text stringlengths 222 548k | id stringlengths 47 47 | dump stringclasses 95 values | url stringlengths 14 1.08k | file_path stringlengths 110 155 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 53 113k | score float64 2.52 5.03 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|
When my children were in school, I didn’t know what trustees did or who the elected official was in my area.
Our education system has a variety of demands and is affected by economic backgrounds, unique student needs, teacher-student ratio, and programming, to name but a few.
Policy decisions, educational choices, testing, and quality are among the reasons why the decisions of a school board trustee matter. The decisions they make affect your child’s education.
Sherry Adams, Edmonton Public school board trustee for Ward I, is on her second term as a trustee. She took the time to talk about the school board and her role as a trustee.
She said the school board, “[Sets] the vision and course of the school district by setting a strategic plan which ensures educational and organizational success. Two important components of our work are to hire and hold accountable a capable superintendent and to oversee and approve the yearly budget and capital plan.”
Adams explained her role as a trustee means “[Ensuring] a quality education for every student.”
A trustee’s role can be complex. He or she must reflect community values and communicate with school principals, school councils, and the community to know about challenges and triumphs. A trustee also advocates for financial needs to the provincial and municipal government, and works with those governments.
Communities in the inner city face unique challenges.
“Our programing and the professionalism of our teachers and staff remain strong in our inner city schools, and we have strong partnerships with many agencies to provide wrap-around services to children and their families. Decreased enrolments in the mature neighbourhoods, however, present challenges to maintaining our inner city school buildings,” said Adams.
She continued, “For the last 27 years, I have been personally involved in supplying supports for schools in low income, high needs communities. I continue to advocate for community partners to come alongside and help meet some of the practical needs that our inner-city kids and families have. It is very important to continue to build strong partnerships to make a difference.”
A trustee can also help parents with school-related issues if they’ve had no success first working with teachers and the principal.
“[Parents can] contact their trustee, who will bring [an issue]to the attention of the very capable and conscientious district staff who, in my experience, are willing to go the extra mile to seeing (sic) problems and misunderstandings satisfactorily resolved.”
The school board deals with its share of challenges. Adams shared two of these issues in Alberta:
“Defunding of independent, charter and home school programs moving toward a unification of provincial school boards,” said Adams. “Balancing the desire of parents to be aware of what is part of their child’s educational experience with a student’s desire for privacy and personal protection.”
The school board sometimes addresses complex issues, like GSAs (Gay Straight Alliance).
According to Alberta Education Guidelines: “If [students] tells us about their sexual orientation or gender identity, but isn’t ready to tell anyone else, we must respect their privacy until they’re ready to share. Our goal in these situations is to help students feel safe and supported. We encourage students to talk to their parents and work to bridge that conversation by giving students the support they need.”
“GSAs serve to create empathy and provide personal support for all students around the LGBTQ experience and issues,” said Adams. “A major reason gay-straight alliances were created was to engender empathy for fellow students. At the same time, I believe that the safety of all students depends on schools informing and involving parents as much as possible, unless doing so would be harmful to a student.”
Students also have a voice and can participate in the school board in the form of a student senate.
“Each high school can elect up to two students to be on the senate. The trustees meet with the senate throughout the year and the senate reports to the public board three times a year. Three students from the senate are selected by their peers to be student trustees and each have an opportunity to participate in a public board meeting.”
Adams said the senate has been effective in giving students an opportunity to communicate ideas and concerns as well as create initiatives for student well-being.
Of course, Adams has her own goals as a trustee. She’s currently focused on “Improving the educational experience and proficiency of our First Nations, Métis, and Inuit students.” She also wants better mental health support and early interventions.
Edmonton Public school board
Edmonton Catholic school board
Featured Image: Sherry Adams is the Edmonton School board trustee for Ward I. | Supplied
- School trustees play an important role Why their role matters and how they impact your children - April 1, 2018
- Sharing love and community on Valentine’s Day How a holiday became a beloved and treasured family tradition - February 1, 2018
- Why you should remember your community concerns Following up on issues identified during the municipal election - December 1, 2017 | <urn:uuid:af85e772-388c-4355-ad00-30da5ee18dd5> | CC-MAIN-2020-45 | https://ratcreek.org/school-trustees-play-an-important-role/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107903419.77/warc/CC-MAIN-20201029065424-20201029095424-00652.warc.gz | en | 0.971376 | 1,078 | 2.59375 | 3 |
HOUSTON -- The largest chemical hub in the Americas courses through this city in a seemingly unending line of plants that produce about a quarter of the country’s petrochemicals.
These plants have helped fuel the city’s economic rise. But they also have added to its poor air quality, with emissions that have been linked to asthma, cancer, and heart attack.
In recent years, Houston has found ways to reduce air pollution, in part by zeroing in on chemical plant emissions. Experts say Houston’s experience may show others how to keep chemical emissions down, even as the industry expands along the Gulf Coast, and possibly into Pennsylvania.
From Pennsylvania to Texas, the chemical industry is building new plants to take advantage of vast deposits of natural gas opened up by the fracking boom. Shell Chemical is eyeing building an ethane cracker in Monaca in Beaver County. The plant would take ethane from the Marcellus shale and convert it into ethylene -- a key building block for plastics and chemicals -- through the ‘cracking’ process.
Shell’s Pennsylvania cracker would be northwest of Pittsburgh, in a region that already fails federal air quality standards for ozone and other pollutants, according to the Environmental Protection Agency. Ozone is an oxidant that can burn lung tissue, aggravate asthma and increase susceptibility to respiratory illnesses like pneumonia and bronchitis, according to the agency.
Ozone is formed when volatile organic compounds (VOCs) mix with other forms of pollution in the presence of sunlight. Environmental scientists say the biggest impact a cracker plant would have in Pittsburgh would be through releases of VOCs.
The company has said differences in local permitting rules and the type of raw materials it would use make it hard to project what kinds of emissions a Pennsylvania cracker would produce. The company has used Shell’s Norco plant in Louisiana in the past as a reference when it proposed its Pennsylvania cracker. Norco produces roughly twice the VOCs of U.S. Steel’s Clairton Coke works, currently the highest emitter in Southwestern Pennsylvania, according to the EPA.
Shell spokeswoman Kimberly Windon said the company did not have specifics about what types of emissions the plant would produce, or what types of permitting it would need.
“I can tell you that if this project does move forward, we will design, build and operate the facility to ensure compliance with all state, federal and local air quality standards,” she said. “Environmental health is important to us. We're definitely committed to environmental responsibility in the communities where we operate.”
Shell recently agreed to spend $115 million to clean up emissions at its Deer Park, Texas, refinery and ethylene plant after the Department of Justice filed a complaint alleging the plant’s flares were emitting improper amounts of VOCs and cancer-causing pollutants.
Joe Osborne of the Group Against Smog and Pollution, an environmental advocacy group in Pittsburgh, said the biggest pollution problem posed by a cracker would be emissions of VOCs and nitrogen oxides.
Osborne said the plant would likely be a major source of new pollution, with more than 50 tons per year of VOCs and 100 tons of nitrogen oxides, though he has yet to see any estimates from the company.
“I expect it will be a large source of ozone precursors, and this would be located in an area that’s already failing to meet federal health-based standards for ozone,” he said.
Looking to Houston
Much has been said about the number of jobs the petrochemical 'cracker' plant that may be coming to Western Pennsylvania would add to the local economy. Between 500 and 1,000 permanent jobs are created at ethylene crackers, plus thousands of other potential jobs that would result from associated businesses that cluster around them. Read more ››
Houston may hold clues to how a cracker, which is expected to bring in 10,000 short-term construction jobs, and up to 17,000 indirect jobs to the region, would impact air quality. At the heart of the industry’s production chain is the Houston Ship Channel, a 26-mile canal lined with refineries and chemical plants, a vast complex of pipes, distillation towers, and storage tanks.
Houston’s air has long borne the brunt of its industrial output. It has never met federal air quality standards for ozone. An array of studies has shown pollution’s negative impact. One study linked high ozone incidents to increased rates of cardiac arrest in Houston; others have found associations between high rates of asthma and childhood leukemia in neighborhoods near the chemical industry’s base along the Houston Ship Channel.
But in the last decade, Houston’s air has improved, in part because regulators have targeted the petrochemical industry.
The city’s air quality nadir was in 1999.
“We were the capital of ozone,” says Elizabeth Hendler, a former state regulator who now works as an environmental consultant to industry.
In that year, Houston surpassed Los Angeles as having the highest ozone levels in America.
“That was kind of a wake-up call,” Hendler said.
Not long afterward, in 2003, Toyota decided against locating a plant in the region because of the city’s air. Hendler says the number of air monitors in Houston doubled in a few years.
The state undertook a wide-ranging series of studies. Aircraft from NASA and the National Oceanic and Atmospheric Administration flew over the ship channel with special emissions-sensing equipment.
They found big leaks. The worst were from chemical plants with ‘crackers’ that made ethylene and propylene, two basic building blocks of plastic.
“The plants were having 1,000-pound releases, 5,000-pound releases, 20,000-pound releases, in one case 200,000-pound releases,” said Harvey Jeffries, a retired University of North Carolina chemist who studied Houston’s air and advised business and research groups on Houston’s air problems.
Ethylene and propylene – the two main products made in a cracker -- are considered ‘highly reactive’ VOCs, meaning they can create large plumes of ozone in a matter of hours under the right conditions.
“When that stuff gets emitted in the daytime—it cooks up the highest amount of ozone you’ve ever seen,” Jeffries said.
When they looked at Houston’s industrial corridor, scientists realized chemical plants had been chronically underreporting their emissions. A lot of this pollution was ‘fugitive’ emissions—leaks from valves, flanges, tiny holes in pipes, and incomplete combustion of waste gasses in the plants’ flares.
To get the city’s air under federal air pollution limits, Texas implemented a suite of environmental reforms. The state created special limits on emissions of highly reactive VOCs like propylene and ethylene, and implemented a cap-and-trade program for Houston’s petrochemical plants.
What effect did all this have?
“Well, ozone went down--a lot,” Hendler said.
The Texas Commission on Environmental Quality estimates the city’s ozone levels have decreased about 20 percent since 2001.
The number of days when the air in Houston exceeds the EPA’s current eight-hour average for ozone of 75 parts per billion went from around 100 a year in 2005 to under 35 days in 2012. Emissions of other pollutants, including carcinogenic chemicals released in petrochemical manufacturing, also decreased.
Progress, but no cure
PORT ARTHUR, Texas -- Standing beneath a tangle of pipes, ductwork, and grated catwalks at BASF’s massive ethylene unit in this small refining city on the Gulf Coast, Andy Miller pointed to a large metal box a few feet above his head. Inside, a fire burning at 2,000 degrees Fahrenheit produced an industrial-scale whine. Read more ››
In spite of recent strides, Houston still has never met any federal guidelines for ozone.
The city will also see huge expansions of its petrochemical sector in the next few years, thanks to the fracking boom. Several new or expanded ethane crackers are slated to go online to take advantage of cheap natural gas. This has some clean air advocates worried.
“We’ve made significant progress,” said Larry Soward, a former regulator for the Texas commission and president of Air Alliance Houston. “But let’s not pat ourselves on the back too much. So far we have not met a single (federal) standard for ozone--and we’re talking about adding all these new pollution sources.”
Companies looking to expand in Houston will have to either reduce pollution at one of their own facilities, or buy credits from a company that’s reduced them at theirs. They will also have to use tighter pollution controls.
Still, Soward thinks they could go even further—by implementing more fence-line monitoring and increasing maximum fines on plants, now $25,000 a day.
“We just don’t do that in Texas,” he said.
The industry contends that current monitoring and regulations are working. ExxonMobil, for example, reduced its emissions by 50 percent in the past decade. And industry backers say Houston’s chemical sector has been a key to helping the city’s economy avoid the worst of the recession.
“A great benefit in anyone’s life is to have a good job,” said Craig Beskid, executive director of the East Harris County Manufacturers Association, an industry group in Houston.
Beskid said Houston’s chemical and refinery sector contributes about 30,000 jobs with salaries ranging from $40,000 to $200,000 a year. That economic engine contributes to a better quality of life, he said.
Steve Smith, technical advisor to the industry-funded Houston Regional Monitoring Network, which operates around a dozen air pollution monitoring stations around the city, says the key to keeping emissions low is simple: Keep an eye on it.
“If you monitor, it will get better,” he said. “That’s exactly what happened here.”
Smith’s group tests for more than 150 pollutants to help oil, gas and petrochemical businesses meet federal air quality mandates.
“We set up a network early on, where if we saw a value too high, we sent out a notice to the companies, saying ‘Look at what’s happening. See if you have something that’s going on.’”
It helped companies cut down on leaks at their facilities. In that way, he said, the monitors have been good for the city’s air, and good for the companies’ bottom lines.
Reid Frazier is a reporter with The Allegheny Front, a radio program covering the environment in Pennsylvania. Find more stories at alleghenyfront.org. This work was funded in part by the Fund for Investigative Journalism. Next Week: Plants provide work, but it can be deadly. | <urn:uuid:97fd274b-b541-4fad-a2ab-7bb4e240d833> | CC-MAIN-2021-04 | https://www.publicsource.org/houston-cleaning-up-pollution-by-going-after-ethane-cracker-emissions/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703538431.77/warc/CC-MAIN-20210123191721-20210123221721-00491.warc.gz | en | 0.949735 | 2,338 | 3.09375 | 3 |
A research team at the Georgia Institute of Technology has developed a novel technique that sets a new milestone for the strength and modulus of carbon fibres.
This alternative approach is based on an innovative technique for spinning polyacrylonitrile (PAN), an organic polymer resin used to make carbon fibres. The work is part of a four-year, $9.8 million project sponsored by the Defence Advanced Research Projects Agency (DARPA) to improve the strength of carbon-fibre materials.
By using a gel-spinning technique to process polyacrylonitrile copolymer into carbon fibres, the researchers developed next-generation carbon fibres that exhibit a combination of strength and modulus not seen previously with the conventional solution-spun method.
In gel spinning, the solution is first converted to a gel; this technique binds polymer chains together and produces robust inter-chain forces that increase tensile strength. Gel spinning also increases directional orientation of fibres, which also augments strength. By contrast, in conventional solution spinning, a process developed more than 60 years ago, PAN co-polymer solution is directly converted to a solid fibre without the intermediate gel state and produces less-robust material.
The gel-spun carbon fiber produced by the team was tested at 5.5 to 5.8 gigapascals (GPa) – a measure of ultimate tensile strength – and had a tensile modulus in the 354–375 GPa range. The material was produced on a continuous carbonisation line at Georgia Tech that was constructed for this DARPA project.
Satish Kumar, a professor in the Georgia Tech School of Materials Science and Engineering who leads the project said;
This is the highest combination of strength and modulus for any continuous fibre reported to-date, and at short gauge length, fibre tensile strength was measured as high as 12.1 GPa, which is the highest tensile-strength value ever reported for a PAN-based carbon fibre.
Kumar also noted the internal structure of these gel-spun carbon fibres measured at the nanoscale showed fewer imperfections than state-of-the-art commercial carbon fibres, such as IM7. Specifically, the gel-spun fibres display a lower degree of polymer-chain entanglements than those produced by solution spinning. This smaller number of entanglements results from the fact that gel spinning uses lower concentrations of polymer than solution-spinning methods.
Kumar and his team convert the gel-spun polymer mix into carbon fibres via a selective treatment process called pyrolysis, in which the spun polymer is gradually subjected to both heat and stretching. This technique eliminates large quantities of hydrogen, oxygen, and nitrogen from the polymer, leaving mostly strength-increasing carbon.
The current performance of solution-spun PAN-based carbon fibres has been achieved after many years of material and process optimisation, yet very limited material and process optimisation studies have been carried out to date on the gel-spun PAN fibre. In the future, the researchers believe that materials and process optimisation, enhanced fibre circularity and increased solution homogeneity will further increase the strength and modulus of the gel-spinning method. | <urn:uuid:04e94f8b-3e00-4501-beec-2916ef4d369f> | CC-MAIN-2018-05 | https://www.compositestoday.com/2015/07/new-method-improves-strength-and-modulus-in-carbon-fibres/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891105.83/warc/CC-MAIN-20180122054202-20180122074202-00250.warc.gz | en | 0.919339 | 666 | 2.75 | 3 |
Back to Resource Topics
By Subject Area: Science
, Educational Options: Summer Programs
, For Educators: Professional Development
||Students and Teachers As Research Scientists (STARS)
||Students and Teachers As Research Scientists (STARS) is a program, funded through the National Science Foundation, that introduces both rising high school juniors and seniors and their teachers to the various aspects of the scientific enterprise as practiced by successful scientists in academic, private and governmental research institutions.
||Contributed by: Student on 2/7/2005
I've actually participated in this program and it has really opened up doors. My research is doing good and I feel really great about doing it. The people in it are great and I forsee it being an international program not too far from now......
