text stringlengths 222 548k | id stringlengths 47 47 | dump stringclasses 95 values | url stringlengths 14 7.09k | file_path stringlengths 110 155 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 53 113k | score float64 2.52 5.03 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|
Table of Contents
A WAN (Wide Area Network or WAN, in English) is a type of computer network capable of covering distances from about 100 to about 1000 km, giving service to a country or continent. An example of this type of network would be RedIRIS, the Internet, or any network. Where not all of its members are in the same building (about the distance there is possible discussion). People make many WANs for a particular organization or company and are for private use. They produce others by Internet providers ( ISPs ) to provide connection to their customers.
Today the Internet provides high-speed WAN. The need for private WAN networks has become drastically less. While VPNs that use encryption and other techniques to make that network dedicated are continually increasing.
Typically the WAN is a point-to-point network, that is, a packet-switched network. WAN networks can use satellite or radio communication systems. It was the emergence of laptops and PDAs that brought the concept of wireless networks.
The WAN network infrastructure is made up and the switching nodes of high-performance transmission lines, characterized by their high speeds and bandwidth in most cases. Transmission lines (also called “circuits,” “channels,” or “trunks”) move information between the different nodes that make up the network.
The switching elements are also high-performance devices, as they must handle the amount of traffic that circulates through them. In general, these devices receive the data through an input line. And they must be in charge of choosing an output line to forward it. Each host is connected to a LAN network, which connects to one of the switching nodes of the WAN network. This node must be in charge of directing the information to the destination for which they need.
Before addressing the next topic, it is necessary to clarify the term switching. We could define it as how the nodes or interconnection elements guarantee two end systems’ interconnection to exchange information.
Also read: 2 Strategies to Improve Customer Service
However, before exploring the specific topologies used for WAN networks, it would be prudent to introduce the term topology briefly. The term topology has two fundamental aspects:
- Physical Topology
- Logical Topology
The physical topology refers to the physical shape or pattern formed by the nodes connected to the network, without specifying the type of device, the connectivity methods, or the network’s addresses. It is based on three fundamental basic shapes: bus, ring, and star.
For its part, the logical topology describes how we convert the data to a specific frame format and how they transmit electrical pulses through the communication medium. So this topology is directly related to the Layer Physics and the Link Layer of the OSI Model seen in previous classes. The most popular logical topologies are Ethernet and Token-Ring, both widely used in LAN networks. Among the logical topologies used for WAN networks, we have ATM (Asynchronous Transfer Mode), also known as the ATM standard. We will be talking about ATM later since it is necessary to explain other concepts before reaching it.
Their physical topology can become more complex in WAN networks and not respond to the primary forms due to several determining factors.
The enormous amount of users, the traffic they must support, and the diversity of interconnection equipment they must use. There is an established group of topologies that are the most used. Specific needs condition the implementation of each of them in particular, such as the number of nodes to connect, the distance between nodes, and the infrastructure in them. The topologies people use in WAN networks are below:
Point to Point
In this topology, each node is connected to another through dedicated circuits, channels that companies or institutions lease to telephone companies. These channels are always available for communication between the two points.
This configuration is only functional for small WANs since all nodes must participate in the traffic. If the number of nodes increases, the number of traffic increases, which has a consequent rise in the network’s cost.
In the ring topology, each node is connected to two others, forming a ring pattern. This topology has two advantages:
- If there is a problem with the connections in a cable, the information continues to reach the node using another route.
- If any node is very busy, the traffic can divert to other nodes.
Extending these networks is more expensive than developing a point-to-point network since at least one more link is vital.
In this configuration, one node acts as a central connection point for all the others. Also, allowing that the other nodes do not lose connection with the central node in the event of a failure in any of the cables. This topology’s main disadvantage is that any significant node problem becomes a total disaster for the network since we lose all the node’s connection. Know more about 9 inches in cm
In this topology, the essence is to seek the interconnection of the nodes. So that if one fails, the others can quickly and easily redirect the data. This topology is the one with the most fault tolerance because it is the one that provides the most paths through which data can travel from one point to another.
The main disadvantage of mesh-type networks is their cost, which is why we created an alternative. That is the partial mesh network in which the most critical nodes (through which more traffic passes) are interconnected with each other. Nodes are interconnected through another topology (star, ring).
To understand how nodes communicate in a WAN network, it is necessary to address an issue central to this network type.
In a company, there are usually many computers. Which need their printer to print reports, the data stored in one of the computers is very likely to be necessary for another of the company’s computers. So it will be essential to copy them in this, being able to produce lags between the data of two users. The occupation of the disk storage resources multiplies, the computers that work with the same data will have to have the same programs to handle said data, etc.
The solution to these problems is the local area network. It allows sharing databases, programs, and peripherals such as a modem, an ISDN card, a printer, etc. Making other means of communication available to us such as email and Chat. It allows us to carry out a distributed process. They can distribute the tasks in different nodes and will support us to integrate the methods and data of each of the users in a corporate work system. Having the possibility of centralizing information or procedures facilitates the administration and management of the teams.
Besides, a local area network involves significant savings, both in time, since information and they achieve work management. As well as money. Since it is not necessary to buy many peripherals, they consume less paper. And is a connection to the Internet can use by a single telephone or broadband connection sharing by several networking computers.
Also read: 29 Celsius to Fahrenheit
- KNOW MORE:- theehealthcar
Building A Robust Brand Narrative: The Role Of Ad Agencies
The Role Of Ad Agencies In today’s digital age, you’re bombarded with countless brand messages daily. With this saturated market,… | <urn:uuid:81d6f5e4-057a-457e-9b76-d058891c4b73> | CC-MAIN-2023-40 | https://www.themarketingpilot.com/what-is-wan/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00341.warc.gz | en | 0.942252 | 1,536 | 3.796875 | 4 |
Shakespeare’s “the Tempest,” the Chronicles of the New World, and E.S.O.L. Instruction, by Norine A. Polio
Guide Entry to 86.02.06:
According to many literary analysts, the basis for “The Tempest” was an account of an actual storm at sea as recorded in the Bermuda Pamphlets in 1609 and illustrates one of the ways in which Shakespeare’s work ties in with the discovery and development of the New World by European explorers. In addition to this particular historical reference, the play contains other elements found in the chronicles of the Indies, showing the influence on the playwright of the literature of the period pertaining to the newly expanded world. Both a detailed description of the Bermuda Pamphlets and parallel references in the chronicles of the Indies and related writings are contained in this curriculum unit in order to illustrate the historical perspective from which Shakespeare wrote. The play itself is analyzed by extracting sections with relatively simple vocabulary and high interest for the purpose of introducing students to the basic plot and suggesting oral and written language arts activities.
The particular emphasis placed in this unit is on Caliban and his relationship with his two language teachers, Prospero and Miranda. The play suggests that Caliban learned his first language from the European colonizers—I feel from a close reading of the text that he was instructed in a second language and because they couldn’t understand his “gabble,” his form of communication was considered worthless. This focus on language acquisition makes “The Tempest” particularly relevant to the E.S.O.L. instructor. When we witness the patronizing tone with which he is taught and his subsequent loss of self, the dark side of second language acquisition is portrayed and we are once again reminded of the importance of balancing the new language with the native tongue.
(Recommended for E.S.O.L. classes, grades 6-12; English literature classes, grades 6-12; Drama classes, grades 6-12; and History (Latin American) classes, grades 6-12)
ESL Teaching Drama Literature Bilingualism Hispanic Latin American | <urn:uuid:c20bdb28-4d86-4339-9ee8-c1616856d2a3> | CC-MAIN-2014-10 | http://yale.edu/ynhti/curriculum/guides/1986/2/86.02.06.x.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654438/warc/CC-MAIN-20140305060734-00067-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.955268 | 446 | 3.703125 | 4 |
Suicidality can be experienced by anyone, and it could be part of mental illness diagnosis or not. Approximately 90% of individuals who die by suicide experience a mental illness, making it an issue closely tied to what we do here at Art With Impact. There are infinite reasons why someone might feel like killing themselves is the only option. There are a number of factors that may put a person at risk of suicide, including: substance abuse, chronic medical illness, oppression due to an identity (such as race, gender, sexual orientation, religion, etc.), history of trauma, isolation, sleep deprivation and age (under 24 or above 65 are at a higher risk).
To reduce the risk of suicide, psychotherapy and medication can be used to help recognize unhealthy patterns of thinking and teach coping skills to deal with problems. Seeking treatment for underlying depression and anxiety through doctors or health professionals is essential, as is building social and peer support networks. The most important thing to remember is that you are not alone, and help is available. Call the National Suicide Prevention Lifeline at 1-800-273-8255.
If you are concerned about someone, talk with them and ask them directly if they are thinking about suicide and if they have a plan to end their life. If this is the case, connect with a crisis service and stay with the person, listening without judgement and telling them they are important and you care about them. | <urn:uuid:34a75850-803e-4976-b2bc-e7034871dd6a> | CC-MAIN-2022-27 | https://www.artwithimpact.org/resources/illness/suicide/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103639050.36/warc/CC-MAIN-20220629115352-20220629145352-00779.warc.gz | en | 0.957081 | 291 | 2.671875 | 3 |
Direct Tax Services
Select Your Location
Retail banking refers to banking that directly deals with individual customers by providing them basic banking services like savings bank accounts, mortgages, personal loans, debit cards, credit cards, and safe deposit boxes. Retail banks usually have a head office, coupled with a large number of branches in different locations to target a wide spectrum of customers. However, in addition to the above it also acts as providing services to retail customers, these banks often serve commercial businesses, as well.
Table of Contents
A retail banking which acts as a comprehensive financial service provider for retail clients, allowing them to purchase multiple financial instruments, under one roof. For a multiplicity of services like opening a savings account, taking a loan, applying for a credit card and may also inquire about potential banking products that they may need at a future date, which the bank can offer all the retail customers can approach the bank.
While some of the retail banks also venture into other services such as wealth management, private banking, retirement and brokerage accounts, which are often linked to core retail banking accounts for transactional ease.
Retail banks use the depositors’ funds to give loans. They make money by charging higher interest rates on loans than they pay on deposits. The banking system in India is regulated by the Reserve Bank of India (RBI), through the provisions of the Banking Regulation Act, 1949. Except for the smallest banks, it requires all other banks to keep around 10 percent of their deposits.
They are free to lend out the rest. At the end of each day, banks that are short of the Fed’s reserve requirement borrow from other banks to make up for the shortfall. This amount borrowed is called the fed funds.
Here are the following services offered by the Retail Banks:
The rising attention in retail banking in the developing economies can be illuminated on account of a few major developments. The first of them is the transitioning of the economies into the intermediate phase. In the early phase of the development of banking, the policymakers focused on ensuring the flow of bank credit to the productive sectors of the economy.
But over time, as the credit demand from the basic industrial and infrastructure sectors have somewhat, the regulators have become more accommodating in allowing the banks to lend even for consumption purposes. The additional development that has provided an enhancement to retail banking aspiration of banks is the availability of enabling technology.
Since retail banking requires mass production techniques, the advent of technology has enabled the banks to design appropriate technology-based delivery channels. Retail banking has also received a push from the regulators for inclusive growth in the wake of the global financial crisis.
The Governments across the worldview banks as the key component in furthering the cause of financial inclusion. India has also been endorsing a bank-led financial inclusion model and views retail mass banking as the stepping stone towards the achievement of universal financial inclusion.
The last, but not the least of the reasons for the growing interest in retail banking is the banks’ quest for new sources of revenue and new channels for profit. Slowly but surely, the banks have realized that the commerce for the poor anywhere in the world is more viable than the commerce for the rich and hence they view the excluded masses as a potential source of profit in the long-run. Commercial banks cannot ignore the adage that the “Future of Banking is Retail Banking.”
Also, Read: The Path to Profitable Growth in Retail Lending.
Consumer protection has been a recurring theme in my address today & the pricing of products and services in the banking system in India is non-transparent would be an understatement. There are charges for non-maintenance of minimum balance, charges for cheque return and there are charges even where no service has been provided – customers not conducting any transactions.
One can apprehend that bank charge the customer once for not maintaining the minimum balance that he was supposed. So much so that eventually his balance becomes negative. Why do they instead not inform him and close his account after the first instance or convert it to a basic savings account?
In fact, another disquieting feature in the pricing of products and services by banks and that is poor subsidizing the rich and banks do not mention the yields to the customers of their deposits or the operative borrowing cost for the customers on the lending products. Why can’t the banks advertise their Annual Equivalent Rates/ Annual Percentage Rates on their deposit and credit products respectively? For one’s retail banking model to be successful, your pricing should be non-discriminatory, risk-based, competitive and value added.
A vital import for the success of any business is the accurate, consistent and granular information about its various components. The information system in the Indian banks continues to be fundamental which leads to impressionistic decision making rather than information-based decision making. The banks even lack the basic information on how many customers they have and how many products they have. The data on segmental revenues and segments profits are not available with any granularity. Under the circumstances, the banks would find it very difficult to make their pricing risk-based. It is crucial, therefore, that if the retail banking has to be rolled out successfully, the banks would need to build an appropriate MIS.
Banks in the advanced countries have handled a substantial amount of penalties from the regulators for their failure to conduct satisfactory due diligence on their customers. In India, had to impose penalties on some of the banks for their failure to have proper due diligence on their customers. It is vital to understand and escalate KYC requirements in all appearances be it for the products on the asset side of the balance sheet or on the liability side. Banks would also need to be mindful of the KYC due diligence for the third-party products that they sell from their premises/through their delivery channel.
The retail banking comprises dealing with a huge number of customers over diverse delivery channels thereby creating significant vulnerabilities across banks’ systems. These vulnerabilities could be in the form of the inadequacy of internal guidelines or non-adherence by staff, inadequacy in the technology systems supplied by vendors, fraudulent practices employed by customers, hackers, etc.
While the banks have developed sufficient safeguards to deal with operational risk event associated with traditional delivery channels, it is the emergence of non-traditional delivery channels which are probable to be the pressure points for banks going frontward. This is already evident in a large number of technology-related frauds that we have witnessed across Indian banks in the past few years.
Though from a value viewpoint these frauds are not significant, still from an individual’s standpoint they are quite important. The banks will require to identify and manage risks arising from mis-selling etc. besides the other business risks like market risk, liquidity risk, interest rate risk, etc. Unless the banks address these issues quickly, even the low-value frauds would have the potential to cause reputational risk and unwarranted litigation for the banks. It is, thus, absolutely significant that the banks improve their risk management systems to address these vulnerabilities.
The retail banking space proved to be an escape of relative calm among the turmoil caused by the Financial Tsunami that the world continues to struggle with even today. The customer deposit gathered by retail banking represents an extremely important source of stable funding for most banks. It is essential for the banks to keep pushing the edges of innovation and experimentation in the retail banking space to survive and also to remain relevant. One of the most crucial elements of a strong customer-bank relationship is the bank’s understanding of customer needs and preferences.
However, with the massive increase in their size and their customer base, the banks have slowly drifted away from understanding their customers’ needs and preferences closely. Further, the rise of alternate delivery channels has necessitated that banks build their presence across all channels to offer their services to their customers. The challenges for the banks is to design products/systems which are channel/segment uncertain.
While retail banking offers remarkable opportunities for growth, the challenges are equally overwhelming. The demanding regulatory requirements on the consumer protection front, risks from a slowing global economy and increasing customer prospects mean that banks must innovate to grow. How far the mass retail banking of the future would be able to fulfill its socio-economic objectives would in a large measure depend upon the willingness of the banks to innovate and reform their business processes and structures for this cause.
It’s in the bank’s own interest to be active to the customer’s interests or else they might have to face rigid regulatory sanctions. In this Facebook and Twitter age, the banks cannot remain oblivious to the power of the social media which wields enough clout to forcibly reform the outliers through negative publicity. Only such retail banks, who inculcate ability to whip out innovative and differentiated products by harnessing cutting-edge technology, greatly improve their productivity and efficiency, bring a fair, transparent & non-discriminatory pricing & demonstrate a commitment towards fair treatment to their customers, would be able to survive and add value to the society.
Read More: Driving Revenue Growth in Retail Banking.
Experienced Finance and Legal Professional with 12+ Years of Experience in Legal, Finance, Fintech, Blockchain, and Revenue Management.
The Reserve Bank of India, in its press release dated June 8, 2023, issued Statement on Develop...
RBI released a developmental and regulatory policy statement on June 8, 2023. The objective of...
Financial Institutions called Asset Reconstruction Companies ("ARCs") reconstruct and securitis...
Any person booked for an offence under the Criminal Procedure Code (CrPc) / the Code would be r...
The Reserve Bank of India regulates Non-Banking Financial Companies in India, and they are subj...
The Reserve Bank of India regulates Non-banking Financial Companies in accordance with the RBI...
Incorporation of a Limited Liability Company (LLC) is an attractive choice for small business o...
The Reserve Bank of India (the Bank) issued Non-Banking Financial Companies Acceptance of Publi...
A few years ago, investing in traditional investment categories like shares, bonds, real estate...
Compared to other organisations, the corporate governance of Non-Banking Financial Companies is...
Are you human?: 8 + 7 =
Easy Payment Options Available No Spam. No Sharing. 100% Confidentiality
NBFC DSA denotes Non-Banking Financial Companies Direct Selling Agent. NBFC DSA Registration refers to the registra...
06 Sep, 2021
Non-banking finance companies are essential to the expansion of the economy since they give entrepreneurs loans to...
14 Apr, 2023
Red Herring Top 100 Asia enlists outstanding entrepreneurs and promising companies. It selects the award winners from approximately 2000 privately financed companies each year in the Asia. Since 1996, Red Herring has kept tabs on these up-and-comers. Red Herring editors were among the first to recognize that companies such as Google, Facebook, Kakao, Alibaba, Twitter, Rakuten, Salesforce.com, Xiaomi and YouTube would change the way we live and work.
Researchers have found out that organization using new technologies in their accounting and tax have better productivity as compared to those using the traditional methods. Complying with the recent technological trends in the accounting industry, Enterslice was formed to focus on the emerging start up companies and bring innovation in their traditional Chartered Accountants & Legal profession services, disrupt traditional Chartered Accountants practice mechanism & Lawyers.
Stay updated with all the latest legal updates. Just enter your email address and subscribe for free!
Chat on Whatsapp
Hey I'm Suman. Let's Talk! | <urn:uuid:90b442a2-2fd6-4251-af94-242d4d306fa0> | CC-MAIN-2023-23 | https://enterslice.com/learning/retail-banking-services-offered-bank/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00516.warc.gz | en | 0.951802 | 2,461 | 3.03125 | 3 |
A ritual known as Día de los Muertos, or Day of the Dead.
An opportunity for a party
Our HI Mexico General Manager, Geovanni, is planning to host a Día De Los Muertos party to raise funds in support of the Vida Project. This is sure to be a fantastic way to support our Vida families, and also to participate in one of their celebrations. Why not join the fun?
Consider hosting a party with a spooky Halloween or playful Día De Los Muertos theme or other event. You can use these simple recipes to get the party started. Use the documentary video to explain the details of the Vida project with your guests. Then, for those who want to share, we’ll post your party pictures and results here in early November.
More than 500 years ago, when the Spanish Conquistadors landed in what is now Mexico, they encountered natives practicing a ritual that seemed to mock death. It was a ritual the indigenous people had been practicing at least 3,000 years, a joyous occasion remembering ancestors and celebrating the continuity of life. It is believed that at this time the souls of the departed return to visit the living.
Unlike the Spaniards, who viewed death as the end of life, the natives viewed it as the continuation of life. Instead of fearing death, they embraced it. To them, life was a dream and only in death did they become truly awake.
Although the ritual has since been merged with Catholic theology, and moved so it coincides with All Saints’ Day and All Souls’ Day (Nov. 1 and 2), it still maintains the basic principles of the Aztec ritual. For instance, the skeleton is a strong symbol for both Halloween and Día de Los Muertos, yet the meaning is very different. For Día de Los Muertos, the skeleton represents the dead playfully mimicking the living. Skulls, kept as trophies by Aztecs and other Meso-American civilizations were used to symbolize death and rebirth and to honor the dead, believed to come back to visit during Dia de los Muertos. Today, people don wooden skull masks called calacas and dance in honor of their deceased relatives. The wooden skulls are also placed on altars that are dedicated to the dead. Sugar skulls, made with the names of the dead person on the forehead, are eaten by a relative or friend. It is a happy occasion for remembering pleasant times with departed family members.
In rural Mexico, people visit the cemetery where their loved ones are buried. They decorate gravesites with marigold flowers and candles. They bring toys for dead children and bottles of tequila to adults. They sit on picnic blankets next to gravesites and eat the favorite food of their loved ones.
Families also build altars in their homes, dedicating them to the dead. They surround these altars with flowers, food and pictures of the deceased. They light candles and place them next to the altar. | <urn:uuid:2962631d-b32f-48fb-9171-8948cef58c54> | CC-MAIN-2015-27 | http://www.himalayaninstitute.org/2012/10/10/a-ritual-known-as-dia-de-los-muertos-or-day-of-the-dead/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375099361.57/warc/CC-MAIN-20150627031819-00189-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.959691 | 620 | 2.828125 | 3 |
Grade 6 Science
The sixth grade curriculum will focus on structure and function through analyzing the macro- and microscopic world. Students will begin by learning Earth’s place in the universe. We will explore the Earth’s relationships in our solar system, galaxy and universe that depend on the forces around us including gravity and energy. Students will then focus on Geologic History and Biological Evolution. This will enable students to develop an understanding of how organisms, environments, and Earth’s surface have all changed over time. Students will discover the basic unit of life: cells. As students learn about the structure and function of the cell, they will transition to the organization of organisms and how body systems interact. Students will continue with the study of matter and its interactions, developing the tools and skills essential for inquiry based learning. Students will end the year with an understanding of the transfer of energy in the form of waves through different mediums. | <urn:uuid:a1e7bb40-082c-4535-b90e-ea19df62bb7e> | CC-MAIN-2020-50 | https://www.nmrsd.org/Page/842 | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141747887.95/warc/CC-MAIN-20201205135106-20201205165106-00322.warc.gz | en | 0.923354 | 187 | 3.78125 | 4 |
Thu Nov 1st, 2012 at 07:05:51 AM EST
The Imperial College, London, report that demolished fantasy forecasts for the UK of massive balancing needs supplied by use of Open Cycle Gas Turbines (OCGT), led to some discussion concerning the importance to the system of Combined Cycle Gas Turbines (CCGT). (See UK Wind Power "Debate" : Latest). Ernst & Young (commissioned by Spanish and Portuguese energy companies Acciona and EdP), have brought out a report throwing new light on the comparison between wind turbines and CCGTs, for the EU27 and for specific European countries.
Wind technology was selected as the reference renewable energy source in this study and is compared here to Combined Cycle Gas Turbine (CCGT). This is based on the idea that natural gas is progressively becoming a significant source of electricity generation due to lower CO2 emissions compared to other fossil fuels and to its price competitiveness. The analysis presented in this report could be extended to other renewable or conventional energy sources.
The present study provides insight on a number of costs and benefits of renewable energy policy measures, which are currently not systematically taken into account in the decision-making process:
► Job creation (direct and indirect) of policy measures in the renewable energy sector
► Contribution to the GDP and additional tax revenues
► Energy security
► Integration of wind capacities on the network
► Environmental externalities (CO2 emissions)
► Impact of wind power on electricity pool prices
Several existing studies have analysed the respective Levelized Cost of Energy (LCOE) of these two technologies but did not include a comprehensive analysis of their additional economic costs or benefits.
Value Creation of Renewable Energy Policies (pdf)
In other words, comparisons based on the levelized cost, expressed in per MWh over the estimated lifetime of the capital investment, do not take into account positive and negative externalities that the report proposes to quantify.
(Added to the Wind Power series.)
Details and methodology can be found p.48 ff of the report. But this chart shows an overall synthesis of total costs and benefits for wind and CCGT across the EU27:
This reads from the outer edges - wind on the left, CCGT on the right - in to the middle, where the total costs are shown in euros/MWh. The two outer columns represent the LCOE: the standard metric used for comparison, according to which wind levelized costs are higher than CCGT levelized costs. Two LCOE items are common to both wind and CCGT, capital expenditure (CAPEX) and operating expenditure (OPEX). (It is the size of the capital investment that raises wind's LCOE, compared to the low capital outlay involved for CCGT). In addition, CCGT has fuel costs (zero for wind) and the cost of CO2 emissions (zero for wind).
In the next column moving in, are negative external costs that are added to the LCOEs. For wind, it is the cost of grid integration (not including connection to the grid, already included in CAPEX, see p.58 for details). For CCGT, security of fuel supply, or the "additional cost attributed to natural gas consumption due to the economic losses generated by price fluctuations" (see p.57).
The third columns moving in show the contribution of each technology to GDP (details from p.50 on):
- directly, via the expenditures necessary to building and operating the plant
- indirectly, via the additional activity of suppliers selling goods and services to the companies building and operating the plant
- through induced effects, via increased consumption from the additional income generated throughout the supply chain (Keynesian, that's K-e-y-n-e-s-i-a-n, multiplier)
The contribution to GDP is subtracted from the subtotal costs of the two outer columns. And the result, in yellow, shows a considerably higher cost per MWh for CCGT than for wind - since capital and operating expenditure for wind make a higher contribution to domestic GDP creation (while fuel costs for CCGT mostly contribute to GDP in gas-producing countries outside the EU27).
Along with estimating the contribution to domestic GDP, the report offers numbers for local job creation. These are presented under the same headings, Direct, Indirect, Induced, with the same logic as described above. For the EU27, this chart sums up the findings:
Tax revenues for each technology are calculated, under the headings VAT, Corporate tax, Local taxes, Income tax, Social taxes. As there is no common EU tax system, these estimations were made for specific countries only (details p.54 ff.)
The tax revenues mostly come from VAT and corporate taxes. Depending on domestic tax policy, social taxes can also be a significant
source from employees and employers.
More country studies
Ernst & Young carried out the same cost and benefit analysis as for the EU27, for the above six EU countries seen separately: Germany, France, Spain, Portugal, Poland, the UK. This chart sums up the net costs calculated for each of these countries, compared to the total EU27:
Merit Order Effect
The merit order effect by which renewables reduce wholesale electricity prices is briefly considered (p.44 ff), citing evidence we have previously seen from Germany, but presenting new estimations for Spain based on data from the Comisión Nacional de Energía.
From which it appears that wind power lowers prices, each year, by more than the cost of the subsidies allocated to wind (even though these rise in the aggregate as more wind capacity is built), resulting in net savings.
For five of the six countries studied, as for the EU27 taken as a whole, the net costs of wind are lower than the net costs of CCGT. Wind also creates more local jobs and contributes more tax revenue to national and local authorities. Through the merit order effect, it reduces electricity spot prices to an extent that "buys back" subsidies, if not more.
Case of the UK
The UK stands out among the six countries considered, as also against the overall EU27 numbers. The net costs of CCGT are lower than those of wind, (though in roughly the same bracket).
This results from the share of locally-produced fuel in total gas consumption: at 63% this is much higher than for the other countries considered, or for the overall EU27. Consequently, fuel purchases for CCGT contribute more to domestic GDP.
In terms of job creation, "the UK's gas plant value chain is more effective in creating new jobs": Ernst & Young estimate job.years per million euros invested as 9 for UK CCGT, 8 for UK wind.
Tax revenue generation is calculated as identical for the two technologies.
No evidence is offered concerning the merit order effect on spot prices in the UK.
Ernst & Young present (p.36 ff) further analysis on the influence of the load factor on net cost estimation. The load factor chosen for the wind estimation was 24%. However, UK wind net costs become cheaper than CCGT's with a wind load factor of >28%, or with a CCGT load factor of <48%. (By comparison, for the EU27, wind net costs are lower than CCGT's whatever the load factor of either technology).
In addition, the report presents (p.39 ff) a stress test on the future evolution of the domestic gas share in the UK (the main variable influencing CCGT net costs).
CCGT net costs rise above those of wind from 0.8% annual decrease in domestic gas share. A projection of that rate of decrease gives:
with a decrease in the domestic share of UK by more than 0.8 point/ year, the Net cost of wind will become lower than the net cost of CCGT. This scenario, in which UK will have a domestic share of 37 % in 2040, can be considered as realistic.
In other words, UK policy-makers would be ill advised to bet on gas against wind. | <urn:uuid:c2beb782-4100-4a15-928d-8383d6d14abf> | CC-MAIN-2018-09 | http://www.eurotrib.com/story/2012/11/1/65817/6658 | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815560.92/warc/CC-MAIN-20180224112708-20180224132708-00154.warc.gz | en | 0.942483 | 1,662 | 2.8125 | 3 |
Are You Getting Enough Exercise?
Clinical Herbalist Reviewed on March 21, 2010 by Paulina Nelega, RH
Posted in Blog
But for many Americans, exercise is not part of daily activity. And the result: we’re getting unhealthier, and unhealthier. Kids And Adults Getting Fatter
If we haven’t developed healthy exercise habits, we’re probably one of the almost 65% of all Americans who are overweight – or even obese, andrisk developing heart disease, diabetes, cancer, and death. The Body Mass Index is a measure of body fat based on height and weight, and overweight is defined as a BMI of 25 or higher; obesity is defined as a BMI of 30.
Scarily, many children in America are now at risk of developing these ailments at a very early age: in a new study published in the journal Health Affairs,nearly 1 in 3 children has a body mass index greater than normal. The American Heart Foundation advises that the following percentages of American children are overweight or obese:
For non-Hispanic whites, 31.9 percent of males and 29.5 percent of females.
For non-Hispanic blacks, 30.8 percent of males and 39.2 percent of females.
For Mexican Americans, 40.8 percent of males and 35.0 percent of females.
Health Risks Associated With Lack Of Exercise
As we’ve seen above, being overweight can cause a host of problems – from diabetes to heart disease. Somecommon ailments stemming from weight problems are:
- Coronary heart disease
- Type 2 diabetes
- Cancers (endometrial, breast, and colon)
- Hypertension (high blood pressure)
- Dyslipidemia (for example, high total chol
esterol or high levels of triglycerides)
- Liver and Gallbladder disease
- Sleep apnea and respiratory problems
- Osteoarthritis (a degeneration of cartilage and its underlying bone within a joint)
- Gynecological problems (abnormal menses, infertility)
People who are overweight or obese can significantly lower their risks, with one simple lifestyle change: exercising!
Why Are So Many Americans Overweight?
The Center For Disease Control calls American society ‘obesogenic,’ “characterized by environments that promote increased food intake, nonhealthful foods, and physical inactivity.”
In kids, eating high-calorie, sugar-filled foods, and spending too much time watching TV, videos, and playing video games all contribute to overweight/obese conditions.
It’s up to us to encourage policy makers to create initiatives that put healthier, affordable food and activity choices into our schools and communities. But we don’t have to wait for that to happen. It’s up to us to learn how to eat right and exercise, for life!
Reaching The Right Weight
It’s important to know how much you should weigh. If you’re not within the healthy weight range, it’s important to begin working towards that goal!
Experts advise that reducing caloric intake is the first step in reaching the right weight. Calories are a measurement of heat, which the body creates to burn food as fuel. You burn up to a certain amount of calories just by living every day, as every activity burns calories (even sleeping!), and depending on your height, weight, age and gender, you need a certain amount just to maintain your weight. Finding out how many calories you need to eat every day is easy: many calorie calculators can be found on-line, to help you determine how many you need to maintain, lose or gain weight.
If you take in more calories than your body can burn, your body stores the extra calories – and you gain weight. To burn more calories, you have to exercise. It’s simple!
How Much Exercise Do You Have To Do?
According to the Surgeon General, 30 minutes of moderate intensity exercise is advised per day on most, if not all, days of the week. And that’s just the minimum, all ages included.
For those who have a high BMI and are overweight or obese, it’s recommended that exercise programs be started gradually. Exercise is crucial in avoiding weight gain, and losing unhealthy pounds.
Photo by colros
How Can You Get It?
But for most overweight and obese individuals, heading to the gym can be an exercise in lowering self-esteem! Gyms can be intimidating, and often times equipment can be cumbersome and hard to use. Walking is one of the best ways to incorporate exercise into your daily life. Try a program like the 20% Boost Program, a program designed to help you take 10,000 steps per day. This can be the equivalent of the Surgeon Generals recommendation of 30 minutes of exercise per day – and can include the whole family!
If insecurity is not a problem, gyms and community centers can offer other exercise options:
Swimming: Swimming is a great exercise for obese people, since it’s practically non-impact and ease easy on the joints and the body. It provides resistance but supports the body, and feels great!
Recumbent Bikes: Exercise bikes designed with back support. These are easier and more comfortable to use than an upright bike.
Ultimately, the best way to live a healthier life is to get moving! Just 30 minutes of moderate exercise at least 4 days per week is enough to get your heart pumping, and your weight healthy.
Make the move to health!
Sign up for our newsletter and receive more articles and the latest health updates and special offers.
Paulina Nelega, RH, has been in private practice as a Clinical Herbalist for over 15 years. She has developed and taught courses in herbal medicine, and her articles on health have appeared in numerous publications. She is very passionate about the healing power of nature. Ask Dr. Jan | <urn:uuid:a6716f07-c82c-463b-b6b5-ded5ff135bb5> | CC-MAIN-2017-43 | http://www.naturalwellbeing.com/blog/are-you-getting-enough-exercise/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826840.85/warc/CC-MAIN-20171023221059-20171024001059-00647.warc.gz | en | 0.931786 | 1,242 | 2.96875 | 3 |
Risk of rapid North Atlantic cooling this century greater than previously thought
A study by scientists at the University of Southampton has found there is a 50 per cent probability of rapid cooling of the North Atlantic during the 21st century. Previous projections suggested that, if cooling takes place, it will be over a much longer period of time.
To evaluate the risk of this form of climate change occurring, researchers from the universities of Southampton and Bordeaux developed a new algorithm to analyse 40 climate models, which were originally examined by the Intergovernmental Panel on Climate Change (IPCC). The researchers’ findings are published in the journal Nature Communications.
Sybren Drijfhout, Professor in Physical Oceanography and Climate Physics at the University of Southampton, says: “The possibility of major climate change in the Atlantic region has long been recognised and has even been the subject of the Hollywood movie: The Day After Tomorrow. While no one is predicting the kind of rapid cooling and extreme events seen in the film, our study does sound a warning over climate change and the policies we adopt for the future.”
Current climate models all foresee a slowing of the Meridional Overturning Circulation (MOC) – the phenomenon behind the familiar Gulf Stream, which carries warm water from Florida to European shores. Slowing of MOC could lead to a dramatic, unprecedented disruption and cooling of the climate system.
In 2013, drawing on 40 climate change projections, the IPCC judged that this slowdown would occur gradually, over a long period of time and that fast cooling of the North Atlantic during this century was unlikely. The Southampton and Bordeaux project team (as part of the EU EMBRACE project), have re-examined these projections by focusing on a critical spot in the northwest North Atlantic, the Labrador Sea – which is host to a convection system (a circular motion of warm and cool water), which feeds into the ocean-wide MOC. The researchers then further focussed on the main factor triggering the convection system, ‘ocean stratification’ – the layering of water of varying densities. Once they isolated relevant models for this, they found 45 per cent predicted a rapid drop in North Atlantic temperatures in the coming century.
In the near future these results can be tested against real data from the Overturning in the Subpolar North Atlantic Program (OSNAP), whose teams will be anchoring scientific instruments within the subpolar gyre (an area of cyclonic ocean circulation). If these predictions are borne out and the North Atlantic waters do cool rapidly over the coming years, climate change adaptation policies for regions bordering the North Atlantic will have to account for this phenomenon. In particular, the predicted global mean temperature increase in 2100 will be 0.5°C less and over the UK more than 1°C less. | <urn:uuid:4dd3a5d5-1cd5-4d37-a75c-952d548e5367> | CC-MAIN-2017-13 | http://www.southampton.ac.uk/oes/news/2017/03/risk-of-rapid-north-atlantic-cooling.page | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218194600.27/warc/CC-MAIN-20170322212954-00162-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.931994 | 580 | 3.359375 | 3 |
Landowners complemented their estate business with interests in industrial and commercial ventures. This diversification was eased by the already close business links between landowners and City financiers. City financiers were also important in their own right as promoters if business ventures, especially railway companies. The railways were giant enterprises whose capital requirements outweighed those of all other businesses together. London bankers, especially Glyn Mills, acted as active promoters for railway companies and brought together the masses of ‘anonymous’ investors, many from the professions and many ‘widows and orphans’, who provided much of the railway capital.
The railway boom in the 1840s led to a situation where the 15 largest companies controlled 75 per cent of railway revenue and by the boom of the 1860s the top four companies had 44 per cent of revenue. As a result, from the 1860s many landowners began to take portfolio investments in the big main-line companies, a move away from their previous commitment only to local lines. The railway booms brought together some of the interests of the financial community and the landowners. But the development of railways was also to have an indirect impact on industrial funding. Limited liability had rarely been thought necessary by industrial entrepreneurs but, as the capital requirements of some industries increased, the trust and the partnership gave way to the joint-stock company. This enabled manufacturers to draw on a wider pool of capital and to provide for the various members of their families by issuing shares to them. By the mid-1860s about a thousand new joint-stock companies were being registered annually, though the majority were still run as partnerships. The spread of railway shareholding encouraged the growth of the London and provincial stock exchanges and so made it easier for expanding industrial enterprises to raise capital and for landowners to invest.
Concentrating industrial power
The move towards joint stock capital was associated with an increase in the levels of economic concentration. In the 1880s the hundred largest industrial firms accounted for less than ten per cent of the total market. However, a spate of company amalgamation led to greater concentrations in the 1890s as the increased merger activity outpaced the growth of the market. Companies were floated on the stock exchange and might then grow by taking over their competitors; or rival firms might join together to float a common holding company. The families whose firms were floated or merged at this time often retained the ordinary, voting, shares for themselves and allowed debentures and non-voting shares to be sold to the wider public. This, family control could be maintained on the basis of a relatively small capital investment. The flotation of firms allowed capital to be raised from outside the family circle; and the joint-stock form allowed family wealth to be diversified and so made more secure.
Large amalgamation of family firms occurred in a rapid burst between 1898 and 1900, but the rate of flotation and merger remained at a high level until 1914. These were, however, often hamstrung by attempts to maintain the autonomy of the constituent family firm, leaving the large firms as merely holding companies with no real control over their subsidiaries. The desire to maintain family control was paramount and could lead to difficulties in managing the newly created company. For example, in the fusion of 59 firms that produced the Calico Printers’ Association in 1899, each of the 84 directors on the board was determined to safeguard the interest of his original company that, in the majority of cases, was still under his management. Because of this situation of family loyalties and priorities, those larger companies that succeeded in adopting a more centralised structure were generally either those in which one constituent firm was considerably larger than the others, or those in which a particular family managed to subordinate its fellows in the struggle for control. The families who lost out in the struggle for the fewer positions of control in the amalgamated firms were faced with the choice of either retiring into land or politics (the gentleman’s route) or moving into new business ventures (the so-called player’s route).
Families that wished to leave business often decided to sell out to a company promoter prior to the stick exchange flotation. These families sometimes retained a stake in the firm but were not involved in active control. These promoters were often keen to recruit peers to the board of companies of the companies that they floated, feeling that a ‘lord on the board’ would help the sale of shares. From the 1870s landowners joined the boards of joint-stock companies and by 1896 a quarter of all peers had directorship. Many of these men would have been invited on to a board for decorative purposes but many landowners found their directorships to be a significant supplement to their income. They may even have performed a useful function for the companies since the managerial problems of large firms and the need for delegated administration was similar to those faced on their estates. Companies may even have benefited from the ‘managerial’ expertise of the landowners.
A concentration of wealth?
The declining return of agriculture as a proportion of the returns of the economy as a whole was aggravated by the agricultural depression of 1873-1896. Smaller landowners were hit far more severely than the larger landowners who had been able to diversify into non-agricultural activities. The squeeze that this exerted on the smaller landowners exacerbated the growing awareness and criticism of the accumulation of wealth in land, commerce and industry. The result of this controversy and criticism was the establishment of an official investigation to scotch the claim that the bulk of British land was owned by 30,000 people. In fact this backfired: the investigation discovered that the land was owned by a much smaller number of people.
The results of the survey for 1873 were published in the Returns of Owners of Land (the ‘New Domesday Book’) and, although there is some confusion in the various summaries of the Return, certain conclusions about the ownership of land are clear. First, 80 per cent of land was owned by 7,000 people, of whom 4,200 in England and Wales and 800 in Scotland held 1,000 acres or more. Secondly, among these people a total of 363 held 10,000 acres or more, 44 having 100,000 acres or more. Most of the largest estates were in Scotland: there were a total of 35 estates larger than 100,000 acres, of which the 25 Scottish estates accounted for a quarter of the Scottish land. Thirdly, in total the large landowners held about 24 per cent of the land, the smaller rentiers held about 55 per cent and owner-occupiers held a further 10 per cent with the Church of England and the Crown holding a similar amount. Finally, this national picture was repeated at local level: in East Anglia, for example, 350 people owned 55 per cent of the agricultural land in Norfolk, Suffolk and Cambridgeshire.
It is also possible to reach some conclusions about income from land. Of the 2,500 people with an annual rental income of £3,000 or more in 1873, 866 received an income of £10,000 or more and 76 received £50,000 or more. Sixteen people received a rental income in excess of £100,000, the largest incomes going to the Dukes of Norfolk and Buccleuch and the Marquess of Bute. Any attempt to construct a list of Britain’s richest people is complicated by the fact that there was not a perfect correlation between income and acreage. Only 7 people had both 100,000 acres and £100,000 annual income: the Dukes of Buccleuch, Devonshire, Northumberland, Portland and Sutherland, the Marquess of Bute and the Earl Fitzwilliam. The survey did not extend to the rental income derived from urban rents and the wealth if men such as the Duke of Westminster were underestimated.
To identify Britain’s richest landowners more closely it is necessary to include the Dukes of Norfolk and Westminster, who had large incomes from relatively small estates and six men with massive estates though receiving less than £100,000 rental: the Duke of Richmond, the Earls of Breadalbane, Fife and Seafield, Alexander Matheson and Sir James Matheson. These fifteen people constituted the core of the British landed class. The continuing overlap between the rich and the peerage is obvious. Of the 363 people with both £10,000 income and 10,000 acres, together holding almost a quarter of Britain’s land, 246 were members of the peerage; and a further 350 peers had smaller estates.
Landed wealth-holders 1809-1899
This table shows the estimate by Rubinstein of the numbers of landed millionaires and half-millionaires -- that is those leaving land valued at £500,000 or more on their death. It is clear that the number of landed millionaires fell considerably between the first and second half of the century. It is, however, important to recognise that the holding of land through settlements and trusts tended to result in an underestimation of landed wealth in studies based on land held at death.
The position of landowners in relation to wealthy merchants and industrialists was deteriorating significantly. In his researches for Capital, Marx tried to assess the number of industrial millionaires by analysing the returns for Succession Duty so as to discover the number of personal estates of more than £1m. He found no deceased millionaires for 1815-1825, eight for 1825-1855 and in the three years 1856-189 he found four. More recently Harold Perkin has estimated that there were, in 1850, 2,000 businessmen with profits of £3,000 or more; 338 of these people received £10,000 or more and 26 £50,000 or more. In 1867 the wealthiest 0.5 per cent of the population received 26.3 per cent of the total income. By 1880 the number of businessmen with Schedule D profits of £3,000 or more had risen to 5,000 of whom 987 received £10,000 or more and 77 £50,000 or more. By 1880 the commercial and manufacturing classes had overtaken the landed classes in economic terms.
Top British wealth-holders outside land 1809-1914
The financial sector consistently accounted for between 20 and 40 per cent of all non-landed millionaires. Within the manufacturing sector, textiles accounted for about 10 per cent (rather more in the earlier period) and metals accounted for the same percentage in both of the earlier periods and then fell away. It can be concluded that both of the main industries of the industrial revolution were well-represented among millionaires. In the later periods the food, drink and tobacco industries together accounted for about 20 per cent of all non-landed millionaires, and from 1858 the distributive trades accounted for one-tenth.
The wealthy men of land, commerce and manufacturing were drawing closer together during the Victorian period, though landowners still tended to deprecate merchants and manufacturers as ‘middle-class’ and concerned with ‘trade’. This status exclusion was made easier by the existence of a vast number of clerks, shopkeepers and tradesmen who were oriented towards the commercial and manufacturing classes and appeared to form a continuous social category with them. In fact, the economic gulf between them was immense.
It was the development in the scale of business activity and the emergence of the joint-stock company that brought into existence a class of salaried managers and administrators who occupied an increasingly important position in the class system. These ‘professionals’ were distinct from manual workers by virtue of their higher earnings, the ‘career’ nature of their work and their participation in the control and surveillance of the labour process but they were distinct from the capitalists themselves. They constituted a loose middle stratum below the main areas of privilege, but enjoyed superior life chances to the majority of the population. They were, however, dependent on the business and private actions of manufacturers and merchants and were also direct beneficiaries of the new form of property that the joint-stock company represented. Yet with the landowners, manufacturers and merchants, the intellectual property of the professions represented an important shift in the definition of property in late Victorian Britain. | <urn:uuid:d597bb58-fe60-47aa-a151-5b0ed66658c7> | CC-MAIN-2016-50 | http://richardjohnbr.blogspot.com/2008/08/aristocratic-elite-landowners-and.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541910.39/warc/CC-MAIN-20161202170901-00248-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.97398 | 2,497 | 3.125 | 3 |
Lithium-ion battery management
Hi everyone, this blog is about the battery management circuit of a typical Lithium-ion battery. If you want to make a simple Lithium-ion battery charger or a handy wireless stuff with charging enabled, you can use this very simple circuit.
Lithium-ion batteries are nice tiny shaped and sized and can be used very easily for making a battery based device or a remote control handy stuff without wires all over the place. You can get a normal phone lithium-ion battery, very easily in nearby mobile stores and use them in your project.
For the traditional Ni-Ca battery charging circuit we had to detect the temperature of the battery to know when to stop charging it. But if you charge the Li-ion battery with low current, you will not have to worry about the heat sensing to determine when to disconnect the charging. Some of the available Li-ion batteries do have a built in temperature sensor which sense the cell but that’s just for the protection of the battery not to detect that the cell is finished charging.
To charge them is really easy, there is only one thing to look at and thats the maximum charging voltage, its mostly either 4.1 or 4.2 volts. 4.2 Volts is most common in most of the Li-ion batteries. That’s also why most of the cellular modules have their VBAT or VDD 4 Volts.
Also the life of Lithium ion battery is directly proportional to the maximum voltage you charge them at, but don’t worry about it as our battery management chip handles it all.
Charging management IC selection
For your charging management IC selection, make sure you pick the right voltage chip, same as 4.1/4.2 Volts selectable. In the below circuit I have used a Microchip’s MCP73832 IC.
The Li-ion battery charging is mostly a two step process. Constant Current Mode and the Constant Voltage mode there is one more mode that is the Preconditioning mode but it is kept optional. The chip handles it all, but let me show you the characteristics as because it’s interesting.
The Y-axis has got the Volts and the X-axis has got the Time. The Green Curve is the battery voltage and the blue curve is the charging curent.
Now this is important if the battery is a 50mAH . Then it should be charged to the maximum of half of its ratings or 25mAmps. So here in this curve the 100%C is the 25mA for 50mAH battery. During a time period chip pushes the constant current and there after reduces exponentially for a period of constant voltage.
The Basic Charging Circuit :
Here I am showing you a basic charging circuit consists of a Microchip’s MCP73832 Chip and a few passive components. The MCP73832 has a maximum charging current of 500mAmps. There are various modules of MCP73832 chips these are AC/DC/AT1/AD. AC model is the most common of them all but refer datasheet for more info on other types.
The above design is just the basic design of Li-Ion charging, but issues arises when load is applied to the battery.
In preconditioning mode and Constant current modes the chip limit the current, suppose it is programmed to limit the current to 50mAmps and the load needs 45mAmps then the battery will get only 5mAmps of current to charge, and if the load asks for 60mA then it will rather start the battery to discharge. So if the load is attached then charging will never seem to finish. But no need to worry about it because we have a load sharing circuit too, that will just increase 3 more components.
The Load Sharing Circuitry:
The circuit disconnects the battery charging circuit and gets direct supply from the mains input. Below is the circuitry of load sharing based Li-ion battery charging.
The P-channel MOSFET works as a switch here. It behaves as open circuit when input supply is ON and works as a close circuit of battery and MCU when the supply is OFF.
The Schottky Diode is there for the isolation of both the live lines, the supply line and the backup line.The Reason behind using the MOSFET and the Schottky diode is that they both works on the quickest switching, that prevents the power loss.
There is some calculations needed to select the value of R2. Diode acts as a resistance say Rd
Rd = Vout / Id
=> Rd = 21K
It is recommended for the MOSFET’s gate to have a voltage of 1V, we name it as “Vtar“
R2 = Vtar* Rd/(Vtar)
R2 = 1*21K/(4.2-1)
R2 = 6.5K
The R2 Shouldn’t exceed 100K value.
So, the next time you design a product with a rechargeable solution, use Li-ion battery and this very simple circuitry consisting very low cost and easily available IC and easily available low cost Li-ion batteries.
Hope you enjoyed the blog. | <urn:uuid:dba7c1a5-8a55-433e-9044-ce6daa2611ec> | CC-MAIN-2019-35 | https://www.jellyfishtechnologies.com/blog/lithium-ion-battery-charger/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317037.24/warc/CC-MAIN-20190822084513-20190822110513-00349.warc.gz | en | 0.932048 | 1,099 | 2.609375 | 3 |
An undated handout photo received on February 6, 2014 shows a 1.5-metre (4ft 11ins) new species of giant jellyfish that washed up on a beach near Hobart near Tasmania. AFP PHOTO/Josie LIM
Your feedback is important to us!
We invite all our readers to share with us their views and comments about this article.
Disclaimer: Comments submitted by third parties on this site are the sole responsibility of the individual(s) whose content is submitted. The Daily Star accepts no responsibility for the content of comment(s), including, without limitation, any error, omission or inaccuracy therein. Please note that your email address will NOT appear on the site.
Alert: If you are facing problems with posting comments, please note that you must verify your email with Disqus prior to posting a comment. follow this link to make sure your account meets the requirements. (http://bit.ly/vDisqus)
Scientists were Thursday working to classify a new species of giant jellyfish that washed up on an Australian beach, describing it as a "whopper" that took their breath away.The 1.5-metre (4 foot 11 inch) specimen was found by a family in the southern state of Tasmania, who contacted a local marine biologist. Lisa Gershwin, a scientist with the government's Commonwealth Scientific and Industrial Research Organisation (CSIRO), said the type of jellyfish had been seen in the past, but never one so big and not one that became beached.
FOLLOW THIS ARTICLE | <urn:uuid:70ee767e-3ae9-41ad-8d26-0b5fc8029f05> | CC-MAIN-2018-05 | http://www.dailystar.com.lb/Culture/Lifestyle/2014/Feb-06/246567-mystery-giant-jellyfish-washes-up-in-australia.ashx | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889733.57/warc/CC-MAIN-20180120201828-20180120221828-00667.warc.gz | en | 0.952842 | 318 | 2.671875 | 3 |
The Oxford English Dictionary defines stigma as, “[a] mark of disgrace associated with a particular circumstance, quality or person,” and provides as synonyms “shame,” “dishonor,” and “humiliation.” Unlike outright discrimination, however, which is defined by and compensable in law, public shaming can be equally or more dangerous to the public well-being, yet remains largely unmeasured, unmonetized and, therefore, non-compensable.
