UC Berkeley. The Oceanic Archaeology Laboratory (OAL) is one of several research labs which together comprise the Archaeological Research Facility, an organized research unit of the University of California at Berkeley. The OAL is under the direction of Patrick V. Kirch, Class of 1954 Professor of Anthropology. Obsidian from the Quispisisa source was widely distributed in ancient South America. Today dozens of large quarry pits are found in high grassland area in southern Ayacucho at around 4000m asl. In 2012 a research project directed by N. Tripcevich, D. Contreras, and Y. Cavero will focus on the source area and adjacent knapping workshops. Contact us about our field research in 2012. Featuring the investigations of and discoveries of the Berkeley Archaeologists at Çatalhöyük (Turkey), and those of their colleagues. Explore themed collections, create original projects, and contribute your own "remix" of Çatalhöyük. Located in central Turkey, Çatalhöyük (”cha-tal-hu-yuk”) is the site of a Neolithic farming community that flourished from 9,400 until 7,700 years ago. The website is a production of Berkeley Archaeologists at Çatalhöyük (BACH), directed by Ruth Tringham a professor of Anthropology at UC Berkeley. Tel Dor archaeological expedition to Israel
<urn:uuid:2146369a-c369-4c94-8710-6cc6f74eb5f0>
CC-MAIN-2015-32
http://arf.berkeley.edu/taxonomy/term/117
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042989443.69/warc/CC-MAIN-20150728002309-00290-ip-10-236-191-2.ec2.internal.warc.gz
en
0.925591
514
2.53125
3
By: Kenya, Lourdes, & Eduardo. Safe methods of industrial waste disposal. What is Industrial waste? Industrial waste is the waste produced by industrial activity, such as that of factories, mills and mines. What are the different types of industrial waste?. By: Kenya, Lourdes, & Eduardo Safe methods of industrial waste disposal What are the different types of industrial waste? Waste comes in many different forms such as, but not limited to.-Agricultural waste-Animal by-products-Biodegradable waste-Biomedical waste-Bulky waste-Business waste-Chemical waste-Clinical waste Most of air pollutants include CO, SO2, etc. These chemicals increase the risks of suffering from cancer, lower respiratory systems and immunity. Worse still, they can cause ozone depletion and global warming. It is very important to figure out the effects of industrial waste on environment. There are consequences. In the first place, industrial waste causes air pollution. Solid and gaseous waste can pollute the air. Using fossil fuels such as gas, coal and oil to create electricity for power industries and manufacturing operations can produce toxic chemicals that are generated to the air through chimneys and exhaust pipes. Most of air pollutants include CO, SO2, etc. These chemicals increase the risks of suffering from cancer, lower respiratory systems and immunity. Worse still, they can cause ozone depletion and global warming. solid waste is everyday household garbage, which is collected by municipalities and disposed of in a landfill or in a incinerator. It can also be the solid form of gases or liquid waste. Industrial waste is the waste produced by industrial activity which includes any material that is rendered useless during a manufacturing process such as that of factories, mills and mines. chemical compounds produced by industry which, if they are ingested or breathed in by humans, can cause psychological damage. The disposal of toxic wastes is a major environmental problem in the United States. Regulated medical waste (RMW), also known as ‘biohazardous’ waste or 'infectious medical’ waste, is the portion of the waste stream that may be contaminated by blood, body fluids or other potentially infectious materials, thus posing a significant risk of transmitting infection. Industrial waste is a potential feast for bacteria. The microscopic bacteria decompose industrial waste, transforming it from environmental pollution to products that can be recycled by man or nature. Incineration is appropriate for some hazardous waste because the high temperatures can destroy some synthetic compounds. Other methods include deep burial and deep-well injection. Chemical treatments such as catalysis alter the chemical structure of hazardous waste, rendering it harmless. Manufacturing, mining, construction and metallurgical industries generate waste material that often cannot be consumed or recycled. Because many of these industry operations take place on a massive scale, they often produce massive amounts of these waste byproducts. Wastes such as slag, scrap material, rock tailings, useless chemicals, oils and acids are disposed of in many different ways: Dumping in landfills Dumping in oceans Storage in underground caverns Some industrial processes create byproducts that can be recycled, such as aluminum, glass, glycerin and gasoline, while other byproducts, such as methane gas, can be used in other industrial processes. How to recycle the industrial hazardous waste? Many hazardous wastes can be recycled into new products. Examples might include lead-acid batteries or electronic circuit boards where the heavy metals these types of ashes go though the proper treatment, they could bind to other pollutants and convert them into easier-to- dispose solids, or they could be used as pavement filling. Such treatments reduce the level of threat of harmful chemicals, like fly and bottom ash while also recycling the safe product. Hazardous wastes are any solid, liquid, or contained gaseous materials which are no longer used and, if not handled or disposed of properly, could damage or pollute the land, air, or water. They can also cause injury or death to exposed individuals. ACUTELY HAZARDOUS WASTES — waste materials which are so dangerous in small amounts that they are regulated the same way as large amounts of other hazardous wastes. USED OIL OR FUELS — can be considered hazardous if not properly handled. UNUSABLE PESTICIDES, RINSATES & RESIDUES — materials classified as hazardous. SPENT SOLVENTS — such as those used in parts washers, etc. PAINTING SUPPLY WASTES — including spent thinners, flammable waste paints, and hardened paint containing lead, chromium, or barium. SPENT WOOD PRESERVATIVES — such as residues or spilled materials containing pentachlorophenol, chromated copper arsenate(CCA), or creosote. BATTERIES — spent lead-acid batteries not intended for recycling. The definition of non hazardous waste is waste which is neither inert nor classed to as special and it does not fall within the hazardous waste classification. Insert waste is non-reactive and therefore not harmful to the environment. Some unfavorable amounts of hazardous materials have the tendency to seep into the ground. These chemicals eventually entered natural hydrologic systems. Many landfills now require countermeasures against groundwater contamination, an example being installing a barrier along the foundation of the landfill to contain the hazardous substances that may remain in the disposed waste. Currently, hazardous wastes must often be stabilized and solidified in order to enter a landfill and many hazardous wastes undergo different treatments in order to stabilize and dispose of them. The best way to dispose of hazardous substances is to isolate them from other waste and send them for recycling or disposal at special facilities. This waste is securely stored until it can be transported offshore for incineration or until suitable treatment options are available Commercial waste recycling happens when commercial companies reuse their non-hazardous or hazardous waste and turn them into new products. They continue this process until there is nothing they can use. since the beginning of the nuclear age, the concern over the disposal of nuclear waste has become one of the primary reasons for the stagnation of the development of nuclear power. Previously, there were only three options available for disposal: 1) Shoot it into space and into the sun. 2) Store it in containers on the earth's surface. 3) Dig a hole and bury it. The first solution, shooting it into space, is ridiculously expensive and dangerous. It takes at least 200 pounds of fuel to raise one pound of payload into the earth's orbit. Getting it to the sun would take much more. There are up to 42,000 tons of nuclear wastes in the U.S. at this time. The second solution, storing it in containers on the earth's surface, is what is currently being done. It is very risky due to the threat potential from terrorists, including bombing or crashing an aircraft into the storage pool (wet storage) or the drums (dry storage). The third solution, digging a hole and burying it, is invalid for any storage for more than a relatively short time due to the lack of long-range data on volcanism, earthquakes, water tables, etc. all commercial spent fuel is stored at the site where it was generated in either a concrete, steel lined pool or in an above-ground dry concrete and steel cask. Typically, spent fuel rods are cooled in a concrete, steel lined pool for between 3 and 10 years, at which time they are transferred to a dry concrete and steel cask. In total, the inventory of commercial spent fuel is close to 65,000 metric tons, or enough to cover one football field about 20 feet deep. Of course, interim storage has its limits; nearly all nuclear reactors will need to continually seek on-site expansion of storage facilities, and some may hit physical limits. The only solution for this problem is to expand which isn’t to economically great. -hazardous waste is a waste that has the potential to cause, or significantly contribute to an increase in mortality or an increase in serious irreversible, or incapacitating reversible illness; or pose a substantial present or potential hazard to human health or the environment when improperly treated, stored, transported, or disposed of, or otherwise managed. -Industrial waste is waste that results from or is incidental to operations of industry, manufacturing, mining, or agriculture. Industrial waste may be hazardous or nonhazardous. The waste from industries are directly dumped into surrounding water bodies and open lands which causes various types of pollution. This is known as industrial pollution. In addition, numerous manufacturing plants pour off undiluted corrosives, poisons, and other noxious byproducts. The construction industry discharges slurries of gypsum, cement, abrasives, metals, and poisonous solvents. Another pervasive group of contaminants entering food chains is the polychlorinated biphenyl (PCB) compounds, components of lubricants, plastic wrappers, and adhesives. In yet another instance of pollution, hot water discharged by factories and power plants causes so-called thermal pollution by increasing water temperatures. Such increases change the level of oxygen dissolved in a body of water, thereby disrupting the water's ecological balance, killing off some plant and animal species while encouraging the overgrowth of others. Acidic water at mine sites often kills vegetation, and may cause fish deaths in rivers. Apart from low pH, visual indicators of AMD at mine sites include the • large areas where vegetation has died due to acidic runoff and shallow acidic • surface water bodies on the mine sites often appear to have a milky blue-white cloudy appearance due to the presence of flocs of aluminium hydroxide. If the water is extremely acidic (< pH 3), it may appear to be crystal clear due to the precipitation of the flocs. Of the chemicals used to process ores, cyanide may be the most problematic due to its toxicity and the complexity of its chemical behaviour in groundwater. Cyanide degrades rapidly into nontoxic chemical compounds when exposed to air and sunlight, but in groundwater it may persist for long periods with little or no degradation. Cyanide (usually in the form of potassium or sodium cyanide) is used to extract gold from its ore, but in the subsurface it can react with minerals in soil and rock to form a wide range of metal cyanide complexes, many of which are very toxic. Abandoned pits and mine shafts are commonly used for water supply after mine closure. Depending on the type of mining activity, water from these sources could pose a risk to human health from high dissolved metal or cyanide concentrations.
<urn:uuid:e81eabca-75be-4c1e-b3a2-db77034210ec>
CC-MAIN-2017-13
http://www.slideserve.com/murray/safe-methods-of-industrial-waste-disposal
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186608.9/warc/CC-MAIN-20170322212946-00255-ip-10-233-31-227.ec2.internal.warc.gz
en
0.932094
2,212
3.78125
4
From the Life of Heber J. Grant Many times in his life, Heber J. Grant sacrificed worldly interests to participate in temple and family history work. This began in his youth when Church members had the opportunity to contribute money to help build the Salt Lake Temple. “Month after month, as a boy,” he recalled, “I contributed one dollar a month. As my wages increased I contributed two dollars a month, and later three dollars, four dollars, five dollars, and finally gave several thousands of dollars towards the completion of that temple. Why? Because the Lord God Almighty had given me a knowledge that the hearts of the children have been turned to their fathers; that the keys held by Elijah the prophet were in very deed delivered to Joseph Smith and Oliver Cowdery.”1 The priesthood keys restored by Elijah make possible the uniting of families for time and all eternity through sacred temple ordinances. As President Grant explained, this work is equally significant to the living and the dead: “We have the gospel of Jesus Christ restored to us; we have the plan of life and salvation; we have the ordinances of the gospel not only for the living but also for the dead. We have all that is necessary, not only for our own salvation, but that we may be in very deed ‘Saviors upon Mount Zion,’ [see Obadiah 1:21] and enter into the temples of our God and save our ancestors who have died without a knowledge of the gospel.”2 President Grant showed his love for temple and family history work when he said: “I am deeply interested in this work. I am anxious to encourage the people to press on in securing their genealogies and after doing so in laboring in our temples.”3 Through his example and teachings, his family members came to love temple work. In January 1928 he decided to establish every Thursday night as Grant family temple night. Endowed members of the family gathered for dinner and then went to the Salt Lake Temple to receive sacred ordinances in behalf of their deceased ancestors. On his birthday in 1934, 50 family members assembled in the temple and participated in the sealings of 1,516 children to their parents.4 Teachings of Heber J. Grant No sacrifice is too great as we strive to unite our families through temple work. I shall always be grateful, to the day of my death, that I did not listen to some of my friends when, as a young man not quite twenty-one years of age, I took the trouble to travel all the way from Utah County to St. George to be married in the St. George Temple. That was before the railroad went south of Utah County, and we had to travel the rest of the way by team. It was a long and difficult trip in those times, over unimproved and uncertain roads, and the journey each way required several days. Many advised me not to make the effort—not to go all the way down to St. George to be married. They reasoned that I could have the president of the stake or my bishop marry me, and then when the Salt Lake Temple was completed, I could go there with my wife and children and be sealed to her and have our children sealed to us for eternity. Why did I not listen to them? Because I wanted to be married for time and eternity—because I wanted to start life right. Later I had cause to rejoice greatly because of my determination to be married in the temple at that time rather than to have waited until some later and seemingly more convenient time. … I believe that no worthy young Latter-day Saint man or woman should spare any reasonable effort to come to a house of the Lord to begin life together. The marriage vows taken in these hallowed places and the sacred covenants entered into for time and all eternity are [protection] against many of the temptations of life that tend to break homes and destroy happiness. … The blessings and promises that come from beginning life together, for time and eternity, in a temple of the Lord, cannot be obtained in any other way and worthy young Latter-day Saint men and women who so begin life together find that their eternal partnership under the everlasting covenant becomes the foundation upon which are built peace, happiness, virtue, love, and all of the other eternal verities of life, here and hereafter.5 I cannot emphasize too strongly … the necessity of the young people of the Latter-day Saints coming into this House, to be properly married and start the battle of life under the inspiration of the living God and with the blessings of the authority of the Priesthood of God held by His servants who administer in the Temple. I want to impress upon your hearts that you can do nothing, that you can make no sacrifice but what sooner or later the reward will come to you, either in time or in eternity, and almost without exception when we make any sacrifices in the line of duty in performing those things that are pleasing in the sight of God we get our reward during our lives.6 A little over a year ago I made up my mind that by planning my affairs, by staying away from lectures or concerts or theatres or operas, I could go to the temple at least once every week and have ordinances performed in behalf of some of my loved ones who had passed away. By making up my mind that I could do this I had no difficulty whatever in going through the temple once a week during the entire year. … True, I have had to miss perhaps an opera or theatre or some other function at which I should have liked to be present, but I have had no difficulty whatever. … We can generally do that which we wish to do. A young man can find an immense amount of time to spend with his sweetheart. He can arrange affairs to do that. We can arrange our affairs to get exercise in the shape of golf and otherwise. We can arrange our affairs to have amusements. And if we make up our minds to do so we can arrange our affairs to do temple work, judging from my own experience.7 I believe that if I can find the time to go to the temple and to do temple work once a week, there is hardly a man in the entire Church of Jesus Christ of Latter-day Saints but that can find time if he wishes to plan his work accordingly. I am speaking of people who live where there is a temple, and not of people who have to travel a long distance to get there. … I do not know of any one that is any busier than I am, and if I can do it they can, if they will only get the spirit in their hearts and souls of wanting to do it. The trouble with so many people is they do not have the desire.8 To my mind, one of the great privileges that we as Latter-day Saints enjoy is that of doing temple work for those of our ancestors who have died without a knowledge of the Gospel. … … If you get it into your heart and soul that this is one of the most important things you as Latter-day Saints can do, you will find a way to do it.9 Since the restoration of the sealing keys, many people have felt a desire to search out their ancestors. From the time of Elijah’s visit, restoring the keys that he held, turning the hearts of the children to their fathers [see D&C 110:13–15], there has come into the hearts of people all over the world a desire to know something about their ancestors.10 Men and women all over the world have been organizing societies, hunting up their ancestors, and compiling genealogical records of their families. Millions of dollars have been expended for these purposes. I have spoken to and heard many times of men who have spent large sums of money to compile a record of their forefathers, and after it was compiled, when asked why they did it, they said: “I do not know; I was seized with an irresistible desire to compile that record and to spend money to freely do it. Now that it is compiled I have no special use for it.” The Latter-day Saints value books of that kind beyond price or money.11 When we receive temple ordinances in behalf of our kindred dead, we become “saviors upon Mount Zion.” I rejoice in the marvelous work that is being accomplished in our temples, in the restoration to the earth of the privilege of baptizing, by the authority of the living God, in behalf of those who have passed away, and of performing ordinances which if accepted, will lead the dead to life eternal and to salvation, although they may have died without a knowledge of the Gospel.13 The world asks, how can that be, that one can be baptized for another? But if we believe in the vicarious work of Christ, we must believe that one can do work for another, and that we also may become “saviors upon Mount Zion.” [See Obadiah 1:21.]14 It is our duty … to be mindful of those children of our Father who have preceded us in death without a knowledge of the gospel, and to open the door of salvation to them in our temples, where we also have obligations to perform.15 If we are diligent, the Lord will prepare the way for us to do temple and family history work for our kindred dead. I pray that the Lord will inspire each and all of us to greater diligence in performing to the full extent of our ability the duties and the labors that devolve upon us in doing vicarious work for our dead. … When we seek earnestly, year after year, to gain knowledge regarding those of our family who have passed away without a knowledge of the gospel, I am sure the Lord blesses us in obtaining it.16 This genealogical work, to me, is simply marvelous. It is wonderful how those of us who take any interest in it have the way prepared. It seems miraculous the way my wife has been able in the past to gather genealogical information regarding her forefathers. It is little less than marvelous the way books and other information have come into our possession. When we got right up against a stone wall, in some way there has been a hole made through that wall so that we could crawl through and get on the other side, figuratively speaking, and find something that was of value.17 For years my wife had been seeking to learn the parentage of her great-grandfather, Gideon Burdick. Seven generations of his family were represented in the Church, but back of him she could not go. She followed every clue, but could not even obtain the name of his father. Since he had been a soldier in the Revolutionary War, it was hoped the official records at Washington, D. C. might furnish the needed evidence. But these showed that there were two Gideon Burdicks serving in the American forces at that period, and this made the task of identification still more difficult. Some years ago Mrs. Grant and I visited Washington and consulted the archives of the pension bureau. She found on file there the application of Gideon Burdick for a pension. Examining it, she found that his age as there given corresponded with that of her own ancestor. … One of the witnesses who signed the application proved to be Hyrum Winters, Gideon’s son-in-law, and her own grandfather. … His birthplace was now known to be in Rhode Island, [so] the task that remained was to trace him back to his family connection in that state. After more search Mrs. Grant learned from a letter that a Mr. Harcourt was compiling a genealogy of the Burdick family. She wrote immediately to his address, only to receive a letter from his daughter saying he had died ten years ago, and the manuscript had now gone out of the hands of his family, and she knew nothing of it. This seemed to be another wall to stop us, one which we could not get past. But my wife said, “I will not stop there.” She wrote to the Postmaster of the place where Mr. Harcourt lived and asked him to deliver her letter to any one of the Burdick name. The letter was handed to Dr. Alfred A. Burdick, who lived only a short distance from the Post Office. He answered immediately, saying he had the Harcourt manuscript, and was still compiling Burdick genealogy, with the intention of publishing it in book form. He said he had the record of the whole Burdick family down to Gideon, but nothing of his family, for the latter seemed literally to have dropped out of sight when he moved westward. “Send me,” he wrote, “all the information of Gideon, and I will send you all you want to know about his ancestors.” This was done, and he very kindly sent to her an account of the forefathers of Gideon Burdick, giving her permission to make such use of it as she saw fit. In this way she succeeded in securing a complete copy of the information she had sought after so long, definitely linking her people with the Rhode Island family. … I afterwards learned … the following story of the Burdick manuscript. Years ago William M. B. Harcourt and Dr. Alfred A. Burdick began compiling a genealogy of the Burdick family. A great store of information was collected and systematically arranged, with the intention of publishing it. At this point Mr. Harcourt died, and a cousin of Dr. Burdick’s obtained possession of the manuscript and carried it off with him to New York. At first he thought of publishing it, but several years later he wrote Dr. Burdick, saying that if the latter would pay the freight he could have the [manuscript]. Dr. Burdick, however, indignant at the other’s action in taking the manuscript away, did not answer, even when the other threatened to burn the lot. So the cousin ordered the janitor to carry all these precious papers down into the basement and burn them. For some reason the janitor failed to do this, and when the cousin discovered this some time later he packed up the whole set and shipped them off to his brother. But the brother had no room for them in his house, and consigned them to his back-yard. There they lay for months, exposed to rain and sun, with no one knowing just what to do with them. The brother’s wife died, and Dr. Burdick attended the funeral. Here he learned of the whereabouts of the manuscripts and he was told he could have them if they were of any value to him. He took them home, and, fearing they might again get out of his possession, copied them over book by book. Many parts had already been destroyed by the exposure, but, on examining the whole carefully, he was happy to find that practically all the important entries were preserved. From that time to the present he has continued his research, adding to his information. While in Washington, last December, Mrs. Grant and I made a special trip to Baltimore to meet this gentleman who had so courteously assisted us. … He recognized us from the pictures we had sent, and extended both hands in greeting. Taking us into his inner office, he showed us volume after volume of genealogical data he had gathered, bearing upon the history of the Burdick family and others. “On this subject,” he said, “I am willing to sit up and converse with you all night.” He had twenty manuscript volumes of Burdick material systematically arranged. Four of these were found to contain the direct line of Gideon. Dr. Burdick graciously tendered us this information, to copy and use as we saw fit. I offered to have a stenographer go to his office and make a copy, or to obtain a … duplicate. But he put the books in my hands, saying, “I can trust you with these, President Grant, for I know they will be safe in your hands.” Typewritten copies have now been made of the entire set, and one of them has been returned to Dr. Burdick. Additional information has been gleaned from our own Genealogical Library, and from the family history, to supplement his compilation. … It is hoped that all of this is interesting not only to Mrs. Grant and to me, but to all who are seeking their own genealogies, as a testimony of how the Lord is working amongst his children outside the Church, and as an inspiration to leading men of the Church as well as to the leading men in stakes and wards of the Church to earnestly continue their own research. “Seek and ye shall find.” [Matthew 7:7.]18 The salvation of the dead is one of the cardinal purposes for which the Everlasting Gospel was restored, and the Church of Jesus Christ reestablished, in this day. The phenomenal interest manifested by the Saints in this very important phase of the Saviour’s redemptive mission is a most promising sign. Our temples are thronged from early morning far into the night, by those intent upon redeeming their departed ancestors and helping to forge the link that will eventually bind the Gospel dispensations and bring together all things in Christ, both in heaven and on earth—a work peculiar to the Dispensation of the Fulness of Times. What happiness awaits those devoted labourers in the House of the Lord, when they pass into the Spirit World and there receive a rapturous welcome from those for whom they have rendered this inestimable service!19 Suggestions for Study and Discussion In what ways has participation in temple ordinances blessed your life? What can we do to more fully enjoy the blessings of the temple? Why is it important that we marry in the temple? How does temple marriage strengthen the relationship between husband and wife? What does it mean to be a “savior upon Mount Zion”? (See also D&C 128; 138:47–48, 53–54, 57–58.) How have temple ordinances and family history work helped you turn your heart to your family members, both living and dead? What resources does the Church provide to help us do family history work? How has the Lord helped prepare the way for you to find family history information? What evidences have you seen that people all over the world have felt a desire to learn about their ancestors? What can we do to make time for regular temple attendance? for family history work? How can families living far from temples build a tradition of respect and reverence for temple work? Gospel Standards, comp. G. Homer Durham (1941), 34. Gospel Standards, 94–95. “An Inspired Mission,” Utah Genealogical and Historical Magazine, July 1931, 106. See Heber J. Grant, “A Family Temple Night,” Improvement Era, July 1944, 425, 471. “Beginning Life Together,” Improvement Era, Apr. 1936, 198–99. From an address delivered at the dedication of the Cardston Alberta Temple, Aug. 1923, Family and Church History Department Archives, The Church of Jesus Christ of Latter-day Saints. Gospel Standards, 33–34. In Power from On High: A Lesson Book for Fourth Year Junior Genealogical Classes (1937), 26. “On Going to the Temple,” Improvement Era, Aug. 1941, 459. In Conference Report, Oct. 1919, 23. In Conference Report, Apr. 1928, 9. In Conference Report, Oct. 1919, 23. In Conference Report, Apr. 1934, 11. In Brian H. Stuy, comp., Collected Discourses Delivered by President Wilford Woodruff, His Two Counselors, the Twelve Apostles, and Others, 5 vols. (1987–92), 1:170. In Conference Report, Apr. 1945, 10. In Conference Report, Apr. 1928, 9; paragraphing altered. Improvement Era, Aug. 1941, 459. “Seek, and Ye Shall Find,” Utah Genealogical and Historical Magazine, Apr. 1928, 59–61. In James R. Clark, comp., Messages of the First Presidency of The Church of Jesus Christ of Latter-day Saints, 6 vols. (1965–75), 5:241.
<urn:uuid:5a691f38-d54d-420c-9440-74c83fa230b6>
CC-MAIN-2017-39
https://www.lds.org/manual/teachings-heber-j-grant/chapter-6?lang=eng&_r=1
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689775.73/warc/CC-MAIN-20170923194310-20170923214310-00281.warc.gz
en
0.976516
4,276
2.828125
3
What is Firewise? Did you know Bella Vista is a Firewise community? October 4 – 10 is National Fire Prevention Week, but the city takes fire prevention seriously year-round. Firewise is a national program that gets homeowners involved in taking responsibility for wildfire prevention around their homes. Bella Vista Fire Department personnel are committed to taking action on the forefront to prevent fire disasters. The Arkansas Forestry Commission sponsors a multi-agency wildfire preparedness effort called Arkansas Firewise. It is part of the National Firewise Communities USA organization. With the help of Arkansas Firewise, our fire department and other local organizations are working to protect our community from wildfires. Firefighters educate residents about wildfires and develop projects to reduce the chances of fires breaking out in the forests and natural areas near our homes and businesses. The topography and landscape of Bella Vista make this community susceptible to wildfires more than most, Fire Chief Steve Sims said. “Firewise in Bella Vista makes sense,” he said, citing an incident recently when leaves surrounding a home caught fire, then the fire traveled up the siding into the home’s attic, igniting the rest of the structure. This is the time of year to practice Firewise philosophy, Sims said. Leaves are falling from the trees and the temperatures are cooling off — take time to remove the fallen foliage and brush from around your home and prevent the perfect conditions for a wildfire. For more information about Firewise, contact Sims at 479-855-8249.
<urn:uuid:fc75e0e7-d814-437f-9249-c4269078de18>
CC-MAIN-2019-18
https://bellavistaar.gov/news_detail_T12_R54.php
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578531994.14/warc/CC-MAIN-20190421160020-20190421182020-00240.warc.gz
en
0.925362
309
2.625
3
Catastrophe alert over melting ice from Greenland GREENLAND’s ice sheet is almost certain to melt away, raising sea levels by seven metres, unless more ambitious targets are set for reducing global warming. A new analysis shows that within half a century, carbon dioxide levels in the atmosphere will be high enough to start the huge ice sheet melting. The melting would take a long time, as much as 1,000 years, but the effects on sea level would be catastrophic. A rise of 7m (23ft) would be enough to inundate huge areas of land, with entire countries, such as the Maldives, disappearing. Large areas of Britain would disappear under the waves if sea levels rose by 7m. Sea defences around East Anglia and the Somerset Levels would be washed away and the estuaries
<urn:uuid:7c0236e2-3600-4c04-bf9d-e964c666a581>
CC-MAIN-2022-21
https://www.thetimes.co.uk/article/catastrophe-alert-over-melting-ice-from-greenland-6m6cs67c2vr
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662550298.31/warc/CC-MAIN-20220522220714-20220523010714-00547.warc.gz
en
0.948403
167
3.546875
4
In 1939, on this day the Nippon Kaigun and Kriegsmarine began a summer-long joint exercise that resulted in the German double aircraft carrier group being stranded in the Far East at the outbreak of war. Flugzeugträger Part 3: Convergence of Operation Z & Plan ZNeedless to say, the internment was a source of huge frustration to Grand Admiral Erich Raeder. His Plan Z rearmament program had been explicitly authorized by the Anglo-German Naval Agreement, but then the real negotiations had begun in earnest - with the Fuehrer. But then fate intervened, and the Grand Admiral was finally given a historic opportunity to demonstrate that the German Navy could make a real difference. Because in late 1941, Raeder's patience was finally rewarded by a private visit from Chuichi Nagumo. The Japanese Admiral wanted to discuss the feasibility of German carriers Graf Zeppelin and Peter Strasser supporting his Kido Butai in a pre-emptive attack on an undisclosed allied military base. The success of the joint exercises had demonstrated that such a mission was operationally possible, although matters of command needed to be delicately discussed. And yet a complete coincidence gave Raeder the assurance that needed. Because Nagumo had chosen the codename Operation Z. It was more than the fickle finger of fate, it was destiny. Because the strike from the Axis third wave force destroyed drydocks and fuel storage depots, putting the eventual US victory back by two whole years. This post shares some commonality with the sister articles in the Flugzeugträger thread.
<urn:uuid:79ea2b86-39ac-4ed6-8c87-152d0b369655>
CC-MAIN-2014-42
http://www.todayinah.co.uk/index.php?userid=guest@todayinah.co.uk&story=39615-Q
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119658026.51/warc/CC-MAIN-20141024030058-00075-ip-10-16-133-185.ec2.internal.warc.gz
en
0.956309
330
3.296875
3
In this second Supportive School Discipline Webinar Series event, experts provided information that school, district, residential facility, and court staff, law enforcement, and community stakeholders need to better understand how the use of discretionary discipline practices focused on prevention and early intervention can transform all schools into supportive learning environments for all students. Research has demonstrated that the most effective tool to address problem student behavior is to prevent it from occurring in the first place. Further, prevention and intervention efforts more closely tailored to address students’ specific behavior issues are more effective than blanket policies and practices. Webinar presenters described the multi-tiered behavioral health prevention framework and discuss how schools in multiple settings have applied the framework to create more supportive discipline policies and practices. In additional, presenters shared experiences implementing multi-tiered preventative approaches to school discipline within public schools and secure care residential facilities, highlighting the impact on safety and overall student and staff performance and well-being.
<urn:uuid:318a152e-6274-46b5-b9c2-a507818a1cf8>
CC-MAIN-2016-40
http://www.neglected-delinquent.org/events/ssd-webinar-series-alternatives-traditional-school-discipline-multi-tiered-behavioral-health
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660436.26/warc/CC-MAIN-20160924173740-00122-ip-10-143-35-109.ec2.internal.warc.gz
en
0.943298
191
2.765625
3
A marine habitat map for the Northland section of the Northeast Marine Bioregion in New Zealand’s territorial sea has been completed and is presented in a series of maps. This recent publication by the Department of Conservation contains maps of marine habitats for the area of coast out to the 12 nautical mile boundary from Mangawhai to Ahipara. The map covers an area of 1.34 million hectares. The map book is a useful resource for community groups, iwi and hapu and many other agencies. There is a technical report on how the mapping was undertaken and a poster available for those keen to display Northland’s coastal habitats. This information should be valuable to any group in Northland looking at marine protection and management.
<urn:uuid:0f9ddd1f-b06f-4a95-bec8-0da784e092a0>
CC-MAIN-2020-45
https://www.nrc.govt.nz/resource-library-summary/research-and-reports/coastal/northland-marine-habitats/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107887810.47/warc/CC-MAIN-20201025041701-20201025071701-00514.warc.gz
en
0.900457
154
2.640625
3
The Ascent of Mary Somerville in 19th Century Society, by Elisabetta Strickland This biography traces the life and work of Mary Fairfax Somerville, whose extraordinary mathematical talent only came to light through fortuitous circumstances. Barely taught to read and write as a child, all the science she learned and mastered was self taught. In this delightful narrative the author takes up the challenge of discovering how Somerville came to be one of the most outstanding British women scientists and, furthermore, a popular writer. Particular attention is paid to the gender aspects of Somerville's success in what was, to put it mildly, a predominantly male domain. Book Review from Mathematical Assocoation of America Mary Somerville most likely qualifies as the most capable mathematician in history that I knew nothing about. This is not due to a lack of attention on my part, I have read many math books, some of which have been historical. As a test, I looked in a 900-page introduction to the history of mathematics book that I have: her name does not appear in the index. Yet she was quite a fascinating character. Her father was a Vice-Admiral in the British Navy and so was away from home for extended periods. In her early years she generally was allowed to run free in the garden; the first attempt to give her some formal schooling, when she was ten, was a failure. Mary was sent to an expensive private school and the restrictions were very difficult and the teacher (Miss Primrose) was very rigid. “She (Mary) was permanently in tears and often constrained in various ways, using methods close to torture.” Yet all was not for naught, as Mary returned from her ordeal with a new outlook and a desire to read (really devour) books. Mary’s mother disapproved of that form of learning for girls and expected her to learn sewing and needlework. However, Mary had other ideas and this started a life of educating herself and going against the strong social mores of Britain in the 19th century. Mary was a “Renaissance woman,” teaching herself mathematics and most areas of science. By herself, she also learned Latin and French. She wrote many books on mathematics and science. Indeed, the breadth and depth of her books is very impressive. Her book On the Mechanism of the Heavens (1832) sold out immediately and earned her the first of many awards. The quality of her self-education is summed up in the following excerpt from this biography: “In fact, she not only translated, but also interpreted Laplace’s work, turning her attention to the most awkward parts of celestial mechanics and reworking all the calculations of the author in such a way that they could be properly understood. I would have enjoyed reading some “before and after” material, quoting first the way Laplace wrote it and then the way Somerville did. Her subsequent books demonstrated her thorough understanding of the math and science: On the Connexion of the Physical Sciences (1834), Physical Geography (1848), and Molecular and Microscopic Science (1869). Her Physical Geography was used as a textbook until the early twentieth century. That is over fifty years! When you consider the dramatic changes taking place in science at the time, this is amazing.
<urn:uuid:98015b91-22bf-4e08-8f14-03ea25965093>
CC-MAIN-2018-22
https://www.scuoladirobotica.it/en/homesdr/882/The_Ascent_of_Mary_Somerville_in_19th_Century_Society__by_Elisabetta_Stricklan.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864466.23/warc/CC-MAIN-20180521181133-20180521201133-00147.warc.gz
en
0.976576
688
3.140625
3
Pacemakers and AEDs. Using an AED has been made very straightforward with designs for lay responders, but you may be thrown a curveball once in a while. Should you encounter a special circumstance, try not to panic. Think through the problem and remind yourself that without your intervention, the patient is unlikely to survive. If the victim has a pacemaker implanted, it will be just below the skin, usually in the upper left chest. It will be a small bump about two inches long, and you may even see a scar over the area. A pacemaker keeps the heart beating at the proper rate and from beating too slow. It helps control abnormal heart rhythms, and it will only activate if it is needed. If you are dealing with an Implantable Cardioverter-Defibrillator (ICD) it will be a slightly bigger device, but similar to a pacemaker. It sends electrical pulses, or shocks, to the heart when it senses any abnormalities in the heartbeat, and helps those who have an irregular heartbeat or are at risk for sudden cardiac arrest. The biggest difference between an ICD and a pacemaker is that an ICD continually monitors heart rhythm and can send low- or high-energy electrical pulses to correct an abnormal heart rhythm. ICDs will initially send low-energy pulses to restore heart rhythm but switch to high-energy pulses when the low-energy shocks are ineffective. Pacemakers, however, only give low-energy electrical pulses to restore a regular heartbeat. It is always a possibility for both devices to malfunction, and fail to deliver the lifesaving intervention a victim needs. Most patients will have the device in their upper right chest, just where you would normally place an AED pad. You should avoid placing a pad directly over the device, if at all possible. When you are placing the AED pads on the patient’s chest, your goal is to “sandwich” the heart. When you think about it this way, you will realize that placing the AED pad a few inches below where you would normally place it is still acceptable. If the implanted pacemaker delivers a low-energy shock while you are attempting to use an AED, you will simply wait for 30 to 60 seconds for the pacemaker to complete the shock. Don’t worry about damaging the device, most are designed to withstand external defibrillation, and saving the victim’s life is much more important than saving a machine. Did you know? In 2015, a study was done in San Francisco, CA. 712 residents had an Implantable Cardioverter-Defibrillator (ICD) during the study period. Of these patients, 15.3% died, and 6.4% of the deaths were sudden cardiac deaths with a device concern. If you still have questions, you can always leave us a comment or email us at email@example.com
<urn:uuid:d5001d52-94b7-4e90-b012-54f130c53f02>
CC-MAIN-2022-40
https://www.aedbrands.com/blog/can-an-aed-be-used-on-a-person-with-a-pacemaker/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00755.warc.gz
en
0.921994
609
3.109375
3
Gardening Articles: Flowers :: Perennials Helping Plants to Help Themselves (page 3 of 3) by William Bryant Logan Quick Mycorrhizae Facts * There are 150 different species of vascular-arbuscular endomycorrhizal (VAM) fungi and hundreds if not thousands of ectomycorrhizal fungi. Only three ericoid mycorrhizal fungi are known. * Mycorrhizal fungi are more specific to the soil than to plants. If your soil is poor quality -- dry and compact, with little or no topsoil -- adding mycorrhizal fungi will likely enhance your plants' ability to find and extract nutrients. * Mycorrhizal plants are much better at extracting phosphorus from soils where the nutrient is unavailable due to pH. * Food crops known to respond to endomycorrhizae include apple, artichoke, celery, corn, eggplant, fig, garlic, grapes, onion, pistachio, potato, soybean, squash, strawberry, and tomato. * Older varieties of plants often respond more favorably to mycorrhizae than newer hybrid varieties. * To determine if mycorrhizal fungi are present in your soil, send a soil sample to a lab for biological testing and analysis. The test results will tell you how to amend your soil for optimum plant health. Arborist William Bryant Logan lives in New York and is the author of The Tool Book (Workman, 1997; $40).
<urn:uuid:df2f22db-046f-4557-89c1-c9bea5f1e945>
CC-MAIN-2014-23
http://www.garden.org/subchannels/flowers/perennials?q=show&id=1125&page=3
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270877.35/warc/CC-MAIN-20140728011750-00372-ip-10-146-231-18.ec2.internal.warc.gz
en
0.867961
319
3.21875
3
Beliefs & Priorities - CSISD should broaden and expand its existing efforts to engage all students and their families, including being more assertive in communicating and connecting to the economically disadvantaged and underrepresented student populations. - To help our students in today’s global economy, CSISD needs to create new opportunities for students to learn about other cultures and more languages at all levels, Head Start-12. - CSISD should systematically encourage all students, specifically targeting economically disadvantaged and underrepresented student populations, to take advantage of challenging academic offerings to prepare them for post secondary education and the workforce. - CSISD should seek and develop faculty and staff that are capable of meeting the wide array of instructional needs of an increasingly diverse student population. - In partnership with other agencies, CSISD should provide accessibility to emerging and challenging technologies for every student. - Technology should be used to increase all students’ knowledge base and enhance their interest in learning. - Technology should be an integral tool in teaching, learning and assessment. - Students should be fluent in a variety of relevant technologies and be able to easily adapt to new technologies. - While recognizing the importance of achieving high educational ratings, CSISD’s primary focus should be on challenging, relevant and engaged student learning that prepares graduates to be ready for post secondary educational experiences and productive members in the work force. The district and all schools should earn at least an Acceptable rating. - CSISD should employ multiple measures of accountability, ensure measured progress over time and provide public access to the results. - CSISD should establish a wider array of workforce readiness programs to meet the expanding needs of its students and the needs of the workforce. - CSISD should prepare all students for post-secondary education. - CSISD should be competitive with peer school districts with regard to the number of college credit hours students may earn while in high school. - Priority 1: Actively communicate to the community, staff and students the District’s strengths and challenges in an environment that promotes trust - Priority 2: Promote a learning environment that is safe and results in academic, social and emotional success while encouraging a healthy lifestyle for each student - Priority 3: Maximize resources in order to create highly successful students
<urn:uuid:7a19052f-a018-4d42-be58-5260adc84425>
CC-MAIN-2017-17
http://www.csisd.org/apps/pages/index.jsp?uREC_ID=161714&type=d&termREC_ID=&pREC_ID=330176
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121216.64/warc/CC-MAIN-20170423031201-00315-ip-10-145-167-34.ec2.internal.warc.gz
en
0.932445
471
3.0625
3
Substitute Success - Tentative Imagine this: it is your first day at a new substitute teaching assignment. The school is one you have never stepped foot in, you have never met any of the students or staff before, and you do not even know where your classroom is. After asking the office where to go, you realize the teacher has not left a lesson plan. Class starts in half an hour and you need to devise a strategy for the day, despite not knowing what the class was learning or where they left off. The class subject is one you are not familiar with. You are still unsure if taking that staff-only parking spot was the right call. For substitute teachers, this is the normal routine. Each day is a new assignment: new students, new content, and new challenges, each unique to that school. As a substitute, you are not only expected to watch over students, but to maintain an enriching learning experience. Without this, students miss crucial days in their learning curriculum. In extreme cases, when substitutes are not available, schools may cancel classes altogether. The question is how does someone prepare for a day like this? What does substitute training look like? What are the best strategies to foster an engaging and educational day, and how can schools simplify this process for their incoming substitutes? The best training for substitute teachers focuses on the everyday issues substitutes encounter during their assignments. One way this can be done is through group training sessions where potential substitutes learn how to provide safe, structured learning environments that encourage student achievement. These sessions typically focus on a few critical elements: - Assignment preparation - Classroom expectations - Classroom management strategies - Age-appropriate communication and instruction - Emergency procedures - End-of-day responsibilities These sessions are often designed by teachers and are led by current and past substitutes who can provide their own real-world experiences. Potential substitutes are given the opportunity to ask questions and to engage with others going through the same process. At these group sessions, substitutes can also learn about additional resources, such as online training and mentoring. Online libraries provide substitutes with in-depth video lectures on managing classrooms, creating lesson plans, and engaging effectively with students. Mentoring provides an in-person approach to these issues and can help substitutes feel supported, making them more likely to return to substitute teaching the next school year. Of course, some training also falls on the shoulders of the substitutes themselves. It is important for substitutes to research their school’s requirements. This can include researching anything from standard protocol (such as the dress code, code of conduct, and start and end times) to any extenuating circumstances (such as school delays and closures). They may call ahead to the school and ask questions, or they may visit the school’s website, seeking out pertinent information. Executing a Successful Day The majority of substitute training focuses on preparing for a successful day. Substitutes are taught to report to assignments early to check in, greet office staff, and ask for assignment details. They need to review lesson plans before students arrive, find materials for the day, and prepare their “teacher toolkit.” This toolkit includes all the go-to strategies a substitute has in their back pocket, such as: - Warmup activities - Attention getters - Downtime activities Successful substitutes have a wealth of these exercises at their disposal and mold them based on the grade level they are working with. For elementary students, a warmup activity might see students drawing a picture, while for middle and high school, it might be creating a name tent. The same is true of attention getters, which can be strengthened with the help of the class. Substitute teachers can identify helpful students and use them to gather information about regular classroom practices. For instance, a substitute might ask what the teacher usually does to grab the class’s attention and then use this information to their advantage. These helpful students can be invaluable resources when a lesson plan is not provided. Students can show the substitute where the class left off, what subjects they have already covered, and paint a clearer picture of what will be covered next. The substitute can then build this information into their plan. They may choose to review previous material as a class or have students pair up and discuss it together. Even when a lesson plan is provided, this information can help a substitute better understand the subject material, as substitutes are not always experts in the classes they are teaching. The most successful substitutes adapt to any situation thrown at them. Each class is unique; every student is unique. When entering a new classroom, substitutes must quickly identify each child’s dynamic, whether they are introverted or extroverted, and consider factors in a student’s life that they are not privy to. Conflict resolution is a crucial skill here: analyzing body language and utilizing trauma-informed teaching enables them to empathize with students in a very limited amount of time. Substitutes may only work with a classroom once, but they use their time to cultivate a safe and welcoming learning space for all. Cultivating a Welcoming Environment for Substitutes According to a survey conducted by EdWeek Research Center, 44% of school district leaders say they provide no training for substitute teachers. Just 11% offer training in a substitute’s most central role: classroom management. This not only leaves substitutes feeling unprepared, but it encourages them to pursue their own training, a sometimes costly endeavor in today’s economy. So, what can schools do? Access to training can go a long way in helping substitutes feel welcomed in a district. This training can be provided by an educational staffing agency or by the district itself, but it is especially important for the district to provide direct support to their substitutes upon arrival. This can be accomplished by implementing a substitute welcoming program: - Create a Plan: Create binders that substitute teachers can bring with them to the classroom. These binders should be K-12 with lessons for every subject area and include the school’s emergency procedures, district policies, and an easy guide to the timesheet process. For easy access, these should also be available online. - Provide Points of Contact: Walk substitute teachers to their class and have school leaders and faculty stop by the classroom to say “hello” and “thank you.” This helps substitutes feel appreciated and welcome in the school, especially if they are greeted by neighboring teachers. Substitutes do not have the regular coworker relationships that full-time teachers do. It can feel gratifying to know that another teacher is on your side. - Follow Up: Be open to feedback about school performance. Check in with subs regularly to see what is going great and what their concerns are. Pay special attention to any notes written by substitutes, as these can provide a thorough explanation of why a sub may or may not return to the district. Use this feedback to make improvements to your substitute welcoming plan. Schools may also consider competitive and incentive-based wages to encourage substitute retention. Nowadays, substitutes have a wide array of gig jobs to choose from, including food delivery, freelancing, and passenger driving. Sometimes, the requirements for these jobs can be as minimal as a driver’s license and still provide a living wage. Schools may consider more competitive wages to keep up with the changing job market, or they may consider additional perks, such as bonuses, paying for substitutes’ training, or giving substitutes paid time off on holidays. Substitute teaching, like all teaching, can be a challenging job. Whatever strategies school districts implement, it’s important is to ensure that substitutes feel welcome, supported, and heard, and that they arrive with the training they need to have a successful day. Jennalyn Stull is a proposal writer at Edustaff. She has a bachelor’s degree in writing from Grand Valley State University with a focus on technical writing. Her experience also includes legal and creative writing, marketing, and graphic design.
<urn:uuid:f6377843-a106-4f7a-a86a-7558f5c3a6d6>
CC-MAIN-2023-14
https://www.aaspa.org/news/substitute-success---tentative
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00593.warc.gz
en
0.9486
1,650
3
3
Researchers from the University of Dundee and the Francis Crick Institute have made a significant discovery about a cellular pathway associated with developmental defects and a myriad of diseases ranging from alopecia to colorectal cancer. The research, jointly led by Dundee's Dr Gopal Sapkota and Professor Sir Jim Smith of the Crick, examined the role of a protein called PAWS1 in the Wnt signalling pathway, which is of fundamental importance in shaping developing embryos and controlling cell fate in adults. Mutations that cause slight alterations in Wnt signalling can lead to the developmental defects and disease. The researchers have now demonstrated that PAWS1 plays a significant impact in controlling the Wnt signalling pathway. "Abnormal Wnt signalling is associated with many cancers, particularly colorectal cancers," said Dr Sapkota. "Understanding how PAWS1 regulates Wnt signalling may therefore offer new opportunities and targets for potential interventions." The Dundee-Crick team had previously made the discovery of PAWS1 as a protein associated with a range of signalling processes involved in the development of bone, cartilage and other tissues in the human body. In order to further understand its role in development and disease, they looked at frogs as the activation of Wnt signalling in frog embryos is known to cause a two-headed tadpole. The researchers found that injection of PAWS1 into frog embryos resulted in two-head tadpoles, thus implicating PAWS1 in the control of Wnt signalling. When they removed PAWS1 from a human osteosarcoma cell line, they found that Wnt signalling was inhibited. To further explore the molecular mechanisms through which PAWS1 controls Wnt signalling, the researchers discovered that PAWS1 interacts with Casein Kinase 1 alpha (CK1?), an enzyme that is known to regulate Wnt signalling. They went on to map the determinants of PAWS1-CK1 interaction and subsequently demonstrated that PAWS1 mutations incapable of associating with CK1? not only fail to cause two-headed tadpoles but are also unable to activate Wnt signalling. This leads to the prospect of scientists one day being able to use PAWS1 to correct potentially deleterious alterations to Wnt signalling and therefore prevent or treat the diseases associated with it. Dr Sapkota continued, "Our uncovering of PAWS1 as a crucial regulator of CK1? in Wnt signalling represents a significant leap in our understanding of this important signalling pathway. CK1? has been known as an important player in Wnt signalling for two decades but its regulation had remained a mystery until now." The findings are published in the current issue of EMBO Reports. Polyxeni Bozatzi, a PhD student in Dr Sapkota's lab, and Dr Kevin Dingwell, from Professor Smith's lab, are joint lead authors of this study. Professor Smith said, "Although the precise function of PAWS1 was poorly understood, PAWS1 mutations are known to cause palmoplantar hyperkeratosis, a disease in which there is excessive skin cell growth on the soles and palms and can affect normal hair growth leading to conditions such as alopecia. "Wnt signalling is known to play crucial roles in the maintenance of skin tissue and hair development. Our findings that PAWS1 is important player in Wnt signalling now offer an opportunity to establish whether the pathogenic PAWS1 mutations impact Wnt signalling to give rise to this disease." "This research is an outcome of a long-standing collaboration between the Dundee and Crick labs. It represents a wonderful example of how collaboration facilitates key scientific discoveries."