Contributed by: Educator on 7/22/2004
My daughter participated in this after her junior year. She will be a junior in college next year and has done three years of research in cell biology. This is an incredible opportunity for anyone's child who is interested in science and mathematics
Contributed by: Student on 7/18/2004
Contrary to what the previous reviewer has said, it is not limited to the St. Louis metro area, as we have had people from Iowa City, Pittsburgh, and Chicago come this year. But I do agree with this person since it is a great opportunity for hands on research in science.
The appearance of any information in the Davidson Institute's Database does not imply an endorsement by, or any affiliation with, the Davidson Institute. All information presented is for informational purposes only and is solely the opinion of and the responsibility of the author. Although reasonable effort is made to present accurate information, the Davidson Institute makes no guarantees of any kind, including as to accuracy or completeness. Use of such information is at the sole risk of the reader. | <urn:uuid:fd67b419-ecdc-4902-8270-54c75a82d6a6> | CC-MAIN-2014-10 | http://www.davidsongifted.org/db/Resources_id_10129.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010856682/warc/CC-MAIN-20140305091416-00088-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.950146 | 381 | 2.71875 | 3 |
Generators of Cyclic Groups
Cyclic groups usually have more than one generator – at least if the group has more than one member.
The setis cyclic group under addition mod 5, generated by the element 1 but also by the elements 2, 3 and 4.
The setis a cyclic group under addition mod 6, generated by the element 1 but also by the elements 5.
Every cyclic group of orderis isomorphic to the addition group
The following theorem gives the condition under which an element of a cyclic group may generate the group.
Letbe a cyclic group of orderThenif and only if the greatest common denominator ofandis 1 ().
Proof: Ifwe can writefor integersandThenThenso all powers ofbelong tohenceandgenerates
Suppose then thatWriteandso that the order ofshowing thatdoes not generate | <urn:uuid:aece6f85-f95f-47a2-ac6e-239a49745952> | CC-MAIN-2021-17 | https://astarmathsandphysics.com/university-maths-notes/abstract-algebra-and-group-theory/1695-generators-of-cyclic-groups.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038469494.59/warc/CC-MAIN-20210418073623-20210418103623-00485.warc.gz | en | 0.882885 | 183 | 2.6875 | 3 |
Inca City is the name given to an anomaly on Mars that looks like an artificial structure. First discovered on pictures taken by the Mariner 9 probe in 1972, more pictures were taken by the Mars Global Surveyor's (MGS) onboard camera, called the Mars Orbiter Camera (MOC) in August 2002. The pictures reveal how Inca City fits into a massive complex of anomalous structures that form a perfect circle. Further intensive research identified many more anomalous artefacts in the region. Thus the pictures tend to corroborate that Inca City most likely is an arteficial structure, and hence proof of an extraterrestrial presence on Mars. (See also Cydonia where similar proof was found).
This topic was copied from the HyperBase and is likely to be revised. | <urn:uuid:4f014f68-1746-4eb5-9580-901a9fe041cf> | CC-MAIN-2020-05 | https://exopaedia.org/Inca+City | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00462.warc.gz | en | 0.948251 | 160 | 3.03125 | 3 |
RAM stands for "random access memory." RAM is the temporary data storage in a computer which is accessed directly by the central processing unit (CPU). Computers require RAM in order to process data and run programs. It's much faster for a computer to get its information from RAM than from the hard drive.
The most common type of RAM is Double Data Rate Synchronous Dynamic RAM (DDR SDRAM.) It operates at about double the bandwidth of single-rate SDRAM. Rambus RAM is designed be considerably faster than ordinary RAM. Rambus RAM is rarely used since it's expensive and can only be installed in certain Intel motherboards. RAM comes in different sizes, typically ranging from 256 megabytes (MB) to 2 gigabytes (GB).
RAM comes in long, slender modules with metallic pins at the bottom. Single Inline Memory Modules (SIMMs) typically come with chips on one side whereas Dual Inline Memory Modules (DIMMs) have chips on both sides. DIMMs also have pin connectors on both sides of the module, doubling the number of connections.
RAM modules are printed circuit boards that plug into the motherboard. Every RAM module has chips that are integrated into the surface of the circuit board. DIMMs can be used singly but SIMMs must be used in pairs. RAM is erased every time your computer is turned off. By comparison, read only memory (ROM) and data stored on the drives are retained after the computer is deactivated. The computer loads programs back into RAM from read only memory and the disk drives the next time it's powered on.
A computer's processor uses RAM to access programs and data it needs to process. Adding more RAM can dramatically increase the speed of your computer. If you are experiencing system slowdowns, you may need to upgrade your RAM. This is especially true if you're hearing a lot of hard drive activity during the slowdowns. This type of activity is commonly called "thrashing" and is an indication that your computer is using the page file on your hard drive as a method to supplement an inadequate amount of RAM.
Most computer users experience the best results by using non-error correction (non-ECC) unbuffered DDR SDRAM. While other types of memory, such as static RAM (SRAM), Rambus RAM and ECC RAM may offer increased performance, their costs are far too high for the benefits gained. Also, adding more memory to your system will achieve better performance boosts than adding faster memory. Furthermore, many computer manufacturers dictate the speed of memory you can install and attempting to install faster memory can backfire. To stay on the safe side, check your computer or motherboard's user guide or website for the RAM specifications, and get exactly the RAM they recommend. | <urn:uuid:52ad4f73-34d0-45d0-84d3-2c456e82b165> | CC-MAIN-2017-30 | https://www.techwalla.com/articles/what-does-ram-stand-for | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424060.49/warc/CC-MAIN-20170722122816-20170722142816-00584.warc.gz | en | 0.938255 | 570 | 4.0625 | 4 |
Agenda Setting Research
Media Tenor compares the relationship between reality and the media's description of reality or public perception of this reality as described by these media. Its applied Agenda Setting research has proved that media shapes peoples' minds. Consequently, topics not discussed in the media have proven to be irrelevant or less relevant by public.
Public opinion and even more importantly, human behaviour tends to follow media reporting. Ongoing up-to-date media content analysis represents the first step of Agenda Setting research. Media Tenor's approach of analysing all texts published in opinion leading media allows it to define 100% of all news reaching the people. Connecting this with public opinion polls or behaviour, Media Tenor can define how many reports are needed to make people change their opinion or behaviour.
The Media Tenor research is conducted in two steps:
- Every day, media analysts encode every single information unit from all articles or new stories of more than 5 lines/seconds in print or broadcast texts from the opinion leading media of the selected country under analysis. The Media Tenor codebook is not based on topics, protagonists, or sources appearing in the media but rather reflects reality. The Media Tenor Codebook has developed over the last 13 years and has, due to daily updates, now reached the stage where it contains more than 100 000 codes each organised in logical categories reflecting the reality and the media content.
- Researchers then take this data and describe what was written in the opinion leading print media or broadcast on screen in TV News. This data, which is unique to Media Tenor, is then correlated with public opinion polls, and voting results to determine what reality is shown (Agenda Setting) in the media and what reality is not shown (Agenda Cutting). Further, these results are compared to external statistics (poll results, consumer behaviour reports, various indexes like business consumer index, consumer confidence index, share price, tourist statistics, etc) and further research to gauge the media effects on public perception and behaviour. | <urn:uuid:d8839f2b-f2d6-43e4-aae1-f8a759c404b2> | CC-MAIN-2017-04 | http://www.agendasetting.com/index.php/agenda-setting-research | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00244-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.922148 | 405 | 2.625 | 3 |
Biblical Hebrew Vocabulary in Context: Building Competency with Words Occurring 50 Times or More
- Regular price
- Sale price
Biblical Hebrew Vocabulary in Context by Miles V. Van Pelt and Gary D. Pratico is a biblical Hebrew language resource designed to reinforce a student's basic vocabulary by reading words that occur fifty times or more in the context of the Hebrew Bible. All 642 of these Hebrew words have been collated into 195 key biblical verses and/or verse fragments to help students practice and retain their Hebrew vocabulary. In lieu of rote memorization, Biblical Hebrew Vocabulary in Context reinforces essential vocabulary by reading words in the context of the Hebrew Bible. The book includes two primary sections. The first section provides room for students to write their own glosses of the biblical verse and to parse as they feel necessary. An English translation is also provided and any term that appears less than fifty times is glossed. Proper names are identified with gray text. The second section of the book provides the same biblical verses from the first section but with minimal room to write glosses and parse and without an English translation for aid. The end of the book includes a Hebrew-English lexicon of all the words occurring fifty times or more in the Hebrew Bible.Read Less
- Contributor(s)Miles V. Van Pelt , Gary D. Pratico
- About the Contributor(s) Miles Van Pelt (PhD, Southern Baptist Theological Seminary) is the Alan Belcher Professor of Old Testament and Biblical Languages at...
Miles Van Pelt (PhD, Southern Baptist Theological Seminary) is the Alan Belcher Professor of Old Testament and Biblical Languages at Reformed Theological Seminary in Jackson, Mississippi, where he also serves as academic dean. Miles lives in Madison, Mississippi, with his wife, Laurie, and their four children.
Gary D. Pratico (ThD, Harvard Divinity School) is senior professor of Old Testament and Hebrew language at Gordon-Conwell Theological Seminary. He has been teaching Hebrew for more than thirty years and is coauthor with Miles V. Van Pelt of Basics of Basics of Biblical Hebrew (grammar and workbook) and The Vocabulary Guide to Biblical Hebrew.show more
- Publish Date07/09/2019
- PublisherZondervan Academic
- Format Softcover
- Weight (lbs)0.65 lb
- Case Weight (lbs)44.22 lb
- Dimensions 9.0(h) x 6.0(w) x 0.42(d) inches
- Price $11.89
add corresponding quantity to see pricing
Ordering more than 2,000? Call 800-727-3480 to save even more!
eBooks purchased here are fulfilled by our partner, Glose. Please note that:
- To access your eBooks, you can download the free Glose app or read instantly in your browser by creating a Glose account using the same email address you use to purchase the eBooks.
- eBooks fulfilled through Glose cannot be printed, downloaded as PDF, or read in other digital readers (like Kindle or Nook).
- For more information about how to access eBooks purchased on this site, click here for our FAQs. | <urn:uuid:c99eb003-4d91-4664-af6e-0665598047b8> | CC-MAIN-2020-24 | https://churchsource.com/collections/hebrew-cognate-languages/products/biblical-hebrew-vocabulary-in-context-building-competency-with-words-occurring-50-times-or-more | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348526471.98/warc/CC-MAIN-20200607075929-20200607105929-00494.warc.gz | en | 0.89426 | 679 | 2.78125 | 3 |
A common findng is an enlarged lymph node. The symptoms caused by this vary depending on where the node is located:
- For lymph nodes near the surface of the body, for example the neck, axilla, or groin, there will be swelling in the area. This is often relatively a painless and, and there is usually no sign of infection in the area which drains to the node.
- A retroperitoneal node in the area of the kidneys/ureter may prevent passage of urine. Symptoms of this are little urine production, flank or back pain, nausea, and symptoms of renal impairment, such as edema and hypertension.
- A tumor in the bowel can cause bowel obstruction leading to nausea, vomiting, abdominal distention, change in bowel patterns, and pain in the abdomen.
- A tumor in the thymus or enlarged nodes in the mediastinum can cause pressure on the trachea causing coughing, difficulty breathing, and a feeling of suffocation. The tumor can also cause obstruction of the superior vena cava causing dilatation of neck veins, facialedema, and venous congestion of the ipsilateral arm.
- Nodes in the biliary ducts can cause restriction of biliary drainage with jaundice, nausea, and pain under the right costal arch.
Lymphoma infiltration of other organs can cause a series of symptoms. Many of these may not give rise to an immediate suspicion of lymphoma, but suggest a pathological process in the involved organ. Further work-up of this organ will then cause suspicion of lymphoma.
- Infiltration of bone marrow can cause pancytopenia with low granulocytes and tendency for infection, low hemoglobin with anemia symptoms, and low platelets with tendency of bleeding.
- Infiltration of the central nervous system can cause focal neurological symptoms. Lymphoma in the spinal canal (either primary or infiltrating from vertebral bodies or paraspinal soft tissue) can also cause pressure on the spinal cord/cauda equina with symptoms of lesions of the spinal cord.
- Infiltration in the liver can cause symptoms of liver failure with jaundice, nausea, and pain under the right costal arch.
- Infiltration in pleura or peritoneum can cause accumulation of pleural fluid with pain in the thorax, coughing, dyspnea, or ascites with increase in abdominal circumference.
General defined symptoms of lymphoma are for example, fatigue, B-symptoms (fever, weight loss, night sweats) and sometimes unexplainable itching. | <urn:uuid:5d05d432-f418-4e4e-91b5-4ea3a09041b3> | CC-MAIN-2019-51 | http://oncolex.org/Childhood-cancer/Diagnoses/Lymphoma/Background/Symptoms | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540564599.32/warc/CC-MAIN-20191213150805-20191213174805-00549.warc.gz | en | 0.885971 | 533 | 2.90625 | 3 |
Abstract: Femtocells are low-power cellular base stations that operate in licensed spectrum. They are typically deployed indoors to improve coverage and provide excellent user experience, including high data rates. Cellular operators benefit from reduced infrastructure and operational expenses for capacity upgrades and coverage improvements. Femtocells also bring unique challenges, such as unplanned deployment, user installation, restricted access, and interoperability with existing handsets and network infrastructure. Although femtocells may cause some interference to other users in the network, with the use of proper interference management techniques, this can be well controlled.
July 18, 2013https://www.qualcomm.com/media/documents/files/interference-management-and-performance-analysis-of-umts-hspa-small-cells.pdf
Mehmet Yavuz, Farhad Meshkati, Sanjiv NandaAkhilesh Pokhariyal, Nick Johnson, Balaji Raghothaman, Andy RichardsonJuly 18, 2013Interference Management and Performance Analysis of UMTS/HSPA+ FemtocellsInterference Management and Performance Analysis of UMTS/HSPA+ Small Cells | <urn:uuid:1d12091e-a904-4320-9dcf-e414d1129cab> | CC-MAIN-2015-14 | https://www.qualcomm.com/documents/interference-management-and-performance-analysis-umtshspa-small-cells | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298387.35/warc/CC-MAIN-20150323172138-00251-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.881771 | 235 | 2.5625 | 3 |
Learn about this topic in these articles:
The Eastern Upland resembles the Western in being a hilly region drained by numerous rivers. Their valleys come together to form the Thames River, which reaches Long Island Sound at New London. Elevations in this area rarely reach above 1,300 feet (400 metres). In both uplands the hilltops tend to be level and have been cleared for agriculture. | <urn:uuid:7ee28e5d-e0e0-4f2d-af00-666be9fbeaa3> | CC-MAIN-2017-43 | https://www.britannica.com/place/Eastern-Upland | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823462.26/warc/CC-MAIN-20171019194011-20171019214011-00895.warc.gz | en | 0.903974 | 81 | 2.890625 | 3 |
Coffee found to be a memory booster
A cup of coffee might improve your memory.
Researchers had 73 volunteers who did not habitually consume caffeine study pictures of flowers, musical instruments and other objects. After they were done, 35 of them were given a pill containing 200 milligrams of caffeine — the amount in one to two cups of coffee — and the rest a placebo.
The next day, the subjects saw more pictures and compared them to the pictures seen earlier.
Those who received caffeine were better at identifying pictures that were different from but similar to the ones they had seen the previous day. In other tests, the researchers found that less than 200 milligrams had no effect.
Double vaccinations pose childhood fever risk
Some children get a fever after a vaccination for flu or pneumococcal disease. But when the vaccinations are given together, the risk of fever increases significantly.
Researchers studied 530 children. On the first day after the flu vaccination alone, 7.5 percent of the children had a fever, as did 9.5 percent of those who got the pneumococcal shot alone.
The study, published online in JAMA Pediatrics, found that 37.6 percent of children who got both shots at the same visit developed a fever within a day. | <urn:uuid:eb8b295d-5051-4653-8e2a-734b62fcf076> | CC-MAIN-2015-48 | http://m.timesunion.com/living/article/Checkup-5162923.php | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398453553.36/warc/CC-MAIN-20151124205413-00264-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.975226 | 258 | 3.28125 | 3 |
Natural data as found in biological signals or images is usually highly redundant and noisy. Classical models for the stochasticity in such processes break down in many such cases. For example, due to the presence of edges in images, the gradients are giving rise to fat tailed distributions. On the other hand, it can easily be seen that multiple EMG signals are highly non-Gaussian.
