text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
1.08k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
What are brand guidelines? A core component of any business’ success is having an effective and aesthetically impressive brand. This is created by many components that culminate in order to form the business’ branding material, that will be used in the marketing and may be used in or on products/services of the business itself. In order to maintain a consistent set of branding material that a business can use selectively on different platforms or for products and services, businesses make use of a set of rules and instructions called “brand guidelines” which are made up of a set of determined features of both the visual components of the branding, as well as the personality of the branding itself and its’ approach to public relations. This is made up of many components in which we will be exploring in detail. Tone of Voice The tone of voice is the first vital element of a company’s brand, as it makes up the backbone of the entire feel and atmosphere of the business’ branding and the consumer’s outlook and view of the business. It represents how a brand wants to appear to the audience and dictates what type of approach the business makes in terms of marketing strategies, and public relations with the consumer. Aspects such as syntax in their marketing and PR material, the level of formality in which they advertise and communicate with their audience, and the dictation of their decisions are all represented in the Tone of Voice of the brand itself. The main logo should reflect and complement the Tone of voice of the brand guidelines, with the colour and overall appearance of the logo maintaining the specifications in the tone of voice. The logo should be the main piece of marketing material for any business, as it is the face of the company and will be representing the brand itself. To learn more about the necessity and power of a logo, check out our article “Why is a Logo so important?” for a more in-depth explanation. The main logo and all other branding material elements should all be made in the vector format, allowing maximum compatibility for any situation it may be used for. For a consistent brand image, there needs to be a certain number of predetermined logo variations, that are consistent with the brand’s colour scheme and original logo. These will be used in order to match certain circumstances where the original logo’s appearance looks out of place or does not match. The different types of variants of the mainline logo that a business guideline can include can vary based on the size and scope of the business itself, however, there are a few key variations that are required by almost every business, such as a Negative logo which uses the reverse colour palette of the standard logo, fitting better on a white background for example. A mono logo is also important, as it may be used where only one colour is appropriate to represent the logo. We could spend all day explaining the different types of logo that a brand may use, but for a detailed explanation of the different variants of logos that brands may use, check out our article “Logo Variants and when to use them?”. Depending on the use of the logo, it may need to be a certain shape, namely either a circular logo, or a square-shaped logo, and if the logo itself does not already adhere to one of these shapes, it is important to have a design ready so that these shapes can be used when necessary. There will always be reasons for needing a square or circular shaped logo for your brand guidelines material depending on what platforms and circumstances the logo will be used for. It is important for businesses to plan ahead for this and create an official logo in the shape of a circle or square so that it maintains the same appearance for the brand no matter where the logo is. A circular shaped logo is also vital for places such as social media, where an avatar is required, as well as other circumstances where a circular shaped logo may be more preferable than the original and/or a square-shaped logo. It is important to have these variants premade, as it will prevent incorrect cropping for certain sites and situations. To read in detail about the fundamental components and aspects that make up a logo, check out our article on “How a logo is constructed” for a more detailed explanation. It is important to note that under certain circumstances, a vector image format may not be able to be used, and may need to be converted into a standard image format for uses such as for social media. In this case, the vector image will need to be “rasterized” so that it may be converted from a vector image made up of shapes and splines, into raw pixel data. However, it is also important to remember that this needs to be saved at a considerably high resolution as it may result in a low-quality image. Vector imagery also allows you to import it into a majority of different software types and keep the outlines and shapes intact, which is useful for design software, such as 3D modelling programs and Computer-aided design and drafting (CAD) software, which can then be used to transform the image into other types of media, products, or visuals. To understand more about vector imagery and how it differs from standard image formats, check out our article “What is the difference between Vector and Bitmap images?”. The fundamental logo designs created in the brand guidelines can and will be used throughout every aspect of the brand guidelines process, and will be used in everything from websites, apps, banners, titles, clothing and apparel, advertisements, both physical and digital, and much much more. Due to the vector format that the logo was designed and saved with, it is very transformative, allowing it to be used for all of these different purposes without needing fundamental redesigns and new versions. The different variant types of the logo can also be used if desired on a myriad of types of material. If you want to hear about the usage of the logo and brand guidelines material in general in further detail, once again, check out our article on “Logo Variants and when to use them”. The colour scheme of the logo and branding, in general, is an integral part of the overall mood and aesthetic that the company wants to go for. Bright, vibrant colours may be used to create excitement and interest in younger audiences, or create a more playful theme, whereas darker colours may be used to enforce a more serious tone in the branding of the business. This should match and reflect the “Tone of voice” segment of the brand guidelines so that they go hand in hand with each other. To learn more about the types of colours and what effect they have on the consumer, check out the article on “The importance of colour theory”. Brand guidelines documents typically have no more than two or three main “Corporate colours” in which make up for the fundamental colour scheme of the logo and any other piece of branding material such as website colour, and any other platforms that are used in the marketing of a business. These colours can vary dramatically depending on the type of business and what aesthetic they are going for, which once again ties back to the “Tone of Voice” of the business. The reason a brand should not have too many colours is that there should be a couple of colours that the consumer can associate with the brand, therefore choosing too many colours for the branding can dilute this and make less of an effect. Another crucial guideline that needs to be documented precisely in the brand guidelines is the exact specifications of the different colours the brand will use, including the “Corporate colours” used for the logo and theming of the brand, as well as any other additional colours used for text or complementary colours, such as the exact tone of black and white the brand may use in certain circumstances. These colours can be documented by using the Colour Hex code (eg. #FFFF00 for red), which can be used for design, as well as the Cyan Magenta Yellow Black (or CMYK) colours for use when printing and the colour needs to be exact. A small deviation in colour can ruin the entire colour specific feel of a company, making it seem inconsistent and less professional. Preset colour gradients can also be documented, typically only a single preset, of a linear gradient of two of the corporate colours or complementary colours, in order to be used on certain branding products where appropriate. The final element of the branding material that needs to be documented in the brand guidelines is the text, font and typography of the different pieces of branding material. Fonts are an integral part of the core branding as it reflects the “Tone of Voice” once again and can affect how the consumer perceives the brand. A brand should not use more than 2 or 3 fonts, as, like the colour scheme, it can get diluted and appear inconsistent to the consumer. The fonts can be used for different purposes, such as for headers and titles, which may be more stylised, and another font for use of the main body of text, that is easier to read in sentences. The typeface, font, size of the text, and the line spacing of the text are all values that should be recorded in a brand guidelines document, and may differ depending on the type of branding material it appears on, such as a banner for a social media platform may have larger font sizes than on the logo’s strapline or website banner, and so on. If you need your own professional bespoke branding package tailored to your company, including a concise and effective brand guidelines definitions document, contact us today or check out our Digital Marketing page for more information. Or check out our Graphic Design page for creative 2D content design examples. This will excellently adapt your whole company image, fonts, styles, layout, logo, and colour range that will work perfectly with your logo, website, printed leaflets, business cards and much more. And be sure to check out our YouTube Channel for more interesting and entertaining content.
<urn:uuid:4fcc5fa3-343a-41fb-8730-372c2a81c8a1>
CC-MAIN-2022-21
https://www.paintingpixels.co.uk/what-are-brand-guidelines/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539049.32/warc/CC-MAIN-20220521080921-20220521110921-00113.warc.gz
en
0.936449
2,095
2.640625
3
Inflammatory bowel disease (IBD), consisting of ulcerative colitis and Crohn’s disease, affects an estimated 1.6 million Americans. Its painful symptoms are often hard to treat, and in some cases, the medications can come with just as many side effects as benefits. That’s why it is important for researchers to develop new medications and therapies that provide the most benefit while doing the least amount of harm. One of the newest potential methods of delivering medication to IBD patients is nanotechnology, which utilizes the functions of a given product at an infinitesimal scale. This makes the product smaller, more readily available, and targeted to the specific cell that it needs to treat. Researchers theorize that this will provide better treatments in IBD, with fewer side effects. Ginger and its consumption has been studied and shown to be beneficial for digestion, nausea, pain, and inflammation. The Institute for Biomedical Sciences at Georgia State University studied the use of ginger in its nanoparticle form. The study, “Edible ginger-derived nanoparticles: A novel therapeutic approach for the prevention and treatment of inflammatory bowel disease and colitis-associated cancer,” (a mouthful in itself!) used mouse models to see how these ginger nanoparticles would work in the gastrointestinal tract. Researchers found that ginger nanoparticles given to mice with IBD reduced acute colitis and prevented chronic colitis and colitis-associated cancers. The mechanism in play seems to be that the nanoparticle ginger actually encouraged the survival and proliferation of cells in the lining of the colon, lowered inflammatory proteins and raised inflammation-fighting proteins. The treatment was also shown to be non-toxic and relatively inexpensive. Having a new treatment for IBD that works in a targeted way without producing serious side effects or costing an arm and a leg is big news for the IBD community. However, more studies are needed to determine if the effects seen in the mouse models will also work in human IBD patients. In the meantime, it couldn’t hurt to add some ginger into your diet, as long as you can tolerate it. One of the best ways is to simply grate fresh organic ginger into some of your meals. It pairs beautifully with things like chicken, stir fry, and Indian dishes. For more information on using fresh ginger, check out this list of ideas! Jennifer has a bachelor's degree in dietetics as well as graduate work in public health and nutrition. She has worked with families dealing with digestive disease, asthma and food allergies for the past 12 years. Jennifer also serves on the Board of Directors for Pediatric Adolescent Gastroesophageal Reflux Association (PAGER).
<urn:uuid:5e085415-7201-4880-a72c-ae3e475fcb58>
CC-MAIN-2020-16
https://www.healthcentral.com/article/innovative-ibd-treatments-nanoparticle-ginger
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370521574.59/warc/CC-MAIN-20200404073139-20200404103139-00496.warc.gz
en
0.95337
550
2.953125
3
Do you read aloud to your child every day? After numerous studies have been conducted to measure the importance of reading aloud to children, The American Academy of Pediatrics announced a new policy in telling parents to read aloud to their children daily. Reading, singing, and talking to your child starting at birth has a significant impact on your child’s literacy development. During the first three years of a child’s life their brain is like a sponge, soaking up information and growing at a faster rate than any other time in their lives. That is why it is important to begin conversing with your child to enhance that brain development, and to ultimately set your child up for a lifetime of success. The American Academy of Pediatrics encourages parents to use the five R’s of Early Childhood Education to help boost your child’s development. The five R’s are; - Read together. Again – read aloud to your child EVERY DAY starting at birth. This will help with your child’s literacy development. - Rhyming, playing, talking and singing together. - Routines and regular times for meals, play, and sleep which allows children to know what they can expect and what is expected of them. - Rewards for everyday successes – praise is a great reward! - Relationships that are reciprocal, nurturing and enduring. Reading aloud to your child daily has so many benefits that will help your child enhance their vocabulary and communication skills at a very young age. Use the 5 R’s of Early Childhood Education from The American Academy of Pediatrics to help give you ideas on how to boost your child’s development starting at birth.
<urn:uuid:544b35a8-7648-4056-9415-e5cdeddacd39>
CC-MAIN-2018-51
http://thelittlegymfranchise.eu/blog/2016/02/23/pediatricians-call-for-parent-to-read-to-their-children-everyday
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823618.14/warc/CC-MAIN-20181211104429-20181211125929-00441.warc.gz
en
0.956534
340
3.625
4
Formats and tools - Unit Description - Reconstruct the unit from the xml and display it as an HTML page. - Assessment Tool - an assessor resource that builds a framework for writing an assessment tool - Assessment Template - generate a spreadsheet for marking this unit in a classroom environment. Put student names in the top row and check them off as they demonstrate competenece for each of the unit's elements and performance criteria. - Assessment Matrix - a slightly different format than the assessment template. A spreadsheet with unit names, elements and performance criteria in separate columns. Put assessment names in column headings to track which performance criteria each one covers. Good for ensuring that you've covered every one of the performance criteria with your assessment instrument (all assessement tools together). - Wiki Markup - mark up the unit in a wiki markup codes, ready to copy and paste into a wiki page. The output will work in most wikis but is designed to work particularly well as a Wikiversity learning project. - Evidence Guide - create an evidence guide for workplace assessment and RPL applicants - Competency Mapping Template - Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners. A template for developing assessments for a unit, which will help you to create valid, fair and reliable assessments for the unit, ready to give to trainers and students - Observation Checklist - create an observation checklist for workplace assessment and RPL applicants. This is similar to the evidence guide above, but a little shorter and friendlier on your printer. You will also need to create a seperate Assessor Marking Guide for guidelines on gathering evidence and a list of key points for each activity observed using the unit's range statement, required skills and evidence required (see the unit's html page for details) - Self Assessment Survey - A form for students to assess thier current skill levels against each of the unit's performance criteria. Cut and paste into a web document or print and distribute in hard copy. - Moodle Outcomes - Create a csv file of the unit's performance criteria to import into a moodle course as outcomes, ready to associate with each of your assignments. Here's a quick 'how to' for importing these into moodle 2.x - Registered Training Organisations - Trying to find someone to train or assess you? This link lists all the RTOs that are currently registered to deliver CSCOFM004, 'Protect the safety and welfare of vulnerable offenders'. - Google Links - links to google searches, with filtering in place to maximise the usefulness of the returned results - Reference books for 'Protect the safety and welfare of vulnerable offenders' on fishpond.com.au. This online store has a huge range of books, pretty reasonable prices, free delivery in Australia *and* they give a small commission to ntisthis.com for every purchase, so go nuts :) Elements and Performance Criteria Elements describe the essential outcomes Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section. 1. Maintain current information 1.1 Check all information available on vulnerable offenders. 1.2 Assess the background of the offender for indicators of special needs and factors to consider. 1.3 Confirm the services and support required to ensure that sentencing and assessment requirements will be met. 1.4 Assist offenders to understand the conditions of the correctional environment and court orders and clarify their expectations of the services to be provided. 1.5 Assist offenders to express concerns and issues and respond to these according to level of risk and urgency. 1.6 Prepare reports and documentation of all action and decisions and report all concerns promptly to the relevant support. 1.7 Comply with all policies, procedures and agreed practice of your organisation. 2. Reduce the risks to offenders 2.1 Identify areas of concern and risk in behaviour and the environment and respond to prevent impact on the welfare of all people involved. 2.2 Ensure that the environment is safe and healthy, and maintained according to agreed standards and conditions. 2.3 Observe the offender’s routine to monitor changes in mood and behaviour and potential risks. 2.4 Use interaction with offender to identify behaviour change and any associated risk. 2.5 Monitor movements and transfers of offenders. 2.6 Seek specialist advice and support where needs and concerns are identified. 2.7 Refer offenders to specialist services or programs where available. 2.8 Promote and maintain the rights and responsibilities of the offender.
<urn:uuid:d9a900f4-35aa-4a06-8d2d-0271e5690339>
CC-MAIN-2018-34
http://ntisthis.com/unit.php?code=CSCOFM004
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213689.68/warc/CC-MAIN-20180818134554-20180818154554-00277.warc.gz
en
0.886009
970
2.65625
3
The Fast ForWord program develops and strengthens memory, attention, processing rate, and sequencing—the cognitive skills essential for learning and reading success. The strengthening of these areas result in a wide range of improved critical language and reading skills such as phonological awareness, phonemic awareness, fluency, vocabulary, comprehension, decoding, working memory, syntax, grammar, and other skills necessary to learn how to read. Fast ForWord Reading Assistant PLUS provides ‘real time’ intervention through speech recognition software. Students gain practice and confidence as they read a variety of texts (fiction, non-fiction). The program provides support in reading fluency, vocabulary, as well as comprehension strategies. At SD41, we are very excited to have Fast ForWord across the district at both elementary and secondary sites as a support for Tier 2 and Tier 3 intervention. Canadian National Reference Site – We are pleased to be recognized by Scientific Learning as a Canadian National Reference site. For more information about the program: Wanda Mitchell, Assistant Superintendent Janet Chow, Fast ForWord Coordinator and District Learning Technologies Teacher
<urn:uuid:4e4fdb2b-890f-4ba9-af82-07b141ecb331>
CC-MAIN-2018-51
https://blogs.sd41.bc.ca/fastforword/about-2/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828056.99/warc/CC-MAIN-20181217020710-20181217042710-00172.warc.gz
en
0.932001
222
2.9375
3
In math and geometry, one of the skills that sets the experts apart from the pretenders is the knowledge of tricks and shortcuts. The time you spend learning them pays off in time saved when you solve problems. For example, it’s worthwhile to know two special right triangles that, once you recognize them, are a snap to solve. The two triangles in particular are the 30-60-90 and the 45-45-90. TL;DR (Too Long; Didn't Read) Two special right triangles have internal angles of 30, 60 and 90 degrees, and 45, 45 and 90 degrees. About Right Triangles Triangles are three-sided polygons whose internal angles add up to 180 degrees. The right triangle is a special case in which one of the angles is 90 degrees, so the other two angles by definition must add up to 90. The sine, cosine, tangent and other trigonometric functions provide ways to calculate the internal angles of right triangles as well as the length of their sides. Another indispensable calculating tool for right triangles is the Pythagorean theorem, which states that the square of the length of the hypotenuse is equal to the sum of the squares of the other two sides, or c2 = a2 + b2. Solving Special Right Triangles When you’re working on any kind of right triangle problem, you’re usually given at least one angle and one side and asked to calculate the remaining angles and sides. Using the Pythagorean formula above, you can calculate the length of any side if you’re given the other two. A big advantage of the special right triangles is that the proportions of the lengths of their sides are always the same, so you can find the length of all sides if you’re given only one. Also, if you’re given only one side, and the triangle is special, you can find the values of the angles as well. The 30-60-90 Triangle As the name implies, the 30-60-90 right triangle has internal angles of 30, 60 and 90 degrees. As a consequence, the sides of this triangle fall into the proportions, 1: 2: √3, where 1 and √3 are the lengths of the opposite and adjacent sides and 2 is the hypotenuse. These numbers always go together: if you solve the sides of a right triangle and find they fit the pattern, 1, 2, √3, you know the angles will be 30, 60 and 90 degrees. Likewise, if you’re given one of the angles as 30, you know the other two are 60 and 90, and also that the sides will have the proportions, 1:2:√3. The 45-45-90 Triangle The 45-45-90 triangle works much like the 30-60-90, except that two angles are equal, as are the opposite and adjacent sides. It has internal angles of 45, 45 and 90 degrees. The proportions of the sides of the triangle are 1:1:√2, with the proportion of the hypotenuse being √2. The other two sides are equal in length to each other. If you’re working on a right triangle and one of the internal angles is 45 degrees, you know in an instant that the remaining angle must also be 45 degrees, because the whole triangle must add up to 180 degrees. Triangle Sides and Proportions When solving the two special right triangles, keep in mind that it’s the proportions of the sides that matter, not their measurement in absolute terms. For example, a triangle has sides that measure 1 foot, and 1 foot, and √2 feet, so you know it’s a 45-45-90 triangle and has internal angles of 45, 45, and 90 degrees. But what do you do with a right triangle whose sides measure √17 feet and √17 feet? The proportions of the sides are the key. Since the two sides are identical, the proportion is 1:1 with one another, and because it’s a right triangle, the proportion of the hypotenuse is 1:√2 with either of the other sides. The equal proportions tip you off that the sides are 1, 1, √2, which belongs only to the 45-45-90 special triangle. To find the hypotenuse, multiply √17 by √2 to get √34 feet.
<urn:uuid:85e89709-59a0-49df-b6fa-25fbbc876b7b>
CC-MAIN-2020-16
https://sciencing.com/how-to-solve-special-right-triangles-13712181.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371662966.69/warc/CC-MAIN-20200406231617-20200407022117-00070.warc.gz
en
0.907898
931
3.640625
4
Microbes in household dust help degrade potentially harmful plasticizer chemicals! Thanks to Ashleigh Bope for her contribution! Microbe of the episode Microbe of the episode: Rosa rugosa leaf distortion virus Using bacteria to protect roads from deicer deterioration Modern life and technology comes with modern challenges, including exposure to chemicals in building materials and such that humans didn't encounter much before the last few generations. Phthalate esters, found in PVC and other materials, can accumulate in homes and cause some problems, especially in children. Modern life is also new to microbes, but they are very adaptable and versatile. In this study, microbes in household dust show some ability to break down the phthalates over time. Whether this activity is significant and beneficial to residents remains to be discovered. Other interesting stories Subscribe (free) on Apple Podcasts, Google Podcasts, Android, RSS, or by email. Also available on the ASM Podcast Network app. Support the show at Patreon. Follow the show on Twitter and Facebook.
<urn:uuid:6ccffbec-057f-490d-bed0-4d1c4b26250a>
CC-MAIN-2022-40
https://asm.org/Podcasts/BacterioFiles/Episodes/Floor-Fungi-Fracture-Phthalates-BacterioFiles-388
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334974.57/warc/CC-MAIN-20220927002241-20220927032241-00729.warc.gz
en
0.915137
226
2.9375
3
Modern humans first emerged about 100,000 years ago. For the next 99,800 years or so, nothing happened. Well, not quite nothing. There were wars, political intrigue, the invention of agriculture -- but none of that stuff had much effect on the quality of people's lives. Almost everyone lived on the modern equivalent of $400 to $600 a year, just above the subsistence level. True, there were always tiny aristocracies who lived far better, but numerically they were quite insignificant. Then -- just a couple of hundred years ago, maybe 10 generations -- people started getting richer. And richer and richer still. Per capita income, at least in the West, began to grow at the unprecedented rate of about three quarters of a percent per year. A couple of decades later, the same thing was happening around the world. Then it got even better. By the 20th century, per capita real incomes, that is, incomes adjusted for inflation, were growing at 1.5% per year, on average, and for the past half century they've been growing at about 2.3%. If you're earning a modest middle-class income of $50,000 a year, and if you expect your children, 25 years from now, to occupy that same modest rung on the economic ladder, then with a 2.3% growth rate, they'll be earning the inflation-adjusted equivalent of $89,000 a year. Their children, another 25 years down the line, will earn $158,000 a year. Tuesday, June 12, 2007 A Brief History of Economic Time I am a few days behind on this, but this excellent editorial in the WSJ by Steven Landsburg deserves to be pointed out. Landsburg, who wrote my college micro textbook, is one of the best popular economists out there, although Levitt gets more press. A choice excerpt:
<urn:uuid:1a818373-180e-4aaf-9920-66200776babb>
CC-MAIN-2018-13
http://thechiefbrief.blogspot.com/2007/06/brief-history-of-economic-time.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647649.70/warc/CC-MAIN-20180321121805-20180321141805-00736.warc.gz
en
0.96738
386
2.921875
3
Anatomy of Macular Degeneration Age-related macular degeneration, commonly referred to as AMD, is the leading cause of vision loss in people over the age of 60 in the United States. AMD affects the macula, the central part of the retina responsible for sharp, central vision, most colored vision, fine details that are seen straight ahead and sending visual signals to the brain by way of the photoreceptor cells contained in the macula. The anatomy of the macula includes the fovea, the pit or depression of the macula, that provides the greatest visual acuity and the choroid, the layer of the macula that contains blood cells, that nourishes the retina. Bruch’s membrane is positioned between these layers and provides support to the retina. The retinal pigmented epithelium protects the retina, removes waste products and prevents new blood vessels from growing into the retina. The health of the eye and the ability to see clearly are intricately linked to light and how the eyes process the light that enters through the cornea to the lens. The light focuses on the retina located at the back of the eye. The retina uses light-sensing cells known as photoreceptors to signal images to the brain via the optic nerve. The macula is the part of the retina that contains the greatest number of these photoreceptor cells that provide clear central vision. AMD is the result of deterioration to the macula. The anatomy of a healthy eye includes a properly functioning cornea, pupil, iris, lens, optic nerve, retina and macula. When the cells contained in the macula deteriorate, images are not received correctly causing dark spots in central vision, low vision, dull or washed-out colors, missing letters or numbers when reading, and poor-quality vision. Although the specific cause of macular degeneration is inconclusive, risk factors include family history of AMD, genetics, age, smoking, obesity, high blood pressure, and diet. The anatomy of macular degeneration can be broken down into 4 stages: sub-clinical AMD, early AMD, intermediate AMD, and late AMD. In both the sub-clinical and early stage of AMD most patients are unaware they have it but the physical changes of the macula that include the loss of dark adaptation and the presence of drusen, yellow deposits beneath the retina, are developing. By the time intermediate AMD begins, patients may notice symptoms such as change in vision or vision loss. By late-stage AMD, vision loss has become noticeable due to either type of AMD, wet AMD or dry AMD, also known as geographic atrophy. Research is still on-going for a cure and treatment options for macular degeneration. The best patient is one who is educated about changes to their vision and the best course of treatments for preserving vision and adapting to the best quality of life possible when macular degeneration becomes apparent. For a comprehensive eye exam with Associated Retina Consultants to determine if you have macular degeneration, contact our office today by 602-242-4928 or WEBSITE.
<urn:uuid:8c2e40ae-f87b-42c9-b470-05ff3ba943bb>
CC-MAIN-2023-14
https://associatedretinaconsultants.com/anatomy-of-macular-degeneration/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945333.53/warc/CC-MAIN-20230325130029-20230325160029-00209.warc.gz
en
0.917926
637
3.625
4
This project involves the analysis of a new data set for manure characteristics from open lot beef systems demonstrating both average characteristics and factors contribution to variability in manure characteristics among these systems. Defining the characteristics and quantities of harvested manure and runoff from open earthen lot animal systems is critical to planning storage requirements, land requirements for nutrient utilization, land application rates, and logistical issues, such as equipment and labor requirements. Accuracy of these estimates are critical to planning processes required by federal and state permitting programs. Poor estimates can lead to discharges that result in court action and fines, neighbor nuisance complaints, and surface and ground water degradation. Planning procedures have historically relied upon standard values published by NRCS (Stettler et al., 2008), MWPS (Lorimor et al., 2000), and ASABE (2014) for average characteristics. What Did We Do? A large data set of analyses from manure samples collected over a 15-year period from 444 independent cattle feedlot pens at a single eastern Nebraska research facility was reviewed to provide insight to the degree of variability in observed manure characteristics and to investigate the factors influencing this variability. No previous efforts to define these characteristics have included data gathered over such a wide range of dietary strategies and weather conditions. This exclusive research data set is expected to provide new insights regarding influential factors affecting characteristics of manure and runoff harvested from open lot beef systems. The objective of this paper is to share a preliminary summary of findings based upon a review of this data set. What Have We Learned? A review of this unique data set reveals several important preliminary observations. Standard values reported by ASABE and MWPS for beef manure characteristics in open lot systems are relatively poor indicators of the significant variability that is observed within open lot feeding systems. Our data set reveals significant differences between manure characteristics as a function of feeding period (Table 1) and substantial variability within feeding period, as illustrated by the large coefficients of variation for individual characteristics. Differences in winter and summer conditions influence the characteristics and quantities of solids, organic matter, and nutrients in the harvested manure. The timing of the feeding period has substantial influence on observed differences in nitrogen loss and nitrogen in manure (Figure 1). Nitrogen recovery for the warmer summer feeding periods averaged 51 and 6 grams/head/day in the manure and runoff, respectively, with losses estimated to be 155 grams/head/day. Similarly, nitrogen recovery in manure and runoff for the winter feeding period was 90 and 4 grams/head/day, respectively, with losses estimated at 92 grams/head/day (Figure 1 and Koelsch, et al., 2018). In addition, differences in weather and pen conditions during and following winter and summer feeding periods impact manure moisture content and the mixing of inorganics with manure (Table 1). |Table 1. Characteristics of manure collected from 216 and 228 cattle feedlot pens during Summer and Winter feeding periods, respectively1.| |University of Nebraska Feedlot in East Central Nebraska||Standard Values| |Total Manure (wet basis), kg/hd/d||9.3||99%||13.1||43%||7.5||7.9| |OM %||24%||28%||25.3%||41%||30%||is not||50%| |DM = dry matter; OM = organic matter (or volatile solids) 1 Summer = April to October feeding period, Winter = November to May feeding period 2 Coefficient of variation, % 3 Unsurfaced lot in dry climate with annual manure removal. Dietary concentration of nutrients was observed to influence the harvested manure P content (Figure 2) but produce minimal impact on harvested manure N content (not shown). Diet was an important predictor in observed N losses, especially during the summer feeding period. However, its limited value for predicting harvested manure N and moderate value for predicting harvesting manure P suggests that other factors such as weather and management may be influential in determining N and P recovered (Koelsch, et al., 2018). Significant variability exists in the quantity of total solids of manure harvested with a factor of 10 difference between the observed low and high values when compared on a mass per finished head basis (note large CVs in Table 1). This variability has significant influence on quality of the manure collected as represented by organic matter, ash content, and moisture content. Although individual experimental trials comparing practices to increase organic matter on the feedlot surface have demonstrated some benefit to reducing nitrogen losses, the overall data set does not demonstrate value from higher pen surface organic matter for conservation of N in the manure (Koelsch, et al., 2018). However, higher organic matter manure is correlated to improved nitrogen concentration in the manure suggesting a higher value for the manure (Figure 3). It is typically recommended that manure management planning should be based upon unique analysis for manure characteristics representative of the manure being applied. The large variability in harvested manure from open lot beef systems observed in this study further confirms the importance of this recommendation. The influence of weather on the manure and the management challenges of collecting manure from these systems adds to the complexity of predicting manure characteristics. In addition, standard reporting methods such as ASABE should consider reporting of separate standard values based upon time of the year feeding and/or manure collection period. This review of beef manure characteristics over a 15 year period further documents the challenge of planning based upon typical or standard value for open lot beef manure. The compilation and analysis of the manure and runoff data from these 444 independent measure of feedlot manure characteristics is a part of an undergraduate student research experience. Final review and analysis of this data will be completed by summer 2019 with the data published at a later time. The authors will explore the value of this data for adjusting beef manure characteristics for ASABE’s Standard (ASABE, 2014). ASABE. 2014. ASAE D384.2 MAR2005 (R2014): Manure Production and Characteristics. ASABE, St. Joseph, Ml. 32 pages. Koelsch, R. , G. Erickson2, M. Homolka2, M. Luebbe. 2018. redicting Manure Nitrogen, Phosphorus, and Carbon Characteristics of Beef Open Lot Systems. Presented at the 2018 ASABE Annual International Meeting. 15 pages. Lorimor, J., W. Powers, and A. Sutton. 2000. Manure characteristics. Manure Management Systems Series MWPS-18. Midwest Plan Service. Ames Iowa: Iowa State University. Stettler, D., C. Zuller, D. Hickman. 2008. Agricultural Waste Characteristics. Chapter 4 of Part 651, NRCS Agricultural Waste Management Field Handbook. pages 4-1 to 4-32. Richard (Rick) Koelsch, Professor of Biological Systems Engineering and Animal Science, University of Nebraska-Lincoln Megan Homolka, student, and Galen Erickson Professor of Animal Science, University of Nebraska-Lincoln Koelsch, R. , G. Erickson2, M. Homolka2, M. Luebbe. 2018. Predicting Manure Nitrogen, Phosphorus, and Carbon Characteristics of Beef Open Lot Systems. Presented at the 2018 ASABE Annual International Meeting. 15 pages. The authors are solely responsible for the content of these proceedings. The technical information does not necessarily reflect the official position of the sponsoring agencies or institutions represented by planning committee members, and inclusion and distribution herein does not constitute an endorsement of views expressed by the same. Printed materials included herein are not refereed publications. Citations should appear as follows. EXAMPLE: Authors. 2019. Title of presentation. Waste to Worth. Minneapolis, MN. April 22-26, 2019. URL of this page. Accessed on: today’s date.
<urn:uuid:85526981-0714-4933-8053-165573f5aceb>
CC-MAIN-2021-10
https://lpelc.org/predicting-manure-nitrogen-and-phosphorus-characteristics-of-beef-open-lot-systems/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178381803.98/warc/CC-MAIN-20210308021603-20210308051603-00615.warc.gz
en
0.882906
1,612
2.9375
3
Science Journal allows you to gather data from the world around you. It uses sensors to measure your environment, like light and sound, so you can graph your data, record your experiments, and organize your questions and ideas. It’s the lab notebook you always have with you. This sketch is used to make an Arduino that has Bluetooth Low Energy (BLE) capabilities (such as the RedBear BLEND board and the Arduino 101) send data from its pins to Science Journal. The arduinoUno firmware is provided for reference, but does not work because of limited RAM on the Uno. Source: For Developers
<urn:uuid:4335aa75-b477-465a-a9cd-82fa9d4de632>
CC-MAIN-2020-05
http://guillaumeisabelle.com/blogging/category/developer/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594603.8/warc/CC-MAIN-20200119122744-20200119150744-00079.warc.gz
en
0.91794
127
2.828125
3
And to round things out there are also breadboards, where you can stick in components without soldering and there are modules, which are usually just one Chip with minimal components added and some pins so you can stich them easily into a breadboard. Breadboard (from WikiPedia Module (from Adafruit.com If you start out, get a breadboard and some jumper wires. You cann connect the sockets on your Arduino to one of the holes on the bread board and tinker around to your heart's desire. Cricuits on Breadboards are a very temporary affair and don't hold up well to permanent use. All those jumper wires get in the way easily. Prototype boards are already more permanent and useful if you have your circuit ready to be used in reality but it's not worth creating a circuit board. Shields are designed for more permanent use and often offer all necessary functions for an application (eg Motor drivers, GPS). If you need that function and don't want to reinvent the wheel, they're very useful, but in my opinion they're too expensive to buy without an application in mind. Modules are usually easy to use single function things to add one function. They can be added to breadboards and prototype boards just like other electronic components. Often modules are created to allow easy use of chips only available as SMD components.
<urn:uuid:c16033d0-87fa-4be9-b183-7ccb873b0497>
CC-MAIN-2014-23
http://forum.arduino.cc/index.php?topic=24184.msg183235
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510265454.51/warc/CC-MAIN-20140728011745-00064-ip-10-146-231-18.ec2.internal.warc.gz
en
0.953794
281
2.578125
3
Most of us were taught to get a jump on spring by putting the garden “to bed” in the fall. We’re compelled to cut every perennial down to the ground, yank annuals out by their roots, and rake leaves off beds and lawns. It turns out that for many of us tidiness is overrated, and most of the preseason prep can—and should—wait until spring. Traditional methods are changing because our priorities have changed: aesthetics are tied to a higher purpose. Gardens, as carefully designed, maintained, and floriferous as they may be, are also living ecosystems, providing habitat and sustenance to all manner of wildlife. Many gardeners have become naturalists and stewards, more likely to measure success by the number of species of pollinators buzzing around their combinations than by how great those plants look together. To fully accommodate nature’s workforce, we need to take animal life cycles into account. Many insects, bees, butterflies, moths, and spiders overwinter as adults, eggs, or cocooned pupae. Some need the insulating shelter of leaf litter; others attach to stems and twigs. Birds too will use the plants in our gardens as feeding stations, roosting sites, and as cover from predators. So we should redirect the desire for tidiness into designs that incorporate the utility, as well as the beauty, of stems and seed heads left standing to catch the frost and stick out of the snow. Allow sculptural seed heads to form on purple coneflower (Echinacea purpurea cvs., Zones 3–8), brown-eyed Susans (Rudbeckia triloba, Zones 4–8), Japanese anemone (Anemone tomentosa cvs., Zones 4–7), and sea holly (Eryngium planum, Zones 5–9). Some will feed the birds, some will self-sow, and all will provide winter interest. Given the insulating protection of their own stems, along with a thick layer of mulch, some tender “annuals” such as hummingbird sage (Salvia guaranitica, Zones 7–10) and pineapple sage (S. elegans, Zones 7–11) may survive winter in the ground. If they don’t come back, their roots will have started breaking down, adding organic matter to the soil. Leave the leaves. Add shredded leaves to garden beds to act as shelter for hibernating insects and as insulating mulch around the crowns of perennials. Leaves may also be mowed onto the lawn to break down and improve the soil. Of course, not all wildlife is welcome, and not all plants are winter-worthy. Voles, which feast on woody plants, perennials, and grasses at ground level, are somewhat discouraged by the exposure of old-school tidiness. If you’ve noticed munching, clear leaves and mulch away from favorite plants. Also, you should cut down perennials and annuals that have been damaged by fungal infections. And always clean debris out from under diseased roses to prevent the spread of blackspot. Experiment. Let some of the garden stay up this winter instead of putting it to bed, and see for yourself how much beauty there is in the protection and sustenance it provides. —Kristin Green is the author of Plantiful: Start Small, Grow Big With 150 Plants That Spread, Self-sow, and Overwinter. She gardens in Bristol, Rhode Island.
<urn:uuid:1ad4f862-e775-49f9-9d01-81f52c9426bd>
CC-MAIN-2022-40
https://www.finegardening.com/article/dont-put-the-garden-to-bed-for-the-season
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338244.64/warc/CC-MAIN-20221007175237-20221007205237-00182.warc.gz
en
0.945144
743
2.828125
3
Approved but not-so-safe pesticides August 7, 2008 The Center for Public Integrity (CPI) has discovered that two groups of common pesticides, generally considered to be “safer” chemicals, are responsible for one quarter of reported human pesticide poisonings, based on the U.S. Environmental Protection Agency’s (EPA) own data. CPI spent several years demanding the release of the data through repeated Freedom of Information Act (FOIA) requests. A trade association representing the interests of the consumer specialty products industry denounced the report. Perils of the New Pesticides, analyzes the number of reported human health problems, including severe reactions and deaths, linked to two families of pesticides, pyrethrins and pyrethroids, over the past decade. Pyrethrins are a class of chemicals derived from chrysanthemum plants. Pyrethroids have similar properties but are created synthetically. Pesticides made with these chemicals are found in thousands of common household products such as flea and tick poisons, ant and roach killers, delousing shampoos, lawn-care products, and carpet sprays. The data reveal that reported incidents of fatal, major, and moderate exposures to the two classes of pesticides increased 300 percent since 1998. There were 1,030 incidents reported to EPA in 2007 alone, up significantly from the 261 reported in 1998. Pyrethrins and pyrethroids accounted for more incidents than any other class of pesticide over the last five years. The EPA’s reporting system receives up to 6,000 reports of pesticide exposures annually. The CPI report concludes that the increase in reported health problems may be a result of increased use and popularity of pyrethrins and pyrethroids following the ban on residential use of another popular group of chemicals, organophosphates, which are thought to be more toxic. However, the EPA data show at least 50 deaths attributed to these supposedly safer classes of pesticides since 1992. Similar data provided by the American Association of Poison Control Centers were compared to the results. The association’s data also show a large increase in reported health problems linked to pyrethroid and pyrethrin exposure over the last decade, with instances increasing 63 percent from 1998 to 2006. Additional data from the association show that the number of hospital visits resulting from pyrethrin and pyrethroid exposures is increasing and approaching the level caused by organophosphate exposures at their peak in the early 1990s, according to the CPI report. Medical studies have suggested that people with ragweed allergies and those with asthma may be especially sensitive to developing skin or respiratory disorders following exposure to pyrethrins and pyrethroids. Children and infants are also more susceptible than adults to health problems, including neurological disorders. Read the full report here.
<urn:uuid:e497913b-4a62-447a-82d7-5223b46a449b>
CC-MAIN-2016-40
https://fooddemocracy.wordpress.com/2008/08/07/not-so-safe-approved-pesticides/
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738663247.66/warc/CC-MAIN-20160924173743-00173-ip-10-143-35-109.ec2.internal.warc.gz
en
0.955484
582
2.703125
3
A flyby perspective By Jonathan Mark One of the stranger events that happened near the end of the 20th Century was when NASA conducted two “flybys” around Venus on a journey towards Saturn. A flyby is a maneuver in friction-less space using gravity from a planet for a slingshot-acceleration effect. The strange part regarding “Cassini” was that it had 72.3 pounds of highly radioactive plutonium on board, and was scheduled for an Earth-flyby on August 17/18, 1999, while traveling at around 10 miles per second. Fortunately there was no inadvertent collision with Earth’s atmosphere, but why would NASA risk life on Earth while exploring the solar system? Karl Grossman, author of “The Wrong Stuff: The US Space Program’s Nuclear Threat To Our Planet,” answered my question. He pointed to the U.S. Air Force report, “New World Vistas: Air and Space Power for The 2lst Century” where it stated “In the next two decades, new technologies will allow the fielding of space-based weapons of devastating effectiveness to be used to deliver energy and mass as force projection in tactical and strategic conflict. These advances will enable lasers with reasonable mass and cost to effect very many kills.” However, the report notes, “power limitations impose restrictions” on such weapons systems, making them “relatively unfeasible. A natural technology to enable high power is nuclear power in space.” In response to the insanity of a NASA-plutonium Earth-flyby, I asked author and Professor Karl Grossman if he could help me find an activist-webmaster. I was introduced to Jo McIntire who had helped those protesting Cassini’s launch at Cape Canaveral in 1997 was a person to work with. By December 1997 we launched the Action Site to Stop Cassini Earth Flyby web site. Our “Flyby: campaign had more than a year and a half to accomplish our mission, to stop or at least expose the dangerous Earth-flyby. Just after the flyby in 1999, Michael Muller graciously helped me set up FlybyNews.com where I could operate it independently for news in the post Cassini flyby era. In the last ten years Flyby News (FN) has covered US election fraud, global warming, uranium munitions, low frequency active sonar (harming whales and dolphins), new energy technologies in development, Middle East information and peace initiatives, human rights violations such as in the case of Leonard Peltier, Lori Berenson, Mumia Abu-Jamal, and others. However the initial crucial campaign was to maintain the authority of the 1972 Anti-Ballistic Missile Treaty to stop the arms race from entering outer space. September 11, 2001 suddenly put everything into jeopardy. The patriotic fervor, the fear, the anger, a neurosis fueled by media betrayal, enabled George W. Bush to override sensibilities in Congress. The Anthrax letters sent to Democrat Party leaders and to major media networks obviously contained a threatening message. Yet, when it became known that the Anthrax originated from an US military base, publicity died down. Within months after 9/11 crimes, with Congress in his palm, Bush terminated the ABM Treaty. The Neoconservative think-tank group, “The Project for a New American Century,” planned or were hoping for such an event like what had happened on September 11, 2001; in their document, “Rebuilding America’s Defenses,” it states: “Further, the process of transformation, even if it brings revolutionary change, is likely to be a long one, absent some catastrophic and catalyzing event–like a new Pearl Harbor.” On November 11, 2001 at the United Nations, George Bush, Jr. said almost threateningly, “Let us never tolerate outrageous conspiracy theories concerning the attacks of September the 11th; malicious lies that attempt to shift the blame away from the terrorists, themselves, away from the guilty.” Could George Orwell have said it better, “War Is Peace?” One lie led to another, and weapons of mass destruction, WMDs became the big one to justify a world destabilizing attack on Iraq. President Dwight D. Eisenhower might have warned us about the dangers of the military-industrial complex, but he could not have imagined the scope of betrayal and deceit following the crimes of September 11, 2001. In 1953 when being encouraged to engage in a preventive war against the Soviet Union, President Eisenhower flatly denounced it, saying, “All of us have heard this term `preventive war’ since the earliest days of Hitler.” He added, “I don’t believe there is such a thing, and, frankly, I wouldn’t even listen to anyone seriously that came in and talked about such a thing.” Yet 9/11 was used for ‘preemptive’ undeclared wars while covering up the truth of what really happened. The dark forces seemed content in increasing global destabilization, crimes against humanity, environmental destruction, and financial fraudulent policies. The path for a Neocon global dominant military agenda, and loss of citizen civil rights proceeded on all fronts, including US terrorism-torture policies. With so many dire issues, uniting a justice and peace movement is no easy task. The mind-control impact of 9/11 is more than many peace activists can handle. The consequences of such a cover-up is simply frightening for most anyone. Yet, integrity, freedom, truth, science, and civilization hang in the balance. As Online Journal contributor, Kevin Quirk, entitled one of his articles, “More than a movement – the search for 9/11 truth is an awakening.” Such an awakening can have dire consequences, which is why FN supports a truth and reconciliation pathway toward a nonviolent future. But the truth should disclose more than just about recent years. Citizens need to know about the truth of assassinations, the falsehood of corporate human rights, the dissolution of the US national banking system for an international crooked one, and other policies of betrayal to the US Constitution. Truth and Reconciliation was successful in South Africa for its political transformation. Of course there is potential for violence from the truth coming out, but also for reclaiming a lost USA Republic, and for a commitment to peace and honor that could lead our world to abolishing all weapons of mass destruction.
