text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
7.09k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
At the end of the last part, the idea of “thinking governmentally” was introduced. It took some time, but eventually I learned that thinking governmentally was to think first internally, then externally; thinking cause to effect, etc. This idea was primary to the entire method of the Principle Approach. It wasn’t which book, which event, or which problem. We had to begin to think first internally. What were the principles which controlled the subject which was being taught? Yes, we would consider which books, which events, and which problems, but the decision would be made by what was internally controlling and directing. Part of my teaching included the privilege to teach literature classes at various grade levels. Since I had first learned to read, I had loved books and reading. I remember walking to school, while reading a book. But I was reading books only for the excitement of the plot. Therefore, I never wanted to read a book more than once. With Miss Slater’s patient tutoring, I quickly learned that literature was much more than just reading books. I soon learned of the rich lessons to be found in books. We learned that literature is the “handmaid of history”. There were only a few teachers who were teaching literature in this manner. There weren’t guides available. So, again, a call to Miss Slater, and she would discuss the various periods of literature, or the great children’s classics. Often, after a telephone call, a package would arrive and Miss Slater would have sent some notes or background material which could be used to teach the book we had discussed. What a blessing! Could I now inspire my students to love literature? [See previous article on reading.] But what was more important than history class? After looking at every so-called Christian book available, we soon realized there weren’t books in print which taught America’s history from a Providential view. The challenge was how could we begin to teach the children in our school the ideas we were learning of America’s Christian history? How could we begin to teach these students to “think governmentally”? A plan began to form in my heart and mind, which would take the ideas of those big red books, but make it teachable for elementary children. Each week, I would develop material, teach it to the other teachers at our weekly teacher’s meeting and they would, in turn, teach their students during the coming week. There was no realization that this would be the seed of a series of children’s history books. But God’s ways are a great deep. After a few years, the fruit of teaching students to “think governmentally” began to reveal itself in the character of the students. And the teaching by principles was producing a higher level of scholarship. As the fruit of American Christian education was revealed, the question we began to ask – How can we share this with others?
<urn:uuid:f0c0f51e-183c-445e-b122-c04819befa19>
CC-MAIN-2021-04
https://pilgriminstitute.org/blog/an-individuals-journey-with-the-principle-approach-part-iii/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703538226.66/warc/CC-MAIN-20210123160717-20210123190717-00294.warc.gz
en
0.988075
616
2.828125
3
University of Houston Professor Badri Roysam and a network of dot-connecting researchers are helping the Pentagon develop reliable, mind-controlled devices for amputees. It sounds like the stuff of science fiction, but the project has very real world goals: to discover why the devices ultimately fail and investigate new strategies to make the devices last longer. "We want to really get to the biology, technology and the fundamental engineering issues that are at stake, and develop new knowledge," he said. Roysam also is chair of the department of electrical and computer engineering. His team is part of a national research assembly line of researchers who are investigating why the devices fail. Others on the network include researchers from the University of Michigan, MPI Research, Rensselaer Polytechnic Institute and Seattle Children's Research Institute. Each team builds on the work of the others. The UH role is to analyze 3D, brain tissue images using a powerful software platform called FARSIGHT, developed in his lab with support from the National Institutes of Health. His team will translate these images into data that quantifies the response of each individual brain cell and cell type to the implant. "For example, if we have microglia—they look like little spiders—we delineate them accurately and then we compute quantitative measurements, almost 300 quantitative measurements per cell—and there are thousands of these cells. Then we have to make sense of those measurements," he said. When each research team has completed its work, recommendations for design changes may come. The research is supported by a $5.4 million grant from the Defense Advanced Research Projects Agency. Badri Roysam is part of what's happening at the University of Houston. I'm Marisa Ramirez. Telling the stories of the University of Houston, this UH Moment is brought to you by KUHF, listener supported radio from the University of Houston.
<urn:uuid:b9dfd08f-6def-458b-bc32-854acde91efa>
CC-MAIN-2014-41
http://www.houstonpublicmedia.org/news/1297893430/
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663218.28/warc/CC-MAIN-20140930004103-00046-ip-10-234-18-248.ec2.internal.warc.gz
en
0.945767
389
2.6875
3
Feeding birds isn’t an easy task. They are different than humans and animals, so they have specific needs. On the other side, they are amazing while they eat, due to the fact they do this in a completely different and unique way. On the other side, feeding birds with human-related foods may not be a great choice, because they require different nutrients. You can learn here which food can cockatiels eat. In general, it is important to feed the birds with food that won’t have a negative effect on their health. The biggest question at this moment is, should they eat raisins? Harmful or good? When it comes to feeding birds with raisins, the situation can go in both directions. The thing is, if you feed them with ordinary raisins, they can have a negative effect on your birds, simply because they are very hard to digest. On the other side, giving too much of this food to them is equally bad. However, if you boil raisins in hot water, they will become softer, so feeding birds with this food is possible. In fact, it will have a positive effect, simply because they will provide nutrients to the birds. The same can be said for giving rice as bird food. Birds don’t like and they shouldn’t eat salt and sugar, simply because it is harmful for them. This also means that salty raisins must be avoided at all cost. Pay attention to the nutrition chart on your food. The lower amount of the salt and sugar, the better. Keep in mind that you can make raisins by yourself or buy it in a grocery shop. However, those bought is pet stores are the best and the safest choice. In any case, do not give too much of raisins to birds. The bottom line is simple, you can feed birds with raisins, but only if it is boiled and without salt of sugar. Which birds can eat raisins The main food of most birds are insects. In addition, those birds also eat fruit, so raisins are not strange to them. Due to the fact most bird pets and backyard birds are species that eat the aforementioned food, they can be fed with raisins. All you need to do is to place them in a hot water and wait for a couple of minutes in order to get soft. After that, give raisins to the birds and enjoy while they are eating. The amount of the food should be determined by the number of birds you are feeding.
<urn:uuid:d08cccba-e2cd-4fd3-9d92-55ffb5221326>
CC-MAIN-2020-16
https://petsolino.com/can-birds-eat-raisins/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496669.0/warc/CC-MAIN-20200330054217-20200330084217-00130.warc.gz
en
0.969971
535
2.75
3
Calvin's Theology: Predestination John Calvin lived from 1509-1564. He was an influential Reformer for his ministry in Geneva. By many accounts he was an excellent writer, preacher, and theologian. When people hear his name today, they often think of him as associated with the doctrine of predestination—that God elects before the foundations of the world a people unto salvation apart from any goodness or foreseen faith in man. Predestination entails God’s sovereignty in every area of life. As Eph. 1:11 says, God “works all things according to the counsel of his will,” It is worth noting three caveats when it comes to thinking about Calvin and predestination. First, later interpreters have often given it more prominence in Calvin’s thought than Calvin himself did. They assume that all his theology bends around this one magisterial doctrine. Unfortunately, this distorts Calvin and creates an unbalanced picture of him. No doubt, predestination was important but so were other doctrines like Christology, the work of the Holy Spirit, justification by faith and union with Christ. Second, for Calvin the doctrine of predestination is primarily a Biblical doctrine not a philosophical doctrine. He holds to it because he finds it in the Bible. Calvin is clear that we should only seek to understand election and predestination so far as God has revealed it. Our speculation should not try to look into things God has not made known (Institutes 3.21.1). Calvin was a pastor and expositor. He wrote commentaries and homilies as much, if not more, than he wrote theology. In the final version of his Institutes, he begins his discussion of election in book 3, chapter 21, which is after he has discussed union with Christ, faith, and justification by faith. Finally, John Calvin was not the first person in church history to teach the doctrine of predestination and unconditional election. For example, Augustine had articulated aspects of these doctrines. Even in his day, John Calvin was not the only reformer holding to these doctrines. Sometimes we do a disservice to the larger history of the church when we simply call a doctrine of predestination “Calvinism.” What are some things we can learn from John Calvin? First, the doctrine comes from the Bible. In his institutes as well as his other writings, John Calvin is careful to tie his doctrine to Scripture and explain the Scriptures. He examines passages like Eph. 1 and Rom. 9. He covers these passages in his commentaries and sermons, as well as bringing them to bear in his Institutes and his Treatise on Eternal Predestination. Second, faith is not the cause of God’s election. God does not foresee ahead of time that we will believe and then choose us on that basis. Calvin writes on Eph. 1:4 “Therefore you can safely infer the following: if he chose us that we should be hold, he did not choose us because he foresaw that we would be so” (Institutes 3.22.3). “To make faith the cause of election is altogether absurd and utterly at variance with the words of the apostle [Paul]” (Calvin’s Calvinism, 45). Third, Calvin’s overarching concern is to give glory to God and help the believer understand the grace and mercy of God. He understands that any doctrine of election that gives credit to make or makes election based upon man’s work, faith, or personal holiness, God will not get the glory because God is merely responding to men. The Bible teaches that God’s election is according to his will alone (Rom. 9:15-16) and for the purposes of the praise of God’s glorious grace (Eph. 1:6). For Calvin, the doctrine of predestination is important because it is in Scripture but it also has a practical effect: it humbles the sinner. It makes us turn and praise God for the depths and power of his mercy. We shall never be clearly persuaded, as we ought to be, that our salvation flows from the wellspring of God’s free mercy until we come to know his eternal election, which illumines God’s grace by this contrast: that he does not indiscriminately adopt all into the hope of salvation but gives to some what he denies to others. (Institutes 3.21.1) Finally, Calvin does not deny the necessity of the preaching of the gospel. While the benefits of Christ are “extended unto, and belong to, none but the children of God” (Calvin’s Calvinism, 94), the gospel offers salvation to all. He writes, “That the Gospel is, in its nature, able to save all I by no means deny. But the great question lies here: Did the Lord by his eternal counsel ordain salvation for all men? It is quite manifest that all men without difference or distinction, are outwardly called or invited to repentance and faith” (Calvin’s Calvinism, 94-5). So, John Calvin holds that God’s election of individuals unto salvation is God’s eternal decree. God ordains individuals to salvation and its benefits but there is the free outward call of the gospel where the listener is invited to believe. Calvin distinguishes this outward call from the inward work of the Holy Spirit who regenerates and enlivens, inwardly drawing the sinner to God’s grace and enabling them to receive it by faith. John Calvin is a stalwart in church history and is worth reading today even if you are not a church historian or academic theologian. His works are filled with a pastoral tone and a clear explanation of Scripture. In this respect, we can still learn from Calvin on the doctrine of predestination as he points us back to what the Bible says and upward to see the glory of God in the accomplishment of redemption. John Calvin, Calvin’s Calvinism: Treatises on the Eternal Predestination of God and the Secret Providence of God. Translated by Henry Cole. Reformed Free Publishing Association: Grand Rapids, Mich.: No date. Tim Bertolet is a graduate of Lancaster Bible College and Westminster Theological Seminary. He is an ordained pastor in the Bible Fellowship Church, currently serving as pastor of Faith Bible Fellowship Church in York, Pa. He is a husband and father of four daughters. You can follow him on Twitter @tim_bertolet.
<urn:uuid:bcb35419-0230-4d6e-8f40-1cbd7ce37426>
CC-MAIN-2020-10
https://www.placefortruth.org/blog/calvins-theology-predestination
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145746.24/warc/CC-MAIN-20200223032129-20200223062129-00552.warc.gz
en
0.963485
1,362
3.046875
3
It’s not uncommon for the person experiencing the symptoms of mental illness to view their situation differently than their family views it. The experience of having a mental illness can be a traumatic experience in and of itself and each person has to find a way to cope with the effects of that trauma, all while they are trying to navigate treatment their symptoms. Education programs such as those provided by the National Alliance on Mental Illness (NAMI) teach the person and the family about the stages of learning to cope with the impact that mental illness has on each person involved. Recognizing that we each see things differently and keeping the focus on what is needed to help the person with the mental illness to do well is critical to successful treatment. Having a clinician who also understands that occasional disagreement between patient and family is typical, and who doesn’t give up on either is essential to optimal recovery. Many conflicts can be addressed over time, the important point is to keep the person and the family engaged in the treatment process. To learn more, view this free SMI Adviser webinar: Engaging the Individual and the Family in Treatment Planning (August 2019). Encourage the individuals you are working with and their families to learn more by visiting NAMI Programs.
<urn:uuid:5d4894d6-dadd-48f0-8a8a-89ec6c6448d5>
CC-MAIN-2023-23
https://smiadviser.org/knowledge_post/how-can-we-address-situations-in-which-the-clinician-the-patient-and-the-family-are-at-odds-with-treatment-decisions
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647639.37/warc/CC-MAIN-20230601074606-20230601104606-00189.warc.gz
en
0.977825
253
2.609375
3
mesh currents method is circuit analysis method. In the mesh current method, a current flowing through a resistor in a specified direction defines the polarity of the voltage across the resistor, and that the sum of the voltages around a closed circuit must equal zero, by KVL. Once a convention is established regarding the direction of current flow around a mesh, simple application of KVL provides the desired equation. In mesh analysis, it is important to be consistent in choosing the direction of current flow. To avoid confusion in writing the circuit equations, unknown mesh currents are defined exclusively clockwise when we are using this method
<urn:uuid:c430ae0a-b8d2-4829-844d-33d8bcc10f32>
CC-MAIN-2021-17
https://myengineerings.com/mesh-current-method/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039379601.74/warc/CC-MAIN-20210420060507-20210420090507-00122.warc.gz
en
0.890275
125
3.46875
3
New excavations conducted by the University of Tübingen (Germany) and the Onsekiz Mart University of Çanakkale (Turkey) at the site of Sirkeli Höyük near Adana (southern Turkey) have revealed the remains of a massive bastion fortification dating to the Hittite Imperial Period (ca. 1300 BC). Sirkeli Höyük, one of the largest settlement mounds in Ciliciaduring the Bronze- and Iron Ages, was already known to archaeologists and historians because of two Hittite rock reliefs located at the site. The better preserved rock relief of the two shows the Hittite King Muwatalli II (ca. 1290–1272 BC), opponent of Pharaoh Ramesses II in the famous Battle of Qadesh in and is thus the oldest Hittite rock relief known so far. Syria On the upside of the rock, just above the reliefs, various shallow pits or basins are found which apparently are to be connected with the reliefs and were used for libations in the course of cultic activities. These pits were part of a larger cultic installation which also included a building to the west of the rock reliefs. This ensemble is thought to be a cultic installation for the Hittite King.
<urn:uuid:a0b5bdcb-7396-436e-9403-a4a611a8c5f4>
CC-MAIN-2013-20
http://archaeoblog.blogspot.com/2007/11/cultic-city-and-fortress-unearthed-in.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704658856/warc/CC-MAIN-20130516114418-00044-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964221
276
3.484375
3
Make a beautiful wall art canvas with 3D flowers using our R2440 Color Diffusing Paper Flowers! Duration: 15-20 minutes Learning Objectives: Children get to take home their own projects to hang up on their bedroom walls at home. Use different colors to produce interesting combinations. Paint easily with fun and engaging Color Diffusing Paper! Create a wash of color on a canvas and talk about essential keywords such as balance, subject and background. • Watercolor paint • Paint tray • Spray bottle of water • Small plastic cups Pour a small amount of watercolor into each cup. Set up your workstation so that the flowers are on the paint tray. Squeeze the bulb of the Squiggle Pipette to expel all the air inside, then dip the nozzle into the paint and release the bulb. This will draw the paint into the main chamber of the pipette. Carefully raise the pipette on top of the paper and squeeze the bulb to release the paint. Use different colors to make interesting effects! Spray the concentrated watercolor spots with a bit of water to help diffuse the paint throughout the flower. To give your Color Diffusing Flower some dimension, drape it on top of an overturned cup. Leave it to dry for 30 minutes under direct light. While the Color Diffusing Paper Flowers are drying, prepare your canvas for painting! You can use watercolor on the canvas as this will give it a nice diffused look. Pour the concentrated watercolor into little cups so as not to use too much, although a little will go a long way! I created a gradient wash from one corner of the canvas to the opposite corner. First I started with the darkest color I had–red–and blended it into an orange once it hit the yellow on the opposite side. Even though there isn’t much red remaining, it is still a lovely transition! Although your students can paint their canvases different colors, it’s a good idea to keep the colors minimal. Remember, the canvas will form the background to your 3D art, so it needs to let the flowers stand out! Now get your flowers ready to attach to the canvas! Dab a bit of glue onto the back of each flower center and press the flower onto the canvas. Hold the flower down for about 20 seconds to make sure that the glue starts working to secure it to the canvas. Glue a button to the center of each flower. Use contrasting colors to really make the 3D art pop! Like us on Facebook, Share this post with your friends, or Subscribe to this blog today to receive original craft project updates every Monday, Wednesday and Thursday!
<urn:uuid:9d801909-731f-4877-ac91-429bd4619816>
CC-MAIN-2020-29
https://littlefingersbigart.com/2015/05/27/3d-flower-wall-art/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655893487.8/warc/CC-MAIN-20200707142557-20200707172557-00353.warc.gz
en
0.901919
551
2.90625
3
In Chapter 5 (The Defensive Investor and Common Stocks) of The Intelligent Investor, Benjamin Graham, the father of value investing, touched on various aspects of defensive investment, among which was dollar-cost averaging, an application of a “formula investment”. Elaborating, he said: “The New York Stock Exchange has put considerable effort into popularizing its ‘monthly purchase plan’, under which an investor devotes the same dollar amount each month to buying one or more common stocks.” “During the predominantly rising-market experience since 1949 the results from such a procedure were certain to be highly satisfactory, especially since they prevented the practitioner from concentrating his buying at the wrong times,” added Benjamin Graham. The father of value investing cited a comprehensive study of formula investment plans in which the author Lucile Tomlinson presented a calculation of the results of dollar-cost averaging in the group of stocks making up the Dow Jones industrial index. The average indicated profit at the end of 23 ten-year buying periods was 21.5 per cent, exclusive of dividends received. There were of course some instances of a substantial temporary depreciation at market value. The author of the study said: “No one has yet discovered any other formula for investing which can be used with so much confidence of ultimate success, regardless of what may happen to security prices, as Dollar Cost Averaging.”
<urn:uuid:666637cb-e4c0-4f66-80d6-03fd3427c410>
CC-MAIN-2021-31
http://buffettpedia.com/2017/03/benjamin-graham-on-dollar-cost-averaging/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154277.15/warc/CC-MAIN-20210801221329-20210802011329-00633.warc.gz
en
0.962787
292
2.5625
3
The UN’s nuclear watchdog agency yesterday began reviewing the decommissioning process at Japan’s crippled nuclear plant, where new problems are triggering growing safety concerns about a cleanup expected to take decades. The experts will assess and analyze melted reactors, radiation levels and waste management at the Fukushima Dai-ichi nuclear power plant to make its decommissioning process safer and more stable, team leader Juan Carlos Lentijo told reporters. The cleanup is “a very difficult challenge,” he said, and “it is very important to conduct the decommissioning process in a very safe way.” The mission by the 12-member team is the International Atomic Energy Agency’s (IAEA) first review of the decommissioning. Japan’s nuclear watchdog said there have been at least eight accidents or problems at the plant since the middle of last month, ranging from extensive power outages to leaks of contaminated water. The problems are raising concerns about whether the plant, crippled by the March 2011 tsunami, can stay intact through a decommissioning process that could take 40 years. The problems have also prompted officials to compile risk-reduction measures and revise decommissioning plans. Among the most pressing issue is the leakage of tonnes of highly radioactive water from three of seven underground storage pools into the soil.
<urn:uuid:84c67203-3f29-49c0-a9ab-45c8388aec9b>
CC-MAIN-2015-22
http://www.taipeitimes.com/News/world/archives/2013/04/16/2003559883
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929003.41/warc/CC-MAIN-20150521113209-00121-ip-10-180-206-219.ec2.internal.warc.gz
en
0.939684
273
3.046875
3
Accurately use primitive data type s and arithmetic expressions in programs Develop correct, efficient, and documented code. Define and use classes in program solutions Compile and run programs in the Windows environment. Begin your game creation by establishing a Unity3D scene with lighting and a camera of your choice. Define a set of floors (planes) like a maze. Build walls or use terrain to keep your player from falling off the edge of the play area. Do not re - use Roll - A - Ball game or your Lab 4; you will lose points for doing this. Add a movable ball to represent the player. Handle user input for movement. Create hazards for your player. You may either create holes between the planes t hat allow a player to fall through to an invisible plane below or create virtual “holes” in the plane that have a mimic this hazard. Either approach has the same consequence : the player is returned to the starting position. Your game must contain at least three holes. Use good commenting and whitespace/indentation throughout your code. Your game should include at least three "enemies" that oscillate back and forth in a small part of the maze; if the ball collides with an "enemy," then the game ends. Make sure that you tell the player the game is over, using a textbox. Use textures/graphics/materials to give your space a good look/feel, but please use standard assets ONLY, as project size grows very quickly. Create a win condition so that if your player avoids all holes and enemies, and reaches the end of the maze, he wins the game. Be sure to give your player feedback that he has won in a textbox. Make sure that all of your scripts are commented heavily to demonstrate your understanding of your scripts. Submitting your project ZIP/compress the entire project file for this solution/application. Name your zipped file using your last name, first in i tial and then G1. If I were doing the submission my file would be named: Jones_S_G1. Submit this ZIP file into the D2L system folder for this project. ALSO submit as many screen shots as required to display ALL SCRIPTS AND YOUR RUNNING GAME! My Assignment Help Services By Online Tutoring and Guided Sessions
<urn:uuid:fa3de73e-05c5-4cb2-9518-064867c6bc8a>
CC-MAIN-2022-21
https://www.myassignmenthelp.net/cse1301-project-1
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663048462.97/warc/CC-MAIN-20220529072915-20220529102915-00617.warc.gz
en
0.922777
494
3.828125
4
Saturday, June 30, 2007 Rubber Ducky Invasion THE JOURNEY SO FAR: 16 NOVEMBER 1992: Caught in the Subpolar Gyre (counter-clockwise ocean current in the Bering Sea, between Alaska and Siberia), the ducks take 10 months to begin landing on the shores of Alaska. EARLY 1995: The ducks take three years to circle around. East from the drop site to Alaska, then west and south to Japan before turning back north and east passing the original drop site and again landing in North America. Some ducks are even found In Hawaii. The National Oceanic and Atmospheric Administration (NOAA) worked out that the ducks travel approximately 50 per pent faster than the water in the current. 1995 - 2000: Some intrepid ducks escape the Subpolar Gyre and head North, through the Bering Straight and into the frozen waters of the Arctic. Frozen into the ice the ducks travel slowly across the pole, moving ever eastward. 2000: Ducks begin reaching the North Atlantic where they begin to thaw and move Southward. Soon ducks are sighted bobbing in the waves from Maine to Massachusetts. 2001: Ducks are tracked in the area where the Titanic sank. JULY TO DECEMBER 2003: The First Years company offers a $100 savings bond reward for the recovery of wayward ducks from the 1992 spill. To be valid ducks must be sent to the company and must be found in New England, Canada or Iceland. Britain is told to prepare for an invasion of the wayward ducks as well. 2003: A lawyer called Sonali Naik was on holiday in the Hebrides in north-west Scotland when she found a faded green frog on the beach marked with the magic words 'The First Years'. Unaware of the significance of her find she left it on the beach. It was only when she was chatting to other guests at her hotel that she realised what she had seen. Labels: Rubber Ducky
<urn:uuid:34e6a423-c126-4e37-aec1-5a043102e3df>
CC-MAIN-2017-30
http://growingyourbaby.blogspot.com/2007/06/rubber-ducky-invasion.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423809.62/warc/CC-MAIN-20170721202430-20170721222430-00314.warc.gz
en
0.939162
408
2.640625
3
Choosing the proper password that you can not only remember and secure is not always easy to do. Some people use automatically generated passwords and others use their first born’s name followed by the number 1. Unfortunately, neither end up working because the auto-generated password is too difficult to remember or when written down are lost, and the name of your child is not secure. Stay away from easy words to translate or random phrases. Instead let’s focus on how to properly manage your password so you can effectively remember it and it is safe and secure. Use a word that comes to mind or phrase that can be repeated and try memorizing the word. Try mixing letters with numbers and vise versa as this will create a more secure password. Changing out letters and numbers is easier to remember and translate. Memorizing does not always work and If you need to write this down keep it in your pocket or wallet. That way you will always have them even when you are on a different computer. Also, try not to use the same password for multiple uses. Choose passwords that are relevant to that particular theme or specification. This will help you associate which password goes with which usage. Also, remember to change your password regularly. Every three months and at least one year.
<urn:uuid:f895b165-f0ab-4fae-a513-341b9aa4e560>
CC-MAIN-2017-51
https://www.redrocketmg.com/properly-setup-password/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948544124.40/warc/CC-MAIN-20171214124830-20171214144830-00408.warc.gz
en
0.941772
260
2.78125
3
From the dense forests of eastern Russia to the barren tundra of the Arctic, Eagle Hall provides visitors with the opportunity to see two very different species of birds of prey. Steller’s Sea Eagles are one of the largest eagle species on the planet with wingspans of 6 ½ to 8 feet. They are found throughout eastern Russia, northern Japan and as far south as Korea. Living in climates with cool summers and winters reaching lows of -30 degrees, Steller’s are comfortable in a wide range of temperatures. Visitors can recognize the difference between the Steller’s pair by comparing the birds’ size. Like most raptor species, the female, Aleutia, is larger than her mate, Kodiak. With their white plumage, cat-like golden eyes, and powerful talons, Snowy Owls are among the world’s most strikingly beautiful birds of prey. Adorned with a thick mantle of feathers to protect them from the Arctic cold, Snowy Owls thrive during frigid winter days. National Aviary guests can visit a pair of Snowy Owls on exhibit daily during the late fall, winter and early spring months. Tundra, age 2, and Glacier, age 5, came to the National Aviary from a falconer after being deemed non-releasable. Both owls are male and still retain some of their juvenile gray and brown barred plumage. As they age they will become increasingly pure white! Also while visiting Eagle Hall, see how you compare to the world’s eagles with the National Aviary’s wingspan and height display. Looking for Liberty the Bald Eagle? Visitors can now see Liberty in her outdoor exhibit in Condor Court!
<urn:uuid:6d436777-76a2-4c6a-bd15-e580e39ee15c>
CC-MAIN-2016-18
http://www.aviary.org/eagle-hall
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461863599979.27/warc/CC-MAIN-20160428171319-00181-ip-10-239-7-51.ec2.internal.warc.gz
en
0.920879
381
2.671875
3
Latest news from Big Barn and our producers. As it is time for new year’s resolutions here are a few ideas on Food resolutions for 2018. Eat less meat Meat tastes great and it is nearly all the favourite foods we eat from a curry to a roast, to a bacon sandwich. All the experts say however, that we eat too much and reducing meat consumption may reduce your risk of chronic preventable conditions like cancer, cardiovascular disease, diabetes and obesity. It can also help reduce your carbon footprint and save precious resources like fresh water and fossil fuel. Did you know that if current trends continue by 2050 we will be feeding enough grain to meat producing animals, that could instead feed 1 billion people. Eat better meat If we eat less meat we should be able to save enough money to buy better quality, high animal welfare, and healthier meat. Healthier for us with less additives, anti biotic residues and higher omega 3 from grassfed livestock. And healthier for the planet with less intensive farming and more traditional mixed farming to improve soils. Cut down on sugar We are ‘hard wired’ to love sugar. For millions of years we humans gorged on sugar when it was available because it was normally scarce and gave us energy and built up fat reserves. Today sugar is cheap and it is in everything from baked beans to bread. We must resits our brain telling us to eat more and cut back. Eat more veg, salads and fruit If you cut down on meat, eat more veg and especially seasonal, local, fresh veg that is full of nutrients and fibre. Get a veg patch for really fresh or visit your local farm shop to buy locally grown produce that is normally cheaper than the supermarket and better. Cut back on the supermarket and Buy local And that is why we should cut back on the supermarket. Yes I know they have everything in one place and they have a loyalty scheme, but do you need ‘everything’, the veg isn’t that fresh, the loyalty scheme earns you very little and you will not be tempted by misleading offers. If you switch to local shops you will find local, fresher, seasonal produce. This should save you money and match your body clock. Be more adventurous This could mean finding more interesting ways to cook seasonal veg using a recipe book or our KIS Cookery videos. Like my every growing asparagus crop from the veg patch! Or more types of sustainable, healthy food like, seaweed, Dartmoor pony, goat burgers, making yogurt with kefir. Make your own bread To be really adventurous how about making your own bread. Get better bread and save lots of money. It really is a lot easier and less time consuming than you think. For a video click here. Grow your own Whether you have a big garden or a balcony you can grow something. Herbs, lettuce and tomatoes for the balcony or asparagus, potatoes, beans, squash, garlic, etc for the veg patch. So lots of resolution ideas there and perhaps even the beginnings of a food business. If you have any more ideas please add them below.
<urn:uuid:c0a7272e-0b41-4647-9775-9c7dbc515ca0>
CC-MAIN-2019-09
https://www.bigbarn.co.uk/2017/12/31/food-resolutions-week-week-1-of-bigbarns-food-drink-weeks/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249434065.81/warc/CC-MAIN-20190223021219-20190223043219-00417.warc.gz
en
0.94115
656
2.578125
3
Good Essay Topics For Economics - Good Essay Topics For Economics For StudentsThere are few things more challenging than writing an essay for an economics course. There are no less than three good essay topics for economics. The first of these is the student's strengths. These include his strengths in terms of aptitude and the ability to think of new concepts and strategies. These are the attributes that make the student special. If the student is confident about his subject, he can win the attention of the class instructor and the other students by doing a great job in a lecture and then a good performance in an exam. But if the student lacks confidence about himself, he may write a weak paper. To overcome this, the student should consult the course syllabus before going to write. The second good essay topic for economics is the student's weaknesses. These include the lack of confidence about his course work and the difficulty in presenting himself in an examination. Sometimes these weaknesses cannot be overcome by external motivation. However, the student can try to apply good research skills and write a very persuasive essay about these weaknesses. The third good essay topic for economics is the student's research skills. Although the student can write his paper without putting in some research work, the best way to improve his chances of winning the exams is to conduct some research work. This will boost the student's confidence and the degree of difficulty in completing his research work. However, the student should not think that in making a research paper he will win the scholarship for a PhD program. In the course, the student will have to write an independent research paper. This will be judged as equivalent to either an original or term papers, depending on the level of difficulty. An original research paper will earn two extra marks over term papers while a term paper will earn one extra mark over original research paper. Thus, a good essay topic for economics does not mean that the student must write an original research paper. One can still win the scholarship with an original research paper. The only thing that counts is to write a good research paper and not to research too much. Persuasive Essay Examples - Enhance Your Writing SkillsThe objective of the purposeful use of persuasive essays examples is to give the reader an insight into the underlying theme of your piece. With this, the intended message will be almost revealed. The article can be easily understood by the reader. This will help in composing a convincing essay, which will certainly impress the readers. There are various reasons why persuasive essay examples should be used, the most common among them is that the style of writing is not presented as if it is a fiction piece. For the entire piece to be effective, there should be a lot of creative and inspirational part within it. This is the easiest way to make the composition style straightforward. A number of good tools have been devised to further increase the effectiveness of persuasive essay examples. These include: Using multimedia in your persuasive essay examples is one example of something that you should think of. The more you play with the media, the more you will get a firm grasp of what style to use in your articles. The use of testimonials is another of the many persuasive essay examples that you can use. The big advantage of testimonials is that they do not occupy the full page of the paper. So it is always handy when the information in the first paragraph can be supported by a few 'testimonials'. If you are looking for some of the other effective persuasive essay examples, you can easily find it online. However, always remember that you must know how to select the proper ones. There are certain criteria that you should take into consideration before selecting the most suitable examples. Last but not the least, these persuasive essay examples can be compiled online, where the number of resources for it is also considerably greater. So the best part about it is that you can avail of the same at your desired time.
<urn:uuid:1828ad6d-60b8-4ddd-b158-013ca9f2ecc3>
CC-MAIN-2020-29
https://termpaperservice561.weebly.com/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657131734.89/warc/CC-MAIN-20200712051058-20200712081058-00041.warc.gz
en
0.955128
799
2.515625
3
ISTOCK, PRETTY VECTORS Our relationship with microbes begins early in life. As an infant passes from the womb to the world through her mother’s birth canal, she is exposed to a multitude of bacteria and fungi. Although a handful of studies now suggest that the womb may not be sterile as many once believed, microbes are much more abundant in the outside world. How our bodies learn to peacefully coexist with cells that are not our own is still unclear. Afterall, we spend most of our lives fighting off microbial invaders. “Once you’re born, you’re assaulted by billions of bacteria, so if the babies’ [immune systems] responded in the appropriate adult manner, they would just be auto-inflammatory bundles,” says Grace Aldrovandi, a professor of pediatrics at the University of California, Los Angeles. “The [question] then is: How does the immune system learn when to relax and when to respond?” Over the last few years, researchers have started to uncover how the immune system dampens its response to friendly microbes. For example, one 2013 study, published in Nature, revealed that a specific population of red blood cells possessing the CD71 protein—which is only plentiful during the first week or so of life—helped suppress the immune response in baby mice. In humans, these CD71+ cells, which the team found were abundant in the blood of umbilical cords (but scarce in adult blood), also appeared to have immunosuppressive properties. “When I went to medical school, I learned that babies had immature, wimpy immune systems,” Aldrovandi says. “We now realize that in fact they have very sophisticated immune systems, they’re just programmed in a different way.” Recent rodent studies have revealed that, in the adult mouse colon, bacterial metabolites such as butyrate, a product of fermentation, can accelerate the differentiation of progenitor cells into regulatory T cells, which help keep the immune system in check. While these studies indicate that products of some bacterial species may help induce tolerance in the adult immune system, Rodney Newberry, a professor of gastroenterology at Washington University School of Medicine, says that “the role for these tolerance-inducing species is not straightforward,” since your ability to become tolerant is better early in life when, paradoxically, these species are less abundant than in later childhood and adulthood. When I went to medical school, I learned that babies had immature, wimpy immune systems. We now realize that in fact they have very sophisticated immune systems, they’re just programmed in a different way. —Grace Aldrovandi, UCLA This idea that the first bacteria we encounter are crucial to our immune development is supported by the growing evidence for the so-called “hygiene hypothesis,” which posits that early exposure to microbes determines our predisposition to immune-mediated disorders. For example, epidemiological analyses in human infants have found that antibiotic use during the first year of life increases the likelihood of developing inflammatory bowel disease and that children who grow up on farms tend to be more resistant to allergies. Mouse studies have found similar effects—researchers have reported that treating neonatal rodents with antibiotics increases their susceptibility to allergic asthma, while exposure to gut microbes during early life protects them from developing immune-mediated disorders later on. In addition, Newberry says, although the prevailing assumption in the scientific community has long been that our immune systems continually gain antigen-specific tolerance to gut bacteria through lifelong interactions, some studies did not support this theory. For example, one would expect healthy individuals to be tolerant to the CBir1 antigen found in commensal bacteria’s flagella. However, researchers have observed that injecting naïve T cells specific to this antigen into adult mice did not initiate a regulatory T-cell response to suppress the immune system, despite the abundance of the antigen in the gut lumen. Instead, when this procedure is repeated in rodents with acute gastrointestinal (GI) infections, the cells expanded into inflammatory effector T cells. “These observations challenge the assumption that we have ongoing, antigen-specific tolerogenic encounters with our gut bacteria throughout life,” Newberry tells The Scientist. “This prompted us to look at events pre-weaning as the gut microbiota and the gut immune system co-develop, each shaping the other.” A time window for bacterial colonization Newberry and his colleagues recently examined the early interactions between the immune system and certain harmless gut bacteria, such as Lachnospiraceae, in newborn mice. Their results, which they reported last month (December 17) in Science Immunology, revealed a time window during early life when the animals developed antigen-specific regulatory T cells specific to those microbes. This critical phase, which occurred between 10 and 20 days of life, was initiated by a drop in levels of epidermal growth factor (EGF), a protein abundant in breast milk during the pre-weaning period, in the GI tract of mice. During the first week or so, high concentrations of gut EGF in the mouse pups blocked the formation of goblet cell-associated antigen passages (GAPs)—channels that allow antigens from the gut lumen to enter the lamina propria, where the immune cells lie—preventing the development of regulatory T cells. We think this forms the basis of how we’re tolerant to our [gut microbes]—but this can’t be the whole story, because not all your gut bacteria are present [during this time].—Rodney Newberry, Washington University School of Medicine Essentially, what appears to be happening is that the reduction of EGF during this time period allows bacterial antigens to pass through pups’ guts, enabling the immune system to learn to not to initiate an inflammatory response. After 20 days, Newberry’s team observed, the presence of microbes blocked the formation of GAPs once again, ending the period during which the immune system was able to develop a tolerance to specific bacteria. According to Newberry, it is not entirely clear how this works—whether the GAP inhibition occurs due to the absolute amount of bacteria present in the gut, or if there are specific elements of microbes triggering an end to antigen passage. Blocking GAP formation during the critical period, or shifting the time during which it occurred, prevented the gut immune system from developing regulatory T-cells specific to commensal antigens, making mice more vulnerable to colitis induced by DSS, a chemical that disrupts the gut’s epithelial barrier, later in life. “We think this forms the basis of how we’re tolerant to our [gut microbes]—but this can’t be the whole story, because not all your gut bacteria are present [during this time],” Newberry says. The most surprising result in this paper, according to Gérard Eberl, an immunologist at the Instutit Pasteur in Paris who did not take part in this work, was that EGF levels determined when the animal needed to be exposed to microbes. Although levels of this protein in mothers’ milk were not directly examined in this study, Newberry says that his team is currently performing additional experiments to confirm that this process is under maternal control. If deemed true, this finding could be relevant to people as well, given that researchers have found that human breast milk is rich in EGF and tapers over time. Vincent Young, a microbiologist at the University of Michigan who was not involved in this study, says the timing of these events is hard to extrapolate to humans because our weaning periods are much more variable. Aldrovandi adds that because mice are born more immunologically immature than people, there may be some differences in the events that occur shortly after birth. A mother’s touch The idea that there may be a window of optimal bacterial colonization supports the work of those who promote “vaginal seeding,” a procedure in which a newborn born via C-section is swabbed with a sterile gauze that was incubated in the mother’s vagina shortly before birth, to restore microbial communities to levels found in vaginally born babies. Last year, a group of researchers published a small pilot trial—with four mothers who volunteered to undergo the procedure—that reported promising results. Studies have found that exposure to the microbes in a mother’s vagina at birth might contribute to their infants’ health later in life. Although there have been some conflicting results, scientists have observed that babies delivered vaginally and by C-section have clear differences in the composition of their microbiomes, and some studies suggest that the latter might be associated with negative health effects, such as obesity and immune-mediated disorders. Some scientists have advised against the practice, citing concerns about transferring potentially infectious vaginal bacteria. “To prevent that from happening, we have a very conservative protocol to make sure that no babies will be exposed to any potentially pathogenic bacteria,” says Noel Mueller, an epidemiologist at Johns Hopkins University who is currently involved in the larger trial of vaginal seeding. Still, whether vaginal seeding procedures have long-term beneficial effects remains an open question, Aldrovandi says. “I think if you look early on, you can clearly see a difference between C-section and vaginally born infants,” she adds. “But we’re finding, and there are other studies showing, too, if the infants are breastfed, those differences dissipate over time.” Multiple questions remain—such as how the immune system is able to tell the difference between “good” and “bad” bacteria and what types of gatekeeper mechanisms exists in parts of the body other than the gut. An infant’s first microbes may play other important roles as well—for example, releasing signals that cause the epithelium to mature, as Young and his team recently found. As scientists work to uncover the specifics of a healthy infant microbiome and how it assembles during early life, Young warns, a common misconception is the belief that we know enough to make solid medical recommendations. “We don't have the answers yet,” he adds. “But as we gather data, we will understand more about what the complexities are, and eventually, perhaps, understand what we ‘should’ do.”
<urn:uuid:2b935469-7195-4cfd-a48b-a106e97a3ffc>
CC-MAIN-2018-51
https://www.the-scientist.com/news-analysis/how-do-infant-immune-systems-learn-to-tolerate-gut-bacteria-30430
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823705.4/warc/CC-MAIN-20181211215732-20181212001232-00356.warc.gz
en
0.953256
2,181
3.328125
3
EMF-Risks may collect a share of sales or other compensation from the links on this page. Want better sleep? Turn off your wifi Download this Ultimate EMF Reduction Bedtime Checklist! We used to spend a lot of time as a culture in front of the television. It was our main source of information and entertainment for decades. We now spend just as much time in front of laptop computers, smartphones, and tablets. However, most living rooms have a flat-screen television, and children actually spend the most time in front of these devices. Considering those facts, many people express concern about radiation effects produced by these high-definition modern marvels. They are large and consume considerable amounts of electricity. With all that current flowing through them, certainly, flat-screen televisions produce harmful radiation that should worry us. Yet, that is not the case. Here we will discuss flat-screen televisions only. In the recent past, these devices were exotic and basically considered toys. Any neighbor who had one was splurging on unnecessary electronics simply because they insisted on having a flat-screen and also had the money for one. Now, you would be hard-pressed to find a tube television of any make and would require you to undertake a lengthy treasure hunt through mom-and-pop appliance repair shops to even locate one, let alone one that still works. All televisions sold now are flat-screen models. Read Related Reading: EMF Protection So, are there radiation risks from modern television? Back in the day… Before we jump into answering that question, let us consider where the very idea of television radiation came from. Its origins are actually from the early age of television, but the issue of radiation from televisions was not recognized until the 1960s. Starting in the 1940s, there were concerns about radiation leaks from black and white television tubes, however, at that time there were no regulatory restrictions on electronic devices apart from fire safety. The same follows for medications where there were no laws stating that medication had to do what was it was marketed to do or whether it would cause death if used. Needless to say, it was an era of unrestricted production without any governmental oversight. In 1967, the US government began to perform routine testing of television devices and found that several large-screen models, primarily produced by General Electric, produced x-ray emissions beyond what would be considered acceptable. X-ray sources are very technology-dependent and are produced any time accelerated electrons, driven through a high-voltage system, are emitted and strike an object like a phosphor screen while traveling in a vacuum. This is an effect known as Bremsstrahlung, which occurs when high-speed electromagnetic particles rapidly decelerate after striking another atom and release x-rays. Although not at the emission levels of x-ray tubes for medical use, concerns were raised regarding long term exposure and lack of appropriate shielding. These sources of x-ray radiation were found mainly in color television sets due to the increased current required to operate the picture tubes. When testing was extended to all models, the conclusion was that all television models of the era produced unacceptable levels of x-ray radiation. It is estimated that over 100,000 television sets on the market at that time were deemed unsafe for home use. Shortly after this discovery in July 1967, a congressional inquiry committee submitted and had passed the Federal Radiation Regulation bill, which was later modified to become the Radiation Control for Health and Safety Act of 1968. Additional testing was conducted by the National Center for Radiological Health, as well as the Public Health Service, and further safety concerns were put forth which prompted the Surgeon General to issue a general statement of safe use. That statement related to the use of a safe viewing distance (following the inverse square law of electromagnetic emissions) and is the origin of the idea that you do not sit directly in front of the television viewscreen while watching your shows. Basically, the negative effects of the X-ray radiation emitted could be mitigated by distance and the standard recommendation was a viewing distance of at least six feet. Regulation of television safety was gradually migrated to oversight by the Food and Drug Administration. To this very day, all cathode ray tube (CRT) television set manufacturers, as well as manufacturers of any radiation-emitting product including microwave ovens and medical x-ray equipment, are required to submit annual product testing reports certifying that their devices meet federal safety guidelines. Modern CRTs, due to improvements in materials and design, emit very little x-ray emissions which is why the older CRT computer monitors were safe enough for users to stick their faces up close to the screen while working long hours at the keyboard. What About Flat-Screen Televisions? Harmful EMF emissions are mainly a matter of the technology used to produce the images and the amount of current required to power the devices. Modern flat-screen televisions and computer monitors, compared with CRT tube technology, are horses of an entirely different color. Flat-screen displays based on plasma, light-emitting diode, or liquid crystal technologies are not capable of producing x-ray emissions. As such, they are not considered radiation-emitting devices and are not subject to FDA regulation for X-ray emissions. What Types of Radiation Do Flat-screen Televisions Emit? The short answer to this question is that flat-screen displays do not produce appreciable amounts of electromagnetic frequency (EMF) radiation. There is a caveat, however, in that many flat screens are Smart Televisions and can use wireless router technology to connect to commercial television signals or internet sources of data. Televisions used in this modality produce the same amount of EMF radiation produced by home internet routers. If flat-screen televisions are connected to data sources strictly by wired connections, EMF emissions become a non-issue. Despite being potential sources of EMF emissions, due to the size of modern flat-screen televisions, viewing distances of less than two feet are quite frankly uncomfortable for use. This is the main reason that flat-screen televisions are not considered substantial indoor EMF sources. As stated above, electromagnetic radiation diminishes dramatically in its energy density over distance, so normal viewing distances for these devices render them harmless for routine use. Read Other Related Reading: Best EMF Protection Pendant Necklaces Reviewed in 2021
<urn:uuid:a7182285-288c-43c9-89a1-2f895d73d296>
CC-MAIN-2021-10
https://www.emf-risks.com/television-radiation/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178381803.98/warc/CC-MAIN-20210308021603-20210308051603-00443.warc.gz
en
0.969179
1,329
2.9375
3
by John Salt - Updated February 2020 RC helicopter controls are perhaps one of my favorite subjects to talk and write about. I truly love this aspect of the hobby; perhaps even more than flying because for many of us, understanding how an RC helicopter is controlled, and how they can even fly is captivating. Helicopters, both RC & full size are fascinating machines! They are mechanically complex. The flight principles and physics that allow them to do what they do, and do so well really hits home while you are flying one. It still gives me goose bump moments after all these years. It's just one more reason (a big one), why this hobby is so awesome! I'm going to be covering the most common and basic questions I had when I was starting out in the hobby, and what my visitors have asked me about. It's all pretty easy stuff to get your head around so don't think this is going to be overly complicated. If you are looking for a more advanced and in depth explanation of the theory & physics of how helicopters fly, I highly recommend this FAA Aerodynamics of Helicopter Flight PDF. It's on the technical side but fairly easy to grasp, and well worth the read if you have a passion for helicopters like I do, and really want to understand the physics of what is going on in more detail. My goal on the other hand is to give you enough information to understand why an RC helicopter can fly and how we control it from an RC radio (RC transmitter). Yes, now comes one of those times that your high school physics teacher warned you about. You know the old “one day, this information will come in handy” statement to make some attempt to keep us all awake. Didn’t work for me – how about you? So how will I keep you awake this time around? First, we are talking about something real here – your RC helicopter that you just spent a significant amount of time and money on. I think you will want to understand how it flies and how RC helicopter controls work – right? Second and as I already mentioned, this really is neat stuff! It the best part of the hobby as far as I'm concerned, and so many other RC heli pilots I have talked to over the years share that sentiment. So, let's start at our hands and the radio (transmitter). In the video below, I demonstrate how this mode 2 radio controls an RC helicopter. Now that we know how the radio imparts control movement to the helicopter, let's look at how these controls actually cause the helicopter to move around and fly. As I have said before, single rotor collective pitch RC helicopters are, at first, not easy to fly. They have the exact same controls and follow the same laws of physics as full size helicopters. The first step is to understand these forces and laws. It will then be an easy matter to understand how a helicopter is controlled. To make this as simple and basic as possible, I have broken helicopter flight and control down into three very basic areas: By fully understanding these three basic areas of helicopter flight, you will have a much better idea of how helicopters fly and understand RC helicopter flight controls much better. Here are also some videos explaining and demonstrating RC helicopter controls and basic heli Visual Demonstration of Collective & Cyclic How Do RC Helicopters Fly Upside Down Dissymmetry of Lift & the Helicopter Speed Limit Now let’s look at two other areas of helicopter flight theory that are a bit more advanced. By understanding the first three, these two will make more sense. They are not crucial to understand, but it is nice to know they exist and how they affect the RC helicopter Finally, here is an excellent training video going over all these helicopter controls on a full size Robinson R22 helicopter. Even though it's full size, it shows the exact same control set that we also use on our collective pitch RC helicopters. So how did I do? Did I put you to sleep? Just remember, RC helicopters take time. If it doesn’t all make sense now, don’t worry. Come back to the explanation in a few hours or a few days and re-read it. Everything is more clear the second time around or as many times as you need. Still a little confused? Here’s a little trick that I use all the time... Simply visualize what is going on while your helicopter is flying. Unlike RC planes or cars, RC helicopter controls seem a bit abstract. You now know how a helicopter flies and how to control it. Visualize yourself in a nice solid hover. What happens if the heli starts drifting to the right? What control input do you give and what is happening on the helicopter to achieve the result from that control input? If you can think and visualize what your helicopter is doing before you even begin learning to fly, you will have a big advantage over others who learn by feel alone. Who said there was anything wrong with day dreaming. Have fun with the process.