In machine learning, we investigate methods for finding useful representations of natural data. For this, we use non-linear parametric models. These are combined into deep and recurrent architectures which are subsequently optimised with classical and novel optimisation techniques on a wide variety of objectives.
The objectives typically encourage the representations to fulfil some numerical criterion: sparsity, independence, clustering of similar items or the ability to reconstruct the input. The models we use include but are not limited to deep belief networks, recurrent neural networks, convolutional neural networks, variational autoencoders, and Gaussian Processes.
Fast Adaptive Weight Noise
We developed an efficient calculation of the marginal likelihood of a distribution over the weights for neural networks. We use a technique called Variance Propagation for computing mean and variance when propagating a Gaussian distribution through a neural network. (Wang & Manning 2013) are providing rules for propagation mean and variance through a set of linear transformations and nonlinear transfer functions. By choosing Gaussian distributions for the network weights and propagating this uncertainty through the network we can efficiently calculate the marginal likelihood. Optimising it directly with respect to the parameters of the distribution of the weights will lead to a maximum likelihood approach. By adding a KL-divergence between the distribution over the weights and a prior we prevent the model from overfitting the data.
A slight variant of this is to use variance propagation to approximate Bayesian learning of neural networks: we can optimise the variational upper bound on the negative log-likelihood of the data. This allows to exploit model uncertainty in a wide range of scenarios, such as active learning or reinforcement learning. Apart from being able to model uncertainty it also requires very few data.
Hybrid addition-multiplication networks using parameterisable transfer functions
Can the performance of neural networks be improved by the use of a novel, parameterizable transfer function that allows each neuron to smoothly adjust the operation it performs on its inputs between summation and multiplication?
In artificial neural networks the value of a neuron is given by a weighted sum of its inputs propagated through a non-linear transfer function; however some tasks greatly benefit from units that compute the product instead of the sum of their inputs.
To allow neurons to autonomously determine whether they are additive or multiplicative, we propose a parameterisable transfer function based on the fractionally iterated exponential function generated from a solution to Schröder’s functional equation. This class of transfer functions allows to continuously interpolate the operation a neuron performs between addition and multiplication. Since it is also differentiable, the operation can be determined using standard backpropagation training for neural networks.
So far the mathematical theory has been established (Urban & van der Smagt, 2015) and an implementation effort is currently being made. Next steps will include testing of this novel transfer function on regression networks. | <urn:uuid:d68b2a07-0f55-4cf1-a5ed-bf36206d55e0> | CC-MAIN-2018-22 | https://brml.org/projects/machine-learning-ml/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868248.78/warc/CC-MAIN-20180527111631-20180527131631-00546.warc.gz | en | 0.905751 | 666 | 2.515625 | 3 |
Whether we want to admit it or not, many of us give our fur babies human food. Whether we’re snacking and just want to give them with a treat or if we’ve just finished dinner and there’s one bite left on the plate, there are always plenty of opportunities for our pups to get an extra “treat” during the day.
So which foods are safe for dogs and which foods are not? Before giving your dog that special snack, read on and learn which common foods are safe and which ones can lead to health issues.
CHERRIES – Overall, cherries are not safe for dogs. The main danger of cherries is that the stems, leaves, and pits all contain cyanide. Although one cherry pit won’t cause cyanide poisoning, it can pose a choking hazard, as they can get lodged in the digestive tract and cause intestinal blockages. What about maraschino cherries which have already had the pit removed? Maraschino cherries may not have pits, but they are loaded with extra sugar, which is also unhealthy for your dog.
CUCUMBERS – Cucumbers are safe for dogs to eat and many dogs love them as a low-calorie snack. The average dog biscuit contains 40 calories, whereas a half cup of cucumber slices only contains eight calories and is very low in fat and sodium. The only issues to watch for with cucumbers are choking and over-eating. To prevent choking hazards, always cut food down into manageable sized pieces, especially with smaller dogs. Also, over-eating can be an issue with any food since it can cause gastrointestinal issues. Always feed in moderation.
BREAD – In general, yes…bread is safe for dogs. Bread is perfectly safe as long as it’s in moderation. Feeding your dog bread as a treat is fine now and then, as long as he is also fed a complete and balanced diet and gets plenty of exercise. Bread is a “filler food” as it is loaded with carbohydrates. Too many snacks loaded with carbs, like bread, can put your pup on the road to obesity if you are not careful. Also, it is important to avoid bread other than plain white or wheat. Many breads contain extra ingredients like raisins, nuts, and seeds…many of which are unsafe for dogs.
MUSHROOMS – Mushrooms are a complicated food. They are a staple in many dishes, but I’m sure you’ve heard stories about mushroom foraging gone wrong. Most mushrooms are edible, but the few varieties that are toxic are VERY toxic. As far as store-bought mushrooms, they are completely safe. But in most instances, we prepare them with different oils and spices which can be very upsetting for a dog’s digestive system. Although plain, raw mushrooms are safe for dogs, they aren’t a necessary or beneficial part of their diet. Instead, consider a healthier snack like a carrot stick or apple slice.
PEANUT BUTTER – You already know that peanut butter drives dogs crazy. Most dogs love this nutty treat. In moderation, peanut butter is not only safe for dogs but provides protein, healthy fat, and a number of vitamins and minerals. But it’s important to purchase all-natural peanut butter that doesn’t have added sodium and sugar…or make it yourself at home. Added sodium and sugar can be detrimental to your dog’s health. Some peanut butter also contains an artificial sweetener called Xylitol which is very toxic to dogs.
PICKLES – Are pickles safe for dogs? The short answer is yes. But there are considerations to be taken when it comes to pickles. As we know, pickles are just preserved cucumbers. And although cucumbers are a healthy snack, pickles are very high in sodium. Also, depending on what ingredients they are pickled with, could contain ingredients such as garlic and onions which could upset your dog’s digestive tract. Although technically, pickles are safe for dogs in moderation, it’s advisable to shy away from them and choose a healthier option instead.
CORN – Corn is not only safe for dogs but (depending on the type of corn) can be nutritionally beneficial as it contains protein, fiber, vitamins, linoleic acid, and antioxidants. If you give your dog corn, remember two things. First, feed corn in moderation. Just like any food that’s high in starch/carbohydrates, over-eating can lead to health issues. Second, NEVER feed your pup corn on the cob. The cob can cause serious internal blockages if ingested.
ALMONDS – Tree nuts are an “iffy” food when it comes to dogs. Many nuts are safe, but many are not. If in doubt, it’s always best to just avoid them entirely. Dogs don’t digest almonds very well. This can lead to gastrointestinal distress. Almonds also pose the risk of obstruction. Because they can't be chewed as easily as softer nuts, they can cause blockages in the esophagus, intestines, or even the windpipe. If your dog happens to ingest an almond or two, it’s probably not a huge issue. You’ll just need to monitor him for signs of distress. If your dog were to eat an entire package, on the other hand, you should seek professional advice from your vet.
AVOCADO – Avocados contain persin, which can cause, heart failure or even death. Although persin is most highly concentrated in the leaves of the plant, it is also present in the pit, stem and in the fruit itself. All parts of the plant can cause vomiting and diarrhea at the least. As with any foods that are toxic to dogs, one bite will probably not cause them harm. If your dog has ingested any avocado make sure to monitor his health closely. Another huge danger concerning avocados is the pit. The pit can be swallowed and cause internal blockages. It’s wise to not only avoid feeding avocado to your dog but also keep them out of their reach.
Although there are many human foods that are toxic to dogs, there are also many that are not only healthy but can be part of a balanced, raw food diet. Whether it’s part of a meal or just as a treat, we want to make sure that the foods we feed our dogs are not only safe but of the highest nutritional value possible.
My dogs have given me an entirely new spiritual perspective on life. I now have a genuine understanding of unconditional love and provision. | <urn:uuid:afc1521f-7790-4e5b-89b9-16b01b165e2a> | CC-MAIN-2018-43 | http://www.earthwisepetliberty.com/blog/human-foods-and-your-dog-some-dos-and-donts | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511703.70/warc/CC-MAIN-20181018042951-20181018064451-00012.warc.gz | en | 0.96206 | 1,386 | 2.671875 | 3 |
The Arb, as it is known among birders, is the place to find Northern Saw-whet Owls in northern Illinois in the winter. It also contains premier habitat in the state for White-winged and Red Crossbills during invasion years. And it’s consistently the best place to find Red-breasted Nuthatches. Woodpeckers, including Yellow-bellied Sapsucker, and Eastern Bluebirds are fairly common during the winter.
Spring is the best time to bird the area; as many as 20 species of warbler can be seen in a day. The highlight is the Yellow-throated Warbler, which stays to breed. As recently as seven years ago, it was the toughest warbler to get in DuPage County. Today, a typical spring bird count tallies five to seven singing males on territory. Most stay into late July.
The arboretum has a large population of Eastern Bluebirds, thanks to an extensive nest-box program, and birds of southern affinity occasionally spend the summer. Summer Tanager, Hooded Warbler, and Acadian Flycatcher have been found on territory in June. In addition, northern breeders like Golden-crowned Kinglet, Pine Siskin, and Red-breasted Nuthatch have nested near Hemlock Hill.
Fall can be great for berry-eating birds. Viburnums and ornamental plantings attract thrushes, vireos, robins, and waxwings. State rarities such as Bohemian Waxwing and Townsend’s Solitaire have been found in mixed flocks. One of my most memorable experiences came in mid-September, when my wife and I counted 400 Swainson’s Thrushes and 500 Red-eyed Vireos in a grove of arrowwood viburnums. — Jeff Chapman
Oak savannah, mixed woodland, prairie, conifer woodland, and plants from around the world.
Mostly flat. Wood-chip trails meander throughout. Asphalt trails are wheelchair-accessible.
Wintering Northern Saw-whet Owls and winter finches, especially crossbills. Breeding Yellow-throated Warblers, Eastern Bluebirds, and occasionally Golden-crowned Kinglets. Migrating warblers, vireos, and flycatchers can be abundant. Rarities: Townsend’s Solitaire, Western Kingbird, Bohemian Waxwing, Hermit Warbler.
When to go
Spring and fall migrations are best. One hundred species can be seen in spring. Winter can be good, especially when finches invade.
Visitor center with restaurant, store, and information area. Restrooms at all buildings, as well as at various parking areas. Arboretum map available from guard shack upon entry.
Nonprofit arboretum. Grounds open from 7 to 7 or sunset. Admission: adults $9, seniors $8, youth $6, children 2 and under and members free.
Best areas to bird east of Rte. 53: Pine Family Collection in winter, main trail loops in migration, Main Trail Loop 4 in summer. Best areas west of Rte. 53: Joy Path in migration and winter, Hemlock Hill in winter, Parking Area 23 and Pine Hill in migration and summer. Parking Areas 2, 23, and 25 are best for Yellow-throated Warbler.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website. | <urn:uuid:879ceb30-a821-4422-b1bd-527bf5d761ab> | CC-MAIN-2019-35 | https://www.birdwatchingdaily.com/hotspots/26-morton-arboretum-lisle-illinois/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315809.69/warc/CC-MAIN-20190821043107-20190821065107-00222.warc.gz | en | 0.94414 | 802 | 2.5625 | 3 |
Read Across America is a program that promotes early literacy for all children. It is sponsored by the National Education Association. The literacy celebration, thus far, always corresponds with Dr. Seuss’ birthday. The program began as a way to pay homage to Theodor Seuss Geisel, aka “Dr. Seuss”. March 2nd is Dr. Seuss’ birthday. Although the Read Across America event is one day, many teachers and schools have turned it into a week-long celebration. It will be recognized on Friday, March 1st this year.
Well…. this is where all of the delightfulness ends!
As you know, I love all things literacy. I looked forward to Dr. Seuss’ birthday every single year. Not was I simply celebrating my love of reading with my students, I was also celebrating Theodor Seuss Geisel. I was absolutely blind-sighted when I learned that my beloved author-illustrator was racist and full of hate.
Reflecting, I should have known that someone that didn’t like children probably wasn’t the nicest person. It’s one thing not to want to have children of your own. It is an entirely different beast to simply not like them- Ever! As a teacher, I might not like my children after a week of indoor recess. That is perfectly normal and acceptable. In general, I like them. Right??
Let me begin by telling you how much I LOVED and adored Dr. Seuss! I mean L-O-V-E-D Dr. Seuss. I didn’t love all of his books, but I had several favorites. Dr. Seuss tees lined my closet, I had two Cat in the Hat hats, and two Cat in the Hat plush toys. I even created a biographical resource in my Teachers Pay Teachers store several years ago in his honor. Just in case you missed it, I LOVED Dr. Seuss. To be honest, I only liked a handful of his books, and have not read them all. But, what I liked, I really liked.
Heartache and Horror
Fast forward to approximately two years ago when I learned that Dr. Seuss was racist. This was right before
Devastation isn’t even close enough. My children learned how to read from several of his books. My African American children learned how to read from his writings. As an educator, I had exposed all of my students to this person during
My sweet parents joyously obliged. Their kids were reading and loving every minute of it! Honestly, for that I am grateful. In spite of the horrid things that I learned, I still know that his books have encouraged countless numbers of children to read.
Turning Lemons Into Lemonade
Fast forward to today, with Read Across America Week looming in the hills. I have decided to literally “read across America”. There will be no mention of Dr. Seuss in my classroom (by me). Instead, I will focus on books that celebrate the beauty of differences! I was inspired by this Instagram post. I saw it on the Multicultural Classroom’s IG page and was blown away by the idea!
View this post on Instagram
I absolutely love this idea from @themulticulturalclassroom! I’m in! 🙌🏾💕. Are you in, too? ・・・ This year for Read Across America week, I’m challenging you to truly “Read Across America”. What makes our country so beautiful is how diverse we all are. Let’s celebrate it by reading books that represent all children! So, I am challenging you instead of reading Dr. Seuss this year, provide your students with “windows” and “mirrors” and read some high quality diverse books during Read Across America week. If you are looking for suggestions of books you should follow these accounts: @weneeddiversebooks @diversereads @hereweeread #diversebooks #bookstagram #books #readacrossamerica #representationmatters #teachmet #teachmettoppicks #culturallyresponsivebooks #openupwindowsofwonders
What This Might Look Like in Your Classroom
You don’t need to spend a great deal of money to bring Read Across America Week to life in your classroom! Take inventory of what you already have. Or, you can explore the vastness of your school or local library. Your options are limitless. All you need is one book a day. Create as many activities to support your book choice- write a poem, create a class mural, write a letter, illustrate your favorite part of the story, write about your least favorite part of the story, find the main idea and supporting details. Or, do as little additional activities as you like. Simply read the amazing books, if you like!
My friend, Vera of The Tutu Teacher, must have been reading my mind! She posted this suggestion for planning out your week of read-alouds for Read Across America Week. Feel free to go to this post on my IG (Instagram) feed and comment on any books that you would add. Click on this link for this post or for my Instagram page.
View this post on Instagram
@thetututeacher has created a wonderful, inclusive, and easy plan for book selections that we can be inspired by for Read Across America Week! ・・・ Swipe to see each day. These are only suggestions and feel free to add any of your own personal favorites to the list. Here’s how the week goes: Day 1: Read a book about immigration Day 2: Read a book about a Famous American Day 3: Read a silly story Day 4: Read a book about different cultures Day 5: Read a book you ❤️ I tried Are there any books you’d add to the list? #teachmet #readacrossamericaweek #knowmoredomore #teachingispolitical #representationmatters #windowsandmirrorsinliteracy #diversereads
Bring It Even Closer to Home
I also had this idea for ways to truly celebrate the beauty of America and all of our differences. What about featuring local authors?? A quick Google search or visit to your local library should reveal authors in your area or state. See if you can find one of their resources online or at the library and share that with your students. Perhaps you can contact that person and invite them to your school to read the book aloud to your students! They would absolutely love that. You could really bring the book to life this way.
What are your thoughts? Is this an idea that you can embrace and dive into for Read Across America Week?
I would love to hear your plans for bringing diverse children’s literature to life during this week of literacy celebrations. Leave a comment to let me know what books you have chosen to share with your students.
Photo Credits: National Education Association, Photos by Suad Kamardeen, Josh Applegate, and Debby Hudson | <urn:uuid:213a8399-3c2c-494f-94dd-f1b8a614d868> | CC-MAIN-2020-16 | https://teachmet.com/2019/02/24/1-epic-way-to-celebrate-read-across-america-week/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371620338.63/warc/CC-MAIN-20200406070848-20200406101348-00499.warc.gz | en | 0.962296 | 1,488 | 2.625 | 3 |
MIT develops novel self-assembly method that could break size barrier,
Using a novel system based on molecules that can assemble themselves into precise patterns, MIT researchers have come up with a way of beating size limitations that would otherwise crimp improvements in data-storage media and electronic microchips.