<urn:uuid:2974db9d-93a4-4db3-bb36-9bee6ac2b34a>
CC-MAIN-2022-05
https://flybynews.wordpress.com/2011/02/25/space-for-peace-and-september-11/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305494.6/warc/CC-MAIN-20220128104113-20220128134113-00103.warc.gz
en
0.944979
1,347
2.796875
3
Also known as: balloon assisted enteroscopy, single-balloon endoscopy. What is single-balloon enteroscopy? Enteroscopy is a procedure used to examine the intestines using an endoscope, which is a thin, flexible tube with a light and a camera on the end. With single-balloon enteroscopy, a second tube placed over the first one has a balloon that widens the intestines, allowing the endoscope to advance further into the intestines. What happens during the procedure? The patient is given medication to relax and then sleep. Once the patient is sleeping, the endoscope is inserted through the mouth and into the intestines. Then the overtube with the balloon is inflated in order to allow the endoscope to advance further into the intestines. The procedure is repeated as necessary to allow the endoscope to advance through the intestines. Is any special preparation needed? You may need to avoid food, drink and certain medication before single-balloon enteroscopy. You may also need to completely empty the colon by using an enema or other means prior to the procedure. What are the risk factors? Bleeding, infection or damage to the intestines or surrounding organs are possible risks of single-balloon enteroscopy. Reviewed by: Carrie Firestone Baum, MD This page was last updated on: 7/4/2018 11:28:27 AM
<urn:uuid:8a3d92f9-4aec-4697-8d3f-0a69318ffadd>
CC-MAIN-2019-22
https://www.nicklauschildrens.org/treatments/digestive/single-balloon-enteroscopy
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232254253.31/warc/CC-MAIN-20190519061520-20190519083520-00091.warc.gz
en
0.91505
297
3.390625
3
The LRN Celebrates 20 Years! 2019 marks 20 years since the Laboratory Response Network (LRN) was formed. The network is known for its responses to all threats — from anthrax to Zika — with both its chemical components playing a key role in keeping the public safe. For example, the LRN for Chemical Threats Preparedness (LRN-C) is currently being leveraged to respond to the opioid epidemic in the US. Learn more about the LRN's impact over the last 20 years. About the LRN The LRN is the nation's laboratory emergency response system for biological, chemical and radiological threats and other public emergencies such as natural disasters. Founded in 1999 by APHL, CDC and the FBI to improve US readiness for bioterrorism, the LRN remains a valuable resource for law enforcement and public health officials. It links local, state and federal public health laboratories with sentinel clinical, food, veterinary, environmental and agricultural laboratories; and military and international laboratory centers. Over time, the US Department of Defense has become an LRN stakeholder, joining in strategic planning and supporting LRN biological response activities, notably the 2014 response to the outbreak of Ebola. APHL Continues to Support the LRN APHL supports the LRN through training, quality improvement initiatives, surge capacity and exercise planning, policy development and fostering of partnerships. The association supports the following activities: Plans and convenes the biennial LRN National Meeting to provide LRN stakeholders with current information on preparedness collaborations and emerging technologies, share model practices, discuss solutions to ongoing challenges, address training needs and explore the future of the LRN to stay ahead of threats Assists in planning the biannual LRN Conventional Methods courses, training 32 laboratorians per year in classical microbiological detection techniques Assists laboratories in equipment procurement for various multi-center validation studies to improve technology in the LRN Convenes biannual in-person meetings of the LRN Operational Workgroup and the LRN Joint Leadership Committee to discuss strategic planning and operations. LRN-B: Tiered and Integrated for Rapid Detection, Response The LRN for Biological Threats Preparedness (LRN-B) is organized as a tiered pyramid of sentinel clinical, reference and national laboratories. These laboratories are integrated into a single network for rapid detection and response to threats. In 2014, the reference tier was further categorized into reference, standard and advanced laboratories based on capabilities. This reconfiguration: Further standardized testing capabilities Supported quality improvements initiatives Expanded existing capabilities for biothreat agent and emerging infectious disease testing Learn more about the impact and successes of the LRN-B. Federal Investment in LRN In the years following the LRN’s founding, significant federal and state investment in public health preparedness strengthened laboratory capability and capacity to respond to health threats, both man-made and naturally occurring. This investment proved invaluable in responding to Hurricanes Katrina and Sandy and other natural disasters. It also readied public health laboratories to respond to the nationwide outbreak of 2009 H1N1 influenza and to emerging diseases such as Middle East Respiratory Syndrome (MERS) and Ebola. For more information, contact Tyler Wolford, MS, senior specialist, Laboratory Response Network at
<urn:uuid:2ed5fbad-8dfa-4bdc-b5b4-7cefb3264230>
CC-MAIN-2019-39
https://www.aphl.org/programs/preparedness/Pages/LRN.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575844.94/warc/CC-MAIN-20190923002147-20190923024147-00101.warc.gz
en
0.910183
687
2.703125
3
A national study by researchers at the National Center for Children in Poverty (NCCP), Columbia University’s Mailman School of Public Health, shows an uneven picture of states’ use of Medicaid to help families with young children gain access to mental health services. [Photo: Dr. Sheila Smith] A large number– as many as 46 states– use Medicaid to cover several important mental health services for low-income young children, including screening for social-emotional problems and mental health treatment in home, community and pediatric settings. But other key services were covered by far fewer states. Findings from NCCP’s latest brief, “Using Medicaid to Help Young Children and Parents Access Mental Health Services,” are published online here. Only 12 states provide Medicaid coverage for parenting programs that address young children’s mental health needs, while 9 states pay for maternal depression screening under the child’s Medicaid during a well-child visit. “States paying for maternal depression screening under the child’s Medicaid are wisely investing in children’s healthy development by helping their mothers obtain screening and referrals for depression,” said Dr. Sheila Smith, NCCP’s Early Childhood Director and lead author. “Young children’s behavioral health and development greatly depend on their mother’s mental health, and early support for children’s behavioral health is critical to later school success.” The researchers conducted telephone interviews with an administrator identified through contacts with each state’s Medicaid Director’s office. In total, 49 states and the District of Columbia participated in the survey which asked about coverage of key Medicaid services for young children (age 0-6) and maternal depression screening as well as policies related to eligibility and quality. The survey also found that the majority of states placed few restrictions on the delivery of mental health services to young children. Most states do not limit the number of treatment visits or the type of treatment models that are used. Dr. Smith noted that a lack of restrictions on the number of treatment visits can help children obtain needed amounts of treatment. But the restrictions imposed by the few states that require providers to use treatments found to be effective in research may benefit children by promoting high quality practices. More in-depth discussions with administrators in selected states identified several promising policies and initiatives. These include a new “at-risk” code in Oregon that allows young children to receive Medicaid-covered mental health services before they have a full-blown mental health disorder; Medicaid coverage in Oregon and Michigan for evidence-based parenting programs that can help parents learn parenting practices that promote a positive parent-child relationship and address challenging child behavior; and extensive training and support for pediatricians in Minnesota who want to conduct maternal depression screening during well-child visits and respond appropriately when the screen indicates that the mother needs further evaluation and support. “Policymakers and advocates can use the findings to examine actual services in their states and explore options for improving access and effectiveness through their Medicaid programs,” observed Dr. Smith.
<urn:uuid:5384a2c4-39c2-405b-9f65-2d43a601dbe4>
CC-MAIN-2022-27
https://aspph.org/columbias-national-center-for-children-in-poverty-shows-medicaid-covers-childrens-key-mental-health-services-but-gaps-remain/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036099.6/warc/CC-MAIN-20220625190306-20220625220306-00059.warc.gz
en
0.948828
630
2.84375
3
Honey Lemon Tea iPhoneOgraphy – 16 May 2016 (Day 137/366) Tea is an aromatic beverage commonly prepared by pouring hot or boiling water over cured leaves of the Camellia sinensis, an evergreen shrub native to Asia. After water, it is the most widely consumed drink in the world. There are many different types of tea; some teas, like Darjeeling and Chinese greens, have a cooling, slightly bitter, and astringent flavor, while others have vastly different profiles that include sweet, nutty, floral or grassy notes. Tea originated in southwestern China, where it was used as a medicinal drink. It was popularized as a recreational drink during the Chinese Tang Dynasty, and tea drinking spread to other East Asian countries. Portuguese priests and merchants introduced it to the West during the 16th century. During the 17th century, drinking tea became fashionable among Britons, who started large-scale production and commercialization of the plant in India to bypass a Chinese monopoly at that time. The phrase herbal tea usually refers to infusions of fruit or herbs made without the tea plant, such as steeps of rosehip, chamomile, or rooibos. These are also known as tisanes or herbal infusions to distinguish them from “tea” as it is commonly construed.
<urn:uuid:a4de6125-9d53-4366-8634-42ca48449cee>
CC-MAIN-2019-13
https://theinspirationshots.com/2016/05/16/honey-lemon-tea/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202326.46/warc/CC-MAIN-20190320105319-20190320131319-00411.warc.gz
en
0.970515
277
2.640625
3
Several years ago a California state legislator made news with a gimmick. He invited school children in his Bay Area district to enter a contest through his office. Each entrant would draft a desired state law. The winning entry would be submitted to the state legislature for a vote. When I first heard of the contest I thought it was silly. But the winning entry was brilliant. It required that antifreeze sold in California be made to taste bitter. The bill was submitted to the legislature, where it passed. Later it was signed into law. The result has been a dramatic decrease in antifreeze toxicity in pets (and, I imagine, children) in California. Antifreeze contains a compound called ethylene glycol. This chemical has a sweet odor and taste. It is attractive to pets and children. When it is consumed, ethylene glycol initially causes the poisoned individual to feel drunk. However, the body metabolizes the chemical into products that clog the kidneys and lead to kidney failure. Ethylene glycol is one of the most toxic chemicals in common use. Several other states now have laws similar to California’s. These include Virginia, Oregon, Washington, New Mexico, Arizona, Tennessee, and Maine. And, if the New Hampshire House of Representatives gets its way, that state will be next to join the list. That, of course, is good news. But I have to wonder why this simple, common sense proposal is spreading slowly state-by-state rather than through federal action.
<urn:uuid:ae2c2500-8298-45c6-a924-ba4d0c4dda20>
CC-MAIN-2018-26
https://www.dogster.com/lifestyle/new-hampshire-moves-to-make-antifreeze-less-dangerous-to-pets-and-children
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864940.31/warc/CC-MAIN-20180623035301-20180623055301-00281.warc.gz
en
0.967021
315
2.640625
3
Nursing homework help head-to-Toe Assessment For this assignment, perform a complete head-to-toe assessment on one of your chosen participants. Your analysis should include the following: •Topical headings to delineate systems. •For any system for which you do not have equipment, explain how you would do the assessment. •Detailed review of each system with normal and abnormal findings, along with normal laboratory findings for client age. •An analysis of age-specific risk reduction, health screen, and immunizations. •Your expectation of normal findings and what might indicate abnormal findings in your review of systems. •The differential diagnosis (disease) associated with possible abnormal findings. •A plan of care (including nursing diagnosis, interventions, evaluation). •Client and age-appropriate evidenced based practice strategies for health promotion. •Pharmacological treatments that can be used to address health issues for this client. Provide your answers in a 6- to 7-page Microsoft Word document. Support your responses with examples. On a separate references page, cite all sources using APA format. •Use this APA Citation Helper as a convenient reference for properly citing resources. •This handout will provide you the details of formatting your essay using APA style. •You may create your essay in this APA-formatted template.
<urn:uuid:45d2849d-275e-4302-8123-0fc5b9fc156e>
CC-MAIN-2021-04
https://mynursingwriter.com/perform-a-complete-head-to-toe-assessment-on-one-of-your-chosen-participants/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704843561.95/warc/CC-MAIN-20210128102756-20210128132756-00603.warc.gz
en
0.867676
283
2.8125
3
How to Ace your Math, Science and Engineering Classes Mathematically-based courses can be a GPA-killer for many students. But, they don’t have to be. Here is some advice on how to do well. 1. Talk to other students to discover the good teachers. 2. Always attend class, be early, participate and be respectful. Whether stated in the syllabus as translating to actual points, or not, many teachers will take your attendance and class participation into account if you grade is borderline. In addition, pop quizzes are commonplace, so make sure you are ready. 3. Learn how to do the math by hand and if available, with the appropriate solver (e.g. Business calculator, or TI). Then, when you do your homework and also your exams, you can do the problems by hand and check for errors. If you find a discrepancy, go back and redo it by hand. Recheck with the calculator. Repeat until both answers agree. When I did this, I got all of my mathematical questions right. 4. The topics generally build upon each other, so be sure that you study and keep up with your coursework. If you study daily, and have work done in advance, then you will likely have a better chance of understanding everything. If you wait until the last minute, odds are that you will be unable to find the help you need in time for the quiz or test. 5. When you are doing a math problem, keep track of assumptions and show all work. 6. Hand in all work on time. You generally will lose a minimum of 10%/day for each day you are late. If you are going to be out of town, clear it with the teacher in advance, and try to hand in assignments early. 7. Go to a used bookstore and buy a few used textbooks in other editions. Read the relevant content. Work through all of the pertinent exercises in each of the books. 8. Be able to draw the important trend-lines and pictures. Understand the pictures, equations and axis labels. 9. Get help if needed. I would start by going to the professor’s office hours. Many schools also have learning centers and/or private tutors. It is worth the extra money to pay a tutor should you need one. Study in groups. Help teach others. Teaching is often the best way to learn and retain something new. 10. When studying for exams and quizzes, redo homework. Be sure that you can do problems quickly so that you don’t run out of time. 11. If you don’t understand a topic and get it wrong on the exam, take the time to learn it even after the fact. Math almost always builds, so odds are it will show up again later. This may sound like a lot of work, and it is… but, if you are serious about getting the grades, it can be done. Typically Approved Calculators Calculators for Business and Economics More by this Author A wide variety of challenges exist when drilling post holes. Clay and rocky soils present particular challenges, both of which are discussed in the following article. Understand chigger life stage and common misconceptions. In addition, learn how to get rid of chiggers once they have bitten as well as prevent future attacks. Rain rot (also known as rain scald, dew poisoning, mud fever, or dermatophilosis) is a common, highly contageous skin infection that occurs in pets, livestock and wild animals. Proper treatment and prevention is...
<urn:uuid:4ed8d880-eb05-43a0-a3da-76e7494cd447>
CC-MAIN-2016-50
http://hubpages.com/education/College-Advice-Part-3-Acing-your-Math-Science-and-Engineering-Classes
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541187.54/warc/CC-MAIN-20161202170901-00029-ip-10-31-129-80.ec2.internal.warc.gz
en
0.946136
747
3.015625
3
Math Tutoring on Radian Measure and Application A Radian is based on the radius of a circle. One Radian is the angle created by bending the radius length around the arc of a circle. Because a Radian is based on an actual part of the circle rather than an arbitrary division, it is a much more natural unit of angle measure for upper-level mathematics. The circumference of a circle is 2π Radians. So it becomes 2π radians = 360 degrees. In Math Tutoring, to convert radians to degrees, multiply a radian measure by 180°/π and simplify. The Length Of An Arc on a circle depends on both the angle of rotation and the radius length of the circle. We know that, a Radian is the measure of an angle that cuts off an arc the same length as the radius. So that a half-rotation is π radians, so the length of the half-circle would be π radius length. On the other hand, the length ‘s’ of the arc intercepted on a circle of radius ‘r’ by a central angle of measure ‘θ’ radians is given by the product of the radius and the radian measure of the angle. So s=rθ. One of the major application of Radian is the measurement of Angular Velocity. The measure of how fast a central angle is changing is called Angular Velocity, ω. So ω=θ/t. where ‘θ’ is the measure of the central angle at time ‘t’. θ must be in radians and ω(omega) is expressed in radians per unit of time. We know that the length ‘s’, of an intercepted arc on a circle with radius ‘r’ by a central angle ‘θ’ is given by s=rθ. So the Linear Speed Around a Circle is Learn ‘Radian Measure and Applications’ with AffordEdu. Interested in free assessment? Build your personalized study plan with AffordEdu through knowledge map and go for free assessment and free tuition session with math expert. * 1. What is Radian and how it is measured? 2. Deduce the relation Radian and Degrees. 3. What is Angular Velocity and how it is measured? 4. How is Linear Speed around a Circle measured? Learn ‘Radian Measure and Application’ with AffordEdu Online One on One Math Tutoring Struggling with Radian Measure and Application? Need math help for homework? You are not the only one. Fortunately, our expert tutors in math tutoring are online now and are ready to help.
<urn:uuid:9b532738-4dcc-418e-a34e-83e870365648>
CC-MAIN-2018-34
https://www.affordedu.com/tutors/Online-Tutoring-Radian-Measure-And-Application
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211146.17/warc/CC-MAIN-20180816171947-20180816191947-00347.warc.gz
en
0.922244
577
4.34375
4
The effects of climate change on Colorado’s water supply just got more complicated, according to a report from the National Center for Atmospheric Research in Boulder. The paper finds that while warmer winters are causing mountain snowpacks to melt earlier, the speed at which they melt is getting slower. That’s because the long nights and weak sunlight of early spring cause less thawing each day, compared to later in the year. NCAR reviewed 10 years of snowpack observations from about 1,000 sites in the U.S. and Canada and used that data to build computer models for future snowpack behavior up through the end of the 21st century. As for what this means for water managers, and the wider environment, the implications are mixed. “A reduction in high melt rates could mean fewer spring floods,” says Keith Musselman, the study’s lead author. “But it could also cause warmer stream temperatures which could affect trout and other fish species.” Slower thaws could also eventually mean less water in the alpine creeks that feed Colorado’s rivers. “When snowpack melts more slowly, the resulting water kind of lingers in the soil, giving plants more opportunity to take up that moisture. And that water absorbed by plants is water that ultimately doesn’t make it into the streams,” Musselman says. Meanwhile, in the short term, Denver Water, Colorado’s largest water supplier, says it’s well positioned for this year’s spring runoff season. Heavy snows in December and January more than offset a long dry fall and warm February. “At the facilities where we collect our snowpack, we’re about 130 percent of average. And that’s before March and April, which are typically our snowiest months,” says spokesman Travis Thompson, “so we’re in really good shape heading into the spring.” Thompson says despite the healthy snowpack now, it’s too early to say whether the mountains will yield more water this year than the utility’s reservoirs can hold. If it does have to release excess water, the higher river flows benefit rivers on the Western Slope. Whatever happens, Denver Water customers shouldn’t expect to get a break on watering rules. Guidelines against watering in the middle of the day or wasting water on sidewalks and driveways are now permanently on the utility’s books. “We never know when that next dry period is going to come, and when it does come, how long it’s going to last,” says Thompson. “And really what those are are common-sense guidelines. You want to know what is really going on these days, especially in Colorado. We can help you keep up. The Lookout is a free, daily email newsletter with news and happenings from all over Colorado. Sign up here and we will see you in the morning!
<urn:uuid:2306eb0b-6d16-4ff8-adb2-3cdbdf8fc302>
CC-MAIN-2022-21
https://www.cpr.org/2017/02/28/new-study-sheds-light-on-climate-changes-effects-on-snow-melt/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662578939.73/warc/CC-MAIN-20220525023952-20220525053952-00330.warc.gz
en
0.943507
626
3.5625
4
Most schools and school districts that Americans are familiar with are comfortable in their buildings, awash in books and loaded with state-of-the-art electronics, including computers and printers. One of Saffa Koroma’s greatest dreams for the 300 schools he runs is an old-fashioned mimeograph machine. Koroma, 59, is education secretary and associate director of Operation Classroom, a school system run by the United Methodist Church in the western African country of Sierra Leone. The nation is only beginning to recover from a decade-long - 1991 to 2002 - war that some call a civil war and others call a war caused by rebels. In any case, tens of thousands died and about a third of the nation’s 6 million citizens were displaced. Elementary and secondary schools in Sierra Leone, in which nearly seven out of 10 people live in poverty, are not run by the government, but by nongovernmental organizations and religious groups - most of them Christian of varying brands, but some Muslim, too. Koroma indicates that there are few if any boundaries separating the educational efforts of the churches: “Everyone cooperates and gets along, and there isn’t any real competition. The young people need education and the various religious groups always have lived in friendship and harmony in Sierra Leone - even working ecumenically often.” He noted that in addition to the UMC-run schools, other Christians sponsoring schools include Roman Catholics, Anglicans, Baptists and Wesleyans. A member of that latter evangelical denomination, Ernest Bai Koroma (no relation), this month was elected president of the country. Said school-administrator Koroma: “We are society-based, caring for each other cooperatively. “We have six government colleges that are available for teachers, and tuition is $250 to $300 a year, well out of the affordability range of almost any potential student,” Koroma said. Yet it’s among his duties to recruit teachers who, when their education is complete, will earn only $30 a month to start. Even an experienced principal of a high-school-level institution will earn only between $150 to $200. And so, for a school district that covets a mimeograph machine to reproduce and proliferate reading materials, outside help in terms of cash and donations of supplies is imperative. Among the U.S. Operation Classroom project members are Puebloans John and Elaine Blinn and Les and Hope Law from Golden. Like all members of the team, the Blinns and Laws have secured the most basic of supplies for the school rooms - computers, books donated by schools, paper, pencils and pens. And they have raised funds, too, to buy materials or pay the shipping costs from gathering points in the United States to Freetown, Sierra Leone’s capital. The American UMC-Sierra Leone link has been in place since 1987, even though the war disturbed the process. The couples have traveled, at their own expense, to that African country to offer whatever help they can, including workshops and additional training for teachers. Blinn, a retired Methodist minister and former district superintendent of the denomination in Southern Colorado, said that, “during the war, the schools, along with most other economic and social systems in the country, ground to a halt and it’s only since 2002 that we’ve been able to start making a comeback.” Koroma added: "During the war, education was at best an ad hoc thing, taught wherever we could spirit the students away to a safe place for a few days.” His role now, in addition to being an administrator, is to be a liaison between the schools and the government. “I wind up explaining what the government needs to the schools, and what the schools need to the government,” he said. In a school system in which classroom size is often 80 to 100 students, and supplies are limited, the participation of the Rocky Mountain District of the UMC in Operation Classroom is crucial. Hope Law seems pleased when she reports that “we visited with teachers and students from Littleton’s Heritage High School and came away with $14,000 in funds and 2,000 books. Jefferson County schools also have been generous with supplies and books and a Littleton charter school donated 32 used computers that will begin to make a difference in the Makeni UMC schools.” Makeni is a city about the size of Pueblo, located about 100 miles northeast of Freetown. Les Law smiled broadly when he told about the response that was made by the elementary school in tiny Haxtun. “There are only 1,000 people there, but after one of the Methodists in town told fellow teachers about the need, the students and teachers both responded with amazing generosity with books and many children’s books for our libraries.” English is the official language in Sierra Leone, but is not all that much used in day-to-day life. Yet it is the language in which classes are taught and business is conducted, so the books in English are important, Law said. Hope Law said that, while the youngsters are only beginning to be exposed to computers and the Internet, “they are excited to see what’s out there in the rest of the world and what’s possible for them and their country.” Koroma and his wife, Agnes, a UMC minister, have five children of their own, “but I have taken in 10 others whom I regard as my children,” he said. Koroma explained the purpose of his two-month trip throughout a wide variety of American cities: “I’ve come to thank Americans for their 20 years of support and, of course, to ask them to do even more.” Koroma does not seem intimidated by the presence of American prosperity, but he pointedly asks whether, for the education of children, “we can allow a trickle of this wealth to fall to these people whose ancestors were once your slaves.” The educator-administrator talked at two UMC congregations last weekend, and will continue his transcontinental trek on behalf of kids. And there are a lot of them: According to the Central Intelligence Agency, 45 percent of the population is younger than 14. For anyone wanting more information or wanting to help, the Blinns may be contacted at 253-0400. ***THE PUEBLO CHIEFTAIN
<urn:uuid:0b2ad934-7e77-4b58-b5f6-7d1d399fbff6>
CC-MAIN-2017-34
http://yusufa95.blogspot.com/2007/09/sierra-leone-slowly-coming-back.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103891.56/warc/CC-MAIN-20170817170613-20170817190613-00486.warc.gz
en
0.972767
1,379
2.671875
3
You may find it difficult to get that substantial grant or impact people’s lives when nobody understands your research. But the upcoming “STEM and Medical Communication Workshop: Communicating What You Do and Why It Matters” can help you. Presented by the Alan Alda Center for Communicating Science, the workshop aims at improving your communication skills so you can explain what you do to patients, students, elected officials, the public and the news media. “The importance of scientists being able to ‘speak science’ using common language has been underestimated,” said Dr. Lisa Middleton, associate professor of biochemistry and molecular biology and one of the organizers of the workshop. “More than an add-on skill, it’s about being able to connect with a broader audience. Techniques learned at this workshop will help researchers express their work in ways that engage and inspire.” The Alan Alda Center for Communicating Science teaches researchers a communication method developed by its founder Alan Alda, who hosted Scientific American Frontiers, a Public Broadcasting Service series about scientific discoveries, and played Hawkeye Pierce in the TV series M*A*S*H. Organized by the Georgia Cancer Center and the Augusta University Research Department, the free event will take place 11 a.m. to 12:30 p.m. on Oct. 15 at The Knox Foundation Community Center in the newly expanded M. Bert Storey Cancer Research Building. The event is open to the Augusta University and Augusta University Health community. The first 75 attendees will receive a free lunch box given at the end of the presentation. To attend the event, register by Oct. 11.
<urn:uuid:e91b4b9e-2f64-495a-84ca-cd75fb079ac0>
CC-MAIN-2021-17
https://jagwire.augusta.edu/nobody-understands-your-research-heres-how-to-change-that/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038057476.6/warc/CC-MAIN-20210410181215-20210410211215-00110.warc.gz
en
0.924077
345
2.5625
3
As a programmer from a non-computer science background, most of the programming I have learned has been on the job. Probably the biggest downside has been a lack of opportunities to dive deeper into the elegance of theory that make the complex compute ecosystem run. Automata theory happens to one such topic. Write a compiler.. seriously? The rarity of circumstances under which one might decide to write a new language is understandable. And given this rarity, one might not encounter automata theory at a job. But considering the ubiquitous nature of programming language, the compilers had captured my imagination ever since I compiled the first Pascal program in 1999. Finally, in 2020 the stars aligned and I could dedicate time to scratch the surface of the topic. Mostly I have noticed developers complaining about the compilers for either strictness or being too “unaware” of what they intend to express (I have done that too). But over the years I came to realize that the compiler is the only link between a developer and the runtime. The compiler is the last predictable scenario that a developer has under control. Once the binary is generated the chaotic universe takes over. The above piece of C or C++ code technically does nothing, but wait how does one assume that? As a reader, if you happen to know these languages then the syntax gives away the context. How to explain that context to the machines? Welcome to the compilers odyssey. In essence, the conversion of the above code the following machine code is what automata theory allows programmers to accomplish. push rbp mov rbp, rsp mov eax, 0 pop rbp ret So study them but why? The main purpose of this post is not to introduce one to compilers instead convince programmers to dig deeper and understand it for themselves. I have been procrastinating about reading the formal text on compilers for close to 10 years. It always seemed a daunting task that seemed too esoteric to be applicable to the daily programming problems I was solving. Like many who think this way, I was wrong. Compilers are not monoliths, they are a chain of programs that accomplish a complex task. Compilers work in stages and communicate via the predefined format of messages. Sounds familiar? It should since compilers are programs too. They too parse strings, allocate memory, hold state in data structures, and need efficient algorithms to be used by millions of developers. The mathematics involved is not too difficult to understand. It does take some effort but there are enough resources out there to accomplish the same. Some books are listed here. Another great resource is the course on compiler design by Stanford on Edx. Compilers deal with string parsing, n-ary tree traversals, quick lookups, graph theory, backtracking (or dynamic programming), and assembly language (which implies some computer architecture basics as well). It is a very vast subject and is actively researched as well. So anyone who has missed studying compilers is recommended to at least take a closer look at this elegant combination of ideas and implementations because it’s COOL.
<urn:uuid:5078f19e-4f52-46c0-a471-635fc33396ea>
CC-MAIN-2020-50
https://rougeneuron.com/compilers-an-odyssey-to-remember/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141685797.79/warc/CC-MAIN-20201201231155-20201202021155-00553.warc.gz
en
0.943884
629
2.53125
3
Where do our thoughts, moods and urges come from? Do they originate in our minds? We like to think so. The idea of free will, that we are in control of our behavior and indeed our destinies, is a powerful cornerstone of what we feel makes us human. However, how much of that free will is real and how much is illusion? Are we truly in control of what we think and do? Throughout the natural world we can see examples of instances in which creatures have been taken over by other organisms, their minds enslaved or manipulated to do the bidding of their invaders. Is it possible for the same thing to happen with us; for our free will to be corrupted by violating outside forces? Even more pressing, is it possible for our humanity to be completely altered by such forces? As we shall see, we may not always be as in control of who we are, what we think, and how we feel, as we’d like to believe. The effects of various microscopic organisms on the animal kingdom have been well documented, and range from subtle, mild alterations or behavioral tweaks to full blown zombification and mind control like something from a horror movie. There are numerous examples of both parasites and viruses manipulating the behavior of their animal hosts, either to gain some advantage or benefit, such as passing itself on to a new host or moving on to the next stage of their often complex life cycles, or in other cases as merely a byproduct of infestation which confers no obvious advantage on the intruding organism. Many parasites exhibit extremely intricate lifecycles, which require that they be passed on to hosts of completely different, disparate species that may not even share the same habitats on their complex journey to their “definitive host,” which is the end of the line, the final stage, where the parasite will finally reproduce and die. In order to move on from one intermediate host to another, it is often necessary to tweak or transform the host’s behavior to facilitate the process. The most well-known example of this can be seen with the malaria parasite plasmodium, which at first makes its mosquito host become more cautious and less likely to bite in order to keep it safe as the parasites develop in their gut. After it has reached a certain stage of development, the parasite sends its mosquito host into a furious biting frenzy, compelling it to bite far more frequently and for longer periods of time than usual in order to spread itself as much as possible. Another classic example of this is the lancet liver fluke, Dicrocoelium dendriticum, which is typically found in the livers of grazing mammals such as sheep or cattle. The first intermediate host is land roving mollusks, such as slugs or snails, the slime trails of which leave behind the parasite, which are then ingested by ants. The next step is for the parasite is to make it into an animal such as a cow, but how to get there? In short, zombification. The parasitic larvae make their way to the ant’s brain, where they encyst and create a strong urge for the ant to climb to the highest blade of grass it can find at night. Upon reaching the top, the cysts cause an involuntary spasm of the mandibles of these “zombie ants” through the release of tetanus, which causes the ant to bite down hard on the grass and prevents it from going anywhere. In the morning, a grazing mammal comes along, eats the grass with the immobile ant on it, and the lifecycle is completed. Other examples of such host manipulation can be found with thorny-headed worms, which alter the neurotransmitters of their hosts’ brains to achieve the desired result of moving on to birds from its initial host, a type of crustacean known as a gammarid. These gammarids typically live in ponds, and their natural reaction to surface movement or disturbances is to seek darkness and to dive into hiding beneath mud on the bottom. However, when infected with thorny-headed worms, they instead swim up towards light when there is a disturbance at the surface, where they are eaten by birds and therefore complete the parasite’s lifecycle. The worms achieve this by producing a strong immune system response that releases large amounts of the neurotransmitter serotonin, which then disrupts signals from the eyes to the brain and likely tricks the gammarids into confusing up for down and light for dark. A particularly gruesome example of changing host behavior can be seen with a type of parasitic worm known as hairworms, which can only reproduce in the water. The hairworm of the species Spinochordodes tellinii uses a species of grasshopper as its host, after which its goal is to get into the water to mate. To do this, the hairworms generate proteins that corrupt the grasshopper’s central nervous system and compel it to seek out the nearest body of water and dive into it. Upon hitting the water, adult parasitic worms burst forth spectacularly from the host into the water, dramatically and horrifically killing the host and dispersing into the new habitat to mate and reproduce. This sort of host manipulation can be extraordinarily complex. In the case of one nematode which infects tropical canopy ants, not only is the behavior of the host altered, but its actual physical appearance as well. Once invaded by the nematode, the normally black ants display abdomens that become unusually bulbous and bright red. Additionally, nerve damage caused by the nematodes instils within the infected ants a compulsion to constantly raise their abdomens in the air, the total effect of which is to make the ant look like a nice, juicy, inviting berry, after which they are picked off by the nematode’s final host, frugivorous (fruit eating) birds. There are several types of parasitoid wasps that also manipulate their hosts in shockingly sophisticated ways. Parasitoid wasps typically lay their eggs in a host, after which the larvae will eventually hatch and feed upon it. One type of wasp native to the rainforests of Costa Rica targets the species of spider Anelosimus octavius as its host. This type of spider generally weaves knotted, gnarled webs of haphazard threads, but infected individuals will go off and spin webs that are completely different in design. Infected spiders essentially have their brains hijacked into weaving webs that have a platform covered by sheets of webbing that protect it from the rain and elements, as well as an odd opening at the end of the platform. When these bizarre webs are finished, the wasp larvae emerges from the spider, killing it, makes its way to the end of the well protected platform, and hangs from a cocoon through the opening that the spider has graciously provided. It is extraordinarily creepy that this parasite can not only alter its host’s behavior, but also essentially have it act as its own personal architect. The parasitoid wasp, Glyptapanteles, also demonstrates a particularly dastardly form of mind control on its host, actually turning it into a guardian for its larvae. The wasp first lays its eggs within its host, a caterpillar of the moth species Thyrinteina leucocerae, after which they will develop until they are ready to pupate. This is where the weirdness begins. The larvae exit the host peacefully and create cocoons nearby, while the still living caterpillar starts to exhibit highly unusual behavior. The caterpillar stops feeding and ceases all movement, only springing to action when an intruder draws near, when it will suddenly vigorously thrash its head back and forth. This is done at the slightest provocation or disturbance, and serves to discourage any potential predators from feeding on the pupating wasp larvae, essentially serving as their own personal bodyguard until they emerge from their cocoons, after which the caterpillar dies. Parasites are not the only organisms that have the ability to control the minds of their hosts, and there are even viruses that play the role of evil puppet masters. A type of virus called baculoviruses is known to change the behavior of hosts to suit their needs as well. One form of baculovirus infects caterpillars, invading the cells and causing them to produce so many new viruses in the hosts that they visibly swell up. After this, the caterpillar is gripped with an irresistible compulsion to climb up to the tops of plants, after which the virus releases an enzyme that causes the host to literally disintegrate, raining the viruses down on the surroundings where they will infect new hosts. These baculoviruses are apparently scattered all over the place, including crops for human consumption, with some everyday vegetables we eat shown to hold staggering numbers of them. Fortunately, they are harmless to humans. It is obvious that there are a plethora of parasites and microorganisms that have the capability to dramatically manipulate the behavior of insects, but what about humans? Is there any such organism that exerts its mind control upon us? It is little understood to just what extent we are influenced by such organisms, as we have much more complicated nervous systems made up of far more neurons than the insects that have been studied so far, making it difficult to ascertain just what sort of mind altering effect may be evident in us. Nevertheless, there are certain cases that we do know of where microorganisms have shown to exert an often dramatic influence on our behavior. Perhaps the best known example is that of the rabies virus, a highly virulent and deadly disease that infects a wide range of hosts and is spread through bodily fluids such as saliva, typically in the form of bites from infected animals. The rabies virus does not have a complex lifecycle and is fairly indiscriminate in which hosts it infects, instead incurring a fitness advantage simply by spreading itself as far and wide as possible. Upon infection, the host exhibits a wide range of symptoms as the disease acts upon the central nervous system, including anxiety, restlessness, confusion, hallucinations, paralysis, involuntary muscular contractions, uncontrolled perspiration, salivation, and pupil dilation, and hydrophobia (fear of water), which usually make themselves known after an incubation period of around 10 days. The most dramatic symptom of rabies is a marked increase in agitation, anger, and aggression, a trait that makes infected animals more likely to bite and thus increase transmission of the virus. Within a period of mere days after exhibiting symptoms, the victim will fall into a coma and die if not treated. Although mostly found in animals, it is possible for a human to contract the disease through a bite from an infected animal, and if it is not treated in a timely manner they will invariably show all of the same symptoms, including the heightened anger and aggression, although our acute self-awareness allows us to somewhat control our urges to lash out and bite everything that comes near us, and there has never been any confirmed case of human to human transmission of rabies as of yet. Many may already know about the effects of rabies on the human nervous system, but there is another, more bizarre microorganism that can have a profound effect on our behavior as well. Toxoplasma gondii is a microscopic parasite that reproduces in the guts of cats and is evicted through their feces. Small mammals such as rodents, as well as birds, can contract the parasite after which they are eaten by cats to complete the lifecycle. The parasite invades the central nervous system and forms cysts, which influence the behavior of the host in some rather bizarre ways. In rats, it deprives them of their natural fear of the smell of cats, and creates disorientation, making them less cautious and more likely to run around out in the open or even approach predators, where they will be eaten by the final host. They also show a general increase in activity and restlessness, making them attractive targets for cats. The parasite also generates extra testosterone in male rats, making them more attractive to mates and allowing them to spread the parasite through sexual contact, as well as further reducing fear and increasing boldness. Although humans are not a natural host for Toxoplasma gondii, and we are essentially a dead end for the parasite, we nevertheless can contract it from handling cat litter or feces that have been exposed to infected animals, or ingesting raw or contaminated food. In the case of human infection, the parasite also is believed to alter our behavior in various ways. The physical symptoms of human Toxoplasma gondii infection in healthy individuals are slight; usually only mild, flu-like symptoms, but the parasite forms cysts in the brain which recent studies are finding can manipulate our behavior even in the absence of physical symptoms. Interestingly, these behavioral modifications are different depending on whether the host is a man or a woman. For men, Toxoplasma gondii infection has been shown to make them more introverted, jealous, morose, suspicious, and oblivious to others’ opinions of them, as well as generally more anti-social and likely to break rules. Infected women, on the other hand, have been shown to exhibit the exact opposite, becoming more outgoing, friendly, trusting, self-conscious, concerned with appearance, and law abiding, as well as more promiscuous. Both men and women who have been infected with Toxoplasma gondii have been shown to have impaired motor skills, and show more inclination to take risks than non-infected people, a fact which makes them 2.6 times more likely to be involved in traffic accidents. Various researches has also linked Toxoplasma gondii to a higher rate of schizophrenia. It is not known exactly how the parasite performs this subtle reprogramming, or if it serves some purpose in human hosts or is merely a side-effect of infestation. Typically the parasite is not dangerous to humans except for pregnant women and people with weakened immune systems, in which it can cause serious health complications such as seizures, mental retardation, deafness, blindness, intracranial calcifications, and death. Somewhat ominous is the fact that it is believed that around 1/3 of the world’s population is infected with Toxoplasma gondii, and around 60 million U.S. citizens are thought to be carrying it. It is certainly enough to incite speculation of what sort of subtle effects this microorganism may be exerting on society as we know it. Recent research has uncovered yet another microorganism that may influence human moods and behavior as well; the microbes living in our guts. Human beings, indeed all animals, have a vast number of various types of microbes living in our stomachs and digestive tracts. It has been found that a person’s brain connections, essentially how we are wired, seem to show a correlation with the type of microbe most prevalent in an individual’s digestive system, which is believed may have an influence on our moods and how we think. Although such research is in its early stages and it is certainly unclear if this behavioral influence is actually occurring or to what extent, experiments on rats with gut microbes have certainly shown that it is possible. In one experiment, researchers replaced the gut microbes of a timid rat with those of a more gregarious specimen, and vice versa. It was found that the timid mice became more fearless and bold, while the previously outgoing and aggressive mice became timid and meek. What does this mean for human beings? The jury is still out. Gut microbes have also been shown to influence our cravings for certain foods. Researchers from University of California, San Francisco (UCSF), Arizona State University, and University of New Mexico have found evidence to suggest that what we feel like eating may be the microbes signaling us and compelling us to ingest certain nutrients that they need rather than just making do with whatever comes their way. Our digestive system is basically an entire ecosystem of various types of microbes, all jostling around and trying to survive. The research suggests that different types of microbes require different kinds of nutrients, and when they are deprived of what they need, they create cravings for certain foods in us, such as sweet or fatty foods, through altering neural messages sent through the vagus nerve. They can also manipulate us in other ways to do their bidding, such as punishing us by producing toxins to make us feel unwell, or to conversely make us feel good through releasing chemical rewards. Since our digestive system is connected to our nervous system, there is a possibility that these microbial signals are influencing our behavior in other subtle ways as well, although it is not yet clear exactly in what way. It seems clear that parasites and that viruses and microscopic organisms can exert an influence on our minds and behavior, but to what potential extent? Many are probably already wondering just how likely it is that some sort of mind altering virus could run amok or basically start a zombie apocalypse. In a way, it seems that it is certainly possible. For instance if the rabies virus were to mutate fast enough and in a way that allowed it to dramatically shorten its incubation period, decrease its fatality rate in order to allow more time to spread, and additionally become airborne, it could very well turn into something that resembles a zombie pandemic from a horror movie. Although rabies is now transmitted only through bites from infected animals, for it to become an airborne contagion is not a completely far out notion. All it would have to do is swap some of its genetic material with an airborne virus such as influenza, a process known as recombination and something that different strains of the same virus do all of the time, although rabies and influenza are far too dissimilar for this to feasibly occur in nature. With a very short incubation period, low fatality rate, and highly contagious means of spreading, and perhaps even more acute symptoms of aggression, carriers of the virus would essentially become mindless, furious vectors for the pathogen roiling within them, and it would spread beyond our ability to control it. Of course if some shady military organization wanted to speed up the process, they could just go and make an aerosolized or engineered version of the rabies virus. Of the possibility of what a theoretical form of rabies engineered to be a zombie virus might look like, a professor in the Department of Cell Biology and Molecular Genetics at the University of Maryland, Jonathan D. Dinman, PhD, summed it up nicely in an interview with RedOrbit: So, you start with Rabies virus, but you engineer it so that it doesn’t actually kill you. It just takes over your brain and makes you want to bite other people to spread itself. Infected people just become automatons devoted to spreading the virus. The main viral property you’d want to change would be to convert it from causing an acute infection (like Ebola which tends to kill the victim quickly) to persistent infection (like Herpes, which stays with you for your entire life). Functions you’d want the infected person to retain would be metabolism (so they can produce more virus) and motility (so they can get from victim to victim). You would want the virus to cause infected people to lose the ability to think independently (and therefore come up with a cure). Some people think that such a virus has already been created. One persistent conspiracy theory is that a virus known as LQP-79 was created as a potential mind-control substance by the military, but it somehow made it into the outside world. This virus is said to cause profound mental deterioration and delirium, as well as savage cannibalistic urges, and is thought to be behind an infamous incident in Miami, when a man by the name of Rudy Eugene attacked homeless Ronald Poppo for apparently no reason and proceeded to try and bite his face off. It has also been linked to a spate of other such cases around the country, such as a man in a Staten Island restaurant who attacked and bit the ear off of another diner, either due to an altercation or the fact that he was not satisfied with the day’s special. There is even an “official” LQP-79 website dedicated to investigating the phenomenon. On the creation of LQP-79, the website claims: The LQP-79 virus is a result of the 79th attempt made at formulating a Lysergic Quinine Protein for use in diametric control of thought processes and the function of the mind. The LQP-79 virus story is likely a hoax, as it has not been really covered in any reputable news source and has mostly been spread through internet discussions, but it has become immensely popular, so much so that the CDC even came forward to deny that such a virus existed, in order to squash all of the rampant speculation and quell panic. It is still a spooky story, though, and makes one wonder if such a scenario could ever play out for real, and if anyone is in fact working on some sort of zombie virus as a bioweapon, either working with rabies or something even worse. In light of the many examples of microorganisms influencing thought, it seems possible at least in theory. Perhaps it would not even take some shadowy organization to concoct such a disease, but rather an entirely different sinister force; Mother Nature herself. Viruses are constantly mutating in nature, and some of these naturally occurring lethal pathogens, such as Ebola, Anthrax, and many others, are every bit as diabolical and deadly as something cooked up in a lab. Nature has a certain knack for coming up with truly wicked ways of invisibly killing us that are often difficult for us to combat or fully understand. A line from the movie World War Z says it up pretty well: Mother Nature is a serial killer. No one’s better, or more creative. Like all serial killers, she can’t help but have the urge to get caught or what good would all those brilliant crimes do if no one takes the credit? So she leaves crumbs. Now the hard part, is seeing the crumbs, the clues there. Sometimes it’s in your thoughts where the most brutal part of a virus is. Turns out to be the chink in its armor. And she loves disguising her weaknesses as strengths. She’s a bitch. What is truly responsible for making us human? Is it our brains, our hearts, or is it at least in some part the doing of the tiny organisms that permeate our bodies and the environment around us? Are we truly in control of our own thoughts, moods, and behaviors? Or are we being guided, manipulated, and influenced by microscopic puppet masters with their own inscrutable agendas? Is there the potential for a new form of virus to assault us and wipe our humanity away? The next time you have a flash of anger, an uncontrollable urge do something, or simply an inexplicably craving for sweets, it might be good to wonder if that is really you, or the enigmatic will of the tiny forces sitting in the background, beyond your control and calling the shots.