<urn:uuid:bef074c1-ecad-463f-9560-21ed620f516e>
CC-MAIN-2021-25
https://www.rchelicopterfun.com/rc-helicopter-controls.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487636559.57/warc/CC-MAIN-20210618104405-20210618134405-00029.warc.gz
en
0.960255
1,061
2.609375
3
The results, although discouraging, are rather obvious. Violent movies and television have been known to desensitize people to actual violence, and now we know video games to be no different. What must be differentiated, however, is one's desensitization to violence and one's ability to cause violence. This study in no way correlates to the causality of violence. Conducted among 257 college students, the researchers made each participant play one of eight randomly assigned video games (four violent, four non-violent) and then had them watch a 10-minute videotape of real incidents of violence. Heart rate and galvanic skin response measurements were taken before and after the game playing and throughout the viewing of actual violence. For the record, the violent games were Carmageddon, Duke Nukem, Mortal Kombat or Future Cop; the non-violent games were Glider Pro, 3D Pinball, 3D Munch Man and Tetra Madness. The full report can be found here (.pdf file).
<urn:uuid:b6eb0d82-8617-43e5-bc14-791fbceae87f>
CC-MAIN-2015-18
http://www.engadget.com/2006/07/31/study-video-games-desensitize-people-to-violence/
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430456031455.97/warc/CC-MAIN-20150501045351-00085-ip-10-235-10-82.ec2.internal.warc.gz
en
0.966521
207
2.75
3
The Hungarian Sinologist Etienne Balazs once remarked that in imperial China, “History was written by officials for officials.” The dynastic chronicles were monopolized by emperors and their ministers, by statesmen and literati. The common folk hardly appeared at all in these records, other than as an abstraction: “the peasants,” “the hundred surnames,” “the black-haired masses.” And even if they could have recognized themselves as individuals on the histories’ pages, most commoners would not have been able to understand the classical language in which the accounts were written. History was thus expressed and dominated by the imperial presence and its Confucian mandarinate. The perspective was set by the Forbidden City, where the emperor looked down upon his subjects beneath him. Rural China and its inhabitants, the poor and nameless, existed somewhere in the lower depths, under the gentry and bureaucrats who connected the ruler with the ruled. This top-heavy image of a brooding imperial presence has by now become a cliche, but it is one not easily avoided. It is very difficult, for instance, even to see the real person of the emperor behind his own facade of rule. This was partly because the emperor was his own mythmaker. The K’ang-hsi Emperor (reigned 1661-1722), who completed the Manchu conquest of China and consolidated the rule of his Ch’ing dynasty (1644-1911), not only altered the historical records to minimize the barbarian characteristics of his ancestors; he also carefully cultivated the manners of a Confucian sage-ruler, often appearing in a series of carefully selected poses before his subjects. All men play roles, but the Chinese emperor more than most rulers possessed a repertoire of stereotypes to draw upon, and consequently seemed to contemporaries more a persona than a person. One of the first scholars to expose the individual ruler behind the imperial presence was Jonathan Spence, professor of Chinese history at Yale University. Spence’s first book Spence did even more to reveal the person beneath the dragon robes of state. Culling singular comments by K’ang-hsi from a selection of public edicts, testamentary rescripts, and private letters, Spence boldly combined these individual statements into collective discourses that reflected the emperor’s own thoughts about statecraft and moral philosophy, about riding to the hunt and commanding troops in battle, and about raising children and enduring old age. This technique of composing a single set of verbal reflections from snatches of writings scattered here and there was … This article is available to online subscribers only. Please choose from one of the options below to access this article: Purchase a print premium subscription (20 issues per year) and also receive online access to all all content on nybooks.com. Purchase an Online Edition subscription and receive full access to all articles published by the Review since 1963. Purchase a trial Online Edition subscription and receive unlimited access for one week to all the content on nybooks.com.
<urn:uuid:d63df62f-fd90-41ba-bce6-ff187bdb24f7>
CC-MAIN-2015-18
http://www.nybooks.com/articles/archives/1978/may/18/the-lower-depths/?insrc=wai
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246654292.99/warc/CC-MAIN-20150417045734-00145-ip-10-235-10-82.ec2.internal.warc.gz
en
0.969431
635
3.1875
3
As an investor, you will have to understand the basics of accounting to be able to identify financially strong companies and avoid companies which experience financial troubles. In this lesson I will try my best to explain this topic in an easy to follow, non-boring way. You have to understand the basics of accounting to be able to identify financially strong companies and avoid companies which experience financial troubles Accountants keep track of the money flows and product flows within a company and document every transaction a company makes Financial statements are the documents in which these transactions are recorded If you do not understand the basics of financial statements, you cannot apply a value investing strategy, because value investing is based on thorough financial statement analysis Accounting and financial statements are not difficult, but they can be confusing at first because of the specialized vocabulary There are three main financial statements: the balance sheet, the income statement and the cash flow statement The balance sheet shows you an overview of what a company owns today, its assets, how much the company owes today, its liabilities, and how much a company is worth today, its shareholders’ equity. On the income statement you find how much a company sold in a given period, sales, how much money it had to pay, costs, and finally how much money was left after paying these costs, net income. The cash flow statement tracks the movement of cash throughout the business, so where the company gets cash and where that cash goes. Income is not the same as cash, and even a highly profitable company might still be unable to pay its bills if it runs out of cash The balance sheet, income statement and cash flow statement all work together to show you a complete picture of a company’s financial position, but they all have their own specific purpose Financial ratios are what you get when you combine some figures from the financial statements in smart ways. This lesson will cover some of the most important financial ratios for value investors. Financial ratios allow you to compare companies and get a better idea of how well they are performing Earnings per share shows you how much profit a company is making for each stock it has issued The Price/Earnings ratio is a valuation ratio, or multiple, which shows you how much investors are willing to pay for a stock per dollar of income P/E in itself does not say much about whether or not a company is undervalued with respect to its intrinsic value The net margin tells you what percentage of total sales is translated into bottom line profits Both P/E and net margin differ greatly per industry, which makes them unsuitable to compare companies across industries Return on equity shows you how much net income a company earns per dollar of equity, or in other words, how efficient a company uses its equity to generate profits While book value is often inaccurate, the growth of book value per share over time gives you a general sense of whether a company is creating value or destroying value The debt to equity ratio indicates how much debt a company has in relation to equity High levels of debt are dangerous, because the interest payments can bankrupt a company The current ratio is a liquidity ratio which measures a company's ability to pay its short-term obligations In today’s lesson we are going to cover a very important, yet often overlooked metric called Free Cash Flow, or FCF. Free cash flow is the amount of cash a company has left after is has paid for all of its expenses and investments required to keep the business running Free cash flow can be used for repaying debts, paying dividends to shareholders, buying back shares, or to facilitate the growth of its business Free cash flow is not reported in the financial statements. You have to calculate it yourself by taking cash from operating activities and then subtracting capital expenditures The absolute value of free cash flow does not tell you the whole story, you have to dig a bit deeper Ask where the cash is coming from. Is a company generating these cash flows from their own earnings or do they rely on debt? Ask what the company is spending its cash on. Are they investing in future growth, paying dividends, buying back shares, paying off debt, or are they simply spending it on maintenance costs? If a company consistently reports negative cash flows while reporting increased earnings, this is a big warning sign, because this is unsustainable in the long run and could indicate earnings manipulation Negative free cash flow might also indicate that a company does not have the liquidity to stay in business, at least not without taking on additional debt Falling free cash flows are a warning sign as well, because it could indicate that a company is experiencing a slowdown in business which means future earnings may not be able to grow Just as you can calculate a P/E ratio, you can also calculate a Price/Free Cash Flow ratio. However, these ratios both share the same limitations. Also check whether a company is growing its cash reserves or burning through its cash reserves Finally, always put these figures into perspective. They never tell you the complete story, you will have to dig a bit deeper to find out how a company is actually performing. In this lesson you will learn why managers manipulate earnings in the first place, how they do it, what the dangers are for you as an investor, and how you can identify and avoid these so called “value traps”, which is one of the most difficult aspects of stock picking. To determine whether or not a company is financially healthy, we have to look at their financial statements, but management sometimes manipulates these statements to make a company look more profitable than it actually is No matter how sophisticated your fundamental analysis and your intrinsic value estimates, if they are based on misstated information they are essentially worthless Managers manipulate earnings to keep the stock price high and to meet analyst expectations The GAAP allow several legal ways to manage earnings to a certain extend, which are sometimes misused A value trap is a stock which appears to be a great investment at first, but is actually experiencing serious fundamental problems which are permanent in nature The price of a true value investment is low because of irrational price movements, often caused by emotional reactions to temporary and solvable problems. TR Even the best value investors in the world regularly buy value traps, because it is very difficult to identify them There are two major scientific models to identify companies which might experience financial troubles in the near future: the Altman Z-score and the Beneish M-score. They are both useful, but not perfect Hewitt Heiserman developed a method of creating two alternative income statements which counter the flaws of a company’s reported earnings: the defensive income statement and the enterprising income statement Shareholder friendly management is important, because honest management is less likely to manipulate earnings Finally, always read the footnotes of a company’s financial reports, because they can reveal important details
<urn:uuid:e0019c3c-0926-40b5-8e94-b52a0717ae60>
CC-MAIN-2021-31
https://valueinvestorclub.org.my/financial-statements/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046157039.99/warc/CC-MAIN-20210805193327-20210805223327-00077.warc.gz
en
0.95824
1,410
2.96875
3
A booster rocket (or engine) is either the first stage of a multistage launch vehicle, or else a shorter-burning rocket used in parallel with longer-burning sustainer rockets to augment the space vehicle's takeoff thrust and payload capability. (Boosters used in this way are frequently designated "zero stages".) Boosters are traditionally necessary to launch spacecraft into low Earth orbit (absent a single-stage-to-orbit design), and are certainly necessary for a space vehicle to go beyond Earth orbit. The booster is dropped to fall back to Earth once its fuel is expended, a point known as booster engine cut-off (BECO). The rest of the launch vehicle continues flight with its core or upper-stage engines. The booster may be recovered and reused, as in the case of the Space Shuttle. Strap-on boosters are sometimes used to augment the payload or range capability of jet aircraft (usually military). The SM-65 Atlas rocket used three engines, one of which was fixed to the fuel tank, and two of which were mounted on a skirt which dropped away at BECO. This was used as an Intercontinental ballistic missile (ICBM); to launch the manned Project Mercury capsule into orbit; and as the first stage of the Atlas-Agena and Atlas-Centaur launch vehicles. The Titan III, used by the United States Air Force as an unmanned heavy-lift vehicle, was developed from the Titan II launch vehicle by adding a pair of strap-on solid rocket boosters (SRB). It was also planned to be used for the Manned Orbital Laboratory program, which was cancelled in 1969. In a new development program initiated in 2011, SpaceX is attempting to recover and bring back for low-cost and rapid reuse a recoverable booster. The program, if successful, is intended to reduce launch prices significantly, opening new markets for the use of space. A multi-year, multi-element test program is now underway. Use in aviation Rocket boosters used on aircraft are known as Jet-Assisted TakeOff (JATO) rockets. Various missiles also use solid rocket boosters. Examples are; - 2K11 (SA-4) which uses SRBs as a first stage, and then a ramjet. - S-200 (SA-5) which uses SRBs as the first stage, followed by a liquid fuel rocket. - Surface-launched versions of the turbojet powered Boeing Harpoon use an SRB. |This section is empty. You can help by adding to it. (February 2015)| - "SpaceX chief details reusable rocket". Washington Post. September 30, 2011. Both of the rocket's stages would return to the launch site and touch down vertically, under rocket power, on landing gear after delivering a spacecraft to orbit. - Belfiore, Michael (2014-03-13). "SpaceX Set to Launch the World’s First Reusable Booster". MIT Technology Review. Retrieved 2014-03-14. SpaceX is counting on lower launch costs to increase demand for launch services. - Foust, Jeff (2014-03-24). "Reusability and other issues facing the launch industry". The Space Review 2014. Retrieved 2014-04-01. - Navias, Rob. "FLIGHT CONTROL OF STS-69". Johnson Space Center. Archived from the original on 18 March 2010. Retrieved 17 August 2013. Booster Systems Engineer (BOOSTER) Monitors main engine and solid rocket booster performance during ascent phase
<urn:uuid:9ac546d6-22aa-4d61-84f5-74be46c75874>
CC-MAIN-2015-27
https://en.wikipedia.org/wiki/Booster_rocket
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375091587.3/warc/CC-MAIN-20150627031811-00007-ip-10-179-60-89.ec2.internal.warc.gz
en
0.912384
731
3.6875
4
Last week, I posted Anxiety–Destroyer of Lives, Part 1: My Long & Complicated Relationship With Panic. In it, I gave a brief description of how and when I began experiencing the crippling effects of Generalized Anxiety Disorder and Panic Attacks. If you have not yet read part 1, reading it before you read this post might help with context. What is Generalized Anxiety Disorder (GAD)? The Mayo Clinic defines GAD as “. . .excessive, ongoing anxiety and worry that interfere with day-to-day activities.” People may develop “generalized anxiety disorder as a child or an adult. Generalized anxiety disorder has symptoms that are similar to panic disorder, obsessive-compulsive disorder and other types of anxiety, but they are all different conditions.” Symptoms of GAD include: Persistent worrying or obsession about small or large concerns that’s out of proportion to the impact of the event Inability to set aside or let go of a worry Inability to relax, restlessness, and feeling keyed up or on edge Difficulty concentrating, or the feeling that your mind “goes blank” Worrying about excessively worrying Distress about making decisions for fear of making the wrong decision Carrying every option in a situation all the way out to its possible negative conclusion Difficulty handling uncertainty or indecisiveness Muscle tension or muscle aches Trembling, feeling twitchy Being easily startled Nausea, diarrhea or irritable bowel syndrome Symptoms in children and teens can manifest differently than adults and may include: Performance at school or sporting events suffering Difficulty being on time (punctuality) Fear of earthquakes, nuclear war or other catastrophic events Feeling overly anxious to fit in Being a perfectionist Tendency to redo tasks because they aren’t perfect the first time Spending excessive time doing homework Striving for approval Requiring a lot of reassurance about performance What are Panic Attacks? The Mayo Clinic defines a panic attack as ” a sudden episode of intense fear that triggers severe physical reactions when there is no real danger or apparent cause. Panic attacks can be very frightening. When panic attacks occur, you might think you’re losing control, having a heart attack or even dying.” Further, they note that “Many people have just one or two panic attacks in their lifetimes, and the problem goes away, perhaps when a stressful situation ends. But if you’ve had recurrent, unexpected panic attacks and spent long periods in constant fear of another attack, you may have a condition called panic disorder. . .Although panic attacks themselves aren’t life-threatening, they can be frightening and significantly affect your quality of life.” Panic attack symptoms vary widely from person to person, but they almost always come on suddenly and without warning, even at times when there does not seem to be anything that would trigger a panic attack. Many people, myself included, have been awakened in the middle of the night from a sound sleep having a panic attack. While symptoms are not the same from one person to the next, they can include: Sense of impending doom or danger Fear of loss of control or death Rapid, pounding heart rate Trembling or shaking Shortness of breath or tightness in your throat Dizziness, light-headedness or faintness Numbness or tingling sensation Feeling of unreality or detachment I have experienced all of those symptoms over the years. Most of the time, my panic attacks have multiple symptoms at a time. They are incredibly frightening, embarrassing, and create a sense of helplessness and hopelessness that someone who doesn’t experience them simply cannot understand. They are exhausting, and after they end, I feel as though I could sleep for days. But, the worst part about panic attacks and panic disorder is the fear that they will happen again. That is why I, and so many other people who suffer from them, avoid situations where they might occur. That leads to isolation, loneliness, and depression. As I said in part 1, relationships with family, friends, significant others, and co-workers can be dramatically impacted by these conditions. But, the symptoms of GAD, panic attacks (panic disorder) are not the only things you need to know. There are several more that those of us who suffer want those of you who don’t to know–not about the conditions, but about US! We Are Not Crazy People who suffer from GAD and panic attacks are not insane. In fact, on the whole, we are among the most sane, intelligent, and creative people you’ll ever meet. Leann Rimes, Johnny Depp, Kate Moss, Emma Stone, Joey Votto, Kim Basinger, Scarlett Johansson, and Adele are just a few of the people known to suffer from GAD, panic attacks, or both. Some psychologists and psychiatrists who’ve studied his writings believe that Abraham Lincoln also likely suffered from GAD. (from CalmClinic.com) While GAD and panic disorder are classified as mental/emotional in nature, the people who suffer from them are most certainly not mentally disturbed or insane. You don’t need to be afraid of us. We Don’t Have A Switch To Turn It Off Oh, that there were a switch that would allow us to turn off the worry, the fear, the panic, the racing thoughts–I don’t know that there is a price we wouldn’t be willing to pay. Unfortunately, that switch doesn’t exist. As much as we want to (as much as YOU may want us to), and as hard as we try, we can’t just turn it off. Many people with GAD and panic disorder have suffered with it since childhood; and while there may be times when we are perfectly fine, we always know that the panic could hit at any time. There are effective treatments for GAD and panic disorder which help many people who suffer with them, but they are just treatments, not cures. We will most likely always “have it.” We Probably Can’t Tell You What We Are Afraid Of I have a fairly sizeable list of phobias: heights, closed spaces, large crowds, etc. But, ask me during a panic attack what it is that I’m afraid of at that moment, and I probably won’t be able to tell you. The vast majority of my panic attacks are not triggered by any of the phobias I have. I can’t tell you what most of them are triggered by, and most of the people who I’ve talked to who suffer like me say the same thing. We can’t tell you what we are afraid of during a panic attack. All we know is that the fear is very real. We Need You To Be Our Friend Even Though We Can’t Always Be Yours This is, maybe, the hardest truth about GAD and panic attacks that I know of. Those of us who suffer need people around who care about us. We need people around who know what we’re going through and who still love us anyway. We need people around us who will continue to be our friends even though we are not always very good at being yours. This flies in the face of everything we’re ever told about friendships. You know–they’re a “two-way street.” That is true. Unfortunately for those of us who suffer from these disorders, we’re not always able to travel down the other side. We know we need to. We know we should. But, just at that moment, we can’t make the trip. We Haven’t “Given Up” On Life One of the things that I dread most when I talk to people about GAD and panic attacks are the looks of pity on people’s faces. You know the look–furrowed brow, eyebrows raised, head tilted to the side, weepy eyes. It’s a look that suggests the thought: “Oh, you poor, hopeless thing. You’ve given up on having a happy life.” But, we haven’t. Most sufferers of GAD and panic attacks may have some level of depression accompanying the disorders, but we don’t often just give up and go to bed. Even during the times when I’ve been housebound, I’ve been busy about trying to get better. It may just be that my “busy” doesn’t look the same as yours. But, trust me, I (we) haven’t given up. Lastly, and the most important thing we want you to know… If you know someone who you think may be experiencing Generalized Anxiety Disorder and/or panic attacks, please talk to them. Let them know that there is help available and that they don’t have to suffer alone. This is especially important for little kids who might be suffering. The earlier GAD and panic attacks are caught, the easier they seem to be to treat. Please don’t let someone you know suffer alone. There is hope and there is help. If you think you may know someone who suffers from Generalized Anxiety Disorder and/or Panic Attacks/Panic Disorder, check out the resources available through the Anxiety and Depression Association of America (ADAA). And, don’t forget to be a friend! Anxiety–Destroyer of Lives, Part 3: The Things People Say That I wish People Didn’t Say Anxiety–Destroyer of Lives, Part 4: Let’s Get Serious About This
<urn:uuid:831a5563-3266-4c36-bac3-8bd746a19d51>
CC-MAIN-2021-31
https://anxietydiaries.net/2017/03/08/anxiety-destroyer-of-lives-part-2-the-things-you-need-to-know-about-gad-panic-attacks/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046156141.29/warc/CC-MAIN-20210805161906-20210805191906-00389.warc.gz
en
0.954876
2,061
2.609375
3
10 Animals With Terrifying Teeth Saber-toothed tigers never fail to capture our imagination. They’re an (albeit extinct) example of just how terrifying teeth can get—but as we’ll find out, the dangers of extreme dentition aren’t merely confined to the past. In this list, we’ll take a look at the most dangerous, bizarre, and shocking teeth you could ever hope to avoid encountering: There are some animals so bizarre and disturbing that we begin to question how evolution managed to create such creatures. The four species of babirusa possess exceedingly bizarre weaponry, with which they carry out acts of aggression. Native to Indonesia, these “Deer Pigs” not only possess massive lower canines that curl, fang-like, over the upper jaw—but their upper canines also come in backwards, pairing with the lower tusks and curling back towards the head. Males slash each other with their sabers during vicious mating disputes. The upward direction allows them to be effective in combat, but if the Babirusa fails to grind them down, they may grow into the animal’s skull—with fatal results. Yes—saber-toothed deer. The thought is so strange and terrifying that one might be tempted to dismiss it as fantasy. In fact, several species of ungulate known as “musk deer”, native to Eurasia, possess massive fangs, which develop from outgrowths of the canine tooth. Musk deer fangs extend several inches past their lower jaw. Unlike the infamous cats of the distant past, musk deer go to battle against other males with their canine sabers, sinking them into each other during mating disputes. The creatures are genetically distinct from true deer (cervids), and are named after the powerful scent they produce to mark their territory. Back when the saber-toothed tiger was still roaming around on land, the terrifying payara was evolving exactly the same weaponry for domination of the rivers—but in reverse. Growing to lengths of more than four feet (1.2m), payara stalk the waters of the Amazon, sinking their three-to-four-inch fangs through the vital organs of their prey. As the stricken prey sinks towards the bottom, the payara’s cavernous jaws engulf it. Unlike most saber-toothed animals, its fangs remain entirely inside its mouth, sliding into two holes in the upper jaw. The ghastly appearance and potential danger of a bite from the “vampire characin” sends chills through the spine of even the most seasoned fisherman. At first glance, the goosander looks like a typical waterfowl; but when feeding ducks at the pond, you might not want to offer your hand to the members of this unusual species. As the largest of the “Sawbills” of the genus Mergus, the goosander inhabits rivers, estuaries, and park lakes throughout Eurasia, Canada, and the USA. Extending from its bill are more than one hundred and fifty razor-sharp teeth, curved backwards, which can slice through the bodies of fish like a hot knife in butter. A bird with teeth is always going to be an anomaly—but even more eerily, this dinosaurian “devil duck” may at times saw up small mammals, and even other birds, as though it were some form of aquatic raptor. The fact that an animal is a herbivore should never tempt you into the belief that it poses no danger to you. Some plant eaters still have particularly wicked canine teeth. Take the familiar and apparently blasé dromedary camel, for instance. Although this species has long been used as a pack animal and grazer, those thick lips hide impressive teeth that reach over three inches (7.5cm) in length. With such massive jaws and sharp teeth, it is easy to understand how owners have been killed—sometimes in their sleep—by camels with a mind for revenge. It is well within their power to crush a human skull. Fatal bites, such as the one recently reported in China, may also occur during mating season, when the animals are defensive and territorial. This is the only extinct species on this list. The helicopron was a shark, twenty feet (6m) in length, which used its enormous teeth in a manner unlike that of any known living creature. Attached to a circular muscle, the shark’s mouth apparatus would shoot out and shred prey into bite-sized pieces, much like an actual chainsaw. The shark’s bizarre form of dentition was misunderstood by scientists for years, before the strange and disturbing truth was eventually revealed. The two-inch (5cm)-long teeth were tightly packed in a descending spiral, ensuring that the prey was torn to pieces with great speed. The “unicorn of the sea” was afforded mythical status by explorers and researchers—until the moment when the bizarre creature was properly documented and found to be real. In a bizarre twist of physiology, this relatively small, thirteen-foot (4m)-long whale developed a lethal “spear” atop its head, which could be used during territorial disputes and in self-defense. Occasionally, it is used to break up ice in the whale’s arctic habitat. In a departure from the norm of symmetry in the animal kingdom, the narwhal’s enormous weapon is actually a modified right canine tooth that angles forwards and extends through the animal’s forehead. The narwhal has no other teeth in its oddly-shaped jaws, but on occasion, the left canine socket may sprout a second “tusk,” sometimes of equal length to the first. Baboons are the largest monkeys on Earth, filling out at more than eighty pounds (36kg). Despite being around half the size of most humans, the average baboon’s fang-like canines often reach two inches (5cm) in length—even longer than the teeth of most adult lions. Although these simian sabers appear fit to kill even the most intimidating prey, they are more often used in mating season fights among rival males—suggesting that it was sexual selection which led to the development of oversized fangs. But this doesn’t afford much comfort to those who stray into baboon territory. The hippopotamus may reach a length of more than sixteen feet (5m), and can put on an incredible nine thousand pounds (4000kg) in weight, making it the third-most massive land animal. The hippopotamus (to avoid the contentious plural) also has the largest canines of any land animal, with two sword-like teeth that reach a whopping sixteen inches (40cm) in length. Essentially, we are dealing with a truck-sized river monster with teeth capable of running through two humans in one bite. And we grew up thinking that crocodiles were our biggest enemies on the Nile… In one notable case, a tour guide was partially swallowed by a hippopotamus, and his arm was lost. And in a final fascinating twist, genetic research has shown that these saber-toothed creatures are relatives of whales, rather than pigs as once thought. With a name like that, anything is possible—this is one fish you do not want to meet on a diving trip. Reaching well over two feet (60cm) in length, these tropical reef inhabitants can be found in shallow waters. They are known to fiercely defend their territories against intruders, including human explorers. Triggerfish teeth—their purpose being to crush rock-hard coral—are shockingly sharp and powerful, and appear almost human-like. Triggerfish teeth are unusual in that they are straight yet extremely thin. This makes them exceptionally sharp, yet they’re also extremely strong, and resilient to damage. Ron Harlan investigates of the mysteries of nature and the bizarre findings that often crop up on this planet. He is a freelance writer and student of science.
<urn:uuid:bf56e698-aba4-4500-8de8-a462badf5cf2>
CC-MAIN-2014-10
http://listverse.com/2013/05/18/10-animals-with-terrifying-teeth/
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999653645/warc/CC-MAIN-20140305060733-00003-ip-10-183-142-35.ec2.internal.warc.gz
en
0.959761
1,685
3.28125
3
50 years ago today, the members of Led Zeppelin—Jimmy Page, Robert Plant, John Paul Jones and John Bonham—made their live debut in the outskirts of Copenhagen for 1,200 youngsters at the Egegard School. Afterward, a local review stated: “Their performance and their music were absolutely flawless.” They became one of the most innovative, influential, and successful rock bands in history, selling 200-300 million LPs sold worldwide. The band’s fourth album, with the song “Stairway to Heaven“, is among the most popular and influential works in rock music. Every one of their 9 studio albums reached Billboard’s top 10, and six hit #1. WATCH a short bio video… (1968) (Photo by Jim Summaria, CC license) MORE Good News on this Date: - Brazil gained its independence from Portugal and celebrates on this day (1822) - TV pioneer Philo Farnsworth succeeded in transmitting an image electronically with his image dissector (video camera tube), and called it television—with 300 patents, he made many crucial contributions to the development of all-electronic television at his Farnsworth Television and Radio Corporation, in Fort Wayne, Indiana (1927) - The first episode of Monty Python’s Flying Circus was recorded, the wildly popular BBC cult comedy series that ran for 5 years and is famous for sketches like, Dead Parrot, The Spanish Inquisition, Ministry of Silly Walks, and The Lumberjack Song (1969) - Desmond Tutu became first black leader of South Africa Anglican Church (1986) - Abdul Ahad Mohmand, the first Afghan in space, returned aboard a Soviet Soyuz spacecraft after 9 days on the Mir space station (1988) He had originally drawn a face for his daughter on a dusty, faceless rag doll she found in the attic. He named the doll Raggedy Ann, and Marcella played with her so much, that he figured other children would like one too. Three years later he published Raggedy Ann Stories and later created a series of popular books and dolls, adding Raggedy Andy as a playmate. Also, on this day in 1936, Buddy Holly was born into poverty in a musical family in Lubbock, Texas. In just 18 months, from his first #1 hit song, “That’ll Be The Day,” to when he died in a tragic plane crash at age 22, the prolific singer-songwriter topped the charts with more than a dozen Top 40 hits worldwide. Unlike his hero, Elvis Presley, Holly was an innovator for writing his own material and experimenting with double tracking and orchestration. He also pioneered and popularized the now-standard use of two guitars, bass, and drums by rock bands. His influence was felt in Britain where he became the major musical influence for The Beatles and Stones. Before there was a British Invasion led by the Beatles in America in 1964, there was an American Invasion led by Buddy Holly in England. Teenagers John Lennon and Paul McCartney saw Holly for the first time when he appeared on English television in 1958. Having recently begun their musical association, they studied Holly’s records–like Peggy Sue, Everyday, and Not Fade Away– and learned his performance style and lyricism, even took their insect-inspired band name from Holly’s band, The Crickets. McCartney owns the publishing rights to Holly’s song catalogue. Don McLean’s popular 1971 ballad “American Pie” and its lyric, “The Day the Music Died,” was inspired by Holly’s death and the day of the plane crash. Holly chartered a four-seat Beechcraft airplane in Mason City, Iowa, for himself and his band, which included Waylon Jennings, because their tour bus had no heat and kept breaking down in the frigid Midwest winter. The pilot took off in inclement weather, although he was not certified to fly by instruments-only, and Holly was killed when the plane crashed in a cornfield outside Mason City, Iowa on February 3, 1959. After he was befriended by The Everly Brothers, Don Everly advised Holly to replace his old-fashioned glasses with trending horn-rimmed glasses. When the plane crashed, the wreckage was strewn across the snow-covered ground and while his other belongings were recovered immediately, there was no record of his signature glasses being found. They were presumed lost until, in March 1980, they were discovered misplaced in a county courthouse storage area. They had been found after the snow had melted the following spring, and were returned to Holly’s widow a year later.
<urn:uuid:f5ecc0c7-e29f-42e3-809b-cc46655bf67d>
CC-MAIN-2019-13
https://www.goodnewsnetwork.org/events060907/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204768.52/warc/CC-MAIN-20190326014605-20190326040605-00174.warc.gz
en
0.978047
981
2.59375
3
In this ongoing term-based art program, students explore their creativity through drawing, illustration and painting, translating their ideas into visual narratives. Projects are designed to build and expand on the individual student's fundamental art skill and style, with different theme to explore in each term. Discover and experiment using various art techniques such as form, shading, colour and how to effectively set up composition for your narrative scene. All of our classes are structured in a mixed-age grouping with each student being assessed and catered according to their learning abilities in a differentiated curriculum. This method of art learning allows appropriate level of comprehension of each student. If you’re passionate about drawing and discovering your inner creativity and imagination, then this course is for you. The course is mentored and facilitated by Tull Suwannakit Children 8 years old onwards BOOK NOW for a single session CONTACT us for more details about our full term enrolment In this 10-week course for adults, you will be taken on a creative journey on how to write and illustrate your very own picture book for children. The immersive course will cover all areas used in the publishing industry including: How to gather ideas, develop your story through structuring and pacing, character design and storyboarding. Throughout the course, our facilitator will guide you through step-by-step illustration techniques that are catered to individual style and preferred medium of each student. The course is suitable for adults with all skill levels, even beginners. Topics covered in this course: Setting up compositions Lighting and shadows Story structure, pacing and rhythm Experimentation of various art medium Character's expression and movement How to develop simple and effective ideas for your story The course is presented and facilitated by children's book author and illustrator Tull Suwannakit
<urn:uuid:ac3297d9-2bf4-495c-9a3a-d636dfb4b144>
CC-MAIN-2023-50
http://www.malvernschoolofart.com.au/COURSES.php
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00061.warc.gz
en
0.926141
372
2.84375
3
What is Matter? Created by: Mrs. Metivier’s 2nd Grade Class Teacher: Mrs. R. Metivier Grade: 2nd Subject: Science Standard: S2P1 Students will investigate the properties of matter and changes that occur in objects. a. Identify the properties of matter and changes that occur in objects. b. Investigate changes in objects by tearing, dissolving, melting, squeezing, etc. Directions: Use as a resource when teaching the standard above. What is matter? Matter can be a gas, solid, or a liquid. Gas is air. A solid is a hard shape. A liquid is water. Every thing is matter. Properties of solids A solid is one kind of matter. Like all matter, it takes up space and has mass. A solid is the only form of matter that has a shape of its own. Measuring solids You can measure solids with a ruler to see how long a solid is. You can also measure solids with a scale to see how much it weighs. Properties of liquid A liquid takes the shape of its container. Even though it takes its shape of its container it still has mass. Liquid is measured by milliliters. If you have one container and put it in a other container it is the same amount. Measuring Liquids You can measure the volume of a liquid. Volume is the amount of space a liquid takes up. We use cups and milliliters to measure liquids. Properties of Gas Like all matter, gas takes up space and has mass. A gas takes the shape of its container. A gas is the only kind of matter that always fills all the space inside a container. Measuring gas Gas can be measured. A balloon is an example of measuring gas. A balloon with air has more mass than a balloon without air. Cup in the water trick Even air takes up space! Try this trick! Take a paper towel and put it in the bottom of a cup. Turn the cup upside down and push it down in a bucket of water. Pull it straight up and look at the paper towel!...It’s dry!!!!!!!!!!!! Why? It’s because the air pushes the water out of its way. Explaining Mixtures of matter Matter can be cut and mixed . When solid matter is cut its shape changes, but its mass stays the same. Some mixtures, like Chex Mix, can be sorted out. Some mixtures, like cake batter, cannot be sorted back out . Cutting Matter When you cut bread it doesn’t change it’s form. It’s mass doesn’t change . You can cut a glue stick in half and its mass does not change. Changing the shape of matter If you have a rock and get a hammer and smash the rock the rock shape will be changed but not its mass. Play-dough can be changed to different shapes, but if the amount is the same the mass is the same. FREEZING WATER YOU CAN FREEZE WATER AND CHAGE IT BACK. A bottle of water can be put in the freezer and it will freeze. You can take it out of the freezer and it will melt. Heating Water When you heat water it will change into a gas. At first, you can see the steam, or water vapor. Then the water vapor spreads into the air and you cannot see it. Evaporation When the rain comes down and it dries up again, this is evaporation. A puddle is liquid water. The sun’s heat may cause the water in the puddle to evaporate or change to water vapor. I can melt the ice with the hair dryer until it disappears, or evaporates. Cooling water vaporCondensation When water vapor condenses, or the heat is taken away,… gas turns back to water. We put blue ice water in the cup and water drops formed on the outside of the cup, but it was clear. This water came out of the air. When the air around the cup cooled down, the water vapor turned back to water on the outside of the cup. It’s not blue so that proves that the water did not come from inside the cup. Reversible Changes In a reversible change, the matter can change back to the way it was before. Jell-O is a solid when it is cold, but a liquid when it warms up. Ice is a solid but when you add heat to it, it will turn back to a liquid. Irreversible changes Cooking can also cause irreversible changes. Cooking makes an egg change from a liquid to a solid. Dancing Raisins Experiment! Get a clear cup. Fill it half way up with water. Stir in two big spoonfuls of baking soda. Put a few raisins in the cup. Then pour in some vinegar and watch what happens!......They dance! The soda and vinegar makes bubbles that lift the raisins and then they POP and sink back down.
<urn:uuid:808c5052-f4de-4076-a71c-32c7a03f3bca>
CC-MAIN-2018-17
http://studylib.net/doc/5431075/what-is-matter%3F
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948214.37/warc/CC-MAIN-20180426125104-20180426145104-00629.warc.gz
en
0.937782
1,022
3.921875
4
The Neotropical eumenine wasp Pachodynerus nasidens is recorded from Japan for the first time. Its recognition characteristics are noted. New records of this species from Micronesia and Polynesis are given and its distribution throughout the western Pacific is mapped and briefly discussed. A new species of isometopine plant bug, Isometopidea gryllocephala, is described from Ishigaki Island in the Ryukyus, Japan. This is the third species of Isometopidea and has the northernmost distribution in the genus. The type specimens of Aphaenogaster forms described by Wheeler from Japan were re-examined. A. verecunda Wheeler, 1928 is newly synonymised with A. japonica Forel, 1911 stat. nov., and A. famelica frontosa Wheeler, 1928, A. f. ruida Wheeler, 1928, and A. vapida Wheeler, 1928 are newly synonymised with A. famelica (Fr. Smith, 1874). A small collection of Pycnogonida from shallow waters of Ogasawara (Bonin) Islands contains two species. One of them, Achelia curticauda, is new to science and is described, illustrated, and compared with similar species. This is the first record of pycnogonids from Ogasawara Islands. The phylogenetic relationships of Platycephalidae and its related taxa were analyzed. Platycephaloidei and Scorpaenoidei form a monophyletic group supported by two synapomorphies : presence of a backwardly-directed opercular spine and an extrinsic muscle derived from the hypaxial. Platycephaloidei and Plectrogenium, the triglids and peristediids are monophyletic, characterized by a posterior pelvic fossa. Bembradium and Plectrogenium constitute a monophyletic group, which divided initially from remainder of the clade. Next Parabembras, followed by Bembras, branched off the latter. Platycephalidae and its sister group, including the triglids, peristediids and hoplichthyids, have 4 synapomorphies. The triglids, peristediids and hoplichthyids share 15 apomorphies. The peristediids and hoplichthyids constitute a monophyletic group supported by 8 synapomorphies. The newly-defined suborder Platycephaloidei includes the following 7 families : Plectrogeniidae, Parabembridae, Bembridae, Triglidae, Peristediidae, Hoplichthyidae and Platycephalidae. Platycephalidae is redefined, being a monophyletic group supported by 6 synapomorphies, and including 2 subfamilies and 17 genera, 3 of them new.
<urn:uuid:dc96d520-f08f-49e8-8eb2-0eab615579ab>
CC-MAIN-2020-50
https://www.jstage.jst.go.jp/browse/specdiv/1/0/_contents/-char/ja
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141681524.75/warc/CC-MAIN-20201201200611-20201201230611-00235.warc.gz
en
0.86818
625
2.703125
3
While pests and predators must be controlled to prevent the damage they cause this must be done humanely to be ethical and regulations shouldn't cause double standards. Pests and predators are unwanted organisms that cause damage to resources that we value. This damage can be highly variable and can be expensive to fix. This damage can range from the soiling of stored products such as weevils in the pantry at home to mice invading raw materials. It may be damage to assets such as rats chewing on electrical cables to birds’ nests being a fire hazard in the roofs of buildings. It may also be the transmission of diseases to livestock, such as bovine TB in cattle or toxoplasmosis in sheep. It may even be damage to wildlife through predation of adults and young or competition for food and space in natural habitats. Just as the range and scale of the damage that pests and predators cause can be highly variable so the identity of the pest or predator can be highly variable. They come from all groups of organisms known to science including invertebrates such as insects, spiders and even worms and vertebrates such as fish, amphibians, reptiles, birds and mammals. In response to this vast array of nuisance organisms and the problems they cause, an equally vast array of responses has been developed to control and remove these animals. From the ubiquitous can of fly spray to ingenious traps and deadly poisons we have an arsenal of weapons at our disposal to counter the threats from pests and predators. However, the right to use of any of those weapons in the arsenal also carries with it the responsibility to use them lawfully and ethically. Over time, the ethics of pest and predator control has shifted and what was once acceptable may now be unlawful. Items that have been consigned to history include gin traps used to catch animals by the legs, glue boards used to ensnare rodents and chemicals such as DDT used to kill insects. So where are ethics today? Animal welfare ethics are increasingly driving legal requirements. Today it is a requirement to check live capture traps at least once a day and soon Britain will outlaw the use of Fenn traps for the capture of stoats on the grounds of humaneness. Interestingly, the Fenn trap was developed as the replacement for gin traps when these were outlawed in Britain so the wheel has turned full circle. We believe that humaneness is paramount so we have clearly stated our position on this. We have also made clear our position on the vexed question of feral cat management and would welcome feedback on either of these statements. We are also concerned about the risks of double standards when comparing the ethical and legal frameworks around pest and predator trapping versus poisoning. On the one hand required minimum standards are set to guard against unnecessary pain and distress caused by trapping yet on the other hand, here in New Zealand, it is OK to broadcast poison in the environment where it can have disastrous effects on non target animals. We think this conversation needs to be further advanced using good information and reliable data as opposed to emotion and prejudge. However difficult this conversation may be we are equally certain the outcome will be worth it and pest and predator control will be better for it. What's in a Name? The familiar saying "A bird in the hand is worth two in the bush" warns about the risks that come with trying to achieve more by challenging the status quo.
<urn:uuid:b9ca103c-bf84-4b7c-8bd5-aa7e557a9f30>
CC-MAIN-2023-06
http://www.modalcontrol.com/forum/ethics
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500215.91/warc/CC-MAIN-20230205032040-20230205062040-00210.warc.gz
en
0.958341
708
3.09375
3
Respiratory therapy for chronic lung diseases Respiratory therapy helps patients with chronic lung diseases such as asthma and COPD to breathe easier. Obstructive airway diseases such as asthma, COPD and pulmonary emphysema are associated with disturbed breathing and often with stuck secretions in the bronchi. The aim of respiratory therapy is to alleviate respiratory-related symptoms and to relieve the patient from coughing up viscous mucus. In a respiratory therapy, therefore, it is about giving those affected certain exercises and techniques that facilitate breathing and exhaling. What happens with respiratory therapy? A respiratory therapy can be thought of as physiotherapy adapted to lung patients . The focus is on the specific complaints of the patients, which should be improved by targeted training. Essentially, respiratory therapy revolves around the following goals and content: Development of a breathing consciousness Instructions for breath-physiological strength and stretching exercises Mediation of special cough and breathing techniques Mobilization of tough, stuck secretion in the bronchi Improvement of oxygen uptake Instructions for training with respiratory therapy devices Where can you do a respiratory therapy? In principle, every patient can carry out a respiratory therapeutic training program independently at home. Especially for newcomers, a training or accompaniment by a therapist is highly recommended. As part of such training, patients will be able to perform the techniques and exercises they have learned on their own. Respiratory Therapy Training is offered by specially trained respiratory therapists (physiotherapists with respiratory therapeutic additional training) Rehabilitation clinics for lung patients and regional pulmonary groups . Regulation and reimbursement A respiratory therapy can be prescribed by a home or pulmonologist. In the case of a first prescription, usually 6 therapy sessions of 20 minutes each are prescribed. Further regulations are possible. If the respiratory therapy has been prescribed by a doctor, the statutory health insurance usually bears the costs. Therefore, discuss the possibility of a prescription with your attending physician. Respiratory therapy devices for lung patients Tough mucus, which lodges in the bronchi and narrows the airways, causes chronic cough and increases the respiratory distress of many respiratory patients. One goal of respiratory therapy is therefore to release the mucus and facilitate coughing . Especially the use of special respiratory therapy devices makes sense here. These so-called PEP systems transmit a positive pressure on the respiratory tract, which arises when exhaling into the device. As a result, tough mucus is released from the bronchial walls and can be easily removed or coughed off. Reflective Respiratory Therapy In addition to the psychotherapeutic respiratory therapy, there is also the reflex respiratory therapy, which, however, pursues a completely different approach. She works with alternative healing methods and wants to promote via meditative breathing exercises body awareness and mental balance. This form of respiratory therapy aims primarily at stress reduction and relaxation in order to positively influence the health status of the patients.