There can be no real debate that HIV, despite its now being a manageable chronic illness and no longer a certain death sentence, still carries a stubborn, burdensome stigma. Some individuals with HIV also endure stigmas related to mental health status, homelessness, poverty, physical disability, drug and alcohol overuse, sex work, being formerly incarcerated, belonging to a marginalized community based on race, ethnicity, “lgbttqqipnb” (for those who favor a different set of consonants, please direct all complaints to the alphabet commission), immigration status, or religion.
These “stackable stigmas,” as I call them, provide significant barriers to ensuring not just the individual’s but also the public’s health. For example, a person who is transgender and believes (often rightfully) that when she seeks medical attention or counseling, she will be scorned, shamed, or simply face dangerous cultural incompetence, she is far less likely to have been tested for HIV and to access ongoing medical management that would allow her to remain HIV free (or to remain healthy if she has already acquired the virus), and therefore more likely to transmit the virus to others inadvertently.
Or imagine a teen-aged, gay African American living in a small town in the American South, in need of counseling for drug or alcohol overuse. Even if that young man could find public health services on his own (rather than use his parents’ insurance), he must still overcome real, justified, and paralyzing fear of being identified as gay in his home community. Being outed could lead to being disowned by family, friends, and faith community on the one hand, and even to violence, on the other. So, he continues to overuse drugs, which leads to his engaging in behaviors that place him at higher risk for acquiring HIV.
Imagine now a late-middle-aged, heterosexual white woman who is a wheelchair user. She repeatedly visits her doctor to seek treatment for a rash, sore throat, night sweats, and general flu-like symptoms. But, because she is a wheelchair user, the doctor assumes she is not sexually active and never tests her for HIV. Her HIV infection therefore may never be diagnosed, or diagnosed so late that the medical treatment that could have given her a normal, healthy life span, will now only be of marginal benefit.
These are but three examples of the hundreds of ways in which stigmas can negatively impact public health. Now that we finally have the medical tools to bring HIV to a close domestically, it is imperative to reduce and eventually eliminate stigma surrounding this medical condition as well as the stackable stigmas that often go with it.
I have called for a “re-branding” of HIV as a critical component of HIV stigma reduction. Unless we update the public’s understanding of the modern science of transmission reduction and elimination, and what it means to be a person living with HIV today, HIV stigma will remain unchallenged and unchanged. I therefore propose that a nationwide campaign be developed to re-brand HIV as “HIV 3.0” – the manageable chronic health condition that it is.
This re-branding is a critical first step, but it must be coupled with the development of a method for measuring and monetizing HIV stigma. We have made strides in reducing discrimination against those with HIV because we have the legal tools to measure, combat, and compensate for it. The same cannot be said of stigma. Building a legal construct for addressing stigma requires us to first define it, measure it, and monetize it.
One methodology for measuring HIV stigma is set out in the most recent update to the “National HIV/AIDS Strategy: Update to 2020 Indicator Supplement” (December 2016). The Update sets the goal of decreasing stigma among those diagnosed with HIV by at least 25% between 2015 and 2020. The Medical Monitoring Project survey (“stigma survey”) will be used to measure four areas:personalized stigma, disclosure concerns, negative self-image and perceived public attitudes about people with HIV. The survey also takes into account co-occurring conditions such as drug and alcohol over use and mental illness, among others, and the impact (stacking stigmas) that can accompany race, ethnicity, sexual orientation and gender identity. The results will be released by the CDC on an annual basis.
Having a scientifically accepted measure for HIV stigma is a critical first step is constructing a system where stigma itself, like its close cousin, discrimination, can become a compensable harm. It may also provide a template that can be used to measure other stigmas — especially those that, like HIV, involve a population of people attached on a regular basis to a medical or social service system. Such populations more readily generate enough data to have an impact.
Whether the legal system would support adding stigma as a compensable harm remains to be seen. In the meantime, the information that will be generated by the stigma survey over three years can be used to sculpt existing systems to reduce stigma by, for instance, making cultural competency a mandatory part of medical and social service education or a part of mandatory continuing education; providing increased online access to medical treatment and counseling for those concerned about confidentially in their home town; and ensuring confidentiality for young people accessing care through their parents insurance plans beginning at an agreed age.
On the cusp of bringing new HIV diagnoses to a close domestically, we cannot afford to take one step back. Not one. Re-branding this virus and eliminating the stigma surrounding it would be forceful and meaningful steps forward on this path to an AIDS-free generation. | <urn:uuid:f6e233c0-3219-49bd-b4fb-f7c43cf6d6a2> | CC-MAIN-2021-21 | https://www.cylindr.co/article/hiv-3-aug-2017/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988802.93/warc/CC-MAIN-20210507181103-20210507211103-00143.warc.gz | en | 0.955852 | 1,267 | 2.625 | 3 |
One of the big challenges of environmental law is that when laws are not properly written, people will inevitably find a way to get around them.
A case in point is Montana.
As it became apparent that groundwater use contributed to stream and lake declines, conflict between water users and environmental degradation, the State began to require permits for groundwater use.
But now, with water supply scarce and populations growing, it is no longer possible to get a permit in many parts of the state. The reason? There are already too many water users.
Montana has however, exempted individual wells from regulation. Homebuilders are taking advantage of this loophole and avoiding the permit process by building 100+-lot subdivisions and drilling a well for each home, the New York Times reports.
The likely outcome of this run-around the law is that in a few years, the state’s aquifers will be completely dried up and both newcomers and long-time residents — the permitted and exempt — will be without water.
Despite Montana’s glaring deficiencies, it is still far ahead of B.C.
B.C. has zero groundwater regulation. The province is, however, in the middle of a process to modernize its Water Act. Troublingly, the province has proposed a system that could lead to the very same problems Montana is experiencing.
B.C.’s goal for reforming the Water Act is groundwater regulation in “priority areas” for “large withdrawals.” This proposal is better than the current situation, but it is far from ideal. Groundwater and surface water are directly connected in most regions, and groundwater use should be regulated to at least the same extent as surface water use. | <urn:uuid:598892eb-3659-45ce-a25d-f18f9e9660e4> | CC-MAIN-2020-29 | https://ecojustice.ca/montana-a-cautionary-tale-for-bc/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657131734.89/warc/CC-MAIN-20200712051058-20200712081058-00325.warc.gz | en | 0.961099 | 352 | 3.171875 | 3 |
Gum disease is one of the most common dental conditions in the UK. Most people will suffer from a mild form of gum disease at some point in their life. However, left untreated it can lead to more serious conditions, including tooth loss. In fact, gum disease is the most common cause of tooth loss for patients in the UK.
The early form of gum disease is called gingivitis, and is caused by the build-up of plaque bacteria on your teeth. If plaque is not removed, it causes irritation to the gums, which may bleed and become painful and swollen.Signs of gingivitis include:
- Swollen or painful gums
- Blood on the toothbrush or in the sink when brushing your teeth
- Bad breath
- Receding gums
- Loose or drifting teeth
If you notice any of these symptoms, you should arrange to visit your dentist or hygienist straight away. Thoroughly cleaning your teeth to remove plaque and helping you develop an effective home cleaning regime will help treat the symptoms of gingivitis.
Regular visits to our hygienist, Anna McGlashan, will also help with the diagnosis of gum disease. As with any disease, the earlier it’s spotted, the easier treatment is, and the better the prognosis.
PeriodontitisLeft untreated, gingivitis will only get worse and can develop into the more serious form of gum disease, periodontitis. This can lead to complications including:
- Loose teeth
- Gum abscesses
- Tooth loss
Periodontitis and its complications may require more extensive treatment. At Meadowbank Dental Practice our associate dentist Dr Cristina Jimenez Mariscal has a special interest in treating periodontal conditions. | <urn:uuid:01fafa78-45a9-4e04-9d98-e1b37ff16410> | CC-MAIN-2021-39 | https://www.meadowbankdental.co.uk/gum-disease-edinburgh.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057733.53/warc/CC-MAIN-20210925172649-20210925202649-00649.warc.gz | en | 0.932549 | 368 | 3.203125 | 3 |
In today’s Programming Praxis problem we have to implement the straddling checkerboard cipher. Let’s get started.
We’ll need two imports:
import Data.Char import Data.List
Our alphabet for the checkerboard consists of letters and a space.
alphabet :: String alphabet = ['A'..'Z'] ++ " "
The algorithm cannot deal with anything other than letters, numbers or spaces.
clean :: String -> String clean = filter (`elem` alphabet ++ ['0'..'9']) . map toUpper
To create the checkerboard (without indices, since we need to the lookups both ways), we need to put the three extra spaces in the correct place and the numbers in the correct positions.
board :: String -> [Int] -> String board key = spaces (replace =<< nub (clean key ++ alphabet)) where spaces = foldl (\a x -> take x a ++ "_" ++ drop x a) replace c = c : (maybe "" id . lookup c $ zip alphabet (map show [1..9] ++ "0" : repeat ""))
As you can see below, encrypting and decrypting are really the same thing in this algorithm, only one adds and subtracts. So we factor out all of the work into one function. The reason for not making all the sub-functions into top-level functions is that it saves us from having to pass the five cipher parameters all over the place.
run :: (Int -> Int -> Int) -> String -> [Int] -> Int -> String -> String run op text ss add key = f $ show =<< zipWith (\a b -> mod (op (read [a]) b) 10) (toIndex =<< clean text) (cycle . map digitToInt $ show add) where f = f (a:xs) = if elem (digitToInt a) ss then fromIndex ([a], take 1 xs) ++ f (tail xs) else fromIndex ("" , [a] ) ++ f xs fromIndex = maybe "" return . look id toIndex = maybe "" (uncurry (++)) . look flip look dir k = lookup k . dir zip indices $ board key ss indices = [(y, show x) | y <- "" : map show ss, x <- [0..9]]
With that out of the way, encrypting and decrypting is trivial:
encipher :: String -> Int -> Int -> Int -> Int -> String -> String encipher xs s1 s2 s3 = run (+) xs [s1, s2, s3] decipher :: String -> Int -> Int -> Int -> Int -> String -> String decipher xs s1 s2 s3 = run (-) xs [s1, s2, s3]
Let’s see if our encryption works correctly:
main :: IO () main = do print $ go encipher "bonsai code" print $ go decipher "2B1ABA71OB1H2LBB" where go f text = f text 2 5 9 2641 "pablo picasso"
Yup. And at about a third of the Scheme solution size, I’d say that wraps things up nicely. | <urn:uuid:15b1d5d8-9fd7-42da-ad76-f24df45f98bc> | CC-MAIN-2014-23 | http://bonsaicode.wordpress.com/2010/01/29/programming-praxis-straddling-checkerboard/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997883905.99/warc/CC-MAIN-20140722025803-00146-ip-10-33-131-23.ec2.internal.warc.gz | en | 0.826967 | 695 | 3.84375 | 4 |
Replaces part of a text string with a different text string.
REPLACE("Spreadsheets", 1, 6, "Bed")
REPLACE(text, position, length, new_text)
text- The text, a part of which will be replaced.
position- The position where the replacement will begin (starting from 1).
length- The number of characters in the text to be replaced.
new_text- The text which will be inserted into the original text.
- This function returns text as the output. If a number is desired, try using the
VALUEfunction in conjunction with this function.
REGEXREPLACE: Replaces part of a text string with a different text string using regular expressions.
SUBSTITUTE: Replaces existing text with new text in a string. | <urn:uuid:0320eef0-3afd-406e-8547-243adcad4c0f> | CC-MAIN-2019-26 | https://support.google.com/docs/answer/3098247?hl=en&ref_topic=3105625 | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999261.43/warc/CC-MAIN-20190620145650-20190620171650-00282.warc.gz | en | 0.715823 | 171 | 3.84375 | 4 |
History of Ludington
In 1873, the city of Ludington was chartered, due in part to James Ludington and the money that he put into the cause. Another major player in Ludington's development was Eber Ward. The Ludington Lumber Company donated property to Ward's idea of getting a railroad into town. Ward himself secured some of this property and built two mills. He was also a proponent of developing a permanent link across Lake Michigan from Ludington to Wisconsin. He died before seeing his dream come to fruition, but in the years to come, Ludington's harbor would become home to the largest carferry fleet in the country.
In addition to James Ludington, the other influential figure in Ludington's history was Justus Stearns. The name may sound familiar, as both Stearns Motor Inn and Stearns Park and both names for him. Former companies that also bore his name were The Stearns Lighting & Power Company and the J.S. Stearns Salt and Lumber Company. He ran the Epworth Hotel for ten years and was known as a caring and involved employer. In the early 1900s, the need for a hospital in Ludington prompted Justus Stearns to open his own home for use as a hospital. In 1907, the Paulina Stearns hospital opened, named for his wife. Justus Stearns continued to support the hospital in the years to come, often stopping in and paying bills himself.
There's no other place in Ludington that depicts Mason County's history better than Historic White Pine Village. Set upon 13 acres overlooking Lake Michigan, this village contains many of the original buildings and truly shows what life was like in the 1800s. Many special events take place at the village from spring until fall, including Children's Day, Down on the Farm Day and Autumn Days.
Set to open sometime in 2015, the Port of Ludington Maritime Museum will be a real showcase for the city. Housed in the former U.S. Coast Guard Station along the channel, the Maritime Museum will feature a panorama of Pere Marquette Lake, a replica of both the Pere Marquette 22 carferry pilot house and the Ludington North Breakwater Lighthouse, plus some interactive exhibits.
More History in the Ludington Area...
For more activities & attractions, check out these additional links for Things to Do in West Michigan:
Have Fun in Manistee, Michigan -- Explore Manistee's historic downtown district and riverwalk, hike the Manistee National Forest, canoe on the Manistee River, and more.
Hamlin Lake -- Just 4 miles north of Ludington, Hamlin Lake is a great destination for boating, fishing and climbing dunes! The Hamlin Lake shoreline is also part of the Ludington State Park.
Silver Lake Sand Dunes -- Visiting the Silver Lake Sand Dunes makes for a terrific vacation because you can take your off-road vehicle for a spin on the scenic sand dunes overlooking Lake Michigan and Silver Lake.
Things to Do in Pentwater, Michigan -- Nothing is quite like the quaint, artsy, harbortown village of Pentwater. Don't miss the popular Charles Mears State Park beach on Pentwater's Lake Michigan shoreline.
Lots of Activities in Scottville, Michigan -- Explore the Riverside Park along the National Scenic Pere Marquette River.
Canoeing or Fishing on the Pere Marquette River -- Many boat liveries offer canoe rentals.
Also, check out West Michigan Guides and our locally produced WestMichigan.MichBiz.com directory for our largest lists of Things to Do in West Michigan. | <urn:uuid:972bf448-b2b1-4a8b-a9f3-ea461f933980> | CC-MAIN-2019-04 | http://www.westmichiganrestaurants.com/stories/history_of_ludington | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657470.23/warc/CC-MAIN-20190116113941-20190116135941-00468.warc.gz | en | 0.954567 | 750 | 2.671875 | 3 |
Michigan public schools are at a crossroads. By many measures, student academic achievement continues to flounder. Businesses, colleges, and universities are spending large sums of money on remedial education for students who never mastered the basic skills in the K-12 system. And polls reveal widespread dissatisfaction with public schools among parents.
Yet despite all these problems, efforts at serious reform are continuously being thwarted. Michigan's most recent attempt at changea voucher initiative to allow students trapped in failing schools a chance to attend other schoolswas defeated. Attempts to raise the legislative limit on charter schoolsan alternative preferred by many Michigan parentsalso have been rebuffed.
Why? It's not because the idea of greater school choice in the form of vouchers or charter schools lacks merit. No, the defeat of both of these reform measures is largely attributable to resistance from the teachers' unions, who every election cycle spend millions of dollarscollected through compulsory union duesto advance their special-interest political agenda.
The underlying obstacle facing real and necessary education reform, then, remains compulsory unionism in public education. No meaningful reform measure can be implemented under the current mandatory collective bargaining structure, which requires teachers to join or financially support a labor organizationeven if that organization promotes an agenda that conflicts with the best interests of students.
How did compulsory unionism come to dominate our schools in the first place? In the 1930s, Congress passed the National Labor Relations Act (NLRA) to allow private-sector employees to organize into labor unions. Congress, in its wisdom, chose not to extend the NLRA's provisions to public employees, believing such action was not in the public interest.
In 1947, Michigan passed the Public Employment Relations Act (PERA), which allowed state workers, including public school employees, to organize and enter into collective bargaining agreements. As a result, most of Michigan's public school employees are now bound by contract agreements that obligate them to join or financially support a labor organizationand its political and ideological positionsas a condition of employment.
Compulsory unionism not only acts as a barrier to education reform, it also hinders educators and the educational mission. Individual teacher desires and needs are overridden by the interests of the group, as determined by union officials. The result is that many talented teachers resign, and many more would-be teachers never go into education.
Clearly, it's time to replace compulsory unionism with a voluntary bargaining model, wherein teachers would have the option to join with others to participate in collective bargaining, but they would not be required to join or financially support a labor organization. Public school employees could negotiate terms of employment individually to best meet their unique needs.
Voluntary unionism also would give employees freedom to support the social, political, or ideological causes that they favor, rather than being forced to support causes they find offensive. And unions would be relieved of any representational responsibility toward teachers who opt out of the collective bargaining regime.
Voluntary unionism is not a radical approach to education reform. Gov. Engler, in an October 1993 address to the Legislature, declared that no teacher in Michigan should be compelled to join and pay dues to a labor organization as a condition of employment.
Seventeen states do not have compulsory unionism for public school teachers. Of those 17 states, 10 neither prohibit nor mandate collective bargaining, while seven go beyond what is being advocated here and actually prohibit collective bargaining for public school teachers.
A recent RAND Corporation study noted that Texas and North Carolina, states without compulsory unionism, have shown the most improvement in educational test scores. Texas and fellow non-compulsory unionism states Missouri and Georgia have independent professional teacher associations that are larger than their union counterparts. And Georgia's teacher salaries have increased 24 percent over the last four years without collective bargaining.
Voluntary unionism doesn't take away employees' rights to organize, form unions, or enter into collective bargaining agreements. It merely allows individual school employees the opportunity to negotiate the best deal for themselves, if they wish.
It's time to say yes to education reform that better meets the needs of students and respects the rights of teachers. It's time to say yes to voluntary unionism for public school employees.
(Alicia M. Sikkenga is labor policy research assistant at the Mackinac Center for Public Policy, a research and educational institute headquartered in Midland, Michigan. More information on labor reform is available at www.mackinac.org. Permission to reprint in whole or in part is hereby granted, provided the author and her affiliation are cited.) | <urn:uuid:1d66a3f7-5219-4d44-9109-977d7808c88a> | CC-MAIN-2017-17 | http://www.mackinac.org/V2001-07 | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125881.93/warc/CC-MAIN-20170423031205-00308-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.953655 | 934 | 2.90625 | 3 |
Buy custom Alfred Green essay
In April 1861 Alfred M. Green gave out a speech in Philadelphia, the very first month that the civil war started. African Americans were not in a position to be in the Union army, although Green had the opinion that they should try to be considered in the army and to be enlisted. Green used to influence his fellow friends who were Africans to join the popular Union forces. He was one of the affected races and thus felt it was his responsibility to encourage individuals to join in the fight. Dred Scott had to endure many months of imprisonment after being charged with treason. This resulted in unfair judicial rulings that came about as result of investigations. In spite of all they endured, their pay was sympathy and concern regardless of the difficulties they survived to bring about emancipation.
The most important thing that Dred preached to the people was not to complain over the mistakes that had happened in the past but to deal with the future. One is bound to act responsibly so as to achieve individual objectives. The consequences of thinking about the past encourage bitter memories and these acts as an impediment to the development of the country. The fighting spirit and enthusiasm to get back to the battle field is a disadvantage because it brings about unfairness and discrimination. This is because it creates unfair playing field as not every one is in a position to enjoy the civil and religious rights.
It was time for the people to unite and come together and fight the social evils and entrench vales such as patriotism, freedom and tolerance to religion and civil rights. These were the principles that were important to bring about independence and equality among the different races. Historical moment in the great Republic was evident as the world was giving birth to a race which was brave and patriotic. Individuals had to fight for the soveignity of the country regardless of whether it was an equitable and a tolerant nation.
These core values are important as they are the guiding factor that encourages true patriotism. The bravery deed of the fore fathers that was started by the immortal revolutionaries of Washington in the year 1776 by Jackson, and other people in the war that took place in the year 1812 was significant. Citizens could not enjoy the privileges as their rights which were an essential part of their lives were denied. Despite the fact that the forefathers had to endure a lot of suffering to bring out independence, still the rights of the noble people were not respected. The many scars that were left behind as a result of the war were a symbol of respect as they were part of the slave laws.
It brings into focus the importance of emphasizing to hope for better future and developing the present favorable moment .Such a conducive environment creates a new just and a honorable Republic. It is important that the honor bestowed to the forefathers for bringing about change should not be tainted with shameful actions by the people in order to proclaim heroism acts. Dred brings into focus the importance of trusting in God so as to protect the righteous and bring about freedom and general political parity. People should disregard the common message preached by the howling leaders that encourages treason and secession. This system encouraged tyranny and slavery in the American Republic.
Lastly, enlisting the people in the Northern troops would encourage the oppressed individuals living in the south to have the spirit to overthrow the system of government that was dictatorial. At the same time, it would restore confidence in those who believed in God as the Supreme Being and one that demands a life full of honesty, truth and equality amongst all people.
Buy custom Alfred Green essay | <urn:uuid:f6bd38fa-c292-40ee-ae7d-3ce235d4a372> | CC-MAIN-2017-47 | https://marvelousessays.com/essays/research/alfred-green.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806455.2/warc/CC-MAIN-20171122031440-20171122051440-00010.warc.gz | en | 0.9829 | 711 | 3.515625 | 4 |
Chef Lena Richard: Culinary Icon and Activist
Lena Richard was an African American chef who built a culinary empire in New Orleans during the Jim Crow era. She reshaped public understanding of New Orleans’ cuisine by showcasing and celebrating the black roots of Creole cooking in a time when pervasive racial stereotypes surrounded the food industry. Her story, however, has never been given its proper due.
Throughout her career, Richard owned and operated catering businesses, eateries, a fine-dining restaurant, a cooking school, and an international frozen food business in the racially segregated South. Her reputation as one of New Orleans’ finest chefs launched her into early food TV in a time of few African American stars.
Spreading the Knowledge
Richard understood culinary training as a tool that young African American cooks could leverage to build better lives for themselves. In 1937 she opened a cooking school specifically for black students. She envisioned the school as a place “to teach men and women the art of food preparation and serving in order that they would become capable of preparing and serving food for any occasion and also that they might be in a position to demand higher wages.” In this way, Richard taught her students a recipe for resilience based on professional development and self-advocacy. These tools helped her students navigate the race- and gender-based barriers embedded in the food service industry.
The same year, she began writing a cookbook with her daughter, Marie. In between culinary classes and catering events, they collected and transcribed Richard’s vast knowledge into around 300 recipes. These included Creole classics like gumbo and court bouillon as well as dishes popular throughout the United States such as Brunswick stew and Baked Alaska. Richard created the recipes herself or adapted community favorites to fit her cooking style. When Richard published Lena Richard’s Cook Book in 1939, she became the first African American author of a published cookbook featuring New Orleans Creole cuisine.
Rewriting the Narrative
Before Richard’s cookbook, white cookbook authors narrated the history of the city’s Creole cuisine from their own perspectives, often downplaying or ignoring the role of black cooks, chefs, and culinary professionals. In 200 Years of New Orleans Cooking (1931), for instance, author Natalie V. Scott reduces African American cooks’ culinary skills to a “sixth culinary sense,” writing that it was with some “mastery of mental telepathy” that black cooks became “miraculously aware of this way of dealing with a vegetable, that way of concocting a soup.”
Cookbooks that labeled African Americans’ cooking skills as “innate” and “magical” contributed to stereotypes of black women as “alien” and “other” as well as submissive and non-threatening to white Americans. This is most recognizable in the caricature of Aunt Jemima, the stereotypical Mammy figure used to promote branded pancake mix through most of the twentieth century. Journalist Toni Tipton-Martin writes that this stereotype “assumes that black chefs, cooks, and cookbook authors—by virtue of their race and gender—are s imply born with good kitchen instincts.” Such a stereotype of African American chefs “diminishes [the] knowledge, skills and abilities involved in their work, and portrays them as passive and ignorant laborers incapable of creative culinary artistry.”
Richard’s cookbook broke down these harmful stereotypes by emphasizing the labor, time, and training that went into her work. She not only tested and perfected the recipes after years of culinary experience, but also taught them to students in her cooking classes to ensure their quality and replicability. By creating her own cookbook and copyrighting it, Richard claimed those recipes—many of which had been taken without permission and published by white cookbook authors—for herself and her community.
Reaching the Masses
Upon release, Lena Richard’s Cook Book quickly captured the attention of local readers, many of whom shared Richard's work with friends and family outside of New Orleans. Within a week, Richard received almost 200 letters of inquiry and orders from people in Philadelphia, New York, and Boston, among other U.S. cities.
Hearing how hungry Americans were for a well-written Creole cookbook, Richard and her daughter headed to the Northeast to promote it so that “up North folks know how good down South folks eat,” as noted food writer Clementine Paddleford in 1939. Unsure of ingredients she’d be able to find in Northern markets, Richard went to New York “with her suitcase bulging with ten pounds of dried shrimp, pure cane syrup, Louisiana shelled pecans and old-fashioned brown sugar.”
While in New York, Richard connected with Houghton Mifflin Company representatives who expressed interest in publishing her cookbook nationally. Soon after, the company printed Richard’s work under a new title, New Orleans Cook Book (1940). This edition featured a new preface where Richard establishes her experience as a professional chef and her scientific approach:
Richard’s work was anything but “magical” and “innate.” Rather, it was the product of years of professional training and work by a chef who, with the support of her family and community, found ways to rewrite harmful historical narratives. In doing so, she created a cookbook that acknowledged and celebrated the ingenuity, strength, and perseverance of African Americans.
Interested in trying a recipe from Richard’s New Orleans Cook Book? Check out her recipes for gumbo and share your experiences with us by using the #SmithsonianFood.
Dr. Ashley Rose Young is the Historian of the American Food History Project at the Smithsonian’s National Museum of American History and her current academic book project focuses on New Orleans’ culinary history. Young is also a curator of a New Perspectives Case in American Enterprise called “The Only One in the Room”, which features eight women business achievers including Lena Richard and is part of the Smithsonian’s “Year of the Woman.” Additionally, in 2012, Young curated an exhibition, “Lena Richard: Pioneer in Food TV” at the Southern Food and Beverage Museum in New Orleans.
The American Food History Project is made possible by Warren and Barbara Winiarski│Winiarski Family Foundation and supporters of the Winemakers’ Dinner and Smithsonian Food History Gala.
Leadership support for American Enterprise in the Mars Hall of American Business was provided by Mars, Incorporated; the Wallace H. Coulter Foundation; and SC Johnson.
Learn more about Lena Richard on the Sidedoor podcast. | <urn:uuid:3af316bd-470a-477c-81de-1bcfa6e0afda> | CC-MAIN-2022-49 | https://americanhistory.si.edu/blog/lena-richard | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710534.53/warc/CC-MAIN-20221128171516-20221128201516-00044.warc.gz | en | 0.958609 | 1,402 | 3.453125 | 3 |
Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Developing Writing Techniques through Mentor Sentences
Transcript of Developing Writing Techniques through Mentor Sentences
through Mentor Sentences by Sonny Harding East Paulding High School 9th Grade Literature & Composition Journalism / Yearbook Problem: Student writing often lacks style or an authentic voice. Possible Causes: 1. Limited knowledge of various techniques. 2. They don't know what their voice sounds/reads like. Inquiry:
Can imitating sentences from established authors expose students to new writing techniques and help shape their own voice? "It's a way for you to have a template for yourself until yourself fills up your own self. And there's no reason you can't be influenced by other people." (Maron) Mentor Sentences DEFINED:
sentences that students can emulate to exercize a particular grammatical or stylistic technique. RESOURCE:
Lauren Wolter's site
http://greatsentences.blogspot.com/ How do I teach it? 1. Pick out a relevant mentor sentence.
2. Ask "What do you notice about this sentence?" 3. "Now you try to do it, using the sentence as your model." How is it structured?
Is there a pattern?
How is punctuation used?
What is the intended effect on the reader? let's try it! "He sat by the windows, hunched down in a rocking chair, scowling, waiting." (Harper Lee, To Kill a Mockingbird) She ran towards the street, choked from the strain of her leash, snarling, growling. The Research Harry Noden. Image Grammar Chapter 4: "From Imitation to Creation "...freshman composition students who imitated professional sentence structures 'for a semester wrote papers that were graded higher than those written by student who had no'" (Noden 69). Novelist R.V. Cassill:
Those who "'try a few imitations now and then will learn something about their craft that can hardly be learned so quickly in any other way'" (Noden 71). Tips:
Punctuation almost always stays the same.
Don't be afraid to add words where you don't see them in the mentor sentence.
Don't be afraid to take words out.
Rememer: the goal is clarity. "Corky walked around the front of the building awhile, always glancing back to the door, checking to see no one came out." (William Goldman, Magic, 61) Michael paced outside the door of the hotel lobby for an eternity, seldom looking up from the ground, hoping Martha would see him before he saw her. “A number of Holmes stories center around the activities of sinister lodgers in boarding houses, machinating stepparents, or people who keep their loved ones locked away” (Chabon 40). but Can we imitate literary analysis? A number of Vonnegut stories center around the actions of dissatisfied everymen in dystopian futures, contradicting timelines, or people who struggle to make sense of a chaotic world. A number of vignettes in To Kill a Mockingbird center around the activities of poor farm children in public school, hypocritical racists, and people who reveal their true nature through their actions. “Much of Kipling’s phraseology is taken from the Bible, and no doubt in the second stanza he had in mind the text from Psalm 127: ‘Except the Lord build the house, they labour in vain that build it; except the Lord keep the city, the watchman waketh but in vain’” (Orwell 118). Much of the Coen brothers’ characters are taken from The Odyssey, and no doubt in the scene when a trio of clothes-washing ladies lure in our protagonists they had in mind the text from book twelve: “At sea once more we had to pass the Sirens, whose sweet singing lures sailors to their doom.” Benefits of imitating texts: opens up a conversation about the power of punctuation, word choice, etc. allows teaching of conventions within a writing/reading context exposes students to new techniques that may influence their own style "Every time a child...sees print in written form, this data fills the child's linguistic data pool" (Anderson 18). Jeff Anderson. Mechanically Inclined
TONS of writing tips, many of it using mentor texts.
Index lists grammatical issues. thanks for your time Successful imitations can be displayed alongside their mentors.
Students can take ownership of the process, identifying mentor sentences in their own reading. be careful! "Imitation is a dangerous cliff above the cavern of plagiarism. Student can plunge into unethical depths if the teacher doesn't emphasize the difference" (Noden 70). | <urn:uuid:835518b9-2cbf-4248-b39a-19e12f4d0302> | CC-MAIN-2017-34 | https://prezi.com/15o0w9r8q6ai/developing-writing-techniques-through-mentor-sentences/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886116921.7/warc/CC-MAIN-20170822221214-20170823001214-00263.warc.gz | en | 0.927281 | 1,135 | 2.546875 | 3 |
Reading: From Ask the Beasts by Elizabeth Johnson
A multi-year study by Peter and Rosemary Grant documented how finch beaks differ from short, narrow and shallow to long, wide and deep, the differences in dimensions correlating with the birds’ ability to harvest different types of seeds. In 1977 the islands experienced a severe drought. Food was so scarce that no birds produced young that year. Only 15 percent of the adults survived to reproduce when the rains finally came. Those that survived had longer, wider, deeper beaks that enabled them to crack the tougher seeds in the seed bank. Their offspring inherited that trait. In 1983 a continuing deluge of rain carpeted the islands with grass, providing an abundance of small soft seeds. Finches with smaller beaks were more able to harvest the available seeds; many produced multiple sets of offspring. After this time the average bird in the population had a shorter, narrower beak, thus reversing the change that had occurred during the drought. As Reznick trenchantly observes, “This reversal is telling because it says that there is not a universal ‘best’ bird. Whether a given feature of an individual gives it an advantage of another depends entirely on the circumstance, be it drought or flood. This is a good illustration of the fact that evolution does not progress in any particular direction, but is rather a response to present conditions in the moment. If conditions change, then so will the selection experienced by populations. If conditions remain constant, it is possible there will be no evolution at all.” P. 91-92
Reading: From Finding Beauty in a Broken World by Terry Tempest Williams
In 1950 government agents proposed to get rid of prairie dogs on some parts of the Navaho reservation in order to protect the roots of sparse desert grasses and thereby maintain some marginal grazing for sheep.
The Navajo elders objected, insisting, “If you kill all the prairie dogs, there will be no one to cry for the rain.”
The amused officials assured the Navajo that there was no correlation between rain and prairie dogs and carried out their plan. The outcome was surprising only to the federal officials. The desert near Chilchinbito, Arizona, became a virtual wasteland. Without the ground-turning process of the burrowing animals, the soil became solidly packed, unable to accept rain. Hard pan. The result; fierce runoff whenever it rained. What little vegetation remained was carried away by flash floods and a legacy of erosion. [p. 87]
Sermon- Evolving Together
When Darwin developed his theory of evolution, it didn’t come to him in one “aha” moment, but emerged over years of observing the natural world. Just after college he famously spent 5 years on the HMS Beagle as a self-appointed naturalist doing those things many of us did as kids, turning over rocks, watching critters, collecting fossils, catching tadpoles in a jar, or just staring at that natural world around him as the Beagle charted the coast of South America. Now what he did that most of us didn’t do was keep a series of meticulous leather bound diaries of all he saw, and how it all fit together. For twenty some years he observed and wrote and thought until in his 50s he finally published “The Origin of Species”
At the time he wrote this book, the prevailing scientific view was that “Each species came about by an independent act of creation.” [Johnson, p. 33] That is to say, each individual species was created exactly as it is today by the hand of God. Darwin proposed the radical new idea that species changed gradually over time without any supernatural help. At first he called this theory “Descent with Modification” because common species can be traced back to common ancestors found in the fossil record. As natural variations occur in the species, some of these modifications would be beneficial, some would not. Darwin Wrote “This preservation of favorable variation and the rejection of injurious variation, I call Natural Selection…We see nothing of these slow changes in progress, until the hand of time has marked the long lapse of ages” [Johnson p.28] This idea shook the foundations of both the religious and scientific establishments which both were committed to the “special creation” theory. By 2015 the scientific community has rallied around Darwin’s “Natural Selection” theory, but the theory of special creation can still be found in churches, and on school boards, and in the houses of Congress. This is why once a year we join with other communities of faith to remind ourselves, to remind the world that scientific and religious truth are not enemies, but weave together our understanding of this world we share.
On Evolution Weekend, we tell true stories written in the body of the world. I believe that the stories we tell about how life came to be, and how it grows and changes unconsciously shape our beliefs about who we are, and our role in the universe.
When Darwin wrote the final paragraph of his On the Origin of Species (1859):
"It is interesting to contemplate an entangled bank, clothed with many plants of many kinds, with birds singing on the bushes, with various insects flitting about, and with worms crawling through the damp earth, and to reflect that these elaborately constructed forms, so different from each other, and dependent on each other in so complex a manner, have all been produced by laws acting around us.”
He could have been talking about the story we just heard about the Mangrove tangle, and there are in fact mangroves in some of the places he traveled in his 5 years on the Beagle. My one hesitancy about sharing that book, was that all those little critters who, in our story, said “I could live here and find food and safety” are not individuals making a life choice, these are the species whose grandparents and great-great grandparents co-evolved with the mangrove trees, and with the bacteria that live there, and the whole tangle of beings who not only live together but change and are changed by one another over thousands of years of living in natural community.
By way of contrast, my front window looks out on a number of trees and bushes full of seeds and berries, but none of the critters in my neighborhood seem at all interested in eating them. That’s because these trees and shrubs were purchased by some landscaper or arborist and planted there as a novelty to the natural community. My squirrels and juncos and cardinals did not co-evolve with those plants, and so they remain as strangers, and their fruit goes uneaten.
“Evolution is a relational Process” says Elizabeth Johnson, Theologian and author this book Ask the Beasts: Darwin and the God of Love. [Johnson, p. 120] T he plants and critters in Darwin’s tangled bank, or in the Mangrove Tangle are “dependent on each other in so complex a manner” as Darwin wrote “Let it be borne in mind how infinitely complex and close-fitting are the mutual relations of all organic beings to each other and to their physical conditions of life” [Johnson p. 121]
These beings shape and are shaped by one another not only in competition for scarce natural resources, but “multi-dimensional biological interactions.” [Johnson, p. 119] “No evolution would happen at all without the reciprocal, give-and-take relations among creatures.” Take not only the finches on the Galapagos Islands - evolving their beaks in local niches based on what food was available, and what beak shape they need to better access that food, but take also “the vulnerable aquatic organisms which evolved rigid shells or carapaces, in relationship to their predators which followed suit by evolving body parts that pierce, chew, or even saw through these protections.”[i]
My friend and colleague Scott Prinster offered a more gentle collaborative co-evolution as well, that between “hummingbirds and honeysuckle. The flowers evolve nectar that attracts the birds and fits their dietary needs (hummingbirds need enormous amounts of sugar to fly and keep their bodies from overheating). The flowers have also developed bright colors and unusually ornate shapes to attract the birds, and they bloom during the hummingbirds' breeding season. In return, the hummingbirds pollinate the flowers, which are not as attractive to bees as other kinds of flowers.” Darwin’s theory is a profoundly relational one.
Unfortunately, this idea of the “survival of the fittest” which did not even appear in Darwin’s work until the 5th edition of his famous book, has turned our popular understanding of this profoundly relational process of evolution, into a social theory that prizes the strength of the individual. British Political Theorist Herbert Spencer co-opted the theory of descent by modification into a political theory in which there are inevitable winners and losers in human society. “Social Darwinism” holds that “the powerful in society are innately better than the weak; that their success is proof of their superiority.” Often Alfred Lord Tennyson's poetic line “Nature, red in tooth and claw”[ii] is enlisted to remind us of the violence inherent in the natural world, to convince us that “only the strong survive.”
But remember, evolution is not about the survival of the individual. It is about the survival of a species, a community of species, of life itself. As Rosemary and Peter Grant’s work with finches points out, there is no single best bird. Instead the many varieties of life’s expression increase the odds of survival in an ever changing world, ensuring the survival of life itself. Survival in nature is limited to the arms race between predator and prey; sometimes it is cooperation, sharing or altruism that allows life to succeed. As Elizabeth Johnson puts it: “Rather than existing as independent operators, all organisms live in intricate systems consisting of many such dynamic interchanges. Each ecosystem is unique. Each has intrinsic value … in a particular time and place, with a diversity of species each of which interacts out if its own evolutionary history.” [p. 119]
This misuse of Darwin’s theory not only seems to support the kind of escalating economic inequalities that UU’s around the country have chosen to study and confront together, but it also gives us the wrong picture of our role in the web of life. When we learn evolution in school (if we are lucky enough to live in a school district that allows it) we tend to study a single branch of the tree of life as it grows and branches and thrives or ends. Think of that classic drawing of the progression from ape to Homo Saipan. When we look at evolution this way it’s difficult to see the complex web of relationships by which species- plant, animal, bacterial, evolve together.
Consider keystone species. This concept was first put forth by zoologist Robert T. Paine In 1969. Like a keystone in an arch, these species, when removed, cause the whole eco-system to collapse. Paine tested this theory by removing certain species from different eco-systems, and leaving other similar eco-systems alone. The systems where he removed the keystone species collapsed. For example, in the system where he removed the sea star from its rocky costal habitat, 7 out of 15 species he measured disappeared. While in the control systems all the species persisted.[iii] The groundhog, from our first reading, is a keystone species. Williams writes “More than 200 species of wildlife have been associated with prairie dog towns, with over 140 species benefiting directly, including bison, pronghorn antelope, burrowing owls, pocket mice, deer mice, ants, black widow spiders, horned larks, and many predators such as rattlesnakes, golden eagles, badgers, bobcats, weasels, foxes, coyotes and especially black-footed ferrets.” When prairie dogs are taken out of their eco-system, 9 vertebrate species disappear or sharply shrink in numbers. We evolve together. We live and die together.
When Sen. Lisa Murkowski was interviewed about President Obama’s plans to designate 12 million acres of Alaska's Arctic National Wildlife Refuge as wilderness she responded in part “There's so much focus on the wildlife, on the polar bear and the critters and the birds. And they are important. Don't get me wrong. But equally important - more important - is the obligation that we have to the people who live there” [iv] This is a point many politicians have made over the years when someone tries to protect an eco-system in jeopardy. But I believe this is a false dichotomy. It ignores how deeply we humans are woven into the web of life, how we too have co-evolved with plants, and animals, and bacteria. We may think we don’t need the groundhog, which ruins our golf courses, and might or might not limit the amount of grass our sheep can graze on, but not even humans can thrive on a hard-pan desert. The political rhetoric pitting Alaskan wildlife against human welfare ignores the complexity of this web of relationships, and the thousands of generations it took for us to weave the web of life as we know it. If we remove keystone species, of we tip an eco-system past where it can recover, it will take thousands more generations for a new eco-system to evolve.
I think the story of the Mangrove which found its niche as a genus of tree that can survive in salt-water is beautiful and inspiring. The birds, and crustaceans and sea mammals that shelter there and eat there have evolved together to share that habitat. The ecosystem shelters and feeds them, and they in turn feed it. It’s so elegant, the way mangrove islands protect our coral reefs from the silt runoff from clearcutting, and filter pollutants that run off our roads and farms. They absorb some of the wave strength of storms, protecting our coasts. The mangrove tree and all its living community survived because of the success of their interrelatedness. When we say “survival of the fittest” we are talking about not so much strength and power, but living beings who “fit” together like an incredibly complex puzzle.
Perhaps that complexity is why we draw the history of our human evolution as one line of hominids marching in procession, without pausing to fill in the whole picture. If we really understood the complexity of each eco-systems that created us, we might wonder about the complexity of the eco-systems we inhabit now -- from the groundhogs we exterminate to make room for our grazing animals, or the mangrove forests we cut down to make shrimp farms. If we really took the time to understand this interdependent web of all existence of which we are a part[v], we would be humbled by it I think. This is not only a spiritual act of respect and gratitude, but provides a more accurate blueprint for our own survival then when we imagine that we who are most fit can somehow survive alone.
So if this sermon has inspired you to boycott shrimp that is farmed unsustainably, or if it inspires you to lobby your Fish and Wildlife service to protect the Utah prairie dog from extinction, that’s wonderful. But just as important, I hope you will look with new eyes at the eco-systems you live in, at the ones you visit on vacation, at the eco-systems where your food is harvested. Too look with humility and awe at their beautiful complexity, and with gratitude to our living community which formed us and sheltered us and shaped us just like that tangled bank. | <urn:uuid:109af976-0c4e-4d45-ab9f-eb792d30c016> | CC-MAIN-2017-43 | http://revlaine.blogspot.com/2015/01/evolving-together-january-25-2015.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824899.75/warc/CC-MAIN-20171021224608-20171022004608-00596.warc.gz | en | 0.957489 | 3,313 | 3.734375 | 4 |
Synonyms and Antonyms of equivalence
the state or fact of being exactly the same in number, amount, status, or quality <moviegoers who mistakenly believe that there is an equivalence between the personality of an actor and that of his character> Synonyms coequality, coordinateness, equality, equivalency, par, parity, sameness Related Words comparability, compatibility, correlation, correspondence; alikeness, community, likeness, parallelism, resemblance, similarity, similitude; exchangeability, interchangeability; identicalness, identity Near Antonyms difference, disagreement, discrepancy, disparateness, disparity, distinction, distinctiveness, distinctness, divergence, diverseness, diversity; incompatibility; dissimilarity, unlikeness Antonyms imparity, inequality, nonequivalence
Learn More about equivalence
Dictionary: Definition of equivalence Medical Dictionary: Definition of equivalence Spanish Central: Translation of equivalence Nglish: Translation of equivalence for Spanish speakers Britannica English: Translation of equivalence for Arabic speakers Britannica.com: Encyclopedia article about equivalence
Seen and Heard
What made you want to look up equivalence? Please tell us where you read or heard it (including the quote, if possible). | <urn:uuid:6a5d4090-8180-4578-a416-a30a20f4dca5> | CC-MAIN-2016-50 | https://www.merriam-webster.com/thesaurus/equivalence | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542714.38/warc/CC-MAIN-20161202170902-00262-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.848386 | 254 | 2.953125 | 3 |
Windows 8 Disk Management
Every Windows PC has Disk Management, with which you can manage disk space. With development of Windows OS, Disk Management has more and more powerful function and features. Under Windows 8 Disk Management, you can perform following operations:
- Open volume
- Explore volume
- Mark partition as active
- Change drive letter and paths
- Extend volume
- Shrink volume
- Add mirror
- Delete volume
- Checking Properties
- View help information
Simplest way to open Disk Management on Windows 8: Right click "Computer" > click "Manage" > click "Disk Management
Open and Explore Volume under Windows 8 Disk Management
When you enter Windows 8 Disk Management on your computer, you can see all disk partitions. You just need to right click the partition you want to open and click "Open" option so as to open the selected volume under Disk Management.
Right click a volume under Disk Management and then click "Explore" option so that you can explore any volume you want to access.
Windows 8 Changes Drive Letter and Paths in Disk Management
When you install a hard drive on your computer, you usually divided it into several partitions and assign different drive letters to each volume so that you can easily find the volume you want to access by viewing its drive letter. On Windows 8 operating system, you can change drive letter and paths anytime you like under Disk Management by following guide below:
1. Right click the volume you want to change its drive letter and paths and select "Change Drive Letter and Paths".
2. Click "Change" button when the change drive letter and paths window pops up.
3. Assign a different letter to the selected volume and click "OK".
It will pop up a warning dialog box to tell it might cause problem after changing drive letter, you just need to click "Yes" button to confirm to change drive letter.
Windows 8 Format Delete Volume on Disk Management
You can also format or delete a volume under Disk Management in Windows 8. You just need to right click the volume you want to delete or format and then select "Delete" or "Format" option to perform the task.
1. When you delete a volume on Windows 8 Disk Management, all data stored on this volume will be erased immediately. The deleted volume will show as unallocated space on your computer.
2. When you format a volume under Disk Management in Windows 8, it will erase all data on the formatted partition. You can perform quick format or full format on the selected volume.
3. You cannot format or delete a system partition on Windows 8 Disk Management.
Shrink & Extend Volume with Disk Management Win8
Win8 operating system allows its users to shrink partition and extend partition under Disk Management.
To shrink a volume, you just need to right click the volume you want to shrink and then select "Shrink Volume" option.
To extend volume, you should make sure that there is contiguous unallocated space to the volume you want to extend. Then, right click this volume and click "Extend Volume" option.
Manage Disk Space on Windows 8 with Freeware
There is free partition management software for Windows 8 to manage disk space, which is more powerful than Windows 8 built-in Disk Management. IM-Magic Partition Resizer Free is a freeware that is able to manage disk space by formatting partition, deleting partition, extending partition, shrinking partition, moving partition, and more. Therefore, you can use this free partition management software to manage disk space when Windows 8 Disk Management grayed out and stops working.
Download IM-Magic Partition Resizer Free Edition
More Related Articles You May Like
windows 2008 r2 expand size of c partition in vmware - how to increase size of system partition on windows 2008 r2 in vmware...Read more >>
windows 2008 r2 extend partition when there is no free space - resize hard disk to fix low disk space on windows server 2008 R2...Read more >>
how to delete partition on windows 10 with freeware - introduction of a freeware to delete partition on windows 10 pc...Read more >>
extend windows 10 system partition with free partition software - free downlaod partition software to increase of c drive on windows 10...Read more >>
freeware for windows 10 system partition c low disk space problem - freeware to fix low disk space problem on system pratition in widows 10...Read more >>
- IM-Magic Partition Resizer Server - Partition space redistributing software that works for Windows Server 2003, 2008 and other editions. | <urn:uuid:ae954600-eaf3-416e-990a-ddb72d4a2dd8> | CC-MAIN-2017-04 | http://www.resize-c.com/howto/windows-8-disk-management.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00431-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.846127 | 946 | 2.859375 | 3 |
Child obesity looms large, with 1/3 of European teenagers overweight
Up to 27 percent of 13-year-olds and 33 percent of 11-year-olds
in some European countries are overweight or obese, according to
the WHO latest report. It's believed that lack of exercise, as
well as the "disastrously effective" marketing of
unhealthy foods, high in fat, sugar and salt, has led to a sharp
rise in obesity and overweight in recent decades. Among the
countries with the highest proportion of overweight 11-year-olds
is Greece (33 percent), Portugal (32 percent), and Ireland and
Spain (30 percent each).
From 2002 to 2010, the number of countries where more than 20 percent of 11-, 13- and 15-year-olds are overweight rose from 5 to 11.
Over 30 percent of boys and girls aged 15 and over in 23 out of 36 countries are not getting enough exercise. Among adults, women's rates of poor physical activity span from 16 percent in Greece to 71 percent in Malta and 76 percent in Serbia.
Thanks to restrictions on advertising of unhealthy foods, promoting vegetable and fruit consumption and physical activity in schools, France, Norway, Switzerland and the Netherlands appeared among the few champions who managed to stem the epidemic of overweight and obesity, however.
National governments should enforce legislation, and insist on informative labeling, nutrient profiling and regulated marketing, requiring the food industry to take responsibility, the WHO recommended in its report.
In Britain, where according to official statistics most people are overweight or obese, (this includes 61.9 percent of adults and 28 percent of children aged between two and 15), on average the population consumes too much saturated fat. Intakes of the so-called non-milk extrinsic sugars exceed the recommended level for all age groups, most notably for children aged 11-18, where mean intakes provided 15.3 percent of food energy, according to the UK National Diet and Nutrition Survey.
The epidemic of overweight and obesity threatens children’s health, since childhood obesity goes hand in hand with an increased risk of cardiovascular diseases, type 2 diabetes, orthopedic problems, mental disorders, underachievement in school, as well as lower self-esteem.
"Preventing children from becoming overweight or obese is vital to their avoiding the associated, lifelong health risks," the United Nations health agency said.
Over 60 percent of children who are overweight before puberty will be so as young adults. Such children are three to seven times more likely to be overweight adults.
"Our perception of what is normal has shifted. Being overweight is now more common than unusual," the WHO's regional director, Zsuzsanna Jakab, pointed out.
We must not let another generation grow up with obesity as the new norm," she added.
Physical inactivity "coupled with a culture that promotes cheap, convenient food high in fats, salt and sugars – is deadly,” Jakab warned. Children need at least one hour of moderate-to-vigorous physical activity every day not to gain extra weight.
"We need to create environments where physical activity is encouraged and the healthy food choice is the default choice, regardless of social group," a WHO expert on nutrition, physical activity and obesity, Joao Breda, said in a statement released with the report.
"Physical activity and healthy food choices should be taken very seriously in all environments - schools, hospitals, cities, towns and workplaces. As well as the food industry, the urban planning sector can make a difference," he added.
Childhood obesity is one of the most serious public health challenges of the 21st century, the WHO says. Globally, in 2010 the number of overweight children under the age of five, is estimated to be over 42 million. Close to 35 million of those live in developing countries. | <urn:uuid:a37fa029-dbea-497b-b852-236e008605f2> | CC-MAIN-2018-34 | https://www.rt.com/news/child-obesity-teenagers-overweight-615/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215261.83/warc/CC-MAIN-20180819165038-20180819185038-00517.warc.gz | en | 0.954726 | 794 | 3.15625 | 3 |
African Experts Underscore Importance of Youth Participation in Access and Benefit-sharing of Genetic Resources NegotiationsFebruary 2, 2022
African biotechnology experts and youth have called for fair and equitable sharing of benefits from utilization of digital sequence information (DSI) on genetic resources. This was during a virtual pre-COPMOP workshop held on 20th January 2022.