<urn:uuid:0cf160f4-5b79-45a7-b29c-b4c845849953>
CC-MAIN-2018-22
http://mysteriousuniverse.org/2015/03/parasitic-puppet-masters-mind-manipulating-microbes-and-zombie-viruses/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794871918.99/warc/CC-MAIN-20180528044215-20180528064215-00491.warc.gz
en
0.96635
4,778
2.671875
3
Sun-rays are harmful and damaging despite what your thermometer says; particularly the UVA rays which are responsible for aging skin. UVA radiation reaches deeper into the skin and contribute to wrinkles and skin cancer risk. Applying sunscreen should never restrict to summer alone, your skin should be protected in every season of everyday. - Shields from harmful UV rays: As much as we need a little bit of exposure of sun to get Vitamin D, it doesn’t mean that you put yourself at risk. Too much of sun exposure can put us at a higher risk of getting affected from the harmful rays of sun. Applying sunscreen actually blocks these harmful rays from penetrating the skin and triggering skin disorders. - Prevents pre-mature aging: Sunscreen shields your skin from developing signs of aging, such as wrinkles and fine lines. According to latest research, it has been revealed that people below the age of 55 who used sunscreen had 24% lesser chances of developing aging signs than non-sunscreen and occasional sunscreen users. - Lowers skin cancer risk Daily usage of sunscreen protect your skin from the risk of various types of skin cancer, especially, melanoma. This is the worst type of skin cancers, which can be life threatening for women, particularly those who are in their 20s. - Prevents sunburn Influence of HUV rays can cause your skin repeated attacks of peeling, swelling, redness and itching. Sunburn can weaken your skin. - You don’t need to apply it after swim Most of the sunscreens available these days are waterproof. This enables you to enjoy yourself in the water, without burning yourself.
<urn:uuid:28176c85-10b9-4660-93cf-7b2f61d57e3e>
CC-MAIN-2020-40
https://www.fhmpakistan.com/fashion-beauty/sunscreen-important-every-season/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400211096.40/warc/CC-MAIN-20200923144247-20200923174247-00247.warc.gz
en
0.931728
343
3.125
3
A Brief Introduction About the License Agreement What is a license agreement? The definition of licensing agreement is the permission by the licensor to allow the licensee to produce goods or services patented by the licensor. The different types of licensing agreement are: - Patent license: Under Patent license, you cannot use certain parts of the patented technology. The licensee can make or sell something patented by you provided they pay you a royalty - Trademark license: Trademark license agreement addresses the type and quality of the licensed product or services. There is a higher degree of control over the licensing partner compared to patent license - Copyright license: Though Copyright license there are six different rights under this category, you get limited access to the rights. You may get the distribution rights but not the rights to edit/add to the product - Trade secrets: Under this type of licensing arrangement, confidentiality is key. Your licensing partners need to be specified what and how your product or service will be used by them. Who Takes the License Agreement – People Involved The agreement is taken by two parties, the licensor, and the licensee. The licensee is granted the right to use a patent or trademark, produce or sell goods or use technology patented by the licensor. In return for the right to use the licensor’s property, the licensee pays the licensor a royalty and adheres to certain conditions laid down by the licensor. Purpose of the License Agreement – Why Do You Need It The purpose of a license agreement is to ensure that the rights of both the licensor and the licensee are protected. The licensor is assured that his or her patented technology or copyright is not violated by the licensee, and he or she gets the royalty payments on time. The licensee is also assured that he or she can use the licensor’s patent or trademark and produce goods or services on a commercial basis as long as he or she is paying the licensor on time and is not infringing any copyright or trademark. You can prepare a license agreement by referring to a license agreement template online. The most important aspect of the agreement would be the financial arrangement. Payments are in the form of guaranteed minimum payments and a royalty on sales. The licensee must meet the minimum sales target for the contract to be renewed. Contents of the License Agreement – Inclusions As this agreement is between the owner of the patent or licensor and the producer or licensee, their names must be clearly mentioned in the agreement. A license agreement must include: - The date of commencement - Description of the product or service being licensed - Address of client and sender - License grant: The licensor is providing a non-exclusive, non-transferable license for the use of the asset - The royalty payable to the licensor by the licensee for providing the license - Licensee’s obligations: The licensee can use the asset only for the purpose mentioned. - Intellectual property rights - Limitation of liability: The licensee indemnifies the licensor of any loss or liability due to the use of the asset - Confidentiality: Disclosure by either licensor or licensee to a third party is not permissible unless mentioned in the agreement. How to Draft the License Agreement While drafting a license agreement, you need to keep the following points in mind: - The names of the parties to the agreement and their relationship - The licensee should pay the licensor the agreed license fee on the execution of the agreement and each anniversary of this agreement. - Termination: The agreement can be terminated if there is a breach of contract by the licensee or insolvency of the licensee The key terms of a licensing agreement are: - The agreement which refers to the licensing agreement - Confidential information means information which is not to be divulged - Asset means the product or service provided by the licensor - Intellectual property rights refer to the copyright, trademark, design or patent being shared by the licensor - Party refers to the person or business entering into this agreement You can find a licensing agreement example online for reference. In this agreement, the licensor agrees to provide his or her patented product or service in return for a fixed fee called a royalty. While the licensor can negotiate the minimum sales required to renew the contract, the licensee can negotiate the royalty rate. Benefits & Drawbacks of the License agreement - The interest of both the licensor and the licensee are protected through this agreement. The licensor is assured of a minimum sales guarantee as well as a royalty for permitting the licensee to use the patented asset or technology. This can be found in any sample license agreement. - The licensee might be a small businessman who is unable to invest in technology. Through this agreement, the licensee can access it. - Minimum sale for renewal: The licensor may not renew the license of the licensee if the latter is not able to achieve the minimum target stipulated in the agreement over and above the royalty payable. This will result in loss of business for the licensee. What happens in case of violation What is an end user license agreement? This is an agreement between the licensor and the purchaser applicable for software, where the purchaser is given the rights to use the software. This agreement benefits both the licensor and the licensee. The licensor does not have to worry about marketing his or her invention, and the licensee gets superior technology for a fee and is able to market it for a profit. However, if the license violates any clause in the contract or is declared insolvent, the contract stands terminated. With a license agreement, the licensor can enjoy guaranteed minimum payments along with a fixed royalty on sales for the duration of the agreement. The licensee can be assured of assured returns on investment in the licensor’s assets, which would increase demand. You can Download the Free License Agreement customize it according to your needs and Print. License Agreement is either in MS Word, Excel or in PDF. Sample License Agreement Download this USA Attorney made Original Agreement for only $9.99 If you need any alterations or have any queries, please contact us before downloading.
<urn:uuid:aeb71cbf-5e7b-408a-b745-ed5d675e62cb>
CC-MAIN-2020-05
https://www.agreements.org/license-agreement.html/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783000.84/warc/CC-MAIN-20200128184745-20200128214745-00027.warc.gz
en
0.924732
1,269
2.953125
3
The Oceans of Data Institute (ODI) at the Education Development Center (EDC), Inc.; Stanford University; and the Scripps Institution of Oceanography have been collaborating, with the support of three National Science Foundation grants over the past 5 years, to bring large scientific data sets into secondary and postsecondary classrooms. These efforts have culminated in the development of a Web-based student interface to marine science data called Ocean Tracks (http://oceantracks.org), which incorporates design principles based on a broad range of research findings in fields such as cognitive science, visual design, mathematics education, and learning science. The Ocean Tracks interface was tested in high school classrooms in spring and fall of 2013 with a total of 195 high school students. These tests indicate that students appeared to find many aspects of the interface simple and intuitive to use. Teachers and students indicated that working with real data was highly engaging, pointing to the tremendous potential for “big data” to transform the way science is taught. Interest among college faculty in Ocean Tracks indicates a need in undergraduate classrooms for similar tools that allow students to interact with data. So in the fall of 2014, we began to collect baseline data on students attending undergraduate oceanography classes at the Scripps Institution of Oceanography (Scripps) and Palomar College, where we will also be developing curricula and conducting classroom tests. Preliminary results from this work are presented here. Source: Inspiring Future Marine and Data Scientists Through the Lure of Ocean Tracks. Randall E. Kochevar, Ruth Krumhansl, Kira Krumhansl, Cheryl L. Peach, Erin Bardar, Josephine Louie, Jessica Sickler, Julianne Mueller-Northcott, Amy Busey, Silvia LaVita, Jacqueline DeLisi. Marine Technology Society Journal, July/August 2015, Volume 49, Number 4, pp. 64–75. This article is for personal use only, and is not to be distributed in any format. The Marine Technology Society is a not-for-profit, international, professional association. Founded in 1963, the Society believes that the advancement of marine technology and the productive, sustainable use of the oceans depend upon the active exchange of ideas between government, industry and academia. See www.mtsociety.org.
<urn:uuid:61141f4a-50c7-47b9-a23e-859009022145>
CC-MAIN-2020-45
http://oceansofdata.org/our-work/inspiring-future-marine-and-data-scientists-through-lure-ocean-tracks
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107892710.59/warc/CC-MAIN-20201026234045-20201027024045-00073.warc.gz
en
0.911054
474
2.90625
3
In 1916, Ernest Everett Just became the first black man to earn a Ph.D. from the University of Chicago in experimental embryology, but perhaps his greatest legacy is the sheer amount of scientific papers he authored during his career. Just was born in 1883 and raised in Charleston, S.C., where he knew from an early age he was headed for college. He studied zoology and cell development at Dartmouth College in Hanover, N.H., and worked as a biochemist studying cells at Woods Hole Marine Biological Laboratory in Massachusetts. He became a biology instructor at Howard University before finishing his Ph.D., and would spend 20 summers also working at Woods Hole. From 1920 to 1931 he was awarded a biology fellowship by the National Research Council. Just pioneered research into cell fertilization, division, hydration and the effects of carcinogenic radiation on cells. Frustrated that no major American university would hire him because of racism, Just relocated to Europe in 1930. Once there, he wrote the bulk of his 70 professional papers, as well as two books. He died of pancreatic cancer in 1941 [sources: Biography, Genetics, Gwinnet County Public Schools].
<urn:uuid:f53b177a-418e-4c52-9fcd-4b1291b7bf5b>
CC-MAIN-2016-22
http://science.howstuffworks.com/innovation/scientific-experiments/10-black-scientists10.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049274985.2/warc/CC-MAIN-20160524002114-00140-ip-10-185-217-139.ec2.internal.warc.gz
en
0.988157
241
2.609375
3
The latest environmental “crisis” is the floating garbage polluting the world’s oceans, which is said to be killing “more than a million seabirds and 100,000 mammals and sea turtles each year.” But does this number really mean anything? The number of animals killed alone is meaningless without context. Understanding why requires a little ecological intuition. Suppose that a hunter goes into an isolated forest once a month to kill a deer. What is the hunter’s impact on the deer population? In the short term, after each deer is killed, the population decreases by one deer. In the long term however, the forest is only capable of sustaining a fixed number of grazing animals, and each deer that dies makes room for additional animals. Each dead adult means that there is more food available for the next generation. Whether the deer population remains stable or decreases depends on the adaptive capacity of the species to reproduce fast enough to compensate for the missing deer. If only a small percentage of the population is killed each year, then there will probably not be any change in the population. Given that there are colonies of sea birds which number over a million and a single sea turtle lays 150-200 eggs, it is far from obvious whether the number of animals killed by garbage has any impact on their population. Animals that survive due to decreased competition may balance the animals killed by plastics. Furthermore, the more drastic the impact on animal populations, the higher the evolutionary pressure for the surviving animals to adapt to their new plastic-rich environment. It is conceivable that plastic waste has a beneficial impact on the oceans, as it is well known for attracting schools of fish, perhaps because it forms a base for microorganisms. It certainly wouldn’t be the first time that environmentalists were dramatically wrong about the impact of a deadly pollutant. In any case, the evolutionary process will certainly maximize the potential of marine species to take advantage of their new environment.
<urn:uuid:197727b2-528f-401e-bddf-ea6ddb20236a>
CC-MAIN-2020-29
http://rationalmind.net/2007/12/31/is-plastic-flotsam-good-for-the-environment/?replytocom=2132
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657139167.74/warc/CC-MAIN-20200712175843-20200712205843-00393.warc.gz
en
0.952332
398
3.359375
3
September 25 -- Coal-fired power plants and wind farms can find happiness together in the West — that is the finding of a new National Renewable Energy Laboratory study. The impact that renewables have on coal and natural-gas base-load generation has been one of the concerns about adding more renewable generation to the power grid. Some studies have indicated that ramping up and down fossil-fuel plants to accommodate wind and solar ends up creating expense and pollution. The NREL study, however, concluded that with the offsets in operation and fuel savings from renewable energy, the benefits outweigh the costs. >>View Article Wednesday, 25 September 2013 15:01 Coal, Renewables Mix Well In West, NREL Report Says FeaturedWritten by Bill Nelander Published in Industry News Latest from Bill Nelander Leave a comment Make sure you enter the (*) required information where indicated. HTML code is not allowed.
<urn:uuid:be4669b5-5711-4d5c-96a4-8eb4e353c707>
CC-MAIN-2015-06
http://acore.org/acore-blog/item/3468-coal-renewables-mix-well-in-west-nrel-report-says
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422120928902.90/warc/CC-MAIN-20150124173528-00040-ip-10-180-212-252.ec2.internal.warc.gz
en
0.925746
186
2.8125
3
Don’t just say what happened. Kick up the drama. Add some flair. Get people interested. Use adverbs to tell people how it happened. Adverbs let you explain how frantically the bicycle thief fled the scene. Or how ardently the the postal worker loved the barmaid. With adverbs, you can describe all sorts of dramatic things. Today, we’ll help you do it in Italian, too! In this article, you’ll learn how to form Italian sentences with adverbs, three main types of adverbs with key vocabulary and where you can practice putting your new skills to use. What’s an Adverb, Anyway? An adverb is a describing word used to modify a verb. It’s distinct from an adjective, which is a describing word that modifies a noun. This rule applies in both English and Italian. In English, adverbs usually end in -ly (e.g. slowly). In Italian, adverbs usually end in -mente (e.g. lentamente, or “slowly”). Of course, there are some exceptions, but they’re easy to learn and we’ll discuss them in depth throughout this article. Essential Italian Adverbs and How to Use ‘Em Correctly Rules for Using Adverbs in an Italian Sentence Basic Word Order Rules Lui balla male. — He dances badly. In the passato prossimo (a super-common Italian past tense), the adverb directly follows the past participle: Lui ha ballato male. — He danced badly. Now that we have those basic word order rules down, let’s incorporate more grammatical building blocks. When There’s an Object If there’s an object in the sentence, the adverb still follows the verb or past participle: L’attrice ha ballato felicemente nella Fontana di Trevi. — The actress danced happily in the Trevi Fountain. In a Question In the context of a question, the adverb can go at the beginning or the end of a sentence. Tu ti trucchi ancora? — Are you still putting on your makeup? Here, ancora (still) is the adverb. When using an interrogative adverb (a.k.a. “question words”—more on those later) you place the adverb at the beginning of the sentence. Quando andiamo al teatro? — When are we going to the theater? Here, the interrogative adverb quando (when) is at the beginning of the sentence. Word Order with C’è or Ci sono The word order changes slightly when the sentence starts with c’è or ci sono (there is/there are). In this case, the word order is: subject + object + adverb + rest of the sentence. C’è una festa dopo la cerimonia di laurea. — There’s a party after the graduation ceremony. Ci sono coniglietti fuori! — There are bunnies outside! In pretty much every instance, a simple adverb (full list of these below) will be used in conjunction with c’é or ci sono. Word Order with Già Another exception to the usual word order is the adverb già (already). Gia goes before the verb. Ma mamma, ho già fatto i compiti! — But mom, I already did my homework! Hai già lavato i piatti? — Did you already wash the dishes? 3 Types of Italian Adverbs with Examples 1. Adverbs That Come from Adjectives To turn an adjective into an adverb, take the feminine form of an adjective that ends in -o and add -mente. For adjectives that end in -e, keep the spelling the same and add -mente. For example, if you wanted to turn lento (slow) into an adverb, you would take the feminine form of lento, which is lenta, and add -mente to get lentamente. Here’s lento used as an adjective: Il servizio in questo ristorante è lento. — The service in this restaurant is slow. Now let’s turn it into an adverb: Lui cammina lentamente. — He walks slowly. Here, lentamente is an adverb that modifies the verb cammina (walks). We already saw an example of an adjective ending in -e turned into an adverb—felice (happy) becomes felicemente (happily). 2. Simple Adverbs Simply put, simple adverbs are adverbs that aren’t formed from adjectives. You just have to memorize what they are. For beginners, these little words may be hard to remember. Often it seems like you can understand a sentence without them. But they’re actually info-packed, and being able to use them will improve your Italian immensely. Below are some examples of Italian simple adverbs, with sample sentences to show you how they’re used. This time we’ll throw in some examples in the present continuous tense, as indicated with an asterisk. Vengo da te attorno le nove.— I will be at your place around nine. Bene is one of the most commonly used adverbs in Italian. You use it to say that someone is doing something well. Luciano canta bene. — Luciano sings well. Marco non canta bene. — Marco does not sing well. Andrea ha cantato bene stasera? — Did Andrea sing well tonight? Si, lui ha cantato molto bene. — Yes, he sang very well. Il nuovo candidato è contro il presidente. — The new candidate is against the president. Il corpo del santo è dentro il cattedrale. — The saint’s body is inside the cathedral. (You’ll see this a lot in Italy!) Il cane sta abbaiando dietro la porta. — The dog is barking behind the door. Prendiamo una birra dopo la partita. — We’re getting a beer after the game. Andiamo insieme. — Let’s go together. Non… mai (never): Non ho mai visto “La Dolce Vita.” — I have never seen “La Dolce Vita.” Non… più (Not… anymore): Non sono più attore. — I’m no longer an actor. Stai attento! Ci sono vampiri oltre i muri del castello! — Watch out! There are vampires beyond the castle walls! Loro sono sempre insieme — They are always together. 3. Interrogative Adverbs You’ve probably already used interrogative adverbs all the time without knowing it. Interrogative adverbs in Italian are the “question words” used at the beginning of a question. These words include: - Come — How - Come mai — How come - Quando — When - Perché — Why - Dove — Where - Di dove — From where - Quanto — How much/how many In the examples below, notice how the interrogative adverb appears at the beginning of the sentence in both the present and past tense, as well as in a negative question. Quando mangiamo la cena? – When are we eating dinner? Quando avete mangiato la cena? – When did you (plural) eat dinner? Perché non hai assaggiato il lampredotto? – Why didn’t you try the lampredotto (tripe sandwich from Florence)? Where to Practice Using Italian Adverbs If you would like to put that dramatic adverb knowledge to the test, here’s a list of online quizzes that you can take. - Online Italian Club has an adverb quiz in which you have to type the correctly spelled adverb from a set of adjectives. - One World Italiano has an adverb quiz in which you select the appropriate adverb from a multiple choice list. - FluentU lets you hear how adverbs are used in real-life contexts. FluentU provides authentic Italian videos, like movie trailers, music videos, inspiring talks and more, that’ve been transformed into language learning experiences. FluentU takes real-world videos—like music videos, movie trailers, news and inspiring talks—and turns them into personalized language learning lessons, as you can see here: FluentU helps you get comfortable with everyday Italian by combining all the benefits of complete immersion and native-level conversations with interactive subtitles. Tap on any word to instantly see an image, in-context definition, example sentences and other videos in which the word is used. Access a complete interactive transcript of every video under the Dialogue tab, and review words and phrases with convenient audio clips under Vocab. Once you’ve watched a video, you can use FluentU’s quizzes to actively practice all the vocabulary in that video. Swipe left or right to see more examples of the word you’re on. FluentU will even keep track of all the Italian words you’ve learned to recommend videos and ask you questions based on what you already know. Plus, it’ll tell you exactly when it’s time for review. Now that’s a 100% personalized experience! The best part? You can try FluentU for free with a 15-day trial. Start using Fluent on the website, or better yet, download the app from the iTunes or Google Play store for iOS and Android devices. - Amy Chambless’ website has several great adverb exercises, including translation and selecting whether an adverb or adjective is appropriate in the given sentence. After mastering adverbs, you’ll become a master storyteller in Italian. You’ll be able to provide important details about how things occurred. You’ll also be more aware that those little words like già aren’t just random words you have to memorize. They’re actually adverbs. This gives you more context about how these words add meaning to a sentence. With a little practice, you’ll also see that adverbs are quite easy to learn and by correctly using them, your spoken and written Italian will sound much more fluent. Jesica Versichele is a writer in the art and culture niche. As an American expat who lives in the Netherlands, she writes about travel and cultural experiences in Europe for an American audience. Check out her website JV Creative Content. If you liked this post, something tells me that you'll love FluentU, the best way to learn Italian with real-world videos.
<urn:uuid:06663491-d518-45c2-a0ad-9b27b5b47906>
CC-MAIN-2020-05
https://www.fluentu.com/blog/italian/italian-adverbs/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250620381.59/warc/CC-MAIN-20200124130719-20200124155719-00413.warc.gz
en
0.891736
2,397
2.796875
3
Ever wondered how life would be if there were no animals on this planet? Well, life wouldn’t be the same because animals may seem insignificant or very dangerous to human beings. But each one of these animals plays a very crucial role in the ecological system. Wildlife plays a very significant role by harmonizing the environment. Different species of animals, from large to small, such as; The Rhinos, Elephant, Pangolin etc. are almost extinct. Illegal trade of animals is happening everywhere in the world, and its value is roughly 7-23 billion US dollars. Between the year 2013 and 2016, nearly 20 tons of Pangolin scales are held from prohibited shipment in Africa. If no action is taken against this illegal poaching, these precious animals will disappear from the face of this earth. Below is a list of top ten animals that are almost extinct. 10. Giant Panda It is also known as panda bear. Gaint panda originates from central China. It is a treasure here in China and is adored all over the world. This panda has white and black colors on its body. Researches shows that adult pandas can live up to 30 years. However, this is not always the case. Because both the Cubs and adult pandas die because of many predators such as the yellow-throated martens and the snow leopard that kill and consume this animal. In particular, pandas are in danger of extinction due to loss and disintegration of habitat, and by people hunting other animals and harvesting plants from the forests. The most depraving thing is that they are also vulnerable to the loss of habitat and destruction. Nevertheless, only humans can assurance a great opportunity for the pandas to continue living by protecting them and the environment they live.
<urn:uuid:0da0400a-85cf-4d14-8cb0-5f82a152a9cc>
CC-MAIN-2018-51
http://newscityhub.com/top-10-animals-verge-extinction/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825495.60/warc/CC-MAIN-20181214070839-20181214092339-00348.warc.gz
en
0.959028
364
3.421875
3
New Developments On Web Security Introduced By Mozilla New Developments On Web Security Introduced By Mozilla. Mozilla and BlackBerry’s work on security research techniques are in the area of fault injection. Fault injection (also known as “fuzzing”) is a method of automated security testing that is used to identify potential security concerns that can be fixed before users are at risk. Fault injection is a testing technique where specially designed software is created to inject a variety of unexpected or malformed data into a specific application, program or area of code. The goal is to uncover areas where the software does not properly handle the malformed data. Through fault injection it is possible to identify potential security weaknesses that can be proactively addressed before there is ever a threat to users. Originally posted at Security Pro News
<urn:uuid:06b2e5cf-6d03-4830-9e44-305320a67edc>
CC-MAIN-2019-09
http://www.internet-security-magazine.com/internet-security/internet-security-news/new-developments-web-security-introduced-mozilla/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482347.44/warc/CC-MAIN-20190217172628-20190217194628-00546.warc.gz
en
0.917139
162
2.65625
3
Using INDIRECT to reference cell in another worksheet In cell m7 you enter the sheet name, say Sheet1 and you want to reference cell v14 on that worksheet, the formula would be: If the sheet name has spaces in the name say Sheet One the formula would =INDIRECT("'"&M7&"'!V14") or use 'Sheet One' in cell M7 and the formula would be as the first one. Hope that's not confusing....... All the Best Microsoft MVP - Excel Newcastle upon Tyne > I am having trouble with the following: > I have 24 Identical workbooks with Identical formula setups. I am > the summary sheet to include only the data from sheets that I am > I have seen the solution on this newsgroup before but am still missing > something. This is what I have so far... > M7 has the string I want to reference the worksheet name and V14 is the > reference desired. It is giving the proper text string but not returning > values from the cell. > Any consideration would be greatly appreciated.
<urn:uuid:7a760c6e-0bce-4035-bd29-0cf5348f2640>
CC-MAIN-2014-10
http://www.office-archive.com/14-excel/124a115a31b4eb06.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021586626/warc/CC-MAIN-20140305121306-00047-ip-10-183-142-35.ec2.internal.warc.gz
en
0.895476
242
2.734375
3
Communication between the parents and the teacher is very pivotal for the success of the student. However, some parents try to be to involved. It is important to have good communication between parents and teachers, and a good way to help gap the communication between home and school is to have a classroom website. By creating a classroom website, a teacher can upload assignments that are due or when tests are so parents can help their children stay on track. Also the teacher can post pictures of things the children are doing while in class so the parents can feel more involved. I think it is also extremely important for teacher/parent conferences. I think that the teacher should always be wiling to meet with the parents of their student in order to see how things are going at home and see if the students needs anything while at school. Communication is the key to a successful schooling experience for children.
<urn:uuid:56354c52-b8fc-452c-bbf2-aaad34d52e66>
CC-MAIN-2019-04
https://mgarber1.wordpress.com/2013/09/15/the-importance-of-communicating-with-parents/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659056.44/warc/CC-MAIN-20190117163938-20190117185938-00183.warc.gz
en
0.985131
175
2.703125
3
Regardless of their religious persuasion, righteous men and women still looked forward to the coming of the Messiah during the intertestamental period. Poets sang psalms, and the common people prayed, talked, and dreamed of His arrival—a Davidic King who was destined to save His people. One group waiting for the Messiah was the Essenes, which formed during the Maccabean conflict. The Essenes believed that the temple priests in Jerusalem were corrupt and the temple was in need of serious reform. In their view, the coming of the Messiah was near. They believed He would join with them to throw off the oppressive yoke of Rome, whose rulers had conquered Palestine some 60 years before the birth of Jesus. Like the Reformation that preceded the Restoration, the intertestamental period also witnessed events that prepared the world for the coming of Jesus Christ. This time had a remarkable production of religious literature, including the translation of the Hebrew Bible into Greek and the beginning of the creation of the Dead Sea Scrolls and the Apocrypha. During this time the ideas about angels, resurrection, and the concepts of heaven and hell became developed and refined. However, without a prophet to guide them, the Jews debated the meaning of the scriptures and about who the Messiah would be. While most people waited for a Davidic Messiah (one descended from King David), others championed a Messiah who was the son of Aaron—a priestly Messiah. Still others did not expect the Messiah to come. So many expectations had built up among the different groups during the intertestamental period that the groups did not know how to recognize the true Messiah when He came to them. None of the groups—scribes, Pharisees, Essenes, or Sadducees—accepted John the Baptist as a prophet or Jesus as the Messiah. Some members of these groups became the primary adversaries of John and Jesus during their ministries (Read Matthew 21:23–46). The debates and arguments among the differing groups about the Messiah continued. The first prophet of the new dispensation, John the Baptist, announced the coming of the true Messiah and clarified the type of salvation He would provide. Indicating Jesus Christ, John said, “Behold the Lamb of God, which taketh away the sin of the world” (John 1:29). Many Jews accepted John as he prepared the people for the coming of Christ. When Jesus Christ began His ministry, He taught the people “as one having authority, and not as the scribes” (Matthew 7:29). He had many discussions with the religious leaders, clarifying the doctrines of marriage, resurrection, the Godhead, and His role as the Savior. Since many of the religious leaders rejected Him (Read Matthew 26:4), Jesus told them: “Ye neither know me, nor my Father: if ye had known me, ye should have known my Father also.” He added, “If God were your father, ye would love me” (John 8:19, 42). Because they expected a Messiah so different from Jesus, they rejected Him. Thankfully, we live in an age when the truths of the gospel are built on the foundational teachings of prophets and apostles (Read Ephesians 2:20). We do not have to choose among the spiritual crosswinds that arise without the guidance of prophets and apostles. As we follow our latter-day prophets and apostles, we will come to understand the true doctrine of the Savior Jesus Christ, as was revealed to the Prophet Joseph Smith: “For [I] saw him, even on the right hand of God; and [I] heard the voice bearing record that he is the Only Begotten of the Father— “That by him, and through him, and of him, the worlds are and were created, and the inhabitants thereof are begotten sons and daughters unto God” (D&C 76:23–24). May the Lord help us to come to the knowledge of serving Him alone. Shalom!
<urn:uuid:c553be0c-0fb1-4417-8166-9547b8fc6317>
CC-MAIN-2020-50
https://www.erykingdomforum.org/apostasy-and-the-awaiting-new-dispensation/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141674082.61/warc/CC-MAIN-20201201104718-20201201134718-00015.warc.gz
en
0.971642
829
3.46875
3
The ancient Greek term for sea gods was "Theoi Halioi" or "Theoi Einalioi." These deities were commanded by the Sea-King Poseidon and his queen Amphitrite. Maritime scenes featuring a host of sea-gods were very popular in Greco-Roman mosaic. A COMPLETE LIST OF GREEK SEA GODS & GODDESSES AEGAEUS (Aigaios) A god of violent sea-storms. He was an ally of the Titans. AEOLUS (Aiolos) The king of the winds. He kept the storm-winds, squalls and tempests locked away in the hollows of the floating island of Aiolia, to be released at the command of the gods. ACHEILUS (Akheilos) A shark-formed sea Daemon. ALCYONE & CEYX (Alkyone & Keyx) The former king and queen of the realm of Trachis were transformed into a pair of kingfishers. The birds presided over the halcyon days, a period of calm seas good for sailing. AMPHITRITE The goddess queen of the sea, wife of Lord Poseidon. Amphitrite was the goddess who spawned the sea's rich bounty--fish and shellfish--as well as dolphins, seals and whales. APHROS One of the Ichthyocentaurs or fish-tailed centaurs. Aphros was the god of the sea-foam who, along with his brother Bythos, carried Aphrodite ashore at her birth. APHRODITE The goddess of love and beauty. She was born from the foam of the se, when the castrated genitals of Ouranos were cast down from heaven. Although Aphrodite was a heavenly goddess she retained a close kinship with the sea. ARGYRA One of the sea nymphs whose name means the "Silvery One." She loved an Achaean man named Selemnus who was transformed into a river. BENTHESICYME (Benthesikyme) One of the sea nymphs, a daughter of the god Poseidon. Her name means "deep wave" and she was the wife an Ethiopian king named Enalos "the man of the sea." BRIAREUS (Briareos) The god of violent sea-storms. He was one of the Hecatoncheires, three hundred-handed, fifty-headed giants, and a son-in-law of Poseidon who made his home on the floor of the Aegean sea. BYTHOS One of the Ickhthyocentaurs or fish-tailed sea-centaurs. He and his brother Aphros brought the goddess Aphrodite to shore following her sea-birth. His name means "sea-depths". CABEIRO (Kabeiro) A sea nymph native to the shores of the island of Lemnos. She was a goddess of the Samothracian Mysteries, and the mother by Hephaestus of the Cabiri. CALLISTE (Kalliste) The sea nymph of the Island of Calliste. CAPHEIRA (Kapheira) The sea nymph nurse of the god Poseidon. CARCINUS (Karkinos) A gigantic crab who allied itself with the Hydra against in a battle against Heracles. It was crushed beneath the hero's foot and placed amongst the stars as the constellation Cancer. CETEA (Ketea) The monsters of the sea's depths. One, sent by Poseidon to ravage Troy, was slain by Heracles, another sent to punish the Ethiopians which was destroyed by Perseus. CETO (Keto) An ancient sea-goddess. She was the goddess of the monsters and dangers of the deep. Her name means "whale" or "sea-monster." CHARYBDIS (Kharybdis) The monstrous Daemon of whirlpools and the tides. She was chained to the sea-bed where her inhallation caused the seas to rise and fall. CYMOPOLEIA (Kymopoleia) A sea-nymph of high storm waves. She was the wife of the Aegean storm-giant Briareus. DELPHIN The leader of the dolphins. He aided Poseidon in the wooing of Amphitrite, and as a reward was placed amongst the stars as the constellation Delphin. DORIS One of the Oceanides, the wife of Nereus and mother of the fifty Nereides. She may have presided over the mingling of fresh water with the brine as her name suggests. EIDOTHEA A prophetic sea-nymph. She was the daughter of the seal-herder god Proteus. ECHIDNA (Ekhidna) A monstrous she-dragon, half serpent and half fair Nymph. She was born of the scum of the sea or the sea-gods Phorcys and Ceto, and was associated with slime, sea-rot, fetid salt-marshes, eels and lampreys. By the storm-giant Typhoeus she became the mother of many a foul beast. ELECTRA (Elektra) One of the Oceanides, the wife of the sea-god Thaumas and mother of the Rainbow (Iris) and the Storm-Gusts (Harpyiae). She probably presided over her namesake "amber"-coloured clouds often seen accompanying the rainbow. EROTES The winged gods of love. Like Aphrodite they were regarded as minor sea-deities and frequently appear in maritime scenes depicted in Roman mosaic. EURYBIA An ancient sea-goddess with power over the shifts of the sea. Her descendants included the Winds and the Stars. GALATEA (Galateia) One of the fifty Nereides. She probably presided over her the "milk-white" swirls in the brine as her name suggests. GALENE One of the fifty Nereides, she was the goddess of calm seas. GLAUCUS (Glaukos) The fisherman's sea-god. Glaukos was originally a fisherman who was turned into a fish-tailed god after eating a magical herb. GORGONS (Gorgones) Three monstrous sea Daemones with snaky locks, bronze claws, wings, and wide grinning tusked mouths. As daughters of the sea gods Phorcys and Ceto they probably represented dangers of the sea, such as submerged rocks and reefs. GRAEAE (Graiai) Three grey-haired, prematurely old sea Daemones, who shared but one tooth and one eye between them. They probably presided over the froth of sea-foam. HALIA A sea nymph of the brine, mother of the Daemones of Rhodes. When she was raped by her sons she leapt into the sea for shame. HALIAE (Haliai) The nymphs of the sea. They included not only the Nereides, but also the daughters of Poseidon and the other sea gods. HARPIES (Harpyiai) A pair, or three, winged sea Daemones, daughters of the sea-god Thaumas. They were spirits of whirlwinds, water spouts, and violent storm gusts. HELLE The goddess nymph of the Hellespont sea. She was the sister of the boy Phrixus who fell sea from the back of the flying Golden Ram during her escape from Greece. Poseidon rescued and transformed her into a sea-goddess. HIPPOCAMPS (Hippokampoi) The fish-tailed horses of the sea, four of whom drew the chariot of Poseidon. ICHTHYES (Ikhthyes) A pair of divine fish who brought Aphrodite ashore following her sea-birth. As reward they were placed amongst the stars as the constellation Pisces. ICHTHYOCENTAURS (Ikhthyokentauroi) Twin sea-centaurs, Aphros (Foam) and Bythos (Depths), who carried Aphrodite to shore in a cockle shell following her sea birth. INO Another name for Leukothea. LADON A monstrous, hundred-headed sea-serpent, son of the sea-gods Phorcys and Ceto. He guarded the western reaches of the sea, and the island and golden apples of the Hesperides. LAMIA A monstrous shark-shaped sea Daemon. She was a devourer of men. LEUCOTHEA (Leukothea) The goddess of the Ionian sea, a protector of sailors and fishermen. She was originally a princess named Ino who was entrusted with the nursing of Dionysus. Hera drove her husband mad, and fleeing his anger she leapt with her son Melicertes into the sea, where the gods transformed the pair into marine-deities. MELICERTES (Melikertes) Another name for the child sea-god Palaemon. NEREIDS (Nereides) A band of fifty goddess nymphs. They were providers of the sea's rich bounty of fish and protectors of sailors. NEREUS An ancient fish-tailed sea-god. He and his fifty Nereid daughters presided over the sea's rich bounty of fish and salt. NERITES A sea Daemon who was transformed into a shell-fish by the goddess Aphrodite. OCEANUS (Okeanos) The Titan god of the earth-encircling, fresh-water river Oceanus. In late classical times he was re-imagined as a god of the briny sea. OEOLYCA (Oiolyka) A sea nymph daughter of the stormy sea-gods Briareus and Cymopoleia. She probably presided over storm surges and flooding waves. Her name means "the Lone Wolf." PALAEMON (Palaimon) A sea-god protector of sailors and fishermen who was depicted as a boy riding dolphin-back. He was originally the boy Melicertes, child of Ino of Thebes. His father was driven mad by Hera, and Ino, fleeing his wrath, leapt into the sea with the child where the two were transformed into marine divinities. PALLAS A warrior sea nymph, friend and companion of Athena. PHORCYS (Phorkys) An ancient sea god who presided over the many dangers of the sea. His name is connected with the Greek word for seal. PONTUS (Pontos) The Protogenos or primordial god of the sea. Pontos was little the liquid form of the sea itself rather than an anthropomorphic god. POSEIDON The king of the seas and lord of the sea-gods. Poseidon received his domain when the three sons of Kronos drew lots for division of the universe. He dwelt in a golden palace on the sea bed with his queen Amphitrite and son Triton. PROSEOOUS DAEMONES Evil sea Daemones which haunted the dark caverns of the island of Rhodes. They were imprisoned beneath the island by their father Poseidon for their crimes. PROTEUS An old shape-shifting, prophetic sea-god. He was the herder of Poseidon's seals. PSAMATHE One of the fifty Nereids. She was the goddess of sandy beaches. RHODE A sea-nymph daughter of the god Poseidon. She was the goddess of the island of Rhodes. SIRENS (Seirenes) Three dangerous sea Daemones with the heads of women and the bodies of birds. They lured sailors to their deaths with their irresistable siren-song. Some say they leapt into the sea in despair when Odysseus sailed past unharmed. SCYLLA (Skylla) A monstrous sea Daemon who preyed on passing sailors. She had the upper body of a nymph, the tail of a fish, and a ring of six ravening dog-heads circling her waste. Some say she was slain by Heracles but restored to life by her father the sea-god Phorcys with flaming torches. TELCHINES (Telkhines) Sea Daemones native to the island of Rhodes. They were practitioners of fell magic, bringing forth storms and drought, and killing men with the power of the evil eye. The gods buried them in the depths of the sea. TETHYS A Titan goddess associated with the sources of fresh-water who was later imagined as a sea-goddess similar to Thalassa. THALASSA The Protogenos or primeval goddess of the sea. She was the mother of the fishes by her male counterpart Pontus. THAUMAS An ancient sea god. He presided over the wonders of the sea. By Electra he was the father of Iris (rainbow) and the Harpyiae (storm gusts). THETIS The leader of the fifty Nereids. She presided over the spawning of marine life in the sea. THOOSA A sea nymph, the mother of the Cyclops Polyphemus by Poseidon. She may have presided over "swift" currents and sea rips, as her name suggests. Her parents and siblings represented other dangers of the sea. TRITEIA A militant sea nymph of the Achaean coast. She was a companion of the god Ares. TRITONIS The goddess nymph of the Libyan salt-lake Tritonis. TRITON The herald of the god Poseidon. A blow of his conch-shell horn calmed the waves. TRITONES Fish-tailed Daemones of the sea, the male counterparts of the sea nymphs. They belonged to the train of Poseidon.