<urn:uuid:74337587-9fda-4829-bcd2-63e938937000>
CC-MAIN-2019-43
https://www.successchemistry.com/blog/respiratory-therapy
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987779528.82/warc/CC-MAIN-20191021143945-20191021171445-00013.warc.gz
en
0.927462
617
2.859375
3
As Bruce Sibbitt, Engineer at Natural Resources Canada (NRCan), announced during his presentation at the Solar World Congress in Kassel, Germany, in September, the solar district heating system at the Drake Landing Solar Community has - in its fourth year in operation - almost reached the planned solar fraction of 90 %. In addition to borehole heat storage of 34,000 m3, the system is equipped with two short-term storage tanks, which have a capacity of 120 m3 of water each. Photo: Natural Resources Canada 52 single-family houses benefit on their two storeys from the generated district heating energy. As for domestic hot water, each house has its own solar water heater, which generates around 50 % of the water heating energy, while a gas-fired boiler supplies the rest. The solar district heating system is a project of the governmental organisation Natural Resources Canada (NRCan). Utility ATCO Gas is said to acquire ownership and take over operation in the near future. The conditions are very favourable for installing a solar water heater in the settlement close to Calgary: First, the location enjoys excellent solar resources. Annual irradiation is at 1,785 kWh/m2*a, which is comparable to central Spain or southern Italy. Second, the Canadians use air heating systems, which were adapted even further in this case to allow the entire system to operate at relatively low, solar-friendly temperatures. The temperature of the water running through the pipes of the district heating system depends on the temperature of the outside air, but is usually cooler than in European water heating systems: even at freezing –40 °C outside, the water in the pipes is no warmer than 55 °C. An air handling unit transfers the heat from district heating to the household system. A lot of heating energy is required around Calgary. Even in summer, a bit of heat remains necessary: Calgary has 5,199 heating degree days per year (= (18 °C – outside air temperature) * number of days). “Which means the heating season, in fact, never stops,” Bruce Sibbitt says. In summer, the heat pumps are halted around 12 hours per day to allow maintenance works. 798 flat plate collectors with a total gross collector area of 2,293 m2 generate the heat. The collectors have been mounted on the garage roofs in four rows. The solar heated water is stored in two short-term storage tanks, which are located in the so-called Energy Centre. Here, water from the cooler storage tank runs through a heat exchanger, absorbs the heat from the solar circuit and is fed into the upper part of the warmer storage tank. Both storage tanks lie horizontally, but are separated by baffles in the middle to improve stratification. In 2009, the tanks were retrofitted with diffuser pipes, which are inserted at the very top of the tanks, to ensure that - if needed - water can be fed into and taken from the warmest area of the tank. When the short-term storage is heated, the heat is fed to the underground borehole storage. The borehole storage consists of 144 single U-tube boreholes heating up about 34,000 m3 of earth. The borehole area has a diameter of 35 m and is 35 m deep. On the surface, it is insulated with 200 mm of foam. The core of the borehole storage reaches temperatures of more than 65 °C in autumn and goes down to 40 °C in spring. Because the storage does not have precisely set borders or insulation within the ground, heat losses were pretty high over the first years, until the earth around the storage had reached a suitable temperature. Measured storage efficiency then rose from 6 % in the first year to over 40 % in the fourth year, which has been almost in line with the simulations carried out beforehand. The solar fraction of the heating energy rose from 55 % in the first year to 86 % in the fourth year. This means that the system has almost reached the 90% solar fraction it was designed to achieve. “It is likely we will reach 90 % in the fifth year,” Sibbitt says. Mean efficiency of the solar collectors was expected to drop with the rising solar fraction, but has so far remained fairly stable, at 33 %. In the fourth year in operation, 683 MWh of solar heat were delivered for space heating. This corresponds to a yield of 278 kWh/m2 of gross collector area. Assuming a system life of 40 years and a collector life span of 20, the solar heat costs 0.17 Canadian Dollars (CAD) per kWh (0.12 EUR/kWh). The calculation is based on initial system costs of CAN 3,385,000 (EUR 2,473,000), including the Energy Centre and its short-term tanks (CAN 600,000), the borehole storage (CAN 620,000), the heating and solar collection loops (CAN 1,025,000), the solar collectors (CAN 710,000), and collector installation (CAN 430,000). Comparing the relatively high cost per kWh to the cheap solar heat from the ground-mounted systems in Denmark (around 0.04 EUR/kWh) has proven quite a challenge because the latter usually exclude initial system costs. Most of the overhead costs of the Drake Landing project were covered by funds from several federal programmes and the Province of Alberta. The homes were sold on the open market. “The project was designed and built with the full knowledge that the solar system was smaller than the economic optimum,” Sibbit says. With the data collected at Drake Landing, NRCan research institution CanmetENERGY plans to calibrate its simulation model for solar systems. The next project at which the model may be in use is a district heating system for 1,000 living units in the Calgary area, which is going to be built and run by the same organisations that set the Drake Landing project in motion. This text was written by Eva Augsten, a German freelance journalist specialised in renewable energies ( email@example.com ).
<urn:uuid:3c9bd09b-7771-4814-9b0b-22a43675636b>
CC-MAIN-2020-29
https://www.solarthermalworld.org/news/canada-district-heating-90-solar-fraction
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655937797.57/warc/CC-MAIN-20200711192914-20200711222914-00433.warc.gz
en
0.954487
1,246
3
3
A new study shows that the body size of the iconic gigantic or megatooth shark, about 15 meters (50 feet) in length, is indeed anomalously large compared to body sizes of its relatives. Formally called Otodus megalodon, the fossil shark that lived nearly worldwide roughly 15-3.6 million years ago is receiving a renewed look at the significance of its body size in the shark world, based on a new study appearing in the international journal Historical Biology. Otodus megalodon is commonly portrayed as a super-sized, monstrous shark, in novels and films such as the 2018 sci-fi thriller “The Meg,” but it is known that the scientifically justifiable maximum possible body size for the species is about 15 meters (50 feet). Nonetheless, it is still an impressively large shark, and the new study illuminates exactly how uniquely gigantic the shark was, according to Kenshu Shimada, a paleobiologist at DePaul University in Chicago and lead author of the study. Otodus megalodon belongs to the shark group called lamniforms with a rich fossil record, but the biology of extinct forms is poorly understood because these cartilaginous fishes are mostly known only from their teeth. Based on measurements taken from present-day non-planktivorous lamniforms, the study presents an equation that would allow estimations about the body length of extinct forms from their teeth. The study demonstrates that O. megalodon that reached about 15 meters (50 feet) is truly an outlier because practically all other non-planktivorous sharks have a general size limit of 7 meters (23 feet), and only a few plankton-eating sharks, such as the whale shark and basking shark, were equivalent or came close to the size. The study also reveals that the Cenozoic Era (after the age of dinosaurs, including today) saw more lamniform lineages attaining larger sizes than the Mesozoic (age of dinosaurs) Era. Warm-bloodedness has previously been proposed to have led to the gigantism (over 6 meters, or 20 feet) in multiple lamniform lineages. The new study proposes their live-bearing reproductive strategy with a unique cannibalistic egg-eating behavior to nourish early-hatched embryos to large sizes inside their mother to be another possible cause for the frequent evolution of gigantism achieved by lamniform sharks. Understanding body sizes of extinct organisms is important in the context of ecology and evolution. “Lamniform sharks have represented major carnivores in oceans since the age of dinosaurs, so it is reasonable to assert that they must have played an important role in shaping the marine ecosystems we know today,” said Shimada. “This is compelling evidence for the truly exceptional size of megalodon,” noted co-author Michael Griffiths, a professor of environmental science at William Paterson University in Wayne, New Jersey. Co-author Martin Becker, also a professor of environmental science at William Paterson University, added, “this work represents a critical advancement in our understanding of the evolution of this ocean giant.” Original research article: http://dx.doi.org/10.1080/08912963.2020.1812598 Featured image: Model of megalodon shark jaws at the American Museum of Natural History, in New York.
<urn:uuid:f0231e84-d3bc-4ef3-9d3f-151184cbab64>
CC-MAIN-2022-05
https://bescienced.com/body-size-of-the-extinct-megalodon-indeed-off-the-charts-in-the-shark-world/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304959.80/warc/CC-MAIN-20220126162115-20220126192115-00006.warc.gz
en
0.94349
704
4.09375
4
Northern Prairie Wildlife Research Center Prairie communities occur along a moisture gradient as shown below. The wet end of the gradient, wet and wet-mesic prairies, meet the criteria for wetlands. These are also referred to as low prairies. Prior to European settlement, vast expanses of prairie existed in southern Wisconsin and western and southern Minnesota. Minnesota alone had approximately 18 million acres of prairie. Prairies evolved with fire and fire is essential to maintenance of prairies. Without periodic burns, prairies become subject to invasion by woody vegetation. In the pre-European settlement landscape, huge wildfires roared across the prairies of Minnesota and Wisconsin. European settlement brought two things to the prairie: the plow and fire suppression. Once the prairie sod was broken, and the wet prairies were drained, the deep, black soils proved to be among the most productive farmland in the world. More than 99 percent of prairies in Minnesota and Wisconsin were destroyed by the conversion to agricultural use. Prairies that were not plowed under were hayed or intensively grazed for decades resulting in degradation and changes in species composition. Remaining remnant prairies often suffer because of fire suppression and may be lost without intensive management. Given this nearly total loss of prairie, it is not surprising that prairie species once common in Minnesota and Wisconsin are now threatened or endangered. Two prairie orchids, the western prairie fringed orchid and white lady- slipper, are prime examples. Some large tracts of virgin (never plowed) or otherwise high quality prairie still exist on publicly-owned preserves or those purchased and managed by private conservation groups. Notable examples are the Chiwaukee Prairie in Kenosha County, Wisconsin, and the preserves within the Interbeach Area of Glacial Lake Agassiz in northwestern Minnesota. VEGETATION: This example of a wet to wet-mesic prairie includes gayfeather (Liatris pycnostachya), prairie cord-grass (Spartina pectinata), giant manna grass (Glyceria grandis), big bluestem (Andropogon gerardii), hummock sedge (Carex stricta), a spike-rush (Eleocharis compressa), green bulrush (Scirpus atrovirens), sawtooth sunflower (Helianthus grosseserratus), Riddell's goldenrod (Solidago Riddellii), grass-leaved goldenrod (Euthamia graminifolia), New England aster (Aster novae-angliae), sneezeweed (Helenium autumnale), prairie loosestrife (Lysimachia quadriflora), water hemlock (Cicuta maculata), mountain mint (Pycnanthemum virginianum), slender rush (Juncus tenuis), redtop (Agrostis gigantea), winged loosestrife (Lythrum alatum) and shrubby cinquefoil (Potentilla fruticosa). SOILS: Colwood silt loam (Typic Haplaquolls), a poorly-drained mineral soil underlain by stratified lacustrine silt and very fine sand. Landscape position is a swale connecting morainal hills with an extensive wetland complex on muck soils. HYDROLOGY: High groundwater table and, to a lesser extent, surface runoff from morainal hills. Colwood soils have a seasonal high water table at the surface to 12 inches below the surface during October through May of most years. LOCATION: Scuppernong Marsh, Kettle Moraine State Forest, Waukesha County, Wisconsin. Prairie Cord-grass (Spartina pectinata Link) Big Bluestem (Andropogon gerardii Vitman) Gayfeather (Liatis pycnostachya Michaux) New England Aster (Aster novae-angliae L.) Riddell's Goldenrod (Solidago Riddellii Frank) Sawtooth Sunflower (Helianthus grosseserratus Martens) Prairie Dock (Silphium terebinthinaceum Jacq.) Western Prairie Fringed Orchid (Platanthera praeclara Shev. & Bowls.) Common Mountain Mint (Pycnanthemum virginianum (L.) Durand and Jackson) Culver's Root (Veronicastrum virginicum (L.) Farw.)
<urn:uuid:3af4c9f3-b94d-4287-89d3-f55f77c6140e>
CC-MAIN-2013-20
http://www.npwrc.usgs.gov/resource/plants/mnplant/wet.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703306113/warc/CC-MAIN-20130516112146-00081-ip-10-60-113-184.ec2.internal.warc.gz
en
0.843819
951
3.859375
4
The Goat and the Vine The fable and its versions When a goat starts eating a vine's leaves and shoots, the vine retorts that it will still have enough juice left to produce grapes, the wine from which will be poured over it when the goat is sacrificed. The earliest record of the fable is in an epigram by Leonidas of Tarentum, who lived in the area of southern Italy colonised by Greeks in the 3rd century BCE. Later Greek references come from Western Asia, including another epigram by Evenus of Ascalon containing simply the vine's retort and the prose collection of fables by Aphthonius of Antioch. Elsewhere in Europe it first appeared in Latin fable collections from German language areas, including Sebastian Brant's Esopi Appologi sive Mythologi (1501) and the 150 poems based on fables by Pantaleon Candidus (1604). The tale only began to appear in English fable collections in the 19th century. In ancient times there was an alternative version of the fable that appeared in various recensions of the story of Ahiqar from the first century CE. In the Arabic version, a gazelle nibbles a madder plant, which threatens that it will be used to tan the goat's hide when the animal is killed and skinned. Madder or other tanning agents make a similar threat in the Syriac, Armenian and Slavonic versions of the story, but the goat or deer involved answers that, while this may happen in the future, for the present it needs to satisfy its hunger. 19–20th century illustrations from books
<urn:uuid:e5e37b5e-0c85-407e-bb7f-12174f53acef>
CC-MAIN-2016-36
https://en.wikipedia.org/wiki/The_Goat_and_the_Vine
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982297973.29/warc/CC-MAIN-20160823195817-00092-ip-10-153-172-175.ec2.internal.warc.gz
en
0.93742
343
3.296875
3
1987 – Flight Telerobotic Servicer (FTS) – Martin Marietta (American) The flight telerobotic servicer, or FTS, was conceived as a means of incorporating U.S. robotics technology on Space Station Freedom. The U.S. Congress was interested in advancing both robotics and automation technology for the benefit of the Station, as well as directing spin-offs to the U.S. economy. In addition to ensuring technology transfer between various U.S. industries, the FTS would also serve to provide telerobotics assistance to early Station assembly tasks, service attached scientific payloads, and serve as a telerobotic assistant to EVA crewmembers. The prime contract to manufacture the FTS was allocated to Martin Marietta Corp. with NASA's Goddard Spaceflight Center (GSFC) serving as the technical/managerial lead for integration onto the Space Station. The FTS was scheduled to fly as part of the Station's first element launch package in 1995, but the FTS program was terminated in 1991 because of SSF budgetary cutbacks. Figure 13 shows the final FTS concept. Source: Teleoperation and Robotics in Space, ed. by Carl F. Ruoff, 1994 . NASA decided to develop a $288-million FLIGHT TELEROBOTIC SERVICER in 1987 after Congress voiced concern about American competitiveness in the field of robotics. The FTS would also help astronauts assemble the Space Station, which was growing bigger and more complex with each redesign. Martin Marietta and Grumman received $1.5-million study contracts in November 1987. Shown here is the winning design by Martin Marietta, who received a $297-million contract in May 1989 to develop a vehicle by 1993. Grumman were losing finalists. The Bush Administration briefly tried to commercialize the FTS project in early 1989. The contractors objected since the FTS had no commercial customers. The DTF-1 manipulator as used on the FTS. It has 7 degrees-of-freedom and is approximately 5.5 feet long from the shoulder to the toolplate. The FTS concept was no longer necessary after the Space Station in-orbit assembly procedures were greatly simplified in 1990-91. See other early Space Teleoperators here. See other early Lunar and Space Robots here.
<urn:uuid:9abde342-e56c-46c2-a4df-4fd79b03e449>
CC-MAIN-2017-04
http://cyberneticzoo.com/teleoperators/1987-flight-telerobotic-servicer-fts-martin-marietta-american/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285337.76/warc/CC-MAIN-20170116095125-00072-ip-10-171-10-70.ec2.internal.warc.gz
en
0.967208
486
3.5
4
Resistance Temperature Detector (RTD) As the name suggests RTD (Resistance temperature detector), gives output as resistance after detecting the temperature. Resistance Temperature Detectors (RTDs) are characterized by a linear change in resistance with respect to temperature. RTDs are positive temperature coefficient, that means Resistance increases with increase in temperature. Platinum is Commonly used in RTDs because its temperature Resistance characteristic is more linear in comparison to copper and nickel. RTD types are broadly classified according to the different sensing elements used. Platinum, Nickel, and Copper are the most commonly used sensing elements. Platinum is considered the best as it has the widest temperature range. This is shown in the resistance versus temperature graph above. Platinum type RTD is also known for its best interchangeability than copper and nickel. It also has the highest time stability. PRT’s can also be used in unsuitable environments where it can reduce atmospheric metallic vapors and also capitalizable vapors if the element is bare. It can also be used in radioactive environments. In industrial applications, a PRT is known to measure temperatures as high as 1500 degree Fahrenheit while copper and Nickel can measure only to a maximum of 400 degrees Fahrenheit. How to check RTD There are three wires in RTD. Out of the two wires are short-circuited as shown in the figure. Same color wires are short-circuited. white color wires are short-circuited We will check whether two same color wires are short-circuited or not. If no then connect a wire between these two same color wires. This wire can be connected either on RTD Side or Indicator Side. We will check whether the different color wire is showing the same resistance with the same color wires. If no then change the RTD. If different color wires are showing the same resistance then we will calculate the temperature according to the table or formula provided. Since platinum is used in RTDs so RTDs are PT 100, PT 500, PT1000. PT 100 means it will show 100 ohms at 0 Degree Celsius. PT 500 will show 500 ohms. We will check the resistance to calculate the temperature. Third wire shows the same resistance with the other two wires. And for calculating temperature the formula is Rt = R0(1+@t) Where t is temperature, R0 is resistance at 0 Degree Celsius. Rt is resistance at t Degree Celsius. R0 is 100 Degree Celsius for PT 100. @ is temperature Coefficient. The other method of calculating temperature is For PT 100 t = (Rt-100)*2.6 similarly for PT 500 that means we will check the resistance between a white and red wire, it will show some value more than 100 ohms, this resistance is called as Rt. suppose Rt is 138.5, then t= (138.5-100)*2.6 approximately 100 degrees Celsius. Types of RTDs RTDs are of three types. 2 wire RTD. 3 wire RTD. 4 wire RTD. Commonly used RTD Materials: Platinum (most popular and accurate) 2 wire RTD is used for short distances. 3 wire RTD is used for long distances. The third wire is used for Resistance compensation. Resistance compensation means when the signal is coming from large distance wire resistance is not added. 4 wire RTD is used for large distances. The various wiring arrangements are designed to reduce and/or eliminate any errors introduced due to resistance changes of the lead wires when they also undergo temperature changes. RTDs used for electrical equipment generally use either a three-wire system or a four-wire system having paired lead wires. The four wire system is little affected by temperature induced resistance changes in lead-wires, and, of all the arrangements, it is affected least by stray currents. It, therefore, is used to measure temperature differences and is used generally for making very accurate measurements. The three-wire system is generally satisfactory for industrial measurement using a secondary instrument that is remote, say, more than 3 meters distant from the RTD. Although the error caused by temperature change in the leads is virtually eliminated in a 3-wire arrangement, a slight non-linearity in the resistance change is introduced with this scheme. RTDs are available in different sizes according to their length. Length of an RTD is in millimeters (mm). This Sensing element is nothing but a PT100 capsule. All RTDs are simplex and duplex. Simplex and Duplex RTD In simplex type RTDs, there will be only one element with 3 wires. In duplex type RTD, there will be 2 temperature sensing elements of 3 wires each. - Very high accuracy - Ability to measure narrow spans - Suitability for remote measurement - Ability to be matched to close tolerances for temperature difference measurements. - Excellent stability and reproducibility Follow us on
<urn:uuid:964d7059-299c-49d2-8660-82f7b09b4f6a>
CC-MAIN-2019-47
https://www.blog.shubhkaamna.in/resistance-temperature-detector-rtd-how-to-check-rtd-and-its-advantages/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670512.94/warc/CC-MAIN-20191120060344-20191120084344-00270.warc.gz
en
0.903099
1,044
3.765625
4
Egyptians believed cats played key roles in safeguarding critical food supplies by feeding on mice and rodents that ate precious grains and crops, and cats also protected humans from large and dangerous predators, which made cats worship worthy. Egyptians worshiped wild and domestic cats alike. They associated felines with gods and demi-gods, and built shrines, statues and temples in honor of favorite felines.Continue Reading Egyptians' admiration for cats infiltrated all aspects of life. Ordinary citizens and esteemed professionals alike noted the importance of cats in Egyptian culture. The ancient Egyptian society relied heavily on agricultural activities. Egyptians harvested plants and crops to sustain the lives of family members and community members. They relied on surplus crops to sell at markets for economic revenue as well. Without cats, which consumed destructive pests, Egyptians faced constant threats of crop loss from attacks by rodents and insects. Egyptians, in response for cats' protection, offered wild and domesticated felines food and shelter. Even wild cats eventually lived closer to human settlements, knowing food and safety abounded. As with modern humans, Egyptians kept cats as pets. They considered cats loyal companions, much like dogs. Egyptians took trained cats wherever they went, including on hunting expeditions. Egyptians considered cats loyal and intelligent creatures, and believed seeing cats in dreams a sign of good harvest for the coming year.Learn more about Ancient Egypt
<urn:uuid:51b159c9-43a8-4138-895b-890a35965cb1>
CC-MAIN-2018-26
https://www.reference.com/history/did-egyptians-worship-cats-ba22a3ce52066bed
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864795.68/warc/CC-MAIN-20180622201448-20180622221448-00004.warc.gz
en
0.950781
276
3.859375
4
Chemical and Biochemical Engineering 5.5 ECTS; 1º Ano, 2º Semestre, 30,0 T + 30,0 PL Basic and in-depth chemistry concepts that are relevant to other courses. Foster the study of chemistry and raise awareness to its significance in industry and society. Students should be able to solve basic problems of inorganic chemistry and perform laboratory tasks. 1. Theories of chemical bonding. Valence Bond Theory and Molecular Orbital Theory; 2.Electrochemistry. Redox reactions. Corrosion and electrolysis; 3.Metallurgy and the chemistry of metals. Non-metallic elements. Transition metal chemistry and coordination compounds. Crystal field theory; 4.Nuclear chemistry. Nuclear stability and radioactivity. Final written test or exam (75%) and laboratory reports (25%). - Kotz, J. e Treichel, P. (2003). Chemistry & Chemical Reactivity. London: Thomson Books - Atkins, P. (1997). Chemistry: Molecules, Matter and Change. NY: Freeman&Co - Goldsby, K. e Chang, R. (2013). Química. Porto Alegre: McGraw-Hill Method of interaction Lectures, tutorials and lab classes involving the performance of several laboratory tasks. Software used in class
<urn:uuid:064001f3-2fa4-4d88-ac91-702a7426bd33>
CC-MAIN-2018-05
http://portal2.ipt.pt/en/cursos/tmr/l_-_eqb/plano_curricular/91849/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886815.20/warc/CC-MAIN-20180117043259-20180117063259-00309.warc.gz
en
0.79692
283
3.125
3
How can manufacturing software development use the concept of the digital thread? Manufacturing software development can use digital thread to improve overall manufacturing production. By using the digital thread throughout the lifecycle of a product, your business can streamline the production of a complex product. Additionally, the digital thread also incorporates upgrades. Finally, in the end, the digital thread will signal the end of your product and the need for a different type of product. What Is the Digital Thread What exactly is the digital thread? The concept of the digital thread began with the military aircraft industry. The military was seeking ways to improve the performance of their future programs by using digital programs. With the use of these digital programs, they were able to apply lessons they were learning to future projects. Applying these lessons to future projects saved on production costs. Moreover, the military saved time in the design and upgrade of their products. How can the digital thread in intelligence manufacturing help your business? Through manufacturing software development, you can incorporate digital thread into the design of your product. Likewise, the production of your product can use the digital thread. Lastly, upgrades of your product can use the digital thread. In essence, the digital thread can follow your product from inception to the retirement of the product. Custom manufacturing software development has the digital thread in mind during the design phase. Additionally, you can use 3D imaging to design your product. In the past, developers stored these designs in separate, proprietary programs that would not share information with each other. As a result, the design process would not consider information from the manufacturing department. However, due to the digital loop, there will be a continuous feedback loop designed into your manufacturing software development. The digital thread will incorporate data from the 3D imaging that the designers produced to speed up the process of manufacturing. The exact replica of the product that you are producing tells you where parts go. As a result, you will avoid hours spent incorrectly putting together the product. During the manufacturing process, if you discover something is not going to work, you can send that back through the feedback loop to the design department. In the past, you would have produced the product even though it had an inferior design. There was no process built in for the manufacturing and design departments to interface together. Now, if the manufacturing department discovers something that won’t work, you can send that information back to the designers for re-designing. For example, if during manufacturing the aesthetic design of a product results in lost time, the design of the product can be changed before it is too late. During the manufacturing process, there is quality control testing. Your product’s digital thread incorporates the process of reviewing your product. If the design needs adjustments, the digital thread will now take the information back to the designers. No longer will there be a gap in information between the quality control experts and the designers of your products. Once your product is ready to go on the market, the re-design process should begin. The design and manufacturing of your product are complete. However, the digital thread does not have to stop there. As your customers use your product and provide feedback to your business, your designers should continue to analyze that data. The digital thread will provide designers with valuable information for future updates. That information will guide how to make the product more user-friendly. Ayoka Custom Software Development Systems If you are a business and searching for ways to improve your product manufacturing, then look no further than Ayoka. Ayoka provides services that will incorporate the digital thread of your product. The digital thread will follow from design through the entire lifecycle of the product. Also, the custom manufacturing software development can save you time in the development of new products. Proper placement of parts streamlines production. Our custom software development emphasizes local, hands-on interaction, and discovering the needs of the end-users. This makes us ideal for delivering the digital thread to your business through our Custom Manufacturing Software Development. Don’t make custom application development complicated. If you want expert advice to guide you through the process and help you get the most out of your software, contact us. Call (817) 210-4042 and begin.
<urn:uuid:276cafb8-dd3f-4bf0-9d3b-91aa283d169d>
CC-MAIN-2023-40
https://ayokasystems.com/news/importance-digital-thread-intelligence-manufacturing/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00671.warc.gz
en
0.939238
871
2.796875
3
Biology 240 - Island Biogeography Biogeography is the scientific study of the patterns and causes of the distribution of organisms using a combination of ecological and evolutionary theory, geology, and geography: what species are where, and why? Islands have been the subject of important biogeographic work and have contributed substantially to existing biogeographic theory. The course covers the important elements of biogeographic theory within the context of islands using the marine and terrestrial flora and fauna of San Salvador Island. Students spend three weeks in residence at the Gerace Research Centre on San Salvador Island. Class activities include hikes through the rugged scrub-forest communities in the island's interior; snorkeling trips to coral reef, seagrass, and mangrove lagoon habitats; plant community analysis; rocky intertidal community sampling; a swim to an offshore island inhabited by iguanas; night snorkeling; and a descent into a water cave. SCUBA diving is possible for certified divers. In addition, students are exposed to the history and culture of the island. Daytime field activities are supplemented by evening lectures, discussions, and student presentations. Course: BIOL 240 Location: San Salvador Island, Bahamas Instructors: Douglas Hamilton and Mark Kuhlmann Curricular requirement: LAB Cost: $2,000 (Travel to and from the departure city (usually Miami, FL) is not included in the course fee) Length of program: 21 days Meals: All meals included Prices of Off-Campus J Term programs are estimates. If there are factors that affect the final cost of a program, such as fluctuations in currency exchange rates or fuel price increases, a fee adjustment will be announced. Should there be a change in a program fee students will have two weeks from notification of that change, or until the last day of classes, (whichever is shorter) to pay.
<urn:uuid:56938d24-d262-4366-980e-aa2519ab842c>
CC-MAIN-2014-23
http://www.hartwick.edu/academics/academic-support-services/psge/global-education/study-abroad-main-page/off-campus-j-term-programs/2015-biol-250-bahamas
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510261958.8/warc/CC-MAIN-20140728011741-00412-ip-10-146-231-18.ec2.internal.warc.gz
en
0.920624
393
2.640625
3
To which lands does the Proposed RMP apply? The Eastern Interior Planning Area includes approximately 30 million acres of public, State, and private lands, of which approximately 6.5 million acres are managed by the BLM. Management measures described in this Proposed RMP apply only to BLM-managed lands in the planning area; no measures have been developed for private, State, or other federally managed lands. However, the BLM-managed lands considered in the Proposed RMP included 2.3 million acres of lands that were selected by the State of Alaska or Alaska Native corporations for conveyance. The BLM has responsibility to manage these selected lands until they are either conveyed or selections removed. What time period is covered by the Proposed RMP? An RMP is a blueprint explaining how the BLM will manage areas of public land and have no specific life-span. BLM District Offices prepare RMPs for the lands within their boundaries. RMPs contain decisions that guide future management actions and subsequent site-specific implementation decisions. RMPs establish goals and objectives for resource management (desired outcomes) and the measures needed to achieve these goals and objectives (management actions and allowable uses). The BLM would begin to implement the RMP upon approval of the record of decision (ROD). There will be four records of decision — one for each planning subunit: White Mountains, Steese, Fortymile, and Upper Black River (Draanjik). RMPs are periodically evaluated to determine whether management decisions contained within them are still current and adequate. Where changing conditions (such as the Federal listing of a wildlife or plant species as threatened or endangered) and/or demands on the public lands have resulted in the need to update management decisions in the RMP, the BLM may either revise or amend the RMP to bring it into conformance with these changing conditions. Why did the RMP take so long to complete? Resource Management Plan development is a complex process that requires intensive staff and public involvement. At numerous points in the process, the BLM responds to public comments received. For this plan, the public raised concerns about several issues – including subsistence, Areas of Critical Environmental Concern, and mineral resources in the White Mountains – prompting the BLM to do additional analysis in order to move forward. There are various internal and external reviews as well, including Tribal governments and the State of Alaska. While RMPs often take a long time to complete, it is important to take the time necessary to understand the issues to be addressed and be thoughtful in crafting appropriate management approaches to address those issues. Does the Alaska National Interest Lands Conservation Act (ANILCA) allow the BLM to designate Areas of Critical Environmental Concern (ACECs)? Concerns have been raised about BLM’s adherence to the Alaska National Interest Lands Conservation Act (ANICLA) with the designation of ACECs. The designation of an ACEC in Alaska does not violate ANILCA’s “no more” clause. The BLM gave careful consideration to the provisions of the ‘no more clause’ when determining the designation of these ACECs, and they do not violate the intent of ANILCA. What is a 17(d)(1) withdrawal? This refers to Section 17(d)(1) in the Alaska Native Claims Settlement Act (ANCSA) of 1971. ANCSA authorized the Secretary of Interior to withdraw and reserve public lands for study and classification. This was done through a series of Public Land Orders (PLOs) issued between 1972 and 1975. The PLOs closed the lands to disposal and appropriation under public laws, including mining and leasing. The withdrawals kept the lands unencumbered for selection by ANCSA corporations, and prevented the creation of new third-party interests that would interfer with land conveyance. The withdrawals also allowed the BLM time to study and classify the lands. Are there 17(d)(1) withdrawals in the planning area? Yes. Portions of six 17(d)(1) withdrawals cover lands in the Eastern Interior Planning Area. These PLOs effectively close the planning area to mineral entry and location under the 1872 mining law, and to mineral leasing under the mineral leasing laws. If the 17(d)(1) withdrawals are modified or revoked, would that make lands in the planning area available for mineral development? Lifting the 17(d)(1) withdrawals would open some lands in the planning area to leasable and locatable minerals. In some cases, lifting the (d)(1) withdrawals would not have an immediate effect. Lands selected by ANCSA corporations and the State of Alaska would remain "segregated" (unavailable) to leasable or locatable mineral entry. Additionally, the White Mountains National Recreation Area, the Steese National Conservation Area, and some lands within wild river corridors are withdrawn from mineral entry pursuant to the Alaska National Interest Lands Conservation Act (ANILCA). In some areas, such as the Steese National Conservation Area, the Secretary of Interior has the authority to modify the ANILCA withdrawals, and make lands available for mineral entry. In other areas the Secretary does not have this discretion. In most cases the ANILCA withdrawals apply to public lands that are also subject to 17(d)(1) withdrawals. In areas withdrawn pursuant to ANILCA, removal of the 17(d)(1) withdrawals could result in opening the area to leasable minerals, but would not open it to locatable minerals unless the ANILCA withdrawal was also modified. Does the Proposed RMP place limits on the use of off-highway vehicles? Motorized use is currently unrestricted on 66 percent of BLM-managed lands due to the absence of off-highway vehicle (OHV) designations, and is subject to only minor limitations on the remaining lands where OHV designations are in place. The Proposed RMP would implement OHV area designations and future travel management plans would impose some restrictions on motorized use on all lands in the planning area. The specific restrictions recommended in travel management plans would be implemented through supplemental rules. Would new areas be opened to mining under the Proposed RMP? The Proposed RMP recommends the Secretary of Interior partially revoke ANCSA 17(d)(1) withdrawals to open 2.4 million acres of BLM-managed lands to mineral location (staking of mining claims) and mineral leasing. The final decision would rest with the Secretary of the Interior. How does the Proposed RMP address concerns over the future health of caribou herds? To minimize disturbance to caribou, the Proposed RMP recommends designation of 362,000 acres of Fortymile Caribou Herd habitat as an ACEC and also identifies management actions for crucial caribou habitat outside of the ACEC. Proposed ACEC management recommends the Secretary of the Interior issue withdrawals to close some caribou habitats to mineral exploration and development. In addition, wildlife management decisions in the Proposed RMP establish seasonal restrictions on some activities in crucial caribou habitat and propose reclamation standards intended to benefit caribou. Travel management planning will further refine restrictions on OHV use in caribou habitat. Does the Proposed RMP allow for mineral leasing or location in the White Mountains National Recreation Area? The Proposed RMP recommends keeping the White Mountains National Recreation Area closed to hardrock mineral leasing. This decision was made after reviewing and considering public comments on the Supplement to the Eastern Interior Draft RMP/EIS. Would the Proposed RMP result in any new wilderness areas or wild and scenic rivers? No. Only Congress may designate wilderness or change the status of wilderness areas. The Proposed RMP does not propose any such designations. Through a wilderness characteristics inventory, the BLM found that 99 percent of lands in the planning area have wilderness characteristics. The Proposed RMP would indirectly maintain wilderness characteristics on 3.4 million acres through proposed or existing designations, such as ACECs, Wild and Scenic Rivers, the Steese National Conservation Area, and the White Mountains National Recreation Area. Additionally management of high-priority riparian areas and crucial caribou and Dall sheep habitats would protect wilderness characteristics. Under the National Wild and Scenic Rivers Act, only Congress or the Secretary of the Interior may designate a wild and scenic river. The Proposed RMP identifies five rivers within the planning area that are eligible as wild and scenic rivers under the National Wild and Scenic Rivers Act criteria but finds none of them suitable for designation. Why doesn’t the Proposed RMP reflect the recent official name change from Black River to Draanjik River? On April 30, 2014, the U.S. Board on Geographic Names officially changed the name of the Black River to Draanjik River. Draanjik is the traditional Gwich'in name for the river and translates as "caches along the river." In the PRMP/FEIS, the BLM continues to use the name "Black River” to avoid confusion, – especially for those comparing draft and proposed versions of the document. However, in the Approved RMP and Record of Decision, the BLM will change the name of the "Upper Black River Subunit" to the "Draanjik Subunit", change all references to the mainstem Black River to Draanjik River, and update maps to show the new name. What are locatable and leasable minerals? Locatable minerals are minerals for which the right to explore, develop, and extract mineral resources is established by the staking of mining claims, under the General Mining Law of 1872. Examples of locatable minerals include metallic minerals (i.e., gold, silver copper, zinc, etc.) and non-metallic minerals (i.e., certain limestones, gypsum, diatomaceous earth, fluorspar, etc.). Leasable minerals are defined by the Mineral Leasing Act and are either solid or fluid leasable minerals. Solid leasable minerals include coal, oil shale, native asphalt, phosphate, sodium, potash, potassium, and sulfur. Fluid leasable minerals include oil, gas, coalbed natural gas, and geothermal resources. Exploration and production of these minerals on BLM lands may only occur on leases acquired by competitive leasing.
<urn:uuid:e85ceb5d-e1f1-4d24-87ba-b316358cdee1>
CC-MAIN-2016-36
https://eplanning.blm.gov/epl-front-office/eplanning/planAndProjectSite.do?methodName=dispatchToPatternPage&currentPageId=10161
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982956861.76/warc/CC-MAIN-20160823200916-00238-ip-10-153-172-175.ec2.internal.warc.gz
en
0.935646
2,131
2.703125
3
VEX IQ Robotics The VEX Robotics Competition provides schools and students with an affordable education based platform and competition experience that inspires and creates interest in Science, Technology, Engineering and Math fields. Combining an educational experience with a sports-like atmosphere that also promotes the development of social and teamwork skills in addition to academic STEM skills, the VEX Robotics Competition is an exciting, engaging and affordable program for all schools and students enjoy.(https://robotics.nasa.gov) The FIRST Tech Challenge Robotics (FTC) is designed for students in grades 7–12 to compete head to head, using a sports model. Teams are responsible for designing, building, and programming their robots in a 10-week build period to compete in an alliance format against other teams. The robot is programmed using Java or the MIT App Inventor. Teams are required to develop strategy and build robots based on sound engineering principles. The ultimate goal of FTC is to reach more young people with a lower-cost, more accessible opportunity to discover the excitement and rewards of Science, Technology, Engineering, and Mathematics. Follow us team on twitter @KnightBots8435
<urn:uuid:f5f0805f-03fe-41f1-85b6-ba0aef649464>
CC-MAIN-2019-09
http://north.imsaindy.org/robotics/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481428.19/warc/CC-MAIN-20190217010854-20190217032854-00173.warc.gz
en
0.931027
233
2.640625
3
This study will examine whether environmental asbestos deposits in California are associated with increased rates of mesothelioma, a rare cancer of the pleura and peritoneum that occurs almost solely as a result of asbestos exposure. The project brings together a multidisciplinary team to address geologic occurrence of asbestos in California, potential human exposure based on population patterns and known occupational exposures, and epidemiologic characteristics of disease in the state. The study will provide the ability to assess age-, race- and sex- adjusted mesothelioma rates in relation to asbestiform type and location as determined by geographic mapping. Previous epidemiological studies of asbestos-induced malignancy have focused primarily on occupation asbestos exposures. Studies in other countries have documented mesotheliomas due to environmental asbestos exposure, but there has been little research on this in the U.S. Information on mesothelioma cases from 1988-96 will be obtained from the California Cancer Registry, which maintains a database of all cancer cases in the state. The analysis will examine the distribution of age-, sex- and race-adjusted county-specific mesothelioma rates to assess whether populations in counties with large concentrations of environmental asbestos have a higher rate of mesothelioma than populations in counties with little or no endogenous asbestos. The location and distribution of amphibole and serpentine asbestos deposits in California will be determined by a review of existing geological surveys and publications, along with case studies of the occurrence of tremolite asbestos. This information will be combined with measures of human interaction with environmental asbestos, such as development, mining, and population density, to determine potential human exposure to environmental asbestos by county. Lastly, this project will plan a case-control study to more rigorously test the hypothesis that mesothelioma in California is independently associated with environmental asbestos exposure. The proposed project will be the first study to test the association of environmental asbestos and adjusted county- specific rates of mesothelioma. It is particularly strengthened by a comprehensive analysis of environmental tremolite and asbestos in California to be conducted by Dr. Howard Day, Department of Geology, UC Davis. This study is particularly important and timely because of the increasing population in the state living in asbestos-containing areas. California represents a unique location for these studies because of the statewide tumor registry, the largest tumor registry in the world. |Pan, Xue-lei; Day, Howard W; Wang, Wei et al. (2005) Residential proximity to naturally occurring asbestos and mesothelioma risk in California. Am J Respir Crit Care Med 172:1019-25| |Orenstein, M R; Schenker, M B (2000) Environmental asbestos exposure and mesothelioma. Curr Opin Pulm Med 6:371-7|
<urn:uuid:168a6d73-589e-4a7e-a1fc-783badd39d4b>
CC-MAIN-2022-05
https://grantome.com/grant/NIH/R03-CA081615-02
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304947.93/warc/CC-MAIN-20220126101419-20220126131419-00210.warc.gz
en
0.89411
573
2.59375
3
|Origin||China (Song Dynasty)| |Quick description||Tea made from dried chrysanthemum| |Temperature||100 °C (212 °F)| |Vietnamese||trà hoa cúc| |Malay||teh krisantimum, teh kekwa| |Indonesian||teh krisan (Chi Hua Ching)| Chrysanthemum tea is a flower-based infusion beverage made from the chrysanthemum flowers of the species Chrysanthemum morifolium or Chrysanthemum indicum, which are most popular throughout East and Southeast Asia. First cultivated in China as a herb as early as the 1500 BCE, Chrysanthemum became popularized as a tea during the Song Dynasty. In Chinese tradition, once a pot of chrysanthemum tea has been drunk, hot water is typically added again to the flowers in the pot (producing a tea that is slightly less strong); this process is often repeated several times. To prepare the tea, chrysanthemum flowers (usually dried) are steeped in hot water (usually 90 to 95 degrees Celsius after cooling from a boil) in either a teapot, cup, or glass; often rock sugar or cane sugar is also added. The resulting drink is transparent and ranges from pale to bright yellow in color, with a floral aroma. |Part of a series on| Several varieties of chrysanthemum, ranging from white to pale or bright yellow in color, are used for tea. These include: Of these, the first two are most popular. Some varieties feature a prominent yellow flower head while others do not. Gukhwacha (국화차; 菊花茶) is made from dried Indian chrysanthemum collected before fully opened. Although typically prepared at home, chrysanthemum tea is sold in many Asian restaurants (particularly Chinese), and in various Asian grocery stores in and outside Asia in canned or packed form, as either a whole flower or teabag presentation. Juice boxes of chrysanthemum tea may be sold.
<urn:uuid:0943f845-842d-461a-8d1a-02bdffdc8e27>
CC-MAIN-2022-21
https://db0nus869y26v.cloudfront.net/en/Chrysanthemum_tea
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662619221.81/warc/CC-MAIN-20220526162749-20220526192749-00251.warc.gz
en
0.87423
647
2.96875
3
In 1987 the European Union (then called the EEC) funded a research program called RACE (Research and Development in Advanced Communications Technologies in Europe). It was sharply focussed on Europe’s vision for the Information Super-highway that would feature a fibre optic connection to every home and business in Europe. Almost as an afterthought Roland Huber the Director of the project agreed to fund a project to look into a third-generation mobile telecommunication system. The project that simply known as RACE 1043. Soon the term was coined the Universal Mobile Telecommunication System (UMTS). The “universal” was to indicate that it would be a new system that would be available everywhere, both indoors and outdoors, and which would be a wireless extension of the fibre optic vision The UMTS vision in the UMTS Task Force report A decision was taken in another part of Europe (CEPT) that UMTS would operate in the 2 GHz band. It was allocated a bandwidth of 250 MHz as part of a world-wide allocation. This decision opened up another interpretation of the word “universal” and that was to link Japan with the rest of the mobile world that had adopted GSM. A key concept of UMTS in these very early days was that the mobile would be capable of multimedia two-way communications. Nokia 6630 – An early 3G mobile (2004) The technical vision at the time was that the data rate to the mobile would depend upon the particular application being used. The idea was a variable data rate (bandwidth) link to the mobile and the tariff would take into account the data rate. The broadband services would operate at 2 Mb/s but for wide-area mobile applications this would be reduced to 144 kb/sec. GSM was seen as the benchmark to exceed and this had just seen a dramatic leap forward in mobile data rates to a breathtaking (for the time) 9.6 kb/sec. NOW READ THE INSIDE STORY…by Ed Candy Click on the link…Inside the 3G Revolution
<urn:uuid:341eb4d2-04a8-4a23-9505-d5530a6a3806>
CC-MAIN-2020-16
http://www.gsmhistory.com/umts/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496227.25/warc/CC-MAIN-20200329201741-20200329231741-00455.warc.gz
en
0.969562
420
3.3125
3
The adult body is populated by many types of microorganisms. They are found on the surface of the body and in those cavities that have a natural connection to the environment. A child’s body is gradually populated with bacteria. The body microflora of a healthy person can be roughly divided into three groups: - occasional microorganisms that are not capable of long-term existence in the human body and quickly die; - constantly existing in the body, useful for a person (they can break down and assimilate nutrients, synthesize vitamins, and act as antagonists of pathogenic microbes, such as bifidobacteria); - constantly existing, but fundamentally dangerous for humans, the so-called opportunistic microorganisms (show their pathogenic properties when the resistance of the body, a change in the composition of the normal microflora, and other conditions). The intestines of the fetus in the womb are sterile, and colonization by bacteria occurs gradually Infant microbiome colonization begins during childbirth: germs get on the skin, in the cavities, and pathogenic microbes may be infected (for example, gnocchi from a sick mother, which cause conjunctivitis in the baby). Then the microflora of the body of the child and adult is formed under the influence of the environment, depending on the diet and other factors acting on the body. Breast milk is known to be a complex of intravenous substances created by nature, which constantly adapt to the age of the child and provide him with nutrition and protection. In addition, breast milk is a constant source of maternal microflora. The question of how the bacteria get into the mother’s mammary gland is still a mystery. However, various diagnostic methods confirm the identity of the bacterial strains in the mother’s intestine, breast milk, and infant feces. In addition to being a source of microflora to populate the baby’s gut, breast milk also contains a unique prebiotic complex of oligosaccharides, which are involved in the metabolic process. For artificially-fed children, develop special milk formulas containing all the necessary probiotics, prebiotics, trace elements, and vitamins. After all, probiotics for babies are part of the normal microflora and are essential for the proper functioning of the gastrointestinal tract. Where are the most bacteria in a child’s body The microflora of the gastrointestinal tract is the most abundant and diverse in terms of species composition. In the oral cavity, there are more than 100 species of microorganisms, which is due to the most favorable living conditions: sufficient humidity level, the alkaline reaction of the environment, the presence of food residues, a constant temperature. The microflora of the stomach is very poor in quantitative and qualitative composition (sardines, yeasts, lactic acid bacteria), which is due to the acidic environment of the gastric juice, causing the death of microorganisms entering it with food and water. Normal intestinal microflora of children plays an important role in many physiological functions: it participates in digestive processes, fatty acid metabolism, affects the structure of the intestinal mucosa and its adsorption capacity, is involved in the synthesis of vitamin B and K groups, nicotine acid, promotes the formation and development of the immune system and stimulates its activity. Under the influence of various adverse factors, which weaken the protective mechanisms of the body, there comes a shift in the composition of the microflora, its physiological functions are suppressed. This condition is accompanied by diarrhea, flatulence, and other symptoms, and is diagnosed as dysbacteriosis. It often occurs in babies, and then the little body needs additional microorganisms for babies. And these special microorganisms, special live bacteria, are designed to improve the biota of the stomach. They are well tolerated by children and do not cause any side effects. At the same time, their use helps to increase the body’s defenses against respiratory infections, reducing the incidence of infectious diarrhea, enterocolitis, eczema, and atopic dermatitis.