<urn:uuid:f0c9560e-d2c5-4b7e-a723-f51d7d3042d6>
CC-MAIN-2019-04
https://www.eurekalert.org/pub_releases/2018-03/uod-sss032218.php
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583857913.57/warc/CC-MAIN-20190122140606-20190122162606-00253.warc.gz
en
0.956564
757
2.625
3
Use the 'BACK' button to return to where you were, if you want. Otherwise, this is a link-poor page. Sex part used to create seeds. Flowers and Flower-like Structures: Achene: A dry type of fruit that contains a single seed; e. g., fruit produced by members of the Aster family. Anther: Male part of the flower that produces Corolla: See petals, below. Disc flower: Flower of the Aster family characterized by a short tube of fused petals and a pappus of bristles attached to the ovary. Filament: Stalk-like part of the stamen that supports the anther. Flower head: A structural unit of several small flowers attached to a receptacle; looks like a single flower, but is a unit of clustered flowers on a common base. e. g., flower head of the Aster family; a sunflower. Inflorescence: A fancy word for the cluster of flowers or flowering heads on a plant; typically occurs in a characteristic pattern; examples of patterns include: cyme, panicle, raceme, spike, and umble. Involucral bracts: Small leaf-like structures that occur on the underside of the receptacle; e. g., in the Ovary: Lowermost part of the pistil; contains the developing seed(s) and forms the fruit. Pappus: A cluster of bristles attached to the upper part of the ovary; may aid in seed dispersal. Petals: Uppermost, leaf-like structures of a flower that are usually brightly colored; collectively the petals form the corolla. The petals of the corolla may be fused to form a tube or other configuration. Pistil: Female part of the flower comprised of the ovary, style, and stigma. Ray flower: Flower of the Aster family characterized by an elongate ribbon-like ray of fused petals and a pappus of bristles above the ovary. Receptacle: A fleshy structure at the tip of a stem that serves as a support for one or more attached flowers or flowering parts. Recurved: Concave or "indented" curve, formed by the margins of a leaf, where they join at the tip or the base of the blade. Sepals: Leaf-like structures located beneath the petals of a flower; collectively the sepals form the calyx, and are usually green. Some species of flowers lack petals, in which case the sepals may be brightly colored and take over the function of the missing petals, e. g.,marsh marigold (Family Ranunculaceae). Stamen: Male part of the flower comprised of the anther and filament. Stigma: Uppermost part of the pistil; receives Style: Central part of the pistil through which pollen tubes pass; connects the stigma with the ovary. Attached individually: Leaves that occur singly and independently on the stem; as opposed to leaves that are paired on the stem; same as alternate. Attached in pairs: Two leaves that are attached across from each other on the stem at the same level; same Axil: The angle, typically acute, formed by the leaf and the stem where they join. Basal leaves: Leaves that occur on the lower or lowest part of the stem, at or near its base, toward the Blade: The broad or flat part of a leaf that attaches to the petiole, or, in the absence of a petiole, to Compound leaf: A leaf in which the blade is subdivided into several small leaf-like structures, called leaflets, that share a common petiole. The number of leaflets may vary within or between species; for example, a compound leaf may have from 5 - 7 leaflets or from 7 - 9, Hairs: See under "Stems," below. Margin: The edge of the leaf, from the tip of the blade to the blade's junction with the petiole. Lance-shaped or Lanceolate: An elongate leaf that is rounded at one end and pointed at the opposite end; likened to the head of a spear; spear-shaped; also lanceolate; lance-shaped leaves are attached by their rounded ends; ob-lance-shaped leaves are attached by their pointed ends; also oblanceolate. Leaflet: The part of a compound leaf that resembles an individual leaf blade, and which is one of several similar structures that are attached to a common petiole; also, leaf-like sub-divisions of a compound leaf; the leaflets together make up the blade of a compound leaf. Ovate: A flattened form that has an egg-like shape. Ovate leaves are attached with their broadly curved end toward the stem. Palmate compound leaf: A compound leaf in which the leaflets emerge radially from a common point of attachment on the petiole. Palmate veined: Pattern in which the principal veins of the leaf emerge radially from a common point near the petiole, and there is no dominant central vein. Parallel veined: Pattern in which the principal veins of the leaf emerge from a common point near the petiole, and extend to the tip of the leaf, while remaining parallel to the edge of the leaf, and to each other. Petiole: A narrow stalk-like structure that connects the leaf blade to the stem. Pinnate veined: Pattern in which paired side veins emerge serially, in "V" like fashion from the principal central vein, throughout the length of the leaf. Simple leaf: A leaf in which the blade is a single unit and not subdivided into leaflets. Smooth edge: A leaf margin that lacks teeth, and is otherwise uninterrupted. Teeth: A series of alternating projections and indentations along the margin of a leaf; likened to the cutting edge of a saw; may be coarse, fine, or double, etc. Veins: Web-like thickenings in the leaf tissue that occur in specific patterns; e. g., pinnate, palmate, Winged petiole: A petiole having narrow extensions of the leaf blade that continue along each side of the petiole, from the base of the blade to the stem. Axil: See under "Leaves," above. Basal leaves: See under "Leaves," above. Hairs: Small bristle-like extensions of the cuticle of stems and leaves, that vary in texture, size, and density; for example: a stem that is "densely covered with conspicuous, rough, hairs." Wings: Intermittent, well-spaced, narrow, leaf-like, structures that run longitudinally along the sides of some stems; e. g., nodding thistle. See also winged petioles, under "Leaves," above. " - Inches ' - Feet
<urn:uuid:e245c710-a6dd-4ad6-a457-466361f69be0>
CC-MAIN-2017-04
http://www.main.nc.us/naturenotebook/plants/botanicalterms.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281263.12/warc/CC-MAIN-20170116095121-00166-ip-10-171-10-70.ec2.internal.warc.gz
en
0.914459
1,585
3.828125
4
National Bat Monitoring Programme Annual Report 2015 The National Bat Monitoring Programme (NBMP) is an annual series of bat surveys undertaken by thousands of dedicated volunteers, which allow us to monitor changes in British bat populations. The data we collect are used by the Government and conservation organisations to monitor the health of our environment, inform policy and improve the conservation of bats. This report provides population trends for 11 of Great Britain's 17 resident bat species derived from data collected up to and including summer 2015. Trends are provided at GB-level and also at country-level where sufficient data are available (for England, Scotland and Wales; we have insufficient data to provide trends for Northern Ireland at present). This report also provides information on our survey methods and the factors that are driving changes in bat populations in the UK. Key sections of the report: Official Statistics: These statistics have been produced to the high professional standards set out in the Code of Practice for Official Statistics. This report was compiled by Katherine Boughey, Philip Briggs and Becky Wilson. Statistical analysis was completed by Steve Langton. The report should be cited as: Bat Conservation Trust, 2016. The National Bat Monitoring Programme. Annual Report 2015. Bat Conservation Trust, London. Available at http://www.bats.org.uk/pages/nbmp_annual_report.html The National Bat Monitoring Programme is run by the Bat Conservation Trust, in partnership with the Joint Nature Conservation Committee, and supported and steered by Natural England, Natural Resources Wales, Northern Ireland Environment Agency, and Scottish Natural Heritage. The NBMP is indebted to all volunteers who contribute data to the programme. Bat Conservation Ireland contributes Northern Ireland bat records collated by the Irish Bat Monitoring Programme which is funded by the National Parks and Wildlife Service of the Department of Arts, Heritage and the Gaeltacht, Republic of Ireland and Northern Ireland Environment Agency. Data are shared on the NBN Gateway.
<urn:uuid:b2a313ce-d915-47bb-8177-ef9463620fef>
CC-MAIN-2016-36
http://www.bats.org.uk/pages/nbmp_annual_report.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982296020.34/warc/CC-MAIN-20160823195816-00007-ip-10-153-172-175.ec2.internal.warc.gz
en
0.907057
388
3.1875
3
Reading to Learn Rationale: Comprehension is one of the most essential aspects to teach children when they are learning how to read. Summarization is a great strategy for children to learn comprehension. This lesson is designed to teach children how to summarize through a series of steps. Materials: chalk, chalkboard, paper, pencil, sheet with steps to summarization (one per student: 1. Delete unimportant information, 2. Delete repeated information, 3. Substitute easy terms for lists of items, 4. Add a series of events with an easy action term, 5. Select a topic sentence, 6. Invent a topic sentence if there is none), one copy for each student of Life in a Deep Freeze article from National Geographic Explorer for Kids!(can also be found in the November-December 2002 issue on pages 10-13 or on the internet- http://magma.nationalgeographic.com/ngexplorer/0211/articles/mainarticle.html) 1. "Lets review the meaning of the word comprehension. Can anyone raise their hand and tell me what it means? Right! Comprehension is being able to understand what we read and remembering it. Today we are going to learn a strategy to help us improve our comprehension. This strategy is called summarization. Summarization is picking out the facts that are important and that make up the main idea of the passage." 2. Pass out the sheets with the steps to summarization and then explain them to the class. 1. Delete unimportant information, 2. Delete repeated information, 3. Substitute easy terms for lists of items, 4. Add a series of events with an easy action term, 5. Select a topic sentence, 6. Invent a topic sentence if there is none. 3. Now that you understand how to summarize, I want you to read the first three paragraphs of your article silently (remind students what silent reading is). As you read remember to pay attention to the most important information. 4. Summarize the three paragraphs together as a class. "Now we are going to use our steps to summarization strategy together. Raise your hand to tell me some of the unimportant information that you read about. I will write them on the board as you call them out. (Model two unimportant facts on the board to begin the list.) Now raise your hand and tell me the repeated information. (Once again, model two repeated facts of information for the students to begin the list.) Next we'll move on to step 3- lets substitute easy terms for lists of items (model by listing a few terms to begin the list). Raise your hand and tell me give me some terms. Step 5 is next. I want someone to tell me what they think would be a good topic sentence for the first three paragraphs of this article (encourage several students to give their suggestions.) (Use step six if there is not a topic sentence that you can use from the passage)." 5. "Now that we have learned our strategy and used it together, I want you to summarize the rest of the article individually. Read the rest of the article silently. Don't forget to pay attention to the most important details." 6. I will individually assess each student as they summarize the remainder of the article. "As you read the rest of the article I want you to write down the most important details on one side of your paper and the unimportant details on the other. Finally, form your own topic sentence and write it down on your paper also. I will take these up, so do your very best!" References: Pressley, Michael. "Strategies That Improve Children's Memory and Comprehension of Text." The Elementary School Journal. Volume 90, number 1. 1989. Click here to return to Inroads
<urn:uuid:5c604bb6-96a0-4197-91a9-bdd9024d0b5c>
CC-MAIN-2015-40
http://www.auburn.edu/academic/education/reading_genie/inroads/anspaughel.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736676977.21/warc/CC-MAIN-20151001215756-00077-ip-10-137-6-227.ec2.internal.warc.gz
en
0.932431
786
3.875
4
Bureau Central de Renseignements et d'Action |This article does not cite any sources. (June 2009) (Learn how and when to remove this template message)| The Bureau Central de Renseignements et d'Action (English: Central Bureau of Intelligence and Operations), commonly referred as the BCRA was the World War II-era forerunner of the SDECE, the French intelligence service. The BCRA was created by the Free French chief-of-staff in 1940, and it was commanded by Major André Dewavrin, who had taken the nom de guerre, "Colonel Passy". Following the defeat of France in 1940, the Vichy France regime's intelligence service was organized within the Centre d’information gouvernemental (Center for Government Information, CIG), under the direction of Admiral François Darlan. According to Colonel Louis Rivet, head of the Deuxième Bureau since 1936, shortly following the defeat of France in June 1940, he, Captain Paul Paillole, and various members of the counter-intelligence service met at the Seminary of Bon-Encontre near Agen. With the assistance of General Maxime Weygand, they planned to revive French counter-intelligence against German domination. Colonel Rivet's memoirs remain controversial, but according to his account the official Bureau des Menées Antinationales (Bureau of Anti-national Activities, BMA), officially an organization opposing communist activities and resistance efforts and accepted by the Germans under the terms of the armistice, was in reality a cover for the pursuit of collaborators with the Germans. The main vehicle for such operations was "L’entreprise des Travaux Ruraux" (The Rural Work Enterprise), supposedly an agricultural engineering program, which performed clandestine counter-espionage under the command of Captain Paillole. In August 1942, the BMA was dissolved and recreated clandestinely as the Military Security Service by Pierre Laval and Admiral Darlan, who needed such an organisation to try to preserve Vichy French sovereignty. Paillole was given control of this new organization. Meanwhile, on July 1, 1940, the Free French government-in-exile in London created its own intelligence service. General Charles de Gaulle assigned Major Dewavrin to command the organization. Initially known as the Service de Renseignements (SR), the agency would change its name to Bureau central de renseignements et d’action militaire (BCRAM) on 15 April 1941, and again change to Bureau central de renseignements et d’action (BCRA) on 17 January 1942. Initially, it consisted of a single section: - Renseignement (R): commanded by Captain André Manuel (aka "Pallas"), which worked closely with British intelligence agency MI6. Subsequently, other sections were added: - Action militaire (A/M) (Military action): created 15 April 1941, commanded by Captain Raymond Lagier (aka "Bienvenüe") and Fred Scamaroni, working with the British Special Operations Executive. - Contre-espionnage (CE) (Counterintelligence): created 16 December 1941, commanded by Roger Warin (aka Roger Wybot) and Stanislas Mangin, working with the British MI5. - Évasion (E) (Escape): created February 1942, commanded by Lieutenant Mitchell, working with the British MI9. - Politique (N/M for non militaire) (Non-military operations): August 1942, commanded by Jacques Bingen, Jean Pierre-Bloch, and Louis Vallon Upon the reconciliation between General Henri Giraud and Charles de Gaulle in 1943, the French national liberation committee ordered the fusion of the BCRA and the clandestine intelligence services of Rivet into a new structure, the Direction générale des services spéciaux (DGSS, General Directorate for Special Services). Louis Rivet resigned in opposition to the new organization. In 1944 the DGSS became the Direction générale des études et recherches (DGER, General Directorate for Study and Research), which became the Service de documentation extérieure et de contre-espionnage (SDECE, Foreign Documentation and Counter-Espionage Service) in 1945. - André Dewavrin, director throughout World War II and into the post-war period.
<urn:uuid:2a8a26a3-2968-42a3-8f84-d5f06821fad2>
CC-MAIN-2017-34
https://en.wikipedia.org/wiki/Bureau_Central_de_Renseignements_et_d'Action
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886108268.39/warc/CC-MAIN-20170821114342-20170821134342-00532.warc.gz
en
0.896812
933
2.8125
3
Today I am publishing material written by Yuri Vetrov (head of the UI Modeling Company that designs user’s interfaces) on www.experiment.ru This is quite comprehensive directory of various types of visualizations with examples and principles of selection. Must know. Set of tools for visualization is quite extensive — from simple line graphs to complex mappings of relations. You can divide them into several types: It shows the dependence of one data to other. Constructed in the X and Y axises, although may be three-dimensional. The most common case — combines the line set of points corresponding to values on the axes. For example, the daily number of visitors per month: it can display multiple sets of data — for example, statistics for the 3 most popular pages. Shows the distribution of limited amount of dots corresponding to values on the axes. The leveling curve is often drawn between the points — it illustrates the pattern among the values. For example, the relationship between work experience and productivity among the 50 employees of the company (notice: it’s not right to just connect the points in the form of a line graph — the meaning is distorted, and the line won’t be straight). Показывают соотношения набора данных. Во многих случаях строятся вокруг осей, хотя и необязательно. Shows the ratio of the dataset. In many cases, they are built around the axes, not necessarily though. Shows one or more sets of data, comparing them with each other. There are two types of these charts: either the form of several columns standing next to each other, either as a single column but divided internally in accordance with parts values. For example, the annual profit of three companies over the past 5 years, or its market share during the same time period. Displays the percentage occupied by each value within the data set as a fragmented disk. For example, the market share of mobile operators. It can display multiple sets of data — in this case, the diagrams superimposed on one another, each of which is less than the previous one. For example, the market share of mobile operators for the past 3 years. A mixture of graphics and charts — along two axes a set of points is arranged, which corresponds to its values. In this case, the points themselves are not interconnected and have a different value, which is given by the third parameter. For example, a comparison of the number of goods purchased, its total value and the budget of the buyer. Shows the percentage of the maximum number. One of the data values occupies it and it is set as a partially shaded ring. For example, the number of medals won on the championship compared to the maximum. Several of these charts are often used — they compare different values. It compares the magnitude of several values, each of which corresponds to the point on the axis. Number of axes corresponds to the number of values; points are connected into lines. For example, the comparison of profitability of each 8 of company’s directions. Compares keywords or phrases (values) contained within a text fragment (data set), setting for each of them its font size. Font size depends on the value of parameter. For example, the 25 most frequently words, cited in papers, in December 2008. Compares the values in the dataset. It paints them into one of the colors in the pre-selected range. The foundation is a picture or other figure, where the values are placed. The color depends on the value of the parameter and often imposed in the form of spots. For example, elements of the home page that users click the most. There is more further: see the original article for the following types of visualization: Trees and structural diagrams - A Tree - Mental Map - Formal Structural Diagrams - Venn-Euler Diagram - Flat Tree Diagrams of visualization process - Formalized block scheme - Non-formalized block scheme - Cyclic process diagram - Sankey Diagram - Time Scale - Gantt Diagram - Geographic Map - Photographic Map - Road Map - Theme Map - Pie Chart - Line Chart - Connection on the map
<urn:uuid:030975d9-824f-41d8-9cf2-0e0f77d8467b>
CC-MAIN-2020-40
http://infographer.ru/classification_of_graphs_eng/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400192783.34/warc/CC-MAIN-20200919173334-20200919203334-00130.warc.gz
en
0.868261
969
2.71875
3
Birding at Mount Auburn Mount Auburn has long been a favorite destination for naturalists including prominent ornithologists, William Brewster (1851-1919) and Ludlow Griscom (1890-1959). Although some birds can be seen year round at Mount Auburn, hundreds of birdwatchers descend on the Cemetery in the spring to witness the migration of flycatchers, thrushes, vireos, tanagers, orioles, and warblers. Mount Auburn’s attraction as a stopover for birds migrating north was best described by Ludlow Griscom, “It appears, as a green oasis in a vast desert…” (The desert of course being the largely industrial and urban area of Boston and Cambridge). As far back as 1870, Mount Auburn’s trustees sought to encourage and protect birds within the Cemetery by introducing trees and shrubs that attract birds. Later, in the 1950s, our records again show that special planting programs were put in place to provide food and shelter for birds. Mount Auburn President Oakes Ames commented, “To the bird lover no area in the general vicinity of Boston holds greater attraction, particularly during the migration of the warblers in May.” That statement holds true to this day, and as recently as 2002 Mount Auburn’s prominence as a sanctuary for birds was (re)affirmed by its designation as an Important Bird Area of Massachusetts. Cemetery staff continues to carefully consider wildlife habitat when making decisions on our plant collections. Since 1986 The Friends of Mount Auburn Cemetery has sponsored bird walks and compiled field observations posted by birders on the “Bird Sightings” chalk board at Entrance Gate of the Cemetery. Sketch by Clare Walker Leslie from Birds and Birding at Mount Auburn Cemetery: An Introductory Guide (2004) by Christopher Leahy and Clare Walker Leslie.
<urn:uuid:a36b5a1b-3279-4361-ad8f-1d087d3d4127>
CC-MAIN-2018-26
https://mountauburn.org/birding-at-mount-auburn/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867885.75/warc/CC-MAIN-20180625131117-20180625151117-00623.warc.gz
en
0.950659
383
2.828125
3
Execution of Rudolf Höss Rudolf Franz Ferdinand Höss served as the first commandant of the Auschwitz concentration and extermination camp from May 4, 1940 to November 1943, where it is estimated that more than a million people were murdered. Höss was born in Baden-Baden into a Catholic family on November 25, 1901. His father, a former army officer who served in German East Africa, ran a tea and coffee business; Rudolf was the eldest of three children and the only son. When World War I erupted, Rudolf Höss served briefly in a military hospital. Then, at the age of just fourteen, he was admitted to his father’s old regiment, the 21st Regiment of Dragoons. He fought with the Turkish Sixth Army at Baghdad, Kut-el-Amara, and in Palestine, rising to the rank of sergeant – at age seventeen the youngest non-commissioned officer in the army. Höss was wounded three times and was a victim of malaria. A brave soldier, he received the Iron Cross 1st and 2nd Classes and the Baden Military Bravery Medal. After the war, Höss completed his high school education, following which joined nationalist paramilitary groups that were forming in the post-war chaos. He enlisted in the East Prussian Volunteer Corps and then the Freikorps Rossbach in the Baltic area, Silesia, and the Ruhr. During the Silesian Uprisings, he participated in guerrilla attacks against Polish people, and later conducted sabotage against French occupation forces in the Ruhr. Joining the Nazi Party in 1922, on May 31, 1923, Höss and members of the Freikorps beat suspected Communist Walther Kadow to death as revenge for the French execution of German paramilitary soldier Albert Leo Schlageter five days earlier. One of the killers unwisely told a local newspaper of the murder; authorities arrested Rudolf Höss, who accepted blame as the leader of the event, found him guilty and sentenced Höss to ten years imprisonment. As part of a general amnesty, Höss was released in July 1928. Rudolf Höss was married and had five children, two sons and three daughters He was accepted into the SS on April 1, 1934 and was assigned to the SS-Totenkopfverbände (Death’s Head Units.) In December 1934, he assumed duties at Dachau concentration camp. By 1938, he was promoted to SS-Hauptsturmführer and was made adjutant to Hermann Baranowski at the Sachsenhausen concentration camp outside Berlin. The following year, he joined the Waffen-SS. On May 1, 1940, Rudolf Höss was appointed commandant of a prison camp in western Poland, built around an old Austro-Hungarian (and later Polish) army barracks near the town of Oświęcim. It would be known throughout history by its German name – Auschwitz. SS-Obersturmbannführer Höss commanded the camp for three and a half years, during which he expanded the original facility into a sprawling complex known as Auschwitz-Birkenau concentration camp. During this time, Höss lived at Auschwitz in a villa together with his wife and children. At its peak, Auschwitz was three separate facilities – Auschwitz I, Auschwitz II/Birkenau, and Auschwitz III/Monowitz, which included many satellite sub-camps. Auschwitz I served the administrative center for the complex and the site where many medical experiments were conducted; Auschwitz II/Birkenau was the extermination camp, where most of the killing took place; and Auschwitz III/Monowitz the slave labor camp for I. G. Farben and other German industries. In June 1941, Höss attended a meeting in Berlin with Heinrich Himmler to receive instructions. Himmler told Höss that Adolf Hitler had given the order for the physical extermination of Europe’s Jews. Himmler had decided on Auschwitz for this purpose due to its easy access by rail and because the extensive site offered space for measures ensuring isolation. Himmler continued by telling Höss that he would be receiving all operational orders from Adolf Eichmann, warning Höss that the project was to be treated with the utmost secrecy and that no one was allowed to speak about these matters with any person. Höss said later that he kept that secret until the end of 1942, when he told his wife. A stickler for efficiency, Höss began to perfect techniques of mass killing, visiting other killing centers whenever he could. According to Höss, during standard camp operations, two to three trains, each carrying 2,000 prisoners, would arrive daily for periods of four to six weeks. The prisoners were unloaded in the Birkenau camp; those fit for labor were marched to barracks in either Birkenau or one of the Auschwitz camps, while those unsuitable for work were driven immediately into the gas chambers. Initially, the SS operated small gassing bunkers deep in the nearby woods, to avoid detection. Later, they constructed four large gas chambers and crematoria in Birkenau to make the killing more efficient and to handle the increasing rate of exterminations. Studying what was being done at the Treblinka extermination camp, Höss improved on the methods at Treblinka by building his gas chambers ten times larger – so that Auschwitz could kill 2,000 people at once, rather than 200. Arthur Liebehenschel replaced Höss on November 10, 1943. The two men switched duties, with Höss assuming Liebehenschel’s former position as the chief of Department D I in the SS Economic and Administration Office, under Oswald Pohl. Höss was also appointed the deputy of the inspectorate of the concentration camps under Richard Glücks, which was located at Oranienburg, just north of Berlin. Rudolf Höss returned to Auschwitz on May 8, 1944 to supervise a special action – the murder of 430,000 Hungarian Jews, who were transported to the camp and killed between May and July of 1944. However, even Höss’ expanded facility could not handle the huge number of corpses and special details of prisoners were pressed into service to dispose of thousands of bodies by burning them in open pits, placing the bodies on wooden railroad ties and using the human fat in the bodies to keep the fires going twenty-four hours per day. The stench was so great that people could smell it from miles away. As the war drew to an end in 1945, Heinrich Himmler advised Höss to disguise himself among German Navy personnel. Höss evaded arrest for nearly a year, but on March 11, 1946, British troops captured Höss – disguised as a farmer and calling himself Franz Lang. After being questioned and allegedly beaten severely, Höss confessed his real identity. He appeared as a witness at the International Military Tribunal at Nürnberg in April 1946, where he gave detailed testimony of his crimes. On May 25, 1946, Polish authorities took control of Höss and handed him over to the Supreme National Tribunal in Poland, which tried him for murder. The tribunal sentenced Höss to death on April 2, 1947. The sentence was carried out on April 16, 1947, immediately adjacent to the crematorium of the former Auschwitz I concentration camp, where Höss was hanged on a gallows constructed specifically for that purpose.
<urn:uuid:bc642373-918f-420f-97de-86dbadf1434b>
CC-MAIN-2021-21
https://www.thefifthfield.com/biographical-sketches/rudolf-franz-ferdinand-hoss/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988759.29/warc/CC-MAIN-20210506175146-20210506205146-00045.warc.gz
en
0.978321
1,574
3.515625
4
The “Narrowest House in the World” has barely 1 meter wide at its narrowest and is developed in depth and height reaching 10 meters in the latter dimension. His “architect” was improvised own the land owner (Helenita Queiroz Grave Minho) who decided to design his house in an area of difficult steps that he possessed. Following the initial refusal by the municipality to authorize the construction of such a house and after much red tape Helenita obtained the license for works to carry out its project which is today one of the major tourist attractions of their city. The house is located in the town of 12,000 inhabitants Madre de Deus about 50 km from El Salvador in Brazil. Despite the difficulties that the dimensions of the site offers inside the housing is possible to find 3 bedrooms, 2 rooms, kitchen, laundry and toilet facilities required to serve all of these placements. Although today it is one of the main attractions of the city where you will find this is a more humble dwelling built with minimal resources and with almost no budget so that materials and techniques used are the traditional in the homes of most families in Brazil without too many resources, focussing on economy and utility over aesthetics and design. His two medians walls are load-bearing walls that support a network of beams unidirectional who have no problem to cover a distance so short.
<urn:uuid:ff3bc42b-40e8-4d7f-8f2a-284deb5ec7a4>
CC-MAIN-2023-50
https://en.wikiarquitectura.com/building/narrowest-house-in-the-world/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00412.warc.gz
en
0.963601
286
2.59375
3
Salary of a full-time job should be enough to lift workers from poverty Melvin B. Miller | 1/22/2014, 12:05 p.m. History focuses on the human rights aspects of Rev. Martin Luther King’s ministry. Ironically, he was on a mission for economic rights in support of wage increases for garbage collectors in Memphis, Tenn., when he was assassinated. Undoubtedly, Dr. King would support present minimum wage efforts to raise workers’ salaries to lift them from poverty. The United States is unquestionably the wealthiest nation in the world. Nonetheless an estimated 15.1 percent of the population lives in poverty — 46.2 million Americans. Of that number, according to the U.S. Department of Labor, 10.5 million are employed. That amounts to 7.2 percent of the labor force. There is a movement underway to alleviate the problem of the working poor by raising the federal minimum wage from the present level of only $7.25 per hour. Decades ago it was thought that the minimum wage was primarily for youngsters still in the care of their parents and for entry level workers who were learning the skills necessary for promotion. Most low salaried employees were retail clerks and fast food workers. According to the National Employment Law Project, fast-food workers are now not just ambitious teenagers. The average age is 29, and 26 percent are parents. At $7.25 an hour, the income for one year is $15,080. The poverty level for a family of four is any income less than $22,050. The scarcity of employment at better pay has forced Americans to accept minimum wage jobs, and they usually have to have multiple jobs to put food on the table. More affluent Americans have little occasion to witness the difficulties of those struggling for survival during an economic downturn. It is too easy to blame the difficulties of the poor as being self-inflicted. But the basic element of the problem is that the federal minimum wage level has not kept up with the cost of living. The value of the minimum wage has declined by 30 percent in the last 40 years. Advocates for change have been proposing a federal minimum wage of $10.10. That would provide an annual income of $21,008, still less than the poverty level for a family of four, but a step up. Some protestors want an even greater jump in the wage but resistance from the business community is very strong. During the Ronald Reagan presidency (1981-1989), the concept of trickle-down economics gained popularity. Another way of expressing the concept is that a rising tide lifts all boats. But that is not what has been happening in the U.S. For example, in 2012 the income of the top 1 percent of earners rose by 20 percent, while all the rest (99 percent) saw only a combined growth of 1 percent. So much for the trickle-down theory. President George W. Bush (2001-2009) provided substantial tax cuts to the wealthy, in compliance with the trickle-down principle, with the expectation that the so-called “job creators” would invest in the economy. Instead the nation had the “Great Recession” by the end of 2007. Now America has the largest income gap between the rich and the poor since the 1920s. Every state has the right to establish a minimum wage that is higher than the federal level. In Massachusetts, the minimum wage is $8 an hour. However, the state Senate has raised that to $11 an hour by 2016. While that increase is making its way through the legislative process, an organized protest group called Raise Up Massachusetts collected signatures to place a minimum wage of $10.50 an hour on the ballot next year. They collected more than 280,000 signatures, enough to be on the ballot. Many conservatives make it appear that those seeking a reasonable wage are claiming unwarranted benefits. American workers should not be treated like supplicants when the titans of industry have failed to create jobs that provide their employees with a reasonable living standard.
<urn:uuid:8691ba2f-1f13-4aae-9f5b-1a28ad56557b>
CC-MAIN-2016-44
http://baystatebanner.com/news/2014/jan/22/salary-full-time-job-should-be-enough-lift-workers/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721387.11/warc/CC-MAIN-20161020183841-00510-ip-10-171-6-4.ec2.internal.warc.gz
en
0.967038
835
2.625
3
A recent study suggests that black children face higher risks of drowning in swimming pools when compared to children of other ethnic groups. On Thursday, May 16, the U.S. Center for Disease Control and Prevention released a report which suggests that black children in the age category of 5 to 19 had a drowning rate of over five times in swimming pools when compared to white children. The report highlights that drowning accounts for around 4,000 deaths per year in the U.S. Drowning is also responsible for higher number of deaths in children who are aged between one and four years when compared to any other cause of death, barring congenital anomalies. Even for people who are 29 years or over, drowning is amongst the top three causes of unintentional deaths. "With swimming pool drowning rates among blacks aged 5-19 years 5.5 times higher than those among whites in the same age group. This disparity was greatest at ages 11-12 years; at these ages, blacks drown in swimming pools at 10 times the rate of whites. Drowning prevention strategies include using barriers (e.g., fencing) and life jackets, actively supervising or lifeguarding, teaching basic swimming skills and performing bystander cardiopulmonary resuscitation (CPR). The practicality and effectiveness of these strategies varies by setting; however, basic swimming skills can be beneficial across all settings," reads the report. According to the report, white toddlers are susceptible to drowning; however, the risk of drowning reduces for them when they reach age five and remains low afterwards. The researchers say that white parents have a higher inclination of getting their children enrolled for swimming lessons from a very early age. The report also says that black toddlers have a lower rate of drowning, but it increases as children grow older. Dr. Julie Gilchrist, the lead author of the study, suggests that very few black children learn how to swim. Dr. Gilchrist also says that swimming is a dangerous activity and children should not just consider it similar to other sporting activities. Dr. Gilchrist also opines that many parents do not consider swimming an important lifesaving skill. Whereas researchers believe that floating in the water, learning how to control breathing and swimming short distances is more important for children rather than learning swimming strokes. The report also indicates that the drowning rate can be reduced by proper supervision of children near water, swimming in areas with lifeguards, using life jackets and teaching children basic swimming skills.
<urn:uuid:9ffd3c87-571a-46e4-9e25-9470d8da0376>
CC-MAIN-2018-26
https://www.techtimes.com/articles/7125/20140518/black-children-adolescents-have-higher-drowning-rates-at-swimming-pools-study.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867885.75/warc/CC-MAIN-20180625131117-20180625151117-00205.warc.gz
en
0.966761
497
2.828125
3
With his brother, Lutz Heck, who was director of the Berlin Zoological Garden, he worked on two breeding back projects to recreate extinct species. The Heck horse aimed to recreate the tarpan (the true European wild horse, ancestor of all European domestic horse breeds), and the Heck cattle, aimed to recreate the aurochs, the wild cattle of the European forest. This work has been criticised on grounds that once an animal is extinct, it cannot re-exist. This is contrary to Heck's view, which is that while genes of an extinct animal still exist in extant descendants, the animal could still be recreated. Heck also played an important part in saving the European bison (wisent) from extinction when the majority of its population of about 90 survived in captivity in Germany following great losses to the species during World War I. To help manage the survival of the European bison from the remaining captive population, he commenced the first studbook for a non-domestic species, initially as a card index in 1923, leading to a full publication in 1932. Thanks to Heck's efforts, the European bison population has significantly increased and the species has been re-released into the wild. - Van Vuure, Cis (2005). Retracing the Aurochs: History, Morphology and Ecology of an Extinct Wild Ox. Sofia, Bulgaria: Pensoft Publishers. ISBN 978-954-642-235-4.
<urn:uuid:00736a0d-88bc-4a8d-95a1-2cabc65d18eb>
CC-MAIN-2017-34
https://en.wikipedia.org/wiki/Heinz_Heck
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106865.74/warc/CC-MAIN-20170820170023-20170820190023-00340.warc.gz
en
0.940203
300
3.46875
3
- E-Filing of Income Tax Return: E-filing has been made mandatory for most tax payers. This has facilitated speedy filing of Income Tax Return and completion of assessments. This has also resulted in faster refund processing. - Online Payment of taxes or eTax: The government has developed an online platform for the payment of Income Tax. This new system intends to replace the old system of filing hard copy of Income Tax Challans, submitting the same to bank and then receiving the acknowledgement of the same. The platform enables easy payment of Income Tax and TDS by all tax payers with net banking facility. What is e-Tax Payment System? Understanding Income Tax rules, procedures, computation of tax liability and payment of same has always been considered a difficult and complex topic. Traditionally, tax management involved a lot of paper work, documentation, form filling and assistance of an expert. Also, a lot of time and energy is involved in filing hard documents, collating them and then standing in a long queue to submit an Income Tax Return or a Challan of payment of tax. However, with technology and digitization, tax management has transformed. The government over the years has taken efforts to develop the Income Tax Management System with the help of technology and has been fairly successful in streamlining the procedure, right from filing of returns to updating Assessment Orders online. In line with the efforts to digitalize the Income Tax Procedures, eTax or electronic payment of tax has been developed and successfully implemented. eTax has now become an easy, speedy and a preferred way of payment of all taxes. Income Tax Management has been moved to digital platform on the following fronts: How Does e-Tax Works? The payment of e-Tax is facilitated by the Tax Information Network (TIN) of the Income Tax department and managed by NSDL (National Securities Depository limited e-Governance Infrastructure limited). Tax Information Network (TIN) of the Income Tax department provides online facilities for all tax related issues and the same are elaborated below. - Permanent Account Number (PAN): PAN is a unique 10 digit alpha numeric number. Every person assessable under the Income Tax Act needs to obtain a PAN, which needs to be quoted in all forms, challans and communications with the Income Tax Department. PAN is also the login of the assesse to the Income Tax return filing website. All information related to tax paid, return filed, assessment of return etc. are linked to the PAN. Tax Information Network (TIN) of the Income Tax department is the portal offers online application for a PAN, reprinting of the PAN or applying for any amendments to the PAN. - Tax Deduction and Collection Account Number (TAN): The assesses, be it corporate or non-corporate, who have business income and make payments in the form of salary, professional or technical charges need to deduct Tax at Source (as prescribed by the Income Tax Act) before making the payments. The amount deducted needs to be deposited with the Income Tax Department. Any person making such deductions needs to obtain a TAN, which is a unique identification number. Tax Information Network of the Income Tax department is the portal for submission of application for obtaining a TAN. - E-payment of Taxes: Tax Information Network of the Income Tax department is the key facilitator for payment of taxes online. E-Payment System is the online service provided for payment of direct taxes by the tax payers. The facility is available to all assesses having a valid PAN/TAN and a net banking facility. The challans are provided online, which need to be filled. Post which payment of taxes is made and acknowledgement is received instantly. - Electronic Return Acceptance and Consolidation system: (ERACS): It is a web based interface between the tax payer and the Income Tax Department. It enables payment tax deducted/collected at Source and filing for quarterly and annual return for the same (AIR- Annual Information Return). - Online Tax Accounting System (OLTAS): Income Tax Department maintains a database of tax paid by all tax payers. OLTAS helps in centralizing the information of tax collected through various branches across of the country. Thus, ‘e-tax’ falls under the purview of TIN. Introduction of e-tax has reduced the amount of paper work and time involved in the tax payment procedure. The tax payer can pay all the taxes be it Income Tax, Wealth Tax or the Tax deducted at Source by choosing the right challan which is available under ‘e-payment’ option in the ‘Services’ TAB of the website. E-Payment System is the online service provided for payment of direct taxes by the tax payers. Currently, there are 30 authorized banks which include Public sector banks like State Bank of India and its associates as well as Private Sector Banks like ICICI and HDFC Bank. How to Choose the Right Challan for Income Tax Payment? The next step is to select the appropriate challan for Payment of Tax. The information below would help you select the right challan: Payment of Income Tax: This is the most relevant challan used by tax payers. While in case of salaried individuals, the tax is deducted at source by the employer, self-employed individuals have to pay their own taxes. Further, any tax on income from fixed deposit, house property needs to be paid over and above the tax deducted at source. Also, the Income tax Act provides for payment of Advance tax during the year. Who pays the tax? Any individual or corporate whose income is subject to tax under the Income Tax Act. Pre-requisite for payment of Income Tax The tax payer needs to have a PAN and a net banking account. He needs to compute his tax liability under the Act and then make the payment under the appropriate category (Self-Assessment Tax, Advance Tax etc) Procedure to pay the Income Tax Challan No./ITNS 280 is used for payment of Income Tax by both Companies and Individuals. The tax payer has to click on the challan and fill in the relevant information as follows: - Choose the kind of entity paying that tax. That is whether the Income Tax has been paid by companies or an individual/entity. - Enter the Permanent Account Number of the tax payer - Enter the Assessment Year. Assessment Year for Financial Year 2016-2017 would be 2017-18. - Other Information like address, email ID and mobile number needs to be entered. - The tax payer then needs to select the Type of Income Tax he/she intends to pay like Self-Assessment Tax, Advance Tax, Tax on regular Assessment etc. - The Name of the assesse, as per the Income Tax database is displayed and the tax payer needs to confirm the same before making the payment. It is therefore necessary to enter the PAN accurately and double check the same. - The tax payer then selects the bank through which he/she would make the payment. - On selecting the payment option, the tax payer is taken to the bank portal to login to his/her net banking account, enter the amount and confirm the payment. - The tax payer can enter the amount payable under various heads like basic tax, surcharge, penalty etc. through the bank site. On confirming the payment, the bank would debit your account. A Challan Identification Number (CIN) is generated which basically mentions the date and challan no. The amount paid by the assesse to the Income tax department is updated in the Income tax department’s database and the credit for the same is reflected in the tax payer’s Form 26AS. Form 26AS is a form in which the total tax credited to the tax payer’s account is reflected. There is generally a week’s time lag between the date on which payment is paid and the date on which it is gets reflected in 26AS. Thus, the portal is user friendly and the payment can be made anytime through your net banking access. Payment of taxes other than Income Tax: While Income Tax is paid via challan No. /ITNS 280, Challan No. /ITNS 282 is used for the payment of securities transaction tax, wealth tax, gift tax, commodities transaction tax, etc. The procedure for filing the challan and making the payment is similar to that of payment of income tax. The pre-requisite of holding a PAN and net banking account exists. Payment of Tax Deducted at Source: Section 192 of the Income Tax Act provides deduction of tax from source on Payment of salary or wages. In case of salary, the tax is deducted at source by the employer, whether corporate or an individual. Income Tax Act further provides deduction of tax at source on other payments like contractors, rent, interest earned on fixed deposits, professional technical services, royalty charges etc. Who needs to deduct tax at source? As per the Income Tax Act, all companies and non-corporate individuals carrying out business/profession (which are subject to audit under section 44AB) need to deduct TDS as prescribed under the Act. The person who deducts tax is called the deductor and the person to whom payment is made post deduction of tax is the deductee. What is to be done with the tax deducted? The deducted taxes need to be paid by the deductor to the Income Tax department before the 7th day of the subsequent month in which the tax is deducted. Pre-requisite for payment of Tax Deducted/ Collected at Source Following are the pre-conditions before payment of TDS: - The person deducting the tax should have a valid 10 digit TAN. - Before filing the challan, it is important to compute the amount of TDS payable under various heads like salary, rent, professional services, contract etc. - A separate challan has to be filled for Tax deducted at source under each category. Also, separate challans need to be filled for tax deducted at source against payment made to companies and tax deducted at source for payment made to non-corporate. Procedure for payment of TDS Challan No. / ITNS 281 is to be filled by the deductor. The deductor can either be a Corporate or an non-corporate. The deductor needs to fill in the following details in the challan: - Choose whether Tax deducted/collected at Source is for a company or non-company. This means that the tax deducted on payment to companies and non-companies needs to be paid separately by the deductor. - TAN of the tax deductor - Enter the Assessment and Financial year in which the TDS is deducted. Assessment Year for Financial Year 2016-2017 will be 2017-18. - Enter other basic information like the address, email ID and mobile number. - Tax deductor needs to select the type of payment – whether TDS/TCS is payable by tax- payer or is being paid after a regular assessment by the Income Tax department - Tax deductor then needs to select the ‘nature of payment’. Under ‘nature of payment, the deductor needs to select the head under which tax is deducted. That is whether the tax is deducted on the payment of salary (92), rent (94I), payment of interest on securities (193) or payment of profession fees (94J). Each type of payment is given a specified code along with a description. The tax deductor needs to select an appropriate nature of payment under which tax is deducted. Please note that the deductor has to submit different challans for different ‘nature of payments’. - The name of the assesse as per the Income Tax database is displayed and the tax payer needs to confirm the same before making the payment. It is therefore necessary to enter the TAN accurately and double check the same. - The tax deductor then selects the bank thru which he would make the payment. - On selecting the payment option, the tax payer is taken to the bank portal where he/she needs to login to his/her net banking login and password, enter the amount and confirm the payment. - Provision to enter the amount under various heads like basic, surcharge, penalty, interest etc. is provided on the bank’s site. On confirmation of payment, the amount is deducted from the tax deductors account and a challan specifying the TAN, Challan Identification Number (CIN), the date of payment, amount and nature of payment is reflected. The amount paid by the deductor gets updated in the Income Tax database. The amount is then credited to the deductee’s account and appears as a credit in Form 26AS. After a quarterly TD return, the credit to the deductee is filed by the deductor specifying individual names, PAN and the deducted amount. Payment of TDS by individual buying a property but not having a TAN: As per the Income Tax Act, section 194AI, any person/entity who buys an immovable property worth Rs. 50 lacs and above needs to deduct tax at source @1% before making the payment to the seller. The tax so deduct is deposited to the Income Tax department within 7 days from the end of the month in which tax is deducted. The buyer needs to submit Form 26QB and pay the tax amount. Procedure for Filing Form 26QB The Form is available in the e-payment section of TIN of the Income Tax Department. The Form can be filled online and the following details need to be mentioned: - Financial Year and Assessment Year of transaction. - Type of payment. In this case, it is TDS on Sale of property. - Status of the Seller- whether the seller is a ‘Resident’ or Non-Resident’ - PAN of the buyer. Once the PAN is entered, the category of transferor (individual, corporate etc.) is auto reflected along with name as per the database of the Income Tax department. Similar details of the transferee that is the seller are entered and name has to be confirmed. - Other details like address, email and mobile. - The details of property bought like address. - Date of agreement, total value of consideration, payment type (Complete or Installment based) - Details of amount to be paid/credited along with TDS amount and date of tax deduction. - For making payment online, the buyer needs to select the e-tax payment as the mode of payment and select the bank through which he/she intends to make the payment. Thus, the buyer can make payment of TDS online and receive a copy of 26QB and issue a Form 16B to the seller of the property confirming the credit of tax to the seller’s account. E-payment options are also available for payment of taxes under the Income Declaration scheme of the Government of India Challan No. / ITNS 281. Thus, the E-payment of Income tax and tax deducted at source has enabled paper less management of tax payments, speedy credit of tax to the payers account, accessibility and easier maintenance of tax data by the Income Tax Department as well as the tax payer.
<urn:uuid:349225e3-2f8d-428c-b6ce-e151b32a63a6>
CC-MAIN-2018-26
https://api.paisabazaar.com/tax/etax/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267868876.81/warc/CC-MAIN-20180625185510-20180625205510-00322.warc.gz
en
0.953319
3,176
2.703125
3
Respiration in Organisms 1. Why does an athlete breathe faster and deeper than usual after finishing the race? 2. List the similarities and differences between aerobic and anaerobic respiration. 3. Why do we often sneeze when we inhale a lot of dust-laden air? 4. Take three test-tubes. Fill 3/4th of each with water. Lebel them A, B and C. Keep a snail in the test-tube would have the highest concentration of CO2? 5. Tick the correct answer: (a) In cockroaches, air enters the body through (i) lungs (ii) gills (ii) spiracles (iv) skin (b) During heavy exercise, we get cramps in the legs due to the accumulation of (i) Carbon dioxide (ii) Lactic acid (iii) Alcohol (iv) water (c) Normal range of breathing rate per minute in an average adult person at rest is: (i) 9-12 (ii) 15-18 (iii) 21-24 (iv) 30-33 (d) During exhalation, the ribs: (i) Move outwards (ii) Move downwards (iii) Move upwards (iv) do not move at all. 6. Match the items in Column I with those in Column II Column I Column II (a) Yeast (i) Earthworm (b) Diaphragm (ii) Gills (c) Skin (iii) Alcohol (d) Leaves (iv) Chest cavity (e) Fish (v) Stomata (f) Frog (vi) Tracheae 7. Mark “T” if the statement is true and ‘F’ if it is false: (i) During heavy exercise the breathing rate of person slows down. (T/F) (ii) Plants carry out photosynthesis only during the day and respiration only at night. (T/F) (iii) Frogs breathe through their skins as well as their lungs. (T/F) (iv) The fishes have lugs for respiration. (T/F) (v) The size of the chest cavity increases during inhalation. 8. Given below is a square of letters in which are hidden different words related to respiration in organisms. These words may be present in any direction-upwards, downwards, or along the diagonals. Find the words for your respiratory system. Clues about these words are given below the square. (i) The air tubes of insects. (ii) Skeletal structure surrounding chest cavity. (iii) Muscular floor of chest cavity. (iv) Tiny pores on the surface of leaf. (v) Small opening on the sides of the body of an insect. (vi) The respiratory organ of human beings. (vii) The opening through which we inhale. (viii) An anaerobic organism. 9. The mountaineers carry oxygen with them because ————-.
<urn:uuid:9841ada2-5453-430e-84e9-b9d21ecf1533>
CC-MAIN-2019-18
https://www.myschoolpage.com/science/cbse/ncert-grade-7-respiration-organisms-questions/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578605555.73/warc/CC-MAIN-20190423154842-20190423180003-00035.warc.gz
en
0.890318
659
3.484375
3
Assertion-level logic does not affect the final implementation; instead, it offers a slightly different way of looking at things that may be advantageous. Editors Note: This is the first in a four-part mini-series on different ways of looking at logical representations. This is abstracted from the book Bebop to the Boolean Boogie (An Unconventional Guide to Electronics) with the kind permission of the publisher. The topics in this mini-series are as follows: Part 1 – Assertion–Level Logic Part 2 – Positive vs Negative Logic Part 3 – Reed Muller Logic Part 4 – Gray Codes Beware – here be dragons! In a moment we're going to start throwing terms around such as active-high . Sad to relate, the definitions of active-high are subject to confusion. Some academics (and even text books) define an active-low signal as one whose asserted (True or logic 1) state is at a lower voltage level than its unasserted (False or logic 0) state. However, this definition serves only to cause confusion when combined with negative logic implementations (see also Part 2 in this mini-series). Engineers in the trenches generally take the position that an active-high state is one whose active state is considered to be True or logic 1, while an active-low state is one whose active state is considered to be False or logic 0. These definitions allow all forms of logic – including the assertion-level logic introduced in this article – to be represented without any confusion, regardless of whether positive or negative logic implementations are employed. The bottom line, however, is that when using the terms active-high and active-low in discussions with other folks, you are strongly advised to make sure that you all understand them to mean the same thing before you find yourself up to your ears in alligators. The purpose of a circuit diagram is to convey the maximum amount of information in the most efficient fashion. One aspect of this is assigning meaningful names to wires; for example, naming a wire system-reset conveys substantially more information than calling it something like big-boy. Another consideration is that the signals carried by the wires may be active-high or active-low (see the discussions in the topic above). For example, consider a portion of a circuit containing a tri-state buffer with an active-low control input called ~enable (Fig 1). 1. Naming active-low signals. In order to convey as much information as possible, it is preferable to indicate the nature of an active-low signal in its name. One method of achieving this is to prefix the name with a tilde (pronounced "til-duh")character "~"; hence, ~enable. When both the enable-A and enable-B signals are set to their active-high states, the ~enable signal is driven to its active-low state and the tri-state buffer is enabled. It is important to note that the active-low nature of the ~enable signal is not decided by the NAND per se. The only thing that determines whether a signal is active-high or active-low is the way in which it is used by any target gates, such as the tri-state buffer in this example. Thus, active-low signals can be generated by ANDs and ORs as easily as NANDs and NORs. The problem with the standard symbols for BUF, NOT, AND, NAND, OR, and NOR is that they are tailored to reflect operations based on active-high signals being presented to their inputs. To address this problem, special assertion-level logic symbols can be used to more precisely indicate the function of gates with active-low inputs. As a simple example of this, consider how we might represent a NOT gate used to invert an active-low ~enable signal into its active-high enable counterpart (Fig 2). 2. Standard versus assertion-level NOT symbols. Both symbols indicate an inversion, but the assertion-level symbol is more intuitive in the case of this example because it reflects the fact that an active-low input is being transformed into an active-high output. In both cases, the small circles known as bobbles (or bubbles) on the symbols indicate the act of inversion. One way to visualize this is that the symbol for a NOT has been pushed into a symbol for a BUF until only its bobble remains visible (Fig 3). 3. One way to visualize standard versus assertion-level NOT symbols. In the real world, both standard and assertion-level symbols are implemented using identical logic gates. Assertion-level logic does not affect the final implementation, but simply offers an alternative way of viewing things. Visualizing bobbles as representing inverters is a useful technique for handling more complex functions. Consider a variation on our original circuit, in which the ~enable-A and ~enable-B signals are active-low and the tri-state buffer has an active-high enable input (Fig 4). 4. Standard NAND versus assertion-level OR symbols. The purpose of this circuit is to set the enable signal to its active-high state if either of the ~enable-A or ~enable-B signals are in their active-low states. Remember that both of these circuit representations are functionally identical (you can easily prove this by drawing out their truth tables). Once again, however, the assertion-level representation is the more intuitive, especially for someone who is unfamiliar with the function of the circuit. This is because the assertion-level symbol unambiguously indicates that enable will be set to logic 1 if either of the ~enable-A OR ~enable-B signals are presented with logic 0s. Any standard primitive gate symbol can be transformed into its assertion-level equivalent by inverting all of its inputs, exchanging any & (AND) operators for | (OR) operators (and vice versa), and also inverting its output. In fact, a little thought reveals that these steps are identical to those used in a DeMorgan Transformation. Thus, assertion-level symbols may also be referred to as DeMorgan equivalent symbols. The most commonly used assertion-level symbols are those for BUF, NOT, AND, NAND, OR, and NOR (Fig 5). 5. Commonly used assertion-level symbols. Note that any tilde characters in the illustration above are part of the signal names and are used to indicate active-low signals. By comparison, the exclamation mark "!" characters (also known as "shriek" or "bang" characters) are used to indicate actual negation operations in the equations. Clive "Max" Maxfield is president of TechBites Interactive, a marketing consultancy firm specializing in high technology. Max is the author and co-author of a number of books, including Bebop to the Boolean Boogie (An Unconventional Guide to Electronics), The Design Warrior's Guide to FPGAs (Devices, Tools, and Flows), and How Computers Do Math featuring the pedagogical and phantasmagorical virtual DIY Calculator. Widely regarded as being an expert in all aspects of computing and electronics (at least by his mother), Max was once referred to as "an industry notable" and a "semiconductor design expert" by someone famous who wasn't prompted, coerced, or remunerated in any way. Max can be reached at firstname.lastname@example.org.