<urn:uuid:7a3da62f-e0a7-494a-bbb8-174afafcf631>
CC-MAIN-2019-35
https://www.theoi.com/greek-mythology/sea-gods.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313589.19/warc/CC-MAIN-20190818022816-20190818044816-00292.warc.gz
en
0.949556
2,975
3.015625
3
From 1919 onward, with the advent of peace and after a traditional postwar rundown, the Aviation militaire belge went through a series of changes before settling down to a relatively solid structure. The flying units were merged into groups depending on their mission and divided over the various bases built and left behind by the German Luftwaffe. The Army-Cooperation Group was installed at Goetsenhoven airfield. Bierset received the Bomber Group which was equipped with D.H.4s. One section of the Fighter Group settled at Schaffen, whereas the other was to be based at Nivelles. Evere finally was to be the mainstay for the Reconnaissance Group. April 1919, the Aviation Militaire Belge/Belgische Militaire Luchtvaart organized itself around 8 squadrons comprising 3 fighter squadrons using Hanriot H.D.1s, Sopwith Camels, Nieuport 23s, Spad XIIIs and Fokker D.VIIs, the latter having been carried over from the German Luftwaffe as a war compensation measure. As a member of the Occupation Forces in Germany, a series of duties had to be attended to by the Aviation militaire amongst which was the continuous presence of a reconnaissance squadron in Bockum (Krefeld) and a replacement system was kept up from 1919 through 1924. In March 1920 on account of extensive changes within the Belgian Army structure, the Aviation Militaire became the Aéronautique Militaire and the squadrons eventually swapped airfields. During the war years training of future pilots had been at first handled by the flying School at Etampes and later switched to Juvisy. The war over it was decided a military flying school should be established at As (Province of Limburg), not withstanding the fact that a private pilot's license had to be obtained from any of the three civilian flying schools prior to being accepted as a prospective military pilot. This scheme would be adhered to till 1932. In the same year, in an effort to try to standardize the basic air materiel, provision was made in Belgium for local manufacturing of aircraft. The Sociéte Anonyme Belge de Constructions Aéronautique (S.A.B.C.A.) which had been founded in Evere in 1920, started off on a license-construction program of very specific foreign aircraft types. Enumerating the various models constructed by SABCA would ask for a separate study. Between 1922 and 1931 this factory turned out and supplied to the air arm quite an impressive collection of types, including : - 30 D.H. 9 (1922-23) - 87 Nieuport-Delage 29C-1 (1924-26) - 45 Ansaldo A.300/4 Reconnaissance Bombers (1923-26) - 27 Avro 504K Primary Trainers (1923-27) - 15 D.H. 4 (1926) - 20 Morane-Saulnier Parasol (1923) - 40 Bristol 17 F2B Mk. IV (1926) - 39 Avia B.H. 21 (1927-29) - 146 Breguet 19 (1928-31) From 1924 onward the Aéronautique Militaire took into inventory of the first all-Belgian two-seat trainer Renard-Stampe-Vertongen RSV.32 of which 14 were delivered in the course of 1924-25 with 5 more to follow rather belatedly in 1929. In the same period the Aéronautique Militaire acquired several types of aircraft from foreign sources directly, including : - 35 Fokker D VII (1919-21) - 21 Nieuport-Delage 29C-1 (1924-25) - 6 Breguet 19A (1925) - 31 Bristol 17 F2B Mk. I (1926) - 5 Avia BH.21 (1927) This remarkable effort to obtain an sizable amount of aircraft was the result of a series of re-organiza-tions in June 1921 to bring the Aéronautique Militaire up to an acceptable strength. This resulted in a substantial increase in the number of squadrons, this again entailing a growing need for recruiting of prospective pilots. The structure eventually took the following form : Still not satisfied with the build-up yet another regrouping of the units resulted in a 1924 split-up into three groups : one observation, one fighter and one bomber group. The Flying School at As moved to Wevelgem. Eventually the three air groups merged into regiments in 1926. The Army budget restriction measures brought forth the creation of a "Direction Supérieure de l'Aéronautique". One regiment was disbanded leaving the following two-regiment deployment at the end of 1929 : At that time the basic aircraft line-up included DH.4s, DH.9s, Breguet 19s, Nieuport-Delage 29s, Avia BH.21 Fighters and Avro 504K as well as 504Ns and last but not least the indigenous RSV 26 trainer. The Flying School at Wevelgem expanded its services to include a primary as well as an advanced flying training program. Still a part of the Belgian Army, the air regiments now accounted for 1990 personnel, 234 first-line aircraft, exclusive of reserve stock, and 36 trainers. An initial order of 25 Firefly II M was placed with the British Fairey Aviation Company. Such was the interest for this aircraft with the Air Staff that it was decided to open a branch factory of Fairey's at Gosselies, where an initial production program for 36 machines was envisaged in 1932. Twenty-six Firefly II Ms were built between 1933 and 1936. Soon after, the advanced observation and reconnaissance Fairey Fox II M was to be equally manufactured at Gosselies, twelve of these two-seaters having been ordered from the mother factory and delivered in 1932. A second order of 26 Fox II Ms and 2 Fox II S to be supplied in the course of 1933 was placed with the Gosselies plant. In 1934 another 14 locally-manufactured Fox IIIs entered into service. In June 1934 a two-year flying training agreement was reached between Belgium and Iran, the former arranging for a team to train the future Iranian pilots in Teheran. In 1935 the Aéronautique Militaire became one of the two components of the 'Commandement de la Défense Aérienne du Territoire' (D.A.T.), the other being the anti-aircraft organization. From then on a progressive start was made to re-arrange the air arm into three regiments again, each one however controlling three groups. Severe budgetary restrictions inspired the staff to upgrade the existing equipment rather than to immediately acquire new aircraft, although 50 Fox IIIC machines were delivered between 1935-37 and a further 46 aircraft of the Fox IVR reconnaissance version trickled to the air groups from 1935 onward. Equipped with Hispano Suiza engines, these aircraft soon were being referred to as 'Fox Hispano'-s. Whilst fifty-two Fox VIC fighters entered the services in the 1935-36 period, two nationally-developed aircraft types were ordered. One was the Renard R31 parasol-type monoplane of which ten were manufactured by Ateliers Renard in Evere, the remaining 26 being built by SABCA between 1935-37. The second type was the Stampe-Vertongen SV.5 used for liaison and training purposes, twenty aircraft being manufactured in 1936. Further limited number acquisitions included the Koolhoven FK.56 trainer, the Fokker F.VII three-engined transport, the Caudron Goëland twin-engined transport and the Potez 33 communications machine. SABCA on the other hand was to deliver 10 Morane 230 and 236 liaison aircraft in 1933 and 31 Avro 504Ns between 1936 and 1939. A batch of 22 Gloster Gladiators were bought from Britain in 1938 and was to re-equip one squadron. A possible license agreement faltered after lengthy discussions in 1937. Following the Munich crisis, war clouds gathered threateningly over Europe and the Belgian Army now reverted to an armed peace-time stand-by. The Tchecoslovakian events urged the D.A.T. staff to search for a rapid modernization of its materiel and to re-equip with more advanced aircraft. Pressed for machines but hampered by an understandable reluctance on the side of foreign nations to export aircraft that were badly needed by themselves, the DAT ordered license-production to be started with the Gosselies plant to obtain 16 Fairey Battle bombers. This aircraft differed from the original British design in that it had an extended nose radiator. Twelve FOX.VIII were ordered in September 1938. This upgraded version of the dilapidated Fox would prove an inferior machine once in combat. Still in 1938 negotiations were started to buy Hawker Hurricane I fighters leading to an initial delivery of 20 machines originally destined to go to the RAF. In March 1939 a further order for 80 Hurricanes to be license-built at Fairey's in Gosselies was launched. Of this batch only three would be ready by the time of the invasion. The Belgian Hurricane was to have had four .5-in guns, but the ones finished had only two. Another relatively modern aircraft was the Fiat CR.42 fighter biplane of which 30 were ordered and a substantial number delivered. As the clouds of war drew nearer Belgium ordered the Brewster Buffalo from the United States and as history would have it some of these aircraft were still crated at the Bordeaux docks at the outbreak of hostilities. On November 1st, 1939 the DAT was fully deployed to meet the enemy, the structure developing towards its wartime build-up and on May 10, 1940 eventually being the following : Last Updated : 06/11/11 15:52 Daniel Brackx
<urn:uuid:660ccb72-1ed4-47f1-a6c8-befdef64b9df>
CC-MAIN-2015-18
http://www.belgian-wings.be/Webpages/Navigator/Belgian_Aviation_History/interbellum/Interbellum.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246656747.97/warc/CC-MAIN-20150417045736-00004-ip-10-235-10-82.ec2.internal.warc.gz
en
0.96155
2,117
2.5625
3
Three-dimensional (3D) printing technology provides a simple and reasonably fast method to produce complex structures and hence is widely used in rapid prototyping. In addition, due to its ease of use and cost-effectiveness, the technology offers immense scope for personalization. Recently, there has been great interest in using 3D printing to print functional conductive microstructures for use as sensors and for other microelectromechanical applications [2,3]. Past successes include using conductive nanocomposites for micromolding and micropatterning . In fact, large scale micropatterning on flexible substrates has been demonstrated . The nanocomposites were prepared by mixing multi-walled carbon nanotubes in poly(dimethylsiloxane) and then crosslinking the linear polymer. In spite the aforementioned successes, this particular nanocomposite has some disadvantages. For one, it is not easy to prepare. Therefore, there is significant scope for improvement if effective use of the processing-properties-performace triad can be mastered. However, much remains to be understood even in the realm of materials design. Therefore, here we step back and focus on a more fundamental issue — the link between the processing undergone by a material intended for use in 3D printing and its effect on various properties. As it is already widely used, poly(acrylonitrile butadiene styrene) was chosen as the matrix polymer. To render the material electrically conductive, multi-walled carbon nanotubes (MWCNTs) were introduced at several concentrations. The polymer and the carbon nanotubes were blended and the nanocomposites prepared by three different methods: solvent casting, melt mixing and capillary extrusion. Solvent casting was unlikely to significantly orient the carbon nanotubes and hence was expected to function as the control. Melt mixing uses mostly shear deformations to disperse the carbon nanotubes in the sample. In capillary extrusion, in addition to shear flow, the sample also experiences significant elongational deformation. Therefore, these three methods are expected to yield polymer nanocomposites with different orientations of the carbon nanotubes and/or agglomerates and consequently, produce nanocomposites with different physical properties. The mechanical and electrical properties of the nanocomposites prepared by the three methods were compared. The structure and morphology of the nanocomposites were investigated by various techniques and several structural parameters that quantify the structure were measured. It was found that certain structural parameters were sensitive to the processing method used to prepare the samples. It will be argued that the aforementioned structural parameters can provide one route to rationally connect the processing method to the properties of the nanocomposite produced. S. Guo, X. Yang, M.-C. Heuzey, and D. Therriault, "3D printing of a multifunctional nanocomposite helical liquid sensor" Nanoscale, 7, 6451–6456 (2015). doi: 10.1039/C5NR00278H A. Khosla, "Nanoparticle-doped electrically-conducting polymers for flexible nano-micro systems" The Electrochemical Society Interface, 21, 67-20 (2012). doi: 10.1149/2.F04123-4if Khosla, A. (2011). "Micropatternable multifunctional nanocomposite polymers for flexible soft MEMS applications" (Doctoral dissertation, Applied Science: School of Engineering Science). http://summit.sfu.ca/item/12017 A. Khosla, B.L. Gray, "Preparation, characterization and micromolding of multi-walled carbon nanotube polydimethylsiloxane conducting nanocomposite polymer" Materials Letters, 63, 1203-1206 (2009). doi: 10.1016/j.matlet.2009.02.043 A. Khosla, B. L. Gray, "Preparation, micro-patterning and electrical characterization of functionalized carbon-nanotube polydimethylsiloxane nanocomposite polymer" Macromol. Symp., 297, 210–218 (2010). doi:10.1002/masy.200900165 A. Khosla, D. Hilbich, C. Drewbrook, D. Chung, B. L. Gray, "Large scale micropatterning of multi-walled carbon nanotube/polydimethylsiloxane nanocomposite polymer on highly flexible 12×24 inch substrates" Proc. SPIE 7926, Micromachining and Microfabrication Process Technology XVI, 79260L (2011); doi:10.1117/12.876738.
<urn:uuid:b2d0a348-7dda-41af-8c25-60316d617ed9>
CC-MAIN-2022-49
https://ecs.confex.com/ecs/232/webprogram/Paper104265.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710980.82/warc/CC-MAIN-20221204204504-20221204234504-00428.warc.gz
en
0.889359
1,033
3.140625
3
A modern democratic society is characterized not simply by a pluralism of comprehensive religious, philosophical, and moral doctrines but by a pluralism of incompatible yet reasonable comprehensive doctrines. No one of these doctrines is affirmed by citizens generally. Nor should one expect that in the foreseeable future one of them, or some other reasonable doctrine, will ever be affirmed by all, or nearly all, citizens. Political liberalism assumes that, for political purposes, a plurality of reasonable yet incompatible comprehensive doctrines is the normal result of the exercise of human reason within the framework of the free institutions of a constitutional democratic regime. Political liberalism also supposes that a reasonable comprehensive doctrine does not reject the essentials of a democratic regime. (xvi)So, to start, Rawls recognizes that modern society is not based on consensus around the major values or issues; rather, individuals differ in their commitments about rights, justice, and the good human life. How in the context of this pluralism of important value systems, is it possible for a modern society to nonetheless possess the features of civility and stability that we would desire? Here, then, is what Rawls calls the problem of political liberalism: How is it possible that there may exist over time a stable and just society of free and equal citizens profoundly divided by reasonable though incompatible religious, philosophical, and moral doctrines? Put another way: How is it possible that deeply opposed though reasonable comprehensive doctrines may live together and all affirm the political conception of a constitutional regime? What is the structure and content of a political conception that can gain the support of such an overlapping consensus? (xviii)One prior thought we may have had about a liberal society is that the state establishes no more than a neutral system of law, within the context of which individuals can pursue their own separate and incompatible conceptions of the right and the good. So the liberal state is a neutral state -- one that gives no privilege to one conception of the good over another. Neutrality is certainly part of the ideal of a liberal state; but it isn't quite enough. The reason is that some conceptions of the good and the right require the intervention of the state for enforcement. If the Alpha group believe that fetal stem cells are nascent human beings and therefore should never be used for the purpose of scientific research, while the Beta group believe that fetal stem cells are no more than useful compounds of organic molecules that can relieve human misery; then both sides of the debate want to prevail through legislation -- either to prohibit stem cell research or to permit stem cell research. Each side sees its position as being driven by a moral imperative -- and therefore not to be compromised without an unacceptable loss of moral integrity on the part of the losing group. To overcome this contradiction, neutrality is not enough. We need to add a commitment to democratic, constitutional procedures as being the moral trump card when it comes to legislation about areas of conflict based on fundamental disagreements about the right and the good. Essentially this comes down to a second-order commitment that every citizen needs to share: When policy issues arise that lead to profound disagreement among blocs of citizens, the right solution is the procedurally correct solution arrived at through legitimate democratic processes. In other words, all citizens need to put their commitment to legitimate democratic procedures ahead of their commitment to a particular conception of the good and the right. Democratic values supersede religious, political, and moral convictions when there is no choice but to legislate an issue. Citizens are entitled to argue their case for or against proposed legislation; but they are then morally obligated to accept the democratically chosen outcome as a legitimate resolution of the issue. Rawls captures this conundrum with the idea of toleration: the idea that citizens must tolerate and respect the strongly-held convictions of their fellow citizens, even while participating in a political process that leads to legislation that is inconsistent with those convictions. This means that if the Alphas prevail through the political process, the Betas need to accept the outcome as morally legitimate -- even though it contradicts their own firmly held moral convictions. But why would one accept the moral necessity of toleration? Doesn't this mean sacrificing one's own moral convictions to the will of a contrary majority? And doesn't this imply that one's own convictions are tentative and conditional? The answer seems to go along something like these lines. When one is a member of a society, one recognizes the inevitable fact of the kind of fundamental pluralism Rawls has described here. This means that society will sometimes legislate about issues concerning which reasonable citizens disagree, based on fundamental moral convictions on both sides. So the citizen is asked to bracket his/her particular moral convictions when considering outcomes, even as he/she is free to vigorously argue on the basis of those convictions during the process leading up to legislation. The citizen is asked to take a double perspective on his/her own moral convictions: first-person, that these are my convictions and they seem binding and justified from my point of view; and third-person, that there is disagreement about these matters, and the only defensible process for resolving the issue is the democratic process in which each person's reasons count as much as every other person's. This is something like Thomas Nagel's understanding of altruism in The Possibility of Altruism; the individual is asked to recognize the moral reality of other persons and not to assign a privileged role to his/her own perspective. A key part of Rawls's own solution to this problem of democratic pluralism is the idea of an "overlapping consensus" among citizens. Here is how he defines that idea: Such a consensus consists of all the reasonable opposing religious, philosophical, and moral doctrines likely to persist over generations and to gain a sizable body of adherents in a more or less just constitutional regime, a regime in which the criterion of justice is that political conception itself. (15) In such a consensus, the reasonable doctrines endorse the political conception, each from its own point of view. Social unity is based on a consensus on the political conception; and stability is possible when the doctrines making up the consensus are affirmed by society's politically active citizens and the requirements of justice are not too much in conflict with citizens' essential interests as formed and encouraged by their social arrangements. (134)So the ideal here is the notion that some set of constitutional arrangements may be acceptable from all points of view -- from Christian to libertarian to Muslim to socialist. This hope seems to rest on the idea that a neutral, democratic set of political institutions give the best opportunity for the adherents of any particular theory of the good to pursue their interests; so each of the "reasonable opposing religious doctrines" may have good reason to endorse the neutral democratic constitution. (This is a kind of "original position" argument, applied to opposing comprehensive doctrines.) What makes this a consensus of any kind is not the notion that there is an overlapping set of values that persist across all the comprehensive doctrines; rather, it is the hope that there will be at least one political arrangement that can serve as the consensus choice of all the incompatible comprehensive doctrines. The preceding account says that the consensus goes down to the fundamental ideas within which justice as fairness is worked out. It supposes agreement deep enough to reach such ideas as those of society as a fair system of cooperation and of citizens as reasonable and rational, and free and equal. As for its breadth, it covers the principles and values of a political conception ... and it applies to the basic structure as a whole. (149)So -- what is a political liberal, according to Rawls? It seems to boil down to this. It is a moral individual who has his/her own conception of the good and set of fundamental doctrines; who recognizes nonetheless that he/she is a member of a polity that is fundamentally plural when it comes to conceptions of the good; who recognizes that there is no basis for insisting on privilege for one's own conception of the good; and who recognizes the moral legitimacy of constitutional democratic procedures when it is necessary to decide among policies that involve conflicting conceptions of the good. It is a person who puts civic commitment to constitutional democratic processes ahead of one's one fundamental convictions when necessary. And it is a person who is fully committed to ensuring the neutrality of the state across fundamental convictions. Neutrality of law across persons and conceptions of the good, full recognition of fundamental pluralism within a modern society, respect for the equal worth of all other citizens, and a recognition that one's own beliefs have no basis for being privileged over those of other citizens -- these are the fundamental commitments of a political liberal. We can now give a fairly simple explication of illiberal thinking as well. It is moral, religious, or political fundamentalism -- the idea that one's own moral convictions are so compelling that no democratic process could legitimately override them. It is the idea that the individual has a persistent right to oppose the state when the state's actions are inconsistent with one's own moral convictions. It is authoritarian -- it endorses the idea that one's own group or party has the right to override the majority's will when the state contradicts one's fundamental convictions. And it is, of course, a position that is fundamentally disrespectful of democracy and of the equal dignity and worth of one's fellow citizens.
<urn:uuid:2928f318-0e44-4f07-bc3c-805299185698>
CC-MAIN-2017-04
http://understandingsociety.blogspot.com/2011/01/rawls-on-political-liberalism.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281084.84/warc/CC-MAIN-20170116095121-00419-ip-10-171-10-70.ec2.internal.warc.gz
en
0.956151
1,873
2.65625
3
A portrait of Alexander Selkirk commissioned by the author and done by Rosemary Sage of Pasadena, Salifornia. The artist tried to render a picture of Selkirk as close in resemblance as possible as he is described in various articles. This is part one. Here's part two. "He had with him his clothes and bedding, with a firelock, some powder, bullets and tobacco, a hatchet, a knife, a kettle, a Bible, some practical pieces, and his mathematical instruments and books. He diverted and provided for himself as well as he could, but for the first eight months had to bear up against melancholy, and the terror of being left alone in such a desolate place. He built two huts with pimento trees, covered them with long grass, and lined them with the skins of goats, which he killed with his own gun as he wanted, so long as the powder lasted, which was but a pound; and that being almost spent he got fire by rubbing two sticks of pimento wood together upon his knee..........."taken from Capt. Woodes Rogers book, "A Voyage Around the World" printed in London, 1712. "After he had conquered his melancholy, he diverted himself sometimes with cutting his name on trees, and of the time of his being left, and continuance there. He was at first much pestered with cats and rats that bred in great numbers from some of each species which had got ashore from ships that put in there for wood and water. The rats gnawed his feet and clothes whilst asleep, which obliged him to cherish the cats with his goats' flesh, by which so many of them became so tame, that they would lie about in hundreds, and soon delivered him from the rats. He likewise tamed some kids; to divert himself, would now and then sing and dance with them and his cats; so that by the favor of providence, and the vigor of his youth, being now but thirty years old, he came, at last, to conquer all the inconveniences of his solitude, and to be very easy." "When his clothes were worn out he made himself a coat and a cap of goat skins, which he stitched together with little thongs of the same, that he cut with his knife. He had no other needle but a nail; and when his knife was worn to the back he made others, as well as he could, of some iron hoops that were left ashore, which he beat thin and ground upon stones. Having some linen cloth by him, he sewed him some shirts with a nail and, stitched them with the worsted of his old stockings, which he pulled out on purpose. He had his last shirt on when we found him on the island." What few people knew, however, is that Robinson Crusoe actually existed in flesh and blood. His name was Alexander Selkirk and Daniel Defoe borrowed Selkirk's real-life adventure to create his legendary Robinson Crusoe. So real has the legend become that there are some people today on the Island of Tobago in the Caribbean Sea that proudly proclaim that they are the hereditary descendents of Crusoe. Alexander Selkirk's adventure did not take place on a deserted island in the Caribbean Sea. His lonely abode was the uninhabited Island of Juan Fernandez in the Chilean Sea far off in the Pacific Ocean. Alexander Selkirk was born in the year 1676 in Largo, Scotland, the son of a fairly prosperous tanner and leather worker. Selkirk was an adventurer at heart, unsuited to shoemaking and village life, and in 1695 ran away to sea and by 1703 was the Master of the Galley. Later he joined the famed William Dampier on a privateering expedition in the Pacific whose sole purpose was preying on Spanish merchant ships. In September of 1704, after a quarrel with his own Captain, the hotheaded Selkirk requested that he be put ashore on the uninhabited island of Juan Fernandez, four hundred miles west of Valparaiso, Chile. It was fortunate for Selkirk because his ship later sank with the loss of most hands. Selkirk remained there until February of 1709 when he was discovered by Captain Woodes Rogers in the sailing ship "Duke" whose pilot happened to be Dampier. Despite his long castaway, Selkirk was appointed Mate by Rogers and later given command of a captured prize ship. Selkirk did not return to England until 1711 where he met the essayist, Richard Steele, who wrote up his story in a publication, "The Englishman" (1713). Daniel Defoe made use of this story in his novel "Robinson Crusoe". Selkirk finally returned home to Scotland where he lived the life of a recluse but later went to sea again. He died at sea in 1721 at the age of forty-five. The rigged, volcanic terrain of 40 square, mile Juan Fernandez Island (now called Robinson Crusoe Island) located 400 miles due west of Valparaiso, Chile. the airstrip is located jujst to the left of the volcano in the lower center. There is only one sensible way to get to Robinson Crusoe Island and that is by air. In the warmer months, October to March, flights are available on small, five passenger planes that fly on schedules that are rarely met. The extremes of weather make flying hazardous. The only other access to the island would be by infrequent supply ships. When we took off from Santiago, Chile, there were five of us on the Cessna 320, including the pilot. Two of our passengers were returning home. The 400 mile three hour flight was uneventful until we approached cloud-covered Robinson Crusoe. A sense of trepidation began building in me. All I could see below was a massive, rugged volcanic pile of rock, piteously barren, hostile and devoid of any signs of welcome. Our plane circled the cloudy end of the island once and someone asked the pilot, "Where's the airstrip?" He replied, "Right below us." All I could see were two extinct volcanoes with a shallow bowl in between. We landed on what looked like the face of the moon. Awaiting us was a lonely driver and his jeep. A short, precipitous ride took us down to the bay and a small jetty. After a prolonged wait, while we watched seals playing in the water, a small boat pulled in, unloaded its cargo of passengers who were returning to the mainland as well as a couple of cases of langostas (lobsters). Embarking on the boat we set out for our one hour trip to Cumberland Bay on the north side of the island. We passed close by massive volcanic cliffs and terrain that looked impossible to support any life system. There were no signs of life or vegetation. Map of Robinson Crusoe and Selkirk Islands. Our arrival at the village of San Juan Bautista in Cumberland Bay excited no particular attention with the exception of the proprietor of the Villa Green, where we had booked rooms. What we found was a tiny, four room hotel where the water ran only occasionally and the lights seemed to work, or not work, on some divine command. People had led us to believe we could live on a daily feast of lobster; in fact we lived on canned food, salty fish and custard pudding. Another guest shared the hotel with us, a young, non-communicative German who appeared as quietly as he disappeared. No one on the island seemed to speak any English, we spoke no Spanish, so communication was mostly by sign language and a smattering of pidgin. The village of San Juan Bautista in Cumberland Bay. The lobster fishing fleet lies ay anchor in the bay. It is here, in this valley off to the left that Selkirk eventually built his huts and lived for four years and four months alone except for his goats and cats. Robinson Crusoe Island, despite its first appearance from the air as nothing more than a disagreeable chunk of lava, had its small share of attributes. The pace was slow and unhurried. On the island time comes to a standstill. To walk and meditate along its interminable paths formed by man's footprints is to feel clean and free under uncontaminated skies. The vast circumferences of the sea surrounding the island is like a golden ornament guarding a capricious natural wilderness full of contrasts. Along the paths the muchay, luma and naranjillo fight their way through the undergrowth seeking the sun. The village of San Juan Bautista in Cumberland Bay has a distinctly forgotten appearance. The few souls that roam the streets seemed to do so without curiosity or interest - thoughts lost in time. A cluster of huts crowd the narrow shore and cling precipitously to the mountainside rising rapidly from the sea, lost in seas of eucalyptus, guayaba and chanta trees. Waterfalls trickle down the steep mountains. During storms, these often grew into raging torrents, sweeping rocks and trees down the mountains in destructive force. A village street in San Juan Bautista. The village rises abruptly from the ocean and the mountain behind the village towers 3000 feet. Most of the villagers are of spanish descent. There is only one vehicle on Juan Fernandez, the mail jeep. Life on the island seems to move at an agonizingly slow pace. A sizeable fleet of lobster boats lay moored at anchor in Cumberland Bay. I had been told that the outside seas were too rough by the lobstermen to tend their traps but the waters appeared to be quiet, basking in the sun, waiting to be used. A few men idled in front of the bakery, eyeing me indifferently (or curiously). It was hard to know the difference. Since I spoke no Spanish I hurried past them, uncomfortable in my ignorance of their local language. One day I hired a local to guide us to Pangal, a forty-five minute walk away along a difficult steep and tricky trail. The trip was made in silence. When it came time to pay him for his services I mustered a feeble "comos muchos." He shrugged indifferently. I paid him three dollars and for a moment his eyes brightened a shade. That was all. A group of chilian lobster trappers gather at the local store at the village of San Juan Bautista, Cumberland Bay to await the arrival of the bread supply from the island bakery. About 600 fisherman and their families live permanently on Juan Fernandez. Swimming in the ocean did not tempt me. The water was cold, the beach rocky and cold winds swept down into Cumberland Bay, bringing frequent showers. The trails of the island offered the main interest, the main challenge. At the top of the island stands El Yangue, a three thousand foot, flat-topped peak, often covered in fine mist that appears like a cap of snow. The landscape is fascinating and exotic, with six foot high ferns that cover the traveler in a way that makes him feel drowned in moist vegetation; rigid palms on top of the cliffs wildly wave their arms like ballerinas; the walls of the rocks are woven with colorful myrtle. The "El Cerro El Yanque" mountain top on Juan Fernandez Island. The highest point on thf island at 915 meters (slightly over 3000 feet). Picaflores (hummingbirds) darted in and out of the bush and an occasional fardeles (an indigenous bird) skimmed the tree tops. It had been reported that the woods abounded in coatis, a small, mouse-eating bear, but we saw none, usually too busy minding our footing on the slippery, sliding volcanic rock underfoot. Looking out, over Cumberland Bay, the vast Pacific Ocean extended an almost empty thousands of miles to Pitcairn Island and eventually to the coast of Australia. On these mountainsides and in the surrounding woods and ferns the sense of loneliness was satisfying; to Selkirk, though, it might have been lonely and despairing. First and foremost we wanted to visit Selkirk's cave, his original home on Juan Fernandez. It was only accessible by boat. The cave was near the beach, probably no more than ten miles away but no boat owners would take us there. "Las olas muy grande." ("Too rough, too rough.") they explained. It didn't look that rough to me but it was their boats and if they didn't want my business I had little choice in the matter. Each day we anticipated getting over. Each day we were disappointed. Directly behind the village the mountains rose to top 3,000 feet of jagged, torturous volcanic rock covered with a variety of forest trees. The mountains acted like a funnel and emptied the wind out into Cumberland Bay. At nights the wind and the rain blowing through the trees made a weird and distressful howl. I had visions of being stranded on Crusoe Island eating canned tomato soup and stale bread. This was summer. I could only imagine what Selkirk must have suffered through the many winter months. Early one morning after a breakfast of bread, jam and coffee, Stevey and I wandered out to the village cemetery, passing a Pentecostal church on the way. There was nothing unusual about the cemetery except for one of its gravesites. It was painted a stark white, crisscrossed with navy blue lines. An anchor lay at the foot of the tombstone and a lifebuoy rested on its top! Looking closely, I found a brass plaque adorning the face. It bore an epithet, in German, to three crew members of the German battleship "Dresden." Our curiosity was now thoroughly aroused. We followed the path further and came upon a sign, in Spanish, marking the site of a long forgotten sea battle of the First World War. Above our heads and in the face of the overhanging cliff were numerous large shell holes, one with an unexploded eight inch shell still in place, its back sticking out menacingly. During World War One it was the practice of the German Navy to send commerce raiders (usually cruisers) to prey on Allied shipping in the Pacific and the Atlantic. The German cruiser "Dresden" was caught by a British fleet at Cumberland Bay while it was repairing previous battle damage. After a short battle the Captain of the "Dresden" blew his ship up to avoid capture. The locals say that under the right conditions the "Dresden" can be seen lying under 180 feet of water not far from the shore. This all occurred in 1915 stirring memories of a similar incident when the German battleship "Graf Spee" scuttled herself at Montevideo rather than face capture or surrender by a surrounding British naval force in 1941. In 1915 a naval battle took place between two british cruisers (the "kent" and the "Glascow") and the German raider-cruiser "Dresden" in Cumberland Bay. The "Dresden" outnumbered and outgunned, blew herself up rather then surrender. This cliff marks a spot where a number of shells from the british cruisers pierced the hillside. The "Dresden" lies under 180 teet of water close offshore. Other then Selkirk's cave the other "piece de resistance" to be seen on Robinson Crusoe Island was Selkirk's "lookout." Expecting an easy hike along well-marked trails, Stevey and I started out one early afternoon for a hike to the "lookout." Promptly we were lost. Many trails crisscrossed the mountainside. Footing was difficult and the grade steeper and far more difficult then we had anticipated. Fortunately, a young man we recognized from the village, Francisco, happened upon us. He had been out worshipping at a family shrine somewhere in the mountains. Francisco assisted us through a most precipitous area and sent us on the right path with a handshake for me and a kiss for Stevey. Soon a sign came into view that read: "Miradoe del Selkirk, 2500 meters." At this point I wasn't sure whether it meant straight up or straight ahead but with higher hopes of reaching our goal we pushed on. The author reloads his camera next to a memorial site close by Alexander Selkirk's "El Mirador", the lookout point where Selkirk watched and waited 4 years and 4 months for a rescue ship. A small shrine and plaque adorned Selkirk's "lookout." We lingered for a while, gazing out to sea, puzzling over what life must have been like for him. Selkirk obviously used the lookout to watch for ship's sails on the horizon or in the bay and occasionally lit fires to try and attract attention, but to no avail until his final rescue four and a half years later. We returned to the hotel much exhausted to a dinner of soup and fish and were more then happy when divine providence turned the lights out early. The mule is the principle means of transportation on Juan Fernandez island. The next day, searching around the village which always seemed strangely deserted, we found a trail directly above the police station that was marked "The Cave of the Patriots." Here were several large, twenty foot deep caves. From what little I could decipher from the Spanish sign, "Patriots" had hid out in these caves after, fleeing Chile during one of its revolutions. Not of much interest (except as a place to duck into during the intermittent rains) we followed on to "the fort." It was a long abandoned, much destroyed stone fort that the Spanish had built in 1750. Seven rusted 18th Century unmounted cannons faced discontentedly out towards Cumberland Bay, its waters still filled with the idle lobster boats. Robinson Crusoe Island was briefly turned into a penal colony in the early 1900's but it proved so difficult to supply that it was abandoned for this purpose. The islands only vehicle, a jeep, jerked past us on its mail delivery mission. A few idle fishermen eyed us curiously, I'm sure wondering what these two "gringos" were doing on their island. Perhaps to convert some souls? We had shortly before met two young American boys, Mormon missionaries from Utah, here for that purpose. Time was running short for us on Robinson Crusoe Island and we were anxious to leave while the weather permitted because the "real" rainy, cold, windy season was fast approaching and we did not relish the idea of being stranded for days without transportation, which had frequently happened to others before us. Without too much regret we packed our bags and left on the next available flight but the thoughts of Alexander Selkirk's lonesome sojourn there continued to haunt our memories.
<urn:uuid:951bc511-e2df-4328-9ab7-7ae0219ce027>
CC-MAIN-2017-43
http://www.ini.uzh.ch/~tobi/fun/alex/alex.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826283.88/warc/CC-MAIN-20171023183146-20171023203146-00701.warc.gz
en
0.97884
3,919
2.546875
3
“Wilma Rudolph, once known as the sickliest child in Clarksville,Tennessee, became one of the fastest women in the world.” Wilma Rudolph was born premature on June 23, 1940, in Clarksville, Tennessee. Wilma was the 20th of 22 children. She was born with Polio, and one of her legs was so twisted she had to wear a brace on it. She was so crippled she couldn't attend school until she was 7. When Wilma was 12, she was in church one Sunday. Out of nowhere she just reached down, removed her brace, and walked down the aisle normally. By that time, Wilma had already beaten the chicken pox, the measles, whooping cough, pneumonia, and scarlet fever. No matter, by Wilma's sophomore year of high school she was setting records on the basketball team and leading the team to a championship season. In temperatures over 100 degrees, Wilma claimed gold in the 100 meter, 200 meter, and 4x100 relay. Her 100 meter time (11.0) would've been a new world record if it hadn't been deemed “wind aided.” Her 200 meter time (23.2 seconds) was an Olympic record. Her 4x100 relay time (44.5 seconds) was also a world record. Wilma dedicated her triple gold performance to her idol Jesse Owens, an African-American who as you probably know won three golds in the 1936 Olympics in Nazi Germany. Wilma was the first American woman to accomplish this feat.
<urn:uuid:1499a8eb-5052-4b23-b6e9-8b90bacf1309>
CC-MAIN-2018-09
http://www.10k-running.com/blog/runner-profile-olympian-wilma-rudolph
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811655.65/warc/CC-MAIN-20180218042652-20180218062652-00507.warc.gz
en
0.988683
321
2.890625
3
Beginning Spanish Tutorial For the Average Traveler Bienvenidos! Welcome! This tutorial is designed for English-speaking adults who wish to learn the Spanish language for travel purposes. This tutorial is for the beginner who has little or no prior knowledge of the Spanish language. Research on adult education and language instruction recommends engaging repetition, interaction, and real-life experience as a good way of learning a language. Therefore, this site consists of various lessons and interactive activities that present one set of common vocabulary words and phrases in order to provide practice for thorough comprehension. For more information on the research behind this tutorial, please see the Research Paper. The tutorial follows a recommended path for beginners (simply follow the arrows ), however the option to skip or return to different pages is available. An online dictionary is available at any time throughout the tutorial, simply click on the icon and enter the requested word. Also, an evaluation form is provided at the end of the lesson. Comments and suggestions are greatly appreciated for further research and improvement to this tutorial. Thank you for your participation! Let's Begin. Developed by Jennifer Kozenski EDPSY 490I Analysis of Advanced Instructional Technologies University of Illinois Urbana-Champaign
<urn:uuid:44d0aac9-5b55-44bd-a91a-3f2a1018d0f8>
CC-MAIN-2014-52
http://lrs.ed.uiuc.edu/students/kozenski/
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768741.99/warc/CC-MAIN-20141217075248-00126-ip-10-231-17-201.ec2.internal.warc.gz
en
0.888005
250
3.21875
3
Build a better mousetrap, and they say the world will beat a path to your door. But the artists at Studio AATB probably shouldn’t expect much foot traffic after finding a way to use a wall-mounted robot arm to improve one of the oldest ways we have to tell time: the sun dial. Because our timekeeping is based on the movements of our solar system, it’s hard to find a more accurate way of telling time than the sun. It’s just unfortunately incredibly unreliable. All it takes is an errant cloud for a sun dial to stop working, which is why we’ve had to invent complex machines and electronics to instead keep tabs on the minutes and seconds that govern our day. With Sunny Side Up, the sun dial is made useful again, because it’s the sun itself that’s been replaced with modern tech. The robotic arm has been programmed to precisely rotate around a metal bar sticking out of a wall while a high-intensity LED light on the end produces a shadow that represents the hour of the day. To represent sunrise and sunset, the most important times of the day back when sun dials were in prevalent use, the LED also slowly dims and brightens in the evenings and morn. The art piece doesn’t make sun dials any easier to read. If you’ve got an appointment at 11:45am exactly, you’ll still want to rely on your watch. But had our ancestors had access to robotic arms, they would have never missed a meeting on overcast days.
<urn:uuid:a0ae2397-32df-4412-9ebe-73727048517f>
CC-MAIN-2018-30
https://gizmodo.com/someone-used-a-robot-to-fix-the-biggest-problem-with-su-1825914981
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592309.94/warc/CC-MAIN-20180721032019-20180721052019-00297.warc.gz
en
0.954477
329
2.625
3
Defining Domestic Violence We define domestic violence as a pattern of abusive behavior in any relationship that is used by one partner to gain or maintain power and control over another intimate partner. Domestic violence can be physical, sexual, emotional, economic, or psychological actions or threats of actions that influence another person. This includes any behaviors that intimidate, manipulate, humiliate, isolate, frighten, terrorize, coerce, threaten, blame, hurt, injure, or wound someone. (US Dept. Of Justice) Types of Abuse Hitting, kicking, biting, shoving, restraining, slapping, throwing objects, withholding or denying medical care. Marital rape, forcing sex after physical abuse or when sick, forcing undesired sexual behavior, treating you in a sexually demeaning manner, insisting you dress or perform in a sexual way that is uncomfortable, withholding sex or affection, criticizing and/or sexually demeaning you, using unwanted objects or weapons during sex that hurt you without your consent. Habitually criticizes you, calls you names or yells at you, humiliates you in private or public, tells private information about you to others, calls you degrading names, puts you down in front of the children, expects you to ask permission, makes you feel bad about yourself, makes you feel guilty. Maintains control over the family finances, makes you financially dependent, withholds personal care items you need for yourself or other family members or makes you ask permission to make purchases, prevents you from getting or keeping a job, taking your money. Intimidates you and causes you fear, threatens to cause harm to self or commit suicide, insults or drives away your friends or family, sabotages your relationships with others including your children, forces isolation from friends, family, school or work, plays mind games, uses the children to make you feel guilty, threatens to take the children away from you, abuses pets, destroys your sentimental items, tries to make you and/or others think that you are crazy. What Causes Domestic Violence? Domestic Violence is caused by a need to have power and control over an intimate partner. Violence is a part of an effective strategy for creating and maintaining power and control. Understanding Domestic Violence
<urn:uuid:dc814057-1fa5-402b-977d-01226923f8f3>
CC-MAIN-2017-39
http://fjcgtownhorry.org/domestic-violence/what-is-domestic-violence
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686169.5/warc/CC-MAIN-20170920033426-20170920053426-00553.warc.gz
en
0.920326
455
3.5
4
Reality cooking shows could be teaching us dirty kitchen habits. Cooking shows don’t always use proper food safely techniques and often show behaviors that could lead to cross-contamination. A 2018 study done in Germany tested two groups of people, they had them make chicken salad with homemade mayonnaise based on a cooking video — one video showed a chef that followed recommended hygiene measures and the other video showed a cook with poor hygiene. They found that people who watched the video of the cook with good hygiene followed the recommended measures more often when they were cooking the dish themselves. A similar study done in 2016 showed offenses in cooking shows include handling raw meat without washing hands, not cleaning the boards after cutting meat and not giving appropriate indicators for how well the meat is cooked. The study had reviewers watch 30 cooking shows featuring 24 different chefs, which included Ina Garten, Gordon Ramsay, Jamie Oliver and Guy Fieri. The study found that all but three of the chefs where shown handling meat without washing their hands at least once during an episode and only a few cleaned their boards after cutting raw meat. Though it’s possible the chefs are taking the right precautions off camera, it’s important to remember the health precautions that go along with preparing food.
<urn:uuid:a5883ede-e7fe-447a-bf31-04e1b7cbcfb6>
CC-MAIN-2018-09
https://nowthisnews.com/videos/food/cooking-shows-might-be-teaching-us-dirty-kitchen-habits
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812855.47/warc/CC-MAIN-20180219231024-20180220011024-00765.warc.gz
en
0.970643
255
2.671875
3
This is a black and white poster that published their protest's demands and date on November 22, 1969. The text explains how six black women were being held in against their will, tortured, and oppressed because they had been deemed, "unfit mothers". This poster shares how these people weren't just sitting around, but they weren't "fighting" as in battles and war, so I would say they were cooperating among themselves to incorporate the change they desired. These six women were wrongfully convicted with no trial according to the flyer, and this protest stood up for not only the injustice to black people, but to any woman too. The cooperation within the constraints of the law, peacefully, without hurting anybody. I felt this piece adds to this presentation because it doesn't just address unfair treatment of African-Americans, it includes how people stood up to the mistreatment of women too. "Mississippi Goddam" by Nina Simone Recording session: Live in Antibes, July 24-25, 1965. The sixth Antibes Juan-les-Pins Jazz Festival took place from July" Mississippi Goddam represents how diverse ways of opposing hateful, racist events that occurred during the black power movement era. This song was written after the offenses afflicted onto black people when racists took measures against them. Although, this is cooperating because Nina Simone didn't hurt anyone or anything by writing and performing this song. I felt this protest song was important to include because of how the composer was reacting to Medgar Evers's murder and the Alabama Church Bombing. "Don't Let Nobody Turn You Around" is a protest song that the Steve Miller Band released in their 1969 album, "Your Saving Grace". This song was commonly sung during marches, protests, and other methods of standing up to racial bias. This song demonstrates how these peoples knew exactly who they were standing up against if you listen to the lyrics, the police officer, politician, and army general try to "turn you around". They cooperated within the restraints of the law while standing up against it by showing the peoples' resistance from a variety of angles. I felt this song was important to include because of how it represents that people opposed injustice from multiple facets. This photograph of a boycott flyer released in the summer of 1966 in Harlem, a neighborhood in Manhattan, New York, demonstrates how the Black Power Movement rebelled against the confines of segregation and injustice, by standing up for equality and leadership positions in their community. Through a boycott, they cooperated within themselves while abiding the law. (Excepting being truant.) I felt this issue was important to include because it shows a way the black community stood up for power over their own education.
<urn:uuid:de64b9f3-556b-4cd7-8d8e-7df268f6e675>
CC-MAIN-2018-17
https://elink.io/p/the-black-power-movement-in-the-civil-rights-movement
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937440.13/warc/CC-MAIN-20180420100911-20180420120911-00362.warc.gz
en
0.983569
545
3.671875
4
A severe condition in your spine when one vertebra slips either forward or backward in comparison with the next vertebra is called spondylolisthesis. This condition often leads to a kind of deformity in your spine and can be treated with a number of spinal fusion surgeries. When the vertebra slips forward, the condition is known as anterolisthesis. And when the vertebra slips backward it is known as retrolisthesis. The spinal canal can also be narrowed due to this condition and in some case the nerve roots that exist can also be compressed due to spondylolisthesis. To recover from this condition, the types of spondylolisthesis surgeries which are available are given below. Types Of Spondylolisthesis Surgery Posterolateral Gutter Spine Fusion In this type of surgery, which is considered the gold standard in spine fusion surgery, a bone graft is placed in the posterolateral section of your spine and it is often considered the most potent of all surgery options available for spondylolisthesis. It has been historically successful in this ailment. Surgeons administer this surgery option from the back where a midline incision, generally three to six inches long, is made. To take care of this ailment, most surgeons trust this method of surgery. Transforaminal Lumbar Interbody Fusion (TLIF) This surgery option is useful when you want to stabilise the vertebra and the disc. A solid bone can be created between the vertebra using this technique and it reduces both pain and nerve irritation. Patients suffering from spondylolisthesis or disc herniations which are recurring find this surgery successful. This is an effective method as the hardware is applied to the spine so that the fusion rate can be enhanced. With the help of a bone graft, the vertebra, both above and beyond can be healed and merged as one long bone. Posterior Lumbar Interbody Fusion (PLIF) In PILF, a bone graft is added to the area of the spine where the bone can grow and stop the motion in that part. This generally happens because of a biological response. The bone grows between toe vertebras and this is how it stops the slipping of the vertebra either forward or backward. In PILF, surgeons use a cage made with allograft bone or PEEK or titanium and this is inserted in the lower back and directly in the hollow of the disc. Anterior and Posterior Lumbar Fusion Among the types of spondylolisthesis surgery the Anterior and Posterior Lumbar Fusion is quite popular because of the advantages it offers. It provides a lot of stability as both the front and the back of the spine can be used using this technique. It is particularly suitable for patients suffering from fractures and in the cases when initial fusion does not set up. As a primary technique also this surgery is quite popular among surgeons. Anterior Lumbar Interbody Fusion (ALIF) ALIF was first performed in the 1950s to treat lower back pain and though it had non-union rates of 30% – 40% and hence it did not gain immediate favour, it is now used in combination with anterior or posterior fusions. ALIF is useful and efficient when you have a huge collapse in the disc space and instability. This type of surgery gained popularity with the development of threaded cages in titanium as they had a higher fusion rate. These types of spondylolisthesis surgery are helpful in treating a severe and painful condition like spondylolisthesis. The most important structure of your body, the spine, can benefit from these surgeries and post surgery you can bid pain goodbye for good.