Digital sequence information on genetic resources is an emerging cross-cutting issue first addressed in 2016 by the Conference of the Parties to the Convention on Biological Diversity (CBD) and the Conference of the Parties serving as the meeting of the Parties to the Nagoya Protocol (COP13/COPMOP2).
Although there is no consensus on the concept and scope of DSI, Parties to the Convention recognize that it incorporates data and information derived from genetic resources. Parties also recognize that access to and use of DSI on genetic resources contributes to scientific research, non-commercial and commercial activities in areas of biological diversity, food security, human, animal and plant health.
Discussions are ongoing on consensus in modalities of benefit-sharing from the use of DSI on genetic resources in view of advancements in synthetic biology. At the global arena, the subject of DSI has generated divergent views and polarized debate. This has called for dialogue among involved stakeholders, to build understanding, and agree on a science- and policy-based process to address benefit-sharing from the use of DSI on genetic resources acquired pre-and post- the Nagoya Protocol.
African experts recognize that availability of DSI on open databases outside control of the original genetic resources provider country allows third parties to access and use this information outside the modalities worked out in the Nagoya Protocol. Therefore, the experts advise that the post-2020 Global Biodiversity Framework (GBF) should contain a package for sharing benefits arising from the use of DSI.
In her address, Ms. Lactitia Tshitwamulomoni, the National Focal Point (NFP) on Access and Benefit Sharing in South Africa, and co-chair of the 2020 ad hoc technical expert group on DSI, emphasized the need for African scientists to participate in international negotiations. This will inform national policies on access and benefit-sharing between users and providers of DSI on genetic resources, a call echoed by all participants and AUDA/NEPAD.
Prof. Kazuo Watanabe, Professor of Biotechnology at the University of Tsukuba, Japan, emphasized the need for clear definition and conceptual clarity of DSI. "It is crucial that we build consensus in understanding of DSI among the involved Parties and stakeholders", he added.
The workshop co-organized by ISAAA AfriCenter and the University of Tsukuba under the African Short Course on Agro-biosciences (AfSCA) brought together 42 participants including Africa's Early Career Professionals, scientists both in crops and animal research, NFPs on ABS, and Japanese professionals.
For more information, contact Dr. Margaret Karembu at firstname.lastname@example.org.
You might also like:
- Pocket K No. 8: Cartagena Protocol on Biosafety
- Pocket K No. 44: Biotechnology for Biodiversity
- Capacity Building for COPMOPs Continues for Asian Countries
Biotech Updates is a weekly newsletter of ISAAA, a not-for-profit organization. It is distributed for free to over 22,000 subscribers worldwide to inform them about the key developments in biosciences, especially in biotechnology. Your support will help us in our mission to feed the world with knowledge. You can help by donating as little as $10.
See more articles:
News from Around the World
- IITA Scientists Identify Markers Associated with Resistance to Banana Weevil
- African Experts Underscore Importance of Youth Participation in Access and Benefit-sharing of Genetic Resources Negotiations
- US Backs Biotech Potato Research for Asia, Africa
- UMass Amherst Researchers Identify Genes for Flower Formation
- University of Florida Scientists One Step Closer Toward Crops That Make Own Nitrogen
- Argentina Updates its Regulatory Policies on Environmental Risk Assessment
- Australia's OGTR Releases Report on Herbicide Tolerance Review
- Researchers Use Wild Relatives to Breed Eggplants with New and Improved Traits
- Transgenic Common Bean Lines Show Multiple Resistance to Three Viruses
- Report Explores Future Applications of Genomic Science
- Researchers Propose Framework for Classifying GMOs and Genome-edited Organisms
- Scientists Develop Shorter Canola to Minimize Lodging
Read the latest:
- Biotech Updates (May 24, 2023)
- Gene Editing Supplement (May 24, 2023)
- Gene Drive Supplement (February 22, 2023)
Subscribe to BU: | <urn:uuid:80469269-ab57-485f-a7ce-71c14603c2e0> | CC-MAIN-2023-23 | https://www.isaaa.org/kc/cropbiotechupdate/article/default.asp?ID=19248 | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646257.46/warc/CC-MAIN-20230531022541-20230531052541-00281.warc.gz | en | 0.890514 | 1,034 | 2.609375 | 3 |
Ten Incredible Mummy Discoveries from Around the World
Mummies of humans and other animals have been found on every continent, both as a result of natural preservation through unique climatic conditions, and as intentionally preserved corpses for religious or cultural purposes. In addition to the well-known mummies of Ancient Egypt, deliberate mummification was a feature of several ancient cultures in areas of South America and Asia, as well as numerous other. Here we feature ten unique mummy discoveries from around the world.
The mummies of Qilakitsoq – Greenland
His little face still stares upwards, as if eternally waiting for his mother. From the moment he was discovered, the little Inuit baby captured hearts with his photograph plastered on magazines and news stories around the world. When he was first found, he was believed to be a doll, but it was soon discovered that it was actually the body of a six-month old baby boy. He was buried alive with his already dead mother – presumably because there was no one left to care for him. The small Inuit baby was found along with a two-year-old boy, and six women of various ages, who were buried in two separate graves protected by a rock that overhung a shallow cave. The bodies were naturally mummified by the sub-zero temperatures and dry, dehydrating winds, providing a remarkable opportunity to learn about the Greenland Inuit of half a millennium ago – they are the oldest preserved remains ever to be found there.
Tollund Man – Denmark
Tollund Man is the naturally mummified body of a man who lived during the 4th century BC, during the period characterised in Scandinavia as the Pre-Roman Iron Age. He was hanged as a sacrifice to the gods and placed in a peat bog where he remained preserved for more than two millennia. Today, the face of the Tollund Man is as preserved as the day he died. The look upon his face is calm and peaceful, as though looking upon a sleeping man.
The Lady of Dai Mummy – China
When talking about body preservation and mummies, people all over the world think of Egypt and the mummified bodies of Pharaohs, such as Tutankhamun. But how many know that the world’s best preserved bodies actually come from China? The Lady of Dai, otherwise known as The Diva Mummy, is a 2,100-year-old mummy from the Western Han Dynasty and the best preserved ancient human ever found. Just how this incredible level of preservation was accomplished has baffled and amazed scientists around the world. Xin Zhui, the Lady of Dai, died between 178 and 145 BC, at around 50 years of age. The objects inside her tomb indicated a woman of wealth and importance, and one who enjoyed the good things in life. But it was not the precious goods and fine fabrics that immediately caught the attention of archaeologists, rather it was the extraordinarily well-preserved state of her remains that captured their eyes.
The 500-Year-Old Inca Child Mummies - Argentina
Over a decade ago, the remains of three Incan children were found, remarkably preserved, atop the summit of Volcan Llullaillaco in Argentina. Last year, an analysis on the bodies of the 13-year-old ‘Maiden’ and her 4- to 5-year-old companions, Llullaillaco Boy and Lightening Girl, revealed that the children had been drugged and given alcohol on a regular basis as part of a year-long series of ceremonial processes leading up to their final sacrifice. Evidence suggests the sacrificial ceremony may have been used as a form of social control. Being selected for the ritual was supposed to be seen as a great honour, but it probably produced a climate of fear. In fact, it was a major offense for parents to show any sadness after giving up their children for the ceremony.
Tjayasetimu, the child star – Egypt
Tjayasetimu is the name of a little girl who was a star singer in ancient Egypt. Nearly three thousand years ago, she was a member of the royal choir and sang for the pharaohs in temples on the Nile. The seven-year-old girl, although heartbreakingly young when she died, was important enough to merit an elaborate mummification, a process normally reserved for Egyptian royalty and elite families. Tjayasetimu had been wrapped in painted bandages, her face covered with a delicate veil and hidden by a golden mask, and she had been placed in a gilded sarcophagus. The child star was well-preserved and still had a full head of shoulder-length hair. They could even see her milk teeth pushing up through her gums. At a height of just 4 feet, Tjayasetimu was far too small for her sarcophagus, although it is not clear why a casing was not made to fit her size. Scientists believe she died as a result of a short illness, such as cholera.
The Beauty of Loulan – China
Loulan was discovered in 1980, but it was 3800 years ago that she died on the trade route known as the Silk Road. The natural dryness and salty soil preserved her and over two hundred other mummies, individuals who had lived in several closely located settlements along the trade route. The mummy has been called the Loulan Beauty because of her amazingly preserved stately facial features that have remained quite beautiful even in death. Unfortunately, the region where she and the others were found is politically unstable and the discovery of the mummies in the Tarim Basin in China was seen as a possible instigating factor for unrest. The Chinese government has been reluctant to allow full access to the mummies because of their racial identity. The Tarim mummies are Caucasian and this fact has given credence to the claims of the local peoples, the Uyghur, who look more European than Asian that they are the descendants of the original inhabitants of the area and not later arrivals, as Chinese history claims.
Ötzi the Iceman – Germany
Ötzi the iceman, who was discovered by some German tourists in the Alps in 1991, was originally believed to be the frozen corpse of a mountaineer or soldier who died during World War I. Tests later confirmed the iceman dates back to 3,300 BC and most likely died from a blow to the back of the head. He is Europe's oldest natural human mummy and, remarkably, his body contained the still intact blood cells, which resembled a modern sample of blood. They are the oldest blood cells ever identified. His body was so well-preserved that scientists were even able to determine that his last meal was red deer and herb bread, eaten with wheat bran, roots and fruit.
The Lady of Cao – Peru
On the beautiful northern coastline of Peru overlooking the blue Pacific, the place known as Huaca El Brujo (Sacred place of the Wizard) gives us an incredible glimpse into the culture of the Moche and the ‘Wizard’ buried there. Its two main pyramids, Huaca del Sol and the Huaca de la Luna, were once the centre of social and religious functions in the area and the final resting place of the tattooed mummy, who has come to be known as the Lady of Cao. Not an elderly woman, she died in her mid-twenties about fifteen hundred years ago, probably as a complication of childbirth. The Moche did not mummify their dead purposefully, but the conditions for desiccation just happened to preserve the Lady of Cao and by doing so also preserved her intricate tattoos. Although it is not believed that the more common members of Moche society were tattooed it could certainly be inferred from this burial that the highest status members were, and the tattoos probably represented and strengthened the individuals’ connection with the divine through sympathetic magic.
Mystery Mummies of Zeleniy Yar – Russia
Zeleniy Yar is a remote site near the Arctic Circle known to the indigenous Nenets people as “the end of the earth”. The unique site has revealed nearly a dozen mysterious mummies who appear to be foreign to the region, and whose artifacts can be traced back to ancient Persia, nearly 6,000 kilometres away. Scientists are undertaking genetic testing to determine the origins of the mummies and unlock the secrets of a mystery medieval civilization. The mummies were found in a well-preserved state, seemingly by accident, and wearing copper masks and covered in reindeer, beaver, wolverine, or bear fur. Many of their skulls are shattered or missing, while the skeletons were smashed. One of the mummies is a red-haired male, protected from chest to foot by copper plating. In his resting place, was an iron hatchet, furs, and a head buckle made of bronze depicting a bear.
The Mummies of Palermo Catacombs – Italy
The Capuchin Catacombs of Palermo are located in Sicily, Italy. In the 16th century, the Capuchin monks of Palermo discovered that their catacombs contained a natural preservative that helped mummify their dead. One of the most famous mummies is that of a two year old girl, Rosalia Lombardo. Rosalia was placed in the catacombs when she died in 1920. Her body is so well preserved that she looks as if she were just sleeping in her glass coffin, hence her nickname “Sleeping Beauty”. The secret for her excellent state of preservation was revealed a few years ago, when a hand-written memoir of the embalmer, Alfredo Salafia, was discovered. This memoir recorded the chemicals that he injected into Rosalia’s blood. These chemicals were formalin, zinc salts, alcohol, salicylic acid, and glycerin. It has been suggested that it was the zinc salts that were most responsible for Rosalia’s amazing state of preservation | <urn:uuid:d13df8ff-8736-43c9-a34a-97e3c8b3bbd9> | CC-MAIN-2018-39 | https://www.ancient-origins.net/comment/11863 | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156780.2/warc/CC-MAIN-20180921033529-20180921053929-00054.warc.gz | en | 0.982903 | 2,063 | 2.65625 | 3 |
Self-help advice isn’t exactly in short supply. There are research-backed tips out there for boosting confidence, resilience, risk taking, and adaptability. The message is pretty clear: Feel better about yourself or change your beliefs about what you’re capable of, and you’ll excel. Indeed, ample scientific evidence supports each of these claims.
Nevertheless, most self-improvement strategies focus too much on the person who’s trying to do the improving. Much of the time, the same outcomes you’re trying to achieve by changing your own habits, attitudes, and behaviors depend on how you view other people.
It sounds paradoxical, but according to University of Georgia researcher Jason Colquitt and his colleagues, people who tend to trust others at work score higher on a range of measure than those who don’t, from job performance to commitment to the team. And since we know that it’s our relationships—particularly with our bosses and colleagues—that determine how happy and successful we are as our careers progress, it may be worth asking some new questions. Instead of, “How can I improve?” the better question might be, “How can I start seeing more of the good in people, more often?”
Why The Benefit Of The Doubt Is So Hard To Give
It can be difficult to believe that others generally have the best intentions; that just isn’t many people’s default assumption. We’re socialized from a young age to be critical of others’ motives, if not downright suspicious. Parents tell their children for their own protection to beware of strangers. And it’s not hard to find evidence in daily life that expressions like “the road to hell is paved with good intentions” has some truth to it. In an era of fake news, taking anything at face value seems potentially foolhardy.
But these societal impulses may actually arise from deeper cognitive ones. Negative past events loom larger in our memories than positive experiences. As psychologist Roy Baumeister famously put it, “Bad is stronger than good.” This makes adaptive sense: To survive in a treacherous environment (especially social ones), early humans needed to recall the times their trust was ill-placed, when they were betrayed or misled and wound up getting hurt. By comparison, all the times when their trust led to good outcomes weren’t as critical to hang onto.
In addition, people have an unyielding desire to see themselves in a positive light. This can cause us to develop less favorable views of others. Research shows that we tend to think we’re better than average at almost everything, meaning that others are worse—including less trustworthy. As part of this process, Stanford behavioral scientist Chip Heath found that we tend to think our own motivations are intrinsic (“I work hard because I love my job”) whereas others’ are extrinsic (“They work hard only because they’re getting paid to do so”).
Finally, while research on optimism—including assuming the best of others—almost universally shows its benefits for success and satisfaction in both work and life, people tend to fear being seen as an unrealistic “Pollyanna.” Just think of how many words there are in English to describe the experience of too-readily trusting others: gullible, ingenuous, credulous, unwary; imbecile, dimwit, stooge, dunderhead, idiot, fool; beguiled, duped, tricked, betrayed, fleeced, deceived, defrauded, double-crossed, deluded, swindled, conned, rooked, cozened, hoodwinked, bamboozled, flimflammed . . . you get the idea.
Research suggests when we perceive someone as innocent and nice, we tend to view them as less competent, a label we ourselves avoid at all costs. As the novelist Laurell K. Hamilton has said, “Never trust people who smile constantly, they’re either selling something or not very bright.”
The Self-Help Approach That’s Not About You
To be sure, there are risks to assuming the best in others, but the benefits may far outweigh the potential costs, especially in the workplace.
Conflict is a difficult but often inevitable part of our work lives. According to Harvard Business School professor Chris Argyris, a top cause of workplace discord is the “ladder of inference” (basically what he sees as a more precise metaphor than “jumping to conclusions”). Climbing up the ladder means that a person takes in neutral information but assumes bad intentions, which results in less favorable beliefs and bad behavior.
For example, when you receive an ambiguous email from a coworker you have a turbulent relationship with, you’re more likely than not to react defensively. In fact, there’s research to suggest that we interpret all emails more negatively than their writer meant them to be. So perhaps it’s no surprise that PepsiCo CEO Indra Nooyi says the best piece of career advice she’s ever gotten is “assume positive intent.”
One of the biggest opportunities for growth at work comes from the way you solicit feedback and what you do with it afterward. Research demonstrates that while employees who speak up tend to improve how well teams function, many tend to be afraid to do so, worrying that their input won’t be well-received. Simply assuming the best in others can lay the foundation for managers and their team members alike to learn and improve without wounding egos.
It’s also no secret that the ability to influence others is a crucial job skill. Research shows that when we think others are capable of changing their attitudes, we’re more likely to advance our own views. But when we think others’ beliefs are fixed, we don’t try too hard to persuade them—what would be the point? This can have personal costs, though, since it limits our own potential sphere of influence.
And that, in turn, creates a self-fulfilling prophecy: Assume the worst in other people, and they’ll prove it every time (“confirmation bias,” anyone?), closing off one opportunity after the next to shore up those crucial relationships that your own happiness and success depend on. Sure, self-help books are a great way to better your work life. But their typical focus on you may have the unintended result of limiting your ability to wring more value out of the social world around you, which is teeming with people, while you’re just one of them. | <urn:uuid:6d463714-2b7c-4b36-871f-583834466bc6> | CC-MAIN-2021-43 | https://www.fastcompany.com/40401630/want-to-be-happier-and-more-successful-learn-to-like-other-people?utm_source=mailchimp&utm_medium=email&utm_campaign=fcweekly-top&position=5&partner=newsletter&campaign_date=04072017 | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585183.47/warc/CC-MAIN-20211017210244-20211018000244-00611.warc.gz | en | 0.953048 | 1,400 | 2.515625 | 3 |
The AlloSphere is a one-of-a-kind scientific instrument that bridges the worlds of engineering, science and art.
Created by Professor JoAnn Kuchera-Morin and architect Robert Venturi in 2007, the AlloSphere allows researchers to come face-to-face with their scientific data, thus providing an entirely new way to see, hear and interpret information.
Located in the 62,000 square-foot "California Nanosystems Institute" building at the University of California Santa Barbara, the AlloSphere is essentially a giant digital microscope hooked up to a supercomputer. Here, researchers can walk onto a bridge in the center of a "virtual reality chamber" and watch their scientific data come to life.
Using mathematical and scientific formulas, raw data is mapped out and converted into three-dimensional experiences. Electrons appear as fluorescent green orbs; hydrogen bonds are white triangles fused with purple zinc blobs and technicolor electron flow. Better yet, each element is also assigned to a particular note and sound, creating a symphony of sorts as researchers explore the terrain.
For instance, an MRI scan of a brain can turn into an otherworldly experience. Scientists are "shrunken" down to the size of their data, as 360-degree 3-D projections of the brain are displayed and musical notes are affixed to certain blood density levels. As the scientists "move" throughout the brain, the projected images correspond in real-time, and the musical notes (and therefore blood density levels) change accordingly.
Physically, the AlloSphere is comprised of two opaque aluminum hemispheres that serve as 360-degree screens, each with a radius of 16 feet. Though there are approximately 500 independent speakers and subwoofers in the chamber, the AlloSphere's sound-absorbing insulation makes it one of the largest anechoic chambers in the world. Improvements are made every day, and by the end of 2010, the structure is expected to maintain a visual resolution of 24 million pixels. Additionally, there will be a 512-channel sound system that will make it seem like a "bird is flying around your head."
Though the AlloSphere may encompass all the equipment necessary for an entertainment center, Professor Kuchera-Morin is confident in its ability to facilitate groundbreaking scientific discoveries. Her hope is that the fully immersive experience will lead to noticing new and different patterns in data, and to further fill the gap between art and science.
Know Before You Go
To make reservations, contact:
Carole M. Self
Corporate/Industry Liaison Officer
Phone: (805) 893-3010 | <urn:uuid:5cdd4d45-2b27-4ae6-931e-576648e829ca> | CC-MAIN-2016-30 | http://www.atlasobscura.com/places/allosphere | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469258948913.96/warc/CC-MAIN-20160723072908-00164-ip-10-185-27-174.ec2.internal.warc.gz | en | 0.917885 | 544 | 3.171875 | 3 |
World Autism Day: Paediatric experts encourage parents to seek medical advice to support children with autism
In support of this year’s World Autism Day, Consultant Paediatrician Dr Ngozi Oluonye from Great Ormond Street Hospital for Children (GOSH) in London urges parents to seek medical advice for children with Autism Spectrum Disorder (ASD) to understand their child’s needs and provide guidance.
“Autism Spectrum Disorder (ASD) is a lifelong, developmental disability that affects how a person communicates with and relates to other people, as well as how they experience the world,” Dr Oluonye explains. “ASD used to be referred to as autism, but specialists believe the term ASD better reflects how this neurodevelopment disorder presents across different individuals. The reason that this is called a spectrum disorder is that there is a wide variability in how individuals present; not all children display every listed feature of autism. Although there is no cure for ASD, there are many things that can be done to make easier for the individual and the family.”
The prevalence of ASD in the GCC is estimated to be between 1.4 to 29 per 10,000 persons1. “There is ongoing research into the causes of Autism and many experts believe that the pattern of behaviour from which autism is diagnosed may not result from a single cause, and that there are genetic factors at play. We also know that there are some genetic or developmental conditions where Autism is more common. The causes of autism are still being investigated and it is felt likely that there are many different causes of ASD,” Dr Oluonye explains.
As a neurodevelopmental disorder, ASD may occur alongside other difficulties such as general developmental impairment; Attention Deficit Hyperactivity Disorder (ADHD); difficulties with motor coordination (clumsiness); sleep difficulties; challenging behaviour or a learning disability. This is not always the case – some individuals may have normal intelligence or have a specific area of skill or interest where they show above average intelligence.
Guidance indicates that assessment should be carried out within a multidisciplinary team, an approach taken at GOSH, which treats over 1500 patients from the Middle East every year. Teams may include paediatricians, psychologists, speech and language therapists and occupational therapists.
Commenting on parents looking for the right schools for children with ASD, Dr Oluonye added, “If parents are worried about ASD, it is important that they seek medical advice from their GP first in order to be referred for a specialist assessment. Parents should seek information from their local professionals and be guided by them about school placements, as well as make time to speak with the professionals who will be teaching their child to ensure that the environment is right for their child. It also helps to visit the school first to prepare your child for the transition to a new, complex social environment.”
What parents should look out for:
“There are difficulties with communication. Many children with ASD have language difficulties which can range from delayed language development, whilst others develop language but then become silent and do not appear to use their words,” Dr Oluonye explains.
Other early signs can be when a child is heard to frequently repeat words or use learnt phrases for no apparent reason. For those who develop the use of language, they may be a limitation to how much they use this to communicate with others. Individuals with ASD may also interpret language very literally. For those who are better at communicating, they may not know when to speak or when to listen, and they may be selective in their attention.
“Individuals with ASD can vary in how socially interested they are,” Dr Oluonye describes. “Young children may appear to be happily occupied in a world of their own, but have no interest in what others are doing and have little response when other approach them, or indeed move away when approached.”
Typically developing children will look towards other people, however individuals with ASD may have limited use of eye contact and are less observant of people. They are less able to learn how to interpret how people use facial expression and body language to communicate; it also affects development of play skills.
Unusual patterns of Behaviour or Interests
Repetitive habits or movements may be observed e.g. hand flapping, spinning
There may be an insistence on things being carried out in a specific way and extreme distress can be shown at small changes to their routine
Distress may also be observed at times of change (transitions)
Obsessions may be seen relating to certain toys, people, activities, TV programmes
There may be preoccupations with unusual objects or subjects for their age
Some individuals with ASD can show unusual responses to sensory experiences in the environment | <urn:uuid:c37a4d32-da8f-4577-a49c-1eba4792260c> | CC-MAIN-2018-39 | http://gosh.com.kw/news-articles/world-autism-day-paediatric-experts-encourage-parents-seek-medical-advice-support | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163704.93/warc/CC-MAIN-20180926061824-20180926082224-00216.warc.gz | en | 0.958868 | 984 | 3.21875 | 3 |
This is part eight of our Combined Vowel Korean Worksheet Series. The eighth Korean character we are going to look at is “ᄋ” which has no sound and therefore the characters are simply the vowel sounds. This worksheet includes all the different possible combined vowel combinations related to ᄋ
A few example words which include the ᄋ with combined vowels are: 왜 = Wae (Why), 위스키 = Wi/Ser/Ki (Whiskey) and 웨일즈 = We/Ill/Jer (Wales – the Country).
Here is your free printable worksheet either as a JPEG or PDF file, we hope that you find it useful:
To catch up with our previous part 7 please click the links.
Thank you for taking a little time to learn some Korean today and if you have any questions or comments please feel free to let us know.
For more FREE learn Korean (Hangul) resources please check out our FREE RESOURCES PAGE.
For details on our Korean Classes please Click Here. | <urn:uuid:c545931f-01f3-4970-9707-d6598bc5ee8e> | CC-MAIN-2022-33 | https://freshkorean.com/2013/02/20/practice-korean-writing-combined-vowels-worksheet-8-%E1%84%8B/?replytocom=728 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00575.warc.gz | en | 0.92688 | 242 | 3.75 | 4 |
- Jennifer D. KibbeJennifer D. KibbeDepartment of Government, Franklin & Marshall College
Covert action presents a potential policy for decision makers who want something quicker or more muscular than diplomacy but less expensive and obtrusive than military force. In contrast with intelligence, which entails collecting and analyzing information, covert action is an active instrument of foreign policy. The three main categories of covert action include propaganda, political action, and paramilitary action. Another separate category is economic action, which involves destabilizing the target state’s economy in some way. Because of the inherent secrecy of covert action, outside scholars have no way of knowing how much they do or do not know about the topic at hand and it also makes it hard to verify the information, since the information comes from a variety of sources. Covert action literature is particularly strong in case studies of particular operations. There is also a well-developed subsection within the field that focuses on covert action since the end of the Cold War, the role that the Office of Strategic Services (OSS) played during World War II, and covert actions undertaken by other states. However, there are several issues in the covert action literature. These issues include the assessment of the success or failure of particular operations and of the policy instrument as a whole, the tangible and intangible costs incurred by covert action, the ethical questions raised by conducting covert actions as well as the particular methods used and its impact on democracy, the oversight of covert action, and the evolution of US law covering covert action.
- Security Studies
Covert action is the aspect of intelligence about which most has been written and yet, somewhat counterintuitively, it remains the least well understood. The main reason for this disjuncture is that covert action includes operations such as assassinations and overthrowing other governments, which are both the “sexiest” as well as the most controversial and morally questionable parts of the intelligence enterprise. Consequently, the covert action literature in general has historically been distorted by the focus on these types of operations, although this characteristic has been increasingly remedied over the last 15–20 years as the field has become more sophisticated. This problem has also meant that many of the complexities involved in covert action have only been conveyed in the more recent literature, leading to a somewhat uneven body of work for the topic as a whole. Another imbalance in the field is that it has been dominated by material about the US, a result of the combination of Washington’s avid use of covert operations during the Cold War and its (relatively) more accessible information regarding such operations. While this imbalance is necessarily reflected in this review of the literature, there have been a number of quality studies about several other states’ operations as well, which are discussed below.
This review begins by exploring the issues and categories involved in defining covert action, as well as the ramifications of the inherent secrecy of the topic. Next, it discusses the major categories of works in the overall field. After presenting the general lay of the land, the review explores several issues that have played a prominent role in the covert action literature, including the question of how to gauge success and failure, the costs of covert operations, the ethical questions raised by conducting them, and questions of law, oversight and policy making.
Defining Covert Action
The first and most important task in any discussion of covert action is to clarify what it is and what it is not. It is important to note at the outset that the very term “covert action” is a uniquely American one, and a relatively recent one at that, having evolved since World War II. Covert action was not even defined in US law until the passage of the 1991 Intelligence Authorization Act, which defines it as activity meant “to influence political, economic or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly” (i.e., preserving plausible deniability) (50 USC 413(b)(e)). Thus, it has been described as the “quiet option” or the “third option,” presenting a potential policy route for decision makers who want something quicker or more muscular than diplomacy but less expensive and obtrusive than military force. While many, if not most, other states have conducted such operations, they have tended to use different terminology, with the Soviets employing the term “active measures” (activinyye meropriatia, which included some overt actions as well as covert), for example, and the British term changing over time, from “special operations” to “special political action” to “disruptive action” (Scott 2004). It is a measure of the US dominance of the literature that “covert action” has come to be seen as the generic term.
Although it is often portrayed as one of the four intelligence disciplines (along with collection, analysis, and counterintelligence), covert action is, strictly speaking, not intelligence at all because it is an active instrument of foreign policy, whereas intelligence entails collecting and analyzing information for policy makers to use in conducting foreign policy. Thus, covert action blurs the dividing line between intelligence and policy that many feel is essential to preserving the integrity of intelligence analysis (Steiner 2006). The concern is that blurring that line creates situations where the CIA is responsible for both analyzing the need for and the efficacy of covert action in a particular situation as well as conducting the operation itself, with the attendant risk that its role in the operational phase may affect its independence in the analytical task.
William Daugherty, a career CIA officer, notes that another key difference between covert action and the other intelligence disciplines is that it can be more controversial than the others in the relationship between two states: “For while target governments will accept being spied upon as a natural adjunct of a nation’s foreign or national security policy […] covert action involves the deliberate, planned intervention in the sovereign rights of a nation,” thus violating both international law and the United Nations Charter, which prohibit intervention in the internal affairs of other states (Daugherty 2004:1819).
Categories of Covert Action
Another way in which covert action has sometimes been misunderstood or mischaracterized is in terms of what activities the term encompasses. As mentioned above, many authors and journalists have tended to focus on the more controversial, high-profile operations such as the disastrous Bay of Pigs operation and the US overthrows of regimes in Iran and Guatemala, while ignoring the subtler ways in which governments try secretly to influence each other’s actions, such as distributing propaganda or funneling money to political parties. Most scholars have traditionally cited three main categories of covert action (propaganda, political action, and paramilitary action, although they are often used in conjunction with one another), while Johnson (1989a) adds economic action as a separate category and Daugherty (2004) argues that it may be time to add a new one for information warfare (now known as information operations).
Propaganda, known in the US early in the Cold War as psychological warfare and now increasingly being referred to as psychological operations, involves the dissemination of information specifically designed to influence people’s opinions and behavior. It can be done overtly, as was the case for example with the United States Information Agency (USIA) during the Cold War. This variety is known as “white” propaganda. “Gray” propaganda is the dissemination of official policy lines through unacknowledged outlets. The best-known examples from the Cold War are those of Radio Free Europe and Radio Liberty, which broadcast anticommunist, pro-democracy messages to Soviet satellites in Eastern Europe and to people in the Soviet Union, respectively. Finally, “black” propaganda is the use of disinformation and outright deception to manipulate public opinion. One of the CIA’s most successful black propaganda operations was its effort in Guatemala in 1954, when it faked broadcasts from a dissident radio station claiming that a large insurgent army was crossing the border and starting a revolution, effectively scaring President Arbenz into resigning (Turner 2007). The Soviet Union was equally busy in the propaganda department during the Cold War, although it focused more on planting disinformation in neutral media, as with its late 1960s placement of a forged letter in the Bombay Free Press Journal recounting Washington’s use of bacteriological weapons in Vietnam and Thailand, a story that was then picked up by the London Times and other Western media (Andrew and Gordievsky 1990:503).
There are numerous studies of propaganda operations (see, for example, Aldrich et al. 2000; Saunders 2000), among which the most thorough account of US operations during the Cold War is Wilford’s The Mighty Wurlitzer (2008). Wilford’s recounting of how the CIA tried to shape America’s image in the rest of world by influencing the content of Hollywood movies, funding abstract expressionist art and supporting a wide variety of cultural, student, women’s and labor organizations serves as a useful reminder that propaganda can come in subtler forms than merely the straight dissemination of information.
Political action includes a range of activities that constitute more direct involvement in the political process of the target country, from the provision of polling services and campaign advisers to discrediting political opponents and funneling support to political parties, media outlets, unions, or front organizations (Treverton 1987; Coleman 1989; O’Brien 1995; Saunders 2000; Wilford 2008). One oft-cited example of political action stems from the early Cold War years when the US successfully intervened in the 1948 Italian elections by giving assistance to the anticommunist Christian Democrats, a case that Treverton argues sets a precedent of “election projects,” which have been as important as any operations undertaken by the CIA (Treverton 1987:20). The KGB was also active in Cold War political action, seeing it, in conjunction with propaganda, as one of the key tools of Soviet foreign policy. Moscow supported a wide variety of parties, such as the MPLA in Angola, and front organizations, such as the World Council of Peace (Andrew and Gordievsky 1990; Andrew and Mitrokhin 1999, 2005). One of the Soviet Union’s most successful covert operations involved political action, when the Monarchist Association of Central Russia, better known as “The Trust,” conducted an elaborate deception operation aimed at penetrating White Russian émigré groups (Andrew and Gordievsky 1990:71–8). Two other states that have been particularly active in covert political action are apartheid-era South Africa (O’Brien 2001a) and Israel (Raviv and Melman 1990; Thomas 1999).
Economic action involves destabilizing the target state’s economy in some way. This could involve directly attacking crops, as the US did to Cuba in the 1960s, spreading disinformation to raise fears of economic instability, trying to manipulate another country’s currency, or convincing companies and other countries not to invest in the target state and disrupting international lines of credit, as the US did in Chile in the early 1970s (Treverton 1987; Sigmund 1993).
Paramilitary action involves the use of armed forces (either regular or irregular) employing unconventional military means to influence events in the target state. Covert paramilitary activity can range from training foreign military and security forces in counterterrorism and counterinsurgency techniques to assisting coup d’états, conducting direct action raids, and supporting large groups of rebels against their governments. One notorious (and notably non-superpower-related) example of a direct action raid is the 1985 attack on the Greenpeace Rainbow Warrior by the French secret services in their attempt to undermine nuclear testing protests (Porch 1995).
The quintessential, albeit failed, example of a larger operation at the more involved end of the paramilitary continuum is the Bay of Pigs. These covert actions are clearly a type of hybrid operation, in that they are effectively military action, although they are covert in that the sponsorship of the attacking state is supposed to remain unknown. With operations this big, however, it is rare that they remain covert, whether successful, as in Reagan’s backing of the mujaheddin in Afghanistan, or unsuccessful, as in Eisenhower’s hapless 1958 Bay of Pigs prequel in Indonesia, when the attempt to overthrow Achmed Sukarno ended with the shooting down of a CIA pilot (Kahin and Kahin 1995). Thus, as Treverton (2007) notes, they really should be called “overt” covert operations.
One of the most controversial types of covert action is also included under the rubric of paramilitary operations: assassination (Thomas 2000; Soderblöm 2004). Probably the best-known examples are the CIA’s ill-fated attempts on Fidel Castro’s life during Operation Mongoose (United States Senate 1975a), but this method has also been used extensively by Israel (Byman 2006), which established its Committee X for expressly this purpose after the 1972 Munich massacre (Kahana 2007), as well as by the Soviet Union and South Africa under apartheid (O’Brien 2001b).
Finally, by far the newest category of covert action, having developed only in the 1990s, information operations involve actions to affect an adversary’s information and information systems while defending one’s own. Being such a new branch of the field, the literature on information operations is still evolving and currently consists largely of research conducted by the military as part of its effort to master what is widely seen as a critical future arena. Some useful sources that address the range of issues raised by this new subfield include Armistead (2003), Jones and Remenyi (2004), who bring together papers presented at a European conference on information operations, and Barrett, B.M. (2005), who focuses on China’s role in this new strategic area.
One last definitional point about covert action that should be kept in mind is that it can be and has been used both against other governments (including allied ones) as well as to help other governments (although economic action has normally been used only against opponents). While some critics of covert action point primarily to the actions used against opponents and some defenders point primarily to the operations used to strengthen friendly states, a thorough understanding of covert action should take both into account.
The Secrecy Problem
An important characteristic of the covert action literature involves the complex web of issues raised by the inherent secrecy of the topic. When reading (or writing) an account of a particular operation or an assessment of covert action over time, the first problem is that outside scholars (i.e., those who are not part of the intelligence community) have no way of knowing how much they do or do not know about the topic at hand. In fact, given the strict compartmentalization of information about some covert operations, this is quite possibly a problem for many within the community as well. This problem looms large in discussions of the overall success or failure of covert action. Critics point to a string of notorious failures, including the Bay of Pigs, the operation in Indonesia, and the almost comical attempts to assassinate Fidel Castro, as evidence of covert action’s lack of efficacy. Other scholars, however, highlight the fact that the public is much more likely to hear about failed operations than successful ones, since covert action is designed to keep sponsorship secret, and thus maintaining a scorecard based on what is in the public domain is an inherently unfair test (Daugherty 2004; Scott 2004).
While this is a fair point, there is some disagreement over just how much information about covert operations remains secret (Scott 2004). In his study of Britain’s Secret Intelligence Service (SIS, also known as MI6), Dorril maintains that there is much more in the public domain regarding British operations than anyone has realized and that “[t]he reality is that secrets are increasingly difficult to protect, and it would not be a great exaggeration to suggest that there are no real secrets any more” (Dorril 2000:xiv). In a similar vein, Garthoff (2004) argues that although we cannot know what percentage of intelligence activity from the Cold War has become public, the likelihood is that we are aware of most of the patterns and important cases. Aldrich, on the other hand, has a more pessimistic view, contending that although substantial records from the Cold War have been released, “much more remains closed, while further material has disappeared in an organized whirl of destruction” (Aldrich 2002:7; see also Ferris 1995).
There has, indeed, been considerable progress in the declassification of US archival records on Cold War covert operations. Even though the George W. Bush administration considerably slowed the progress that had been achieved during the Clinton years, US declassification continues to outpace that of other states, including Britain where the continuing hold of the Official Secrets Act has been one reason the literature on covert action is much more developed on the US side. The advances in declassification have provided material for covert action researchers working on particular operations and resulted in certain small boons, such as the 2003 publication of a retrospective volume in the State Department’s Foreign Relations of the United States series on the action taken in 1954 in Guatemala (US Department of State 2003). Nonetheless, covert action analysts must always keep in mind that decisions to declassify documents are fundamentally political ones, inextricably intertwined with the question of how history is written, and no history is potentially more controversial than that of covert operations. Thus, the executive branch may well have an interest in trying to shape that history. Moreover, certain key documents, even on declassified operations, remain classified and there is at least one known case, that of the 1953 operation in Iran, where the CIA has admitted intentionally destroying virtually all of the relevant records of the operation (Eisendrath 2000:3).
Beyond the accessibility of archival documents, there is also quite a lot of information available to the public now in the form of oral histories, memoirs, biographies, and interviews. In the case of this kind of information as well, however, the covert action researcher needs to be mindful of why the information is being made public. Is it merely for the historical record, or is there some other agenda at work, be it personal, bureaucratic or political? An early example of this phenomenon is the interview that CIA Director Allen Dulles gave to the Saturday Evening Post boasting about the CIA’s successful action in Iran (Little 2004). Clearly, it was part of creating the myth of the all-powerful CIA covert operators and, needless to say, his account did not include how close the operation came to failing. Thus, on the one hand, it was valuable in lifting the curtain partway on a particular operation but, on the other, that partial story was almost worse than no information at all, in the sense that it helped create an ethos that CIA could do no wrong, which, beyond its distortion of public knowledge, did not serve the agency well in planning for future operations.
Another problem stemming from the secrecy of covert action is that much of the other information relied on by journalists and researchers comes from a variety of sources that make it hard, if not impossible, to verify the information, such as leaks, whistleblowers, defectors, and anonymous sources. Scott (2004) presents a thoughtful discussion of the various issues raised by this problem, as well as strategies for ameliorating it.
Another aspect of the availability of information regarding covert action is to recognize that the literature on the topic is penned, in large part, by two broad groups of people: outside scholars and journalists, and current or, more likely, former members of the intelligence community. Aside from individual authors’ relative talents, there is an obvious tradeoff. Former analysts and agents are much more likely to know and understand the inner workings of the community but, on the other hand, they are more likely to have a vested interest in the material in terms of protecting their personal reputations and those of their agencies. Moreover, members of the US intelligence community must submit their manuscripts to the CIA for vetting. While this is officially, and understandably, for the purpose of protecting classified material, it does create the opportunity for censorship for political reasons as well.
Finally, as Scott points out, studying covert action can include a whole other level of smoke and mirrors as well: “Among the more perplexing questions: when we think we are learning of secret intervention are we in fact the target of covert action and the recipient of disinformation or propaganda?” (Scott 2004:327) Although it is illegal for the CIA to disseminate propaganda in the US, other countries’ intelligence services could have some reason to spread information about a particular operation, or propaganda issued by the CIA elsewhere could find its way back to the US population by accident, in a process known as “blowback.”
The Overall Field
At the core of the covert action literature are a number of analytical studies done over the years that both explain the elements and purpose of covert action and examine the range of issues that arise in conducting it, from its relationship to both policy and intelligence to questions of democracy, ethics, implications, and how to evaluate outcomes. Blackstock (1964) was the first to take this more scholarly, analytical approach to covert action. Based on cases from Czarist Russia, Nazi Germany and the United States, he highlighted the problems posed by the adoption of covert action as a policy, including most policy makers’ lack of understanding of the subject, the undermining of operations by intra-agency bureaucratic infighting, the overestimation of their effectiveness, and the problems that failed operations can pose for US foreign policy in general.
Treverton’s (1987) analysis of covert action is informed by his experience as a staff member of the Church Committee, as well as by the Iran-Contra scandal. He uses the cases of Iran, Guatemala, the Bay of Pigs, Chile, Angola, and Iran-Contra in his effort to assess the benefits and liabilities of covert action as a policy tool. In presenting an even-handed critique, Treverton acknowledges that covert operations may be necessary at times, but warns that they will most likely not remain secret and will often involve unintended consequences and long-term costs that, because of the secrecy in which the policy is conceived, tend to be worse than those for overt public policies. After evaluating the history and efficacy of US covert action policies, Godson (1995) arrives at a different conclusion. Godson is more of an advocate of covert action and, where Treverton calls for more openness and congressional oversight, Godson criticizes Congress for having too much influence.
Berkowitz and Goodman’s (1998) analysis focuses on the issue of deniability as the single most important characteristic of covert action, addressing two central questions: when does an operation absolutely have to be done covertly, and what does covertness imply for a democratic government?
A number of other authors have approached covert action analytically, but done so within the context of larger studies of intelligence or of the CIA as a whole (Ransom 1970; Rositzke 1977; Johnson 1989a; Johnson 1996).
Another group of authors has approached the topic of covert action through chronological studies that focus more on chronicling the various operations of the CIA, accompanied by varying degrees of analysis. It is largely in this branch of the literature where one encounters the more sensationalist treatments of covert action, which tend to rely more on journalistic accounts than archival evidence and tend more toward heavy criticism and less objective analysis (see, for example, Blum 1986). There are, however, some very good treatments of the topic in this branch of the field, among the best of which are Wise and Ross (1964), Prados (1986), Ranelagh (1986), Jeffreys-Jones (1989) and Andrew (1995). The most comprehensive, because it is the most recent and was able to take advantage of the progress in declassification, is Prados’s Safe for Democracy (2006), which even those who take issue with its critical assessment of covert action applaud for its magisterial coverage of the archival record.
Although the literature on US covert action is well developed overall, there is something of a gap, because although the US has used covert action from its very earliest days, one would be hard pressed to know it since the great majority of the literature focuses on the period after World War II and the creation of the CIA in 1947. There are a few notable exceptions, however. In his broad study of US covert action, Andrew (1995) gives some historical background, covering the span from George Washington to the twentieth century in his first chapter. Carter (2000) provides another account, while the most detailed treatment can be found in Knott’s Secret and Sanctioned (1996).
One area where the literature is particularly strong is in case studies of particular operations. Here, historians (in large part) have achieved impressive advances in bringing knowledge to light through the tireless use of the Freedom of Information Act as well as the archival records of non-intelligence agencies that were involved in policy decisions but have traditionally not been as strict as the CIA about classifying their records, such as the State Department and administrations’ presidential records. Not surprisingly, the best-known cases have the best-developed literature, only a sample of which can be mentioned here: Iran (Roosevelt 1979; Gasiorowski 1987; Bill 1988); Guatemala (Immerman 1982; Schlesinger and Kinzer 1982; Gleijeses 1991); Bay of Pigs (Wyden 1979; Higgins 1987; Gleijeses 1995; Blight and Kornbluh 1998); Chile (Sigmund 1993; Kornbluh 2003). Other operations that have been the subject of useful case studies include Indonesia (Kahin and Kahin 1995), British Guiana (Rabe 2005), Afghanistan (Coll 2004), Syria (Little 1990; Lesch 1992), and the Middle East more generally (Little 2004).
Post–Cold War and Post–9/11
The most recent branch of the field is that covering covert action since the end of the Cold War, a period that is effectively divided in two. The first decade after the collapse of the Soviet Union saw the CIA fighting to retain its covert action authority in the face of the resulting severe budget cuts and questioning of whether the United States needed to engage in such controversial action any more. Gradually, the CIA began to justify a continuing need for covert action to enable it to combat the new, post–Cold War threats posed by terrorism, drug trafficking, information warfare, and economic espionage (Berkowitz and Goodman 1998; Johnson 2000). The post–9/11 branch of the field focuses on the role that covert action has played in the “war on terror” (Baer 2002; Clarke 2004), including specific cases such as Afghanistan (Schroen 2005) and the increasing covert responsibilities being assumed by the military’s special operations forces (Kibbe 2004, 2007).
Although much of the covert action literature focuses almost exclusively on the period after the creation of the CIA, there is a well-developed subsection within the field that deals with the role that the Office of Strategic Services (OSS) played during World War II. While the early postwar work on the OSS emphasized the dramatic and daring nature of the operations, there have since been a number of studies that have taken a more sober, scholarly approach (for example Smith 1972; Smith 1983; Howard 1990; Warner 2000). The best studies are the more recent ones that are well grounded in the declassified OSS archives (Jakub 1999; Mauch and Riemer 2003). There have also been a number of studies of the significant role played by women in the OSS (for example McIntosh 1998).
Non-US Covert Action
Although the literature has been dominated by material on US operations, there have been a number of quality studies of covert actions undertaken by other states. Among the best studies of Soviet covert activity are Richelson (1986), Andrew and Gordievsky (1990), Deriabin and Bagley (1990), and Andrew and Mitrokhin’s two-volume study based on the KGB documents brought out of the Soviet Union by Mitrokhin (1999, 2005). On the UK, the most useful overall studies include Andrew (1985), Dorril (2000), and Aldrich (2002), while Davies (2004) focuses on the interaction between MI6’s organizational structure and operations. There have also been a few overall studies of Israeli covert action (Raviv and Melman 1990; Thomas 1999; Kahana 2007), as well as case studies of several well-known operations, including the Lavon Affair, a sabotage operation against British targets in Egypt aimed at preventing Britain’s pull-out from Suez (Golan 1978), and Operation Plumbat, which involved stealing uranium for Israel’s nuclear reactor (Davenport et al. 1978). Porch (1995) is the best English language treatment of the French secret services, as is Eftimiades (1994) on China’s, although these two (as well as a few of those named above) cover the state’s entire intelligence apparatus and are less focused solely on covert action.
Success v. Failure
One of the many contentious issues regarding covert action discussed in the literature is the assessment of the success or failure of particular operations and of the policy instrument as a whole. The first problem is how to define success. One issue is how long one’s time horizon should be: does success refer to the short term, or should it include what transpires over the long term as well? Critics of covert action frequently point to Iran and Guatemala as examples of operations that succeeded in the short run in terms of achieving their operational goals, but that incurred such political costs over the long term as to cast doubt over whether they should truly be counted as successes. Many now add the Reagan administration’s support of the mujaheddin in Afghanistan to this list, given the subsequent rise and virulent anti-US posture of Osama bin Laden (Goodman 2000; Prados 2006). On the other hand, some scholars contend that the critics make too much of the long-term cost argument. As Treverton argues with respect to Iran, “the aspects of US policy that loomed so large in the shah’s downfall in 1979,” such as his image as an American client and the waste and corruption stemming from his massive purchases of US weapons, stemmed from Washington’s overt foreign policy in the 20 years after the operation rather than from the coup itself (Treverton 2007:5).
Another, related question in evaluating success is whether it should refer solely to the tactical success of the actual operation, or whether it should also include the wider political ramifications, both domestically and internationally, of the operation (Daugherty 2004). Moreover, how does one judge even just the tactical success of an operation? Treverton (2007) poses an interesting hypothetical question with regard to the US role in the Angolan civil war in 1975. The immediate answer is that it was a failure for the US – the MPLA, supported by the Cubans and Soviets, won and the US role in supporting the MPLA’s opponents was exposed. However, he asks, what if “the initial purpose was more limited – for instance, to raise the price of victory for the MPLA and its Soviet and Cuban backers – then Angola might be counted a short-run success” (Treverton 2007:5). While Treverton notes that US officials did not make that argument either then or later, it is an important nuance to keep in mind when considering the success of covert operations.
A third value tradeoff to be considered is whether one considers success solely in terms of Washington’s interests or whether an estimation of success should take into account the interests of the target nation as well. In British Guiana, the United States and Britain succeeded in ensuring that the candidate they did want for prime minister, Forbes Burnham, beat out the candidate they didn’t, Cheddi Jagan. But, in so doing, they effectively sentenced the newly independent Guyanan nation to 20 years under a brutal dictatorship. Should British Guiana be considered a covert action success? And in judging an operation’s effect on Washington’s interests, does one mean only its interests in the target country, its global interests, or its domestic interests, or some combination of the three?
Others use a still different measuring stick for success, arguing that the key determinant should be whether covert action has actually made a significant difference in the world. Codevilla argues that “[t]here is no evidence that, absent American covert action, the important conflicts of the 1940s and early 1950s, never mind those of subsequent years, would have turned out differently” (1992:241). In a similar vein, Rudgers (2000:261) notes that the abrupt end of the Soviet empire raises the “question as to whether CIA covert actions contributed to the result, or whether they were a sort of narcotic for policy-makers, carried out as an end in themselves merely because they could be.” And Goodman (2000:34), a career CIA analyst and strong critic of covert action, contends that “most covert operations are ‘operations for operations sake,’ undertaken with no reckoning of the result beforehand.”
Daugherty (2004) responds to the “did it have any overall effect?” argument by saying that, while it might be true if one considers only “small wars of liberation” and similar operations, it is a much harder argument to make if one includes political action programs. Indeed, most critics concede that the CIA’s few unadulterated successes have come in the field of propaganda and political action. The operations most often mentioned in this regard are the Agency’s use of Radio Free Europe and Radio Liberty to defeat the heavy censorship imposed in the Soviet bloc, the electoral defeat of the communist party in Italy and the support of the Solidarity labor union and related operations to deter harsh Soviet action in Poland in the 1980s, an operation that Daugherty terms “perhaps the most successful covert action program regardless of standard of measure” (Goodman 2000; Daugherty 2004:4; Prados 2006).
Some scholars point to another nuance of the success/failure question: success at what price? Treverton (2007:4) notes that operational success in both Iran and Guatemala “was purchased at the price of enlarging the intervention,” thus increasing the risk of undermining plausible deniability. The particular danger of covert operations for policy makers is that the initial decisions to conduct them are made on the assumption that they will be relatively quick, cheap, and easy but, as the operations unfold, they often evolve into larger, more costly, and more risky affairs. Once lured in at the beginning, though, it is difficult for a policy maker to close the operation down. Moreover, as was the case in Dulles’s Saturday Evening Post account of the Iranian operation, the caveats about how close both that operation and the one in Guatemala came to failing and what was required for them to succeed were left out of the tales that became CIA legend and were, thus, soon forgotten, a flaw that has been replicated in much of the less scholarly literature about covert action.