<urn:uuid:b5863699-2ca4-4334-9417-7647fa7e22a5>
CC-MAIN-2017-51
https://www.eetimes.com/author.asp?section_id=216&doc_id=1274541
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948589512.63/warc/CC-MAIN-20171216220904-20171217002904-00713.warc.gz
en
0.933703
1,549
3.34375
3
Photo Credit: lisafx / iStockPhoto.com How Managing Your Breath Can Help With COPD Symptoms Chronic obstructive pulmonary disease (COPD) leads to progressively worsening airway obstruction. In the early stages, people may experience only shortness of breath upon exertion, but this later progresses to feeling out of breath while performing normal daily activities. Two other major symptoms are a build-up of mucus in the airways and coughing. For most people with COPD, breathlessness causes the most anxiety. It also causes sleeping issues, fatigue, activity restriction, and reduced quality of life. COPD and Breathlessness In COPD patients, fatigue and breathlessness upon exertion are difficult, frightening, and can make exercise difficult. However, the more inactive you are the weaker your limb and respiratory muscles will become. This can lead to a downward spiral of weakness, more trouble breathing and further inactivity, progressing to breathlessness and an inability to function during normal daily activities. Although it can be difficult to overcome the breathlessness and fatigue, regular moderate physical exercise is the best method for maintaining normal function in spite of progressive lung deterioration. Rehabilitation for Breathing The basis of all pulmonary rehabilitation programs is a structured exercise program involving aerobic exercise and strength training. The purpose is to improve the strength and endurance of the limb and respiratory muscles to keep you functioning normally for longer. Breathing exercises for COPD can help you cope with episodes of breathlessness. One breathing exercise, pursed lip breathing, is actually adopted spontaneously by many COPD people in breathing distress. Breathing exercises can relieve distress, reduce the exercise-induced anxiety, and allow you to continue to benefit from physical exercise. Practicing the breathing exercises outside of breathing distress is also useful for when you need them. Breathing exercises are also important for those who are unable to undertake physical exercise. Understanding Your Lungs In the normal lungs, the air sacs expand as oxygen rich air is breathed into the lungs. Oxygen crosses the walls of the sacs to enter the blood in exchange for carbon dioxide. Upon breathing out, the air sacs bounce back to their original shape and the carbon dioxide rich air is breathed off. In COPD, the walls of the air sacs lose their elasticity and structure and do not bounce back readily to their normal shape. The airways also become inflamed, becoming thicker and producing mucus, which causes them to block. The consequence is that it is harder to breathe in. Also, the air that gets into the air sacs gets trapped, leading to incomplete emptying on exhalation and over-inflation of the lungs. The changes in the lungs leads to rapid, shallower breathing and changes in the muscles involved in breathing. Muscles Working in Overdrive Poor oxygen-carbon dioxide exchange stimulates more rapid breathing, especially with exertion, which makes the respiratory muscles work harder. The respiratory muscles also have to work harder to get air through the obstructed airways and into the overinflated air sacs. The main muscles involved in breathing at rest are the diaphragm and, to a lesser extent, the muscles between each rib. Other accessory muscles, the muscles of the neck and chest, only normally become involved with exertion. In COPD, the rib muscles and the accessory muscles make a greater contribution, even at rest. The inspiratory muscles fatigue as they work hard against an increasing load. The diaphragm cannot fully relax against the overinflated lung and becomes tight and fatigued. As the muscles fatigue, breathing becomes inefficient and the muscles work out of sync, with the abdominal muscles pushing counteractively against the chest during inspiration. Breathing progressively becomes more and more difficult. COPD patients also have generalized muscle dysfunction and wasting that affects not only the muscles of respiration, but also of the leg and arm muscles. This is a major cause of exercise intolerance in COPD patients, separate from breathing problems, and is the main reason why regular physical exercise is important. The factors that cause muscle dysfunction are not fully known. These changes cause reduced muscle strength and endurance, which results in rapid muscle fatigue. While reduced function of the leg and arm muscles affects exercise tolerance, reduced inspiratory muscle strength and endurance is more seriously associated with reduced survival. Breathing Exercises You Can Try at Home As well as helping you to cope with breathlessness and assisting you to continue physical exercise, breathing exercises aim to reverse the abnormal breathing pattern of COPD and reduce the strain on the respiratory muscles. They aim to make breathing more efficient, to retrain the diaphragm, strengthen the breathing muscles, and take work away from the rib and accessory muscles. Breathing training also aims to help exhale air from the over-inflated lungs. Studies have shown breathing exercises improve function, with most people able to walk a greater distance over a set time after eight weeks of regular breathing exercises, for five to 15 minutes three times per day. There are a number of types of breathing exercises: those that can be done at home and those that require specialized equipment in the clinic. Safe breathing exercises you can undertake at home are: Pursed Lip Breathing This exercise increases exhalation time, reduces respiratory rate, and causes you to breathe more deeply. - Breathe in slowly through your nose for three counts, keeping your mouth closed - Purse your lips like you are going to whistle - Breathe out gently through your lips for six counts - If this is too long, then aim to breathe out twice as long as you breathe in - Repeat steps one through three for up to 15 minutes, as long as you feel comfortable When using pursed lip breathing to specifically manage shortness of breath: - Stay calm and try to relax - Lower your head and shoulders - Breathe in and out through pursed lips as fast as necessary - Gradually slow down your exhalation by taking longer to breathe out - Start to breathe in through your nose and out through your mouth - Stay in this positon until you have completely caught your breath Diaphragmatic or Abdominal Breathing Focus on using your diaphragm and abdominal muscles when breathing, reducing your chest wall motion. This helps strengthen your diaphragm and abdominal muscles, allowing more air to move in and out of your lungs without tiring the accessory muscles. - Lie on your back with your knees bent - Place one hand on your abdomen below your rib cage - Place the other hand on your chest so you can feel your diaphragm as you breathe - Inhale deeply through your nose for three counts — the belly and lower ribs should rise but the chest should remain still - Tighten your stomach muscles and exhale for a count of six through slightly puckered lips — your hand on your chest should remain still - Repeat for five to 10 minutes Another helpful method is yoga breathing, which is timed and concentrated with a focus on deep breathing, exhalation, body position, and relaxation. There are other more intensive breathing exercises that incorporate applying resistance while breathing. Examples include breathing through a variable diameter pipe and placing weights on your chest and abdomen while breathing. These are techniques that require specific instruction or equipment. In contrast, pursed-lip breathing and diaphragmatic breathing have shown functional benefit, are safe, and can be done at home.
<urn:uuid:3c90370e-7ed6-4ef9-ad41-5b16517352f4>
CC-MAIN-2022-49
http://copdliving.today/living-with-copd/breathing-exercises-can-help/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446708010.98/warc/CC-MAIN-20221126144448-20221126174448-00746.warc.gz
en
0.944799
1,549
2.703125
3
It’s perhaps the most aggravating strain of algae, it has been compared to herpes; “once you’ve got it, it’s there for life.” One can only manage the problem with treatments. This is not entirely accurate, but the difficulty in eradication is due to the strong roots and protective layers over top of the black algae plant. Black algae will appear as dark black or blue/green spots, usually the size of a pencil eraser tip. It lurks in cracks and crevices in plaster, and is one of the hardest to remove. Their roots extend into the plaster or tile grout, and unless the roots are destroyed completely, a new head will grow back in the same place. The heads also contain protective layers to keep cell destroying chemicals from entering the organism. Like yellow algae, black strains can bloom even in the presence of normal sanitizing levels and proper filtration. Black algae is more typically found in concrete or plaster finished pools; it is known for a heavy slime layer and “skeletal growths” that make it impervious to normal chlorine levels (1.0 – 3.0 ppm). Black algae can grow “condominium style” providing layers of algae one on top of the other. Slight cracks in plaster are perfect breeding grounds for black algae especially when if the pool surface is near or past its life span. You actually cannot get rid of black algae unless you get rid of the spores that propagate it.
<urn:uuid:52bd029d-327d-4c9d-97d0-cd4f455e142a>
CC-MAIN-2019-04
https://poolspalmbeaches.com/frequently-asked-questions-about-black-algae/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583660529.12/warc/CC-MAIN-20190118193139-20190118215139-00320.warc.gz
en
0.937958
312
2.65625
3
Northern Prairie Wildlife Research Center Fragments of a cooler setting dating back to glaciation persist to the present along the Sheyenne River Valley, in some ways more closely resembling what we identify with northern Minnesota than with eastern North Dakota. The stately basswood and elm forests, impenetrable thickets, beaver ponds, aspen groves and snaking oxbow pools are in the valley right below stunted oaks and grass-covered dunes. So far one state rare animal and 16 rare plants have been discovered in these habitats. In these numbers are represented the highest concentration of ferns in the state and a notable orchid display. This is in addition to its wealth of game and fish resources and luxuriant array of more common plants. Each of the three tracts described here as the Mirror Pool area make a unique contribution to our understanding and enjoyment of the area. They are highlighted, tract by tract, from east to west, as follows: Mirror Pool WMA 1: Largest of all the three tracts, this area encompasses the greatest habitat diversity and is perhaps the most frequently visited. Extensive sand dunes and old paths through basswood-elm forest offer miles of back country hiking. Deer and turkey hunters, anglers and scouts regularly come to the riverbottom clearing. A series of springs and seeps coming off in valley coulees provides valuable game habitat. These and other features are part of an exciting landscape to explore. Mirror Pool WMA 2: Mirror Pool Swamp, as it's called, is choice stomping grounds for moose. But don't expect to peer across from the edge to see them. Most of the tract is dense alder and bog birch brush, more accurately referred to as "fen" or "peatland" rather than swamp. In fact, it is the largest peatland on the Sheyenne River. Mirror Pool WMA 3: A great semicircle of an oxbow pool nestled in steep sand slopes is found here. It has been called the Leonard Swimming Hole, once a favorite swimming spot. A clearing in the center of the oxbow is still sought for camping, and a path ascending the sand slopes behind is used by both hikers and horseback riders to climb up for a scenic overlook of the valley. Facilities: Camping is allowed in Mirror Pool WMA tracts except where posted. Durations over 10 days require permit. No facilities. Ownership and Contact: Mirror Pool WMA is owned by ND Game and Fish Department. Information on use regulations is available by writing: ND Game and Fish Department, District Office, Lisbon, North Dakota 58054. BONNIE HEIDEL is natural resources ecologist for the North Dakota Game and Fish Department in Bismarck, ND.
<urn:uuid:a04deb1c-7c8e-42ff-9cc0-948bf8019df1>
CC-MAIN-2013-20
http://www.npwrc.usgs.gov/resource/habitat/natareas/mirror.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703293367/warc/CC-MAIN-20130516112133-00056-ip-10-60-113-184.ec2.internal.warc.gz
en
0.941773
578
2.765625
3
Using bad language The language we use tells us a lot about how we see and perceive the world around us. If you use the wrong term, you might end up using the wrong equipment or using it inappropriately. At the simplest level, let’s consider items of a wheelchair to see how the use of bad language can be interpreted. People refer to items as ‘rests’ i.e. arm rests, foot rests, etc. Most of these items are added to wheelchair for a functional purpose, and should be referred to as ‘supports’ rather than ‘rests’. Hence, using the term support (for a functional purpose) as part of good language, will lead subliminally to more careful selection, prescription, and placement of these items, benefiting the user. Terminology is a very important issue, especially in the world of wheelchair prescription. As a result, international standards have been created to ensure correct terminology is used. ISO 7176-26 lists all the ‘correct’ terms and also lists ‘deprecated’ terms for items fitted to wheelchairs and their seating systems. There are many other examples of the use of terms that do not represent the items or their use correctly. Use of the term ‘lap belt’ (which is very commonly used), does not provide the differentiation between a pelvic restraint (e.g. belts used in car seats) and a positioning belt used as a functional support belt. A lap belt also doesn’t define correct as to where the belt should be fitted i.e. over the things, around the pelvic bone, etc which can not only lead to poor interpretation but also have a harmful effect on positioning a person seated in a chair. Similarly, the word ‘pommel’ which is usually used as an knee abductor doesn’t define what the item is being used for and where. Hence, terminology is very important, especially within the healthcare industry to ensure that the clinical needs of the individual are not being compromised as a result of bad language or interpretation of bad language.
<urn:uuid:d498dfe1-392d-45d2-9cfd-b3df90655392>
CC-MAIN-2022-40
https://hiaus.net.au/knowledge-hub/using-bad-language/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335303.67/warc/CC-MAIN-20220929003121-20220929033121-00051.warc.gz
en
0.951788
432
3.046875
3
In many cases of signal processing, using only FIR digital filters is preferable since FIRs with symmetrical impulse response will give an exact linear phase response. Linear phase response is very important for video signal processing. Some applications require baseband filters with very steep rolloff and high stopband attenuation; with the passband much narrower than the stopband. To achieve these requirements, a high order FIR with high precision coefficients and respectively high precision multiplications is required. This means that the complexity of the filter is high. To decrease the complexity, a cascaded connection of filters with downsampling after each cascade is utilized. In many cases it performs a downsampling by 2. Each filter, except the last one, plays the role of pre-filter for the next filter in the cascade connection. The pre-filter has to attenuate only those frequencies that will be aliased to the passband after downsampling. Finally, the last filter has to extract the spectrum of the filtered baseband signal.
<urn:uuid:c988a3b6-8534-49b8-bdeb-dae0d073e4b6>
CC-MAIN-2019-35
https://www.vocal.com/video/implementation-of-fir-using-downsampling/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316150.53/warc/CC-MAIN-20190821174152-20190821200152-00370.warc.gz
en
0.933437
205
2.9375
3
At the Forge - Database Modeling with Django The past few months, this column has been examining Django, a popular open-source Web development framework written in Python. Django sometimes is described as a rival to Ruby on Rails or a Python version of Rails, but just as Python and Ruby are distinct languages, each with its own strengths and weaknesses, Django and Rails are different frameworks, and each has its own set of trade-offs. If you have been following this series of columns about Django, you already have seen how to download and install the Django software, how to create and configure a site and application, and even how to create views (Python methods that handle the business logic) and templates (HTML files with special rules for interpolating variables and dynamic content). With everything we've looked at so far, you could presumably create an interesting dynamic Web application. However, most modern Web applications have another component, a relational database, on which they rely for data storage and retrieval. Sure, you could store everything on the filesystem or even in memory, but for most of us, a relational database is the path of least resistance, ensuring the safety of our data while providing a great deal of flexibility in retrieving it. This month's column, then, looks at the ways in which Django programmers can store and retrieve information in a database. If you have worked with databases only from PHP or CGI programs, you will be surprised and impressed by the degree of automation Django provides. If you have worked with Ruby on Rails, you probably will think the Django programmers are working too hard—to which Django hackers would say that they want to have full control over their application, rather than rely on behind-the-scenes magic. The term model in the Django world describes a Python object for which there is a persistent state, presumably stored in a relational database. We don't need to use models to integrate a database into Django, but it would be difficult (not to mention unaesthetic) if we were simply to stick SQL queries into our templates. So instead, we use Django's built-in object-relational mapper, working solely with objects from within our views and templates. The mapper's job is to translate our method calls into SQL and then translate the resulting database response into Python objects. But, before we even can create our model object, we first must have a database table to which the object will connect. Django requires that we define our model using Python code, describing the table's name, fields and even some default values. If we were interested in keeping the blog application we started last month, we probably could define our table in PostgreSQL as follows: CREATE TABLE Posting ( id SERIAL NOT NULL, title TEXT NOT NULL, body TEXT NOT NULL, posted_at TIMESTAMP NOT NULL DEFAULT NOW(), PRIMARY KEY(id) ); But in Django, we don't create the above SQL directly. Rather, we use Python to create it for us. For example, we can define the above table in Django as follows: from django.db import models class Posting(models.Model): title = models.CharField(maxlength=30) body = models.TextField() publication_date = models.DateTimeField() Our model is a Python class, which inherits from django.db.models.Model. We define each field with a particular type, using objects that we imported from django.db.models. As shown above, some of these data types can be restricted or modified from their defaults by passing parameters. Some are defined specifically because they have built-in limits, such as EmailField, which must be a valid e-mail address. By defining columns with ManyToManyField and ForeignKey objects, it's possible to define a variety of relationships among tables. The above code should be placed in models.py, a Python file that sits within our application's directory (blog in this case), which itself sits inside our Django site directory (mysite in this case). Thus, the models for my blog application reside in mysite/blog/models.py, whereas the models for a poll application would reside in mysite/poll/models.py. Notice that we don't have to define a primary key, which traditionally is called id and is a nonrepeating integer. (In PostgreSQL, we set it to have a SERIAL data type, which gives the column a default value taken from a newly created sequence object. In MySQL, you would set the column to AUTO_INCREMENT, which has some of the same capabilities as a sequence.) Django creates the id column for us automatically. Django handles potential namespace conflicts by prefacing the table name with the application name. So, the posting table within the blog application becomes the blog_posting table. Now, how do we turn our Python code into SQL? First, we have to be sure Django knows which database to use. If you have been following along since my first Django article in the July 2007 issue, you already have added the appropriate lines to settings.py, a site-wide configuration file in which we define the database type, name, user and password. Here are the values that I have installed: DATABASE_ENGINE = 'postgresql' DATABASE_NAME = 'atf' DATABASE_USER = 'reuven' DATABASE_PASSWORD = '' DATABASE_HOST = '' DATABASE_PORT = '5433' It's also important to check that the application is defined in INSTALLED_APPS, a tuple of strings. On my system, INSTALLED_APPS looks like this: INSTALLED_APPS = ( 'django.contrib.auth', 'django.contrib.contenttypes', 'django.contrib.sessions', 'django.contrib.sites', 'django.contrib.admin', 'mysite.blog' ) Notice the clear namespace distinction between my application (mysite.blog) and the applications that are included with Django (django.contrib.*). Before we turn our Python code into SQL, we first should check to make sure it passes some basic sanity and validation checks. To do that, we go to our site's home directory, and type: python manage.py validate If all goes well, Django will report that there aren't any errors. Now that our model has been validated, we can use it to create SQL. The easiest way to do this is with the sqlall command to manage.py: python manage.py sqlall blog This produces the SQL output for our database driver (PostgreSQL, in this case). For example, this is the output that I see on my system: BEGIN; CREATE TABLE "blog_posting" ( "id" serial NOT NULL PRIMARY KEY, "title" varchar(30) NOT NULL, "body" text NOT NULL, "publication_date" timestamp with time zone NOT NULL ); COMMIT; To their credit, the Django developers wrap the CREATE TABLE statement between BEGIN and COMMIT, ensuring that the table creation will take place in a transaction and will be rolled back if there is a problem. This isn't an issue when creating only one table, but if we have several models, it's always best to leave the database in a consistent state. One way for us to use the output from sqlall to create tables is to copy it from the terminal window and then paste it, either into a file or into the psql client program. But, Django provides the syncdb utility to do this for us: python manage.py syncdb The output from this reassures us that all is well: Creating table blog_posting Loading 'initial_data' fixtures... No fixtures found. And, sure enough, now we can see that our table has been added: atf=# \d blog_posting id | integer | not null default nextval('blog_posting_id_seq'::regclass) title | character varying(30) | not null body | text | not null publication_date | timestamp with time zone | not null Indexes: "blog_posting_pkey" PRIMARY KEY, btree (id) Voilà! We now have a model that we can access via Python methods, but that exists in our relational database. Now that our data model is in place, let's see how we can work with it. Given that our model is brand new, and that there is no data currently stored in it, let's begin by adding some data to it. In last month's column, we saw how each URL request in Django results in the invocation of a method. Which method is invoked depends on the settings of urls.py, a site-wide configuration file that tells Django what application and method should be associated with what URL. One way to add data to our blog database, and to get some practice working with the various components of Django, is to do so via a view and template. Normally, I would demonstrate how to do this with an HTML form, but for space reasons, I use a simpler (and more contrived) way, inserting dummy data into the database. The first step is to add a new line to the definition of the urlpatterns variable, defined in urls.py: Now, we can go to the URL /blog/add_dummy_data, and Django will invoke the blog.add_dummy_data method. The beginning of this method is quite simple, namely: The name of the method is obvious from the configuration file. The number of parameters is determined by the number of parenthesized groups in urlpatterns. Now what do we do? If we were dealing with raw SQL, I would suggest the following: INSERT INTO Posting (title, body, posted_at) VALUES ('Dummy 1 headline', 'This is my first blog post', NOW - interval '1 hour'); INSERT INTO Posting (title, body, posted_at) VALUES ('Dummy 2 headline', 'This is my second blog post', NOW()); These will insert two rows into the Posting file: the first with a timestamp from one hour ago and the second with a current timestamp. But, we don't want to use SQL. We want to use Python, creating objects that automatically map to these INSERT statements. So, it makes sense that all we have to do is create new instances of the Posting object, passing it appropriate parameters. And, sure enough, we can do that: p = Posting(title='Dummy 1 headline', body='This is my first blog post', posted_at=(datetime.now() - timedelta(0, 0, 0, 0, 1))) p.save() p = Posting(title='Dummy 2 headline', body='This is my second blog post', posted_at=datetime.now()) p.save() If you are an experienced Python programmer, the above code shouldn't be very surprising at all. We simply are creating two new instances of Posting, passing arguments that will set the object's attributes. Then, we invoke the save() method on each posting, which presumably saves the posting to disk. Finally, we finish our method with: return HttpResponse("Created blog posts.") With the method (shown in Listing 1) defined, start up the server: python manage.py runserver 126.96.36.199:8000 Then, point the Web browser to the URL defined in urls.py, and get the message: Created blog posts. Next, check the database, just to be sure: atf=# \x Expanded display is on. atf=# select * from blog_posting; -[ RECORD 1 ]----+------------------------------ id | 1 title | Dummy 1 headline body | This is my first blog post publication_date | 2007-06-15 16:13:34.609396-05 -[ RECORD 2 ]----+------------------------------ id | 2 title | Dummy 2 headline body | This is my second blog post publication_date | 2007-06-15 16:14:34.675235-05 As you can see, we were able to create these new objects successfully and store them in the database. Listing 1. models.py for Creating New Dummy Posts from django.template import Context, loader from django.http import HttpResponse from blog.models import Posting from datetime import * def add_dummy_data(request): p = Posting(title='Dummy 1 headline', body='This is my first blog post', publication_date=(datetime.now() - timedelta(0, 0, 0, 0,1))) p.save() p = Posting(title='Dummy 2 headline', body='This is my second blog post', publication_date=datetime.now()) p.save() return HttpResponse("Created blog posts.") Now that we've created these objects, let's see if we can retrieve and display them—a pretty typical thing to do if you write applications in Django. Because the most common thing you might want to do with a blog is display all of the postings in reverse chronological order, we write our index method to do that. If you still don't have an entry in urls.py for index, make sure there is a line that looks like the following in the definition of urlpatterns: Now, we open up views.py to create our index method. The first task in that method is to get all the postings. Django makes that trivially easy to do: postings = Posting.objects.all() This retrieves all the instances of Posting (which happen to be stored as rows in our database) and assigns them to the variable postings. This variable isn't a list, but an instance of a QuerySet object. We most likely will want to iterate over the QuerySet, but we can perform other operations on it, such as reordering it or retrieving selected elements. We also can select particular items from the database. This is done with two methods: one called filter (which returns objects that match a restrictive function) and one called except (which does the opposite, returning objects that are false for a function). Both filter and except take a large number of parameters, built up dynamically by joining column names with various functions. The column name and function name are joined with a double underscore (__). For example, we can get only those postings from this year: this_year_postings = Posting.objects.filter( publication_date__gte=datetime(2007, 1, 1)) Sure enough, this returns both of our postings. Because filter and except return QuerySet objects, we can chain them together, creating just the query we want in Python code. But, what if we want only the most recent posting? If you're thinking there will be a “limit” feature, you've been working at the SQL level (or in Rails) for too long. Because QuerySets use lazy evaluation, you simply can say: this_year_postings = Posting.objects.filter( publication_date__gte=datetime(2007, 1, 1)) We similarly can order our objects by using the order_by method on them, which can be chained along with filter and exclude: latest_posting = Posting.objects.filter( publication_date__gte=datetime(2007, 1, 1)).order_by('-publication_date') Notice that we put a minus sign (-) before the word publication_date. This tells Django we want to order the results in reverse. Django has a wealth of such methods, giving both a great deal of flexibility in constructing your queries and a rich Python API that allows you to ignore the low-level SQL calls almost entirely. Finally, we can get information out of our object as we would retrieve it from any Python object: output += "<h1>%s</h1>\n" % posting.title output += "<h2>%s</h2>\n" % posting.publication_date.isoformat() output += "<p>%s</p>\n\n\n" % posting.body If we put this all together, as shown in Listing 2, we'll have a view method (albeit without a proper Django template) that shows each of the blog postings. Listing 2. views.py, with an Index Method from django.template import Context, loader from django.http import HttpResponse from blog.models import Posting from datetime import * def index(request): postings = Posting.objects.all().order_by("-publication_date") output = "" for posting in postings: output += "<h1>%s</h1>\n" % posting.title output += "<h2>%s</h2>\n" % posting.publication_date.isoformat() output += "<p>%s</p>\n\n\n" % posting.body return HttpResponse(output) You can try all of these database queries for yourself using Django's shell: python manage.py shell Using the Django shell, as opposed to the straight interactive Python interface, ensures that Django-related classes and paths are preloaded, making it possible to query and modify the database from within Python interactively. This is a good way to experiment with new code that you are thinking of adding to a view method, without having to place it in a file. Django provides a high-level interface for the definition of database models using Python, rather than SQL. This high-level API permeates the framework, making it possible to work exclusively in Python. Moreover, the API includes many convenience functions and data types that make it relatively natural to work in this way. Creating database-backed Web applications with Django is dramatically easier and better than with most frameworks I've used, although it is similar in style to Ruby on Rails. Whether you should use Django or Rails is a matter of personal taste and also depends on what others in your organization are using, but there's no doubt that if you're a Python Web/database hacker, Django is worth a very serious look. Reuven M. Lerner, a longtime Web/database consultant, is a PhD candidate in Learning Sciences at Northwestern University in Evanston, Illinois. He currently lives with his wife and three children in Skokie, Illinois. You can read his Weblog at altneuland.lerner.co.il.
<urn:uuid:c173fe1e-4be8-4727-b2b8-9b07d3ebb65d>
CC-MAIN-2019-22
https://www.linuxjournal.com/article/9778
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256797.20/warc/CC-MAIN-20190522103253-20190522125253-00426.warc.gz
en
0.878725
3,950
3.125
3
Trees In A Pod Braided reforestation pods are just one of numerous engineered textiles developed for specialized applications by Atkins & Pearce's product development staff. Janet Bealer Rodie, Associate Editor "Our quest is to find the intersection between textiles and (fill in the blank)," said Jeramie Lawson, director of new product development at A&P's Research & Development Center, where teams comprising chemists, engineers, machine designers, fiber experts and market developers work on diverse projects. "The blank could be agriculture, medical devices, the environment, alternative energy, functional coating, storm protection - the possibilities are endless," Lawson added. Examples include a lightweight hybrid cable system for a wind energy project, a braid used in a desalination filtration system and a high-pressure hose for transferring fluids between submarines linked together in deep ocean waters, among other products. The flexible, loose construction of Atkins & Pearce's reforestation pods allows a seedling's roots to grow through the pod into the soil and the stalk to emerge through the top. One current project involves braided seed pods and seed tapes designed for reforesting barren areas such as fire- or storm-ravaged land, strip mines or logging sites; and also for commercial landscaping projects, Christmas tree farms, erosion control and planting on steep embankments. Offering an alternative to transplanting seedlings grown in plastic containers, these biodegradable cotton textiles contain a protective, nutrient-rich environment in which seeds can germinate and get a good start regardless of the harshness of the external environment. The pod can be as small as a marble or as large as a basketball, while the tape is a sleeve-like structure. To slow the pod's decay - as when the seedling needs additional time to develop in utero, as it were - wax additives can be applied to the cotton as temporary waterproofing. With the growth medium contained within the pod or tape, there is no need to dig a hole to set the seedling. The pod can be dropped onto the land from an airplane or truck bed, saving considerable time and labor. The pod's flexible construction allows the seedling to work its way out of its "cocoon" as well as develop a healthier, denser root system than one confined in a hard container, Lawson said. "After the fabric decays, the medium remains as a mound of highly fertilized soil containing hydroponic crystals to make it more water-absorbent than other soils," he added. Dr. Daniel Karl Struve, professor, horticulture and crop science, College of Food, Agricultural and Environmental Sciences, The Ohio State University, is studying the root formation of red oak seedlings grown in pods. The plants are now 6 to 9 inches tall, but it will be several months before the root systems develop the air-root-pruned lateral roots that help stabilize the trees, as well as absorb ground-surface water and nutrients. "We assume they'll behave like other air-root-pruned systems," Struve said. The improved root development and reduced stress on the young trees are expected to promote increased survival rates over traditional reforestation methods. For more information about Atkins & Pearce's research and development capabilities, contact Jeramie Lawson (859) 512-2795; email@example.com.
<urn:uuid:7fdf7866-87fa-482d-a295-0e69bd506cef>
CC-MAIN-2015-35
http://www.textileworld.com/Issues/2008/July-August/Quality_Fabric_Of_The_Month/Trees_In_A_Pod
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645311026.75/warc/CC-MAIN-20150827031511-00031-ip-10-171-96-226.ec2.internal.warc.gz
en
0.936216
701
3.125
3
What is Glutathione (GSH)? Glutathione is one of the body’s most important and potent antioxidants. It has acclaimed the label of “The mother of all antioxidants!”. Antioxidants are substances that reduce oxidative stress by combating free radicals in the body. Thankfully, our bodies are able to produce this amazing substance all by itself… however, the following factors destroys our GSH levels: 1. Toxins from poor diet including GMO foods 2. Artificial sweeteners 3. Chronic disease & Infections 4. Constant stress 7. Medications and antibiotics overuse 8. Trauma & injuries If your GSH levels drops too low, this leaves you susceptible to unrestrained cell disintegration from oxidative stress, free radicals, infections and cancer. Your liver then gets overloaded and damaged, making it unable to do its job of detoxification. If any of these factors are present in your life, you might benefit from an increase in your Glutathione (GSH) levels! Ways to increase your Glutathione naturally: ** As always, diet comes first! ** 1. Include Milk Thistle in your diet – The active ingredient in Milk Thistle is silymarin. This may cause an increase in Glutathione levels. 2. Whey protein – Great source of cysteine and the amino acid building blocks for Glutathione synthesis (must be bio-active and made from non-denatured proteins) 3. Consume sulphur rich foods – Garlic, onions, broccoli, kale, cauliflower, radish, turnip, collards, cabbage, brussels sprouts, watercress, mustard greens, beef, fish, poultry. 4. NAC (N-acetyl cysteine) – A very effective asthma remedy which helps to decrease the severity and frequency of wheezing and respiratory attacks by boosting Glutathione and thinning bronchial mucous. NAC is a precursor to Glutathione. 5. Methylation Nutrients (Vitamins B6, B9, B12 and biotin) – Top folate foods include: Chickpeas, liver, pinto beans, lentils, spinach, asparagus, avocado, beets, black eyed peas, broccoli. 6. Add selenium rich foods to your diet – Selenium is a cofactor for the production of glutathione. Fish, beef, chicken, organ meats, cottage cheese, brown rice, eggs, spinach and brazil nuts have high levels of selenium. 7. Increase your Vitamin C intake – Vit C works as an antioxidant to protect cells from oxidative damage. Vit C attacks the free radicals first, thereby sparing glutathione. Vit C also assist to reprocess glutathione by converting oxidized glutathione back to its active form. Foods high in Vitamin C include: Oranges, red peppers, kale, brussels sprouts, broccoli, strawberries, grapefruit, guava, kiwi, green peppers. – Boost immune system, improve detoxification and enhance your body’s own antioxidant defenses. 9. Eat foods naturally rich in Glutathione – Spinach, avocados, asparagus, okra, however dietary Glutathione is not fully absorbed by the body. This may still help decrease oxidative stress in the body. 10. Try turmeric extract – Curcumin, an important ingredient of turmeric, may increase Glutathione levels. You however need more than just using the spice in your food. 11. Get enough sleep – Chronic lack of sleeps may case a decrease in your body’s Glutathione levels. Getting regular good quality sleep can assist to increase and maintain your Glutathione levels. 12. Take Glutathione supporting supplements
<urn:uuid:c519912f-9fdd-41e7-8802-64a874ba0441>
CC-MAIN-2019-39
https://www.ii-health.co.za/boost-your-glutathione-gsh-levels-naturally/
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573121.4/warc/CC-MAIN-20190917203354-20190917225354-00505.warc.gz
en
0.858554
820
2.71875
3
and Civil Rights Movement in the U.S. |Black Liberation Movement Supported ||Vietnamese Liberation Movement Supported the Vietnamese have won their Independence in 1975 without the Civil Rights Movement in the U.S.? a Black President even be possible now if not for the Vietnamese War of movement propelled Anti-War movement which pressured govt to end the ||U.S. govt claims to be defender of Freedom & Democracy in Vietnam required that they not ignore civil rights struggle - it was embarrassing to them. U.S. Govt was worried about International Image. |Black militants in the military played leading role in G.I. Resistance Black soldiers refusing to fight |U.S. gov 't need Black soldiers to fight the war and so had to consider demands. |Rebellion in the city, revolution in the air meant U.S. govt need troops to control the people at home. Put more pressure on the military. ||Imperialist war radicalized A 1970 survey showed that 30.6 percent of black enlisted men in the armed forces planned "to join a militant Black group like the Panthers" when they returned home. |Civils rights movement et al brought international dicredit to the U.S. on another front. ||While U.S. govt makes concessions on racism at home it exports racism & racists to SEA. Example: Many Klansman in Vietnam - Southern Racists who were finding their more physical and violent practises curtailed in the U.S. had the option of taking it out on gooks and niggers in SEA. |The Power of the People is greater than the Man's Technology! |No Matter how Formidable the Enemy, People's Struggles can lead to Victory 1921 Nguyen Ai Quoc [Ho Chi Minh] wrote in Communist Review: "When hundreds of millions of ill-treated and oppressed Asians stand up to liberate themselves from the odious exploitation of greedy colonialists, they will form a gigantic force capable of helping their brothers in the West secure complere liberation by destroying one of the conditions for the exirence of capitalism, namely imperialism." |1945 9-2 The Communist dominated Viet Minh Independence League seizes power. Ho Chi Minh establishes the Government of the Democratic Republic of Vietnam (GRDV) in Hanoi. |1945 9-26 Lt. A. Peter Dewey became the first American soldier to die in Vietnam. Apparently mistaken for a Frenchman, Dewey was gunned down by Vietminh troops while driving a jeep to the airport. The son of a former Illinois congressman, he had been the head of the American |1945 First protests against U.S. involvement in Vietnam take place in 1945, when United States Merchant sailors condemn the U.S. government for the use of U.S. merchant ships to transport French troops whose express purpose is to "subjugate the native population" of Vietnam. |1951 5-2 Iran nationalized the Anglo-Iranian Oil Company| |1953 8-19 Iranian |1953 - 1958 "Operation Wetback", the U.S. Immigration Service arrests and deports more than 3.8 million Latin Americans. Many U.S. citizens are deported unfairly, including political activist Luisa Moreno and other community leaders.| |1954 Iranian Consortium Agreement of 1954, for the first time, United States oil companies shared in the control of Iranian oil, with the U.S. and UK evenly splitting 80% and the remainder divided between French and Dutch interests| |1954 5-7 Dien Bien Phu falls to Viet Minh |1955 5-10 South Vietnam formally requests U.S. Instructors for armed forces.| |1954 5-17 Brown v. Board of Education decision handed down| |1954 5-24 the U.S Navy created a sea blockade on Guatemala called operation HARDROCK BAKE| |1955 7-20 South Vietnam cancels Geneva Accord elections| |1954 10-24 Eisenhower advises Diem that the U.S, will provide assistance directly to South Vietnam, instead of channeling it though French authorities. |1955 12-1 Rosa Parks won't give up seat Montgomery Bus Boycott starts. |1956 Feb. The pejorative “Viet Cong,” a contraction for "Vietnamese Communists" is create by American psyops as a substitute for "Viet Minh" and first promoted through Saigon newspapers. according to Everett Bumgardner "A Bright Shining Lie" p.189 |1956 2-18 While visiting Peking, Sihanouk renounces SEATO protection for his nation. |1956 12-20 Montgomery Bus Boycott ends |1957 Eisenhower Sends Federal Troops to Little Rock, AK| |1959 7-8 Major Dale R. Buis and Master Sargeant Chester M. Ovnand become the first Americans to die in the Vietnam War during the guerilla strike at Bienhoa |1959 5-6 Diem issues repressive Law 10/59 |1960 Eisenhower authorizes covert actions to get rid of Castro. Among other things, the CIA tries assassinating him with exploding cigars and poisoned milkshakes. Other covert actions against Cuba include burning sugar fields, blowing up boats in Cuban harbors, and sabotaging industrial equipment.| |1960 Early SDS formed |1960 2-1 4 black college students from North Carolina Agricultural and Technical College sat down at a segregated Woolworth's lunch counter in Greensboro, North Carolina and refused to leave, they are then allowed to stay at the counter, but are refused service. |1960 3-15 The sit-ins spread to 15 cities in 5 southern states. |1960 4-16,17 SNCC founded is founded at Shaw University| |1960 5-6 Civil Rights Act of |1960 Dec. NLF is formed |1961 4-25 the Unites States invades Cuba at the Bay of Pigs and the mission is a failure. |1961 5-4 the Congress of Racial Equality (CORE) begins sending student volunteers on bus trips to test the implementation of new laws prohibiting segregation in interstate travel facilities. One of the first two groups of "freedom riders," encounters its first problem two weeks later, when a mob in Alabama sets the riders' bus on fire. The program continues and by the end of the summer 1,000 volunteers, black and white, have participated. The Freedom Riders force integration of Interstate and Travel facilities in the South. |1961 Joseph Heller's Catch 22 is |1961 9-1,4 Viet Cong carry out series of attacks in Kontum province, SV |1961 9-18 A viet Cong battalion seizes the provincial capital of Phouc Vinh |1961 11-1 Fifty thousand women in sixty cities, mobilized by Women Strike for Peace, protest above ground testing of nuclear bombs and tainted milk. |1961 11-16 Kennedy increases military aid to South Vietnam but no combat troops |1961 10-6 President Kennedy advises Americans to build fallout shelters. |1962 Jan People's Revolutionary Party in SV "it was explicitly the "Marxist-Leninist Party of South Vietnam," and it purported to be the "vanguard of the NLF, the paramount member." In 1962, it had some 35,000 members." pp |1962 1-12 Operation Chopper: America's first combat missions against the Vietcong. |1962 6-15 The Port Huron Statement is adopted by SDS |1962 1-7 U.S. Military Employs Agent Orange, Operation |1962 2-7 4,000 U.S. troops in SV with addition of 2 Army aviation units |1962 Sept. Silent Spring |1962 9-30 James Meredith Enrolls at "Ole Miss"| |1963 1-2 Battle of Ap Bac| |1963 2-25 Betty Friedan's The Feminine Mystique is published |1963 4-16 Martin Luther King is arrested and jailed during anti-segregation protests in Birmingham, Ala.; he writes his seminal "Letter from Birmingham Jail," arguing that individuals have the moral duty to disobey unjust laws.| |1963 5-8 Riots in Hue when SV gov't troops try to prevent celebration of Buddha's birthday |1963 May the first coordinated Vietnam War protests occur in London and Australia| |1963 May During civil rights protests in Birmingham, Ala., Commissioner of Public Safety Eugene "Bull" Connor uses fire hoses and police dogs on black demonstrators.| |1963 6-11 President Kennedy proposes the Civil Rights Bill.| |1963 6-11 Thích Đức First of seven Buddhist monks commits suicide |1963 6-12 (Jackson, Miss.) Mississippi's NAACP field secretary, 37-year-old Medgar Evers, is murdered outside his home.| |1963 7-26,28 Newport Folk Festival, includes popular folk singers Bob Dylan, Joan Baez, Phil Ochs and Pete Seeger.| |1963 8-28 About 200,000 people join the The March for Jobs and Freedom. Congregating at the Lincoln Memorial, participants listen as Martin Luther King delivers his famous "I Have a Dream" speech.| |1963 9-15 (Birmingham, Ala.) Four young girls (Denise McNair, Cynthia Wesley, Carole Robertson, and Addie Mae Collins) attending Sunday school are killed when a bomb explodes at the Sixteenth Street Baptist Church, a popular location for civil rights meetings. Riots erupt in Birmingham, leading to the deaths of two more black youths.| |1963 11-2 Diem overthrown and |1963 11-15 Following a prediction by Defense Secretary MCNamara that the U.S. military role will end by. 1965, the U.S. gov't announces that 1,00 of the 15,000 American advisers in South Vietnam will be withdrawth early in December. |1963 11-22 President Kennedy's assassination |1963 11-24 President Johnson escalates American's military involvement in the Vietnam War, declares he will not "lose Vietnam" during a meeting with Ambassador Lodge in Washington.| |1963 11-29 The Beatles release "I Want to Hold Your Hand,"| |1963 12-31 16,300 American military advisors in South Vietnam.| |1964 1-8 President Johnson declares a "War on Poverty" in the State of the Union address thus initiating plans for his Great Society. |1964 1-23 The 24th Amendment abolishes the poll tax, which originally had been instituted in 11 southern states after Reconstruction to make it difficult for poor blacks to vote.| |1964 2-3 In protests against alleged de-facto school racial segregation, black and Puerto Rican groups in New York City boycott public school. |1964 3-8 Macolm X breaks with Nation of Islam announces he is forming a black nationalist party.| |1964 4-19 Military coup in Laos.| |1964 5-2 In the first major student demonstration against the war hundreds of students march through Times Square in New York City, while another 700 march in San Francisco. Smaller numbers also protest in Boston; Seattle; and |1964 Summer The Council of Federated Organizations (COFO), a network of civil rights groups that includes CORE and SNCC, launches a massive effort to register black voters during what becomes known as the Freedom Summer.| |1964 6-12 Nelson Mandela sentenced to life in prison. |1964 6-21 James E. Cheney, 21; Andrew Goodman, 21; and Michael Schwerner, 24 go missing. |1964 7-2 Civil Rights Act of 1964 |1964 7-23 There is a Race riot in Harlem, NY |1964 7-30 On this night, South Vietnamese commandos attack two small North Vietnamese islands in the Gulf of Tonkin. The U.S. destroyer Maddox, an electronic spy ship, is 123 miles south with orders to electronically simulate an air attack to draw North Vietnamese boats away from the commandos. |1964 8-4 Gulf of Tonkin Incident |1964 8-4 Three civil rights workers ( Michael Schwerner,Andrew Goodman and James Chaney ) were found buried |1964 8-24,27 Democratic Convention, Atlantic City Mississippi Freedom Democratic Party| |1964 8-28 There are Race riots in Philadelphia| |1964 9-14 Free Speech Movement protests begin at Berkeley. |1964 10-14 Announced that Martin Luther King Jr. has won the the Nobel Peace Prize. |1964 11-1 Two days before the U.S. presidential election, Vietcong mortars shell Bien Hoa Air Base near Saigon. Four Americans are killed, 76 wounded. Five B-57 bombers are destroyed, and 15 are damaged. |1964 12-20 Military coup - South |1964 12-3 Police arrest 800 students at Berkeley for occupying the administration building. |1965 1,1-2,7 Vietcong forces mount a series of attacks across South Vietnam. They briefly seize control of Binh Gia, a village only 40 miles from Saigon. Two hundred South Vietnamese troops are killed near Binh Gia, along with five American advisors.| |1965 1-2 The Selma Voting Rights Movement officially started on January 2, 1965, when Dr. King addressed a mass meeting in Brown Chapel in defiance of the anti-meeting |1965 1-18 Malcolm X denounces US involvement in Vietnam| |1965 1-27 Khanh seizes full control of South Vietnamese government |1965 1-29 one of the first violent acts of protest was the Edmonton aircraft bombing, where planes being retrofitted in Canada were destroyed| |1965 2-7 VC attack US base at Pleiku - A U.S. helicopter base and advisory compound in the central highlands of South Vietnam is attacked by NLF commandos. Nine Americans are killed and more than 70 are wounded. President Johnson immediately orders U.S. Navy fighter-bombers to attack military targets just inside |1965 2-8 U.S. starts bombing North Vietnam.| |1965 2-10 A Vietcong-placed bomb explodes in a hotel in Qui Nonh, killing 23 American servicemen. |1965 2-13 President Johnson authorizes Operation Rolling Thunder| |1965 2-18 an Alabama State Trooper, corporal James Bonard Fowler, shot Jimmie Lee Jackson as he tried to protect his mother and grandfather in a café to which they had fled while being attacked by troopers during a nighttime civil rights demonstration in Marion,| |1965 2-18 Sect. of Defense Robert McNamara calls for nationwide network of bomb shelters.| |1965 2-18 Khanh ousted in a military coup, he is replaced by a military/civilian government led by Dr. Phan Huy Quat. |1965 2-21 Malcolm X is assassinated at the Audubon Ballroom| |1965 2-25 Bombing of North |1965 3-2 Operation Rolling |1965 3-3 Owsley starts LSD factory, making large quantities of acid available for the first time. |1965 3-6 First American soldier officially sets foot on Vietnam battlefields, First U.S. combat troops begin fighting in South Vietnam.| |1965 3-7 (Selma, Ala.) Blacks begin a march to Montgomery in support of voting rights but are stopped at the Pettus Bridge by a police blockade. Fifty marchers are hospitalized after police use tear gas, whips, and clubs against them. The incident is dubbed "Bloody Sunday" by the media. |1965 3-7,8 3,500 The first U.S. combat troops arrive in Vietnam as 3500 Marines land at China Beach to defend the American air base at Da Nang.| |1965 3-9 Johnson approves the use of napalm.| |1965 3-13 Alice Herz, an 82-year-old survivor of Nazi terror, set herself on fire in Detroit shortly after President Johnson announced major troop increases and the bombing of North Vietnam. |1965 3-16 Police break-up a Civil Rights demonstration of 600 in Montgomery, Alabama |1965 3-17 1,600 people demonstrate at Montgomery, Alabama courthouse |1965 3-21 Martin Luther King Jr. leads march from Selma to Montgomery, Alabama joined by 25,000 marchers.| |1965 3-24, the anti-war organization Students for a Democratic Society attended the first teach-in, organized by some teachers, against the war at the University of Michigan, attended by 2,500 participants. This was to be repeated at 35 campuses across the country.| |1965 3-25 Civil rights worker shot and killed by KKK in Alabama| |1965 3-28 Martin Luther King calls for boycott of Alabama on TV| |1965 4-3 An American campaign against North Vietnam's transport system begins. In a month-long offensive, Navy and Air Force planes hit bridges, road and rail junctions, truck parks and supply depots. |1965 4-7 The U.S. offers North Vietnam economic aid in exchange for peace, but the offer is summarily rejected. Two weeks later, President Johnson raises America's combat strength in Vietnam to more than 60,000 troops. Allied forces from Korea and Australia are added as a sign of international support. |1965 4-17 the SDS and SNCC led the first of several anti-war marches in Washington DC, with about |1965 4-28 United Dominican Republic with 42,000 troops. Occupation lasts to Sept. 1966, 1,500 civilians and 500 combatants killed on Dominican side. General Robert York led, from Alabama [Bright Shining Lie] and was active in Vietnam. |1965 5-3 The first U.S. Army combat troops, 3500 men of the 173rd Airborne Brigade, arrive in Vietnam.| |1965 5-9,10 Bob Dylan performs at the Royal Albert Hall |1965 5-11 2500 Vietcong troops attack Song Be, a South Vietnamese provincial capital. After two days of fierce battles in and around the town, the Vietcong withdraw.| |1965 5-12 The California State Senate's Byrne Committee releases report calling the Berkeley campus a haven for communists. |1965 5-22,23 1st draft card burnings at UCB at demo organized by the Vietnam Day Committee, where a coffin was marched to the local Draft board office, a teach-in was attended by 30,000, and president Lyndon Johnson was burned in effigy.| |1965 May - First anti Vietnam war demonstration in London outside the U.S. embassy| |1965 6-10 At Dong Xai, a South Vietnamese Army district headquarters and American Special Forces camp is overrun by a full Vietcong regiment. U.S. air attacks eventually drive the Vietcong away. |1965 6-18 Ky takes power in South Vietnam as the new prime minister with Thieu functioning as official chief of state. |1965 6-18 General William Westmoreland launches the first purely offensive operation by American ground forces in Vietnam, sweeping into NLF territory just northwest of |1965 July The Mississippi Freedom Democratic Party circulates a leaflet entitled "The War on Vietnam: A McComb, Mississippi, Protest." |1965 7-8 Chicago school |1965 7-14 US spacecraft Mariner 4 flies by Mars, becoming the first spacecraft to return images from the red planet |1965 7-25 Bob Dylan is booed at the Newport Folk Festival for playing electric set with Paul Butterfield Blues Band.