<urn:uuid:74d588b1-44d1-4f51-ad73-fd7435b5eca1>
CC-MAIN-2019-09
http://www.findarthritistreatment.com/types-of-spondylolisthesis-surgery/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484928.52/warc/CC-MAIN-20190218094308-20190218120308-00502.warc.gz
en
0.930369
775
2.8125
3
Virtually any specific or see this page even business which purchases and installs an energy from the sun system to produce solar electricity can not only reduced electricity bills, but also reduce their cost of ownership with the benefits of unlimited energy certificates (REC) if they reside in countries like Australia, which implements the Mandatory Renewable Energy Scheme. In essence, these certificates are as good as cash payments as they reduce the price of owning a solar energy system and directly promote energy efficiency with the use of renewable energy sources. One REC is awarded for each one megawatt hour of electrical power generated through solar panel systems. These certificates are usually given to the organisation doing the solar energy installation of yours and they also sell them to energy companies as part of their obligations under mandatory renewable energy targets. Various solar energy systems generate varying amounts of REC in accordance with each one’s capacity as well as the place. In Australia, you’ll find 4 distinct zones for both solar energy PV panelsand solar water heating units signifying the 4 different levels of the sun each zone receives. Deeming periods of 1, 5, and fifteen years may additionally be applied to system owners eligible for RECs. The deemed basis would depend upon the setting up date of the solar energy systems. The way the REC System Works The Australian federal goals locating a minimum of twenty % of energy usage from renewable sources by 2020, in compliance to an international mandate that involves other nations working towards the reduction of green house gas emissions. Energy companies are attempting to meet the target, being necessary to surrender RECs into the respective holding accounts of theirs in the end of every calendar year. Failing to reach the target leaves them liable to pay a decent a lot higher than the REC value. For individuals and businesses alike, RECs may be traded for cash. The values of RECs fluctuate, just like any other commodity, based on market conditions. Solar power system owners may claim the inexhaustible energy certificates themselves or perhaps assign the right to get the REC importance to an agent in order to save some time and stay away from the inconvenience of going through the required procedure. Naturally, the program hasn’t received all beneficial feedback. There was claims that the REC device doesn’t actually cause the sizable decrease of greenhouse gas emissions. When an individual or a business owner sets up energy from the sun systems to produce solar energy, and then promote their unlimited energy certificates to energy companies, he forfeits the right for getting the inexhaustible energy to the electrical power companies whose goal is to meet the environmental obligations of theirs.
<urn:uuid:4c3a9025-f4b6-4d49-b062-7d00f8387308>
CC-MAIN-2023-50
https://quatreindex.com/2023/10/22/renewable-energy-certificates-the-way-they-promote-energy-efficiency/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100135.11/warc/CC-MAIN-20231129173017-20231129203017-00628.warc.gz
en
0.940651
525
2.59375
3
Anne and Prince William Anne was Queen of England, Scotland and Ireland from 8 March 1702. On 1 May 1707, under the Acts of Union, the kingdoms of England and Scotland united as a single sovereign state known as Great Britain. Anne continued to reign as Queen of Great Britain and Ireland until her death in 1714. Anne was born in the reign of Charles II to his younger brother and heir presumptive, James, whose suspected Roman Catholicism was unpopular in England. On Charles's instructions, Anne and her elder sister Mary were raised as Anglicans. Mary married their Dutch Protestant cousin, William III of Orange, in 1677, and Anne married Prince George of Denmark in 1683. On Charles's death in 1685, James succeeded to the throne, but just three years later he was deposed in the Glorious Revolution of 1688. Mary and William became joint monarchs. Although the sisters had been close, disagreements over Anne's finances, status, and choice of acquaintances arose shortly after Mary's accession and they became estranged. William and Mary had no children. After Mary's death in 1694, William reigned alone until his own death in 1702, when Anne succeeded him. During her reign, Anne favoured moderate Tory politicians, who were more likely to share her Anglican religious views than their opponents, the Whigs. The Whigs grew more powerful during the course of the War of the Spanish Succession, until 1710 when Anne dismissed many of them from office. Her close friendship with Sarah Churchill, Duchess of Marlborough, turned sour as the result of political differences. The Duchess took revenge with an unflattering description of the Queen in her memoirs, which was widely accepted by historians until Anne was reassessed in the late 20th century. Anne was plagued by ill health throughout her life, and from her thirties she grew increasingly ill and obese. Despite 17 pregnancies, she died without surviving issue and was the last monarch of the House of Stuart. Under the Act of Settlement 1701, which excluded all Catholics, she was succeeded by her second cousin George I of the House of Hanover. Queen Anne’s War was known as the War of Spanish Succession in Europe. It raged from 1702 to 1713. During the war, Great Britain, the Netherlands, and several German states fought against France and Spain. Just as with King William's War before it, border raids and fighting occurred between the French and English in North America. This would not be the last of the fighting between these two colonial powers. The war consumed most of her reign. In America, the war became known as Queen Anne's War and consisted mainly of French privateering in the Atlantic and French and Indian raids on the frontier between England and France. The most notable of these raids occurred at Deerfield, Massachusetts on February 29, 1704. French and Native American forces raided the city, killing 56 including 9 women and 25 children. They captured 109, marching them north to Canada. THE TAKING OF PORT ROYAL In 1707, Massachusetts, Rhode Island, and New Hampshire made a failed attempted to take Royal, French Acadia - not the Jamaican port. However, a new attempt was made with a fleet from England led by Francis Nicholson and troops from New England. It arrived at Port Royal on October 12, 1710, and the city surrendered on October 13th. At this point, the name was changed to Annapolis and French Acadia became Nova Scotia. In 1711, the British and New England forces attempted to conquest Quebec. However, numerous British transports and men were lost heading north on the St. Lawrence River causing Nicholson to stop the assault before it began. Nicholson was named Governor of Nova Scotia in 1712. As a side note, he would later be named the governor of South Carolina in 1720. BLACKBEARD AND QUEEN ANNE'S REVENGE The pirate took a liking to La Concorde, and it became his flagship. He renamed it Revenge, after the British Queen Anne. Blackbeard served in the English Navy during Queen Anne's War in the early 1700s. Captain Blackbeard is probably the most infamous pirate of history's Golden Age of Piracy — a period that spanned the mid-1600s to the early 1700s. What is most unusual about his notoriety is that Blackbeard didn't actually have a long career in piracy. Records show that he was only in the pirating business from roughly 1713 to 1718, a mere five years. And most of his life is still shrouded in mystery. Records show that the Teach family owned a large plantation in Spanish Town that, in 1706, Edward Teach, Jr. inherited as the eldest son. Around the time he joined the Royal Navy, Teach Jr. generously turned over the plantation to his stepmother and half-siblings rather than hold on to it. Teach joined the Royal Navy somewhere between 1706 and 1713 and became a sailor aboard the HMS Windsor. This would be Teach, Jr.'s first step to becoming the notorious and widely feared Blackbeard the pirate. As privateers, Blackbeard and his compatriots would attack and loot enemy ships, basically committing acts of piracy that were authorized by the British government. However, once the war was over, there wasn't any immediate need for government-sanctioned privateers. Rather than lose his livelihood and miss out on an adventurous life at sea, Edward Teach (along with many others) decided to turn to unregulated piracy, keeping all the spoils. Blackbeard had to learn piracy from somewhere. He found his pirate mentor in the form of the famous former privateer-turned-pirate, Benjamin Hornigold. Hornigold converted to unadulterated piracy after serving as a privateer during the War of Spanish Succession and became the notable pirate captain of the time with an able crew, per The Way of the Pirates. Edward Teach joined Hornigold sometime around 1717. Blackbeard was a capable pirate and so impressed Hornigold that he was promoted to second-in-command. About a year after joining the crew, Hornigold rewarded Blackbeard with his own ship, a small crew, and the title of "Captain." As a captain, Blackbeard became friendly with another famous pirate — Stede Bonnet — and the two traveled together for a time. Blackbeard's famous ship, The Queen Anne's Revenge, was originally a French slave ship called La Concorde. He and his crew captured the ship in the Caribbean off the island of Martinique in the late fall of 1717. Those aboard La Concorde didn't stand much of a chance. According to The Queen Anne's Revenge Project, La Concorde's crew had already suffered 16 deaths, and another 36 members were sick with scurvy and dysentery. Finding themselves at a severe disadvantage, Captain Dosett surrendered the ship to Blackbeard. At least three of La Concorde's crew members joined Blackbeard voluntarily, though Blackbeard and his men forcibly took a few others whom they thought would be useful to them; a pilot, three surgeons, two carpenters, two sailors, and the cook. Blackbeard was far from being an abolitionist. His father's plantation operated on slave labor, so he was certainly accustomed to the practice. However, according to The History Press, slave ships were among Blackbeard's favorite targets, so he regularly encountered African slaves being transported. After pillaging a ship, there have been reports showing that Blackbeard would return captured slaves to the mainland where they would presumably be sold at auction, while other times the enslaved individuals willingly joined his crew. Recent discoveries have shown that joining Blackbeard's crew certainly came with at least one perk — guaranteed on-site medical care. After discovering the wrecked Queen Anne's Revenge in the 1990s, archaeologists have found that Blackbeard didn't just keep valuables and weapons on his ship. As described by the Washington Post, Blackbeard also had a wide array of medical supplies that were found during the ship's excavation. Legend has it that Blackbeard had 14 wives in his lifetime. These were more like long term mistresses or relationships where he considered those women common-law wives, but there's no legal documentation of any of those unions, except for one. Records show that Blackbeard was legally married to the teenage Mary Ormond of Bath, North Carolina, per The Way of the Pirates. Mary was thought to be between 14 and 16 at the time of her marriage. We don't know much about Mary Ormond except that she was the daughter of plantation owner William Ormond and married the seemingly reformed Edward Teach at a young age, presumably inheriting the Teach plantation. We don't know what happened to Mary Ormond after her husband absconded, though the rumors prevail. Some say that she became pregnant quickly after her marriage, but no record confirms that she ever had a child with Blackbeard, in the age lacking contraception, it would seem probable. And Lord Huntington somehow ended up with a treasure map once in the possession of Mr Teach, he having acquired it without explanation or intelligences, after the passing of Captain Henry Morgan. There must then have been a means of safe transmission. of Wales, is currently the third King of England, named Charles son, the Duke of Cambridge, Prince William, is also a King in waiting - as of 2022 as Their mother and grandmother, respectively, Queen Elizabeth II, is presently the British Monarch, aged 95. The previous King, Charles II, ruled from 1630 until 1685, gave a Royal Charter to export captured native Africans as slaves to British colonies. Elizabeth I (Good Queen Bess), was famous for commissioning privateers to carry out acts of piracy on the high seas, to boost the coffers of her Treasury. As was Queen Anne 1665 - 1714. King George I carried on with privateers, then politics changed during his reign 1714 to 1727. appears that throughout history, and until Oliver Cromwell brought some semblance of transparency, the royals had been keen to profit by stealing from other nations, as what may be termed today; immoral earnings. If there were no time bar, these monies and other acquired assets, could be seized as proceeds of crime. wealth in all its forms is a contributing factor to global warming, and a destabilizing factor, that leads to empire building, of which the ancient Egyptians and Myans, demonstrated many years before naval superiority became a deciding factor. Now of course it is air superiority, including missiles, Samuel - Black - English Teach and the Queen Anne - Pirate Sir Francis - Privateer England - Irish pirate, Edward Seegar Age of Piracy John - Privateer Benjamin - Privateer Captain Roger - Pirate flag William - Captain Kidd, privateer/pirate Henry - Privateer, Sir Henry Governor of Jamaica of the Caribbean, Disney's film Jack - Calico Jack Sir Walter - Privateers Mary - Pirate Bartholomew - Black Bellamy - Black Sam, the pirate and Crossbones - Pirate flag to buried gold and jewels - Island Charles - Pirate captain Cleopatra The Mummy is currently under development as a script & graphic novel
<urn:uuid:5709612c-2af3-492e-a588-891e7c47d11a>
CC-MAIN-2023-23
https://kingsportreasureislandpiratesroyal.com/Kings_Royals/Anne_Queen_England1665United_Kingdom1714.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00168.warc.gz
en
0.977814
2,549
3.359375
3
Calculating income is essentially deducting costs and expenses from profits. It starts with calculating the total amount of sales made during accounting and is followed by deductions for certain costs or other operating expenses. When all is said and done, the company learns how much it earned or lost during the accounting period. The only revenue that should be included is money brought in from sales or services that has been earned and received, not monies expected or accounts receivable. The bottom line is the gross revenue. For deductions, money that a company does not expect to collect, as well as returns and allowances, should be added to the cost of goods sold, salaries, and overhead, but the cost of inventory that has yet to be sold should not be included. Asset depreciation for machinery, tools, and furniture should also be calculated. The company’s expenses and additional expenses combined are known as the total expenses. When these total expenses are deducted from the gross revenue, that is the net income, or business income.
<urn:uuid:2f826432-16da-496d-bbf9-86302208054c>
CC-MAIN-2019-51
https://www.botkeeper.com/how-to-calculate-income
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540527205.81/warc/CC-MAIN-20191210095118-20191210123118-00027.warc.gz
en
0.985366
204
2.921875
3
Squad – 9 to 10 soldiers. Typically commanded by a sergeant or staff sergeant, a squad or section is the smallest element in the Army structure, and its size is dependent on its function. Platoon – 16 to 44 soldiers. A platoon is led by a lieutenant with an NCO as second in command, and consists of two to four squads or sections. Company – 62 to 190 soldiers. Three to five platoons form a company, which is commanded by a captain with a first sergeant as the commander’s principle NCO assistant. An artillery unit of equivalent size is called a battery, and a comparable armored or air cavalry unit is called a troop. Battalion – 300 to 1,000 soldiers. Four to six companies make up a battalion, which is normally commanded by a lieutenant colonel with a command sergeant major as principle NCO assistant. A battalion is capable of independent operations of limited duration and scope. An armored or air cavalry unit of equivalent size is called a squadron. Brigade – 3,000 to 5,000 solders. A brigade headquarters commands the tactical operation of two to five organic or attached combat battalions. Normally commanded by a colonel with a command sergeant major as senior NCO, brigades are employed on independent or semi-independent operations. Armored cavalry, ranger and special forces units this size are categorized as regiments or groups. Division – 10,000 to 15,000 soldiers. Usually consisting of three brigade-sized elements and commanded by a major general, divisions are numbered and assigned missions based on their structures. The division performs major tactical operations for the corps and can conduct sustained battles and engagements. Corps – 20,000 to 45,000 soldiers. Two to five divisions constitute a corps, which is typically commanded by a lieutenant general. As the deployable level of command required to synchronize and sustain combat operations, the corps provides the framework for multi-national operations. Army – 50,000 + soliders. Typically commanded by a lieutenant general or higher, an army combines two or more corps. A theater army is the ranking Army component in a unified command, and it has operational and support responsibilities that are assigned by the theater commander in chief. The commander in chief and theater army commander may order formation of a field army to direct operations of assigned corps and divisions. An army group plans and directs campaigns in a theater, and is composed of two or more field armies under a designated commander. Army groups have not been employed by the Army since World War II.
<urn:uuid:f9ecbd80-deed-422d-8ef1-616f8dbdfcf7>
CC-MAIN-2019-26
http://goldsmithwatchworks.com/us-forces-division-to-platoon/
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999066.12/warc/CC-MAIN-20190619224436-20190620010436-00383.warc.gz
en
0.962883
515
3
3
Different target platforms use different naming conventions, so you might not want to copy the names of your elements directly into the transformed models. To facilitate this requirement, the transformation templates provide a CONVERT_NAME function macro. Another way in which you can transform a name is to remove a prefix from the original name, with the REMOVE_PREFIX macro. CONVERT_NAME <originalName>, <originalFormat>, <targetFormat>) This macro converts <originalName>, which is assumed to be in <originalFormat>, to <targetFormat>. The supported formats are: |·||Camel Case: new words start with a capital letter except for the first word, which begins with a lower case letter; for example, myVariableTable| |·||Pascal Case: the same as Camel Case but the first letter of the first word is upper case; for example, MyVariableTable| |·||Spaced: words are separated by spaces; the case of letters is ignored| |·||Underscored: words are separated by underscores; the case of letters is ignored| The original format might also specify a list of delimiters to be used. For example a value of ' _' breaks words whenever either a space or underscore is found. The target format might also use a format string that specifies the case for each word and a delimiter between them. It takes the following form: |·||<firstWord> controls the case of the first word (see below)| |·||<delimiter> is the string generated between words| |·||<otherWords> applies to all words after the first word| Both <firstWord> and <otherWords> are a sequence of two characters. The first character represents the case of the first letter of that word, and the second character represents the case of all subsequent letters. An upper case letter forces the output to upper case, a lower case letter forces the output to lower case, and any other character preserves the original case. Example 1: To capitalize the first letter of each word and separate multiple words with a space: "Ht( )Ht" to output "My Variable Table" Example 2: To generate the equivalent of Camel Case, but reverse the roles of upper and lower case; that is, all characters are upper case except for the first character of each word after the first word: "HT( )hT" to output "MY vARIABLE tABLE" This macro removes any prefix found in <prefixes> from <originalName>. The prefixes are specified in a semi-colon separated list. The macro is often used in conjunction with the CONVERT_NAME macro. For example, this code creates a get property name according to the options for Java: $propertyName=%CONVERT_NAME($propertyName, "camel case", "pascal case")% |·||Acronyms are not supported when converting from Camel Case or Pascal Case|
<urn:uuid:089e5820-64c6-49fd-872d-743216b5bc17>
CC-MAIN-2017-04
http://www.sparxsystems.com/enterprise_architect_user_guide/12/model_transformation/convertingnames.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280723.5/warc/CC-MAIN-20170116095120-00049-ip-10-171-10-70.ec2.internal.warc.gz
en
0.758476
629
2.796875
3
Talk to your coaches, teachers, organization, or school about the prevention strategies below and how they might be incorporated into training and policies. It is important to be aware of concussion signs and symptoms and know what to do if concussion is suspected. The Concussion Awareness Training Tool (CATT) is an online resource to learn more about how to recognize, prevent, and manage a concussion. CATT also includes resources on how to respond to a potential concussion situation, as well as detailed Return to School and Return to Sport protocol. Coach Education Programs A comprehensive coach education program, such as Heads-Up Football, and guidelines to restrict contact during practices, such as Pop Warner, were shown to decrease the risk of injury during practice. Learn more about the Heads-Up Football program. Learn more about the Pop Warner program. Personal protective devices such as mouthguards and ankle supports can be used to reduce the risk of injury. Lace-up ankle braces have been shown to reduce the incidence of ankle injury in football. Helmet fit is an important factor in injury prevention. Consider how the helmet fits to reduce the risk for, and severity of, head injury. Strength Training and Neuromuscular Training Warm-up Programs Lower body injuries are common in football. Based on studies done in other sports, the risk of all lower body injuries may be reduced by up to 50% by regularly participating in a balance training exercise program with a resistance-training component. This is also referred to as a neuromuscular training warm-up program. Completing a warm-up program has the ability to lower the chances of common injuries to the ankle and knee. The New Zealand government has supported the creation of a warm-up program based on the FIFA 11+. This program has been shown to reduce injuries in rugby and is useful in preventing injuries in a number of sports. The program has exercises for both the upper and lower body. Learn more about ACC SportSmart, which has training videos and other resources. Oslo Sport Trauma Research Centre Neuromuscular Training Due to the physical demands of football, some athletes sustain shoulder injuries. The Oslo Sport Trauma Research Centre has developed exercises that specifically help keep the shoulder strong and reduce the risk of shoulder injuries. This resource includes videos and PDFs for download. Learn more about exercises to help prevent shoulder injuries. Learn more about exercises to help prevent back injuries. For more exercises, visit http://fittoplay.org/. Football is a physically demanding sport and some pre-existing conditions may increase the risk of injury. A sport-related physical evaluation at the beginning of each season ensuring fitness to play can help to reduce risk of injury. KidsHealth provides information about what sports physicals are, why they may be appropriate and where you may go to get them. Learn more about Kids Health Sports Physicals. The Ontario Physical Education Association (OPHEA) provides recommendations for safely implementing flag/touch football in elementary schools. Learn more about implementing flag/touch football in elementary schools.
<urn:uuid:77689da9-72c8-4efb-9330-ebdde5945cda>
CC-MAIN-2019-22
https://activesafe.ca/football/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258439.57/warc/CC-MAIN-20190525184948-20190525210948-00460.warc.gz
en
0.948955
628
3.421875
3
Here is the collection inspired by The UN Convention on the Rights of the Child It's Manu's birthday but he is sad because he has lost his favorite toy. His forest friends promptly throw a surprise party to lift his spirits. This mini-story teaches the recognition of the variety of emotions and to experience them all serenely. These interactive games are based on logical reasoning. Children's rights: Expressing one's own identity, Eating suitable food Luke the crab is a great collector, but it has become difficult for him to find new shells among the plastic accumulated on the beach and in the ocean. Together with his friends he decides to do something about it. Con questo mini-racconto i bambini possono apprendere l’importanza della condivisione e del riuso. Children's rights: Living in a healthy environment, Breathing clean air, Eating uncontaminated food Ray is a tame elephant raised in a circus, who manages to return to the jungle after many years. The other elephants welcome him with joy but Ray feels a little uncomfortable at first because of his manners and because he is always cleaner than the others. This short story teaches the acceptance of others and integration into a group. Children's rights: Express one's own opinion, Being heard, Choosing friends In the dojo, the wise bear Andrew trains everyday with his students. One day, a new girl arrives (a hare) but the rest of the group (boy raccoons) don’t want to accept this new member. This story teaches the importance of inclusion and helps children understand what bullying is and why it’s bad. Children's rights: Inclusion, Express one's own identity, culture, religion and language Every year, Peter and his wife compete in an original race: a tractor race through mud and puddles in the farm. Both are very competitive and want to win, but at the end of the race they understand that what matters the most is not winning but the happiness of helping others. Children's rights: Playing, doing sports, Having free time A seaquake brings disarray and disorder to a little village of fish! Each one of them loses something and Luke, the great collector who is jealous about all his precious treasure, learns the importance of sharing. Children's rights: Being safe, Being granted adeguate treatment in case of wars and natural calamities There is too much garbage in the woods and the cicadas stop singing in protest! Andrew, a creature of habit, is no longer able to enjoy his beloved naps without their song and, like a wise bear, decides to take matters into his own hands by asking all the animals for help to clear up the forest. With this story, children learn respect for the environment and the importance of recycling and reuse. Children's rights: Living in a healthy and safe environment, Breathing clean air, Eating uncontaminated food and water The “Save the Woods” collection opens with Owen the squirrel. Like all the animals in this story, Owen deals with trash that pollutes the woods and covers his beloved flowers. The games in this chapter are concerned with concentration and visual memory: kids are asked to identify cards with the same flowers. Charlie is a very willing and helpful fawn. He doesn't hold back when it comes to clearing the trash from the forest, but he does need some tools. The activities in this story ask kids to help Charlie to get back a rake and overcome some obstacles, by getting them used to adopting problem-solving strategies. Sal also helps clean the forest. He is a very tidy and meticulous racoon and everyone calls him "the fusspot". This story introduces the concept of respect for the environment and teaches kids how to dispose of waste properly. The activities are based on computational thinking (coding). The only way to persuade Bonnie the fox, Lisa the hare and Manu the wolf to help clean the forest is promising them food as a reward! So while the trio makes itself useful, kids have to distribute fruit and acorns fairly between the characters and learn multiplication and division. The ants in the woods are very hardworking and Flo is the queen of all. With this rhyming tale, kids need to collect and give new life to used objects and they also learn ensembles and logical associations to arrange and classify objects correctly. The last episode of the "Save the Woods" collection is a rhyming story that teaches kids how to recycle and respect the environment. Ginny the eagle looks forward to separating all paper, glass and plastic objects. The activities are designed to teach logical associations and properties of materials. For this sharing of values, Smart Tales is committed to supporting UNICEF by also donating a part of the proceeds from our app.
<urn:uuid:76681192-e5f8-4c77-8fd4-7d1a5de543b3>
CC-MAIN-2023-50
https://smarttales.app/en/unicef-collection/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099942.90/warc/CC-MAIN-20231128183116-20231128213116-00626.warc.gz
en
0.958823
995
2.71875
3
An 11 pin relay wiring diagram is an essential tool for the electrical engineer or technician. It provides a detailed, often complex visual representation of how a particular electrical circuit is connected and routed. In some cases, it may even provide additional information such as how to wire the circuit, how it should be wired, and what components are needed. At its most basic level, a relay wiring diagram is simply a series of lines that indicate the flow of energy between two points. Depending on the complexity of the system, additional text may be included to explain what each line represents. On a basic 11 pin relay wiring diagram, the lines may look like this: L1>L2>L3>L4>L5>L6>L7>L8>L9>L10>L11. As you can see, each line represents a different function of the relay, from the input line (L1) to the output line (L11). When an electrical engineer or technician is looking at an 11 pin relay wiring diagram, it’s important to understand each line and its associated purpose. This helps make sure that the wiring is done correctly and that the relay works as intended. Understanding the 11 pin relay wiring diagram can be difficult, but it’s essential for successful electrical engineering. With the right knowledge and guidance, you’ll be able to ensure your wiring projects are successful. 10ff 3z C3 Hongfa Europe Gmbh Relay Socket For Use With Hf10ff Hf10fh Series Relays 11 Pin Din Rail 250v Ac 923 2603 Rs Components 11 Pin Sub Magnal B11a Circula Base Elesta Kr 11s Relay 48vdc 10a 220vac 4a 380vac 3pdt Self Powered Voltage Detecting Protecting Relay Item 327xbx48p 060 12vdc 326 327 Series Time Delay Relays On Struthers Dunn Relays Control Pilot Devices Electrical Control Relay Tutorial Time Delay Relays Item 88ahpx 74 240vac 88hp Series Hermetically Sealed Plug In Special Purpose Relays On Struthers Dunn 2 X Relay Socket Pf113a 11 Pin Octal Base For Mk3p I Jqx 10f 3z Jtx Special Mk3pn 5 I Omron 3pdt Power Relay With Round Base 11 Pin 3p Tpdt 24v Dc Coil 10a Trillium Controls Inc Plug In Relays 750xcxrm4l 24d General Purpose Relay Se Relays 750r 3pdt 10a 24vdc Octal Terminal 11 Pins Led Clear Cover Lock Push On Schneider Electric Usa 8 Pin Relay Base Diagram Ptf08a Jin Kou Direct 4 Pin Relay Wiring Diagram Vs 5 How To Wire A Relay General Discussions Robot Community Eaton Cutler Hammer D3pa3 Relay Socket 11 Pin 3 Pole Allied Electronics Automation 8501kpdr13v51 Plug In Relay 11 Pin 3pdt 10 Amp At 277 Vac 12 Vdc Coil Schneider Electric Usa Hooking Up Relays Cdm Fabrication Relay And Timer Specifications Technical Data How To Wire This Latching Relay Electrical Engineering Stack Exchange
<urn:uuid:6da13468-98d3-4905-bd80-2ddfb734c1e0>
CC-MAIN-2023-50
https://www.schemadigital.com/11-pin-relay-wiring-diagram/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100327.70/warc/CC-MAIN-20231202042052-20231202072052-00298.warc.gz
en
0.779542
679
3.59375
4
BY MIKE VIOLETTE Reproduced with permission of IN Compliance Magazine Original publication April 2014 When I was a kid and found out that my dad was an ‘engineer,’ the vision of him driving a train popped into my head for the word engineer was firmly associated with the word locomotive. It was a few years until that image became disassociated as I learned the reality that engineers do all kinds of things entirely unrelated to trains. But the connection between engineers and trains never completely went away. This month’s Reality Engineering explores a train incident due to a failure of judgment—and one man’s ultimate sacrifice. The development of steam-powered locomotives grew rapidly in the early and mid 1800s. By the turn of the twentieth century, these machines, fired by wood, oil or coal, were used to transport goods and people across the globe. Often, the technology, materials, design and construction were pressed beyond their limits. As a result, steam-engine explosions were not rare—and were often violent. Locomotives were also used for back-woods work in the clearing of mighty forests, where we join two loggers whose fates are cast by the catastrophic failure. [North of Waterville, ME. Fall, 1899] The day’s duty was to clear slash from the previous weeks’ cutting and make clear the way to begin hand-skidding felled trunks from the edge of a steep incline down to the river. This meant moving the smaller trees and brush and laying them so the logs could be moved to the main road. It was dirty and difficult work. The skidding team used a combination of horses and steam-powered donkey engines to pull the logs out and collect them onto the skid tracks that led down to the water’s edge, where the logs were floated out and to the mill, fifteen miles downstream in Waterville. The locomotives were loaded by workers known as wood hicks, wielding peavey poles, or cant hooks which were lever tools with a pivoting, hooked arm and metal spike used to gig the log and, using the leverage at the end of the long handle, roll the logs onto the flat bed of the locomotive. The trains themselves weighed 30 tons, driven by split wood fed into the firebox of the train. The most popular type of train were the Shay-geared locomotives that were developed for use in the logging camps. The loads were large and the track hastily constructed, and often uneven and bent. The Shays powered all the wheels of the large engine via a central shaft and gear distribution to the locomotive trucks, greatly increasing the traction of the rig over the rudely built tracks. The Shays were slow but strong and could pull some of the largest loads up steep grades while not pounding the track to pieces, unlike other locomotives of the time. The machines were hardy, but the harsh conditions in the winter made maintenance difficult and camp bosses, attuned to the costs of idle labor and lost opportunity of blue-sky days, pushed the men and equipment past their physical and mechanical limits. Steam locomotives were built of thick steel in a bottle-shape with a firebox—lined with firebrick—on one end of the bottle. The plate above the firebox that separated the fire from the boiling water—called the crownsheet—was one-half of an inch thick. The job of the fireman was to maintain the fire to keep the steam pressure available for the cylinders, which, in the Shay, consisted of a triad of push-pull cylinders, the steam sent alternately to the top and bottom of the cylinder, providing motive force at each half-cycle of the piston travel. Maintaining the level of water in the boiler was critical, for if the crownsheet were uncovered, the steam would become super-heated and the crown would fail, with catastrophic results. This most often happened as locomotives crested hills under full power. If the water level was not carefully monitored and was allowed to drop too low, the water would flow away from the crown. Thus, the driver was constantly monitoring the level of water in the boiler through a sight glass in the cabin. Maurice and Dragos, fellow loggers with an unexpected connection, were walking along the track to the higher reaches of the logging operation. The day was nearly done and this was the last tract to clear before the mid-winter sun disappeared behind the blue mountains. “Maurice, Maurice!” Dragos cocked his head and looked at his friend who had a vacant, far-off look. “What are you thinking about?” Maurice, shaken from a temporary reverie, replied, “Uh, yes. It is nothing. I was just wondering” He trailed off, trying to compose himself, and then asked “Dragos, what brought you East?” Maurice didn’t expect the answer. “I am, or was, looking for someone.” Dragos replied. “Who?” He said distractedly, trying to focus on his friend, who had something important to say. “My mother.” He looked at Maurice expectantly. “Her name was Thérèse. Thérèse Ouvrier.” The train groaned by, moving up the tracks. Maurice said something, but Dragos could not hear it for the noise of the Shay. Steam was spitting from the pistons as the train passed by, pulling uphill to the left of the pair of men. The driver was leaning out the window, watching the progress of the train on the newly-laid track, his left arm on the throttle, goosing the engine slowly up the incline. “What did you say?” Dragos yelled over the noise. He had heard, but couldn’t quite fathom the possibility. Maurice looked at his cousin’s face. A great many questions were answered and the next chapter scribbled itself out across the pages of the journal, not in his hand, but in his mind’s eye he saw it. Suddenly, the train lurched hard to the left and there was a great sound of cracking timber. The driver yelled above the noise of the steam and the sound of the train breaking through the un-shored portion of the track and hit the brakes, simultaneously pulling the reversing linkage hard, grunting. The wheels stopped and then spun quickly backwards, but the momentum of the huge machine was too great, its perch too precipitous. The train continued to pitch forward and to the left, the bulk of the weight of the behemoth over the left wheels of the train truck. The driver pushed the throttle fully forward and the pistons roared, churning furiously, the wheels spinning backwards now at full speed, but to no effect save to chew through the rails, the wheels turning motion to friction to heat and heat turning wood to smoke and flame. Chunks of wood flew forward of the train as the wheels rotated backwards, a big limb clanged hard into the connecting linkage, bending the rod and pulling the rotation of the steel wheel out-of-round, the left wheels of the train deformed the track and the train lurched hard, once, then again, pitching the driver from the controls, which were set at full throttle, full reverse. He fell against the fireman, who was struggling to shut down the air inlets when the train tipped, knowing that they didn’t have much time before part of the machinery would fail due to heat and the battling mechanical forces. The engine now screamed above the roar, metal grinding at great speeds making a screeching, hideous howl, rinds of steel peeling off from the thin guards, ripped away and caught in the rotating wheels as the machine tore itself apart. Smoke poured out of the stack, adding to the confused scene: shouting men and failing machinery and wood and smoke and steam mixing with the yells of the men and rending of metal. Maurice realized his oversight and failure to get the track repaired. He ran to the front of the train, bent down to look and confirmed his suspicion: the supports had splintered and the rail sagged under the weight of the locomotive. He cursed and looked back as Dragos sprinted to the engine as the wheels slowed, steam still belching through the valves. Steam and grease sprayed onto the ladder to the cab, the heat igniting hot oil and fire began creeping up the rungs. The bowels of the engine groaned and three low-pressure steam lines popped free from their fittings, hissing and spitting. Inside the firebox, fully stoked and now agitated to a greater heat by the motion, the coals flared red and blue; wood and smoke and fire roared. The tender had not been refilled, at Finn’s urging, because the trek to the nearest water would have taken 30 minutes to complete. What was worse, he urged the crew to get underway and started the day off with little more than half the water in the boiler. As the train rolled front and listed to the left, the water ran away from the highest part of the crownsheet, the half-inch thick steel that separated the boiler water from the fire. The now-dry crown began to soften, stoked to above melting point by the intensity of the fire in the chamber, now a blast furnace. The driver scrambled to his feet and watched in horror as the water dipped below the sight glass. The easiest way out of the doomed locomotive was down, but the exit on the left of the cab was blocked by a large tree that the engine lay into. The wheels spun to a stop as the water, concentrated on the left, cooler side of the boiler, gave off less steam to the pistons. He scrambled up the inclined floor, slipping and grabbed the railing on the door. He yelled at the fireman. “Get out! We’ve got to get out of here!” The fireman clawed his way forward, holding onto the driver. The driver saw Dragos, now up on the ledge of the engine, furiously working the door latch. “Help me!” cried the driver, who was hanging on the hand rail, holding the door shut against Dragos’ mighty pull. Dragos recognized the two men as the one who had taunted him that morning and paused, just for a moment, to let the recognition be shared. “Help me, please.” The man now was desperate and Dragos yelled: “Let go of the door!” The driver realized he was holding the door closed and moved his grip, grabbed the brake handle and wedged his foot against the handbrake and the floor. As he gained his footing, the fireman came to eye level with the sight-glass. It was broken—exploded from the inside. Steam shot out the empty frame of the tube and he realized that the fire was undoing the steel holding back the roiling steam, now pressurized to hundreds of pounds per square inch. The crownsheet was stabilized by an array of stays, arrayed along in rows from the top of the boiler, linking the top and bottom together. If the crown were to buckle and fail, the stays would be pulled past their limit and the fasteners holding them in place would pop, leading to a catastrophic explosion. Dragos pulled the door open and flipped it around, grabbed the driver and hoisted him free. The fireman scrambled up, fairly pulling his rescuer down into the cab as he climbed up and out. The heat bloomed in the space and the bolted end of the boiler starting to leak steam. Dragos still had his harness clipped around his waist and as the firemen scrambled out, he pulled Dragos off-balance and half-way into the cab and a loop of his harness caught on a hissing valve. Dragos tried to pull himself out, but the valve was over his head and he could not reach it as he desperately tried to twist free. In his writhing to wrench himself away, his head struck the edge of the door and he was temporarily dazed. Maurice jumped up on the ledge of the cab, slipping on the oily surface. He grabbed the edge of the opening of the cab and leaned inside. The valve that had hooked Dragos had started to turn and steam leaked furiously from the sealing nut. Maurice grabbed the rope, the skin on his hands burning and turning instantly to scarlet, but still he managed to pull Dragos free. With his uninjured hand, Maurice pulled his friend out and lowered him to the ground, who rolled against the truck of the train. As Maurice leaned half-inside the cab and looked to see if there was anyone left in the smoky fogged murk, the crown, at the highest point tortured the longest by the intense heat, ballooned into the firebox, a bubble of steel. The retaining stays lengthened and as the crown stretched the rivets pulled through the holes in the sheet, now as soft as cheese. The thickness of the steel thinned to a mere eighth-of-an-inch. With a roar, bubble burst and the boiler erupted. Superheated water dumped into the fire and steam at 200 thunderous pounds-per-square-inch blew into the firebox, blowing away the door. A shock of steam and smoke shook the cabin and split the roof of the locomotive. Shrapnel showered the woods and the men running for their lives. Maurice was vividly aware of what would happen next. As the blast hit, he covered his face and braced. But the explosion was powerful and he was slammed against the back of the cab, his head jerked and smashed against a handrail. He felt nothing more. The heat and fire and smoke sizzled and hungrily devoured his clothing, skin and sinew. He crumpled onto the floor of the cab, consumed. -Excerpted from The Bearers by Michael Violette
<urn:uuid:a3251b95-adb9-4f37-ab6a-0038e065dfb8>
CC-MAIN-2022-40
https://www.wll.com/a-wreck-of-a-story/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338244.64/warc/CC-MAIN-20221007175237-20221007205237-00201.warc.gz
en
0.980574
2,941
2.9375
3
Cincinnati, OH—A recent study has found severely obese teens are at risk of nutritional deficiencies. The study compares the nutritional status of obese teens who had weight-loss surgery and those who did not. Both had low iron, mild anemia, and low vitamin D, and those who did not have surgery also had low levels of protein in their blood. Researchers from the Cincinnati Children’s Hospital Medical Center conducted the study on 79 obese teens who received gastric bypass surgery or didn’t receive surgery but were evaluated. The patients were studied between 2001 and 2007 and then contacted to continue the study in 2011 through 2014. Eight years later, on average, the patients that had the surgery experienced significant weight loss; while those that did not have surgery did not lose any weight. Before the study was done, bariatric surgery was thought to be the main cause of nutrient deficiencies in such patients. Stavra Xanthakos, M.D., medical director of the Surgical Weight Loss Program for Teens at Cincinnati Children’s Hospital, along with a co-author of the study, state: “What this shows us in that nutritional deficiencies occur even in teens that don’t undergo surgery. Severely obese patients should be screened for nutritional deficiencies, regardless of whether they’ve undergone weight loss surgery.” Published in WholeFoods Magazine, July 2014 (online 6/13/14)
<urn:uuid:687e9308-a816-48bd-9eab-2c6018dddd48>
CC-MAIN-2015-48
http://www.wholefoodsmagazine.com/news/breaking-news/new-study-reveals-nutritional-deficiency-risks-obese-teens6678941
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398450715.63/warc/CC-MAIN-20151124205410-00350-ip-10-71-132-137.ec2.internal.warc.gz
en
0.97655
295
2.875
3
The Protivin brewery has enlisted crayfish to monitor the purity of the spring water it uses to make its beer. Bob Mezan reports. A Czech brewery is getting some high tech help from some little creatures. The Protivin brewery has enlisted crayfish to monitor the purity of the spring water it uses to make its beer. Placed in tanks that are pumped with the sourced water, the crayfish can react to low levels of pollution. They are fitted with infrared sensors that monitor their heartbeats and track their cardiac activity, while cameras monitor their movements. Master Brewer, Michal Voldrich explains how the whole process works. SOUNDBITE: Protivin Master Brewer, Michal Voldrich, saying (Czech): "We have five crayfish controlling the water quality here. They are connected to a computer and we are following their pulse activity and movement. When three or more crayfish move or change their pulse activity, we know that the water parameters have changed. We are able to react quickly, because we have the result within three minutes." Scientists have used crayfish populations as a method of studying water pollution, but now it looks like they've found a place in the private sector, ensuring cleaner water - and better beer.
<urn:uuid:408f835f-b243-41fe-8634-1845e4de3d7e>
CC-MAIN-2018-30
https://mobile.reuters.com/video/2017/09/29/czech-brewery-uses-crayfish-equipped-wit?videoId=372630837
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593378.85/warc/CC-MAIN-20180722155052-20180722175052-00100.warc.gz
en
0.966821
261
2.78125
3
The NSW government must invest in early intervention to overcome deep and entrenched poverty, especially to break the intergenerational cycle and impact on children. Between 12 per cent to 15 per cent of the Australian population lives in poverty, and the Australian Council of Social Service estimates that 600,000 Australian children live in poverty. The July 2013 report of the Productivity Commission entitled, Deep and Persistent Disadvantage in Australia, estimated that 5 per cent of Australians aged 15 or over experience deep social exclusion, with 1 per cent suffering very deep exclusion. Sole parents whose families rely on government payments and emergency food vouchers, families with members who have a mental illness or a serious disability, former prisoners, social housing tenants and Indigenous families are at high risk of entrenched poverty. Unfortunately, a child from one of these families is likely to suffer social and economic disadvantage for the rest of his or her life. Some will triumph over this adversity but many will not. The Anglicare 2012 State of Sydney report showed that children who experience multiple disadvantages are far more likely to experience lower levels of education and are more likely to be absent from school. They are three times more likely to experience mental health problems, are more likely to suffer from vision, dental, and hearing disorders, have asthma, heart and kidney disease, epilepsy and digestive problems, and are more likely to have poor nutrition. The early years of a child's life profoundly shape their future. There is ample evidence that shows that early intervention and assertive support for families make a difference. This is critical for the first five years of life so that children do not start school behind the eight ball and continue on a pathway of poorer outcomes. I am concerned about government cuts to budgets and programs that help these families and children. Ironically, the programs at risk are often the prevention and early intervention services that are geared to help vulnerable families, promote child safety and offer a way out of entrenched poverty. These services include the Welfare Rights Centre and other non-core welfare programs that deal with reduced access to childcare and pre-school funding. In the long term these services help to save government resources. I support community calls for a national child poverty action plan, drawing on governments at all levels and asking that the New South Wales government lobby the new Federal government to achieve that aim. We should have baby healthcare centres that provide home visits to help new parents. Anne Hollands from the Benevolent Society makes it clear that we need maternal and paediatric health services working closely with family support, mental health and early childhood education services. Health resources must also help to prevent disease and support people managing chronic conditions, including education and public health measures. We need more health resources that target homeless people with complex needs, expanding on the great work of Neami National, Way2Home and St Vincent's Hospital Homeless Health Team. We should ensure all children have access to quality childcare and education, specifically helping students with special needs. Better education means better health and greater citizen engagement and social support. We must provide secure low-cost and affordable housing. As former and current governments have sold or neglected vital inner city social housing, I have been working with tenants in my electorate who have told me how hard it is to afford inner city rents. Employment is a main pathway out of entrenched poverty. We need State and Federal governments to work together to ensure effective job entry programs and that social security payments are adequate to help people get back on their feet. The Productivity Commission has identified that high economic and social costs contribute to families who are persistently disadvantaged, including lost income, lost investment, crime and reduced social capital, as well as spending on health, justice and welfare services. It also identifies the significant costs on people and families and the broader community. It is time for all levels of government to work with the community sector to fund and support early intervention strategies to help overcome deep and entrenched poverty. Donate To New Matilda New Matilda is a small, independent media outlet. We survive through reader contributions, and never losing a lawsuit. If you got something from this article, giving something back helps us to continue speaking truth to power. Every little bit counts.