Another issue that has been the focus of considerable discussion in the literature is that of the costs incurred by covert action, both tangible and intangible. Prados expands the criticism about the often-expanding costs of successful operations into a wider one of the lack of discipline over the literal costs of covert activities. According to Prados, “available spending data indicate that no major operation of this kind ended within its allotted budget” (2006:635, emphasis in original). The operation in Iran was initially estimated to cost $100,000–200,000, but ended up costing $10 million. Similarly, the Bay of Pigs was initially estimated to cost $2.6 million and ended up costing over $46 million, while Operation Mongoose (the post–Bay of Pigs plan to eliminate Fidel Castro) accounted for another $100 million (Prados 2006).
Beyond dollar amounts, however, the potential costs of covert operations can include a range of factors, some of which, such as the wider ramifications or long-term consequences, have already been noted in the preceding discussion of success and failure. Other notable costs include damage to relations with the target state and the compromising of strategic interests in separate policy areas. As an example of the latter, Goodman (2000) notes how Washington’s desire to funnel weapons to the mujaheddin in Afghanistan required doing so through Pakistan, which meant turning a blind eye to Islamabad’s nuclear weapons development program. Furthermore, as Berkowitz and Goodman point out, “[t]here is always a cost when other governments and the public ultimately find out” about covert operations and, even in those cases where people or policy makers may approve of the policy after the fact, “whether they admit it or not, those who were misled or not informed will trust the US government less from then on” (Berkowitz and Goodman 1998:40).
Ethics and Covert Action
Legitimacy of Covert Intervention
The most controversial aspect of covert action is its ethical dimension. Some question whether the very act of covert intervention is ever ethically acceptable, while others focus their criticism on the particular methods used, and still others raise the particular conundrum of what it means for a democracy to engage in covert action (Beitz 1989). The first question of whether covert action can ever be acceptable is a subset of the broader question regarding the legitimacy of any kind of international intervention. And, just as is the case with the broader question, most scholars contend that there are certain circumstances under which it would be morally defensible for a state to intervene covertly. The least controversial cases involve a state using covert action in self-defense or for compelling humanitarian reasons (Beitz 1989; Colby 1989). Even there, though, there will often be room for argument about whether the intervention was truly justified. For example, President George W. Bush’s justification of many of his actions in the “war on terror” as self-defense, including the 2002 Predator Hellfire missile strike against Abu Ali al-Harithi in Yemen, is by no means universally accepted. And one need only look to the case of Darfur to see the contentious nature of justifying intervention (albeit overt in that case) in the name of alleviating human suffering. Beyond the comparatively “easy” test cases of covert intervention for self-defense and humanitarian reasons, some contend that covert intervention is justified in a range of other situations as well, from protecting friendly regimes that ask for help to propping up strategic allies.
Other scholars approach the argument more generally, contending that because the international environment can be a dangerous place, covert action in pursuit of the national interest is justified. The most clear-cut version of this was put forth in 1954 when the Doolittle Report commissioned by President Dwight Eisenhower justified the US’s need to resort to the “repugnant philosophy” of covert action by pointing to the “ruthless” methods employed by the “implacable enemy” of the Soviet Union (quoted in Ranelagh 1986:276–7). Two intelligence officials updated that sentiment in 1989, stating that “given the depravity of the world around us […] free societies have no choice but to engage in intelligence activities if they are to remain free” (Hulnick and Mattausch 1989).
The problem, of course, is that once one accepts that some covert operations are legitimate, people from different agencies, organizations, and governments will never all agree on what constitutes an acceptable national interest reason and what does not (Beitz 1989). Moreover, a very real risk of the fact that policy makers perceive covert action as a relatively cheap and easy “third option” is that they may well utilize, knowingly or not, a quite flexible interpretation of the national interest and resort to covert action too readily (Beitz 1989; Kibbe 2002).
Clearly, too, the degree of acceptability of covert action varies in conjunction with the level of perceived threat. As the Doolittle Report so vividly highlighted, during the Cold War the threat posed by the Soviets served to convince almost everybody that at least some covert action was justified. Consequently, when the Cold War drew to a close, some observers argued that it marked the end of the need to resort to “the bastard child of that long confrontation” (Hodding Carter iii, in Twentieth Century Fund 1992:22; see also Goodman 2000). In response, however, others contended that “the world remains a dangerous place” and that covert action “may be justified when a prospective threat creates a compelling national interest that cannot be met prudently by overt means alone” (Twentieth Century Fund 1992:5). During the 1990s, covert action was seen as still being useful to defend US interests from the new, post–Cold War threats of terrorism, nuclear proliferation, and narcotics. With the crystallization of the terrorist threat after 9/11, the launching of the so-called war on terror seems to have swung the pendulum of opinion back to favoring a lower threshold for the use of covert action. The clearest indication of this has been the resurgence of observers calling for the lifting of the US ban on political assassination (Pape 2002; Richelson 2002).
Several scholars have tried to delineate criteria for when it would be acceptable to use covert action and, in those cases, what specific methods would be appropriate. One starting point is former Secretary of State Cyrus Vance’s formulation that covert action should only be used when “absolutely essential to the national security” of the United States and when “no other means” will do (cited in Treverton 1989:28). Former CIA Director William Colby calls for covert action to meet the criteria of self-defense and proportionality (Colby 1989). The most comprehensive criteria stem from Barry’s (1993) effort to apply Just War theory to covert action. He settles on seven standards that should be applied: just cause, just intention, proper authority, last resort, probability of success, proportionality, and discrimination and control (i.e., taking measures to safeguard the innocent and minimize damage).
In its comprehensive study of covert action undertaken at the beginning of the post–Cold War period, the Twentieth Century Fund takes a more policy oriented approach, recommending that covert action be seen as “exceptional” not “routine,” be driven by “a compelling national interest,” undertaken “only in support of publicly articulated policy,” and “only when overt means are unavailable, insufficient, or (even if sufficient) judged too costly in terms of human life” (Twentieth Century Fund 1992:8–9, emphasis in original). Similarly, Treverton (1989) and Colby (1989) advocate that covert action be used only when it has a good chance of succeeding and when it coincides with an administration’s publicly stated policy positions.
Methods and Ethics
A second category of arguments concerning the ethics of covert action focuses on the specific methods used. The most obvious target is assassination, which has been described as “a brutal, cowardly and inhuman act” that cannot be justified by “noble ends” (Johnson 1992:434). The United States, according to one author, “must not adopt the tactics of barbarians and terrorists” (Johnson 1992:434). Other scholars, however, have made the opposite argument, contending that sometimes assassination is, in fact, the ethical choice (Reisman and Baker 1992). Peters, for example, in referring to the Gulf War, notes that:
while it was acceptable to bomb those divisions of hapless conscripts, it is unthinkable to announce and carry out a threat to kill Saddam Hussein, even though he bore overwhelming guilt for the entire war and its atrocities. We justify this moral and practical muddle by stating that we do not sanction assassination in general, and certainly not the assassination of foreign heads of state. Yet where is the logic in this? Why is it acceptable to slaughter […] the commanded masses but not to mortally punish the guiltiest individual, the commander, a man stained with the blood of his own people as well as his neighbors?(Peters 1996:104)
Aside from assassination, ethicists call into question a variety of the other methods that comprise covert action as well. Some point to the fact that many actions undertaken in covert operations are themselves illegal (separate from a properly approved operation being legal under US law) (Goodman 2000). As the House Intelligence Committee reported in 1996, “[a] safe estimate is that several hundred times every day (easily 100,000 times a year) DO [Directorate of Operations] officers engage in highly illegal activities (according to foreign law)” (House Permanent Select Committee on Intelligence 1996:205). Others raise questions about the morality of the manipulation that lies at the heart of many covert methods. Because covert action is, by definition, deniable, the whole point is that one country is trying to effect change in another without the target population being aware that they are being acted upon, whether it be by means of propaganda, support of unions or political parties, the surreptitious triggering of strike actions, or some other method. But that inherently interferes with the target population’s ability to make its own decisions and, because it is done covertly, “leaves a person peculiarly defenseless against this invasion” (Beitz 1989:214).
Covert Action and Democracy
The third category of ethical issues raised by covert action are those regarding whether its use by a democratic state calls into question that state’s adherence to democratic norms. Here, the controversy revolves around two key questions. The first concerns the policy making process and whether the secrecy required in the adoption of a covert action policy is inherently at odds with the norms of open debate and accountability on which a democracy is predicated (Wise and Ross 1964). This is what Treverton refers to as “the paradox of secret operations in a democracy” (1987:222). Hodding Carter III, in dissenting from the Twentieth Century Fund study on covert action, put this argument in starkest relief, stating that “covert action is by definition outside the ambit of democracy” (Twentieth Century Fund 1992:21).
Others take a more intermediate position, conceding that there is an inherent conflict between democracy and covert action, but pointing out that democracies make many concessions to accommodate the realities of governing (Beitz 1989; Colby 1989). These authors emphasize that, since the mid-1970s, the United States has chosen to deal with the conflict between covert operations and its democratic values by relying on the oversight role played by the Congress to ensure that the executive branch does not overreach itself (Beitz 1989; Johnson 1989b).
The second question raised by a democracy conducting covert action goes back to the issue mentioned above regarding such operations violating the target population’s democratic rights to make their own decisions about their government. One response to this argument holds that if the goal of a covert operation is to protect a democratic state from a nondemocracy or to spread democratic values such as pluralism and individual rights to new arenas, then it cannot be said to be inimical to democracy (Shultz 1989).
Law, Oversight, and Policy Making
The 1950s and early 1960s have long been portrayed as the veritable “golden age” of CIA covert operators, a time when Congress was largely content to approve broadbrush reports from the Agency about its covert operations and not ask too many questions (Damrosch 1989; Smist 1994). Barrett, D.M. (2005), however, comes to a somewhat different conclusion. In the first study to look carefully at Congressional involvement in covert action in the early years of the Cold War, he argues that Congress was both more active and more vigilant on the issue of covert action than it is usually given credit for. The result of Barrett’s more nuanced view of Congress’s role is somewhat contradictory. On the one hand, he maintains that, although legislative oversight was nowhere near as formal as it is now, Congressional “monitoring of the agency had become decidedly more extensive in the late 1950s, for example, than it was a decade earlier,” not least because of the much publicized intelligence “failures” that occurred roughly once a year, such as the failed uprising in Hungary and the surprises like Suez and Sputnik (Barrett, D.M. 2005:459). On the other hand, Barrett cites over two dozen cases where individual legislators urged the CIA to engage in covert operations, portraying a Congress that didn’t merely look the other way on covert action but, rather, actually “helped move the CIA toward aggressive covert action” (Barrett, D.M. 2005:460).
Congress first began trying to assert control over covert action in a concerted way in 1974, after allegations began to circulate in the press about the CIA’s role in overthrowing Salvador Allende in Chile and supporting rebels in Angola. The result was the Hughes-Ryan Amendment to the Foreign Assistance Act of 1961, which prohibited the CIA from using appropriated funds for covert action unless the President found an operation to be important to national security and reported it to the Armed Services, Foreign Affairs, and Appropriations committees in both the House and the Senate (22 U.S.C. § 2422). Further disclosures concerning the CIA’s domestic spying operations and the FBI’s COINTELPRO program caused each house of Congress to establish a special investigating committee to find out what else its members had been unaware of, known as the Church and Pike Committees in the Senate and House respectively.
The Church Committee, in particular, was invaluable to covert action researchers, providing as it did a public record of a number of previously unknown operations including, most notably, that in Chile and Operation Mongoose, but also actions against Patrice Lumumba of the Congo and the Dominican Republic’s Rafael Trujillo. The Church Committee’s interim and final reports remain an important source of information on those operations (United States Senate 1975a, 1975b, 1976). Also valuable, in terms of the question of congressional oversight, are the accounts of the investigation itself (Johnson 1985; Treverton 1987; Smist 1994).
The Church and Pike investigation committees eventually led to the establishment of the Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI), standing committees charged with oversight responsibility. However, despite the new committees and the passage of the 1980 Intelligence Oversight Act, which incorporated the covert action-finding requirement of the Hughes-Ryan Amendment, the Iran-Contra scandal served as a rude awakening that important gaps remained in the new system of congressional oversight of covert action. In response, Congress adopted more stringent provisions in the 1991 Intelligence Authorization Act, which is still the governing legislation on congressional oversight requirements. The Act codified two requirements for any covert action. First, there must be a written Presidential finding, which cannot be issued retroactively, stating that the action is important to US national security. Second, the administration must notify the intelligence committees of the action as soon as possible after the finding has been issued and before the initiation of the operation, unless “extraordinary circumstances” exist, in which case the president must fully inform the committees “in a timely fashion” (50 USC 413(b)(e)).
Not surprisingly, the literature regarding the oversight of covert action is considerably fuller for the post-1975 period, as various scholars have investigated how well Congress has fulfilled the oversight charge it gave itself in creating the two standing intelligence committees. In the wake of Iran-Contra, there was some debate over where the evident problem in the oversight system lay. Johnson (1989b) found that the oversight system had “struck an appropriate balance between control and discretion” and argued that the problem lay in the unwillingness of some members of the executive branch to abide by the rules set by Congress, while others argued that Congress needed to play a more active oversight role (Damrosch 1989). The next wave of analysis of congressional oversight was triggered by the events of 9/11 and the weapons of mass destruction (WMD) in Iraq question, which served to highlight the ongoing and crucial need for better oversight. In this most recent phase of the oversight literature, which has become increasingly detailed and sophisticated, discussion of covert action oversight is usually subsumed in the studies of intelligence oversight in general (e.g., Johnson 2005; Snider 2005; McDonough et al. 2006).
The newest wrinkle in the covert action oversight question is the dilemma posed by the increased use of special operations forces post–9/11 for what is, in essence, covert action, although the Pentagon defines it as traditional military action (Kibbe 2004, 2007; Baker 2007). Here the focus of the problem is on the jurisdictional complexity involved in covert action oversight. While the intelligence committees are ostensibly the main oversight bodies, if it is an operation conducted by special operations forces, funding authorization and oversight in the Senate shift to the Armed Services Committee (in the House, they remain with the intelligence committee). Second, in both houses the Armed Services Committees have ultimate control over the intelligence authorization process in any case, since they must sign off on intelligence authorization bills before they go to the full House and Senate for votes. Finally, the appropriations for most intelligence activities are included as a classified section of the defense appropriations bill, meaning that the real control over the intelligence purse lies with the defense subcommittees of the two Appropriations Committees. While the 9/11 Commission, among others, recommended several ways of alleviating this longstanding obstacle to effective oversight, the entrenched bureaucratic power of various committees continues to doom much chance of reform, leaving the effectiveness of Congressional oversight of covert action questionable at best.
While the literature on legislative oversight is dominated by analyses of the US Congress, there has been an increasing amount of work done comparing legislative oversight structures across a variety of established and emerging democracies, and attempting to determine best practices for democratic accountability of intelligence operations (Born et al. 2005; Born and Caparini 2007).
Law and Policy Making
There are a number of useful analyses of the evolution of US law covering covert action, including Cinquegrana (1988), Johnson (1989b, 1996), and Reisman and Baker (1992). Gumina (1992) provides a detailed analysis of the covert action statutes in terms of the separation of powers (see also Eyth 2002). In addition, numerous scholars have focused on the legal issues raised by the covert aspects of the war against terrorism, including rendition (Neuman 2004; Weissbrodt and Bergquist 2006; Baker 2007).
Reisman and Baker (1992) provide what is still the best overall examination of the international legal issues involved in covert action, even though some legal experts are critical of their “contextual” argument that whether a particular covert operation is within the bounds of international law depends on the context in which it is taken, granting more leeway to major actors and beneficial purposes.
Another relatively recent development in the covert action literature has been the closer attention being paid to the process by which the executive branch arrives at covert action policies. Several scholars have carefully laid out the policy making procedures that various administrations have used to respond to the increased statutory requirements regarding covert action, including Johnson (1989b), Reisman and Baker (1992), and Daugherty (2004).
- Aldrich, R.J. (2002) The Hidden Hand: Britain, America, and Cold War Secret Intelligence. New York: Overlook Press.
- Aldrich, R.J., Rawnsley, G., and Rawnsley, M. (eds.) (2000) The Clandestine Cold War in Asia, 1945–65. Portland, OR: Frank Cass.
- Andrew, C. (1985) Her Majesty’s Secret Service: The Making of the British Intelligence Community. New York: Viking.
- Andrew, C. (1995) For the President’s Eyes Only: Secret Intelligence and the American Presidency from Washington to Bush. New York: HarperCollins.
- Andrew, C., and Gordievsky, O. (1990) KGB: The Inside Story. London: Hodder & Stoughton.
- Andrew, C., and Mitrokhin, V. (1999) The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB. New York: Basic Books.
- Andrew, C., and Mitrokhin, V. (2005) The World Was Going Our Way: The KGB and the Battle for the Third World. New York: Basic Books.
- Armistead, E.L. (2003) Information Operations: Warfare and the Hard Reality of Soft Power. Washington, DC: Potomac.
- Baer, R. (2002) See No Evil: The True Story of a Ground Soldier in the CIA’s War on Terrorism. New York: Crown.
- Baker, J.E. (2007) From Cold War to Long War: Covert Action in U.S. Legal Context. In L.K. Johnson (ed.) Strategic Intelligence Volume 3: Covert Action. Westport, CT: Praeger Security International, pp. 157–76.
- Barrett, B.M. (2005) Information Warfare: China’s Response to US Technological Advantages. International Journal of Intelligence and Counterintelligence 18, 682–706.
- Barrett, D.M. (2005) The CIA and Congress: The Untold Story from Truman to Kennedy. Lawrence, KS: University Press of Kansas.
- Barry, J.A. (1993) Covert Action Can Be Just. Orbis 37, 375–90.
- Beitz, C.R. (1989) Covert Intervention as a Moral Problem. Ethics and International Affairs 3, 45–60.
- Berkowitz, B.D., and Goodman, A.E. (1998) The Logic of Covert Action. National Interest 51, 38–46.
- Bill, J.A. (1988) The Eagle and the Lion: The Tragedy of American–Iranian Relations. New Haven, CT: Yale University Press.
- Blackstock, P.W. (1964) The Strategy of Subversion: Manipulating the Politics of Other Nations. Chicago: Quadrangle Books.
- Blight, J.G., and Kornbluh, P. (1998) Politics of Illusion: The Bay of Pigs Invasion Reexamined. Boulder, CO: Lynne Rienner.
- Blum, W. (1986) The CIA, A Forgotten History: U.S. Global Interventions Since World War 2. London: Zed Books.
- Born, H., and Caparini, M. (2007) Democratic Control of Intelligence Services. Burlington, VT: Ashgate.
- Born, H., Johnson, L.K., and Leigh I. (2005) Who’s Watching the Spies? Establishing Intelligence Service Accountability. Washington, DC: Potomac Books.
- Byman, Daniel. (2006) Do Targeted Killings Work? Foreign Affairs 85, 95–111.
- Carter, J.J. (2000) Covert Operations as a Tool of Presidential Foreign Policy in American History from 1800 to 1920. Lewiston, NY: Edwin Mellen Press.
- Cinquegrana, A.R. (1988) Dancing in the Dark: Accepting the Invitation to Struggle in the Context of “Covert Action,” The Iran-Contra Affair and the Intelligence Oversight Process. Houston Journal of International Law 11(1), 177–209.
- Clarke, R. (2004) Against All Enemies. New York: Free Press.
- Codevilla, A. (1992) Informing Statecraft: Intelligence for a New Century. New York: Free Press.
- Colby, W.E. (1989) Public Policy, Secret Action. Ethics and International Affairs 3, 61–71.
- Coleman, P. (1989) The Liberal Conspiracy: The Congress for Cultural Freedom and the Struggle for the Mind of Postwar Europe. New York: Free Press.
- Coll, S. (2004) Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, From the Soviet Invasion to September 10, 2001. New York: Penguin.
- Damrosch, L.F. (1989) Covert Operations. American Journal of International Law 83, 795–805.
- Daugherty, W.J. (2004) Executive Secrets: Covert Action and the Presidency. Lexington, KY: University Press of Kentucky.
- Davenport, E., Eddy, P., and Gillman, P. (1978) The Plumbat Affair. London: Andre Deutsch.
- Davies, P.H.J. (2004) MI6 and the Machinery of Spying: Structure and Process in Britain’s Secret Intelligence. London: Frank Cass.
- Deriabin, P., and Bagley, T.H. (1990) KGB: Masters of the Soviet Union. New York: Hippocrene Books.
- Dorril, S. (2000) MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service. New York: Free Press.
- Eftimiades, N. (1994) Chinese Intelligence Operations. Annapolis, MD: Naval Institute Press.
- Eisendrath, C. (2000) Introduction. In C. Eisendrath (ed.) National Insecurity: U.S. Intelligence After the Cold War. Philadelpia: Temple University Press.
- Eyth, M. (2002) The CIA and Covert Operations: To Disclose or Not to Disclose – That Is the Question. BYU Journal of Public Law 17, 45–72.
- Ferris, J. (1995) Coming in from the Cold War: The Historiography of American Intelligence, 1945–1990. Diplomatic History 19, 87–115.
- Garthoff, R.L. (2004) Foreign Intelligence and the Historiography of the Cold War. Journal of Cold War Studies 6, 21–56.
- Gasiorowski, M.J. (1987) The 1953 Coup D’Etat in Iran. International Journal of Middle East Studies 19, 261–286.
- Gleijeses, P. (1991) Shattered Hope: The Guatemalan Revolution and the United States, 1944–1954. Princeton, NJ: Princeton University Press.
- Gleijeses, P. (1995) Ships in the Night: The CIA the White House and the Bay of Pigs. Journal of Latin American Studies, 27, 1–42.
- Godson, R. (1995) Dirty Tricks or Trump Cards: U.S. Covert Action and Counterintelligence. Washington, DC: Brassey’s.
- Golan, A. (1978) Operation Susannah. New York: Harper & Row.
- Goodman, M.A. (2000) Espionage and Covert Action. In C. Eisendrath (ed.) National Insecurity: U.S. Intelligence after the Cold War. Philadelpia: Temple University Press.
- Gumina, P. (1992) Title VI of the Intelligence Authorization Act, Fiscal Year 1991: Effective Covert Action Reform or “Business as Usual”? Hastings Constitutional Law Quarterly 20, 149–205.
- Higgins, T. (1987) The Perfect Failure: Kennedy, Eisenhower, and the CIA at the Bay of Pigs. New York: Norton.
- House Permanent Select Committee on Intelligence (1996). IC21: The Intelligence Community in the 21st Century. Washington, DC: Government Printing Office.
- Howard, M. (1990) Strategic Deception in the Second World War. London: Pimlico.
- Hulnick, A.S., and Mattausch, D.W. (1989) Ethics and Morality in United States Secret Intelligence. Harvard Journal of Law and Public Policy 12 (2), 520–2.
- Immerman, R.H. (1982) The CIA in Guatemala: The Foreign Policy of Intervention. Austin, TX: University of Texas Press.
- Jakub, J. (1999) Spies and Saboteurs: Anglo-American Collaboration and Rivalry in Human Intelligence Collection and Special Operations, 1940–45. New York: St. Martin’s.
- Jeffreys-Jones, R. (1989) The CIA and American Democracy. New Haven, CT: Yale University Press.
- Johnson, B.M. (1992) Executive Order 12,333: The Permissibility of an American Assassination of a Foreign Leader. Cornell International Law Journal 25, 401–36.
- Johnson, L.K. (1985) A Season of Inquiry: The Senate Intelligence Investigation. Lexington, KY: University Press of Kentucky.
- Johnson, L.K. (1989a) America’s Secret Power: The CIA in a Democratic Society. New York: Oxford University Press.
- Johnson, L.K. (1989b) Covert Action and Accountability: Decision-Making for America’s Secret Foreign Policy. International Studies Quarterly 33, 81–109.
- Johnson, L.K. (1996) Secret Agencies: US Intelligence in a Hostile World. New Haven, CT: Yale University Press.
- Johnson, L.K. (2000) Bombs, Bugs, Drugs, and Thugs: Intelligence and America’s Quest for Security. New York: New York University Press.
- Johnson, L.K. (2005) Accountability and America’s Secret Foreign Policy: Keeping a Legislative Eye on the Central Intelligence Agency. Foreign Policy Analysis 1, 99–120.
- Jones, A., and Remenyi, D. (eds.) (2004) Third European Conference on Information Warfare and Security, London: Royal Holloway, University of London.
- Kahana, E. (2007) Covert Action: The Israeli Experience. In L.K. Johnson (ed.) Strategic Intelligence Volume 3: Covert Action. Westport, CT: Praeger Security International, pp. 61–82.
- Kahin, A.R., and Kahin, G.M. (1995) Subversion as Foreign Policy: The Secret Eisenhower and Dulles Debacle in Indonesia. New York: New Press.
- Kibbe, J.D. (2002) Presidents as Kingmakers: United States Decisions to Overthrow Foreign Government. PhD dissertation. University of California, Los Angeles.
- Kibbe, J.D. (2004) The Rise of the Secret Warriors. Foreign Affairs 83, 102–15.
- Kibbe, J.D. (2007) Covert Action and the Pentagon. Intelligence and National Security 22, 57–74.
- Knott, S.F. (1996) Secret and Sanctioned: Covert Operations and the American Presidency. New York: Oxford University Press.
- Kornbluh, P. (2003) The Pinochet File: A Declassified Dossier on Atrocity and Accountability. New York: New Press.
- Lesch, D.W. (1992) Syria and the United States: Eisenhower’s Cold War in the Middle East. San Francisco: Westview.
- Little, D. (1990) Cold War and Covert Action: The United States and Syria, 1945–1958. Middle East Studies 44, 51–75.
- Little, D. (2004) Mission Impossible: The CIA and the Cult of Covert Action in the Middle East. Diplomatic History 28, 663–701.
- Mauch, C.T., and Riemer, J. (2003) The Shadow War against Hitler: The Covert Operations of American’s Wartime Secret Intelligence Service. New York: Columbia University Press.
- McDonough, D., Rudman, M., and Rundlet, P. (2006) No Mere Oversight: Congressional Oversight of Intelligence Is Broken. Washington, DC: Center for American Progress.
- McIntosh, E.P. (1998) Sisterhood of Spies: The Women of OSS. Annapolis, MD: Naval Institute Press.
- Neuman, G.L. (2004) Counterterrorist Operations and the Rule of Law. European Journal of International Law 15, 1019–1029.
- O’Brien, K.A. (1995) Interfering with Civil Society: CIA and KGB Covert Political Action during the Cold War. International Journal of Intelligence and Counterintelligence 8, 431–56.
- O’Brien, K.A. (2001a) Counter-Intelligence for Counter-Revolutionary Warfare: The South African Police Security Branch 1979–1990. Intelligence and National Security 16, 27–59.
- O’Brien, K.A. (2001b) The Use of Assassination as a Tool of State Policy: South Africa’s Counter-Revolutionary Strategy 1979–1992. Terrorism and Political Violence 13, 107–42.
- Pape, M.S. (2002) Can We Put the Leaders of the “Axis of Evil” in the Crosshairs? Parameters 62–71.
- Peters, R. (1996) A Revolution in Military Ethics? Parameters 26 (2), 102–8.
- Porch, D. (1995) The French Secret Services. New York: Farrar, Straus, and Giroux.
- Prados, J. (1986) Presidents’ Secret Wars: CIA and Pentagon Covert Operations since World War II. New York: William Morrow.
- Prados, J. (2006) Safe for Democracy: The Secret Wars of the CIA. Chicago: Ivan R. Dee.
- Rabe, S.G. (2005) U.S. Intervention in British Guiana: A Cold War Story. Chapel Hill, NC: University of North Carolina Press.
- Ranelagh, J. (1986) The Agency: The Rise and Decline of the CIA. New York: Simon & Schuster.
- Ransom, H.H. (1970) The Intelligence Establishment. Cambridge, MA: Harvard University Press.
- Raviv, D., and Melman, Y. (1990) Every Spy a Prince: The Complete History of Israel’s Intelligence Community. London: Houghton Mifflin.
- Reisman, W.M., and Baker, J.E. (1992) Regulating Covert Action: Practices, Contexts, and Policies of Covert Coercion Abroad in International and American Law. New Haven, CT: Yale University Press.
- Richelson, J.T. (1986) Sword and Shield: Soviet Intelligence and Security Apparatus. Cambridge, MA: Ballinger.
- Richelson, J.T. (2002) When Kindness Fails: Assassination as a National Security Option. International Journal of Intelligence and Counterintelligence 15, 243–74.
- Roosevelt, K. (1979) Countercoup: The Struggle for Control of Iran. New York: McGraw-Hill.
- Rositzke, H.A. (1977) The CIA’s Secret Operations: Espionage, Counterespionage, and Covert Action. New York: Reader’s Digest Press.
- Rudgers, D.F. (2000) The Origins of Covert Action. Journal of Contemporary History 35(2), 249–62.
- Saunders, F.S. (2000) The Cultural Cold War: The CIA and the World of Arts and Letters. New York: New Press.
- Schlesinger, S., and Kinzer, S. (1982) Bitter Fruit: The Untold Story of the American Coup in Guatemala. Garden City, NJ: Doubleday.
- Schroen, G. (2005) First In: An Insider’s Account of How the CIA Spearheaded the War on Terror in Afghanistan. New York: Presidio Press.
- Scott, L. (2004) Secret Intelligence, Covert Action and Clandestine Diplomacy. Intelligence and National Security 19(2), 322–41.
- Shultz, R.H. (1989) Covert Action. In R. Godson (ed.) Intelligence Requirements for the 1990s. Lexington, MA: Lexington Books.
- Sigmund, P.E. (1993) The United States and Democracy in Chile. Baltimore: Johns Hopkins University Press.
- Smist, F.J. (1994) Congress Oversees the United States Intelligence Community 1947–1994. Knoxville, TN: University of Tennessee Press.
- Smith, B.F. (1983) The Shadow Warriors: O.S.S. and the Origins of the C.I.A. New York: Basic Books.
- Smith, R.H. (1972) OSS: The Secret History of America’s First Central Intelligence Agency. Berkeley: University of California Press.
- Snider, L.B. (2005) Congressional Oversight of Intelligence after September 11. In J.E. Sims and B. Gerber (eds.) Transforming U.S. Intelligence. Washington, DC: Georgetown University Press, pp. 239–58.
- Söderblom, J.D. (2004) Time to Kill? State Sponsored Assassination and International Law. World International Community Experts. At http://world-ice.com/Articles/Assassinations.pdf, accessed March 2009.
- Steiner, J.E. (2006) Restoring the Red Line Between Intelligence and Policy on Covert Action. International Journal of Intelligence and Counterintelligence 19, 156–165.
- Thomas, G. (1999) Gideon’s Spies: Mossad’s Secret Warriors. London: Macmillan.
- Thomas, W. (2000) Norms and Security: The Case of International Assassination. International Security 25, 105–33.
- Treverton, G.F. (1987) Covert Action: The Limits of Intervention in the Postwar World. New York: Basic Books.
- Treverton, G.F. (1989) Imposing a Standard: Covert Action and American Democracy. Ethics and International Affairs 3, 27–43.
- Treverton, G.F. (2007) Covert Action: Forward to the Past? In L.K. Johnson (ed.) Strategic Intelligence Volume 3: Covert Action. Westport, CT: Praeger Security International, pp. 1–21.
- Turner, M.A. (2007) Covert Action: An Appraisal of the Effects of Secret Propaganda. In L.K. Johnson (ed.) Strategic Intelligence Volume 3: Covert Action. Westport, CT: Praeger Security International, pp. 197–217.
- Twentieth Century Fund (1992) The Need to Know: The Report of the Twentieth Century Fund Task Force on Covert Action and American Democracy. New York: Twentieth Century Fund Press.
- U.S. Department of State (2003) Foreign Relations of the United States, 1952–1954: Guatemala. Washington, DC: U.S. Government Printing Office.
- United States Senate (1975a) Alleged Assassination Plots Involving Foreign Leaders: An Interim Report to the Select Committee to Study Governmental Operations with Respect to Intelligence Activities. Washington, DC: Government Printing Office.
- United States Senate (1975b) Staff Study: Covert Operations in Chile, 1963–1973. Washington, DC: Government Printing Office.
- United States Senate (1976) Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities (Books I, IV, and VI). Washington, DC: Government Printing Office.
- Van Wagenen, J.S. (1997) A Review of Congressional Oversight. Studies in Intelligence. At https:/www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/97unclass/wagenen.html, accessed February 2008.
- Warner, M. (2000) The Office of Strategic Services – America’s First Intelligence Agency. Washington, DC: Central Intelligence Agency.
- Weissbrodt, D., and Bergquist, A. (2006) Extraordinary Rendition: A Human Rights Analysis. Harvard Human Rights Journal 19, 123–60.
- Wilford, H. (2008) The Mighty Wurlitzer: How the CIA Played America. Cambridge, MA: Harvard University Press.
- Wise D., and Ross, T.B. (1964) The Invisible Government. New York: Random House.
- Wyden, P. (1979) Bay of Pigs: The Untold Story. New York: Simon & Schuster.
Links to Digital Materials
Chile Documentation Project, National Security Archive. At http://www.gwu.edu/~nsarchiv/latin_america/chile.htm, accessed June 4, 2009. The National Security Archive is an independent nongovernmental research institute that collects and publishes declassified documents obtained through the Freedom of Information Act. The Chile Project provides access to thousands of documents related to the Nixon administration and the 1973 coup in Chile.
Foreign Relations of the United States, 1952–1954, Guatemala. At http://digital.library.wisc.edu/1711.dl/FRUS.FRUS195254Guat, accessed June 4, 2009. Digital copy of the US Department of State’s official archival record (published in 2003) of US relations with Guatemala during the period leading up to the CIA coup in 1954.
Literature of Intelligence. At http://intellit.muskingum.edu/covertaction_folder/catoc.html, accessed June 4, 2009. Online bibliography of intelligence materials maintained for the past decade by J. Ransom Clark of Muskingum College. Listed address links directly to the covert action chapter. Many entries include excerpts and/or links to reviews of the works listed.
Secrecy News. At http://www.fas.org/blog/secrecy/, accessed June 4, 2009. Blog by the FAS Project on Government Secrecy (Federation of American Scientists). Secrecy News provides links to newly released or declassified papers and reports about a variety of security and intelligence topics, including covert action. Often includes helpful editorial commentary.
US Covert Actions and Counter-insurgency Programs. At http://nasser.bibalex.org/Data/USDocWeb/HTML/XXIV,%20Africa%201964–68/www.state.gov/www/about_state/history/vol_xxiv/covert_actions.html, accessed June 4, 2009. An explanatory note from the FRUS editors (part of the 1964–1968, Africa volume) describing, on the basis of previously declassified documents, the changing procedures for planning and approving covert actions during the Truman, Eisenhower, Kennedy, and Johnson Presidencies. | <urn:uuid:28869a99-2a64-4287-8492-2c03f0c12bd2> | CC-MAIN-2021-39 | https://oxfordre.com/internationalstudies/view/10.1093/acrefore/9780190846626.001.0001/acrefore-9780190846626-e-135 | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058456.86/warc/CC-MAIN-20210927151238-20210927181238-00075.warc.gz | en | 0.920786 | 16,644 | 2.984375 | 3 |
- a person who possesses great power, as a sovereign, monarch, or ruler.
Origin of potentate
Related Words for potentatedespot, king, majesty, ruler, queen, autocrat, sovereign, empress, chief, royalty, dictator, chieftain, emperor, prince, leader, princess
Examples from the Web for potentate
Contemporary Examples of potentate
Money became a potentate whose power is greater even than that of the president, controlling and outlasting any political fortune.Money Rules in the New D.C.
April 8, 2009
Historical Examples of potentate
I don't know whether that potentate ever communicated with me.
The potentate glanced at the pianist, and then dropped his heavy eyelids.Melomaniacs
They know no gratitude, and they would not cringe to the greatest Christian potentate.The Philippine Islands
The potentate saw that flash of glory, and put himself "on-side."Ambrotox and Limping Dick
As a matter of fact, the newcomer did not look in the least like an Eastern potentate.The Slave of Silence
Fred M. White
- a person who possesses great power or authority, esp a ruler or monarch
Word Origin for potentate
Word Origin and History for potentate
c.1400, from Old French potentat and directly from Late Latin potentatus "a ruler," also "political power," from Latin potentatus "might, power, rule, dominion," from potentem (nominative potens) "powerful" (see potent). | <urn:uuid:53ea63e9-479a-4a6a-a780-05963ab87da9> | CC-MAIN-2018-43 | https://www.dictionary.com/browse/potentate | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512014.61/warc/CC-MAIN-20181018194005-20181018215505-00038.warc.gz | en | 0.87768 | 324 | 2.921875 | 3 |
“Look!” exclaimed my nine year old daughter as she ran to meet me after school, arms outstretched. In one hand she held a small paper lantern with an opening the size of a pea that was covered in electrical tape. In the other, she held little light bulbs, the size of the ones on a string of holiday lights, that were wired to a coin battery. She inserted one of the lights into the lantern, pushed the battery, and lit her lantern.
The origami lantern is just one the many projects she completed in her electronics class. This semester she learned the basics of electricity and electronics through hands-on experimenting and building. It began with building circuits to learn about series/parallel, basic logic, lights/sounds, burglar alarms, and AM radios and transmitters. Starting with the basics, the kids progressed to building AM radios, origami lanterns powered by LED lights, and will be making a home made burglar alarm out of common household materials and a buzzer next week!
Understanding electronics through circuitry is the perfect blend of science, technology, engineering, and math— STEM topics. While my daughter has been introduced to engineering and has mentors in science related fields, many girls are not as fortunate.
If you’re intimidated by science, technology, engineering, and math, don’t be! One of the best ways to encourage your daughter to learn about these topics is to learn together. Here are 3 ways that allow you to learn more about STEM topics and explore them together.
Do some engineering at home. Try these hands on engineering activities. There’s also nothing wrong with taking apart old electronics to take a look inside at how they work.
Learn through play. Created by female Stanford engineers to nurture a new generation of girls, toys such as Goldie Blox and Roominate are designed to motivate girls into thinking about technology innovation by exposing them to interactive building toys that incorporate STEM. Snap Circuits sets are also wonderful because they teach electronics and circuitry in a hands-on-way and there are always opportunities to advance skills by purchasing add on sets. | <urn:uuid:d32f11ad-e6c2-4cf2-bde7-ed0b1dd94792> | CC-MAIN-2017-04 | http://www.scholastic.com/parents/blogs/scholastic-parents-learning-toolkit/encouraging-tween-girls-to-learn-about-stem | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00574-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.967625 | 435 | 3.890625 | 4 |
The Landsat program provides more than three decades of decameter resolution multispectral observations of the growth and evolution of human settlements and development worldwide. While these changes are often easy to observe visually, accurate repeatable quantification at Landsat's resolution has proven elusive. In part, this is a consequence of the multi - scale heterogeneity and diversity of settlements worldwide. Efforts to map settlement extent are also confounded by the lac k of a single, physically - based, definition of what constitutes urban, suburban, peri - urban and other types of settlement. We attempt to resolve both of these challenges by characterizing built environments in terms of their distinctive physical properties . This can be accomplished by combining multi - temporal optical reflectance with synthetic aperture radar backscatter measurements to identify combinations of physical properties that distinguish built environments from other types of land cover. Three well - known examples include an abundance of impervious surface, persistent deep shadow between buildings and high density of corner reflectors at meter to decameter scales. At optical wavelengths, spectral properties of land cover can be represented using stan dardized spectral endmember fractions to represent combinations of the most spectrally and functionally distinct components of land cover soil and impervious substrates, vegetation, water and shadow. The spectral similarity of soils and impervious substra tes that makes thematic classifications error prone can be resolved by using multi - season composites of spectral endmembers to distinguish spectrally stable impervious substrates from temporally variable soil reflectance resulting from seasonal changes in moisture content (thus albedo) and fractional vegetation cover. By representing the diversity of anthropogenic land use as a continuous mosaic of land cover it is possible to quantify the wide variety of human settlements in a way that is physically consis tent, repeatable and scalable. We propose to develop and test algorithms to combine multi - season Landsat and Sentinel - 2 optical multispectral imagery with SRTM and Sentinel - 1 C - band radar backscatter imagery to produce a continuous Infrastructure Index (II ) to identify and map changes in the extent of anthropogenic built environments (e.g. urban, suburban, exurban, peri - urban) worldwide between 2000 and 2015. Rather than attempting to map specific features associated with built environments (e.g. impervious surfaces, buildings, roads), we will characterize the combined optical and microwave response of a wide range of built environments to identify the physical properties associated with these features (e.g. spectral stability, persistent shadow, anisotropic backscatter intensity). We will then use the most persistent of these properties to derive an index incorporating multiple characteristics measured by both optical and microwave sensors. The index will be calibrated using the full range of properties obse rved in a set of ~20 test sites spanning urban - rural gradients worldwide and vicariously validated using high spatial resolution (1 - 4 m) imagery and the DLR 8 m urban footprint product. As an independent comparison, we will use high resolution (sub - km) cen sus enumerations circa 2000 and 2010 to map changes in population density associated with the mapped changes in the infrastructure index at test sites in the USA, Brazil, Portugal, Malawi, South Africa and Sri Lanka. | <urn:uuid:05ff6646-33da-498b-a180-e1fb2adba7c3> | CC-MAIN-2017-26 | http://lcluc.umd.edu/projects/multi-source-imaging-infrastructure-and-urban-growth-using-landsat-sentinel-and-srtm-2 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323680.18/warc/CC-MAIN-20170628120308-20170628140308-00689.warc.gz | en | 0.893526 | 661 | 2.640625 | 3 |
- Flora Samsa mentions her great-great-great-great-great-great-great-uncle Gregor Samsa.
- James Henry Atkinson invented the snapping mousetrap in 1897.
- Mrs Samsa serves a roast chicken for dinner.
- In the far future, mice have evolved into sentient humanoid life-forms, the new dominant species of Earth.
- Omega theorised that living matter could be imbued with the time winds to create a being that would live forever.
to be added
Community content is available under CC-BY-SA unless otherwise noted. | <urn:uuid:fcf8c2d6-9138-44fd-a83d-ed641bff28e2> | CC-MAIN-2020-45 | https://tardis.fandom.com/wiki/Omegamorphosis_(short_story) | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107865665.7/warc/CC-MAIN-20201023204939-20201023234939-00012.warc.gz | en | 0.846756 | 122 | 2.546875 | 3 |
The basic idea is that all citizens from different segments of society should be able to influence important decisions directly to Parliament through the internet democracy .
" Representative democracy " has ceased to operate in accordance with the theory . Too many politicians "full -time" seem to be controlled by short-term personal interests or incompetence , and the fundamental interests of citizens are ignored.
Moreover, political parties have ceased to meet the requirements for democracy . We humans should , therefore , to take direct responsibility for what happens to us , by creating a real democracy .
Political elite does not know what democracy means ( democracy means majority rule ) with intent , they misunderstand what is true democracy, in order to protect their power and to take their big piece of cake for themselves.
We can not let this rule " few people decide " to become the norm for "democracy" , because , then dictatorship is not far.
It is very important to develop real democracy while it is still somewhat possible . We still have the right to organize ourselves so let's do it ! Can do together to ensure that our views have power . We can put into operation the power of all citizens , if we can unite .
The most important task for direct democracy is to give citizens the opportunity to quickly remove politicians when they make bad decisions , but also the ability to support competent politicians . Four years of corrupt governance that have no possibility of influence is too much. Citizens must be able to influence more than that .
When people begin to understand , they will be more effective and see more clearly and influence more effective reality in which they live
The most important on the direct- democracy is that it has an ideology that ignores completely political thinking color party and leave any decision to citizen , all in accordance with the principles of direct democracy in harmony with the true representative democracy , called " direct democracy representative " .
In practice , this means that as a national delegate may vote either direction . You can choose to become a delegate to the others . Your opinion and your vote as a delegate will be presented through an account to vote, the same as any existing bank account on the Internet today .
Peoples elected in parliament will have to accept a true democracy through written agreements with the risk of being sued in a court of law. The direct purpose of democracy is to avoid corruption by seeking idealists who believe the democratic principles for this task. | <urn:uuid:e8056710-0abf-4751-9213-465a30e5ed64> | CC-MAIN-2017-09 | http://democratiedirecta.com/index.php/english | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00551-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.964652 | 478 | 2.65625 | 3 |
New Mexico Utility officials announced plans Thursday to build a giant solar energy plant in the New Mexico desert in what is believed to be the largest such project in the nation.
The 92-megawatt solar thermal plant could produce enough electricity to power 74,000 homes, far exceeding the size of other solar plants in the United States. The largest solar thermal plant in operation now is about 70 megawatts, said Dave Knox, a spokesman for New Jersey-based NRG Energy, the company building and running the facility.
“This is larger than anything in existence in America so far today,” he said.
The plant was announced at a time when communities around the country are drawing up plans for solar and other alternative energy projects, especially with millions of dollars in stimulus money available. | <urn:uuid:94acddbf-46ec-4982-9b92-ddff1134fd37> | CC-MAIN-2017-39 | http://www2.ljworld.com/news/2009/jun/12/site-nations-largest-solar-plant-picked/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689897.78/warc/CC-MAIN-20170924062956-20170924082956-00245.warc.gz | en | 0.937939 | 160 | 2.578125 | 3 |
When people engage is risky behavior, such as drunk driving or unsafe sex, it’s probably not because their brains’ desire systems are too active, but because their self-control systems are not active enough.
For a new study published in the Proceedings of the National Academy of Sciences, researchers analyzed data from 108 subjects who sat in a magnetic resonance imaging (MRI) scanner, a machine that allows researchers to pinpoint brain activity in vivid 3D images, while playing a video game that simulates risk-taking.
The researchers used specialized software to look for patterns of activity across the whole brain that preceded a person’s making a risky choice or a safe choice in one set of subjects. Then they asked the software to predict what else subjects would choose during the game based solely on their brain activity. The software accurately predicted people’s choices 71 percent of the time.
“These patterns are reliable enough that not only can we predict what will happen in an additional test on the same person, but on people we haven’t seen before,” says Russell Poldrack, professor of psychology and neuroscience at the University of Texas at Austin and director of the Imaging Research Center.
When the researchers trained their software on much smaller regions of the brain, they found that just analyzing the regions typically involved in executive functions such as control, working memory, and attention was enough to predict a person’s future choices. Therefore, the researchers conclude, when we make risky choices, it is primarily because of the failure of our control systems to stop us.
A function of control
“We all have these desires, but whether we act on them is a function of control,” says Sarah Helfinstein, a postdoctoral researcher and the study’s lead author.
Additional research could focus on how external factors, such as peer pressure, lack of sleep, or hunger, weaken the activity of our brains’ control systems when we contemplate risky decisions.
“If we can figure out the factors in the world that influence the brain, we can draw conclusions about what actions are best at helping people resist risks,” Helfinstein says.
To simulate features of real-world risk-taking, the researchers used a video game called the Balloon Analogue Risk Task (BART) that past research has shown correlates well with self-reported risk-taking such as drug and alcohol use, smoking, gambling, driving without a seatbelt, stealing, and engaging in unprotected sex.
Take a risk or play it safe?
While playing the BART, the subject sees a balloon on the screen and is asked to make either a risky choice (inflate the balloon a little and earn a few cents) or a safe choice (stop the round and “cash out,” keeping whatever money was earned up to that point). Sometimes inflating the balloon causes it to burst and the player loses all the cash earned from that round.
After each successful balloon inflation, the game continues with the chance of earning another standard-sized reward or losing an increasingly large amount. Many health-relevant risky decisions share this same structure, such as when deciding how many alcoholic beverages to drink before driving home or how much one can experiment with drugs or cigarettes before developing an addiction.
Researchers from Yale University contributed to the study, which was supported by the National Institutes of Health, the Consortium for Neuropsychiatric Phenomics and the Tennenbaum Center for the Biology of Creativity.
Source: University of Texas at Austin | <urn:uuid:fc78a5d8-721d-4715-a00d-8c86aecee50f> | CC-MAIN-2020-16 | https://www.futurity.org/take-risks-just-cant-stop/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371604800.52/warc/CC-MAIN-20200405115129-20200405145629-00284.warc.gz | en | 0.945951 | 720 | 3.125 | 3 |
Table Top Weathervane
Students will create a miniature table top weather vane from cardboard or wood.
By Andrea Mulder-Slater
A weathervane lets people know which way the wind is blowing. A useful concept turned decorative object, the earliest weathervanes were very simple carvings of animals such as fish and roosters. Eventually, more designs began to emerge as arrows, cows, pigs and angels started to appear on rooftops all across North America.
Traditionally, weathervanes were made sheets of metal or they were carved out of wood. You can create a miniature weather vane using several techniques ranging from cardboard cut-outs to paper mache. For this particular weathervane, you can use cardboard – especially if you are working with a classroom full of children. If you have the facilities – and the time however, you could try this project with wood (if you have a scroll saw and a steady hand).
- Students will be directed to observe weather vanes and discuss their purpose and history.
- Students will discover the history of weather vanes.
- Students will create a miniature weather vane from cardboard or wood.
- Students will learn to appreciate the art created not only by them, but by others as well.
What You Need:
- Thick cardboard (or thin wood – if you choose).
- Scissors or a scroll saw (depending on the material you choose to use)
- Paint or other method of finishing your weathervane
- Paintbrush, water, containers etc.
- A small piece of dowel or a stick
- A piece of wood to act as a stand for your weathervane
What You Do:
- First, have a look at some actual weathervanes or pictures of weathervanes, to give yourself an idea of what direction you would like to go in terms of design.
- Next, draw a simple outline of a rooster, pig, cow, or whatever you like, on your cardboard (or wood). [see below for patterns]
- Cut out the shape and decorate using one of any number of paints or finishes.The craft supply store is a great place to find different ways of finishing wood and paper. You can buy the following kits:
- Pickling Stain (for wood only) – This allows the grain of wood to show through a veil of transparent color.
- Crackle Medium – This offers an antiqued or weathered look.
- Instant Rust – This is a nifty kit that allows you to create the illusion of metal.
- If you don’t have access to the fancy finishes from the craft store, simply layer different colors of paint on your weathervane and sand lightly between coats. This way, the colors beneath will peek through the colors above – giving you some depth and texture.
- Once your design and painting is complete, attach to a wooden dowel (you can also apply the same finishing medium to the dowel) and attach that to a block of wood. (Drill a hole in your wood block, apply some glue and fit the dowel in the hole). In fact, why not take your block of wood and cut it into a circular shape … even more interesting would be to create a miniature rooftop using two blocks of wood attached together in a triangle.
- The possibilities are endless.
► Folk art cow
► Folk Art Horse
► Folk Art Pig
Join Our Club:
Join The KinderArt Club for detailed step-by-step lessons and resources to help you teach your students and children about the Weather.
This bundle (plus many more) can be found inside.
Become a member at https://thekinderartclub.com/vip | <urn:uuid:ae794ad6-130a-4b18-aeb8-dabcce6e3d42> | CC-MAIN-2021-21 | https://kinderart.com/art-lessons/crafts/table-top-weathervane/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989766.27/warc/CC-MAIN-20210512162538-20210512192538-00164.warc.gz | en | 0.90543 | 772 | 3.34375 | 3 |
Cancer Treatments Affect Teeth
With over 1.4 million new cases of cancer diagnosed each year, it's likely that people in the field of dentistry are seeing patients that are undergoing cancer treatments. Because some cancer treatments may affect the oral tissues, you may want to know about potential treatment side effects. It's also important to know that preexisting or untreated oral disease may also complicate cancer treatment. If you are going to be undergoing cancer treatment, make sure to consult a dentist one month beforehand to prevent these kinds of complications.