| |1965 7-28 President Johnson announces he will send 44 combat battalions to Vietnam. Monthly draft calls are doubled to 35,000. |1965 7-30 LBJ signs Medicare bill| |1965 8-6 Aniwar protestors attempt to stop troop trains on the Santa Fe railroad tracks in West Berkeley and Emeryville by standing on the tracks. |1965 8-10 Voting Rights Act |1965 8-11,17 Watts Rebellion |1965 8-13 First issue of The Berkeley Barb published |1965 8-17 Operation Starlite. In this, the first major battle of the Vietnam War, the United States scores a resounding victory. Ground forces, artillery from Chu Lai, ships and air support combine to kill nearly 700 Vietcong soldiers. U.S. forces sustain 45 dead and more than 200 wounded. |1965 8-31 President Johnson signs a law criminalizing draft card burning.| |1965 9-5 San Francisco writer Michael Fallon applies the term "hippie" to the San Francisco counterculture in an article about the Blue Unicorn coffeehouse where LEMAR (Legalize Marijuana) & the Sexual Freedom League meet, and |1965 9-16 Cesar Chavez and Dolores Huerta found the United Farm Workers association, in Delano, Calif. Huerta becomes the first woman to lead such a union. Under their leadership, the UFW joins a strike started by Filipino grape pickers in Delano. The Grape Boycott becomes one of the most significant social justice movements for farm workers in the United States.| |1965 9-24 President Johnson issues Executive Order 11246, which enforces affirmative action for the |1965 10-3 Immigration Act of 1965, also known as the Hart-Celler Act, in actuality fundamentally reshaped American Immigration for the remainder of the twentieth century| |1965 10-16 100,000 anti-war protesters nationwide in 80 cities. New York, police make the 1st arrest under a new Federal draft card-burning law.| |1965 10-22 A demonstration against the war in Sydney, Australian results in 65 arrests. |1965 Nov. Anti-war demonstrations are widespread in the U.S. |1965 11-2 Quaker Norman Morrison set himself on fire and died outside Secretary of Defense Robert McNamara’s Pentagon office, a scene McNamara witnessed |1965 11- 9 Catholic Worker Roger LaPorte immolated himself opposite the United Nations building as an anti-war protest |1965 11-14,18 Heavy Fighting at Ia |1965 11-17 Elements of the 66th North Vietnamese Regiment moving east toward Plei Mei encounter and ambush an American battalion. Neither reinforcements nor effective firepower can be brought in. When fighting ends that night, 60 percent of the Americans were casualties, and almost one of every three soldiers in the battalion had been killed. |1965 11-27 some 40,000 protesters led by several student activist groups surrounded the White House, calling for an end to the war, then marched to the Washington Monument. On that same day, President Johnson announced a significant escalation of US involvement in Indochina, from 120,000 to 400,000 troops.| |1965 The Autobiography of Malcolm X and Ralph Ellison's Invisible Man are published. |1965 12-10 The Warlocks change their name to The Grateful Dead| 12-31 181,00 U.S. Troops |1966 1-2 Strike of public transportation workers in New York City |1966 1-8 U.S. forces launch Operation Crimp. Deploying nearly 8,000 troops, it is the largest American operation of the war. The goal of the campaign is to capture the Vietcong's headquarters for the Saigon area, which is believed to be located in the district of Chu Chi. Though the area in Chu Chi is razed and repeatedly patrolled, American forces fail to locate any significant Vietcong base. |1966 1-14 March on Atlanta to protest ouster of Julian Bond| |1966 1-28 US military adopts the tactic of Search and Destroy as the standard operating procedure in |1966 Feb. Master Sgt. Donald Duncan publishes "The Whole Thing was a Lie" a stinging rebuke of US involvement in Vietnam in Ramparts. |1966 Feb. The Senate Foreign Relations Committee, chaired by Sen. J. William Fulbright, holds televised hearings examining America's policy in Vietnam. |1966 Feb. U.S. forces launch four search and destroy missions in the month of February. Although there are two minor clashes with Vietcong regiments, there are no major |1966 2-5 The White House rebuffs a group of veterans who attempted to return their medals and honorable discharge papers as a protest against the Vietnam war. |1966 2-16. Veterans Stage Anti-War Rally a group of about 100 veterans attempted to return their decorations to the White House in protest of the war, but were turned back.| | 1966 2-19 Jefferson Airplane and Big Brother and the Holding Company with Janis Joplin perform at the Fillmore |1966 3-3 GI Bill grants veterans rights to education, housing, health and jobs| |1966 3-5 The 272nd Regiment of the Vietcong 9th Division attack a battalion of the American 3rd Brigade at Lo Ke. U.S. air support succeeds in bombing the attackers into retreat. Two days later, the American 1st Brigade and a battalion of the 173rd Airborne are attacked by a Vietcong regiment, which is driven away by artillery fire. |1966 3-17 Cesar Chavez embarked on a peregrinación, Spanish for pilgrimage, which was a three hundred mile march from Delano California to the state’s capital of |1966 3-26 Anti-Vietnam war protests in NY bring out 25,000 on 5th Ave. Other protests in 7 US cities and 7 foreign cities. Second International Day of Protest Against the Vietnam War. |1966 4-10 SDS National Council decides to distribute a "National Vietnam Exam" to all students taking the first Selective Service deferment test on May 14. |1966 4-12 B-52's strike NV for first time near Mu Gia Pass| |1966 4-12 NY Stock Exchange hit with anti-war leaflets |1966 4-30 30 Mississippi blacks build tent city under President Johnson's window to protest housing conditions in their state |1966 5-14 South Vietnam in a state of virtual civil war as military units loyal to Prime Minister Ky battle renegade South Vietnamese Buddhist troops in DaNang and Hue. |1966 5-15 another large demonstration, with 10,000 picketers calling for an end to the war, took place outside the White House and the Washington Monument. |1966 Late May - June, In late May 1966, the North Vietnamese 324B Division crosses the Demilitarized Zone (DMZ) and encounters a Marine battalion. The NVA holds their ground and the largest battle of the war to date breaks out near Dong Ha. Most of the 3rd Marine Division, some 5,000 men in five battalions, heads north. In Operation Hastings, the Marines backed by South Vietnamese Army troops, the heavy guns of U.S. warships and their artillery and air power drive the NVA back over the DMZ in three weeks. |1966 6-6 James Meredith is shot while trying to march across Mississippi |1966 6-19 U.S. Senate Internal Security Subcommittee charges that communists have played a key role in anti-war demonstrations . |1966 6-23 RVN sieze Buddhist HQ in Siagon, bring an end a wave of protests than had begun in March with agitation against military rule. |1966 C.O.R.E. Cites "Burden On Minorities and Poor" in Vietnam |1966 6-28,30 National Organization of Women |1966 6-29 US bomb oil depots around Hanoi and Haiphong.| |1966 6-30 On Route 13, which links Vietnam to the Cambodian border, American forces are brutally assaulted by the Vietcong. Only American air and artillery support prevents a complete disaster. |1966 6-30 Fort Hood Three refuse to go to Vietnam Pfc James Johnson, Pvt Dennis Mora and Pvt David Samas| |1966 July Heavy fighting near Con Thien kills nearly 1,300 North Vietnamese troops. |1966 7-4 The Congress of Racial Equality calls for withdrawal of US troops from Vietnam and an end to |1966 7-18 Race Riot - Cleveland| |1966 8-7 Race Riot - |1966 8-18 Quotations of Chairman Mao also called the the little red book is published in China. The Red Guard begins to wipe out western influence in China as part of the cultural revolution that is raging there. |1966 8-18 The Battle of Long Tan involing Austrlian forces |1966 9-7,9 Fort Hood 3 court martialed and found guilty of violating Article 134 of the UCMJ. Johnson and Mora sentenced to three years at Hard Labor, Johnson to |1966 9-14 In a new mission code-named Operation Attleboro, the U.S. 196th Brigade and 22,000 South Vietnamese troops begin aggressive search and destroy sweeps through Tay Ninh Province. |1966 Oct. The Vietcong's 9th Division, having recovered from battles from the previous July, prepares for a new offensive. Losses in men and equipment have been replaced by supplies and reinforcements sent down the Ho Chi Minh trail from North Vietnam. |1966 10-15 Bobby Seale and Huey P. Newton form Black Panther Party for Self-Defense in Oakland |1966 11-5 The Walk for Love and Peace and Freedom in New York City takes place with 10,000 12-31 385,000 U.S. Troops |1967 Jan - May Two North Vietnamese divisions, operating out of the DMZ that separates North and South Vietnam, launch heavy bombardments of American bases south of the DMZ. These bases include Khe Sanh, the Rockpile, Cam Lo, Dong Ha, Con Thien and Gio Linh. |1967 1-8 America forces begin Operation Cedar Falls, which is intended to drive Vietcong forces from the Iron Triangle, a 60 square mile area lying between the Saigon River and Route 13. Nearly 16,000 American troops and 14,000 soldiers of the South Vietnamese Army move into the Iron Triangle, but they encounter no major resistance. Huge quantities of enemy supplies are captured. Over 19 days, 72 Americans are killed, victims mostly of snipers emerging from concealed tunnels and booby traps. Seven hundred and twenty Vietcong are killed. |1967 1-14 20,000-30,000 people staged a "Human Be-In" anti-war event in Golden Gate Park in San |1967 2-8 Christian groups opposed to the war staged a nationwide "Fast for Peace".| |1967 2-late Dow Recruiters Driven From Wisconsin Campus |1967 2-21 In one of the largest air-mobile assaults ever, 240 helicopters sweep over Tay Ninh province, beginning Operation Junction City. The goal of Junction City is to destroy Vietcong bases and the Vietcong military headquarters for South Vietnam, all of which are located in War Zone C, north of Saigon. Some 30,000 U.S. troops take part in the mission, joined by 5,000 men of the South Vietnamese Army. After 72 days, Junction City ends. |1967 3-1 Adam Clayton Powell denied House seat |1967 3-12 A three page anti-war ad appeared in The New York Times bearing the signatures of 6,766 teachers and professors. |1967 3-17 A group of antiwar citizens marched to the Pentagon to protest American involvement in |1967 3-25 Civil rights leader Martin Luther King led a march of 5,000 against the war in Chicago, |1967 3-26 Be-In at Central Park in NY. which 10,000 attend |1967 4-4 M. speech against the war. |1967 4-8,10 Black Rebellion in |1967 4-10Vietnam Week starts. Draft card burnings and anti-draft demonstrations |1967 4-15 400,000 people marched from Central Park to the UN building in New York City to protest the war, where they were addressed by critics of the war such as Benjamin Spock, Martin Luther King, and Jan Barry Crumb, a veteran of the conflict. On the same date 100,000 marched in San Francisco. |1967 4-16 Black Rebellion in |1967 4-19 Stokely Carmichael, a leader of the Student Nonviolent Coordinating Committee (SNCC), coins the phrase "black power" in a speech in Seattle.| |1967 4-24 American attacks on North Vietnam's airfields begin. |1967 4-24 Abbie Hoffman led a small group of protesters against both the war and capitalism who interrupted the New York Stock Exchange, causing chaos by throwing fistfuls of both real and fake dollars down from the gallery. |1967 4-28 Muhammad Ali refuses induction, had announced that he would refuse to serve early in 1966 [video] |1967 May Desperate air battles rage in the skies over Hanoi and Haiphong. America air forces shoot down 26 North Vietnamese jets, decreasing the North's pilot strength by |1967 5-2 British philosopher Bertrand Russell presided over the "Russell Tribunal" in Stockholm, a mock war crimes tribunal |1967 5-18,26 US forces enter the Demilitarized Zone for the first time. |1967 5-20 Flower Power Day in NYC |1967 5-27 Army admits more than 700 GIs have deserted because of their opposition to the Vietnam war| |1967 Late May In the Central Highlands of South Vietnam, Americans intercept North Vietnamese Army units moving in from Cambodia. Nine days of continuous battles leave hundreds of North Vietnamese soldiers dead. |1967 6-1 VVAW is born |1967 6-12 In Loving v. Virginia, the Supreme Court rules that prohibiting interracial marriage is unconstitutional. Sixteen states that still banned interracial marriage at the time are forced to revise their laws.| |1967 6-16 Monterey Pop |1967 6-21 Summer Solstice Party in Golden Gate Park |1967 6-30 The number of US troops in Vietnam reaches 448,400. |1967 July "Summer of Love" in |1967 7-2 Congress passes Selective Service Act reform: ends grad student deferments & puts them in a pool to be drafted in June 68 |1967 7-12,16 Black rebellion in |1967 7-23,30 Black The Detroit Riot of 1967 began when police vice squad officers executed a raid in the early morning hours of July 23, 1967 on an after hours drinking club or "blind pig" in a predominantly black neighborhoods located at Twelfth Street and Clairmount Avenue. They were expecting to round up a few patrons, but instead found 82 people inside holding a party for two returning Vietnam veterans. Urban racial violence did plague over 100 cities in 1967. During the Spring, minor disturbances had occurred in Omaha, Louisville, Cleveland, Chicago, San Francisco, Wichita, Nashville, and Houston. Then in June, Boston and Tampa experienced serious disorders. The most devastating riot since Watts in 1965 occurred, however, in Newark, from June 12 to 17, 1967, an outburst that resulted in 25 deaths, 1,200 persons injured, and over 1,300 arrested. The following month Detroit was the site of the worst urban race riot of the decade, one that left 43 dead, over 2,000 injured and more than 3,800 arrested. Rioting continued around the country, with outbreaks in Phoenix, Washington, D.C. and New Haven, among other cities. According to a report of the Senate Permanent Committee on Investigations released in November 1967, 75 major riots occurred in that year, compared with 21 in 1966; 83 were killed in 1967, compared with 11 in 1966 and 36 in 1965. |1967 7-20,23 Black Power Conference - Newark |1967 7-26 H. Rap Brown arrested for inciting a riot in Maryland. |1967 7-27 Camp Pendleton, California--In the middle of the Detroit rebellion, two Black Marines requested a "captain's mast" meeting with their officers. They demanded to know why "Black men should fight a white man's war" in Vietnam. The brass came down hard. The soldiers were convicted of making "disloyal statements" and "advising, urging, and attempting to cause insubordination, disloyalty, and refusal of duty." One was sentenced to ten years, the other to six.| |1967 summer Neil Armstrong and various other NASA officials began a tour of South America to raise awareness for space travel. According to First Man, a biography of Armstrong's life, during the tour, several college students protested the astronaut, and shouted such phrases as "Murderers get out of Vietnam!" and other anti-Vietnam War messages. |1967 8-28 US representative Tim Lee Carter R-KY stated before congress: "Let us now, while we are yet strong, bring our men home, every man jack of them. The Vietcong fight fiercely and tenaciously because it is their land and we are foreigners intervening in their civil war. If we must fight, let us fight in defense of our homeland and our own hemisphere." |1967 10-8 Ernesto "Che" Guevara was put to death by Bolivian soldiers, trained, equipped and guided by U.S. Green Beret and CIA operatives. |1967 10-20 Stop the Draft Week resulted in major clashes at the Oakland, California induction center, and saw more than a thousand registrants return their draft cards in events across the country. The cards were delivered to the Justice Department on October 20. |1967 10-21 March on Pentagon a large demonstration took place at the Lincoln Memorial in Washington. As many as 100,000 demonstrators attended the event, and at least 30,000 later marched to the Pentagon for another rally and an all night vigil. Some, including Abbie Hoffman and Jerry Rubin, attempted to "exorcise" and "levitate" the building, while others engaged in civil disobedience on the steps of the Pentagon, interrupted by clashes with soldiers and police. In all, 647 arrests were made. When a plot to airdrop 10,000 flowers on the Pentagon was foiled by undercover agents, these flowers ended up being placed in the barrels of MP's rifles, as seen in some famous photographs. Norman Mailer documented the events surrounding the march on the Pentagon in his novel, Armies of the Night.| |1967 Oct. Congressman Thomas P. ("Tip") O'Neill broke publicly with President Johnson and opposed continuation of the Vietnam war. O'Neill supported Senator Eugene McCarthy (D-Minn) for president in 1968| |1967 11-7 General Hershey announces crackdown on deferred college students active in anti-war |1967 11-29 Robert McNamara announces his resignation as Defense Secretary. |1967 11-30 Eugene McCarthy announces he is a candidate for President |1967 Dec. "Stop the Draft" movement organized by 40 antiwar groups, nationwide protests ensue. |1967 12-5 1000 antiwar protesters try to close NYC induction center. 585 arrested including Allen Ginsberg and Dr. Benjamin Spock. 12-31 486,000 U.S. troops |1968 Jan UFO Coffeehouse opens in Columbia, South Carolina |1968 1-18 Youth International Party (YIPPIE) founded. Abbie Hoffman, Jerry Rubin, Paul Krassner, Dick Gregory, & friends pronounce themselves "Yippies" |1968 1-21,4-8 Seige of Khe Sanh. At 5:30 a.m., a shattering barrage of shells, mortars and rockets slam into the Marine base at Khe Sanh. Eighteen Marines are killed instantly, 40 are wounded. The initial attack continues for two days. |1968 Latino high school students in Los Angeles stage citywide walkouts protesting unequal treatment by the school district. Prior to the walkouts, Latino students were routinely punished for speaking Spanish on school property, not allowed to use the bathroom during lunch, and actively discouraged from going to college. Walkout participants are subjected to police brutality and public ridicule; 13 are arrested on charges of disorderly conduct and |1968 1-30,3-15 Tet Offensive: On the Tet holiday, Vietcong units surge into action over the length and breadth of South Vietnam. In more than 100 cities and towns, shock attacks by Vietcong sapper-commandos are followed by wave after wave of supporting troops. |1968 2-1 General Loan publicly executes an NVA prisoner in front of an NBC news crew and an A. P. |1968 2-8 3 Black Students killed by police - Orangeburg, South Carolina |1968 2-8 George Wallace mounts a third-party campaign for President on a law and order platform |1968 2-14 80+ students sitin against Dow Chemical at Wish. U. 4 are charge by university including |1968 2-23 Over 1,300 artillery rounds hit the Marine base at Khe Sanh and its outposts, more than on any previous day of attacks. |1968 2-27 Walter Cronkite declares, on the evening news, that he cannot see the Vietnam war ending as anything but a stalemate. |Battle for Hue| |1968 3-6 While Marines wait for a massive assault, NVA forces retreat into the jungle around Khe Sanh. For the next three weeks, things are relatively quiet around the base. |1968 3-11 Massive search and destroy sweeps are launched against Vietcong remnants around Saigon and other parts of South Vietnam. |1968 3-12 anti-war candidate Eugene McCarthy received more votes than expected in the New Hampshire Primary, wins 42% of the vote| |1968 3-16 Massacre of 200 - 500 Vietnamese civilians at My Lai. |1968 3-16 Robert F. Kennedy announces candidacy for President. |1968 3-17 Major rally outside the US Embassy in London's Grosvenor Square turned to a riot with 86 people injured and over 200 arrested. Over 10,000 had rallied peacefully in Trafalgar Square but met a police barricade outside the |1968 3-22 Without warning, a massive North Vietnamese barrage slams into Khe Sanh. More than 1,000 rounds hit the base, at a rate of a hundred every hour. At the same time, electronic sensors around Khe Sanh indicate NVA troop movements. American forces reply with heavy bombing. |1968 3-31 LBJ Announces He Won't Run| |1968 4-4 MLK Slain in Memphis| |1968 4-6 Oakland Police ambush Black Panthers. Black Panther Eldridge Cleaver arrested with a bullet-shattered leg, while Bobby Hutton is shot and killed. |1968 4-8 U.S. forces in Operation Pegasus finally retake Route 9, ending the siege of Khe Sanh. A 77 day battle, Khe Sanh had been the biggest single battle of the Vietnam War to that point. |1968 4-4,11 Black uprisings in |1968 4-14 Love-in at Malibu |1968 4-15 Spring Mobilization Against the war |1968 4-17 national media films the anti-war riot that breaks out in Berkeley, California. The over-reaction by the police in Berkeley is shown in Berlin and Paris, sparking reactions in those cities. |1968 4-23,30 SDS lead students take over 5 buildings at Colombia Univeristy for a week. 700 arrested |19684-24 300 Black students occupy administration building at Boston University demanding black studies and financial aid. |1968 5-4 6 American deserters hold press conference in Moscow to denounce the War. |1968 5-4,5 Wave of attacks by VC (NVA) hit 109 cities |1968 5-10 Paris Peace Talks Begin| |1968 5-13,30 France swept by protests, strikes and demonstrations. |1968 5-25 First campus protest against ROTC is held at Michigan State University in East Lansing by pacifists during ROTC Field Days. |1968 May The Movement (DRUM) was created in May 1968 at the Chrysler Plant in Hamtramck. This organization sought to put Blacks in higher positions and make physicians available on sight. |1968 June Oleo Strut Coffeehouse |1968 June Khe Sanh closes |1968 6-5 Robert Kennedy Assassinated| |1968 7-1 Phoenix Program |1968 7-8 DRUM led a wildcat strike against conditions in the Hamtramck plant.| |1968 7-15,18 The 9 for Peace publicly announce they had resigned from the US military and begin a 48 hour service of liberation and communion. |1968 7-28 South Vietnamese opposition leader Truong Dinh Dzu sentenced to five years hard labor for advocating the formation of a coalition government. |1968 8-8 Richard Nixon and Spiro Agnew nominated during Miami riots. |1968 8-23 At Fort Hood a hundred Black soldiers from the 1st Cavalry Division gathered to discuss the situation. 43 GIs then publicly announced that if called they would refuse to go to Chicago for riot duty during the Democratic National Convention. Over half of the Fort Hood 43 were Vietnam combat veterans. They were arrested--and faced possible execution for mutiny. Given the explosive atmosphere in the military and throughout society, the brass decided to hush up the mutiny instead and the soldiers received light sentences and transfers.| |1968 8-23 Gypsy Peterson, editor of the Fatigue Press, and Josh Gould, manager of the Oleo Strut are busted as they left Killeen to go the the Democratic Convention. |1968 8-26,29 Upheaval at Democratic Convention in Chicago| |1968 8-29,30 Long Binh Jail |1968 10-2 Mexican military fire upon protesting students, killing 200. |1968 10-4 Shelter Half GI coffeehouse opens in Tacoma.| |1968 10-10 Lt [jg] Susan Schnall 'bombs' US Naval installations in and around San Francisco with 20,000 leaflets announcing GI & Vets March for Peace in San Francisco. |1968 10-11 Pvt Richard Bunch, 19, was shot in the back and killed trying to escape from the Presidio |1968 10-12 GI & Vets March for Peace - San Francisco |1968 10-14 In protest of the killing of Richard Bunch, 27 prisoners at the Presidio staged a brief sit-down strike during Morning Roll Call demanding to see the Correction Officer to present a list of grievances. |1968 10-16 Tommie Smith and John Carlos raise fists for Black Power at Summer Olymics |1968 10-29 Counterpoint, the newspaper of the GI-Civilian Alliance for Peace at Ft. Lewis, first appears.| |1968 10-31 LBJ annouces end of bombing of NV. Operation Rolling Thunder comes to an end. In total, the campaign had cost more than 900 American aircraft. Eight hundred and eighteen pilots are dead or missing, and hundreds are in captivity. |1968 11-5 Shirley Chisholm was elected America's first black woman to Congress |1968 11-6 San Francisco State University - student strike. |1968 12-2 Student strike - New York High Schools. |1968 12-31 536,100 U.S. troops |1969 1-17 Los Angeles Panther Captain Bunchy Carter and Deputy Minister John Huggins were killed in Campbell Hall on the UCLA campus, in a gun battle with members of US Organization| |1969 1-19 GIs at Ft. Sam Houston publish a pro-Panther pamphlet, calling for "Black Power". |1969 1-22 Strike at U.C. Berkeley for ethnic studies| |1969 Feb. Student strikes and sit-ins - Berkeley, Harvard, Howard University, Penn State, Rice, University of Massachussetts, University of Wisconsin, University of |1969 2-3 Harvard University faculty votes to deny credit for ROTC courses and to deny ROTC officers recognition as members of the faculty. —Yale in New Haven, Conn., |1969 2-4 Yasser Arafat appointed chairmaan of the Palestinian Liberation Organization |1969 2-5 Reagan declares a "State of Extreme Emergeny" in California. |1969 2-13 33 students arrested at administration building sit-in at University of Massachusetts |1969 2-16 Antiwar protest in downtown Seattle, part of a national plan for Easter protests, led by 200 GIs. Speakers include Andy Stapp of the ASU, historian Sidney Lens, and Howard Petrick from the SMC.| |1969 2-18 Students seize building and boycott started at Howard University. |1969 2-23,24 VC rocket attacks against 115 bases. In a major offensive, assault teams and artillery attack American bases all over South Vietnam, killing 1,140 Americans. At the same time, South Vietnamese towns and cities are also hit. The heaviest fighting is around Saigon, but fights rage all over South Vietnam.| |1969 2-24 Students occupy Adminstartion building at Penn State. |1969 2-27 Police charge student picket lines, club and arrest two Chicano leaders at U.C. Berkeley. |1969 2-27 Thousands rampage thru nine buildings at U of Wisconsin, Madison over black enrollments. |1969 3-5 Senate Committee reports that in the year ending June 30 1968 “a GI deserted on average once every ten minutes” and a GI went AWOL approximately every 3 |1969 3-13 Senior US military commanders order investigations into reports that the Black Panther Party might be organizing and recruiting among the troops in Vietnam. |1969 3-15 Presidio 27 demonstration in San Francisco, speakers include Susan Schnall and |1969 3-18 "Operation Menu,” the secret bombing Cambodia, begins. |1969 Late Feb. 1,000 students protest ROTC at the State University of New York in Buffalo |1969 3-28 Founders of The Shelter Half Coffeehouse arrested for "contributing to the delinquecy of a minor." |1969 April Armed Services Committee discloses that 53,357 servicemen have been classified as |1969 4-4 “Pain the Brass Night,” where civilians leaflet at Ft. Lewis about the upcoming weekend of |1969 4-5,6 The only major anti-war demonstration in the early months of the Nixon presidency occurred April 5th and 6th April 5-6: “Antiwar Basic Training Days” conference at the Moore Theater in downtown Seattle, sponsored by GI-CAP. Speakers include Aaron Dixon from the Black Panther Party, Native American activist Sidney Mills, Ann Fetter from the ACLU, and Bill Massy from the Young Socialist Alliance. April 5: Large GI-civilian Easter demonstrations in New York City (100,000); San Francisco (40,000); Chicago (30,000). |1969 4-9 SDS torches a Marine Corps classroom at Harvard. Demanding an end to ROTC, 40 SDS members take over the religion lounge at nearby Northeastern University |1969 4-9,22 Student strike - Harvard. 300 Harvard students led by SDS seize Univ Hall and evict eight deans April 10 - Police called into Harvard, 37 injured, 200 arrested April 11 - Start of 3 day student strike at Harvard April 22 - Harvard faculty votes to create black studies program & give students vote in selection of its faculty. |1969 4-15 Thousands of students march on the University of California—Berkeley’s ROTC building, sparking a five-hour battle with police. |1969 4-22 City College of NY closed after black & Puerto Rican students lock selves inside asking higher minority enrollment |1969 4-24 U.S. B-52s launch the biggest attack yet on North Vietnam. As a result there are protests ensuing around the country. |1969 4-30 US troop levels in South Vietnam peak at 543,000| |1969 5-4 GI-CAP’s clambake fundraiser at Point Defiance in Tacoma |1969 5-4 Hal Muskat transferred from Fort Dix, to Fort Lee, for involvement in the distribution of underground newspapers on post. |1969 5-6 SDS sets fire to the ground floor of the ROTC building at Harvard. Stanford University ROTC building also burned by students. |1969 5-10,20 Hamburger Hill |1969 5-14,15 People's Park - Berkeley,May 15 - Hippies in People's Park in Berkeley attacked by police and National Guard. |1969 5-17 GI-CAP celebrates Armed Forces Day by handing out antiwar leaflets at Seattle Center. |1969 May GIs serving with the 101st Airborne, in Vietnam, publish Statement in Support of the |1969 May The New York Times breaks the story about the secret bombing of Cambodia. In response Nixon orders illegal wiretapping of journalists. |1969 6-6,8 PRG formed in South |1969 6-7 Fred Hampton and Black Panthers announce "Rainbow Coalition" Groups involved included Black Panther Party, Brown Berets, I Wor Kuen and their successors the Red Guard Party, White Panther Party, Gray Panthers, Youth International Party, The Patriot Party, Young Patriots Organization, American Indian Movement, Students for a Democratic Society, Gay Liberation Front, Symbionese Liberation Army, Student Nonviolent Coordinating Committee, Weather Underground and Young Lords| |1969 6-8 Nixon annouces Vietnamization. President Nixon meets with South Vietnamese President Nguyen Van Thieu on Midway Island in the Pacific, and announces that 25,000 U.S. troops will be withdrawn immediately. |1969 Summer Black GIs from Fort Lewis’ Third Cavalry Division walk out of riot control classes en masse, receiving no punishment because of commanders’ fears of creating a potentially explosive incident. |1969 June The GI Press Service is formed by the Student Mobilization Committee as an “associated press” of the GI underground newspapers, serving as a national disseminator of articles and publishing national roundup issues. |1969 6-10 GI-CAP, the Young Socialist Alliance, and the Seattle Antiwar Action Movement demonstrate during a “welcome home” parade for troops returning from Vietnam, with signs that read “Welcome home—We’ll stay in the streets until all of the GIs are home.” |1969 6-18,22 SDS National Conference in Chicago ends in chaos as the organization splits into two ideologially incompatable factions. |1969 6-20 Roger Priest charged with violating 14 specifications under 4 articles of the Uniform Code of Military Justice, for statements and articles published in the first 3 issues of OM. |1969 6-28 Stonewall Riots - New York |1969 7-10 800 GIs parade in Seattle for returning soldiers.| |1969 7-13 GI-CAP’s aquatic invasion of Ft Lewis, across American Lake, to “liberate” GIs.| |1969 7-20 Apollo 11 landed on the moon| |1969 8-15,16,17 The Woodstock |1969 8-20 Bobby Seale arrested in Oakland for murder of Alex Rachey, charges were later dropped |1969 8-24 Combat Refusal - Company A of the 3rd Battalion, 21st Infantry. |1969 8-30 Fort Knox Coffeehouse |1969 9-3 Ho Chi Minh dies |1969 9-11 Richard Chase refuses to participate in riot control training - Fort Hood. |1969 9-23 Puerto Rican youth in Chicago form the Young Lords Organization| |1969 9-24 Chicago Seven |1969 10-6 Weathermen blow up police statue in Haymarket Square - Chicago. |1969 10-8,11Days of Rage - |1969 10-15 "First Vietnam Moratorium" - An estimated 1 million Americans across the US participated in anti-war demonstrations, protest rallies and peace vigils. 50 members of the US Congress also participated |1969 10-15 100 SDS members ransack the Air Force ROTC office at Buffalo, burning its files and books. At Kent State University in Ohio, SDS members run alongside cadets, screaming, “Kill, Kill, Kill!” Harvard’s student newspaper, Crimson, comes out in favor of a Viet Cong victory. |1969 10-20 Antiwar meeting at Cascadian Service Club, on base at Fort Lewis, raided. |1969 10-30 The Supreme Court orders desegregation nationwide |1969 11-3 President Nixon says he plans withdrawal of all US troops on a secret timetable |1969 11-12 Pfc Leonard Wathen, a GI at Fort Lewis and member of the ASU, refuses an order to serve on a riot control force, leading to a court-martial and sentence, on January 12, 1971, to six months in the stockade.| |1969 11-13 Reports of the My Lai massacre (which took place on March 16, 1968) surface.| |1969 11-15 2nd Moratorium - More than 250,000 protest the War in Washington DC| |1969 11-20 Armed Forces Disciplinary Control Board decides to put the Shelter Half coffeehouse in Tacoma on trial. |1969 Nov. Sam Jane Alpert, and several others bombed several corporate offices and military installations (including the Whitehall Army Induction Center) in and around New York City in opposition to the war in Vietnam. Melville was a leader in Attica and was killed. |1969 12-1 The first draft lottery in 27 years was held at Selective Service Headquarters in |1969 12-4 Fred Hampton murdered |1969 12-8 Police raid on L.A. Black Panthers resulting in a four hour shoot-out. |1969 12-11 The Shelter Half receives letter from the Army threatening to declare them “off limits” |1969 12-18 ASU members questioned by military police for passing out Fed Up at SeaTac Airport.| |1969 12-20 Pvt Richard Chase convicted and sentenced to two years hard labor at Leavenworth and |1969 12-27,30 Weatherman National War Council - Flint Michigan |1969 12-31 474,000 |1970 January "Washington Monthly Magazine" described an intelligence network of "nearly 1,000 plain clothes investigators working out of some 200 offices from coast to coast" who wrote reports on "political protests of all kinds". The domestic intelligence operation stored and disseminated information on both groups and individuals who "might cause trouble of the US Army." Senator Ervin reported in December 1970 that he was informed the surveillance included 800 Illinois citizens including Senator Adlai Stevenson, III (D-ILL), Rep. Abner Mikua (D-ILL) and US Circuit Judge Otto Kerner. Ervin said "apparently anyone who in the Army's definition was 'left of center' was a prospective candidate for political surveillance." During lengthly Senate hearings on the Army's activities, Defense Secretary Laird ordered the spying stopped. |1970 Early The national Movement for a Democratic Military forms, and gains much early support from Navy sailors.| |1970 1-2 Supreme Court rules General Lewis Hershey's 1967 directive, that local draft boards reclassify anti-draft demonstrators as eligible for active duty (1-A) |1970 1-5 Supreme Court upholds prohibition of underground GI anti-war newspaper at Fort Bragg. |1970 1-21 The Shelter Half, ASU, SDS, and other antiwar activists hold a “Trial of the Army” at the University of Washington’s HUB ballroom to put the Army, not the Shelter Half, on trial for genocide. Cancelled the next |1970 Feb. Hew-Kekaw-Na-Yo (meaning “to resist,” later renamed Hey-Tra-Sneyo) all-Native American radical GI organization formed at Fort Lewis, with a short-lived newspaper Yah-Hoh.| |1970 2-4 Riot in Isla Vista, Calif. protesting Chicago verdicts| |1970 2-18,19 Chicago Seven acquitted of conspiracy charges, Dellinger, Davis, Hayden, Hoffman, & Rubin found guilty of crossing state lines to incite riot |1970 2-19 Explosions in 3 office buildings in NY; and in Calif; Wash; Maryland; Mich, possibly done by |1970 2-22 ROTC building at Washington University is burned |1970 2-25 Isla Vista, Santa Barbara Bank of America bombed |1970 2-26 1,000 students attack ROTC offices on the Buffalo campus. |1970 2-26 U.S. Army discontinues surveillance of civilian demonstrations |1970 2-27 West Point graduate, 1st Lt. Louis Font, asks to be released from military service because its actions in Vietnam counter his religious beliefs. |1970 2-28 GI demonstration at Fort Lewis to protest the military’s “kidnapping” of Bruce McLean, a soldier and ASU member taken from his cell in the stockade and shipped to Vietnam with little notice. |1970 3-6 Three Weathermen blow themselves up in Greenwich Village. |1970 3-8 Actress and antiwar figure Jane Fonda visits Fort Lewis and is detained for “questioning” by military authorities. Later in the evening Fonda visits the Shelter Half coffeehouse, and holds a press conference in Seattle the following day.| |1970 3-9 ASU chapter at Fort Lewis breaks from the national organization and reorganizes as the Independent Servicemen’s Movement, continuing to publish Fed Up and hoping to work with the national Movement for a Democratic Military.| |1970 3-12 Students ignite a bonfire in front of the ROTC building at Buffalo. Chanting “Ho, Ho, Ho Chi Minh—NLF is Gonna Win!” they burn a U.S. flag. |1970 3-14 Hey-Tra-Sneyo, ISM GIs, civilians, and Northwest and Alcatraz Indians picket at the Madigan gate of Fort Lewis as an extension of the occupation of Fort Lawton, laying claim to the soon-to-be-abandoned army base for Native |1970 3-18 Cambodian coup, Prince Sihanouk deposed| |1970 3-22 San Diego MDM open house, attended by Jane Fonda and Robert Ryan of the Black Panther |1970 3-23 President Nixon orders 24,000 troops from Ft Dix and McGuire Air Force Base to New York City to break postal workers strike. |1970 March/April SDS firebombs the ROTC building at the University of Colorado—Boulder. |1970 April Ohio State University at Columbus is wracked by violent confrontations over ROTC. |1970 4-7 Referring to student unrest, Ronald Reagan, Gov. of Calif: "If it takes a bloodbath, let's get it over with." |1970 4-15 National Moratorium Day protests around the country; in Seattle, soldiers at Fort Lewis in the ASU organize a mess hall strike. |1970 4-18 Large antiwar demonstration in Seattle, drawing around 6,000 people.| |1970 4-22 1st Earth Day |1970 4-28 Three staff members of the UFO Coffeehouse sentenced to six years in prison. |1970 4-30 Students firebomb ROTC buildings at Maryland, Michigan State, Washington, Wisconsin and Yale |1970 4-30 Nixon orders US troops into Cambodia. South Vietnamese troops attack into Cambodia, pushing toward Vietcong bases. Two days later, a U.S. force of 30,000 -- including three U.S. divisions -- mount a second attack. Operations in Cambodia last for 60 days. |1970 5-2 Anti-war demonstrations breakout at many U.S. campuses, 1,000 students set fire to the ROTC building at Kent State. Torching it a second time that night, it is destroyed. During the first week of May alone, ROTC buildings explode or ignite at the rate of more than four a day. |1970 5-5 4 Kent State college students were shot to death by Ohio National Guardsmen during an anti-war protest on the campus. This lead to widening anti-war protests| |1970 5-5 Air Force ROTC building at Washington University was burned |1970 5-6 Students firebomb ROTC offices on the Buffalo campus. |1970 May Iowa State University (ISU) in Ames, Iowa, was one of over thirteen hundred colleges and universities that held protests during May 1970 |1970 May Army issues new regulations allowing mustaches and sideburns.| |1970 5-7 - Stanford University, ROTC building destoyed by fire again |1970 5-8 Construction workers attack antiwar demonstrators, Wall St., NY |1970 5-8 Anti-Vietnam War protesters stage the first moratorium marches in Australian cities (70,000 in Melbourne, and about 120,000 throughout Australia). |1970 5-9 A peaceful anti-war rally held at the Ellipse in Washington, DC was attended by about 80,000 people including about 10 members of Congress [75,000-100,000 to protest Cambodia escalation |1970 5-14,15 Student unrest - Jackson State University. Two students killed. |1970 5-15,16 “Armed Farces Day” demonstrations organized by GIs at seventeen locations around the country.| |1970 5-29,31 National GI antiwar conference in Atlanta, Georgia. |1970 June Pentagon admits it cannot account for 80,000 GIs |1970 6-11 Daniel Berrigan arrested by FBI for kidnapping/bombing conspiracy |1970 6-26,27 Six antiwar GIs at Fort Lewis publicly refuse to be sent to Vietnam, possibly the largest action to date at any Army Shipment Center on grounds of conscientious objection, and become known as the “Fort Lewis Six.” |1970 6-29 Private Willie Williams, a black GI at Fort Lewis, is court-martialed for presenting an antiwar statement and poster to his commanding officer, and sentenced despite a June 19 rally at the Shelter Half in his support. |1970 8-3 Margaret Kuhn start Gray Panthers to protest discrimination against elderly |1970 8-24 the University of Wisconsin-Madison in the Sterling Hall bombing.| |1970 8-29 The Chicano Moratorium: on August 29, some 25,000 Mexican-Americans participated in the largest anti-war demonstration in Los Angeles. Police attacked the crowd with billyclubs and teargas; two people were killed. Immediately after the marchers were dispersed, sheriff's deputies raided a nearby bar, where they shot and killed Ruben Salazar, KMEX news director and Los Angeles Times columnist, with a tear-gas projectile.| |1970 9-4,7 Operation R.A.W. (Rapid American Withdrawal), 75 mile march from Morristown, NJ to Valley Forge, PA. Stage simulated search and destroy missions along way to dramatize the horror of the Vietnam War.| |1970 9-18 About 100,000 people take part in a second moratorium march in Australia. |1970 9-18 Jimi Hendrix dies.| |1970 10-4 Janis Joplin dies| |1970 10-13 Angela Davis arrested on kidnapping, murder and conspiracy charges |1970 10-16 State of Emergency declared in Canada. |1970 11-3 Allende becomes president of Chile. |1970 Kissinger and Le Duc Begin Secret Talks| |1970 12-7 South Africa expelled |1970 12-14 The military declares Fort Lewis a closed base to civilians.| |1970 12-22 Cooper-Church Amendment to Defense Appropriations Bill forbids use of US ground forces in Laos and Cambodia. |1970 12-31 335,800 U.S. troops| |1970-71 Academic Year: 110 campus incidents against the ROTC occur compared to 400 in 1969-70 |1971 Jan. Military launches an experiment to transition the Army from draft-based induction to an all-volunteer force, a program called VOLAR; The 3rd Armored Cavalry at Fort Lewis was one of three units nationwide chosen for the VOLAR |1971 1-4 Nixon declares that an end to the war is in sight. |1971 1-12 Rev. Philip Berrigan and 5 others indicted for conspiracy to kidnap Henry Kissinger and bomb |1971 1-12 Ralph Nader forms Earth Act group |1971 1-13 President Nixon signs a bill repealing the Gulf of Tonkin resolution |1971 1-31,2 Vietnam Veterans Against the War’s “Winter Soldier” hearings held in Detroit.| |1971 2-8 In Operation Lam Son 719, three South Vietnamese divisions drive into Laos to attack two major enemy bases. Unknowingly, they are walking into a North Vietnamese trap. Over the next month, more than 9,000 South Vietnamese troops are killed or wounded. More than two thirds of the South Vietnamese Army's armored vehicles are destroyed, along with hundreds of U.S. helicopters and planes. |1971 2-13 Private Wade Carson, an ASU member, is court-martialed and convicted for attempting to distribute Fed Up on post. The prosecution’s case was flimsy, and Carson was being prosecuted more for his active role in the ASU and organizing on the other bases to which he was transferred as punishment. |1971 2-18 FTA formed by Jane Fonda and Donald Sutherland. |1971 3-1 Bomb explodes in Capitol men's room - Washington DC. The Weathermern claim responsibility "in retaliation for the Laos decision" |1971 3-5 Pakistani army occupy |1971 3-15 Billy Smith arrested and accused of fragging two officers at Bien Hoa. |1971 3-23 Puget Sound Sound Off, an antiwar paper, debuts from the Puget Sound Naval Complex in Bremerton, initiated by active duty soldiers and officers from the Concerned Officers Movement (COM).| |1971 3-23 Coup - Argentina. |1971 3-29 Lt. William Calley found guilty for his involvement in My Lai massacre. Charles Manson sentenced to death.| |1971 3-30 It was later found out that on this date; "a confidential Army directive orders personnel to intercept and confiscate personal mail containing anti-war and other dissident material sent to soldiers in Vietnam." |1971 4-1 Nixon orders Lt. Calley be released pending his appeal. |1971 4-7 During a speech, President Nixon said that in relation to setting a firm date for troop withdrawal, that it would "serve the enemy's purpose, not our own." |1971 4-11 Protest and all-night vigil in downtown Bremerton, organized by the Navy’s Concerned Officers’ Movement, as the Navy supercarrier USS Constellation (nicknamed “Connie”) set sail from the Puget Sound Naval Shipyard for a scheduled bombing mission in Southeast Asia. The Connie would become the focus of larger protests during a stop in San Diego, and en route, as crew members became part of the “Save Our Ship” (SOS) antiwar movement and held protests on board ships.| |1971 4-13,14 FTA Show performs at Haymarket Square coffee house (Cast includes Peter Boyle, Barbara Dane, Jane Fonda, Dick Gregory and Donald Sutherland). |1971 4-18 2,300 Vietnam Veterans came to Washington, DC to participate in Dewey Canyon III, "a military incursion into the country of Congress". Led by Vietnam Veterans Against the War (VVAW), the vets camped on the mall 1/4 mile from the Capitol, and threw away military medals and ribbons at the foot of the statue of Chief Justice John Marshall. |1971 4-24 1000 active duty GIs lead up to 500,00 anti-war protesters converge upon Washington, D.D.; at least 150,000 take part in a similar demonstration in San 10 days of protests by a group calling themselves the "Mayday Tribe" included attempted work stoppages at several federal offices in Washington, DC |1971 4-46 50,000 demonstrators in Washington D.C. set up "Algonquin |1971 5-1,3 National antiwar May Day actions called; at Fort Lewis on May 3, the GIA organizes a “sick in” strike of active duty men, which is partially successful; antiwar rallies scheduled in Seattle (May 1) and Tacoma (May 2). |1971 5-3 5,100 policemen backed by 10,000 federal troops resulted in an unprecedented mass arrest of approximately 7,000 persons, with another 2,700 arrested the next day. Protests ended 5 May with the arrest of another 1,200 demonstrators on the Capitol's east steps during a rally attended by some members of |1971 5-3 “FTA,” an antiwar musical/comedy/political show, featuring Jane Fonda and Donald Sutherland, performed at University of Puget Sound. |1971 5-4 Antiwar teach-in at the University of Puget Sound.| |1971 5-5 University of Washington/Washington State University memorials held for Kent and Jackson State students killed by police; May Day actions continue with a march and rally in Bremerton, where the Bremerton mayor signs an “anti-Viet Nam war statement.”| |1971 5-5 Riot control units of the 82nd Airborne Division are deployed in Washington DC to “preserve law and order” as 50,000 anti war protestors descend on the Capital to “Stop the Government”. |1971 5-11 Indian occupation of Alcatraz ends after 19 months |1971 5-15 Second “Armed Farces Day” activities held, the largest united nationwide action of the GI movement, with protests at 19 separate posts (including Air Force and Navy); at Fort Lewis, over 700 army and McChord airmen attend the two-day people’s fair organized by the GIA; in Bremerton, members of the COM and veterans leaflet the Bremerton Armed Forces Day parade.| |1971 5-22 At Travis Air Force Base in Northern California, a mass rebellion among mostly African American airmen results in the arrest of 135 airmen, the largest mass rebellion in Air Force history. The events at Travis spark the formation of the Coromantee Brothers Council among black airmen at McChord, who launched a series of anti-discrimination programs aimed at off-base housing, legal counseling, and greater participation in base cultural/educational activities, and sponsored a visit from the Seattle Black Panther Party.| |1971 6-13 NY Times starts publishing Pentagon Papers |1971 June the Armed Forces Journal [Col. Robert D. Heinl ,"The Collapse of the Armed Forces"], reported: "The morale, discipline and battle-worthiness of the U.S. Armed Forces are, with a few salient exceptions, lower and worse than at any time in this century and possibly in the history of the United States. By every conceivable indicator, our army that now remains in Vietnam is in a state approaching collapse, with individual units avoiding or having refused combat, murdering their officers and noncommissioned officers, drug-ridden and dispirited where not near-mutinous. Elsewhere than Vietnam, the situation is nearly as serious."| |1971 6-30 Six GIs and ten civilians arrested for distributing the Declaration of Independence at Fort Lewis as an act of protest. |1971 6-30 About 110,000 demonstrate in State capitals of Australia. |1971 8-18 Australia and New Zealand announce the withdrawal of their troops from Vietnam. |1971 8-21 George Jackson killed. |1971 8-22 The Camden 28 conducted a raid on the Camden, New Jersey, draft board offices.| |1971 9-1 The Shelter Half coffeehouse moves to a second location in Tacoma (1902 Tacoma Ave South). Fed Up stops appearing regularly. |1971 9-9,13 Prison riot - Attica. |1971 9-28 Stop Our Ship Referendum - citizens of San Diego are asked to decide whether the USS Constellation should remain at homeport or sail for Vietnam. |1971 10-10,11 Combat refusal - |1971 10-20 United States Congressional Committee on Internal Security begins the first of a three-part series of investigative hearings into the GI movement, with a focus on activity at Fort Lewis (published in the summer of 1972).| |1971 10-25 Mass arrest of GIs, the staff of the Oleo Strut, including the director of Sir! No Sir!, and supporters for staging antiwar Veteran's Day demonstration - |1971 12-26 Members of VVAW seize the Statue of Liberty in protest of renewed air attacks on North Vietnam.| |1972 1-25 Shirley Chisholm announces her candidacy for President. |1972 2-24 After 16 months in prison, Angela Davis is released |1972 3-10,12 several thousand African Americans gathered in Gary, Indiana, for the National Black Political Convention |1972 3-22 ERA adopted by the |1972 3-29 166 people, many of them seminarians, were arrested in Harrisburg, Pennsylvania, for encircling the Federal Courthouse with a chain, to protest the trial of |1972 3-30 Massed North Vietnamese Army artillery open a shattering barrage, targeting South Vietnamese positions across the DMZ. Upwards of 20,000 NVA troops cross the DMZ, forcing the South Vietnamese units into a retreat. U.S. |1972 4-1 North Vietnamese soldiers push toward the city of Hue, which is defended by a South Vietnamese division and a division of U.S. Marines. But by April 9, the NVA are forced to halt attacks and resupply. |1972 4-13 In an assault spearheaded by tanks, NVA troops manage to seize control of the northern part of the city. But the 4,000 South Vietnamese men defending the city, reinforced by elite airborne units, hold their positions and launch furious counterattacks. American B-52 bombers also help with the defense. A month later, Vietcong forces withdraw. |1972 4-15 Hanoi and Haiphong |1972 4-17 3,000 students march on the ROTC building at the University of Wisconsin, smearing blood on |1972 4-19 in response to renewed escalation of bombing, students at many colleges and universities around the country broke into campus buildings and threatened strikes. The following weekend, protests were held in New York, San Francisco, Los Angeles, and elsewhere.| |1972 4-27 Two weeks after the initial attack, North Vietnamese forces again battle toward Quang Tri City. The defending South Vietnamese division retreats. By April 29, the NVA takes Dong Ha, and by May 1, Quang Tri City. |1972 4-28 First antiwar demonstration at McChord Air Force Base occurs. |1972 5-8 American forces mine the Hanoi and Haiphong ports.| |1972 5-11Chicago 7 convictions |1972 5-13 protests again spread across the country in response to President Nixon's decision to mine harbors in North Vietnam and renewed bombing of North Vietnam (Operation Linebacker).| |1972 5-15 Gov. George Wallace shot during primary campaign in Maryland |1972 5-20 Armed Farces Day. |1972 6-17 Watergate breakin. |1972 July Jane Fonda visits |1972 7-8 GIs picket Court of Military Appeals, Washington DC, in support of Billy Smith. |1972 7-19 With U.S. air support, the South Vietnamese Army begins a drive to recapture Binh Dinh province and its cities. The battles last until September 15, by which time Quong Tri has been reduced to rubble. Nevertheless, the NVA retains control of the northern part of the province. |1972 8-12 The last American ground troops leave SV. 43,5000 air and support remain |1971 8-23 1100 antiwar protest arrested outside Republican National Convention |1972 9-5,6 11 Israeli athletes killed at the Munich Olympics by the Black September Organization. |1972 12-13 In Paris, peace talks between the North Vietnamese and the Americans breakdown. |1972 12-18,29 "Christmas bombing" of North Vietnam. By order of the president, a new bombing campaign starts against the North Vietnamese. Operation Linebacker Two lasts for 12 days, including a three day bombing period by up to 120 B-52s. Strategic surgical strikes are planned on fighter airfields, transport targets and supply depots in and around Hanoi and Haiphong. U.S. aircraft drop more than 20,000 tons of bombs in this operation. Twenty-six U.S. planes are lost, and 93 airmen are killed, captured or |1972 12-30 Bombing North of the 20th parallel is ended |1973 1-27 Last American serviceman to be killed in combat in South Vietnam, Lt. Col. William Nolde, is killed. |1973 1-28 Cease-fire Signed in Paris| |1973 End of Military Draft |1973 2-28,5-8 Occupation and seige of Wounded Knee |1973 2-29 The last U.S. troops |1973 3-20 VVAW members and GIs in the 864th Engineers Battalion at Fort Lewis confronted their CO and demanded more respect from officers, the removal of NCO’s who made racist remarks, better schooling opportunities and job assignments, and other quality-of-life issues. Their demands were later endorsed generally by the Army Secretary.| |1973 4-4 World Trade Center |1973 6-19 Congress approves Case-Church Amendment which forbids any further US military involvement in South East Asia after August 14. |1973 8-14 U.S. bombing activities in Cambodia are halted. |1973 8-31Gainsville 8 acquitted |1973 9-11 Coup - Chile.| |1974 4-1 Jane Fonda arrives in Vietnam on second visit| |1974 8-9 President Nixon resigns from the Presidency at noon |1974 9-4 Nixon pardoned by President Ford| |1974 9-7 CIA operation against Chile's Marxist Govt. disclosed |1974 12-21 NY Times reports on CIA illegal domestic activities during Vietnam War |1974 12-26 The 7th North Vietnamese Army division captures Dong Xoai. |1975 1-6 In a disastrous loss for the South Vietnamese, the NVA take Phuoc Long city and the |1975 3-1 A powerful NVA offensive is unleashed in the Central Highlands of South Vietnam. The resulting South Vietnamese retreat is chaotic and costly, with nearly 60,000 troops dead or missing. |1975 3-25 Hue, South Vietnam's third largest city, falls to the North Vietnamese Army. |1975 4-29 U.S. Marines and Air Force helicopters, flying from carriers off-shore, begin a massive airlift. In 18 hours, over 1,000 American civilians and almost 7,000 South Vietnamese refugees are flown out of Saigon. |1975 4-30 Saigon falls. At 4:03 a.m., two U.S. Marines are killed in a rocket attack at Saigon's Tan Son Nhut airport. They are the last Americans to die in the Vietnam War. At dawn, the last Marines of the force guarding the U.S. embassy lift off. Only hours later, looters ransack the embassy, and North Vietnamese tanks role into Saigon, ending the war. |1976 4-25 Nationwide elections are held in Vietnam for a National Assembly of 249 deouties from the North and 243 from the South. It is claimed that 98.7 percent of the |1976 6-24 NA of Vietnam meets for the first time |1976 11-15 U.S. vetoes Vietnam's application to the UN on the gounds of Vietnam's 'brutal and inhumane" attutude to U.S. servicemen still listed as missing in action.