<urn:uuid:b351af1a-c694-4ca3-8377-5f15fdf40bf9>
CC-MAIN-2022-40
https://www.professorshouse.com/the-types-of-bacteria-that-live-in-a-childs-body/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00791.warc.gz
en
0.932876
837
3.609375
4
- freely available Viruses 2014, 6(6), 2242-2258; doi:10.3390/v6062242 Abstract: Cytomegalovirus, of the Herpesviridae family, has evolved alongside humans for thousands of years with an intricate balance of latency, immune evasion, and transmission. While upwards of 70% of humans have evidence of CMV infection, the majority of healthy people show little to no clinical symptoms of primary infection and CMV disease is rarely observed during persistent infection in immunocompetent hosts. Despite the fact that the majority of infected individuals are asymptomatic, immunologically, CMV hijacks the immune system by infecting and remaining latent in antigen-presenting cells that occasionally reactivate subclinically and present antigen to T cells, eventually causing the inflation of CMV-specific T cells until they can compromise up to 10% of the entire T cell repertoire. Because of this impact on the immune system, as well as its importance in fields such as stem cell and organ transplant, the relationship between CMV and the immune response has been studied in depth. Here we provide a review of many of these studies and insights into how CMV-specific T cells are currently being used therapeutically. 1. Biology of Cytomegalovirus The virus family Herpesviridae consists of three subfamilies of viruses, alpha, beta, and gamma. Betaherpesviruses contain the four major components of this family: the core, the capsid, the tegument, and the envelope and establish latency in cells of the myeloid lineage and CD34+ cells [1,2,3]. The tegument contains the majority of virion-associated proteins [4,5]. Tegument proteins have two reported functions, though the proteins that facilitate them are not mutually exclusive . The first function is the disassembly of the virion during entry and assembly of the virion during egress . The second function is inhibiting the host immune response to infection, though as discussed later, they may also promote the response as well . Many of these proteins are associated with immune evasion, and are therefore packaged within the virion and delivered to the host soon after uncoating of the virus. The most abundant tegument protein is the lower matrix phosphoprotein of 65 kDa (pp65), or Unique Long (UL)83 . One important function of pp65 is immune evasion. Other tegument proteins devoted to immune evasion include the upper matrix protein pp71, UL36, UL38, and IRS1/TRS1 [8,9]. Immediate early (IE) proteins are translated within 2 h of infection and do not require the de novo synthesis of viral proteins for their translation . These IE proteins then control subsequently gene expression and virus replication. As such, suppression of IE proteins is thought to contribute to CMV latency whereas the expression of IE genes is associated with reactivation . The laboratories of both Hahn and Fietze have shown that proinflammatory cytokines such as GM-CSF and TNF-α can induce the differentiation of monocytes into macrophages or dendritic cells, which is thought to activate the IE1 promoter and stimulate reactivation [12,13,14]. However, how cytokines cause HCMV reactivation is still mostly unknown [12,14]. Because IE proteins are expressed first after reactivation, T cells targeting these proteins are of paramount importance, as highlighted in the field of transplantation where T cells IE proteins are important for protection after solid organ transplant . 2. CMV Infection in the Immune Compromised Host CMV has long been one of the most problematic pathogens after stem cell transplantation (SCT) and organ transplant [16,17,18,19]. While effective antiviral drugs, viral monitoring, and donor/recipient matching have lowered the likelihood of disease after SCT, the mortality rate in patients who develop CMV-associated pneumonia remains strikingly high (around 80%–90%) [17,18]. Additionally, the recipient’s CMV-seropositivity remains an independent risk factor for morbidity and mortality after SCT. In the case of SCT, the highest risk of CMV reactivation is when the recipient is seropositive and the stem cell donor is seronegative [20,21]. This is because the recipient has latent (or active) CMV that can no longer be controlled by the recipient’s immune system after it is depleted with conditioning regimens and the stem cell donor graft does not contain protective CMV-specific memory T cells. In contrast, the risk of CMV-related complications, including death, after solid organ transplant (SOT) is greatest when the organ donor is CMV-seropositive and the recipient is CMV-seronegative, though the severity tends to vary based on the organ being transplanted [22,23,24,25]. With the advent of CMV prophylaxis, an unexpected complication has emerged with an increased incidence of late-onset CMV disease; after day 100, late CMV disease may be as high as 17% in CMV-seropositive recipients undergoing SCT . 3. Innate Immunity to CMV An in-depth review of the immune response to CMV can be found here . Some of the best evidence for the role of the innate immune system in mice is in experiments using beige mice that have known defects in Natural Killer (NK) cell-mediated cytotoxicity and are highly susceptible to murine Cytomegalovirus (MCMV). However, protection against MCMV can be restored by transferring NK cells from normal mice . Despite the elegant studies suggesting the importance of NK cells in controlling MCMV, similar studies in humans are lacking for HCMV . However, Biron et al. have reported in the New England Journal of Medicine NK cell-deficient individuals who are susceptible to herpes virus infections, including HCMV. In vitro experiments using IL-2 activated human NK cells have also demonstrated that NK cells can inhibit CMV replication in CMV-infected fibroblasts by inducing IFN-beta release from infected fibroblasts . Activated NK cells also released IFN-gamma which can impede viral replication . Boehme et al. have shown that HCMV glycoproteins B and H also activate Toll Like Receptor (TLR) 2 on fibroblast, resulting in NFκB activation and subsequent inflammatory cytokine secretion, suggesting that NK cells are not the only innate cell responsible for protection from CMV . Indeed, monocytes, macrophages and dendritic cells are cells permissible for viral reactivation and once infected release inflammatory cytokines, in addition to presenting antigen to T cells . 4. Humoral Immunity to CMV The importance of an antibody response to CMV is demonstrated in guinea pig models where antibodies protect the animals from reaching a lethal infective dose, but do not prevent infection, suggesting a role for the humoral immune response in limiting the severity of the disease by controlling CMV viral load . After a primary infection in humans, antibodies against a number of proteins from HCMV are detectable in the serum. These antibodies recognize an array of proteins from different parts of the virus, including pp65 and pp150 from the tegument, the glycoproteins gB and gH from the envelope, as well as proteins involved in transcription such as IE-1 . Most CMV-seropositive humans have antibodies directed against gB, with over 50% of all neutralizing antibodies recognizing an epitope of gB [33,34]. The importance of humoral immunity is also demonstrated in congenital CMV infection where pregnant women who develop primary CMV infection carry a 40% chance of HCMV transmission to the fetus [35,36]. In cases where the mother is able to provide transplacental IgG antibodies, the severity is less . Moreover, identifying a successful vaccine that elicits functional neutralizing antibodies to CMV and can prevent congenital CMV has become a priority . Relevant articles discussing the role of the humoral immune response can be found here [39,40,41]. 5. Cellular Immunity to CMV CMV infection commands an overwhelming response from all facets of the immune system. As discussed above, the humoral response and innate response to CMV are indeed significant and contribute to controlling the infection, but the cellular immune response is necessary to control latency and impede viral replication in latently infected individuals (Figure 1) . The most compelling evidence for the immunogenicity of CMV involves the cellular arm of the immune system where up to 10% of all circulating CD8+ T cells can be directed towards CMV—a staggering number given the plethora of pathogens we encounter in our lifetime . With the extraordinary percentage of T cells targeting CMV, it has been postulated that over time, immune surveillance is less effective in CMV+ individuals and, although controversial, CMV-seronegative individuals have been reported to live longer than their CMV-seropositive counterparts . Recent reports on the “aging” of the immune response to CMV have begun to shed light on the mechanism behind this observation [45,46]. 6. CD8+ T Cell Response to CMV The most studied, understood, and manipulated facet of the immune response to CMV is the cellular response, in particular the protective role of CD8+ T cells. The presence of CMV-specific T cells was first reported in a SCT study noting that the majority of patients without CMV-specific T cells had overwhelming CMV disease . This led to studies evaluating the ex vivo expansion of CMV specific T cells from CMV-seropositive individuals and the extensive evaluation of the CMV-specific T cell response in healthy individuals versus immune compromised populations. The importance of CD8+ T cells has been reported in solid organ transplant as well . In renal transplant recipients, the presence of CD8+ T cells coincides with protection from CMV [50,51,52] and in both heart and lung transplant recipients, the presence of IE-1-specific T cells correlated with protection from CMV disease . The protectiveness of CD8+ T cells was first shown in a study by Riddell et al. where T cells were expanded ex vivo using CMV-infected fibroblasts . Expanded T cells were then infused into patients after SCT. Riddell et al. reported that prior to the infusion of the T cells, the CMV-specific immunity was undetectable in these patients. However, as early as 48 h after infusion there was a detectable CMV-specific response and after three weeks the CMV-specific T cells response was as great or greater than CMV-specific immune responses detected in immunocompetent donors [48,53]. The cell mediated immune response targets proteins in all three of these stages of the viral replication cycle: immediate early, early, and late. By targeting immediate-early and early genes, T cells can protect against reactivation from latent viruses . Although targeting late proteins would typically delay the cellular response to CMV since these proteins are not expressed until 24-h after infection, many of the late proteins are structural proteins such as the tegument protein pp65 which is already present within the virion and can be immediately presented to T cells by infected APCs. In spite of the plethora of CMV antigens targeted by the CD8+ T cell response, a hierarchy of antigenic frequency exists, though it varies on the method of detection. Collectively, pp65 and the immediate-early 1 (IE-1) are two of the most targeted antigens of CMV by CD8+ T cells [55,56]. 7. CD4+ T Cell Response to CMV As is the case with CD8+ T cells, approximately 9% of all circulating CD4+ T cells recognize CMV, an astounding number given the immune repertoire devoted to protection from one pathogen . These T cells recognize at least 125 open reading frames of CMV or 59% of all open reading frames. Antigen recognition by CD4+ T cells is similar to CD8+ T cells in that T cells recognizing pp65 are some of the most abundant but T cells recognizing other antigens such as gB, UL86, pp28, IE-2, UL36, UL48, pp10, UL113, and IRS-1 are also highly abundant . The importance of CD4+ T cells is apparent in a model of CD4-T cell-depleted mice where mice infected with MCMV had an increased incidence of MCMV reactivation . It has also been reported that CD4+ T cells contribute to controlling MCMV in mice depleted of CD8+ T cells, but viral clearance is significantly delayed in most tissues and is never cleared from the salivary glands where a persistent infection develops . The significance of CD4+ T cells is better understood and supported in HCMV. Lung transplant recipients with low frequencies of CMV-specific CD4+ T cells have difficulty clearing CMV . In a parallel to the finding in mice, children with CMV who have few CD4+ T cells have prolonged shedding of CMV in the salivary glands, and dysfunctional CD4+ T cells have been reported during primary infection [59,60]. Studies from SCT recipients suggest that CD4+ T cells are linked with protection from disease and are necessary for the recovery of donor-derived CD8+ T cells . What is perhaps more interesting is that the persistence of adoptively transferred T cells has been reported to depend on the presence of CD4+ T helper cells . In the first study of adoptively transferred CMV-specific T cells (predominantly CD8+), no patients developed CMV viremia but only patients who had detectable CD4+ T cell responses showed persistence of the transferred CD8+ T cells . In other words, the highly successful trials mentioned above that utilized CD8+ T cells specific for various antigens of CMV required not only the transferred CD8+ T cells, but endogenous CD4+ cells as well. A compelling argument for the role of CD4+ T cells in immunity to HCMV derives from a study conducted by Einsele et al. in which CD4+ T cells (without CD8+ cells) were transferred to antiviral-resistant SCT recipients with CD4+ T cell deficiencies. Remarkably, all patients exhibited rapid antiviral activity and the cells then persisted at levels similar to immunocompetent healthy donors. Einsele et al. observed that the presence of CD4+ T cells allowed endogenous CD8+ CMV-specific T cells to expand, in contrast to transferring CD8+ T cells that eventually decline without CD4+ T cell help . 8. CMV Evasion from the Immune System Through thousands of years of evolution, CMV and humans have reached a balance whereby CMV is able to transmit virus from host-to-host yet not cause significant pathology to immunocompetent individuals. One way CMV is able to persist is by employing numerous immune evasion genes that are expressed in both the unique short (US) and unique long (UL) region of the genome (Table 1) . As with all herpes viruses, CMV interferes with MHC class I presentation to CD8+ T cells in a number of ways. Interestingly, CMV also appears to stealthily modulate the immune response to itself by using decoys and choosing which epitopes and antigens it allows the immune system to target. More specifically, phosphorylation of IE-1 by pp65 blocks the processing of IE-1 in the proteosome . This evasiveness is likely a reason why IE-1 was not identified earlier as an important immunogen of CMV. |Mechanism of evasion||CMV Gene product||Effect on immune system| |MHC Class I down-regulation ||US2, US3, US6, US11||Decreased presentation of CMV antigens to CD8+ T cells| |CMV-IE-1 sequestration ||UL83 (pp65)||T cells cannot target first genes expressed upon reactivation| |MHC Class II down-regulation [65,66,67]||IE/E product||Decreased presentation of CMV antigens to CD4+ T cells| |MHC Class I homolog ||UL18||Inhibition of NK cell lysis| |Inhibitory receptors, downregulation of ligands [69,70]||UL40, UL16, UL142||Evasion of NK cells| |Chemokine receptor ||US28||Immune homing interference| |IL-10 homolog ||UL111a||Immune suppression| |Inhibitors of apoptosis [72,73]||UL36, UL37||Decrease in phagocytosis of infected cells by APCs| |Downregulation of MICB expression [74,75]||MicroRNAs (miR-UL112)||Decreased recognition by NK cells and T cells via NKG2D| Another way CMV disrupts antigen presentation is by disrupting the transporter associated with antigen processing (TAP). US6 binds with high affinity to the ER-lumenal side of the transporter, effectively altering the affinity of TAP for ATP. Overall, at least four US genes are involved in down regulation expression of MHC Class I: US2, US3, US6, and US11 [64,76]. Dendritic cells play an important role in the primary immune response to CMV as they orchestrate the priming of naïve T cells in the lymph nodes. Not surprisingly, CMV targets dendritic cells and halts their maturation, forcing them into a state of functional paralysis and preventing them from presenting CMV antigens to T cells [62,77]. What’s more unexpected is that DCs infected with MCMV are not just unresponsive to MCMV, but MCMV-infected DCs do not secrete IL-12 or IL-2 even after treatment with the potent stimulus lipopolysaccharide (LPS) . It has been suggested that CMV not only evades the immune system, but it also suppresses it. Secondary CMV-associated diseases exist and are a result of CMV modulation of the immune response in ways mentioned above. Additional immunomodulatory genes expressed by CMV and their function are listed in Table 1, but for a more comprehensive review of immune evasion by CMV see the reviews cited here [78,79,80]. 9. Immunotherapy: Adoptive Transfer of CMV-Specific T Cells after Transplant As discussed above, some of the most insightful data about the role of T cells in protection from CMV came from adoptively transferring T cells to patients who received stem cell transplants. Since the first method of generation CMV-specific T cells that was utilized almost 20 years ago by Riddell et al. using CMV-infected fibroblasts to expand T cells, numerous other methods have been developed to offer protection after SCT . The most common and perhaps most simple is pulsing antigen presenting cells—typically dendritic cells—with overlapping peptides spanning the entire pp65 antigen . Although efficacious, this technique requires the lengthy and difficult generation of DCs, a non-trivial amount of donor-derived blood, and requires highly trained technicians and expensive equipment and manufacturing facilities. In 2006, Leen, Bollard, and Rooney et al. generated T cells specific for three viruses (CMV, EBV, and adenovirus) by using a recombinant adenovirus that expressed pp65, hereafter named Ad5f35pp65 . This approach utilized monocytes and EBV transformed LCL transduced with the Ad5f35pp65 vector as APCs, thus obviating the need for high volumes of donor blood and targeted 3 viruses in a single culture. While this strategy was effective in vivo and less labor intensive, the expansion of virus-specific T cells is still a lengthy process that takes upwards of one month, not including the months it takes to generate EBV-LCL . To circumvent the need for multiple expansions and a lengthy expansion process, Peggs et al. recently described a method where they pulsed leukocytes with overlapping peptides for pp65. Activated T cells are then selected based upon their secretion of IFN-gamma and then frozen for infusion. Including QA/QC testing, total time to infusion was less than two weeks and the entire selection process took <24 h. However, the risk of such a rapid manufacturing strategy is GVHD since alloreactive T cells may be still present in the infused product. Indeed, in the Peggs study, most patients were protected from CMV at a dose of only 1 × 104 CD3+ cells/kg but 8 of 18 patients developed acute GvHD, three of which were grade II or higher. Six patients also experienced chronic GvHD . Memory T cells are critical in non-T cell depleted grafts because the virus-specific memory T cells present in the grafts confer protection against viral infections and reactivation. For this reason, CMV-reactivation is highest when the transplant recipient is CMV-seropositive and the transplant donor is CMV-seronegative, as is often the case in cord blood transplantation and CMV-seronegative donors . Memory T cells are also a valuable resource when expanding virus-specific T cells ex vivo from seropositive donors as these T cells can be expanded by simply culturing virus-specific memory T cells with antigen-presenting cells loaded with the antigen of interest. When transferred to transplant recipients after transplant, these cells have been protective against CMV, EBV, and adenovirus without severe adverse events (Table 2) [83,86]. The challenge, however, has been the ex vivo generation of antigen-specific T cells from antigen-inexperienced sources of T cells such as cord blood. Instead of expanding the pre-existing memory T cell population, naïve T cells need to be primed in vitro to respond to the antigen of interest . |Group||Method of Expansion/Selection| |Riddell, 1992, 1995 [48,53]||Expansion using CMV-infected fibroblasts| |Einsele, 2002 ||Expansion with CMV lysate| |Cobbold, 2005 ||Tetramer Selection using magnetic beads| |Leen, 2006 ||Antigen-presenting cells (Dendritic cells, EBV-LCL) transduced with an adenoviral vector encoding CMVpp65| |Micklethwaite, 2008 ||Antigen-presenting cells (Dendritic cells) transduced with an adenoviral vector encoding CMVpp65| |Peggs, 2011 ||Selection of T cells secreting IFN-γ after exposure to CMV antigen| |Hanley, 2012 ||Antigen-presenting cells (Dendritic cells, EBV-LCL) transduced with an adenoviral vector encoding CMVpp65| |Blyth, 2013 ||Antigen-presenting cells (Dendritic cells) transduced with an adenoviral vector encoding CMVpp65 or Dendritic cells pulsed with HLA-A02-restricted peptide NLVPMVATV| Because of these challenges, only a few reports document the generation of single antigen-specific T cells from naive donors [90,91,92,93]. In an attempt to target 3 viruses simultaneously, our group reported the ability to generate CMV, EBV, and adenovirus-specific CTL from the 20% fraction of a cord blood unit by using dendritic cells transduced with an Ad5/f35-CMV-pp65 vector as well as the cytokines IL-7, IL-12, and IL-15 . Responding T cells were shown to be derived from the naïve T cell population and responded to typical and atypical, novel CMV-pp65 epitopes. A clinical trial using CB-derived multi-virus specific T cells for the prevention and treatment of viral infection after CBT is open and has started to accrue patients. (Clinical Trial #: NCT01017705) [81,88]. Recently, we and other groups have also reported the ability to generate CMV-specific T cells from CMV-seronegative donors; [95,96] the clinical efficacy of these T cells will be tested in a Phase 1 clinical study (Clinical Trial #: NCT01945814). Another option for recipients of CB and CMV-seronegative donors is the use of third party, CMV-specific T cells. Thirdy party virus specific T cells have been evaluated clinically in several trials with promising results [97,98,99,100,101]. Leen et al. recently published a multi-institutional study of best-matched, MULTI virus-specific T cells and reported that responses with third party CTL were similar to those from donor-derived CTL in their previous studies [83,100]. This study highlights the importance of epitope recognition when selecting the optimal third party T cell lines. The human body has done an exquisite job over thousands of years to prevent or impede the manifestations of CMV and as a result, the majority of the population can live with CMV without knowing they have it. However, when the balance shifts towards CMV reactivation, usually as a result of treatment modalities or in some cases other infections, options are available to treat CMV infection, and the use of immunotherapy is rapidly becoming one of the favored options. The use of third-party, epitope-targeted CMV-specific T cells provides a unique platform similar to other pharmacotherapies in that they are rapidly available, are short lived, are effective, and are not associated with significant toxicities. However, for chronically suppressed patients, such as those undergoing SOT, the use of autologous CMV-specific T cells might be the ideal solution as long-term protection is necessary. Overall, improvements to T cell manufacturing technologies will provide a new and widely used treatment for CMV infection after transplant. This work was supported by a post-doctoral fellowship, PF-13-046-01-LIB from the American Cancer Society awarded to PJH, and CPRIT RO1 RP100469 and NCI PO1 CA148600-02 awards to CMB. P.J.H. and C.M.B. both contributed to writing the manuscript. Conflicts of Interest The authors declare no conflict of interest. References and Notes - Cheung, A.K.; Gottlieb, D.J.; Plachter, B.; Pepperl-Klindworth, S.; Avdic, S.; Cunningham, A.L.; Abendroth, A.; Slobedman, B. The role of the human cytomegalovirus UL111A gene in down-regulating CD4+ T-cell recognition of latently infected cells: Implications for virus elimination during latency. Blood 2009, 114, 4128–4137. [Google Scholar] [CrossRef] - Goodrum, F.D.; Jordan, C.T.; High, K.; Shenk, T. Human cytomegalovirus gene expression during infection of primary hematopoietic progenitor cells: A model for latency. Proc. Natl. Acad. Sci. USA 2002, 99, 16255–16260. [Google Scholar] [CrossRef] - Reeves, M.B.; Sinclair, J.H. Analysis of latent viral gene expression in natural and experimental latency models of human cytomegalovirus and its correlation with histone modifications at a latent promoter. J. Gen. Virol. 2010, 91, 599–604. [Google Scholar] [CrossRef] - Varnum, S.M.; Streblow, D.N.; Monroe, M.E.; Smith, P.; Auberry, K.J.; Pasa-Tolic, L.; Wang, D.; Camp, D.G., Jr.; Rodland, K.; Wiley, S.; et al. Identification of proteins in human cytomegalovirus (HCMV) particles: The HCMV proteome. J. Virol. 2004, 78, 10960–10966. [Google Scholar] [CrossRef] - Kalejta, R.F. Tegument proteins of human cytomegalovirus. Microbiol. Mol. Biol. Rev. 2008, 72, 249–265. [Google Scholar] [CrossRef] - Human Herpesviruses: Biology, Therapy, and Immunoprophylaxis; Arvin, A., Campadelli-Fiume, G., Mocarski, E., Moore, P.S., Roizman, B., Whitley, R., Yamanishi, K., Eds.; Cambridge University Press: Cambridge, UK, 2007. - Roby, C.; Gibson, W. Characterization of phosphoproteins and protein kinase activity of virions, noninfectious enveloped particles, and dense bodies of human cytomegalovirus. J. Virol. 1986, 59, 714–727. [Google Scholar] - Gandhi, M.K.; Khanna, R. Human cytomegalovirus: Clinical aspects, immune regulation, and emerging treatments. Lancet Infect. Dis. 2004, 4, 725–738. [Google Scholar] [CrossRef] - Loewendorf, A.; Benedict, C.A. Modulation of host innate and adaptive immune defenses by cytomegalovirus: Timing is everything. J. Intern. Med. 2010, 267, 483–501. [Google Scholar] [CrossRef] - Sissons, J.G.; Bain, M.; Wills, M.R. Latency and reactivation of human cytomegalovirus. J. Infect. 2002, 44, 73–77. [Google Scholar] [CrossRef] - Paulus, C.; Nevels, M. The human cytomegalovirus major immediate-early proteins as antagonists of intrinsic and innate antiviral host responses. Viruses 2009, 1, 760–779. [Google Scholar] [CrossRef] - Hahn, G.; Jores, R.; Mocarski, E.S. Cytomegalovirus remains latent in a common precursor of dendritic and myeloid cells. Proc. Natl. Acad. Sci. USA 1998, 95, 3937–3942. [Google Scholar] [CrossRef] - Gerna, G.; Percivalle, E.; Lilleri, D.; Lozza, L.; Fornara, C.; Hahn, G.; Baldanti, F.; Revello, M.G. Dendritic-cell infection by human cytomegalovirus is restricted to strains carrying functional UL131–128 genes and mediates efficient viral antigen presentation to CD8+ T cells. J. Gen. Virol. 2005, 86, 275–284. [Google Scholar] [CrossRef] - Fietze, E.; Prosch, S.; Reinke, P.; Stein, J.; Docke, W.D.; Staffa, G.; Löning, S.; Devaux, S.; Emmrich, F.; von Baehr, R. Cytomegalovirus infection in transplant recipients. The role of tumor necrosis factor. Transplantation 1994, 58, 675–680. [Google Scholar] [CrossRef] - Bunde, T.; Kirchner, A.; Hoffmeister, B.; Habedank, D.; Hetzer, R.; Cherepnev, G.; Proesch, S.; Reinke, P.; Volk, H.D.; Lehmkuhl, H.; et al. Protection from cytomegalovirus after transplantation is correlated with immediate early 1-specific CD8 T cells. J. Exp. Med. 2005, 201, 1031–1036. [Google Scholar] [CrossRef] - Kennedy-Nasser, A.A.; Bollard, C.M.; Myers, G.D.; Leung, K.S.; Gottschalk, S.; Zhang, Y.; Liu, H.; Heslop, H.E.; Brenner, M.K.; Krance, R.A. Comparable outcome of alternative donor and matched sibling donor hematopoietic stem cell transplant for children with acute lymphoblastic leukemia in first or second remission using alemtuzumab in a myeloablative conditioning regimen. Biol. Blood Marrow Transplant. 2008, 14, 1245–1252. [Google Scholar] [CrossRef] - Mori, T.; Kato, J. Cytomegalovirus infection/disease after hematopoietic stem cell transplantation. Int. J. Hematol. 2010, 91, 588–595. [Google Scholar] [CrossRef] - Boeckh, M.; Nichols, W.G. The impact of cytomegalovirus serostatus of donor and recipient before hematopoietic stem cell transplantation in the era of antiviral prophylaxis and preemptive therapy. Blood 2004, 103, 2003–2008. [Google Scholar] [CrossRef] - Hanley, P.J.; Cruz, C.R.; Shpall, E.J.; Bollard, C.M. Improving clinical outcomes using adoptively transferred immune cells from umbilical cord blood. Cytotherapy 2010, 12, 713–720. [Google Scholar] [CrossRef] - Ugarte-Torres, A.; Hoegh-Petersen, M.; Liu, Y.; Zhou, F.; Williamson, T.S.; Quinlan, D.; Sy, S.; Roa, L.; Khan, F.; Fonseca, K.; et al. Donor serostatus has an impact on cytomegalovirus-specific immunity, cytomegaloviral disease incidence, and survival in seropositive hematopoietic cell transplant recipients. Biol. Blood Marrow Transplant. 2011, 17, 574–585. [Google Scholar] [CrossRef] - Jaskula, E.; Bochenska, J.; Kocwin, E.; Tarnowska, A.; Lange, A. CMV Serostatus of Donor-Recipient Pairs Influences the Risk of CMV Infection/Reactivation in HSCT Patients. Bone Marrow Res. 2012, 2012, 375075. [Google Scholar] - Falagas, M.E.; Paya, C.; Ruthazer, R.; Badley, A.; Patel, R.; Wiesner, R.; Griffith, J.; Freeman, R.; Rohrer, R.; Werner, B.G.; et al. Significance of cytomegalovirus for long-term survival after orthotopic liver transplantation: A prospective derivation and validation cohort analysis. Transplantation 1998, 66, 1020–1028. [Google Scholar] [CrossRef] - Paya, C.V. Prevention of cytomegalovirus disease in recipients of solid-organ transplants. Clin. Infect. Dis. 2001, 32, 596–603. [Google Scholar] [CrossRef] - Cope, A.V.; Sabin, C.; Burroughs, A.; Rolles, K.; Griffiths, P.D.; Emery, V.C. Interrelationships among quantity of human cytomegalovirus (HCMV) DNA in blood, donor-recipient serostatus, and administration of methylprednisolone as risk factors for HCMV disease following liver transplantation. J. Infect. Dis. 1997, 176, 1484–1490. [Google Scholar] - Sia, I.G.; Wilson, J.A.; Groettum, C.M.; Espy, M.J.; Smith, T.F.; Paya, C.V. Cytomegalovirus (CMV) DNA load predicts relapsing CMV infection after solid organ transplantation. J. Infect. Dis. 2000, 181, 717–720. [Google Scholar] [CrossRef] - Boeckh, M. Current antiviral strategies for controlling cytomegalovirus in hematopoietic stem cell transplant recipients: Prevention and therapy. Transpl. Infect. Dis. 1999, 1, 165–178. [Google Scholar] - Shellam, G.R.; Allan, J.E.; Papadimitriou, J.M.; Bancroft, G.J. Increased susceptibility to cytomegalovirus infection in beige mutant mice. Proc. Natl. Acad. Sci. USA 1981, 78, 5104–5108. [Google Scholar] - Biron, C.A.; Byron, K.S.; Sullivan, J.L. Severe herpesvirus infections in an adolescent without natural killer cells. N. Engl. J. Med. 1989, 320, 1731–1735. [Google Scholar] - Iversen, A.C.; Norris, P.S.; Ware, C.F.; Benedict, C.A.; Human, N.K. Cells inhibit cytomegalovirus replication through a noncytolytic mechanism involving lymphotoxin-dependent induction of IFN-beta. J. Immunol. 2005, 175, 7568–7574. [Google Scholar] [CrossRef] - Boehme, K.W.; Guerrero, M.; Compton, T. Human cytomegalovirus envelope glycoproteins B and H are necessary for TLR2 activation in permissive cells. J. Immunol. 2006, 177, 7094–7102. [Google Scholar] [CrossRef] - Rossini, G.; Cerboni, C.; Santoni, A.; Landini, M.P.; Landolfo, S.; Gatti, D.; Gribaudo, G.; Varani, S. Interplay between human cytomegalovirus and intrinsic/innate host responses: A complex bidirectional relationship. Mediat. Inflamm. 2012, 2012, 607276. [Google Scholar] - Bratcher, D.F.; Bourne, N.; Bravo, F.J.; Schleiss, M.R.; Slaoui, M.; Myers, M.G.; Bernstein, D.I. Effect of passive antibody on congenital cytomegalovirus infection in guinea pigs. J. Infect. Dis. 1995, 172, 944–950. [Google Scholar] [CrossRef] - Britt, W.J.; Vugler, L.; Butfiloski, E.J.; Stephens, E.B. Cell surface expression of human cytomegalovirus (HCMV) gp55–116 (gB): Use of HCMV-recombinant vaccinia virus-infected cells in analysis of the human neutralizing antibody response. J. Virol. 1990, 64, 1079–1085. [Google Scholar] - Gonczol, E.; deTaisne, C.; Hirka, G.; Berencsi, K.; Lin, W.C.; Paoletti, E.; Plotkin, S. High expression of human cytomegalovirus (HCMV)-gB protein in cells infected with a vaccinia-gB recombinant: The importance of the gB protein in HCMV immunity. Vaccine 1991, 9, 631–637. [Google Scholar] [CrossRef] - Stagno, S.; Pass, R.F.; Cloud, G.; Britt, W.J.; Henderson, R.E.; Walton, P.D.; Veren, D.A.; Page, F.; Alford, C.A. Primary cytomegalovirus infection in pregnancy. Incidence, transmission to fetus, and clinical outcome. J. Am. Med. Assoc. (JAMA) 1986, 256, 1904–1908. [Google Scholar] - Revello, M.G.; Gerna, G. Diagnosis and management of human cytomegalovirus infection in the mother, fetus, and newborn infant. Clin. Microbiol. Rev. 2002, 15, 680–715. [Google Scholar] [CrossRef] - Schleiss, M.R. Cytomegalovirus in the neonate: Immune correlates of infection and protection. Clin. Dev. Immunol. 2013, 2013, 501801. [Google Scholar] [CrossRef] - Krause, P.R.; Bialek, S.R.; Boppana, S.B.; Griffiths, P.D.; Laughlin, C.A.; Ljungman, P.; Ljungman, P.; Mocarski, E.S.; Pass, R.F.; Read, J.S.; et al. Priorities for CMV vaccine development. Vaccine 2013, 32, 4–10. [Google Scholar] [CrossRef] - Alonso Arias, R.; Moro-Garcia, M.A.; Echeverria, A.; Solano-Jaurrieta, J.J.; Suarez-Garcia, F.M.; Lopez-Larrea, C. Intensity of the humoral response to cytomegalovirus is associated with the phenotypic and functional status of the immune system. J. Virol. 2013, 87, 4486–4495. [Google Scholar] [CrossRef] - Zhu, J.; Shearer, G.M.; Marincola, F.M.; Norman, J.E.; Rott, D.; Zou, J.P.; Epstein, S.E. Discordant cellular and humoral immune responses to cytomegalovirus infection in healthy blood donors: Existence of a Th1-type dominant response. Int. Immunol. 2001, 13, 785–790. [Google Scholar] [CrossRef] - Landini, M.P.; Lazzarotto, T.; Xu, J.; Geballe, A.P.; Mocarski, E.S. Humoral immune response to proteins of human cytomegalovirus latency-associated transcripts. Biol. Blood Marrow Transplant. 2000, 6, 100–108. [Google Scholar] [CrossRef] - Moss, P.; Rickinson, A. Cellular immunotherapy for viral infection after HSC transplantation. Nat. Rev. Immunol. 2005, 5, 9–20. [Google Scholar] [CrossRef] - Crough, T.; Khanna, R. Immunobiology of human cytomegalovirus: From bench to bedside. Clin. Microbiol. Rev. 2009, 22, 76–98. [Google Scholar] [CrossRef] - Olsson, J.; Wikby, A.; Johansson, B.; Lofgren, S.; Nilsson, B.O.; Ferguson, F.G. Age-related change in peripheral blood T-lymphocyte subpopulations and cytomegalovirus infection in the very old: The Swedish longitudinal OCTO immune study. Mech. Ageing Dev. 2000, 121, 187–201. [Google Scholar] - Spielmann, G.; Bollard, C.M.; Bigley, A.B.; Hanley, P.J.; Blaney, J.W.; Lavoy, E.C.; Pircher, H.; Simpson, R.J. The effects of age and latent cytomegalovirus infection on the redeployment of CD8+ T cell subsets in response to acute exercise in humans. Brain, Behav, Immunity 2013. [Google Scholar] [CrossRef] - Simpson, R.J.; Lowder, T.W.; Spielmann, G.; Bigley, A.B.; LaVoy, E.C.; Kunz, H. Exercise and the aging immune system. Ageing Res. Rev. 2012, 11, 404–420. [Google Scholar] [CrossRef] - Reusser, P.; Riddell, S.R.; Meyers, J.D.; Greenberg, P.D. Cytotoxic T-lymphocyte response to cytomegalovirus after human allogeneic bone marrow transplantation: Pattern of recovery and correlation with cytomegalovirus infection and disease. Blood 1991, 78, 1373–1380. [Google Scholar] - Riddell, S.R.; Watanabe, K.S.; Goodrich, J.M.; Li, C.R.; Agha, M.E.; Greenberg, P.D. Restoration of viral immunity in immunodeficient humans by the adoptive transfer of T cell clones. Science 1992, 257, 238–241. [Google Scholar] - Sester, U.; Gartner, B.C.; Wilkens, H.; Schwaab, B.; Wossner, R.; Kindermann, I.; Girndt, M.; Meyerhans, A.; Mueller-Lantzsch, N.; Schäfers, H.J. Differences in CMV-specific T-cell levels and long-term susceptibility to CMV infection after kidney, heart and lung transplantation. Am. J. Transplant. 2005, 5, 1483–1489. [Google Scholar] - Radha, R.; Jordan, S.; Puliyanda, D.; Bunnapradist, S.; Petrosyan, A.; Amet, N.; Toyoda, M. Cellular immune responses to cytomegalovirus in renal transplant recipients. Am. J. Transplant. 2005, 5, 110–117. [Google Scholar] - Reusser, P.; Cathomas, G.; Attenhofer, R.; Tamm, M.; Thiel, G. Cytomegalovirus (CMV)-specific T cell immunity after renal transplantation mediates protection from CMV disease by limiting the systemic virus load. J. Infect. Dis. 1999, 180, 247–253. [Google Scholar] - Sester, M.; Sester, U.; Gartner, B.C.; Girndt, M.; Meyerhans, A.; Kohler, H. Dominance of virus-specific CD8 T cells in human primary cytomegalovirus infection. J. Am. Soc. Nephrol. (JASN) 2012, 13, 2577–2584. [Google Scholar] - Walter, E.A.; Greenberg, P.D.; Gilbert, M.J.; Finch, R.J.; Watanabe, K.S.; Thomas, E.D.; Riddell, S.R. Reconstitution of cellular immunity against cytomegalovirus in recipients of allogeneic bone marrow by transfer of T-cell clones from the donor. N. Engl. J. Med. 1995, 333, 1038–1044. [Google Scholar] [CrossRef] - Hanley, P.J.; Shaffer, D.R.; Cruz, C.R.; Ku, S.; Tzou, B.; Liu, H.; Demmler-Harrison, G.; Heslop, H.E.; Rooney, C.M.; Gottschalk, S.; et al. Expansion of T cells targeting multiple antigens of cytomegalovirus, Epstein-Barr virus and adenovirus to provide broad antiviral specificity after stem cell transplantation. Cytotherapy 2011, 13, 976–986. [Google Scholar] [CrossRef] - Wills, M.R.; Carmichael, A.J.; Mynard, K.; Jin, X.; Weekes, M.P.; Plachter, B.; Sissons, J.G. The human cytotoxic T-lymphocyte (CTL) response to cytomegalovirus is dominated by structural protein pp65: Frequency, specificity, and T-cell receptor usage of pp65-specific CTL. J. Virol. 1996, 70, 7569–7579. [Google Scholar] - Sylwester, A.W.; Mitchell, B.L.; Edgar, J.B.; Taormina, C.; Pelte, C.; Ruchti, F.; Sleath, P.R.; Grabstein, K.H.; Hosken, N.A.; Kern, F.; et al. Broadly targeted human cytomegalovirus-specific CD4+ and CD8+ T cells dominate the memory compartments of exposed subjects. J. Exp. Med. 2005, 202, 673–685. [Google Scholar] [CrossRef] - Polic, B.; Hengel, H.; Krmpotic, A.; Trgovcich, J.; Pavic, I.; Luccaronin, P.; Jonjić, S.; Koszinowski, U.H. Hierarchical and redundant lymphocyte subset control precludes cytomegalovirus replication during latent infection. J. Exp. Med. 1998, 188, 1047–1054. [Google Scholar] [CrossRef] - Jonjic, S.; Pavic, I.; Lucin, P.; Rukavina, D.; Koszinowski, U.H. Efficacious control of cytomegalovirus infection after long-term depletion of CD8+ T lymphocytes. J. Virol. 1990, 64, 5457–5464. [Google Scholar] - Tu, W.; Chen, S.; Sharp, M.; Dekker, C.; Manganello, A.M.; Tongson, E.C.; Maecker, H.T.; Holmes, T.H.; Wang, Z.; Kemble, G.; et al. Persistent and selective deficiency of CD4+ T cell immunity to cytomegalovirus in immunocompetent young children. J. Immunol. 2004, 172, 3260–3267. [Google Scholar] [CrossRef] - Antoine, P.; Olislagers, V.; Huygens, A.; Lecomte, S.; Liesnard, C.; Donner, C.; Marchant, A. Functional exhaustion of CD4+ T lymphocytes during primary cytomegalovirus infection. J. Immunol. 2012, 189, 2665–2672. [Google Scholar] - Einsele, H.; Roosnek, E.; Rufer, N.; Sinzger, C.; Riegler, S.; Loffler, J.; Grigoleit, U.; Moris, A.; Rammensee, H.G.; Kanzm, L.; et al. Infusion of cytomegalovirus (CMV)-specific T cells for the treatment of CMV infection not responding to antiviral chemotherapy. Blood 2002, 99, 3916–3922. [Google Scholar] - Lehner, P.J.; Wilkinson, G.W. Cytomegalovirus: From evasion to suppression? Nat. Immunol. 2001, 2, 993–994. [Google Scholar] [CrossRef] - Gilbert, M.J.; Riddell, S.R.; Plachter, B.; Greenberg, P.D. Cytomegalovirus selectively blocks antigen processing and presentation of its immediate-early gene product. Nature 1996, 383, 720–722. [Google Scholar] [CrossRef] - Park, B.; Oh, H.; Lee, S.; Song, Y.; Shin, J.; Sung, Y.C.; Hwang, S.Y.; Ahn, K. The MHC class I homolog of human cytomegalovirus is resistant to down-regulation mediated by the unique short region protein (US)2, US3, US6, and US11 gene products. J. Immunol. 2002, 168, 3464–3469. [Google Scholar] [CrossRef] - Miller, D.M.; Rahill, B.M.; Boss, J.M.; Lairmore, M.D.; Durbin, J.E.; Waldman, J.W.; Sedmak, D.D. Human cytomegalovirus inhibits major histocompatibility complex class II expression by disruption of the Jak/Stat pathway. J. Exp. Med. 1998, 187, 675–683. [Google Scholar] [CrossRef] - Le Roy, E.; Muhlethaler-Mottet, A.; Davrinche, C.; Mach, B.; Davignon, J.L. Escape of human cytomegalovirus from HLA-DR-restricted CD4(+) T-cell response is mediated by repression of gamma interferon-induced class II transactivator expression. J. Virol. 1999, 73, 6582–6589. [Google Scholar] - Tomazin, R.; Boname, J.; Hegde, N.R.; Lewinsohn, D.M.; Altschuler, Y.; Jones, T.R.; Cresswell, P.; Nelson, J.A.; Riddell, S.R.; Johnson, D.C. Cytomegalovirus US2 destroys two components of the MHC class II pathway, preventing recognition by CD4+ T cells. Nat. Med. 1999, 5, 1039–1043. [Google Scholar] [CrossRef] - Reyburn, H.T.; Mandelboim, O.; Vales-Gomez, M.; Davis, D.M.; Pazmany, L.; Strominger, J.L. The class I MHC homologue of human cytomegalovirus inhibits attack by natural killer cells. Nature 1997, 386, 514–517. [Google Scholar] - Wang, E.C.; McSharry, B.; Retiere, C.; Tomasec, P.; Williams, S.; Borysiewicz, L.K.; Braud, V.M.; Wilkinson, G.W. UL40-mediated NK evasion during productive infection with human cytomegalovirus. Proc. Natl. Acad. Sci. USA 2002, 99, 7570–7575. [Google Scholar] [CrossRef] - Dunn, C.; Chalupny, N.J.; Sutherland, C.L.; Dosch, S.; Sivakumar, P.V.; Johnson, D.C.; Cosman, D. Human cytomegalovirus glycoprotein UL16 causes intracellular sequestration of NKG2D ligands, protecting against natural killer cell cytotoxicity. J. Exp. Med. 2003, 197, 1427–1439. [Google Scholar] [CrossRef] - Casarosa, P.; Bakker, R.A.; Verzijl, D.; Navis, M.; Timmerman, H.; Leurs, R.; Martine, J.S. Constitutive signaling of the human cytomegalovirus-encoded chemokine receptor US28. J. Biol. Chem. 2001, 276, 1133–1137. [Google Scholar] - Skaletskaya, A.; Bartle, L.M.; Chittenden, T.; McCormick, A.L.; Mocarski, E.S.; Goldmacher, V.S. A cytomegalovirus-encoded inhibitor of apoptosis that suppresses caspase-8 activation. Proc. Natl. Acad. Sci. USA 2001, 98, 7829–7834. [Google Scholar] - Zhang, A.; Hildreth, R.L.; Colberg-Poley, A.M. Human cytomegalovirus inhibits apoptosis by proteasome-mediated degradation of Bax at endoplasmic reticulum-mitochondrion contacts. J. Virol. 2013, 87, 5657–5668. [Google Scholar] [CrossRef] - Stern-Ginossar, N.; Elefant, N.; Zimmermann, A.; Wolf, D.G.; Saleh, N.; Biton, M.; Horwitz, E.; Prokocimer, Z.; Prichard, M.; Hahn, G.; et al. Host immune system gene targeting by a viral miRNA. Science 2007, 317, 376–381. [Google Scholar] - Stern-Ginossar, N.; Gur, C.; Biton, M.; Horwitz, E.; Elboim, M.; Stanietsky, N.; Mandelboim, M.; Mandelboim, O. Human microRNAs regulate stress-induced immune responses mediated by the receptor NKG2D. Nat. Immunol. 2008, 9, 1065–1073. [Google Scholar] [CrossRef] - Mocarski, E.S., Jr. Immunomodulation by cytomegaloviruses: Manipulative strategies beyond evasion. Trends Microbiol. 2002, 10, 332–339. [Google Scholar] [CrossRef] - Andrews, D.M.; Andoniou, C.E.; Granucci, F.; Ricciardi-Castagnoli, P.; Degli-Esposti, M.A. Infection of dendritic cells by murine cytomegalovirus induces functional paralysis. Nat. Immunol. 2001, 2, 1077–1084. [Google Scholar] [CrossRef] - Noriega, V.; Redmann, V.; Gardner, T.; Tortorella, D. Diverse immune evasion strategies by human cytomegalovirus. Immunol. Res. 2012, 54, 140–151. [Google Scholar] [CrossRef] - Miller-Kittrell, M.; Sparer, T.E. Feeling manipulated: Cytomegalovirus immune manipulation. Virol. J. 2009, 6. [Google Scholar] [CrossRef] - Jackson, S.E.; Mason, G.M.; Wills, M.R. Human cytomegalovirus immunity and immune evasion. Virus Res. 2011, 157, 151–160. [Google Scholar] [CrossRef] - Saglio, F.; Hanley, P.J.; Bollard, C.M. The time is now: Moving toward virus-specific T cells after allogeneic hematopoietic stem cell transplantation as the standard of care. Cytotherapy 2014, 16, 149–159. [Google Scholar] [CrossRef] - Gerdemann, U.; Katari, U.L.; Papadopoulou, A.; Keirnan, J.M.; Craddock, J.A.; Liu, H.; Martinez, C.A.; Kennedy-Nasser, A.; Leung, K.S.; Gottschalk, S.M.; et al. Safety and clinical efficacy of rapidly-generated trivirus-directed T cells as treatment for adenovirus, EBV, and CMV infections after allogeneic hematopoietic stem cell transplant. Mol. Ther. 2013, 21, 2113–2121. [Google Scholar] [CrossRef] - Leen, A.M.; Myers, G.D.; Sili, U.; Huls, M.H.; Weiss, H.; Leung, K.S.; Carrum, G.; Krance, R.A.; Chang, C.C.; Molldrem, J.J.; et al. Monoculture-derived T lymphocytes specific for multiple viruses expand and produce clinically relevant effects in immunocompromised individuals. Nat. Med. 2006, 12, 1160–1166. [Google Scholar] [CrossRef] - Peggs, K.S.; Thomson, K.; Samuel, E.; Dyer, G.; Armoogum, J.; Chakraverty, R.; Pang, K.; Mackinnon, S.; Lowdell, M.W. Directly selected cytomegalovirus-reactive donor T cells confer rapid and safe systemic reconstitution of virus-specific immunity following stem cell transplantation. Clin. Infect. Dis. 2011, 52, 49–57. [Google Scholar] [CrossRef] - Kroger, N.; Zabelina, T.; Kruger, W.; Renges, H.; Stute, N.; Schrum, J.; Kabisch, H.; Schafhausen, P.; Jaburg, N.; Löliger, C.; et al. Patient cytomegalovirus seropositivity with or without reactivation is the most important prognostic factor for survival and treatment-related mortality in stem cell transplantation from unrelated donors using pretransplant in vivo T-cell depletion with anti-thymocyte globulin. Br. J. Haematol. 2001, 113, 1060–1071. [Google Scholar] - Micklethwaite, K.P.; Clancy, L.; Sandher, U.; Hansen, A.M.; Blyth, E.; Antonenas, V.; Sartor, M.M.; Bradstock, K.F.; Gottlieb, D.J. Prophylactic infusion of cytomegalovirus-specific cytotoxic T lymphocytes stimulated with Ad5f35pp65 gene-modified dendritic cells after allogeneic hemopoietic stem cell transplantation. Blood 2008, 112, 3974–3981. [Google Scholar] [CrossRef] - Cobbold, M.; Khan, N.; Pourgheysari, B.; Tauro, S.; McDonald, D.; Osman, H.; Assenmacher, M.; Billingham, L.; Colin. Adoptive transfer of cytomegalovirus-specific CTL to stem cell transplant patients after selection by HLA-peptide tetramers. J. Exp. Med. 2005, 202, 379–386. [Google Scholar] [CrossRef] - Hanley, P.J.; Martinez, C.; Leung, K.; Savoldo, B.; Dotti, G.; Brenner, M.K.; Rooney, C.; Heslop, H.; Krance, R.; Shpall, E.J.; et al. Improving Immune Reconstitution after cord blood transplantation using ex vivo expanded virus-specific T cells: A phase I clinical study. ASH Annu. Meet. Abstr. 2013, 15, S21. [Google Scholar] - Blyth, E.; Clancy, L.; Simms, R.; Ma, C.K.; Burgess, J.; Deo, S.; Byth, K.; Dubosq, M.C.; Shaw, P.J.; Micklethwaite, K.P.; et al. Donor-derived CMV-specific T cells reduce the requirement for CMV-directed pharmacotherapy after allogeneic stem cell transplantation. Blood 2013, 121, 3745–3758. [Google Scholar] [CrossRef] - Sun, Q.; Burton, R.L.; Pollok, K.E.; Emanuel, D.J.; Lucas, K.G. CD4(+) Epstein-Barr virus-specific cytotoxic T-lymphocytes from human umbilical cord blood. Cell. Immunol. 1999, 195, 81–88. [Google Scholar] [CrossRef] - Savoldo, B.; Cubbage, M.L.; Durett, A.G.; Goss, J.; Huls, M.H.; Liu, Z.; Teresita, L.; Gee, A.P.; Ling, P.D.; Brenner, M.K.; et al. Generation of EBV-specific CD4+ cytotoxic T cells from virus naive individuals. J. Immunol. 2002, 168, 909–918. [Google Scholar] [CrossRef] - Park, K.D.; Marti, L.; Kurtzberg, J.; Szabolcs, P. In vitro priming and expansion of cytomegalovirus-specific Th1 and Tc1 T cells from naive cord blood lymphocytes. Blood 2006, 108, 1770–1773. [Google Scholar] - Hanley, P.J.; Lam, S.; Shpall, E.J.; Bollard, C.M. Expanding cytotoxic T lymphocytes from umbilical cord blood that target cytomegalovirus, Epstein-Barr virus, and adenovirus. J. Vis. Exp. 2012, e3627. [Google Scholar] [CrossRef] - Hanley, P.J.; Cruz, C.R.; Savoldo, B.; Leen, A.M.; Stanojevic, M.; Khalil, M.; Decker, W.; Molldrem, J.J.; Liu, H.; Gee, A.P.; et al. Functionally active virus-specific T cells that target CMV, adenovirus, and EBV can be expanded from naive T-cell populations in cord blood and will target a range of viral epitopes. Blood 2009, 114, 1958–1967. [Google Scholar] [CrossRef] - Jedema, I.; van de Meent, M.; Pots, J.; Kester, M.G.; van der Beek, M.T.; Falkenburg, J.H. Successful generation of primary virus-specific and anti-tumor T-cell responses from the naive donor T-cell repertoire is determined by the balance between antigen-specific precursor T cells and regulatory T cells. Haematologica 2011, 96, 1204–1212. [Google Scholar] [CrossRef] - Hanley, P.J.; Cruz, R.Y.; Melenhorst, J.; Scheinberg, J.; Blaney, J.; Savoldo, B.; Dotti, G.; Heslop, H.; Rooney, C.M.; Shpall, E.J.; et al. Naive T-cell-derived CTL recognize atypical epitopes of CMVpp65 with higher avidity than CMV-seropositive donor-derived CTL—A basis for treatment of post-transplant viral infection by adoptive transfer of T-cells from virus-naive donors. Cytotherapy 2013, 15, S9. [Google Scholar] - Barker, J.N.; Doubrovina, E.; Sauter, C.; Jaroscak, J.J.; Perales, M.A.; Doubrovin, M.; Prockop, S.E.; Koehne, G.; O’Reilly, R.J. Successful treatment of EBV-associated posttransplantation lymphoma after cord blood transplantation using third-party EBV-specific cytotoxic T lymphocytes. Blood 2010, 116, 5045–5049. [Google Scholar] [CrossRef] - Doubrovina, E.; Oflaz-Sozmen, B.; Prockop, S.E.; Kernan, N.A.; Abramson, S.; Teruya-Feldstein, J.; Hedvat, C.; Chou, J.F.; Heller, G.; Barker, J.N.; et al. Adoptive immunotherapy with unselected or EBV-specific T cells for biopsy-proven EBV+ lymphomas after allogeneic hematopoietic cell transplantation. Blood 2012, 119, 2644–2656. [Google Scholar] - Uhlin, M.; Okas, M.; Gertow, J.; Uzunel, M.; Brismar, T.B.; Mattsson, J. A novel haplo-identical adoptive CTL therapy as a treatment for EBV-associated lymphoma after stem cell transplantation. Cancer Immunol. Immunother. (CII). 2010, 59, 473–437. [Google Scholar] [CrossRef] - Leen, A.M.; Bollard, C.M.; Mendizabal, A.M.; Shpall, E.J.; Szabolcs, P.; Antin, J.H.; Kapoor, N.; Pai, S.Y.; Rowley, S.D.; Kebriaei, P.; et al. Multicenter study of banked third-party virus-specific T cells to treat severe viral infections after hematopoietic stem cell transplantation. Blood 2013, 121, 5113–5123. [Google Scholar] - Qasim, W.; Derniame, S.; Gilmour, K.; Chiesa, R.; Weber, M.; Adams, S.; Rao, K.; Amrolia, P.; Goulden, N. Third-party virus-specific T cells eradicate adenoviraemia but trigger bystander graft-versus-host disease. Br. J. Haematol. 2011, 154, 150–153. [Google Scholar] [CrossRef] © 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
<urn:uuid:c2e44812-174d-49f8-9353-3d1ffefd173f>
CC-MAIN-2016-18
http://www.mdpi.com/1999-4915/6/6/2242/htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860122902.86/warc/CC-MAIN-20160428161522-00145-ip-10-239-7-51.ec2.internal.warc.gz
en
0.795008
14,772
2.578125
3
Seated Harpokrates with the crown of Amun, named as "Harpokrates-the-great, the eldest, the first of Amun" Late Period–Ptolemaic Period Cupreous metal, precious metal inlay H. 28.6 cm (11 1/4 in.); W. 5.8 cm (2 5/16 in.); D. 9 cm (3 9/16 in.) Gift of Mrs. S. W. Straus, 1925 Not on view The figure represents a child god in a seated/reclining position, wearing the double feather crown, complete with a streamer at the back. The crown associates him with the god Amun, a connection that is also made explicit in the inscription on the base. The child god, as here, is usually distinguished from adult gods by a range of iconographic clues: his nudity, the finger raised to the mouth (a child-like gesture), and a sidelock on the right side of his head. The sidelock was cast separately and was then mechanically attached to the crown with a pin. The braiding is inlaid with silver. Child gods grew in popularity and cult from the Third Intermediate Period onwards, rivaling even the most powerful and ancient gods, especially as temple offerings. Because of their profusion and many local forms, generally it is very difficult to assign precise identities to child gods, but an inscription on the base names this figure as Harpokrates. Horus the child (or Harpokrates) is best known as the son of Osiris and Isis, but in some cases, such as this one and 25.184.19, he is also referred to as the son of Amun. Such multi-layered associations are common to Egyptian religion, which had no strict canon perse and which, by this point in time, was built upon millennia of change and adaptation. Given to the Museum by Mrs. S. W. Straus, New York, 1925. Purchased by her at "the Museum," Luxor.