Such self-assembling molecular systems, called block copolymers, have been known for many years, but the problem was that the regular patterns they produced were well-ordered only over very small areas. The MIT researchers found a way to combine this self-assembly with conventional lithographic chip-making technology, so that the lithographic patterns provide a set of "anchors" to hold the structure in place, while the self-assembling molecules fill in the fine detail between the anchors.
The work, carried out by three MIT professors and three graduate students, is being reported this week in the journal Science.
Karl Berggren, the Emanuel E. Landsman Associate Professor of Electrical Engineering in MIT's Department of Electrical Engineering and Computer Science, explains that without the lithographed "pillars" to anchor the pattern, the self-assembling molecules "would be a mess of randomly arranged lattices." But with the pillars, "the block copolymer lattice is sort of fooled by these pillars, and forms its array around them. They form a nice, ordered pattern around the pillars."
Edwin L. Thomas, Morris Cohen Professor of Materials Science and Engineering and head of the department, who is also a co-author of the paper, says that the original inspiration came from a graduate student, Ion Bita, who now works for Qualcomm in California. Bita explains that "by properly choosing the spatial distribution of the pillars to match a desired final structure, it was possible to consistently generate defect-free polymer nanostructures."
The molecules themselves are made from a pair of polymer chains that are bonded together. The chains are chemically different, like oil and water, and do not mix. As a result, when spread on a surface they naturally separate into an orderly array, forming a pattern of tiny balls, each about 20 nanometers across. By using similar molecules with shorter chains, the resulting structures could be made even smaller, says Caroline Ross, Toyota Professor in MIT's Department of Materials Science and Engineering.
"Nature allows you to get these really well-ordered structures without doing much work," because of the way the molecules assemble themselves, Ross says. "It sort of magically forms these structures."
By changing the spacing of the pillars they create on the chip surface, the new method makes it possible to control the size and spacing of the overall pattern, Berggren says. The pillars themselves are placed on the surface using advanced high-resolution electron-beam lithography methods that have also been developed at MIT.
The most immediate application will be for improving the storage capacity of magnetic storage systems such as the hard disk drives used in computers, he says. For that application, the new method could be tested within the next year or two, he says. "The state of the industry in magnetic media is really ready for this," Berggren says. "They really need something right now."
In the future, by creating more complex patterns in the lithographic part of the process, entire computer chips could be made this way, says Ross. "The ultimate goal would be a complete self-assembling chip structure," she says. The lithographic step, instead of just a regular grid of dots as in the present system, could produce a more complex pattern of dots, lines and junctions, with the block copolymers then filling in the patterns between them.
"Ultimately, this is a technology that is very high-resolution and very scalable," Berggren says. It could also be used for other kinds of devices, including energy technology applications such as electrodes for fuel cells.
MIT graduate students Joel Yang and Yeon Sik Jung also worked on the project. It was funded by the National Science Foundation, the Semiconductor Research Corp., the Nanoelectronics Research Initiative, King Abdulaziz City for Science and Technology and Alfaisal University, and the Singapore-MIT Alliance. | <urn:uuid:5f4ac3cb-576c-4df9-9917-01454babc0ae> | CC-MAIN-2017-30 | http://24hoursnews.blogspot.com/2008/08/building-microchips-from-bottom-up.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424559.25/warc/CC-MAIN-20170723122722-20170723142722-00599.warc.gz | en | 0.955209 | 854 | 3.609375 | 4 |
As I pointed out in my previous blog post, when a lawyer uses storytelling effectively at trial, he or she is literally eliciting a reaction from the brain areas and the neurochemicals that are the basis of any human being’s foundation for biological survival.
Storytelling, in fact, serves the biological function of encouraging pro-social behavior. Effective stories reinforce the concepts that if we are honest and play by the right rules, we reap the rewards of the protagonist, and that if we break the rules, we earn the punishment accorded the bad guy. Stories are evolutionary innovations: They help humans remember socially important things and use that information in their lives.
To impact an audience such as a jury, a story must do three things: (1) emotionally transport the audience by moving them and having them get “lost” in it; (2) include characters facing problems and trying to overcome them, but not engaging in mere meaningless problem solving; and (3) communicate some message or moral, meaning some set of values or ideas. Otherwise, the story will seem “empty” and not important enough to pay attention to.
There are several guidelines to help you turn your evidence into a story worth telling. The essential elements you need to provide are:
- Theme(s) of your case
- Compelling characters (good/bad)
In order to figure out these elements in a lawsuit setting, the first and critical question to ask and answer is: “What really happened here?”
The most common mistake is that litigators don’t bother to ask the question, or they answer it with how it (whatever “it” is) happened. Rattling off a series of events – but not the bottom line of what happened - is disastrous to connecting with jurors and telling a compelling story about your client. As a litigator, you must ask yourself “Why must you tell THIS story?” and “What’s the belief burning within you that your story feeds off?”
Other questions that will lead to the real story are:
“Why did they do that?”
“What were they thinking and feeling?”
“What did they know or not know?”
“What were their options and choices?”
“What were they each trying to accomplish?”
“Why did they succeed or fail?”
“How did that affect everyone involved?”
“Who tried to correct it? Did it work? Why or why not?”
“How did the story end? Who won or lost?”
“What caused the problem to become a lawsuit?”
“What would make it right?”
“Why is that fair?”
“Why should anyone care about what happened?”
These are the questions that the first-chair litigator and the entire trial team should brainstorm in developing the most persuasive way to present their case. When I consult for or with trial teams, these are the types of questions I ask and insist the first chair can answer.
Finally, these rules of thumb should be followed in developing an effective trial story:
- The simpler the story, the better.
- The simpler the language, the better.
- Use metaphors involving sensory descriptions.
- Reduce the facts to a relatable story.
- Use word pictures.
With the basics of storytelling and its importance to courtroom persuasion in mind, we must also consider how to develop a complete package of storytelling presentation. This complete package is not just the oral telling of a story, but must be accompanied by visual support. We will discuss that next.
Other A2L Consulting resources related to storytelling and persuasion at trial:
- Storytelling Proven to be Scientifically More Persuasive
- Storytelling at Trial - Will Your Story Be Used?
- Planning For Courtroom Persuasion? Use a Two-Track Trial Strategy
- WATCH: Storytelling for Litigators Webinar
- DOWNLOAD: Storytelling for Litigators E-Book
- WATCH: Using PowerPoint Litigation Graphics for the Win
- How To Emotionally Move Your Audience
- 10 Videos to Help Litigators Become Better at Storytelling
- Are You Smarter Than a Soap Opera Writer?
- Good-Looking Graphic Design ≠ Good-Working Visual Persuasion
- Don't Be Just Another Timeline Trial Lawyer
- 20 Great Courtroom Storytelling Articles from Trial Experts
- Portray Your Client As a Hero in 17 Easy Storytelling Steps
- No Story, No Glory: Closing Arguments that Don't Close Loops
- 5 Keys to Telling a Compelling Story in the Courtroom
- Patent Litigation Graphics + Storytelling Proven Effective: The Apple v. Samsung Jury Speaks | <urn:uuid:acc97044-1b2b-4cce-af0e-ba8d6d4aba04> | CC-MAIN-2019-39 | http://www.a2lc.com/blog/bid/72438/5-Essential-Elements-of-Storytelling-and-Persuasion | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514576047.85/warc/CC-MAIN-20190923043830-20190923065830-00323.warc.gz | en | 0.933501 | 1,013 | 2.609375 | 3 |
No products in the cart.
Observations of a Female North Atlantic Right Whale (Eubalaena glacialis) in Simultaneous Copulation with Two Males: Supporting Evidence for Sperm Competition
Abstract: Given the huge size of their testes (approximately 1,000 kg), it has been hypothesized that North Atlantic right whales (Eubalaena glacialis) have a mating system that is based upon sperm competition. Herein, we report an observation which provides support for this hypothesis. On 11 August 2000 in the Bay of Fundy in Canada, a mature female right whale was observed copulating simultaneously with two mature males. The female made no attempt to resist copulation. For anatomical reasons, double copulation would be difficult or impossible in most mammals; however, it is quite feasible in right whales, and the fact that it actually occurs provides strong support for the belief that females of this species promote sperm competition as a mating strategy.
Key Words: NORTH ATLANTIC RIGHT WHALE; EUBALAENA GLACIALIS; MATING SYSTEM; MATING STRATEGIES; SPERM COMPETITION
Document Type: Research article
Page Numbers: 157 – 160 | <urn:uuid:f3149fa6-6bc0-4492-b597-81aecd68d8c9> | CC-MAIN-2023-40 | https://www.aquaticmammalsjournal.org/observations-of-a-female-north-atlantic-right-whale-eubalaena-glacialis-in-simultaneous-copulation-with-two-males-supporting-evidence-for-sperm-competition/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00335.warc.gz | en | 0.905545 | 264 | 2.953125 | 3 |
WAYS TO COOL YOUR GREENHOUSE
There are multiple ways to heat your greenhouse; but a lot will depend on your budget. This post is meant to help out the backyard gardeners; those of us who can’t afford the big fancy cooling systems that are used in commercial greenhouses.
Being in New Jersey, we often get very cold winters and very hot summers; often to the extreme, so we had to prepare for both seasons. Below are things we do to help keep our greenhouse cooler in the winter:
Ways to Cool Fish In Aquaponic Systems:
If you have an Aquaponics garden or just have fish in your greenhouse, you will need to keep them cool as well. Below are some of
- I learned that because of the nature of Aquaponics whereby the water flows from the fish tank to the grow beds, into a sump tank then is pumped back to the tank; the water cools down a bit on it’s own. Not so good in the winter, but it does help in the summer. 🙂
- Clean out, then fill large 2 liter empty soda bottles 3/4 of the way up with water. Place them in plastic shopping bags and freeze them. Throw them into the fish tank to slowly cool down the water as the ice melts inside the container. When they’ve melted, rinse them off really well and let dry; then place into plastic bags and refreeze.
- We loose quite a bit of water to evaporation; In addition, when I’m in the greenhouse I will take water from the fish tank and go around watering my plants. This usually uses up quite a bit of water, and provides room for me to run fresh water into the fish tank, equating to a water change every other day if not every day. Having well water also helps cool down the fish tank.
- Make sure you position your fans all pointing one way in the house. Ours goes from front to back. Somewhere I have a great article that explains how to position them and why… once I find it I will add it to this post.
Tips For Cooling Down the Greenhouse:
Ventilate the Greenhouse:
Plants can begin to show signs of suffer when the temperatures reach 85 degrees (F).
- Providing your plants with a decent flow-through of air is probably the most beneficial thing you can do for them in the heat.
- While it is still relatively cooler in the early morning, it helps to keep open the windows to help keep the cross-ventilation going; in our house, we run fans staggered from the front to the back; all facing one way, towards the back of the house. We also have a box fan in the front window of the house, pulling fresh air in. This setup pulls the fresh air into the greenhouse then pushes it to the back where the exhaust fans pull out the air to the back of the house.
- My fans are automatically set to run all day and a couple of times during the night.
Check the Air Flow in Your Greenhouse...
The air should travel from one end of the green house and out the other for optimal cooling and ventilation to help prevent mold from growing.
Cover the greenhouse with a shade cloth...
Not until after you buy and set up a good shade cloth on your greenhouse will you realize what a difference they make!
Make sure you get the right density of shade cloth; we bought 40%, meaning that 40% of the UV light is blocked from entering the greenhouse. This is enough light for the plants to grow, yet it made a huge difference with the heat.
Keep your plants well watered..
Plants do much better in the heat when they have plenty of moisture on their roots.
Most of my plants are in self-watering containers which keep their roots damp but not soaked. When the water is used up, a floating valve lets more water in until the reservoir of water beneath the plants are full again. Excess runs out of a strategically placed drain hole so roots won’t rot.
Adding moisture to the air will help your plants as well. The leaves lose moisture through their pores to help cool down the leaf surface, a lot like when we sweat; which is why you need to provide your plant with more water from the base to soak up.
Add moisture so it evaporates...
Add humidity to the inside of your greenhouse. This can be done by running a misting system in the walk-ways or paths in your greenhouse.
You should mist your plants themselves in the early morning. This will allow their leaves to dry out during the day, avoiding mold from growing on the plant.
I also hose down the floor (which is covered by black plastic landscaping cloth) which accomplishes two things 1)I hose any dirt to the back of the greenhouse where I let it dry up then sweep up to clean the floor, and 2)it helps cool down the entire greenhouse. When the sun and heat hits your greenhouse, the physical process of the water evaporating off of the floor lowers the temperature. This is the concept behind Swamp Coolers.
Add a Swamp Cooler to your greenhouse..
Depending on the level of humidity in your area, by way of evaporation, Swamp coolers are said to cool down a very dry area as much as 25-30 degrees!
As you might expect, the size of the swamp cooler depends on the size of your greenhouse.
I have seen them coming down in price at some garden centers; and I have also seen DIY projects where you can make one yourself.
Watch my BLOG posts as these are two topics on my list to Blog about in the future! | <urn:uuid:948d0a3f-b42a-48c1-9048-7e724d8299af> | CC-MAIN-2021-43 | https://gailsaquaponicgarden.com/ways-to-cool-your-greenhouse | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585381.88/warc/CC-MAIN-20211021040342-20211021070342-00268.warc.gz | en | 0.948382 | 1,181 | 2.640625 | 3 |
How does CPU work?
The central processing unit of a computer processes instructions, performs calculations and manages the flow of information through a system. It turns raw data into information through the use of its two parts: the control unit and the arithmatic logic unit (ALU). As the names suggest, the control unit coordinates all the other components and the ALU does all of the arithmatic (addition, subtraction, multiplication and division), and makes all the logic and comparison decisions. The steps involved in a CPU's function are to fetch data from RAM, decode it into language that the CPU can understand, execute the instructions given by the data and store the results to RAM before restarting the pattern. This system of steps is called a machine cycle.
How does a hard disk work?
A hard disk or hard drive is made of a pile of round, thin plates of metal called platters. To save data, magnetized spots are created on the coating representing binary digits and therefore information. The coating on the disks allow them to be written on both sides, adding to the amount of data that can be stored. The coatings are written in a process called low-level formatting, inscribing concentric circles called tracks and pie-shaped wedges called sectors. This helps the computer to organize the files . High-level formatting creates the table that helps the computer to keep track of which files are stored where. The platters spin very quickly and special "arms" called read-write heads move across directly above them like the arm of a record-player.
How can I determine whether I should upgrade my computer or buy a new one?
After determining what you need from a computer and deciding that your computer does not meet those standards, you must figure out how much it would cost to buy a new system with the needed components and how much it would cost to upgrade the current system to what is needed. In some cases a computer with the needed specifications may not exist, and may have to be custom-built, significantly adding to the price. Upgrades to the CPU, operating system, RAM, hard drive, solid state drive, CD, DVD, or blu-ray burner, video card and sound card can be considered.
How can I improve the reliability of my system?
If your system often crashes, check that you have enough RAM, make sure new software or hardware is properly installed or try "rolling back" to a previous restore point using the System Restore utility in Windows or Time Machine in Mac. Tto improve reliability you can also upgrade to the latest software products. Often software patches and upgrades fix "bugs". You can also use the problem steps recorder to capture the exact steps of the problem in order to learn more about it, or try reinstalling or upgrading the operating system.
What is access time? What is clock speed?
Access time is how long it takes a storage device to locate its stored data and make it available for processing. It is usually measured in milliseconds. It is mostly composed of two factors: seek time and latency. Seek time is how long it takes for the read/write heads to move over the surface of the disk. Latency is the time the read/write head has to wait for the right part of the platter to spin into the correct place. The faster the spin, the shorter these two periods will be. Clock speed is how many instructions the CPU can finish processing in one second.
f. What is data transfer rate?
Data transfer rate is the maximum speed at which data can be transmitted between two nodes on a network. It is usually measured in megabits per sonced (Mbps).
What is read/write head?
The read/write head is the end of an "arm" in the hard drive that moves across a platter like the arm of a record player but much faster. It retrieves and records the magnetic data stored on the platter.
What is a computer network? What are the benefits of a computer network?
A computer network is two or more computers that are connected via software and hardware so they can communicate with each other. The benefits of a computer network include sharing resources like internet connections and peripheral devices like printers. It also helps to share files easily and wirelessly between computers.