<urn:uuid:d63327dd-4c88-46c0-b061-cd81788f77ca>
CC-MAIN-2019-18
http://peoplesvictory.linuxbeach.net/files/PV-diagram.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578531994.14/warc/CC-MAIN-20190421160020-20190421182020-00195.warc.gz
en
0.895167
18,730
3.390625
3
50 years service for M113 From their first service in Vietnam, through to UN deployments and local exercises, the M113 family has protected and transported soldiers for 50 years. On March 19, 1965, the first M113A1 vehicles were issued to the Royal Australian Armoured Corps. That year the Armoured School and 1 Armd Regt were the only regular armoured units. Two Citizen Military Forces (CMF) units had one regular squadron each – 4/19 Prince of Wales Light Horse (Reconnaissance) and 2/14 Queensland Mounted Infantry (Anti-Tank). 1 Tp, A Sqn, 4/19PWLH, was the first unit to receive the new vehicles. The troop had less than two months to train on the new vehicles before five vehicles departed for Vietnam on May 27, 1965. The M113A1 family had been ordered in 1963-64, although the vehicles were ordered separately from the radio and harness. This led to different delivery times, causing problems in Vietnam. Vietnam – the M113A1’s first war The firepower and mobility of the armoured personnel carrier (APC) element deployed with 1RAR soon proved its worth. By September 1965, APC numbers had raised to 13, able to carry an infantry rifle company. Meanwhile, 1 APC Sqn had been raised in Australia and relieved the troop in Vietnam in June 1966 as part of the new 1st Australian Task Force. 1 APC Sqn arrived with only two APC troops, and took over the PWLH vehicles to form 3 Tp. The squadron’s first major action came on August 18, 1966, when 3 Tp reacted with the task force reserve to relieve D Coy, 6RAR, at Long Tan. 3 Tp had only seven serviceable APCs – the rest of the worn-out PWLH carriers were in repair. 3 Tp was reinforced by three carriers from 2 Tp, which had no gun shields or intercom. 3 Tp also had outdated radios, which had problems communicating with the infantry and artillery. The radios and harness ordered with the vehicles still had not all arrived. Long Tan accelerated a search for a protected station for APC crew commanders. The US “bathtub” solution was not accepted and Army sought a turret. M74C cupolas were acquired and fitted but it was very cramped – only 20 were available and suffered from spares problems. In 1966, Army started trials with the T-50 turret, which could be fitted with two .30 machine guns or a .50/.30 combination. This proved an adequate short-term solution, but the decision to fit all APCs with T-50 turrets caused problems for the next 30 years. In November 1966, all ARA RAAC regiments were numbered sequentially, so 1 Armd Regt was joined by 2 and 3 Cav Regts. 3 Cav Regt was raised in January 1967 with two squadrons – one in Vietnam and one training in Australia. The M113A1s and their crews performed exceptionally well in Vietnam, but the M113A1s were light armoured vehicles. During Operation Bribie, in February 1967, one APC was destroyed by three hits from 75mm recoilless rifle and another destroyed by a mine made from a five-inch shell that blew the engine through the driver’s compartment. Mines were to remain the main threat in Vietnam, requiring a belly armour program. 3 Cav Regt began to withdraw from Vietnam in late 1971, with the last APC troop leaving country in May 1972. Service in Australia Back in Australia, the M113A1 became the Army’s light armoured fighting vehicle (AFV). From 1967, a unique Australian vehicle had been developed by fitting a Saladin armoured car turret to an M113A1, adopted as the fire support vehicle (FSV). Specialist tracked light reconnaissance vehicles (LRV) were rejected and the M113A1 APC became the APC/LRV. As the ARA adapted to service in Australia, in 1972 the decision was made to equip all CMF units with the M113A1 vehicles. The simple and robust M113A1 proved an ideal vehicle for the CMF. Easy to maintain and drive, it permitted part-time soldiers with limited training time an opportunity to focus on tactics. In 1973, the CMF became the Army Reserve. A new FSV based on the British Scorpion turret was accepted for service in 1976. It was the first RAAC AFV fitted with a passive (image intensifying) night sight. It was soon redesignated the medium reconnaissance vehicle (MRV). As well as ARA reconnaissance squadrons, reserve RAAC units were issued MRV or the Saladin FSV to reintroduce full bore gunnery to the reserve force. In 1976, 5/7RAR began trialling mechanised infantry, with such success that the role became permanent and in 1 Bde the infantry operated its own M113A1 vehicles. The mechanised role survived the de-linking of the battalions in 2007 but under Plan Beersheba the battalions converted back to light infantry in 2013. Armoured mobility will now be provided by RAAC APC units. The focus on operations in Australia led to increasing interest in wheeled AFV. In 1980, Project Waler examined replacing the Army’s fleet of Light AFV. Both wheeled and tracked vehicles were considered. The Defence of Australia paper of 1987 focused on Northern Australia, leading to plans to relocate 2 Cav Regt to Darwin and re-equip it with wheeled AFV, leaving a reduced M113 fleet of about 600, some of which would be upgraded. It was not until 1992 that plans to purchase sufficient ASLAVs to equip 2 Cav Regt were announced. The M113 upgrade project was to see many changes before anything happened Exercises such as Kangaroo ’89 involved 1 Armd Regt, 2 Cav Regt and B Sqn 3/4 Cav Regt deploying to northern Australia with M113A1 vehicles, as well as the 1 Armd Regt Leopard tanks.UN deploymentsIn 1992-93, the Australian Government contributed to UN forces in Somalia. 1RAR Group formed the main part of Operation Solace, including elements of B Sqn, 3/4 Cav Regt. The manning cap meant that only a reduced squadron with two APC troops could deploy. The M113A1 family performed well once again, albeit the squadron had serious problems with maintenance, especially the supply of track link, in conditions where RAN sea transport was limited. In 1994-95, the government accepted a further UN request for assistance in Rwanda. Operation Tamar initially involved a company of 2/4RAR deployed with a section of three APCs, plus a fitters’ vehicle. This was to be the first time RAAC AFVs were painted UN white. The second rotation came from 5/7RAR, which took over the vehicles in location.More planningIn 1994, Army agreed on a M113 upgrade to consist of: • Phase 1 – suspension and engine cooling modifications to M113A2 standard. New turret with power traverse and elevation with single. M2HB QCB .50 machine gun. Spall liners and a cooled drinking water system were to be fitted, and the crew commander and driver provided with night-vision goggles. • Phase 2 – to move to M113A3 standard. This included a new engine and transmission, external fuel cells, appliqué armour and climate control system for crew compartment.In 1996, the MRV was retired. 2 Cav Regt was already equipping with the ASLAV, signalling the end of the M113A1 in the medium reconnaissance role. In 1998, the first four M113A2 vehicles were delivered from upgrade. At this point, the Phase 1 upgrade was halted and combined with Phase 2, the new vehicle to be known as the M113AS3. One more operation for M113A1 In September 1999, the Australian Government sent a force to East Timor to secure the country while the UN prepared a peacekeeping force to take over. The Australian component of Interfet on Operation Warden included 2RAR and 3RAR, supported by B Sqn, 3/4 Cav Regt. After securing Dili, Australian forces moved to the area of the border.2 Cav Regt ASLAVs were deployed but had problems with the narrow streets, tending to damage buildings when going around corners. The M113A1, being shorter and, when necessary, able to skid-turn, had no such problems. The ASLAVs were withdrawn – they were to have their turn in Iraq and Afghanistan – and the M113A1 soldiered on.With the two Australian battalions on the border, a third battalion was required to secure Dili and its surrounds. 5/7RAR (Mech) deployed with its M113A1s and proved the advantages of armoured mobility in the security role. When Interfet withdrew, 5/7RAR became the first Australian battalion on Operation Tanager. Subsequent Australian battalion deployments were supported by RAAC APC elements until 2002. The M113AS3 concept was further modified, with a lengthened version to be called the M113AS4, while the short version remained the AS3. CO 2 Cav Regt Lt-Col James Davis said 259 M113AS4 variants were procured as APCs, fitters vehicles and Armoured Logistics Vehicles. “The unstretched A3 versions are used as ambulance, command, recovery and mortar vehicles,” he said. “The upgraded M113 family have a new engine, drive train, electrical and fuel systems, as well as a redesigned internal layout to accommodate safe stowage in a variety of situations. “The APC version has a new electrically operated turret with day/night weapon sights. The AS4 vehicle is lengthened, with the six, rather than five, pairs of road wheels each side providing an instant identification feature.” The M113AS3/4 is planned to serve until at least 2025. 4 January 2020Operation Bushfire Assist 10 December 2019135th Graduation of the Australian Army's Future Leaders 20 November 2019Australian Army and Queensland Police Service recognised for efforts during Townsville floods 30 September 2019Retired Army Banner laid up at Kapooka 25 September 2019Delivering the next generation of network assurance for the Australian Army
<urn:uuid:a6ad9517-5dc0-4cda-a86b-6188f8d7358f>
CC-MAIN-2020-16
https://www.army.gov.au/media-room/media-releases/50-years-service-for-m113-0
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496227.25/warc/CC-MAIN-20200329201741-20200329231741-00478.warc.gz
en
0.974538
2,218
2.625
3
The aviators, airplanes, and airlines of Dallas’s Love Field have endowed it with one of the richest histories of any airport in the nation. Not only has it been the headquarters of two major commercial air carriers, it is also the site where the 36th president—himself a native Texan— was sworn in. At the outset of the twentieth century, Dallas was fortunate in having a chamber of commerce that early on believed in the potential of aviation, engaging aviators to give exhibition flights at Fair Park as early as 1910. WINGS DURING WARTIME With America’s entry into World War I in 1917, the chamber successfully petitioned the army to establish a flight training base in Dallas. The organization purchased 670 acres of mostly cotton fields on the south shore of Bachman Lake and leased them back to the army. Construction progressed rapidly, and on October 19, 1917, the new flying field was officially dedicated in honor of Lt. Moss Lee Love, continuing an Army tradition of naming new airfields for its aviators who had perished in the line of duty. Lieutenant Love, who died in a training accident in 1913, was never known to have visited Dallas, but his name was next on the list of fallen aviators to honor. During Love Field’s time as a flight training base, 449 pilots earned their wings as Army Air Service Aviators there. Only twelve airmen died in training accidents during that time, a remarkably low number considering the nature of early flight training. AFTER THE ARMY After the war, the hope that Love Field would continue as an active army base went unrealized, as the military terminated flight operations in early 1919. The Dallas Chamber of Commerce found itself with an extensive infrastructure of hangars, streets, office buildings, and other facilities. Forming a Love Field Industrial District, they leased a portion of the property back to the city for a municipal airport. Gradually the vacated army hangars and other facilities filled with businesses offering airplane rides, flying lessons, fuel, maintenance, and other aviation services. Many of these operations were run by former army aviators, using or selling surplus army aircraft. In 1926, the U.S. Post Office began phasing out its operation of the nation’s air mail, awarding contracts to private carriers that would soon form the basis of the nation’s commercial airline system. Consequently, the first commercial aviation flight in Dallas—and in the state of Texas—began on the morning of May 12 of that year as a Curtiss “Carrier Pigeon” piloted by Herb Kindred of National Air Transport (a predecessor of United Airlines) took off on the first flight of Contract Air Mail Route 3 from Love Field to Chicago, with intermediate stops. LUCKY LINDY LANDS AT LOVE The following year thousands of North Texans turned out on September 27 to welcome Charles Lindbergh as he flew his famous Spirit of St. Louis into Love Field as part of a 48-state tour following his electrifying New York-to-Paris solo flight. The city of Dallas included among the festivities a ceremony formally dedicating Love Field as the city’s municipal airport. In a speech at the Adolphus Hotel that night, Lindbergh praised Love Field as an outstanding airport and urged supporting its growth in order to “keep Dallas and Texas on the air map of the United States.” Previously, city leaders had been discussing buying the airport from the Love Field Company, but Lindbergh’s remarks may have prompted them into action. In any case, the Dallas City Commission on March 30, 1928 voted to approve the purchase of Love Field for $325,000. PASSENGER AIRLINES ON THE RISE By this time Love was earning a reputation as one of America’s best airports. With public interest in air travel on the rise, new hangar and passenger terminal facilities were built in 1929 to accommodate newly established air carriers that had begun offering passenger service. Through the 1930s, three of these grew steadily through expansion, mergers, and consolidations to become the trio of major airlines serving Love Field by the end of the decade—American, Delta, and Braniff. As airline service increased through the 1930s, the need for more modern passenger facilities was met by a new, $400,000 two-story terminal building at Lemmon Avenue on the airport’s east side, dedicated in October 1940. A MILITARY MAGNET ONCE AGAIN With the onset of World War II, Love Field experienced a significant expansion in infrastructure and traffic volume as it became the home of two new tenants. The Lockheed Aircraft Corporation established a major aircraft repair and modification facility, and the Fifth Ferrying Group of the Air Transport Command (ATC) established a base at Love Field that would become the largest ATC base in the country. Among the pilots of ATC’s Fifth Ferrying Group was a squadron of the now-famous Women Airforce Service Pilots, or WASP (see Authentic Person Dorothy Ann Smith Lucas, page 34). These remarkable women, trained at Avenger Field in Sweetwater, flew every type of army aircraft, delivering them to fields all over the nation and flying other non-combat missions such as cargo, target towing, and maintenance test flights. The squadron at Love Field was the largest contingent of WASP in the nation. Even amidst the strain and uncertainty of war, civilian passenger operations continued, though on a limited basis. In 1942, American Airlines would be the first to offer international service from Love Field, with DC-3 flights to Mexico City and Monterrey. The same year, Tom Braniff moved his air carrier’s headquarters to Love Field after having brought his maintenance operation to the airport in 1934. Activity at Love Field remained robust after the war, fueled mainly by an extraordinary postwar public demand for air travel. The wartime expansion of infrastructure helped to support this demand, but the not-yet-ten-year-old Lemmon Avenue terminal was strained to its limits, with wings added to the north and east to increase the number of gates from five to thirteen. A postwar airport master plan envisioned a new, larger terminal building at the north end of an extension of Cedar Springs Road (now Herb Kelleher Way) at the center of the airport grounds. Construction began in 1955, and the facility opened for operations in January 1958. FATEFUL TIMES FOR LOVE FIELD For capital improvements at Love Field, 1958 was a banner year. As the new terminal opened, American Airlines built a million-dollar hangar, Delta Air Lines built its first maintenance hangar outside of Atlanta, and Braniff International Airways dedicated its extensive new Operations and Maintenance Base at 7701 Lemmon Avenue. (The complex is currently being repurposed and has been deemed eligible for inclusion in the National Register of Historic Places.) But the airport’s most notable day would occur five years later, on a date it would share with one of the darkest events in American history. On November 22, 1963, after President John F. Kennedy was fatally shot in downtown Dallas, Texan Lyndon B. Johnson was sworn in as the 36th president. He thus became the first, and so far, only, president to be sworn in aboard an airplane (Air Force One), by a female justice (Sarah T. Hughes, herself a Texan), and in the state of Texas. A LITTLE LUV FOR AIR TRAVELERS In the fall of 1966, one of Love Field’s most influential associations had its start—in a San Antonio club. Sipping doses of bourbon, Rollin King and his attorney, Herb Kelleher, were planning the creation of a low-fare airline with a business model of flying to large cities solely within the borders of Texas—specifically, Dallas, San Antonio, and Houston. On March 15, 1967, Kelleher filed to establish what he called the “Air Southwest Company,” and almost a year later the Texas Aeronautical Commission voted to approve the new airline’s operating certificate. By staying within the boundaries of Texas, Southwest steered clear of dealings with the federal government’s Civil Aeronautics Board. But the legal battles began the very next day. Three air carriers—Braniff, Continental, and Trans-Texas—filed suit to stop the new airline, arguing that the named cities were already sufficiently served, by them. The plaintiffs were initially successful, but Southwest pre- vailed eventually through a reversal by the Texas Supreme Court. In 1971, Kelleher and King established headquarters at Love Field for their renamed Southwest Airlines. The no-frills commuter airline drew inspiration from the name of its base, with love-inspired logo, marketing campaigns, on-board refreshments, and even its stock-ticker designation, LUV. COMPETITION IN THE CITY By 1973, Love Field had grown to be the tenth busiest airport in the world (yes, the world) with 6.6 million enplaned passengers. But the following year its long legacy would be significantly affected by the opening of a newcomer, the Dallas-Fort Worth Regional (now International) Airport. Love Field’s passenger count dropped sharply as the major air carriers moved their operations to DFW in accordance with a 1969 agreement. Southwest kept its operations at Love, arguing that they were not bound by that agreement since they had not been operating at the time—a position that predictably drew further legal challenges. The result of a series of lengthy and complex court actions was that airline operations could continue at Love—for the time being. With the opening of DFW, Love Field was at a critical juncture, and there was even talk of closing it altogether. In a nearly empty terminal building, the iconic Texas Ranger statue stood watch over a mostly deserted lobby area, and for a time the space was even occupied by an ice rink and other amusements. Where commercial flight traffic shrank, general aviation—private and corporate operations—began to take up the slack, and soon Love Field became the nation’s largest general aviation facility. As the 1970s gave way to the 1980s, the terminal lobby’s polished terrazzo floor began to click with the heels of an ever-increasing number of Southwest Airlines passengers. SOUTHWEST AND THE WRIGHT AMENDMENT In 1979, under the provisions of the Airline Deregulation Act of 1978, Southwest applied to begin service for the first time from Love Field outside the boundaries of Texas (into New Orleans). Major players opposed the move, but Southwest once again prevailed in the courts and with federal agencies in its bid to expand its route structure. Southwest’s expansion caused some apprehension in both Dallas and Fort Worth about the potential drain on DFW Airport’s revenue. House Majority Leader Jim Wright (D-Fort Worth), concerned about protecting the two cities’ significant investment in their international airport, attached a provision to a piece of transportation legislation that would limit the scope of commercial flights. The main provision of the “Wright Amendment” was that Southwest (or any airline) could operate nonstop flights from Love Field only to destinations within Texas and its four bordering states (a few states were added later through additional legislation). However, in 2004, Southwest abandoned its long-time position of “passionate neutrality” toward the Wright Amendment and began actively campaigning for its repeal—a move opposed by American Airlines, DFW International Airport, and the cities of Dallas and Fort Worth. At the quiet but firm suggestion of then-senator Kay Bailey Hutchison, the five parties worked out a compromise in 2006 that immediately eliminated some of the Wright Amendment restrictions. The prohibition against non stop flights would expire in October 2014. Spurred by the prospect of the Wright Amendment’s repeal, the airport in 2009 began the Love Field Modernization Program (LFMP), a public/private partnership between the City of Dallas and Southwest Airlines, that involved major improvements to the field’s operational infrastructure as well as tenant and passenger facilities. These included an extensive upgrade to the 1958 terminal building, and completely rebuilt baggage claim and ticketing wings. The LFMP also included provisions for extensive additions to the public art installations at the airport. Since restrictions on nonstop flights expired, Love Field’s passenger traffic has shot up dramatically. In 2015, the first full year of unrestricted nonstop flights, the airport’s passenger count rocketed past 1973’s 6.6 million to an all-time high of over 7.2 million, and in 2018 more than 8 million passengers boarded at Love. Love Field progresses into its second century of operations as one of the nation’s most convenient and modern airports, as validated by various awards, including “number one in customer satisfaction” from J.D. Power and Associates in 2015. The addition of a new parking garage in 2018 raises the airport’s available parking capacity to well over 11,000 spaces, and a series of planned long- term projects promises an even better airport operation for the future. ART AND ARTIFACT Visitors interested in viewing icons of Love Field’s long and varied history have several options. The airport’s twenty-three public art installations are located in its buildings, parking structures, and on the airport grounds; a complete illustrated list is at www. dallas-lovefield.com/passenger-services/ art-program/public-art/permanent-art- work. At the south end of a grassy median between Parking Garages B and C and accessible to the public is the Danny Bruce Flag Plaza, with a six-foot tall obelisk from 1921 honoring Lieutenant Love and the twelve other aviator victims of World War I. Three Texas state historical markers about the airport are there also. On Lemmon Avenue at Love Field’s southeast corner, the Frontiers of Flight Museum displays historical flight gear of the same type worn by Lieutenant Love, as well as many original artifacts from the airport’s history. Hanging from the ceiling in the main exhibit gallery is a perfectly restored Curtiss JN-4 “Jenny” that records show was in service at Love Field in 1918. And if you’re fortunate enough for your travels to take you into the terminal itself with a little time to spare, a large observation window at the northeast corner of the mezzanine level looks out on the area where Air Force One was parked on that historic day, November 22, 1963. A nearby plaque guides the visitor’s view to the right spot. Dallas resident Bruce A. Bleakley, a retired Air Force pilot and former director of aero-themed museums in San Diego and Dallas, has written four books about the history of aviation in North Texas.
<urn:uuid:90225761-f3bf-44ec-b153-dc696274b205>
CC-MAIN-2020-29
https://authentictexas.com/from-cotton-field-to-love-field/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655902496.52/warc/CC-MAIN-20200710015901-20200710045901-00144.warc.gz
en
0.961465
3,092
3.015625
3
Alpha Phi Alpha Fraternity: A Centennial Celebration Alpha Phi Alpha Fraternity: Brief Background On December 4, 1906, seven undergraduate students at Cornell University, “The Seven Jewels,” organized Alpha Phi Alpha Fraternity, the first intercollegiate fraternity among African American men. With the Great Sphinx of Giza as its symbol, and the motto “First of All, Servants of All, We Shall Transcend All,” Alpha Phi Alpha dedicated itself to defend the rights and to promote the responsibilities of African Americans. The founders of Alpha Phi Alpha sought to combine social purpose with social action, to be more than a social organization. Throughout its history, Alpha Phi Alpha has promoted knowledge and achievement. The archives for Alpha Chapter at Cornell University reveal the tenacity of the early members of the Fraternity as it expanded to Howard University in 1907 and to Virginia Union University in 1908, and subsequently to other major campuses across the country. Although Alpha Chapter helped to shepherd the early growth of the Fraternity, it soon relinquished its administrative role as Alpha Phi Alpha became a national organization. The Sphinx Magazine, published in 1914, is the second oldest continuously published black journal in the United States. The oldest one is the NAACP’s Crisis Magazine, which was started by W.E.B. Du Bois, a member of Alpha Phi Alpha Fraternity. Alpha Chapter encouraged the Fraternity to adopt its signature program “Go-to-High School, Go-to-College” in 1919 to increase the number of black students eligible for college enrollment. Over the years, Alpha Phi Alpha Fraternity has initiated national programs to end segregation in professional education, to increase voter registration and turn-out, to create decent and affordable housing for African Americans, to encourage business development, to foster male sexual responsibility, and to mentor young men. In 1998, Congress authorized and the President approved Alpha Phi Alpha’s request to build a memorial on the Mall in Washington, D.C. to honor Dr. Martin Luther King, Jr., one of Alpha’s most distinguished members. Robert L. Harris, Jr., National Historian
<urn:uuid:0b196959-8e7c-413f-973e-c755b0b20a98>
CC-MAIN-2015-35
http://rmc.library.cornell.edu/alpha/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064590.32/warc/CC-MAIN-20150827025424-00004-ip-10-171-96-226.ec2.internal.warc.gz
en
0.940073
442
2.8125
3
Is Vaping HEALTH THREATS Real? You will find a new product being offered that has been touted as a healthier alternative to cigarettes. The product is vaporware and contains been compared to e-juice, but without the higher level of toxins within many brands of tobacco. Vaping does appear to have less harmful ingredients than almost every other products in its category. But what’s the Vaping Health Risks? This past summer the U.S. Department of Health released a report into the negative effects that secondhand cigarette smoke might have on public health. In line with the report, nearly nine million children reside in america, with one in four of them having had some sort of lung problem because they were younger. In addition, you can find over eight million adults who smoke, with one in six of these suffering from some type of chronic illness as a result of their smoking. The amount of deaths from smoking rose by two percent within the last year alone. That’s a large amount of harm in just a brief amount of time. The main Vaping Health Risks includes immediate or future lung injuries caused by long-term using tobacco. The chemicals present in cigarettes to create it incredibly dangerous to inhale. Some studies show that the chemicals in cigarettes, such as nicotine, might lead to cancer. Other studies have shown links to changes in the body’s composition, such as a rise in cholesterol levels. However, there is currently no known cure for cancer. In the long term, smoking is merely unhelpful to your body. But think about the risk to getting a respiratory infection? According to experts, there is actually among the highest levels of risk in terms of using e-liquids. Simply because e-liquids contain both propylene glycol and glycerin, which are generally contained in antifreeze and motorcycle fluids. Propylene glycol is used as a stabilizer for e-liquid, as it allows the liquid to flow easier through the system. The issue comes when it leaks into the user’s the respiratory system and manifests itself as a severe respiratory infection. At these times, it is important that an individual stops smoking immediately and requires a few days off of the e-liquid, before restarting. Another of the Vaping Health Risks is related to underage vaping. According to the 2018 edition of the Aabara ranking, eighth graders will be the most likely to use underage vaping. This is due to the fact that many schools have began to offer e-liquid with flavors that appeal to teenagers, like chocolate and raspberry. If these flavors aren’t appealing enough, teens will smoke cigars in hopes of getting those tastes from cigarettes. Because of this, they may find yourself putting themselves vulnerable to catching illnesses and developing addiction. Nicotine and other chemicals found in tobacco smoke are also probably the most common ingredients in vaporizers. The flavors that lots of companies use to make their products mimic these ingredients, so e-pipe users may be at risk of developing cancer and cardiovascular disease from vapors that have tobacco. It has been found that pregnant women should avoid using any type of electronic cigarette, especially if they are expecting. Pregnant women should always stay away from cigarettes altogether, as this is one of the best methods to help reduce the risk of developing cardiovascular diseases. Many vapes contain high levels of caffeine or ephedra, both of which can increase the odds of creating a nicotine addiction. Some vapes actually contain over two hundred and fifty times how much caffeine as within a cup of coffee, that may be extremely hazardous. Smoking cigarettes is simply Puff Bar Flavors as bad for your health as using any of these vapes, so it is practical to stay from them. Also, e-smokers who do not quit smoking will find themselves at an increased risk of developing cancers and other heart disease. It is crucial for everyone who uses e-cigs to give up smoking, or at least lessen the number of cigarettes that they currently smoke each day. There are a plethora of health benefits to stopping smoking, but several are negated when a person continues to smoke. Using vaporizers or e-cigs to smoke will not make it any better to give up cigarettes, in fact it is imperative that the user quit cigarettes because of their own health’s sake. E-cigs are becoming increasingly popular among smokers, however they are not without their risks.
<urn:uuid:b7960c6d-8ce3-474b-8066-4540a4af3820>
CC-MAIN-2021-25
https://clarke727.609gan.com/2021/05/is-vaping-health-threats-real.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487613380.12/warc/CC-MAIN-20210614170602-20210614200602-00332.warc.gz
en
0.964106
911
2.765625
3
3. Statements of Former Prisoners at Auschwitz We are currently in possession of at least nine declarations written prior to the end of the war. They were therefore made before even the maddest minds could have conceived of the so-called "Jewish world conspiracy," the objective of which was to extort fabulous sums of money from Germany. These statements are those of five persons who escaped from the camp of Auschwitz and of four others who died there before its liberation in January The escapees are two Slovak Jews who got away from Birkenau on April 7, 1944, two others escaped on May 27, 1944, and a non Jewish Polish officer who had arrived at Auschwitz on March 25, 1942, and remained there for nearly two years. After having left Auschwitz, these five former prisoners were able to transmit to the United States accounts of what they had seen and personally experienced. In November 1944 (five months before the end of the war), the Executive Office of the War Refugee Board of the President of the United States published them, adding that their "names will not momentarily be revealed in the interest of their own security" and that "the Office has every reason to believe that these reports provide an exact picture of the horrible things which are going on in these camps" (5). It is known today that the first two escapees are Rudolf Vrba and Fred Wetzler. The former now lives in Canada and related the details of his escape and the story of his report, published anonymously in 1944, in a book which appeared in 1963 (51). The latter now lives in Slovakia. The two escapees of May 1944 are Czeslaw Mordowiz and Ernst Rosin. On the other hand, I ignore the name of the Polish commandant. Wetzler was deported on April 13, 1942, from Sered in Slovakia directly to Auschwitz. Vrba was deported from Novaky in Slovakia to Maidanek and was then transferred on June 27, 1942, to Auschwitz. They thus were familiar with Auschwitz-Birkenau for nearly two years, as was the Polish officer. The date of the arrival at Auschwitz of the two escapees of May 27 is not given, but it is certainly prior to April 7, 1944. Their report was received in Switzerland via Slovakia. then sent to the USA. five reports are very rich in information of all kinds. We shall, however, retain from this mass of particulars only what is directly relevant to the problem of the gas chambers. Each report speaks of them. knew Birkenau at its beginnings, described the first systematic selections upon arrival of the convoys, after which those selected were sent without other formality from the siding directly to the birch wood forest (at Birkenau, G.W.) where they were administered the gas and where they were incinerated" (5, p. 14). He spoke of the first "Sonderkommando" (5, p. 15). "At the end of February 1943, a new modern establishment of crematory ovens and gas chambers was inaugurated at Birkenau," he wrote. "The administration of the gas
<urn:uuid:f5663ec2-79dd-4312-8fb3-625d6b38132a>
CC-MAIN-2013-48
http://holocaust-history.org/klarsfeld/mythomania/T116.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053664/warc/CC-MAIN-20131204131733-00094-ip-10-33-133-15.ec2.internal.warc.gz
en
0.976761
688
2.515625
3
Keeping the federal workforce healthy is a top priority. Flu season is right around the corner and once again poses a health threat to many Americans. Certain populations, such as pregnant women, young children, older people, and those with chronic conditions are at greater risk for serious complications if they get the flu. But even healthy people can get—and, more importantly, spread—this virus to anyone they come into contact with. As the agencies responsible for federal workforce polices and for protecting the health of all Americans, the U.S. Office of Personnel Management and the U.S. Department of Health and Human Services are again coordinating efforts to reduce the spread of flu virus in our workplaces and communities. The best protection against influenza is an annual flu vaccination. Thanks to the Affordable Care Act, most Americans with private health insurance and those with Medicare can get vaccinated against the flu and other serious illnesses with no out-of-pocket cost. Employees and their families enrolled in the Federal Employees Health Benefits Program can also be immunized through their health plans at no out-of-pocket cost. Many health plans make flu vaccine available in pharmacies and other convenient community locations. Federal departments and agencies are also improving access to flu vaccine through their occupational health clinics. Everyone should receive the flu vaccine, and not just those at high risk for serious complications. According to the Centers for Disease Control and Prevention, virtually everyone can benefit and protect not only themselves, but also those they are in contact with. With few exceptions, all persons six months of age and older should receive a flu vaccination every year before flu season is in full swing. In addition to the flu vaccine, there are things we can do each day to help prevent the spread of flu and other illnesses: - frequently wash your hands using soap and water or an alcohol-based sanitizing rub; - avoid touching your eyes, nose, or mouth; - try to stay away from sick people when possible; - get plenty of sleep, exercise, eat well, and drink lots of fluids; and - when you cough or sneeze, cover your nose or mouth with a tissue (not a reusable handkerchief) and throw it away when you are finished. It is also vital to foster a workplace environment that encourages our employees to stay home when they are sick to limit transmission of influenza and other illnesses this season. It may be difficult to tell the difference between influenza and a common cold. While both illnesses may cause a runny nose and a cough and/or sore throat, symptoms like tiredness, headaches/body aches, and fever over 100 degrees are more common with the flu. Although someone could have the flu without a fever, encouraging employees to stay home until they have been fever-free for 24 hours (without fever-reducing medication) is recommended. Please remind your employees about the availability of flu vaccine, as well as the importance of maintaining a healthy workplace. This is also a great opportunity to highlight other vaccines recommended for adults that can prevent a number of illnesses besides influenza. Please urge employees to discuss updating their immunizations with their health care provider. Additional flu prevention information is available online at www.flu.gov. This site features flu prevention tips, public service announcements, and posters. Also, a vaccine finder tool on www.flu.gov can help employees and their families locate places in their communities where they can get vaccinated for the flu and other diseases. We encourage you to visit www.flu.gov and become familiar with the many resources your employees and their families can use. Thank you for the valuable work you do and for helping to ensure a healthy work environment for all.
<urn:uuid:1726bacf-f0a5-4e4b-990e-20e11b82f59e>
CC-MAIN-2014-52
http://chcoc.gov/Transmittals/TransmittalDetails.aspx?TransmittalID=5814
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802776556.43/warc/CC-MAIN-20141217075256-00144-ip-10-231-17-201.ec2.internal.warc.gz
en
0.957982
746
3.109375
3
Endometriosis is when functional endometrial tissue that is found outside the uterus. In the ovary it is referred to as an endometrioma, and in the uterine myometrium it is called an adenomyosis. The most common sites endometriosis is found are on the ovaries and behind the uterus. Less common sites include the vagina, cervix, bladder and bowel. The prevalence of endometriosis in the general population is unknown due to the fact that many women can be asymptomatic with the disease. Estimates indicate that 1% of all women undergoing surgery for any gynecologic conditions have endometriosis. In those women undergoing surgery for pelvic pain, 12-32% have lesions, and in women having surgery for infertility, 48% have endometriosis. There are many theories as to why women develop endometriosis. These include: - Retrograde menstruation: Bleeding backward (out the fallopian tubes and not out the cervix) Endometrial tissue fragments are transported backwards through the fallopian tubes into the peritoneum. - Direct implantation: This theory explains why endometriosis develops in tissue directly involved with a surgery or wound, i.e. c/s scars and episiotomies. - The cells change type and function: This theory suggests that there are undifferentiated cells in the peritoneum that are capable of becoming endometrial tissue. This is based on the embryology of all pelvic organ cells (including the endometrium) are derived from the cells lining the abdomen. - Vascular/lymphatic transport: The theory can explain why there are very rare cases of endometriosis in the thoracic cavity, bone, breast, pancreas, and other distant sites. First, many women with endometriosis are completely asymptomatic and the finding may be incidental. Some of the more common symptoms involve pelvic pain (which is more severe during menses because of the pressure of the lesions on surrounding tissue). This characteristic triad of symptoms includes dysmenorrhea, dyspareunia (painful intercourse), and dyschezia (painful bowel movements). Other symptoms include infertility and perimenstrual spotting. Some of the typical signs include a tender, immobile, retroflexed uterus, a tender and/or fixed adnexal mass, a sharp “barb-like” pain felt in the uterosacral ligament, or a palpable, tender mass in the cul de sac or uterosacral ligament while performing a bimanual exam. The definitive diagnosis of endometriosis can only be made by visualizing the pelvic cavity through a laparoscopy or laparotomy. Until that is done the differential diagnosis includes endometriosis, acute salpingitis, pelvic inflammatory disease, hemorrhagic corpus luteum, ectopic pregnancy, and a benign/malignant ovarian neoplasm. During surgery the endometriosis should be staged. Staging means determining how much and how bad the endometriosis is. This is done on the basis of the total size of the lesions, the tissue they are implanted on, and whether or not there are any adhesions present. Lesion appearance: “Blueberry” lesions are relatively young; brown or chocolate lesions are older; white/fibrotic lesions are older still. Staging attempts to quantify endometriosis and correlate it with fertility potential.1 Anatomical abnormalities in peritoneal, tubal, uterine, and ovarian position are a potential mechanism linking infertility and endometriosis. Adhesions can develop in tissues that can essentially put them out of position to be conducive to conception and implantation. Studies have shown that women with endometriosis have an increased volume of peritoneal fluid, increased peritoneal fluid concentration of activated macrophages (white blood cells), and increased peritoneal fluid concentration of prostaglandin, interleukin-1, tumor necrosis factor, and proteases. These abnormalities in the peritoneal environment may impair gamete, embryo, and fallopian tube function. For example, peritoneal fluid from women with endometriosis has been reported to inhibit sperm function and ciliary function, thereby possibly reducing fertility.4 There are only two generally accepted choices for the treatment of endometriosis: surgical or medical therapy. Surgery is usually reserved for very large endometriomas (over 3 cm in size) or for patients who desire fertility. If the patient is of advanced age and does not desire fertility, a Hysterectomy with removal of the ovaries can be done to remove all endometrial tissue and the hormone-producing ovaries which stimulate the growth of endometriosis. On the other hand, if the patient is younger and/or fertility is desired then a minimally invasive laparoscopy can be performed. In this case, endometriosis can be resected. Medical treatment involves using combination OCP’s or Depo Provera to cause the endometriosis to stop growing.2 Progesterone alone (i.e. Provera) can also be used to simulate a “pseudo” pregnancy state and temporarily calm the endometriosis tissue. A final medical approach is with a GnRH agonist like leuprolide or nafarelin. With the use of these drugs, stimulation of pituitary luteinizing hormone (LH) and follicle stimulating hormone (FSH) secretion occurs during the first 10 days of treatment. Paradoxically, chronic treatment results in a decrease in pituitary secretion of LH and FSH due to GnRH receptor down regulation and pituitary desensitization. This decrease in pituitary LH and FSH secretion suppresses ovarian follicular growth and ovulation, resulting in low levels of circulating estradiol and progesterone. Women chronically treated with clinically effective doses of parenteral GnRH agonists have circulating estradiol concentrations in the range of menopausal women. The main side effects of GnRH agonist analogues are those observed in hypoestrogenic women: vasomotor symptoms, insomnia due to hot flashes, thinning vagina, and accelerated bone loss.5 1. Schenken, Robert. “Pathogenesis, clinical features, and diagnosis of endometriosis.www.uptodateonline.com 2. Essentials of Obstetrics and Gynecology 3rd Edition, 1998. Hacker and Moore. Pg. 432-439. 3. Steele, R.W., Dmowski, W. P. Immunologic aspects of human endometriosis. American Journal of Reproductive Immunology, 1984, 6:33. 4. Lebovac, D.I., Mueller, M.D. Immunobiology of endometriosis. Fertility and Sterility, 2001, 75:1. 5. Barbieri, R.L. “Gonadotropin releasing hormone agonists for long-term treatment of endometriosis”.www.uptodateonline.com
<urn:uuid:f62a40d4-26af-4de8-8d36-db720f2084d2>
CC-MAIN-2019-51
https://denverinfertilityclinic.com/diagnosis/endometriosis/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540528490.48/warc/CC-MAIN-20191210180555-20191210204555-00165.warc.gz
en
0.894515
1,512
3.765625
4
Baroque is an artistic style found in music, architecture, and painting thinking about the time period and the artwork that embodied the characteristics of. Peter paul rubens (1577-1640) was one of the preeminent representatives of baroque art flourished in europe during the 17th century. Smuggled out of nazi germany, the painting has resurfaced in baroque old master rubens lived between 1577 and 1640 and was one of. At its heart is a world-class collection of paintings by rubens, assembled by the cross, which offer unique insights into the mind of this great baroque master. Sir peter paul rubens was a flemish artist he is considered the most influential artist of flemish baroque tradition rubens' highly charged compositions. The staedel, frankfurt, germany's preeminent art museum, has a must-see staedel museum features superstar baroque painter rubens. Rich in italian renaissance and baroque art, the collection boasts works by work by peter paul rubens, exemplify the active reception and interpretation of. Born 1577 in siegen/germany, died 1640 in antwerp/belgium peter paul rubens, the grand master of flemish baroque painting, is one of the greatest artistic. Peter paul rubens (1577-1640): biography of baroque artist, biblical painter, famous for descent from the cross (antwerp cathedral. Sir peter paul rubens was a flemish baroque painter, and a proponent of an extravagant baroque style that emphasized movement, colour, and sensuality. The rubens house is in a search for six paintings by michaelina wautier ' michaelina' is the first survey exhibition of the baroque artist's work and is part of . Flemish artist peter paul rubens was born on this day in 1577 the baroque master explored religious and mythological themes in large-scale. Peter paul rubens is widely known as a successful artist, but he was also an on in the city of antwerp today, not just in its baroque paintings and architecture,. Flemish painter who was the greatest exponent of baroque painting's this accounted for the rubens family's exile to germany, where peter paul was born. Baroque 'n' roll: rubens and his enduring artistic legacy by waldemar januszczak published 5 december 2014 from his battle scenes to royal portraits,. Peter paul rubens prometheus bound 17th century [x] baroque [x] chains [x] collaborative [x] eagle [x] epic hero [x] eternity [x] faithful [x] favorite [x] fire [x]. The elevation of the cross altarpiece is a masterpiece of baroque painting by the flemish painter peter paul rubens the work was originally installed on the. Sir peter paul rubens was a flemish artist he is considered the most influential artist of flemish baroque tradition rubens' highly charged. Baroque art is characterized by dynamism (a sense of motion), which is augmented by peter paul rubens, the greatest baroque artist of flanders, is often. The flemish painter and diplomat peter paul rubens (1577-1640) was not only the unquestioned leader of the flemish baroque school but one of the supreme. Rubens was not just a prolific painter though he was also a diplomat, towards the sensory and theatrical nature of european baroque art. Thanks to the handy rubens walking guide you can learn more about the life of rubens the jealousy of a former associate, the amazing art collection of rubens's friend, step inside the home of the greatest baroque artist north of the alps. Peter paul rubens: peter paul rubens, flemish painter who was the greatest exponent of baroque painting's dynamism, vitality, and sensuous exuberance. Rubens, explaining his painting, the consequences of war: the principal figure is mars, who has left open the temple of janus (which in time of peace,.
<urn:uuid:4d069bd9-316b-4315-a98b-7f0d8b0fce22>
CC-MAIN-2018-47
http://vhessayuykb.centroformazione.info/rubens-baroque-artist.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743294.62/warc/CC-MAIN-20181117061450-20181117083450-00419.warc.gz
en
0.958553
914
3.234375
3
In this section, we will learn how to secure the MCMP channel. This means that the MCMP messages will be transferred over SSL. In the mod_cluster documentation, we named the protocol MCMP, which stands for Mod-Cluster Management Protocol. In design, mod_cluster uses SSL mutual authentication to secure the MCMP channel. This means that we must create certificates for both the servers. EAP6 needs to trust the certificate provided by httpd; meanwhile, httpd must trust the certificate from the EAP6 server. So, we need two certificates instead of just one. In the previous chapter, we created a self-signed certificate for httpd to enable HTTPS communication ...
<urn:uuid:e44cbcf0-c8f9-468d-a322-bbfabdf47da0>
CC-MAIN-2018-34
https://www.safaribooksonline.com/library/view/jboss-eap6-high/9781783282432/ch07s02.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217970.87/warc/CC-MAIN-20180821053629-20180821073629-00069.warc.gz
en
0.903374
145
2.578125
3
If you have three, you have three. If you have two, you have two. If you have one, you have none. What is it? This is kind of a play on words, but: If you have 3 options, you have 3 options. If you have 2 options you have 2 options. If you have only 1 option, you don't have any options. Along similar lines, this works too: If you have 3 choices, you have 3 choices. If you have 2 choices you have 2 choices. If you have only 1 choice, you don't have a choice. Is it a If you have triplets, you have three multiples. If you have twins, you have two multiples. But if you have a single child, you have no multiples. Original answer, not correct by the precise definition (thanks @Will): If you have three organisms with the same DNA, you have three clones. But if you have one organism it is not a clone. It may be about physical sharing, and telling other people what you have. If you have more than one unit of something you can inform your surroundings on this and share it with them. On the other hand: if you have only one, telling others might induce envy and you may be better off not mentioning it.
<urn:uuid:93dbcb21-051d-4a46-b1fe-8048ca6fba9c>
CC-MAIN-2023-50
https://puzzling.stackexchange.com/questions/32507/if-you-have-one-you-have-none
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00033.warc.gz
en
0.957134
275
3.109375
3
Test 4: Soldering Iron Test Performed: Soldering Iron Test Date: February 28, 1999 Special Conditions: None For this test, we heated up a soldering iron in our lab. The soldering iron is usually used for electronic assembly. Its extreme temperature is used to melt metal solder used to connect electronic wires and circuits. Chibi Moon was placed in position while the soldering iron was fully heated. Precise temperature measurements were not available since the soldering iron would have melted the thermometer. It was determined that the focal point of the soldering iron would be the top of Chibi Moon's head. Her head is the largest part of her body and would provide more area for the soldering iron to come in contact with than her body or limbs. After the soldering iron was fully heated, it was slowly lowered into the part in her hair on top of her head. It began to melt away the plastic into a ring around the soldering iron's tip. This also caused some hazerdous fumes to be given off. The soldering iron had a small bead of solder on the tip that rolled off and became lodged near her hair clip. It melted into place and is not easily removed. After submerging the tip of the soldering iron and reaching a depth of approximately one inch, the soldering iron was removed from Chibi Moon's head. At this point, the test concluded and both the soldering iron and Chibi Moon were allowed to cool down. The soldering iron left an obvious cavity in Chibi Moon's head. This may have caused a loss in structural support. Further tests will evaluate this. The image seen to the right has been enhanced with a small light aimed into the cavity. The dark spots are charred plastic which fell off the soldering iron and melted into the plastic inside the hole. There is no damage to any other part of Chibi Moon's body. Damage Assessment: Severe head trauma. Conclusion: Chibi Moon is vulnerable to extreme heat
<urn:uuid:76cbaf01-518c-4cf6-800e-ca64b54864f9>
CC-MAIN-2022-33
https://chibiproject.com/tests/solderingiron.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573849.97/warc/CC-MAIN-20220819222115-20220820012115-00045.warc.gz
en
0.977075
419
2.90625
3
A team led by the University of Sydney School of Geosciences has created the first digital globe of seafloor sediments. Ocean sediments cover 70% of our planet’s surface, forming the substrate for the largest ecosystem on Earth and its largest carbon reservoir – but the most recent map of seafloor geology was drawn by hand over 40 years ago, at the dawn of modern ocean exploration. That’s about to change. In a gargantuan effort Adriana Dutkiewicz and her colleagues carefully analysed and categorised 15,000 seafloor sediment samples to reveal the nature of sedimentary blankets over ocean ridges, seamounts and the vast abyssal plains. She teamed up with big data experts to find the best way to use modern computer algorithms to turn the vast sea of point observations into a continuous digital map. The first “census of seafloor sediments” reported in the journal Geology is rendered as a spectacular, interactive spinning virtual globe that allows anyone to fly through the colourful patchwork of seafloor geology draped over a terrain map. Dr. Dutkiewicz says: “The new map completely changes our understanding of what’s down there. We find a complex patchwork where in the 70s large continuous belts of seafloor sediments were mapped.” Why is this important? The deep ocean floor is a graveyard with much of it made up of microscopic sea creatures called phytoplankton, whose dead remains rain down through the water column like “marine snow”. The composition of their shells is used to decipher how our oceans have responded to past climate change. Tiny organisms called diatoms, thriving in sunlit surface waters, produce about a quarter of the oxygen we breathe, and they make a bigger contribution to fighting global warming than most plants on land. Their dead remains sink to the bottom of the ocean, locking away their carbon. Co-author Prof. Dietmar Müller explains: Satellites map chlorophyll concentrations in the surface ocean, but so far we haven’t had any reliable maps of where diatoms accumulate on the seafloor – we understand the carbon source, but not the sink.” Surprisingly, the new seafloor geology map demonstrates that diatom accumulations on the seafloor are nearly entirely decoupled from diatom productivity maxima in surface waters in the Southern Ocean. Independently, a similar decoupling was recently reported for the Northeast Pacific, supporting these results. Dr. Dutkiewicz notes: “That means oceanographers and marine geologists have some work to do. Now that Australia has a brand-new marine research vessel, the Investigator, our research opens the door to future voyages aimed at better understanding the workings and history of the marine carbon cycle.” Müller adds: “Big Data technologies, paired with old and new data, now allow us to better predict the impact changing climate and ecosystems may have on the life cycle of diatoms, by jointly analysing a multitude of sea surface and seafloor observations.” Co-author Dr. O’Callaghan from NICTA concludes: “The recent images of Pluto’s icy plains are spectacular, but the process of unveiling the hidden geological secrets of the abyssal plains of our own planet was equally full of surprises!”