<urn:uuid:1423af36-b880-469f-93c7-fab918d4547a>
CC-MAIN-2017-13
http://www.metmuseum.org/art/collection/search/552049?pos=8
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190236.99/warc/CC-MAIN-20170322212950-00487-ip-10-233-31-227.ec2.internal.warc.gz
en
0.964191
430
2.9375
3
Today we are going to talk about a lifelong inflammatory process and some of the implications of this inflammatory process for disease. The pathologies we will talk about is the chronic inflammatory response to tattoos. In a recent article published in March 2018 in the Journal of Experimental Medicine titled "Unveiling skin macrophage dynamics explains both tattoo persistence and strenuous removal" Baranska et al explain what happens to tattoo ink when it is injected into the dermis. The pigment injected into the dermis generates an inflammatory response. A specific type of macrophage, known as a melanophage, along with other immune cells, race to engulf the foreign substance, in this case tattoo ink. In other words the ink does not stay in the dermis it is retained inside these macrophages. When the melanophage dies it then bursts, and then another melanophage engulfs the pigment which has been released. The result is an endless cycle of immune response and cell death of macrophages. While some of the pigment laden immune cells stay at the site where the tattoo was placed, others are taken by immune cells to the lymph nodes scattered throughout the body. Thus when you look at a tattoo, you are actually looking at a collection of dying macrophages in the skin. Every 90 days these macrophages die and are replaced by new macrophages. Tattoo associated diseases In order to read the most recent research related to tattoo related diseases click on the links below:: Bacterial endocarditis, aortic regurgitation, and heart failure Systemic sarcoidosis and granulomas Inflammatory myopathy and immune deficiency Haemophilus influenza sepsis Painful pigmented lymphadenopathy which mimics melanoma, lymphoma or breast cancer Psoriasis, discoid lupus erythematosus and lichen planus Malignant melanoma, basal cell carcinoma, squamous cell carcinoma, dermatofibrosarcoma protuberans, B cell lymphoma and leiomyosarcoma. Infection, Allergic Contact Dermatitis and Keloids Thousands of adverse effects have been reported in medical journals around the world including Here is a book dedicated to complications of tattoos
<urn:uuid:2b0641a9-3063-4976-959d-17bfa3aa7bac>
CC-MAIN-2019-30
https://www.medupdates.net/updates/tattoos-implicated-in-numerous-disease-processes
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525793.19/warc/CC-MAIN-20190718190635-20190718212635-00311.warc.gz
en
0.737394
471
3.015625
3
Many factors contribute to the rise of single mothers in the United States, like evolving social norms that accept the concept of a single motherhood lifestyle. In 2020, there were nearly 16 million single-mother households.1 The numbers are shocking, especially since they seem to have doubled over the past fifty years. Mothers are expected to upkeep their houses and help raise their children in significant ways to better their lives and the future of society. The pressure of being a mother is already heavy with a partner, let alone without one. Despite the social challenges, single mothers must maintain their children's home and well-being and financially support their lives. Unfortunately, due to this enormous responsibility, it’s common for single mothers to turn to substance abuse. Keep reading better to understand the reasoning behind single mothers and addiction. As mentioned, the role of a single mother comes with societal pressure, although it's becoming less frowned upon since it’s a more common occurrence in America. Still, mothers will handle intense conditions, emotionally and mentally, due to their added responsibilities. For one, single moms rarely get the proper amount of sleep needed for the brain and body to rejuvenate. Lack of sleep raises cortisol levels, spiking stress hormones, disrupting the immune system, and may result in sudden mood swings. Mothers also are psychologically tested due to factors such as: Men are more likely to abuse illicit drugs. Still, women, especially single mothers, tend to misuse substances such as certain stimulants like cocaine or Adderall or depressants like Xanax and Vicodin, which are classified as opioids or painkillers. These medications are often mixed with alcohol which is extremely dangerous since this worsens the adverse side effects of both alcohol and the consumed drug. Women are more likely to form an addiction to alcohol than men since women hold less water, acquire more fat in the body, and have lower levels of enzymes that break down the alcohol in the body’s system. Alcohol addiction treatment is urgently recommended, especially if other drugs interact with the substance, to avoid alcohol poisoning and behavioral changes and to create a positive lifestyle at home. According to single mother statistics, addict mothers inflict substance abuse disorder (SUD) on their children. Research indicates that children with a drug addict mom are found to be of lower socioeconomic status and have more difficulties in academic and social functioning.2 The report concludes that these children who experience single mothers and addiction stand at higher rates of mental and behavioral disorders as well as developing SUD symptoms. Combined 2009-2014 research, NSDUH data displayed an annual average of 8.7 million children aged 17 or younger living in a one-parent household developed SUD.2 Again, the numbers have continued to increase since the late 1980s and significantly since the start of the 2000s. Children and teenagers are more likely to turn to socially acceptable drugs like nicotine, marijuana, and alcohol before experimenting with prescription pills or illicit substances like heroin. At Banyan Treatment Centers Heartland, we offer a medically monitored drug detox for single mothers, teenagers, and older adults from all walks of life, so they can safely be guided through withdrawal symptoms. We offer successful counseling for families in order to mend relationships and practice communication and relapse prevention skills. Our team of experts will work with you and design a treatment plan that fits your recovery goals while providing the options for the flexibility you need.
<urn:uuid:91987a46-7dd6-4b2c-956d-16564ae3ab7f>
CC-MAIN-2022-40
https://www.banyantreatmentcenter.com/2022/08/22/single-mothers-and-addiction-heartland/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00616.warc.gz
en
0.956662
699
2.6875
3
WITHOUT a doubt social media has emerged as a dominant form of communication, fundamentally changing the nature and dynamics of social, business and political discourse around the world. And whether we, as parents, like it or not, social media has not only become a way of life for today’s child it is life itself! Apparently youngsters today spend more than 50 hours of screen-time every week. So obviously the media content they consume and create will have a profound impact on their social, emotional, cognitive and physical development. Learning how to use media and technology sensibly and responsibly has become an essential skill for life and now more than ever, we need to help our youngsters and teach ourselves how to navigate a world where change is the only constant! Earlier in the week, parents were invited and encouraged to attend a talk at our school on Internet safety and the UAE laws concerning social media. There is a UAE Schools Social Media and Online Behaviour Guidance that teachers and carers teach to students to adhere to and it is part of their teaching standards, which in turn is part of the UAE’s Federal Decree Law that came into effect in August of 2012 to combat cybercrimes in all their forms. Some of the issues in the law, which are relevant to schools, include the law against insults or accusations that would lead to victim being punished or held in contempt by others. This holds a fine of AED250,000 to 500,000 (BD25,000-BD50,000) and imprisonment. Defamation, publishing news, photos, scenes, comments, statements or information, even if true and correct can have a penalty of up to six months in prison and a fine of AED150,000 to AED500,000 (BD15,000 to BD50,000). So posting pictures on social media without the owner’s permission is in fact violating privacy and such electronic cases can neither be waived off nor can there be a reconciliation among parties involved as the law will take its course. Last year, a 13-year-old girl was taken to court, because she allegedly posted a picture of her friend, also 13, without her consent. Out of fear, the latter lied to her parents about the fact that she did not give permission to her friend to post pictures of her on social media. And they filed a case against the teenager. But then it emerged that she had actually agreed to it. And although her family tried to waive the case they could not, because the law states that electronic crimes cannot be waived off or settled by reconciliation. So the case was referred to the Court of First Instance, where the defendant was unable to provide proof that her friend had authorised her to post the picture. The trial court sentenced and convicted the girl. Now the case is before the Supreme Court. And the families hope the sentence is reduced considering the age of the girl. Another case out of Austria could reignite a debate about sharing photos of children on Facebook. An 18-year-old woman from Carinthia is suing her parents over their posting of 500 images of her without her consent. The images were shared with her parents’ 700 Facebook friends. Her father told the news outlet he has rights to the photos because he took them. The Austria case goes to court in November, and if she does win, parents around the world might be rethinking how they share photos of their children on social media. According to Parent Zone, a UK-based site about parenting in the digital age, the average parent shares almost 1,500 photos, mostly on Facebook, of their children before they turn five. It found that 85 per cent of parents had not reviewed their Facebook privacy settings in more than a year and 79pc wrongly believed strangers could not see pictures of their children. French authorities have warned parents against posting intimate images of their children on Facebook, saying it could cause them lasting psychological damage. All I can tell you is that I am glad I attended the seminar. It was a definite an eye opener. Up until then I was actually one of the 85pc and the 79pc!
<urn:uuid:ebb8c07f-89f7-4458-ba22-bcd7fc0f6aa5>
CC-MAIN-2017-26
http://www.gdnonline.com/Details/133589/Change-now-the-only-constant
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322873.10/warc/CC-MAIN-20170628065139-20170628085139-00610.warc.gz
en
0.977387
849
2.59375
3
Fertility and Abortion in Czechoslovakia, 1950-2005 This graph shows two trends in the Czech population (first in Czechoslovakia and after 1993 in the Czech Republic)—changes in fertility rates (births per women aged 15-49) and the abortion rate in this same population. This fairly simple graph offers a number of insights into the experiences of Czech women both during and after Communism. For instance, we see births per woman declining from a high of more than 2.75 to a low of around 1.2, followed by a slight increase in the last few years. We also see a slow but steady rise in the number of abortions per woman from the legalization of abortion in Czechoslovakia in the mid-1950s until 1989, when there is a sudden and rapid drop in both the number of births per woman and the number of induced abortions. Unlike several countries in the Communist bloc, the number of abortions per woman in Czechoslovakia did not exceed the number of births, but the two lines were approaching one another by the late 1980s. What would explain the drop in births and the increase in abortions in the 1980s? And what would explain the rapid drop in both immediately after 1989? In the case of the latter question, one important answer was that Czech women suddenly had access to reliable condoms and the birth control pill, both of which made it possible for them to regulate their fertility to a much greater degree. When women can control their fertility they typically have fewer children and almost always have fewer abortions (because there are fewer unplanned pregnancies). Czechoslovak Statistical Office
<urn:uuid:2dcd9712-e345-4b59-b59a-e7a4dd95953c>
CC-MAIN-2017-04
http://chnm.gmu.edu/1989/items/show/669
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281001.53/warc/CC-MAIN-20170116095121-00179-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970858
324
3.1875
3
The earliest known settlers in Co Cork were hunter-gatherers who lived near Fermoy more than 10,100 years ago. That’s according to archaeologists who will reveal a wealth of information about our ancestors when they launch a book published by the National Roads Authority on Dec 10 at UCC. It details illustrated accounts of the 114 significant excavations undertaken in the county, revealing a wealth of previously unrecorded sites, each adding to our understanding of the story of Cork — going back to the county’s first known settlers, more than 500 generations ago. While the 8,100BC settlement in Fermoy, uncovered during the construction of the M8, is deemed to be the oldest, evidence of similarly ancient hunter-gatherers was discovered near Ballincollig and Youghal. NRA project archaeologist Ken Hanley, who edited the book, said a lakeside wooden hunting platform and an antler from a giant elk, which had been fashioned into a tool by humans, were found at the oldest known site at Corrin, Fermoy. He said there was evidence that, around that time, part of a large forest in the area was burned down to make way for a settlement. Houses built by Cork’s first farmers (c.3,900BC) were found near Ballincollig and Fermoy, while a substantial Bronze Age settlement was found near Rathcormac. The most exceptional discovery was the Mitchelstown Face Cup, dating to the Bronze Age. “This is the oldest known three-dimensional representation of a person ever discovered in Ireland,” said Mr Haney. “It was radio carbon-dated to 1,800BC. It is unique. It came as a complete surprise. It was a spectacular find.” A sauna dating to 1,400BC was uncovered at Scartbarry, near Watergrasshill. “Two substantial early medieval settlements were discovered at Curraheen, near Bishopstown and at Ballynacarriga on Youghal bypass. Both date to the seventh century AD,” said Mr Hanley. An Anglo-Norman moated settlement, built in the 13th century, was unearthed at Ballinvinny South, north-east of Glanmire. The same settlement was later occupied in the 17th century and held a horde of James II coins. “These weren’t ordinary coins,” said Mr Hanely. “[James] had no money. Instead of using gold and silver coins he smelted coins from cheaper metals to pay his soldiers.” The tokens were to be redeemed for real money if he won the war against William of Orange, but he didn’t and so they were worthless. All the finds were made courtesy of NRA funding in five road projects: Glanmire-Watergrasshill bypass (N8); Rathcormac-Fermoy motorway (M8); Mitchelstown Relief Roads (N8/N73); Ballincollig bypass (N22); and Youghal bypass (N25). The NRA has funded more than 2,000 excavations on national road projects since it was established in 1994. lThe book, which costs €35, will be launched by Dr Ann Lynch of the Department of Arts, Heritage, and the Gaeltacht at UCC, at 7pm on Dec 10. © Irish Examiner Ltd. All rights reserved More in this section
<urn:uuid:907836f3-adfb-42cb-8ce0-d5aab76fa00b>
CC-MAIN-2014-23
http://www.irishexaminer.com/ireland/10000-year-old-settlement-unearthed-in-cork-251299.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997881423.31/warc/CC-MAIN-20140722025801-00124-ip-10-33-131-23.ec2.internal.warc.gz
en
0.980301
735
2.828125
3
Since the birth of the nation, we have turned to stories about the American South to narrate the rapid ascendency of the United States on the world stage. The idea of a cohesive South, different from yet integral to the United States, arose with the very formation of the nation itself. Its semitropical climate, plantation production, and heterogeneous population once defined the New World from the perspective of Europe. By founding U.S. literature through opposition to the South, writers boldly asserted their nation to stand apart from the imperial world order. Our South tracks the nation/South juxtaposition in U.S. literature from the founding to the turn of the twentieth century, through genres including travel writing, gothic and romance novels, geography textbooks, transcendentalist prose, and abolitionist address. Even as the southern states became peripheral to U.S. politics and economy, Jennifer Rae Greeson demonstrates that in literature the South remained central to the expanding and evolving idea of the nation. Claiming the South as our deviant and recalcitrant “other,” Americans have projected an anti-imperial imperative of domesticating and civilizing, administering and integrating underdeveloped regions both within our borders and beyond. Our South has been a primal site for thinking about geography and power in the United States.
<urn:uuid:2b672320-6e16-4b00-8248-a5772a1c5869>
CC-MAIN-2022-49
https://www.hup.harvard.edu/catalog.php?isbn=9780674024281
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710777.20/warc/CC-MAIN-20221130225142-20221201015142-00846.warc.gz
en
0.941117
268
3.703125
4
When we think of what distinguishes the baroque violin from the modern violin we think of the straight neck and the fingerboard wedge which determines the projection of the strings to the bridge. The nut and the saddle are likely to be at the same height relative to the top of the violin. The nut to saddle distance forms the base of a triangle which is bisected by the bridge/arch height. |Now there are two triangles, one on each side of the bridge/arch. The distribution of the bridge pressure on either side of the bridge/arch is determined by respective string/bridge angles.| |There are also forces in either direction at right angles to the top of the bridge. When the perpendicular forces are seen in balance, it is clear that the force in the direction of the nut is greater due to the sharper string/bridge angle on the tailpiece side.| |So a violin built in the manner of the early baroque violin is inherently out of balance with regard to the geometry of the strings vis-ŕ-vis the bridge. Friction at the top and feet of the bridge hold it in place. But the bridge will not be in a state of equilibrium relative to the forces upon it. Picture this as a tiny man leaning against the bridge on the tailpiece side. When you consider that the bridge not only rocks, but must also flex and bend with each cycle of vibration, it becomes clear that a dis-equilibrium of these forces will have consequences for the response of the violin. One of the most obvious ways I have seen the response affected is the tendency for baroque violins to tolerate only light strings. This stands to reason since the imbalance will be proportional to the tension of the strings and heavier strings only worsen the situation. Ideally the static forces on the bridge are in balance. And in fact when theorists calculate these forces, they usually average the angles, discounting the difference between the two. But even with the modern violin, where the angles are closer to equal due to the higher appui and raised saddle, there will be, on balance, a kilogram or more of force pushing toward the nut. For a violin in baroque set up, the options are limited. Can we open up the angle of the strings at the bridge? This would certainly put the static forces closer to a state of balance. |The only way to create a larger angle between the strings and the bridge would be to raise the saddle, which is the only pivot point of consequence here. But raised saddles do not become part of violin set-up until the mid 18th century. What if we increase the size of the tailgut? Would that open up the string/bridge angle? Surprisingly, the answer is no. The size of the tailgut is a key variable in baroque violin set up, but tailgut thickness and string/bridge angle are not directly related. In fact the tailpiece string lengths will always form a line directly to the top of the saddle, no matter the size of the tailgut.|| Courtesy of the National Music Museum Courtesy of the National Music Museum |Early tailpieces were fairly thick, between 7-8 mm. Perhaps there were structural reasons, depending on the choice of wood, but there may have been other reasons as well. Violin makers as early as Girolamo Amati (1613) began to carve out the forward section of the underside of the tailpiece, preserving intact a thick section where the tailgut passes through. Tailpieces of this type were very common during the baroque yet today’s violinmakers rarely incorporate this detail when they finish the tailpiece for a baroque violin. The drawing below illustrates the forces in play when the tailpiece and tailgut are of historical thicknesses. Note the continuous line of the strings from the crown of the bridge to the top of the saddle. The imperative of the strings to follow this line creates a pivot point where the tailgut exits the bottom of the tailpiece. As the strings are tightened the tailpiece rotates in a clockwise manner, bringing it into a more parallel orientation with the top of the violin. When this happens, the tailpiece is more flexible and appears to be capable of storing and releasing energy as the bridge flexes from the vibration of the strings. The static forces have not changed since the angle between the strings and the bridge are unchanged. But there appears to be a re-orientation of the dynamic forces that have a profound effect on the resonance of the violin. |What role does the tailgut play in this system, and why was a thick tailgut seen as an advantage? This would seem to be counterintuitive if we are seeking greater flexibility in the tailpiece system. But examining and measuring the holes in original tailpieces we find tailgut thicknesses of 2.50 to 2.60. When tailgut of thinner sizes is used, it quickly reaches the limit of its’ yield strength. In other words the thinner material readily conforms to the line of stress; particularly where it bends on exiting the bottom of the tailpiece, resulting in a more rigid system. In contrast a thicker piece of tailgut maintains a gradual curve as it passes through the tailpiece and most importantly, retains its’ springy quality indefinitely. This attribute of thick tailgut enables the rotational movement of the tailpiece and enhances the dynamic qualities of the tailpiece system by providing it with a spring hinge. This makes an enormous contribution to the damping qualities of the bridge by permitting greater flexibility of movement. I have experimented extensively with my own violin and can attest that the results are dramatic. With the proper historical set-up the violin rings louder and longer even when very heavy strings are used. The tailpiece string lengths ring quite loudly as well and if they are in tune with the playing lengths, will respond sympathetically as well. In this set-up there is a pronounced gap between the strings and the front edge of the tailpiece, creating a natural pure stop as the string exits the hole.
<urn:uuid:833dd9b3-1381-496f-9c1b-191a9aaef36f>
CC-MAIN-2014-41
http://www.damianstrings.com/baroque%20set-up.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657123284.86/warc/CC-MAIN-20140914011203-00205-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.941199
1,308
3.71875
4
The Somali are undoubtedly the most powerful of all African tribes when it comes to military warfare and tactics. They boast of the best military warfare and tactics which helped them to sail as far as Southeast Asia to flex their power. What is the strongest tribe in Africa? What is the strongest tribe in Africa? The Somali people are undisputedly the strongest African tribe. Who were the most feared tribe in Africa? The Maasai inhabit the African Great Lakes region and arrived via the South Sudan. Most Nilotic speakers in the area, including the Maasai, the Turkana and the Kalenjin, are pastoralists, and are famous for their fearsome reputations as warriors and cattle-rustlers. Who was the most powerful African king? Mansa Musa was the King of the Mali Empire from 1312 to 1337. Mansa Musa simply makes our top spot as most powerful African King because of the tremendous influence he had on the medieval world. The 25 years of Mansa Musa’s reign were the golden ages of the Mali Empire. What percentage of Africa is black? Black Africans made up 79.0% of the total population in 2011 and 81% in 2016. The percentage of all African households that are made up of individuals is 19.9%. Who was the most beautiful African Queen? Queen Nefertiti is a prominent queen from ancient Egypt. Her name means “a beautiful woman has come.” She left a legacy of strength, beauty, and power. Who is the most dangerous tribe? The Sentinelese. The Sentinelese are an uncontacted tribe living on North Sentinal Island, one of the Andaman Islands in the Indian Ocean. They vigorously reject all contact with outsiders. Who was the first black king of Africa? |Musa depicted holding an Imperial Golden Globe in the 1375 Catalan Atlas.| |Mansa of Mali| |Reign||c. 1312– c. 1337 ( c. 25 years)| What is the oldest tribe in Africa? 1. San (Bushmen) The San tribe has been living in Southern Africa for at least 30,000 years and they are believed to be not only the oldest African tribe, but quite possibly the world’s most ancient race. The San have the most diverse and distinct DNA than any other indigenous African group. Who is the powerful king in the world? Khan was the founder of the Mongol Empire, the largest land-based empire the world has ever seen. Given the size of his army, the levels of discipline and training he instilled were incredible. What was the first black empire in history? The first major state to rise in this region was the Ghana Empire (Wagadu). The name Ghana, often used by historians, was the regnal title given to the ruler of the Wagadu empire. Who named Africa? The 1st-century Jewish historian Flavius Josephus (Ant. 1.15) asserted that it was named for Epher, grandson of Abraham according to Gen. 25:4, whose descendants, he claimed, had invaded Libya. Where do most Africans live? The most populous African country is Nigeria with over 206 million inhabitants as of 2020 and a growth rate of 2.6% p.a. Which race has the largest population on earth? The world’s largest ethnic group is Han Chinese, with Mandarin being the world’s most spoken language in terms of native speakers. The world’s population is predominantly urban and suburban, and there has been significant migration toward cities and urban centres. What does black mean in Africa? The term Black generally refers to a person with African ancestral origins. In some circumstances, usually in politics or power struggles, the term Black signifies all non-White minority populations.
<urn:uuid:aa3d9503-3d3f-4955-83aa-38aac9003a82>
CC-MAIN-2023-14
https://haiafrika.com/about-africa/frequent-question-what-was-the-most-powerful-african-tribe.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943698.79/warc/CC-MAIN-20230321131205-20230321161205-00453.warc.gz
en
0.956828
823
2.59375
3
Microscopes have gone a long since Zacharias Jansen first invented them in the 1590s. Besides optical telescopes, we now have digital microscopes, atomic force microscopes or, my favorite, electron microscopes. Now, it may be the right time to add a new class to the list: holographic microscopes. While these have been investigated for some time, it’s only recently that we’re seeing actually working prototypes that can be used in the field. The most recent one was reported by a team of engineers from the University of California, Los Angeles which was used to examine breast-tissue samples for abnormalities. Because these telescopes don’t use lenses, they could be made for a lot less money, all without compromising quality. A new microscope The digital holographic microscopes that were developed before were great for a proof of concept, but lacked the imaging quality necessary in medicine for diagnosing diseases. The model developed at UCLS, however, has proven to be remarkably reliable. When a trained pathologist was asked to identify anomalies in breast-tissues, she was able to get 74 diagnoses correct out of a possible of 75. When a traditional microscope was used she was right 75 out of 75. The prototype works by first beaming a partially coherent light through the sample that’s to be examined. The light then projects a holographic image of the sample onto an image-sensing sensor, positioned below the sample. Data collected by the chip are sent to a computer where algorithms reconstruct a high-resolution image of the sample, as reported in the journal Science. Because they’re not limited by the physics of lenses, holographic microscopes have the additional advantage of displaying a wider field of view. Also, there’s no need for fiddling with knobs to focus, since all the imaging tweaking is made by a computer. Most importantly, holographic microscopes might become popular because of their low cost. The light sensor, for instance, is similar to those found in smartphones. The cost itself for this particular product is unknown, but other groups reported holographic microscopes could be made for less than $1,000.
<urn:uuid:500a7bc5-848e-493b-9d68-ca3445417624>
CC-MAIN-2021-17
https://www.zmescience.com/research/technology/holographic-microscope-tissue-analysis-04233/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038072180.33/warc/CC-MAIN-20210413092418-20210413122418-00198.warc.gz
en
0.959274
449
3.703125
4
What Is Low Blood Pressure? A blood pressure reading of 90 millimetres of mercury or less during systole and 60mm of mercury or less during diastole is considered as low blood pressure. This condition is known as hypo tension in medical terms. Low blood pressure can cause dizziness, vomiting sensation and fainting. In severe cases, low blood pressure is life threatening. When blood pressure is low, the brain fails to get an adequate supply of blood and cause fainting. Low blood pressure is caused by various conditions such as heart problems, endocrine problems, dehydration, and lack of nutrients in diet, medications, blood loss or pregnancy. Depending on the reason for low blood pressure, you can take certain preventive steps to avoid the symptoms and can use some home remedies to get rid of the symptoms. Home Remedies And Lifestyle Changes 1. Increase Your Salt Intake Include more salt or salty foods in your diet. Salt helps to increase the blood pressure. - Take a glass of water add ½ teaspoon of salt into it - Drink this twice a day, if you are constantly having low blood pressure. If you are feeling dizziness due to low blood pressure take this remedy to get instant effect. - Mix two tablespoons of honey in a glass of water - Add a pinch of salt into it and drink this mix 3. Almond Milk This is a highly beneficial home remedy for low blood pressure. - Take almond milk as the first thing in the morning. - This will help to increase the blood pressure. This is a traditionally used remedy for low blood pressure. You can consume it in different ways to maintain the blood pressure. - You can eat it as a fruit - You can use it in salads - You can have it in the juice form as well Also Read: Home Remedies for High Blood Pressure 5. Dark coffee The caffeine present in dark coffee helps to increase the blood pressure instantly. If you have any other health problem avoid this remedy. - Take 1-2 dark coffee daily or when you feel the warning signs of low blood pressure. This is a highly beneficial remedy for low blood pressure. Continue this remedy for a few weeks to improve the blood pressure level. - Soak about 20- 30 raisins in water in a ceramic bowl. - Next day morning eat the raisins. - Drink the water in which the raisins were soaked. 7. Increase Water Intake Dehydration is the cause of low blood pressure in many people. Hence it is necessary to increase the water intake, if you are feeling that your blood pressure is going down. - Drink 8-10 glass of water - You can also increase water intake in the form of juices - The additional fluids help to maintain the blood pressure within the blood vessels. The raw juice of beet-root is extremely helpful in increasing the blood pressure. - Take a cup of raw beet-root juice twice a day - Continue the remedy for at least one week to get the benefit 9. Holy Basil Leaves This herbal remedy is also very effective in curing low blood pressure. This herb has many medicinal property. - Crush 10-15 leaves of holy basil or Tulsi (Ocimum sanctum) - Strain the juice of the leaves - Mix this juice with one teaspoon of honey - Have it in empty stomach in the morning 10. Avoid Alcohol If you are a person consuming alcohol, this may be the reason for your low blood pressure condition. Alcohol causes dehydration of the body leading to low blood pressure even if taken in moderate quantities. - Totally avoid alcohol consumption and replace it with water intake, if you want to have a normal blood pressure. 11. Change Body Positions Slowly Sudden changes in body position may cause dizziness in people with low blood pressure. - Breathe deeply before getting out of the bed in the morning - Sit up for two minutes before standing - If get low blood pressure symptoms while standing, put your one foot on a chair and lean forward. - This will improve the blood circulation to heart and head. 12. Follow A Healthy Diet It is necessary to make changes in the diet to control the blood pressure. Make sure that your body is getting all the required nutrients. Lack of proper nutrients can cause low blood pressure. - Include whole grains, fruits, lean chicken, fish and vegetables in your diet. - Limit the intake of carbohydrate rich food such as rice, potato, bread, pasta etc. 13. Multiple Small Meals Instead of having three large meals which may cause postprandial fall of blood pressure take multiple small meals. After the meals more blood will be diverted to gastrointestinal tract this will result in reduced blood supply to the heart and the brain causing dizziness. - Split the same quantity of meals into 5-6 small meals. - Relatively lesser blood will be needed by the digestive system 14. Mild Exercise Studies have shown that mild exercises increases blood pressure in people who are having low blood pressure. Avoid strenuous exercises as they can further lower the blood pressure. - Light exercises like yoga, walking, swimming and cycling are highly helpful to regulate the blood pressure. - Exercises should be done daily to maintain the blood pressure. 15. Avoid Stress Stress is an important factor which regulates the blood pressure in people. Avoid all kinds of stress. - Do not work till late night - Avoid negative thinking and unnecessary worry - Have a good night’s sleep - Practice relaxation techniques Are you a person with constant low blood pressure symptoms? Are you looking for the best and easily available home remedies to regulate your blood pressure? You can use any of the above home remedies to get rid of low blood pressure? If you feel that you are having serious conditions, do not hesitate to visit the doctor and get the medical treatment.
<urn:uuid:13a50742-b075-491d-bdc7-186dfa105560>
CC-MAIN-2021-43
https://myhealthtips.in/2013/09/home-remedies-to-cure-low-blood-pressure.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587770.37/warc/CC-MAIN-20211025220214-20211026010214-00686.warc.gz
en
0.901747
1,230
2.71875
3
In the United States, the meaning of village varies by geographic area and legal jurisdiction. In many areas, "village" is a term, sometimes informal, for a type of administrative division at the local government level. Since the Tenth Amendment to the United States Constitution prohibits the federal government from legislating on local government, the states are free to have political subdivisions called "villages" or not to and to define the word in many ways. Typically, a village is a type of municipality, although it can also be a special district or an unincorporated area. It may or may not be recognized for governmental purposes. In informal usage, a U.S. village may be simply a relatively small clustered human settlement without formal legal existence. In colonial New England, a village typically formed around the meetinghouses that were located in the center of each town. Many of these colonial settlements still exist as town centers. With the advent of the Industrial Revolution, industrial villages also sprang up around water-powered mills, mines, and factories. Because most New England villages were contained within the boundaries of legally established towns, many such villages were never separately incorporated as municipalities. A relatively small unincorporated community, similar to a hamlet in New York state, or even a relatively small community within an incorporated city or town, may be termed a village. This informal usage may be found even in states that have villages as an incorporated municipality and is similar to the usage of the term "unincorporated town" in states having town governments. States that formally recognize villages vary widely in the definition of the term. Most commonly, a village is either a special district or a municipality. As a municipality, a village may Under Article 10, Section 2 of the Alaska Constitution, as well as law enacted pursuant to the constitution, Alaska legally recognizes only cities and boroughs as municipal entities in Alaska. In Alaska, "village" is a colloquial term used to refer to small communities, which are mostly located in the rural areas of the state, often unconnected to the contiguous North American road system. Many of these communities are populated predominantly by Alaska Natives and are federally recognized as villages under the Indian Reorganization Act and/or the Alaska Native Claims Settlement Act. As voting membership in the Alaska Municipal League is on an equal footing, regardless of population, most villages are incorporated as second-class cities. In common usage, however, these communities are thought of more often as villages than as cities. Village districts are subordinate agencies of municipal governments rather than municipalities in their own right. Municipalities in Delaware are called cities, towns, or villages. There are no differences among them that would affect their classification for census purposes. Municipalities in Florida are called cities, towns, or villages. They are not differentiated for census purposes. All municipalities in Idaho are called cities, although the terms "town" and "village" are sometimes used in statutes. A village is a type of incorporated municipality in Illinois; the other two types are the city and the incorporated town. All incorporated municipalities, regardless of type, are independent of each other, and cannot overlap. Villages can be created by referendum under the general state law or by special state charter. The governing body is a board of six elected trustees and an elected village president, all of whom are usually elected at-large. A village in Louisiana is a municipality having a population of 1,000 or fewer. In Maine, village corporations or village improvement corporations are special districts established in towns for limited purposes. See also: List of incorporated places in Maryland In Maryland, a locality designated "Village of ..." may be either an incorporated town or a special tax district. An example of the latter is the Village of Friendship Heights. The distinction is legally relevant to the level of police power that a village may exercise. Main article: Administrative divisions of Michigan § Villages In Michigan, villages differ from cities in that, whereas villages remain part of the townships in which they are formed, thereby reducing their home-rule powers, cities are not part of townships. Because of this, village governments are required to share some of the responsibilities to their residents with the township. Villages that existed in Minnesota as of January 1, 1974, became cities, which may operate under general municipal law ("statutory city") or adopt a charter for itself to become a charter city.[failed verification] See also: Category:Villages in Mississippi A village in Mississippi is a municipality of 100 to 299 inhabitants. They may no longer be created. The municipalities of Missouri are cities, towns, and villages. Unlike cities, villages have no minimum population requirement. In Nebraska, a village is a municipality of 100 through 800 inhabitants, whereas a city must have at least 800 inhabitants. In counties having townships, all villages, but only some cities, are within township areas. A city of the second class (800-5,000 inhabitants) may elect to revert to village status. In New Hampshire, a village district or precinct may be organized within a town. Such a village district or precinct is a special district with limited powers. Main article: Village (New Jersey) A village in the context of New Jersey local government, refers to one of five types and one of eleven forms of municipal government. Villages in New Jersey are of equal standing to other municipalities, such as cities, towns, boroughs, and townships The municipalities in New Mexico are cities, towns, and villages. There are no differences among them that would affect their classification for census purposes. Main article: Administrative divisions of New York (state) § Village In New York, a village is an incorporated area that differs from a city in that a village is within the jurisdiction of one or more towns, whereas a city is independent of a town. Villages thus have less autonomy than cities. A village is usually, but not always, within a single town. A village may be coterminous with, and have a consolidated government with, a town. A village is a clearly defined municipality that provides the services closest to the residents, such as garbage collection, street and highway maintenance, street lighting and building codes. Some villages provide their own police and other optional services. Those municipal services not provided by the village are provided by the town or towns containing the village. As of the 2000 census, there are 553 villages in New York. There is no limit to the population of a village in New York; Hempstead, the largest village in the state, has 55,000 residents, making it more populous than some of the state's cities. However, villages in the state may not exceed five square miles (13 km²) in area. Present law requires a minimum of 500 residents to incorporate as a village. The municipalities in North Carolina are cities, towns, and villages. There are no significant differences in legal power or status. In Ohio, a village is an incorporated municipality with fewer than 5,000 inhabitants, excluding residents of educational or correctional facilities. The minimum population for incorporation as a village is 1,600 inhabitants, but this was not always the case, resulting in many very small villages. If an existing village's population surpasses 5,000 at a federal census, or if a village comes to have more than 5,000 resident registered voters, it is automatically designated as a city. Cities or villages may be located within township areas; however, if a city or village becomes coterminous with a township, the township ceases to exist as a separate government (see Paper township). In Oklahoma, unincorporated communities are called villages and are not counted as governments. Main article: Village (Oregon) In Oregon, the municipal governments are cities, towns, and villages, although there is no significance in their legal powers or status. Also, one county — Clackamas County — permits the organization of unincorporated areas into villages and hamlets. The boards of such entities are advisory to the county. In Texas, villages may be Type B or Type C municipalities, but not Type A municipalities. The types differ in terms of population and in terms of the forms of government that they may adopt. Main article: Village (Vermont) In Vermont, villages are named communities located within the boundaries of a legally established town, unlike cities, which are outside of any town area. Villages may be incorporated or unincorporated. In West Virginia, towns and villages are Class IV municipalities, i.e., having 2,000 or fewer inhabitants. Main article: Political subdivisions of Wisconsin In Wisconsin, cities and villages are both outside the area of any town. Cities and villages differ in terms of the population and population density required for incorporation.