<urn:uuid:19059ba6-2ed8-4caa-998a-0bb59e80d4e1>
CC-MAIN-2019-30
https://newmatilda.com/2013/10/24/child-poverty-can-be-prevented/
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526931.25/warc/CC-MAIN-20190721061720-20190721083720-00256.warc.gz
en
0.956945
847
2.53125
3
Proving that I can write about things other than the Spanish flu … In the summer and fall of 1883, the newly-installed Anglo-Egyptian government faced its first public health crisis when cases of cholera were reported in the Nile Delta and rapidly spread throughout the country. The government’s response was based in part on long-standing European prejudices about the “Orient” as the origin of plague and pestilence and “Orientals” as people who did not understand health, science, or hygiene, and were unconcerned—even fatalistic—in the face of life-threatening illnesses. To the contrary, Egypt had, over the course of the 19th century, developed a basic national health system, which had earned praise from European observers prior to the British occupation in 1882. The prejudices expressed by British occupation authorities also elides the British government’s own stance in ongoing debates among European scientists about contagion and the appropriate methods for preventing the spread of diseases like cholera. The Anglo-Egyptian government’s response was based on imperial policies, racial prejudices, and scientific understandings that failed to adequately deal with the pandemic at the cost of 50,000 Egyptian lives.
<urn:uuid:38ceacfa-a6a4-4008-a76c-596d831cd3d2>
CC-MAIN-2022-05
https://christophersrose.com/2020/05/25/a-tale-of-two-contagions-science-imperialism-and-the-1883-cholera-in-egypt/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304309.59/warc/CC-MAIN-20220123202547-20220123232547-00336.warc.gz
en
0.967402
255
2.90625
3
Not only are fish a great source of lean protein, they are also the richest source of omega-3 fats. These anti-inflammatory fats lower triglyceride levels, LDL cholesterol, and even reduce the formation of clots in your arteries. Together, this cleans and unclogs arteries, which in turn prevents heart disease. An intake of 1 portion, 2 to 3 times a week is recommended by the American Heart Association. This can be of any fish available in the market including salmon, tuna, trout, mackerel, and cod. Most importantly, fish is easy to cook. It can be baked, steamed, grilled, and added to a curry, salad or even some pasta. Nuts & Seeds Nuts and seeds contain high quantities of poly- and monounsaturated fats, minerals, and phytosterols. How are these helpful? Unsaturated fats lower LDL cholesterol levels, minerals lower blood pressure, and phytosterols compete with cholesterol for absorption in the digestive system. Walnuts and unsalted almonds are among the best nuts for heart health. Ideal seeds include chia, sunflower, pumpkin and flaxseeds. However, limited consumption of nuts and seeds is recommended, specifically one small handful a day, as the high content of monounsaturated fats also makes these foods calorie-dense. Nuts and seeds can be eaten as standalone snacks or added to granola, smoothies, salads and soups. Dark Green Leafy Vegetables These are some of your richest sources of potassium, fibre, and vitamins A, C, and K. Not only are they available year-around, they also come in a wide range of varieties (e.g. spinach, kale, arugula, amaranth greens, romaine and leafy lettuce). The potassium in these vegetables helps kidneys remove sodium from the body to lower blood pressure; cohort studies have time and again shown an inverse link between potassium consumption and the risk of stroke. The fibre reduces absorption of cholesterol in the gut while vitamins work in synergy to remove oxidising agents and therefore preventing LDL oxidation, a major risk factor of heart disease. At least one type of these vegetables should be consumed at mealtimes. This can be as a salad, soup, sabzi or curry.
<urn:uuid:e78a2614-40d4-419f-b2bc-704942eeb315>
CC-MAIN-2019-26
https://setu.in/blogs/nutritionist-pankti-motani-talks-about-top-5-superfoods-against-hypertension-and-high-cholesterol/
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628001014.85/warc/CC-MAIN-20190627075525-20190627101525-00113.warc.gz
en
0.926123
469
2.71875
3
The Dental Program at Valley Animal Hospital Imagine what would happen to your teeth and gums if you didn't go to the dentist regularly to have them cleaned. Add onto that you rarely, if ever, brushed and flossed! You can imagine what your teeth would look like and the chronic, gnawing discomfort you would experience. Dogs and cats are no different, especially in view of the fact they are now living longer than ever before. In addition, current research shows that dental disease in animals worsens and even starts disease in other parts of the body. A complete dental prophylaxis is one of the primary ways you can keep your dog or cat healthy for a long time to come and improve their quality of life. And like us, they need their teeth as much as we do. Dogs and cats that are accustomed to dry kibble can not chew so they are forced to "gum" large chunks of food and swallow them whole as it is too uncomfortable to chew. This can exacerbate digestive issues. What's a Dental Prophylaxis? Cleaning your dog or cats' teeth is just part of a complete dental prophylaxis at Valley Animal Hospital as the following table shows: Valley's Complete Prophylaxis - Charting Teeth: Teeth are assessed and recorded for future reference. - Supra-Gingival Hand Cleaning: Eliminate major calculus above the gum line. - Sub-Gingival Hand Cleaning: Eliminate plaque and tartar below the gum line. - Ultrasonic Scaling: Ultrasonic cleaning of a smooth tooth surface. - Examination by the Doctor: Evaluate the need for further work as well as check for the presence of oral tumors. - Dental Radiographs: X-Rays of any individual teeth suspicious for deep disease. - Low Speed Polishing: Removal of the micro- scratches from the ultrasonic scaling. - Fluoride Treatment: Application of caries fighting fluoride. - Apply Oravet®: Application of a long- lasting, tartar control product. Why do you need anesthesia? Dogs and cats would never sit still for a dental prophylaxis. Were it not for anesthesia, it could even be a dangerous procedure as sharp instruments are used. In addition, the ultrasonic equipment generates irritating sensations and sounds which are heard by dogs and cats. But isn't anesthesia dangerous? We would be misleading you if we claimed anesthesia did not involve some risk but here at Valley Animal Hospital, we go the extra mile to make certain it remains as close to zero risk as possible. Here's why: - Pre-anesthetic blood analysis - Sophisticated monitoring equipment including ECG and blood oxygen levels - Constant observation and charting of vital signs by a veterinary nurse - Intravenous catheter placement with supportive fluid therapy via a fluid pump - Use of a Bear Hugger® full body heating unit - Constant supply of oxygen via an endotracheal tube - Recovery in a Snyder Intensive Care Unit® as needed
<urn:uuid:9e1f7e15-bb76-4e5b-ae0a-76399aa16d1f>
CC-MAIN-2020-29
https://www.valleyofthevets.com/about-us/services/denstistry.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657155816.86/warc/CC-MAIN-20200715035109-20200715065109-00572.warc.gz
en
0.937796
638
3.125
3
What is Sport Anyway? In February 2008, the National Centre for Cultural and Recreational Statistics (NCCRS) released a Discussion Paper: Defining Sport and Exercise, a Conceptual Model (cat. no. 4149.0). After receiving feedback and comments on the paper from specialists working in the field of sport and physical activity policy, research or measurement, NCCRS has now released the final version of this paper, titled Information Paper: Defining Sport and Physical Activity, A Conceptual Model (cat. no. 4149.0.55.001). If you have ever contemplated the question "what is sport?" or "what is exercise?" then this paper will be of interest to you. The information paper presents definitions of sport, exercise and physical recreation. It also examines the relationship between these overlapping concepts, and brings them together in a conceptual model. The model outlines what activities may be considered in scope for research on exercise, physical recreation and sport. As a precursor to the development of this conceptual model, an analysis of sports and physical activity surveys was undertaken to review 30 surveys conducted at the national, state or territory level. The aim of developing a conceptual model for sport and physical activity is to aid interpretation and future development of surveys in this field. That said, even when concepts are well defined, there can still be practical difficulties in designing a survey that will accurately measure the concepts. This is also briefly discussed in the paper. If you have any queries regarding the paper, please contact Megan Warner in the Sport Statistics Unit (08) 8237 7387. This page last updated 24 September 2009
<urn:uuid:dd789c88-6379-4ce2-ba11-c0b2f385462d>
CC-MAIN-2014-42
http://abs.gov.au/AUSSTATS/abs@.nsf/Previousproducts/4147.4.55.001Main%20Features42009?opendocument&tabname=Summary&prodno=4147.4.55.001&issue=2009&num=&view=
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413558066654.4/warc/CC-MAIN-20141017150106-00358-ip-10-16-133-185.ec2.internal.warc.gz
en
0.934346
329
2.84375
3
Tim Burton’s Alice in Wonderland sees Lewis Carroll’s Alice returning to ‘Underland’ at the age of 19, falling down a hole in pursuit of the familiar white rabbit, and more importantly in flight from an unwelcome marriage proposal. She has no memory of her childhood visit, and the fantastical characters debate among themselves whether she is in fact ‘the right Alice’. But of course, really this is a question Alice herself must answer: can she remain the free spirit with the wild imagination that was encouraged by her late father, or must she ‘grow up’ and learn to conform to Victorian Britain’s expectations of a young woman of her social class? Naturally, the moral of Burton’s story is that freedom and imagination must triumph over conformism. As Alice’s father told her, all the best people are completely bonkers. But the moral is no less appealing for being predictable, and there are a few suprises and twists in the telling of the story. Significantly, screenwriter Linda Woolverton gives Alice herself the famous line about believing ‘six impossible things before breakfast’, something her father apparently used to do. In Lewis Carroll’s original Through the Looking Glass, it is the White Queen who reprimands the exactly-seven-and-a-half-year-old Alice for not trying hard enough to believe that the queen is a hundred and one, five months and a day. Now Alice has internalised the lesson that believing the impossible requires imaginative effort, and is challenged to act on it. In the real world, this means turning down the awful aristocrat Hamish, despite the wishes of her family and an entire garden party gathered to witness her acceptance. While Alice refuses to wear her corset, and prefers gazing at clouds to dancing quadrilles, she doesn’t know if she has the courage to assert her own wishes against such oppressive expectations. Hence the visit to Underland. Here, Burton and Woolverton slip Alice into the role of the young boy (another impossible thing) in ‘Jabberwocky’, the nonsense poem included in Through the Looking Glass. Alice must find the vorpal sword and slay the Jabberwock before she can return to the world and slay the dragon of an unwanted marriage. The quest is enjoyable enough, with 3D effects adding to the impression that Alice is trapped in a computer game, and an impressive cast of gargoyle-like characters including Helena Bonham-Carter as the huge-headed Red Queen and Johnny Depp as a tragic Mad Hatter. Alice herself is played by Mia Wasikowska (fresh from a more naturalistic teenage psycho-drama in HBO’s In Treatment), who brings just the right combination of vulnerability and assertiveness. If anything, though, the film is perhaps too star-studded, with celebrity turns like Stephen Fry as the Cheshire Cat distracting from the story. The dramatic pay-off at the end is pleasingly unexpected, however. Having slain the Jabberwock and turned down Hamish, Alice announces that she will now take responsibility for her late father’s business. His impossible idea, now vindicated, had been to establish trading posts in the far east, and Alice now intends to expand into China. What a contrast with the more right-on 3D blockbuster Avatar, which slavishly follows the script of postcolonial guilt and suspicion of progress. By way of Underland, Alice takes herself out of her corseted role as a woman in Victorian Britain, and into the world. That sounds like progress to me.
<urn:uuid:3dbca271-27ad-43c7-a907-e7bdcdbbc357>
CC-MAIN-2016-18
http://www.culturewars.org.uk/index.php/site/article/a_manifesto_for_the_imagination/
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860112727.96/warc/CC-MAIN-20160428161512-00190-ip-10-239-7-51.ec2.internal.warc.gz
en
0.948294
752
2.609375
3
Update from the Green blog: Where to get more information on fracking. Syracuse, NY -- The natural gas drilling method known as fracking is "the most serious environmental challenge we've ever faced,'' a spokesman for the Onondaga Nation said Thursday at a meeting of about 100 environmentalists and citizens in Syracuse. "The more I study this, the scarier it becomes,'' Joseph Heath, general counsel for the Onondaga Nation, said at a information session and panel discussion at May Memorial Unitarian Universalist Society. Hydraulic fracturing -- hydrofracking or fracking for short -- is the process of drilling down into shale and then turning the drill horizontally to tap pockets of natural gas. Ron Bishop,a chemistry professor at the State University College at Oneonta, laid out the drilling process. A thick chemical slurry is pumped in to keep the drill bit clear of debris. Once the well is drilled, concrete is poured down to seal it. Large quantities of water -- up to millions of gallons -- are pumped in under pressure to "hydrofracture'' the shale and release more natural gas, he said. The briny, polluted water then has to be disposed of. In the meantime, it often sits in tanks or drainage ponds prone to overflow and leaks. "I'm not sure there is anything they could do to make this process safe,'' said Bishop. Other environmental impacts of fracking, Bishop and others said, include the potential to foul drinking water aquifers; diesel pollution from pumps, compressors and trucks bringing water to a drilling site; and wear and tear on rural roads. The gathering was sponsored by the Onondaga Nation; Sierra Club, Iroquois Chapter; Citizens Campaign for the Environment; and Neighbors of the Onondaga Nation. They are organizing in a hurry to meet a Nov. 30 deadline for public comment on gas drilling regulations proposed by the state Department of Environmental Conservation. The Citizens Campaign is seeking an extension of the deadline until Jan. 31 to ensure the public has enough time to learn about fracking and comment on the proposed regulations, said Dereth Glance, executive program director. "Landmen'' for the gas drillers have been signing up landowners for years. A review of Onondaga County records, only one-third complete, shows there are already more than 1,300 leases signed by landowners in the county, said Jack Ramsden, of NOON. "More than 18,000 acres of land are already leased,'' he said. "The horse is already out of the barn.'' The Haudenosaunee issued a statement calling on New York state to ban hydrofracking and other unconventional gas drilling methods. They will not comment on the state regulations because doing so "means we accept the process of allowing hydrofracking into our environment and impacting our future generations.''
<urn:uuid:a8dcfcbb-4415-4e41-bb3a-becc0206eb14>
CC-MAIN-2016-40
http://www.syracuse.com/news/index.ssf/2009/10/environmentalists_meet_in_syra.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661763.18/warc/CC-MAIN-20160924173741-00120-ip-10-143-35-109.ec2.internal.warc.gz
en
0.943949
585
2.703125
3
February 1, 1946 PUBLISHED TWICE A MONTH BY THE Foreign Policy Association, Incorporated MIDSTON HOUSE, 22 EAST 38TH STREET, NEW YORK 16, N.Y. VOLUME XXI NUMBER 23 $.25 a copy $5.00 a year Axis Ties with Argentina By O. K. D. RINGWOOD AND OLIVE HOLMES Although the war ended with Argentina nominally an Allied power,(1) there is abundant evidence that Axis interests in that country are not only relatively unmolested but are closely leagued with Colonel Juan Domingo Perón and members of the military government in the rearmament drive and in a program to extend Argentine hegemony over the River Plate basin. Until Buenos Aires terminated diplomatic relations with Germany and Japan, on January 26, 1944, Axis penetration into South America had been channeled through the German Embassy in that capital.(2) Its activities, according to a report issued in 1943 by the Emergency Advisory Committee for Political Defense of the Continent, located in Montevideo, were responsible for the loss of millions of dollars' worth of United States ships and supplies, as well as of the lives of hundreds of passengers when their ships were torpedoed.(3) After the break, however, the great German enterprises in Argentina took over the organization of financing of the Nazi movement. The amount of German investments in Argentina is large, its character is extremely diversified and has not apparently been appreciably altered as a result of World War II.(4) German investments are located in the electric, metallurgical, steel and chemical industries, in the construction industryboth civilian and militaryand in sugar, cattle and other rural enterprises, and have been estimated to total 2,500 million pesos (about $600 million). This figure does not include, however, recent clandestine accumulations of Nazi fugitive capital. When it became clear that Germany would lose the war, a "safe haven" program was devised for the secretion of German economic assets in neutral countries where control could be retained through various "dummy" arrangements. In this fashion, it is believed that German capital and loot from occupied countries, and even experts and technicians, under assumed Spanish or Argentine identity, have been transferred to Argentina. The Argentine government on April 3, 1945 announced that 150 German subsidiaries, with an aggregate value of $40 million, had been confiscated and that government inspectors had been placed in control of these firms pending transfer to Argentine hands. Assistant Secretary of State Clayton stated before a subcommittee of the Senate Military Affairs Committee on June 25, 1945, however, that not one of 108 major Axis enterprises suspected by the Allies of being the spearheads of German economic penetration and espionage had been eliminated.(5) It is the contention of the United States that nothing less then complete liquidation of those Axis interests which figure on the United States and British "black lists" is adequate, and that at the time of the Clayton testimonythree months after Argentina had entered the waronly four of these "spearheads" were in the process of being eliminated. On November 30, 1945 of the directorate of the Enemy Properties Board, whose secretary charged Foreign Minister Juan Cooke with unwarranted interference with the committee's work, resigned in mass.(6) In addition, charges of complicity with Nazi espionage in Argentina have been brought against the police, the Ministry of War and the Foreign Ministry by Argentines as private citizens and in the press. In an article entitled "Nazi Germans are Well Protected," the Socialist Weekly La Vanguardia linked the names of Ludwig Freude, owner of the General Construction Company, Fritz Mandl, who possesses an interest in the IMPA arms corporation, and Ricardo Staudt, with the Foreign Minister.(7) These individuals have not only been given protection from deportation in a variety of ways but have also been the recipients of government contracts. In turn, they are alleged to have contributed large sums to Perón's Presidential campaign. The United States has taken cognizance of the military government's diversion of critical materials to the Axis firms which received its contracts.(8) It has also called pointed attention to the fashion in which certain Argentine newspapers, formerly subsidized by the German Embassy and now publishing freely under new identities, are supporting the Perón candidacy.(9) The Farrell government has not convincingly refuted these charges by either word or deed. 1. Argentina declared war on Japan and on Germany, "in view of the character of the latter as an ally of Japan," on March 27, 1945. 2. Sax Bradford, The Battle for Buenos Aires (New York, Harcourt, Brace, 1943). 3. First Annual Report of the Emergency Advisory Committee for Political Defense (Washington, Pan American Union, 1943). 4. Luis Victor Sommi, Los Capitales Alemanes en Argentina (Buenos Aires, Claridad, 1943). For a digest of this study, see "German Capital in Argentina," The Economist (London), September 22, 1945, pp. 416-18. 5. New York Herald Tribune, June 26, 1945. 6. Ibid., December 5, 1945. 8. State Department memorandum of July 26, 1944, Department of State, Bulletin, July 30, 1944. 9. On January 17, 1946 the U.S. Embassy in Buenos Aires released some of the documents uncovered in Berlin proving Nazi connections with Argentine government officials and Nazi control over a part of the press.
<urn:uuid:67a53f41-3f8b-4694-abc5-df91e322a17e>
CC-MAIN-2015-18
http://maebrussell.com/Argentina/Axis%20Ties%20with%20Argentina.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246654292.99/warc/CC-MAIN-20150417045734-00250-ip-10-235-10-82.ec2.internal.warc.gz
en
0.963906
1,119
2.609375
3
Archiving the web National libraries start to preserve the web, but cannot save everything IN THE digital realm, things seem always to happen the wrong way round. Whereas Google has hurried to scan books into its digital catalogue, a group of national libraries has begun saving what the online giant leaves behind. For although search engines such as Google index the web, they do not archive it. Many websites just disappear when their owner runs out of money or interest. Adam Farquhar, in charge of digital projects for the British Library, points out that the world has in some ways a better record of the beginning of the 20th century than of the beginning of the 21st. In 1996 Brewster Kahle, a computer scientist and internet entrepreneur, founded the Internet Archive, a non-profit organisation dedicated to preserving websites. He also began gently harassing national libraries to worry about preserving the web. They started to pay attention when several elections produced interesting material that never touched paper. In 2003 eleven national libraries and the Internet Archive launched a project to preserve “born-digital” information: the kind that has never existed as anything but digitally. Called the International Internet Preservation Consortium (IIPC), it now includes 39 large institutional libraries. But the task is impossible. One reason is the sheer amount of data on the web. The groups have already collected several petabytes of data (a petabyte can hold roughly 10 trillion copies of this article). Another issue is ensuring that the data is stored in a format that makes it available in centuries to come. Ancient manuscripts are still readable. But much digital media from the past is readable only on a handful of fragile and antique machines, if at all. The IIPC has set a single format, making it more likely that future historians will be able to find a machine to read the data. But a single solution cannot capture all content. Web publishers increasingly serve up content-rich pages based on complex data sets. Audio and video programmes based on proprietary formats such as Windows Media Player are another challenge. What happens if Microsoft is bankrupt and forgotten in 2210? The biggest problem, for now, is money. The British Library estimates that it costs half as much to store a digital document as it does a physical one. But there are a lot more digital ones. America's Library of Congress enjoys a specific mandate, and budget, to save the web. The British Library is still seeking one. So national libraries have decided to split the task. Each has taken responsibility for the digital works in its national top-level domain (web-address suffixes such as “.uk” or “.fr”). In countries with larger domains, such as Britain and America, curators cannot hope to save everything. They are concentrating on material of national interest, such as elections, news sites and citizen journalism or innovative uses of the web. The daily death of countless websites has brought a new sense of urgency—and forced libraries to adapt culturally as well. Past practice was to tag every new document as it arrived. Now precision must be sacrificed to scale and speed. The task started before standards, goals or budgets are set. And they may yet change. Just like many websites, libraries will be stuck in what is known as “permanent beta”.
<urn:uuid:ce4a4447-1fdb-42f8-bbcf-8bf68e9a8577>
CC-MAIN-2014-10
http://www.economist.com/node/17306104/email
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999639954/warc/CC-MAIN-20140305060719-00099-ip-10-183-142-35.ec2.internal.warc.gz
en
0.946544
669
3.09375
3
Does Drinking Water Make You Sweat More? As the human body is made up of more than 70 percent water and life without water is not possible, it is very important to drink sufficient quantity of water every day. However, some people consume too much fluid, sometimes more than what is needed, and this makes our body sweat excessively. This excessive sweating condition is known as hyperhidrosis and can be dangerous for the body. Causes of Excessive Sweating After Drinking Water Experts suggest that people should focus on drinking water or any other liquid only when they are thirsty and not just because they want to. One may also need to cut down on the excess liquids if suffering from hyperhidrosis. Here are some of the major reasons for excessive sweating after drinking water. Drinking Excess Water Increases Pressure on Kidneys When you drink a lot of water, your kidneys are pressurized to work harder than before as they need to eliminate the extra load of fluid the body has been given. In order to do so, it not only makes you use the toilet more frequently but also makes you sweat excessively to balance out the fluid. Brain Flushes Out Excess Water in Form of Sweat On drinking too much water at any given point of time, a message is sent to the brain from the stomach that the body has become over hydrated and that the excess of water needs to be flushed out. The nervous system is then activated by the brain to excrete excess water through both urination and sweating. So when you sweat due to excess water consumption, the sweating lasts for a short while till the brain understands that the excess water has been eliminated from the body. Hormonal Changes Cause Excessive Sweating The body undergoes several hormonal changes during andropause and menopause and this too plays a major role in causing excessive sweating after drinking too much of water. Along with the sweating, the person can also experience night sweat and hot flashes all day long. How to Prevent Excessive Sweating After Drinking Water? In order to keep the body well hydrated, you must drink sufficient water every day. It is important to know that if you experience a lot of sweating after drinking water, it is no way injurious to your health and will have no ill-effects on the body. In most cases, the sweating is brief and not continuous. However, here are some easy ways to prevent excessive sweating after drinking water. - Instead of drinking a lot of water at one point of time, drink small amount of water at regular intervals. For example, if you are thirsty and want to drink water instead of drinking 3 glasses of water in one go, drink a glass of water every hour or half an hour to quench your thirst and keep the body hydrated. By doing this, you can also adjust the fluid loss from your body (in the form of sweat and urine) quite easily. - It is recommended not to drink too much coffee or any caffeinated product after water consumption as this can lead to excessive sweating. Once you have finished your caffeinated drink, wait for at least half an hour before drinking any water. This will prevent the sweating to a large extent. - If you wish to prevent excessive sweating, try not to immediately indulge in any kind of physical activity be it running, jogging, cycling or weight training after consuming water. Drink some water, wait for a few minutes and only then start your exercise regime or activity which you plan to do. - In order to prevent excessive sweating after water consumption, never drink loads of water after eating spicy food items. This plays a major role in causing sweating as your body gets heated up when you consume foods which are spicy and adds to the sweating rapidly. A human being should never reduce his water intake as this can lead to several diseases and also prove to be fatal in some cases. However, if you are amongst those individuals who experience a lot of sweating after drinking water or any other liquid for that matter, then it is advisable to own the ways mentioned above to prevent this from happening. This will not only help you continue your regular water intake but also keep the body well hydrated without any excessive sweating.
<urn:uuid:8c01f30e-641c-4fdd-a8a1-f5b470eef38b>
CC-MAIN-2017-09
https://www.epainassist.com/articles/does-drinking-water-make-you-sweat-more
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171932.64/warc/CC-MAIN-20170219104611-00351-ip-10-171-10-108.ec2.internal.warc.gz
en
0.967577
853
2.578125
3
The 25 countries are partly determined by the availability of long-run (meaning a good chunk of the 20th century) data. Along with the United States, the other countries are Argentina, Brazil, Australia, Canada, Finland, France, Germany, Iceland, India, Indonesia, Italy, Japan, Malaysia, Mauritius, Netherlands, New Zealand, Norway, Portugal, Singapore, South Africa, Spain, Sweden, Switzerland, and the United Kingdom. The figure for each country is also followed by a few bulletpoints that highlight some main trends. Detailed sources for the data are also provided. Any single economic statistic is a one-dimensional slice of reality. When you put a lot of economic statistics together, and let your eye move from one to another, you develop a better overall perspective. As one example, here's the chart for the United States. But if you have an interest in these topics, I encourage you to surf the countries of the Chartbook. Among the key takeaways from this figure: U.S. inequality follows a U-shaped pattern, with a number of measures of inequality falling in the 1930s and 1940s, and then rising since the 1970s. For example, "the top decile of earnings has risen from 150 per cent of median in 1950 to 244 per cent in 2012." The table also suggests some puzzles. For example, the share of total wealth held by the top 1%, based on estate data, doesn't seem to have risen in the last few decades along with inequality of incomes. The dispersion of earnings as measured by the top decile starts rising in the 1950s, but the overall inequality of earnings doesn't seem to start rising until the 1970s--presumably because during the 1950s and 1960s, there was declining inequality at the bottom of the income distribution, as seen in the falling poverty rate, to offset rising dispersion of incomes at the top. Hat tip: I was alerted to the "Chartbook" by a post from Larry Willmore at his "Thought du Jour" blog.
<urn:uuid:9269df65-cb90-4ddb-a7de-357f6bf33d15>
CC-MAIN-2019-18
http://conversableeconomist.blogspot.com/2014/03/an-inequality-chartbook-long-run.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578605555.73/warc/CC-MAIN-20190423154842-20190423180842-00415.warc.gz
en
0.966817
421
2.546875
3
Micronutrient malnutrition is not a glaring health hazard such as HIV/AIDS or tuberculosis, but it exists all the same, and causes blindness, anaemia, (and sometimes even death) especially among women and pre-school children, in the semi-arid tropics (SAT), which is home to more than half of the world’s population. Micronutrient malnutrition is primarily the result of diets poor in bio-available vitamins and minerals [mostly iron (Fe) and zinc (Zn)]. Sorghum is a staple food and daily diet for millions of people in the SAT, making it an excellent medium through which increased iron, zinc and pro-vitamin A could reach the consumer. Crop varieties selected and/or bred for this purpose through a plant breeding approach will complement existing approaches (such as other fortified foods and medical pills), and at a fraction of the cost of existing approaches. ICRISAT is carrying out pre-breeding research for bio-fortified sorghum as part of a HarvestPlus project to assess the potential of plant breeding technology to combat micronutrient deficiency. The initial results indicated significant genetic variability for Fe, Zn and phytates (which reduce bio-availability of Fe and Zn) and limited variability for β-carotene content. The significant genetic variability coupled with high broad-sense heritability and absence of genotype × environment (managed soil fertility level) interaction for Fe, Zn and phytates offers good prospects. PVK 801, a mold resistant variety. Several varieties with high Fe and Zn, and low phytate content, compared to trial mean (45.4 ppm Fe, 21.8 ppm Zn and 6.1 mg g-1 phytates), have been identified. Notable are: Hybrid seed parents with high Fe content (46.0 – 48.7 ppm) ICSB 561, ICSB 675, ICSB 52, and ICSB 484; high Zn content (25.7 – 26.5 ppm) ICSB 418 and ICSB 484; and low phytate content (4.3 – 6.4 mg g-1) ICSB 675, ICSB 74, ICSB 38 and ICSB 39. Restorer parents/varieties with high Fe content (48.7 – 55.3 ppm) ICSR 40, IRAT 204, PVK 801 and ICSV 93046; high Zn content (23.1 – 30.3 ppm) IRAT 204, ICSV 93046, ICSR 90017 and ICSR 40; and low phytate content (2.6 – 4.7 mg g-1) ICSR 165, Lade Samrudhi, IRAT 204 and ICSV 21005. Assuming 5% Fe and 25% Zn bio-availability, ICRISAT envisages improving sorghum with grain micronutrient density [base level (mean Fe and Zn contents of popular varieties) + 30 ppm Fe and 12 ppm Zn contents] through conventional plant breeding to meet the daily requirements. Do you realize that every plant under cultivation in the present day was once wild? Plant evolution under domestication has led to the evolution of modern day crops, but the same process has narrowed the genetic base of the crops. The challenge today is to produce crops with high yield, disease and pest resistance, drought and salinity tolerance, in an environment friendly manner. In times of major epidemic or to broaden the genetic base, crop improvement scientists return to the wild relatives of crop plants, as these offer a variation that was lost in the long process of evolution and domestication. The process to tap wild relatives of crop plants is not a straightforward process, but advances in scientific research combined with enthusiasm and commitment, has resulted in many success stories. Here are excellent examples where wild relatives have improved the crop plants: Wheat: The history of wheat goes hand-in-hand with human civilization! Wheat breeders discovered close to 30 independent disease resistance genes in wild introgressions, which has increased wheat varieties. The sources of resistances came from rye, Agropyron and wild emmer wheat. Rice: Traits for resistance to bacterial blight, brown planthopper, white-backed planthopper, grassy stunt, and other traits such as hull color, pigmented pericarp, were introgressed from wild species from different gene pools. Derivatives from many of these sources are in commercial cultivation. Tomato: Commercially available hybrids of tomato have disease resistance genes and quality characters introgressed from many wild sources. An important gene was introduced from Lycopersicon pennellii, which increased the level of provitamin A (β-carotene) in the fruit more than 15-fold. (L to R) Wild species of Arachis, Cajanus and Cicer. ICRISAT mandate legumes Pigeonpea: wild relatives of pigeonpea have been sources of genes/traits for CMS, high protein lines, dwarfing genes. phytophthora blight and salinity tolerance . Apart from this, there is a major emphasis at ICRISAT to transfer resistance of the plant to the Helicoverpa pod borer. Groundnut: Wild Arachis are sources of resistance to important fungal diseases, insect pests, nematodes, and drought. Scientists have succeeded in accessing these important traits for the improvement of the crop. Chickpea: Wild Cicer have high levels of resistances to Helicoverpa, botrytis grey mold, ascochyta blight, cyst nematode and some rare characters such as induction of androgenesis or apomixes. For more information contact email@example.com The red hairy caterpillar (RHC), Amsacta albistriga, is a pest of several rainy season crops in Asia. The RHC infestation is sporadic, but the devastation is widespread. Due to the prolonged diapause, larval migratory behavior and irregular adult emergence, chemical protection alone is not sufficient. The red hairy caterpillar. Farmers manage the pest by manually collecting and destroying the larvae. However, investment and timely availability of labor in large areas make this method impractical. ICRISAT’s research resulted in utilization of the Nuclear Polyhedrosis Virus (NPV) to kill the RHC. Further studies to find effective virus production strategies led to the utilization of field-collected larvae for NPV production. The RHC larval populations were collected from three hotspots in Andhra Pradesh (Nalgonda, Ananthapur and ICRISAT sites) during August 2004–05. Studies revealed a second generation of the pest, which, together with the prolonged emergence of moths, confirmed the widespread occurrence of RHC. RHNPV was isolated and multiplied at ICRISAT laboratories. The mass production technique involved putting up an aluminum or polythene grid/enclosure (10 cm height) to confine the larvae inside the shaded enclosure. RHC larvae (3–5 instars) were released into the enclosure, and fed with plants already inoculated with the virus. The infected larvae showed the mortality symptoms from the 5th day after inoculation. Aluminum grid to confine larvae. Eco-friendly options for larvae collection The field technique for rearing larvae is advantageous, particularly in avoiding the handling of huge larval populations, rearing and inoculation. This would also facilitate farm level production and access to the biopesticide at the village level. The technique can serve as an option in the armory of the plant protectionist and would be an asset in managing the RHC pest. For more information contact firstname.lastname@example.org A survey of crop-livestock systems in Zimbabwe’s drought-prone Tsholotsho district has confirmed earlier known facts and raised some interesting new questions. The survey compared two areas: one close to Tsholotsho business center (high population density, high levels of degradation), and the other remote and thinly populated. Crops and livestock form an integrated system: crops provide food and fodder, while livestock provide draft power, cash, milk and manure. But as human populations grow, rangeland is giving way to crop fields, and grazing areas are shrinking, besides being over-used. Frequent droughts and institutional weaknesses (credit, extension, veterinary services) are contributing to a decline in animal health and per capita holdings. Twenty years ago the average household had nearly 100 cattle. Today, farmers with 50 cattle are considered wealthy; and the number of households with no cattle has increased substantially. Distance from a business centers and markets was an important factor. The further away from a population center, the better the herd size and grazing areas. Scientific Officer interviewing a Tsholotsho farmer. Farmers report that soil fertility and crop yields have declined over the years, as a result of nutrient mining and greater rainfall variability. Weed control is harder, for two reasons – labor shortages (in turn due to HIV/AIDS and out-migration) and the inexorable spread of couch grass (partly spread through livestock dung). Interestingly, fallow areas have expanded – although this is not necessarily a good thing. The expansion seems to have occurred in three ‘waves’. First, soon after independence, farmers moved from clay soils to sandy areas that were easier to cultivate. The 1990s saw an exodus to urban areas, in search of employment. And in recent years, an increasing number of played-out fields (low in nutrients and/or infested with couch grass) are being abandoned. This information tells us what is happening and why; enables us to understand local needs and priorities, and design practical, low-cost interventions to improve livelihoods. For example, farmers were keen to rebuild their herds, but were limited by fodder shortages during the dry season. ICRISAT is keen to work with farmer groups, NGOs and the national research and extension system to promote cultivation of bana grass, forage sorghum, forage legumes, and other alternatives. We are also looking at ways to link small-scale farmers to livestock markets, so that farmers have solid financial incentives to invest in managing livestock and feed/fodder resources. For more information contact email@example.com
<urn:uuid:e80f8365-7d7b-402f-bbed-10416644f1c2>
CC-MAIN-2017-43
http://www.icrisat.org/what-we-do/satrends/mar2006.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825473.61/warc/CC-MAIN-20171022222745-20171023002745-00844.warc.gz
en
0.926955
2,207
3.0625
3
Pithouse illustration by Eric S. Carlson Tahoe's home styles have changed throughout the years, but always respond to the region's climate and landscape In Lake Tahoe social circles, where prevailing architectural trends past and present function as conversational currency, arguments about whether Lake Tahoe has its own unmistakably distinctive architectural style may be given full shrift. While some pundits point to the innumerable rustic wooden cabins dotting Tahoe’s shores as comprising a genuine Lake Tahoe feel, others will argue such habitations were being built in much the same style in the Adirondacks, Catskills, White Mountains and other Appalachian locations for decades before arriving in the Sierra Nevada. Currently, a slew of houses being built in Placer County’s Martis Camp attempt to forge contemporary architectural styles with their emphasis on flat roofs, minimized or absent eaves and abundance of glass affording wide views of the surrounding topography. A rising chorus of voices in the local architectural milieu assert these “mountain modern” homes present a twist on innovative architectural styles unique to the area, while others who prefer the more traditional fare contravene the idea. Regardless of whether a true Lake Tahoe style has been generated organically or borrowed from other eras and geographical locales, the Lake Tahoe Basin has witnessed architectural trends that have come and gone and come back again over the centuries. Washoe Habitations, Pre-1850s Before John C. Fremont spied Lake Tahoe in 1844, the Basin and its now-famed translucent waters were no stranger to human habitation. The Washoe nation annually repaired to The Lake’s shores during the summer season as a means of beating the valley heat while taking advantage of the diverse flora and fauna in the alpine area. During the early period of the Washoe tribe’s existence in the area, they lived in rudimentary Martis pit houses. A shallow pit is dug into the earth and two to four poles are pounded vertically in the ground on either side of the pit. Wooden poles are placed horizontally for lateral bracing and then wooden slabs are stacked along the lateral bracing poles to provide shelter. Weather is kept out by either using earth or a collection of brush, bark and other collectable materials from the surrounding environment. The scale of the house was commensurate with its purpose, whether used as a family dwelling place or a communal gathering space. The Pope House at Tallac Historic Site, photo by Eshter Moineau The first habitation built by European hands is widely considered by historians to be Smith’s Station, built in 1851 by Martin Smith, a trader who erected a small trading post at the current site of Meyers, California. The presence of Johnson Cutoff, a trail connecting overland emigrants streaming in from the east to get a piece of the burgeoning California Gold Rush, meant the South Shore of Lake Tahoe developed far in advance of its northern counterpart. When the Silver Rush came to Nevada in 1859, development at Lake Tahoe gained steam, though the buildings erected at the time emphasized function over form. However, Lake Tahoe got a glimpse of its imminent future when the Glenbrook Hotel, the Basin’s first resort, was built in 1863 as a retreat for the blossoming regional aristocracy. The hotel is quintessential Victorian-style architecture, featuring a New England–inspired geometric layout with one commodious main building flanked by scaled-down wings and an open porch running the course of main building’s face. The splendor embodying the ethos of Lake Tahoe’s fin de siècle Victorian resorts was brought to the world courtesy of Elias “Lucky” Baldwin, the profligate resort owner who built an elaborate mansion on the current grounds of South Shore’s Tallac Historic Site. From the vast veranda encircling the rectangular mansion to the large dormers protruding from the steeply sloping roof, the opulence of the large resort still stands as a symbol of the Victorian excess. The Thunderbird Lodge, photo courtesy Thunderbird Lodge, photo by Jarvis Photography In subtle ways, the Gilded Age at Lake Tahoe featured the continuation of the Victorian architecture that took a nod from the mountain resorts dotting the Catskills, Adirondacks and other mountain playgrounds for the wealthy. However, the Arts and Crafts, or American Craftsman, style began to incrementally encroach into Lake Tahoe design territory, most properly evinced by Vikingsholm, built in 1929 at the behest of Mrs. Lora Josephine Knight. The Arts and Crafts style emphasized the value of individual human labor as the effects of industrial mass production simultaneously marginalized those contributions in several areas of the increasingly modern workplace. The 38-room mansion abutting Emerald Bay typifies the movement in that it required a labor force of more than 200 workers to cut the locally culled stone, hew timber from the surrounding forests and gather the granite from a quarry created in the backyard of the house. The Scandinavian-inspired estate also features enormous fireplaces and sod roofs covering the north and south wings. Lake Tahoe was primarily an aristocratic destination until the post–World War II era introduced a level of prosperity to an increasing number of Americans. The A-frame, perhaps the most recognizable structure form around the Lake Tahoe Basin, came to evoke the post-war leisure culture. While the triangular form was simple to the point of being archaic (it hearkens back to Martis pit houses), there was ample room for variation and individual expression. The pitched roofs with steep slopes that sometimes plummet all the way to the earth are ideal for shedding snow loads, which can be particularly heavy in the mountain range known for “Sierra Cement.” The growing popularity of skiing, attributed in part to the 1960 Squaw Valley Olympic Games, and an increase in disposable income, helped give rise to the A-frames in Lake Tahoe. In 1960 alone, about 125 A-frames sold in Squaw Valley for $15, 000 a pop.
<urn:uuid:32de064f-6749-41c8-99cc-72820697cae0>
CC-MAIN-2023-14
http://www.sffireapp.org/ArchitecturalStyles/styles-of-architecture-timeline
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00791.warc.gz
en
0.929686
1,292
3.046875
3
Have you seen birds in your garden lying on the ground with their wings spread and their beaks open? We saw a blackbird doing this in our garden for the first time a few days ago. The awkward angle of the bird’s head and the wings spread out wide initially made us think that it must be injured. In fact, at a glance it looked dead. Nevertheless, after a few minutes it got up and hopped away. We’ve seen this fascinating behaviour a few more times since then and now we have come to realise that this is basking or sunning. With the exceptionally warm weather we have been having in Ireland for the last few weeks, birds are taking the opportunity to sun themselves. In such hot conditions, why would birds bask in this way? There are several reasons. Firstly birds need Vitamin D just like we do and sunning themselves helps them to generate it. It also helps to maintain feather health by causing any parasites that might be present to move to cooler parts of the bird, where the bird can preen them away more easily. In heat like we are having at the moment it is important to provide birds with a source of drinking water. You don’t need anything fancy to do this - in fact, we use a plastic Ikea kid’s dinner plate filled with water – because that’s what we happened to have lying around, but anything will do. Remember to refill your water source daily and also to keep the water clean because bird droppings left in the water may cause the spread of infections. Have you seen basking behaviour in your garden? Mail us a picture at email@example.com and we’ll create a gallery. About Land for Nature The Land for Nature project acquires land and sets it aside in perpetuity for natural habitat. If you’re interested in finding out more you can: Blackbird image (c) Roy & Marie Battell at The Moorhen.