Compare peer-to-peer networks and client/server networks
A peer-to-peer (P2P) network is one where all computers are equal, and can perform their own tasks. They are common for small setups. Larger setups usually use a client/server network, where there are two types of computers. Client computers are the ones that are actually used for specific tasks, like writing papers and printing. The server computer provides resources to the client computers, and is the administrator of the network. Often, the client computers send a request to print a file to the server computers, and the servers actually signal the printing. Internet service providers are an example of a client/server network. They are the server, turning a basic computer into a client while surfing the internet.
What does HAN stand for? LAN? WAN? MAN?
- HAN means home area network. LAN means local area network
- WAN means wide area network
- MAN means metropolitan area network
List three network components.
1. A means of connecting the nodes on the network (cables or wireless), such as radio waves for wireless and twisted-pair cable, coaxial cable or fiber-optic cable for wired. This is called transmission media. 2. Special devices that allow nodes to communicate with each other and send data, such as a network interface card. These are called network adapters. 3. Software that allows the network to run, such as an operating system that supports P2P networking or a special network operating system (NOS) for a client/server network.
What is wireless access point?
A wireless access point allows wireless devices to connect to a wired network using Wi-Fi. It usually connects via a router (or is a router).
What is bandwidth?
Bandwidth, aka data transfer rate, is the maximum speed at which data can be transmitted between two nodes on a network. It is usually measured in megabits per second (Mbps).
What is Wi-Fi?
Wi-Fi stands for wireless fidelity. It is a standard for wireless transmissions using radio waves and is used to connect computers to wireless networks or the internet.
What is firewall? What is firmware?
A firewall is a software program or hardware device designed to prevent unauthorized access to computers or networks. Firmware is system software that controls hardware devices.
What are the advantages of a digital format?
Digital formats turn pictures and sounds into a long string of numbers, which makes it much simpler to reproduce the exact sound and light wave the same way every time. It is also easier to distribute, like in streaming or attaching to an email or Facebook message and sending over the internet.
What is cell/smartphone synchronization?
Cell/smartphone synchronization is the process of updating data so that the files on the cell/smartphone and those on the computer are the same. This allows you to keep things like to-do lists updated.
Briefly explain 3G and 4G.
3G and 4G are standards of fast data transfer. 3G is available almost everywhere, not requiring a hotspot to use, and speeds up mobile transfer rates between 0.6 and 2.3 Mbps. 4G is the newer incarnation, available in fewer places, but capable of speeds up to 100 Mbps. Most service providers are not yet capable of providing 4G.
What is voice over Internet protocol?
Voice over Internet Protocol is a technology that facilitates making telephone calls across the internet instead of using conventional telephone lines.
How do cell/smartphone components resemble a traditional computer, and how do they work?
A cell/smartphone, like a regular computer, has a central processor, memory and an operating system. These components work the same way in a computer as they do in a smartphone to process information and support communications, software applications and other services.
What change does ubiquitous computing bring to our lifestyles?
The inclusion of computer devices in our everyday lifestyle is referred to as ubiquitous computing. As computers become smaller it becomes increasingly easier to include them in our everyday life. Most automobile keys now come with an embedded computer inside. I have seen kitchen appliances and even clothing that uses computing technology. Mostly this is useful in streamlining; devices are being created that can do multiple jobs and defeat the need for so many devices.
What are computer viruses? List their types.
- Computer viruses are programs that attach themselves to other computer programs and attempts to spread when files are exchanged. Their classifications are polymorphic, multipartite and stealth.
- Boot-Sector Viruses
- Logic Bombs and Time Bombs
- Worms (some argue that these are not viruses because of their reproduction technique)
- Script viruses
- Macro viruses
- Email viruses
- Encryption viruses
Who are hackers? List their types.
- A hacker is someone who breaks into computer systems to create mischief or steal valuable information.
- White-hat hackers
- Black-hat hackers
- Grey-hat hackers
What does DoS stand for? DDoS?
- DoS stands for denial-of-service attack, which happens when a hacker is tying up the resources of a network and deny legitimate users access.
- DDos is distributed denial of service attack, which is an automated attack launched from more than one zombie (hacker-controlled) computer at the same time.
What is Bluesnarfing? Bluebugging?
Bluesnarfing is unauthorized access of information from a wireless device through a Bluetooth connection. Bluebugging is a technique not unlike phone-eavesdropping (“bugging”), but done by hackers on bluetooth devices, accessing mobile commands covertly and listening in to phone calls. It is very much like bluesnarfing but a bluebugger must be closer to the target.
Compare adware and spyware.
Adware is a program that downloads on your computer when you install a freeware program. It enables sponsored advertisements to appear in the browser or as a pop-up. Spyware is an unwanted piggyback program that also downloads with software but then runs in the background of your system.
Compare SPAM and SPIM.
SPAM is unwanted junk email. SPIM are unwanted instant messages.
What are cookies in computer term?
A cookie is a small text file that some Web sites automatically store on a client computer’s hard drive when the client visits the site.
What is phishing and what is pharming?
- Phishing is the process of sending email messages to lure Internet users into revealing personal information that could lead to identity theft.
- Pharming is planting malicious code on a computer that alters the ability of the browser to find web addresses and sends the user to bogus web sites.
What can I do to protect my computer from viruses?
Short of never interacting with any other computers or networks, up-to-date antivirus software is the best defense against viruses. Complete virus checks should be run at least once a week.
How do I create secure passwords and manage all of my passwords?
Secure passwords contain a mixture of upper and lower case letters, numbers and symbols and are at least 14 characters long. They should not contain easy-to-guess information, like your birthday or your pet’s name. Online password checkers can evaluate the strength of your password. Web browsers and internet security software contain features that manage passwords for you, preventing you from having to memorize multiple complex passwords.
What is a Trojan horse and what is a worm?
A Trojan horse is a computer program that appears to be something useful but does something malicious in the background without the user’s knowledge. A worm is a program that attempts to travel between systems through network connections to spread infection. They can run independently of host file execution and are active in spreading themselves. | <urn:uuid:8fa48ab9-dd97-402f-8d74-7e02b24240e9> | CC-MAIN-2021-17 | https://freezingblue.com/flashcards/217372/preview/final-exam | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038507477.62/warc/CC-MAIN-20210418163541-20210418193541-00216.warc.gz | en | 0.936494 | 2,492 | 3.625 | 4 |
Forum—Winning the Weevil War: Beating a $22 Billion Bug
The Agricultural Research Service's mission is to solve agricultural problems of national and regional importance. Research that is helping vanquish the boll weevil certainly fulfills that charge. Problems don't come much bigger than the boll weevil.
One of the top two or three insect pests that the United States has ever had to deal with, the boll weevil has been a major economic and environmental catastrophe, especially in the South. This pest has laid waste to cotton for more than 100 years, forcing growers either to abandon the crop or to use large quantities of insecticides in a constant and often losing battle to produce a profit.
Where the boll weevil made cotton growing untenable, the economic ripple was often devastating. Many experts name the boll weevil as second only to the Civil War as an agent of change in the South. Over the years, boll weevil damage has totaled more than $22 billion in yield losses and control costs.
Now, for the first time since the boll weevil entered the United States in 1892, the end of the problem is in sight. By 2006, it is entirely possible that boll weevil management will consist of keeping the insect out of the country instead of controlling its damage.
It has taken a team effort to reach this point.
USDA's Animal and Plant Health Inspection Service (APHIS) is the lead agency of the boll weevil eradication program. But no one agency or institution could ever tackle a problem this big alone. We are talking about more than 15 million cotton-growing acres in 17 states and an insect that has been enormously difficult to control. ARS has the responsibility to provide research and technical support to the program.
Before an eradication program begins in their region, growers must vote in favor of it, and they pay for 70 percent of the program with an assessment on their cotton acreage. The remaining funds come from state and federal dollars.
The National Cotton Council of America and other industry groups have championed the cause of boll weevil eradication. And the states and their cooperative extension services have worked tirelessly. But it is research by ARS and others, including many universities and state experiment stations, that has laid the foundation on which this eradication has been built.
For eradication to be feasible, scientists first had to develop an understanding of the pest's biology to be able to create effective, efficient control methods. Once the basic work was done, it has been a continuing research cycle to improve and more tightly target control techniques. Many of the major milestones in developing control strategies have come from ARS laboratories. And it was ARS scientists who put all the research together to create the model for areawide boll weevil eradication.
When the first full-scale eradication trial began in 1978 in southern Virginia and northern North Carolina, three ARS scientists moved to Raleigh from the ARS Boll Weevil Laboratory in Starkville, Mississippi, to provide research support to make the program work. A modular building was built on the North Carolina State University campus to house both the ARS scientists and the APHIS personnel who conducted the program.
ARS has continued to respond to new challenges as eradication progressed. But identifying research needs has been done cooperatively by all groups involved in the effort.
Today, all cotton-growing states have eradication programs.
Boll weevil eradication has been a truly model program, in terms of both eliminating the pest and exemplifying successful public-private cooperation.
Benefits from boll weevil eradication are staggering. Cotton production has already increased by hundreds of thousands of acres in states where the crop had nearly disappeared.
Where this pest is eliminated, growers typically experience an increase in cotton yield of up to 10 percent—more in some areas. Moreover, resurgence of beneficial insects preying on other cotton pests further reduces the need for pesticides, resulting in additional cost savings.
The public is also benefiting—from the preservation of an important domestic crop. Today, the United States is second only to China in cotton production and is the leading exporter, accounting for 25 to 30 percent of global trade in raw cotton. The U.S. cotton industry accounts for more than $25 billion in products and services annually and generates over 400,000 jobs from farm to textile mill.
Beyond the economic benefit, eradicating the boll weevil means significantly less pesticide introduced into the environment. After the boll weevil is eradicated from an area, farmers generally reduce pesticide use by 40 to 90 percent.
Few programs tackling a problem this big can claim the level of success achieved by those involved in boll weevil eradication. Thanks to this program, the boll weevil may someday be as little known in the United States as screwworm and polio—historically interesting, but really just the domain of a few sentinels safeguarding against the return of a distant enemy.
Robert M. Faust
"Forum" was published in the February 2003 issue of Agricultural Research magazine. | <urn:uuid:c0ec98f5-0fc9-4bfc-9c5a-575f9b441ada> | CC-MAIN-2017-26 | https://agresearchmag.ars.usda.gov/2003/feb/form | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320040.36/warc/CC-MAIN-20170623082050-20170623102050-00050.warc.gz | en | 0.955804 | 1,047 | 2.90625 | 3 |
Before fighting broke out in 1991, Yugoslovia was a unified nation of republics.
After nearly four years of fighting, a peace plan preserves Bosnia as a single state but still divided into two separate republics -- the Bosnian-Croat Federation and the Bosnian Serb Republic.
NATO has since divided Bosnia into three main sectors, each dominated by one of the major allies. There's also an area of northwestern Bosnia controlled by NATO's Rapid Reaction Force.
The British sector, headquartered in Gornji Vakuf, is in northwestern Bosnia. Troops from Canada, Belgium and the Netherlands will also patrol here.
The French sector covers the southern part of the country. NATO contingents from Spain and Italy also will be part of this sector. The headquarters for this sector will be the capital, Sarajevo.
Under the Dayton agreement, Sarajevo's Serb and Muslim neighborhoods are to be reunified under Bosnian government control. Bosnian Serbs, who object to being governed by their war enemies, would prefer Sarajevo remain a divided city.
Troops from the United States and Russia are responsible for the U.S. sector in northeastern Bosnia. This area includes the disputed Posavina corridor, a narrow strip of land that Serbs now control. They want to hold on to it to link their territory to the east and west.
But the Bosnian government also needs the Posavina corridor for vital access to the Sava River. The issue was unresolved in the Dayton agreement and is due to be resolved by arbitration within one year. Headquarters for the U.S. sector is Tuzla.
Copyright © 1995 Cable News Network, Inc.
ALL RIGHTS RESERVED.
External sites are not endorsed by CNN Interactive | <urn:uuid:a64c6bcf-24af-4f89-ba75-ee0e0bfc0f25> | CC-MAIN-2018-05 | http://www.cnn.com/WORLD/Bosnia/mission_peace/maps/map1/map1.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887973.50/warc/CC-MAIN-20180119105358-20180119125358-00381.warc.gz | en | 0.965543 | 367 | 2.65625 | 3 |
Hematuria, or blood in the urine, isn't always visible. While gross hematuria describes noticeable blood in the urine, some people are not even aware they have microscopic hematuria until they see the doctor for another symptom or condition and have their urine tested.
In the case of gross hematuria, blood in the urine may make the liquid appear pink or reddish. Visible blood in the urine is cause to see a doctor right away. Unfortunately, microscopic hematuria can only be diagnosed through the microscopic study of urine; a lab technician will notice red blood cells in your sample.
This site offers information designed for educational purposes only. You should not rely on any information on this site as a substitute for professional medical advice, diagnosis, treatment, or as a substitute for, professional counseling care, advice, diagnosis, or treatment. If you have any concerns or questions about your health, you should always consult with a physician or other healthcare professional. | <urn:uuid:28469bde-448c-4829-ac99-b439fe671ab9> | CC-MAIN-2020-40 | https://facty.com/ailments/body/frequently-asked-questions-about-microscopic-hematuria/1/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401582033.88/warc/CC-MAIN-20200927215009-20200928005009-00716.warc.gz | en | 0.923694 | 197 | 2.640625 | 3 |
Hella Haasse: Heren van de thee (The Tea Lords)
Haasse’s best-known novel tells of a Dutch family who grew tea, coffee and quinine bark in the late nineteenth/early twentieth century in what was then known as the Dutch East Indies and is now called Indonesia. The focus of the story is Rudolf Kerkhoven. He is the eldest child of Rudolf Kerkhoven, who is a planter in the East Indies. (Rudolf Junior will call his first-born Rudolf, as well.) He has two younger brothers, August and Julius, and two younger sisters, Sophie and Cateau. At the start of the novel, Rudolf and his brothers are studying in the Netherlands, while the two sisters are in the East Indies with their parents. Rudolf is studying civil engineering, with a view to helping build roads and bridges around his parents’ estate. On completion of his studies, he hopes to go out to the Indies and be his parents’ manager, so he is somewhat upset when they appoint someone else before he gets there. When he does go there, he goes to work as the assistant to his uncle.
While on his Uncle Eduard’s estate, he soon learns about not only the problems of tea growing but the problems of dealing with the natives. When his uncle goes on holiday to the Netherlands, leaving Rudolf in charge, he wants to be a good employer but has to deal with local customs as well the local language. But it is Rudolf’s aim to manage his own estate and, eventually, he manages to get a lease on a now abandoned former government coffee estate. He cannot afford to buy the lease with his own money so he has to have two investors, his father and his brother-in-law. This will cause considerable trouble later on. We follow the story of his management of the estate of Gamboeng, till he first starts till he eventually leaves it, an old man, handing it over to his son.
It is not plain sailing. He wants to grow tea and does manage to do so but he also grows coffee and then grows cinchona trees, for their quinine. He develops an effective way of producing high quality quinine but others copy him and eventually there is a glut on the market. Conditions are hard and money short, given the fact that he does not own the entire property. Through his sister, he meets and marries Jenny and they have several children (and she has a miscarriage and a premature birth). While the agricultural developments are interesting, there is something of a soap opera with inter-family squabbles, partially over the share of his property, partially because his parents seem to favour the youngest son, August. There is an estrangement within the family which is never really healed. We only get glimpses of the opposition to Dutch rule, though there are a few rebellions and uprisings, though they do not seem to affect the Kerkhovens. The Aceh opposition is only mentioned in passing. (Annoyingly, the translator uses the Dutch spelling for various Indonesian words, such as Atjeh instead of the normal English Aceh, Soendanese instead of Sundanese and Krakatau instead of Krakatoa.) And, of course, there are family tragedies as well.
In the Acknowledgements, Haasse states that the story is based on fact, much of it taken from letters in the Indies Tea and Family Archive. Her novel is the story of the lives of the family, the rest being factual. We do see more famous real characters, in particularly one of the relatives of the Kerkhoven family, Douwes Dekker, better known as the author Multatuli whose book Max Havelaar exposed some of the abuses of the Dutch colonial system. But it is Haasse’s creation of the family and the way she brings them to life that makes this an interesting and worthwhile novel of colonialism.
First published in 1992 by Querido
First published in English in 2010 by Portobello | <urn:uuid:a36230c2-f9cc-42d2-9ceb-c1129dad4f57> | CC-MAIN-2022-49 | https://www.themodernnovel.org/europe/w-europe/netherlands/haasse/tea/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710719.4/warc/CC-MAIN-20221130024541-20221130054541-00434.warc.gz | en | 0.980198 | 854 | 2.625 | 3 |
Roman snails exclusively are plant eaters that may crawl amazing distances between resting places and feeding places.