<urn:uuid:8a248426-06b4-476f-8dca-f61f8f1f2dff>
CC-MAIN-2019-04
https://www.earthbyte.org/big-data-reveals-geology-of-worlds-ocean-floor/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583867214.54/warc/CC-MAIN-20190122182019-20190122204019-00542.warc.gz
en
0.914896
714
4.03125
4
While self-driving technology should one day help to eliminate most kinds of collisions, there will still be instances where the sudden coming together of car and object will be unavoidable. For example, when someone rushes into the road from a spot unseen by the vehicle's sensors, the autonomous car may have too little distance in which to stop to avoid a collision. In such a case, the technology needs to decide if it's safe to swerve out of the way or simply apply the brakes and brace for impact. Google spinoff Waymo has been thinking a lot about how best to deal with such situations. As it continues to improve its sensor technology to help its vehicle understand its surroundings and respond quickly and safely to unfolding events, it's also been considering how to deal with unavoidable collisions, whether it's with a "soft" human that could easily sustain an injury, or a harder object like another vehicle. A patent recently awarded to Waymo offers some insight into how the company is approaching the issue. Its intriguing idea focuses on a car body that has the ability to transform into a soft shell when it detects it's about to collide with a human. The vehicle would achieve this change by altering the rigidity of the panels, or "tension members" as Waymo describes them, that make up its exterior. In Waymo's own words: "The vehicle may contain tension members that are arranged so that a change in tension across one or more of the tension members will alter the rigidity of the vehicle's surface. The vehicle may identify and respond to a potential collision by altering the tension that is applied to one or more tension members, thereby altering the rigidity of the vehicle's surface." It's a fascinating idea, and outlines technology that would be just as useful on today's human-driven cars. But it's worth noting that at this stage it's just that an idea. In other words, there's no telling whether Waymo will ever build and implement the proposed technology. Still, the patent nevertheless offers some interesting insight into how the company is dealing with the challenge of designing effective pedestrian-impact technology. In 2016, Waymo, or Google as it was then, proposed a slightly wackier-sounding idea that dealt with the same issue. It suggested adding an adhesive layer to the surface of its car that would become instantly sticky the moment it came into contact with a pedestrian. In such a scenario, the pedestrian would stay stuck to the car until it came to a safe stop, rather than bouncing off into the path of an oncoming vehicle or onto a hard road. But if the car somehow lost control or was unable to stop for some distance, it could be a terrifying ride for the "passenger" stuck on the outside. With that in mind, we much prefer Waymo's latest idea.
<urn:uuid:f43f3f9f-520e-4df0-bfe7-0cb98b9d9c9c>
CC-MAIN-2019-39
https://www.foxnews.com/auto/waymos-self-driving-car-could-automatically-soften-if-it-hits-a-pedestrian
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575168.82/warc/CC-MAIN-20190922053242-20190922075242-00354.warc.gz
en
0.965267
573
2.796875
3
Season 151 - Day 11 of 14 In biology, what is the term for the condition where the sexes of the same species exhibit different characteristics, particularly characteristics not directly involved in reproduction? The differences in characteristics may include size, weight, color, or behavioral traits. The condition occurs in most animals. An example is the peafowl, where the appearance of the peacock differs significantly from the peahen. Thanks for rating this question! You must be logged in to type your answer Send your answer Correct answer is: If you want to leave a comment for the quizmaster you can always contact him by using the chat button at the bottom right corner. The quiz master will return to you as soon as possible
<urn:uuid:bfe42038-0250-4c15-955c-420ce478ded7>
CC-MAIN-2023-06
https://www.quizzypedia.com/question-of-the-day/Season-151---Day-11-of-14
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500837.65/warc/CC-MAIN-20230208155417-20230208185417-00809.warc.gz
en
0.921537
161
3.75
4
Photo by Shutterstock We’re half-way through National Prematurity Awareness Month, an event that happens each November, so the news that preterm birth rates have dropped is fitting (and excellent) news. According to the March of Dimes Premature Birth Report Card the number of premature babies born in the United States dropped drastically in 2012 down to 11.5% – that’s a 15-year low! However, before you get too excited, be aware that this change, though awesome, is not enough to save all the babies it should. Even with the drop in preterm birth rates, the United States still only scored an overall national grade of a “C” with regard to premature babies. The March of Dimes also points out that 1 in 9 babies (450,000 a year) are born far too soon in the U.S., making the U.S. rate of premature babies higher than that of most other developed nations. Photo by Shutterstock Preterm birth is defined as a baby born at least three weeks before its due date, which means the baby misses out on some key growth and development perks that full-term babies experience. Preterm babies account for a large proportion of infant deaths, and while clearly death is the worst outcome if your baby is born early, many other bad outcomes may also arise. The CDC points out that not only do most premature babies spend weeks or months hospitalized in a neonatal intensive care unit, babies born too soon may suffer from life-long challenges and health problems such as: - Intellectual disabilities - Cerebral palsy - Breathing and respiratory problems - Visual problems - Hearing loss - Feeding and digestive problems Some factors pose well-known preterm birth risks such as being an African American woman, carrying multiples, having problems with your uterus or cervix, or mothers with chronic health problems such as high blood pressure or diabetes. However, this doesn’t mean preterm birth is inevitable — you just need to discuss these issues with your midwife or doctor. If you have none of the above risk factors, you can still be at risk for preterm birth. Reduce your chances of having a preterm baby by doing the following: - Never smoke, drink or do drugs while pregnant. - Seek prenatal care early and regularly. - Eat a healthy diet while pregnant. - Take 400 micrograms of folic acid daily before and during early pregnancy. - Report any illnesses, infections, bleeding or weird pain right away to your midwife or doctor. Visit the March of Dimes to learn more about how you can help support the cause for stronger, healthier babies who are born right on time and not one moment sooner.
<urn:uuid:fd0fd724-39f0-40bb-8b69-2a8546176eeb>
CC-MAIN-2017-04
http://www.inhabitots.com/preterm-birth-rates-drop-significantly-in-the-united-states/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283475.86/warc/CC-MAIN-20170116095123-00255-ip-10-171-10-70.ec2.internal.warc.gz
en
0.949529
562
3.109375
3
By Dr. Becker It's really remarkable to watch – especially if it's your first time experiencing it. It's another of the many unique and fascinating things about cats. Your kitty jumps into your chair with you, or perhaps onto the bed next to you, and begins pressing one front paw, then the other against you in a rhythmic motion. His eyes are either closed or hold a far away look. Often there's purring. Sometimes there's drooling. It can go on and on and on. Some kitties knead with their claws pulled in. Others extend their claws as they push, and retract them during the pulling motion. Sometimes it's not a person they're kneading but a soft surface like a pillow or blanket, or even another kitty. To humans it looks like the cat is lovingly kneading dough to make bread. The kitty, on the other hand, appears to be moving closer to ecstasy with each press of a paw. What the heck is he doing? Why Your Cat "Makes Biscuits" This kneading, also known as 'making bread' or 'making biscuits,' is an instinctive feline behavior kittens display shortly after they're born. The reason for the movement in kittenhood is to stimulate the flow of milk from the mother's mammary glands. Cats that continue the behavior into adulthood with their owners might be: - Showing contentment - Calming themselves during periods of stress - Marking their human with the scent from the sweat glands in their paws One theory is adult cats who still knead were taken from their mothers too soon. This idea has been pretty well debunked because nearly every cat kneads. More than likely it's an instinctive lifelong behavior that is simply comforting to felines. However, kitties weaned too early may become the cats that go on to "over-knead." The behavior might also have its origins in wild cats who built nesting places with grass and leaves in which to rest or give birth. It does seem the behavior in most cats precedes settling down for a nap. Some intact female cats will knead more frequently as they're going into heat. For some cats, kneading can be come an obsessive behavior. These kitties may also try to suckle on their person's skin, stuffed toys, blankets, clothing – even the family dog. If You Need to Curtail the Behavior... If your cat's kneading is uncomfortable due to claws, or seems to be obsessive, there are a few things you can try. When she starts the motion, try gently pulling her down into a lying position. This may settle her down and she'll drift off to sleep. You can also try gently covering her paws with slight pressure from your hands, making the motion more difficult to perform, or distracting her with a food treat or toy. What you don't want to do is punish your kitty for a behavior that is entirely natural.
<urn:uuid:2d6560f6-571f-4d6f-b0b1-f6804be0178b>
CC-MAIN-2016-36
http://healthypets.mercola.com/sites/healthypets/archive/2012/05/02/cat-kneading-behavior.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982295192.28/warc/CC-MAIN-20160823195815-00279-ip-10-153-172-175.ec2.internal.warc.gz
en
0.978468
634
2.8125
3
Compact Flash vs SD memory card for your camera Most photo and video cameras use memory cards. CF or Compact Flash cards are popular with professionals, but SD or Secure Digital cards have grown in popularity in recent years. While it won’t be the number one priority when choosing a new camera, it’s helpful to know the pros and cons of each system a little better. Compact Flash (CF) Specifications This system was once the standard for higher-end DSLR cameras. The speed of reading and writing was faster, and the design feels durable and sturdy. Some cards are also more resistant to higher temperatures, which can be a solution in professional situations. Nowadays, development has almost come to a standstill, and XQD cards are the successors of the CF system. What’s on the card? - Here you can see how much capacity the card has, it varies between 2GB and 512GB. With 4K video, it fills up quickly, so take more than enough capacity, especially with longer recordings. - This is the maximum read speed. In practice, these speeds are hardly achieved and the speed is not constant. - The UDMA rating indicates the throughput specifications of the card, from 16.7 MB/s for UDMA 1 to 167 MB/s for UDMA 7. - This is the card’s minimum write speed, which is especially important for videographers who need a guaranteed constant speed. Secure Digital (SD) Specifications SD cards became popular so quickly that over time they surpassed CF in both storage capacity and speed. Standard SD cards are limited by a FAT16 system, the successor SDHC works with FAT32 which allows you to record larger files, and SDXC has the exFAT system. SDHC goes up to 32GB and SDXC even goes up to 2TB of capacity. With 312MB/s, the speed specifications of UHS-II cards are almost twice as fast as that of CF cards. MicroSD cards are also available in the above three variants and may work with an adapter. The system is “backwards compatible”, SD can be read with an SDXC reader, it doesn’t work the other way around. What’s on the card? - This is the storage capacity of the card, from 2GB for an SD card to a maximum of 2TB for an SDXC card. - The maximum reading speed that you will rarely if ever achieve in practice. - The card type, keep in mind that the systems are only “backwards compatible”, an SDXC card cannot be read in a standard SD device. - This is the card’s minimum write speed, which is especially important for videographers who need a guaranteed constant speed. UHS class 3 does not go below 30 MB/s, class 1 does not go below 10 MB/s. - The UHS value indicates the maximum read speed. Cards without UHS go up to 25 MB/s, UHS-1 goes up to 104 MB/s and UHS-2 has a maximum of 312 MB/s. Please note that the card reader must also support this value. - This is the predecessor of UHS but many camera manufacturers still use this designation. Class 10 is the maximum with 10 MB/s and class 4 guarantees 4 MB/s. SD cards have one small but useful advantage because of the small switch to protect the card from erasure. Whatever type of card you use, you can never have enough! Getting started with your own stop motion storyboards Subscribe to our newsletter and get your free download with three storyboards. Get started with bringing your stories alive! We'll only use your email address for our newsletter and respect your privacy Hi, I'm Kim, a mom and a stop-motion enthusiast with a background in media creation and web development. I've got a huge passion for drawing and animation, and now I'm diving headfirst into the stop-motion world. With my blog, I'm sharing my learnings with you guys.
<urn:uuid:48178424-d92f-4be4-8593-d775efeec4e6>
CC-MAIN-2023-23
https://stopmotionhero.com/compact-flash-vs-sd-memory-card/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652149.61/warc/CC-MAIN-20230605153700-20230605183700-00128.warc.gz
en
0.93769
858
2.625
3
Syon Monastery, Middlesex, England, founded in 1415 by King Henry V at his manor of Isleworth. The "Monastery of St. Saviour and St. Bridget of Syon" was the only one in England belonging to the modified order of St. Augustine, as reformed by St. Bridget (see BRIGITTINES), and comprised thirteen priests, four deacons, and eight lay brethren, besides sixty nuns. The property extended for half a mile along the bank of the Thames, near Twickenham; and the chief duty of the community was to pray for the souls of the royal founder and his near relatives and for all the faithful departed. Martin V confirmed the foundation in 1418, and the first novices were professed in 1420. Six years later the Regent (John, Duke of Bedford) laid the first stone of the chapel ; endowments and benefactions rapidly flowed in, and towards the close of the century and a quarter which elapsed between its foundation and dissolution, the annual income of the monastery was estimated at 1730, equal in modern money to 100,000 dollars. The good observance of Syon was maintained to the last; and even Layton and Bedell, Henry VIII's servile commissioners, could find little or nothing to bring against the community. The inmates were nevertheless expelled in 1539, and the buildings seized by Henry, who imprisoned his fifth wife, Katherine Howard, in them for some months. The nuns retired to a house of their order in Flanders, but in 1557, on the accession of Queen Mary, they returned to Syon, and the greater part of their property was restored to them. At the queen's death, however, they were once more exiled, and after various wanderings in France and Spain settled in Lisbon, where they still own property. The Lisbon community returned to England in 1861, settling at Spettisbury, Dorsetshire (transferred to Chudleigh, Devon, in 1887). The Isleworth monastery was granted by James I to the ninth Earl of Northumberland, whose descendants still hold it. The present mansion is mostly the work of Inigo Jones, the ancient mulberry-trees in the garden being, it is said, the sole relic of the conventual domain. The Catholic Encyclopedia is the most comprehensive resource on Catholic teaching, history, and information ever gathered in all of human history. This easy-to-search online version was originally printed between 1907 and 1912 in fifteen hard copy volumes. Designed to present its readers with the full body of Catholic teaching, the Encyclopedia contains not only precise statements of what the Church has defined, but also an impartial record of different views of acknowledged authority on all disputed questions, national, political or factional. In the determination of the truth the most recent and acknowledged scientific methods are employed, and the results of the latest research in theology, philosophy, history, apologetics, archaeology, and other sciences are given careful consideration. No one who is interested in human history, past and present, can ignore the Catholic Church, either as an institution which has been the central figure in the civilized world for nearly two thousand years, decisively affecting its destinies, religious, literary, scientific, social and political, or as an existing power whose influence and activity extend to every part of the globe. In the past century the Church has grown both extensively and intensively among English-speaking peoples. Their living interests demand that they should have the means of informing themselves about this vast institution, which, whether they are Catholics or not, affects their fortunes and their destiny. Copyright © Catholic Encyclopedia. Robert Appleton Company New York, NY. Volume 1: 1907; Volume 2: 1907; Volume 3: 1908; Volume 4: 1908; Volume 5: 1909; Volume 6: 1909; Volume 7: 1910; Volume 8: 1910; Volume 9: 1910; Volume 10: 1911; Volume 11: - 1911; Volume 12: - 1911; Volume 13: - 1912; Volume 14: 1912; Volume 15: 1912 Catholic Online Catholic Encyclopedia Digital version Compiled and Copyright © Catholic Online
<urn:uuid:2326b25c-fca6-4f55-99d9-561a6fc69aff>
CC-MAIN-2016-18
http://www.catholic.org/encyclopedia/view.php?id=11217
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860123151.14/warc/CC-MAIN-20160428161523-00189-ip-10-239-7-51.ec2.internal.warc.gz
en
0.960326
849
2.6875
3
Natural disasters seem to be happening with more frequency. If there is an unexpected disaster, or just a simple power outage, are you prepared? This is how you can be prepared for the next disaster, just in case. Have a supply of food you can eat cold that doesnít need to be refrigerated such as breakfast cereal or crackers. Then itís useful to have food that can be eaten after hot water is poured on it, such as oatmeal or ramen noodles. Keep a supply of frozen foods that can be easily heated on an outdoor barbecue grill. Calculate how many people there are in your family and how much water you would need if your water supply was compromised. Then store enough for a week. The water should be replaced once a year. If you have a barbecue or gas grill, then this can be used for family cooking. But leave the stove outside, even if itís really cold, as itís a risk for causing carbon monoxide poisoning if itís inside. If your home is plunged into darkness, be able to find the lighters, candles or flashlights without much difficulty. Have small flashlights for each child as that makes darkness fun and not scary. Hide them somewhere or they will be played with when the power is not out. Or keep light sticks that you can break to get light. Have a store of extra blankets in case it is really cold when the power goes out. First aid box A well stocked first aid box is a must. You can buy a ready packed one, or build your own. The kit should include Band-Aids, alcohol wipes, antibiotic ointment, gauze, eyewash, scissors, and cleaning wipes. Basically everything you would need if someone were to get hurt at home. Keep your gas tank topped up Itís a good idea to fill up your gas tank when it reaches half full. Then if there is an emergency and the gas stations also lose power, you have at least half a tank of gas. Emergency supply for the car Think what you would need if you were stranded in the car in snow. Blankets and a snow shovel are essential. Also important is a drink, maybe some food and a flashlight. Itís better to have too many things in your car ready for an emergency than not enough. Here are some other things you may want to keep in your car: jumper cables, first aid supplies, de-icer, foil, hand crank radio, chemical hand-warmers, gloves, socks, black trash bags (these can have many uses), a zip-lock bag of high-energy, high protein snacks such as nuts, candy bars, granola bars, etc. Planning for an emergency is something that many people put off, but itís essential because you donít want to get stranded without food or water or basic supplies. Ambient Weather WR-111B Emergency Solar Hand Crank AM/FM/NOAA Digital Radio, Flashlight, Cell Phone Charger with NOAA Certified Weather Alert & Cables
<urn:uuid:891090fd-fc1a-4eed-86f5-a7941ae466ce>
CC-MAIN-2016-22
http://www.bellaonline.com/ArticlesP/art1386.asp
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049278091.17/warc/CC-MAIN-20160524002118-00088-ip-10-185-217-139.ec2.internal.warc.gz
en
0.959349
627
3.03125
3
There are more than 80,000 industrial chemicals in widespread use across the US. Around 3,000 of these chemicals are in products that we come into contact with every day, including clothing, carpets, toys, cleaning products and cosmetics. But is it safe to be so frequently exposed to these chemicals? Past studies have associated chemical exposure with negative impacts on health. In 2012, Medical News Today reported on a study suggesting that routine exposure to toxic chemicals may increase the risk of breast cancer, although this link has never been confirmed. However, there is one health issue as a result of chemical exposure that is now widely accepted in the medical world – its effect on child brain development. In 1993, a report from the National Research Council titled Pesticides in the Diets of Infants and Children first suggested that children, specifically the developing fetus, are significantly more sensitive to the toxic effects of chemicals than adults. Numerous studies have supported this discovery. Last year, Medical News Today reported on a study from the Royal College of Obstetricians and Gynaecologists in the UK, suggesting that pregnant women need to be aware of unintentional chemical exposure, as it may impact the health of their unborn baby. But how exactly can chemical exposure affect a child’s development? Harmful chemicals can be absorbed into our bodies through our skin, or we can ingest them through air, food and drinks. The US Agency for Toxic Substances and Disease Registry (ATSDR) states that pregnant women, children and elderly individuals are more sensitive to chemical exposure. According to a 2006 study from the Center on the Developing Child at Harvard University in Cambridge, MA, some toxic chemicals can interfere with the natural function of genes, proteins and other small molecules in the brain. The paper states that the immature brain is much more vulnerable to toxic exposure than the brain of an adult. The mature brain has a barrier of cells that stops chemicals in the blood stream from entering brain tissue. But the developing fetus does not have this protective barrier, meaning it is more vulnerable to toxic substances. There are a series of chemicals that have been associated with neurodevelopmental disorders. These include lead, mercury, fluoride, dichlorodiphenyltrichloroethane (DDT), manganese, chlorpyrifos (a pesticide) and tetrachloroethylene (a solvent). Lead can interfere with important neurotransmitters in the brain, including dopamine, glutamate and acetycholine, while mercury can disrupt brain development by blocking enzymes that regulate brain function. It also stops cells from dividing, meaning there are fewer neurons and support cells produced in the brain. US organizations, including the Environmental Protection Agency (EPA) and the Food and Drug Administration (FDA), have imposed regulations on chemicals that have been linked to neurodevelopmental disorders in order to protect children’s health. But a recent study from the Harvard School of Public Health in Boston, MA, states that there are 214 chemicals that have been linked to human brain damage that have not been regulated. Furthermore, the researchers note that of the 80,000 chemicals widely used in the US, the vast majority of these have not been tested for their toxic effects. “Sadly, in the US, the legal requirements for testing chemicals before they come on to the market are almost non-existent,” said study author Dr. Phillip Landrigan, of the Department of Preventive Medicine at the Icahn School of Medicine at Mount Sinai in New York, NY. He told Medical News Today: “These chemicals are put into products, they are not tested, they get out into the environment and get into people. Some, I am quite sure, will turn out to be benign. But I am sure there are some that are hidden. There are some that are probably causing harm that we have not yet recognized as dangerous.” Recent studies have focused on the potential harm that certain unregulated chemicals can cause. We recently reported on research suggesting that synthetic chemicals used in food packaging – known as food contact materials (FCMs) – may leak into the food we eat and harm our long-term health. Other research has found that pregnant women exposed to phthalates – chemicals found in some deodorants, lotions and perfumes – may be at increased risk of preterm birth. But according to the study researchers, “our very great concern is that children worldwide are being exposed to unrecognized toxic chemicals.” They say this exposure could lead to a “global neurodevelopmental epidemic.” So what can be done to prevent this possible epidemic? In a 2011 study, Dr. Landrigan and colleagues say “the finding that children are uniquely vulnerable to synthetic chemicals indicates the need for fundamental revision of US chemical policy.” Talking to Medical News Today, Dr. Landrigan said that US policymakers would benefit from adopting a chemical testing policy similar to that enacted by the European Union (EU) in 2007. The Regulation on Registration, Evaluation, Authorisation and Restriction of Chemicals (resource no longer available at ec.europa.eu) (REACH), states that the responsibility of chemical testing should lie with the chemical industry, not the government. The chemical industry within the EU compiles data on the potential risks of commercial chemicals and sends this information to a central database of the European Chemical Agency in Helsinki, Finland. This data is then reviewed and presented to consumers and environmental professionals. Dr. Landrigan said that this policy is beginning to make a difference to the levels of chemical exposure in the EU. But there are some positive moves toward improved chemical testing in the US. The EPA recently announced it has awarded more than $3 million to researchers studying how chemical exposure can affect brain development. According to Lek Kadeli, of the EPA’s Office of Research and Development: “By better predicting whether chemicals have the potential to impact health and human development, these grants will not only advance the science necessary to improve chemical safety, but protect the wellbeing and futures of children in this nation.” Dr. Landrigan said research such as this is very valuable to the future of chemical testing. “There is always need for more research. To carry out chemical testing you need to know what you are looking for, and it is the research that tells us what to look for,” he explained. Dr. Landrigan believes that awareness as to how chemical exposure impacts brain development has improved in the medical world over the past 10-15 years. “I think 10 or 15 years ago, it wasn’t widely appreciated how vulnerable a fetus is in the womb. The brain and other organ systems are still going through the most rapid and complex changes of their development,” he told us. However, he noted that awareness within the general public is an area that needs more focus, and health professionals can play a very important role in increasing awareness among populations that are vulnerable to chemical exposure. “The three groups of doctors that really need to be aware of these issues are people that are OB/GYNs (obstetricians/gynecologists), pediatricians and family doctors – who are seeing both pregnant women and young children. Most doctors now counsel women about not drinking alcohol during pregnancy, not smoking and making sure they get enough folic acid in their diet. Now they need to add environmental warnings to that.” According to the ATSDR, there are a number of ways that vulnerable individuals can reduce their risk of chemical exposure. Pregnant women are advised to avoid painting, as paint contains a variety of chemicals that can be absorbed through the skin. Dr. Landrigan told us that both women and children should also be aware of moving into older properties that may be decorated with lead paint. “We have a big problem in the US with lead paint, so I would advise people to be very careful if they are moving into a house or an apartment that was built before the mid-1970s. They should get it tested for leaded paint.” The use of pesticides should also be avoided during pregnancy. When gardening, pregnant women are advised to wear gloves to avoid potential contact with pesticides. Dr. Landrigan noted that women should also take their diet into consideration when it comes to chemical exposure during pregnancy. Although it is important that expectant mothers include fish in their diet, some fish may contain high levels of chemicals. Dr. Landrigan explained: “It is very important that pregnant women eat fish because the omega-3 fatty acids in fish are very good for infant brain development. But that said, women need to know that not all fish are equal. Some have higher levels of PCP (pentachlorophenol) and mercury while others do not.” The ATSDR state that fish lower in mercury include shrimp, trout, crab, calamari and wild Alaska salmon. Furthermore, Dr. Landrigan said pregnant women should eat organic foods when they can afford to do so. “Very big studies have shown that people who eat organic food have 90% lower levels of pesticide in their bodies than people who eat normal pesticide-treated food,” he added. These tips may help to reduce chemical exposure. However, given the number of everyday products that these substances are in, it may be impossible to completely eliminate exposure to potentially harmful toxins. But with the EPA funding more research into how these chemicals impact brain development, changes to US chemical policy may be just around the corner. As Dr. Landrigan and colleagues have previously stated: “Creating a new chemical policy explicitly protective of health could prevent disease and dysfunction in childhood and across the lifespan, reduce health and education costs, increase national productivity, and promote better health and well-being for all Americans.” The ATSDR have published information on how to reduce exposure to chemicals.
<urn:uuid:11fbe427-396f-427c-b047-7347866be922>
CC-MAIN-2023-50
https://www.medicalnewstoday.com/articles/273331
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00241.warc.gz
en
0.958961
2,053
3.515625
4
India has been witnessing a spate of month-long farmer protests across the country, particularly in the national capital, against the recently introduced farm bills by the central government. One of the major reasons behind these agitations, including calls for repealing the law, is that farmers were not actively involved in the policymaking cycle of these laws, which they deem as unjust, and only catering to large corporate houses. Agriculture, even with declining shares in India’s gross domestic product (GDP), plays a crucial role in the country’s overall economic and social well-being. There is still a large dependency on this sector for income, employment and national food security, with around 59 percent of the country’s total workforce employed in agriculture. This workforce not only includes farmers, but also farm labourers and those employed in agriculture-dependent industries and services, for instance the textile or sugar processing industries. In such a context, agriculture cannot be viewed as farming alone. Instead, it must be viewed as a holistic agriculture value-chain (AVC) system, which includes farming, aggregating, processing, and retailing. Agriculture cannot be viewed as farming alone. Across this system, there are multiple actors (farmers, traders, retailers, and so on), variables (climate, market prices, and so on), and institutions (seed, fertiliser and other input companies, regulatory bodies, and so on) involved, resulting in dynamic relationships between and within these groups. However, often, these relationships are not taken into account when making policies, just as critical perspectives like those of farmers are discounted. This leads to increased power imbalances between actors, with marginal and smallholder farmers getting excluded from the AVCs. Moreover, it weakens the adoption of policies, technologies and practices necessary for strengthening AVCs overall. It is this exclusionary approach that has led to the largest agrarian protest the country has seen in recent memory. What we need instead are collaborative and inclusive multi-stakeholder partnerships and discussions, so that all actors in the AVC can benefit from policies. Understanding agricultural value-chains in India AVCs in India, though centred around farmers are influenced by multiple actors at every stage from the production of a commodity on a farm to its final purchase by a consumer. These different actors range from market actors such as wholesalers and agribusinesses to policy- and research-based stakeholders. The latter includes different agriculture institutes established under Indian Council of Agricultural Research (ICAR), extension services like Krishi Vigyan Kendras (KVKs), and consumers. In simpler terms, farmers are embedded in larger systems of activities and relationships. And all actors in any AVC, along with farmers, need to work together for its smooth operation. This is because all of them have different expertise, viewpoints and specialised roles that can complement each other, and address the constraints and opportunities that AVCs face. Disregarding any perspective can lead to the failure of even well-intended interventions. This article, using two examples from Sikkim and Telangana, looks at what we can learn from including multiple perspectives when strengthening any agricultural value-chain. Sikkim: The mountain perspective Sikkim is a small eastern Himalayan mountain state nestled in Northeast India, which in 2003 passed a resolution to completely transition to organic farming. Twelve years later, in 2015, it became India’s first fully organically farmed state. In fact, this achievement was possible largely due to the inclusive, multi-stakeholder governance it employed in adopting its organic policy. The state used a phased approach to transition from conventional agriculture to organic farming. It focused on involving and aligning stakeholders from the production, technical, policy and marketing activities of the AVCs with the organic mission. First, the agriculture and horticulture government departments and extension officers held a series of workshops and training sessions with local panchayats and the farming community under the Sikkim Organic Mission (SOM) to get producers—the main actors—vested in the programme. Next, the government controlled the supply of pesticides and chemical fertilisers into the state, pushing for the use of only organic manure since 2003. The state government also bore all the costs associated with the organic certification process, so that all of its farmlands could be organically certified. The Sikkim government got multiple service providers to focus on marketing which helped organic growers receive better prices. Additionally, since Sikkimese farmers traditionally grew a large number of their crops organically, shifting to organic farming practices was easier for the local growers. On the marketing side, the government got multiple service providers—Sikkim State Co-operative Supply and Marketing Federation Ltd (SIMFED), North Eastern Regional Agricultural Marketing Corporation Ltd (NERAMAC), Justrop Organic Sikkim—to focus on actively marketing and spreading awareness about the different organic produce grown in Sikkim. These helped organic growers across the state receive better prices for their produce. It was also beneficial because these organisations worked directly with the growers, helping them improve their agri-management practices. Further, the organic mission collaborated with banks like National Bank for Agriculture and Rural Development (NABARD), that supported the creation of Farmer Producer Companies (FPCs) for local growers in East and South Sikkim. In this way, the SOM actively involved multiple stakeholders along the value-chain, so that they could complement one another’s expertise and function towards achieving 100 percent organic status. And the instances when they failed to do this, local growers did not end up adopting the intervention. For example, in the case of large cardamom, the government established auctions in order to make the cardamom market more organised and to help in price protection for farmers. However, although large cardamom fetched farmers higher prices in government auctions, they continued to sell to local village-based traders instead. This is because there was a lack of trust, awareness, and information about the new system; there were delays in payment; the auctions were held at a long distance from the farms; and, farmers had limited knowledge of online banking transactions, which was necessary to participate in the auctions. Selling locally, or to collectors who came directly to their farms to buy the cured produce, was preferable. Unlike the auction which was dependent on digital banking, collectors came to remote farms where accessing banking facilities like ATMs or online transactions was extremely difficult; and, they paid in cash which is a major advantage for small farmers. The auction intervention failed to become popular because the government assumed certain farmers’ needs, and failed to understand and integrate their complete perspective in designing what was a technically well-established system. Telangana: The plains perspective As an agrarian state, Telangana is in complete contrast to Sikkim. Unlike Sikkim, which mainly focuses on marketing high-value cash crops owing to lower yields in mountain regions, Telangana produces paddy in large quantities. In 2020, there was a steep fall in prices of a high-value fine variety of rice called Sannalu. Policymakers in Telangana had recommended that farmers grow Sannalu, as it commands a higher price in comparison to the regular coarse variety that was being cultivated and sold. However, this intervention did not pan out because the quantity of fine variety grown exceeded the procurement and processing capacity of the rice mills. On a single day, the capacity of tractors in Miryalaguda—the hub of the local rice industry—exceeded 3,000 tractors, as against the actual capacity of 1,500 tractors per day. The mills were not prepared for procuring, storing, and processing such large inflows of fine variety as they were not active participants of the planning process. This led to a situation where instead of selling at prices of approximately INR 1,800 and above, farmers were forced to sell at INR 1,400 or even less per quintal. Further, there were long waiting periods for the trucks carrying the harvest—up to four days—to reach the selling point. During this time, large quantities of rice got damaged, further depressing the prices. Such situations often deter farmers from shifting to newer or better crop varieties. Given the variety of stressors facing AVCs, it is important to engage all actors for designing and adopting sustainable solutions. These are just a few examples that point to the importance of including diverse perspectives of multiple actors when it comes to developing any agricultural value-chain. Given the variety of climatic and non-climatic stressors that AVCs will continue to face, it is important that we actively engage all actors for designing and adopting sustainable solutions. Collaboration can address complexity better than any individual stakeholder can on their own. One way to do this is by creating multi-stakeholder platforms. These platforms can range from informal governance structures focused on a single sector with a defined geographic scope, to global, formal networks trying to address a wide range of issues. These platforms can be short-duration, multi-stakeholder capacity building and experience-sharing workshops like those used in Sikkim, or a smartphone-based app or social media group that shares timely, credible information to members. Dr Reddys Foundation for instance, (where I work), has developed a community platform called MITRA, which acts as a bridge between farmers and other powerful AVC actors in relaying information. It includes content on best agricultural practices, climate-friendly interventions, farm mechanisation, improved irrigation and water management techniques as well as digital and financial literacy, among other information. Such platforms not only relay information but also take critical feedback from farmers when developing and promoting interventions. This is particularly beneficial, given that agriculture-related information and knowledge is otherwise typically disseminated only through government extension agents, without much room for two-way communication. Enhanced communication through multi-stakeholder platforms can promote mutual understanding between actors, create a shared vision, help support innovations, and also prevent possible bottlenecks and conflicts that can threaten the smooth functioning of the AVC. Such platforms help actors voice their concerns which can make value-chain collaborations more inclusive and productive. Disclaimer: Dr Reddy’s Foundation supports IDR for research and dissemination of underserved themes in the social sector. - Learn more about the organic farming policy of Sikkim. - Explore this guide on multi-stakeholder partnerships across sectors. - Read this paper on integrating a value-chain approach for sustainable planning of a niche crop in Indian Himalayas. - Read this article on why farmers in India are protesting. - Register for this massive open online course designed by the United Nations on strengthening multi-stakeholder engagement.
<urn:uuid:8b0d167a-80bb-42f3-b1a7-139426e6b8aa>
CC-MAIN-2023-50
https://idronline.org/why-we-must-listen-to-farmers-agriculture-value-chains/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100769.54/warc/CC-MAIN-20231208180539-20231208210539-00107.warc.gz
en
0.952072
2,218
2.75
3
Homozoology: The study of the behavior, structure, physiology, classification, and distribution of gays. The term was recently coined by Guy Social host Jonathan Winkles and has thus become the newest area of study by gay scientists as well as straight scientists who like putting things they don't understand into categories for easy stereotyping. The Obvious Ones: Bear: A bear is a gentleman or beast that projects rugged masculinity with broad features and dense hair. They may appear intimidating but when approached with respect, they can be quite cuddly. Habitat: Northern and western mountain rangers in North America, bars titled "The Eagle." Cub: A younger bear. Simple. Traits of a bear still apply. Otter: Bears and otters share similarities in hair structure, with otters dense hair patterns on the arms, chest, abs, and legs. They always have more body hair than the average gay creature. Unlike bears, otters poses a more streamline body structure, with more slender, toned features. This allows an otter to swim confidently in the local stream or ocean near a nude beach. Silver Fox: A draw dropping ratio of sexiness to age defines the silver fox. The other prominent feature is their hair, as silver foxes sport a distinct grey and/or salt-and-pepper color. Some silver foxes also feature toned musculature with chiseled facial bones. Regardless of stature, there's always something about a silver fox that really rustles your jimmies. Habitat: Instagram See also: Anderson Cooper Wolf: Mysterious and elusive. Not much is known about the wolf in terms of personality. They tend to be lean and toned if not muscular with some hair across the body. However, their enigmatic personality seems to defy categorization (so we gave them one) as they appear to have lots of sex but also study philosophy in their spare time. Pup: When one looks up at your with his big brown eyes and wiggles his booty, you can't help but go, "awwww." Homosexuals may also pretend to take on the personality of a puppy which begs the question, "Who's a good boy?" Habitat: dog parks and puppy pens. Queen: The center of attention and the one everyone flocks to for gossip or leadership. She commands respect. A queen the life of the party in both a figurative and literal sense. Her presence at the party keeps things energetic and full of life. A hive needs a queen to maintain population and activity level because in all honestly, if she wasn't there waiting for her time to perform, you'd probably turn in early and watch Netflix. The Less Obvious Ones: Twink - Baby Kangaroo. Slightly awkward, naturally hairless, and knobbly, the twink enters this world like a baby kangaroo. Soon they shall embark on a journey of discovery and sexual awakening. Habitat: Wandering around, wide eyed at their new, gay world. Exploiting social media to the fullest extent. Note: some twinks stay in this primary stage for a significant portion of their life, making classification of the species difficult. What would they be? Naked mole rat? Sphynx cat? Dolphin? Then what happens when they workout? Ugh, science is hard. Twunk - Juvenile Kangaroo. Midstage between a twink and a hunk. Once the twink desires to leave twinkdom, they begin to workout and let their hair grow. Thus, they enter this stand of their Pokemon evolution. Habitat: Gym every other day or so, Australia. Jock - Kangaroo: The true ones don't skip leg day. Containing muscles you didn't even know existing, the jock is a spectacle of nature. Their muscle density ratio allows for impressive shows of strength like lifting their entire body by their tail. If you piss them off, they will fight you. Habitat: Twice a day at the gym and Australia. Circuit - Drone: The circuit gays comes by the hundreds of thousands to a singular area, performing ritual dances and performances to communicate with others, similar to their bee counterparts. The hive has many layers and rooms, similar to the homosexual party. Many drones bumbin' in da club flock around the queen bee, the life of the party. Habitat: dark, cramped spaces with sticky substances on the walls and floor, also Fire Island. Disclaimer: this article is written in jest. These categories do not define the people in which they define. Homozoology is not an exact science. Class dismissed.
<urn:uuid:d9b024ae-f640-4989-bd61-d943244550c7>
CC-MAIN-2017-51
https://www.guysocial.com/guy-blog/2017/7/27/homozoology
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948513784.2/warc/CC-MAIN-20171211164220-20171211184220-00479.warc.gz
en
0.951066
954
2.6875
3
|Brown tree snake and Green anole| |black: range of Squamata| Their skins have overlapping horny scales. They also have movable quadrate bones, which make it possible to move the upper jaw relative to the braincase. This is particularly visible in snakes, which are able to open their mouths very wide to accommodate comparatively large prey. Evolution[change | change source] Squamate fossils first appear in the early Jurassic, but a mitochondrial phylogeny suggests that they evolved in the late Permian. The evolutionary relationships within the squamates are not yet completely worked out, with the relationship of snakes to other groups being most problematic. From morphological data, Iguanid lizards have been thought to have diverged from other squamates very early, but recent molecular phylogenies, both from mitochondrial and nuclear DNA, do not support this early divergence. Because snakes have a faster molecular clock than other squamates, and there are few early snake and snake ancestor fossils, it is difficult to resolve the relationship between snakes and other squamate groups. Evolution of venom[change | change source] Venom in the families Caenophidia, Anguimorpha, and Iguania evolved once, then the three families diverged. All three lineages share nine common toxins. The fossil record shows that the divergence between anguimorphs, iguanians, and advanced snakes dates back roughly 200 MYA to the Upper Triassic/Lower Jurassic. Different toxins have been recruited from different proteins and are diverse as the functions themselves. Natural selection has driven the diversification of the toxins to counter the defences of the prey. Venom genes form large multigene families, and evolve by protein evolution. This leads to a diversification of toxins that let sit-and-wait predators attack a wide range of prey. Taxonomy[change | change source] Classically, the order is divided into three suborders: - Suborder Iguania (the iguanas and chameleons) - Suborder Scleroglossa - Suborder Serpentes (the snakes) - Suborder Amphisbaenia References[change | change source] |Wikispecies has information on: Squamata.| - Kumazawa, Yoshinori (2007). "Mitochondrial genomes from major lizard families suggest their phylogenetic relationships and ancient radiations". Gene 388 (1-2): 19–26. doi:10.1016/j.gene.2006.09.026. PMID 17118581. - "Lizards & snakes alive!". American Museum of Natural History. http://www.amnh.org/exhibitions/lizards/snakes/world.php. Retrieved 2007-12-25. - Fry B.G. et al. 2006. Early evolution of the venom system in lizards and snakes. Nature 439:584-588. - Fry B.G. et al. 2009. Evolution and diversification of the toxicofera reptile venom system. Journal of Proteomics 72:127-136. - Fry B.G. 2005. From genome to "venome": molecular origin and evolution of the snake venom proteome inferred from phylogenetic analysis of toxin sequences and related body proteins. Genome Research 15:403-420. - Fry B.G. et al. 2008. Evolution of an arsenal. Molecular & Cellular Proteomics 7:215-246. - Calvete J.J. et al. 2009. Venoms, venomics, antivenomics. Febs Letters 583:1736-1743. - Barlow A; C.E. Pook; R.A. Harrison and W. Wuster 2009. Coevolution of diet and prey-specific venom activity supports the role of selection in snake venom evolution. Proceedings of the Royal Society B-Biological Sciences 276:2443-2449.
<urn:uuid:5b2bd3df-5e96-44d1-bcb7-1aaac215c30a>
CC-MAIN-2016-40
https://simple.wikipedia.org/wiki/Squamata
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738659865.46/warc/CC-MAIN-20160924173739-00118-ip-10-143-35-109.ec2.internal.warc.gz
en
0.818791
830
3.34375
3
This column is one in a multipart American Libraries series that explores the library profession’s relationship to sustainability. Academic librarians have a notable opportunity to take the lead in ensuring reliable information enters the hands of community members, including leaders and activists. One area for improvement is the topic of sustainability—an issue not just for those interested or working in the sciences, but one for every living, breathing being. Libraries can move toward providing a fact-based voice in fighting climate change in their communities. One way to do this is by more proactively collecting and disseminating information to stakeholders involved in local sustainability efforts. A recent study from Lisa Dilling and John Berggren at the University of Colorado finds, “there is substantial capacity to provide the needed data, modeling, and knowledge, but … stakeholders may be encountering barriers in locating data, finding experts, or simply knowing whom to contact as a first step.” Libraries can curate and actively market meaningful data and resources to those seeking information. Building a knowledge base As a first step, libraries may want to consider hosting a digital forum where community members and external partners can contribute relevant material. These partners can include local watershed councils, municipalities, and nongovernmental organizations, among others. An excellent example of a university-sponsored digital forum is Yale Climate Connections. This nonpartisan initiative acts as an informational conduit to the world of climate change. Rich stories are told through articles, radio, video, and webinars and act as a constructive catalyst for community change. Librarians can also create LibGuides that are regularly updated with groundbreaking studies. A dynamic, highly localized LibGuide that includes your university’s faculty and student research and a list of local sustainability partners can assist those participating in the climate conversation by keeping them current on regional initiatives. The LibGuide can be populated by actively engaging with departments involved in climate change research and adding papers or findings through your library’s institutional repository. After implementing these two initiatives, there are still other ways to become more proactive in sustainability efforts. Strengthening your library’s ties to environmental student groups can mobilize youth voices and amplify your efforts. Including campus environmental projects as part of your resources can serve as an important reminder of the practical value behind initiatives. According to an article by Sara Meerow, John Nordgren, and Missy Stults in Environmental Science and Policy, distributing regional case studies to interested parties may also be beneficial in helping leaders and activists decide on best practices for their communities. Your creativity and community’s unique circumstances can be a guide for the efforts you undertake at your library. Disseminating the information By establishing relationships with interested stakeholders and local organizations, the library can develop a knowledge base that can be useful to university board members, elected officials, and business leaders. This information should include comparative data to show how other communities across the state and nation have become more resilient in the face of climate change. Once gathered, the information needs to be promoted and disseminated to be truly useful. Initially, getting information into the hands of the activists working within and on behalf of the community is important. One way to promote this information is by offering regular, regionally focused programming on climate change and sustainability. This creates a pathway for strengthening public awareness and provides a channel for actively marketing this curated information. These resources can also be regularly promoted via email newsletters, social media, and local media outlets. By empowering the public with factual and relevant information, it is more likely to be accessed when it’s most needed. For instance, at city council meetings, community activists can refer to the latest findings or reports related to any votes or proposals being discussed. When businesses are considering new initiatives, interested residents could send the information to the project managers or board of directors to help them consider more sustainable options. Strengthening the voice of a community takes both determination and courage—and as academic librarians, we are armed with an incredible arsenal of resources to do just that. By ensuring trusted information on climate change and sustainability gets distributed to those within your community, all will benefit. Resources to Help Create a LibGuide Many governmental websites are going through changes with the new US presidential administration, so creating PDF copies of the information is advisable in case is lost. - Environmental Protection Agency (EPA) - Greenbiz.com, a site geared toward sustainable business practices and corporate social responsibility - Intergovernmental Panel on Climate Change (IPCC), and its Data Distribution Centre - National Aeronautics and Space Administration (NASA) Global Climate Change Resources - National Centers for Environmental Information (NCEI) - National Oceanic and Atmospheric Administration (NOAA) - University of Michigan’s Center for Sustainable Systems, a comprehensive online repository of annually updated fact sheets on topics such as climate, energy, food, and water
<urn:uuid:2be4214b-b031-4f01-ac45-7ccb28aad71d>
CC-MAIN-2018-13
https://americanlibrariesmagazine.org/blogs/the-scoop/strengthening-voice-sustainability/
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648594.80/warc/CC-MAIN-20180323200519-20180323220519-00179.warc.gz
en
0.92681
998
2.59375
3
Agriculture in Goa is one of the important economic activities in the state. Located between the Arabian Sea and the Western Ghats, Goa faces problems for enough cultivable land to feed its own population.The coastal areas are exposed to salinity and do not qualify as good agricultural areas, while the inland areas are not productive enough. So for its day-to-day needs of agricultural produce like vegetables, Goa is dependent on Karnataka andMaharashtra. However, approximately one-third of the total land in Goa falls under forest areas and yields substantial profits. The government, however, has done much to improve and develop agriculture in Goa to make it more productive, thus enabling the farmers to get a better return for their labor. Rice and fish being the staple diet of the people, paddy becomes the principal crop in the scenario of agriculture in Goa. The important crops, apart from paddy, are ragi, maize, jowar, bajra and pulses. Cash crops like coconut, cashew-nut, arecanut, mango, jackfruit, banana, pineapple are also grown in abundance. Cashew is an important crop in Goa. A kind of intoxicating drink called Feni is produced from cashew. Sugarcane cultivation has been taken up only recently and a sugar factory has also been set up in Goa. A variety of mangoes are grown in Goa. Some of the famous Mango varieties are mancurade, mussarade, fernandine, xavier, alfonsa, colaco. There are two varieties of jackfruit grown here namely kapo (hard) and rasal (soft). The vegetables that form a part of the agriculture in Goa are brinjal, lady's fingers, radish, cucumber, pumpkins, drumsticks, breadfruit and different varieties of gourds. Sweet potatoes, chillies, onions are also available. Paddy being the principal crop of Goa, it is grown in two seasons, namely Kharif or sorod and the rabi or vaingan. The monsoon crops are called the kharif crops and the winter crops are called rabi crops. The main sources of irrigation for winter crops are the nallahs, rivers and streams, tanks, wells and canals. Crops grown in the Kharif season consist of paddy, ragi (locally called nachani) and some pulses. Crops grown in the rabi season are comprised of paddy, pulses like horse-gram (kulith), black gram (udid), a variety of beans and some vegetables. The forest produce too makes up a significant part of the agriculture in Goa. The Government forest area is approximately around 1224.38 sq. kms, besides this, the forest land owned by private people and institutions is around 200 sq. kms. The important forests products are bamboo canes, Maratha barks, chillar barks and bhirand. The area planted under forest is 1424.38 sq. kilometers. Last Updated on: 20th March 2013
<urn:uuid:533d5d25-001f-4a91-8303-c432828ead33>
CC-MAIN-2015-22
http://www.mapsofindia.com/maps/goa/goaagriculture.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207932705.91/warc/CC-MAIN-20150521113212-00263-ip-10-180-206-219.ec2.internal.warc.gz
en
0.942267
649
2.953125
3
In February, after almost two years worth of six-hour workdays, nurses at the Svartedalens elderly care facility in Gothenburg, Sweden went back to eight hour shifts—despite recently published research showing the benefits of the shortened workdays. The City of Gothenburg didn’t extend the experiment in part because funding ran out. It cost about 12 million krona ($1.3 million) to hire the 17 extra staff members needed to fill the gaps created by shorter work hours. The city had only budgeted for two years, and legislators said it would be too expensive to implement the project across the entire municipality. So, for now, the project has come to an end. Yet, there are longer term savings the study didn’t take into account. Working shorter hours resulted in healthier workers, researcher Bengt Lorentzon found in a new paper. “They were less tired, less sick, had more energy coming home and more time to do activities,” said Lorentzon. Specifically, the nurses took fewer sick days than they did when working longer, eight hour days. They also took fewer sick days than nurses in the control group. In fact, they took fewer sick days than nurses across the entire city of Gothenburg. Overall, they took 4.7% fewer sick days over the period of the experiment, while nurses in the control group took 62.5% more sick days over the same time frame. Nurses who worked fewer hours took less unexpected time off, too. While the study found health and productivity benefits, it didn’t measure the potential long term cost savings of healthier nurses. But one thing is clear, Lorentzon says: These improved attitudes and health led to higher quality care at the nursing home.In general, the working population of nurses in Sweden are in worse health than the average Swede. The women in the facility have higher body mass indices than the average worker, for example. While the study didn’t run long enough to fully measure health effects of shorter days, the research indicates nurses working only six hours will experience permanent health benefits, resulting in savings. “The satisfactory blood pressure is slightly lower for nurses at Svartedalens and the reference facility in comparison to the normal value for all professional women,” the study found. Healthier employees spend half as much on health care, a new study published in Mayo Clinic Proceedings found. Looking at 10,000 employees at a health system in Florida, researchers found that those who were in “ideal” cardiovascular health, using the American Hearth Association's Life’s Simple 7 measurement , spent $4,000 a year less on health care costs than those in “poor” heart health. “A more complete analysis [of Sweden] would include the upside of having done it,” said Eduardo Sanchez, one of the authors of the American study and Chief Medical Officer for Prevention at the American Heart Association. “The question is what were they measuring in terms of cost and what was included and what wasn’t included?” The Svartedalens experiment didn’t calculate the health savings cost of healthier nurses at all, let alone consider long term savings. The nurses working six hour days reported having more energy and less stress during the trial. Sanchez points to research that’s found that people who feel good about their employer deliver better results at work. “You’re going to be a better nurse when you have good feelings about your employer,” he said. Other Swedish municipalities have started their own experiments on workforces with high burnout and poor health, but short-term costs remain their ultimate nemesis. Also, some studies conducted before the Gothenburg trial had less encouraging results than those at Svartedalens. But even more daunting is the political reality facing such projects: The Left Party, which is behind the move away from 40 hour weeks, got only 6% of the vote in Sweden’s last general election. Conservative politicians have already expressed opposition to the shortened workday, and even tried to shut down the Svartedalens experiment one year into its tenure. In the U.S., some companies spend hundreds of dollars per employee on workplace wellness programs, hoping to save money on healthcare while maintaining productivity, albeit with the understanding that the eight-hour day should be viewed as a minimum at best. Maybe the solution isn’t step challenges and diet contests, but shorter workdays.