<urn:uuid:e5276fad-c9a0-47b2-85bd-93af734c65dc>
CC-MAIN-2022-49
https://db0nus869y26v.cloudfront.net/en/Village_(United_States)
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710972.37/warc/CC-MAIN-20221204104311-20221204134311-00642.warc.gz
en
0.969068
1,901
3.75
4
Concept of Biodiversity Biodiversity is the variety of plant and animal life in the world or in a particular habitat. Measurement of Biodiversity Biodiversity is measured by two major components:Species richness, and Species evenness. • Species richness : It is the measure of number of species found in a community and can be further divided into : - Alpha diversity : It refers to the diversity within a particular area or ecosystem, and is usually expressed by the number of species (i.e., species richness) in that ecosystem. - Beta diversity : It is a comparison of diversity between ecosystems, usually measured as the change in amount of species between the ecosystems. - Gamma diversity : It is a measure of the overall diversity for the different ecosystems within a region. • Species evenness : It measures the proportion of species at a given site, e.g. low evenness indicates that a few species dominate the site. - Genetic diversity is the total number of genetic characteristics in the genetic makeup of a species. - A single species might show high diversity at the genetic level for E.g. Man has different genes such as : Chinese, Indian American, African etc.]. India has more than 50,000 genetically different strains of rice, and 1,000 varieties of mango. - Genetic diversity allows species to adapt to changing environments. This diversity aims to ensure that some species survive drastic changes and thus carry on desirable genes. - It is the ratio of one species population over total number of organisms across all species in the given biome. ‘Zero’ would be infinite diversity, and ‘one’ represents only one species present. - Species diversity is a measure of the diversity within an ecological community that incorporates both species richness (the number of species in a c-ommunity) and the evenness of species. • For example, the Western Ghats have a greater amphibian species diversity than the Eastern Ghats. There are more than 2,00,000 species in India of which several are confined to India (endemic). - Endemism is the ecological state of a species being unique to a defined geographic location, such as an island, nation, country or other defined zone, or habitat type; organisms that are indigenous to a place are not endemic to it if they are also found elsewhere. A particular type of animal or plant may be endemic to a zone, a state or a country. The extreme opposite of endemism is cosmopolitan distribution. - Species differ from one another, markedly in their genetic makeup, do not inter-breed in nature. Closely-related species however have in common much of their hereditary characteristics. For instance, about 98.4 per cent of the genes of humans and chimpanzees are the same. - According to the IUCN (2004), the total number of plant and animal species described so far is slightly more than 1.5 million, but we have no clear idea of how many species are yet to be discovered and described. A large proportion of the species waiting to be discovered are in the tropics. Estimate place the global species diversity at about 7 million. - More than 70 per cent of all the species recorded are animals, while plants (including algae, fungi, bryophytes, gymnosperms and angiosperms) comprise no more than 22 per cent of the total. - Among animals, insects are the most species-rich taxonomic group, making up more than 70 per cent of the total. That means, out of every 10 animals on this planet, 7 are insects. - The number of fungi species in the world is more than the combined total of the species of fishes, amphibians, reptiles and mammals. - It should be noted that these estimates do not give any figures for prokaryotes. Biologists are not sure about how many prokaryotic species there might be. - In general, species diversity decreases as we move away from the equator towards the poles. With very few exceptions, tropics (latitudinal range of 23.5° N to 23.5° S) harbour more species than temperate or polar areas. - India, with much of its land area in the tropical latitudes, has more than 1,200 species of birds. - The largely tropical Amazonian rain forest in South America has the greatest biodiversity on earth- it is home to more than 40,000 species of plants, 3,000 of fishes, 1,300 of birds, 427 of mammals, 427 of amphibians, 378 of reptiles and of more than 1,25,000 invertebrates. Why tropics have greater biological diversity? - Speciation is generally a function of time, unlike temperate regions subjected to frequent glaciations in the past, tropical latitudes have remained relatively undisturbed for millions of years and thus, had a long evolutionary time for species diversification. - Tropical environments, unlike temperate ones, are less seasonal, relatively more constant and predictable. Such constant environments promote niche specialization and lead to a greater species diversity. - There is more solar energy available in the tropics, which contributes to higher productivity; this in turn might contribute indirectly to greater diversity. The importance of Species Diversity to the Ecosystem - For many decades, ecologists believed that communities with more species, generally, tend to be more stable than those with less species. - What exactly is stability for a biological community? A stable community should not show too much variation in productivity from year to year; it must be either resistant or resilient to occasional disturbances (natural or man-made), and it must also be resistant to invasions by alien species. - Although, we may not understand completely how species richness contributes to the well-being of an ecosystem, we know enough to realize that rich biodiversity is not only essential for ecosystem health but imperative for the very survival of the human race on this planet. Nations endowed with rich biodiversity explore molecular, genetic and species-level diversity to derive products of economic importance. Keystone species and Foundation Species - Keystone species is a species whose addition to or loss from an ecosystem leads to major changes in occurrence of at least one other species. - A classic keystone species is a predator that prevents a particular herbivorous species from eliminating dominant plant species. All top predators such as (Tiger, Lion, Crocodile, Jaguar ) are considered as keystone species because it regulates all other animal population indirectly. Hence top predators are given much consideration in conservation. - Certain species in an ecosystem is considered more important in determining the presence of many other species in that ecosystem. - If keystone species is lost, it will result in the degradation of whole ecosystem. For example certain plant species (ebony tree, Indian-laurel) exclusively depends upon bats for its pollination. If the bat population is reduced then regeneration of particular plants becomes more difficult. - Foundation species is a dominant primary producer in an ecosystem both in terms of abundance and influence. Example: kelp in kelp forests and corals in coral reefs. - A flagship species is a species chosen to represent an environmental cause, such as an ecosystem in need of conservation. - These species are chosen for their vulnerability, attractiveness or distinctiveness in order to engender support and acknowledgement from the public at large. • Example: Indian tiger, African elephant, giant panda of China, mountain gorilla of Central Africa, orangutan of Southeast Asia and the leatherback sea turtle. • Ecological diversity refers to the different types of habitats. A habitat is the cumulative factor of the climate, vegetation and geography of a region. • It includes various biological zones, like lake, desert, coast, estuaries, wetlands, mangroves, coral reefs etc. • At the ecosystem level, India, for instance, with its deserts, rain forests, mangroves, coral reefs, wetlands, estuaries, and alpine meadows has a greater ecosystem diversity than a Scandinavian country like Norway. Biodiversity of India • India is a recognized as one of the mega-diverse countries, rich in biodiversity and associated traditional knowledge. • India has 23.39% of its geographical area under forest and tree cover. • With just 2.4% of the land area, India accounts for nearly 7% of the recorded species even while supporting almost 18% of human population. • In terms of species richness, India ranks seventh in mammals, ninth in birds and fifth in reptiles. • In terms of endemism of vertebrate groups, India’s position is tenth in birds with 69 species, fifth in reptiles with 156 species and seventh in amphibians with 110 species. • India’s share of crops is 44% as compared to the world average of 11%. • Two ‘Realms’ • Five Biomes • Ten Bio-geographic Zones • Twenty five Bio-geographic provinces - Biogeographic realms are large spatial regions within which ecosystems share a broadly similar biota. - Realm is a continent or sub-continent sized area with unifying features of geography and fauna & flora. - The Indian region is composed of two realms. They are: • The Himalayan region represented by Palearctic Realm and • The rest of the sub-continent represented by Malayan Realm - In world Eight terrestrial biogeographic realms are typically recognized. They are • Nearctic Realm • Palaearctic Realm • Africotropical Realm • Indomalayan Realm • Ocenaia Realm • Australian Realm • Antarctic Realm • Neotropical Realm Biomes of India - The term biome means the main groups of plants and animals living in areas of certain climate patterns. - It includes the way in which animals, vegetation and soil interact together. The plants and animals of that area have adapted to that environment. The five biomes of India are: • Tropical Humid Forests • Tropical Dry or Deciduous Forests (including Monsoon Forests) • Warm deserts and semi-deserts • Coniferous forests and • Alpine meadows. - Biogeography deals with the geographical distribution of plants and animals. - Biogeographic zones were used as a basis for planning wildlife protected areas in India. - There are 10 biogeographic zones which are distinguished clearly in India. • Bio-geographic Province is a eco systematic or biotic subdivision of realms. India is divided into 10 bio geographic zones and 25 biogeographic provinces. List of Bio-geographic zones :
<urn:uuid:191cb334-1961-4045-bc8e-047cb0f92349>
CC-MAIN-2019-18
https://www.exambin.com/concept-of-biodiversity-types-of-biodiversity/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529472.24/warc/CC-MAIN-20190420080927-20190420102128-00034.warc.gz
en
0.907228
2,211
3.953125
4
A snowpack layer with less strength than adjacent layers. Often the layer in the snowpack where an avalanche fractures. All snow exists as layers. Some layers are relatively more cohesive (stronger layers) and others are relatively less cohesive (weaker layers). Like cliffs in the Grand Canyon, if you brush a snowpit wall with your mitten, the weaker layers erode away while the stronger layers stick out. When the snowpack is stressed by rapid changes (e.g. wind-drifted snow, new snow, or rain) this stress can cause the weak layer to fracture. Understandably, most avalanche geeks are obsessed by weak layers. Weak layers involved in most avalanche accidents usually are a “persistent” grain type such as faceted snow, surface hoar or depth hoar, but it can also be a layer formed within new snow such as low density new snow or graupel. After an avalanche occurs, you often hear avalanche professionals ask, “what was the weak layer” or “what did it run on?” The life of an avalanche aficionado revolves around knowing what is the weakest layer in the snowpack and how much stress it takes to make it fail.
<urn:uuid:fb2dd375-42d1-474a-ab22-90ffb4ba75a4>
CC-MAIN-2020-05
https://avalanche.org/avalanche-encyclopedia/weak-layer/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598800.30/warc/CC-MAIN-20200120135447-20200120164447-00260.warc.gz
en
0.911665
250
3.578125
4
posted by Monty . What volume of a .500 M HCl solution is needed to neutralize each of the following: 10 ml of a .300 M NaOH solution 10 mL of a .200 M Ba(OH)2 solution Please remember to include the leading zero when writing values. Start with the equation for the neutralisation HCl + NaOH -> NaCl + H2O so one mole of HCl neutralises 1 mole of NaOH 10 x 0.300 mmoles of NaOH so we need the same number of mmoles of HCl so if V is the volume of HCl 10 x 0.300 = V x 0.500 solve for V for the volume of HCl repeat for Ba(OH)2
<urn:uuid:40d76e6e-c2c8-4ece-9098-9f7d9fe70597>
CC-MAIN-2017-34
https://www.jiskha.com/display.cgi?id=1299572037
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117519.82/warc/CC-MAIN-20170823020201-20170823040201-00556.warc.gz
en
0.744446
163
2.515625
3
Phylogeny inference, or tree building, is used to deduce the history of entities related by common descent, whether they're genes, populations, or species. Ultimately, it can reveal the evolutionary relationships between these entities, even if we don't have access to the intermediate steps. But it's a method that has to be used cautiously. "Erroneous conclusions can show strong statistical support," warns a new paper, published in Nature. Andrew Rambaut's lab, which wrote the paper, issued that warning because phylogenetic studies can have serious practical implications: "This is a serious problem given that such results are widely used to infer when, where, and how pandemic and panzootic viruses have emerged." The "pandemic and panzootic" virus in question is the influenza A strain that swept the globe in 1918, killing millions. The new analysis by Rambaut's lab suggests that previous work on the 1918 flu was fundamentally flawed. The problem is that viral genes mutate at different rates depending on which host species the virus is infecting. Researchers know that different species, and even different genes within a species, mutate at different rates; hence, during phylogenic analysis they usually use a "relaxed clock model" that allows for the mutation rate to vary over time and between organisms. Rambaut himself used this relaxed clock in a 2006 paper he titled (probably without irony) "Relaxed Phylogenetics and Dating with Confidence." But this new paper says that an older one of his "very seriously underestimates the time to the most recent common ancestor," probably because the older one only looked at human flu viruses. The flu viruses they have now examined anew include equine, porcine, avian, and human strains. This most recent phylogenomic analysis, using a new host-specific local clock, indicates that their most recent common ancestor dates very recently—to the latter half of the nineteenth century. That's when avian influenza viruses underwent a global selective sweep, a process in which DNA sequences tag along with a beneficial mutation that's under positive selection. Even though these nearby sequences confer no benefit themselves, they become more prominent in a population, along with the gene that is actually useful. The net result of a selective sweep is reduced genetic diversity as the beneficial mutation spreads through the population, dragging nearby genetic sequences along with it. The authors speculate that one of the most dramatic recorded outbreaks of flu in animals, the equine influenza of 1872 and 1873, may have somehow precipitated the sweep. During this period, the same genes spread into related viruses in other species—the virus was panzootic—including all of those that tend to make the jump to humans. The new analysis suggests that this set the stage for the 1918 flu, which they conclude arose in North America and originated in birds. The prevailing hypothesis—that it came from a reassortment of human and swine viruses—"arises erroneously from a failure to accommodate differences in [mutation] rates between hosts." The HA and NA genes, which encode proteins on the virus' surface, are more diverse than the genes for the proteins that are encapsulated inside the virus. This had always been attributed to a higher rate of evolution, as the virus hangs on to mutations that let it escape immune attack. But Rambaut now thinks that it may be a vestige of the ancestral diversity that existed in all avian strains before the global selective sweep of the late 1800s. Human flu viruses undergo selective sweeps that serve to replace their genomic diversity every few years. In 1918, it took only months for the new deadly variant to replace existing strains. The authors are still not sure what drove the global selective sweep that they are suggesting occurred in avian viruses in the 1870s, but they note that figuring it out might be important in understanding the risks that bird flu might pose for us in the future.
<urn:uuid:d355ef8f-7db7-4ef0-b1fb-1ee93f9ce416>
CC-MAIN-2014-35
http://arstechnica.com/science/2014/03/flu-viruses-derive-from-a-global-selective-sweep-in-the-1870s/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922087.15/warc/CC-MAIN-20140909042135-00038-ip-10-180-136-8.ec2.internal.warc.gz
en
0.962676
807
3.875
4
Environmental Issues: Energy All Documents in Energy Tagged data centers - America's Data Centers Consuming and Wasting Growing Amounts of Energy Critical Action Needed to Save Money and Cut Pollution - The explosion of digital content, big data, e-commerce, and Internet traffic is making data centers one of the fastest growing users of electricity in developed countries, and one of the key drivers in the construction of new power plants in some regions of the United States. - Saving Energy in Server Rooms and Closets - Energy waste in U.S. server rooms and closets represents the equivalent output of seven medium-size coal-fired power plants, costing U.S. businesses over $2 billion per year in unnecessary electricity. For additional policy documents, see the NRDC Document Bank. For older publications available only in print, click here. Get Updates and Alerts NRDC Gets Top Ratings from the Charity Watchdogs - Charity Navigator awards NRDC its 4-star top rating. - Worth magazine named NRDC one of America's 100 best charities. - NRDC meets the highest standards of the Wise Giving Alliance of the Better Business Bureau. - Efficient Appliances Save Energy -- and Money - A consumer's guide to buying energy efficient appliances and electronics.
<urn:uuid:c87403d5-b467-45cb-8725-e13414b19f35>
CC-MAIN-2015-40
http://www.nrdc.org/documents.asp?topicid=12&tag=4846
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738099622.98/warc/CC-MAIN-20151001222139-00048-ip-10-137-6-227.ec2.internal.warc.gz
en
0.845718
268
2.515625
3
The IBM RT PC ROMP processor and memory management unit architecture by R. O. Simpson, P. D. Hester The ROMP processor is the microprocessor used in the IBM RT PC. It is a 32-bit processor with an associated memory management unit implemented on two chips. ROMP is derived from the pioneering RISC project, the 801 Minicomputer at IBM Research. This paper describes some of the trade-offs which were made to turn the research project into a product. It gives an introduction to the architecture of ROMP, including the addressing model supported by ROMP's memory management unit. Some of the unique features of the programming model are explained, with high-level language coding examples which show how they can be exploited. ROMP's architecture is extensible, and the fact that almost all programming for the RT PC has been in high-level languages means that the RT PC hardware architecture can be extended as needed to meet future requirements while preserving the investment in existing software.
<urn:uuid:a85786cd-b9ac-4a0f-9656-88363b43d0e9>
CC-MAIN-2018-22
http://domino.research.ibm.com/tchjr/journalindex.nsf/0/f6570ad450831a2485256bfa00685bda?OpenDocument
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794869732.36/warc/CC-MAIN-20180527170428-20180527190428-00074.warc.gz
en
0.947012
204
2.6875
3
Take a look at this example and ask yourself how a professor would probably respond to it if it were the thesis statement of a paper: Have I created my own terms, or have I simply borrowed what looked like key ones from the assignment? What others do I need? The word thesis in a sentence outstanding writing! For example: How to Write a Thesis Statement (with examples) - Word Counter Blog Compare this to the original weak thesis. Example Of A Thesis Sentence - buywritefastessaycom Good Thesis Sentence good thesis sentence In expository writing, a topic sentence is a sentence that summarizes the main idea of a paragraph. - Word Choice - The Writing Center - Thesis statement about stress management homework translate to german If a sentence seems confusing, rewrite newcastle university phd thesis guidelines to make the meaning clear. For example: This form of persuasion, often called academic argument, follows a predictable pattern in writing. - Critical thinking process nursing guidelines for creating a business plan - Use thesis in a sentence | thesis sentence examples - Swaps problem solving sample cover letter for project coordinator job - Thesis: In a Sentence – WORDS IN A SENTENCE - Use The Word Thesis In A Sentence Look for repetition. When writing for your professors, think simplicity. A thesis is an interpretation of a question or subject, not the subject itself. In an academic argument paper, what makes the thesis and argument sophisticated are the connections presented in simple, clear language. Your Thesis Statement Will Undergo Several Drafts As you analyze the information you have at your disposal, you may decide to change or expand on your thesis statement. On the occasion of his inauguration he maintained for thesis De Sacerdotio Christi. Don't settle for three pages of just skimming the surface. Your thesis statement should fulfill the following requirements: Am I positive, or should I look it up? - Writing Tips « Writers Workshop: Writer Resources « The Center for Writing Studies, Illinois - The Word "Thesis" in Example Sentences - Page 1 - Thesis | Definition of Thesis by Merriam-Webster - Thesis Statements - The Writing Center - On the other hand, she still does not know how this return to nature is crucial to your understanding of the novel. Your thesis should be limited to what can be accomplished in the specified number of pages. There are advantages and disadvantages to using statistics. Navigation: Main Content Sections Graders, in particular, like to see clearly stated thesis statements. In this way you will tell your reader why your take on the issue matters. Do they cover the entire range of my argument? If the government takes over industry in Kenya, the industry will become more efficient. New York: As you write the essay, you will probably begin to characterize these differences more precisely, and your working thesis may start to seem too vague. The finality of the form of religion mediated in God's Son, i. How to write an ma thesis introduction an original, insightful, and memorable thesis makes a distinct impression on a reader. use thesis in a sentence, make example sentences of the word his doctoral thesis on, Your thesis statement should tell your reader what the paper is about and also help guide your writing and keep your argument focused. Please do not use this list as a model for the format of your own reference list, as it may not match the citation style you are using. Our favorite shows and binges," 24 Dec. The Longman Handbook for Writers and Readers. Keep revising until the thesis reflects your real ideas.
<urn:uuid:330d479a-ad7a-4982-a599-5dc31311e1f3>
CC-MAIN-2019-22
http://vivianerose.biz/104-how-to-use-the-word-thesis-in-a-sentence.php
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257699.34/warc/CC-MAIN-20190524164533-20190524190533-00270.warc.gz
en
0.914991
750
2.96875
3
How to avoid stress and eventually happy and healthy We need to admit to the fact that we are living in a stressful environment. Two major contributors of stress in our life are – Work and Personal life. Targets at work, pressure of boss, office politics, harassment at work are prime reasons for employees to fall prey to this problem. Similarly when it comes to personal life we get stressed because of bitter relationships, money, family pressure and many other. In a situation when we feel stressed out we tend to take a different path to avoid stress. These paths may be getting involved in drugs, smoking, drinking alcohol, our food consumption goes from healthy to junk. Now, because of all these situations we start heading towards depression which at times turns fatal. We keep ourselves away from all the worldly pleasures and feelings of happiness turns just the opposite. Things that once used to excite us now irritates us. When we get into such habits our dental health and overall health starts to deteriorate. Eventually we end up with gum diseases, periodontal diseases, heart diseases so on and so forth. So it is important for us to stay happy so that we can stay away from dental diseases and stay healthy forever. However the question is – HOW? It is difficult but not impossible to stay happy and keep smiling when you are stressed out. The reason being that at time your dominant thoughts will not let your subconscious mind to even think of any happy moments that you have spend all through your life. You will keep on thinking about the situation which is giving you stress. So it becomes difficult to avoid stress but still there are ways where in you can avoid stress and stay happy. This is the topic of discussion for today. Before we learn about the methods to avoid stress I urge you to see this 14 minutes video from TED Talk which focuses on the fact that how can you be friends with STRESS and eventually avoid it- Avoid Stress by these methods - Get up early in the morning: No one wants to leave the bed early but the fact is that the morning breeze has a tendency to make you happy. Get up early and take eat healthy breakfast and you will end up feeling happy and this will be your first step to avoid stress. - Stay around positive people: During stressful situations whom you interact with matters a great deal. So stay with people who make you realize the goodness in you and your abilities. - Be positive: As mentioned before your dominant thoughts won’t let you think about happy moments. This will make you a negative person and eventually you will be stressed even more. Don’t let any negative thoughts grow inside your mind. Focus and shift your energy to thoughts that have given you happiness in the past. - Go out and shop: This works all the time. It has been proven in some researches that when you shop it helps to boost your mood when you’re feeling low. As per this research it has been found out that 82% of shoppers had only positive feelings while shopping, Moreover the effect was long lasting for them. So just go out and shop for yourself or your family and friends. - Meditate and just think good: Meditation is the best and a sure fire to avoid stress. For 15-20 minutes just close your eyes and forget about things that bother you. Try this exercise preferably before going to bed and see the difference. You will sleep better and wake up happy and fresh. - Make others smile by donating something: Another surefire way to avoid stress. It’s an old adage “What you give comes back to you manifold”. This is called as Law of Attraction. If you are making someone happy eventually happiness will land up on your laps. So make someone happy and feel the difference. These methods are proven and has always worked wonders for those who are stressed out. I know that someone out there right now reading this is stressed out because of your current situation. Do not worry as you are not alone. Just live in the moment by letting good thoughts to prevail in your mind. Stay happy and Stay Healthy.
<urn:uuid:8e7f772e-fb6b-440d-b23e-6a60163cf854>
CC-MAIN-2021-10
http://www.drsunildental.com/dental-blog/avoid-stress/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178350717.8/warc/CC-MAIN-20210225041034-20210225071034-00480.warc.gz
en
0.963082
834
2.609375
3
- Joining of separate parts of subpreforms (e.g. stringers and skin) into a single preform using blindstitching - Single-sided transversal stitching of complex multilayer preforms along curvilinear path to form folding lines - Stitching complex preforms to compact layers and achieve given thickness - Joining separate parts of subpreforms (e.g. stringers and skin) into a single preform Making a stitch using one thread and bent needle at a one-sided access, the needle doesn’t penetrate base material.
<urn:uuid:ac879e5a-8456-4cdc-9225-99598a13debb>
CC-MAIN-2019-39
https://cct-kai.com/en/labs/lab-composite-structures/automated-complex-preform-manufact/blind-stitch-head
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573323.60/warc/CC-MAIN-20190918172932-20190918194932-00032.warc.gz
en
0.783618
121
2.515625
3
Persons with Disabilities Sidewalk width. The Americans with Disabilities Act mandates a minimum width of three feet of unobstructed sidewalk passageway. Guidelines proposed in 2011 call for a four-foot minimum for new sidewalks, and Cambridge has adopted this minimum. Sidewalks less than five feet wide are required to include a five-by-five-foot passing space every two hundred feet. Most people have at least a temporary disability at some time in their lives, so making sidewalks usable by people with disabilities improves them for everyone. Options for widening sidewalks and narrowing streets are considered whenever roads are reconstructed. Bicycle facility improvements are also considered. On streets with little foot or automobile traffic, decisions about changing the width of sidewalks are made on a street-by-street basis, taking into account cost, drainage, utility locations, heights of thresholds along the sidewalk, vegetation, and other factors. In general, sidewalks on quiet residential streets can be narrower than sidewalks on busy commercial streets. Mailboxes, signs, posts, benches, bus shelters, trash cans, signal control boxes, and other sidewalk furniture should be placed in the curb zone so they do not interfere with pedestrian traffic or with the ability of pedestrians, including children and people in wheelchairs, to see cars and be seen by motorists at intersections. It is also important that snow removal be kept in mind when deciding how much space to allot to cars and how much to give sidewalks. In commercial areas, wide sidewalks are usually important for pedestrians to feel comfortable. People tend to avoid the edges close to the street or to abutting buildings. In general the travel zone should be at least 8 feet wide, wide enough for two pairs of pedestrians to pass each other comfortably. City sidewalks are important social spaces as well as travel routes, and space for people to stop and talk or to sit or stand and watch must also be factored into calculations of optimal sidewalk widths, especially in commercial areas. Nonetheless, it is not the case that sidewalks should always be as wide as possible. ADA and AAB regulations require pedestrian ramps at all street crossings. Pedestrian access routes, including temporary routes where there is construction, should all be accessible. Curb ramps must be made of concrete and must have detectable warning surfaces (also known as truncated domes) for people who are visually impaired. While all major sidewalk reconstruction includes installing ramps, the City also has a program to reconstruct shorter segments in poor condition in high priority areas, which include areas that the disabilities commission identifies as priorities. Visit the Cambridge Commission for Persons with Disabilities web site to learn about transportation options for the disabled. The MBTA has wheelchair-accessible buses with boarding ramps and buses can "kneel" for people with mobility challenges. Most rapid transit stations have elevators or are otherwise made wheelchair-accessible using boarding ramps. To plan a wheelchair-accessible trip on the T, use the website’s trip planner. The MBTA also operates The RIDE, a door-to-door paratransit service with lift-equipped vehicles. Information is available on the T’s web site. The EZRide by the Charles River TMA also have low-floor buses equipped with wheelchair ramps and kneelers. Information is available on the EZRide web site. SCM Community Transportation, a local non-profit, operates Door2Door Transportation, a van service for seniors and persons with disabilities. To find out more or schedule a ride, call 617/625-1191. Need a Taxi Cab? For an accessible taxicab, call 888-TRANS-21 (888/872-6721). The Commission for Persons with Disabilities also sponsors a coupon program for Cambridge seniors and residents with disabilities. For More Information For more information, contact the Commission for Persons with Disabilities at either email@example.com or 617/349-4692.
<urn:uuid:8e014078-6fc3-461f-8053-63a3c7c2e23b>
CC-MAIN-2020-40
https://www.cambridgema.gov/CDD/Transportation/gettingaroundcambridge/personswithdisabilities
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400219691.59/warc/CC-MAIN-20200924163714-20200924193714-00195.warc.gz
en
0.919971
820
3.171875
3
I recently spotted what appeared to be remarkably modern looking haircuts in Albrecht Druer’s woodcut of 1521 AD[i]. This image shows a group of Irish soldiers[ii], most likely mercenaries, who were fighting on the European continent during the early 1520s. I soon discovered that, far from being unusual, this distinctive hairstyle was actually very popular amongst the native Irish during the 16th century. Referred to as a ‘glib’ this style involved the hair at the back and side of the head being trimmed short, while at the front and top it was allowed to grow long, resulting in a large fringe, which fell down over the face. In 1517 Laurent Vital described this distinctive Irish hair style thus: ‘for they (Irish men) were shorn and shaved one palm above the ears, so that only the tops of their heads were covered with hair. But on the forehead they leave about a palm of hair to grow down to their eyebrows like a tuft of hair which one leaves hanging on horses between the two eyes’[iii]. Seen as a particularly Irish haircut it was despised by the English establishment and attempts were made to outlaw it in 1537[iv] and again in the 1570s[v]. However, it remained persistently popular and appears to have been worn as badge of honour amongst Irish kerns (soldiers). In c. 1596 the famous English poet, Edmund Spenser, deplored this ‘thick curled bush of hair, hanging down over their (the Irish) eyes’ and compared it to a thief’s mask[vi]. He also rather fancifully stated that the Irish believed that this heavy fringe of hair could deflect the strike of a sword, ‘going to battle without armour on their bodies or heads, but trusting to the thickness of their Glybbes, the which (they say) will sometimes bear off a good stroke’[vii]. This last assertion, however, has probably more to do with Spenser’s own anti-Irish prejudices, rather than any genuine belief held by the Gaelic Irish. [ii] These particular men are actually described as ‘Irish peasants’ in Druer’s image [iii] Archduke Ferdinand’s visit to Kinsale in Ireland, an extract from Le Premier Voyage de Charles-Quint en Espagne, de 1517 à 1518. Corpus of Electronic Texts, accessed 8/8/2013 [iv] Statute of the Irish Parliament (1537), 28 Henry VIII, chapter xv. Accessed 8/8/2013 [v] Berry, R. G. 1907 ‘The Whites of Dufferin, and their connections’ in The Ulster Journal of Archaeology, pp. 89-95 [vi] Edmund Spenser ‘A View of the present State of Ireland’. Corpus of Electronic Texts, accessed 8/8/2013
<urn:uuid:ce6ef28c-18ca-4591-8fe9-40519d791e89>
CC-MAIN-2017-04
http://irisharchaeology.ie/2013/08/16th-century-irish-hipsters/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00305-ip-10-171-10-70.ec2.internal.warc.gz
en
0.968933
619
3.140625
3
HABIT # 5 ?h SEEK FISRT TO UNDERSTAND, THEN TO BE UNDERSTOOD The basic concept of this chapter ?h TAKE TIME TO DIAGNOSE ?h READING AND WRITING, NOT LISTENING Very few people have had training in listening and therefor use a listening technique. To interact effectively one must really understand the problem. Once the person feels you understand them then they start to open up. ?h LISTEN TO UNDERSTAND NOT TO REPLY Most people listen to reply rather than understand meaning that they are either talking or getting ready to talk. When one person listens to another they are often relating the story to their own lives, past experiences or frames of reference. ?h 4 MAIN LEVELS PEOPLE LISTEN AT Never really reach the 5th level of empathic listening, empathic meaning to really understand the other person both emotionally as well as intellectually. Getting into their frame of reference. ?h HOW WE COMMUNICATE ?h 10 % words ?h 30 % sounds This is why empathic listening is so important and powerful; you listen with your ears and eyes. If you listen empathetically one listens for feeling and meaning. ?h PSYCOLOGICAL AIR This is a very important concept and can be achieved if people are able to listen empathetically. Example of air being sucked out of the room, survival would be the only motivation and the book would not be very important. The most important part of this concept is that satisfied needs do not motivate people only the unsatisfied ones. It is very important for people to be psychologically understood, or to be affirmed or validated so if you can give them this feeling through listening empathetically then it is possible to concentrate on the real problem. ?h 4 AUTOBIOGRAPHICAL RESPONCES These responses come very naturally to us and we live amongst it all the time. It does also effect our ability to really understand. Probing and evaluating is very controlling and invasive and does not give a person psychological air. ?h SEEK TO BE UNDERSTOOD Once one has succeeded in understanding then one has to try and be understood. A person should be able to present his or her own ideas clearly, specifically, visually and very importantly contextually. Meaning in context of ones paradigms and concerns. It is important for people to believe that what you are presenting is what you really believe in and understand. HABIT # 6 ?h SYNERGY. WHAT IS IT? Synergy relates to the concept that the whole is greater than the sums of the parts. The essence of synergy is to value the differences, to build on the strengths and to compensate for the weaknesses. ?h SYNERGISTIC COMMUNICATION Communicating synergistically means that you are opening up your mind and expressions to new possibilities, alternatives and options. It starts with the belief that all parties involved will gain and learn from the communication process. Many people don??t experience much synergy at all, they are trained into forms of defensive and protective communication, and it comes through a not being able to trust people. ?h LEVELS OF COMMUNICATION ?h Defensive (Win/Lose or Lose/Win) ?h Respectful (Compromise) ?h Synergistic (Win/Win) The lowest level comes out of low trust situations and is characterized defensiveness and protectiveness. This occurs when people want to cover all the bases and allow for escape clauses if this don??t go as planned. This creates either a Win/Lose or Lose/Win situation and by doing this again amplifies the feelings of a necessity to defend and protect. The second level is respectful communication and is carried out by mature people. Through mutual respect they try to avoid any confrontations so they communication politely but not empathetically. They might understand each other intellectually but do not look at the factors underlying the other parties positions and are therefor not open to new ideas. This means that the communication is not creative or synergistic and produces a low form of Win/Win. The third and most productive level is the synergistic Win/Win level. Due to the fact that this type of communication needs high trust, the solutions that it produces are better than any originally proposed
<urn:uuid:98ea3574-0546-45c6-a806-e6851a1298b0>
CC-MAIN-2020-40
https://essay.ua-referat.com/Habits
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400201699.38/warc/CC-MAIN-20200921112601-20200921142601-00104.warc.gz
en
0.943989
900
2.734375
3
“The true hero, the true subject, the center of the Iliad is force.” The first sentence of The Iliad thus proclaims Weil’s principal thesis with a directness typical of her writing. Nearly everything that follows is evidence adduced to support the thesis. The piece is very lean in that sense. The first paragraph also contains a second thesis, one less expressly propounded but whose truth emerges as a subtext or corollary of the main argument: Some readers have thought Homer’s poem a historical document of a more primitive and more brutal stage of civilization, but for those “who perceive force, today as yesterday, at the very center of human history, the Iliad is the purest and the loveliest of mirrors.” It is a mirror reflecting the social and political realities of modern times. Force is that which turns people literally into things, that is, corpses: “Somebody was here, and the next minute there is nobody here at all.” The world conjured up in Homer’s epic is one of graphically depicted carnage, of hundreds of individual deaths portrayed in unflinching and gruesome detail. While valiant Hector’s mutilated body lies on the battlefield, his wife Andromache orders a hot bath for the husband who will never return: “Far from hot baths he was indeed, poor man,” Weil observes, adding “nearly all human life, then and now, takes place far from hot baths.” There is, however, a more subtly operating force “that does not kill, [that is], that does not kill just yet.” Under this heading, Weil discusses the peculiar mode of existence of the defeated man who supplicates his conqueror. Paralyzed by the imminence of force and the death it will bring, he imitates in advance the nothingness that is his fate. Witnesses view the suppliant as they would a dead man, at first with a shudder, then with indifference. He has effectively ceased to exist even before the fatal sword stroke. Besides suppliants, there are other, more unfortunate inhabitants of the empire of force: the enslaved, who suffer a protracted death-in-life. Weil poignantly characterizes the plight of the slaves, generally women and children, taken in war. Examples in the Iliad are Chryseis, Briseis, and, as foreseen by Hector, Andromache. Each, forcibly deprived of expression and feeling, is consigned to a “life that death congeals before abolishing.” Weil now proceeds to make her most sweeping claim about the worldview of the Iliad: Homer’s “Poem of Force” demonstrates the pathetic debasement of all humans. The common soldier, such as Thersites, is in theory a free agent but must endure the indignities of having to accept orders and of abuse should he balk. At the high end of the social scale, magnificent and invincible Achilles suffers humiliation at the hands of his superior, Agamemnon, who in his turn must shortly humble himself. The relevance of this circumstance to later ages is... (The entire section is 1215 words.)
<urn:uuid:385a6fdc-daf5-4da5-8ee1-235f1fc99032>
CC-MAIN-2014-35
http://www.enotes.com/topics/iliad-simone-weil
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500814701.13/warc/CC-MAIN-20140820021334-00326-ip-10-180-136-8.ec2.internal.warc.gz
en
0.961701
682
3.140625
3
The worldwide scramble to develop new and existing energy sources has become a driving force in contemporary foreign policy. The Clinton Administration, building on America's dual role as the world's largest energy producer and largest energy consumer, has made itself a main player in this new world energy game, promoting increased production at home and abroad. Its sensible goal is to lessen the country's vulnerability to pressures from energy exporters and protect Washington's freedom to make foreign policy based on larger American and global interests. Global energy supplies are not tight now, but demand is rising quickly, especially in areas of robust economic growth, like the United States, China and Southeast Asia. Last year, the world consumed just over 70 million barrels of oil every day. That is projected to rise to nearly 105 million barrels by 2015. Proven worldwide reserves are now about one trillion barrels, a figure that tends to rise over time with new exploration, cheaper extraction methods and changes in price. America's daily oil consumption was just over 18 million barrels last year, up nearly 10 percent from 1991. Without significant new gains in conservation and efficiency, the United States can be expected to consume more than 22 million barrels by 2015. Imports have been rising even more sharply, and now account for just over half the oil the country uses. The Administration is right to emphasize developing new low-cost foreign sources. The United States learned the perils of overdependence on Persian Gulf supplies during the 1970's Arab oil embargo. But there is no strategic justification for the favors, like reduced royalty payments, that the Administration and Congress have been lavishing on domestic producers. The United States can retain its energy independence while relying on foreign sources of supply, leaving much of its own untapped wealth in the ground as a strategic reserve. The Administration has also failed to focus on more efficient use of existing energy supplies and on stronger conservation efforts, whether through taxes, regulation or market-based incentives. Diversification is not the only motive behind the race for new supplies. There is worry that prices will rise if global consumption grows as rapidly as predicted. Meanwhile, the investment climate has been transformed by political changes in oil regions, like the collapse of Communism in Russia and the Caspian Basin and Latin America's more welcoming attitude toward foreign investment. The Administration's policies have produced good results in Venezuela, from which the United States now imports more oil than it does from Saudi Arabia. Since 1995, American companies have helped Venezuela sharply increase its production capacity. Washington has promoted business partnerships with Russia's oil and gas industry, in the hope that American technology will help Russia pump more energy at lower cost from aging wells. Washington has also been wooing the newly independent governments of the Caspian Basin, like Azerbaijan, Georgia, Kazakhstan and Turkmenistan, all of which sit astride rich energy deposits or vital pipeline routes. Rightly, it has pressed the case of American companies seeking a share of Caspian energy rights, encouraged the removal of regulatory obstacles and sought consistent standards for cross-border pipeline routes. But except for Georgia, Caspian area governments have shown scant tolerance for democracy and human rights and have tried to use their leverage with Washington to deflect American pressures on these issues. The Administration should be cautious about the tradeoffs it makes to smooth access to oil. One aim of energy independence is to gain more freedom to pursue larger national goals. Washington should not subordinate these goals to a mindless rush for new energy suppliers.
<urn:uuid:b7c0bc6b-216c-4fd2-8ec3-ad241f4a2aae>
CC-MAIN-2014-15
http://www.nytimes.com/1997/11/17/opinion/america-s-energy-independence.html?src=pm
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609532374.24/warc/CC-MAIN-20140416005212-00101-ip-10-147-4-33.ec2.internal.warc.gz
en
0.952021
700
3
3
Boire et évacuer : le rôle préventif de l'eau sur l'infection urinaire By Dr. Mariacristina Vecchio Recorded on 23/06/2017 About the speaker Mariacristina Vecchio earned her Doctorate Degree in Pharmacy with a specialization in clinical pharmacology at the University of Calabria, Italy. She worked at the Mario Negri Institute as a renal epidemiology research officer where she focused her research on pharmacological treatment for patients undergoing dialysis. She conducted several clinical studies on the comorbidities associated to dialysis treatment such as depression and sexual dysfunction. Currently at Danone Nutricia Research, Mariacristina is working as Hydration and Kidney Health Manager, focusing her research on the relationships between water intake and renal diseases. About the talk Urinary tract infection (UTI) is one of the most common infectious diseases in women. The lifetime risk of developing UTI has been estimated to be over 60% in women, with 25% developing a recurrence within 6 months. UTIs are a key issue: although temporary, they can be associated with significant morbidities such as pain, general discomfort and decreased quality of life. Abundant fluid intake seems to be a possible option to prevent recurrent episodes of infection, promoting the flushing of the urethra by the passage of urine. Women suffering from recurrent UTIs are often recommended to drink more water as a preventive action; however, no official recommendations exist supporting the beneficial effects of increased water intake on recurrent UTIs. Despite many open questions, existing scientific evidence on this topic is sparse and high quality research is still lacking. Here, we present the results of the first randomized controlled trial assessing the effect of increased water intake on recurrent UTI in young healthy women.
<urn:uuid:9a77d88e-44df-4589-8cf6-0fd801d79bca>
CC-MAIN-2023-06
https://www.hydrationforhealth.com/fr/sciences-de-lhydratation/conference-series-fr/conference-series-list/drink-and-flush-preventive-role-water-uti/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499826.71/warc/CC-MAIN-20230130165437-20230130195437-00132.warc.gz
en
0.939503
380
2.78125
3
Molecular Approaches for the Classification of Microbial Pathogens of Public Health SignificanceView this Special Issue Molecular Approaches for the Classification of Microbial Pathogens of Public Health Significance A number of pathogenic microorganisms are widely disseminated, surrounding us and sometimes infecting our body, causing a wide range of health problems, ranging from mild to life-threatening diseases. It is now widely accepted to use a variety of molecular approaches to classify or type the causative microbial pathogens in both host and hostile environments, which improve our global understanding on the epidemiology, pathogenesis, ecology, and evolution of the microorganisms, contributing to the prevention of infection, better infection control, and environmental sanitation. This special issue focuses on molecular approaches for microbial classification and typing, which would be contributable to our better understanding on the microbial features, risks, and potent strategies for its controlling from the viewpoint of public health. Microbial infections in humans could occur in a number of ways, including food-borne, human-to-human, or environmental transmissions. To reduce the food-borne infections, it is well recognized that the control of microbial safety in foodstuffs is a first-line of preventive strategy. Such an assessment of 126 natural cheese products manufactured in Hokkaido, Japan, was reported by F. K. Esho et al. The authors examined prevalence of some pathogens (Listeria monocytogenes, pathogenic Escherichia coli, and Salmonella spp.) as well as enumeration of indicator bacteria, revealing no detection of those pathogens despite the detection of coliforms in 25 of 126 tested samples (19.8%). Considering the use of pasteurized milk, it could be evidenced that the microbiological quality and hygienic status of the natural cheese tested in this study were in the most fine and satisfactory status. Microbial quality of meat processing at slaughter is now one of the most public health concerns because of the frequent contamination with a numbers of pathogenic bacteria in meat products attributing to human infections . In this relation, H. Asakura et al. reported the prevalence of Shiga toxin-producing E. coli (STEC) O157 in bovine feces and bovine offal at preslaughter and their characterization. At preslaughter, the STEC O157 was detected in 31 of 301 cattle feces (10.3%). Throughout slaughtering, this pathogen was detected from bovine offal and carcasses, and some of which exhibited identical macrogenotypes, suggesting their cross-contamination at preslaughter. Development of the protocol for the detection of foodborne pathogens was reported by Hayashi et al. The authors demonstrated a quick screening methodology by the development of cocktail PCR dipstick DNA chromatography (CPDC) assay, which enabled finalizing the simultaneous detection of multiple enteric pathogens including Salmonella spp., Shigella spp. enteroinvasive E. coli (EIEC), and enterohemorrhagic E. coli (EHEC) from food samples, within 45 min after 4–6 h of enrichment in a recently developed FPE broth . Such method offers rapid report to food suppliers and helps the quick shipment of safety-confirmed food products to markets. Vibrio cholerae is an aquatic bacteria that causes cholera, a major public health problem especially in developing countries . For the rapid and sensitive detection of this pathogen, E. Yamasaki et al. report the development of immunochromatographic test strip targeting cholera toxin (CT-IC). The authors evaluated the high sensitivity (detection limit of 10 ng/mL) and no cross-reactions of this developed tool, confirming its feasible use for the rapid detection and surveillance of toxigenic V. cholerae that is a public health threat. The rapid detections in early stage of epidemic would also allow quick triggering of control measures. Some pathogens could withstand under hostile environments. Legionella pneumophila that causes Legionnaires’ disease and Pontiac fever is one of the representatives to achieve adaptation to aquatic environments. The article of M. Tachibana et al. reports the prevalence and virulence characteristics of this pathogen in environmental water and foot spa in Yamaguchi, Japan. Finally, L. pneumophila was isolated from 5 of 22 samples, which exhibited virulence characteristics to humans. The authors thus concluded the potent risks for the transmission of this pathogen from the spa via generated aerosols. Staphylococcus aureus, a gram positive coccal bacterium, is either commensal that colonizes healthy nasal mucosa or pathogen of humans . During the last five decades, S. aureus clones that resist methicillin (methicillin-resistant S. aureus, MRSA) disseminated and caused a medical and public health problem worldwide . N. Indrawattana et al. performed genotypic and phenotypic classification of 92 S. aureus isolates from periodic monitoring in Thailand. The authors confirmed the link between the possession of virulence genes and resistance to methicillin as well as the fact that about 73% of the isolates formed biofilms on abiotic surface. The results of this study provide insight information on molecular and phenotypic markers of S. aureus clinical isolates in Thailand which should be useful for future active surveillance that aimed to control a spread of existing antimicrobial resistant bacteria as well as early recognition of a newly emerged variant. In summary, this special issue covers a range of diverse topics related to the microbial classification of public health significance. We hope the papers published will serve to further highlight the microbial safety in foods and environments, as well as in stimulating further researches into the virulence features of microbes and development of diagnostic tools, thereby contributing to the improved patient treatment and microbial safety in sources of infection. The guest editorial team would like to thank all external reviewers for their expert assistance and all authors who submitted their work to the issue. J. A. Painter, R. M. Hoekstra, T. Ayers et al., “Attribution of foodborne illnesses, hospitalizations, and deaths to foodcommodities by using outbreak data, United States, 1998–2008,” Emerging Infectious Diseases, vol. 19, no. 3, pp. 407–415, 2013.View at: Google Scholar M. Hayashi, S. Kubota-Hayashi, T. Natori et al., “Use of blood-free enrichment broth in the development of a rapid protocol to detect Campylobacter in twenty-five grams of chicken meat,” International Journal of Food Microbiology, vol. 163, no. 1, pp. 41–46, 2013.View at: Google Scholar “Cholera, 2011,” The Weekly Epidemiological Record, vol. 87, no. 31-32, pp. 289–304, 2012.View at: Google Scholar W. C. Winn Jr., “Legionnaires disease: historical perspective,” Clinical Microbiology Reviews, vol. 1, no. 1, pp. 60–81, 1988.View at: Google Scholar R. E. Williams, “Healthy carriage of Staphylococcus aureus: its prevalence and importance,” Bacteriological Reviews, vol. 27, pp. 56–71, 1963.View at: Google Scholar
<urn:uuid:8ee818bd-8e88-436d-9b42-de7d3b00464b>
CC-MAIN-2023-50
https://www.hindawi.com/journals/bmri/2014/725801/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00159.warc.gz
en
0.900565
1,543
2.59375
3
One species, Chrysaster ostensackenella (Fig. 1), occurs in North America. The larva makes a flat yellowish blotch on black locust, Robinia pseudoacacia (Fabaceae), in July and August. The mine occurs usually on the upperside, but occasionally on the underside, of the leaflet. It is nearly circular in its early stages, but later in development, it becomes irregular in shape. The adult is a very small, brilliantly shiny moth with an orange forewing marked with transverse silvery-white bands that are narrowly edged with black along their basal margins. This moth is unusual for a lithocolletine, in that the larva leaves the mine to pupate in a small cocoon, in similar fashion to many of the smaller gracillariines (e.g., Parectopa). Figure 1. Chrysaster ostensackenella. Top: left, adult; center and right, early and late upperside leaf mines on black locust, Robinia pseudoacacia (Fabaceae); bottom: left, late-stage underside leaf mine on R. pseudoacacia, with larva visible in mine; right, mature larva.