On the search for food the Roman snail orientates by its tentacles. The large one sweeping the environment in a searching motion, give the snail an overview over its immediate surroundings. Sense cells, especially on the smaller tentacles search for promising traces of food smell.
It has been proved that Roman snails are able to find food in some distance and then directly crawl there. Limp food is generally preferred to fresh green plant parts.
Process of Eating
Like all molluscs the Roman snail as well uses a specialised organ to take in and process food. How a Roman snail uses it can best be seen, when it eats at the edge of a leaf. Then the snail can be observed pushing out its tongue and then pulling a piece of food into the mouth.
Only under a microscope it can be seen, that a snail's tongue in fact is a rasp tongue or radula, on which there are thousands of tiny little teeth in lateral rows. A tissue band armed with teeth moving over a gristle core is pulled through the food and so digs small particles from it, then transporting them into the gullet. In the rear part of the radula, new toothlets are formed, so those worn down can be replaced continuously.
Thanks to their radula, snails are among the few invertebrates that are able to grind their food before swallowing it.
Roman Snail while eating
- Picture: Weichtiere.at -
Microscope Admission of the
Radula of a Roman Snail | <urn:uuid:6a6bd9ea-25a1-4219-8130-12f26d2b4d4d> | CC-MAIN-2022-49 | https://escargots-schnecken.com/e/03schneck/food.php | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711200.6/warc/CC-MAIN-20221207153419-20221207183419-00777.warc.gz | en | 0.959185 | 343 | 3.9375 | 4 |
Rape and Domestic Violence: The law criminalizes rape or forcible sexual assault and establishes penalties for violations ranging from three years to life in prison. The law also criminalizes spousal rape.
Rape remained a problem, and there were no specific government rape prevention activities. During the first seven months of the year, prosecutors initiated 197 criminal cases of rape, a 9 percent increase from 2013. Of these, 30 were dismissed and 114 were forwarded to the courts for trial. NGOs maintained that many rapes were unreported due to social stigma and a lengthy and often corrupt judicial process. Police reportedly used poor investigative techniques and often mishandled rape cases, which discouraged survivor cooperation. There was an increase in reports of gang rapes during the year. In some instances officials involved in prosecutions blamed the survivors, a practice pervasive on all levels of the justice system. Police officers, prosecutors, and judges often blamed the survivor when dismissing a case or acquitting the rapist, often after receiving a bribe. Local authorities engaged in public survivor-blaming on several occasions during the year. In one instance the mayor of the village of Hansca, Ialoveni Region, publicly accused a survivor of a gang-rape of “dressing provocatively” and being “intoxicated” and therefore responsible for the rape.
Rape remained a crime with a low rate of effective police investigation, as charges were mainly based on survivor testimony, and law enforcement officers generally used a confrontation (face-to-face interview) with the rapist to verify the survivor’s statement. Survivors were frequently traumatized by the experience, and few managed to maintain their testimony under such conditions.
In the first seven months of the year, police registered 1,176 cases of domestic violence, almost twice the number for the same period in 2013. Of these, 679 cases were sent to trial and 36 were dismissed. The increase in domestic violence registered by police reflected an improvement in the law enforcement response to the problem. According to a Promo-Lex report, every seventh woman in rural areas experienced at least one act of physical violence in her lifetime. During the year police registered 22 murders and five suicides stemming from domestic violence. During her April visit, the UN deputy high commissioner for human rights, Flavia Pansieri, noted the country has taken important steps to combat violence against women, including domestic violence, rape, and sex trafficking.
Domestic violence investigations remained problematic when police officers themselves were the aggressors. In such cases law enforcement officers tended to side with the aggressor, and the victim was forced to appeal to the ECHR. The process was lengthy, and authorities did not protect victims from their abusers during the trial.
The law defines domestic violence as a criminal offense, provides for the punishment of perpetrators, defines mechanisms for obtaining restraining orders against abusive individuals, and extends protection to unmarried individuals and children of unmarried individuals. The maximum punishment for family violence offenses is 15 years’ imprisonment.
The law permits an abuser to be excluded from lodging shared with the victim, regardless of who owns the property. The law also provides for psychiatric evaluation and counseling, forbids abusers from approaching victims either at home or at work, and restricts child visitation rights pending a criminal investigation. Courts may apply such protective measures for a period of three months and may extend them upon the victim’s request or following repeated acts of violence.
During the year the Drochia trial court sentenced abusers in domestic violence cases to compulsory rehabilitation and counseling at the local rehabilitation center. The court sent more than 30 abusers to the rehabilitation program.
Progress in protecting women and children against domestic violence was slow. The Ministry of Internal Affairs undertook a series of reforms, including increased training for police officers handling domestic violence cases. According to various NGOs and the UN Children’s Fund (UNICEF), the issuance of protective orders and the effectiveness of their implementation depended on the attitude of authorities. There were numerous reports that police officers were not diligent in ensuring either proper protection of victims or proper execution of measures prescribed by protective orders. NGOs maintained authorities relied excessively on NGOs to publicize available remedies and assist victims in requesting protection. The situation improved slowly with the timely issuance of an increased number of protective orders. NGOs expressed concern that authorities were insufficiently proactive in combating indifferent attitudes towards domestic violence among police, prosecutors, and social workers.
Public perception of domestic violence as a private problem persisted. Authorities generally relied on civil society to raise awareness. During the year the Ministry of Labor, Social Protection, and Family organized a public campaign, 16 Days against Violence, to raise awareness.
NGOs reported cases in which authorities issued conflicting protective orders, providing both the abuser and the victim with protection against the other and resulting in confusion in courts.
According to NGO reports, authorities issued only 1-2 percent of all protective orders within 24 hours as required by law. In most cases abusers continued their mistreatment undeterred. There were reported cases of protective orders being issued one month after mistreatment reportedly occurred.
According to a Promo-Lex report, social workers and police were not fully aware of domestic violence laws, and 44 percent of social workers and 20 percent of police officers did not know how to respond to domestic violence. While courts increased the number of protective orders issued, police did not always implement such orders effectively. Observers stated the police approach to domestic violence improved slightly, but judges and prosecutors often failed to take the crimes seriously. Protection order violations continued to be classified as administrative infractions, which meant no criminal proceedings could be opened against offenders unless they violated the order on multiple occasions.
The law provides for cooperation between government and civil society organizations, establishes victim protection as a human rights principle, and allows third parties to file complaints on behalf of victims.
After their release from detention, abusers commonly returned to their homes and continued to abuse. Fines often had the effect of significantly reducing overall household income, further harming the spouses and children of abusers. Victims of domestic violence were frequently reluctant to come forward because of economic dependence on their abusers, particularly if the family had children.
The government supported educational efforts, usually undertaken with foreign assistance, to increase public awareness of domestic violence and to instruct the public and law enforcement officials on how to address the problem. Private organizations provided services for abused spouses, including a hotline for battered women. Access to such assistance remained difficult for some.
The NGO La Strada operated a hotline to report domestic violence, offered victims psychological and legal aid, and provided victims with options for follow-up assistance. During the first eight months of the year, the hotline received 1,861 calls related to domestic violence.
In Transnistria the law does not specifically prohibit violence against women and the extent of domestic violence was difficult to estimate. According to a 2013survey in Transnistria, approximately 22 percent of women reported having been subjected to physical violence, 36 percent reported experiencing physical violence from their partners at least once, while 60 percent reported instances of psychological violence. Most victims of domestic violence did not file complaints with police.
Female Genital Mutilation/Cutting (FGM/C): The law does not prohibit FGM/C. There were no reports of FGM/C during the year.
Sexual Harassment: Sexual harassment remained a common problem. The law provides criminal penalties for sexual harassment ranging from a fine to a maximum of two years’ imprisonment. The law prohibits sexual advances that affect a person’s dignity or create an unpleasant, hostile, degrading, or humiliating environment in a workplace or educational institution. According to NGOs, law enforcement agencies steadily improved their handling of sexual harassment cases, such as by addressing harassment of students by university professors and several instances of workplace harassment.
Reproductive Rights: Couples and individuals could decide freely and responsibly the number, spacing, and timing of their children and had the information and means to do so and the right to attain the highest standard of reproductive care free from discrimination, coercion, and violence. The government adopted laws and implemented policies to ensure free obstetric and postpartum care to all citizens. Mandatory government medical insurance covered all expenses related to pregnancy, birth, and postpartum care. During pregnancy the government provided essential medicines free of charge. Most medical institutions, both state and private, had free booklets and leaflets about family planning and contraception.
Although there were no reports of Romani women being denied obstetrical, childbirth, or postpartum care, many Romani women did not take advantage of free government-administered medical care during pregnancy.
Women in psychiatric institutions and social care homes lacked access to contraceptives.
Discrimination: The law provides for women to enjoy the same legal status as men under family law, labor law, property law, and inheritance law, and in the judicial system. The law requires equal pay for equal work, which was mostly respected during the year. The National Bureau of Statistics reported almost equal proportion of men and women employed by midyear, 50.5 percent and 49.5 percent, respectively. | <urn:uuid:40e9afdb-76bf-4d20-ab3f-67259f165f16> | CC-MAIN-2023-50 | https://2009-2017.state.gov/j/drl/rls/hrrpt/2014/eur/236554.htm | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00716.warc.gz | en | 0.965301 | 1,841 | 2.6875 | 3 |
|1.||The fifth letter of the English alphabet.|
|2.||(Mus.) E is the third tone of the model diatonic scale. E$ (E flat) is a tone which is intermediate between D and E.|
|Noun||1.||E - a fat-soluble vitamin that is essential for normal reproduction; an important antioxidant that neutralizes free radicals in the body|
|2.||E - a radioactive transuranic element produced by bombarding plutonium with neutrons|
|3.||E - the cardinal compass point that is at 90 degrees|
|4.||e - the base of the natural system of logarithms|
|5.||E - the 5th letter of the Roman alphabet|
|1.||E - An extension of C++ with database types and
persistent objects. E is a powerful and flexible
procedural programming language. It is used in the Exodus
See also GNU E.
["Persistence in the E Language: Issues and Implementation", J.E. Richardson et al, Soft Prac & Exp 19(12):1115-1150 (Dec 1989)].
|2.||(language)||E - A procedural language by Wouter van Oortmerssen with semantics similar to C. E features lists, low-level polymorphism, exception handling, quoted expressions, pattern matching and object inheritance. Amiga E is a version for the Amiga.| | <urn:uuid:e94a65c7-d5c3-4df2-a705-f921a8c31d30> | CC-MAIN-2018-34 | http://www.webster-dictionary.org/definition/e | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213689.68/warc/CC-MAIN-20180818134554-20180818154554-00361.warc.gz | en | 0.831585 | 308 | 3.109375 | 3 |
No parent intentionally tries to discourage their child from reading. But sometimes our actions do just that. Kids may be resilient, but they are also really sensitive, and how we handle reading in our homes can work for or against our kids”™ reading attitude. Once a child writes reading off, it”™s much harder to reel them back in and get them to give it a second shot. Here are eight things to avoid .
1. Don”™t put down your child”™s reading materials. Comics and books with crude humor often get dragged through the mud, as do character-driven books. Their choices may not be your favorite, but when you say no to a book, what your child may hear is no to reading. Instead of banning their beloved reading material , find a way to add in some more desirable books into the mix.
2. Don”™t provide the wrong level material. No one likes reading something that makes them feel stupid. If the books are too hard they will frustrate your child. If the books are too easy, they will bore your little reader. You don”™t need to know your child”™s exact level; their interest will let you know. Go to the bookstore or library when you have a chunk of time and let them explore. Take out a bunch of books and try them out. Find favorite authors and read everything they’ve written, then start again with a new author.
3. Don”™t use reading as a punishment. Saying things like “Go to your bedroom and read!” or “If you do that again, I will make you go read.” sets kids up to associate reading as a negative thing. Keep punishments and reading separate.
4. Don”™t forget to give your child books as a gifts. Gifts are special, and starting at birth books make the best gifts – especially if you read them with the person who gave them to you. Book fairs at schools are a great place for kids to get excited about books, and we use them as treats!
5. Don”™t explain to your child they aren”™t really reading yet when they are only looking at the pictures. If we tell our children they aren”™t readers, they will believe it, and to a child this isn”™t as fluid as it is for adults. They don”™t see that reading is developmental, and this blow to their confidence can really stick with them. If they aren”™t decoding words yet, let them know that they can “read the pictures” and tell the story that way until they can read the words too.
6. Don”™t forget to let your kids see you read for fun. Studies show that kids with parents who read often for pleasure are more likely to read for fun themselves. So if you want a kid who loves to read, let them see you reading too.
7. Don”™t over-correct and over-practice. It”™s exciting when your child starts to read independently, but forcing them to read and reread text until they have it perfect is not the most effective way to encourage or instruct. Read with your new reader and help when they ask for it. If they miss a word but the meaning is intact, don”™t interrupt. If the meaning of the sentence is all screwy, wait for a natural pause and ask them, “Did that make sense?” You can revisit the word if it didn”™t. Use the pictures and the rest of the text as clues if the word is too tough to decode. If you have to do this often, the text is too hard for your child. Choose something easier, or if they are insistent take turns reading so there is some fluency being modeled.
8. Don”™t forget to read to your kids. Every day. Even those days when you just want them to go to sleep already!!
Check out Scholastic Parents Raise a Reader blog for more simple ways to bring literacy into your family. Together with Amy from Teachmama.com I share with readers tips, tricks and tried and true ways to Raise a Reader.
This post contains an affiliate link. | <urn:uuid:5ff315c1-34ad-4876-8885-d5e61178228a> | CC-MAIN-2020-29 | https://www.notimeforflashcards.com/2013/03/8-ways-parents-discourage-their-kids-from-reading.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886095.7/warc/CC-MAIN-20200704073244-20200704103244-00346.warc.gz | en | 0.962777 | 895 | 2.609375 | 3 |
If you would like to make this program work better, here are a few
- Extending it to make measurements on multiple signals is an easy project.
Allow the user to set measurement reference points on each signal separately.
- It's also not too difficult to copy the input annotation file, writing
the measurements into the num fields of the annotations, so that
WAVE can display them as a signal. If you try this, keep in mind
that num values must be integers in the -128 to 127 range, so
don't record the deviations in V. If you want to write the
measurements into a signal file (as we did with tach
earlier in this chapter), this can get complicated--see the source
for tach for hints about doing this.
- The measurement point should move closer to the J point at high heart rates;
see any reference on the ECG for a discussion of this issue.
- The measurements as made above are very easily contaminated by small amounts
of noise in the signals. You should be able to improve them significantly by
averaging the amplitudes of several samples in the neighborhoods of
the isoelectric point and the ST level measurement point.
- The program should not produce measurements for ventricular ectopic beats,
or for beats that are extremely noisy. Noise detection is an
interesting research problem in itself.
- You may wish to examine using beat averaging (or median filtering) to reduce
noise in the measurements further; the
WFDB Programmer's Guide
describes a beat averager that may be a useful starting point.
- Another source of measurement error is baseline wander in the ECG,
visible as slopes in the intervals between beats. You can reduce this
error by modelling the baseline drift and subtracting it from
the signal. Simple linear models, or quadratic or cubic splines, can
George B. Moody (email@example.com) | <urn:uuid:0d8c94af-6b01-4bff-a57b-13191528882c> | CC-MAIN-2019-22 | http://physionet.fri.uni-lj.si/physiotools/wug/node43.htm | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256227.38/warc/CC-MAIN-20190521042221-20190521064221-00407.warc.gz | en | 0.907544 | 407 | 2.859375 | 3 |
Northern Alberta is home to some of the fastest-growing bodies of water in the world. Every day roughly two billion litres of water – enough to fill 800 Olympic swimming pools – are added to these lakes, which are already over 11.5 trillion litres in volume.
The largest one, located near Mildred Lake just north of Fort MacMurray, is big enough to meet the water needs of a town of 70,000 people for 50 years.
But none of the artificial lakes are fit for human consumption – they’re filled with water that’s been diverted from the Athabasca River and used to extract bitumen, a viscous, tar-like form of petroleum found in the Athabasca oil sands.
As a result, the water is toxic to humans, fish, birds, and even bacteria. Covering an area of more than 130 square kilometres, these tailings ponds are far from scenic – but they’re the easiest, most efficient way to deal with the toxified water.
“In bitumen processing water is a big, big problem,” said Greg Dechaine, a researcher at the Centre for Oil Sands Innovation at the University of Alberta. Scientists are trying to find better ways to clean up the water and avoid using so much in the first place.