Oral complications common to both chemotherapy and radiation
• Inflammation and ulceration of the mucous membranes.
• Infections: viral, bacterial, and fungal.
• Salivary gland dysfunction: dry mouth, reduced, or absent salivary flow.
• Impaired abilities to eat, taste, swallow, and speak.
• Taste alterations
• Nutritional compromise
• Abnormal dental development
Oral complications that stem from radiation to the head and neck, or from chemotherapy, may compromise a patient's health and quality of life. They can even affect an individual's ability to finish planned cancer treatments. For some, complications may be so bad that only lower doses of therapy can be endured, which results in a less effective result. Others may opt to postpone scheduled treatments, while a few discontinue cancer treatments entirely. Oral complications may also lead to serious infections.
There are various types of oral complications of cancer treatment; and degrees of severity vary from individual to individual, and also depend on the cancer treatment. The following is a list of common side effects, both to chemotherapy and radiation therapy. It is worth noting that alternative cancer treatments, such as proton therapy can pose less risk of oral complications. This form of treatment targets a tumor so specifically that there is less dose of the treatment into healthy tissue. This particular type of cancer treatment is often regarded by doctors for patients with cancers in the head and neck, as well as for kids with developing tissue.
It is important that the patient understand that in order to reduce risks of oral complications during cancer treatments, he or she needs to have optimal oral hygiene, good nutrition, and avoid tobacco and alcohol. Taking these dental measures during cancer treatment will generally contribute to its success.
Tips for Maintaining Oral Hygiene During Cancer Treatment
• Brush teeth, gums, and tongue gently after each meal and before bed.
• Use an extra-soft toothbrush
• Use fluoride toothpaste.
• Floss teeth every day.
• Use additional fluoride gel treatments.
• Avoid mouthwashes containing alcohol.
• Exercise the jaw muscles a few times a day.
• Avoid candy, gum, and soda unless they are sugar-free.
• Avoid spicy or acidic foods
• Avoid toothpicks
• Avoid tobacco products
• Avoid alcohol.
• Keep all dental appointments. | <urn:uuid:61901ce5-1a5c-4a58-bbd3-64be8026dbc1> | CC-MAIN-2017-22 | http://toothpage.com/content/cancer-treatments-affect-teeth | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612018.97/warc/CC-MAIN-20170529053338-20170529073338-00033.warc.gz | en | 0.928503 | 596 | 2.8125 | 3 |
the Lord is our judge, the Lord is our ruler, the Lord is our king; he will save us. (Isaiah 33.22)
I am the Lord, that is my name; my glory I give to no other, nor my praise to idols. (Isaiah 42.8)
Adonai is the Hebrew word meaning ‘Lord’, which Jews traditionally substitute for the divine name when reading the Old Testament. Here it is applied to Jesus, implying that Jesus is the God of the Covenant. In Greek, Adonai became Kurios: a title with great political significance in first-century Palestine. Only Caesar was Kurios. To say, ‘No. Jesus is Kurios, is Lord’ is to say both that he is God and that none of the powers of this world are worthy of our ultimate allegiance. It is to say that our allegiance to him takes priority over our allegiance to any nation, ethnic group, political party or cause.
According to the antiphon, it was this Adonai – Jesus – who spoke to Moses in the burning bush, and who gave the Law on Mt Sinai.
Finally the image of the outstretched arm again identifies the Messiah with God. St Irenaeus spoke of Jesus and the Holy Spirit as the two hands of God, but the image goes back to the Old Testament. With ‘outstretched arm’ God showed his power and might, led his people out of Egypt, and delivered them from dangers.
Unsayable, you chose to speak one tongue
Unseeable, you gave yourself away,
The Adonai, the Tetragrammaton
Grew by a wayside in the light of day.
O you who dared to be a tribal God,
To own a language, people and a place,
Who chose to be exploited and betrayed,
If so you might be met with face to face,
Come to us here, who would not find you there,
Who chose to know the skin and not the pith,
Who heard no more than thunder in the air,
Who marked the mere events and not the myth.
Touch the bare branches of our unbelief
And blaze again like fire in every leaf. | <urn:uuid:b7fb132e-6b9a-47e6-b10e-925d6d2234eb> | CC-MAIN-2017-47 | https://osbloggery.blogspot.com/2008/12/o-adonai.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806070.53/warc/CC-MAIN-20171120145722-20171120165722-00007.warc.gz | en | 0.954459 | 465 | 3.0625 | 3 |
|2010 Census Population:||18,801,310 (4th)|
|Land Area:||53,624.8 square miles (26th)|
|Density:||350.6 persons per square mile (8th)|
|Became a State:||March 3, 1845 (27th)|
|Bordering States:||Alabama, Georgia|
The United States acquired the area of Florida from Spain in 1819, although the area was not formally transferred until 1821. Florida Territory was organized on March 30, 1822, with generally the same boundary as the present state. Florida was admitted to the Union on March 3, 1845, as the 27th state.
Census data for Florida are available beginning with the 1830 census.
Data for the legally established state of Florida are available beginning with the 1850 census.
AMERICAN INDIAN AREAS
Florida has 10 federally recognized American Indian areas. There are seven reservations, one with associated off-reservation trust land. Two areas consist of trust lands only. There is also one off-reservation trust land associated with a reservation in Alabama.
METROPOLITAN AND MICROPOLITAN STATISTICAL AREAS AND RELATED STATISTICAL AREAS
Florida has 20 metropolitan statistical areas, 10 micropolitan statistical areas, 3 metropolitan divisions, and 3 combined statistical areas.
There are 67 counties in Florida. With the exception of Duval County, each county is governed by a board of county commissioners. Duval County does not function as a separate governmental unit; its governmental functions are administered by the city of Jacksonville.
There are 316 county subdivisions in Florida. They are all census county divisions (CCDs), which are delineated for statistical purposes, have no legal function, and are not governmental units. CCDs were first established in Florida for the 1960 census. Prior to 1960, the minor civil divisions used in the census included election precincts, polling places, and (county) commissioners’ districts.
Florida has 920 places; 411 incorporated places and 509 census designated places. The incorporated places consist of 268 cities, 124 towns, and 19 villages. The minimum population to incorporate in Florida is 1,500 except in counties with a population of 50,000 or more, where the minimum population is 5,000. The minimum population density per acre required for incorporation, unless extraordinary conditions can be shown, is 1.5 people per acre, and the new entity must be at least two miles from the boundary of an existing incorporated place.
CENSUS TRACT/BLOCK GROUPS/BLOCKS
Florida has 4,245 census tracts, 11,442 block groups, and 484,481 blocks.
For the 111th Congress (January 2009-January 2011), Florida had 25 congressional districts. For the 113th Congress (January 2013-January 2015), Florida has 27 congressional districts as a result of reapportionment based on the 2010 Census.
Florida has 67 unified school districts.
STATE LEGISLATIVE DISTRICTS
There are 40 state senate districts and 120 state house districts in Florida.
Florida has 104 urban areas; 30 urbanized areas and 74 urban clusters.
ZIP CODE TABULATION AREAS
There are 983 ZIP Code tabulation areas (ZCTAs) in Florida.
|Year||North Latitude||West Longitude|
|20106||27° 49′ 22″||81° 38′ 05″|
|20006||27° 47′ 45″||81° 38′ 05″|
|19905||27° 47′ 60″||81° 39′ 10″|
|19804||27° 47′ 41″||81° 40′ 25″|
|19703||27° 51′ 49″||81° 43′ 32″|
|19603||28° 06′ 05″||81° 39′ 30″|
|19503||28° 15′ 09″||82° 05′ 47″|
|19402||28° 28′ 29″||82° 15′ 19″|
|19302||28° 40′ 23″||82° 23′ 05″|
|19201||29° 04′ 36″||82° 46′ 42″|
|19101||29° 19′ 30″||83° 00′ 32″|
|19001||29° 28′ 40″||83° 07′ 19″|
|18901||29° 29′ 15″||83° 03′ 28″|
|18801||29° 43′ 40″||83° 17′ 00″|
1 Source: U.S. Department of Commerce, Bureau of the Census, Fourteenth Census of the United States, 1923
2 Source: U.S. Census Bureau, recomputation for historical county level data which relied upon aggregate county level population data with an estimated county centroid resulting in a possible error of up to one mile.
3 Source: U.S. Department of Commerce, Bureau of the Census, Centers of Population for States and Counties, 1974
4 Source: U.S. Census Bureau, Geography Division, recomputation from archived national block group/enumeration area data resulting in a possible error of up to 1,000 feet.
5 Source: U.S. Census Bureau, Geography Division, recomputation from archived national block group data resulting in a possible error of up to 1,000 feet.
6 Source: U.S. Census Bureau, computation from national block-level data
(Persons per square mile)
|County||Miami-Dade County||2,496,435||Collier County||1,998.32||Pinellas County||3,347.5|
|- Inc Place||Jacksonville city||821,784||Jacksonville city||747.00||Sunny Isles Beach city||20,518.9|
|- CDP||Brandon CDP||103,483||Lehigh Acres CDP||92.56||Fountainebleau CDP||14,030.5|
See the Gazetteer Files for a list of geographic entities. See the Metropolitan and Micropolitan Statistical Areas page for a list of metropolitan and micropolitan statistical areas and related statistical areas. | <urn:uuid:1bb6bfa4-10ea-4bc2-9792-71d254da168b> | CC-MAIN-2023-23 | https://www.census.gov/geographies/reference-files/2010/geo/state-local-geo-guides-2010/florida.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647459.8/warc/CC-MAIN-20230531214247-20230601004247-00656.warc.gz | en | 0.839875 | 1,423 | 2.953125 | 3 |
December 21, 2021
The Most Effective Solution for Your Acid Reflux Issues
Have you ever had heartburn at bedtime? Simply put: that painful, burning sensation that robs you of sleep can be awful. For some, the symptoms are mild and seem to go away on their own; but for many, a few sleepless, painful nights are just the beginning. If you’re having frequent heartburn, you may have acid reflux disease, also known as gastroesophageal reflux disease (GERD), when your condition is severe or chronic.
Acid reflux is caused by a weakness or relaxation of the lower esophageal sphincter. This is the valve that joins your esophagus and your stomach. Normally this valve shuts tightly after food enters your stomach. However, sometimes it relaxes when it shouldn’t, causing your stomach contents – stomach acid, food, etc. – to come back up into your esophagus.
Symptoms can be triggered a number of different things, including:
- Food choices – Most doctors agree that acidic, fatty and spicy food may contribute to your symptoms, and the size of your meals also makes a difference. Large meals are more likely to cause symptoms than small ones.
- Medicines – Aspirin, ibuprofen, sedatives and blood pressure medications may affect your condition.
- Alcohol and tobacco use – This relaxes the stomach valve, enabling food and stomach acid to rise up into your esophagus.
- Weight – Being overweight or obese increases the pressure on your abdomen or stomach, weakening the valve.
- Pregnancy – This also may increase pressure on your abdomen or stomach.
- Other diseases and conditions – One of the most common is a hiatal hernia, which according to the Cleveland Clinic, occurs when the upper part of the stomach abnormally pushes through an opening in the diaphragm and into the chest cavity. Typically, the opening in the diaphragm is where the esophagus and stomach join, and that valve closes tightly after letting in food. However, with a hiatal hernia, the valve is in a different place (inside the chest cavity), which may keep it from closing completely. Thus, letting in a back-flow of stomach contents that can be extremely painful and damaging to your esophagus.
Common symptoms of acid reflux and related conditions include:
- A sour taste in your mouth
- Feeling overly full
- Feeling like you have food “stuck” in your throat
Symptoms may seem to intensify when you lay down or bend over because these positions may allow stomach acid to move more easily into your esophagus. Thankfully, there is hope. Certain medications, dietary changes and weight loss can help improve symptoms.
However, most patients report that these treatments help but do not completely “fix” the problem. If you’re still having symptoms, then acid reflux surgery might be the solution for you! For example, if you have a hiatal hernia, simply changing your diet isn’t going to fix the underlying medical condition that’s causing your symptoms, but surgery can. And after the surgery, you can go back to eating the foods you love, without the painful consequences!
You might be a good candidate for acid reflux surgery, if:
- You still have symptoms, despite dietary changes and medications.
- You continually require medications to control your symptoms and do not want lifelong medication use.
- You have a hiatal hernia or another underlying medical condition.
- You have frequent or ongoing symptoms that are affecting your quality of life.
Acid reflux surgery can be extremely beneficial, bringing you relief from acid reflux symptoms and preventing the serious complications that can occur if symptoms are left untreated. These complications include but are not limited to, esophagitis, ulcers, esophageal cancer and aspiration pneumonia.
There are two types of acid reflux surgery: linx surgery and nissen fundoplication, both of which are offered at Coryell Health. During linx surgery, the doctor wraps a ring of tiny beads around the lower esophageal sphincter, which keeps the opening closed, stopping reflux. During nissen fundoplication, the upper part of the stomach is wrapped around the lower esophageal sphincter, which also keeps the opening closed and prevents reflux.
Our acid reflux specialist, John Bawduniak, MD, can help determine which surgery is right for you. Board certified in general surgery, with significant training in vascular and endovascular surgery, Dr. Bawduniak has a special interest in complex, minimally invasive and laparoscopic surgery, as well as oncologic surgery and vascular surgery.
Operating in our Minimally Invasive Surgery Center, Dr. Bawduniak is specially trained in the use of Robotic-Assisted da Vinci®, which allows him to perform a wide range of delicate and complex operations through a few small incisions. Coryell Health’s da Vinci system enables Dr. Bawduniak to operate with enhanced vision, precision, dexterity and control.
Dr. Bawduniak is a gifted surgeon, who is highly skilled, highly trained and highly experienced. He’s one of the many reasons why you don’t have to drive to the “big city” to get state-of-the-art treatment. If you’re suffering from acid reflux symptoms, we can help. Call 254-865-8251 to book an appointment with Coryell Health today. | <urn:uuid:b083c8d0-c9ec-4b19-9164-623738b5a07d> | CC-MAIN-2022-49 | https://coryellhealth.org/acid-reflux-surgery-at-coryell-health/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711017.45/warc/CC-MAIN-20221205132617-20221205162617-00690.warc.gz | en | 0.93358 | 1,203 | 2.609375 | 3 |
In “Revolt Against The Sun”, Nazik al-Mala’ika expressed her thoughts about women of the Middle East and South Africa region through her exceptional poetic capability to create such a piece of art. A naïve examination reflects this poem as if a burst of emotions without any intention more meaningful, deeper intention. However, a thorough analysis reflects a tremendous liberating derive depicted in Nazik’s self-description.
“She stood before the sun, screaming”
If you imagine a person standing- not sitting or kneeling- against the sun which represents authority, God, and any powerful entity, and scream, this situation is an expression of revolution, courage, and self-expression. After this revolutionary scene, Nazik explained a shared characteristic between her and the sun where both of them are rebellious, willing to sacrifice and provide life. Here, it is crucial to analyze a specific feature that Nazik shared with the sun is Nazik like the sun providing nourishment for the stars. However, stars are self-shining, unlike moons that reflect the brightness of the sun. So, how can we interpret this shared feature?
Focusing on women in MENA, it is possible to consider that the sun here represents Nazik or intellectuals, nourishments represent education and knowledge provided by Nazik and intellectuals, and the stars are the future women that are going to glow in the darkness of ignorance. Thus, the sun is a representation of the source of education for upcoming MENA women against ignorance and marginalization. Also, this nourishment is ever-renewal which may reflect the inability to stop women strive for education, enlightenment, and rights. This shows the unidirectional movement of women toward their rights.
“Don’t be betrayed by the sadness [and] my tears… Sadness is the form of my revolt and resistance”
In these lines, Nazik declared that sadness and tears are a form of revolt and resistance rather than a manifestation of weakness and victimhood. The shared sadness and oppression practiced against women is the commonality that will unite women together to change the status quo and achieve a better life for themselves.
“Below the night- divinity be my witness”
Night mentioned can represent the ignorance of the patriarchal society. Besides, if we stick to the above consideration that future women are the stars, then it appears clearly that although there is a dark night, the shining stars/educated women are increasing day after day to eventually shine the sky of the night.
“Divinity is my witness” is very crucial at this point to prove that women’s acts are not against God because most, if not all, interpretations of religious texts support patriarchy and even consider any attempt to reinterpret them as a rejection of God’s rules and infidelity. Thus, Nazik is challenging the notion that feminism and women’s rights are against God.
In the end, Nazik is an exceptional poet who can convey infinite messages and sophisticated arguments through short and musical lines. Her brilliance relies on the deep philosophy underlying simple words.
Leave a Reply | <urn:uuid:4456d7be-b2b5-4192-a548-7397bd4feca1> | CC-MAIN-2023-23 | https://asfariinstitute.org/2021/05/03/poem-analysis/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650264.9/warc/CC-MAIN-20230604193207-20230604223207-00777.warc.gz | en | 0.93996 | 646 | 2.5625 | 3 |
“God of Study”, loved the ume blossoms The spring atmosphere in Kitanotenmangu Shrine, Kyoto
Kyoto is an ancient city representing Japan, and a lot of tourists from both Japan and abroad visit here.
Kitanotenmangu Shrine in Kamigyou-Ku is the head shrine of Tenmangu, that is to worship Michizane SUGAWARA and there are 12,000 shrines.
It worships Michizane as “Tenjin”, and it is famous as the birthplace of “Tenjin Shinko”.
Michizane SUGAWARA was a scholar, a noble, and a post of “Udaijin” in the Heian Period.
He was talented of literature since he was a child so that he was called a genius, and deeply trusted from an emperor.
But he was demoted to Dazaifu in Kyushu because of an innocent, and he’d never landed in Kyoto.
After his death, several disasters troubled Kyoto, and people thought Michizane’s regrets brought them so that they built Tenmangu in Kitano to pray for him to calm down.
This is the beginning of Kitanotenmangu Shrine.
It was in 947, and Kitanotenmangu Shrine has more than 1,000 years of history.
In the Edo Period, people, who want to share the excellence of Michizane, lined up to worship.
Then, it has become the God of Study and a lot of people has visited to pray for an academic achievement.
Michizane loved Ume blossoms.
In Kitanotenmangu Shrine, there are 50 types of 1,500 Ume trees.
Buds of early flowering types have been developed since the middle of December, and it blooms after the New Year Day.
Then, they are bloomed bit by bit, and people can enjoy beautiful ume blossoms until the end of March.
Even this year, “Baien Kokai” will be held from the beginning of February to the end of March; there will be the walking path between ume blossoms, and the tea-house will be opened to enjoy the tea and sweets.
On February 15th, it was held that “Baika-Sai Festival” and “Baika-Sai Nodate Ochanoyu” by Maiko-san and Geiko-san.
People who visit to see ume blossoms can see lovely ume blossoms and enjoy drinking ume tea, using Kitanotenmangu’s ume, and eating sweets, motif from ume, that are included in the entrance fee.
“Shaden (main building)”, connected from Honden (main hall) to Haiden (worship hall) by a stone paved corridor, is designated as the national treasure, and it is a view spot that the tatami floored solemn tea room, holding the tea party on 1st and 15th every month.
After visiting the shrine, please try to eat “Namayubadon (row yuba bowl)” in the old tofu restaurant nearby Kitanotenmangu Shrine, and “Ippon Udon”, one thick and long piece of Udon noodle in the handmade udon restaurant.
Also, we recommend you to eat “Chougoroumochi” with green tea at the tea ceremony!
There is a tasteful moment to think of Michizane SUGAWARA, called “God of Study” who passed away at the place where was far away from Kyoto, and to see beautiful ume blossoms.
Why don’t you feel the coming spring in Kitano, Kyoto?
If you like this post,Please share widely!!
Source of photos:http://www.kitanotenmangu.or.jp/
Source of photos:://souda-kyoto.jp/blog/00358.html
Source of photos:://kitanotenmangu.or.jp/about_precincts.php
Source of photos:://www.athome.co.jp/vox/series/life/23625/pages2/ | <urn:uuid:a95b16fd-a52d-4f3f-a75b-8d7d4ea3cbfa> | CC-MAIN-2020-34 | https://tatamiroom.jp/2019/02/26/god-of-study-loved-the-ume-blossoms-the-spring-atmosphere-in-kitanotenmangu-shrine-kyoto/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737883.59/warc/CC-MAIN-20200808135620-20200808165620-00072.warc.gz | en | 0.940133 | 920 | 2.640625 | 3 |
IBM Data Analytics with Excel & R Certificate Online
Turn big data into actionable insights with IBM data analytics professional certificate courses that teach you the fundamental skills behind data mining and analysis, predictive modeling and data visualization.
Franklin University has partnered with Coursera Campus to provide cutting-edge certificates to learners seeking to advance. Courses are open to all learners. No application required.
What You Will Learn
- Learn the fundamentals of data analysis, including how to identify data sources and gather data
- Practice data manipulation techniques, including developing data visualizations using spreadsheets and dashboards
- Work with relationship databases and real datasets, running SQL queries and accessing databases from Jupyter notebooks using SQL and R
- Grow your data science skills with hands-on labs and projects that challenge you to collect, analyze and visualize data using a variety of tools, including Tidyverse and R Shiny
About the IBM Data Analytics with Excel and R Professional Certificate
If you're looking to ready yourself with the skills, tools and professional portfolio to start your career as a data scientist or data analyst, then the IBM Data Analytics with Excel and R Professional Certificate is for you.
Developed by IBM, this eight-course certificate program is designed to equip you with the fundamental skills needed to work in the growing field of data analytics.
As you prepare for an entry-level role as a data analyst or data scientist, you'll learn how to collect, analyze, test, visualize and model data on real-world datasets from a wide range of data sources. You'll also acquire relevant experience using some of the most- powerful and popular analytics tools, like Excel, Cognos Analytics and the R programming language.
With this Professional Certificate program, you can study at your own pace as you work through the entire data analysis lifecycle and methodology. Here's just some of what you'll do: work with relational databases, engage in predictive modeling, create interactive dashboards, and communicate your findings to stakeholders and key constituents.
Through your applied learning assignments and a capstone project, you'll gain practical, hands-on data experience with Excel, Cognos Analytics, SQL, the R programing language and related data science libraries, such as Tidyverse, Tidymodels, R Shiny, ggplot2, Leaflet, and rvest.
Required IBM Data Analytics with Excel & R Certificate Courses
BEGINNER | Data Science | Self-paced | 10 hoursThis course presents a gentle introduction into the concepts of data analysis, the role of a Data Analyst, and the tools that are used to perform daily functions. You will gain an understanding of the data ecosystem and the fundamentals of data analysis, such as data gathering or data mining. You will then learn the soft skills that are required to effectively communicate your data to stakeholders, and how mastering these skills can give you the option to become a data driven decision maker. This course will help you to differentiate between the roles of a Data Analyst, Data Scientist, and Data Engineer. You will learn the responsibilities of a Data Analyst and exactly what data analysis entails. You will be able to summarize the data ecosystem, such as databases and data warehouses. You will then uncover the major vendors within the data ecosystem and explore the various tools on-premise and in the cloud. Continue this exciting journey and discover Big Data platforms such as Hadoop, Hive, and Spark. By the end of this course you will be able to visualize the daily life of a Data Analyst, understand the different career paths that are available for data analytics, and identify the many resources available for mastering this profession. Throughout this course you will learn the key aspects to data analysis. You will begin to explore the fundamentals of gathering data, and learning how to identify your data sources. You will then learn how to clean, analyze, and share your data with the use of visualizations and dashboard tools. This all comes together in the final project where it will test your knowledge of the course material, explore what it means to be a Data Analyst, and provide a real-world scenario of data analysis. This course does not require any prior data analysis, spreadsheet, or computer science experience. All you need to get started is basic computer literacy, high school level math, and access to a modern web browser such as Chrome or Firefox.
BEGINNER | Data Science | Self-paced | 12 hoursThis course is designed to provide you with basic working knowledge for using Excel spreadsheets for Data Analysis. It covers some of the first steps for working with spreadsheets and their usage in the process of analyzing data. It includes plenty of videos, demos, and examples for you to learn, followed by step-by-step instructions for you to apply and practice on a live spreadsheet. Excel is an essential tool for working with data - whether for business, marketing, data analytics, or research. This course is suitable for those aspiring to take up Data Analysis or Data Science as a profession, as well as those who just want to use Excel for data analysis in their own domains. You will gain valuable experience in cleansing and wrangling data using functions and then analyze your data using techniques like filtering, sorting and creating pivot tables. This course starts with an introduction to spreadsheets like Microsoft Excel and Google Sheets and loading data from multiple formats. With this introduction you will then learn to perform some basic level data wrangling and cleansing tasks and continue to expand your knowledge of analyzing data through the use of filtering, sorting, and using pivot tables within the spreadsheet. By performing these tasks throughout the course, it will give you an understanding of how spreadsheets can be used as a data analysis tool and understand its limitations. There is a strong focus on practice and applied learning in this course. With each lab, you will gain hands-on experience in manipulating data and begin to understand the important role of spreadsheets. Clean and analyze your data faster by understanding functions in the formatting of data. You will then convert your data to a pivot table and learn its features to make your data organized and readable. The final project enables you to show off your newly acquired data analysis skills. By the end of this course you will have worked with several data sets and spreadsheets and demonstrated the basics of cleaning and analyzing data all without having to learn any code. Getting started with Excel is made easy in this course. It does not require any prior experience with spreadsheets or coding. Nor does it require downloads or installation of any software. All you need is a device with a modern web browser, and ability to create a Microsoft account to access Excel online at no-cost. However if you already have a desktop version of Excel, you can follow along quite easily as well.
BEGINNER | Data Science | Self-paced | 9 hoursThis course covers some of the first steps in the development of data visualizations using spreadsheets and dashboards. Begin the process of telling a story with your data by creating the many types of charts that are available in spreadsheets like Excel. Explore the different tools of a spreadsheet, such as the important pivot function and the ability to create dashboards and learn how each one has its own unique property to transform your data. Continue to gain valuable experience by becoming familiar with the popular analytics tool - IBM Cognos Analytics - to create interactive dashboards. By completing this course, you will have a basic understanding of using spreadsheets as a data visualization tool. You will gain the ability to effectively create data visualizations, such as charts or graphs, and will begin to see how they play a key role in communicating your data analysis findings. All of this can be accomplished by learning the basics of data analysis with Excel and IBM Cognos Analytics, without having to write any code. By the end of this course you will be able to describe common dashboarding tools used by a data analyst, design and create a dashboard in a cloud platform, and begin to elevate your confidence level in creating intermediate level data visualizations. Throughout this course you will encounter numerous hands-on labs and a final project. With each lab, gain hands-on experience with creating basic and advanced charts, then continue through the course and begin creating dashboards with spreadsheets and IBM Cognos Analytics. You will then end this course by creating a set of data visualizations with IBM Cognos Analytics and creating an interactive dashboard that can be shared with peers, professional communities or prospective employers. This course does not require any prior data analysis, or computer science experience. All you need to get started is basic computer literacy, high school level math, access to a modern web browser such as Chrome or Firefox, the ability to create a Microsoft account to access Excel for the Web, and a basic understanding of Excel spreadsheets.
BEGINNER | Data Science | Self-paced | 11 hoursWhen working in the data science field you will definitely become acquainted with the R language and the role it plays in data analysis. This course introduces you to the basics of the R language such as data types, techniques for manipulation, and how to implement fundamental programming tasks. You will begin the process of understanding common data structures, programming fundamentals and how to manipulate data all with the help of the R programming language. The emphasis in this course is hands-on and practical learning . You will write a simple program using RStudio, manipulate data in a data frame or matrix, and complete a final project as a data analyst using Watson Studio and Jupyter notebooks to acquire and analyze data-driven insights. No prior knowledge of R, or programming is required.
BEGINNER | Data Science | Self-paced | 17 hoursMuch of the world's data resides in databases. SQL (or Structured Query Language) is a powerful language which is used for communicating with and extracting data from databases. A working knowledge of databases and SQL is a must if you want to become a data scientist. The purpose of this course is to introduce relational database concepts and help you learn and apply foundational knowledge of the SQL and R languages. It is also intended to get you started with performing SQL access in a data science environment. The emphasis in this course is on hands-on and practical learning. As such, you will work with real databases, real data science tools, and real-world datasets. You will create a database instance in the cloud. Through a series of hands-on labs, you will practice building and running SQL queries. You will also learn how to access databases from Jupyter notebooks using SQL and R. No prior knowledge of databases, SQL, R, or programming is required. Anyone can audit this course at no charge. If you choose to take this course and earn the Coursera course certificate, you can also earn an IBM digital badge upon successful completion of the course.
INTERMEDIATE | Data Science | Self-paced | 15 hoursThe R programming language is purpose-built for data analysis. R is the key that opens the door between the problems that you want to solve with data and the answers you need to meet your objectives. This course starts with a question and then walks you through the process of answering it through data. You will first learn important techniques for preparing (or wrangling) your data for analysis. You will then learn how to gain a better understanding of your data through exploratory data analysis, helping you to summarize your data and identify relevant relationships between variables that can lead to insights. Once your data is ready to analyze, you will learn how to develop your model and evaluate and tune its performance. By following this process, you can be sure that your data analysis performs to the standards that you have set, and you can have confidence in the results. You will build hands-on experience by playing the role of a data analyst who is analyzing airline departure and arrival data to predict flight delays. Using an Airline Reporting Carrier On-Time Performance Dataset, you will practice reading data files, preprocessing data, creating models, improving models, and evaluating them to ultimately choose the best model. Watch the videos, work through the labs, and add to your portfolio. Good luck! Note: The pre-requisite for this course is basic R programming skills. For example, ensure that you have completed a course like Introduction to R Programming for Data Science from IBM.
BEGINNER | Data Science | Self-paced | 10 hoursIn this course, you will learn the Grammar of Graphics, a system for describing and building graphs, and how the ggplot2 data visualization package for R applies this concept to basic bar charts, histograms, pie charts, scatter plots, line plots, and box plots. You will also learn how to further customize your charts and plots using themes and other techniques. You will then learn how to use another data visualization package for R called Leaflet to create map plots, a unique way to plot data based on geolocation data. Finally, you will be introduced to creating interactive dashboards using the R Shiny package. You will learn how to create and customize Shiny apps, alter the appearance of the apps by adding HTML and image components, and deploy your interactive data apps on the web. You will practice what you learn and build hands-on experience by completing labs in each module and a final project at the end of the course. Watch the videos, work through the labs, and watch your data science skill grow. Good luck! NOTE: This course requires knowledge of working with R and data. If you do not have these skills, it is highly recommended that you first take the Introduction to R Programming for Data Science as well as the Data Analysis with R courses from IBM prior to starting this course. Note: The pre-requisite for this course is basic R programming skills.
INTERMEDIATE | Data Science | Self-paced | 16 hoursIn this capstone course, you will apply various data science skills and techniques that you have learned as part of the previous courses in the IBM Data Science with R Specialization or IBM Data Analytics with Excel and R Professional Certificate. For this project, you will assume the role of a Data Scientist who has recently joined an organization and be presented with a challenge that requires data collection, analysis, basic hypothesis testing, visualization, and modeling to be performed on real-world datasets. You will collect and understand data from multiple sources, conduct data wrangling and preparation with Tidyverse, perform exploratory data analysis with SQL, Tidyverse and ggplot2, model data with linear regression, create charts and plots to visualize the data, and build an interactive dashboard. The project will culminate with a presentation of your data analysis report, with an executive summary for the various stakeholders in the organization.
BEGINNER | Data Science | Self-paced | 1 hourThis is the final course in the Data Analysis and Visualization Foundations Specialization. It contains a graded final examination covering content from three courses: Introduction to Data Analytics, Excel Basics for Data Analysis, and Data Visualization and Dashboards with Excel and Cognos. From the Introduction to Data Analytics course, you will be assessed on your knowledge of topics such as the data ecosystem and the fundamentals of data analysis, including data gathering and data mining tools. From the Excel Basics for Data Analysis course, you should be prepared to answer test items on topics like how Excel spreadsheets are used in data analytics, cleansing and wrangling data, as well as pivot tables. Finally, from the Data Visualization and Dashboards with Excel and Cognos course, you will demonstrate your knowledge on topics such as the basics of IBM Cognos and using Excel for data visualization.
Bolster Your Professional Skills
Take back control or rethink your career by strengthening your skills with a Professional Certificate through Franklin. Learn, hone or master job-related skills with professional development classes that won't break the bank or gobble up your free time. These online courses let you feed your curiosity and develop new skills that have real value in the workplace. Learn at your own pace. Cancel your subscription anytime.
Showcase Your Capabilities
Through Franklin’s partnership with Coursera, Certificate courses let you apply your learnings and build a career portfolio that helps demonstrate your professional capabilities to employers. Whether you're moving into a new field or progressing in your current one, the hands-on projects offer real-world examples that help illustrate your skills and abilities. Project completion is required to earn your Certificate.
Gain a Competitive Advantage
Get noticed by hiring managers and by your network of professional connections when you add a Professional Certificate to your credentials. Many Certificates are step toward full certification while others are the start of a new career journey. At Franklin, your Certificate also may be evaluated for course credit if you decide to enroll in one of our many degree programs.
Frequently Asked Questions
When you enroll in this self-paced certificate program, you decide how quickly you want to complete each of the courses in the specialization. To access the courses, you pay a small monthly cost of $35, so the total cost of your Professional Certificate depends on you. Plus, you can take a break or cancel your subscription anytime.
It takes an average of 3-4 months to complete the courses and hands-on projects to earn your certificate.
No prior experienced is needed for this beginner-level series. Enroll now.
Share your certificate with your professional network with confidence, knowing that you've readied yourself with the skills needed for an entry-level position in data analytics or data science.
No. Courses offered through the Marketplace are for all learners. There is no application or admission process. | <urn:uuid:d71ce3a6-a0a6-4f5a-9502-fa207bed1424> | CC-MAIN-2022-21 | https://www.franklin.edu/franklinworks-marketplace/certificates/ibm-data-analytics-excel-r-certificate-online | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662625600.87/warc/CC-MAIN-20220526193923-20220526223923-00583.warc.gz | en | 0.917113 | 3,570 | 2.640625 | 3 |
This study is provided by ICPSR. ICPSR provides leadership and training in data access, curation, and methods of analysis for a diverse and expanding social science research community.
School District Data Book (SDDB), 1990: [United States] (ICPSR 2953)
Principal Investigator(s): United States Department of Education. National Center for Education Statistics
The School District Data Book (SDDB) is an education database and information system. It contains an extensive set of data on children, their households, and the nation's school systems. Under the sponsorship of the National Center for Education Statistics, the Bureau of the Census has produced special tabulation files using the basic record files of the 1990 Census of Population and Housing by school district. These tabulation files contain aggregated data describing attributes of children and households in school districts. Data are organized by seven types of tabulation records: (1) characteristics of all households, (2) characteristics of all persons, (3) characteristics of households with children, (4) characteristics of parents living with children, (5) children's household characteristics, (6) children's parents' characteristics, and (7) children's own characteristics.
These data are available only to users at ICPSR member institutions. Because you are not logged in, we cannot verify that you will be able to download these data.
WARNING: This study is over 150MB in size and may take several minutes to download on a typical internet connection.
U.S. Dept. of Education, National Center for Education Statistics. SCHOOL DISTRICT DATA BOOK (SDDB), 1990: [UNITED STATES]. ICPSR02953-v2. Washington, DC: U.S. Dept. of Education, National Center for Education Statistics [producer], 2000. Ann Arbor, MI: Inter-university Consortium for Political and Social Research [distributor], 2006-10-27. http://doi.org/10.3886/ICPSR02953.v2
Persistent URL: http://doi.org/10.3886/ICPSR02953.v2
Scope of Study
Geographic Coverage: United States
Date of Collection:
Universe: All public elementary and secondary education agencies in operation during 1990-1991 in the 50 states and the District of Columbia.
Data Types: census/enumeration data
Data Collection Notes:
(1) Some states have multiple data files because they have large numbers of cases. (2) Two data files are not included in this release. They are: Washington, Part 3, and Wisconsin, Part 4.
1990 Census of Population and Housing record files
Extent of Processing: ICPSR data undergo a confidentiality review and are altered when necessary to limit the risk of disclosure. ICPSR also routinely creates ready-to-go data files along with setups in the major statistical software formats as well as standard codebooks to accompany the data. In addition to these procedures, ICPSR performed the following processing steps for this data collection:
- Checked for undocumented or out-of-range codes.
Original ICPSR Release: 2001-06-27
- 2006-10-27 Variable names were corrected in SAS and SPSS setup files. The processing note in the codebook was also updated to reflect the corrections.
- 2006-01-12 All files were removed from dataset 139 and flagged as study-level files, so that they will accompany all downloads.
- 2006-01-12 All files were removed from dataset 138 and flagged as study-level files, so that they will accompany all downloads.
- 2006-01-12 All files were removed from dataset 137 and flagged as study-level files, so that they will accompany all downloads.
- 2002-05-29 Seventeen additional datasets (Parts 140-156) were added to the collection, including data for two states previously not covered -- Vermont and Washington -- and additional data for Arkansas, California, Illinois, Massachusetts, Michigan, Minnesota, New Jersey, Pennsylvania, and Texas.
- Citations exports are provided above.
Export Study-level metadata (does not include variable-level metadata)
If you're looking for collection-level metadata rather than an individual metadata record, please visit our Metadata Records page. | <urn:uuid:d13b42cc-59dd-4ce3-81e7-d155c434fa4b> | CC-MAIN-2015-35 | http://www.icpsr.umich.edu/icpsrweb/ICPSR/studies/2953?q=Consumer+Expenditure+Survey%2C+2011%3A++Interview+Survey+%26+Detailed+Expenditure+Files&permit%5B0%5D=AVAILABLE&keyword%5B0%5D=census+data&paging.startRow=1 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645328641.76/warc/CC-MAIN-20150827031528-00000-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.906195 | 886 | 3.171875 | 3 |
Annapolis to ban use of fertilizer with phosphorus in most cases
Ordinance’s goal is to ensure homeowners do their part to reduce nutrient loads to waterways
Citing the need to help clean up the Chesapeake, Annapolis in January became the first municipality in the Bay watershed to ban most uses of lawn fertilizers containing phosphorus. The ban takes effect this year.
"We're leading the way," said Alderman Julie Stankivic, who proposed the ordinance, which was unanimously approved by the City Council.
She said the ordinance will help to ensure that homeowners do their part to reduce nutrient pollution that contributes to the degradation of the Bay.
Urban areas generate a relatively small amount of the nutrients reaching the Chesapeake, but their contribution is increasing while the nutrient load from other sources is generally decreasing.
"The dead zones are growing," Stankivic said. "We have to take individual responsibility for what we can do to improve the Bay. It's not just chicken farmers."
Beginning this year, the ordinance requires residents to have a soil test taken within the last three years indicating their soil has lower concentrations of phosphorus than recommended by lawn care experts before they can use fertilizer with phosphorus.
Newly established lawns are also exempt from the ban-phosphorus is needed by new lawns to help grass develop roots, but the nutrient is rarely needed by established lawns, which primarily use nitrogen to grow.
"Most soils in Maryland have more than enough phosphorus in them already," Stankivic said. "So if you can pick up something that has zero, it will do no harm."
Too much phosphorus can spur excess algae growth in lakes, freshwater streams and rivers, as well as lower salinity portions of the Chesapeake Bay. Nitrogen is generally more responsible for algae growth in higher salinity water.
Excess algae can block sunlight to underwater grass beds, which provide important habitat for crabs and fish. When the algae die, they decompose in a process that depletes oxygen from the water.
Landowners are still allowed to use compost, which may contain phosphorus, and they may continue to use fertilizer containing phosphorus in gardens, on shrubs and trees or on indoor plants.
The handful of stores in Annapolis that sell fertilizer must display a poster alerting customers to the ordinance.
Starting next year, no business can openly display fertilizer that contains phosphorus, although they may post signs that it is available upon request. Store-owners are not required to quiz buyers about how they intend to use the fertilizer. "We are not expecting our retailers to act like police," Stankivic said.
Such bans are not unique. A number of local governments across the nation have enacted similar bans, including Dane County, Wisconsin, and several counties in Michigan. Others are considering similar action.
Minnesota enacted a statewide ban in 2005, a year after Minneapolis and St. Paul took action. As with the Annapolis ordinance, the Minnesota law prohibited the use of phosphorus fertilizer unless a new lawn is being established, or a soil test indicates the need for phosphorus.
As a result, the amount of phosphorus used in lawn fertilizer in the state decreased from 292 tons in 2003 to 151 tons in 2006, according to a report by the Minnesota Department of Agriculture. The report found that consumers were largely supportive of the measure. In fact, the major consumer question regarding the measure was how to dispose of leftover fertilizer that contained phosphorus.
The report also said that the reduction was achieved without municipalities having to take any enforcement actions.
That's good news for Annapolis officials, who acknowledge that enforcing the law would be difficult. Residents can easily purchase fertilizer outside city limits, and it's hard to know whether fertilizer is being misused.
Residents who violate the ordinance could face a $100 fine, and businesses could pay $500, but officials doubt they will have many violations.
"It's not our intention to turn ourselves into fertilizer police," said Frank Biba, the city's chief of environmental programs. "I would expect people who pay attention to easily be able to comply with this. It is not onerous by any means. I would think if it is not displayed openly in stores, people would just buy what is there. That's simple."
The ordinance, in a way, is aimed as much at other local governments as it is Annapolis residents.
"Obviously, we alone are not going to have a substantial impact on the Bay," Stankivic said. "It will be minimal. But if we can get all counties, at least those that lie along the Chesapeake Bay, to adopt this policy, I think we will see a much greater impact."
Stankivic said she has urged officials in Anne Arundel County, where Annapolis is located, to pass a similar ban, and is hoping the General Assembly will establish a statewide prohibition. The main hesitation, she said, is a reluctance by officials to tell landowners what to do.
"But would you tell someone to take penicillin if they didn't need it?" she asked.
There is precedent for state actions that require less phosphorus use. In the mid-1980s, Maryland, Virginia and Pennsylvania each enacted laws to ban the sale of laundry detergent with phosphates. More recently, they have passed legislation that will ban the sale of dishwasher detergent with phosphates next year.
In recent years, Florida, Maine, Michigan and Wisconsin have all considered regulating the use of phosphorus fertilizer on lawns.
Annapolis Lawn Fertilizer Ordinance
- As of Jan. 1, 2009, businesses selling fertilizer must display a sign informing customers of the new regulations.
- The ban affects lawn fertilizer used for nonagricultural purposes such as lawns, golf courses, parks and cemeteries.
- The ban does not affect fertilizer products primarily intended for gardening, trees, shrubs or indoor plants. Fertilizer containing phosphorus may continue to be used for those purposes.
- No fertilizer containing phosphorus may be applied when the ground is frozen.
- Any fertilizer accidentally applied or spilled onto impervious surfaces such as roads, sidewalks and parking lots must be immediately contained and cleaned up.
- Newly established lawns, or lawns which have had soil tests in the last three years showing phosphorus levels are deficient according to standards set by the Maryland Department of Agriculture, may use fertilizers containing phosphorus.
- Yard waste compost or similar materials that are primarily organic may continue to be applied to lawns.
- As of Jan. 1, 2010, no one may display for sale any lawn fertilizer that contains more than 0 percent phosphorus, or any compound containing phosphorus, such as phosphate.
- Lawn fertilizer that contains more than 0 percent phosphorus may be stored off the sales floor and sold on request. Signs may state the fertilizer is available upon request.
Comments are now closed for this article. Comments are accepted for 60 days after publication. | <urn:uuid:4f00545c-7593-4fed-97fc-85faa795dca9> | CC-MAIN-2014-10 | http://www.bayjournal.com/article/annapolis_to_ban_use_of_fertilizer_with_phosphorus_in_most_cases | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011155657/warc/CC-MAIN-20140305091915-00023-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.958195 | 1,416 | 2.6875 | 3 |
Borobudur is a ninth-century Mahayana Buddhist monument in Magelang, Central Java, Indonesia. The monument comprises six square platforms topped by three circular platforms, and is decorated with 2,672 relief panels and 504 Buddha statues. A main dome, located at the center of the top platform, is surrounded by 72 Buddha statues seated inside perforated stupa.
The monument is both a shrine to the Lord Buddha and a place for Buddhist pilgrimage. The journey for pilgrims begins at the base of the monument and follows a path circumambulating the monument while ascending to the top through the three levels of Buddhist cosmology, namely Kāmadhātu (the world of desire), Rupadhatu (the world of forms) and Arupadhatu (the world of formlessness). During the journey the monument guides the pilgrims through a system of stairways and corridors with 1,460 narrative relief panels on the wall and the balustrades.
Evidence suggests Borobudur was abandoned following the fourteenth century decline of Buddhist and Hindu kingdoms in Java, and the Javanese conversion to Islam. Worldwide knowledge of its existence was sparked in 1814 by Sir Thomas Stamford Raffles, the then British ruler of Java, who was advised of its location by native Indonesians. Borobudur has since been preserved through several restorations. The largest restoration project was undertaken between 1975 and 1982 by the Indonesian government and UNESCO, following which the monument was listed as a UNESCO World Heritage Site. Borobudur is still used for pilgrimage; once a year Buddhists in Indonesia celebrate Vesak at the monument, and Borobudur is Indonesia's single most visited tourist attraction. [Wikipedia]
For you that celebrating Vesak Day (Buddha Birthday)
HAPPY VESAK DAY 2553 BE / 2009
May all beings be happy and free
Dim lights Embed Embed this video on your site
You must agree on Document License agreement page first, choose agree on the radio button then you will proceed
Open the PDF file with Adobe Acrobat (recommended software)
PDF security password : paper-replika.com
|< Prev||Next >| | <urn:uuid:18887943-5989-4434-a1fa-48fab47c7ebb> | CC-MAIN-2017-13 | http://paper-replika.com/index.php?option=com_content&view=article&id=557:buddha-at-borobudur-temple&catid=85:building&Itemid=205052 | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189734.17/warc/CC-MAIN-20170322212949-00497-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.927009 | 454 | 3.296875 | 3 |
Tip 5: How to use puppets
The Year 1 and Year 2 Spanish lessons include humorous and interactive puppet skits. These skits add a delightful component to the teaching of a foreign language.
You may be unfamiliar with the use of puppets and therefore not comfortable using them. It takes a little practice to use puppets effectively in the classroom. Rehearse the puppet skits out loud in front of a mirror or with other children outside the classroom. Give the puppet its own name, voice, and personality. Make eye contact with the puppet when you are speaking to it.
Even though I have written out the puppet skits in detail, don’t memorize them. Become familiar with the skit and understand what vocabulary you are trying to reinforce with the skit. Keep it interactive, have fun, and “ham it up.” If you are enjoying yourself, then the students will too.
I hope this teaching tip helps your students have more fun in the classroom! | <urn:uuid:fd289ceb-eb10-4a8e-93f0-006e9a497a23> | CC-MAIN-2023-40 | https://singnspeak.com/teaching-tip-5/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00615.warc.gz | en | 0.9448 | 205 | 4.15625 | 4 |
The Cleveland Clinic offers excellent advice for managing diabetes during times of physical or emotional distress. Experts offer the following five tips to help maintain blood sugar and minimize the dangerous complications of uncontrolled diabetes.
1. Stay hydrated
Dehydration occurs quickly when you have fever, vomiting or diarrhea. The main risk from dehydration is hyperglycemia (high blood sugar). Cold medications, skipping diabetes medications and eating food erratically may also lead to high blood sugar.
According to diabetes specialist Bartolome Burguera, MD, “when you’re ill, it’s very important to check your blood sugar regularly, continue to take medications on a schedule and drink fluids regularly.” He also suggests that when your blood sugar goes over 250, check your urine for keytones (produced when your body has difficulty processing blood sugar) and call your clinician with the results.
2. Change up your diet
When you are ill or stressed, your diet may change. If you are unable to eat normally or have a decreased appetite, meal replacement drinks are often helpful. “Nutritional shakes formulated for people with diabetes have a moderate amount of carbohydrate, which is appropriate” (Burguera). Homemade meal-replacement shakes are also helpful by using:
- Frozen fruit
- A protein source (e.g., protein powder, Greek yogurt, peanut butter, tofu)
- Milk, soy milk or almond milk
Alternatively, “noodle soups are typically well tolerated and the noodles offer carbohydrates, which may help prevent low blood sugars” (Burguera).
3. Create a sick-day tool kit
Dr. Burguera recommends putting together a “sick-day diabetes tool kit” that includes items to be eaten or drank when feeling unwell. “Some non-food items to include in your tool kit are extra blood-sugar monitoring supplies and a thermometer to check for a fever” (Burguera). Your kit may include:
- Regular soda pop or juice (to prevent low blood sugars)
- Broth-based soups
- Gelatin (regular, not sugar-free)
- Electrolyte-supplemented beverages
4. Make sure you’re monitoring
Monitoring your diabetes is essential during times of stress. “In general, if you’re taking insulin at meals and long-acting insulin once a day, you should monitor your blood sugar four times per day — before each meal and before bed” (Burguera).
5. Talk to your clinician
Individualized care is important with diabetic management and your clinician will adjust your diabetes medications as necessary and dependent on:
- The type of medications you’re taking
- The extent to which your food intake has decreased
Dietician Dawn Noe states that “if you’re taking long-acting insulin, which is typically given at bedtime, we usually recommend you continue with the same dose, as long-acting insulin is mainly responsible for insulin needs not related to food intake.”
When insulin is taken before meals (also called rapid-acting insulin, fast-acting insulin, or mealtime insulin) your clinician may need to reduce your dose, depending upon your daily meals for breakfast, lunch and dinner. “If you skip a meal, skip the mealtime insulin” (Noe).
Oral medications may need to be adjusted by your clinician. Diabetes medications, such as metformin, SGLT-2 inhibitors or DPP4- inhibitors, rarely cause low blood sugars and may not need adjusting. “These medications usually bring down blood sugar from high to normal, but very rarely drop blood sugar too low” (Burguera). However, sulfonylureas or acarbose may cause your blood sugars to drop if you are eating less. “These medications should be adjusted based on blood-sugar readings” (Burguera).
Whether during stress or illness, blood sugar management is imperative to control diabetes and maintain a healthy lifestyle and quality of life.
Read the Article Here: 5 Best Tips to Manage Diabetes When You’re Sick | <urn:uuid:f829e939-01e2-48e7-bf62-2867c0af93a9> | CC-MAIN-2018-13 | http://progressivenurse.com/category/stressmanagement/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647692.51/warc/CC-MAIN-20180321195830-20180321215830-00576.warc.gz | en | 0.908616 | 876 | 3.0625 | 3 |
A didactic approach to presenting verbal and visual information to children participating in research protocols: The comic book informed assent.
Massetti, T., Crocetta, T. B., Guarnieri, R., Silva, T. D. D., Leal, A. F., Voos, M. C., & Monteiro, C. B. D. M. (2018). A didactic approach to presenting verbal and visual information to children participating in research protocols: The comic book informed assent. Clinics, 73: e207.
OBJECTIVE: When children participate in research protocols, consent (by a parent or legal guardian) and assent (by the children) must be given. Understanding research protocols can be challenging for an adult and even more difficult for a child. The aim of this study was to describe the development of a comic book created to facilitate children’s understanding of informed assent with clear and simple language.