<urn:uuid:12e18d1f-e6e8-457e-9ea8-dbc508ca05f4>
CC-MAIN-2016-40
http://www.microleps.org/Guide/Gracillariidae/Lithocolletinae/Chrysaster/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738663308.86/warc/CC-MAIN-20160924173743-00033-ip-10-143-35-109.ec2.internal.warc.gz
en
0.909927
250
3.03125
3
Search our database of handpicked sites Looking for a great physics site? We've tracked down the very best and checked them for accuracy. Just fill out the fields below and we'll do the rest. You searched for We found 16 results on physics.org and 148 results in our database of sites 134 are Websites, 2 are Videos, and 12 are Experiments) Search results on physics.org Search results from our links database This is a good clear site that covers projectile motion and forces, includes diagrams and animations to help the explanations. Java Applet showing how to find (graphically) the resultant of 1, 3, 4, or 5 forces. Three vector forces that can be changed. The resultant vector is calculated and shown by this JAVA applet. A simple site that contains an online alternative to plotting compass' or iron filings. The applet is very effective at showing both the direction of the force on an electron and its magnitude. The strong force holds atoms together but it's very complicated and not well understood. This article looks at the problems and current research trying to find the solutions. This page describes in detail the four fundamental forces of nature. This shockwave activity provides a very basic simulation of the force on an airplane wing. Subscription required but with 30 day free trial. One of the properties of elasticity is that it takes about twice as much force to stretch a spring twice as far. That linear dependence of displacement upon stretching force is called Hooke's law. A java applet that shows the effect of buoyant force acting on an object less dense than water. This java applet gives a practical demonstration of lorentz force when a charge q is applied to a magnetic field. Showing 21 - 30 of 148
<urn:uuid:5946343f-f843-4dac-ac53-806869fff30e>
CC-MAIN-2017-04
http://www.physics.org/explore-results-all.asp?currentpage=3&Linktype=0&age=0&knowledge=0&q=strong+force
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00274-ip-10-171-10-70.ec2.internal.warc.gz
en
0.919095
372
2.921875
3
This problem has been around since the early days of logic circuits.When it comes to CMOS chips, There is no easy answer. The original CMOS chips Ranged in voltage from 15V and in some cases up to 30V.I do not recommend using the older chips. However, current CMOS chips will run at 15V or 5V. I have never tried to run true CMOS at 3.3V. If you're referring to the 74H series which is a CMOS -based " TTL " series, They normally run at 5V, check your data sheet. Some of these chips will run fine at 3.3 V. Even if you run them at 5V, Going from 3.3 V to 5 V should not give you a problem. However, you will need a voltage divider when going in the opposite direction. A level shifter is always recommended. 4000 series is CMOS Which predates the 7400 series If you want I can send you a copy of a page or two from the National Semiconductor data book from 1984 to prove it. Yes I have been dealing with them that long. So to get back to the OP's questing.The attached PDF gives you some options.
<urn:uuid:15d41688-cf9f-4c2a-b406-53fd5101acb0>
CC-MAIN-2017-30
http://forum.arduino.cc/index.php?topic=214606.msg1587577
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423512.93/warc/CC-MAIN-20170720222017-20170721002017-00044.warc.gz
en
0.953472
254
2.65625
3
While teaching your dog specific commands can improve behavior and give you more control, it can also be a fun exercise where you can bond with your best friend. It’s also a great way to avoid unwanted behavior and ensure you can curb bad behavior in the future. In this post we discuss five fundamental commands you should start teaching your dog today. 1. Teach Your Dog to Stay For you to teach your dog to ‘stay’, you’ll need to teach him how to ‘sit’ first. - After you have commanded your pooch to ‘sit’, raise your hand, palm facing outwardly in front of you and say ‘stay’. - Take a couple of steps backwards. If he stays, give him a treat as reward. - Continue the exercise, taking a couple of more steps backwards every time. - Remember always to reward him with pizzle sticks if he stayed. These all-natural, durable chew treats are wonderful treats for your obedient pooch! It might take some time and patience, but it is well worth the effort. This will teach your pup self-control. 2. Teach Your Dog to Sit Teaching commands usually kicks off with teaching your dog to sit. - Get a treat and hold it to your dog’s nose so that he can smell it. - Bring your hand upwards, he will follow the treat with his head and might even go into a sitting position. - If he is in the sitting position, say ‘sit’ and give him his reward. Add some cuddles and a praise for extra positive reinforcement. You should do this a couple of times daily until he gets it. Then, you can include the command in everyday activities like before meals or when you need his full attention. 3. Teach Your Dog to Leave It A lot of times our dogs eat things we’d rather not have them eat. Sometimes these can be things like bones that might be harmful to them. Here’s how to get him to ‘leave it’. - Hold a treat in both your hands, making your hands fists. - Holding one enclosed fist to him, tell him to ‘leave it’. - He’ll lick your fist, bark and try to get it. Simply ignore all these behaviors. - If he stops trying to get you to give it to him, reward him with the treat in the other hand. - Continue the exercise until he moves away from the fist you tell him to ‘leave’. - Once he moves away when you say ‘leave it’, reward him. This can be a long process, so be patient. You can also try to teach him not to snatch treats altogether if you continue practicing. A well-mannered dog is one that’s also able to control himself from being impulsive. 4. Teach Your Dog to Come This is an excellent command if you want to get your dog’s attention and respond to you calling him. - Get your pooch’s leash and collar and put it on. - Bend down on your knees and say ‘come’ while slightly pulling him towards you. - Once he is with you, give him a treat. Repeat the exercise as often as possible, always giving him a bit more leeway. As soon as he responds to your command by himself, you can practice it without a leash and collar. 5. Teach Your Dog to Fetch Who doesn’t love Cesar Milan, right? Well, he’s got a couple of neat tricks on how you can teach your dog how to fetch. Read his technique on teaching your dog how to fetch here. Remember, teaching our dogs commands and training them is important not only for them but us and our relationship with them too. Training is a fantastic way to bond with your furball. Let us know how you did when you tried any of the techniques mentioned here.
<urn:uuid:3133d288-c520-4e74-83c0-24f15ce4f188>
CC-MAIN-2020-24
http://toppawtraining.com/training/fundamental-commands-pizzle-sticks-reward
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347388758.12/warc/CC-MAIN-20200525130036-20200525160036-00126.warc.gz
en
0.96289
843
2.59375
3
Unlocking the World of Felt: Discovering the Myriad Types and Applications In the realm of textiles, few materials offer the versatility, warmth, and creative potential that felt does. Derived from compressed and matted fibers, felt has been a staple in human civilization for centuries, serving both functional and artistic purposes. From fashion to interior design, crafting to industrial applications, felt finds its place in a multitude of fields. In this comprehensive guide, we embark on a journey to explore the various different types of felt products, highlighting their unique characteristics, applications, and the creative potential they offer. The Spectrum of Felt Products: A Detailed Overview 1. Clothing and Fashion Accessories Overview: Felt's adaptability shines through in the world of fashion. From cozy winter coats to stylish hats and scarves, felt clothing offers both comfort and style. Additionally, felt is a popular choice for fashion accessories such as handbags, belts, and even footwear, combining aesthetics with durability. 2. Home Décor and Interior Design Overview: Felt's soft texture and vibrant colors make it a favorite in interior design. Felt rugs, cushions, and curtains add warmth and a touch of elegance to living spaces. Wall hangings and decorative panels showcase felt's artistic potential, transforming walls into unique canvases. 3. Craft and DIY Projects Overview: Felt is a beloved medium for craft enthusiasts. It's easy to work with, allowing for intricate designs and shapes. From felt flowers and ornaments to plush toys and decorative banners, the possibilities for creative expression are limitless. 4. Industrial and Technical Applications Overview: Beyond aesthetics, felt's properties make it suitable for various industrial uses. Felt gaskets and seals play a crucial role in machinery and equipment, ensuring proper insulation and sealing. Its sound-absorbing qualities also make it a preferred material in automotive interiors. 5. Musical Instruments and Sound Engineering Overview: Felt's acoustic properties find a niche in the realm of music. It's commonly used in piano hammers to produce desired tones. In sound engineering, felt is employed to dampen vibrations and achieve precise sound control. 6. Medical and Orthopedic Devices Overview: Felt's softness and hypoallergenic nature make it suitable for medical applications. It's used in bandages, wound dressings, and orthopedic padding. Its moisture-wicking properties are beneficial for patient comfort. 7. Filtration and Industrial Cleaning Overview: Felt's porous structure lends itself to filtration systems. Industrial felt filters are used in air purification, water treatment, and oil filtration processes. Their efficiency and durability make them essential components in various industries. 8. Stationery and Office Supplies Overview: Felt finds its way into everyday office supplies. Felt-tip pens and markers owe their smooth writing experience to the use of felt tips. Felt organizers, folders, and laptop sleeves offer practicality combined with aesthetic appeal. 9. Footwear and Orthotics Overview: Felt's comfort and insulation properties extend to footwear. Felt-lined slippers and boots provide warmth in colder months. Orthopedic insoles and inserts made from felt offer support and alleviate discomfort. 10. Art and Sculpture Overview: Artists and sculptors are drawn to felt for its tactile nature. Felt's malleability allows for intricate sculptures and installations. It's a favored medium for creating texture and dimension in visual art. FAQs about Different Types of Felt Products Q: Can I dye felt products to match my home décor? A: Absolutely! Felt's porous structure readily accepts dyes, allowing you to achieve a custom look that complements your interior. Q: Is felt a sustainable material? A: Yes, felt is often made from natural fibers like wool. Additionally, its durability contributes to its eco-friendliness. Q: Are felt products suitable for outdoor use? A: Some felt products are treated for outdoor use, such as weather-resistant felt rugs and outdoor cushions. Q: How do I clean felt products? A: Gently spot clean felt products with mild soap and water. Avoid harsh chemicals and excessive rubbing. Q: Can felt be recycled? A: Yes, felt can be recycled, especially when made from natural fibers. It can be repurposed into new felt products or insulation materials. Q: Are there any hypoallergenic felt options? A: Yes, felt made from natural fibers is often hypoallergenic, making it a safe choice for those with sensitivities. As we've delved into the vast landscape of different types of felt products, it's clear that this versatile material is not only functional but also a canvas for creativity. From the coziness of felt clothing to the precision of industrial applications, felt products enrich our lives in numerous ways. Their adaptability, combined with their aesthetic and practical qualities, ensures that felt will continue to be a cherished textile for generations to come.
<urn:uuid:ba1f1fdc-7ea4-466f-bb27-270efe428a95>
CC-MAIN-2023-50
https://besthimalaya.com/blogs/news/different-types-of-felt-products-exploring-the-versatility-and-creativity
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00677.warc.gz
en
0.928581
1,047
2.5625
3
Protein has been in the news a lot lately. We have heard that higher protein diets help with weight management and have seen food marketers adding protein to foods such as granola bars and bread. What exactly is protein? Protein is a macronutrient – a nutrient that provides calories. Protein is broken down in the body into amino acids. These amino acids are important for our body to function. Nearly everything the body does needs protein. It is needed to build and repair skin, muscles, bones, blood and organs, as well as to make enzymes, hormones, and antibodies (for immunity). Our bodies use protein throughout the day to make and repair body cells. The Canadian recommendations for protein are set to help prevent deficiencies. The current guidelines recommend 0.8 grams of protein for every kilogram of body weight every day. For a 70-kilogram, generally healthy adult person, that would equal 56 grams of protein each day, or about 20 grams at each meal. Recent research has shown that we may need to eat a bit more than the recommendations to build or maintain our muscle and help manage weight. Some research suggests we should eat about 30 grams of protein at breakfast, lunch and supper. Since there is a limit as to how much protein our body can absorb at one time, eating more than 30 grams at one time will not help to build more muscle. Unless a person’s calorie needs are high, the extra protein will eventually be stored as fat since our bodies cannot store protein. There are very few foods made solely of protein. Most foods contain a combination of protein, fat and carbohydrates. Foods that are higher in protein come from the Meat and Alternatives and the Milk and Alternatives food groups in Canada’s Food Guide. Foods in the Grain Products and Vegetables and Fruit groups also have some protein, but in smaller amounts. What does 30 grams of protein look like? This would be about 1 1/2 cups (350 millilitres) of lentils or three ounces (90 grams) of meat, fish or poultry. Typically, people have less protein at breakfast and lunch and more at supper. Eating two slices of whole wheat bread, two boiled eggs, 3/4 cup (175 millilitres) of plain yogurt and an orange is an example of a breakfast that contains 30 grams of protein. What are the healthiest ways to get the right amount of protein? - Choose lean sources of meat and meat alternatives. For example, choose skinless chicken or fish in a 90-gram serving. - Use meat alternatives like beans and legumes in recipes. For example, eat baked beans for breakfast with whole wheat toast. Make a meatless chili or bean dish at least once per week; try to increase the frequency if you can. - Choose low-fat milk and alternatives. Have skim or one-per-cent milk on whole grain cereal, or choose plain low-fat Greek yogurt on a baked potato. - Shred lower fat cheeses (with less than 20 per cent MF on the label) and add to a salad or soup, or melt on toast. Limit servings of red meat and if possible avoid processed meats that are smoked, cured or salted. The World Cancer Research Fund and the American Institute for Cancer Research recommend limiting red meat and eating very little, if any, processed meat. Choose less than 500 grams cooked weight per week. That would mean, for example, limiting your red meat to one 180-gram trimmed steak, two 90-gram hamburger patties, and one 180-gram serving of lean pork in a week. So, do your muscles a favour and make sure you have enough lean protein at each meal by spreading it equally throughout the day. Maintain or possibly build the muscle you have with exercise and eating the right amount of protein each day. Karol Sekulic is a registered dietitian with Alberta Health Services who has expertise and interest in the areas of weight management, nutrition and communications.
<urn:uuid:7387b3f7-8035-456c-b4cc-851d77fb4665>
CC-MAIN-2018-34
https://myleapmagazine.ca/2014/03/06/lean-and-clean/
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213737.64/warc/CC-MAIN-20180818193409-20180818213409-00003.warc.gz
en
0.950728
816
3.609375
4
This blog was updated on October 4, 2016 to include additional resources and information. “High-quality OER (Open Education Resources) can save teachers significant time and effort,” points out this article at Edutopia, “on resource development and advance student learning inside and outside the classroom. Further, open sharing of resources has the potential to fuel collaboration, encourage the improvement of available materials, and aid in the dissemination of best practices.” Given that OER is increasingly available in education space, representing various “big players” like Amazon, Apple, Google, and Microsoft’s OpenEd.com, it’s worth taking a look at new offerings in this space. What will these services mean for school districts and teachers? And, more important questions linger, such as, “Should teachers and school districts be trying to create their own content when so much is available online already? If not, who curates OER content?” Let’s explore three current and future sources of open educational resources: Amazon Announces Inspire “Where big ideas take-off,” shares a video for Amazon’s new service, Inspire. You might think a free online lesson plan collection would be passé given that there are many other online lesson plan collections (as well as open educational resources available at no cost), but Amazon Inspire seeks to put a fresh face on digital lesson design, as well as open educational resources. Open Educational Resources are teaching and learning materials that you may freely use and reuse without charge. Open Educational Resources are different from other resources a teacher may use in that they have been given limited or unrestricted licensing rights. That means they have been authored or created by an individual or organization that chooses to retain few, if any, ownership rights. Source: OER Commons Amazon Inspire seeks to make free resources, created by teachers and others, available for the purpose of improving learning outcomes. The new system will be searchable by grade level, type, and more. Contributors will be able to review and rate content made available online. Since Inspire is not yet available, teachers and contributors can request early access, and potential organizations can request to collaborate as well. Their invitation to collaborators appears below: Are you a state, district, or school? An OER provider or a publisher with free content to share? We’ve collaborated with thousands of teachers and dozens of states, districts, and publishers during the private beta of Amazon Inspire. Now it’s your turn. Help us to provide teachers everywhere with access to a large and diverse selection of free digital teaching resources. Of course, Amazon is neither the first or the last to the OER space. Until Amazon’s Inspire OER clearinghouse is ready, be aware that there are ample locations to find OERs. One place that you can look is a Google custom search. For example, a quick search on blended learning yielded these results: How many of these resources remain current however? Keeping it all updated remains a key obstacle according to JISC’s web site: Sustainability of OER release is currently a significant issue for institutions around the globe and evidence of benefits must be clarified if resources are to be made available for continued release. (Source: JISC) If you explore The OER4Schools Professional Learning Resource, you will probably be impressed (as I was) by the breadth and depth of the content available. Now imagine maintaining this content, updating it to reflect the latest information (e.g. Google Forms and Drive updates may not be reflected on this page fast enough to be useful). As LeiLani Cauthen (@learningcounsel – The Learning Counsel) pointed out recently (paraphrased in my notes below) at a San Antonio, Texas event, teachers are essentially competing against a global network of knowledge workers. Small teams of teachers in their respective classrooms are unable to keep up with the constantly changing flood of content, apps, and information washing over schools in waves. Digital curriculum and LMS companies are dis-intermediating teachers because there’s no possible way for teachers to design the mobile learning experiences students need at the speed they need to. Teachers are competing against a global network of knowledge. Some district curriculum leaders think they can simply digitize their resources and teach teachers to use a variety of digital apps. But organizing and managing this for each teacher is impossible for them. It’s a never-ending task that teachers have no time for or expertise (most were not taught to be instructional designers of curriculum that is multi-sensory and mobile), and, as such, more information is needed. Featuring an easy-to-use interface, the OER Commons presents educators with a variety of open educational resources. As you can see from the results below, there is content available in a variety of areas. Another resource for creating customized lesson plans is from startup FormSwift. They provide a very nice-looking and easy-to-use template for making an ELA, math, or science lesson plan based on the Common Core standards. The free site allows you to edit a PDF or Word document that can then be printed or emailed in to a supervisor. Open Educational Resources certainly have great potential for educators, providing content and lessons that teachers can adapt. Yet the question remains. Even though OERs are becoming available, who evaluates these and makes sure they connect to the district’s curricular goals? And do teachers really have the time to curate content coming from multiple vendors? OER Apps and Resources - MERLOT OER Search (iOS) – MERLOT Search provides easy-to-use access to the MERLOT database of 48,000+ higher education resources. MERLOT’s Open Education Resource collection has been curated by subject matter experts, many with comments provided by members who have used them and often with learning exercises attached for use in the classroom. - OER Search (iOS) – OER Search provides a quick and easy way to discover high quality open educational resources that are freely available online. Search from 30,000 resources that have been curated by educators from over 300 collections and providers. - Creating and Sharing Open Educational Resources (iOS) – This nonlinear collection of multi-touch resource books are designed to support educators who are authoring content and/or guiding learners who are authoring content for publication. This course is designed as a collection of resources to help the teacher and student navigate through open educational resources.
<urn:uuid:81a87761-50fc-4b65-9a7f-c8b14026aa3a>
CC-MAIN-2019-13
https://blog.tcea.org/new-oer-resources/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202496.35/warc/CC-MAIN-20190321051516-20190321073516-00426.warc.gz
en
0.940261
1,357
3.1875
3
Archaeologists are studying the fossilized remains of a previously undiscovered species of Van Gundy found in Montana this week. Previously believed to be a subspecies of the Homo genus, scientists now believe Van Gundys are an altogether separate species, which has been living alongside humans and surviving off their refuse since the dawn of civilization. The evolution of the Van Gundy species has been a slow, often awkward process, with their development lagging well behind humans. Despite their large skulls, poor physicality and brooding nature, Van Gundy civilization also developed much slower than humans, owing to their susceptibility to mites and indifference towards hygiene. Known as "the cockroach of primates," Van Gundys primarily survived by living in shelters abandoned by early human tribes, eating their leftovers and motivating humans to hunt and forage for them with their barking yelps and their nervous, overstressed temperaments.
<urn:uuid:ecca077d-589a-4765-a67d-d28180d1fa87>
CC-MAIN-2017-17
http://www.theonion.com/article/new-species-of-van-gundy-sheds-light-on-developmen-19627
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119642.3/warc/CC-MAIN-20170423031159-00409-ip-10-145-167-34.ec2.internal.warc.gz
en
0.973763
184
3.390625
3
In the previous chapters, you have been presented with the three principles of cultural intelligence: cultural strategic thinking, motivation, and behavior. This chapter provides case studies that are a combination of real life stories shared by clients and colleagues I have worked with over the last 7 years as well as cases from national and international newspapers. Names of organizations and individuals have been replaced and situations have been altered to conceal their identities. of leaders and managers who must find solutions to working through intercultural problems and situations. Each case study is followed by an activity to help you apply your understanding of the cultural intelligence principles; then, it is followed by a list that outlines sample ideas related to the questions in the activity. The following are your instructions: - Read the case studies. - Answer the questions in the activity section. - Review ideas.
<urn:uuid:c9f64b9c-3def-4910-8587-d3bcc689ed7a>
CC-MAIN-2022-33
https://biz.libretexts.org/Bookshelves/Management/Leading_with_Cultural_Intelligence/07%3A_Cultural_Intelligence_in_Action
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00163.warc.gz
en
0.961731
166
2.84375
3
Not only are invasive species able to wreak havoc on local ecosystems, but they sometimes play host to dangerous parasites as well. So is the case with the giant African snails of South Florida, which are known to carry a tiny roundworm parasite that can infect humans, dogs, horses, birds, and other animals. Now experts are warning residents that the parasitic worms are present in at least three other non-native snail species currently living in the region. The parasitic worms, Angiostrongylus cantonensis, more commonly known as rat lungworms, are members of the phylum Nematoda consisting of around a million species, over half of which are parasitic. Several species of snails serve as intermediate hosts; the worm larvae live in the snail guts until infective. The worms infect larger animals that prey on the snails. Humans are incidental hosts, usually picking up the worms from eating raw or undercooked snails or inadequately washed produce. The giant African snail, Achatina achatina, grows large enough to fill an adult human hand. It is one of several non-native, invasive snail species residing in South Florida. Researchers have known for some time that these snails carry rat lungworms, and they have been testing snails throughout the state to determine how far the parasite has spread. The worms were recently detected in three other snail species, all of which are also non-native intruders. “Determining the geographic distribution of this parasite in Florida is important, due to the hazards to human health,” said Heather Walden, an assistant professor of parasitology in the University of Florida’s college of veterinary medicine. The parasite can cause a fatal form of meningitis in people who become infected from eating raw or undercooked snails. It has been widely recognized as a public health problem in large parts of Asian and Hawaii. “Humans can’t become infected with this parasite unless they eat an undercooked or raw snail,” says Walden, lead author of a
<urn:uuid:f2cc6cf4-ca2e-461d-ba75-c1cb2e321457>
CC-MAIN-2017-17
https://www.sciencerecorder.com/news/2015/02/26/tiny-worm-vs-giant-snail-parasitic-nematodes-pose-real-threat-to-snails-in-florida/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.68/warc/CC-MAIN-20170423031203-00300-ip-10-145-167-34.ec2.internal.warc.gz
en
0.971819
422
3.328125
3
clergyman, army chaplain, and physician, was born a slave in Seguin, Texas. Little is known about his parents except that his mother was a slave, and during the Civil War she and William fled to Galveston, Texas. As a young boy, he joined the African Methodist Episcopal (AME) Church, which took on both local and national responsibility for the religious, intellectual, and social uplift of African Americans, often taking a leading role in promoting both secular and religious education. The AME Church, in fact, sponsored Anderson's education for three years at Wilberforce University in Ohio. The remainder of Anderson's education was financed by an Ohio sponsor, Stephen Watson, who was then the vice president of the London Exchange Bank of Madison County. In 1886 Anderson received a theology certificate from Howard University and two years later graduated from the Homeopathic Medical College of Cleveland Much ... Sherrow O. Pinder William C. Hine Richard Harvey Cain was born to free parents in Greenbriar County, Virginia (now West Virginia). In 1831 his family moved to Gallipolis, Ohio. Cain was educated at local schools and worked on an Ohio River steamboat before being licensed to preach in the Methodist Episcopal church in 1844. Complaining of racial discrimination in the church, he resigned and joined the African Methodist Episcopal Church. Assigned a pulpit in Muscatine, Iowa, he was ordained a deacon in 1859. He returned to Ohio and in 1860 attended Wilberforce University. From 1861 to 1865 he served as pastor at Bridge Street Church in Brooklyn, New York, and was elevated to elder in 1862. He participated in the 1864 national black convention in Syracuse, New York, which advocated abolition, equality before the law, and universal manhood suffrage. He married Laura (maiden name unknown), and they adopted a daughter. minister and activist, was born to Archibald J. Carey Sr., a Methodist minister, and Elizabeth Davis Carey in Chicago, Illinois. He attended Doolittle Elementary School and graduated from Wendell Phillips High School in 1925. As a youth Carey exhibited strong speaking skills and won the Chicago Daily News Oratorical Contest in 1924. In his adolescent years he was much influenced by his father, a staunch Republican politician, who took him to a private meeting with President Theodore Roosevelt. After high school the young Carey pursued his education at the local Lewis Institute, where he earned a BS in 1928. He married Hazel Harper Carey, with whom he had one daughter, Carolyn. In 1929 he was ordained by his father who had become a bishop in the African Methodist Episcopal AME Church The following year Carey was assigned to the Woodlawn AME Church in ... Dickson D. Jr. Bruce Born in Michigan, James D. Corrothers was raised in the predominantly white community of South Haven by his paternal grandfather, a man of Cherokee and Scotch-Irish ancestry. He moved to Muskegon at age fourteen, supporting himself and his grandfather. Shortly thereafter he moved to Indiana, then to Springfield, Ohio, working as a laborer. There, in his teens, he began his literary career, publishing a poem, “The Deserted School House”, in the local newspaper. Corrothers's literary career received a boost when, at eighteen, he relocated to Chicago. Working in a white barber shop, he met journalist-reformer Henry Demarest Lloyd and showed him some poems. Lloyd arranged for their publication in the Chicago Tribune, getting Corrothers a custodial job in the Tribune offices Corrothers was soon asked to do an article on Chicago s African American elite He was chagrined when the story appeared rewritten by a white reporter ... William C. Fischer journalist, poet, and clergyman, was born in Chain Lake Settlement, Cass County, Michigan, a colony first settled by fugitive slaves in the 1840s. His parents were James Richard Carruthers (the spelling was later changed by Corrothers), a black soldier in the Union army, and Maggie Churchman, of French and Madagascan descent, who died when Corrothers was born. Corrothers was legally adopted by his paternal grandfather, a pious and respected man of Cherokee and Scotch-Irish origins, who raised young Corrothers in relative poverty. They lived in several roughneck towns along the eastern shore of Lake Michigan, where Corrothers attended school and became aware of racial hostility. When he was just a boy family members introduced him to a rich vein of African American folk tales that he would later draw upon for a number of his dialect sketches. Working in his teens variously as a sawmill hand hotel menial coachman ... William C. Fischer Corrothers, James David (02 July 1869–12 February 1917), journalist, poet, and clergyman, was born in Chain Lake Settlement, Cass County, Michigan, a colony first settled by fugitive slaves in the 1840s. His parents were James Richard Carruthers (spelling later changed by Corrothers), a black soldier in the Union army, and Maggie Churchman, of French and Madagascan descent, who died when Corrothers was born. Corrothers was legally adopted by his nonblack paternal grandfather, a pious and respected man of Cherokee and Scotch-Irish origins, who raised young Corrothers in relative poverty. They lived in several roughneck towns along the eastern shore of Lake Michigan, where Corrothers attended school and became aware of racial hostility. In his boyhood family members introduced him to a rich vein of African-American folk tales that he would later draw upon for a number of his dialect sketches. Working in his teens variously as a ... Alexis Cepeda Maule minister and politician, served thirty-six years (1943 to 1979) in the Illinois State House of Representatives for the 22nd District and acted as associate pastor at Chicago's Quinn African Methodist Episcopal (AME) Church. Corneal was born on a farm near Vicksburg, Mississippi, to a white landowner and an African American former slave named Pearl Darden. After attending primary school at Sisters of the Holy Ghost, a Roman Catholic School, Davis graduated from Magnolia Public High School. At Magnolia there had been one teacher who taught all the subjects. Davis attended Tougaloo College, a historically black institution near Jackson, Mississippi. Established in 1869 by the Home Missionary Society of the Disciples of Christ Tougaloo offered a first class liberal education to African Americans At Tougaloo he read the newspaper almost every day and participated in the debate society which would help his oratory skills in his later ... minister, schoolteacher, and civil rights leader, was born in Manning, Clarendon County, South Carolina, the seventh of thirteen children of Tisbia Gamble DeLaine and Henry Charles DeLaine, a pastor at Liberty Hill African Methodist Episcopal (AME) Church. The family owned farmland, which they worked to keep food on the table, and the children walked miles to a rundown segregated school. When he was fourteen, while walking to school, DeLaine shoved a white boy who had accosted his sister. After this incident was reported to his school's principal, DeLaine ran away to escape punishment of twenty-five lashes, which a school authority was compelled to administer. He spent four years in Georgia and Michigan working as a laborer and attending night school, returning to Manning in 1916. DeLaine worked his way through college and in 1931 earned a BA from Allen University in Columbia South Caroliana where ... Stephen W. Angell Jordan Winston Early was born a slave in Franklin County, Virginia. His mother died when he was three years old, and he was raised by an elderly woman, known as Aunt Milly, who cared for the plantation's slave children while their mothers worked. She was a devout Christian, and Early later attributed the fact that he became a “useful and intelligent” man to her influence. Early attended many camp meetings in his boyhood, and he later recalled that he was religiously inclined from an early age. He loved nature and often hunted at night with a favorite uncle. In 1826 Early moved with the Early family to St. Louis. In his new home, he frequently visited churches and listened closely to the white ministers' sermons. A sermon by a Methodist minister named Barger soon led to his conversion; “My conviction was deep and powerful,” related Early. In 1828 ... Lisa Clayton Robinson The daughter of former slaves, Julia Foote attended a segregated white Methodist church with her family during her childhood in Schenectady, New York. When she was a teenager her family moved to Albany, New York, and joined the local African Methodist Episcopal Church (AME). Foote had a conversion experience in that church in 1838. The next year she married George Foote and moved with him to Boston. Before her conversion, Foote had agreed with the conventional opinion that women should not preach. But after her arrival in Boston, she felt the call to preach and pray in public. Despite the disapproval of her parents, husband, and minister, and the threat of excommunication from her church, Foote began a career as an evangelist. During the next four decades, Foote traveled and preached throughout New England and the mid-Atlantic states, and as far away as Detroit, Michigan San Francisco ... community activist, city councilwoman, and ordained minister, was born Beatrice Frankie Fowler in Wake Forest, North Carolina, to Maude Fowler, a domestic worker, and to a father who left when she was a toddler. In a 1989Baltimore Sun Magazine article, Gaddy recalled “many days” that she and her four siblings (Mottie Fowler, Pete Young, Tony Fowler, and Mabel Beasly) “didn't eat because when my mother didn't work and couldn't bring home leftover food, there was nothing to eat. And, even when there was food, if my stepfather had been drinking, he'd come home and throw our plates out in the back yard or through the window.” A high school dropout, Gaddy was divorced twice by her early twenties. As a single mother, she struggled for years to make a living for herself and her children (Cynthia, Sandra, John, Michael, and Pamela ... Michele Valerie Ronnick pharmacist, physician, man of letters, and licensed preacher in the British Methodist Episcopal Church and African Methodist Episcopal (AME) Church, was born in Port of Spain, Trinidad, to Stephen and Eleanor Jones Hartley. His mother, who was born in Bridgetown, Barbados, on 7 June 1830, was of Creole origin. She was confirmed at St. Michael's Cathedral, an Anglican church, on 6 January 1849, and moved a few months later on 27 June 1849 to Port of Spain. Her husband, whom she married at the Church of the Holy Trinity on 27 December 1860, was a merchant's clerk. A physician from Paris, France, named Louis Saturnin witnessed the couple's wedding and also the baptism on 5 February 1862 of their only son, Henry, who was Saturnin's namesake. Not quite four years later, on 26 January 1866 Hartley s father died To make ends ... actor, singer, and minister, was born in Atlanta, Georgia, the son of Charles Haynes, a bricklayer, and Mary (“Mollie”) Leech, an office cleaner. Haynes was educated in the Atlanta public schools and graduated from the African Methodist Episcopal (AME) Church–affiliated Morris Brown College. Haynes worked as a porter in Atlanta and as an itinerant preacher before securing a job in the records division at the Standard Life Insurance Company in Atlanta around 1915. Founded by Heman Edward Perry in 1913, Standard was one of the nation's few black life insurance companies, and Haynes gained valuable business experience working with one of the most active black entrepreneurs in America. While at Standard, he also met Harry Herbert Pace, the company's secretary-treasurer, with whom he would later work in New York. Haynes registered for the draft in 1917 and according to one source ... Kenneth J. Blume clergyman, politician, educator, and diplomat, was born a slave on the plantation of Thomas Jones in Elbert County, Georgia. William's mother died when he was nine, and he was obligated to rear his younger siblings while working as a plowboy. His education during his last years of enslavement (1860–1865) was in Sunday school in Elberton, Georgia. Legally prohibited from learning to read or write, he learned largely by memorizing Bible passages. But when he was fifteen the Civil War ended, and Union troops appeared. As he wrote in his memoir, From Slavery to the Bishopric in the A.M.E. Church (1924): “Freedom had come, and I came to meet it” (28). Freedom also meant the end of his Sunday school education, but Heard's father had earned enough money as a wheelwright to pay for William's lessons in spelling, reading, and arithmetic. From 1865 ... Michele Valerie Ronnick pastor, Latinist, linguist, Reformation scholar, and college president, was born in Urbana, Ohio. He was one of seven children born to David Leander and Karen Andrews Hill. Hill's father was the first African American police officer in Urbana. His mother was a housewife who was active in the community and a devoted member of the St. Paul African Methodist Episcopal Church. The church, founded in 1824, held an important place in the African American community. For the young man, the church provided not only spiritual guidance but his Bible studies also provided him a rich source of intellectual stimulation. In 1924 Hill matriculated at Wittenberg University which was founded under the auspices of the Lutheran church and located in Springfield, Ohio. He graduated with honors in 1928 Interested in religion he entered Hamma Divinity School now located in Columbus Ohio and sharpened his skills in Greek Latin ... Rebecca Cox Jackson was born in Horntown, Pennsylvania, into a free family. Her mother, Jane Wisson (or Wilson), died in 1808. Nothing is known of her father. Later she began living with her elder brother, Joseph Cox, who was a tanner and preacher at Bethel African Methodist Episcopal Church (AME) in Philadelphia, Pennsylvania. She married a man named Samuel S. Jackson and cared for her brother's four children, remaining childless herself. According to her spiritual autobiography, Gifts of Power, which was rediscovered and published in 1981, Jackson experienced in 1830 a religious awakening during a thunderstorm that changed her life. She soon became involved in the early Holiness Movement, an early form of Pentecostalism that grew out of the Methodist Church. Jackson and her friend Mary Peterson began to hold prayer meetings which attracted large crowds This soon brought her into conflict ... Jean McMahon Humez Rebecca Cox Jackson was a charismatic itinerant preacher, the founder of a religious communal family in Philadelphia, and a religious visionary writer. Though an important example of black female religious leadership and spirituality in the nineteenth century, she was virtually unknown after her death until the rediscovery and publication of her manuscript writings in 1981. Jackson was born into a free black family in Horntown, Pennsylvania, near Philadelphia. She lived at different times in her childhood with her maternal grandmother and with her mother, Jane Cox (who died when Rebecca was thirteen). In 1830 she was married (to Samuel S. Jackson), but apparently childless, and living with her husband in the household of her older brother, Joseph Cox a tanner and local preacher of the Bethel African Methodist Episcopal AME Church in Philadelphia Jackson cared for her brother s four children while earning her own living ... Edith L. Blumhofer pastor and educator, was born in slavery at Burnt Corn, near Monroeville, Monroe County, Alabama, one of twelve children born of John (surname unknown), a Native American (probably Creek), and Rachel (surname unknown), a Virginia-born mixed-race slave of the Tait family. In the late spring of 1865, Osborne, an eleven-year-old attracted by uniforms and drums, followed the soldiers of the 117th Illinois Infantry as they marched through Monroeville for points beyond. He made himself useful in practical ways to the officers and men, and he won the sympathy of Lt. Col. Jonathan Merriam (whose horse became Osborne's special responsibility). When Merriam was mustered out of the army on 5 August 1865 Osborne accompanied him to Merriam s farm near Atlanta Logan County Illinois Merriam was a prosperous farmer who was active in Illinois politics and was an ardent Protestant and he promised the illiterate Osborne a home ... Frank N. Schubert George W. Prioleau was born in Charleston, South Carolina, to L. S. and Susan Prioleau, who were slaves. He graduated from Claflin College, Orangeburg, South Carolina, in 1875, and taught in the public primary schools of Lyons Township, Orangeburg County. In 1879 he joined the Columbia, South Carolina, Conference of the African Methodist Episcopal Church (AME), of which his father was a pastor at St. Mathews, just north of Orangeburg. His first pastorate was at Double Springs Mission, Laurens County. In 1880 the Columbia Conference sent him to Wilberforce University in Ohio, where he enrolled in the Theological Department. After his 1884 graduation, Prioleau served churches in Hamilton and Troy, Ohio. In 1888 he was appointed professor of theology and homiletics at Wilberforce. After the Theological Department became Payne Theological Seminary, he occupied the chair of historical and pastoral theology (1890–1894). In 1890 he ... Hiram Revels, the son of former slaves, was born in Fayetteville, North Carolina. He studied at several seminaries in Indiana and Ohio before becoming a minister in the African Methodist Episcopal Church (AME). During the American Civil War Revels helped to organize African American regiments in Maryland and ...
<urn:uuid:a7aea8a7-0472-4838-8a6b-5330b412758f>
CC-MAIN-2020-34
https://oxfordaasc.com/browse?btog=chap&pageSize=20&sort=titlesort&t=AASC_Occupations%3A852&t_2=AASC_Eras%3A6
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738950.61/warc/CC-MAIN-20200813014639-20200813044639-00233.warc.gz
en
0.984675
3,802
3.015625
3
“fashion revolution” consisted of two phases. In the first, Directoire period, the old, corseted look developed into a straight but sinuous silhouette, with an easy and often raised waistline and a narrow skirt that in 1911 became the notorious “hobble skirt.” In the second (but related) phase, Orientalism was in fashion. The 1909 Paris debut of the Ballets Russes with its costumes by Leon Bakst contributed to both the infamous jupes-culottes (known also as trouser-skirts and harem-skirts) and the so-called “lamp-shade tunic” (a short tunic-crinoline worn over a long, narrow skirt), as well as the use of brilliant colours and richly textured fabrics, turbans, aigrettes, beads and tassels.” Vallerie Steele, Fashion and Eroticism 1985 1910 - the “New Figure” – From as early as 1892 fashion houses in Paris were beginning to launch the New Figure on an unsuspecting world, but it took time to make the break with traditional Victorian Values. The uncomfortable extremes of the “S” Bend corset combined with high stiff collars created a fashion climate ready for some relief from Victorian styles. Relief came in the form of the “Harem Look.” Couturier Paul Poiret’s Orientalism stormed Paris successfully using the latest sales pitch, the catwalk show. Meanwhile the Russian Ballet’s costumes, designed by Leon Bakst, were a triumph in the theatre and so introduced Eastern harem influences that the West could live Most would attribute the fall of the corset directly to Paul Poiret’s fashion designs (others additionally site Chanel or Vionnet), reminiscent of the Directoire period (Regency or Empire look), which appealed to a youthful public looking for a change from the matronly Edwardian look. Having been trained at the best couture houses in Paris, those of Worth and Doucet, Poiret saw the need for a break from the past prudishness of the Victorians and introduced dresses styled on the exotic Far East. Ballet had never been so popular in Europe, not since 1830, and this was widely reflected in the work of painters like Degas. The Ballets Russes employed a painter named Leon Bakst to create costumes for exotic, lavish productions like “Scheherazade”, “Cleopatre” and “Tamar” displaying bright colours in romantic settings. The time was right for the public to be exposed to something new and to abandon the pastels and frou frou of the old guard. Such was the overwhelming acceptance of the sets and costumes of the touring Ballet Russes; interior designers, dressmakers and artists and the public were inspired and impressed. In addition, stage stars like the dancer Isadora Duncan took the new aesthetic to heart and happily presented herself in public without a corset, thus introducing the audience to something shocking and exciting. It must be said, though, the aristocracy and the nobility continued to maintain the use of corsetry through out the 20th century as a sign of good breeding, thought to set them apart from the lower orders. Poiret was possibly the first designer to see the value of shock tactics when presenting his work and can be compared today with advant garde catwalk displays. Poiret’s designs were so colourful, draped and tubular, they eventually influenced fashion for the masses as they “trickled down” to the High Street shop. His harem skirt and the hobble skirt, a floor length pencil skirt with no pleats or slits, would only have been worn by very few women at first but it’s impact on the rest of society was lasting with mass production and added pleating, side panels and slits. Such narrow skirts were adapted by many designers and the corset industry had to progress along with them in creating long narrow corsets with less accent on the waist and more on the hip and upper thigh areas. (fig. 44) Corsetry design and development must move alongside fashion trends in order to survive. In an even more youthful market, the use of “stay bands” for children, to protect them against the cold, had remained standard practice for about 2 hundred years. “A flannel binder should be worn round the stomach and abdomen next to the skin; it should be sufficiently wide to cover the whole of the belly from hips to chest, and long enough to go twice round the body.” Dr D.E. Lock, Medical Officer of Health for the Uxbridge Urban District Council The use of stay bands and other forms of stiffened or corded vests would continue until the 1920’s but in 1908 Symingtons revolutionised children’s underwear by developing the “Liberty Bodice.” It was an instant success as a soft, lightweight, warm knitted cotton vest top which had front buttons for ease of dressing and tied fabric bands or “tapes” round it for support. No longer would children be required to use a boned garment or tight bindings, freedom or “liberty” of movement was the healthy way. Over 3 million bodices were produced and sold each year, eventually replacing children’s stay bands completely. The Liberty Bodice remained in use in England until the 1960’s (fig. 46) Even an adult version was introduced which can still be obtained in an orthopaedic form for the elderly. 1914-1918, the Great War, not only sped up the decline of the empire of the corset it also became the mother invention when materials for corsetry began to dwindle. Up to 75% of the metal components for corsetry manufacture were imported into the U.K. in addition to the vast amounts of fabrics from France and Belgium. The war forced the U.K. to rethink its manufacturing and export industry. Upgrading and expansion schemes were implemented to improve the financial gains to be made from a world wide export market, starting with the British It is interesting to note here that during the war, when raw materials like cotton and steel became scarce, the Germans resourcefully made use of pressed paper and twine products for undergarments! Recycling of materials was popular everywhere. Even old whalebone was taken out of umbrellas and strong pressed paper “Fibrone” was developed and used alternately with steel boning in corsets. When the supply of raw rubber from British plantations within the Empire became cut off, research surged forward into alternative man-made fabrics like rayon and new forms of elasticised fabrics. As the war pressed on, being fashionable was not considered important when your country needed you and so the progressive development of lingerie in the form of basic utilitarian undergarments was hastened. The brassier and short elastic girdle was by far more practical than any form of tight-lacing corset. The corsolette, which first made its appearance in America in 1919, combined the two. “The Warner Corselette combines a bandeau, an abdominal confiner, and four hose supporters in such a way to give you an unbroken line from shoulder to knee. As a corset house, we know, and as corset wearers, you know that no figure can long dispense with a corset and keep its lines. Yet there are figures and there are occasions which require less corsetry than others. We have developed for such occasions the Warner Corselette.” Contemporary magazine Novenber 1921 The joining of a long-line bra and high waisted girdle, with very light boning and elastic panels, was an instant success and has been worn by generations of “full figured gals” ever since. (fig. 47) In her book The History of the Corset, Emily Yooll explains, “Some schools of thought contend that all the control that is necessary can be exerted by means of a skilful cut, by stitching and reinforcement. Boning however, is the most popular method of control. This certainly applies so far as rigid corsetry is concerned. Elastic corsetry comes into another category, in which the varying degrees and direction of stretch in a cloth give greater or lesser control.” Emily Yooll was also the editor of the industry trade magazine Corsetry and Underwear Journal from 1935 to 1975. Speaking about the disappearance of the corset after the French Revolution and again after the Great War, the fashion historian James Laver points out that, “both epochs were periods of feminine emancipation, so that it almost looks as if the throwing away of the corset was a kind of symbolic gesture and that is precisely what it was. But while the women of 1800 wore no corsets at all, the women of the post-war period merely extracted the bones - that is, they wore a foundation garment which by previous standards would not have been considered a corset at all.” After “The War to End All Wars, ”the New Figure and new lifestyles constantly required new corset designs. Vulcanised rubber cloth was first used in 1911 to create a sports corset with less boning and in 1913 a dance corset (called “the tango”) claimed to prevent muscle fatigue. In peace time, between the two World Wars, dresses, corsets and undergarments became quite flimsy once more, in a shameless display of the natural body and glorification of youth culture much as during the Regency period. By 1923 sheets of rubber fabric were first used to create girdle foundations with exotic or vampish names like the “Madame X,” a sort of tube corset or “roll-on” girdle which no longer served to sculpt the figure, rather control it, as a slimming aid. This ideal did not really take off until the health and weight loss craze of the 1930’s but even today we still see ads in the back of magazine for such weight control garments which haven’t changed a bit. (fig. Inevitably, during the 1920’s, traditional rigid corsetry fell out of favour with the youth market. The fashionable figure just did not demand it. The accent was on youth and freedom and this meant “roll-on” and “step-in” girdles, made in the latest perforated rubber sheeting and elastic fabrics offering a modern image of comfort and convenience. (fig. 48) The new short, girdle-like garments were little more than glorified garter belts doing not much more than holding the stockings up, but in the 1930’s something a little more substantial was required and the corselet came into its own as only it could produce a figure worthy of the new, slinky figure hugging Jean Harlow style dresses. (fig. 49) A smooth unbroken line was the look, like Art Deco styling, sleek and modern. Corsetry now had to be sold to women without really being called corsetry. One did not wish to wear what one’s mother wore! Anything considered to be “old-fashioned” would not stand a chance in a young, health conscious market. Although still known in the trade as corsetry, this term generally referred to girdles, corselettes and brassieres. So-called real or rigid corsetry referred to garments that laced up with boning and a steel busk. They would also have to be made out of strong rigid fabric as opposed to the now well established elastic fabrics like Eclast, Wondastretch, Lustercale, Gripknit, Wondernet and Lastex. Advertising of these new elastic foundations called for names reflecting a youthful, modern active woman. Names like; Formfit, Radiante, Unda-fit, Sta-up-top, Fitu, Supacut and Flexees, calling to mind the control offered by these “miracle fabrics” with improved designs depending on the cut and shape for figure control. The word corset was not in the vocabulary of the young who lived in the age of the zipper. During the 20’s freedom and the excesses of youth took a toll on the feminine figure, as women were now able to eat and drink without the restriction of a rigid corset. The decadence of the 1920’s, lead directly to the 1930’s national craze for healthy pursuits, regular exercise and fashionable suntans. There was now an urgency to develop “healthy” designs for bras, girdles and corselettes, frantically trying to keep up with the mass market. New elastics could also be combined with hook and eye tape, zippers or, occasionally, lacing and a short busk to create garments with “comfort, not constriction,” gently moulding the figure and not the old push and pull treatment. Aiming at the health conscious market, surgical support was an ideal and successful sales tactic. Suggested reasons for use were; general wear, figure control, support of thin women, breast support, control for larger women, muscular or posture weakness, abdominal up lift, prescription cases, post-operative, visceroptosis (prolapsed abdomen), hernia and orthopaedic. Many sales assistants were experts in fitting garments and some companies even trained assistants in physiology and anatomy to reassure customers. The main surgical supplier in Great Britain and America was Camp. They also preached the importance of maternity corsetry for use in the support of the abdominal wall and protection of the foetus during pregnancy. It is quite true, however, that the use of maternity corsetry can improve posture and alleviate backache. Yet another corset would then be fitted for the postnatal period, to bring back the As the craze for health gained momentum, brands like Slimtex and Vita-flex promoted their rubber reducing girdles made in lightweight, perforated rubber sheeting, guaranteed not to split, peel or crack. In 1937 Corsets Silhouette Company in Great Britain advertised the “Silhouette Radiante” corset range for about a year. These foundation ads claimed that they were made with fabric “impregnated with radio-active elements – uranium, thorium and radium” and were said to “give a feeling of energy and fitness and a resistance to The rigid lacing corset, known for the past three centuries, was almost extinct thanks to the popularity of the naturally slim waist, a healthy figure and loose fitting garments. Despite all this, society still considered it to be indecent for a lady to appear in public without a foundation garment of some sort. The slightest hint of a “cheek cleft” under a slim fitting dress would be classified as indecent exposure! In 1939 there was indeed a resurgence in back lacing corsetry caused by a brief fashion swing towards the “nipped-in waist” thanks in particular to the Mainbocher corset. The “Waltz Waist” was a pale pink, back-lacing corset designed by couturier Mainbocher and was beautifully photographed in a neo classical pose. (fig.51) This photo was the shot heard round the fashion world and many designers took the lead to return to small waists (the new “figure of eight” silhouette) in their Fall collections of 1939. But as early as March 1938 the return of Victorian styling was announced. The “New Silhouette” or the fashionable “New Woman,” again encouraged a 21-inch waist with nostalgic, old-fashioned styled corsetry like the Bon Ton “little laced waist corset” from the USA. This trend may have lasted for quite a while if it had not been for the war and the manufacturing industry’s opinion that it was only an extreme fashion trend and merely a novelty. Designers like Worth, Molyneux, Balanciaga, and to a certain extent Schiaparelli, were using genuine influences from the Victorian era to create boned, tailored suites and evening gowns with bustles, waist cinchers and even hoops and crinolines in their designs. The new silhouette dictated by fashion produced a demand for some Edwardian styles to be brought back into production, but this time made predominantly in elastic with side zip fasteners. Designers saw a fresh market for their product by designing foundation garments specifically to be worn with their own gowns and suits. Mainbocher, the first, went on to produce a stylish collection of foundation garments with Warners in America in 1940. Dior did the same with Lily of France in the 1950’s and Schiaparelli produced her own through out the 1940’s & 50’s. War soon put an end to all of this frivolity….