<urn:uuid:bf669c3d-959a-4aab-9865-d1d4ee697da9>
CC-MAIN-2019-09
https://www.newequipment.com/plant-operations/how-six-hour-workday-actually-saves-money
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247479885.8/warc/CC-MAIN-20190216045013-20190216071013-00512.warc.gz
en
0.970183
934
2.84375
3
Aleppo, Syria’s largest city, is in the grip of the country’s civil war. Government attack helicopters and fighter jets circle the city’s skies as rebel factions entrench themselves in Aleppo’s old town and sections of the city’s suburbs. The regime of Syrian President Bashar Assad has dispatched armored columns to flush out insurgents, not unlike its recent crackdown on rebel fighters in pockets of the capital Damascus. One rebel commander in Aleppo told the U.K.’s Daily Telegraph that the fight for Syria’s commercial capital, a city of 2.5 million people, would last months. Rebels are stockpiling medical supplies and munitions, while the U.S. State Department warned of a potential massacre. A pro-government newspaper promised the “mother of all battles.” Until recently, Aleppo was not one of the major theaters of the Syrian conflict. But it is no stranger to war. With a history as ancient as Damascus — considered to be one of the longest continuously inhabited cities in the world — Aleppo has been won and lost by a succession of empires, sacked by myriad invaders and reduced to rubble by epic earthquakes. That it still stands, and is, indeed, with its thousands of old limestone houses and winding old streets, a UNESCO World Heritage Centre, is testament to the richness of its past and the resilience of its people. From its early origins, Aleppo was a place where people grew wealthy. Cuneiform tablets from roughly four thousand years ago tell of a settlement called ‘Halabu’ — eventually Aleppo — that was even then a center for the manufacture of garments and cloth. Located not far from the Mediterranean Sea on one side and the river valley of the mighty Tigris and Euphrates on the other, the city found itself in the middle of ancient Egyptian and Hittite trade routes. The Seleucids, a Greek dynasty descended from one of the lieutenants of Alexander the Great, developed the area further, while certain colonnaded avenues and courtyard homes in Aleppo today bear the tell-tale signs of Roman craftsmanship and Hellenistic urban planning. Following the advent of Islam and into the medieval era, Aleppo became a hub of the Silk Road, a giant entrepot pooling in all the riches of China and India for buyers further west, north and south. Aleppo’s many caravanserais and bath houses bubbled with the chatter of different tongues; by the 16th century, numerous European merchant houses had set up shop to try to get a piece of the action. When one of the witches in Shakespeare’s Macbeth speaks of a sailor’s wife — “Her husband’s to Aleppo gone, master o’ th’ Tiger” — the English audience at the time would have been aware of that faraway city’s allure and majesty. Aleppo’s many-layered past and cosmopolitan identity is chiseled into its very architecture. The city’s Great Mosque and Citadel — a towering edifice on a hilltop at the heart of Aleppo — were statements of medieval Turco-Arab might erected atop earlier Roman and Byzantine structures. Well into the 20th century, the city remained home to a diverse mix of faiths and denominations. It always had a prominent, flourishing Jewish community — which, for some six centuries, zealously guarded one of the most famous and venerated copies of the Hebrew Bible, now known as the Aleppo Codex. In the city’s outskirts, sits the Church of St. Simeon, a 5th century Byzantine ruin built around the supposed site where Simeon, an ascetic Christian saint, perched himself atop a pillar for 37 years, choosing, as the 18th century British historian Edward Gibbon put it, “the celestial life.” But while Aleppo’s history was so indelibly shaped by this intermingling of cultures, it was a hardly a bastion of peace. The city was on the frontlines of the Crusades, ever threatened by Frankish crusader mini-states further to the west. In 1119, an army comprising Aleppans, Kurds and Arab tribesmen annihilated a whole Crusader force in a battle remembered by Latin chroniclers as Ager Sanguinis — “field of blood.” The Aleppans’ Turkic commander, though, didn’t consolidate his gains and died later in alcohol-induced indolence. For centuries thereafter, Aleppo was a prize competed over by various warring Turkic and Arab dynasties. In 1400, the Mongol warlord Timur overran the city. One chronicler described the raid “like a razor over hair” and “locusts over a green crop.” Timur, according to accounts, piled high a mountain of thousands of skulls outside the city gates. Aleppo endured, and would go on to be ruled for nearly four centuries under the suzerainty of the Ottoman empire and later, in the early 20th century, by French imperial mandate. It remained a busy mercantile center. In his famed guidebook to the Middle East, 19th century European traveler Karl Baedeker frowned on the city’s petit bourgeois character: “The Aleppines do not enjoy a very high reputation and the expression ‘the Aleppine is a coxcomb’ is proverbial.” French colonial administrators attempted to solidify their control and counter nascent Syrian nationalism by playing the territory’s major centers — Aleppo, Damascus and what was then known as the Alawite state — against each other. That legacy of gerrymandering and divisive rule, while a failure, has had a lasting effect: it can be seen in the contemporary politics of Syria and much of the region — the vicious sectarianism, the delicately forged (and oft-cynical) alliances linking interest groups and whole communities to the regime in power. The Assads, who are Alawite, long trusted in the support of Aleppo’s Sunni business elites. With that consensus unraveling, though, what happens in this historic city, a veritable global crossroads, may be a bellweather for the future of Syria and the Middle East as a whole.
<urn:uuid:33286a88-ae1a-48cf-895c-6a641ea608f5>
CC-MAIN-2017-22
http://world.time.com/2012/07/27/brief-history-of-aleppo-a-great-world-city-now-in-the-grip-of-war/?iid=ent-category-mostpop2
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607811.15/warc/CC-MAIN-20170524093528-20170524113528-00032.warc.gz
en
0.952432
1,301
3.125
3
Cognitive Skills Tutorial Program STICKYBEAR EARLY LEARNING ACTIVITIESReturn to Search Results Record 88 of 114.« Previous Product Next Product » Stickybear Early Learning Activities is an academic and pre-reading skills tutorial program designed for children from pre-kindergarten through first grade who have learning or developmental disabilities. The program features six separate learning activities with animation and sound which provide skills practice in the alphabet, counting, writing, shapes, opposites, and colors. The Alphabet activity provides a word, letter, and animation for every letter of the alphabet. The Counting activity helps children master the numbers 0 through 9 while they discover the effect of adding and taking away. The Writing activity introduces children to writing numbers and letters with ease. The Shapes activity helps children identify basic shapes found in everyday scenes. The Opposites activity helps children build word recognition and vocabulary skills, and the Colors activity allows children to color, identify and name colors found in scenes. Students can learn through prompted direction or through the discovery method by selecting either structured or non-structured mode of play. The school versions and above also come with freely reproducible lesson plans and manipulative masters. Available languages are English and Spanish. COMPATIBILITY: Windows or Macintosh. SYSTEM REQUIREMENTS: For hybrid direct drive: Windows 2000, XP, Vista or 7, CD ROM drive and from 150 to 260 megabytes (MB) of free space on the hard drive; Mac OS X v.10.4 or above, PowerPC or Intel processor, CD ROM drive, and from 150 to 260 MB of free space on the hard drive. For stand alone CD: Windows 2000, XP or Vista, CD ROM drive, 32 MB of RAM; Mac OS 9, PowerPC, CD ROM drive, and 32 MB of RAM. Notes: Windows is a registered trademark of Microsoft Corporation. ** Macintosh is a registered trademark of Apple Inc. ** Intel is a registered trademark of Intel Corporation. Price: 699.95 to 59.95. This product record was updated on October 6, 2011. This product is available from: Optimum Resource, Inc.1 Mathews Drive, Suite 107 Hilton Head Island, South Carolina 29926 Telephone: 888-784-2592 or 843-689-8000. Link to more products from Optimum Resource, Inc. Riverdeep, Inc.100 Pine Street San Francisco, California 94111 Telephone: 800-825-4420 or 415-659-2000. Fax: 866-627-1403 or 415-659-2020. Link to more products from Riverdeep, Inc. « Previous Product Next Product » Return to Search Results Record 88 of 114.
<urn:uuid:021b2814-9be9-4f97-b435-bdc829065872>
CC-MAIN-2015-06
http://www.abledata.com/abledata.cfm?pageid=19327&top=11450&ksectionid=19327&productid=89782&trail=0&discontinued=0
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115855561.4/warc/CC-MAIN-20150124161055-00135-ip-10-180-212-252.ec2.internal.warc.gz
en
0.840159
568
2.96875
3
City and suburban agriculture takes the form of backyard, roof-top and balcony gardening, community gardening in vacant lots and parks, roadside urban fringe agriculture and livestock grazing in open space. Urban agriculture is an important source of environmental and production efficiency benefits. The use of best management practices (BMPs) and integrated farming systems protect soil fertility and stability, prevent excessive runoff, provide habitats for a widened diversity of flora and fauna, reduce the emissions of CO2, increase carbon sequestration, and reduce the incidence and severity of natural disasters such as floods and landslides. Decorative or scenic agriculture landscapes, waterways, and buildings provide numerous benefits including recreational activities, scenic views, and open space qualities. These positive benefits often merit assistance to producers such as technical and financial and other public support.
<urn:uuid:12f5645c-17c1-46ed-80b4-a782263f08c8>
CC-MAIN-2021-10
http://www.backyard-farming-today.com/wp/2021/02/19/what-is-urban-agriculture-3/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178368687.25/warc/CC-MAIN-20210304082345-20210304112345-00451.warc.gz
en
0.922602
159
3.421875
3
co-authored with Arun Agrawal Everyone agrees that innovation and its diffusion of innovations are key to managing climate change. Meeting the climate challenge in the coming decades will be fundamentally more difficult if we fail to come up with new, more cost-effective technologies. But global efforts to innovate and share existing innovations fall woefully short of what is needed. Nowhere is the gap between need and reality more glaring than for innovations related to adaptation. Members of climate change community who care about innovation have had their sights firmly fixed on technological innovations on the mitigation side: to reduce and capture emissions, to geo-engineer climate, to make energy use more efficient, to meet global energy needs through alternative and advanced renewable sources ... the list goes on. The focus on technology and mitigation is necessary. But it has been so wholehearted that adaptation-centered innovations and institutional changes necessary to meet climates challenges have received short shrift. It is not even that examples of such innovations do not exist. There are many success stories of on farm innovations by farmers to increase productivity and carbon sequestration. But these have not been studied systematically for greater generalization and are ineligible for carbon finance under existing mechanisms. Community-based forest conservation has great promise for sequestering carbon and providing livelihoods. But governments have limited incentives to adopt them broadly, and financial support for such policy efforts has declined substantially in the past decade. These examples point to how existing knowledge can be used to create effective institutions and innovations for adaptation. They also raise major questions and challenges: How can we design institutions that align public and private incentives to adapt- from the global to the local level? What are the lessons for climate change of policies that have successfully achieved very long term goals? How do we encourage the mega-improvements needed to protect ecosystems and simultaneously increase the productivity of agriculture and insure reliable water supplies? On what basis do we begin to compare the relative costs of different forms of adaptation? Even as we grope towards answers to these questions, a major infusion of creative energies and financial incentives is necessary even to ask many of the other right questions about adaptation and institutional innovation. Focusing on and investing in better knowledge of appropriate adaptation and institutional innovations is a fundamental need today - we must meet this need now to reduce the misery and damage that committed levels of climate change will otherwise inflict upon humanity.
<urn:uuid:d088d265-f15a-4f79-a1f7-b378be76545f>
CC-MAIN-2018-13
https://blogs.worldbank.org/climatechange/innovative-adaptation
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257646875.28/warc/CC-MAIN-20180319101207-20180319121207-00569.warc.gz
en
0.94195
479
2.859375
3
The pilot taxied out for take off on strip 36. Run up and pretakeoff checks were normal. Full power was applied for take off and the aircraft accelerated. However, by two thirds to three quarters of the 1000 metre length the aircraft was not airborne. The pilot applied back pressure on the control column and lifted off. The airspeed then decreased so the pilot lowered the nose. The left wing dropped and the aircraft descended, striking the ground nose down and overturning. The pilot had inadvertently taken off in strong gusty downwind conditions. Significant Factors The following factors were considered relevant to the development of the accident: 1. The pilot did not pay adequate attention to ascertaining the direction of the wind. 2. The pilot attempted a take off in strong downwind conditions.
<urn:uuid:13735f9e-8ff9-4061-adde-aff9f4b7c777>
CC-MAIN-2021-39
https://www.atsb.gov.au/publications/investigation_reports/1995/aair/199500431/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057417.10/warc/CC-MAIN-20210923044248-20210923074248-00235.warc.gz
en
0.969553
157
2.578125
3
The Power of Personality and Character: How They Impact Your Life Personality and character are two important concepts that play a crucial role in shaping who we are and how we interact with the world around us. While the two terms are often used interchangeably, they are distinct aspects of human nature that have different origins and implications. Today, we’ll explore what personality and character are, how they differ from each other, and why they matter in our personal and professional lives. What is Personality? Personality refers to the unique set of characteristics, traits, and patterns of behavior that define an individual’s identity and shape how they perceive and interact with the world. These traits can be broadly categorized into five dimensions known as the Big Five: extraversion, conscientiousness, openness, agreeableness, and neuroticism. Extraversion refers to the extent to which a person is outgoing, assertive, and sociable, while conscientiousness reflects their degree of organization, responsibility, and dependability. Openness refers to the level of creativity, curiosity, and intellectual curiosity, while agreeableness indicates how cooperative, compassionate, and empathetic a person is. Finally, neuroticism reflects the degree of emotional instability, anxiety, and vulnerability to stress. The origins of personality are a matter of debate among psychologists, with some suggesting that it is largely genetically determined and others emphasizing the role of environmental and social factors. However, most researchers agree that personality is a relatively stable trait that remains largely unchanged over time and across different situations. What is Character? Character, on the other hand, refers to the moral and ethical qualities that define a person’s values, beliefs, and actions. These qualities include honesty, integrity, responsibility, kindness, fairness, and compassion, among others. Unlike personality, character is largely shaped by our upbringing, culture, and life experiences, and it is not necessarily a stable trait. Rather, it is something that can be developed and improved over time through conscious effort and practice. Character is often thought of as a key component of ethical leadership, as leaders with strong character are more likely to act in ways that benefit their organizations and society as a whole. For example, a leader with strong character is more likely to prioritize honesty, transparency, and fairness in their decision-making, and to act in the best interests of their stakeholders rather than their own personal gain. The Relationship between Personality and Character While personality and character are distinct concepts, they are closely related and can influence each other in significant ways. For example, a person with a naturally high level of agreeableness may be more likely to develop strong moral and ethical values and to act in ways that reflect those values. Similarly, a person with a high level of conscientiousness may be more likely to prioritize responsibility and dependability in their relationships and work. At the same time, personality traits can also have negative implications for character development. For example, a person with a high level of neuroticism may be more prone to anxiety and stress, which can make it harder for them to act in a calm and rational manner in challenging situations. Similarly, a person with a high level of extraversion may be more likely to prioritize their own needs and desires over those of others, which can make it harder for them to develop strong moral values. Why Personality and Character Matter Personality and character are both important aspects of who we are and how we interact with the world, and they can have significant implications for our personal and professional lives. For example, a person with a naturally outgoing and assertive personality may be more likely to excel in sales or marketing roles, while a person with a high level of conscientiousness may be more suited to project management or accounting. Similarly, a person with strong character is more likely to build strong relationships, earn the trust of others, and achieve long-term Ultimately, whether we’re striving to build successful careers, cultivate meaningful relationships, or simply live fulfilling lives, the importance of personality and character cannot be overstated. By recognizing and harnessing the unique strengths and qualities of our personalities, and by actively working to develop our character traits and live by our values, we can create the foundation for a life of purpose, happiness, and success. See you soon, until then let us continue to develop our character! Also, you may use the donation link below to contribute to our work. Blessings always.
<urn:uuid:599893e7-4dd2-4ad9-b2f4-d43151bb7dbe>
CC-MAIN-2023-23
https://hannahmoments.com/2023/04/04/the-power-of-personality-and-character/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644574.15/warc/CC-MAIN-20230529010218-20230529040218-00790.warc.gz
en
0.953403
900
3.390625
3
BERKELEY SPRINGS - Solar energy is the basis for all life on earth. For thousands of years the sun's energy has been used to warm dwellings (solar thermal), however solar electricity (photovoltaic or PV) is a relatively new technology. In the past 10 years the solar PV industry has exploded in the global market and has been growing rapidly in the U.S., including West Virginia. Today solar is one of the fastest growing industries in the country and is creating thousands of new jobs. Solar energy strengthens the utility grid by producing energy where it is used and at times of peak demand. How Solar PV Works Solar panels have no moving parts, so they require virtually no maintenance. Simply mount the panels out in the sun, hook up the wires and collect power. No need to add fuel. No one knows for sure how long a solar panel will last because many of the very first photovoltaic panels are still producing power today. Most panels come with a 25-year performance warranty and are expected to produce energy for up to 40 years. Solar PV requires good Southern exposure for the system to operate efficiently. The roof of an existing building is typically the first choice, but panels can also be mounted on ground support structures as well. Many people believe that "solar doesn't work in West Virginia because there isn't enough sun." The truth is West Virginia has 95 percent as many hours of sun light annually as Florida. Solar panels collect DC electricity that flows through an inverter, is changed into AC current, and used to power appliances and lights in your home. When you are generating more electricity than your home is using, the excess power travels back out through your meter and generates a credit against future use. The design, size and cost of a solar photovoltaic power system depend on a few simple factors: How much energy in kilowatt-hours (kWh) is used per month; what sun exposure or solar resource is available at your location; and how much are you able to invest? Solar is modular - you can begin with a small system and add to it over time. Solar is more affordable than ever When you install solar, there are a couple ways that you can offset the installation cost and over time actually make money by generating energy. Your utility bills are reduced by the amount of energy you produce. When these systems are incorporated into the home mortgage, it becomes that much more affordable. Currently there is a federal tax credit of 30 percent of the total cost of your Solar PV with no cap. West Virginia and most of the surrounding states offer incentives or tax credits as well. You can view all state incentives at www.dsireusa.org. For electricity generated by Solar PV there is an additional benefit - Solar Renewable Energy Certificates (SRECs). In many states, the Renewable Portfolio Standard (RPS) requires electricity suppliers to secure a portion of their electricity from solar facilities connected to the local distribution grid in that state. For every 1000 kWhs of energy produced one SREC credit is created, which can be sold to electric suppliers to meet their solar RPS requirement. SRECs are designed to provide solar PV owners with an economic incentive to investing in solar electric systems. In summery, solar energy is more affordable than ever with a return on investment for solar energy often in excess of 6 percent. Saving money isn't the only reason to utilize renewable energy; we have a responsibility to be good stewards of the earth and its abundant natural resources. Every day the sun produces 6,000 times more power than the world's population consumes. By harvesting just a portion of this energy, we can provide clean power for generations to come. - Submitted by Colin J. Williams, vice president of sale & marketing for Mountain View Solar
<urn:uuid:be3359dd-f6f7-4850-b6c1-88a33043ab86>
CC-MAIN-2015-35
http://www.journal-news.net/page/content.detail/id/578430/Invest-in-solar--power-your-dreams.html?nav=5000
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065534.46/warc/CC-MAIN-20150827025425-00079-ip-10-171-96-226.ec2.internal.warc.gz
en
0.953823
774
3
3
How can businesses use their influence to build sustainable industries? Mining urban waste streams for valuable resources is one way to start, said sustainability leaders at this year’s Eco Action Day. Singapore may be a resource-constrained economy, but there are rich resources in the waste we throw away, said Amy Khor, Senior Minister of State for the Environment and Water Resources, at this year’s edition of the annual industry roundtable event Eco Action Day hosted by imaging and electronics company Ricoh. Speaking about Singapore’s waste management systems at the event last month, Khor said: “There is potential for us to turn our country into an urban mine.” Urban mines refer to the continuous waste that is generated in the country that can be harvested and upcycled, thus reducing reliance on natural mining resources. An example of this is the rare and precious metals that can be recovered from the 60,000 tonnes of electronic waste that is generated in the country annually. Forty-eight sustainability leaders from the government, civil society and corporate sectors were present at the roundtable to discuss how industry innovation could contribute to sustainable development, an aim embodied by Goal 9 of the Sustainable Development Goals (SDGs), “Industry, Innovation and Infrastructure”. Introduced by the United Nations in 2015, the SDGs are a collection of 17 global goals that seek to protect the environment and establish a poverty-free and prosperous world by 2030. Rethinking product designs and business models There was broad recognition among experts of the need for industrial production and waste management to shift towards a circular economy, which is an economic concept that champions material recovery at the end of a product’s lifecycle to channel resources back into production. Otherwise, experts warned, Singapore will face increasing waste accumulation and problems related to high rates of disposal, and potentially face the same urban waste management nightmare as Hong Kong. Industry leaders agreed that innovation in product designs and business models was crucial to achieving the circular economy. One major obstacle to sustainability endeavours in the industry is planned obsolescence, a common and conscious business strategy to design cheap and short-lasting products in order to increase sales, shared Maggie Lee, market transformation manager at World Wide Fund for Nature, Singapore.
<urn:uuid:15860b56-62c0-474d-a54c-e6c837b9ad7e>
CC-MAIN-2021-31
https://aclima.eus/can-we-turn-singapore-into-an-urban-mine/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155268.80/warc/CC-MAIN-20210805000836-20210805030836-00512.warc.gz
en
0.93492
467
2.765625
3
I look at the Book of Ether as reconciling the DNA issues of our day - once we move past the former assumptions of the early saints (including the leaders). The record states quite clearly that the Nephites were religious separatists by nature, so it's perfectly reasonable to assume that the Lamanites outnumbered them so heavily (despite disproportionate death in warfare) because the Lamanites assimilated some of the remnants of the Jaredite nation that didn't die in the great battle that destroyed the nation itself. That assimilation could even have been of a more numerous people (like the Nephites and the Mulekites), if the Jaredites lacked social cohesion and wanted social stability they had lost. In fact, I think that is the most logical conclusion, since even AFTER the Nephites assimilated the Mulekites the Lamanites STILL outnumbered them substantially. There's no reason to demand that they all were wiped out in that battle (Coriantumr's claim notwithstanding) - that the Jaredites were any different than the Nephites (or any other hyperbolic historical description of total annihilation) in that regard. Many could have fled and refused to gather, joining a separate civilization instead. The Nephites certainly wouldn't have distinguished them as anything other than "Lamanites" in their records - since "Lamanites" meant "anybody not with us" right from the start. Therefore, the "Lamanites" (as defined expansively by the Nephites themselves) not only would have outnumbered the Nephites, but they easily could have been primarily of Jaredite descent - and the description of the Jaredites leads me to believe they originated in the Upper East Asian steppes. (Hugh Nibley also reached this conclusion in "The World of the Jaredites".) If that is true, the "Lamanites" would have been primarily of Asian descent quite quickly in their existence, which the current DNA research indicates is the best possibility.
<urn:uuid:7b2c3de5-8834-468d-ba58-e4bae10fe720>
CC-MAIN-2015-32
http://thingsofmysoul.blogspot.com/2011/03/book-of-mormon-actually-supports-latest.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981525.10/warc/CC-MAIN-20150728002301-00175-ip-10-236-191-2.ec2.internal.warc.gz
en
0.972795
403
2.5625
3
Tuning of the Native American Style Flute The Native American style flute is a musical instrument of elegant simplicity. This simplicity can be viewed as one of its more attractive characteristics. Because of its simplicity this instrument is accessible to the casual player. But with simplicity come certain limitations. I would like to address some of the unique characteristics of the Native American style flute so that you better understand your instrument. I am not a musicologist or trained musician. What I will try to do is present some common sense knowledge gained from my experiences making and playing the Native American style flute. Tuning, as we now understand it, was not an issue for the Native American Flute maker/player. The Native American was interested only in making sounds that felt right to him. He did not measure the tonality of the instrument by any external standard other than his own ear. It was literally a matter of anything goes as long as I like it. In the late twentieth century the Native American flute began to gain acceptance beyond the confines of the Native community. In the hands of Native and non-Native flute makers and players the Native American style flute began a period of rather rapid development – one could perhaps say transformation. The most fundamental change that took place was to bring the Native American flute into conformity with Western standards of tuning. Various makers adopted the mode one minor pentatonic scale as appropriate for the music they felt was being expressed through the Love flute. The resulting instrument had five tone holes and could play a five-note scale plus the first note of the second octave (six notes total). When a sixth hole was introduced it became possible to easily produce two scales on the same flute – mode one and mode four. So now you had a Native American flute that could play two different five-note scales. Native American style flute makers also began to tune their flutes using the modern concert standard of 440 HZ for the key of A above middle C on the piano. The next challenge that flute makers took up was to craft a flute that could play a full chromatic scale. A chromatic scale divides the octave into twelve semi tones (notes) or half steps. There is an equal interval between each note. When you play a six hole Native American style flute you can easily play six of these notes by just lifting one finger after another as you go up the barrel of the flute. In between those notes are other notes. You can think of them as hidden notes. You can see this illustrated on my website on the Playing the Flute page. See hidden notes. You can also see this when you look at a piano keyboard. On the keyboard you have a sequence of twelve notes that repeat over and over. Five of the notes in the sequence are the black keys. Think of these five black keys as a pentatonic scale (which in fact they are). Now think of the white keys as the hidden notes between the pentatonic scale notes. With a full chromatic (twelve note) scale at a player’s disposal it is possible to play music in diatonic (seven note) as well as pentatonic (five note) scales. You can also play in music in major as well as minor scales. The twelve notes of the chromatic scale are each a half step apart. The thirteenth note up or down the scale is the fundamental (starting note) again but one octave higher or lower than where we started. By convention the interval between one note and the next higher or lower note was divided into 100 cents. To make playing a chromatic scale on the Native American style flute possible the flute maker must tune the flute so that the hidden notes are playable. These notes are played by using a technique called cross fingering and half holing. These notes must be in tune so that there are 100 cents between each adjacent note. Remember, these are the notes in between the notes in the two available pentatonic scales. This challenge has been met with the possible exception of the two notes that lie between the fundamental and the first open holed note. Half holing (rather than cross fingering) must be used to produce these two notes. As anyone who has tried can tell you it’s not easy (or in my case possible) to sound both of these notes distinctly. So we have an almost but not quite full chromatic scale available on a modern, well tuned Native American style flute. Good enough to have a lot of fun with for sure. Temperature and Tuning in the Native American style Flute The Native American style flute has another limitation. It has become standard practice for flute makers to tune their flutes at an ambient temperature of 72 degree Fahrenheit. A limitation of the Native American style flute is that once it is made its tuning cannot be adjusted. If the flute is made to be in tune at 72 degrees this means that it will be out of tune if the air temperature is higher or lower than 72. Warmer air temperatures will make the flute play sharp. Cooler temperatures will make the flute play flat. A change in temperature of 10 degrees higher or lower than 72 will make a flute play about 15 cents out of tune one way or the other. The length of the barrel of the flute determines the tuning of the fundamental note of the flute. A longer flute barrel lowers the tone. A shorter barrel raises the tone. As a matter of convenience we will say that the barrel length is measured from the splitting edge at the front of the true sound hole to the foot end of the flute. The standard metal concert flute has a telescoping slip joint on the barrel of the flute. This joint allows the musician to lengthen or shorten the overall length of the barrel. This changing barrel length allows the user to adjust the flute to compensate for differences in temperature. The Native American style flute (with certain rare exceptions) does not have this capability. It is solid wood from one end to the other with no telescoping joint. Breath Pressure and the Tuning of the Native American style Flute. Another factor effecting the tuning of the Native American style flute is that the tone of the flute is sensitive to the breath pressure going into the flute. When the flute maker tunes a flute at a particular breath pressure it will be in tune only when played at that pressure (and at 72 degrees). If the flute player uses a higher breath pressure the flute will play sharp (it will also be louder). If he uses less pressure as he blows into the flute the flute will play flat (and softer). How sharp or flat depends on the amount of deviation in pressure from that at which the Love flute was originally tuned. Most Native American style flute makers tune their flutes using a breath pressure that is just short of a pressure that makes the tone of the flute start to sound ragged. This is usually (depending on the configuration of the flute) a rather high pressure and a rathere loud sound. Beyond this pressure the purity of the note will start to break up. With more pressure the flute will jump octave. Does it matter if the Native American style Flute is sharp or flat? Not if you are playing solo. Remember the flute is in tune with itself. That is, the notes are in a correct harmonic relationship with each other. So if the flute is sharp all the notes are sharp to the same degree. If flat all the notes are equally flat. So there is no dissonance. In any case, few amateur musicians are able to detect (much less be bothered by) minor deviations from 440 HZ. So, even if the Love flute is playing a little sharp or flat it won’t be noticed. The tuning of the Native American flute becomes important when it is played ensemble with other instruments. If you are out of tune relative to your guitarist friend to the extent of 15 cents there will be a noticeable cacophony between the two instruments. A guitar can be tuned. So the guitarist can tune his instrument so that it is in tune with your flute. This solves the problem on one level. Now you are both either sharp or flat to the same degree. The two instruments are in harmony with each other. The Native American style flute is basically a solo instrument. Therefore, there has been little pressure from flute players for a tunable instrument. When the flute is played ensemble with other instruments the flute is usually the lead instrument and the other musicians tune to the flute. There are three ways of making a Native American style flute that can be tuned. I have already mentioned the first – a telescoping barrel. The second method is to make a flute with an adjustable splitting edge. An adjustable or movable splitting edge is one that can be adjusted forward or backward along the length of the flute. This makes the barrel of the flute (the distance from the end of the flute to the splitting edge) longer or shorter. The third way is to make a flute with an adjustable chimney. A chimney that can be made deeper of shallower will provide some range of tuning.
<urn:uuid:a73f5307-eda2-4480-9248-d1ecea67d044>
CC-MAIN-2014-42
http://www.atflutes.com/index.php?option=com_content&view=article&id=10&Itemid=90
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507450097.39/warc/CC-MAIN-20141017005730-00024-ip-10-16-133-185.ec2.internal.warc.gz
en
0.965456
1,911
3.5
4
Pacific Cod, Gadus Macrocephalus, is the Second Largest Groundfish Fishery, Next to Walleye Pollock, in Alaska (Fig. 1). In 2013, the Gulf of Alaska, Aleutian Islands, and eastern Bering Sea total catch was 318,867 metric tons with a gross value of nearly $390 million. Management of this important resource is conducted through stock assessments using age-structured models in which fish length-at-age data are key to estimating mortality, recruitment, and recommended harvest levels. Hence, the accuracy of fish age determination of Pacific cod is critical. The reliability of Pacific cod age determination, however, has recently been called into question. An inconsistency has been identified between mean length-at-age from age-length samples taken in scientific surveys and the yearly progression of modal lengths representing some dominant cohorts (from the 1996 and 1999 year classes for example), specifically for Pacific cod that are 2 to 5 years old. Otoliths, which are used to determine the ages of fish, are paired calcium carbonate structures located in a fish’s inner ear in which annual growth rings (growth zones) are deposited (Fig. 2). Counting otolith growth zones to estimate fish age is analogous to counting tree rings. Unfortunately, however, compared with more than 30 other species aged each year by the Alaska Fisheries Science Center’s (AFSC) Age and Growth Program, age determination of Pacific cod is relatively difficult and sometimes uncertain. For some Pacific cod otoliths, multiple interpretations of growth zone patterns are possible, resulting in more than one potential age estimate per specimen (Fig. 3). Further, the precision of repeated otolith age readings is lower for Pacific cod than many other species. Therefore, in such problematic situations, a second independent method of estimating fish age is necessary to validate or confirm the fish’s age. In other species, a number of age validation methods have been used, such as bomb-produced radiocarbon, radiometric methods, or marginal increment analysis. But for a variety of reasons, these popular methods are not appropriate or have yet to be used for Pacific cod. The Age and Growth Program recently initiated a novel alternative strategy to validate age determination methods and estimate ageing inaccuracy for Pacific cod. This approach to age validation relies on a geochemical technique using stable oxygen isotope signatures in otoliths. In marine carbonates, the δ18O concentration is typically inversely related to water temperature. Therefore, δ18O measured from the center to the edge of an otolith represents temperature changes over the fish’s life history and inversely mirrors annual seasonal temperature cycles. Counting the number of peaks in δ18O cycles (maxima) provides an alternative method for determining the fish’s age. Our primary goal was to use this alternate method to validate traditional Pacific cod growth zone-based ages and to estimate the probability of inaccurately ageing specimens. In the simplest sense, we compared the number of counted growth zones to the number of δ18O maxima. If the number of counted growth zones agreed with the number of δ18O maxima, strong support was given to the age determination methods (interpretation of growth zones) and estimated ages. A secondary goal was to describe the relationship between otolith δ18O and water temperature. We used Pacific cod otoliths collected in the eastern Bering Sea (EBS) during AFSC assessment surveys conducted in 2006-2010 (Fig. 4). Prior to our study, specimens were aged for stock assessments by the break-and-bake method, the standard Pacific cod age determination method used at the AFSC. In this ageing method, otoliths are cut with a diamond saw transversely through the core and toasted in a small oven for about 5 minutes at about 400ᵒF. This preparation increased the contrast of translucent zones, dark zones thought to be deposited when winter temperatures are lowest, which were then counted. In the present study, the specimens were aged again independently by three additional age readers from the Age and Growth Program, resulting in a total of four sets of independent ages. On images photographed with a high resolution microscopy system, all readers recorded the location of each translucent growth zone they counted. We used Pacific cod 2 to 5 years of age due to the uncertainty of assigning ages to younger animals, and more specifically due to the mismatch between the mean size at age and modal length frequency progression. We randomly selected 40 Pacific cod specimens, each initially aged 2 to 5 years old, from the 2006-2010 surveys. Ten otoliths were taken from each age class, representing the 2004 and 2005 cohorts. This selection process based on age and cohort allowed us to evaluate age determination bias by estimated age. To generate a δ18O signature representing the life of each fish, careful microscopic and analytical procedures were necessary, requiring specialized high-resolution sequential microsampling and stable isotope mass spectrometry tuned to small sample mass. Prior to sampling for isotopic analysis, the remaining intact otolith of each pair was thin-sectioned by embedding it in plastic resin and making two transverse cuts with a diamond saw. The resulting thin sections were mounted on glass slides and polished to a thickness of 0.7 mm (Fig. 3). Images of the thin sections were annotated to show the specific growth zones counted most recently by the three age readers. This required that locations of the earlier counted growth zones in the break-and-bake preparations were translated to the new thin-section images. Next, to carry out the high-resolution sequential microsampling, we used a Carpenter Systems CM-2® micromilling instrument. This computer-controlled system (Fig. 5) allowed progressive sampling which started at the inner most area of the thin section and advanced to the otolith’s edge (Fig. 6). Each progressive milling was about 40 µm wide, 900 μm long, and 250 µm deep and produced calcium carbonate powder with an average mass of about 30 µg. The micromilling provided up to 45 samples in any single otolith and up to 9 samples per postulated year. In collaboration with scientists in the College of Earth, Ocean, and Atmospheric Sciences at Oregon State University, the oxygen isotopic composition of the milled calcium carbonate powder was analyzed by dual-inlet mass spectrometry using a Kiel III carbonate preparation system connected to a MAT 252 mass spectrometer. Results were reported in standard delta notation (δ18O ‰) relative to Vienna Pee Dee Belemnite (VPDB). Age validation requires comparisons of “true age” to the age estimated by the standard protocol of otolith growth zone interpretation and counting. To derive a true age, the δ18O signature of each otolith was first plotted sequentially by distance from the center of the thin-sectioned otolith to its edge. Next, the true age was determined by counting the periodic maxima in the sequence of δ18O measurements over the entire life span. Not entirely unexpected, some subjective interpretation of the δ18O results was necessary to define the periodic maxima. In doing so, the main considerations were 1) the variability (2 standard deviation (SD) error bars) of the δ18O data and whether the adjacent valleys and peaks were reasonably dissimilar (Fig. 7), and 2) if the peaks and valleys were defined by more than one δ18O data point. An offset between the location of potential annual growth zones and peaks in the isotope data may have existed. This is because the actual seasonality of growth zone deposition in the otolith may not have been understood correctly or because the spatial resolution of the milling may not have been high enough to avoid smoothing of theδ18O signal. Next, validation of the Pacific cod age determination methods was performed by comparing the number of δ18O maxima to the number of translucent growth zones originally counted in the break-and-bake otolith half. In total, 160 age estimates (4 independent readings x 40 otoliths) were compared to the true age for age validation and bias estimation. Ageing bias, the difference between the growth-zone age and the true age, was estimated by two methods. Each method treated the age data differently. The first treated this difference as discrete and assumed a multinomial distribution. The second treated the difference as continuous and assumed a normal distribution. We employed both methods because previous studies have often estimated ageing bias and error by the latter method. Both approaches yield similar expressions of ageing bias, which quantify the probability of an age reader assigning an age equal to the true age or to some other age. Our secondary goal required samples of otoliths paired with instrumental water temperature measurements. We used two sources of otoliths associated with known water temperature: 1) EBS and Gulf of Alaska adult Pacific cod that were collected during an archival (temperature and depth) tag-recapture study, and 2) juvenile (1-year-old) specimens collected in 2010 from the EBS. In the first case, the otolith thin sections were sampled for δ18O on the edge, corresponding to the most recently deposited material, and paired with temperature measured by the tag. In the second case, the otolith thin sections were again sampled for δ18O on the edge, but for these specimens the temperature was measured at the time of capture by instruments mounted on the trawl survey nets. These sources provided a broad range of measured temperatures and hence the ability to describe its relationship with δ18O in the otolith. Results & Conclusions Our primary goal of confirming the accuracy of the growth zone counts was largely achieved, and some guidance in choosing the best interpretation also was provided. The sequential δ18O measurements demonstrated clear seasonal signatures (Fig. 7) which made this validation possible. The percent agreement between the growth zone counts and the number of δ18O maxima was 61.18%, the average coefficient of variation was 8.04%, and the average percent error was 5.69%. Considering specimens individually, specifically the locations of counted translucent growth zones with respect to δ18O maxima, provided results in greater detail. For example, Figure 7 shows four images of thin-sections annotated with the counted growth zones and their respective δ18O signatures. In three of these examples, the number of counted growth zones is equal to the number of δ18O maxima. Further, the locations of the counted growth zones and the locations of the δ18O maxima in the thin sections are generally similar (Fig. 7). Therefore, this adds confidence to our age validation. In approximately 39% of the specimens, where the counted growth zones were not equal to the number of δ18O maxima, new guidance was provided for correct interpretation of problematic growth zone patterns. For example, we learned that a dark zone sometimes occurs inside the first true annual zone and should not be counted (Fig. 7). Also, a dark zone between the first and second true annual zones often occurs and should not be counted. This is clearly the case in panel 3 of Figure 7 where a dark zone was counted, but did not co-occur with a δ18O maxima. These examples can now be applied to future age estimates in Pacific cod. Bias estimation considered the difference between true ages and ages derived from growth zones interpretation in the break-and-bake otolith. It was rare for an age reader to assign an age 2 years greater or less than the true age. Hence, there was a very small probability of bias by that degree (Fig. 8). In general, both the discrete-multinomial and continuous-normal approaches to estimating the probability of bias were similar (Fig. 8). Over all ages, there was a 64% probability that an age reader assigned the true age, with a 19% and 17% probability of assigning an age less or greater than the true age by 1 year, respectively (Fig. 8). The probability of bias at the ages of 2 and 3 years was also relatively symmetric about ±0 years, and the different estimation methods showed similar results. At these ages, there was approximately an 80% probability of assigning the true age, and about a 10% probability of assigning within 1 year of the true age (Fig. 8). At the ages of 4 and 5 years, age-specific bias estimates were less symmetric about ±0 years and the different bias estimation methods had more discrepancies. At an age of 4 years with the discrete-multinomial approach, the probability of assigning an age equal to the true age was about 32%, to 1 year greater it was about 37%, and to 1 year less it was about 30%. In contrast, the continuous-normal approach showed a much greater probability (~62%) of assigning an age equal to the true age. Further, in this approach the probabilities of assigning an age 1 year greater or less than the true age were very unequal, about 36% and 8% respectively. At a true age of 5 years, the probabilities differed slightly between the two bias estimation methods. Both methods indicated a 50% to 60% probability of assigning an age equal to the true age. The probabilities in both methods were near 0% of assigning an age greater than the true age. However, the probabilities of assigning an age 1 year less than the true age were about 42% and 30% for the discrete-multinomial and continuous-normal approaches, respectively. Also, the discrete-multinomial approach indicated a small probability of under-ageing true age by 2 years (Fig. 8). While a comparison between the two estimation methods was instructive, we suggest that the discrete-multinomial approach was more faithful to the nature of age data. The secondary goal of our research, to describe the relationship between otolith δ18O and water temperature, was very successful. The instrumental temperatures we had, whether measured at time of capture or from recording archival tags, demonstrated the strength of the relationship between δ18O in Pacific cod otoliths and water temperature (r2 = 0.74) (Fig. 9). In a related fish species, Atlantic cod (G. morhua), previous studies have also indicated that δ18O is a function of temperature. The δ18O signatures indicated that the growth zone-based ages were usually correct, i.e. validated. When the number of δ18O maxima was not the same as growth zone-based ages, valuable insights were provided to aid interpretation of the growth zones. The confirmed relationship between otolith δ18O and water temperature lent credibility to this age validation study.
<urn:uuid:61531113-466a-4fc4-bc83-75f2ea0c7d0e>
CC-MAIN-2022-27
https://www.fisheries.noaa.gov/feature-story/age-validation-pacific-cod-using-stable-oxygen-isotope-d18o-otoliths
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103034877.9/warc/CC-MAIN-20220625065404-20220625095404-00738.warc.gz
en
0.945103
3,045
3.0625
3
Archaeological finds show human presence in Indiana for over 3,000 years. The Indian tribes that inhabited this region, when the first Europeans arrived in the 17th century, were the Miami, Potawatomi, Wea and Kickapoo Indians. Frenchmen Jacques Marquette and La Salle were the first to explore the territory since 1670. The first settlements in the current state of Indiana were leather trader camps near Fort Wayne and Lafayette, built in 1720. In 1763, France ceded the territory to Great Britain. During the American Revolution, in 1777, British troops captured Fort Sackville, near Vincennes, near the Wabash River, a strategic point that ensured control of the northwest region. In 1779, George Rogers Clark’s ‘long knives’, a group of Virginians, took over Fort Sackville. In 1784 the men of this group founded Clarksville, near the Ohio River. In 1787, once the independence of the United States was consolidated, Indiana remained integrated into the northwestern territory. - See Countryaah.com for a full list of counties in Indiana. In Indiana, settlers had great difficulty building their settlements until General Anthony Wayne defeated local tribes in the Battle of Fallen Timbers in 1794. In 1800, Congress decided to admit Ohio as a state of the Union, and the rest of the Northwestern territory was officially called Indiana, or ‘Indian territory’. This region included, in addition to this state, the present states of Illinois and Wisconsin, and parts of Michigan and Minnesota. With the administrative reorganization of 1809, the territory of Indiana coincided with the current state. Between 1810 and 1812, the Indian tribes of southern Indiana helped the British in the war against the American colonists. The problems of these tribes began when the first governor of the territory, William Henry Harrison, tried to buy most of the land they occupied from the Indians. Although the Indians were defeated in 1811, in the battle of Tippecanoe, they continued to fight until 1813, when the Indian chief Tecumseh, leader since the beginning of the conflict, died in the battle of Thames. In 1816, Indiana joined the United States as a non-slave state. Settlers from the south and the states of Ohio, Pennsylvania, New York and New England, settled in Indiana, among them, the family of Abraham Lincoln, originally from Kentucky. The movement of the last Indian tribes to the north to allow the colonization of the territory ended in 1846. At a later stage, migrants arrived mainly from Ireland and Germany. Being a non-slave state, many people of color arrived in Indiana, who managed to escape from the slavery of the southern states. During the Civil War (1861-1865) about 200,000 inhabitants fought in defense of the Union. There were no battles in Indiana territory, although John Hunt Morgan’s Confederates occupied the town of Corydon in 1863, on their advance towards Ohio. After the war, Indiana developed industrially, especially in sectors related to the manufacture of machinery and the canning industry. Among the companies that emerged in this early phase of its industrial development were the Studebaker brothers’ factory, founded in 1852, which produced railway carriages, and the Van Camp canning company. However, it was the discovery of natural gas fields in 1886 that encouraged many companies to move to Indiana, including numerous glass factories. In Whiting, on the edge of Lake Michigan, Standard Oil built one of the largest refineries in the world in 1889. Car manufacturing has been one of the leading activities of the Indiana since Elwood Haynes in 1894 invented a gasoline-powered internal combustion engine. The proliferation of car factories during the early 20th century explains why one of the most popular car races of our day was inaugurated in 1908: the Indianapolis 500. The metallurgical industries have been one of the pillars of the state economy since the early twentieth century, especially since in 1906 the United States Steel Corporation inaugurated a blast furnace in Gary. The severe economic crisis of the 1930s obliged the diversification of the Indiana industry. The explosion of the Second World War ended that crisis, as it activated all sectors, both industrial and agricultural and mining. The opening of the canal, which allowed ships from the Atlantic Ocean to sail across the St. Lawrence River in 1970, has been a crucial factor in the state’s economic growth over the past few decades. - See ejiaxing.org for Indiana state facts, including geography, climate, flora and fauna as well as major cities. Indiana: places to visit The north-south crossing of the state is a source of surprise in a state that statistics present as one of the most industrial in the Union. In fact, the only truly industrial region is the north-west corner, sometimes referred to as ‘Calumet’, while the region as a whole is not lacking in natural attractions. For those who love water, Indiana has inexhaustible resources. In the north, hundreds of lakes attract fishermen and water sports enthusiasts. At its core, the Indianapolis region is lined with countless waterways crisscrossed by picturesque covered bridges. To the south, a thousand streams meander through the wooded hills and give Indiana a backdrop of serenity. The gigantic caves of Wyandotte and Marengo alone justify a visit to the region. If the capital Indianapolis, has about 850,000 inhabitants, most of the other cities look like large villages, which have a deep love for simple things, an attachment to traditions linked to the land. The traditionalist trend of Indiana is also manifested in the numerous reconstructions of the past, like the pioneer village of Conner Prairie, in Noblesville and the village of Nashville, in Brown County, in a green setting, its galleries of paintings and its exhibits of pottery stand next to old-fashioned shops. It is truly in the Middle West that the American Way of Life must be discovered. - See itypemba.com to learn specific information about Indianapolis Indiana. BLOOMINGTON – Lively and adorable, 53 miles south of Indianapolis is the home of Indiana University. The city focuses on Courthouse Square, surrounded by restaurants, bars and bookstores. OHIO RIVER VALLEY – From the Indiana border with Kentucky, Routes 56 and 156 follow the Ohio River through the towns of Rising Sun, Patriot, Florence and Vevey. These two roads are the best for visiting the river valley and the hilly area in the south of the state. The River Port of Madison is located 145km southeast of Indianapolis in one of the best preserved cities in the area. Among the buildings in the city, the Lanier Mansion, built in 1844 in the Greek revival style and the Shrewsbury-Windle House, built in 1849. In the center is the restored office of the frontier doctor William D. Hutchings. NEW HARMONY- The tree-lined town is a State Historic Site, with its 25 well-preserved buildings dating back to the Harmonist era, an inn and many well-kept gardens. These include the Labyrinth, formed by hedges in concentric circles arranged around a stone temple. INDIANA DUNES NATIONAL PARK – One of the most diverse ecosystems in the United States is found in Indiana Dunes National Lakeshore. Just a thirty-minute drive from downtown Chicago, this nature reserve occupies 25 miles along the shores of Lake Michigan. It offers natural environments such as, connected by scenic roads and a network of trails for hikers and cyclists. Tourist and Cultural Places – Among the many cultural institutions of Indiana, the main ones are: the Indiana State Museum, the Children’s Museum, Herron Museum of Art, the Civic Theater and the Indiana State Library, all of these are in Indianapolis, the Evansville Museum of Arts and Sciences, the Fort Wayne Museum of Art, the Snite Museum of Art at the University of Notre Dame, and the village that recreates the settlement of the plains pioneers in Noblesville. The most important art institutions in Indiana are the Fort Wayne Ballet, the Fort Wayne Philharmonic Orchestra, the Indianapolis Ballet Theater, the Indianapolis Opera, the Indiana Repertory Theater, and the Indianapolis Symphony Orchestra. There are also other symphony orchestras in other cities, State parks, especially Brown County, Indiana Dunes, McCormick’s Creek, and Spring Hill, are some of Indiana’s top tourist attractions; there are also sites of historical interest that pay homage to the pioneers of the state, or that commemorate places and personalities linked to the era of the US civil war. Curiosity– The most popular sports in Indiana are basketball, American football and motor racing. Basketball stands out for the quality of its college teams (Notre Dame and Purdue) and the professional team, Indiana Pacers. Every year the ‘Hoosier Hysteria’ takes place, a tournament where the basketball teams of the state schools compete against each other. In American football, the Indiana Colts compete in the professional league. The 500 Miglia has been held in Indianápolis since 1911, one of the oldest car trials.
<urn:uuid:46aab50d-fbf0-4a68-bdad-cfa7f301e444>
CC-MAIN-2022-49
https://www.indexdotcom.com/history-of-indiana/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710918.58/warc/CC-MAIN-20221203011523-20221203041523-00537.warc.gz
en
0.951398
1,910
3.796875
4
Answer the following problems problem 1) Describe the relationships between two tables in ms access? problem 2) Describe creating report using report wizard? problem 3) What is sorting records describe? problem 4) Describe the steps to insert, select and delete records in a MS-Access table? problem 5) What do you mean by E-R model? What are the components used to draw an E-R diagram? prepare down the advantage and disadvantage? problem 6) describe the various data models in RDBMS? problem 7) Describe the set operator? problem 8) Describe some built in function in details? problem 9) Describe the different database languages? problem 10) Describe the function of database administrator (DBA)?
<urn:uuid:7736c019-d8c7-40a6-854d-eac66ca9a3bf>
CC-MAIN-2017-04
http://www.mywordsolution.com/question/what-do-you-mean-by-e-r-model-what-are-the/98048
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00241-ip-10-171-10-70.ec2.internal.warc.gz
en
0.75974
160
3.21875
3
This is going to be a difficult article to illustrate, I thought to myself as I started to write this article for BAR. How do you illustrate something that isn’t there? This is an article about burials—or perhaps tombs would be more accurate. But they aren’t there!1 At least not at this time and place. The time is Iron Age I and Iron Age IIA—and even early Iron Age IIB. This is essentially the Biblical period. Iron I is usually denominated the period of the Judges, from about 1200 to the first half of the tenth century B.C.E. Iron Age IIA and the beginning of the Iron Age IIB cover the rest of the tenth century (the time of the United Monarchy) as well as the ninth and even the first part of the eighth century B.C.E. So we’re really talking about 1200 B.C.E. to the beginning of the eighth century B.C.E., a period of about 450 years. The place is (mainly) the highlands of ancient Israel, which includes the area from northern Samaria all the way south through Benjamin and Judah to the southern slopes of the Hebron hill country (but the phenomenon expands even somewhat beyond that).