METHODS: Five researchers with scores above seven according to the Fehring criteria developed the comic book, avoiding the use of technical terminology. Twenty children between 7 and 12 years old, and enrolled in a larger study, responded using a Likert scale and questions about the clarity of texts and illustrations. The final version met National Health System Resolutions (Resoluc ̧o ̃ es do Conselho Nacional da Sau ́ de – CNS no 196/1996 and 466/2012).
RESULTS: The comic book assent presents a short story containing information about a real study: the invitation to participate, objectives, methods, instruments, procedures, risks, benefits, and the researchers’ contact information. Most of the participants answered that they perceived the content of the text to be ‘‘Excellent’’ (40%) and ‘‘Very good’’ (40%), and the illustrations were perceived as ‘‘Excellent’’ (45%) and ‘‘Very good’’ (55%).
CONCLUSION: The construction of a simple and clear model of informed assent is possible, and this model should be used in experiments with children.
The full version of this article is available via the link below.Publisher’s Link | <urn:uuid:3a4ab4e3-f4d0-4ee0-ab60-7787cdd5b505> | CC-MAIN-2022-05 | https://childethics.com/library/a-didactic-approach-to-presenting-verbal-and-visual-information-to-children-participating-in-research-protocols-the-comic-book-informed-assent/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304345.92/warc/CC-MAIN-20220123232910-20220124022910-00430.warc.gz | en | 0.878361 | 472 | 3.453125 | 3 |
At a gathering of family and close friends recently, a young couple asked me a question about their almost 3-year old son. I had observed the child and had found him to be intelligent, charming, and warmly connected to his parents. He also seemed sensitive, perhaps one of Kagan’s “inhibited” children (Kagan & Moss, 1983). The child, whom I will call “David” (not his real name), had been anxiously asking his parents about whether he might be put in jail, about whether he was a “bad guy”. He seemed to associate these fears to bible stories he was hearing in Sunday school, particularly the stories of Daniel and the Lion’s Den, and the story of Jesus being arrested. This was confusing to his parents, because in their understanding of these narratives, it was the “good guys” who were arrested. His parents told me that they constantly reassure him that he is a good boy, that they love him, and that he is safe. David’s parents further explained that he seems to ask these questions about being thrown in jail whenever a stranger is in the house, asking whether that person is going to throw him in jail. His parents decided to avoid stories about jail and to limit the bible stories since many of the concepts seemed too complex for him to process at this age. They asked me what I thought.
This question is fascinating from several points of view. First of all, it highlights the difference between the meanings an adult makes of certain narratives and those made by a preschool child. Second, it underscores the often discrepant levels of maturation of different developmental capacities in the same child. Third, it reveals aspects of a crucial cultural context that forms the way narratives transmit important beliefs and values in a society. Consideration of these factors may help parents in their efforts to talk to their children about complex subjects.
What about what Tronick calls the “age possible” meanings that two people of different developmental ages make of the same story (Tronick, 2007)? An example is offered by the 4-year old whose mother was trying to explain to her the generational relationship of people at a family reunion. The mother explained, “Your nana is your daddy’s mommy.” The little girl thought for a moment and then asked in wonder, “But how did she get him into the car seat?” I am also reminded of a little patient, a 3-year old who witnessed people jumping from the World Trade Towers on television and in a play session suggested to me that children could “jump big” in a playground because it is “softer” (Harrison & Tronick, 2007). I took her to be referring to a “soft landing”, though I knew that no number of soft mattresses at the foot of the WTT could have cushioned the fall of the jumpers. In David’s case, the meaning he derived from “being put in jail” was that you were a bad guy, period. He was not able to consider a nuanced meaning in which a good guy was unjustly jailed. It is clear that good guys and bad guys are on his mind these days. Remember the “terrible two’s”?. His age-typical anxiety about the result of noncompliance to parental demands (whether real acts of noncompliance or imagined ones) led him to fear that his “bad guy” feelings and thoughts would brand him as a bad guy and cause someone to throw him in jail. A “stranger” is a preferable enforcer of that terrible punishment, because a stranger can be seen as “all bad”. If it were one of his beloved parents who threatened him with jail, how could he manage the stress of fearing one that he also loved and depended on?
The second issue is that of discrepant developmental capacities. Human development is not a smooth, linear process. It occurs in a messy process of hits and misses, halts and bumps forward, and reiterative efforts to master. In many children, this messy process occurs at very different rates and in different ways in different domains of competency. For example, some children have precocious motor coordination but are slow to speak. Others speak sophisticated sentences early but struggle to do one rung of the monkey bars or are insecure about climbing and jumping. If you have significant discrepancies in your developmental capacities, you are left with a subjective sense of inner imbalance, sometimes even of incipient chaos, in the background. It does not always bother you, but when you experience a threat, it can emerge. This could be called “anxiety”, but that is a rather crude description of a complicated subjective experience. I do not know David well enough to guess about whether he has a discrepant developmental profile. The inheritance of “inhibited” genes is another possibility. However, I do know many children who fit this picture of uneven development.
Finally, there is the interesting factor of culture. In an earlier posting, I wrote about how another 3-year old sat through a 6-hour wedding dinner with a minimum of fuss. I described what I saw his French parents do in order to teach him to sit at the table for long stretches. In any culture many core beliefs are transmitted by narratives. Children hear these narratives repeated over and over from early on and learn the culturally shared meanings that their parents convey to them. However, the meaning is not transmitted by language alone. Peter Fonagy talks about this process. He says, “Human communication is specifically adapted to allow the transmission of cognitively opaque cultural knowledge, kind-generalizable generic knowledge, and shared cultural knowledge” (Fonagy, lecture IPMH, May, 2012). This knowledge is transmitted by what he calls “ostensive communication cues” such as eye contact, turn taking with contingent reactivity, and special vocal tones. In a study Fonagy cited, infants of 18 months old were asked by the researcher to pass an object, a doll. In the control group, the researcher gave no cues directed to the infant, but in the study group, the researcher first smiled and said hello to the infant. Then in both groups, the researcher smiled at one doll and made a disgust face at the other. At that point, another researcher came into the room and the baby was asked to give the second person a doll. Only in the group in which the experimenter had smiled and said hello, did the babies give the second person the doll the first experimenter had smiled at, the doll designated as desirable . In other words, the researcher had initiated a relationship with the baby and in that context, the baby attended to the “ostensive cues” (smiling or disgust face) she then gave him. The infant trusted the researcher who smiled and said hello and then judged the information she gave him to be reliable.
So, in response to my young friends’ question, I would say that I support their decision to protect David from anxiety provoking bible stories for the present. In avoiding certain bible stories they are acknowledging a dysynchrony between the dominant contemporary middle class U.S. culture and a culture in which bible stories are a primary means of transmitting beliefs. In the latter culture, bible stories would not just be read but from early on would be told as stories, with accompanying “ostensive cues”. In that culture, the parent would communicate – with eye contact, turn taking rhythms, and tone of voice – who the bad guys and who the good guys are in every story, over and over. In that way, David would learn the salient meanings – with associated values – of his culture. Of course, he might still have fears of being a bad guy, because of his age-typical struggles with his aggression and negativity. It is less likely, though, that his fears would focus on bible stories.
Harrison, Alexandra & Tronick, Ed (2007). Now we have a playground: Emerging new ideas of therapeutic action”, J Amer Psychoanal Assoc., 55/3: 853-874.
Kagan, Jerome & Moss, Howard A (1983) From Birth to Maturity: A Study in Psychological Development, Yale University Press.
Tronick, Ed (2007). The Neurobehavioral and Social-Emotional of Infants and Children, WW Norton.
photograph by Joshua Sparrow | <urn:uuid:528fd9bc-ddd1-46b1-b991-14c9ba0b8f37> | CC-MAIN-2018-26 | http://supportingchildcaregivers.com/2012/12/26/how-to-talk-to-your-child-about-complex-subje/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861981.50/warc/CC-MAIN-20180619080121-20180619100121-00514.warc.gz | en | 0.981138 | 1,754 | 2.71875 | 3 |
There are sound physiological reasons for eating foods in compatible combinations. In other words, some foods, if mixed in the digestive system, will cause distress! The principles of food combining are dictated by digestive chemistry. Different foods are digested differently...
- Starchy foods require an alkaline digestive medium which is supplied initially in the mouth by the enzyme ptyalin;
Protein foods require an acid medium for digestion- hydrochloric acid.
The undigested food mass can cause various kinds of digestive disorders. Undigested food becomes soil for bacteria which ferment and decompose it. Its by products are poisonous, one of which, alcohol, is a narcotic that destroys or inhibits nerve function.
It plays havoc with nerves of the digestive tract, suspending their vital action such that constipation may well be a result! As set forth in Dr. Herbert Shelton's FOOD COMBINING MADE EASY these are the salient rules for proper food combining.
The Nine Basic Rules of Proper Food Combining:
1. Eat acids and starches at separate meals. Acids neutralize the alkaline medium required for starch digestion and the result is fermentation and indigestion.
2. Eat protein foods and carbohydrate foods at separate meals. Protein foods require an acid medium for digestion.
3. Eat but one kind of protein food at a meal.
4. Eat proteins and acid foods at separate meals. The acids of acid foods inhibit the secretion of the digestive acids required for protein digestion. Undigested protein putrefies in bacterial decomposition and produces some potent poisons.
5. Eat fats and proteins at separate meals. Some foods, especially nuts, are over 50% fat and require hours for digestion.
6. Eat sugars (fruits) and proteins at separate meals.
7. Eat sugars (fruits) and starchy foods at separate meals. Fruits undergo no digestion in the stomach and are held up if eaten with foods that require digestion in the stomach.
8. Eat melons alone. They combine with almost no other food.
9. Desert the desserts. Eaten on top of meals they lie heavy on the stomach, requiring no digestion there, and ferment. Bacteria turn them into alcohols and vinegars and acetic acids. In my opinion, the Vitamix and the Healthmaster juicer are the best machines on the market. Green LEAFY vegetables are the best to use in your vegetable juicing program. All green leafy vegetables work well. The easiest ones to use include all the lettuces including, but not restricted to:
Red leaf lettuce
Green Leaf lettuce
You can then put in some of the other similar green leafy vegetables such as spinach, kale and cabbage.
Cabbage juice is one of the most healing juices when it comes to repairing an ulcer as it is a huge source of vitamin U.
Herbs also make wonderful combinations. Parsley and cilantro are great in vegetable juice. Fruit juicing is certainly good for you, but it has one disadvantage over vegetable juicing: fruit juice tends to increase insulin levels when consumed.
Adding essential oils to your vegetable juice
There are 4 basic supplements you could use:
Fish Oil (EPA/DHA) (source of omega 3 fatty acids)
Flaxseed oil (source of omega 3 fatty acids)
Cod Liver Oil (has vitamin D and vitamin A in addition to the EPA/DHA of fish oil.)
Evening Primrose Oil (source of omega 6 fatty acids)
It is becoming increasingly clear that one of the major reasons vegetable juicing works is that it is living raw food. I am confident that most of us would notice significant improvements in our energy and health if we increased the amounts of living raw foods in our diet. If you juice vegetables on a regular basis, it is quite easy to consume over 50% of your foods as raw.
The enzymes in raw foods are destroyed by heat
Most raw food, like our bodies, is very perishable. When raw foods are exposed to temperatures above 118 degrees, they start to rapidly break down, just as our bodies would if we had a fever that high. One of the constituents of foods which can break down are enzymes. Enzymes help us digest our food. Enzymes are proteins though, and they have a very specific 3-dimensional structure in space. Once they are heated much above 118 degrees, this structure can change.
Once enzymes are exposed to heat, they are no longer able to provide the function for which they were designed. Cooked foods contribute to chronic illness, because their enzyme content is damaged and thus requires us to make our own enzymes to process the food. The digestion of cooked food uses valuable metabolic enzymes in order to help digest your food. Digestion of cooked food demands much more energy than the digestion of raw food. In general, raw food is so much more easily digested that it passes through the digestive tract in 1/2 to 1/3 of the time it takes for cooked food.
Eating enzyme-dead foods places a burden on your pancreas and other organs and overworks them, which eventually exhausts these organs. Many people gradually impair their pancreas and progressively lose the ability to digest their food after a lifetime of ingesting processed foods.
Juicer Recipes #1 – Lemony Apple
- 2 apples
- 1 lemon
- 1″ slice of ginger
Juicing Tip: Juice the apples with their skins on. The skin is the most abundant area of the apple as far as flavonoid content goes. This will produce cloudy but more nutritious (and still delicious) apple juicer recipes. This healthy juicer recipe also makes a great remedy for colds.
Juicer Recipes #2 – Plain O’ O.J
- 4 medium size oranges
Juicing Tip: When juicing oranges (or any kind of citrus fruit in your recipes for juicers) it is a good idea to juice the white membranes at the center of the orange. The majority of the bio-flavonoids in citrus fruits are found in the white membranes. Scrape off some of the white membranes inside the peel and include them in the juice. We don’t recommend juicing the whole peel, this will produce a very sour unpleasant juice.
- 2 or 3 large lemons
- 1/2 cup of water
- Optional – Add apple to sweeten
Peel lemons and cut stem of apple (Swap out 1 lemon for 1 lime and bingo, you got limeade). Add ice on those hot days.
Kiwi and Pear
- 2 kiwis
- 2 pears
Peel kiwis and remove pear stems.
- 1/2 watermelon
- 1/2 honeydew
- 1/2 cantaloupe
Remove rinds and seeds (except for watermelon seeds).
Tropical Fruit Juice Recipes
- 1 orange
- 1 kiwi
- 1/2 mango
- sparkling mineral water
Peel all the fruits and also pit the mango. Pour the juice in a large glass, fill to the top with sparkling water and serve.
- 2 apples
- 3 and 1/2 watermelon pieces with rind
Cut the apples into narrow wedges and juice with the watermelon pieces.
The Pain Reducer
- 1 lemon
- 1 orange
- 2 hard pears
- 2 apples
Peel orange and lemon, remove pear and apple stems and juice.
Simply Green Juice
- 1 cup of spinach
- 2 cups of kale
- 2 cups of parsley
- 1 cucumber
- 3 celery stalks
Add a little garlic and/or ginger if you like. Wash thoroughly and juice.
- 6 carrots
- 1 cup of kale
- 1/2 beet with greens
- 3 apples
Wash all thoroughly, remove apple stems and put the whole 1/2 a beet in. | <urn:uuid:744c8502-e829-4051-b7d3-5bc878c08140> | CC-MAIN-2019-35 | https://www.dralimelbey.com/blog-of-enlightenment/nine-rules-for-proper-food-combining | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318011.89/warc/CC-MAIN-20190823062005-20190823084005-00028.warc.gz | en | 0.926055 | 1,646 | 3.0625 | 3 |
The Capitalist Imperial Pig discusses whether the Earth could go into meltdown, pointing to an article at the MIT Technology Review based on a submission by Colin Goldblatt and Andrew Watson available at arXiv. The manuscript itself is quite clear and differentiates different kinds of runaway warming, the second , and the one Eli will think a bit about comes from determining the vapor pressure of the stratosphere by temperature of the tropopause. In other words, the flux of water vapor into the stratosphere is determined by how much can get through the cold trap at the tropopause.
In radiative equilibrium, the upward longwave flux must equal the downward shortwave flux throughout. Two consequences of this are that the temperature increases with optical depth (this increase is rapid once optical depth > 0.1) and that a higher absorbed shortwave flux will mean that the stratosphere is warmer throughout.They show this in their Figure 2.
A limit on outgoing radiation from the stratosphere arises because the radiative equilibrium temperature profile needs to match the optical depth of the stratosphere, which is set by the saturation vapour pressure at the tropopause. Intuitively, one might think first of the tropopause temperature then of the associated outgoing flux, but the radiation limit is easier to demonstrate by starting with the outward flux. For some given flux, we follow the radiative equilibrium temperature–optical depth profile until it intersects the temperature–optical depth curve derived from the saturation vapour pressure (figure 2). The intersection gives the tropopause . If the outgoing longwave flux is large, no solution can be found—the radiation limit is then the highest flux for which a solution can be found, around 385Wm−2 here.Put this together with Susan Solomon's demonstration a couple of years ago that humans are wetting the stratosphere by increased methane releases, followed by oxidation to water vapor and the bunnies realize that there is another mechanism for what Goldblatt and Watson call "Radiation Limit 2: moist stratosphere upper limit (Komabayashi–Ingersoll limit)", blowing a bunch of methane into the stratosphere.
And where have we seen that discussed? and here too.
Eli, being a lazy bunny, thinks this would require an ungodly methane release, but a massive push of methane into the stratosphere with the associated increase in stratospheric water vapor would bring the Earth into an entirely unique and dangerous situation. | <urn:uuid:3f83623c-d5a5-4542-8817-cd290df6315f> | CC-MAIN-2015-11 | http://rabett.blogspot.com/2012/01/wetting-stratosphere-boiling-oceans.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461988.0/warc/CC-MAIN-20150226074101-00204-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.912694 | 502 | 3.09375 | 3 |
As the name implies, VT involves the visual observation of the surface of a test object to evaluate the presence of surface discontinuities. VT inspections may be by Direct Viewing, using line-of sight vision, or may be enhanced with the use of optical instruments such as magnifying glasses, mirrors, borescopes, charge-coupled devices (CCDs) and computer-assisted viewing systems (Remote Viewing).
Syllabus for visual Testing in level l/ll:
- Defects types and source in metals
- Methods of testing on material
- Materials properties
- Methods for visual test
- Light and its application in visual test
- Welding and related defects on weld joints
- Standards and acceptance criteria for weld inspections.
- Documents need for visual test
- Steps for visual inspection
- Documentation and visual test reporting.
- Review course objects and exam
4 Days Theoretical In-class + assessment day | <urn:uuid:dca8cf13-366f-48ba-b2f1-0be1f6ab9dbb> | CC-MAIN-2022-27 | https://academy.citadel-engineering.com/visual-testing-training-course-vt/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103334753.21/warc/CC-MAIN-20220627134424-20220627164424-00024.warc.gz | en | 0.821086 | 198 | 2.9375 | 3 |
What would a city’s CO2 emissions look like?
One ton of CO2 would fill a sphere 33 feet across. The office of the mayor of New York City decided to take this information and, given the city’s overall CO2 emissions, visualize exactly what New York’s CO2 emissions would look like if all of the gas was condensed around the center of Manhattan. The screenshots above are taken from Michael Bloomberg’s video, and the visuals are dramatic - the emissions after only an hour tower over nearby buildings, and after just one day, the Empire State Building would be swallowed by CO2. The scariest part of the whole project? New York is only the 5th worst city in terms of per capita emissions. | <urn:uuid:9d088e8f-542a-420b-aa5f-f52da804cbcb> | CC-MAIN-2014-10 | http://sciencecenter.tumblr.com/post/36677131201/what-would-a-citys-co2-emissions-look-like-one | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021901207/warc/CC-MAIN-20140305121821-00097-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.942113 | 154 | 2.90625 | 3 |
Most people don't eat enough fibre. You need fibre daily for a healthy digestion and to prevent constipation. When you eat more fibre, it's important to also drink more fluid, such as water. This helps your body make the best use of the fibre.
- Choose dhal and bean curries often. They contain a particular type of fibre called soluble fibre which has been shown to reduce your blood cholesterol. These foods can also help to keep blood glucose (sugar) steady in diabetes. Try out one of the Masoor Dhal recipes – delicious!
- Opt for wholegrain cereals or mix some in with your favourite cereal. Check labels so you choose those wholegrain breakfast cereals that contain less sugar.
- Try different breads such as seeded, oat bread, rye bread, wholemeal and granary. Choose coarse wholemeal atta for chapattis, or if you don't like it, try a combination of wholemeal and white mixed together in your atta container.
- Try unusual grains like bulgur and couscous. Bhajra (millet) roti is a good source of fibre. Try not to add butter or ghee on top so that you keep an eye on your saturated fat intake.
- Get into the habit of asking yourself what you can do to your meal to increase its fibre content. Could you serve a side salad or extra vegetables? Why not throw a can of sweetcorn or some lentils into a meat curry, or a few sunflower seeds into cereals and salads? How about a piece of fruit after your meal? | <urn:uuid:84c40f5e-4e93-46c8-a8cd-288180618ac4> | CC-MAIN-2017-26 | http://theismaili.org/nutrition/five-ways-eat-more-fibre | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00037.warc.gz | en | 0.929704 | 329 | 2.78125 | 3 |
During their current project cycle, the 9th Grade is exploring the themes of revolution and paradigm shifts. To be able to make sense of the world around them, it is important for our students be aware of the paradigms of thought and ideology that shape the societies we live in. Critical and ethical citizens should be able to appreciate the fact that these paradigms emerged under certain conditions and that they may shift in the future if those conditions change. This project cycle was designed specifically to create such an awareness in our students’ minds.
In their Humanities classes, students have been delving into the historical topics of the Scientific Revolution – focusing on the question of why it happened in early modern Europe, but not to the same extent in the contemporaneous Middle East and China – and the Age of Revolutions – focusing on how political theories of Enlightenment shaped the French Revolution. Concurrently, in STEM, the students have been studying the structural changes and innovations in the history of chemistry over the last few centuries, such as our understanding of molecules, atomic bonding, and the periodic table. Taking this integrated, multi-disciplinary approach has allowed our students to see revolution of thought and ideology in action in a more holistic way.
To complete their 6-week project cycle, the students are turning to art. Specifically, the students will create murals based on the paradigm-shifter of their choice – from scientific innovators to civil rights leaders to anyone who has caused a true watershed in society or in human thought. In preparation for this culminating project, the students have gone on a mural walk of DC to familiarize themselves with the context and range of important murals, they have visited the National Portrait Gallery, and they are being mentored by a local professional muralist who has already helped them complete their concept sketches.
Overall, this is another exciting integrated and experiential learning opportunity with the final product to be showcased permanently on the Whittle campus.
Learn more about our educational philosophy and approach to learning. Attend an upcoming event. | <urn:uuid:e5d83825-341e-4764-b542-6b86018bbd2a> | CC-MAIN-2020-16 | https://www.whittleschool.org/en/blog/studying-revolution-and-paradigm-shifts-upper-school | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370499280.44/warc/CC-MAIN-20200331003537-20200331033537-00081.warc.gz | en | 0.954169 | 412 | 3.390625 | 3 |
Arduino is an electronic platform with a diverse number of development boards available to communicate between real and programming worlds. It allows students, beginners, teachers, and engineers to design academic and real time projects to solve modern problems. Apart from Arduino’s vast scope it has some limitations also. Nothing is 100% perfect in this world! Like every electronic gadget Arduino has also some restrictions to work with.
Arduino is designed to make the microcontroller world more accessible. It is based upon ATmega AVR microcontrollers. Arduino platforms consist of circuit boards like UNO, normally referring to microcontrollers and the development part known as IDE. Using IDE, Arduino boards can be programmed using C++ language.
The Arduino platform has multiple learning opportunities due to its vast usage and advantage over microcontrollers but along with good there is always a chance of bad things.
What are the Advantages of Arduino
Arduino has been used for a long time in electronic projects and it has been the favorite board of beginners in the electronic world. Here are some advantages of Arduino due to which it is so popular.
Easy to Use
Arduino is super easy to learn. Any beginner can learn Arduino with little or no knowledge of programming. It uses a simplified version of C/C++ language which is easily adaptable. It is an ideal board for beginners. Arduino is a plug and play electronic board with a simple and minimalistic hardware interface.
Arduino boards are available at low cost. To start building our first program we just need an Arduino board as its development tool IDE is freely available. There is no need for any external hardware, multiple projects can be made using single Arduino boards which cut overall project cost by a great margin.
Active User Community
Arduino is an open-source community with many online supports available on Arduino forum. Thanks to open-source nature of Arduino projects, as a lot of work on multiple topics has already been done. Multiple Arduino projects starting from fan controllers to smart homes have been designed already.
Cross Platform Support
Arduino is not only limited to Windows it is also available across multiple platforms like Linux and macOS. Most of the microcontrollers can only be programmed using Windows but not in case with Arduino.
Tons of Libraries
Many Arduino libraries are available to control external sensors, modules, and motors. Functionality of Arduino boards can be extended using these libraries. Libraries provide the user free hand to play with hardware and manipulate data easily.
What are the Disadvantages of Arduino
Arduino boards are not always the best choice, with so much to offer Arduino has some disadvantages too. Here is a brief description of a few shortcomings Arduino have.
Lack of Multitasking
Arduino boards are limited to run only a single program at a time. Other competitor boards like Raspberry Pi offers multitasking functionality. Like multicore CPUs that can run multiple programs without slowing the speed of the overall system, Arduino lacks this ability and we must close one sketch to execute the other one.
Not Optimized for Performance
Microcontrollers used in most Arduino boards are not ready to give their full performance. The Arduino development environment is optimized for beginners so they can easily create sketches. All this optimization comes at the cost of reducing the microcontroller’s overall power ability. If the same microcontroller is used with AVR development the performance will be increased by manifolds.
Lack of Communications
Arduino boards are limited in terms of Bluetooth and Wi-Fi support. Popular Arduino boards like UNO don’t have in-built communications support; we must interface external hardware modules to enable these functions. Arduino ships few boards with these technologies, but overall cost increased compared to other boards available in the market.
Limited Support for Programming Languages
Less Memory Storage Capacity
One of the main features which Arduino lacks is it has limited memory storage. Arduino UNO has 2kb of SRAM and 32kb of flash memory which can only store sketches with hundreds of lines. Due to this Arduino has limited scope in the robotics world and cannot be used in industrial scale projects.
Arduino is a microcontroller-based platform used for rapid prototyping. Arduino is a starter package for beginners and designed for students to get into the programming world however Arduino is not designed for a harsh industrial environment. Arduino has limited processing power that cannot meet industrial requirements. If you must design a complex project that demands rapid and high processing ability, then a microprocessor board like Raspberry Pi is the best choice which has a lot more functionality. To learn more about Raspberry Pi click here. | <urn:uuid:2eb54151-8f25-44a9-abb8-bc2711f14fdc> | CC-MAIN-2023-14 | https://linuxhint.com/advantages-and-disadvantages-arduino/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949009.11/warc/CC-MAIN-20230329151629-20230329181629-00072.warc.gz | en | 0.931739 | 995 | 3.171875 | 3 |
New Orleans' Teaching Force Today: Whiter, Less Experienced, Higher Turnover
After the levees broke in the wake of Hurricane Katrina, 7,000 New Orleans teachers lost their jobs, paving the way for a massive change in the city's teaching force.
Now, a descriptive study by Nathan Barrett and Douglas N. Harris of the Education Research Alliance for New Orleans, paints a picture of just how different the city's teachers look today from a decade ago. Here are some of key trends:
- The city's teaching force is now 49 percent black, compared to 71 percent black in 2005.
- About 60 percent of teachers in 2005 were trained in New Orleans colleges; in 2014, fewer than 40 percent were.
- Teacher experience levels dropped notably since 2003; the percentage of teachers with five or fewer years of experience increased from 33 percent to 54 percent over that time period.
- The percentage of certified teachers fell from 79 percent to 56 percent.
- Teachers were now twice as likely to exit teaching altogether, at 18 percent, in 2013 compared to 2004 (9 percent), and it is also more common for teachers to change schools within a CMO or the parish-run schools than before the storm. Interestingly, though, it's still not that common (4 percent) for teachers to move to work in another parish.
Some of these findings are expected given policy changes in the city's education system. For example, 93 percent of the city's students are taught in charters, and those schools don't have to hire teachers with traditional credentials. But others, the researchers note, are harder to pin down. For instance, was the drop in minority teachers due to a diminished supply of teachers, a change in hiring priorities by schools, or difficulties faced by black teachers in returning to the city after Katrina?
Finally, the report notes that many of these trends—high turnover, little experience—are the opposite to the conventional wisdom on teacher quality, and yet test scores have improved noticeably in the Crescent City. Again, it's unclear whether that's a result of schools' newfound flexibilities with hiring and firing, the effects of the alternative programs many new hires came through, or some other factor.
And there are still a lot of open-ended questions, the authors underscore: For example, standardized test scores may be up, but how will students taught under this new system do on measures like creativity and civic engagement?
We do know that, whatever the impact on students of this turnover, Katrina wrought severe collateral damage on the teachers who were fired without so much as an apology, as my colleague Corey Mitchell reported. Corey's story is part of Education Week's package looking at New Orleans education 10 years after the storm.
Look for more reports on New Orleans' teaching force from the alliance in the coming weeks and months.
Photo: Teacher Karen Taylor helps 2nd grader Rae'Niya Davis, 7, with a math problem at the Dr. Martin Luther King Jr. Charter School in New Orleans' Lower 9th Ward. -Swikar Patel/Education Week | <urn:uuid:af076c6e-4e06-4d70-9bb5-7b675f8ffedb> | CC-MAIN-2018-05 | http://blogs.edweek.org/edweek/teacherbeat/2015/08/new_orleans_teaching_force_whi.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887729.45/warc/CC-MAIN-20180119030106-20180119050106-00606.warc.gz | en | 0.960056 | 627 | 2.65625 | 3 |
Elucidating terrestrial nutrient sources to a coastal lagoon, Chincoteague Bay, Maryland, USA
Long-term non-linear ecosystem-scale changes in water quality and biotic communities in coastal lagoons have been associated with intensification of anthropogenic pressures. In light of incipient changes in Johnson Bay (an embayment of Chincoteague Bay, Maryland-Virginia, USA), examination of nitrogen sources was conducted through synoptic water quality monitoring, stable nitrogen isotope signatures (deltaN-15) of in situ bioindicators, and denitrification estimates. These data were placed in the context of long-term and broader spatial analyses. Despite various watershed protection efforts, multiyear summer time studies (2004-2007) suggested that high levels of terrestrially derived nutrients still enter Johnson Bay. Total nitrogen concentrations in Johnson Bay were 132% the concentrations in the broader Chincoteague Bay during the late 1970s (mean 2004-2007 was 40.0 - 73.2 µM). Comparing total nitrogen concentrations in Johnson Bay to St. Martin River (consistently the most eutrophic region of these coastal bays), Johnson Bay has increased from 62.5% to 82.5% of the concentrations in St. Martin River during the late 1970s. Though specific sources of nitrogen inputs have not yet been definitively identified, the long-term increase in total nitrogen concentrations occurred despite increased and continued conservation and protection measures. We suggest that investigating nutrient sources can reveal potentially ineffective nutrient policies and that this knowledge can be applied towards other coastal lagoons.
Keywords: coastal lagoons, nitrogen, anthropogenic factors, water quality, land use, Maryland, Chincoteague Bay | <urn:uuid:672245d5-d4ef-4aa4-9b6e-31e218c1ac70> | CC-MAIN-2021-25 | https://ian.umces.edu/publications/elucidating-terrestrial-nutrient-sources-to-a-coastal-lagoon-chincoteague-bay-maryland-usa/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487586465.3/warc/CC-MAIN-20210612222407-20210613012407-00636.warc.gz | en | 0.916646 | 353 | 2.75 | 3 |
The purpose of this report is to provide information on the mining industry of Delaware as an essential component of a growing economy. The industry, particularly in sand and gravel mining, must deal with uneven regulation, land use competition, and environmental pressures. It is hoped that the information gathered here will assist planning and regulatory agencies as well as an interested general public in evaluating the role of the extractive mineral industry.
The information contained in this Guidebook was compiled on the occasion of the Annual Meeting of the Association of American State Geologists held in Delaware in June 1977. The Delaware Geological Survey is pleased to have been selected to host this national meeting. The field trip logs were designed to familiarize geologists from across the United States with basic features of Delaware's geology and resources. We have also sought to identify some points of historical and cultural interest that may help the visitor become familiar with our State. Experience has shown that field guides retain their usefulness beyond the event that they initially served. They may assist classes, other groups, and individuals seeking additional information about their physical environment. Therefore, this Guidebook has been published as an Open File Report for public distribution. All users of this information are urged to exercise caution, especially at rock faces and along waterways, and to obtain specific permission for visits from landowners where necessary.
The Columbia sediments of Delaware cover almost all of the surface of the Coastal Plain portion of the State. A major unconformity separates these predominantly sandy materials from the underlying rocks of the Coastal Plain. As it includes the materials closest to the surface in most places, the Columbia has great practical importance in Delaware. In addition to the morphology and soils which are largely dictated by the Columbia, it holds about 90 percent of the State's groundwater supplies, is the geologic foundation for most construction, and yields essentially all of the sand and gravel mined here.
OFR45 Characterization of the Potomac Aquifer, an Extremely Heterogeneous Fluvial System in the Atlantic Coastal Plain of Delaware
Fluvial sands of the subsurface Cretaceous Potomac Formation form a major aquifer system used by a growing population in the northern Coastal Plain of Delaware. The aquifer is extremely heterogeneous on the megascopic scale and connectivity of permeable fluvial units is poorly constrained. The formation is characterized by alluvial plain facies in the updip section where it contains potable water. While over 50 aquifer tests indicate high permeability, the formation is primarily composed of fine-grained silt and clay in overbank and interfluvial facies. Individual fluvial sand bodies are laterally discontinuous and larger-scale sand packages appear to be variable in areal extent resulting in a labyrinth style of heterogeneity. The subsurface distribution of aquifers and aquitards has been interpreted within a new stratigraphic framework based on geophysical logs and on palynological criteria from four cored wells. The strata dip gently to the southeast, with generally sandy fluvial facies at the base of the formation lapping onto a south-dipping basement unconformity. The top of the formation is marked by an erosional unconformity that truncates successively older Potomac strata updip. Younger Cretaceous units overly the formation in its downdip area. In the updip area, the formation crops out or subcrops under Quaternary sands.The fine-grained facies include abundant paleosols that contain siderite nodules and striking mottling that commonly follows ped faces and root traces. These paleosols may serve as regional aquitards. This geologic complexity poses a challenge for determining the magnitudes and directions of ground-water flow within the aquifer that are needed for making informed decisions when managing this resource for water supply and contaminant remediation.
The purpose of this report is to characterize Delaware Atlantic Coast beach sand on the basis of sand texture data in order to identify geologic material suitable for beach nourishment.
OFR28 Potential for Ground-Water Recharge in the Coastal Plain of Northern New Castle County, Delaware
This map was constructed primarily to indicate the possibilities for artificial recharge into both the surficial sediments of Quaternary age (exclusive of soils) and the older, immediately underlying sediments. However it can also be used to determine where natural recharge might be entering the ground most readily in those areas relatively free from impermeable cover. The surficial sediments include micaceous sands and gravels in the vicinity of the Fall Line derived from underlying crystalline rocks, Holocene marsh deposits, Delaware River sediments, and the Columbia Formation of Pleistocene age. The Columbia Formation is composed of poorly sorted sands with some gravels, silts and occasional clays. The unit is one of the most important ground-water reservoirs in New Castle County.
B13 Geology, Hydrology, and Geophysics of Columbia Sediments in the Middletown-Odessa Area, Delaware
Columbia sediments in the Middletown-Odessa area are composed of boulders, gravels, sands, silts and clays. These sediments are exposed in four gravel pits where their structures and textures were studied. Subsurface geology was interpreted on the basis of the well-log data from 40 holes drilled in the area of study. Columbia sediments were laid upon a surface made up of the greensands of the Rancocas Formation (Paleocene – Eocene age). The contact between the Rancocas and Columbia Formations is an erosional unconformity.
The Columbia deposits of Delaware form a sheet of sand with a maximum thickness of approximately 150 feet which covers most of the Coastal Plain portion of the State. The dispersal pattern, deduced from foreset dip directions of cross-bedding, indicates that the sediment entered the study area from the northeast, i.e., from the direction of the valley of the Delaware River between Wilmington and Trenton, and spread south and southeast over Delaware.
This investigation was undertaken to locate deposits of rock, sand, gravel, fill and borrow in northern New Castle County which may be potential sources of material for highway construction, and to prepare maps and descriptions of the surficial earth materials relative to their geologic and engineering properties.
B5 Sedimentary Petrology of the Cretaceous Sediments of Northern Delaware in Relation to Paleogeographic Problems
The non-marine Cretaceous sediments of northern Delaware older than the Magothy formation cannot be divided accurately into formations or mappable geologic units because their lithologic characteristics are very similar. However, two heavy mineral zones can be distinguished in these deposits: a lower staurolite-kyanite-tourmaline-zircon zone, and an upper tourmaline-zircon-rutile zone with abundant alterites. They have been named the Patuxent zone and the Patapsco-Raritan zone respectively. The Magothy formation is characterized by abundant staurolite and also contains significant amounts of tourmaline. The marine Upper Cretaceous deposits have a greater variety of heavy minerals than the underlying non-marine sediments. They contain abundant epidote; chloritoid, first appearing at the base of the Merchantville formation, is persistently present. Garnet is found in the Merchantville and the Mount Laurel-Navesink formations. The heavy mineral composition of the Cretaceous sediments is shown in table IV.
The complex geologic framework of the Fall Zone in Delaware is primarily caused by diverse structural features present in the crystalline basement rocks that have exerted a considerable influence on the distribution of the overlying sediments of the Coastal Plain.
The feasibility of using geophysical techniques in determining the amount of overburden and the nature of the subsurface along a proposed highway was tested in the Piedmont area of Delaware. The area is underlain by crystalline rocks capped by varying amounts of unconsolidated material or regolith. Seismic refraction and surface resistivity methods were used at selected stations and the interpretations were later compared to results from test holes and to the material exposed in road cuts. In general, interpretation of the seismic refraction results compared quite well with test borings and with field observations made after construction was started. Resistivity data were inconclusive in themselves but provided some additional control points when correlated with seismic refraction data. With proper control, it is concluded that such techniques could be useful in the Piedmont of Delaware for highway planning.
The quantitative lithofacies analysis of the Potomac Formation in a small area west of Delaware City revealed that the deposition of these sediments was continuous throughout the time of their formation. The uppermost part of the Potomac sequence appears to have been removed, probably by erosion, prior to the deposition of the younger Upper Cretaceous marine sediments. The sand bodies contained in Potomac deposits have a shoestring channel form and were most probably deposited by unidirectional currents. The direction of the flows, however, cannot be determined on the basis of the available subsurface data.
RI11 An Evaluation of the Resistivity and Seismic Refraction Techniques in the Search for Pleistocene Channels in Delaware
Pleistocene channels along the margins of the Atlantic Coastal Plain are developed in crystalline and Triassic sediments (Bonini and Hickok, 1958), or into the Cretaceous and Tertiary coastal plain sediments (Widmer, 1965). Deposits in these channels consist of sand and gravel with amounts of silt and clay. For example, the Bear area channel is 50 to 70 feet deep and contains up to 30 feet of sand and gravel overlain by sandy clay. Because they are usually more permeable than the older deposits into which the channels are developed, Pleistocene deposits are important in ground water studies for several reasons: (1) where they are thick enough they may be used as aquifers, as in the case of the Bear channel, and (2) these beds can effectively increase the recharge into the underlying aquifers by absorbing precipitation and transmitting the water to them.
A series of cores was obtained from a boring in the sediments of the Delaware River near the Delaware Memorial Bridge. The mineralogy, texture and palynology of these samples have been studied. The sedimentary and palynological records suggest that the Delaware River, while swollen with Wisconsin meltwaters, deepened its channel and that subsequent flooding of the mouth of the stream by rising sea waters initiated the deposition of estuarine silts in post-Wisconsin time. | <urn:uuid:20fb8a0a-4865-4fe3-81f4-53a06c6bbf4c> | CC-MAIN-2016-26 | http://www.dgs.udel.edu/category/geology-keywords/sediments?page=1 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402516.86/warc/CC-MAIN-20160624155002-00126-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.940961 | 2,189 | 2.703125 | 3 |
In this article
What is lactose intolerance?Lactose intolerance means your body can't produce enough lactase, the enzyme needed to digest lactose. Lactose is the main sugar in animal milk and other dairy products. When one is lactose intolerant, the undigested lactose stays in the intestine and causes gastrointestinal problems. Although lactose intolerance is uncomfortable it isn't dangerous.
Do bear in mind that cow's milk intolerance and lactose intolerance are not the same thing. Although their symptoms are similar, cow milk allergy is when your body reacts to the proteins in milk. It is an allergy triggered by the immune system.
What are the symptoms of lactose intolerance?People who are lactose intolerant will find that dairy products give them wind. If you're highly intolerant you may already be aware of this before pregnancy. But if you're only somewhat intolerant (and thus not aware of it) you may start to feel some distress during pregnancy.
Other common symptoms are:
How can I know for sure I'm lactose intolerant?In all likelihood, your doctor will be able to tell you if you're lactose intolerant by asking about your symptoms. She may ask you to cut out all dairy products for a short period to see if your health improves.
Sometimes normal pregnancy symptoms can be confused with those of lactose intolerance. Nausea, vomiting heartburn are common problems for many pregnant women. In such cases doctors may suggest taking a blood sugar test or a hydrogen breath test to get the right diagnosis.
How can I get enough calcium if I'm lactose intolerant?Your best food sources of calcium are milk and other dairy products. However, if you are lactose intolerant, you may need calcium supplements and a specific non-dairy, calcium rich diet. This will help to make up for the loss of calcium from milk and dairy products. Non-dairy sources of calcium include:
- leafy greens such as spinach (paalak)
- soya milk
- Indian shad fish (hilsa)
- sesame seeds (til)
Lactose-free milk and other dairy products are now available in some grocery stores. They have all the nutrients of regular milk without the lactose.
Keep in mind that vitamin D is essential for maximum absorption of calcium in your body. Good sources of vitamin D are eggs, fish and regular exposure to sunlight. If you do not eat eggs and fish speak to you doctor, she may prescribe a suitable vitamin D supplement.
Can lactose intolerance be treated or prevented?There is no specific treatment for lactose intolerance. But there are things you could do to help you with this condition:
- Reduce or cut out milk and milk products from your diet. This approach works for most people.
- Keep a food diary and note down the foods you eat. This can help you to easily pinpoint which ones are causing or aggravating your symptoms.
- Check food labels. Look out for milk based ingredients such as whey, cheese, curds, dry milk solids, non-fat dry milk powder and dairy creamer.
- If you're eating out, ask out about the recipe and ingredients used. Dishes such as shahi paneer, kadhi, butter chicken, malai koftas, dal makhani are made with milk and milk products.
- Check the composition of any over-the-counter medication, or gas and acidity pills you may be taking. They may contain lactose. If you aren't sure, consult your doctor and only take medicine prescribed by her.
Despite your best efforts, if symptoms continue to persist, speak to your doctor. She may want to review your case and suggest you meet a dietitian to rule out any hidden lactose triggers in your diet.
Find out more about:
- Can I have milk and milk products if I'm lactose intolerant?
- Do I need to include full cream milk and a katori of ghee in my daily diet?
- Diet for a healthy pregnancy.
Last reviewed October 2012 | <urn:uuid:c8310ee3-31c3-4725-a510-58de6bb6982b> | CC-MAIN-2015-14 | http://www.babycenter.in/a1015427/lactose-intolerance-in-pregnancy | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298871.15/warc/CC-MAIN-20150323172138-00215-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.935397 | 849 | 3.25 | 3 |
(AP) -- There's a monster lurking off the coast of New York. Experts in a Cornell University acoustics program said Thursday that blue whales have been positively identified in the area for the first time.
The sound of a blue whale was recorded about 70 miles off Long Island in January. A second one was recorded farther away.
Blue whales wander all the world's oceans but normally are found in much deeper water hundreds of miles offshore.
Program director Christopher Clark says the discovery will guide conservation decisions, help protect the endangered animals from ship collisions and reduce noises that interfere with their communication.
On the Net:
Cornell Bioacoustics Research Program: http://www.birds.cornell.edu/brp/
©2009 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
Explore further: Whale songs are heard for the first time around New York City waters | <urn:uuid:4931ca38-774d-47e8-981f-1d41162e06f9> | CC-MAIN-2017-47 | https://phys.org/news/2009-05-blue-whales-ny-usual-path.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805008.39/warc/CC-MAIN-20171118171235-20171118191235-00190.warc.gz | en | 0.911373 | 190 | 2.8125 | 3 |
The "Museo Cartaceo" ("Paper Museum"), a collection of more than 7,000 watercolors, drawings and prints assembled by the Roman patron and collector Cassiano dal Pozzo and his youngest brother Carlo Antonio from 1625 to 1665, represents one of the most significant attempts made before the age of photography to embrace the widest range of human knowledge in visual form. Documenting ancient art and architecture, botany, geology, ornithology and zoology, the collection is a significant tool for understanding the cultural and intellectual concerns of a period during which the foundations of our own scientific methods were laid down.
"The Paper Museum reflects the taste and intellectual breadth of Cassiano dal Pozzo, one of the most learned and enthusiastic of all seventeenth-century Roman collectors. As secretary to Cardinal Francesco Barberini, patron of artists such as Poussin, and a friend of Galileo, Cassiano crossed the boundaries of artistic, scientific and political disciplines to create his unique visual encyclopaedia. His patronage extended to both the well-known and the lesser-known artists of his day, and his close connections with leading European scientists, scholars and philosophers kept him informed of the latest archaeological and scientific discoveries. His younger brother Carlo Antonio came to share his interests and played a significant role in augmenting and arranging the collection.
"Through his association with Federico Cesi, Prince of Acquasparta (1585–1630), and his membership of the Accademia dei Lincei (the first modern scientific society, founded by Cesi), Cassiano assembled visual evidence of scientifically – and for the first time microscopically – observed natural phenomena, thus establishing a firm basis for scientific classification. Fruit, flora, fungi, fauna, minerals and fossils – all were meticulously recorded, whether commonplace or exotic. He applied the same rigour and systematic methodology to his antiquarian studies: classical and early medieval monuments and artefacts were painstakingly drawn and classified to form a unique survey of ancient architecture, religion, custom, dress and spectacle" (http://warburg.sas.ac.uk/pozzo/prospectus.pdf, accessed 0-03-2010).
The "Paper Museum" was sold by Cassiano’s heirs to the Albani Pope Clement XI , who resold it to his connoisseur nephew Cardinal Alessandro Albani in the early eighteenth century. It remained in the Albani collection until a substantial portion was acquired by George III, also a scientific amateur, in 1762 for his library at Buckingham House. In 1834, the collection was transferred to the Royal Library created by William IV at Windsor Castle, where it forms part of the Royal Collection. Other portions are at the British Library, the British Museum, the botanical gardens at Kew (mycological specimens) , the library of Sir John Soane's Museum. Portions not purchased for George III are preserved at the Institut de France and various other public and private collections.
Since the 1990s a project has been underway to publish the drawings and prints in the ‘Museo Cartaceo’ in a series of thirty-six volumes, arranged by subject matter following the method of classification employed by Cassiano himself. The series is entitled The Paper Museum of Cassiano dal Pozzo ~ A Catalogue Raisonné. | <urn:uuid:4315ebe5-ef21-4532-bcf5-bbb866c95920> | CC-MAIN-2021-17 | https://historyofinformation.com/detail.php?entryid=2838 | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038074941.13/warc/CC-MAIN-20210413183055-20210413213055-00628.warc.gz | en | 0.941207 | 691 | 3.171875 | 3 |
Send an E-Postcard of:
(c) Pocumtuck Valley Memorial Association, Deerfield MA. All rights reserved.
Contact us for information about using this image.
This is a stone called a "pitted" or "nutting" stone. It was used as a small nutcracker or seed grinder. The nuts or seeds would be placed in the small depression and then cracked or ground with a small round stone used as a hammer. This particular stone has pits on both sides. Other items such as minerals, pigments, plants and berries were ground in these small grinders for use in medicinal remedies, dyes, and pigments. Native people used these for many thousands of years from about 6,000 to 300 years ago.
top of page | <urn:uuid:9b667b7b-ec88-4d2b-bbe7-8c1b3833bc3a> | CC-MAIN-2014-52 | http://www.americancenturies.mass.edu/activities/postcards/make.do?itemid=5243 | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770668.10/warc/CC-MAIN-20141217075250-00120-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.942843 | 160 | 3.515625 | 4 |
- Don’t ever dive into shallow water. Before diving, inspect the depth of the water to make sure it is deep enough for diving. If diving from a high point, make sure the bottom of the body of water is double the distance from which you’re diving. For example, if you plan to dive from eight feet above the water, make sure the bottom of the body of water, or any rocks, boulders or other impediments are at least 16 feet under water.
- Never dive into above-ground pools.
- Never dive into water that is not clear, such as a lake or ocean, where sand bars or objects below the surface may not be seen.
- Only one person at a time should stand on a diving board. Dive only off the end of the board and do not run on the board. Do not try to dive far out or bounce more than once. Swim away from the board immediately afterward to make room for the next diver.
- Refrain from body surfing near the shore since this activity can result in cervical spine injuries, some with quadriplegia, as well as shoulder dislocations and shoulder fractures.
The entire list is as follows:
- Fall Protection in Construction (1926.501)
- Hazard Communication (1910.1200)
- Scaffolding in Construction (1926.451)
- Respiratory Protection (1910.134)
- Lockout/Tagout (1910.147)
- Powered Industrial Trucks (1910.178)
- Electrical – Wiring Methods (1910.305)
- Ladders in Construction (1926.1053)
- Machine Guarding (1910.212)
- Electrical – General Requirements (1910.303)
National Aeronautical Space Agency (NASA), an executive Federal Agency dedicated to Space flight, highly values exploration. The Agency’s exploration success depends on employees’ detailed attention to the safety and health of the astronauts and their fellow Earth-bound employees. For decades NASA’s occupational health programs have maximized the opportunities of national health initiatives as well as internal resources. And, they have led the way to improve internal programs for the maintenance of a workforce that operates at its highest level of physical and mental well-being.
Emergency medical services (EMS) workers are primary providers of pre-hospital emergency medical care and integral components of disaster response. The potentially hazardous job duties of EMS workers include lifting patients and equipment, treating patients with infectious illnesses, handling hazardous chemical and body substances, and participating in the emergency transport of patients in ground and air vehicles. These duties create an inherent risk for EMS worker occupational injuries and illnesses; and research has shown that they have high rates of fatal injuries and nonfatal injuries and illnesses.
Employers that invest in workplace safety and health can expect to reduce fatalities, injuries, and illnesses. This will result in cost savings in a variety of areas, such as lowering workers’ compensation costs and medical expenses, avoiding OSHA penalties, and reducing costs to train replacement employees and conduct accident investigations. In addition, employers often find that changes made to improve workplace safety and health can result in significant improvements to their organization’s productivity and financial performance.
Home building is physically demanding work and manual material handling may be the most difficult part of the job. Manual material handling includes all of the tasks that require you to lift, lower, push, pull, hold or carry materials. These activities increase the risk of painful strains and sprains and more serious soft tissue injuries.
Soft tissues of the body include muscles, tendons, ligaments, discs, cartilage and nerves. Soft tissue injuries cause workers pain, suffering and lost income. They can also restrict non-work activity, like sports and hobbies. Builders’ and employers’ costs include loss of productivity and high workers’ compensation insurance premiums.
- Train employees. The deadline to ensure all workers are familiar with the updated labeling and SDS elements was Dec. 1, 2013.
- Get the new SDSs. Take steps, including contacting chemical manufacturers, to ensure you have updated SDSs by June 1 for all chemicals onsite.
- Review the SDSs. When the new SDSs come in, closely examine them and consider whether you have appropriate controls in place for all hazards.
- Update hazcom program. If new hazards are listed on the SDSs, update your hazard communication program to mitigate the risks posed by those hazards.
- Review training. Make sure your employees understand the new labels and SDSs. Refresher training may be necessary.
Psychosocial environment refers to the culture and climate of the workplace. Examples of the psychosocial environment of a workplace include respect for work-life balance, mechanisms to recognize and reward good performance, valuing employee wellness, encourage employee feedback about organizational practices, zero tolerance for harassment, bullying and discrimination, ensuring employee psychological safety and health.