<urn:uuid:443a0723-84fe-4c40-a338-b3dcdbe9bd1c>
CC-MAIN-2021-25
https://www.landfornature.org/single-post/2018/06/27/lovely-basking-birds
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488551052.94/warc/CC-MAIN-20210624045834-20210624075834-00240.warc.gz
en
0.958513
408
2.890625
3
How To Get Kids To Do Something They Don’t Want To Do...And Why Push Them? Homework is a daily battle. She won’t eat her broccoli. He doesn’t want to go to practice (or to Garage Strength). How do you get kids to do something they don’t want to do, and why should we push them? Your homework is your responsibility. I regularly have battles with my first grader to get his homework done. Sometimes a short assignment drags on for 1-2 hours with some work getting done, but lots of playing and crying are thrown in the mix. Recently my son asked me to cut out part of his homework because, “You will probably do it faster than I will”. While this is true, I believe that helping, when help is not needed, sends the wrong message. Set a timer Setting a timer can be an effective way to encourage focused work. If an assignment should take 20 minutes, set a timer for 25 and let the child know that the assignment needs to finish in the allotted time. If he can’t finish the assignment, he can explain that to the teacher tomorrow. The work my child brings home is not too challenging for him, he simply doesn’t want to do it. He welcomes any distraction that comes his way and then ends up spending way too much time at the kitchen table. It’s a different story if the child is struggling and needs assistance. However, in our scenario a race against the clock works wonders. Break it up If the quantity of work is going to take longer than 20 minutes it can be helpful for children and parents to separate the work into chunks. For example, reading needs to be done before dinner, but we will save math for after dinner. This way it is clear to everyone that all assignments need to be completed in their designated time slot. Send them on their own Homework should be a reinforcement for learning that has already taken place. Ideally the child already knows how to do the work, he or she just needs help with motivation and encouragement. If the child needs little assistance, send him to a quiet place to work independently and free from distractions. Permit the child to come ask questions when the assignment is 75% completed. This method allows for more focused work and (hopefully) less fightin and less overall time spent. There is no amount of bribery that will get my picky eater to consume and entire meal. He does not make good food choices, but we still need him to eat nutritional food. Here are two strategies for winning the food battles with younger kids. The illusion of choice You can eat two bites of broccoli or 3 baby carrots. Your kid gets to make a choice, but he still has to eat something that is good for him. If the child tosses out another option, (what about an apple?!) do not give in. He needs to choose between the items you offered. Unless he wants fermented vegetables, (sauerkraut, kimchee, etc.) then by all means let him. The gut healing properties outweighs the psychological food battle. Put him on the spot I recently tried this: https://youtu.be/s-PcM7zGDzg after reading it on Jordan Page’s Blog: Fun, Cheap or Free. It has worked great for our picky eater! This simple trick can really bring my kid out of a funk and make him laugh. Once he gets over his stubbornness he is usually willing to comply and at least try something. Start by announcing to the table that “child’s name” needs to take a bite. Everyone at the table chants the child’s name until he takes the bite. Then, cheer like he scored a goal in a soccer match and praise him for eating his food. It’s excessive, I know. But it really takes the tension out of a stressful situation, and if the child gives in and eats something nourishing then really it’s a win-win. Take a risk Whether this be at the playground or in a sporting event, a piano recital or dance concert. Children need to be exposed to uncomfortable situations, and they need to be pushed to overcome the stress involved in these situations. Why? Because they come out with a sense of accomplishment. One of my absolute favorite accomplishments for young kids He has worked on his swimming skills for weeks or months (or years). He has jumped off the side of the pool and learned how to swim to the surface, but the diving board is a whole knew level of fear. That extra foot in the air and the outstretch of the board can be seriously panic inducing for a preschool aged kid. The first time a child goes off the diving board is such a cool thing to witness. When he makes that jump for the first time, and he swims to the side of the pool and climbs out, the child is just beaming with pride. It’s such a proud moment for the child, the parent, (and the swim teacher!). Sometimes it takes a little pushing, encouragement, to get the child to take that jump, but it’s worth it! He or she learns a new skill and the thrill and excitement from this learning experience. When a child accomplishes something new They learn they have the power to do something they didn’t realize they could do. This feeling of accomplishment transcends to other difficult tasks, and this is really the beautiful part of parenting. Raising a child who believes he or she can do things. Someone who is competent and capable, caring and compassionate. A child who believes in himself. Is it possible to push your child too hard? Yes. Every parent needs to respect the limitations that come with age and maturity. But should we always push our children to be better, work harder, and make healthy choices? Absolutely.
<urn:uuid:e4bc494d-b11b-4cf0-873a-d25cb4d07bdd>
CC-MAIN-2020-16
https://www.garagestrength.com/blogs/news/how-to-get-kids-to-do-something-they-don-t-want-to-do-and-why-push-them
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371660550.75/warc/CC-MAIN-20200406200320-20200406230820-00151.warc.gz
en
0.966421
1,236
2.859375
3
Vocabulary in any language plays an essential role. In order to learn Chinese well, you must dedicate yourself to improve your Chinese vocabulary. And this article by a Chinese language school will tell you how to do the same. - Draw a Chinese vocabulary tree. Begin with a topic of your interest like shopping or playing sports. Write this main topic in the middle of a paper. Then, add branches from the main subject and use associated phrases or words as the title. It is more like the mind mapping done used for idea generation process. If you want to learn new words to build your vocabulary, look them up in a dictionary. Always use a dictionary of the latest edition and entails phonetics. That bestows a themed vocabulary list that can be reviewed quickly. - Use Chinese vocabulary flashcards. The best way to quickly learn the Chinese words is to make your own flashcards. By this, you can remember the details better like the correct stroke order of the letters. It also indulges you to purchase more flashcards, but know that buying them is better than ignoring them. Apart from learning the Chinese characters, flashcards also help in recognizing the voice of each character. Flashcards also help in getting familiar with Chinese when used on a regular basis and added to your collection as the vocabulary expands. - Being aware of what you are trying to learn and render it meaningful The reason why you forget the characters is by merely cramming up useless data in your head. In other words, remember by character parts, individual characters, characters and words, and then combining these three. When it comes to reviewing your flashcards, actively study the cards which you are striving to learn. Repetition is just not enough and you must always use what you have learned on a regular basis so as not to forget it. - When you read Chinese vocabulary out loud, you learn the language better Apart from visually processing the language, you also practice speaking and have the auditory memory to assist you significantly. Read Chinese from books, newspapers, and magazines to have a better sense of how the language is used in various contexts. Your vocabulary will expand significantly when you level up by reading tough material. In order to stay motivated, always read the topic that interests you the most like a magazine that showcases your interest.
<urn:uuid:4d2f535c-23b2-41c7-a645-bdd132fc5fa2>
CC-MAIN-2023-06
https://www.newsjunkiebook.com/want-to-improve-your-chinese-vocabulary-look-no-further.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500251.38/warc/CC-MAIN-20230205094841-20230205124841-00271.warc.gz
en
0.949962
466
3.625
4
What do vitamins do? Vitamins are involved in many biological functions, including construction of the body (growth, skeletal development, etc) and its functioning and maintenance (transformation and use of micro-nutrients, sight, blood clotting, the muscular, nervous and immune systems, production of DNA, etc.). The body needs a balanced and varied diet to cover its needs along with an adequate supply of vitamins in order to prevent many pathologies (diseases associated with ageing, cardiovascular diseases, and cancer). An excessive intake of vitamins does not improve the performance of a normally functioning body. In fact, their over-consumption can lead to medium- or long-term toxic effects. Conversely, an inadequate intake can lead to deficiencies or even malnutrition as well as clinical and/or pathological disorders. Two main groups of vitamins Thirteen types of vitamins have been defined and classified into two groups: - liposoluble vitamins (i.e. which can dissolve in fat): vitamins A, D, E, and K. These vitamins are stored in adipose tissue (vitamines D and E) and to a significant degree in the liver (vitamin A). The fact that they can build up in the organism means there is a potential risk of toxicity if intake is too high; - hydrosoluble vitamins (i.e. which can dissolve in water) include the B group of vitamins (B1, B2, B3 or PP, B5, B6, B8, B9 and B12) and vitamin C. These vitamins can also be stored by the body, but there is less of a risk of overdosing as they are eliminated through the urine.
<urn:uuid:e6c7be9e-a592-464a-9a5b-4833d4fb06ef>
CC-MAIN-2022-33
https://www.anses.fr/en/content/what-are-vitamins
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00681.warc.gz
en
0.947571
350
4
4
Cold plunges are all the rage right now. The hashtag #coldplunge on TikTok has over 1.1 billion views, and features thousands of videos of people shivering and gasping through a soak in frigid water. The toe-numbing practice is endorsed by celebrities, athletes, influencers and everyone in between. Many say cold plunge benefits include relieving muscle soreness, aiding with recovery after workouts, reducing inflammation and boosting immunity. Some report cold plunges also yield mental health benefits, like improving clarity and reducing depression or anxiety. But what does the science say about the benefits of cold plunges? We spoke to experts about cold plunges about what people should know before jumping in. What is a cold plunge? A cold plunge involves fully submersing the body in cold water — whether that be a bathtub, tank, pool or a natural body of water, such as a lake or the ocean. It’s also called cold water immersion or cold water swimming. Ice baths are a type of cold plunge, typically on the lower end of the temperature spectrum. Although cold plunges have surged in popularity recently, the practice has been around pretty much as long as people have been near water, Mike Tipton, a professor of human and applied physiology at the University of Portsmouth, tells TODAY.com. “Going back to Hippocrates and even Thomas Jefferson, Darwin and Florence Nightingale were all doing cold water immersion,” says Tipton, who leads research on cold water swimming at the University of Portsmouth’s Extreme Environments Laboratory. How to cold plunge A cold plunge involves immersing yourself in cold water — either quickly in and out or for several minutes. During a cold plunge, the water is typically between 50 to 70 degrees Fahrenheit or about 10 to 20 degrees Celsius, Dr. Kristi Colbenson, a sports medicine and emergency physician at the Mayo Clinic, tells TODAY.com. The length of a cold plunge can vary depending on the water temperature and comfort level. The colder the water, the shorter the submergence should be, the experts note. In general, cold plunges typically last between five and 10 minutes, Colbenson adds. The water should be no colder than about 53 degrees Fahrenheit or 12 degrees Celsius, at which point the risk of damage to the skin and tissues or other adverse events increases. The ideal temperature for cold water swimming is a bit warmer, or between about 65 to 75 degrees. How long to cold plunge Quite literally a quick plunge in and out counts as a cold plunge, but how long does it take for a cold plunge to work? It takes three to five minutes for the cold to penetrate beyond the skin, Colbenson says, at which point it starts to have a neuromuscular effect. She adds that cold plunges typically last between five to 10 minutes, and Tipton cautions that plunging for longer than 10 minutes can increase the chances of being physically harmed by the cold. People have long-touted the benefits of cold water but also warned of the risks, says Tipton, and throughout history it has been deemed both a cure-all and a health hazard. So what do we know now about how cold water immersion affects the body? Cold plunge benefits From a physiological standpoint, the biggest benefit from cold water immersion seems to be improvement in recovery, the perception of pain and delayed muscle soreness, says Colbenson. A systematic review published in the journal Sports Medicine in February 2022 suggested that cold water immersion was an effective recovery tool after high intensity exercises, specifically HIIT exercises, TODAY.com previously reported. Cold plunges may also reduce inflammation in the body. Why? When the body enters cold water, this causes the blood vessels to constrict, especially in the extremities, to conserve heat at the core of the body near the heart, the experts explain. “It slows down and inhibits blood flow to the legs and the arms and pushes (the blood) more towards the central aspect of the body,” says Colbenson. “In doing so, you decrease that natural inflammatory response that occurs after exercise.” However, the reduction of inflammation after cold water immersion is likely temporary, the experts note. “When you look at the literature, it does help with recovery and inflammation, especially if you’re a competing or training athlete,” Colbenson adds. A cold plunge can also induce a heightened state of stress and send us into “fight or flight” mode, Colbenson notes, and the body will release a surge of norepinephrine and cortisol, the stress hormone. Also known as a cold shock response, the initial gasping, hyperventilating and increased heart rate after jumping into frigid water can be dangerous — but it may also be the basis of some of the physical benefits, says Tipton. “The belief is that if you consistently expose yourself to stress in a meaningful and structured way, your body will actually respond by improving its ability to respond to everyday stress,” says Colbenson. However, the evidence that cold water immersion improves the body’s immune function, is lacking, the experts note. “From an immunologic standpoint, or your ability to fight infection, I give caution to that. … There hasn’t been a good study that says there is a decreased propensity of getting infection if you use cold water immersion,” Colbenson adds. The lack of robust scientific evidence seems to be a running theme. “Whilst we know a lot about the science of the hazards, we know much less about the science of the benefits,” says Tipton, adding that more studies like randomized controlled trials (the gold standard in research) are needed. “We have hypotheses but no definitive experimentation yet,” he adds. Can cold plunges boost mental health? When it comes to the mental health benefits of cold plunges, these are even less studied or understood, the experts note. However, there are many anecdotal testimonies about the mind-boosting effects of cold water immersion and a few possible theories. In the short-term, cold plunges can increase levels of dopamine and endorphins, says Colbenson, which can contribute to a feeling of euphoria and heightened mental clarity or focus right after. “That’s how our body responds to stimuli that threatens us — we are ready to be clear in our ability to react,” Colbenson adds. However, the mental clarity after a cold plunge seems to be short-lasting, she adds, and there isn’t literature showing this is sustained over time. The anti-inflammatory effects of cold water may also play a role. “There may well be, according to some models, an inflammatory component in depression and we know that repeated cold immersions decreases (inflammation),” Tipton adds. Similarly, the hypothesis that repeated cold water exposures can make the body better able to deal with other stressors may apply to mental health obstacles, says Tipton, who co-authored a case study on a 24-year-old woman whose depression was treated with cold water swimming. The patient felt an immediate improvement in mood after each immersion, the authors note, and experienced a gradual and sustained reduction in symptoms over time. One year after starting routine cold water swimming, the patient was reportedly depression-free and off medication, says Tipton. “Something’s going on,” he adds, but exactly what that is remains unclear. There are several other factors that may impact a persons mental state after cold water immersion or swimming, the experts note. “They’re doing some exercise, they’re getting a sensation of overcoming a challenge and a sense of achievement,” says Tipton, adding that cold plunges can also be a social activity. “Even if it’s a placebo effect, that’s still an effect,” he adds. “There’s lots of potential things that could be going on and we need more experiments to isolate the active ingredient, to see what’s making a difference,” Cold plunge risks There’s a right way and many wrong ways to do a cold plunge, the experts note, and certain people should avoid it entirely. “We’ve spent probably 40 years looking at the hazards associated with going in cold water — from drowning to sudden cardiac death,” says Tipton. The surge in the hormone norepinephrine from cold water increases the heart rate, blood pressure and breathing rate, says Colbenson. For young, healthy people, that may be tolerable, she adds, but for people with any history of heart disease or cardiac problems (such as arrhythmias), it can be deadly. People with any cardiac history, vascular disease or conditions like high blood pressure should probably avoid cold plunges, Colbenson says — regardless, everyone should check with their doctor before trying cold water immersion to be safe, the experts note. People should also avoid doing cold plunges or cold water swimming alone, Tipton warns. “We want to make sure that people do it safely, and that means doing it in a controlled environment with other people or supervised,” says Tipton. Some people may be tempted to take things up a notch or drop the temperature, but the experts caution against overdoing it. “Colder is not necessarily better, and that cold shock response is potentially dangerous if you’re in an uncontrolled environment,” says Tipton. “We know that response maximizes between 10 and 15 degrees Celsius, so you don’t need to be going into iced water,” says Tipton. Plunging for longer (or beyond about 10 minutes) is not always beneficial either, he adds. “There’s a greater chance you become physically incapacitated by the cold.” Practicing cold water immersion in a sensible and risk-minimizing way maximizes the chance of it being beneficial, says Tipton. Read the full article here
<urn:uuid:89fcb81a-72f7-4568-8608-5b1127f7a1f0>
CC-MAIN-2024-10
https://crackandcider.com/health/what-are-the-benefits-for-physical-and-mental-health/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476592.66/warc/CC-MAIN-20240304232829-20240305022829-00803.warc.gz
en
0.942111
2,137
2.578125
3
Child labor is a major threat to the health of children in the United States. The U.S. Department of Labor estimates that more than four million children are legally employed and that another one to two million are employed under illegal, often exploitative conditions. Across the United States, child labor accounts for 20,000 workers compensation claims, 200,000 injuries, thousands of cases of permanent disability, and more than 70 deaths each year. Agriculture and newspaper delivery are the two most hazardous areas of employment for children and adolescents. Poverty, massive immigration, and relaxation in enforcement of Federal child labor law are the three factors principally responsible for the last two decades' resurgence of child labor in the United States. Control of the hazards of child labor will require a combination of strategies including vigorous enforcement, education, and public health surveillance.
<urn:uuid:7a118e59-1dd1-42ec-beea-85f498f857ad>
CC-MAIN-2017-34
https://www.cdc.gov/niosh/nioshtic-2/20030928.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886108264.79/warc/CC-MAIN-20170821095257-20170821115257-00062.warc.gz
en
0.953267
163
3.015625
3
Women in The Elizabethan Times A description of how women were treated during Queen Elizabeth’s reign. Women During the Elizabethan Era The Elizabethan Era was affiliated with Queen Elizabeths reign (1558-1603). It is often considered to be the height of the English Renaissance, which brought us poetry, music, literature, and theater that broke free of England’s past styles. Even though Queen Elizabeth was an unmarried woman, the roles of women in society during this time period were very limited. There were clear expectations of men and women. Men were expected to be the one’s with more power and all the money. Women were expected to be housewives and mothers, nothing more. Upper Class Elizabethan women had it just as bad as any other woman in the Elizabethan era. They were supposed to be completely obedient to men and dependent on their male relatives to support them. They were used to form alliances with other powerful families through arranged marriages. Women were raised to believe the misconception that they were inferior to men, and men knew better. The upper class women had the fortunate opportunity for an education. They had to be tutored at home because there was no school for girls. Along with this limited education, they were not allowed to continue their studies in universities. They were also not allowed to be heirs to their fathers titles, not allowed to be involved in politics, and not allowed to act in theaters. Disobedience was not just looked down upon, it was a crime against religion. This was clearly supported by the Church and quoted in the bible as “Women in her greatest perfection was made to obey and serve man.” The lucky girls who had the opportunity to be tutored at home, usually began from the age of five or even younger. They were taught many languages including Latin, Italian, Greek, and French. Music and dancing skills were absolutely essential. They were taught a range of subjects and skills, the most important skills being manners and etiquette, including how to curtsey. Other skills include music, dancing, riding, and archery. The lower class Elizabethan women were also expected to obey males. They did not go to any type of school, and were not tutored whatsoever. As girls, they had to learn how to govern a household and become skilled in all housewifely duties. Single Elizabethan women were looked upon with suspicion. They were often thought to be witches by there neighbors. All Elizabethan women were expected to be married and dependent on male relatives throughout her entire life.
<urn:uuid:399abbe4-245f-430a-a9cc-88482b61b8db>
CC-MAIN-2015-27
http://beyondjane.com/women/women-in-the-elizabethan-times/
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095423.29/warc/CC-MAIN-20150627031815-00047-ip-10-179-60-89.ec2.internal.warc.gz
en
0.995074
525
3.8125
4
When we get hooked on the latest video game on our phone, or our favorite flavor of Ben & Jerry’s ice cream, we are tapping into one of the most evolutionarily conserved learning processes currently known to science, one shared among countless species and dating back to the most basic nervous systems known to man. This reward-based learning process basically goes like this: We see some food that looks good. Our brain says, Calories, survival! And we eat the food. We taste it, it tastes good, and especially when we eat sugar, our bodies send a signal to our brains: remember what you are eating and where you found it. We lay down this memory—based on experience and location (in the lingo: context-dependent memory), and we learn to repeat the process the next time. See food. Eat food. Feel good. Repeat. Trigger, behavior, reward. Simple, right? After a while, our creative brains tell us: Hey! You can use this for more than remembering where food is. The next time you feel bad, why don’t you try eating something good so that you will feel better? We thank our brains for that great idea, try it, and quickly learn that if we eat ice cream or chocolate when we are mad or sad, we do feel better. It is the same learning process, just a different trigger: instead of a hunger signal coming from our stomach, this emotional signal—feeling sad—triggers the urge to eat. Or maybe in our teenage years we saw the rebel kids smoking outside school and looking cool, and we thought, hey, I want to be like them, and so we started smoking. See cool. Smoke to be cool. Feel good. Repeat. Trigger, behavior, reward. And each time we perform the behavior, we reinforce this brain pathway, which says, Great, do it again. So we do, and it becomes a habit. A habit loop. Later, feeling stressed out triggers that urge to eat something sweet or to smoke. Now with the same brain mechanisms, we have gone from learning to survive to literally killing ourselves with these habits. Training Resilience Through Mindfulness Practice Dropping into a mindful awareness of our habitual reactivity helps us step out of the cycle of suffering—resting in awareness itself rather than being caught up in reactivity. Reactivity amounts to the opposite of resilience: resistance. As we go through the day, seeing how many times we react to or resist things beyond our control can help us see more clearly that we are training our own resistance. In any type of addictive behavior, reactivity builds its strength through repetition—resistance training. Each time we look for our “likes” on Facebook, we lift the barbell of “I am.” Each time we smoke a cigarette in reaction to a trigger, we do a pushup of “I smoke.” Each time we excitedly run off to a colleague to tell her about our latest and greatest idea, we do a sit-up of “I’m smart.” That is a lot of work. At some point we stop running around in the circles perpetuating our (perpetual) positive and negative reinforcement loops. When does this happen? Usually when we are exhausted—once we have grown tired of all the lever pressing and start to wake up to the fact that it isn’t getting us anywhere. When we stop and look at our own life, we can step back and see that we are lost, headed nowhere. We can pull out our compass and see that we have been orienting ourselves in the wrong direction. The beautiful thing here is that simply by paying attention to how we are causing our own stress—simply by being mindful—we can begin to train ourselves to walk the other way. Let’s continue with the resistance-training metaphor. When training in a gym, we calculate how much to lift, how many time to lift it, and how long to hold it against gravity (resistance). Each aspect of the exercise contributes to the strengthening of our muscles. When starting any type of un- or antiresistance training, whether taking a Mindfulness-Based Stress Reduction course or using some other way to change, we can apply these three types of gym metrics to our reactivity as we go about our day. How often do we react by taking something personally? The simplest way to find out is to look for some type of internal contraction denoting an urge or attachment—remember, this physical sensation occurs with both pleasant and unpleasant experiences. How heavy is the burden, meaning, how contracted do we get? And finally, how long do we carry it around? Gaining a clear view of our reactivity will naturally point us to its opposite: letting go. We can use the same metrics to check our progress in this area. How often do we let go or not habitually react in a way that we used to? When we pick something up, is it lighter than before, meaning, do we not get as caught up in it? How long do we carry it around? And if we notice that we have been carrying something around, how quickly do we drop it (and not pick it back up)? We can think of antiresistance training as an exploration more than a dogmatic framework for achieving some result. Orienting to stress and its opposite doesn’t lead to something in particular. Instead, paying attention helps us start moving in a particular direction, at any moment. The more we become familiar with our compass, the easier it becomes to realize how readily available this mode of being is, all the time. We don’t have to do anything special or go somewhere to get something. We simply have to learn what it feels like to get in our own way and the rest begins to take care of itself. Keeping our eyes open, seeing clearly, will keep us moving in that direction. Adapted from The Craving Mind by Judson Brewer. © 2017 Yale University Press. Used with permission.
<urn:uuid:31537091-c127-424c-b91f-ce9e148c0473>
CC-MAIN-2017-39
https://www.eomega.org/article/calm-your-cravings-with-mindfulness-practice
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685993.12/warc/CC-MAIN-20170919183419-20170919203419-00608.warc.gz
en
0.944627
1,250
2.765625
3
By Thomas Orde-Lees, Quartermaster "May, 1916. 15. A cold night followed by a calm day with a calm open sea. Ninety penguins came up and all were killed. Wild asked me, sarcastically, if I was satisfied. He seems to think that I am personally afraid of having to starve. This is not exactly the case, it is rather the whole party that I am concerned about. I should not like to see a repetition of the Greeley disaster, and upon my word, I think we are asking for it. We are now burning nothing but penguin skins on our indoor stove and nearly all the cooking is being done on it. It requires about fifteen skins per day and it behooves us to get all the penguins we can if only for the value of their skins as fuel. To burn them it is necessary to cut them into thin strips which are laid over the two cross bars of the stove. The heat of the burning oil on the bottom of the stove causes the oil to "render" from the strips of skin; it drops on to the heap of ash and debris at the bottom and in due course ignites and helps to render the oil our of the next two strips and so on. It is necessary to replenish the strips every five or ten minutes. We leave the feathers on the skins just as they are and being very oily there is no unpleasant smell such as burning feathers usually make. The fire is lighted by a few wood-shavings and splinters derived from the little wooden "sweet-boxes" in which every ten pieces of nut food are packed. There are therefore ten of these wooden boxes in a case of 100 blocks of nut food or seventy of them in all and, as each box will light two fires we have enough to get our stove going for a period of four months at least. We could quite easily light the fire by pouring seal oil on to the ashes of the previous night and inserting a wick when the whole lot would soon be in a blaze, but as the wood is available and blubber scarce we use the former for the present. We are fortunate in having a good supply of matches, but even if we had none we could easily manage to get a light, in the first instance, with a "burning glass" on one of our rare sunny days and thereafter maintain a constant flame night and day with a blubber lamp." One hundred years ago this August, Ernest Shackleton rescued his crew after the failure of the Imperial Trans-Antarctic Expedition. Rauner holds a complete transcript of the diary and the manuscript diary from March 24th, 1915, through April 16th, 1916.” These entries are a selection from the diary of the expedition's quartermaster Thomas Orde-Lees. Rauner Special Collections Library in Webster Hall holds a complete transcript of the diary and the manuscript diary from March 24th, 1915, through April 16th, 1916. To see them, come to Rauner and ask to see MSS-185 or Stefansson G850 1914 .O7 1997 during normal hours of operation. An exhibit on Shackleton’s Antarctic explorations will be on display in Rauner from July 1-September 2, 2016.
<urn:uuid:fcee557f-abf8-4a84-8fdc-7545388dee11>
CC-MAIN-2018-09
http://sites.dartmouth.edu/library/2016/08/24/shackletons-endurance-expedition-a-crewmans-view-39/
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812873.22/warc/CC-MAIN-20180220030745-20180220050745-00430.warc.gz
en
0.96473
675
2.765625
3
BLEVE – Response and Prevention= The video concentrates on addressing critical safety issues affecting emergency responders by providing answers to common questions regarding accidents involving fire impingement of pressure liquefied gas tanks and BLEVEs. Typical questions addressed include: What is a BLEVE and its hazards? What is a safe distance for emergency responders when a fire is close to a pressure tank? How much water is required to keep a tank cool? Does there have to be a fire for a BLEVE to occur? The video sequences include 3-D animation and film footage of complete BLEVE scenarios, followed by more detailed examination of specific parameters using animated graphics. For more information or to order a DVD please contact the Research, Evaluation and Systems Branch, Transport Dangerous Goods, Transport Canada at TDG-RD-TMD@tc.gc.ca - Date modified:
<urn:uuid:433efdf2-00da-4c9a-b4cf-0e0279bd1182>
CC-MAIN-2017-43
http://www.tc.gc.ca/eng/tdg/publications-menu-1238.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824775.99/warc/CC-MAIN-20171021114851-20171021134851-00780.warc.gz
en
0.902284
179
2.75
3
The steel hulled canallers were the backbone of the Canadian lake shipping industry for many years but, all too often, we think of them solely in terms of the mass produced "built by the mile, cut off by the foot" steamers turned out by various British shipyards during the 1920's. The fact remains that perhaps the greatest advances in canaller design really took place during the very early years of this century, when specially designed vessels began to supplant the hodge-podge of wooden carriers then on the scene, Today, very few of the pre-World War I canallers remain as evidence of the evolution of this type of ship. In the month of April 1910, the Sunderland Shipbuilding Co. Ltd. put the finishing touches to their Hull 256, a canal steamer which was building to the order of the Merchants Mutual Line Ltd., Toronto. She was a bulk carrier, 250.2 feet in length, 42.7 feet in the beam, and 17.4 in depth, these dimensions producing tonnage of 1798 Gross and 1148 Net. She was built with six hatches, the last of which was situated on the raised poop forward of the boiler house. Cargo was handled by three booms, one on the foremast immediately aft of the bridge, and two on the main which was stepped between hatches four and five. The vessel was powered by triple expansion engines with cylinders of 20 1/2, 34 and 57 inches, and a 39-inch stroke. This machinery dated back to 1896 but its previous history is not known. Steam was provided by two coal-fired Scotch boilers measuring 13'6" by 9'6". In 1914 the vessel emerged from winter quarters in the colours of Canada Steamship Lines Ltd., which had been formed on December 1st of the previous year as a consolidation of a number of Canadian vessel operators including Canadian Interlake Line. Her first year under the new management was not as successful as might have been hoped as, on July 24, 1914, she stranded in the St. Lawrence River near Port Neuf, Quebec, while upbound with a load of pulpwood. She was later released and repaired. C.S.L. did not get a chance to operate SASKATOON for long as she was requisitioned for overseas service during the First War. It would appear that she was operated by British interests during this period, presumably in the British coastal trade. SASKATOON was sold in 1920 to the Canadian Maritime Co. Ltd., Montreal, but she did not, apparently, return to lake service until 1922 when she was purchased by the Interlake Steam Navigation Co. Ltd., a firm operated by the partnership of Mapes and Fredon, Montreal. At this time, she was given the distinctive Mapes and Fredon stack colours, black with three broad gold bands. She ran for this company into the 1926 season and then a strange thing happened. In 1926 and 1927, Canada Steamship Lines Ltd. were again expanding and they now swallowed up Mapes and Fredon, with the result that, for the second time in her career, she was absorbed into the C.S.L. fleet. The year 1927 saw Canada Steamship Lines take delivery of a new package freighter built at Midland and christened SASKATOON. As a result, the older vessel, SASKATOON (I), was renamed ROSEMOUNT (II). She continued to operate on a regular basis for C.S.L. until the onset of the Depression which, as might be expected, spelled the end for many of the older and less economical units of the fleet. Fortunately, ROSEMOUNT managed to stay clear of the company's boneyard at Kingston, but she was laid up for much of the time during the early thirties, appearing once in a while for a trip or two as required. By 1934, however, business conditions had deteriorated so badly that ROSEMOUNT was laid up at Montreal and relegated to the job of coal storage. She continued in this lowly state until 1936 when she sank at her dock. ROSEMOUNT was raised by Foundation Maritime Co. Ltd., but she never again operated for Canada Steamships. In 1937, a number of idle C.S.L. canallers were sold to Les Chantiers Manseau Ltee. (which in 1939 became known as Marine Industries Ltd), some for scrapping and others for no apparent reason. ROSEMOUNT was included in the sale and she was taken to the company's boneyard at Sorel where, stripped of her superstructure, she lay until 1940. At this time, Marine Industries converted her, as well as several other bulk carriers, to a tanker. Strangely enough, the rebuild left the step in her deck but she received a "trunk" which was the same height as the poop and which extended forward to the forecastle. She was given a rather handsome triple-deck bridge structure and this was set back off the forecastle along with the foremast. The mainmast was moved back to the forward end of the after cabin. She was further modernized by the installation of a new six-cylinder Fairbanks Morse diesel which gave her a very good service speed. The reconstruction altered her tonnage to 1752 Gross, 1028 Net. Renamed WILLOWBRANCH (I) in 1940, she entered service in 1941 for Branch Lines Ltd., a subsidiary of Marine Industries, operating under charter to Imperial Oil Ltd. However, by this time, Canada was immersed in the hostilities of World War II and tankers were much in demand. Accordingly, WILLOWBRANCH was requisitioned for salt water service and was turned over to the British Ministry of Transport. For the second time in her life, she left her home waters to make a treacherous wartime crossing of the Atlantic. Operating for the next few years under charter to the Coastal Tankers Ltd., she undoubtedly did her part in helping to sustain Britain during the hard years of the war. In 1945 she was renamed EMPIRE TADPOLE to bring her into line with the series of names chosen by the British Government for ships of her type. She was sold in 1947 to the Basinghall Shipping Co. Ltd., London, and, under the name BASINGCREEK, she continued in the British coastal trade. COASTAL CREEK continued her faithful service until July 18, 1968, when she, along with two other ships of the fleet, was sold to the Hall Corporation of Canada Ltd. In view of her age and condition, COASTAL CREEK was not the prize of the deal, the purchase revolving around other more valuable considerations. However, the thumping heartbeat of her diesel would not yet be stilled. Renamed CREEK TRANSPORT in August of 1968, she operated for Halco for about a year, being laid up at Montreal part way through the 1969 season. She was then held in reserve for a period of time but in 1970 was moved to Sorel where she is currently lying along with two other retired lakers. For the last few years, the ship was something of an oddity, for she had retained her beautiful deep steam whistle despite her conversion to diesel power. This whistle distinctively announced her comings and goings but not, perhaps, as strikingly as did her diesel whose prounounced thumpings could be heard for a considerable distance. But now, after a life of sixty-one years, she lies cold and almost forgotten in Sorel, and her upcoming sixth transit of the cold, grey North Atlantic promises to be at the end of a long towline, a voyage at whoso end the cutting torches will be waiting. Reproduced for the Web with the permission of the Toronto Marine Historical Society.
<urn:uuid:590571f1-e613-424c-aca3-e42801888cfd>
CC-MAIN-2016-07
http://www.maritimehistoryofthegreatlakes.ca/GreatLakes/Documents/Scanner/04/02/default.asp?ID=c007
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701150206.8/warc/CC-MAIN-20160205193910-00124-ip-10-236-182-209.ec2.internal.warc.gz
en
0.985971
1,618
2.875
3
Viktor Litovkin, senior editor of the Independent Military Observer magazine, notes that work in hypersonic weapons did not begin from scratch. "There were very successful projects in the former Soviet Union. Yet, it should be understood that time has been lost. Those projects were suspended and shelved at design stage as there was no money to implement them, nor was there any need at the time. But then it became obvious that the West continued to develop hypersonic weapons and that they might be used against us under some circumstances. Therefore, we must create similar weapons of our own based on our previous projects. Still, more than two decades have passed. Today, we have new materials, new electronic devices and new laws of weapon creation." Hypersonic missiles can travel at a speed surpassing that of sound (1,200 km/h) by ten or more times and are capable of penetrating any missile defense, says Alexander Khramchikhin, deputy head of the Institute for Political and Military Analysis in Moscow. "It’s an attack weapon, not an antiaircraft or anti-missile one. Its chief advantage is its velocity. If this weapon is made, its warheads will be impossible to detect. But thanks to its supersonic speed, this weapon possesses such kinetic energy that it may, in principle, carry no nuclear or conventional warheads but hit targets using its striking power." The United States has its own hypersonic weapon development program and is hoping to build a multi-functional missile by 2015 or 2018. Russia will not try to overtake the United States by creating a similar missile by 2015 or 2016, says Viktor Litovkin. "Whether the U.S. will or will not have combat-ready hypersonic weapons or, more specifically, a weapon complex by 2015 remains to be seen. The problem is that individual components of these weapons are of no combat use. For example, a plane is less capable without such a missile than with it. And a missile without a delivery vehicle has no potential unless it can be launched from a long-distance bomber or submarine. A whole complex is needed – not just delivery vehicles, but also a control system, target pointing and a lot more." Making hypersonic weapons is a tough challenge for Russia. But with a purpose-oriented program setting clear-cut priorities in a number of fields, it will be much easier to tackle.
<urn:uuid:7c65821d-3df7-4b89-af7a-bf9d60b8571d>
CC-MAIN-2015-35
http://omoooduarere.blogspot.com/2013/05/russia-pursues-hypersonic-weapon.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645176794.50/warc/CC-MAIN-20150827031256-00321-ip-10-171-96-226.ec2.internal.warc.gz
en
0.962893
495
2.59375
3
Compared with its close relative, the flute (“flauto traverso”), the instrument range of the wooden recorder (“flauto dolce”) is more limited in terms of pitch and dynamics. This is one of the reasons why the recorder was replaced by the (traverse) flute in orchestras around the 18th century. However, recorders were very popular during medieval times and into the renaissance, and even in the baroque era famous composers such as Telemann, Bach, Händel and Vivaldi wrote pieces for these instruments. Due to the absence of upper harmonics and a predominance of odd harmonics, the sound of recorders is soft and mellow. The instrument is often unfairly marginalized as a toy for children or amateur players, with its main application being classrooms and less formal occasions. However, contemporary composers of all genres (from Luciano Berio and Mauricio Kagel to Keith Jarrett) have written demanding pieces for the recorder, expanding its timbral range in a virtuosic way. What’s more, recorders are used as solo instruments in modern film music, adding a particular exotic timbre with references to ancient or far eastern worlds in orchestral scores. All four recorders of this Vienna Instruments Collection were played by Austrian flute and recorder virtuoso Leopold Eibl, a sought-after soloist and chamber musician. |Download File Size||1.5 GB| |Installed File Size||2.2 GB|
<urn:uuid:6e7c8c10-5d0d-4f0a-a449-3ea0274a3a17>
CC-MAIN-2021-31
https://www.vsl.co.at/en/Additional_Winds_Bundle/Recorders
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154302.46/warc/CC-MAIN-20210802012641-20210802042641-00270.warc.gz
en
0.959412
318
3.03125
3
Robert Laurence Binyon (10 August 1869 at Lancaster – 10 March 1943 at Reading, Berkshire) was an English poet, dramatist, and art scholar. His most famous work, For the Fallen, is well known for being used in Remembrance Sunday services. Moved by the opening of the Great War and the already high number of casualties of the British Expeditionary Force, in 1914 Laurence Binyon wrote his For the Fallen, with its Ode of Remembrance, as he was visiting the cliffs of northern Cornwall (where a plaque commemorates it nowadays.) The piece was published by The Times newspaper in September, when public feeling was affected by the recent Battle of Marne. Today Binyon is most famous for For the Fallen, often recited at Remembrance Sunday services in the UK, and an integral part of Anzac Day services in Australia and New Zealand, and November 11 Remembrance Day services in Canada. The third and fourth verses of the poem (although often just the fourth)have so been claimed as a tribute to all casualties of war, regardless of nation. They went with songs to the battle, they were young. Straight of limb, true of eyes, steady and aglow. They were staunch to the end against odds uncounted, They fell with their faces to the foe. They shall grow not old, as we that are left grow old: Age shall not weary them, nor the years condemn. At the going down of the sun and in the morning, We will remember them. In 1915, despite being too old to enlist in the Fir..
<urn:uuid:304af689-b1af-4115-8ca5-b32f46054609>
CC-MAIN-2022-21
https://www.poemhunter.com/poets/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663006341.98/warc/CC-MAIN-20220527205437-20220527235437-00472.warc.gz
en
0.978576
336
3.046875
3
What You Need to Know About Heroin Heroin, horse, smack, cheese, gum. By any name, it's a killer drug. Until recently, heroin was not thought to be a problem among children of middle-class parents. But lately, heroin has been showing up in new places. Today, the typical user could be the child, teen, or adult next door. These younger addicts account for some dangerous new patterns in the way heroin is used: It can be the child's first drug experience. Children do not always start with "gateway" drugs (drugs that lead to other drugs), like marijuana, and then move up. A gateway drug is one that leads to other drugs. It's a social activity. Heroin used to be thought of as something done alone. Now it's not unusual to see it used in a group setting such as teen parties. This social use increases the risks of spreading serious infections, such as HIV or Hepatitis C. New image, old danger Heroin is made from morphine. Morphine is found in the seed pods of some varieties of poppy plants. It is a very addictive opiate. Although purer heroin is becoming more common, most street heroin is "cut" with one or more other substances. These may include antihistamines to help control the stuffy nose and watery eyes that occur when snorting heroin. These can also include other white powdery substances likes sugar, starch, powdered milk, quinine, or even strychnine or other poisons. Other drugs like cocaine, methamphetamine, or other narcotics may also be mixed in. It might be only a little heroin or even no heroin at all. And that can change with each dose a person gets. Heroin abusers don't know the actual strength of the drug or what substance was used to cut it. So they are at risk for overdose or death. Overdoses are common. It's easy to take a dose that had too much heroin. This can cause users to stop breathing or to suffocate in their own vomit. Users get high by snorting, smoking, or injecting the heroin. Snorting and smoking have become more common because high-purity heroin is available. Smoking and snorting is also more common because users fear getting an infection by sharing needles. In an addicted person, withdrawal occurs within a few hours after the last use. Symptoms of withdrawal can be drug craving, restlessness, muscle and bone pain, and vomiting. Symptoms peak between 48 and 72 hours after the last dose. They last about a week. Symptoms can be very intense. The addicted person may return to using again if he or she doesn't get treatment for withdrawal symptoms to help break the cycle of addiction. Parents, take note Drug abuse experts tell parents that their best strategy is to be involved in their children's lives and pay attention to everything that goes on. They offer these specific suggestions: Check out your children's friends. It's a red flag when children replace old friends with new ones who have bad reputations. Learn the signs of heroin use. Look for runny noses and eyes, pinpoint pupils, and unusual amounts of sleep. Wearing long sleeves in summer could be a way to cover up needle marks on arms. Pay attention to grades. A sudden drop in a child's grades could be a warning. Talk to the child's teachers to see if they have observed unusual behavior or other problems. Look for clues. Syringes, tiny balloons or plastic bags, capsules and packaging material for antihistamines can be signs of heroin use. Check the coffee-bean grinder for unusual remnants. Be sure to ask your child's health care provider about drug abuse prevention strategies. Some parents and schools have done urine or other drug testing on children and teens. It's an extreme measure, but if you believe one of your children is on heroin, it could be a lifesaver. Ask your health care provider to recommend a testing facility. Over-the-counter testing kits are also available from pharmacies or online. If you believe your child has a drug problem, take it seriously. Talk to a professional drug counselor to find out which resources are available for the child and the best way to get involved. Your child's health care provider or teacher may be able to recommend a counselor or substance abuse treatment program to contact. The Substance Abuse and Mental Health Services Administration has a drug abuse information and treatment resource locator available on its website.
<urn:uuid:e1b9434c-56a4-4645-a7e7-7fb354b683b3>
CC-MAIN-2015-35
https://healthcare.utah.edu/healthlibrary/library/wellness/behavior/doc.php?type=1&id=1426
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645151768.51/warc/CC-MAIN-20150827031231-00058-ip-10-171-96-226.ec2.internal.warc.gz
en
0.947511
920
2.984375
3
Food donations organizations are looking for innovative ways to reduce packaging waste and their environmental footprint. Through sustainability commitments, the certified B corporation is working to set an example for other companies. With the EPA saying EPS packaging “can have serious impacts upon human health, wildlife, and aquatic environment, and the economy,” Maryland decides to ban foam packaging altogether With 30 million tons of plastic thrown away annually in the U.S. alone, plastic waste can feel hopeless—but it’s easier than it seems to make an impactful change. A new report says that we as consumers pursue healthy and sustainable eating habits, but still overlook the impact of food packaging on the environment. Innovations that help consumers store and use food at home can be effective at improving food security and tackling food waste. Today, scalable innovation in consumer packaging is making home storage easier and more efficient than ever. 18 organizations find innovative ways to replace plastic wrappers with edible packaging. McDonald’s director of U.S. Public Affairs sat down with Food Tank to discuss the world’s largest restaurant company’s new goals focused on packaging and recycling. It plans to meet both by 2025 in each of its 37,000 restaurants.