<urn:uuid:40746585-447d-40b2-815a-2b575499812b>
CC-MAIN-2021-31
https://www.baslibrary.org/biblical-archaeology-review/39/4/5
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151866.98/warc/CC-MAIN-20210725205752-20210725235752-00361.warc.gz
en
0.962626
265
2.71875
3
Through the month of September, the microbiome scientific literature had some particularly interesting contributions related to human health. First up is a pair of papers on the significance of serotonin that’s made in the gut, linking it to host metabolic regulation; this is followed by a large study looking at the gut microbiota of infants born by Caesarean section (C-section); then, a study on the extent to which gut microbiota affects host gene regulation; and finally, the curious case of a man who regularly became drunk without consuming any alcohol – all because certain gut bacteria in his gut, which were linked to non-alcoholic fatty liver disease (NAFLD), produced alcohol from the carbohydrates he consumed. Previous work from Hsiao lab has found that certain bacterial species from the gut microbiome stimulate the hosts’s gut endocrine cells to produce serotonin.(And to clarify: this ‘peripheral serotonin’ is the same molecule as the serotonin produced in the brain, but it’s produced very differently.) In turn, more serotonin in the gut shapes the bacteria that thrive there. This new work from the lab singles out a particular species, Turicibacter sanguinis (linked to host metabolism),that uses serotonin to increase its own fitness in the gut environment. To date, we only have a basic idea of how microbiota perturbations affect host metabolism. In mice, scientists manipulated the gut microbiota and levels of gut serotonin to observe how the animals fared metabolically. The group found that the glucose homeostasis of the mice dramatically improved with these manipulations—ultimately implicating intestinal serotonin in the mechanism by which the gut microbiome influences host glucose metabolism. Scientists have amply demonstrated the microbiome differences between infants born by C-section and those born vaginally, yet the significance of these differences for health remain unclear. In particular, we are lacking mechanistic connections between the early-life microbiome and health. This large study took a close look at the microbiomes of babies born by C-section, describing them in unprecedented detail after both sequencing and culturing the microbes. The researchers identified some potentially worrying signs—virulence factors and the presence of antimicrobial resistance (probably typical of a hospital environment) in the microbiota—but it should be noted that the effects on infant health were not tracked in this study. The authors of this paper set out to demonstrate how microbes might change gene regulation in the host epithelial cells, which are in close proximity to intestinal microbes. They took colonic epithelial cells and added live microbial communities from healthy people to observe what happened with transcriptional regulation and chromatin accessibility in the host cells. Over 5000 host genes ended up changing their expression. Furthermore, the researchers used a manipulated microbial community as a proof-of-concept for how targeting a certain microbiota composition yields a particular gene expression profile. Non-alcoholic fatty liver disease (NAFLD) has been linked with gut microbiota changes—but this paper finally gets us closer to finding a causal link. After investigating a person with liver disease who would become alcohol-impaired without drinking (because his gut microbes fermented carbohydrates into alcohol), the scientists discovered that a large proportion of people with NAFLD have strains of ethanol-producing Klebsiella pneumoniae in their guts. Perhaps surprisingly, these alcohol-producing bacteria were able to induce NAFLD when transferred into mice. It’s possible that the identified strains of bacteria (or others) that produce ‘endogenous alcohol’ could turn out to be a risk factor for NAFLD.
<urn:uuid:98449e4f-f393-4cb2-aa75-8764b17c0867>
CC-MAIN-2022-05
https://www.microbiometimes.com/5-minute-microbiome-science-roundup-september-2019/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304835.96/warc/CC-MAIN-20220125130117-20220125160117-00535.warc.gz
en
0.945088
723
3.109375
3
INCOME TAX ADMINISTRATION IN NIGERIA (CASE STUDY OF KWARA STATE BOARD OF INTERNAL REVENUE) Taxation is the legal demand made by the federal government or the state government on its citizens to pay money income, goods and services. In less complex society in which government has duties and responsibilities, financial need of the government income greater consequently taxes – increase and their effect on the economy become more important. Thus among the traditional function of the government is the provision of the public goods i.e goods cannot be divided among the separate members of the society and which must be used or welfare of all people in the society. Among the goods services are maintenance of law and orders, defense against external aggression and control of business and trade to ensure social and economic justice. Moreso, this project work will be divided into five chapters. The first chapter which is the reintroduction, background to the study, statement of the problem, objectives of the study, significance of the study, scope and limitation of the study and definition of terms. Furthermore, the second chapter is centered on literature reviews which is the introduction assessable income or profit, total administration of income tax, capital transfer tax administration, while chapter three is research, methodology that is introduction, sample and sampling method, method of data collection and method of data analysis. The Chapter four of this project is centered on data presentation that is the introduction data presentation, and analysis. While the last Chapter five is centred on summary, conclusion, recommendation, contribution, to the filed of knowledge and references. TABLE OF CONTENT Table of content 1.2 Statement of the problem 1.3 Aims and objectives of the study 1.4 Significance of the study 1.5 Scope and Limitation of the study 1.6 Definition of terms 2.2 Ascertainment of Assessable income of profit. 2.3 Total income 2.4 Administration of income, Tax personnel income, Tax Administration 2.5 Capital Transfer Tax Administration 2.6 Capital Gain Tax Administration 2.7 Companies Income tax Administration 2.8 Petroleum Profit tax Administration 3.2 Research Method 3.3 Historical Background of the case study 3.4 Sample and sampling method 3.5 Method of data collection 3.6 Method of Data Analysis DATA PRESENTATION AND ANALYSIS 4.2 Data Presentation and data analysis 4.3 Research findings 5.0 Summary, Conclusion and Recommendation 5.2 Summary of Findings 5.4 Contribution of the study to the field of knowledge It is generally believed that taxation if the main sources of government revenue. The money realized from the tax is for the benefit of all and people must attain certain age before they can start the payment of tax. We can view tax as a compulsory payment or levy imposed on individual and firm by the government. It’s also made by the government on the citizen, non diplomatic residents and property owners within the country irrespective of the exact amount of services rendered to the tax payer in return. This chapter discusses tax revenue in Nigeria as well as the purpose of tax revenue. There are also property tax, i.e the tenement rather than on legal documents. The world “Income” does not have a specific meaning of definition. Economist define income as the sum total of earning of a government consumption – unit that can be separate during particular period and still have same net asset value in money terms at the end of the period as at the beginning of the period. Income from the factors of production i.e land, labour and capital can be categorized as follow for income tax purpose. The land receiver rent, labour receives wages and salaries while capital receive interest and entrepreneur receive dividends. The administration of income tax which is the topic of the project is on how the government administer the various types of taxes applicable to Kwara State are company income tax, capital gain tax, petroleum profit and purchase tax. There are various types of taxes. These are import and excise duties tax (this levied on goods important and export repectively). Exercise duties levied on goods produced within the country. Consumption tax (this is levied on consumers of goods and services). 1.2 STATEMENT OF THE PROBLEM The main problem to be addressed during the research work includes. What is the utilization of the income tax? What is the aims of government in generating income and tax administration in a country? How does administration of income tax services as (means) for the government? How is government able to generate income in Nigeria? In what ways does income and tax helps the country e.g Nigeria. AIMS AND OBJECTIVES OF THE STUDY The aims and objectives behind the study of income tax administration in Ilorin with particular reference to Kwara State board of Internal revenue. Firstly, form the following the role played by the tax collectors and tax payers in an economy and also to know the role played by the inspector of taxes in the collection of various taxes. Secondly to find out whether the adequate number of complete absence of qualified accountant in the staff of the tax authorities. Inadequate book keeping by the tax payer, legal tax allowance, illegal tax erosion. Illiteracy poor income tax authorities are responsible for the revenue realization from income tax. Thirdly to let people know the important of income tax administration and its contribution to the economy of Kwara State. Lastly to assist low tax payers and tax authorities have contributed to economy growth. 1.4 SIGNIFICANCE OF THE STUDY It is hope that the study with provide variable information on the function and operation for the benefit of the state. The study is therefore significance to the studies in the subject of income tax administration in Nigeria because if further helps in shading light and some relevant concepts. Methods of income tax would provide means of making amendment where necessary for efficiency and effectiveness in the country. Tax helps the government to generate revenue for the utilization of the state or country. 1.5 SCOPE AND LIMITATION OF THE STUDY This project is designed to research on income tax administration, in Kwara State with particular reference to board of Internal revenue and to find out how much revenue collected is been of utilized. Whether government of Kwara State is able to meet is target allowant and to survey and analysis as much as possible the system of revenue collection and enforcement procedure order the income tax management Act (ITMA) 1961 and the relevant Kwara State Law. And attempt has being made analysis the conservation both internal and external, it is intended also after which analysers to attempt to evaluate the effectiveness of the collection and enforcement procedure in Kwara State. The Scope of the Study has also included how the Kwara State Government administrative various types of income tax based on individual, company and partnership, the view reactions of various payer and problem associated with the tax collections. However, this project should be considered from one prospective only, being academic and making founding based on the responses of the respondents. The limitation to this study is that, in undertaking a research work in any field human endeavour one is usually failed with some constraint which this research work is not on exception, some of the obstacles are secret that is some information were branded “TOP SECRET” which means it is not mean for outsider consumption. Another problem encountered in the process of the research is the insufficient time giving for the writing and submission. Financial the research is another due to the fact that there was no enough financial research work cannot be intensified. However the objectivity of the analsis in the research work helps to compensate for the constraints enumerate above. 1.6 DEFINTION OF TERMS Income:- can be defined as money received during a certain period for work of enforcements, the income or output of a country always refers to the value of output during a specific or definite [period says one year calendar. TAX: Can be defined as a compulsory payment imposed on people living in an area environment or a country by the government in order to provide necessary things e.g goods road, hospitality, good electricity standard education etc. ADMINISTRATION: This can be defined as the organizational running of a business or system. The action of giving out or applying order of the government in power. LAND: Law as factor of production is a free gift if nature and is fixed. It is the oldest factor of production in the sense that, it had been on earth before man started working on it. Land does not include only the hard surface of the earth, but all other free gifts of nature like water, forest and minerals unlike other factors of productions, the supply of land is limited and its reward is rent. CAPITAL: May be view as wealth research or set aside for the production of more wealth as man made other factors of production includes physical cash, machinery, semi-finished goods and order equipment. Just like other factors of production, capital plays a crucial role in production of goods and services and its reward is interest. LABOUR: May be defined as both physical and mental efforts of man directed toward production. It is one of the variable factors of production. Labour as a factor of production involves human being who work on other factors of production like land and capital in order to produce goods. The reward for labour are salaries and wages..
<urn:uuid:93ee5b23-5bdc-4626-b1b7-2a2878bfa39e>
CC-MAIN-2021-39
https://researchwap.com/business-administration/pr6kDEX69idhqn
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060908.47/warc/CC-MAIN-20210928214438-20210929004438-00140.warc.gz
en
0.945417
1,954
2.71875
3
Cervicitis is infectious or noninfectious inflammation of the cervix. Findings may include vaginal discharge, vaginal bleeding, and cervical erythema and friability. Women are tested for infectious causes of vaginitis and pelvic inflammatory disease and are usually treated empirically for chlamydial infection and gonorrhea. Acute cervicitis is usually caused by an infection; chronic cervicitis is usually not caused by an infection. Cervicitis may ascend and cause endometritis and pelvic inflammatory disease (PID). The most common infectious cause of cervicitis is Chlamydia trachomatis, followed by Neisseria gonorrhea. Other causes include herpes simplex virus (HSV), Trichomonas vaginalis, and Mycoplasma genitalium. Often, a pathogen cannot be identified. The cervix may also be inflamed as part of vaginitis (eg, bacterial vaginosis, trichomoniasis). Noninfectious causes of cervicitis include gynecologic procedures, foreign bodies (eg, pessaries, barrier contraceptive devices), chemicals (eg, in douches or contraceptive creams), and allergens (eg, latex). Cervicitis may not cause symptoms. The most common symptoms are vaginal discharge and vaginal bleeding between menstrual periods or after coitus. Some women have dyspareunia, vulvar and/or vaginal irritation, and/or dysuria. Examination findings can include purulent or mucopurulent discharge, cervical friability (eg, bleeding after touching the cervix with a swab), and cervical erythema and edema. Cervicitis is diagnosed if women have cervical exudate (purulent or mucopurulent) or cervical friability. Findings that suggest a specific cause or other disorders include the following: Women should be evaluated clinically for PID (see Pelvic Inflammatory Disease (PID) : Diagnosis) and tested for chlamydial infection (see Chlamydial, Mycoplasmal, and Ureaplasmal Mucosal Infections : Diagnosis) and gonorrhea (eg, with PCR or culture—see Gonorrhea : Diagnosis), bacterial vaginosis (see Bacterial Vaginosis (BV) : Diagnosis), and trichomoniasis (see Trichomoniasis : Diagnosis). At the first visit, most women with acute cervicitis should be treated for chlamydial infection empirically, particularly if they have risk factors for STDs (eg, age < 25, new or multiple sex partners, unprotected sex) or if follow-up cannot be ensured. Women should also be treated empirically for gonorrhea if they have risk factors for STDs, if local prevalence is high (eg, > 5%), or if follow-up cannot be ensured. Treatment consists of the following: Once the cause or causes are identified based on the results of microbiologic testing, subsequent treatment is adjusted accordingly. If cervicitis persists despite this treatment, reinfection with chlamydiae and N. gonorrhoeae should be ruled out, and empiric treatment with moxifloxacin 400 mg po once/day for 7 to 14 days (eg, for 10 days) should be started to cover possible M. genitalium infection. If the cause is a bacterial STD, sex partners should be tested and treated simultaneously. Women should abstain from sexual intercourse until the infection has been eliminated from them and their sex partners. All women with confirmed chlamydial infection or gonorrhea should be tested between 3 and 6 mo after treatment because reinfection is common. Drug NameSelect Trade
<urn:uuid:cfb38ab8-9441-49bc-be94-49b5b0db9e79>
CC-MAIN-2018-05
https://www.merckmanuals.com/professional/gynecology-and-obstetrics/vaginitis,-cervicitis,-and-pelvic-inflammatory-disease-pid/cervicitis
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891980.75/warc/CC-MAIN-20180123151545-20180123171545-00303.warc.gz
en
0.85993
775
3.359375
3
Ancient Near East Images & Art Maps & Geography Mythology & Beliefs People in History Timelines & Charts David's kingdom had it's first major war with Moab (east of the Dead Sea). 2 Sam 8:2 Then he defeated Moab. Forcing them down to the ground, he measured them off with a line. With two lines he measured off those to be put to death, and with one full line those to be kept alive. So the Moabites became David's servants, and brought tribute. It is interesting that while David was a fugitive the people of Moab were friendly with him and offered him and his family refuge. David was a servant of the Lord and it was God's will that Moab become a vassal state with their own king, and paying tribute. Afterward David defeated Edom (south east of the Dead Sea) 2 Sam 8:14 He also put garrisons in Edom; throughout all Edom he put garrisons, and all the Edomites became David's servants. And the LORD preserved David wherever he went. There is not a lot of detail about this war but it occurred in the Valley of Salt (Arabah Valley) according to 2 Kings 14:7 and there was a severe slaughter. According to 1 Kings 11:15-18 Joab had to slay every male soldier in Edom, including the royal household. Only Hadad and a few servants escaped to Egypt. A garrison was left to maintain control and Edom was made a vassal state to Israel. Defeating Moab and Edom gave David sovereignty on the east and south east sides of the Dead Sea, including the portion of the Kings Highway (see map) leading to the Gulf of Aqaba, an important water route for trade. Map of David's Kingdom The Story of the Bible © Bible History Online (http://www.bible-history.com) Smith’s Bible Dictionary
<urn:uuid:8d0ae7ad-72fd-4792-ada8-f3fe1610297a>
CC-MAIN-2017-04
http://www.bible-history.com/map-davids-kingdom/map-davids-kingdom_moab_and_edom.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00059-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966764
416
3.90625
4
Are you concerned about pesticides and toxins on fruits and vegetables you eat daily? How often do you buy organic? Many fruits and vegetables available on the market are from conventional and commercial sources which use pesticides in farming practices. It can be challenging to provide the healthiest choices for your family and stay on budget. Although organic is a good, healthy choice, there are ways to avoid the worst offenders, stay within your budget, and still eat healthy foods. The following is a list of produce from conventional sources which contain the most and least pesticides (source, Environmental Working Group). “Consistent with two previous EWG investigations, fruits topped the list of the consistently most contaminated fruits and vegetables, with seven of the 12 most contaminated foods. The seven were peaches leading the list, then apples, nectarines and strawberries, cherries, and imported grapes, and pears. Among these seven fruits: - Nectarines had the highest percentage of samples test positive for pesticides (97.3 percent), followed by peaches (96.7 percent) and apples (94.1 percent). - Peaches had the highest likelihood of multiple pesticides on a single sample – 87.0 percent had two or more pesticide residues — followed by nectarines (85.3 percent) and apples (82.3 percent). - Peaches and apples had the most pesticides detected on a single sample, with nine pesticides on a single sample, followed by strawberries and imported grapes where eight pesticides were found on a single sample of each fruit. - Peaches had the most pesticides overall, with some combination of up to 53 pesticides found on the samples tested, followed by apples with 50 pesticides and strawberries with 38. Sweet bell peppers, celery, kale, lettuce, and carrots are the vegetables most likely to expose consumers to pesticides. Among these five vegetables: - Celery had the highest of percentage of samples test positive for pesticides (94.1 percent), followed by sweet bell peppers (81.5 percent) and carrots (82.3 percent). - Celery also had the highest likelihood of multiple pesticides on a single vegetable (79.8 percent of samples), followed by sweet bell peppers (62.2 percent) and kale (53.1 percent). - Sweet bell peppers had the most pesticides detected on a single sample (11 found on one sample), followed by kale (10 found on one sample), then lettuce and celery (both with nine). - Sweet bell peppers were the vegetable with the most pesticides overall, with 64, followed by lettuce with 57 and carrots with 40″. 15 Least Contaminated Fruits and Vegetables: “The vegetables least likely to have pesticides on them are onions, sweet corn, asparagus, sweet peas, cabbage, eggplant, broccoli, tomatoes, and sweet potatoes. - Over half of the tomatoes (53.1 percent), broccoli (65.2 percent), eggplant (75.4 percent), cabbage (82.1 percent), and sweet pea (77.1 percent) samples had no detectable pesticides. Among the other three vegetables on the least-contaminated list (asparagus, sweet corn, and onions), there were no detectable residues on 90 percent or more of the samples. - Multiple pesticide residues are extremely rare on any of these least contaminated vegetables. Tomatoes had the highest likelihood, with a 13.5 percent chance of more than one pesticide when ready to eat. Onions and corn both had the lowest chance with zero samples containing more than one pesticide. - The greatest number of pesticides detected on a single sample of any of these low-pesticide vegetables was five (as compared to 11 found on sweet bell peppers, the vegetable with the most residues on a single sample). - Broccoli had the most pesticides found on a single type of vegetable, with up to 28 pesticides, but far fewer than the most contaminated vegetable, sweet bell peppers, on which 64 were found. The fruits least likely to have pesticide residues on them are avocados, pineapples, mangoes, kiwi, papayas, watermelon and grapefruit. - Fewer than 10 percent of pineapple, mango, and avocado samples had detectable pesticides on them, and fewer than one percent of samples had more than one pesticide residue. - Though 54.5 percent of grapefruit had detectable pesticides, multiple residues are less common, with only 17.5 percent of samples containing more than one residue. Watermelon had residues on 28.1 percent of samples, and just 9.6 percent had multiple pesticide residues”. According to Environmental Working Group: - People who eat the 12 most contaminated fruits and vegetables ingest an average of 10 pesticides a day. Those who ate from the 15 least contaminated list, only ingested 2 or less pesticides a day. - Pesticides are known to interfere with many bodily functions, including poisoning, infertility, and birth defects. Children are especially at risk as their body proportions are smaller, they are in the growing and developing stages of life, and their metabolisms are faster which means substances travel faster in the body. In another recent study, the effects of pesticides were studied in children and the following was found: “Current EPA standards of exposure for some pesticides assume children are three to five times more susceptible than adults, and for other pesticides the standards assume no difference,” said Nina Holland (a principal author of the study) stated: “Our study is the first to show quantitatively that young children may be more susceptible to certain organophosphate pesticides up to age seven. Our results suggest that the EPA standards need to be re-examined to determine if they are adequately protecting the most vulnerable members of the population.” Organophosphate pesticides are insecticides used on farms, but some are manufactured for use in the home to eliminate or repel insects such as ants, mosquitoes, cockroaches, and other pests. These purpose of these chemicals are intended to disable the nervous system of insects. As reported by the National Pesticide Information Center, many common brands (pdf) use organophosphates in insecticides. As with other manufactured chemicals, these are suspected as being the cause of various serious health problems in humans. In World War I, similar chemicals were created to be used as nerve gases, and may affect reproductive, brain, and other development. Some pesticides contain toxins that have been found to cause weight gain, among other health problems. The EPA has the responsibility of pulling these products from the shelves, but often doesn’t take action until health issues have become chronic and widespread. It is not uncommon for profitable pesticides to remain on the market many, many years after damage to human and environmental health is discovered. Here are some ways to minimize your child’s exposure to pesticides in and out of the home: - At home and in garden areas, avoid the use of pesticides as much as possible, and look to Beyond Pesticides for the least-toxic method for dealing with unwanted insects and pests that invade your home. - Read about the Environmental Working Group’s Dirty Dozen foods reported to contain the most pesticides, and learn about a great new resource from the Pesticide Action Network at whatsonmyfood.org. When shopping for food choose organic as much as you are able, and reduce the number of opportunities of exposure to pesticides for your children. - Don’t be afraid to have discussions with school staff and administrators, friends, and neighbors and friends about habits of pesticide usage. When facing a pest problem, a safe “integrated pest management” protocol can usually achieve the same or better results as a chemical pesticide. - You can make your own natural formulas at home to repel mosquitoes and other unwanted pests with the following essential oils and a good carrier oil such as coconut oil or almond oil: citronella, lemon eucalyptus, cinnamon, castor, rosemary, lemongrass, cedar, peppermint, clove, pennyroyal, lavender, pine, basil, thyme, allspice, garlic, or geranium. You only need a few drops of oil mixed into carrier oil on your skin. Make certain your oils are labeled “food grade” or “therapeutic grade” and are suitable for topical application on the bottle. Depending on how long you are outside and perspiration, frequent re-application may be necessary. - Growing your own food is a great option to be able to control how your food is produced. Gardening can take on a large or small scale production, and is a good way to save money on produce, teach your children about growing food, and reduce your exposure to pesticides. Here’s my latest post on what I’ve learned about gardening over the last few years in my own backyard. - Studies done on pesticide use and effect on human health are still in the early stages. Because there are still so many things we may not know about the overall impact on health and the environment, research on your own to find out information about these chemicals and above all, err on the side of caution when it comes to exposure to risks you know are there. - Shop locally as many farmers in local markets grow foods that are economical and don’t use pesticides and other dangerous chemicals. - If you are unable to avoid produce with pesticides, use careful washing methods. Here’s a good home-made wash: fill a spray bottle with equal parts white vinegar and water. Spray solution onto your vegetables. Rub it in and rinse. For soft-skinned produce, fill a bowl with equal parts water and vinegar, place your produce in the bowl and soak for a minute or two, then rinse. For more information on how to protect children from pesticides, visit the State Environmental Resource Center. Interested in learning more about traditional foods and farming and the role they have on human health? Visit the Weston A. Price Foundation. What are your solutions to avoiding pesticides and keeping your family healthy? This post is part of Kelly The Kitchen Kop’s Real Food Wednesdays Carnival. Please visit her site and read the other great posts there.
<urn:uuid:09c1aae3-06c1-458a-96e1-b6b533225da9>
CC-MAIN-2022-21
http://agriculturesociety.com/2010/03/produce-and-pestcides-the-dirty-dozen-and-protecting-your-children/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662584398.89/warc/CC-MAIN-20220525085552-20220525115552-00486.warc.gz
en
0.952225
2,108
3.28125
3
Washington, D.C. -- Disease statistics buried within patient records or detailed in newspaper clippings can be sorted and organized to depict geographic patterns, allowing the discovery of trends that were previously overlooked, according to a Penn State geographer. "The use of interactive maps and graphs, combined with word search interfaces, can lead to greater insight into complex events like the spread of Swine flu," said Frank Hardisty, research associate, Penn State GeoVISTA Center. The GeoViz Toolkit is a user-friendly application that combines text mining with geographical mapping. It allows users to search publically available data to identify and visualize data patterns for their own interests or concerns. The flexible software package allows someone with no programming experience to navigate the application, while also providing different components and analytical tools for experienced analysts. "Potential applications range from research in public health -- infectious disease dynamics, cancer etiology, surveillance and control -- through analysis of socioeconomic and demographic data, to exploration of patterns of incidents related to terrorism or crime," said Hardisty. Many sources for disease and crime statistics -- newspaper articles for example -- are in a semi-structured format that do not clearly present the data in a table or graph, but rather bury it within the text of the document. To obtain high-quality, relevant information from these documents, researchers use "text analytics" or '"text mining," allowing them to retrieve only applicable information, like the date and description of a disease-related death, from the flood of information usually included in a newspaper clipping. "An example would be searching a database of H1N1 flu reports for 'child' or 'children' and seeing if there is spatial clustering in the relative frequency of those reports," Hardisty told attendees today (April 15) at the 2010 Association of American Geographers Annual Meeting in Washington, D.C. H1N1 data, provided by RhizaLabs, was used in a GeoViz query. Reports containing "child" or similar terms were mapped, with areas containing a high frequency of children cases highlighted. In general, areas with low population density exhibited a higher proportion of cases containing the search term. "The hypothesis that this evokes is that rural states have proportionally more transmissions via children, while more densely populated places are more likely to experience other vectors of transmission," said Hardisty. The GeoViz application allows users to easily manipulate the software to change time and location, as well as how the data is viewed. The user can thus visualize the pattern of how the disease spreads and determine how quickly it progresses from one area to the next. Visual geographic analysis can identify locations that are more or less susceptible to certain disease, crime, or weather patterns and researchers might link these occurrences with a cause or trigger. Using the GeoViz Toolkit could contribute to how people respond to or prevent these incidents. "First, GeoViz methods can help first responders gain better situational awareness. Second, a better retroactive understanding of clustered patterns like disease incidence and public security incidents will lead to the development of effective control measures," concluded Hardisty. |Contact: A'ndrea Elyse Messer|
<urn:uuid:655dd94e-2603-4a67-a861-304050a8f1ba>
CC-MAIN-2017-04
http://www.bio-medicine.org/biology-news-1/Visualization-of-geographic-patterns-may-predict-spread-of-disease-12843-1/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00065-ip-10-171-10-70.ec2.internal.warc.gz
en
0.924162
658
3.15625
3
A “perovskite structure” uses a different combination of atoms but keep the general 3-dimensional structure originally observed in the mineral, which possesses superb optoelectronic properties such as strong light absorption and facilitated charge transport. These advantages qualify the perovskite structure as particularly suited for the design of electronic devices, from solar cells to lights. The accelerating progress in perovskite technology over the past few years suggest new perovskite-based devices will soon outperform current technology in the energy sector. The Energy Materials and Surface Sciences Unit at OIST led by Prof. Yabing Qi is at the forefront of this development, with now two new scientific publications focusing on the improvement of perovskite solar cells and a cheaper and smarter way to produce emerging perovskite-based LED lights. An extra layer in a solar cell “sandwich” Perovskite-based solar cells is a rising technology forecast to replace the classic photovoltaic cells currently dominating the industry. In just seven years of development, the efficiency of perovskite solar cells increased to almost rival – and is expected to soon overtake – commercial photovoltaic cells, but the perovskite structure still plagued by a short lifespan due to stability issues. OIST scientists have made constant baby steps in improving the cells stability, identifying the degradations factors and providing solutions towards better solar cell architecture. The new finding, reported in the Journal of Physical Chemistry B (“Engineering Interface Structure to Improve Efficiency and Stability of Organometal Halide Perovskite Solar Cells”), suggests interactions between components of the solar cell itself are responsible for the rapid degradation of the device. More precisely, the titanium oxide layer extracting electrons made available through solar energy – effectively creating an electric current – causes unwanted deterioration of the neighboring perovskite layer. Imagine the solar cell as a multi-layered club sandwich: if not properly assembled, fresh and juicy vegetables in contact with the bread slices will make the bread very soggy in a matter of hours. But if you add a layer of ham or turkey between the vegetables and the bread, then your sandwich stays crisp all day in the lunchroom refrigerator. A perovskite-based layer includes many layers, including for example the electrodes on both sides, and the perovskite in the middle. The addition of a polystyrene layer in-between prevents the titanium oxide layer to deteriorate the perovskite, but does not affect the overall power conversion efficiency. (© American Chemical Society) This is exactly what the OIST researchers achieved: they inserted in the solar cell an additional layer made from a polymer to prevent direct contact between the titanium oxide and the perovskite layers. This polymer layer is insulating but very thin, which means it lets the electron current tunnel through yet does not diminish the overall efficiency of the solar cell, while efficiently protecting the perovskite structure. “We added a very thin sheet, only a few nanometers wide, of polystyrene between the perovskite layer and the titanium oxide layer,” explained Dr. Longbin Qiu. “Electrons can still tunnel cross this new layer and it does not affect the light absorption of the cell. This way, we were able to extend the lifetime of the cell four-fold without loss in energy conversion efficiency”. The lifespan of the new perovskite device was extended to over 250 hours – still not enough to compete with commercial photovoltaic cells regarding stability, but an important step forward toward fully functional perovskite solar cells. Manufacturing LED lights from gasses The bipolar electronic properties of the perovskite structure not only confer them the ability to generate electricity from solar energy but also can convert electricity into vivid light. Light-Emitting Diode – LED – technology, omnipresent in our daily life from laptop and smartphone screens to car lights and ceiling tubes, currently relies on semi-conductors that are difficult and expensive to manufacture. Perovskite LEDs are envisaged to become the new industry standard in the near future due to the lower cost and their efficiency to convert power into light. Moreover, by changing the atomic composition in the perovskite structure, perovskite LED can be easily tuned to emit specific colors. The manufacturing of these perovskite LEDs is currently based on dipping or covering the targeted surface with liquid chemicals, a process which is difficult to setup, limited to small areas and with low consistency between samples. To overcome this issue, OIST researchers reported in the Journal of Physical Chemistry Letters (“Methylammonium Lead Bromide Perovskite Light-Emitting Diodes by Chemical Vapor Deposition”) the first perovskite LED assembled with gasses, a process called chemical vapor deposition or CVD. “Chemical vapor deposition is already compatible with the industry, so in principle it would be easy to use this technology to produce LEDs,” commented Prof. Yabing Qi. “The second advantage in using CVD is a much lower variation from batch to batch compared to liquid-based techniques. Finally, the last point is scalability: CVD can achieve a uniform surface over very large areas”. Like the solar cell, the perovskite LED also comprises many layers working in synergy. First, an indium tin oxide glass sheet and a polymer layer allow electrons into the LED. The chemicals required for the perovskite layer – lead bromide and methylammonium bromide – are then successively bound to the sample using CVD, in which the sample is exposed to gasses in order to convert to perovskite instead of typically solution-coating processes with liquid. In this process, the perovskite layer is composed of nanometer-small grains, whose sizes play a critical role in the efficiency of the device. Finally, the last step involves the deposition of two additional layers and a gold electrode, forming a complete LED structure. The LED can even form specific patterns using lithography during the manufacturing process. Perovskite LED fabrication Top: the perovskite LED sits in a furnace, where the Methylammonium Bromide (MABr) in gaseous form will be introduced into the system and deposit on the LED surface. Bottom left: a glass-based LED, glowing green when electricity is applied. Bottom right: size and shapes of the perovskite grains on the surface of the LED. (© American Chemical Society) “With large grains, the surface of the LED is rough and less efficient in emitting light. The smaller the grain size, the higher the efficiency and the brighter the light,” explained Dr. Lingqiang Meng. “By changing the assembly temperature, we can now control the growth process and the size of the grains for the best efficiency”. Controlling the grain size is not the only challenge for this first-of-its-kind assembling technique of LED lights. “Perovskite is great, but the choice in the adjacent layers is really important too,” added Dr. Luis K. Ono. “To achieve high electricity-to-light conversion rates, every layer should be working in harmony with the others.” The result is a flexible, thick film-like LED with a customizable pattern. The luminance, or brightness, currently reaches 560 cd/m2, while a typical computer screen emits 100 to 1000 cd/m2 and a ceiling fluorescent tube around 12,000 cd/m2. This large perovskite-LED was produced using chemical vapor deposition and connect to a 5V current, illuminating through an OIST pattern etched on the surface. (© American Chemical Society) “Our next step is to improve the luminance a thousand-fold or more,” concluded Dr. Meng. “In addition, we have achieved a CVD-based LED emitting green light but we are now trying to repeat the process with different combinations of perovskite to obtain a vivid blue or red light”. Source: By Wilko Duprez, Okinawa Institute of Technology
<urn:uuid:cb363186-cbbc-486f-bdf0-06024519a7d4>
CC-MAIN-2019-30
https://genesisnanotech.wordpress.com/tag/perovskite/
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524568.14/warc/CC-MAIN-20190716135748-20190716161748-00445.warc.gz
en
0.908005
1,715
3.5
4
Level 1 Level 3 8 words 0 ignored Ready to learn Ready to review Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session. Not enough resources to sustain a country's population The most populous country in SOUTHEAST Asia increasing the amount of agricultural land CBR (Crude Birth Rate) fertility rate based on the number of live births per 1,000 residents NIR (Natural Increase Rate) when the population increases lowest in Africa (no / lacking hospital care) When are natural increase rates highest in the demographic transition? When are CBRs rapidly declining in demographic transition?
<urn:uuid:a11b6976-617d-48b8-ad58-1982a029b63a>
CC-MAIN-2021-04
https://app.memrise.com/course/1243578/ap-human-geography-for-freshmen/2/?action=prev
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703517966.39/warc/CC-MAIN-20210119042046-20210119072046-00350.warc.gz
en
0.804355
146
2.625
3
30 Days of Prayer Int'l Colorado Springs, CO The “Gospel” of Barnabas The Gospel of Barnabas is a medieval forgery, of unknown origin. The book seems to have been written in Europe sometime during the 14th–16th centuries. It includes geographical and historical inaccuracies as well as errors about Christian and Islamic beliefs. In the Gospel of Barnabas Mohammed is called the Messiah which means “anointed one” (Christ) while in normal Islamic belief Jesus is understood as being the Messiah. In several places the Qur’an itself proclaims that Jesus is the Messiah (see our article for day 22). In the Gospel of Barnabas Jesus is called the Christ (chapter 6). The author did not realize that The word Christ is the Greek equivalent of the Hebrew word Messiah. This is a significant error. Here are quotes from chapters 96 and 97: Jesus answered: “As God lives, in whose presence my soul stands, I am not the Messiah whom all the tribes of the earth expect, even as God promised to our father Abraham, saying: ‘In your seed will I bless all the tribes of the earth.’ But when God shall take me away from the world, Satan will raise again … making the impious believe that I am God and son of God, whence my words and my doctrine shall be contaminated … God will send his messenger …. who shall come from the south with power, and shall destroy the idols with the idolaters … The name of the Messiah is admirable … Mohammed is his blessed name.” It is an interesting distortion that Satan is portrayed as the one to claim Jesus as God. The author of the “Gospel of Barnabas” has attempted to rewrite the Biblical Gospel to make it agree with the Qur’an. The aim of the book is to try to convince people that Jesus was a Muslim and predict the coming of Muhammad. And, as such, it is both a weak attempt to distort scripture and an effort to mislead Muslims. In recent years many Muslims have cited the book in order to show that Jesus was a good Muslim. Jesus is portrayed in the book as a prophet who prays, speaks and acts exactly like traditional Muslims. - The Gospel is cross-cultural. Pray that this truth be believed and acted upon by Christian’s throughout the Muslim world. - Pray that believers will accurately be able to show that Jesus was always submitted to the Father but He was more than simply a good prophet. - May God give Muslims insights into the errors of the Gospel of Barnabas.
<urn:uuid:2bd3cd25-ac1c-47ac-9d7e-a7689a6fd739>
CC-MAIN-2022-40
https://www.pray30days.org/the-gospel-of-barnabas
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00643.warc.gz
en
0.96378
554
2.578125
3
The Rainbow Covenant & the Planet Although we often first learn the story of Noah as children, as if it is just a colorful tale of a floating zoo, it is actually a terrifying story of destruction, chaos, and survival. After Noah, his family, and the animals survive the Great Flood, God chooses the rainbow, an existing natural phenomena, as the sign of a covenant of forbearance not just with one person or even a nation, but with the entire planet. In our own days, with thousands of species endangered and being destroyed, with global climate change threatening the future of human civilization, the importance of a covenant with the whole planet–humans, animals, and plants–has new meaning. Now it is we human beings who must urgently make a covenant with all living things, not to destroy them from our greed and exploitation. Rabbi Arthur Waskow of The Shalom Center has made the Rainbow Covenant a central message of his teachings about imperative of to act for the future of the planet. Each of us must do our own part, not just in individual action but in urgent collective action, to protect the delicate ark of our planet floating in the vast sea of space. Rabbi Waskow has conveyed a modern-day Haftarah like a modern prophetic message about the meaning of the Rainbow. Rabbi Zalman Schachter-Shalomi translated this powerful message into Hebrew. אליכם אקרא להאיר את כל צבעי הקשת להרים נס נראה לכל רואה דגל הברית ביני ובין בני נח ונעמה ולכל נשמה החיה עלי אדמות כדי שלא ישבות לעולמי עד זריעה וקציר קור וחום: קיץ וחורף לילה ויום לא ישבותו: I call you to light the colors of the Rainbow, To raise once more before all eyes That banner of the covenant between Me, and all the children of Noah and Naamah, and all that lives and breathes upon the Earth— all the days of the earth, shall sowing and harvest, cold and heat, summer and winter, day and night –from the Rainbow Haftarah, by Rabbi Arthur Waskow, Hebrew by Rabbi Zalman Schachter-Shalomi Another recognition of the Rainbow Covenant is the observance of Rainbow Day, the day Jewish tradition has it that Noah and his family left the Ark. Look on a Jewish calendar for Yom Yerushalayim (Jerusalem Day) and Rainbow Day will be the day before. Here are some resources for Rainbow Day from Rabbi David Seidenberg, which can also be used when reading the Torah portion of Noah’s Ark or whenever you want to explore the themes of the Rainbow and world ecology. Photo at left by Adam Segulah Sher.
<urn:uuid:0e5d2379-6eb7-40bb-817e-cf04882a8b9c>
CC-MAIN-2017-43
http://wellspringsofwisdom.com/rainbows-rainbow-covenant/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820487.5/warc/CC-MAIN-20171016233304-20171017013304-00449.warc.gz
en
0.795968
730
2.578125
3
Enrollment in undergraduate computer science courses is at an all-time high at colleges nationwide. But this trend that's been hailed by the U.S. tech industry has a dark side: a disproportionate number of students taking these courses are caught cheating. More students are caught cheating in introductory computer science courses than in any other course on campus, thanks to automated tools that professors use to detect unauthorized code reuse, excessive collaboration and other forbidden ways of completing homework assignments. Computer science professors say their students are not more dishonest than students in other fields; they're just more likely to get caught because software is available to check for plagiarism. Half the academic dishonesty cases at the University of Washington involve computer science students. "The truth is that on every campus, a large proportion of the reported cases of academic dishonesty come from introductory computer science courses, and the reason is totally obvious: we use automated tools to detect plagiarism," explains Professor Ed Lazowska, chair of computer science and engineering at the University of Washington. "We compare against other student submissions, and we compare against previous student submissions and against code that may be on the Web. These tools flag suspicious cases, which are then manually examined." Stanford University disclosed in February that 23% of its honor code violations involved computer science students, although these students represent only 6.5% of the student body. Of 123 honor code violations investigated last year by Stanford's Judicial Panel, 28 involved computer science students. "The tools that we employ make it easy to catch students cheating," says Professor Mehran Sahami, associate professor of computer science at Stanford University. "I wouldn't say that computer science students violate the honor code more often or are any more dishonest." Sahami says computer science students mistakenly believe that writing software code is similar to solving a mathematical proof, where one correct answer exists. What students don't realize is that software code is more akin to writing an essay and that a significant amount of creativity is involved. "One of the things that happens in computer science and contributes to the cheating rates is that students are unaware of how dissimilar programs that do the same task really look," Sahami says. "They tend to think that it's OK if they copy portions of someone else's program. But our tools can discover this." Behind the cheating epidemic As more college students study computer science, the number of cheating incidents is on the rise. At the University of Washington, total enrollment in the two introductory computer science courses is the highest ever, approaching 2,750 students over the last four quarters compared to 2,500 students a year ago. In these two courses, between 1% and 2% of the assignments are identified as involving academic dishonesty, Lazowska says. The top computer science schools in the country are experiencing the same trend. "We see more cheating. It's something we're working hard to stop through a number of means," says Professor Lenny Pitt, director of undergraduate programs at the Department of Computer Science at the University of Illinois. "Cheating has gone up across many fields because it's easier to find with the tools we have today." Cheating in introductory computer science classes typically involves homework assignments rather than exams. Students get frustrated when their code won't run, and that's when they are tempted to borrow solutions from someone else. Because computer science assignments are complicated and need debugging, professors assign the same homework several years in a row. That means students can find code written by someone who has already taken the course. "There's a lot of infrastructure that needs to be built and a lot of effort that goes into creating a homework problem. There's a disincentive for professors to change those problems every semester. So we tend to reassign similar problems, and that causes cheating because past solutions are available," Pitt says, adding that the University of Illinois checks homework against a repository of past solutions. The other common form of cheating involves excessive collaboration. "Many of our students like to collaborate, but at what point are you copying?" Pitt asks. "The course policy needs to be really clear. Some courses will allow you to work in pairs but not in triples. If you don't follow that policy, we would call that cheating." At Stanford, students are allowed to discuss strategies for solving homework problems, but they need to write their own code. "You shouldn't be looking at someone else's program, and you shouldn't be sharing yours with other computer science students," Sahami says. Sahami says the introductory computer science courses require students to code their own programs, while higher-level courses allow for more teamwork. "We want them to learn the mechanics first, and then open up the world of collaboration," he adds. Students often resort to cheating because they feel excessive pressure from their peers and their families to excel, professors say. "Anecdotally, we see a larger incidence of cheating among foreign students then domestic students, and I think part of that is that they are under extreme pressure to do well and succeed," Pitt says. "That pressure contributes to the idea that they need to do as well as possible even if it means taking some shortcuts." Computer science professors say just as much copying and excess collaboration goes on in other college courses. "Does anyone in their right mind think that [cheating] isn't happening in large introductory courses in other fields? If so, they're smoking something," Lazowska says. "There have been several cases in which faculty in other disciplines have adapted these tools to detect plagiarism in term papers, and have found plagiarism rates far greater than typically encountered in computer science courses." Why industry should care As college recruiters traipse across the country seeking the best computer science graduates from the Class of 2010, they need to be aware of the rising incidents of cheating in computer science courses. "Ethics is a huge issue in the IT industry, not just with copyrights and licensing but with privacy," says David Foote, CEO of Foote Partners, a research firm tracking IT workforce management and compensation issues. Foote sits on the advisory council for Hiram College's Center for the Study of Ethics and Values. "We need to be looking at the idea of how do we breed people to be concerned naturally about issues of ethics and morality." For CIOs and other hiring executives, the issue is whether copying code for homework assignments could lead prospective employees to ethical lapses on the job. Businesses want to hire entry-level workers who won't get in trouble for software licensing, patent infringement and other intellectual property problems. "There are not enough programs in American universities that are looking at ethics and cheating," Foote says. "Don't pick on computer science people. Pick on the fact that universities are not doing enough in general about calling attention to cheating." Foote points out that some incidents of excess collaboration that qualify as cheating on college campuses would be encouraged by industry, which wants employees to reuse software to improve efficiency and cut costs. "In the real world, people write code in teams where they are given pieces of a project to work on," Foote says. "The academic world should be mapping onto the real world…They shouldn't be handing out assignments where people are coding on their own." To encourage collaboration, Georgia Tech changed its approach to cheating in its introductory computer science courses in 2007. Instead of trying to catch and punish students for excessive collaboration, Georgia Tech requires students to disclose the names of the other students that helped them complete their homework. "Students sign a collaboration agreement," explains Cedric Stallworth, assistant dean for Undergraduate Enrollment at Georgia Tech's College of Computing. "We realize that computing is one of the subjects that is best learned in a group. If students are using somebody else's code and are learning from it, that's all right." To ensure that the students are mastering the material, Georgia Tech requires them to give an oral demonstration of how their software works for one of their teaching assistants. "We worry less about catching cheaters. We worry more about properly assessing the student's skill set," Stallworth says. "Less percentage of the grade is from homework and more percentage is from the assessment, and the assessment is designed to truly [measure] skills. Then you can cheat on homework, but that's not going to help you with the assessment that counts for the bulk of your grade." No rise in failure rates Computer science professors do not think that cheating is a result of students being unprepared to take introductory-level courses. They are not seeing a rise in failure rates or a drop in grades. Instead, they say their students are more qualified than ever. "We haven't seen an increase in failure rates," Stanford's Sahami says, adding that 5% or less of students typically fail introductory computer classes. "This is not a student body that accepts failure. For them to pass all of their classes is an important thing." Lazowska says rising enrollment in computer science courses is a more important trend than the resulting increase in plagiarism cases. "An ever-broader range of students is recognizing that, even if they major in something else, college-level preparation in computational thinking is essential," Lazowska says. "There is no reason to believe that computer science students are anything other than better than ever." Read more about infrastructure management in Network World's Infrastructure Management section. This story, "Why Computer Science Students Cheat" was originally published by Network World.
<urn:uuid:489f65a6-ef34-49d3-95fa-5c3045c995ff>
CC-MAIN-2017-09
http://www.pcworld.com/article/194486/Computer_Science_Students_Cheating.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170609.0/warc/CC-MAIN-20170219104610-00115-ip-10-171-10-108.ec2.internal.warc.gz
en
0.96572
1,953
2.875
3
Sir William Burrell is celebrated as an art lover and philanthropist. He left a wealth of objects to the people of Scotland in the magnificent Burrell Collection. But it was not a passion for art that first brought him fame. One hundred years ago he was known across the globe as a shipping merchant. What was the key to Burrell's business success, that created one of the world's most remarkable art collections? "It was often said he was ruthless, but that's not the right word," says maritime historian Martin Bellamy, Head of Research at Glasgow Museums. "He was an innovative business operator with an inspired commercial mind. "He was a typical Victorian entrepreneur. He exploited the world of opportunities that the British Empire created. "Burrell took over a modestly successful family business and expanded it enormously." Burrell's secret was his ground-breaking operation of a type of trade called 'tramp shipping'. Unlike liners which followed a set route of destinations, tramp ships did not have scheduled deliveries. They sailed to whatever port their cargo took them. While a ship was unloading, the captain would make arrangements to find the next job. This led to delays and meant ships often sailed only part full. But Burrell had a solution. "He travelled the world and set up a network of agents," says Bellamy. "They would do the work of the captains and secure the next cargo before his ships arrived. "Usually tramp ships had to rely on the skill of the captain to secure cargo, and the trading opportunities available in each port. Burrell had found a far more efficient way to operate." Burrell had developed his business from an early age. In 1876, at 15 years old, he joined Burrell & Son, the Glasgow shipping firm set up by his grandfather. As a teenager Burrell had already found his interest in art, buying his first painting with savings that his father thought would be better spent on a cricket bat. In later life he admitted that most of the value of his early art purchases "lay in the frames". Burrell & Son prospered in the industrial growth of the 19th Century, moving from small canal vessels to ocean-going steamers. At the time Glasgow was at the heart of Britain's shipbuilding and engineering industries, earning its reputation as the second city of the Empire. Burrell and his elder brother George took over the firm in 1885. George handled engineering matters, while Burrell's focussed on the financial side. The company flourished under their control. Burrell's global travels helped him pursue his passion for collecting art. He gathered around 9,000 objects in his lifetime from all over the world. His collection includes paintings, sculptures, tapestries, ceramics and stained glass. It covers medieval and early Renaissance Europe, as well as important examples of Chinese and Islamic art. He also loved the modern art of his day, buying paintings by James McNeill Whistler, Edouard Manet and Edgar Degas that are now worth a fortune Burrell's shrewd investment in art reflected his business mind. Eye for a bargain "Commercial shipping was a cut-throat business," says Bellamy. "It was inevitable that Burrell would bring that sensibility to the art world. "He was not afraid to take risks. Burrell was lucky, but he engineered his own luck. When prices were rock bottom he saw the opportunity to make money and took it. "He didn't conform to the romantic stereotype of a ship owner. Burrell had no emotional attachment to his ships. He wasn't afraid to get rid of them." Burrell proved this in 1894 when the market was in a slump. He bought 17 ships at a bargain price, then sold the entire fleet a few years later when the market recovered. Between 1905 and 1911 Burrell ordered 32 new ships. Most tramp shipping traders operated just five or six vessels. Devotion to art Burrell & Son was now one of world's biggest tramp shipping firms, known from the Caribbean to Mediterranean, to the Adriatic and Far East. But during World War I, when demand for ships was at a peak, he again sold off the fleet for a handsome profit. With his wealth Burrell bought Hutton Castle in the Scottish borders in 1916. When his brother died in 1927 the firm was left solely in Burrell's hands. He and his wife Constance had a daughter Marion, but no son to take over the family business. The market did not hit another slump to allow Burrell to buy another bargain fleet, but by this time he had already made his fortune. Now in his seventies, the business dwindled as he devoted more time to his art collection. Burrell & Son finally closed in 1939. Burrell donated his artworks to the city of Glasgow in 1944, along with £250,000 to build a museum to house it. One of his conditions required the art to be displayed in a rural setting away from the pollution of Glasgow. He was concerned about his tapestries and carpets, and warned the Glasgow Herald newspaper that "if housed in an industrial city [they] would quickly deteriorate". Burrell died in 1958 at the age of 96. He would never see his objects in their final home. It took until 1983 for the right home to be found, when the Burrell Collection finally opened in Glasgow's Pollok Country Park. Burrell's outstanding collection means he will forever be remembered as an art lover, but it would not have been possible without the achievements of Burrell the businessman. Author: Paul Hastie BBC History
<urn:uuid:7f7f93da-b783-4b83-b22b-bbf81c286228>
CC-MAIN-2018-51
http://www.mastermariners.org.au/stories-from-the-past/1286-william-burrell-the-ships-that-bought-an-art-collection
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824525.29/warc/CC-MAIN-20181213054204-20181213075704-00463.warc.gz
en
0.987767
1,181
2.90625
3
Integrated Solid Waste Management (ISWM) is a comprehensive waste prevention, recycling, composting, and disposal program. An effective ISWM system considers how to prevent, recycle, and manage solid waste in ways that most effectively protect human health and the environment. ISWM involves evaluating local needs and conditions, and then selecting and combining the most appropriate waste management activities for those conditions. The major ISWM activities are waste prevention, recycling, composting, combustion, and disposal in properly designed, constructed, and managed landfills. Each of these activities requires careful planning, financing, collection, transportation, and processing of waste.
<urn:uuid:d31bfea1-385d-44a5-b691-311af044ac77>
CC-MAIN-2022-33
https://deq.wyoming.gov/shwd/solid-waste/integrated-solid-waste/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00680.warc.gz
en
0.913048
127
2.796875
3