A healthy workplace will:
- Improve employee health outcomes
- Make it easier to attract and retain qualified employees
- Lower absenteeism
- Reduce health benefit costs
- Enhance morale
- Reduce risk of injury
- Improve job performance
Safe and healthy employees are less likely to be injured while on the job and are vibrant, engaged, and high performing.
Safer and Healthier Employees…
… Are good for business and help improve the bottom line. Companies that have exemplary safety, health, and environmental programs outperformed the S&P 500 by between 3% and 5%.
… Create a happier, less stressful, and more prosperous business environment. According to a survey by Aon Hewitt, the National Business Group on Health, and the Futures Company, employees who reported having a strong culture of health at work were more likely to report being happy, less likely to report that stress has a negative impact on their work, and less likely to cite the work environment as an obstacle to health.
… Do better at their jobs and contribute more. Employers that have high employee engagement performed better than employers with low employee engagement in profitability, customer ratings, turnover, safety incidents, productivity, and quality. Engagement includes feeling like someone at work cares about the employee as a person and having the materials needed to do work right.
… Are absent from work less and more productive when at work. For every dollar spent on worksite wellness programs, absentee day costs were reduced by $2.73, and medical costs were reduced by $3.27.9 Research on chronic conditions and productivity estimates that presenteeism causes 18-91 lost work days per year and absenteeism causes 1-10 lost work days per year. Presenteeism costs more than absenteeism and medical expenses combined.
… Enjoy their jobs more, reducing turnover costs. Employees who feel supported by their employers are more likely to want to keep their jobs and will help attract and retain the best employees for the business. A study by the World Economic Forum found that 64% of employees who reported that their workplaces were active promoters of health intended to stay with their companies at least five years. | <urn:uuid:b10d1c83-50f0-4f9a-9108-6655a33cd004> | CC-MAIN-2019-35 | http://www.riskmanagement365.com/tag/safety-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315865.44/warc/CC-MAIN-20190821085942-20190821111942-00447.warc.gz | en | 0.950343 | 1,465 | 3.140625 | 3 |
What is Seaweed?
Seaweed, in other words, is the name for all the species of marine plants and algae that grow in the ocean, rivers, lakes, and other water bodies.
WHAT IS SEAWEED GEL?
Seaweed Gel is manure extracted from Seaweed.
Why do you need Seaweed Gel?
We know that Urea helps Supply Plants with Nitrogen, DAP (Diammonium phosphate Fertilizer) helps supply plants with Macronutrients and Micronutrient Fertilizers help supply plants with – well, MICRONUTRIENTS. But Seaweed is a combination of Macronutrients, Micronutrients, Secondary Nutrients, and Plant Growth Hormones. Seaweed Gel made from Seaweed is an all in one combination of all Plant Nutrients and Hormones that any Crop/Plant requires. Our Seaweed Gel is the only product with all 3 Plant Growth Hormones that help your Plants in Flower formation, Root formation, and Stem formation.
Why should we use Seaweed in a Gel form and not in Powder form?
Seaweed Powder is made by using a lot of heat in the process. Due to the Heat used in the Process to make Seaweed Powder, the useful Bacteria dies. Thereby reducing the properties and benefits of Seaweed. Our Seaweed Gel is made without using heat, which results in Seaweed Pulp which contains a higher percentage of the five species of bacteria and 60-65% Organic Matter. This Seaweed Gel is then filtered where the fibrous particles are removed from the Seaweed Pulp, resulting in a 100% Water Soluble Seaweed Gel. Thus our Seaweed Gel is not only completely Organic but also 100% Water Soluble.
Since no useful bacteria is lost in the process of making Seaweed Gel, it increases the percentage of Azospirillum Bacteria (nitrogen-fixing bacteria) in the soil which will help to absorb Nitrogen from the atmosphere. This Azospirillum Bacteria thus results in an increase in the Nitrogen in soil, without using any chemical fertilizers like DAP/NPK/Urea.
How does Azospirillum Bacteria in our Seaweed Gel Help intake Atmosphere Nitrogen?
Let us understand this by an example. Ants are tiny insects that are present around us all the time – at our home, at our office, at our surroundings – but they are only visible to us when we leave food or sugar unattended. This is the same case with Atmosphere Nitrogen. Our Atmosphere is made up of 78% Nitrogen, 21% Oxygen and 1% other gases. So why does Soil still lack Nitrogen? Why do we need to use Synthetic Fertilizers or Chemicals to increase the percentage of Nitrogen in Soil?? This is because Atmospheric Nitrogen is in gaseous form and cannot be taken directly by the soil without undergoing a formation. Similarly, Azospirillum Bacteria (which is a nitrogen-fixing bacteria) if present in the soil, will naturally increase the intake of Atmospheric Nitrogen in Soil (just like how unattended food automatically attracts Ants). Our Seaweed Pulp which is extracted from the cold process results in an increase in Azospirillum Bacteria in the soil – as a result, the percentage of Nitrogen will increase in soil over time – resulting in a reduction in the use of Synthetic and Chemical Fertilizers.
Does the use of Seaweed gel immediately reduce the use of Synthetic Fertilizers?
The answer depends on whether you are looking for a short term temporary result or a Long Term Lasting result. Seaweed Gel is a slow and effective process – It does not give instant results like the chemical Fertilizers – but if used continuously for 2-3 years, the soil will be enriched with nutrients giving long term benefits and keeping your Agricultural Land Healthy. Seaweed Gel is not a Temporary Solution – it is a Permanent Solution. While Chemical Fertilizers may give immediate results, they leave Chemical Toxicity in the Soil – making our agricultural land Toxic. We have spent and are spending our time focusing on the plant and we forget to focus on the LAND – if the soil is enriched, our plants will automatically be healthy.
What is the ideal Soil Ph?
The Ideal Soil Ph is 6 to 6.5Ph. But due to the regular use of our agricultural land – the soil ph changes. Our Seaweed Gel also contains a bundle of Microorganisms along with Macronutrients, Micronutrients, Secondary Nutrients, and Plant Growth Hormones. These Micro-Organisms available in our Seaweed Gel acts as a buffer agent and help neutralize the ph of the soil – if the soil is alkaline, these microorganisms will balance it and bring it down to the ideal acidic level (6-6.5ph), and if the soil is too acidic – these microorganisms will again balance the soil ph and make it reach the ideal level 6-6.5.
How to know if your Soil is toxic or not?
Well, Did You know the Colour of the Healthy plant roots is supposed to be White? If your plants have Light brown Roots, then your soil is less Toxic in nature. If your plants have Dark brown Roots, then your soil is More Toxic in nature. If your plants have Black Roots, then your soil is completely Toxic in nature. White Plant Roots indicate Healthy Soil.
Does Our Seaweed Gel help reduce Toxicity in your Agricultural Land?
Absolutely! Our Seaweed Gel is 100% Organic and contains Natural Micro Nutrients, Macro Nutrients, Secondary Nutrients, Plant Growth Hormones, Micro-Organisms and 5 species of Bacteria. Additionally, it is 100% Water Soluble and in the form of Pulp – which makes it easy to dissolve in the soil.
For More Details Visit:- https://www.shamrockoverseas.com/gold-gel.php
You can also order via WhatsApp- https://bit.ly/39rtUoG | <urn:uuid:1f64ab52-b895-427a-9b45-81940852b5b7> | CC-MAIN-2021-10 | https://shamrockoverseas.com/blog/unbelievable-facts-about-seaweed-gel/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178350706.6/warc/CC-MAIN-20210225012257-20210225042257-00098.warc.gz | en | 0.916514 | 1,305 | 3.25 | 3 |
why does magnetic fied exerts no charge on a stationary charge
Asked by umanggarg | 12th Jan, 2010, 09:03: PM
Because it's a experimental fact.
Magnetic field is produced by moving charges, and they feel the magnetic force.
Answered by | 12th Jan, 2010, 09:59: PM
Kindly Sign up for a personalised experience
- Ask Study Doubts
- Sample Papers
- Past Year Papers
- Textbook Solutions
Verify mobile number
Enter the OTP sent to your number | <urn:uuid:73a8e383-ef47-4806-a635-581212ef6f80> | CC-MAIN-2021-21 | https://www.topperlearning.com/answer/why-does-magnetic-fied-exerts-no-charge-on-a-stationary-charge/iijn4bss | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989030.87/warc/CC-MAIN-20210510033850-20210510063850-00002.warc.gz | en | 0.868193 | 119 | 2.828125 | 3 |
Jaime Hernandez: The assassination of former President John F. Kennedy took place on November 22, 1963 and many grieving individuals wanted to commemorate the late President. Shortly thereafter, it was decided that Kennedy’s portrait would be placed on a U.S. coin.
Initially, Kennedy’s portrait was going to be placed on a U.S. quarter. However, Mrs. Kennedy requested for George Washington’s portrait to remain on the quarter dollar instead of her late husbands. The second best choice was the Half Dollar coin. At the time, the Franklin Half Dollar coins were still being issued and the current law required that a coins design should remain on a circulating coin for at least 25 years before it can be changed.
Consequently, Congress had to act quickly and change the law for the Half Dollar coins. In the end, the Kennedy Half Dollar was approved, therefore, ending the Franklin Half Dollar series at least four years earlier than expected. By February 1964, the Philadelphia Mint struck its first Kennedy Half Dollars for circulation while the Denver Mint had already struck them just a week earlier. | <urn:uuid:5b485ef9-689b-4286-9a1d-8f00bcb1b715> | CC-MAIN-2017-04 | http://www.pcgs.com/setregistry/CoinFacts.aspx?i=45949 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00211-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.976168 | 224 | 3.40625 | 3 |
If we know of or can create a good model of the blurring function
that corrupted an image, the quickest and easiest way to restore that is
by inverse filtering. Unfortunately, since the inverse filter is a form
of high pass filer, inverse filtering responds very badly to any noise
that is present in the image because noise tends to be high frequency.
In this section, we explore two methods of inverse filtering - a
thresholding method and an iterative method.
Method 1: Thresholding
We can model a blurred image by
where f is the original image, b is some kind of a low pass
filter and g is our blurred image. So to get back the original
image, we would just have to convolve our blurred function with some kind
of a high pass filter
But how do we find h? If we take the DFT of b so that
B=DFT2(b), we would get something that looks like this
In the ideal case, we would just invert all the elements of B to
get a high pass filter. However, notice that a lot of the elements in
B have values either at zero or very close to it. Inverting these
elements would give us either infinities or some extremely high values.
In order to avoid these values, we will need to set some sort of a
threshold on the inverted element. So instead of making a full inverse
out of B, we can an "almost" full inverse by
So the higher we set , the closer H
is to the full inverse filter.
Implementation and Results
Since Matlab does not deal well with infinity, we had to threshold
B before we took the inverse. So we did the following:
where n is essentially and is set
arbitrarily close to zero for noiseless cases. The following images shows
our results for n=0.0001.
We see that the image is almost exactly like the original. The MSE
Because an inverse filter is a high pass filter, it does not perform
well in the presence of noise. There is a definite tradeoff between
de-blurring and de-noising. In the following image, the blurred image is
corrupted by AWGN with variance 10. n=0.2.
The MSE for the restored image is 1964.5. We can see that the sharpness
of the edges improved but we also have a lot of noise specs in the image.
We can get rid of more specs (thereby getting a smoother image) by
increasing n. In general, the more noise we have in the image, the
higher we set n. The higher the n, the less high pass the
filter is, which means that it amplifies noise less. It also means,
however, that the edges will not be as sharp as they could be.
Method 2: Iterative Procedure
The idea behind the iterative procedure is to make some initial guess
of f based on g and to update that guess after every
iteration. The procedure is
where is an initial guess based on
g. If our is a good guess,
eventually convolved with b will be
close to g. When that happens the second term in the
equation will disappear and
converge. is our convergence factor and it
lets us determine how fast and
If we take both of the above equations to the frequency domain, we
Solving for recursively, we get
So if goes to zero as k goes to
infinity, we would get the result as obtained by the inverse filter. In
general, this method will not give the exact same results as inverse
filtering, but can be less sensitive to noise in some cases.
Implementation and Results
The first thing we have to do is pick a
satisfy the following
and thus will be a positive integer in the range of 0 to 1. The bigger
is, the faster
converge. However, picking too large a may
also make and diverge instead of converge. Imagine that we're
walking along a path and the end of the path is a cliff. is the size of of the steps we take. We want
to go to the edge of the path as fast as possible without falling off.
Taking large steps will ensure that we will get there fast but we'd
probably first. Taking small will ensure that we get there without
falling off but it could take an infinite amount of time. So the
compromise would be to take big steps at the start and decrease our step
size as we get close to our destination.
The following is the noiseless image after 150 iterations.
starts off at 0.1 and decreases by 10%
every 25 iterations.
The MSE is 364.6897. The image is sharper than the blurred image although
the MSE is high. But the image restored using the direct inverse filter
is much better.
The following is the blurred image corrupted with AWGN with a
variance of 10. The number of iterations is 150.
The MSE for the restored image is 1247.3. We see the same noise specs as
we had seen with the inverse filter. But the image is in general better
than the the noisy image restored using the inverse filtering method and
has a lower MSE. So we can conclude that the direct inverse filtering
method is better for a noiseless case and the iterative method is better
when noise is present.
Follow the links below to view the matlab code: | <urn:uuid:78771c1d-cdb1-4cb6-822b-9665f3641b5e> | CC-MAIN-2016-18 | http://www.owlnet.rice.edu/~elec539/Projects99/BACH/proj2/inverse.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861754936.62/warc/CC-MAIN-20160428164234-00191-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.931928 | 1,175 | 3.078125 | 3 |
Have you ever asked yourself, “Why do dogs sweat?” This is not an unusual thought since you never see sweat pouring down a dog’s face or under its armpits when the weather is hot and humid.
Dogs have a different way of regulating their body temperature than do humans. Dogs will sweat through their foot pads and also release heat by panting. They are not able to release body heat as efficiently as humans do because we release body heat by sweating through our skin.
If your dog pants excessively on a hot day it’s because it feels warm and needs to relieve some of its body heat. By panting, a dog sends cool air over its tongue and deep into the lungs which alleviates some of the heat.
It may surprise you, but dogs do have sweat glands. Their sweat glands are divided into two groups: Merocrine glands are located in a dog’s foot pads and are activated when the dog is warm; apocrine glands are considered to be sweat glands and they are located all over a dog’s body. The apocrine glands don’t actually release sweat, but secrete pheromones used as a means of communication between dogs.
Dogs sweat when they are unable to effectively rid themselves of excessive heat and the internal body temperature begins to rise. When the dog’s temperature reaches 106°, damage to the body’s cellular system and organs may become irreversible. Many dogs die from heat stroke when it could have been prevented.
Since dogs don’t have complex means to eliminate sweat and body heat, they can suffer from heat stroke on very hot days; or if you leave them in a car, even if the windows are partway down. Especially avoid leaving your dog outdoors during times of extreme heat. If you must keep your dog outdoors make sure it has a shaded area where it can cool off and be sure it has plenty of cool water to drink to help it maintain a normal body temperature.
Signs of a heat stroke include: excessive panting, unconsciousness, sudden collapse, increased rectal temperature (over 104° requires action, over 106° is a dire emergency), seizures, lying down and unwilling or unable to get up, dizziness or disorientation, or in the worst case, a coma.
If you suspect your dog is suffering from heat stroke you need to take immediate action. Start by moving your dog out of the heat and away from the sun. Begin placing cool, wet rags or washcloths on its body, especially the foot pads and around the head.
Do not use ice water or very cold water. Extreme cold may cause the dog’s blood vessels to constrict and prevent its body’s from cooling. This can cause its internal temperature to rise. Overcooling can also cause hypothermia.
When the dog’s body temperature reaches 103°, stop cooling. You should give your dog cool water, but do not force water into its mouth.
Now you know why dogs sweat and what to do if your pet begins showing signs of heat stroke. | <urn:uuid:eeea2cf2-f021-4808-bbbf-ceead7ca6078> | CC-MAIN-2023-14 | https://www.dogshealth.com/tag/dogs-sweat-glands/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00726.warc.gz | en | 0.955528 | 642 | 3.53125 | 4 |
Epic genetic: the hidden story of wheat
Globally, wheat, together with maize and rice, provides the most human nutrition. It can thrive in a whole range of different environments, even within a similar geographical region.
Exploring one hundred different wheat lines worldwide, the research team led by the Earlham Institute in collaboration with Helmholtz Zentrum München, University of Liverpool and the John Innes Centre have revealed a trove of epigenetic variation that was previously unknown to current genotyping methods.
The new findings link crop evolution and phenotypic change to agricultural conditions – allowing us to protect future yields with a climate resistant armour through new breeding methods – contributing to the success of this global crop as well as significant implications for the wheat community.
With DNA, it's not always about the sequence of As, Ts, Gs and Cs. Although they contain the vital code that lets us make proteins, there are many other aspects to a genome than just the gene sequences.
One aspect is epigenetics – changes in how genes are expressed. Extra to the DNA sequence, the individual letters might come attached with a 'methyl group'. Methylation is very important because it means that genes can be turned off, or the way DNA is stored can change, changing the way genetic information is read.
This is important because these changes can happen due to the environment, but are still inherited. This means, in certain conditions, if an epigenetic change happens that is beneficial, this can be passed on to the next generation.
The research team found geographical patterns in these epigenetic changes between the 100 landraces of wheat studied, which suggests that these changes have arisen due to environmental conditions in those local areas.
This is exciting because it means that breeders have a hidden tool up their wheat sleeve. Currently, it's all about SNPs – single changes in a DNA sequence that have an effect on disease or environmental resistance, for example. Now, even if the DNA sequence is the same, there might be subtle changes at the epigenetic level that we can use to improve how plants respond to local conditions.
Essentially, there are more tools to enable farmers to keep on growing the best possible crop for their local environment.
Group Leader Professor Anthony Hall at the Earlham institute, says: "We are very proud of our groundbreaking piece of fundamental work indicating that DNA methylation offers a broad and stable source of variation for wheat breeders.
"Our next step is to translate this fundamental work on DNA methylation to a technology that is transformative, relevant and accessible to wheat breeders for the development of new cultivars."
Dr Laura-Jayne Gardiner, Senior Postdoctoral Scientist, added: "What is really neat is, even though we are working with a hugely complex genome which is five times the size of the human genome, we're able to translate this discovery into a tool for breeders in likely to be just a few years. As a scientist, it's incredibly exciting that your research could have such an immediate impact."
Funded by ERA-CAPS, the ERA-Net for Coordinating Action in Plant Sciences, BBSRC, DFG and NSF, this research builds on Earlham Institute's previous epigenetic work on Chinese Spring wheat (Clavijo et al., Genome Research, 2017) using the advances in wheat genomic resources, as well as in preparation for the International Wheat Genome Sequencing Consortium. | <urn:uuid:fc9a402e-e4a7-4c06-a604-ddf3d7a21fe4> | CC-MAIN-2018-47 | https://scienmag.com/epic-genetic-the-hidden-story-of-wheat/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746205.96/warc/CC-MAIN-20181122101520-20181122123520-00528.warc.gz | en | 0.932598 | 707 | 3.375 | 3 |
By now almost everyone knows that the U.S. has fallen badly behind other advanced nations in the kind of health care and education it delivers to its citizens. We spend twice as much per capita than most other countries on health care and don’t get better outcomes as a result. We also spend twice as much per full-time equivalent student on higher education than other OECD countries, and 38 percent more on elementary and secondary education with disappointing results in terms of what students know at the end of the process, according to international assessments of learning.
What has been less recognized are some of the similarities between these two sectors that help to explain why they are not performing better. These include 1) fee for service instead of pay for performance, 2) low productivity, 3) third-party payment, and 4) entrenched institutional and professional interests that mitigate against change.
Some have advocated a pure market-based approach to each. In my view, although some greater market pressure might help, these solutions are neither realistic nor without their own flaws. These are both sectors where consumers are too poorly informed and societal costs and benefits too great to leave decision-making entirely in the hands of individuals. Moreover, health and education are arguably goods that should be available to everyone in a rich country with a commitment to equal opportunity. That said, there is no reason that well-regulated access to each needs to be so expensive.
In both sectors, providers are paid based on what they deliver and not on the outcomes they produce. In education, teachers and professors are paid based on hours spent in the classroom and not based on what their students learn and in health care, providers are paid based on treatments prescribed and not on whether patients get well. The good news is that in both sectors there is an ongoing effort to link pay more closely to outcomes achieved, whether in accountable care organizations or in new ways of paying teachers based on the learning gains achieved by their students.
In addition, both sectors are labor intensive and have been largely by-passed by the technological and organizational advances that have made manufacturing, retail trade, and other sectors of American society so productive. Put differently, both sectors have been plagued by what economists call “the cost disease” – steadily rising costs necessitated by the failure of productivity in these sectors to advance as rapidly as in other sectors of the economy. The response to the cost disease must be to find cost-reducing technological solutions such as the use of generic drugs or para-professionals in health care and online learning in education.
The problem of rising costs is exacerbated by the fact that consumers are largely unaware of how much their education or health care is costing and thus less likely to shop wisely. Much of the problem is related to asymmetries of information — the fact that consumers are much less well-informed than the experts or those providing services, but some of it is related to the fact that consumers are insulated from the costs by government subsidies or insurance policies that pay for much or all of what they consume.
Another reason it is so difficult to improve these two sectors is the power of existing institutions and the people who work in them to retain the status quo. Whether it is public school teachers fighting new compensation schemes tied to performance or university professors resisting the replacement of lectures with online courses or doctors preventing nurses from providing more patient care or pharmaceutical companies trying to maintain high profits with marginally better new drugs, the consumer is the ultimate loser.
Another reason for the status quo is the dedication to maintaining access to both education and health care even when that access raises costs without actually helping its intended beneficiaries. Community colleges have provided broad access to higher education but 70 percent of students in this system fail to get a degree, a certificate, or transfer to a four-year institution within six years. Medicaid and Medicare have provided access to health care for millions of low-income and elderly households, but too many of them are receiving treatments with little or no evidence of effectiveness or are making lifestyle choices inconsistent with good health. Access to both higher education and to subsidized health care should be preserved or even expanded but it may be time to consider new ways of conditioning that access on individual behavior. Students don’t learn unless they are engaged in the process and patients don’t get well unless they comply with a treatment plan.
These two sectors now represent one quarter of the economy. Other advanced nations spend less and get more for their money. It is time for both voters and their elected representatives to recognize that without the kind of innovation that has made other sectors strong, the United States is doomed to become a second class nation. Health care and education are vital not only to the well-being of individuals but also to the strength of the nation. A little creative destruction in these two sectors might serve us well. | <urn:uuid:cb994774-db91-4369-a855-dce3d77c5d3c> | CC-MAIN-2020-05 | https://www.brookings.edu/opinions/americas-two-most-troubled-sectors-health-and-education/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251694908.82/warc/CC-MAIN-20200127051112-20200127081112-00011.warc.gz | en | 0.970894 | 972 | 2.65625 | 3 |
Japan’s trademark system has a lot in common with trademark-related practices in other countries. It aims to define what the trademark is and how can any given trademark, patent, utility model, or industrial design be legally protected from infringements. In this introductory guide, we take a closer look at why it is important to register your trademark, patent, utility model, or industrial design in Japan and what features one needs to pay attention to.
This is the first and probably one of the most important things to know about the trademarks in Japan. In accordance with the Trademark Law of Japan both the citizens of Japan and foreign residents are equal before this law and none of them will get a preferential treatment. Thus, everybody has the same right, obligations and are subject to the same protection from the Japan Patent Office. In such a way Japan hopes to encourage foreign direct investment in Japan’s industries.
Why is trademark registration in Japan important?
It is important that the registration of your trademark is legally recognized in Japan in order to get the protection of Japanese authorities in cases of infringement. During the registration process the Paten Organisation will examine the aspects of the trademark mentioned below. Once these aspects are recognized by the authorities your trademark is under the protection of numerous Japanese laws.
The use of a trademark
Unlike in some other countries, the use of the trademark does not automatically mean that the trademark is protected by the law as someone’s property or as a result of someone’s intellectual and creative work. In practice, it means that even if you have developed a logo and attached it to your products but did not register it, anyone else can use your trademark and there is almost nothing one can do to retrieve the trademark or claim one’s rights along with the intellectual property. If you do not register your trademark, you robbing yourself off legal protection against trademark theft or infringement.
There a very few exceptions to this rule, which are discussed in our trademark legislation guide.
The degree of similarity between trademarks is very important in Japan. But to sum up, such minor differences as a slight variation in a color tone or a different spelling with a one letter difference are not enough to claim the uniqueness of the trademark. For example, you cannot register a trademark “Abidas” since it is easily confused with the leading sportswear company name, etc.
The rules for defining the trademark uniqueness are discussed in the following sections of this guide.
In accordance with the trademark registration laws in Japan, the applications process follows the “first come, first served” rule. In other words, even if you original trademark was not used by any other brand in its original design, some other business can still use your trademark as an inspiration for their own. If such an altered design based on your original has been registered before you registered yours, technically you are second in the line.
If the Japan Patent Office rules out that two trademarks are to close to each other leading to confusion among the customers, the second-in-line application can be rejected due to the lack of uniqueness as was explained above.
Classification of trademarks
There are several ways to define a trademark and categorize the existing trademarks. Initially, trademarks used to be purely visual. The majority of trademark today are still following this tradition and brands quite often choose to have a logo (a sign, a symbol, a pictogram, a picture, etc.). However, the development of technologies and advertising methods widened the possibilities of trademark creation.
Moreover, a trademark can be associated with a single company, person, product or service as well as with their groups. Thus, the definition of the trademark became somewhat blurred. Some of the ways to classify trademark are shown below.
This system refers to visual logotypes and divides trademarks into groups based on the type of the visual elements it contains. Under Japanese Trademark Law, trademarks are categorized as follows:
- Consisting of characters. For example, names of the companies written in Japanese characters called kanji, Latin or Cyrillic alphabetic letters, etc., such as “Sony” or “Toshiba”.
- Consisting of symbols or devices. For example, Nike swoosh or Mitsubishi 3 diamond-shaped symbols.
- Consisting of character and symbols/devices. For example, the Starbucks logo that has both a picture and a word “Starbucks” written under it.
- Three-Dimensional trademarks (not to be confused with the industrial design). For example, Toblerone triangle chocolates and its packing or Coca-Cola bottles.
The “new-type” trademarks
A “New-type trademark” was previously not in the scope of trademark protections because they differ from the standard practices. However, nowadays almost anything that a human can perceive through the five senses and use this information to identify the brand can become a trademark. In 2015, these types of trademarks came under legal protection because the number of companies using new-type devices grew fast and they all were attempting to apply for registration.
It is now possible to register the following items:
- Sound marks. For example, McDonalds’ “I’m loving it”, Super Mario Bros. coin sound effect by Nintendo, or Metro Goldwyn Mayer’s lion roar.
- Color per se marks without delineated contours. For example, Tiffany Blue or Milka lilac
- Motion marks. For example, Lamborghini’s upwards opening doors Microsoft Windows animation at the startup.
- Position marks that are defined by the exact place on the product where the logo is located. For example, three stripes on the side for sportswear by Adidas.
- Hologram trademarks already. This is already a widespread practice and they are under broad international protection. For example,
Protection of trademarks about retailers, etc.
Under the 2006 revision of the Trademark Law, “Retail services, etc.” are now accepted as designated services in order to protect the names of retail and wholesale stores as well as mail-order businesses, including online stores.
Collective Trademark Registration is a system that was included in the 1996 revision of the law. It allows the registration of trademarks by business associations or groups to allow all group members to use the trademarks. The goal is to protect the unique brands and names of the associations to rejuvenate regional economies as well as specific industries.
The Regional Collective Trademark system was introduced in 2005 by legal amendment “to protect and strengthen regional brands.” This allows the registration of marks consisting of a regional and generic name for a product or service per meeting certain requirements.
A Collective Trademark application by the Society of Commerce and Industry, the Chamber of Commerce and Industry and NPO Corporation was formerly not accepted. However, according to a 2014 revision of the Law in 2014 now allows collective applications to be accepted by these agencies.
The uniqueness criteria
The uniqueness criteria depend on the type of trademark the company is using. The rule of a thumb is that regardless of the trademark type it should be easily recognizable among other trademarks of a similar nature for people with average attention characteristics. It refers to all aspects of human perception and information processing. But most often one can talk about the uniqueness of trademarks’ sound (pronunciation), appearance, and meaning.
This refers to the trademarked sounds as well as the pronunciation of any words or characters used. To avoid confusion in language translations, it is preferred that trademarks in Japan have Japanese kana characters showing how to pronounce trademarks consisting of words in foreign languages other than English.
This refers to the meaning inferred from the trademark, such as imagery conjured by text or sound. In situations with foreign languages, it is possible that trademarks will not readily call a certain image to mind if the person who sees or hears the trademark does not understand its original language. For example “Swan Lake” written in German or Spanish may not prompt the image of the white swan if a consumer does not speak German or Spanish. In these circumstances, it may be better to obtain separate trademark protection that includes a Japanese translation of the original foreign-language phrase.
Trademarks with characters that Japanese people are unable to recognize as written characters or letters are treated as trademarks consisting of devices. For example, the titles written in a different writing system, say Korean Hangul or Indian Devanagari, sometimes may not be identified as an actual language or writing by people who see this script for the first time in their life.
In such a situation, consumers may see an “abracadabra” and the owner will not reap any benefits that a trademark consisting of written characters may have. One solution to this problem is to apply for a separate trademark registration including a Japanese translation or Japanese characters indicating how to pronounce the foreign language phrase.
Nowadays a wide variety of devices can be trademarked to appeal to multiple human senses in order to make sure that consumers can easily recognize a certain business, product, or services among competitors. For example static and moving visual elements, sounds, colors, etc.
Whichever option you may prefer it is important that your trademark is properly registered and will be legally recognized by the Japanese authorities to guarantee the protection of your trademark from forgery, infringement, theft and many other illegal actions that can undermine the reputation of your business.
Remember that both Japanese nationals and foreign residents are equal before the Law in Japan and none of them can get a preferential treatment regardless of the situation.
Trademark system FAQ
What laws regulate trademark-related issues in Japan?
The full list with explanations about the application of specific laws can be found in our Trademark Legislation Guide.
Can I use a combination of features to make a trademark?
Yes, you can. Your trademark can appeal to one or multiple senses. You can combine motion and sound for example. During the registration process all aspects of your trademark will be described in details to include all of its aspects.
How do I know if my idea for a trademark is unique and new?
The Japan Patent Office archives all the registered trademarks in the Industrial Property Digital Library. Once you have an idea of what your trademark could be, your preliminary idea can be compared to existing ones. Thus, you will know if your design is original enough not to be rejected during the application process itself.
When does a trademark fall under the legislative protection from infringement?
Your trademark is protected from the moment it has been officially registered with the authorities. In Japan, it is not enough to use (apply) the trademark to activate its protection. This is an important difference between Japan and many other countries when it comes to the protection of the trademarks and intellectual property.
What does the "use" of trademark mean?
Usually, the use of a trademark means that the trademark was applied in one way or another to advertise the business or raise brand awareness. One can place a trademark on a product, its package, use it in a printed advertisement or on an internet page.
How often do I have to use the trademark?
Once in 3 years is enough to keep the trademark in registers. More details on the validity of trademarks and its dependence on the frequency of use can be found in our trademark registration guide. | <urn:uuid:fa4e7fc5-34f5-436b-b9a5-8232564524b0> | CC-MAIN-2019-39 | https://www.smejapan.com/japan-business-guides/japanese-patent-trademark-registration/japans-trademark-system/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572517.50/warc/CC-MAIN-20190916100041-20190916122041-00313.warc.gz | en | 0.93016 | 2,318 | 2.515625 | 3 |
Bivalvia | Arcida
Environment: milieu / climate zone / depth range / distribution range
Benthic; depth range 0 - 80 m (Ref. 348). Tropical
Indo-Pacific: from East and South Africa including Madagascar and the Red Sea, to eastern Polynesia; north to Japan and south to New Caledonia.
Length at first maturity / Size / Weight / Age
Maturity: Lm ? range ? - ? cm Max length : 7.0 cm TL male/unsexed; (Ref. 348); common length : 4.0 cm TL male/unsexed; (Ref. 348)
Byssally attached to rocks, corals, or under boulders on sand, from low tide pools to a depth of 80 m (Ref. 2922); also seen adjacent to fringing mangroves (Ref. 2925).
Life cycle and mating behavior
Maturity | Reproduction | Spawning | Eggs | Fecundity | Larvae
Members of the class Bivalvia are mostly gonochoric, some are protandric hermaphrodites. Life cycle: Embryos develop into free-swimming trocophore larvae, succeeded by the bivalve veliger, resembling a miniature clam.
Poutiers, J.M. 1998. (Ref. 348)
IUCN Red List Status (Ref. 124695)
CITES status (Ref. 108899)
Threat to humans
| FishSource |
Estimates of some properties based on models
): 22.7 - 29.1, mean 28 (based on 1766 cells).
Low vulnerability (10 of 100) | <urn:uuid:5a2d345d-c7f9-456b-9b52-adf88452c0b8> | CC-MAIN-2022-33 | https://www.sealifebase.ca/summary/Arca-avellana.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572898.29/warc/CC-MAIN-20220817092402-20220817122402-00408.warc.gz | en | 0.775719 | 431 | 2.984375 | 3 |
Procedural C++ (MS V. Studio)
by Dr Jan Pajak
This Web page allows to look at solutions (i.e. at programs) for various programming
problems that I utilise in my teaching of C++ programming language. In order to run
or to download any of these solutions, simply click on
the underlined part of the description of this solution!
- For further instructions see the end of this Web page.
- Click the button BACK (from the browser) to return to the previous Web page.
The last update of the Web page on:
22 June 2003.
Part A. Course notes for the subject coded PR25n (i.e. PR250). It uses the Microsoft Visual Studio 6.0 C++:
PR25n - e.g. PP250 (i.e. procedural programming in C++ based on the Microsoft Visual Studio 6.0)
This course is designed to provide a basic programming skills in Microsoft-based procedural C++.
Exercise 1 (Typing in, compiling, and running your first C++ program. Keyboard input and screen output statements).
Exercise 2 (Date and time in C++; system commands, string functions and their parameters).
Exercise 3 (Selection and iteration statements in C++).
Exercise 4 (Sequential file handling in C++: .open, .getline, .write, .close functions; backups).
Exercise 5 (Modular programming in C++: functions and menu program).
Exercise 6 (Bubble Sort).
Exercise 7 (Array handling and strings handling in C++).
Exercise 8 (Arithmetic operations in C++).
Assignment 1 for C++. (PR250).
Assignment 1 marking schedule .
Sample problems for final test from PP C++. (PR250)
Part B. Solutions of problems for the subject coded PR25n (e.g. PR250). These solutions
are programmed with Microsoft Visual Studio 6.0 C++:
Leap.cpp: Finding whether a given year is a leap year (source code in C++).
Leap.exe: Finding whetther a given year is a leap year (executable program in C++).
Age.cpp: Determining the age of the user (source code in C++).
Age.exe: Determining the age of the user (executable program in C++).
When.cpp: Determining a next date a number of days apart from today (source code in C++).
When.exe: Determining a next date a number of days apart from tooday (executable program in C++).
Part C. Examples of problems for the subject PR25n (e.g. for PR250).
These problems are solved above with Visual Studio 6.0:
Text of sample problems for PP C++ programming (MS *.doc format).
Text of Assignment 1 for C++ programming (MS *.doc format).
Part D. Solutions for the subject coded PR21n (e.g. PR211). These solutions are programmed
with Borland C++ Builder 5:
Part D. Examples of problems for the subject PR21n (e.g. for PR211). These
problems are solved above with Borland C++ Builder 5. Please notice their unique attribute,
namely that they all are to be marked by students themselves:
Assignment PP1 for PP C++. (PR211).
Assignment PP2 for PP C++. (PR211).
Assignment PP3 for PP C++. (PR211).
Assignment PP4 for PP C++. (PR211).
Assignment PP5 for PP C++. (PR211).
Part E. Instructions on how to use this Web page:
(1) Each C++ program is provided here in two versions, namely (a) as a source code (*.cpp),
which is prepered respectively either in the Microsoft Visual Studio 6 C++ or in Borland C++
Builder 5, and (b) as an executable version of a given C++ program (*.exe).
Each one of these parts needs to be downloaded separately.
(2) In order to download to your computer any of these two versions (*.cpp
or/and *.exe) of a given C++ solution click on this version,
and then follow the instructions that appear in the downloading window.
(3) To return to this Web page, click on the Back
button on the tool palette of your browser.
(4) Some solutions are compressed into standard zip
files. Therefore, you need to unzip them first before they are executed or compiled.
(5) If you wish to see any other related Web pages see the Favorite Links Page
(e.g. the so-called "Blue Book" with prescriptions for PR25n and PR21n courses addressed
here, are available at the Web page
(6) Address for correspondence (June 2003): Dr Jan Pajak, P.O. Box 33250, Petone 6340, New Zealand.
Note that "self-paste" type exercises, which prepare students for solving these programming problems,
are outlined in lecture notes (Exercises 1 to 8 for PP C++ programming). | <urn:uuid:41271068-5822-4f81-93c1-1c0d769786fe> | CC-MAIN-2017-30 | http://pajak.20fr.com/cpp_so.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424645.77/warc/CC-MAIN-20170724002355-20170724022355-00001.warc.gz | en | 0.780264 | 1,117 | 2.640625 | 3 |
Tudor-style houses may feature decorative half-timbering and steep pitches on their roofs. Roofs may also feature cross gables, and windows are often tall and narrow with small panes. If a Tudor-style house has an open fireplace, it may have a large chimney that is topped with a decorative chimney pot. The home's doorways may also feature decorations and embellishments.Continue Reading
Tudor-style homes can be large or small, with some smaller cottage-style houses bearing fake thatched roofs. Larger Tudor homes often feature more decorative elements such as parapets and decorative stonework. The decorative timberwork on the houses' outside is one of the style's striking features and is achieved by filling in a wooden framework with stucco or similar materials.
The name "Tudor" refers to the dynasty that ruled England during the 1500s, but in the United States architectural sense, it refers to homes that take their influence from that period. Tudor-style homes were most popular from around 1890 to 1940, when architects from Europe travelled to the United States and brought their Old World influences with them.
The Tudor style remained popular until World War 2, when the wartime patriotism ushered in the more American Colonial Revival period. The style's drawbacks include the fact that it was expensive to build and was prone to maintenance issues.Learn more about Architecture | <urn:uuid:7c97ceb7-bd5e-4de2-b03d-41913e2f5470> | CC-MAIN-2017-13 | https://www.reference.com/art-literature/features-tudor-style-home-d2384a39a6abfe12 | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191984.96/warc/CC-MAIN-20170322212951-00307-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.968523 | 288 | 3.203125 | 3 |
Birds and Bats Need More Protection from Wind Power
The benefits of wind power are substantial. Although the impact of wind turbines on birds and bats is minimal, relatively speaking, these risks can be further reduced by strategically locating the turbines away from sensitive locations. The ECO is pleased that the Ministry of Natural Resources’ (MNR) recently released guidelines give special consideration to the potential negative effects of wind turbines on birds, bats and their habitats. However, the ECO is troubled by the gaps in these guidelines that leave some birds and bats vulnerable. Click here for more information, or to download a high-resolution map.
Ontario Needs to Better Prepare for Increased Dry Spells and Droughts
Ontario is not immune to the threat of drought. Severe low water conditions can cause significant social and economic stress for farmers, businesses and residents, as well as affect aquatic ecosystems. Following a dry summer, the Ministry of Natural Resources published an updated Ontario Low Water Response Plan to improve the province’s low water response process. While these amendments made modest improvements, the ECO is concerned that the heavy reliance on voluntary measures and the prohibitive hurdles to obtain a Level III declaration (highest drought alert level) both remain. Moreover, the ECO found that while some aspects of MOE’s permit to take water (PTTW) process have improved, the ministry continues to fail to deliver on numerous core commitments including having regard to ecosystem needs and cumulative impacts in decision making, and promoting water conservation and transparency in the PTTW issuing system. Click here for more information, or to download a high-resolution map.
Government has “Nothing To Report” from Required Wildlife Monitoring Program after 18 Years
Commercial timber harvesting occurs on over 270,000 square kilometres of publicly-owned Crown forests. The Provincial Wildlife Population Monitoring Program was established to monitor the status of forest wildlife populations, in order to inform Ministry of Natural Resources (MNR) forestry policy. The ECO concludes that MNR’s wildlife monitoring program is in a state of abject failure: no consistent list of species has been monitored, and very limited long-term trend information has been collected. After 18 years, the program has failed to achieve its objectives – MNR still has nothing to report. Click to read more.
A Terrible Waste – the Environmental Costs of Throwing Our Food Away
We may feel guilty for social and economic reasons when we throw away uneaten food. But very few of us consider the environmental costs of tossing that bruised banana. Statistics Canada estimated that, in 2007, Canadians wasted the equivalent of 183 kilograms of food per person. Another study estimated that 40 per cent of food produced in Canada each year – valued at a staggering $27 billion – is not consumed. As a result, valuable resources that went into the production, packaging, transportation and storage of disposed food have been squandered. The ECO believes the province has a role to play in providing consumers with the knowledge, tools and incentives to reduce food waste.
The Province’s Forgotten Fauna: Marine Mammals in Ontario
Some Ontarians may be surprised to learn that Ontario has more than a thousand kilometres of marine coastline. The shores of Hudson Bay and James Bay host a variety of marine mammals, including polar bears, seals, walruses and whales. Though living far from the public eye, these animals comprise an important part of Ontario’s biodiversity. Unfortunately, these marine mammals face numerous threats, including a warming climate. Ontario has a responsibility to safeguard these mammals by addressing threats under its control including habitat loss and hunting.
Protecting Algonquin’s Brook Trout from Commercial Timber Harvesting
Brook trout (Salvelinus fontinalis) is a freshwater fish native to Ontario. Algonquin Provincial Park holds the highest concentration of natural brook trout lakes in the world. In 2011, two applicants requested that the Ministry of Natural Resources (MNR) review Algonquin Park’s forest management policies, asserting the need for more stringent rules for commercial timber harvesting in the park. The ECO strongly urges MNR to undertake a comprehensive public review of its policy to allow logging in Algonquin – the only protected area in Ontario that permits commercial timber harvesting. In addition, the ministry needs to evaluate the effects of forestry and aggregate extraction practices on the park’s brook trout populations. | <urn:uuid:e9dedf39-31c7-4ed9-b391-df7a1a3fedbb> | CC-MAIN-2013-20 | http://www.eco.on.ca/blog/2012/10/02/2011-12-annual-report/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382705/warc/CC-MAIN-20130516092622-00029-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.929799 | 887 | 2.859375 | 3 |
Duration: 2 days
Recommended Class Size: 10 to 20
Prerequisites: Basic to Advanced OOP understanding
Frameworks are reusable designs for an application or a subsystem expressed as a set of classes and the way that instances of these classes collaborate. A framework describes not only how to partition the responsibilities of a system among its components, but also how to think about a problem. It is therefore not only a way to reuse code, but a way to reuse design and analysis information, as well.
Frameworks are difficult to design because they are abstract. Framework designers must look at many concrete applications to ensure that the abstractions that they are designing make sense. Frameworks are difficult to learn because the user of a framework must adopt the collaborative model of the framework. It is usually not possible to learn a framework one class at a time, but instead several classes have to be learned together. Nevertheless, there is a great advantage to learning a well-designed framework, and mature frameworks (like some of the user interface frameworks) can provide order of magnitude increases in programmer productivity.
- Describes what frameworks are, how to use them, and their importance
- Teaches how to design and document frameworks
- Shows how patterns can make the design process more efficient
- Discuss the evolutionary process of frameworks
- Discuss the Do’s and Don’ts of framework development | <urn:uuid:5ed96922-4dd6-4142-ae4a-c7f5f99d05d7> | CC-MAIN-2021-39 | https://refactory.com/frameworks/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057417.10/warc/CC-MAIN-20210923044248-20210923074248-00709.warc.gz | en | 0.92359 | 276 | 3.78125 | 4 |
Introduction to the Environment Rating Scales, Supporting Programs Participating in YoungStar-online
May 12, 2021 - 12:00 am
Introduction to the Environment Rating Scales, Supporting Programs Participating in YoungStar – ONLINE
May 12 – May 18 (complete at your own pace)
This five-hour course will provide you with an introduction to the Environment Rating Scales, referred to as ERS tools. The ERS tools provide an overall picture of the environment that has been created for the children and adults who share an early childhood setting. There are four Environment Rating Scales used in the different segments of the early childhood field, this course will introduce you to each scale, providing an overview of how and when to use each scale to assess program quality. This online training will enable participants to work closely with a YoungStar Technical Consultant, explore the scales, ask questions, add additional notes for clarification, and highlight required interactions. Participants are encouraged to take one or more of Exploring courses after completion of this course, for a comprehensive look at the individual scales. | <urn:uuid:723b1415-864a-4bf2-8559-171083f13d30> | CC-MAIN-2021-10 | https://www.fcrnew.org/events/introduction-to-the-environment-rating-scales-supporting-programs-participating-in-youngstar-online/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360293.33/warc/CC-MAIN-20210228054509-20210228084509-00607.warc.gz | en | 0.904406 | 217 | 2.5625 | 3 |
by Clif Stratton, author of Education for Empire: American Schools, Race, and the Paths of Good Citizenship
This guest post is part of a series published in conjunction with the meeting of the Organization of American Historians in New Orleans. The theme of this year’s conference is “Circulation,” which characterizes many of the subjects historians study, whether migrations, pilgrimages, economies, networks, ideas, culture, conflicts, plagues or demography. #OAH17
While Secretary of Education Betsy DeVos is likely in for a long fight should she seriously push for painful “school choice” programs, President Trump’s deportation policies are having an immediate and detrimental impact on U.S. students and schools.
In late February, the Bay Area’s Mercury News reported a forty percent drop in the number of college financial aid applications from undocumented students. California’s Dream Act allows undocumented students brought to the United States as children to access financial aid and in-state tuition. But Donald Trump’s “military operation” aimed at ramping up deportations has many high school and college students wary of providing identifying information to government authorities.
Two weeks later, ICE arrested Romulo Avelica-Gonzalez, an undocumented father of four U.S. citizens while driving his daughter Fatima to school in northeast Los Angeles. The family was less than two blocks from Fatima’s school, which signaled, according to reports, that ICE may discard its long-standing policy not to conduct enforcement raids at hospitals, churches, schools, and other “sensitive sites.”
Meanwhile, in the Aloha state, public school social studies (social studies!) teacher John Sullivan used his work email to announce: “If [students] are in the U.S. illegally, I won’t teach them.” His email was in response to that of school counselor who cited national statistics concerning an increase in school absences over deportation fears.
Historians of American education will find these intersections of immigration policy and public education horrific yet unsurprising. As unions and lawmakers in California and other western states moved to bar first Chinese then Japanese migrants from entering the U.S. at the turn of the twentieth century, school administrators actively participated in the xenophobic hysteria by segregating citizens and non-citizens of Asian descent in inferior schools. Some school officials openly advocated deportation.
In New York and other eastern industrial cities where southern and eastern European immigrants settled for jobs, housing, and education, school board members and administrators first pressed for rapid assimilation—“100 percent Americanism,” as they called it. When school officials perceived those efforts to fail, many threw their support behind the National Origins Act of 1924 which effectively barred from entry those of alleged racial inferiority or Bolshevistic proclivity (the Bolshevik was the era’s “really bad dude”).
What has certainly changed from a century ago—John Sullivan aside—is the position of educators. Top officials for both the University of California and California State University systems have assured students that they will not comply with any ICE requests for student information.
Chicago Public Schools likewise refused: “To be very clear, CPS does not provide assistance to [ICE] in the enforcement of federal civil immigration law,” a memo stated in late February.
Meanwhile, in the Red State South, the largest university in the University System of Georgia—Georgia State University—began admitting students regardless of their immigration status this semester.
And on O’ahu, where a little over a century ago territorial officials ran a reform school for native Hawaiians and immigrants that functioned an awful lot like a prison, John Sullivan faces disciplinary action for his email and the cold shoulder of the state teachers’ association.
Educators are clearly uninterested in returning to the days in which their predecessors actively colluded with the xenophobes in union halls, state houses, or Washington, D.C. They have repeatedly attested that all children deserve a public education, regardless of immigration status. In doing so, they serve as vital bulwarks against the politics of division and those that seek to deepen, not close, the education gap in the United States. This colleague, for one, commends them.
Clif Stratton is Clinical Assistant Professor of History and Assistant Director of the Roots of Contemporary Issues program at Washington State University. He is the 2014 recipient of the American Historical Association’s Eugene Asher Distinguished Teaching Award. | <urn:uuid:8abee056-29a6-48c3-9a6a-3645c468fcec> | CC-MAIN-2018-34 | https://www.ucpress.edu/blog/26386/educators-argue-that-trumps-immigration-policies-belong-in-the-history-books/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215284.54/warc/CC-MAIN-20180819184710-20180819204710-00182.warc.gz | en | 0.957509 | 935 | 2.53125 | 3 |
Erucic acid, a monounsaturated omega-9 fatty acid marked as 22:1ω9, is found in the oil-rich seeds of the Brassicaceae family of plants notably rapeseed and mustard. It has formula CH3(CH2)7CH=CH(CH2)11COOH. The name is derived from Latin word eruca which means arucola or garden rocket. It is common in wallflower seed with a content of 20 to 54% in high erucic acid rapeseed oil, and 42% in mustard oil. This acid is also known as cis-13-docosenoic acid and trans isomer is called brassidic acid. Though natural forms of mustard and rapeseed contain high erucic acid levels (over 40% of total fatty acids) and levels in rapeseed for food use are below 0.5%.
Erucic acid has similar uses as mineral oils but with a benefit that it is more bio-degradable. It is highly tolerable to temperature which makes it suitable for oil transmission. It is able to polymerize and dry means it can be – and is – used as a binder for oil paints. Erucic acid is broken down long-chain acyl-coenzyme A (CoA) dehydrogenase, which is formed in the liver. This enzyme breaks long chain fatty acid into shorter-chain fatty acids.
|Food name||Weight (g)||Erucic acid (g)| | <urn:uuid:c274ecf7-31db-4e1b-8217-f4e2d4b45eb1> | CC-MAIN-2021-21 | https://www.healthbenefitstimes.com/nutrition/erucic-acid/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989766.27/warc/CC-MAIN-20210512162538-20210512192538-00070.warc.gz | en | 0.874539 | 313 | 3.28125 | 3 |
This report is drawn from a national survey of Canadian youth conducted by MediaSmarts in 2013. The classroom-based survey of 5,436 students in grades 4 through 11, in every province and territory, examined the role of networked technologies in young people’s lives. Experts or Amateurs? Gauging Young Canadians’ Digital Literacy Skills (the fourth in a series of reports from the survey) explores the level of young people’s digital literacy skills, how they are learning these skills and how well digital technologies are being used in classrooms to support these skills.