Heavy, viscous fluid
Their advances so far have been modest — water will probably remain a key environmental issue for the oil sands for the foreseeable future, along with the greenhouse gases produced by the energy-intensive extraction process. But their work holds promise for a cleaner future for an industrial project the size of England.
Alberta’s oil sands are made of bitumen — a heavy, viscous fluid that is eventually refined into fossil fuels, mixed up with sand, clay, and water in the ground.
About 20 per cent of the bitumen in the oil sands is close enough to the surface that companies such as Syncrude and Suncor get at it using giant shovels and dump trucks in open pit mines. The remainder is so far underground that it has to be pumped to the surface using steam and suction.
Once the sand is out of the ground, companies use a bitumen extraction process developed by Karl Clark at the University of Alberta in the first half of the 20th century.
Actually, calling it a process might give the wrong impression – essentially, the sand is simply blasted with hot, pressurized water. Dechaine described it as “like taking a plate and running it under the tap and you just basically blast all the bits and pieces off.”
The amount of water required to do this varies based on the origin of the sand. If it comes from an open pit, it takes between two and 4.5 barrels of water to obtain one barrel of bitumen. But if the sand is extracted from deep underground, about one barrel of water total is required.
Once separated from the sand, water, and clay, the bitumen goes on to be processed into usable fossil fuels. The water is recycled until it is saturated with so much hydrocarbons and metals from the sand that it cannot be used anymore. After that, it goes into one of the ever-growing tailings ponds.
A dirty problem
The tailings ponds’ water use “is the equivalent of the use of a city the size of Calgary,” said David Schindler, a professor of ecology at the University of Alberta and a leading water scientist. “Right now, it’s just sitting there indefinitely.”
Schindler sees the oil sands as a threat to the long-term health of the Athabasca River. Taking water from the river when it freezes over in the winter lowers oxygen levels in the water, making it more difficult for fish to respire.
He also said that the tailings ponds may leak into the river and cause health problems for communities downstream, though no reliable statistics are available. He has called for a moratorium on the development of new oil sands extraction plants until more research is done into reducing their environmental impact.
Terra Simieritsch, an oil sands policy analyst at the Pembina Institute, a non-partisan think-tank in Alberta, agrees. Simieritsch said she would like to see a halt on new project approvals “so we allow some time to figure things out a little bit better and have better environmental management in place.”
While the mining continues, some scientists have dedicated their efforts to cleaning up the contaminated waters.
Richard Johnson, a biologist at the University of Essex, has discovered a way of using microbes to breakdown some of the toxic hydrocarbons found in the end-process water — specifically napthenic acids. Johnson treated a naphthenic acid solution with a cocktail of naturally-occurring bacteria, and found that the bacteria will totally metabolize some of the acids into water and carbon dioxide. However, the more complex, branched acid molecules did not breakdown completely.
Strangely, the acids Johnson’s bacteria ate are toxic to the microbes themselves.
“We’ve found in many of our experiments that the acids are toxic to the bacteria as well,” said Johnson. “So, if we add too much of the acid, the bacteria will just all die, and then not eat any of them. So you need to kind of strike the right balance.”
Finding that balance might be a bit of a problem. The microbes exhibited symptoms of toxicity at acid concentrations as low as five milligrams per litre, and naphthenic acid concentrations in tailings ponds can be up to 24 times that. Still, Johnson remains optimistic that microbes will be used to cleanup tailings ponds eventually, though he concedes it might be decades away.
Another approach to making the oil sands more water-friendly is to develop an extraction process that doesn’t require water. Researchers all over the world are exploring different ways of doing this.
In a paper published in 2008 in the journal Ultrasonics Sonochemistry, four chemists at the Kurnakov Institute of General and Inorganic Chemistry in Moscow describe using ultrasound on oil sand to extract bitumen from oil sand.
By subjecting a sample of oil sand to sonic waves above 20,000 hertz – a sort of industrial version of the scanners used to determine the sex of a foetus – the Russians were able to shake the bitumen apart from the sand, clay and water in less than an hour.
However, the experiments were on samples of sand less than a half litre in volume, and extracted about 2.5 grams of bitumen from each sampled tested. According to the Canadian Association of Petroleum Producers, the oil sands produce over 1.3 million barrels of bitumen every day, and production is expected to nearly triple by 2025. No tests at that kind of scale have been done.
Non-aqueous extraction methods are also being explored at the University of Alberta. One is the the brainchild of environmental engineer Selma Guigard. Guigard’s method involves “supercritical” carbon dioxide – a heated, pressurized solvent that behaves somewhat like a liquid and somewhat like a gas.
Guigard’s method mixes supercritical carbon dioxide with oil sand and then de-pressurizes the slurry, forcing the bitumen to separate from the rest of the mixture. The carbon dioxide can be recycled indefinitely, and the only water involved in the process is that already naturally mixed with the bitumen, sand and clay.
Once again, though, the technique has yet to be tested at the sort of scale that would let it replace the Clark process in northern Alberta. Guigard has had difficulty obtaining the funding necessary to build a small pilot plant.
Murray Gray, the director of the University of Alberta’s Centre for Oil Sands Innovation, predicts that Guigard’s method won’t be used in industry any time soon because carbon dioxide simply doesn’t mix well enough with bitumen to be viable.
“Nothing that’s been published shows that you can get good dissolution of the bitumen in carbon dioxide,” he said. “Unless someone can lick the solubility problem, it won’t be used.”
Gray’s Centre is doing its own research into non-aqueous extraction using organic solvents like paint thinner. Currently, the Centre is trying to understand the fundamentals of how that might work.
“What we didn’t do was run into the lab with a bunch of pots and pans and start playing around with different solvents and additives,” said Gray. Instead, the Centre is focused on the basic research required to design a practical non-aqueous extraction process. Gray estimates that their method is six years away from being used by industry.
In the meantime, the tailings ponds continue to present a serious hazard to wildlife in northern Alberta. The Canadian Association of Petroleum Producers encourages mine operators to use “cannons, scarecrows, decoy predators and radar/laser deterrent systems,” but they don’t always work.
In April 2008 about 500 migrating ducks died when they landed on a Syncrude tailings pond, and according to the Pembina Institute about 100 wading birds mistake the ponds for mudflats every year and become covered in oil as a result.
As the tailings ponds continue to grow, environmentalists like Simieritsch and Schindler are pessimistic about the future of the Athabasca River. Schindler said he saw no new methods on the horizon that could operate at the needed scale.
“If they can go ahead with these non-aqueous bitumen extractions and they’re found to be safe, then that’s great,” said Simieritsch. “But, you know, we still see that current [mining] projects are going ahead with large volumes of water use.” | <urn:uuid:14a030c5-401c-46b1-8876-25742aa4b66d> | CC-MAIN-2020-40 | https://thethunderbird.ca/2009/12/17/researchers-aim-to-clean-up-toxic-athabasca-water/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400211096.40/warc/CC-MAIN-20200923144247-20200923174247-00351.warc.gz | en | 0.943996 | 2,069 | 3.53125 | 4 |
Cognitive Skills Tutorial Program
STICKYBEAR EARLY LEARNING ACTIVITIESReturn to Search Results
Record 88 of 114.« Previous Product Next Product »
Stickybear Early Learning Activities is an academic and pre-reading skills tutorial program designed for children from pre-kindergarten through first grade who have learning or developmental disabilities. The program features six separate learning activities with animation and sound which provide skills practice in the alphabet, counting, writing, shapes, opposites, and colors. The Alphabet activity provides a word, letter, and animation for every letter of the alphabet. The Counting activity helps children master the numbers 0 through 9 while they discover the effect of adding and taking away. The Writing activity introduces children to writing numbers and letters with ease. The Shapes activity helps children identify basic shapes found in everyday scenes. The Opposites activity helps children build word recognition and vocabulary skills, and the Colors activity allows children to color, identify and name colors found in scenes. Students can learn through prompted direction or through the discovery method by selecting either structured or non-structured mode of play. The school versions and above also come with freely reproducible lesson plans and manipulative masters. Available languages are English and Spanish. COMPATIBILITY: Windows or Macintosh. SYSTEM REQUIREMENTS: For hybrid direct drive: Windows 2000, XP, Vista or 7, CD ROM drive and from 150 to 260 megabytes (MB) of free space on the hard drive; Mac OS X v.10.4 or above, PowerPC or Intel processor, CD ROM drive, and from 150 to 260 MB of free space on the hard drive. For stand alone CD: Windows 2000, XP or Vista, CD ROM drive, 32 MB of RAM; Mac OS 9, PowerPC, CD ROM drive, and 32 MB of RAM.
Notes: Windows is a registered trademark of Microsoft Corporation. ** Macintosh is a registered trademark of Apple Inc. ** Intel is a registered trademark of Intel Corporation.
Price: 699.95 to 59.95.
This product record was updated on October 6, 2011.
This product is available from:
Optimum Resource, Inc.1 Mathews Drive, Suite 107
Hilton Head Island, South Carolina 29926
Telephone: 888-784-2592 or 843-689-8000.
Link to more products from Optimum Resource, Inc.
Riverdeep, Inc.100 Pine Street
San Francisco, California 94111
Telephone: 800-825-4420 or 415-659-2000.
Fax: 866-627-1403 or 415-659-2020.
Link to more products from Riverdeep, Inc.
« Previous Product Next Product » Return to Search Results
Record 88 of 114. | <urn:uuid:021b2814-9be9-4f97-b435-bdc829065872> | CC-MAIN-2015-06 | http://www.abledata.com/abledata.cfm?pageid=19327&top=11450&ksectionid=19327&productid=89782&trail=0&discontinued=0 | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115855561.4/warc/CC-MAIN-20150124161055-00135-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.840159 | 568 | 2.96875 | 3 |
JAVA APPLICATION ARCHITECTURE PDF
Java. An example of a secured architecture. Software security& secure programming JVM security architecture . Main java application: executed on a dedicated JVM .. cittadelmonte.info pdf. Download Java Application Architecture: Modularity Patterns with by Kirk Knoernschild PDF. By Kirk Knoernschild. “I'm dancing! by way of god I'm dancing at the. 4 Spring Web Application Architecture . Distributed applications provide services for each other, . class with the same interface (e.g. Java I/O streams).
|Language:||English, Spanish, Hindi|
|Genre:||Science & Research|
|ePub File Size:||24.38 MB|
|PDF File Size:||13.16 MB|
|Distribution:||Free* [*Regsitration Required]|
Library of Congress Cataloging-in-Publication Data. Knoernschild, Kirk. Java application architecture: modularity patterns with examples using OSGi / Kirk. Java Application Architecture: Modularity Patterns with Examples. 76 Pages · Software architecture design patterns in Java / Partha Kuchana. cittadelmonte.info . Java application architecture: modularity patterns with examples using OSGi by Kirk Knoernschild. Full Text: PDF.
Prentice Hall wrote: Martin a. But rest assured, this title is different. The way we develop Java applications is about to change, and this title explores the new way of Java application architecture. Over the past several years, module frameworks have been gaining traction on the Java platform, and upcoming versions of Java will include a module system that allows you to leverage the power of modularity to build more resilient and flexible software systems. | <urn:uuid:d6d5998b-31ce-466c-ab9c-b67618b74597> | CC-MAIN-2019-43 | http://cittadelmonte.info/politics/java-application-architecture-pdf-18870.php | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986682037.37/warc/CC-MAIN-20191018104351-20191018131851-00088.warc.gz | en | 0.718433 | 364 | 2.6875 | 3 |
BOSTON -- A simple breath test gives a good overall measure of liver function in patients with chronic viral hepatitis and could help in evaluating potential liver transplant candidates, a researcher said here.
The test, which measures exhaled carbon dioxide following an oral dose of isotopically labeled methacetin, accurately predicted survival of 395 patients with chronic viral hepatitis during a median of five months of follow-up, reported Gadi Lalazar, MD, of Hadassah Hebrew University in Jerusalem.
The test predicted death with a sensitivity of 82% and specificity of 89% in the prospective study, Lalazar told attendees at the American Association for the Study of Liver Diseases meeting.
Although the findings still need additional validation, Lalazar said, it also appeared that the test could improve survival predictions for patients within specific ranges of Model of End-Stage Liver Disease (MELD) scores.
MELD is now the basis for allocating liver transplants, but is known to be an imperfect predictor of survival, Lalazar explained.
The breath test, tradenamed Breath ID, is based on the fact that methacetin is metabolized in the liver to produce acetaminophen and carbon dioxide. The speed of that reaction declines with impaired hepatic function.
The test uses methacetin containing 13C carbon atoms, such that the exhaled carbon dioxide is also labeled with this isotope. Therefore, Lalazar said, the amount of 13C-labeled carbon dioxide in breath correlates closely with hepatic function.
The technology, being developed by an Israeli company called Exalenz, translates the carbon dioxide measurement into a hepatic impairment score (HIS). For purposes of the study, scores were grouped into tertiles reflecting low, medium, and high risk.
Patients in the study had mean MELD scores of 8.2, with about 80% having scores below 10, indicating relatively mild liver disease. Close to 90% had hepatitis C virus infection; the remainder had hepatitis B. About 30% had cirrhosis.
Eleven patients died during follow-up, which ranged from two to 24 months.
Nine of the deaths occurred in patients with high-risk HIS values; the other two occurred in the medium-risk group.
Lalazar said the risk of death increased by 34% with each log10 unit increase in the HIS (P<0.0001).
The accuracy remained strong in patients with normal levels of alanine aminotransferase (ALT), he said.
Six of the deaths occurred in patients with normal ALT but who were determined to be at high risk on the basis of breath-test results. Two deaths occurred in medium-risk patients with normal ALT, and none in the low-risk patients.
Four patients with MELD scores under 15 died during the study; three of them were identified as high-risk on the basis of HIS scores.
Lalazar said only one death was recorded among 10 patients with MELD scores of 15 or higher whose HIS results indicated low risk.
He said that breath test results were associated with mortality risk, even among patients in a relatively narrow two-point range in MELD scores.
John Hoefs, MD, of the University of California Irvine, commented that quantitative tests of liver health such as this appear to be more accurate than the usual clinical measures.
"Quantitative liver function tests trump fibrosis and other measures in predicting clinical outcomes," he said.
Hoefs, who was not involved in the study, was part of a group that had reported here on a separate trial involving a panel of other quantitative tests, such as choline and antipyrine clearance and perfused hepatic mass. It also accurately predicted outcomes in patients with chronic viral hepatitis.
"We think this [methacetin breath test research] supports that effort," he said.
Lalazar noted that the study was limited by the low proportion of cirrhotic patients and the small number of deaths. "A validation study is required," he said.
The study was funded by Exalenz, developer of the methacetin breath test.
Lalazar reported no potential conflicts of interest other than the research funding. One co-author reported relationships with Alcobra, Immuron, Enzo Biochem, and ChiasmaPharma.
Hoefs reported relationships with Roche and Gilead.
- Reviewed by Dori F. Zaleznik, MD Associate Clinical Professor of Medicine, Harvard Medical School, Boston and Dorothy Caputo, MA, RN, BC-ADM, CDE, Nurse Planner | <urn:uuid:a7db5697-44c5-476f-9f41-77f631ae9440> | CC-MAIN-2018-09 | https://www.medpagetoday.com/meetingcoverage/aasld/16856 | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813322.19/warc/CC-MAIN-20180221024420-20180221044420-00533.warc.gz | en | 0.960393 | 944 | 2.625 | 3 |
How It Works
How Scroll Compressors Work
The Copeland Scroll compressor has one scroll, or spiral, orbiting in a path defined by a matching fixed scroll. The fixed scroll is attached to the compressor body.
The orbiting scroll is coupled to the crankshaft and orbits, rather than rotates. The orbiting motion creates a series of gas pockets travelling between the two scrolls. On the outer portion of the scrolls, the pockets draw in gas, which they then force to the centre of the scroll, where the gas is discharged. As the gas moves into the increasingly smaller inner pockets, the temperature and pressure increase to the desired discharge pressure.
Design BenefitsBetter Liquid Handling
Axial and radial compliance allow the scroll members to separate in the presence of liquid refrigerant, thus, providing protection against liquid damage and compressor superior robustness and reliability.Greater Efficiency
More efficient over their entire operating rangeUnmatched Reliability
- 70% fewer moving parts then other compression technologies
- Ability to start under any system load, without start components
- Easy to service and maintain due to their compact size and lightweight, simple design
- Engineered for optimum performance with today’s chlorine-free refrigerants
- No complex internal suction and discharge valves for quieter operation and higher reliability | <urn:uuid:5f9ac49b-974e-4180-910b-9495f32fc9b4> | CC-MAIN-2016-07 | http://www.emersonclimate.com/europe/en-eu/products/compressors/scroll_compressors/pages/default.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701148758.73/warc/CC-MAIN-20160205193908-00120-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.897002 | 262 | 2.546875 | 3 |
- in Environment
Mass tree planting in the UK could harm the environment if not planned properly, a report warns.