<urn:uuid:907bdd7b-aaef-4ddd-9ad9-99319b26cb36>
CC-MAIN-2016-07
http://www.candsconstructions.com/pand3.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701152987.97/warc/CC-MAIN-20160205193912-00312-ip-10-236-182-209.ec2.internal.warc.gz
en
0.947835
3,867
2.71875
3
Tourette disorder (also known as Tourette syndrome) afflicts as many as one person in a hundred worldwide with potentially disabling symptoms including involuntary motor and vocal tics. However, researchers have so far failed to determine the cause of the disorder, and treatments have only limited effectiveness, in part because the genetics underlying the disorder have remained largely a mystery. Now, as reported online May 3, 2017 in Neuron, a consortium of top researchers -- led by scientists at UC San Francisco, Rutgers University, Massachusetts General Hospital, the University of Florida, and Yale School of Medicine -- has made a significant advance, identifying the first "high-confidence" risk gene for Tourette disorder as well as three other probable risk genes. These findings are a step forward in understanding the biology of the disorder, the authors said, which will aid in the search for better treatments. "In the clinic, I have seen again and again the frustration that patients and families experience because of our lack of understanding and the limitations of our current treatments. But we have now taken a major initial step forward in changing this reality, thanks to new genomic technologies and a very successful long term collaboration between clinicians and geneticists," said Matthew State, MD, PhD, Oberndorf Family Distinguished Professor and chair of the Department of Psychiatry at UCSF and a co-senior author on the new paper. Studying Rare Variants to Illuminate Disease Biology For their new paper, the researchers used an approach that State and colleagues have pioneered in studies of the genetic basis of autism spectrum disorders, and which has led to important discoveries in that field over the past five years. As in this earlier research, the scientists involved in the Neuron study compared the protein-coding regions of the genomes of children with Tourette disorder to the genomes of their parents to identify so-called de novo variants -- rare genetic mutations that are not inherited from parents, but rather occur spontaneously at conception. De novo variants often have stronger biological effects than inherited variants passed from generation to generation, said Jeremy Willsey, PhD, an assistant professor of psychiatry at UCSF and co-lead author of the new paper. "We study de novo variants even though they are rare because they generally have more extreme effects than inherited mutations and can provide us much information about the underlying causes of a disease," Willsey said. "This also translates to developing therapies: if these variants greatly increase a child's risk of Tourette disorder, we would expect that understanding these changes could potentially lead to very effective treatments for the disorder." The team analyzed genomic data from 311 "trios" -- children with Tourette disorder and their parents, most of whom were unaffected by the disorder -- collected by the Tourette International Collaborative Genetics group (TIC Genetics), and found strong evidence that de novo variants can play a significant role in triggering the disorder. To be certain of what they were seeing, the team conducted a replication study in 173 trios from the Tourette Association of America International Consortium for Genetics (TAAICG), and found the same results. Extrapolating from the number of de novo variants they observed in these relatively small datasets, the researchers were able to estimate that approximately 12 percent of Tourette disorder cases are likely to involve de novo variants, and that these variants probably strike about 400 different key risk genes. Four Brain-Expressed Genes are Likely Tourette Disorder Risk Factors In order to gain sufficient statistical power to identify specific genes in which de novo variants disrupt function and contribute to risk of Tourette disorder, the researchers combined the genetic data from the TIC Genetics and TSAICG cohorts -- a complex effort led by State, Willsey, and their team at UCSF. The resulting dataset allowed the researchers to zero in on four genes expressed in the brain in which de novo variants were significantly associated with the disorder. This analysis identified variants of the gene WWC1, also called KIBRA (for "KIdney- and BRAin-expressed protein) -- which is involved in brain development, memory, and the brain's response to the hormone estrogen -- as having a greater than 90 percent probability of contributing to Tourette disorder. Three other genes were flagged as having at least 70 percent probability of contributing to the disorder. Of these, two -- FN1 and CELSR3 -- are also known to be involved in the development of brain circuitry. The third probable risk gene, called NIPBL or Delangin, is involved in regulation of gene expression in the brain, and has previously been associated with the developmental disorder Cornelia de Lange syndrome, as well as anxiety, obsessive-compulsive disorder, and attention-deficit/hyperactivity disorder in humans. The authors anticipate that future studies of de novo variants in a larger number of families affected by Tourette disorder will result in dozens more promising genetic leads, just as State and colleagues have been able to generate for autism spectrum disorders: those findings are driving an explosion in research into the biology of autism that was not possible before the identification of these molecular clues. "We've now done in Tourette disorder what we began five years ago in autism spectrum disorders. These findings shows that Tourette disorder has same path forward, which means there is a very bright future for understanding genetics of the disorder," said State, who is also director of the Langley Porter Psychiatric Institute and Hospital at UCSF and a member of the Steering Committee for the UCSF Weill Institute for Neurosciences. "The very first study I did as a geneticist was of Tourette disorder, so this has been a 20-year odyssey -- and it is deeply gratifying to see this long-term effort across multiple sites and countries lead to real progress." Close Collaboration Between Geneticists, Clinicians Made Study Possible The new study represents a collaborative effort across the two international Tourette disorder genetics consortia: TIC Genetics, founded by State and Jay Tischfield, PhD, of Rutgers, and now led by State, Tischfield and Gary Heiman, PhD, also at Rutgers; and the TSAICG, led by Jeremiah Scharf, MD, PhD, of Massachusetts General Hospital and Carol Mathews, MD, of the University of Florida. Tischfield, Heiman, Scharf, and Mathews are all co-senior authors of the new paper. "The success of this project, and the identification of an increased burden of rare variants in Tourette disorder reinforces the importance of collaborative science and open data sharing, to which both consortia are strongly committed," Scharf and Matthews wrote in an email. The study also depended on a tight collaboration between genetic researchers and the clinicians who work directly with the patients and families whose DNA were central to the new findings, State said. "Our collaborators in this effort are all clinical experts, deeply devoted to Tourette patients and families, in the U.S., Europe and Asia, all of whom have tenaciously worked to keep this project moving forward over the last seven years." Thomas V. Fernandez, MD, of the Yale School of Medicine's Child Study Center and Department of Psychiatry was co-lead author, with Willsey, of the new study. The research was funded by the National Institute of Mental Health (R01MH092290, R01MH092291, R01MH092292, R01MH092293, R01MH092513, R01MH092516, R01MH092520, R01MH092289, K23MH085057, K08MH099424) and the National Institute of Neurological Disorders and Stroke (U01NS40024-09S1, K02 NS085048) of the U.S. National Institutes of Health, as well as the Harvard Clinical and Translational Science Center, the Tourette Association of America, the New Jersey Center for Tourette Syndrome and Associated Disorders, and the Overlook International Fund. About UCSF: UC San Francisco (UCSF) is a leading university dedicated to promoting health worldwide through advanced biomedical research, graduate-level education in the life sciences and health professions, and excellence in patient care. It includes top-ranked graduate schools of dentistry, medicine, nursing and pharmacy; a graduate division with nationally renowned programs in basic, biomedical, translational and population sciences; and a preeminent biomedical research enterprise. It also includes UCSF Health, which comprises three top-ranked hospitals, UCSF Medical Center and UCSF Benioff Children's Hospitals in San Francisco and Oakland, and other partner and affiliated hospitals and healthcare providers throughout the Bay Area. Please visit http://www.
<urn:uuid:33c3e0dc-089a-4ca4-971a-3a6190e1e843>
CC-MAIN-2019-51
https://www.eurekalert.org/pub_releases/2017-05/uoc--fcr042817.php
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00058.warc.gz
en
0.949798
1,785
3.46875
3
Romances featuring the English hero Guy of Warwick were especially popular in France and England from the 13th to the 17th century. Warwick’s story survived in English broadside ballads up to the 19th century. The kernel of the story is a single combat in which Guy defeats Colbrand (a champion of the invading Danish kings Anlaf and Gonelaph), thereby delivering Winchester from Danish dominion. The Anlaf of the story is probably the Norwegian king Olaf I Tryggvason, who, with Sven Forkbeard of Denmark, invaded the southern counties of England in 993 and pitched his winter quarters at Southampton. Although the romance of Guy perhaps was inspired by some historical incident, Winchester was not in fact saved by the valor of an English champion but by the payment of money. The earliest French version of the tale probably dates from the 12th century; 13th-century versions survive in French and Anglo-Norman manuscripts. Four versions survive in English, as translations from the French or Anglo-Norman, the two earliest dating from about 1300. One of these has an appended sequel concerning Guy’s son Reinbrun. The strong religious interest of the legend as it survives makes it likely that it had passed through monastic hands. The romance is not distinguished by unity of structure or by grace of style and probably owed its popularity to its combined secular and religious elements, furthered in England by its patriotic appeal.
<urn:uuid:4fd8423b-e069-427c-9833-552b7c93ba1d>
CC-MAIN-2022-05
https://kids.britannica.com/students/article/Guy-of-Warwick/311554
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304217.55/warc/CC-MAIN-20220123081226-20220123111226-00012.warc.gz
en
0.974343
297
2.796875
3
|What's New||Products||Outlet||Buyer's Guides||Where to Buy||Blog||Support| Algorithm: A set of steps or procedures used to solve a specific problem. Algorithms are used in computer science to calculate and process data. In hard disk drive sanitization, algorithms include one-pass wipe, a three-pass wipe with verify, or seven-pass wipe as recommended by the Department of Defense. Asynchronous Duplication (also called Asynchronous Replication): The process of writing data to primary storage then duplicating the data to target memory or a disc-based storage. In asynchronous duplication, the process runs independently of other processes. Automatic start/stop (shredders): A safety feature on some shredders where the motor automatically starts or stops during operation. For instance, a paper jam would automatically stop the motor from running. Bootable Flash Drive: A USB flash drive that that stores a computer operating system (i.e., Windows, Linux, etc.) and allows you to boot your computer from the device. Boot sector: A section of computer hard disk drive other data storage device that contains code to initiate the boot process. HDD cloning typically performs a sector-by-sector copy, including partition and boot sector information, from a single source hard disk to target drives. Buffer Memory: The physical space on a computer hard drive that stores data while it is being transferred from one area to another. Blu-Ray Disc: A digital optical disc data storage format capable of storing high-definition video. Blu-Ray Discs can store a greater density of data than DVD discs. CE: Abbreviation for Consumer Electronics. Certified Sanitization: An accreditation given by an outside source to hard disk drive sanitizers. Certified Sanitation verifies that all data from the hard drive has been completely erased and are forensically CFast Card: Also known as CF-SATA, a CFast card is a compact flash storage device that uses Serial ATA technology for high speed processing. Cloning: In computing, cloning refers to copying the entire contents of a hard drive (including files, partition tables, master boot record files, etc.) to one or more computer hard drives. Compare: A verification function common in hard disc drive duplication that checks if the copies match the originals. Compact Disc (CD): A digital optical disc data storage format originally developed to store and play back sound recordings. CDs have been adapted for storage of data (CD-ROM) with multiple formats that include write-once audio and data storage (CD-R) and rewritable media (CD-RW). Compact Flash (CF) Cards: A storage device format typically used in portable electronics that uses flash memory or a hard disk to store data. A compact flash card can store pictures from a digital camera or other device, thus freeing up the device's own internal memory storage. Computer Connected: As applied to duplication and sanitation of hard disc drives and other store mediums, computer connected devices operate while connected to a computer. Cradle: A common term in hard drive duplication that refers to the docking station or holder that is connected to a duplicator so that data can be transferred. Crosscutting: A feature applied to shredders that are capable of cutting strips of into smaller pieces. Cross cutting offers a higher level of security by destroying sensitive data. dB: Abbreviation for decibel, a unit of measure for sound pressure levels or loudness. Digital Versatile Discs (DVD): DVD is a digital optical disc storage format with a higher storage capacity than compact discs. Often used for video playback and data storage, DVD-ROM discs can only be read and not written or erased. Blank recordable DVD discs (DVD-R and DVD+R) can be recorded once using a DVD whereas rewritable DVDs (DVD-RW, DVD+RW, and DVD-RAM) can be recorded and erased multiple times. Disc: Refers to an optical storage media, such CD, CD-ROM, DVD-ROM, DVD-RAM, or DVD video disc. Disk: Refers to magnetic storage media, such as a hard drive disk or external hard drive disk. Disc Capacity: The amount of memory a CD, DVD or Blu-ray optical disc is capable of storing. Disc Duplicator: A device that makes multiple copies of CD-R or DVD-R discs. There are simple units with two drives that require manual loading or automated units that can hold and copy hundreds of blank discs and print labels directly on the media. DoD: Abbreviation for Department of Defense, a department of the United States government that governs national security. DoD 5220/22-M seven-pass wipe: A Department of Defense standard for hard drive drive sanitization that includes a seven-pass overwriting wipe algorithm. Enterprise Drive: A class of hard disk drives designed to meet the needs of high-capacity server environment. Most Enterprise-class HDDs have high-tolerance internal parts to and high-tolerance for vibration, heat, and the other server-related environmental factors. Erase: In computing, erase means to wipe a hard drive or completely erase all of the information stored on a hard drive. Unlike deleting files where data is still accessible, to erase means all information on the hard drive is wiped clean and cannot be retrieved. Ethernet: A specified IEEE 802.3standard, Ethernet is the most commonly used local area network (LAN) technology that allows computers to communicate with one another. External Hard Drive: A portable storage device housed in its own enclosure and outside of the computer. Often used to back up computers, external hard drives can be attached to a computer through a USB, a FireWire connection or wirelessly and typically have high storage capacities. Fair and Accurate Credit Transactions Act (FACTA): A united States federal low established in of 2003 that allows consumers to obtain a free credit report once every 12 months from each of the three nationwide consumer credit reporting companies (Equifax, Experian and TransUnion). FAT16/32 (File Allocation Table for 16 and 32 bit): The name of a computer file system architecture and a family of industry standard file systems utilizing it. FCC: Abbreviation for Federal Communications Commission, an agency of the United States government that regulates communication by radio, television, wire, satellite, and cable. File: For computer storage, refers to information stored on a computer hard drive that is accessible through the use of various programs. File Copy: For duplication, file copy refers to a software suite function that allows user to duplicate from selected files on their hard drive. Firmware: In computing and electronic systems, firmware refers to software embedded into hardware. Examples of firmware include optical drives, remote controls or a DVD player where special memory stores the computer code for the device to functions. To keep hardware compatible with new media, manufacturers will often create firmware updates. Flash Drive: Also referred to as thumb drives, a USB flash drive is a portable data storage device that used flash memory and an integrated Universal Serial Bus (USB) interface. Flash Memory: A non-volatile computer storage medium that can be electrically erased and reprogrammed. Format Hard Disk Drive: The process of preparing a computer's hard disc drive for reading and writing. Formatting the drive erases all information on the disk, then tests that all sectors are reliable, checks for bad sectors and creates internal address tables that it later uses to locate information. Form Factor: In manufacturing, refers to the size and dimensions of a particular product. Gramm-Leach-Bliley Act (GLB Act): Also known as the Financial Modernization Act of 1999, GLBA is a federal law that requires financial institutions to explain their information-sharing practices to customers and to safeguard sensitive data. Hard Drive Docking Station: A dock or station that allows users to connect a 2.5"or 3.5" SATA hard drive to the USB port of in order to exchange large amounts of data. Docking stations also serve as a way to quickly connecting a new hard drive for test purposes. Hard Disk Drive Duplicator: A stand-alone or computer-connected device designed to make to copy data stored on one hard disk drive and then transfer an exact copy of that data to one more target hard disk drives. Many hard drive duplicators also include advanced features that allow users to format their drives, compare drive contents, and sanitize used drives. HDD : Abbreviation for hard disk drive, or the hardware that stores information such as software and files on a computer. HDD Bay: A hard disk drive bay is a standard-sized space for adding hardware to a computer. HDD bays can be fixed to the inside of a case or removable. HPA : Hidden Protected Area or Host Protected Area, HPA is an area located at the end of a hard disk that includes diagnostic tools, backup tools, and various booting and diagnostic utilities. Normally hidden from the operating system, the HPA of a hard disk drive will often contain a preloaded operating system to store software used by theft recovery and monitoring services. Internal Hard Drive: The primary storage device located inside a computer system that contains software applications, the operating system and other system files. Image Copy: Also known as imaging, image copying of a hard disk drive copies everything on the drive into a large, single, and compressed file that can be saved onto an external hard drive. MB/s: Abbreviation for Mega-bits per second. Multimedia Shredder: A document shredder that in addition to shredding paper can shred optical discs such as DVD and CDs. NSS: Non-Scratch SATA connectors. NTFS (New Technology File System): The default file system of Windows NT family. One-pass wipe: A hard disk drive that is sanitized with a one-wipe algorithm as opposed to multiple wipe methods. 1-pass is typically used for low security risk applications. Optical Disc Duplicator: A device that makes multiple copies of CD or DVD discs. There are simple units with two drives and units with up to 15 drives that require manual loading of discs. Automated units can hold and copy hundreds of blank discs and print labels directly on the media. Quick pass: Refers to a sanitization method where a quick, single-pass wipe overwrites hard disk drive data with random characters. Read Only: A type of storage medium that can be displayed but not copied, modified or deleted. Read/Write Speeds: A reference to how long it takes to read something from a drive (i.e., open a file stored on the drive), and how long it takes to save something on to the drive. RoHs: Stands for Restriction of Hazardous Substances. RoHs is a set of standards instituted by the European Union (EU) that regulate the use of toxic materials in products. Sanitization: In computing, sanitization refers to the process of wiping a hard disk drive or solid state drive or all data. There are multiple levels of sanitization including Secure Erase, quick, 1-pass, 3-pass, 3-pass with verify, and DoD 7-pass. Sarbanes-Oxley Act (SOX): A federal law that mandates financial disclosures from corporations and sets rules to prevent accounting fraud, accounting errors and fraudulent practices. SATA Drive: Stands for Serial Advanced Technology Attachment, which is the current standard technology for connecting a hard drive or SSD to a computer. Secure Erase: A method of sanitation classified as "purge technology." Secure Erase makes use of the hard drive's own built-in utility for purging the data completely and is classified as the US Guidelines for Media Sanitization in the National Institute for Standards and Technology's Special Publication 800-88. Source Drive: The hard disk drive, solid state drive, flash drive or other storage medium where data is retrieved. Solid State Drive (SSD): An SSD is a nonvolatile storage device that stores data on solid-state flash memory as opposed to a rotating disk as is the case with hard disk drives. With SSDs, there are no moving parts. Stand - Alone Device: A device and does not require a computer to operate. Strip cutting: A feature applied to shredders that are capable of cutting documents into strips. Strip cutting offers a lower level of security than cross cutting. Three-pass wipe: Refers to a sanitization method where the drive is wiped (i.e., recorded over with random data) three times. Terabyte (TB): A measure of computer storage capacity equal to a trillion bytes or a thousand gigabyte. USB Duplicator: A stand-alone or computer connected device that copies the data from a source USB flash drive or USB solid state drive to multiple USB target drives.
<urn:uuid:4eb228e7-a0eb-4b74-8e5b-e48d86491be1>
CC-MAIN-2019-43
https://www.aleratec.com/glossary-of-terms.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987835748.66/warc/CC-MAIN-20191023173708-20191023201208-00181.warc.gz
en
0.900286
2,704
3.46875
3
Nana Assenso stands at the grave of his uncle, remembering the man he loved but also a past that has haunted his family for generations. His uncle was called Kwame Badu, a name that has been passed on through the family in remembrance of an ancestor with that name who was captured and sold into slavery long, long ago. "Growing up, I was told the story of two of my great-great-grand-uncles Kwame Badu and Kofi Aboagye who were captured and sold into slavery," says Assenso, 68, the chief of Adidwan, a village in Ghana's interior. He followed the family tradition and named his youngest son Kwame Badu. This month marks 400 years since the first recorded enslaved Africans arrived in North America to work plantations in English colonies. In the centuries after, European slave traders shipped millions of African men, women and children across the Atlantic Ocean. Many died in horrific conditions on the slave boats, while survivors endured a life of misery and backbreaking farm work. For some of them, the terrible journey began here, deep inside Ghana. Captured by slavers, they were marched along dirt tracks for 125 miles to slave castles perched on the Atlantic Coast, where they boarded ships for North America. They never saw their homeland again. From here in Adidwan, the slaves were forced south, passing through the gold-mining town of Obuasi. Kwaku Agyei is a pastor and elder in Obuasi. He tells the story of the slave trade to young workers in his neighborhood, the indignity of it mixed with pride in his ancestors. "They captured us because they realized we were very strong," the 71-year-old says. "They sent our ancestors to work on sugar plantations. The slave trade made us realize that the white man was cruel." But many rulers of West African empires, such as the Ashanti kingdom, whose descendants still live in this part of modern-day Ghana, also profited, selling captured slaves in exchange for guns, cloth, alcohol and other Western manufactured goods. "Our elders exchanged their children for 'nice things' like matchboxes," Agyei says. But once again, his pride in his heritage shows through. "I can say our ancestors were the ones who developed America," he says. Abdul Sumud Shaibu, 50, also lives in Obuasi and tells of his strong ancestors. He shows a photograph of his grandfather that he saved to his mobile phone. "My ancestors were giants," he says. "They were well-built and strong. Look at the height of my grandfather in this picture." They did battle with slave raiders, he says. In those fights, sometimes they lost. And sometimes they were captured into slavery. Near the journey's end in Ghana, the captives were given a last, ritual bath in a river before being sold. Today, the Assin Manso site is a sacred place of remembrance. In this area of mangrove swamps, an image of slaves chained by the feet promises, "Never again." In the river, 75-year-old New Yorker Regis Thomson sits within circle with five other women from her church and prayed. "When I think of what my ancestors had to go through ..." the US tourist says, adding that she would go back and tell of her experiences so today's children are made aware of their past. "We have a lot of work to do." After they bathed in the river, the captives were then taken on the final leg of their journey in Ghana, to the last place they'd ever see in their homeland: slave forts on the Atlantic like the Cape Coast and Elmina castles. Saviour Asante, 30, a hairdresser in Obuasi, had given little thought to slave history growing up. That changed with a visit to Cape Coast castle. "I cried the whole day," she says. "It was a very painful experience to hear these stories." From the castles, where European authorities lived in comfort right above the dungeons that held the slaves, the captured Africans walked through the Door of No Return onto the ships that would take them to America. By Siphiwe Sibeko and Francis Korokoro/Reuters Writing by Tim Cocks; Editing by Kari Howard
<urn:uuid:e592514f-dc5e-4588-8a8b-6ff3dccfb26b>
CC-MAIN-2020-29
https://www.pri.org/stories/2019-08-22/retracing-slave-route-ghana-400-years-later
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897027.14/warc/CC-MAIN-20200708124912-20200708154912-00062.warc.gz
en
0.981124
905
2.859375
3
List of Hottest and Coldest Planets in the Solar System Hottest and Coldest Planets in the Solar System There are two types of planets existing in the solar system, namely Terrestrial Planet (made up of rocks) and Giant planets (gas giants and ice giants). Two factors- the structure of the planets and their distances from the sun determine the temperature of the planets. There is also another determining factor of the nature and composition of the planets, that is, the amount of heat radiated by the planets as well as the heat retained by them. The hottest and coldest planets of the solar system along with their temperatures and few other things are discussed in the following essay. Hottest and Coldest Planets The average temperature of Venus is 464 degree Celsius. It is the hottest planet in the solar system and the second nearest from the Sun. The average temperature of Mercury is 167 degree Celsius. It is the first nearest planet from the Sun and the second hottest planet in the solar system. The range of temperature of the planet is -93 degree Celsius to 427 degree Celsius. The third planet from the Sun with an average temperature of 15 degree Celsius is our very own planet Earth. Mars is the fourth planet from the Sun with an average temperature of -65 degree Celsius. Mars is made up of rocks which mean it is a terrestrial planet. Jupiter is the fifth planet from the sun. It is the largest planet in the solar system with an average temperature of -110 degree Celsius. The components of the atmosphere of the planet are ammonia crystals and possible ammonium hydrosulphide. The sixth planet from the Sun with an average temperature of -140 degree Celsius is Saturn. It is the second-largest planet in the solar system after Jupiter. Uranus is the seventh planet from the Sun with an average temperature of -195 degree Celsius. It is the third-largest planet according to the radius and fourth-largest planet according to the mass. The major feature of the planet is it contains ‘ices’ like water, ammonia and methane along with traces of other hydrocarbons. Neptune is the eighth and furthest known planet from the Sun with an average temperature of -200 degree Celsius. The density of the giant planet Neptune is the maximum in the solar system. It is the fourth-largest planet according to the diameter. Pluto is known as the dwarf planet in the Kuiper Belt, a surrounding of particles beyond Neptune. The average temperature of the planet is -225 degree Celsius. The atmosphere of the planet contains nitrogen, methane and carbon monoxide in an equal distribution with their ices. Thus the planets are categorised by their temperature, atmospheric ingredients, surface diameters and many other variables. The hottest planet in the solar system is Venus with an average temperature of 464 degree Celsius and the coldest planet in the solar system is Pluto with an average temperature of -225 degree Celsius. Scientists are trying to find out lives in several planets but are yet to achieve success.
<urn:uuid:fb0e09d0-03da-4384-a4d9-bbc6248907c2>
CC-MAIN-2023-14
https://www.vedantu.com/question-answer/list-of-hottest-and-coldest-planets-in-the-solar-system-5ecf56cdc27c8354fb0ca0c1
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949689.58/warc/CC-MAIN-20230331210803-20230401000803-00374.warc.gz
en
0.915829
667
3.375
3
Farming is risky business in Morocco, where a 30 percent drop in precipitation since 1970 makes steady, predictable annual crop yields virtually impossible. So the World Bank was called in to help implement Plan Maroc Vert – an ambitious initiative designed to boost the country’s cereal production and create a more sustainable agricultural sector by 2020. And though Morocco’s Berbers have long cultivated water management practices that sustained their crops, it turns out that direct seeding can substantially improve yields in an uncertain future. Planting directly in the soil Direct seeding involves planting seeds directly into the soil instead of nurturing seedlings in water-intensive nurseries beforehand. “…direct seeded plants are more likely to be able to reach moisture remaining in the soil after the rainy season has ended than those raised in plant nurseries because of their more extensive root system,” according to the Eden Initiative, which began promoting direct seeding in the Sahel in the 1990s. “They are therefore better able to tolerate drought,” they add. This is of particular importance to small farmers who have limited access to sophisticated irrigation systems, and where water supplies are intermittent, scarce and shared across various sectors. “Compared to traditional plowing and sowing, direct seeding (also known as “conservation agriculture” or “no-tillage”) allows for both increasing organic matter in soil and making the most of the limited rainfall,” Gabriella Izzi from the World Bank notes. “This is great for risk mitigation: while direct seeding and traditional seeding result in essentially the same yield in good years, when droughts occur, a crop planted by direct seeding can produce remarkably higher yields than those sown with traditional seeding.” Research and technology While other water-scarce countries in the Arab world are turning to land grabs to generate a sense of food security for the upcoming decades, Morocco is investing in its own country’s food production systems – a much more sustainable approach in the long term. And various sectors are pooling their resources to achieve these goals. “…associations of small farmers, public services, agencies, and research institutes, are working together to develop direct seeding in Morocco,” Izzi reports on MENA blog. “The establishment of associations allows for economies of scale among small farmers. The alignment of financial subsidies with applied research allows associations to access the state-of-the-art machinery needed for direct seeding,” she adds. As climate change escalates, with no sign of abatement in the foreseeable future, it is crucial for citizens and governments across the globe to start implementing sound adaptation strategies now – before it’s too late. And Morocco is ahead of the fold. :: MENA Blog
<urn:uuid:35b2dc47-5395-4f36-826c-35dbb4604e56>
CC-MAIN-2019-47
https://www.greenprophet.com/2013/04/direct-seeding-helps-moroccan-farmers-adapt-to-climate-change/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496664752.70/warc/CC-MAIN-20191112051214-20191112075214-00307.warc.gz
en
0.928313
589
3.609375
4
When it comes to the fear of sick people it’s first important we’re not confusing it with a number of closely related specific fears and phobias. Namely: A fear of sick people is a little different to the above. It’s about feeling overwhelmingly uncomfortable around sick people, not knowing what to say or how to act, becoming paranoid about catching the illness (even if it’s not contagious at all) and hence avoiding these situations completely. Yes … it can be associated with either or both Emetophobia or Nosophobia but it’s a very different fear in its own right. Being around sick people on some occasions in our lives is completely unavoidable. A loved one, a friend or family member may be ill and you are required to help or support. Paying a visit to someone close to you in hospital may be expected. When you think about it there’s lots of other scenarios too. To most people this doesn’t represent a problem. They visit to show sympathy, to help and to support. To them it’s natural to want to help with the recovery process and to bring a little happiness when it’s needed – often in the form of flowers and gifts. In other words, they know what to do, what to say and how to act. To others though this situation doesn’t bare thinking about. They feel intensely uncomfortable, they feel awkward, they don’t know what to do, say or how to act and they selfishly fear for their own health. Obviously, they know it’s irrational and want to be understanding and supportive and often hate themselves for feeling this way. The fact of the matter is that they can’t change and so avoidance is the best policy and this has a knock on effect of a deterioration in relationships. As to the cause of the fear of sick people – every case is different and cause wide ranging. As mentioned earlier, it could be as a result of another specific fear such as vomiting, illness or even a fear of hospitals. There could be a historical negative association with doctors, hospitals or medical centres behind the fear. It could be the fear of getting sick yourself. Or it could be an uncomfortable feeling or one of disgust in respect of bodily processes going wrong. Numerous other triggers, specific in each case, can also be behind the phobia. Symptoms very much vary depending on the severity of each case. As the fear of sick people is a form of anxiety traditional anxiety symptoms can manifest themselves. This includes: The list goes on … Perhaps the most important symptom is the intense desire to avoid the situation at all costs. This means that loved ones who need a visit, who expect you to be there to support and who want to see you can’t understand why the reluctance or why you don’t appear as though you want to be there. You weren’t born with particular fears or anxiety – instead you have developed them along your life journey so far. In very simple terms Hypnotherapy works by re-setting the mind to produce the rational response to a specific situation or environment that you had before the phobia was initially triggered off. Find Out More > Neuro-linguistic programming or NLP combines neurology and linguistics and creates a sort of programming that helps people change their thinking habits, help them deal with anxiety, stress, depression and overcome particular fears. In short, this means taking a specific fear or phobia and disassociating and reframing the experience to prevent the irrational response. Find Out More > In simple terms Cognitive Behavioural Therapy or CBT as it’s more commonly referrred to, is a talking therapy which takes your specific issue, fear or specific phobia and focusses on your thoughts, beliefs and attitudes and how they affect your behaviour and emotions in respect of this issue. It takes on the notion that your thoughts (cognition) creates emotions which, in turn, controls our reactions (behaviour). Find Out More > If the mere thought of being around anyone who is sick or ill fills you with fear and terror then take a look at one of our recommended, self-help treatment programs that are all guaranteed, proven and effective.
<urn:uuid:e4dded88-70db-4571-91d6-40dcea2b9c28>
CC-MAIN-2022-49
https://beatyourfears.com/specific-fears/fear-of-sick-people/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711376.47/warc/CC-MAIN-20221209011720-20221209041720-00847.warc.gz
en
0.952543
887
2.53125
3
Globally, 1.4 million patents were granted in 2017. China’s patent authority led the world in the number of patents granted with 420,144 and was followed by the US with 318,829, according to the WIPO. Highlights of the report- India related key facts: The number of patents granted by India shot up by 50% in 2017, keeping up a trend of steep increases. The patents granted by India increased from 8,248 in 2016 to 12,387 last year. Of the patents granted last year, 1,712 went to entities and individuals based in India, and 10,675 to foreigners. While India ranked 10th in the number of patents given last year, no Indian company or university figures in last year’s global list of the top 50 patent applicants. - The World Intellectual Property Organization (WIPO) is one of the 17 specialized agencies of the United Nations. - It was created in 1967 “to encourage creative activity, to promote the protection of intellectual property throughout the world.” - It has currently 188 member states, administers 26 international treaties, and is headquartered in Geneva, Switzerland. - Non-members are the states of Marshall Islands, Federated States of Micronesia, Nauru, Palau, Solomon Islands, South Sudan and Timor-Leste. Palestine has observer status. - India is a member of WIPO and party to several treaties administered by WIPO. Genesis of World Intellectual Property Organisation (WIPO) The origins of WIPO is traced back to 1883 during Paris Convention for the Protection of Industrial Property, when 14 countries signed Convention for the Protection of Industrial Property, Hence, from that convention the intellectual-property protections for inventions, trademarks, and industrial designs was created. WIPO was formally created by the Convention Establishing the World Intellectual Property Organization, which entered into force on April 26, 1970. Under this Convention, WIPO seeks to “promote the protection of intellectual property throughout the world.” It became a specialized agency of the UN in 1974. Purposes of World Intellectual Property Organisation (WIPO) To promote the protection of intellectual property on the globe the world through cooperation among states, and collaboration with any other international organization. To ensure administrative cooperation among the unions. Governing Bodies of World Intellectual Property Organisation (WIPO) It has four organs which are discussed below: General Assembly: It consists of all states party to the WIPO Convention that are also members of any of the unions. It meets every two years and has the highest authority of all the organs. Conference: It consists of all states party to the WIPO Convention, whether or not they are members of one or more of the unions. It meets every two years to discuss matters of general interest in the field of intellectual property, as well as to establish WIPO’s program of technical legal assistance and the budget for that program. Coordination Committee: It consisting of the States party to this Convention which are members of the Executive Committee of the Paris Union, or the Executive Committee of the Berne Union, or both. However, if either of these Executive Committees is composed of more than one-fourth of the number of the countries members of the Assembly which elected it, then such Executive Committee shall designate from among its members the States which will be members of the Coordination Committee, in such a way that their number shall not exceed the one-fourth referred to above, it being understood that the country on the territory of which the Organization has its headquarters shall not be included in the computation of the said one-fourth. Contributions of World Intellectual Property Organisation (WIPO) The WIPO has played a vital role in helping countries set up effective intellectual property regimes in all three areas patents, copyrights, and trademarks. As countries undertake the transition from state-run economies to market-driven ones, they see the necessity of a well-functioning intellectual property infrastructure. Hence, these countries see the advantages of joining the World Trade Organization; they seek the assistance of the WIPO in bringing their intellectual property regimes up to the required standards. PATENTS: The WIPO’s most recent endeavours in the patent area centre on the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs), which was negotiated in the Uruguay Round of the General Agreement on Tariffs and Trade (GATT). Although that agreement was negotiated outside of the framework of the WIPO, the officials involved expected at the outset that the WIPO given its institutional strength and special expertise would play a major role in its implementation. And indeed that has turned out to be the case. Through a specific memorandum of understanding between the WIPO and the World Trade Organization (the successor to GATT), the WIPO is undertaking a host of activities in support of the agreements reached on TRIPs. COPYRIGHTS: The WIPO administers several major treaties dealing with international protection of trademarks, including the Paris Convention, already mentioned, which assures the right of national treatment in trademark registrations, as well as protecting well-known marks from pirating worldwide.
<urn:uuid:2cfe1a91-f032-46f5-a58d-c8958e84291f>
CC-MAIN-2019-09
http://iasipstnpsc.in/world-intellectual-property-organisation-wipo/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247480622.9/warc/CC-MAIN-20190216145907-20190216171907-00401.warc.gz
en
0.944073
1,089
2.765625
3
- Category: Drought Tolerant - Mature Height: 3' - Mature Width: 4' - Light Requirements: Full Sun - Water Requirements: Moderate to Little Water - Hardiness Zones: 10, 11, 7, 8, 9 Lantana is woody and heavy flowering perennial, or annual depending on location, that is both reliable and beautiful in any landscape. Lantana is native to central and South America and is both heat and drought tolerant. Depending on use and hardiness zone, it can become a mid-sized evergreen shrub or a low sprawling ground cover. While it is perennial in many areas, it is also often used for annual color in landscape beds and containers. Some new hybrids have a very compact habit ideal for flower beds or narrow perennial borders. Lantana blooms profusely in varying shades of white, orange, red, yellow, pink, and purple; as well as mixed colors. The blooms attract a wide variety of butterflies to the garden. The most common lantana species include L. camara (shrub) and L. montevidensis (low-growing groundcover). There are many hybrids available. Lantana is fast growing plant that is typically disease and pest free. Be sure to plant Lantana in full sun for best bloom display. In the right conditions Lantana can reseed freely but its offspring are typically not true to variety. Lantana can tolerate poor soils but prefers well-draining soil and medium moisture.View Availability
<urn:uuid:80faf5bf-95c0-41dd-b7c1-57b5f4a3cf6e>
CC-MAIN-2022-21
https://www.tynursery.com/plant-library/item/lantana-hybrid-irene/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662543264.49/warc/CC-MAIN-20220522001016-20220522031016-00439.warc.gz
en
0.926477
318
2.75
3
Memantine is technically a moderate affinity NMDA-receptor antagonist used for Alzheimer patients to improve memory. It’s available in the USA, Europe, Mexico, and some countries in South America. It’s sold as Axura, Akatinol, Namenda and Ebixa. Memantine is now being used "off label" for both migraine and tension headache. In the case of migraine, it may be that the drug blocks the waves of electrical activity (cortical spreading depression – CSD) that spread across the brain during an attack. In a study published in the Journal of Headache and Pain, 66% of patients found significant relief after taking the drug. It was a small study, but it sounds hopeful. The study into CSD has an interesting side note. Studying mice, it was found that it was far easier to trigger CSD in females than in males. Since the "estrous cycle" was not taken into consideration in the study, it may be that this difference, if it holds true in humans, is not related to the menstrual cycle. So the reason why women get more migraines than men may be a lot more complex than hormones. Read more here – Why Women Get More Migraines Than Men from California’s UCLA. Can mice tell us anything about why women get migraine? Photo courtesy of beijinglaoda
<urn:uuid:9bad6bd9-e7bf-4a87-a7b8-6da53c0730cc>
CC-MAIN-2017-39
http://headacheandmigrainenews.com/memantine-for-migraine/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696681.94/warc/CC-MAIN-20170926193955-20170926213955-00682.warc.gz
en
0.928025
287
2.734375
3
Introduction to MATLAB for Engineers Introduction to MATLAB for Engineers, by William J. Palm III, is aimed at beginning engineering students and practicing engineers' who want to learn MATLAB. The text assumes no prior programming knowledge. Based on Professor Palm's experience in teaching MATLAB with freshmen, the text contains many examples of engineering applications of MATLAB. Several hundred homework problems and self-test exercises are included to provide practice in solving engineering problems with MATLAB. The text is also useful as a reference. Throughout the chapters are dozens of tables summarizing MATLAB functions. An appendix contains a master reference list of functions, organized by category. What people are saying - Write a review We haven't found any reviews in the usual places. 5 other sections not shown Other editions - View all Algebraic angle answer applications ASCII atan2 augmented matrix axes axis calculations cell array Chapter Click column vector Command window complex conjugate complex number containing corresponding costs create curve Data Structures determine diary dirname display elements engineering equations example exponentiation figure window filename format function file grid hyperbolic hyperbolic functions identity matrix imaginary unit input inverse label left-division method linear load logarithm loop M-file mathematical Matlab commands Matlab program Matlab session Matlab to find matrix inverse matrix multiplication menu meters minimum nonzero obtain Operations and Arrays output overdetermined systems plot command Plotting with Matlab polynomial problem pseudocode pseudoinverse radians RC circuit result returns roots row vector scalar script file shown in Figure sine solve spacing specified speed spreadsheet statement string structure array student subplot Suppose symbol syntax Table temperature Test Your Understanding tick-mark toolbox values versus voltage workspace variables zero All Book Search results » Modeling Tools for Environmental Engineers and Scientists No preview available - 2001
<urn:uuid:f0c54fb1-cb23-4996-9d51-01ec51c6428f>
CC-MAIN-2019-35
https://books.google.com/books/about/Introduction_to_MATLAB_for_engineers.html?id=m_xQAAAAMAAJ&hl=en
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314130.7/warc/CC-MAIN-20190818205919-20190818231919-00543.warc.gz
en
0.796523
365
3.140625
3
1 - 3 of 3 Results Across the Caribbean, there are millions of girls who could right now be learning from home – if only they were connected. On International Girls in ICT Day, we encourage governments not to leave these girls behind. UN Women joins all indigenous peoples everywhere, especially indigenous women and girls, in commemorating the International Day of the World’s Indigenous Peoples. This year’s theme of “Indigenous Languages” challenges us to ensure that indigenous women and girls have a voice—quite literally—in the diverse political, civil, social, economic and cultural spaces that they occupy. I welcome the focus on women and girls as the theme of this year’s World Telecommunication and Information Society Day.
<urn:uuid:67c43543-ad6b-4240-a560-f313f7258143>
CC-MAIN-2022-33
https://caribbean.unwomen.org/en/news-and-events/stories?f%5B0%5D=topic_stories%3A1390&f%5B1%5D=topic_stories%3A1818
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00185.warc.gz
en
0.917504
161
2.796875
3