<urn:uuid:fcc34972-b67c-4fb0-932c-f63852031c33>
CC-MAIN-2022-05
https://foodtank.com/news/tag/packaging/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304954.18/warc/CC-MAIN-20220126131707-20220126161707-00569.warc.gz
en
0.928449
254
3
3
Scientific research / heat and heat transfer measurement Many engineering studies involve the measurement of transport of heat. The heat and heat transfer measurements are used for several purposes, including understanding the physics / main transport mechanisms and analysing energy balance (input - output) of a system. A good starting point for a heat transfer experiment is a heat flux measurement. Hukseflux has a full range of heat flux sensors. Do you have any questions about our products or would you like our support in setting up a measurement, don't hesitate to contact us. At Hukseflux, we like having a good technical conversation. Heat and heat transfer measurement Many engineering studies involve the measurement of transport of heat. The heat and heat transfer measurements are used for several purposes: - to understand what is going on; the physics / main transport mechanisms - to distinguish between radiative, convective and conductive transport mechanisms - analysing energy balance (input – output) of a system - to derive material properties - to detect changes of state of materials for example chemical reactions, phase transitions - to detect changes in flow regime, transitions from laminar to turbulent flow - determining heat absorption or release in processes like condensation, boiling - analysing energy production in chemical reaction We see different approaches: - comparative, taking one measurement as a reference point and comparing this to a measurement under similar but slightly different conditions - absolute, trying to establish absolute values in [W] or [W/m²] What is measured A good starting point for a heat transfer experiment is a heat flux measurement. Heat flux sensors measure heat transfer. More specifically: the energy flux onto or through a surface, in [W/m²]. In reality this surface is the sensor itself. The source of the heat flux may be: - conduction - heat flowing through a static, not-flowing material - radiation - heat transmitted, typically by visible or infra-red, radiation - convection - heat transported by flowing fluids or gasses Heat transfer is driven by temperature differences. Heat always flows from a source to a sink, from a hot to a cold environment. At the surface of a solid object, often the source of heat flux is a mixture of radiative and contributions. Convective and conductive heat fluxes are measured by letting this heat flow through a heat flux sensor. Heat flux sensors are either mounted on a surface of a solid object or embedded into this object. Measuring convective heat flux, the sensor will typically be located on the surface of a solid object, and exposed to the convective flow; at the sensor surface, the convective flux is then converted into a conductive flux. Radiative flux is measured using a heat flux sensor covered with a (black) radiation absorber. It is usually mounted on a solid, well conducting heat sink. The absorber converts radiative energy to conductive energy. However this sensor will also be sensitive to convective heat flux. By covering a sensor with a radiation reflector, like a gold or aluminium foil, you can measure convective flux only. A classic sensor combination to analyse heat transfer is: - heat sink with - a black coated heat flux sensor and - a gold coated heat flux sensor - a heat sink temperature measurement - an air temperature measurement In some cases heat can be measured by electrical substitution. The heat generated by a test object is temporarily replaced by electrically generated heat. The system is thereby calibrated. Such a system typically includes: - heat sink with - a heat flux sensor - a resistor - the test object Heat transfer is driven by temperature differences. Hukseflux can measure temperature differences with very high accuracy over a large temperature range. Accurate temperature difference measurement is essential for a good heat transfer experiment. Heat flux sensors manufactured by Hukseflux are optimised for the demands of different applications: - rated temperature range; we make sensor for use from -150 to + 900 °C - suggestions for absorbers and reflectors to mount on the sensors - rated heat flux range; from 0.01 to 200 000 W/m² - sensitivity / output signal - response time - chemical resistance, safety requirements; including sensors for potentially explosive environments - size, shape and spectral properties - optional on-site performance validation or self-calibration capabilities Hukseflux can also supply temperature sensors to support heat transfer measurement: - matched thermocouple pairs, temperature difference measurement accuracy of better than 0.1 °C Selecting a sensor We can assist you selecting sensor and designing an experiment. For preparation, please read: - our note about general things to keep in mind when measuring heat flux, also showing different sensor models and their most common applications a typical checklist is: - what is the application, what must be measured - what is the temperature range - what transport mechanisms do you expect; convective, radiative, conductive, and must they be separately measured - any requirements for size and shape - what are the accuracy requirements - how can I mount the sensor - what is the rated temperature range in °C - what are the expected temperature differences in °C - what is the rated heat flux range of all transport mechanisms in W/m² - what data acquisition do I have, can it measure in the millivolt range; if not what kind of input can it accept? - what other things must be measured; usually it is best to use one measurement system performing all measurements - any special requirements for example response time, spectral properties, .. What we contribute Hukseflux company started in 1993 making sensors for measurement of heat flux and heat transfer. We have designed and supplied sensors for many studies. Our experience includes a variety of environments such as coal fired boilers, fluidised beds, solar concentrators, offshore flare systems and blast furnaces. We are the market leader in industrial heat flux and heat transfer measurement. Hukseflux is the world market leader in heat flux measurement. We offer: - assistance - select the best sensors, heat flux as well as temperature difference, for your application - assistance - optimising the sensor – measuring system combination, also looking at the total system - worldwide support – specialists available in the major economies - traceability - formal metrological traceability to international standards. Take a look at our selection of suitable sensors:
<urn:uuid:e962a405-624e-4d4d-b98d-e0887a6d14b2>
CC-MAIN-2021-10
https://www.hukseflux.com/applications/scientific-research-heat-and-heat-transfer-measurement
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178361510.12/warc/CC-MAIN-20210228145113-20210228175113-00532.warc.gz
en
0.917127
1,349
3.40625
3
Journal writing is one of the techniques many educators and critics of educators find valuable for student learning. A variety of skills can be practiced more effectively through journal writing than in class drills. The journal prompts are designed to provide some practice time and your responses should get better as the year progresses. They are not to be seen as full compositions but should not be brushed off as unimportant. Journals will be given a quiz grade at the end of the quarter. This is an easy way to add an A+- into your grade. It is also an easy way to add a 0. Zeros will have a negative impact on your quarter grade. This page contains the journal prompts for the year. I may make changes as the year progresses so do not jump ahead to other quarter work. NEWSPAPERS - 1ST QUARTER (and probably the second one too) You need to have access to a daily newspaper. The school's Media Center has subscriptions or you may read the papers on line. The papers must be reputable ones. Papers such as the "Globe" or "Herald" are preferable to the "Daily News Tribune." News magazines such as "Time" may be used sporadically. Glamour, YM and similar may NOT be used at all. Step 1. Read the paper every day. Step 2. Select news articles from different sections and different days. Police Beat, Obituaries, Op Ed, hororscopes, Ask Ann Landers and other non-news articles may NOT be used. Step 3. Cut out the article and affix it to a page in your journal. Step 4. Respond to the following prompts in your journal: 1. Name of the paper 2. Date of the paper 3. Title of the article 4. Name of the reporter (if given) 5. In one or two sentences describe the subject matter of the article. 6. In a paragraph (no fewer than 3 complex sentences), write your opinions about the article: the subject matter, the way the reporter handled the subject matter, do you agree with the reporter's point of view, did you see the same subject covered better in a different paper, etc. 4 articles are due each week. This assignment has a couple of goals. First, it encourages you to become aware of current events. It is most important for people in today's fast-paced everchanging world to stay aware of events. Second, you are practicing your writing skills and your critical thinking skills. These are areas that will be tested on the MCAS and that are important in life in general. Third, #6 is practicing your creativity as well as your critical thinking. and Finally, #1 through 5 are skills you will need when we do the research paper. #1 - #4 are source information or citation information and #5 is the skill you use when taking notes on notecards. In fact, #6 is a small version of writing the research paper itself. Practice now and the research paper will be easier to write later. The journals for this quarter will be linked to the work we are doing in class with the research projects. I am still taking suggestions for this quarter. My original plan was to use the frameworks as prompts but I am inclined to change this plan as the revised frameworks do not lend themselves to this task as well as the original ones did. VOCABULARY - 4TH QUARTER Look up the following words and write them in sentences that prove you understand their meaning. They do not have to be in order. abase v., abdicate v., aberration n., abeyance n., abhorrence n., abject adj., abrade v., abrupt adj., abstain v., abstinence n. , abstruse adj., absurd adj., abundant adj., accede v., acrimonious adj., adamant n., aggregate n., bide v., bier n., blatant adj., boisterous adj., cacophony n, cajole v., carrion n., castigate v., circumlocution n. ,circumscribe v., circumspect adj.., clandestine adj., cognizant adj. , contemptuous adj., contender n., contrive v., copious adj., defame v., degenerate v., degradation n. , delineate v., denounce v.., deplorable adj. , deprecate v.., depreciate v., detest v. , devise v., discreet adj., dubious adj., eccentric adj., efface v., effuse v., egregious adj. , emaciate v., emulate v., enigma n., enjoin v., enmity n., facetious adj., facile adj. , facilitate v., foible n., guile n. , harangue n., harass v., harbinger n, icon n., iconoclast n., idealize v., idiom n., idiosyncrasy n., illusive adj., immaterial adj., impassive adj., impromptu n., inexorable adj., zephyr n., zealot n., wry a dj., wrest v. , virulent adj.,visage n., veneer n. , lucid adj., lucrative adj., ludicrous adj., lurid adj., malevolent adj., malign v., malignant adj., negligence n., obsequious adj. , odoriferous adj. , omniscient adj., patronize v., perfunctory adj., pillage n. , piteous adj., pitiable adj., quandary n., reparation n., subjugate v.,timorous adj.
<urn:uuid:98b2acaf-4dd0-4225-a854-7a16c699857f>
CC-MAIN-2019-39
https://www.quia.com/pages/journal.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514576047.85/warc/CC-MAIN-20190923043830-20190923065830-00342.warc.gz
en
0.854389
1,156
3.59375
4
Thanks to the joint actions of the dog´s bone and muscular systems they allow him to fulfill multiple functions such as moving, fleeing from danger, looking for food and protecting himself from weather conditions. The lack of information available regarding the functioning of the bone system and the very important care that must be taken for the healthy development of their bones can have a negative impact on the dog´s well-being. The following article will provide you with important information regarding the structure and functions of their skeleton, the most common diseases, and what to do to take care of their bones. What is the skeleton? The skeleton is the bony framework of the body in all vertebrate animals, which provides the body its shape as well as a firm structure so that he can move around easily. The bones are connected to each other by the ligaments, and the muscles are connected to the bones by the tendons. Muscular and Skeletal Systems A dog´s skeleton consists of approximately 319 bones, with certain variations depending on the number of bones in the tail. What are the main functions of the dog´s skeleton? The skeletal system provides stability and support to the muscles which in coordination with the muscular system, create movement. Another function is to protect the different parts of the body from possible blows or accidents. For example: the skull bone acts as a protective helmet for the brain, the ribs act as a protective box that surrounds the internal organs (heart, lungs, liver, etc.) and the canal created by the vertebras protects the spinal cord. Another function of the skeleton is to produce red blood cells in the bone marrow, and to store vitamins and minerals for the body to use when it needs them. The ribs are a protective box for the internal organs The skeleton is made up of various types of bones that are classified according to their shape and function: Long bones are characterized by their elongated and cylindrical shape. They are responsible for supporting the weight of the dog´s body and helping him to move. The femur, humerus, tibia, fibula, radius, ulna, metacarpals, and metatarsals belong to this category. Short bones are roughly cube-shaped. They provide stability and little bit of movement in the ankle and wrist joints. The carpal, tarsus and vertebrae are bones in this category. These bones are flat and wide. They protect the internal organs such as the brain, the heart and the pelvic organs. The bones of the skull, hip, ribs, and shoulder blades are examples of this group. Shoulder blade bone The skeleton is divided into 3 parts: 1. Axial skeleton It is called axial because it is located on the central axis of the body. It comprises the bones of the head, spine, ribs, and sternum. The skull bones can be classified into 2 groups: 1) bones of the cranium 2) bones of the face. Bones of the cranium: they form the bone box which is responsible for covering and protecting the brain. It is made up of the following bones: 2 temporal, 2 parietal, 2 frontal, 1 occipital, 1 inter-parietal, 1 sphenoid, and 1 ethmoid. Bones of the face: they define the outline of the face and most of the sense organs that are housed within their cavities. The face is composed of the following bones: 2 pre-maxillaries, 2 maxillary, 2 nasals, 2 lacrimals, 2 malars, 2 pterygoids, 2 palatines, 4 turbinates, 1 vomer, 1 mandible and 1 hyoid. - 1. Maxilla 2. Frontal 3. Lachrymal 4. Palatine 5. Malar 6.Nasal 7. Pre-maxilla 8. Parietal 9. Interparietal 10. Temporal 11. Occipital 12. Lower maxilla or mandible. The shape of the dog´s head defines the variability between the different breeds of dogs. Dolichocephalic dog breeds have elongated and narrow skulls. The greyhound, the collie and the Afghan hound are part of this group. Dolichocephalic dog breed Brachycephalic dog breeds have a short nosed and flattened face. The boxer and the pug fit into this classification. Mesocephalic breed of dogs has craniums whose length and width is proportional or similar in measurement. The German Shepherd is part of this group. Mesocephalic dog breed The vertebral column Also called the backbone, is the central axis of the skeleton. This part of the body is formed by vertebrae, these are tough rings of bone and their function is to protect the spinal cord from possible injury and potential paralysis. It also provides an attachment point for the ribs. The vertebral column is comprised of the following bones: Seven cervical vertebrae (C1- C7): form the bony base of the neck. Thirteen thoracic vertebrae (T1-T13): form the bony base of the thorax. Seven lumbar vertebrae (L1-L7): form the bony base of the back. Three sacral vertebrae (S1-S3): they are formed by the union of several vertebrae that articulate within the pelvic girdle.Coccygeal or caudal vertebrae (20-23): the number of vertebrae varies depending on the breed of dog and form the bony base of the tail. A. cervical vertebrae B. Thoracic vertebrae C. Lumbar vertebrae D. Sacral vertebrae E. Tail vertebrae. Between each one of the vertebrae there is an inter-vertebral disc whose main function is to provide mobility and flexibility to the Vertebral column when the dog walks, runs, or jumps. View of the vertabrae and the intervertebral disk The ribs protect the internal organs located inside the rib cage such as the heart, liver, and lungs. There are 13 pairs of ribs: 9 of them articulate the upper part of the thoracic vertebrae (or dorsal vertebrae) and in the lower area it articulates with the sternum. The next 3 pairs are known as ¨false ribs¨ as they are not in direct contact with the sternum but are connected by cartilage; while the last pair of ribs are called ¨floating ribs¨, and they are the smallest ones and are not attached to the sternum. The space in between the ribs is called the intercostal space. The sternum is located at the center of the thorax. It is an elongated bone, formed by 8 bone segments. 2. Appendicular skeleton This group of bones determines the movement of the skeleton; it includes the bones of the front and rear limbs. Comparing it to the human body, the front limbs of the dog would be equivalent to the arms and the hind limbs to the legs. They are formed by the following bones: Scapula: also called the shoulder blade, which together with the humerus form the shoulder joint. Humerus: It is a long bone that extends from the shoulder to the elbow. Radius and ulna: they are 2 long bones that make up the forearm. Bones of the paw: comprised of the carpal bones (equivalent to the human wrist), the metacarpal bones (between the wrist and the phalanges/fingers), and the phalanges/digits (fingers). Bones of the forelimb They are in charge of the dog´s locomotion and are made up of the following bones: Coxal bone: the largest of the flat bones, comprised of 3 bones welded together: the ilium, the ischium, and the pubis. Femur (upper extremity): forms the bony structure of the thigh and extends from the hip to the knee. Tibia and fibula: 2 bones that form the leg where the bones are arranged in parallel with one next to the other; these bones connect the knee to the tarsus (ankle joint). Foot bones: composed of 3 sections: tarsus (equivalent to the ankle, also called hock), metatarsals bones and phalanges/digits (fingers). Imagen / Florian Scheuerer Skeleton of a mammal 3. Splanchnic or visceral skeleton The visceral skeleton are those bones that develop inside the parenchyma of some soft organs or viscera, such as the heart bone of the ox and the bone of the dog’s penis. We must remember the importance of keeping the dog´s bones healthy, since they protect the internal organs, form the basis of his body, and allow for his mobility. The puppy´s skeleton is primarily cartilaginous when he is born, and unlike bone, cartilage is flexible and can change shape and he could develop hip dysplasia and elbow dysplasia if overweight. To avoid the appearance of these disorders, it is very important to have his growth and weight well under control. Let’s look at some of the situations that could affect the health of his bones: Puppy overfeeding is one of the main causes of the development of hip dysplasia, elbow dysplasia, malformations and joint problems. Although it is true, that the hereditary genetic factor is the trigger for hip dysplasia and elbow dysplasia, external factors precipitate their appearance, as is the case of obesity due to overeating. Excess exercise Puppies during their growing phase need to release large amounts of energy and sometimes their owners mistakenly expose them to strong and excessive activities. You should keep in mind that during their growing process, their skeleton is still too immature to withstand the impact of intense exercises which could seriously damage the health of his bones. Calcium is important for bone health, but consuming too much of it, can lead to bone disease. If your dog has a well-balanced diet, it is best not to add calcium supplements. There are some signs that may indicate that your dog has some type of bone or joint problem: he does not want to participate in physical activities that he used to enjoy, has difficulty walking up and down stairs, presents limb weakness, lameness, trouble getting up, and growling when he is touched. If he presents any of these symptoms or similar signs, you should take him immediately to the veterinarian. Vitamin deficiency diseases which are caused by poor nutrition can also occur. Some of these diseases are: This disease is characterized by bowed limbs, pelvic deformities, and curvatures of the spine. It is produced by the deficiency of nutrients especially of vitamins D and lack of adequate calcium and phosphorus. To avoid rickets, vitamins that are not in their food should be added to his diet, and if necessary, any other treatment recommended by the veterinarian. Nutritional secondary hyperparathyroidism It is a disease caused by an elevation of the parathyroid hormone that is secondary to inadequate nutrition. This disease is the result of a nutritional deficiency in Calcium, vitamin D, and/or excess phosphorus. Its symptoms include lameness, pain, bone deformities, bone fractures, and joint inflammation. Eating a balanced diet will help him recover. Osteoporosis is characterized by a significant loss of bone density; the bones become so weak that the risk of fracture is high. The main cause is that there is an imbalance in the consumption of calcium and phosphorus. Conclusions: just as human beings need exercises and balanced nutrition to stay healthy, it is also important in dogs to avoid disease, injury, and paralysis. While it is true that some bone diseases have a genetic predisposition, a preventive lifestyle reduces the chances of having them.
<urn:uuid:51c07d48-3b7b-402b-b140-3b0881499fd3>
CC-MAIN-2021-04
https://www.animaltia.com/dog-anatomy-skeleton/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703495901.0/warc/CC-MAIN-20210115134101-20210115164101-00524.warc.gz
en
0.938474
2,510
3.421875
3
Lamination is a process in which two materials are united as one. Laminating paper to wood is a technique that is useful for displaying photographs or other important documents. Glue is the easiest way to laminate paper to wood. Paper is a tricky material to work with as a laminate material, because it is fragile, and glue can eat away at it over time. A non-acidic archiver's glue is the best type to work with when laminating paper, because it keeps the paper from yellowing or aging quickly. Things You'll Need - Flat wood piece - 220 grit sandpaper - Acrylic medium glue - Damp cloth Sand the wood piece with 220 grit sandpaper to remove any rough edges. Wipe the wood with a damp cloth when you're finished to get rid of dust. Wait for the wood to dry. Put an acrylic medium glue on the back of the paper and position it on the wood board. Acrylic medium glue adheres paper to a variety of surfaces and can be used to create texture. If you can't find this type of glue, use acid-free liquid glue. Paint the surface of the wood with a layer of acrylic medium glue. Use smooth, downward strokes to apply the glue. Wait for it to dry and sand it with the 220 grit sandpaper to remove bubbles. Paint another layer over the surface and wait for it to dry. Sand it to remove any bubbling in the surface.
<urn:uuid:59c7dd61-0801-4247-8cc8-5658e0d026f3>
CC-MAIN-2018-09
https://www.ehow.com/how_6590128_laminate-paper-wood.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812978.31/warc/CC-MAIN-20180220145713-20180220165713-00714.warc.gz
en
0.919862
303
3.0625
3
Each of the virtual labs has an interactive set of the appropriate apparatus, which comes complete with background information about the experimental setup to be used and the underlying biological concepts. At the virtual neurophysiology lab, for example, you can learn how to isolate ganglia (groups of cell bodies) from leeches, so that the responses of individual neurons to mechanical stimulation of the skin can be measured. You can also investigate cell morphology by injecting virtual fluorescent dyes into the neurons. The lab has background information about the leech and the electrical properties of nerve cells, a notebook providing details of each step of the experimental procedure, and tutorials on the use of the micromanipulator (on which the microelectrode is mounted) and the oscilloscope (the instrument with which voltage is measured). It’s a shame that the electrophysiology of the leech neurons can’t be investigated further by patch- or voltage-clamping. Nevertheless, the virtual neurophysiology lab is both informative and fun, as are the other labs in the series.
<urn:uuid:8e824e03-7b60-48d4-9979-4a77b655a54a>
CC-MAIN-2017-39
https://neurophilosophy.wordpress.com/2007/10/29/the_virtual_lab_series/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688932.49/warc/CC-MAIN-20170922093346-20170922113346-00151.warc.gz
en
0.911454
218
2.921875
3
SEPTEMBER 18, 2012 -- Even though Hurricane Isaac blew off the weather radar several weeks ago, the pollution and destruction it left behind in the Gulf of Mexico still remain. After the hurricane's initial landfall the week of August 28, the U.S. Coast Guard received reports of 158 oil spills and 171 hazardous material targets in the affected areas in Louisiana. Some two weeks later, the numbers are down to 13 open oil discharges and 57 hazardous material targets remaining. At this time, NOAA's Office of Response and Restoration has five support personnel, consisting of Scientific Support Coordinators and information management specialists, on scene in the New Orleans command post assisting response operations for these cleanups. The incidents ranged from very small (several gallons) to medium (60,000 gallons) sized releases of oil and a wide variety of chemicals. NOAA has been involved in assessing shorelines possibly affected by these spills, conducting aerial surveys of coastal waters, making cleanup recommendations, and performing final assessments of oiled areas that have been cleaned up. In addition, our experts have been coordinating the federal and state agencies involved, mapping data, and managing response information in databases. This work is in support of the unified command, which is made up of the U.S. Coast Guard and Louisiana Oil Spill Coordinator's Office, along with several oil and chemical facilities identified as the originators of materials spilled during the hurricane. Additionally, OR&R is collaborating with the U.S. Fish and Wildlife Service, NOAA National Marine Fisheries Service, NOAA National Weather Service, Louisiana Office of Historic Preservation, and the Louisiana Department of Wildlife and Fisheries' Scenic Rivers program to address impacts to natural resources and to determine when cleanups are complete. NOAA anticipates being on scene another week.
<urn:uuid:3cab9f0b-ec3c-408b-8de3-bf3ae44079b6>
CC-MAIN-2018-47
https://response.restoration.noaa.gov/about/media/weeks-later-responders-still-dealing-pollution-left-hurricane-isaac-wake.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742793.19/warc/CC-MAIN-20181115161834-20181115183834-00285.warc.gz
en
0.951022
355
2.796875
3
Presentation on theme: "Spanning Tree Protocol"— Presentation transcript: 1 Spanning Tree Protocol Module 3Spanning Tree Protocol 2 Spanning Tree Protocol (STP) STP allows L2 devices to communicate with each other to discover physical loops in the network.STP specifies an algorithm that L2 devices can use to create a loop-free logical topology.STP creates a tree structure of loop-free leaves and branches that spans the entire Layer 2 network. 4 L2 Loops Broadcasts and Layer 2 loops can be a dangerous combination. Ethernet frames have no TTL fieldAfter an Ethernet frame starts to loop, it will probably continue until someone shuts off one of the switches or breaks a link. 5 L2 Loops - Flooded unicast frames Where’s Host B? FLOODWhere’s Host B? FLOODWhere’s Host B? FLOODWhere’s Host B? FLOODAnd the floods continueRemoved from the network 6 STP Prevents LoopsThe purpose of STP is to avoid and eliminate loops in the network by negotiating a loop-free path through a root bridge.STP determines where the are loops and blocks links that are redundant.Ensures that there will be only one active path to every destination. 7 Spanning Tree Algorithm STP executes an algorithm called STA.STA chooses a reference point, called a root bridge, and then determines the available paths to that reference point.If more than two paths exists, STA picks the best path and blocks the rest 8 Two-key STP ConceptsSTP calculations make extensive use of two key concepts in creating a loop-free topology:Bridge IDPath Cost 9 Bridge ID (BID) is used to identify each bridge/switch. The BID is used in determining the center of the network, in respect to STP, known as the root bridge. 10 Used to elect a root bridge Lowest Bridge ID is the root.If all devices have the same priority, the bridge with the lowest MAC address becomes the root bridge. 11 Path CostIEEE modified the most to use a non-linear scale with the new values of:4 Mbps (cost)10 Mbps (cost)16 Mbps (cost)45 Mbps (cost)100 Mbps (cost)155 Mbps (cost)622 Mbps (cost)1 Gbps (cost)10 Gbps (cost) 12 BID and Path CostBID and Path Cost are used to develop a loop-free topology .But first the Four-Step STP Decision Sequence 13 Four-Step STP Decision Sequence When creating a loop-free topology, STP uses:Four-Step decision SequenceStep 1 - Lowest BIDStep 2 - Lowest Path Cost to Root BridgeStep 3 - Lowest Sender BIDStep 4 - Lowest Port IDBridges use Configuration BPDUs during this four-step process. 14 Four-Step STP Decision Sequence BPDU key concepts:Bridges save a copy of only the best BPDU seen on every port.When making this evaluation, it considers all of the BPDUs received on the port, as well as the BPDU that would be sent on that port.As every BPDU arrives, it is checked against this four-step sequence to see if it is more attractive (lower in value) than the existing BPDU saved for that port.Only the lowest value BPDU is saved.Bridges send configuration BPDUs until a more attractive BPDU is received.Okay, lets see how this is used... 15 Three Steps of Initial STP Convergence The STP algorithm uses three simple steps to converge on a loop-free topology:STP ConvergenceStep 1 Elect one Root BridgeStep 2 Elect Root PortsStep 3 Elect Designated Ports 18 STP Convergence Step 1 Elect one Root Bridge When the network first starts, all bridges are announcing a chaotic mix of BPDUs.All bridges immediately begin applying the four-step sequence decision process.Switches need to elect a single Root Bridge.Switch with the lowest BID wins!Note: “highest priority” is the “lowest” BID value.This is known as the “Root War.” 19 STP Convergence Step 1 Elect one Root Bridge Cat-A has the lowest Bridge MAC Address, so it wins the Root War!All 3 switches have the same default Bridge Priority value of 32,768 20 STP Convergence Step 1 Elect one Root Bridge Its all done with BPDUs! 21 STP Convergence Step 1 Elect one Root Bridge At the beginning, all bridges assume they are the center of the universe and declare themselves as the Root Bridge, by placing its own BID in the Root BID field of the BPDU. 22 STP Convergence Step 1 Elect one Root Bridge Once all of the switches see that Cat-A has the lowest BID, they are all in agreement that Cat-A is the Root Bridge. 24 STP Convergence Step 2 Elect Root Ports A bridge’s Root Port is the port closest to the Root Bridge.Bridges use the cost to determine closeness.Every non-Root Bridge will select one Root Port!Bridges track the Root Path Cost, the cumulative cost of all links to the Root Bridge. 26 Cat-A sends out BPDUs, containing a Root Path Cost of 0. Step 1Cat-A sends out BPDUs, containing a Root Path Cost of 0.Cat-B receives these BPDUs and adds the Path Cost of Port 1/1 to the Root Path Cost contained in the BPDU.Step 2Cat-B add Root Path Cost 0 PLUS its Port 1/1 cost of 19 = 19 27 BPDUCost=0BPDUCost=0BPDUCost=19BPDUCost=19BPDUCost=19BPDUCost=19BPDUCost=38 (19=19)BPDUCost=38 (19=19)Step 3Cat-B uses this value of 19 internally and sends BPDUs with a Root Path Cost of 19 out Port 1/2.Step 4Cat-C receives the BPDU from Cat-B, and increased the Root Path Cost to 38 (19+19). (Same with Cat-C sending to Cat-B.) 28 BPDUCost=0BPDUCost=0BPDUCost=19BPDUCost=19Root PortRoot PortBPDUCost=38 (19=19)BPDUCost=38 (19=19)Step 5Cat-B calculates that it can reach the Root Bridge at a cost of 19 via Port 1/1 as opposed to a cost of 38 via Port 1/2.Port 1/1 becomes the Root Port for Cat-B, the port closest to the Root Bridge.Cat-C goes through a similar calculation. Note: Both Cat-B:1/2 and Cat-C:1/2 save the best BPDU of 19 (its own). 30 STP Convergence Step 3 Elect Designated Ports A Designated Port functions as the single bridge port that both sends and receives traffic to and from that segment and the Root Bridge.Each segment in a bridged network has one Designated Port, chosen based on cumulative Root Path Cost to the Root Bridge.The switch containing the Designated Port is referred to as the Designated Bridge for that segment.To locate Designated Ports, lets take a look at each segment.Root Path Cost, the cumulative cost of all links to the Root Bridge. 31 Root Path Cost = 0Root Path Cost = 0Segment 1Segment 2Root Path Cost = 19Root Path Cost = 19Root PortRoot PortRoot Path Cost = 19Root Path Cost = 19Segment 3Segment 1: Cat-A:1/1 has a Root Path Cost = 0 (after all it is the Root Bridge) and Cat-B:1/1 has a Root Path Cost = 19.Segment 2: Cat-A:1/2 has a Root Path Cost = 0 (after all it is the Root Bridge) and Cat-C:1/1 has a Root Path Cost = 19.Segment 3: Cat-B:1/2 has a Root Path Cost = 19 and Cat-C:1/2 has a Root Path Cost = 19. It’s a tie! 32 Root Path Cost = 0Root Path Cost = 0Segment 1Segment 2Designated PortDesignated PortRoot Path Cost = 19Root Path Cost = 19Root PortRoot PortRoot Path Cost = 19Root Path Cost = 19Segment 3Segment 1Because Cat-A:1/1 has the lower Root Path Cost it becomes the Designate Port for Segment 1.Segment 2Because Cat-A:1/2 has the lower Root Path Cost it becomes the Designate Port for Segment 2. 33 Both Cat-B and Cat-C have a Root Path Cost of 19, a tie! Segment 1Segment 2Designated PortDesignated PortRoot Path Cost = 19Root Path Cost = 19Root PortRoot PortRoot Path Cost = 19Root Path Cost = 19Segment 3Segment 3Both Cat-B and Cat-C have a Root Path Cost of 19, a tie!When faced with a tie (or any other determination) STP always uses the four-step decision process:1. Lowest Root BID; Lowest Path Cost to Root Bridge;3. Lowest Sender BID; 4. Lowest Port ID 34 2) Root Path Cost for both is 19, also a tie. Segment 1Segment 2Designated PortDesignated PortRoot Path Cost = 19Root Path Cost = 19Root PortRoot Port32,768.CC-CC-CC-CC-CC-CC32,768.BB-BB-BB-BB-BB-BBRoot Path Cost = 19Root Path Cost = 19Designated PortSegment 3Non-Designated PortSegment 3 (continued)1) All three switches agree that Cat-A is the Root Bridge, so this is a tie.2) Root Path Cost for both is 19, also a tie.3) The sender’s BID is lower on Cat-B, than Cat-C, so Cat-B:1/2 becomes the Designated Port for Segment 3.Cat-C:1/2 therefore becomes the non-Designated Port for Segment 3. 36 Port Cost/Port ID0/20/1Assume path cost and port priorities are default (128). Port ID used in this case. Port 0/1 would forward because it’s the lowest.If the path cost and bridge IDs are equal (as in the case of parallel links), the switch goes to the port priority as a tiebreaker.Lowest port priority wins (all ports set to 128).You can set the priority from 0 – 255.If all ports have the same priority, the port with the lowest port number forwards frames. 37 STP Convergence RecapRecall that switches go through three steps for their initial convergence:STP Convergence Step 1 Elect one Root Bridge Step 2 Elect Root Ports Step 3 Elect Designated PortsAlso, all STP decisions are based on a the following predetermined sequence:Four-Step decision SequenceStep 1 - Lowest BIDStep 2 - Lowest Path Cost to Root BridgeStep 3 - Lowest Sender BIDStep 4 - Lowest Port ID 39 Spanning-Tree Port States Blocked:All ports start in blocked mode in order to prevent the bridge from creating a bridging loop.Port are listening (receiving) BPDUs.No user data is being passed.The port stays in a blocked state if Spanning Tree determines that there is a better path to the root bridge.May take a port up to 20 seconds to transition out of this state (max age). 40 Spanning-Tree Port States Listen:The port transitions from the blocked state to the listen stateAttempts to learn whether there are any other paths to the root bridgeListens to framesPort is not sending or receive user dataListens for a period of time called the forward delay (default 15 seconds).Ports that lose the Designated Port election become non-Designated Ports and drop back to Blocking state. 41 Spanning-Tree Port States Learn:The learn state is very similar to the listen state, except that the port can add information it has learned to its address table.Adds addresses to MAC Address TableStill not allowed to send or receive user dataLearns for a period of time called the forward delay (default 15 seconds) 42 Spanning-Tree Port States Forward:The port can send and receive user data.A port is placed in the forwarding state if:There are no redundant linksorIt is determined that it has the best path to the root 43 Spanning-Tree Port States Disabled: The port is shutdown. 44 Results of BPDU exchange A root port for each switch and a designated port for each segment is selected.These ports provide the best path from the switch to the root switch (usually the lowest-cost path).These ports are put in the forwarding mode.Ports that will not be forwarding are placed in the blocked state.These ports will continue to send and receive BPDU information but will not be allowed to send or receive data. 49 Configuring STPConfiguring Port PrioritySwitch(config)# spanning-tree [vlan vlan-list]priority priority* Default = (0-255)The port with the lowest priority value forwards frames for that vlan.This command can be very useful for load balancing vlans across multiple paths. 50 Verifying STP Switch# show spanning-tree [vlan] Switch# show spanning-tree mod/num 52 STP Timers Forward Delay Timer The default value of the forward delay (15 seconds) was originally derived assuming a maximum network size of 7 bridge hops, a maximum of three lost BPDUs, and a hello-time interval of 2 seconds.Forward delay is used to determine the length of:Listening stateLearning state 53 STP Timers Max Age Timer Max Age is the time that a bridge stores a BPDU before discarding it.Each port saves a copy of the best BPDU it has seen.If the device sending this best BPDU fails, it may take 20 seconds the a switch transitions the connected port to Listening. 54 STP Timers Modifying Timers Do not change the default timer values without careful consideration.Modify the STP timers only from the root bridgeThe BPDUs contain three fields where the timer values can be passed from the root bridge to all other bridges in the network. 55 STP Timer ExampleIt can take seconds for a switch to adjust to a change in topology. 60 In Figure , bridge A has priority 8192 and is the root for the VLAN. Bridge B haspriority and is the backup root bridgefor the same VLAN. Bridges A and B,connected by a Gigabit Ethernet link,make up a core of the network. Bridge Cis an access switch and has PortFastconfigured on the port connected to deviceD. Given the other STP parameters beingdefault, bridge C port that connects to bridgeB will be in STP Blocking state.Device D (PC) is not participating in STP.The red arrows indicate the flow of STPBPDUs. 61 Now, consider that device D started to participate in STP (for example, a Linux-based bridgeapplication was launched on a PC).If the priority of software bridge is zero orany value below that of root bridge, the softwarebridge will take over the root bridge function(as bridge with lowest priority), and the Gigabitlink connecting the two core switches willtransition into blocking mode, thus causing allthe data in that particular VLAN to flow via the100 Mbps link. If there is more data flowing viathe core in the VLAN than the link canaccommodate, the dropping of frames willoccur, leading to a connectivity outage.STP PortFast BPDU guard feature wouldprevent such a situation by disabling the portas soon as STP BPDU is received from device D. 69 Not seeing BPDU from Cat-B Ages out BPDU and goes into Listening mode X FailsAges out BPDU and goes into Listening modeHubCat-B:1/2 fails. Cat-C has no immediate notification because it’s still receiving a link from the hub. Cat-C notices it is not receiving BPDUs from Cat-B. 20 seconds (max age) after the failure, Cat-C ages out the BPDU that lists Cat-B as having the DP for segment 3. This causes Cat-C:1/2 to transition into the Listing state in an effort to become the DP.Hub 70 X FailsForwarding ModeListening ModeHubBecause Cat-C:1/2 now offers the most attractive access from the Root Bridge to this link, it eventually transitions all the way into Forwarding mode. In practice this will take 50 seconds (20 max age + 15 Listening + 15 Learning) for Cat-C:1/2 to take over after the failure of Cat-B:1/2.Hub 71 STP Topology ChangesThe STP change process requires the switch to clear the table faster in order to get rid of unreachable physical addresses.If a switch detects a change, it can send a Topology Change Notification (TCN) BPDU out its root port.The topology change BPDU is forwarded to the root switch, and from there, is propagated throughout the network.TCN does not start a STP recalculation. 72 STP Topology Changes A Bridge originates a TCN BPDU in two conditions: 1. It transitions a port into Forwarding state and it has at lease one Designated Port or Root Port.2. It transitions a port from either Forwarding or Learning states to the Blocking state.On bridges with Designated Ports accept and process TCN BPDUs.The Root Bridge will send out Configuration BPDUs 73 TCN BPDU Much simpler than a Configuration BPDU. Only three fields, Protocol ID, Version, and Type (TCN). 74 STP Enhancements Implementation of : Rapid Spanning Tree Protocol 802.1w (RSTP);Per VLAN Spanning Tree 802.1q (PVST +);Multiple Spanning Tree 802.1s (MST);Load balancing across links;BPDU guard;Root Guard; andUni-Directional Link Detection (UDLD) 75 RSTPThe IEEE 802.1w specification, Rapid Spanning Tree Protocol, provides for subsecond reconvergence of STP after failure of one of the uplinks in a bridged environment.802.1w provides the structure on which the 802.1s features such as multiple spanning tree operates.There are only three port states left in RSTP corresponding to the three possible operational states Learning ,Forwarding and Discarding.Rapid Transition to Forwarding State is the most important feature introduced by 802.1w:RSTP actively confirms safe port transition to forwarding without relying on timers;There is now a real feedback mechanism that takes place between RSTP-compliant bridges.In order to achieve fast convergence on a port, the protocol relies upon two new variables: edge ports and link type. 76 RSTP The RSTP role is now a variable assigned to a given port: Root PortDesignated PortsAlternate PortsBackup PortsRSTP calculates final topology using exactly the same criteria as 802.1d.There is now a difference between the role the protocol has determined for a port and its current state. 77 When STA selects a port to become a designated port, under 802 When STA selects a port to become a designated port, under 802.1d it waits twice <forward delay> seconds (2x15 by default) before transitioning it to the forwarding state.In RSTP a root bridge aware of a change in the topology, sets the TC flag on the BPDUs it sends out, which are then relayed to all the bridges in the network. 78 BPDU are sent every hello-time (not simply relayed anymore). A few changes have been introduced by RSTP to the BPDU format. Only two flags, Topology Change (TC) and TC Acknowledgment (TCA), were defined in 802.1d, however RSTP now uses all six remaining bits of the flag byteBPDU are sent every hello-time (not simply relayed anymore).BPDUs are now used as a keep-alive mechanism between bridges. A bridge considers that it has lost connectivity to its direct neighboring root or designated bridge if it misses three BPDUs in a row. 79 The following developments in Spanning Tree Protocol are examined: Per-VLAN Spanning Tree (PVST) is a Cisco-proprietary implementation requiring ISL trunk encapsulation.PVST+ provides Layer 2 load balancing for the VLAN on which it runs.MST (IEEE 802.1s) extends the IEEE 802.1w Rapid Spanning Tree (RST) algorithm to multiple spanning-trees.Enhanced PVST + or Multiple Instance of Spanning Tree Protocol (MISTP), a compromise between PVST+ and MST
<urn:uuid:26ce7e03-1869-480f-9f52-8d96974a4e82>
CC-MAIN-2017-47
http://slideplayer.com/slide/3346970/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804518.38/warc/CC-MAIN-20171118021803-20171118041803-00280.warc.gz
en
0.873362
4,511
3.859375
4
The Western Australian shark cull By Emma-Louise Nicholls, on 14 January 2014 Twenty deaths have occurred in Western Australia due to sharks, over the last one hundred years (1). On one hand every life lost is a tragedy. On the other hand 20 deaths over 100 years, is nothing compared to other causes of death such as obesity, car accidents and even lightning. Each year, more people get killed by toasters worldwide than sharks. Nevertheless, the government decided action was needed to reduce the number of shark-related marine traumas and three years ago proposed a cull. This proposal was overturned in favour of investing $1.7 million into establishing four research projects at the Department of Fisheries in Western Australia to run from 2011-12 to 2015-16. The outline of these projects was to study shark ecology and behaviour, with the intended outcome of ‘improved capability to manage shark hazards’ (2). Sadly, a shark related marine trauma occurred at the end of 2013, which resulted in the death of a young father of two. Despite the rarity of such cases, and the yet to be completed research projects at the Department of Fisheries, the incident provoked a knee-jerk reaction* from the WA government in the guise of another proposal for a shark cull in Western Australia. In an official statement to the press, the WA government stated that the cull would comprise three major components (1): – Baited drum lines to be set at five metropolitan and three South-West locations – Commercial vessels to monitor and patrol these eight Marine Monitored Areas – Sharks deemed to be a threat to water users will be destroyed** The government reassured the public that ‘the new measures would improve public safety’ and would result in a ‘faster and more aggressive response’ to any incidences. Response to the Cull The proposed cull ignited an outcry that resonated around the world. Scientists, conservationists, shark experts, and the general public all joined forces to be part of the opposition. Baited drum lines can not target ‘problem species’, and subsequently will catch non-dangerous shark species as well as other animal groups such as turtles and dolphins (3). It is known from other examples of Shark Control Programmes that have been implemented in Queensland, New South Wales and KwaZulu-Natal (South Africa) that they do not, and can not offer an impenetrable barrier between the beach and the open ocean (4). The best a SCP can hope for is to reduce the numbers of dangerous species getting through. May I remind you at this point that the ‘numbers getting through’ have resulted in 20 fatalities in Western Australia since World War I. So What Do We Do? As the cull will not, and can not, guarantee the safety of water users, but will endanger harmless wildlife, negatively impact the ecosystem, and cost the lives of endangered species, it is unequivocally a misguided attempt to put a plaster over a cut and ignore the sharp object imbedded in it. A statement by The Shark Trust suggests ‘instead of engaging in ecologically damaging activities, that efforts are focused on improved mitigation measures including increased patrols, alerts and public awareness’ (5). This type of measure is widely accepted in the scientific community as the best course of action with the highest probability of making a positive difference. In Brazil, a Shark Control Programme was implemented that captures large sharks, transports them away to be released offshore with a radio tag for monitoring (6). The results of this programme have been a reduction in the incidences of shark related marine traumas, whilst avoiding damaging the ecosystem with indiscriminate killing of marine life (7). So those are the facts, whether you support the cull or not is up to you. However, as a shark expert myself, with a deeper understanding of the situation than can be outlined in a short blog, I encourage you to sign the petitions against this action, and do what you can to get others to do the same. As a closing remark, I’d point out that a similar shark cull took place in Hawaii in the 1950’s and the result was no significant decrease in the number of marine incidences involving sharks (8). If it isn’t going to work, why damage the environment unnecessarily? Emma-Louise Nicholls is the Curatorial Assistant at the Grant Museum of Zoology 3. Conservation Council of Western Australia http://ccwa.org.au/ 4. McPhee, D.P. (2012) Likely Effectiveness of Netting or Other Capture Programs as a Shark Hazard Mitigation Strategy under Western Australian Conditions 6. Hazin, F. H. V. and Afonso, A. S. (2013) A green strategy for shark attack mitigation off Recife, Brazil. Animal Conservation 7. In a letter to to the government of Western Australia by Dr Ryan Kempster, founder of Support Our Sharks http://www.supportoursharks.com/ **Quantified as sharks of over 3 metres in total body length. These individuals will be automatically deemed to be a ‘danger to water users’ and are to be exterminated.
<urn:uuid:1cd63f13-73e3-4eab-9da9-d90c4a13755f>
CC-MAIN-2022-33
https://blogs.ucl.ac.uk/museums/2014/01/14/the-facts-of-the-western-australian-shark-cull/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00717.warc.gz
en
0.9353
1,190
2.796875
3