31 Mar 2014 | <urn:uuid:7496568f-4c45-49d5-8dce-771fddf8aee3> | CC-MAIN-2021-31 | https://mediasmarts.ca/publicationreport/young-canadians-wired-world-phase-iii-experts-or-amateurs-gauging-young-canadians%E2%80%99 | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151972.40/warc/CC-MAIN-20210726000859-20210726030859-00222.warc.gz | en | 0.943031 | 121 | 2.953125 | 3 |
Find Integrals and Antiderivatives! Online Derivative Calculator. Equations solver - GetEasySolution.com. Variable on One Side Solving Two-Step Equations - WorksheetWorks.com. Trigonometry Problems and Questions with Solutions - Grade 10. X = 10 / tan(51o) = 8.1 (2 significant digits) H = 10 / sin(51o) = 13 (2 significant digits)
Algebrarules.com: The Most Useful Rules of Basic Algebra, Free & Searchable. Online maths practice. Videos and Worksheets. If you are a teacher/tutor and find the Videos and Worksheets useful, please consider making a donation towards the site’s running costs Common marking codes for teachers Marking codes 2D shapes: names Video 1 Practice Questions Textbook Exercise 2D shapes: quadrilaterals Video 2 Practice Questions Textbook Exercise 3D shapes: names Video 3 Practice Questions Textbook Exercise 3D shapes: nets Video 4 Practice Questions Textbook Exercise 3D shapes: vertices, edges, faces Video 5 Practice Questions Textbook Exercise.
Basic Differentiation Tutorial. Differentiation The process of finding the gradient or slope of a function is the differentiation.
We used to find the gradient of a straight line, just by dividing the change in 'y' by change in 'x', in a certain range of values. However, when it comes to a curve, it is not easy to find the gradient or slope as the very thing we want to measure, keeps changing from point to point. we have to draw tangents at all those points and then find the gradients individually. The following animation illustrates just that.
If we stick to this method we will have to draw hundreds, if not thousands, of tangents to find the gradient at various points of the curve; enough work to put off someone doing maths for decades! Good news is that there is a method that comes to our rescue. If y = xn then dy/dx = nxn-1 That means, if a curve is in the form of y = xn , its gradient at any point is given by nxn-1 . Understanding Exponents (Why does 0^0 = 1?) We’re taught that exponents are repeated multiplication.
This is a good introduction, but it breaks down on 3^1.5 and the brain-twisting 0^0. What is a Logarithm? A logarithm is the power to which a number must be raised in order to get some other number (see Section 3 of this Math Review for more about exponents).
For example, the base ten logarithm of 100 is 2, because ten raised to the power of two is 100: log 100 = 2 because. Introduction to Logarithms. In its simplest form, a logarithm answers the question:
Approaches that try to avoid memorization. Algebra 1 Math Course. GeoGebra Calculus Applets. Unit Circle. The "Unit Circle" is a circle with a radius of 1.
Being so simple, it is a great way to learn and talk about lengths and angles. The center is put on a graph where the x axis and y axis cross, so we get this neat arrangement here. Sine, Cosine and Tangent Because the radius is 1, we can directly measure sine, cosine and tangent. What happens when the angle, θ, is 0°? Trigonometry - Wikibooks, open books for an open world. For how to help with this book, click here.
Do add new material and examples and make corrections. It all helps.Decide whether new material is book 1,2 or 3. Didaxy. Exploring Precalculus. Integral Calculator - Symbolab. SineRider - A Game of Numerical Sledding. Desmos Graphing Calculator. Untitled Graph Create AccountorSign In Important changes to our Terms of Service!
Undo Learn more π functions θ τ Drop Image Here powered by Delete All Reset Done Create AccountorSign In to save your graphs! + New Blank Graph. Real World Examples of Quadratic Equations. An example of a Quadratic Equation: Quadratic equations pop up in many real world situations!
Here we have collected some examples for you, and solve each using different methods: Each example follows three general stages: Take the real world description and make some equations Solve! Use your common sense to interpret the results. Maths. Exploring Precalculus. Friendly lessons for lasting insight. Example 1: The Natural Base. Plotted below are two familiar exponential functions: and On the interval shown, we see that 2x begins with a slight head start in value, but 3x quickly outgrows it, overtaking 2x at We also see that the larger the values of each function, the faster they grow.
Said geometrically: Both curves are steeper the further up you go. It is interesting to compare the average growth rates of these two functions at different points. We do so in the table below. In the table, values of f(x) and g(x) have been computed at equal intervals of beginning at and ending at For each interval, the average rate of change Dy/Dx has been computed for both and and these rates are displayed at the midpoint of the interval over which they have been computed. It appears that the average rates of change for f are always lagging a little behind the values of the function itself, while those for g are always a little ahead.
Tranposition explanations and excercises. Math. Specialized - Math. | <urn:uuid:2a2fabf1-3d4c-4c3f-9b74-2cfbbd927b1e> | CC-MAIN-2019-35 | http://www.pearltrees.com/stephenteacher/maths-help/id13186188 | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316549.78/warc/CC-MAIN-20190821220456-20190822002456-00174.warc.gz | en | 0.889151 | 1,186 | 3.953125 | 4 |
Grow a Dracaena marginata plant by choosing a location with plenty of sun, using well-drained soil, watering regularly, fertilizing lightly and repotting as necessary. You need well-draining soil or potting mix, controlled-release fertilizer, water and a pot.Continue Reading
Place the Dracaena marginata in a location that receives relatively bright light. This plant does best in temperatures between 65 and 80 degrees Fahrenheit. If the temperature outside becomes too hot or too cold, the plant should be brought inside. This plant does well if kept indoors.
Use loose, well-draining potting mix. Annually refresh potted soil with fresh soil; replacing any that has become compacted.
Water the plant regularly, but allow the plant to be almost dry before watering again. Use a distilled or nonfluoridated water to avoid discoloration of the plants leaves. Avoid over watering; allowing the plant to sit in water can result in root rot.
This plant requires very little fertilizer. Fertilizer is only necessary once or twice annually, preferably at the beginning of spring using controlled-release fertilizer.
Repot as necessary into a larger pot. The plant grows at a slow rate; the action of repotting may be done every two to three years. | <urn:uuid:be94833f-a51d-4be8-bae5-64cd1563aca8> | CC-MAIN-2018-30 | https://www.reference.com/home-garden/grow-dracaena-marginata-tree-f39420b8dfc9881b | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591543.63/warc/CC-MAIN-20180720061052-20180720081052-00023.warc.gz | en | 0.924504 | 267 | 2.96875 | 3 |
By John W. Traphagan, Trustee, METI International
In general, when we think about scientific inquiry, much of its power rests in the idea that everything is open to question. Turning a scientific gaze upon the world enlightens us and opens our potential to understand more deeply, while often challenging us to reconsider previously held beliefs and ideas. But science is not an unambiguously moral good.
Einstein questioned the ethics of building the atomic bomb. We know that research like the Tuskegee study of syphilis in African Americans has deep moral problems related to racism and informed consent. More recently, Stephen Hawking and others have raised ethical questions about whether or not we should engage in sending messages to the stars—the risks of letting ET know we’re here may outweigh the benefits of making contact if ET happens to be in a particularly foul mood when they answer our interstellar phone call.
Those opposing Active SETI or METI (messaging extraterrestrial intelligence) have a point. There could be some risk involved with alerting ET to our presence in the universe, although if ET has knowledge of physics allowing them to visit our corner of the galaxy, hiding probably won’t do us much good anyway. If the extraterrestrials want to vaporize us, they’ll go ahead and do it. More likely the extreme distances between Earth and possible other civilizations will mitigate against any real threat—if we send a message out to a star in the Orion constellation today, it will take over 1,000 years to get there.
Perhaps a more important question is not about the risks of transmitting, but the dangers in receiving. Many in the SETI community have shown commitment to the belief that a technologically advanced civilization will be altruistic, despite the lack of evidence supporting that assumption. Therefore it is assumed there are no significant risks with listening quietly.
Maybe they’re right. But even so, contact may prove quite dangerous to humans.
Why? Because of the potential to destabilize our civilization. How will humans react? Will there be panic, infighting, conflict? Imagine if the Chinese intercept the first message from aliens and want to keep the information they gain to themselves. How will the American and other governments respond if they think the Chinese might have information from ET about physics that would allow them to build super weapons? How will religious zealots, who are suddenly confronted with the idea that humans may not be so special after all, cope with news that we are not alone? Imagine if ET sends us an encyclopedia of information about themselves in which we learn that they are a civilization of card-carrying atheists.
And, perhaps, the most important question is what does sending a message say about them? One way to interpret this is to assume it means they want contact. But if they are significantly more advanced than we are morally (and there’s no guarantee), perhaps they are also aware of what normally happens when more advanced civilizations come into contact with lesser ones. It’s not typically great for the less advanced society whose culture tends to get run over, even if intentions are good on the part of those making contact. We have plenty of data to support this scenario from our own history.
Put another way, if ET is so advanced, shouldn’t they have something equivalent to Star Trek’s Prime Directive in which they make every effort to avoid meddling in the development of less advanced civilizations? Perhaps the very fact that they sent the message indicates nefarious intentions, or just plain stupidity, on the part of aliens who didn’t give much thought to how sending might negatively influence the civilization at the receiving end, whose culture they knew nothing about when they sent the message.
Now, we need to turn this around to ourselves. Many scientists in the SETI community argue against METI on the grounds that it is dangerous. We should simply wait and listen until we are sufficiently advanced to deal with contact. We should hold off until we mature from our cultural and technological adolescence, whatever that means, to adulthood.
However, if we really think about it, the activity likely to be more dangerous to humans is receipt of a signal rather than sending a message. The way in which people will react on our socially fragile world is quite unpredictable. Awareness of the existence of another likely more technologically advanced civilization might propel our world into political chaos or it might have little influence. And we are left with the problem of what to think about an extraterrestrial civilization that sent a message without giving much thought to what it might do at the other end. Those aliens may be malicious at worst or naïve at best. Neither possibility is terribly good from our perspective.
The alternative, of course, is to roll up in a ball and hide. This seems rather pointless, since the genie is already out of the bottle, given the wide array of transmissions we constantly send from our planet. A society with technology 1,000 or 10,000 years beyond ours may well be able to pick up even the faint signals we are leaking out to the galaxy.
Instead of hiding, we should give a great deal of thought to the kind of message we might send and to what the possible consequences are of sending. By consequences here, I do not mean self-centered worries about ET blasting us, but other-centered concerns about how sending a message might influence or harm the recipient.
Perhaps the silence we have experienced to date is a product of more advanced civilizations saying, “don’t send anything that way; those beings are primitive and we might ruin their development.” If that’s the case, then our only shot at contact will be METI as a way of alerting extraterrestrials that we are ready for contact.
If SETI scientists are right and ET is likely to be much older and wiser than humans, the real question is not the dangers of sending a message, but the risks of receiving one. It seems much less likely that messaging to more advanced extraterrestrials will have a significant impact on their society, while receipt of a message from advanced extraterrestrials might have a very significant impact on ours.
Artículo en español: http://meti.org/es/blog/evolucion-cultural-extraterrestres-y-seti-activo | <urn:uuid:89d187af-e0bf-4b60-b4d4-164e237fce7a> | CC-MAIN-2023-06 | http://meti.org/blog/active-seti-really-dangerous | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00073.warc.gz | en | 0.943406 | 1,295 | 2.78125 | 3 |
When you are a foreign language teacher, there is nothing better than watching your students produce meaningful language. After months of comprehensible input in the target language (which for me is Spanish), students began asking me if I would ever allow them to write their own stories. When students start wanting to produce language you know that you’re on the right path.
I was on my first year of teaching and I started focusing mainly on high frequency structures instead of vocabulary lists and grammar. After winter break my students were writing very creative stories and as the year progressed these stories became more and more complex. It didn't take long before students didn’t want to write about the girl and the cat anymore and they were constantly asking me for more complex characters such as “the hairy monster”…”the alien” or “the flying man”. I realized that I needed a list of classic characters with some kind of visual to ignite creativity. It was then when I sat down with my notebook and pencil and started designing my next poster. I finally got it done with the help of many creative minds and Wow! Let me tell you, it has been an absolute success!
Seriously, if you want to encourage writing in the target language and ignite creativity tho poster belongs in your classro
om. These characters open students' mind to magic and possibility but most importantly, they will have fun and improve their Spanish skills.
French and English versions are also available.
Categorised in: Uncategorized
This post was written by Craig Klein | <urn:uuid:3c5c1cd9-4d38-4888-a7b5-2957a5e4b537> | CC-MAIN-2020-29 | https://spanishcuentos.com/2015/08/spanish-storytelling/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655919952.68/warc/CC-MAIN-20200711001811-20200711031811-00509.warc.gz | en | 0.960417 | 317 | 2.53125 | 3 |
click icon following
glossary term for image
Not looking for hardwood terms visit our main glossary
A term used to describe the V-shaped groove made from two eased or beveled edges coming together.
V.O.C. - Volatile Organic Compounds, a measurement of solvents that are not water in a product.
- Vapor Barrier
A layer of material that is applied between the floor and subfloor which prevents the migration of moisture.
- Vapor Retarder
Foil, plastic, specialty paper, or other material which is used to control the migration of moisture.
A solution made of either natural or synthetic oils, used as a sealer.
The ability of a fluid to resist flow. | <urn:uuid:133a08cc-36a4-438a-8a9d-df4f7c307dac> | CC-MAIN-2017-09 | http://www.findanyfloor.com/Glossary/HardwoodGlossary/v.xhtml | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172783.57/warc/CC-MAIN-20170219104612-00028-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.859778 | 153 | 2.796875 | 3 |
Memories Of Fearful Odors Activate Heightened Sense Of Smell
redOrbit Staff & Wire Reports – Your Universe Online
Neuroscientists at Rutgers University have discovered that fear reactions can occur in the olfactory system, even before the brain has had an opportunity to interpret and associate a particular odor with trouble. In a study published Thursday in the journal Science, John McGann, associate professor of behavioral and systems neuroscience at Rutgers and colleagues, report that neurons in the noses of laboratory animals reacted strongly to threatening odors before the odor message was even sent to the brain.
“What is surprising is that we tend to think of learning as something that only happens deep in the brain after conscious awareness,” McGann said. “But now we see how the nervous system can become especially sensitive to threatening stimuli and that fear-learning can affect the signals passing from sensory organs to the brain.”
McGann and his team made their discovery by using light to observe activity in the brains of genetically engineered mice through a window in the mouse’s skull. They found that the mice that received an electric shock simultaneously with a specific odor showed an enhanced response to the smell in the cells in the nose, before the message was delivered to the neurons in the brain.
The research indicates that fearful memories can influence the senses, findings that could help improve our understanding of conditions like Post Traumatic Stress Disorder (PTSD), in which feelings of anxiety and fear exist even though an individual is no longer in danger.
“We know that anxiety disorders like PTSD can sometimes be triggered by smell, like the smell of diesel exhaust for a soldier,” said McGann.
“What this study does is gives us a new way of thinking about how this might happen.”
The researchers also discovered a heightened sensitivity to odors in the mice traumatized by shock. When these mice smelled the odor associated with the electrical shocks, the amount of neurotransmitter – chemicals that carry communications between nerve cells – released from the olfactory nerve into the brain was as large as if the odor were four times stronger than it actually was. This created mice whose brains were hypersensitive to the fear-associated odors.
Until now, scientists did not believe that reward or punishment could influence how the sensory organs process information.
McGann says he plans to continue his research to determine whether the hypersensitivity to threatening odors can be reversed by using exposure therapy to teach the mice that the electrical shock is no longer associated with a specific odor. McGann said this could help develop a better understanding of fear learning that might someday lead to new therapeutic treatments for anxiety disorders in humans. | <urn:uuid:2d6e0ba8-2f00-4775-b1f6-07d20be0a49c> | CC-MAIN-2014-10 | http://www.redorbit.com/news/science/1113027608/fearful-odors-activate-heightened-sense-of-smell-121313/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999636575/warc/CC-MAIN-20140305060716-00059-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.95911 | 548 | 2.953125 | 3 |
What Is Opioid Use Disorder?
What is opioid use disorder? What are the signs and symptoms of opioid use disorder, what causes it and what drugs are considered opioids? These are all common questions, especially since the United States is in the midst of what’s described as the Opioid Epidemic, related to the soaring number of drug overdoses from opioids.
What Are Opioids?
Before explaining what opioid use disorder is and the signs and symptoms of opioid use disorder, what are opioids?
Opioids are a class of drugs that include prescription drugs as well as the illegal drug heroin.
- Opioids are central nervous system depressants. When used, opioids including both prescription drugs and heroin, bind to certain receptor sites found throughout the brain and central nervous system.
- These drugs slow the activity of the central nervous system as a result.
- The central nervous system controls functions including breathing and heart rate. Too high a dose of opioids can lead to a fatal overdose.
- Opioids also carry the risk of addiction and dependence, especially if they’re misused.
Opioids in prescription form are given to patients to alleviate pain. Prescription opioids vary in strength and how addictive they are. Some of the most commonly used and abused prescription opioids are:
- Codeine: Codeine is a prescription opioid that can be given to patients as a tablet, capsule or liquid. Street names for codeine include Captain Cody, Lean, Sizzurp, and Purple Drank.
- Fentanyl: This is one of the most dangerous and deadly prescription opioids. Fentanyl is found in brand-name prescription drugs such as Actiq, Duragesic and Sublimaze. When someone abuses fentanyl it can be injected, snorted or smoked.
- Hydrocodone: This is a prescription opioid that’s in brand-name drugs such as Vicodin and Norco.
- Hydromorphone: Found in the brand-name drug Dilaudid, this drug is frequently injected.
- Methadone: Methadone is intended as a medication to help people stop using other opioids, but it has an abuse potential as well.
- Oxycodone: This tends to be one of the most readily accessible prescription opioids. Oxycodone is in OxyContin, Percodan, Percocet and other brand-name prescription painkillers.
What is Heroin?
Heroin is also characterized as an opioid. Heroin is derived from morphine, which is found in the opium poppy.
Heroin can be sniffed, snorted, smoked and most commonly injected. With heroin, it crosses into the brain quickly and creates a powerful, rapid and euphoric high. Research shows the use and abuse of prescription opioids can be a gateway to heroin.
Short-term heroin effects can include nausea, vomiting, itchiness and nodding off.
Defining Opioid Use Disorder
Opioid use disorder is a term that refers to a pattern of opioid use that’s problematic. This means someone’s use of opioids causes impairment or distress. Opioid use disorder is similar in terms of signs and symptoms to other substance use disorders.
An opioid use disorder can include both psychological addiction and physical dependence.
These are two separate concepts, and one can occur without the other but they are usually seen together.
What is Opioid Addiction?
People tend to use the terms addiction and dependence interchangeably, but when someone is addicted to opioids, it’s primarily psychological. Opioid addiction occurs in the brain, due to the activation of the brain’s reward cycle that occurs when it’s exposed to opioids.
Opioid addiction means someone is compulsively using these substances. While they may have initially chosen to use opioids or even been prescribed to use them, once an addiction forms their use is no longer in their control. This lack of control explains part of why opioid addiction is a disease and not a choice.
What Is Opioid Dependence?
Opioid dependence can occur even if someone isn’t addicted. Dependence means that the brain and body depend on the presence of opioids to function in what’s a new sense of normal.
If someone is dependent on opioids and they stop using them suddenly, they’ll go through withdrawal. This can happen even if a person is prescription opioid painkillers and uses them exactly as instructed by their doctor.
What Happens During Opioid Withdrawal?
If someone is dependent on opioids and they stop suddenly, withdrawal symptoms can vary from mild to severe. Withdrawal is the body’s response to trying to readjust to a sense of normal functionality without drugs.
Early symptoms of opioid withdrawal can include:
- Muscle aches and pains
- Teary eyes
- Insomnia and sleep disturbances
- Runny nose
Later symptoms of opioid withdrawal can include:
- Abdominal cramps
- Dilated pupils
There are different ways to reduce or alleviate opioid withdrawal symptoms. If someone is taking opioids as prescribed, their health care provider might advise them to taper off slowly. This means gradually reducing the dose of opioids used over time rather than cold turkey.
If someone is abusing opioids or using heroin, they may require professional treatment as they go through withdrawal because it can be very difficult.
Certain medications for opioid withdrawal may be used including methadone, buprenorphine or clonidine.
How Does Opioid Use Disorder Occur?
Opioids are very addictive substances. When someone uses an opioid of any kind, it binds to opioid receptor site. That reduces pain, which is why opioids are commonly prescribed pain relievers. At the same time, this opens a person to the risk of opioid use disorder.
The following are the steps that usually lead to opioid use disorder:
- First someone takes opioids, as prescribed or otherwise which activate opioid receptor sites
- When opioid receptor sites are activated, it triggers a flood of dopamine into the brain, which is a feel-good brain neurotransmitter. Dopamine is what causes people to feel high when they use opioids and other psychoactive substances.
- When dopamine floods into the brain at a high level as it does with opioids, it can trigger the brain’s reward response
- The reward response in the brain occurs naturally when we do certain activities such as eating or sex
- When the reward response is triggered by opioids, it then leads to compulsive use of the substance. The brain wants you to keep seeking out what created the positive feelings of using opioids.
- Once this happens, the use of opioids is no longer in your control.
There are some things to realize as far as opioid use disorder, however. First, not everyone who uses opioids will become addicted or develop an opioid use disorder.
Some people are at a greater risk of developing an opioid use disorder. For example, someone with a family history of substance abuse may be more likely to become addicted.
Also, the higher the dose of opioids someone uses, the more likely they will become addicted. If you take opioids as prescribed and follow your doctor’s instructions, you’re at a lower risk of developing an opioid use disorder, although it’s still possible.
With heroin, an opioid use disorder is likely to develop very quickly because of the potency of the drug and how quickly it takes effect.
What Are the Symptoms of An Opioid Use Disorder?
If someone uses opioids and has at least two of the symptoms below that occur within a 12-month period, they might be diagnosed as having an opioid use disorder.
The symptoms of an opioid use disorder include:
- Taking more opioids or a higher dose than intended
- Feeling like you want to stop using opioids or cut down on how much you use, but not being successful in doing so
- Spending a significant amount of time getting opioids, taking them, or recovering from their effects
- Cravings for opioids occur
- Declining performance at school or work because of opioid use
- Using opioids even when there are negative effects on relationships or socially
- Giving up other interests or activities due to the use of opioids
- Using opioids even when there are harmful physical side effects or unsafe situations occur
- Knowing that opioids are causing problems physically or psychologically but continuing to use them
- Develop a tolerance and needing larger amounts to get the same effects
- Experiencing withdrawal symptoms when not using opioids
Opioid Use Disorder and the DSM-5
The Diagnostic and Statistical Manual of Mental Disorders, DSM-5, is the guide used to diagnose mental health and psychological disorders. The DSM is published by the American Psychiatric Association.
In the current 5th edition, two disorders are combined which are Opioid Dependence and Opioid Abuse. Now these are classified as Opioid Use Disorder.
According to the guidelines in the DSM-5, when a diagnosis of an opioid use disorder is made, it should include the specific opioid the person is using since the term opioid is one that covers so many substances.
Does Everyone Who Uses Opioids Have An Opioid Use Disorder?
The term opioid use disorder is one that refers to problematic opioid use. Not everyone who uses opioids has an opioid use disorder.
People are often prescribed opioids to treat pain, for long and short time periods and during that time they don’t meet the criteria for an opioid use disorder.
Also, if someone takes opioids for a period of time and develop a physical dependence with withdrawal symptoms, this isn’t necessarily problematic. This is a physical response to taking opioids, and as was touched on, is different from a psychological addiction.
In rare cases, even people who use heroin may not meet the requirements to be diagnosed as having an opioid use disorder because they control their use, although this is fairly uncommon.
How Do Doctors Screen for Opioid Use Disorder?
There are ways doctors screen to make an opioid use disorder, as is the case with many other medical conditions. One way to screen patients for a potential opioid use disorder is called the CAGE questionnaire.
The questions that are part of the CAGE assessment for opioid use disorder include:
- C—This stands for cut down. Has the person tried to cut down on their use of opioids, but weren’t able to.
- A—Stands for annoyed. Are friends and family annoyed with the person’s use of opioids?
- G—Stands for guilty, as in does the person ever feel guilty about their use of opioids.
- E—This stands for eye-opener meaning does the person every use opioids as what’s called an “eye-opener” in the morning.
If someone answers yes to any questions, they may need further assessment for a potential opioid use disorder.
Opioid Risk Tool
There’s also something called the Opioid Risk Tool. The Opioid Risk Tool creates a calculation of the factors that put someone at a higher risk of having an opioid use disorder or a substance use disorder.
Some of the factors that are part of the calculation include a family or personal history of substance use, childhood abuse or trauma, and a history of psychological disorders.
How Is An Opioid Use Disorder Treated?
If someone has an opioid use disorder they will require treatment. There are a lot of different ways opioid use disorder including addiction and dependence can be treated including medication, therapy or a combination.
Medications for Opioid Addiction and Opioid Use Disorder
There are a variety of medications approved by the FDA to help with the treatment of opioid use disorder, opioid addiction and dependence. Some of these drugs are controversial, however, because they can be habit-forming themselves and are known as opioid replacements rather than true treatments. In fact, this is known as opioid replacement therapy.
Some of the medications that may be used to help someone struggling with opioids include:
- Methadone is opioid replacement therapy. It is itself a weak-acting opioid, and it can help people stop using other stronger forms of opioids. Methadone is a tightly controlled substance and it has to be monitored under a methadone program.
- Buprenorphine is a partial opioid receptor agonist. Buprenorphine has what’s known as ceiling effect, which reduces the likelihood of an overdose. After a certain amount is used, the effects no longer increase.
- Buprenorphine and naloxone are also combined with one another in a medication called Suboxone. Other brand names for this combination include Zubsolv and Bunavail.
- Naltrexone is an opioid receptor antagonist, meaning it blocks the effects of opioids if someone uses it. If someone were to try and use opioids while on naltrexone, it could lead to rapid withdrawal symptoms and it would block them from feeling high.
Therapy-Based Treatments for Opioid Addiction and Opioid Use Disorder
Even with medication, most people who have an opioid use disorder benefit from therapy as well. They can receive therapy in different settings including a rehab center.
Cognitive behavioral therapy or CBT is one of the forms of therapy most used to treat substance use disorders. With CBT, patients learn how to change their thinking and behaviors and gain more effective coping mechanisms. With regard to opioid use disorder specifically, CBT usually works best when paired with medication.
Some people also participate in 12-step programs either in place of other forms of therapy or in addition to rehab or therapy. Narcotics Anonymous (NA) is one such 12-step program.
Opioid Facts and Statistics
Opioids and opioid use disorder have led to the rise of what’s called the opioid epidemic or the opioid overdose crisis.
Each day more than 130 people die in the U.S. after overdosing on opioids. The following are statistics related to opioid use disorder and the opioid epidemic according to the National Institute on Drug Abuse and the Centers for Disease Control:
- Opioid overdoses went up 30 percent from July 2016 to September 2017
- The Midwest region saw an increase of 70 percent in opioid overdoses from July 2016 to September 2017
- Anywhere from 21 to 29 percent of patients who take opioids as prescribed for chronic pain misuse them
- Of the patients who misuse opioids for chronic pain, between 8 and 12 percent develop an opioid use disorder
Summing Up—The Reality of Opioid Use Disorder
Opioid use disorder is a troubling and growing problem. At the same time, opioid use disorder is also something that’s preventable, and if it does occur, it’s treatable. Education can be an empowering way to help yourself or someone you love if an opioid use disorder may be an issue.
It’s important to understand that if you believe you could have opioid use disorder, you should speak to a healthcare professional. Addiction treatment is available, and treatment programs can help you stop your use of any opioid drug you may have a problem with.
You may be exploring opioid use disorder not necessarily for your own drug addictions, but because you’d like to learn more to help a loved one, and this information will be relevant for you as well.
CDC. “Module 5: Assessing and Addressing Opioid Use Disorder (OUD).” Accessed February 20, 2019.
Hartney, Elizabeth Ph.D. “ What Is Opioid Use Disorder in the New DSM-5?” Verywell Mind. March 31, 2018. Accessed February 20, 2018.
Wikipedia. “Opioid Use Disorder.” Accessed February 20 2019.
NIH National Institute on Drug Abuse. “Commonly Abused Drugs Charts.” July 2018. Accessed February 20, 2019.
NIH National Institute on Drug Abuse. “What Is Heroin.” June 2018. Accessed February 20, 2019.
Medline Plus. “Opiate and Opioid Withdrawal.” Accessed February 20, 2019. | <urn:uuid:579d5946-ecd4-4932-83d8-b8360b4a835f> | CC-MAIN-2019-39 | https://myaddictioninfo.com/opioid-use-disorder-3/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572556.54/warc/CC-MAIN-20190916120037-20190916142037-00400.warc.gz | en | 0.935649 | 3,349 | 3.25 | 3 |
On most days, you do everything you can to work more fruits and vegetables into your diet: You add berries to your oatmeal, pile spinach on your pizza, and swap out your fries for a side salad. While you should be congratulated for your efforts, chances are you, like more than 70 percent of adults, aren't hitting the USDA target of nine servings of produce (that's four halfcup servings of fruit and five half–cup servings of vegetables) daily. That's where juice comes in. "It can be overwhelming for busy women to try to get the fruits and vegetables they need," says Kathy McManus, R.D., director of the department of nutrition at Brigham and Women's Hospital in Boston. "Drinking 12 ounces a day can be a convenient way to get two servings closer to your produce goal."
Juice also can boost your health, as the nutrients normally found in these beverages have been credited with everything from warding off cancer to preventing age–related ailments. A recent study published in The American Journal of Medicine concluded that people who drank three–plus servings per week of juices high in polyphenols– antioxidants found in purple grape, grapefruit, cranberry, and apple juice– had a 76 percent lower risk of developing Alzheimer's disease. Plus, some store–bought juices are actually higher in certain nutrients than the fruits and vegetables they came from (see the boxes in this story for specifics).
The key, according to McManus, is to make juice a supplement to rather than a substitute for all of the fruits and vegetables in your daily diet. Though these beverages are generally higher in sugar and calories and lower in fiber than their whole counterparts, research shows that a combination of the two may be the most beneficial to your overall health. The Harvard–based Nurses' Health Study found that adults who had the highest intake of produce in both solid and liquid form– about eight servings per day– were 30 percent less likely to have a heart attack or stroke than those who got 1.5 or fewer servings daily. Plus, their overall risk for any type of chronic disease was 12 percent lower than the fruit and veggie skimpers'. To squeeze more nutrients out of every single sip, follow this expert advice.
Mix It Up A glass of OJ may deliver all the vitamin C you need in a day, but make room in your fridge for a new variety or an exotic blend and you'll get an even healthier payoff. That's because drinking a range of juices helps you maximize the kinds of vitamins and minerals you're getting. "Individual fruits and vegetables can offer some measure of protection against illness and chronic disease," says Janet Novotny, Ph.D., a research physiologist at the USDA's Beltsville Human Nutrition Research Center in Maryland. "But to get the greatest preventative benefits, you should diversify the type and color of produce you're taking in." In a study published in The Journal of Nutrition, women who ate from the widest array of botanical groups (18 plant families versus 5) experienced the most protection against oxidative damage, or the breakdown of cells and tissues.
Switch from white grapefruit juice to a ruby red version (the darker fruit may be more effective at cutting cholesterol), or try a blend with açai, an antioxidant–rich Brazilian berry. Learn the Lingo Some store bought juice "drinks," also called "cocktails" or "punches," contain as little as five percent juice. What you will find: water, lots of sugar, and artificial flavoring. Check the label to see what you're getting. "Your beverage should be 100 percent fruit juice, made without added sugar or high–fructose corn syrup," says Felicia Stoler, R.D., a Holmdel, New Jersey, nutritionist. "But extra vitamins, minerals, and fiber can be a healthy bonus."
Stick to a Two-Drink maximum While the disease–fighting potential of juice may be considerable, it shouldn't be an invitation to keep refilling your glass. "Most fruit juices are not only higher in calories and natural sugars– up to 38 grams per 8–ounce glass–but also take less time to consume than the whole fruit," says Stoler. There's no peeling or slicing involved, and unlike whole foods, the energy in beverages won't do much to fill you up–which could spell weight gain if you're not careful. One study published in the International Journal of Obesity found that when people were given either the solid or liquid version of certain foods (watermelon versus watermelon juice, cheese versus milk, and coconut meat versus coconut milk), those who drank the liquids consumed up to 20 percent more calories throughout the rest of the day.
"Most juices are low in fiber, a nutrient that helps delay the emptying of your stomach," says Stoler. "And unlike whole fruits and vegetables, which take time to be broken down by the body, juice moves through your system almost as quickly as water." To make juice a waistline–friendly part of your diet, she recommends limiting your intake to no more than 200 calories per day. That's 16 ounces of most fruit varieties (like apple, orange, and grapefruit), about 8 to 12 ounces for more sugary juices (like grape and pomegranate), and 24 ounces of most vegetable juices.
Don't Bother with Juice Fasts You might have heard that this extreme diet– consuming nothing but juice for days or weeks on end–can help you slim down or "cleanse" your body of harmful toxins, but McManus warns not to buy into the hype. "There's simply no scientific evidence to prove that subsisting on juice helps expel waste products from your system," she says. "You'll just be denying your body essential nutrients from the foods that you're not eating, like lean proteins, healthy fats, and whole grains."
Because you're getting so few calories (often less than 1,000 per day), you may feel sluggish, dizzy, or irritable– not to mention hungry. Some people even report bad breath, breakouts, and sinus congestion. Even if you can put up with all that, you probably won't experience lasting weight loss. "You may drop a few pounds," adds McManus "But they'll return once you start eating real food again."
Get Fresh One of the most effective strategies to control calories, maximize variety, and increase the nutritional value in every glass is to create your own fresh blend at home. That's because you can handselect the kinds of fruits and veggies (which nearly always contain fewer calories) you're using. And if prep time has held you back from snacking on produce, juicing literally lets you cut corners: Most items can be popped whole in your juicer (rind, skins, and all) or cut into large pieces to fit the feeder tube.
While there are three types of juicers– masticating, triturating, and centrifugal– the latter is the easiest to use and the most affordable. Usually priced between $100 and $200, "the centrifugal type works by first grating or finely chopping the produce, then spinning it at a high rpm [revolutions per minute] to push the pulp against a straining screen," says Cherie Calbom, author of Juicing for Life. "When shopping around, look for a model with 600 to 1,000 watts of power and removable parts that can go in the dishwasher."
Need more guidance? After putting several popular extractors through their paces, these three earned the highest overall marks for speed, ease of use, and quick cleanup.
- Best value: Juiceman Junior Model JM400 ($70; at Wal–Mart) Built to run at two speeds, this chrome–plated extractor is stylish enough to display on your countertop between uses.
- Easiest cleanup: Breville Juice Fountain Compact ($100; brevilleusa .com) This streamlined model takes up less counter space than other juicers out there and was designed with removable, dishwasher–safe parts. Extras like a splash–proof lid and shock–resistant plug make this extractor as smart as it is compact.
- Ideal for big families: Jack LaLanne Power Juicer Pro ($150; powerjuicer.com) Thanks to its sample size and huge feed tube, you'll do very little chopping before adding fruits and vegetables to this stainless steel extractor. A straining element allows you to reserve the fiber-rich pulp to use in soups, salsas, muffins, and other recipes.
Experiment with a Lot of ingredients You can increase the variety of nutrients you're getting while cutting the total sugar content by tossing at least one vegetable into your blend. &quo;Red and yellow peppers are chock full of carotenoids, while cucumbers can add potassium," says Calbom. "And if you're feeling adventurous, feel free to toss in some spinach leaves or beet greens, which are both good sources of iron."
Pears, green apples, and berries all have high water content, so they sweeten the flavor of your drink without spiking the calorie content. Calbom recommends washing your fruits and vegetables before tossing them into the juicer to remove any dirt, mold, or surface pesticides. | <urn:uuid:9eba3edc-e83c-44b2-a8fd-83bd8e34cb9e> | CC-MAIN-2015-27 | http://www.shape.com/healthy-eating/diet-tips/can-juice-really-make-you-healthier | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096293.72/warc/CC-MAIN-20150627031816-00279-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.947924 | 1,922 | 2.71875 | 3 |
Sea otters aren’t just unbearably cute; they’re also emerging as key players in keeping the oceans healthy in a warming world, according to new scientific research.
Think of sea otters as the park rangers of coastal kelp forests. The floating thickets of treelike seaweed provide habitat for a plethora of marine life, including seals, sea lions, whales, gulls, terns, and snowy egrets. Like terrestrial forests, kelp forests absorb huge quantities of carbon dioxide that would otherwise be released into the atmosphere. (If you’re a surfer, kelp is cool because great white sharks don’t like to venture into the tangle of seaweed, so it’s safe to ride waves when otters are nearby.)
Sea otters must eat a quarter of their body weight each day to keep warm, and their appetites make them voracious consumers of spiny urchins, according to Rebecca Martone, a marine biologist at the Center for Ocean Solutions at Stanford University.
Left unchecked by otters, spiny urchins would multiply and lay waste to kelp forests, creating oceanic dead zones, Martone and her colleagues said in a presentation on Tuesday at the Ecological Society of America’s annual conference in Sacramento, Calif.
Fortunately for kelp forests and the marine animals that depend on them, the sea otter is one of the few predators that can crack the urchin’s hard shell.
A 2012 study led by Christopher Wilmers of the University of California, Santa Cruz, found that when otters were present, carbon storage in kelp forests from British Columbia to Alaska increased by 8.7 million metric tons. That’s worth about $408 million on Europe’s carbon trading market.
“Sea otters exhibit strong top-down control of grazers, particularly sea urchins, and thus indirectly increase kelp population spatial occupancy and productivity,” Martone and her colleagues wrote in a summary of their research they presented Tuesday.
The scientists studied the impact of otters on kelp forests and marine life off the Canadian coast in British Columbia. They found a greater diversity of marine life in areas where sea otters were present.
“Researchers found that when sea otters arrive in an area from which they have been absent, they begin feasting on urchins,” the Ecological Society said in a statement. “As a result, the kelp forest begins to grow back.”
The bad news is that sea otters are in trouble. Fewer than 3,000 otters are left off the California coast, for instance, and the marine mammal is classified as threatened under the United States Endangered Species Act. (The International Union for Conservation of Nature lists the sea otter as endangered.)
The impact of climate change on sea otters themselves remains uncertain.
“I don't know how vulnerable otters are themselves to climate change,” Martone said in an email. “If their prey populations are shifting in response to climate change, their populations could be affected.”
But she said her research shows the importance of preserving top predators to keep ecosystems in balance. | <urn:uuid:0241356e-658d-47b9-8dc6-9a8983f5491b> | CC-MAIN-2015-18 | http://www.takepart.com/article/2014/08/13/sea-otters-are-helping-fight-climate-change | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246656887.93/warc/CC-MAIN-20150417045736-00190-ip-10-235-10-82.ec2.internal.warc.gz | en | 0.943146 | 671 | 3.578125 | 4 |
- the ancient Roman god of war and agriculture, identified with the Greek god Ares.
- Astronomy. the planet fourth in order from the sun, having a diameter of 4222 miles (6794 km), a mean distance from the sun of 141.6 million miles (227.9 million km), a period of revolution of 686.95 days, and two moons.
- (often lowercase) of or relating to any of various pigments used in painting that are artificially made from an iron oxide base: Mars color; Mars pigments.
- to damage or spoil to a certain extent; render less perfect, attractive, useful, etc.; impair or spoil: That billboard mars the view. The holiday was marred by bad weather.
- to disfigure, deface, or scar: The scratch marred the table.
Origin of mar
SynonymsSee more synonyms for mar on Thesaurus.com
- (used chiefly in representation of southern black speech) master.
Origin of marse
Examples from the Web for mars
Methane could be produced by microbes on Mars, too, if they exist in enough numbers.
However, their presence shows that Mars could have a more complex and evolving chemical story.
There is an expanded place-name index with more than 150,000 entries, and separate undersea, Moon, and Mars features.The Best Coffee Table Books of 2014
December 13, 2014
Orion represents the first step towards human exploration of other planets, like Mars.NASA Launches Orion in Fiery Spectacle
Jack Holmes, The Daily Beast Video
December 5, 2014
What would it take to carry people to the Moon, or Mars, or an asteroid?To Infinity and Beyond! NASA’s Orion Mission Blasts Off
Matthew R. Francis
December 4, 2014
It is only in poetry that Cupid is more powerful than either Mammon or Mars.
Think of our world as it looks from the rocket that is heading toward Mars.
Well, hit do look sorter so, but I wouldn't 'a' b'lieved it, Mars Tom.
Mars Tom, he could a got de cow fer fifteen, en I tole him so.
And on that rug was a fine representation of Mars, the god of war.The Boy Life of Napoleon
- the Roman god of war, the father of Romulus and RemusGreek counterpart: Ares
- Also called: the Red Planet the fourth planet from the sun, having a reddish-orange surface with numerous dark patches and two white polar caps. It has a thin atmosphere, mainly carbon dioxide, and low surface temperatures. Spacecraft encounters have revealed a history of volcanic activity and running surface water. The planet has two tiny satellites, Phobos and Deimos. Mean distance from sun: 228 million km; period of revolution around sun: 686.98 days; period of axial rotation: 24.6225 hours; diameter and mass: 53.2 and 10.7 per cent that of earth respectively
- the alchemical name for iron
- (tr) to cause harm to; spoil or impair
- a disfiguring mark; blemish
Word Origin and History for mars
Roman god of war, also the name of the bright red planet, late 14c., from Latin Mars (stem *Mawort-), the Roman god of war, of unknown origin, apparently from earlier Mavors, related to Oscan Mamers. According to Watkins the Latin word is from *Mawort- "name of an Italic deity who became the god of war at Rome ...." He also had agricultural attributes, and might ultimately have been a Spring-Dionysus. The planet was so named by the Romans, no doubt for its blood-like color. The Greeks also called the planet Pyroeis "the fiery."
Old English merran (Anglian), mierran (West Saxon) "to waste, spoil," from Proto-Germanic *marzjan (cf. Old Frisian meria, Old High German marren "to hinder, obstruct," Gothic marzjan "to hinder, offend"), from PIE root *mers- "to trouble, confuse" (cf. Sanskrit mrsyate "forgets, neglects," Lithuanian mirszati "to forget"). Related: Marred; marring.
- The fourth planet from the Sun and the second smallest in the solar system, with a diameter about half that of Earth. Mars is the last of the terrestrial or inner planets and has notable similarities to Earth, including polar ice caps and a tilted axis that gives it seasons. However, it is significantly less dense than Earth and has no magnetic field, suggesting that it lacks a metallic core, and its atmosphere, made up mostly of carbon dioxide, is much thinner than Earth's. Mars has no surface water apart from a layer of permanent ice that underlies the seasonally changing caps of frozen carbon dioxide at its poles; there is, however, clear evidence of earlier water flows in the form of channels, outwashes, and canyons. Other surface features include numerous craters, especially in the southern hemisphere, along with very large volcanoes and extensive windblown dunes. Mar's reddish color is due to the abundance of hematite in its surface rocks. Its two small, irregular moons, Phobos and Deimos, may be asteroids captured earlier by gravitational attraction. See Table at solar system.
The Roman name of Ares, the Greek and Roman god of war. | <urn:uuid:90aa48ec-ff7e-404e-a39b-53353a3f5892> | CC-MAIN-2018-34 | https://www.dictionary.com/browse/mars | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215487.79/warc/CC-MAIN-20180820003554-20180820023554-00491.warc.gz | en | 0.913457 | 1,152 | 3.015625 | 3 |
Shank3 ranks among the best studied genes associated with autism. Around 1 percent of people with autism lack a working copy of the gene, which is critical for brain development.
Now researchers working with genetically engineered mice have shown that they can reverse repetitive behaviors and social avoidance by switching a disabled SHANK3 gene back on – even in adulthood. The result, they say, hints that the mature brain can at least partially rewire itself.
“In thinking about the development of new therapies for autism, there has long been a question of whether these potential therapies would have much benefit in older individuals,” comments Mathew Pletcher, Autism Speaks vice president, head of genomic discovery. “This study provides further evidence that even in adulthood, changes that address the underlying genetic cause of autism could provide a benefit.”
“This suggests that, even in the adult brain, we have profound plasticity to some degree,” says senior study author Guoping Feng, a neuroscientist at the Massachusetts Institute of Technology (MIT). “There is more and more evidence showing that some of the defects are indeed reversible.”
Vital for brain communication
The Shank3 gene spells out instructions for creating a protein that helps brain nerve cells (neurons) communicate with each other. The Shank3 protein also helps organize hundreds of other proteins involved in coordinating a neuron’s response to incoming signals.
A missing or defective Shank3 gene disrupts communication between neurons and is associated with repetitive behaviors, avoidance of social interaction, anxiety and difficulty with motor coordination.
In previous research, the MIT investigators showed that Shank3 gene defects also reduce the abundance of dendritic spines – small buds on the neurons’ surface that help convey signals between brain cells – in some brain areas. (See photo above.)
Engineering an off/on gene switch
In the new study, the MIT researchers genetically engineered mice to turn off so that their Shank3 gene was turned off during embryonic development but could be turned back on by adding the drug tamoxifen to the mice’s diet. (To be clear, the researchers are not proposing to use tamoxifen as a treatment for autism. Rather, they cleverly engineered their gene knock-out to be reversed by the chemical.)
When the researchers switched on the gene in young adult mice (1 to 4.5 months old), the mice lost their social avoidance and stopped engaging in repetitive behaviors such as compulsive grooming.
Inside the brain, the team found that the density of neuron dendritic spines dramatically increased in brain areas where they had been abnormally reduced. This, they said, demonstrates the adult brain’s plasticity, or ability to “rewire.”
However, the mice’s anxiety and motor coordination symptoms did not disappear. The researchers speculated that these behaviors were tied to early brain connections that are not easily reversed during adulthood.
To test this idea, the researchers tried switching on the Shank3 gene just 20 days after birth. In response, the mice’s anxiety and motor coordination improved.
The research team is now working on identifying the critical periods for the formation of Shank3-controlled brain connections. This, they hope, will help them determine the best time to intervene.
“Some circuits are more plastic than others,” Feng says. “Once we understand which circuits control each behavior and understand what exactly changed at the structural level, we can study what leads to these permanent defects, and how we can prevent them from happening.”
Relevance to people?
How might these findings in genetically engineered mice apply to the 1 percent of people with autism and Shank3 mutations?
In theory, the study authors say, the findings suggest that new gene-editing techniques could someday be used to repair defective Shank3 genes and, so, ease autism symptoms, even in adulthood. However, such techniques are not yet ready for use in humans.
In addition, Feng says that the insights from their study may guide more general approaches to repair or support brain connections to ease some of autism’s most disabling symptoms. | <urn:uuid:4134a145-37fd-42d6-9280-f1085cdf5646> | CC-MAIN-2016-50 | https://www.autismspeaks.org/science/science-news/fixing-disabled-shank3-gene-eases-autism-behaviors-adult-mice | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542657.90/warc/CC-MAIN-20161202170902-00255-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.949378 | 852 | 3.484375 | 3 |
Most people have heard of storing information in "the cloud," but do you know what this means, and if it is even safe?
A cloud is basically a network of servers that offer different functions. Some of these servers allow you to store data while others provide various services. The cloud is made of millions of servers across the globe and most are owned by private or public corporations. Many of those corporations are diligent about security, and you are likely using the cloud whether you know it or not.
Most customers using cloud services have faith that their information will remain safe. But there are some precautions you need to take. Here are some questions to ask any cloud service provider before relying on them to store your business data:
- How often do you clean out dormant accounts?
- Who can access and see my data?
- Where is the data physically kept?
- What level of encryption is in place?
- How is the data backed up?
- What’s in place for physical security?
- Are private keys shared between others if data encryption is being used?
Keeping your company data safe
Over time, a company surely will accumulate data that seems irrelevant, but you shouldn't be so quick to dispose of this data, especially if it is sensitive. This might include data such as customer or client information, employee information, product information or even old employee records.
The truth is, you just never know when you may or may not need this information, so it is best that you keep it. Digital data should be backed up in the cloud. If it’s paper, convert it to digital and store it offsite. Here are some things to remember when doing this:
- All data, even if old or irrelevant, should be backed up.
- Data retention policies should always include an "expiration date" for when this data is no longer useful to you.
- Companies that want to delete old data should understand that deleting files and emptying the recycle bin, or reformatting a drive may not enough to get files off of your computer. Hackers may still be able to access this data.
If you actually want to remove all of the data on a disk, literally break or smash it. To truly delete a file, you must physically destroy the hard drive.
Consultant Robert Siciliano is an expert in personal privacy, security and identity theft prevention. Learn more about Carbonite’s cloud and hybrid backup solutions for small and midsize businesses. | <urn:uuid:8c19d260-a885-4add-bba0-c2701d434c5f> | CC-MAIN-2019-04 | https://smallbiz.carbonite.com/blog/article/2016/02/can-the-cloud-be-trusted/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657555.87/warc/CC-MAIN-20190116154927-20190116180927-00267.warc.gz | en | 0.941785 | 513 | 2.6875 | 3 |
In many industrial applications and machinery, there are pneumatic cylinders used. They are also sometimes known as pneumatic actuators or air cylinders. Working with such industrial machines, it is important to know about pneumatic cylinders, so that you can understand how they work, especially if they break down and there is a need to fix or replace them.
What Is A Pneumatic Cylinder?
A pneumatic cylinder is a type of actuator, which is a device that translates a source of static power into useful output motion, for example, to apply a force. Actuators typically are mechanical devices that convert energy into motion, such as blocking, clamping or ejecting.
Pneumatic cylinders are mechanical devices that use compressed air acting on a piston inside a cylinder to move a load on a linear path. Unlike the hydraulic alternatives, the operating fluid in a pneumatic cylinder is simply air, so there is no risk of leakage and contamination of the surrounding machinery components as compared to the hydraulic cylinders.
There are many styles of pneumatic actuators. Some of the varieties include diaphragm cylinders, rodless cylinders, telescoping cylinders, and through-rod cylinders.
How A Pneumatic Cylinder Works
The most popular type of pneumatic cylinder is made up of a piston and rod, moving within a closed cylinder. There are two subcategories of this cylinder based on how they operate, namely, single acting and double acting.
Single-acting cylinders use one airport which allows compressed air to enter the cylinder, moving the piston to the desired position. A spring is used to return the piston to its original position once air pressure is removed. Double-acting cylinders, on the other hand, have an airport at each end to move the piston back and forth using alternating blasts of pressured air.
Typically within an application, the actuator body is connected to a support frame and the end of the rod is connected to a machine element that is to be moved. An on-off control valve directs compressed air into the port to be extended, while opening the port to be retracted to the atmosphere, creating a pressure difference within the cylinder which, if the load connected to the rod is less than the force created by the force of the pressure differential multiplied by the surface area of the piston, will move the load. The machine element position can be reversed by reversing the compressed airflow.
Pneumatic cylinders help to power other components, but they are rarely seen, unlike other components such as compressors, filters, pressure regulators, lubricators, on-off control valves, and flow controls. All of these components are connected together by a network of piping or tubing (either rigid or flexible), and fittings. It is crucial to take into account the pressure and flow requirements of the cylinders or actuators in an application system when selecting these other components, to ensure the desired performance.
How To Fix A Broken Pneumatic Cylinder
If your pneumatic cylinder has failed, it could be tricky to try to replace it yourself. Your best bet is to consult a professional such as Carter Pump, which offers complete technical support and repair services and would be able to advise you on your best course of action. Contact Carter Pump today for your repair needs! | <urn:uuid:20c325de-df0e-4324-8a6a-e77eae290bcb> | CC-MAIN-2021-31 | https://www.carterpump.com/what-you-need-to-know-about-pneumatic-cylinders/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153491.18/warc/CC-MAIN-20210727202227-20210727232227-00259.warc.gz | en | 0.933821 | 673 | 3.796875 | 4 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.