Badly-planned trees would increase greenhouse gas emissions, say the government’s advisers on the economic value of the natural environment.
The report comes from the Natural Capital Committee (NCC), which says planting trees into peat bogs would prove a serious mistake.
Peat locks up vast quantities of carbon – but trees dry out peat.
This can release more greenhouse gases than the trees absorb.
One NCC member, Prof Ian Bateman from the University of Exeter, said: “The mantra has to be ‘the right tree in the right place’.“
“We would be crazy to undertake the massive scale of planting being considered if we did not also consider the wider effects upon the environment including impacts on wildlife, benefits in terms of reducing flood risks and effects on water quality, improvements to recreation and so on.”
Right trees in right places
The report adds that carpeting upland pastures with trees would reduce the UK’s ability to produce meat – which may lead to increasing imports from places that produce beef by felling rainforests.
It also makes a similar point on industry. There’s no point closing dirty UK factories, the authors say, if we’re then going to import goods from places with worse emissions.
The authors note that huge publicity has been given to the UK’s plans for planting 11 million trees to lock up carbon emissions, but they warn that conserving carbon in soils is equally or more important.
The report points out that the Office for National Statistics (ONS) estimates that in 2007 UK soils contained approximately 4,019 million tonnes of carbon (MtC), that’s 94.2% of the total stock of biological carbon – excluding fossil fuel carbon.
They say soil degradation through erosion, intensive farming and development creates losses estimated at between £0.9 –1.4bn per year for England and Wales alone.
Soils underpin everything
Prof Kathy Willis from Oxford University and an NCC member, told BBC News: “We love looking at trees – we get all these positive emotions, smells and sounds – but most of us don’t look at soil that actually underpins everything.”
The NCC calls for much better monitoring of soils. And it says that farming on lowland peat such as the rich fields of East Anglia should be halted if soil there continues to be lost.
This recommendation may be strongly resisted by farmers, although some of them say they’re addressing the problem by using “cover crops” to bind the soil together while cash crops are being planted.
Mark Bridgeman, president of the Country Land and Business Association (CLA) told BBC News: “You improve soil by taking good care of it – reducing ploughing and using organic manure for example. You do not just give up and stop farming the land – particularly at a time when the country is becoming increasingly reliant on high quality, locally produced food.”
The NCC notes previous reports projecting a reduction in the consumption of amount of red meat and dairy produce by at least 20% per person and reducing food waste by 20%.
This implies around a 10% reduction in cattle and sheep numbers by 2050, compared with 2017 levels.
The report outlines the scale of the challenge for measures taken to tackle climate change through land use policies in the UK.
It says: “These figures make it clear that – far from being an option for major offsetting of emissions from other sectors – the measures will not even mitigate the emissions of the agriculture, land use and peatlands sectors.”
Follow Roger on Twitter. | <urn:uuid:b8a0e50b-d655-4fa3-b10b-e865b4782783> | CC-MAIN-2021-49 | https://magicalinterweb.com/environment-climate-change-uk-forests-could-do-more-harm-than-good/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362297.22/warc/CC-MAIN-20211202205828-20211202235828-00558.warc.gz | en | 0.933047 | 784 | 3.203125 | 3 |
Community service, vocational studies, introduction to foreign languages, performing arts, and museum docent visits are just some of the enrichments we are planning to compliment our curriculum. Additional enrichment programs are described below.
At Discovery Charter Schools, student learning reaches beyond the classroom. Teachers team to select field trips and assemblies that are an extension of the curriculum. Parents support field trips by providing input and helping with planning and implementation.
Junior Achievement (JA) gives young people the knowledge and skills they need to own their economic success, plan for their future, and make smart academic and economic choices.
The JA experience helps students envision the possibilities of what they can be by helping them see the value of staying in school. Interactive JA curriculum engages and excites students, leading to stronger critical thinking and decision-making skills and more confidence.
JA programs are delivered by trained corporate and community volunteers who share their skills and personal and professional experiences to make learning come to life. For more information about JA in Northern California, go to janorca or their facebook.
Junior Master Gardener Program
This program engages children in experiences that promote a love of gardening, develop an appreciation for the environment, and cultivate the mind. This program encourages youth to be of service to others through service learning and leadership development projects and rewards them with certification.
This international organization for kindergarten through college teaches life skills and expands imagination through team-based creative problem solving. The curriculum draws on creative problem solving strategies and multiple intelligences of students to use what they learn in new and creative ways. More info: destinationimagination | <urn:uuid:41da99a2-a350-41e3-8aa3-df0923bd8dcc> | CC-MAIN-2020-05 | https://www.discoveryk8.org/apps/pages/index.jsp?uREC_ID=214922&type=d&pREC_ID=475081 | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607596.34/warc/CC-MAIN-20200122221541-20200123010541-00452.warc.gz | en | 0.931941 | 321 | 2.765625 | 3 |
20 Amp Variable Power Supply using LM317
This 20 Amp Variable Power Supply varies its output voltage from 1.5 to 15 volts and is based on the well-known variable voltage source configuration, where only the LM317 voltage regulator is used. See red box on the diagram.
The output voltage of this basic regulator is adjusted with the potentiometer connected to the regulator pin 3 (adj). On this power voltage source, the level of the output voltage is regulated in the same way.
The basic regulator has a maximum current capacity of 1.5 amps. (acceptable for most cases). To amplify the current capacity of this regulator, we place four power NPN power transistors as shown on the diagram.
How the 20 Amp Variable Power Supply works?
The output of the LM317 voltage regulator (pin 2) is connected to the 4 power transistors bases. These transistors are connected in parallel. The output voltage of the 20 Amp Variable Power Supply is obtained from the junction of the 4 resistors (R2, R3, R4, R5), connected to the emitters of the 4 transistors.
The emitter voltage of each transistor is: Ve = Vb – 0.7 V (approximately), where:
- Ve = Emitter voltage
- Vb = Base voltage
The transistor base-emitter voltage drop is between 0.6 to 0.7 volts.
Resistors in series with each emitter are placed in order to compensate for voltage differences that may exist among the 4 emitter voltages of the power supply.
List of circuit components
- 1 110/220 VAC to 18 VAC transformer, 15 Amps. (T)
- 1 30 amp. / 300 volts diode bridge. (DB)
- 4 4200 uF (microfarads) / 40V electrolytic capacitors (C1, C2, C3. C4).
- 1 10 uF / 40V electrolytic capacitor (C5)
- 1 LM317 voltage regulator. (U)
- 4 2N3055 NPN power transistors (T1, T2, T3, T4)
- 1 270 ohms, 1/2 watt resistor (R1)
- 4 0.47 ohms / 10 watts resistors (R2, R3, R4, R5).
- 1 100k potentiometer (P)
- 4 heatsinks (1 heatsink for each transistor) or a large heat sink for all transistors | <urn:uuid:7fe42b83-2be0-4aed-8def-03debf49cc28> | CC-MAIN-2023-14 | https://electronicsarea.com/20-amp-variable-power-supply-using-lm317/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00021.warc.gz | en | 0.823624 | 547 | 2.640625 | 3 |
Money and Budgeting
The Basics of Currency in Japan:
As with all currencies, the dollar <-> yen exchange rates fluctuate every day. An online search will reveal many websites and mobile applications that can help you track these changes and assist with budgeting.
As a general principle, do not convert more dollars to yen than you can reasonably expect to use during your stay in Japan. Money is always lost in the conversion process, as banks set different rates for buying and selling currency, as well as charge a service fee. Exchange counters in airports or other locations tend to cost more in fees. To minimize fees, it is a good idea to do fewer exchanges of larger amounts than several smaller exchanges.
While traveling, it is a good idea to carry a minimum of $100 in US currency for incidental expenses incurred en route to and from Japan. Once you arrive in Hikone, tuck it away until you are ready to come home. It is also recommended that you have yen (approximately $300 worth) available to you prior to your arrival in Japan to cover travel costs and to help you get settled for the first week or so of the program. If your arrival is unexpectedly delayed or you cannot find an ATM, already having yen will be very helpful.
Many items in Japan are, for the most part, more expensive in Japan than in the US. During your first few weeks in Japan, you will quickly learn how to budget for daily living and other activities based on your personal lifestyle habits. To get a general idea of what things cost in Japan, please visit:
Managing Money from Abroad:
For a variety of reasons, it can be beneficial to arrange to give POWER OF ATTORNEY to a parent or close relative for the period that you are overseas. Power of attorney enables your designee to handle business and legal matters on your behalf, such as paying bills, depositing financial aid and personal checks, etc. In the past, students have had a hard time with things such as class scheduling and financial aid departments because they did not have the relevant information. As you know, some information will not be given out freely over the telephone or to anyone but you unless you grant power of attorney.
IMPORTANT: Take care of all of the details with your academic counselor, financial aid office, and your bank before you leave. Make sure that your bank, financial aid office, and designee have a copy of the Power of Attorney document. Some banks and other institutions require another form along with the standard power of attorney form. Check to be sure.
Using an International ATM (debit) card to withdraw money from your U.S. bank account may be the easiest way to access your funds in Japan. Most ATM cards with a 4-digit PIN will work, though it is advisable to double-check with your bank just to make sure. There are ATMs available in many convenience stores in Japan, including 7/11. There is a 7/11 with an international ATM about 15 minutes from JCMU by bike which is open 24 hours a day 7 days a week. While most U.S. debit cards work at 7/11, some cards do not work, in which case using the post office ATMs is recommended. International ATMs are found in most post offices in Japan, though they have strict hours. There are three post offices in close vicinity to the center and in general, post offices tend to be near major train stations as well. Remember, there will be a service fee on top of whatever your bank charges.
Credit cards are very useful when an emergency arises when traveling, but credit card use in Japan is not as common as in the United States. Unfortunately, most stores and restaurants in Hikone normally will not accept credit cards.
A VISA account can be very handy in Japan, both for making larger purchases (such as hotel rooms or long-distance train tickets) and for cash advances. The bill will be automatically converted to dollars (often at a rate equal or better than what you would get exchanging cash at a bank), and charged to the account in the US. However, don’t depend on using your VISA all of the time because it is not accepted everywhere. Also, interest rates and fees for cash advances on credit cards often tend to be higher than the fees for purchases with the credit card, or withdrawals from ATMs with a debit card. Check with your account provider to make sure you are aware of fees and other charges in advance so that you can make an informed decision about cost-effective methods.
Traveler’s checks are one of the safest forms of money to carry when traveling, but are quickly becoming obsolete. In Japan, American Express or Visa checks are probably your best bet. They are difficult to cash in Japan; inside the airport is the generally the best option. You may be able to purchase traveler’s checks through AAA or your local bank or credit union; however, most banks don’t issue travelers checks anymore.
Opening a Bank Account in Japan:
It is possible to establish a bank account with a Japanese bank after your arrival. If you wish to open an account, please consult with the staff at JCMU.
Transferring Money from the US to Japan:
The easiest way to receive money in Japan, besides depositing money into an account from the US that can be accessed by ATM, is a US International Postal Money Order issued by the U.S. Postal Office. They can be purchased for under $5 with a max value of $700 each. It can be sent by regular or express mail and cashed at the main post office in Hikone. Avoid using personal checks or any other kind of money order. Never send cash!
Program Fee Payment and Financial Aid:
Payment is due before the beginning of the program. Make certain that everything is in order and clarify the procedures for the release of financial aid checks for the period when you are out of the country. These offices may require a letter in advance from you authorizing the release of checks to a parent, etc. and may require that you provide them in advance with a copy of the “power of attorney” letter. Check with your office of financial aid to make sure the awards will be available when you expect them to be. | <urn:uuid:23b08c8d-bd36-42d2-900e-612798076df4> | CC-MAIN-2017-43 | http://jcmu.isp.msu.edu/index.cfm?FuseAction=Abroad.ViewDocument&File_ID=050071727A4F057A7176077104771C700C7B7714737B02036E01030306720771040577757075020570 | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825227.80/warc/CC-MAIN-20171022113105-20171022133105-00550.warc.gz | en | 0.955819 | 1,289 | 2.6875 | 3 |
The Rage of Achilles, The Iliad, Homer (760 BCE)
The opening lines of The Iliad are devoted to the rage of Achilles for a reason, though it takes awhile before we understand why the muses had to be invoked to express it. But Achilles’ arrival on the battlefield is one of the most terrifying moments in all of literature. The very sound of him quakes the spirit of the Trojans. Even the horses, “sensing death,” overturn their chariots. And when he finally lets out his battle cry, their finest fighters fall back and impale themselves on their own spears. Disgusting.
Scylla munches the crew, The Odyssey, Homer (8th Century BCE)
Odysseus finds out from Circe that his best bet is to try to sneak by Scylla, the enormous, six-headed monster also known as “the immortal devastation.” The goal is to avoid making a snack out of his crew. They do not succeed. When they attempt to pass, she munches on six men from the ship. It’s one of the first great and horrifying monster scenes in Western literature.
Apollo possesses Cassandra, The Oresteia, Aeschylus (458 BCE)
How many scenes of bodysnatching are unwittingly based on this moment from The Oresteia, wherein Cassandra’s inflamed godspeak merges both past and future in the highest, most insane poetry of death? Everyone will die!
Oedipus gouges out his eyes, Oedipus the King, Sophocles (429 BCE)
A scene so excessively violent and terrifying that the only way to assimilate it was to turn it into a psychological model. You know the backstory. But did you remember that he uses the golden pins of his mother’s dress to mutilate himself?
Juno summons the Fury, Aeneid, Virgil (29 BCE)
“Baleful Juno and her sleepless rage” is one of the major themes of the Aeneid, so when she summons Alecto, a Fury born from the blood of the castrated Uranus, to cause a war, it’s no surprise that she loses control. Rage begets rage. Alecto boils someone with a torch, steals the dreams of her adversaries, and provokes needless slaughter…
The Flaying of Marsyas, Metamorphoses, Ovid (8 CE)
Marsyas gets flayed alive in a cave for losing to the cheating Apollo in a musical duel. It’s like “The Devil Went Down to Georgia,” except the devil wins and murders his human competitor.
Rachel weeps for her children because they are no more, Gospel of Matthew (70 CE)
You can pick your poison from the New Testament — the lake of fire, the crucifixion — but nothing terrified me more as a child than the massacre of the innocents at Herod’s decree. It’s also worth mentioning that Herod’s own death was violent. He suffered gangrene of the genitalia.
Mr. Grendel (and his mom), Beowulf (1000 CE)
Feared by all, the monster Grendel has a head so big it requires four men to carry it. Covered in scales and thorny skin caked in blood, his mere mention in Beowulf is a source of terror. To make matters worse, his mother was a “monstrous hell bride” who descended from Cain, the first murderer.
Ugolino gnaws on Ruggieri’s skull, eats his own children, Inferno, Dante Alighieri (1320)
The arrangement of scenes for Ugolino, whom Dante locates in the second ring of the lowest circle of Hell, is doubly terrifying. For his rage and betrayal, he is forced to gnaw on the skull of his opponent for eternity. How did he end up dead in the first place? He died in captivity after his children begged him to “strip away” their “wretched flesh.” His hunger was greater than his sorrow. He ate them.
Banquo returns to haunt his killer, Macbeth, William Shakespeare (1611)
Whether real or phantasm, the appearance of the ghost of Banquo, along with his descendants, is terrifying enough to drain the blood from the usurper Macbeth (and the reader). It is also fulfills the scary prophecy of the Weird Sisters and establishes a paradigm for witchiness.
This house is haunted… The Castle of Otranto, Horace Walpole (1764)
A bridge from Shakespeare’s Hamlet and Macbeth to the gothic novel, or arguably the first gothic novel, Walpole’s book is scary because it is crazy — I’m convinced Walpole was nuts. Still, the best thing about the book is that it achieves its “gloomth” (Walpole’s coinage) mostly through its invention or reinvention of the haunted castle. In this one, things creak and fall from the walls. And mysterious giants roam around.
Graveyard vibes and uncouth nuns, Mysteries of Udolpho, Ann Radcliffe (1794)
It takes little more than a scary nun — when you are the psychologically fragile heroine of one of the great gothic romances — to find yourself beset on all sides with fear. It only makes matters worse when she tells you not to forget the open grave you have to cross on your way through the cemetery…
The maniacal laugh that condemns a monk, The Devil’s Elixirs, E.T.A. Hoffmann (1815)
This gothic novel borrows many of the tropes from prior works in the genre, but it extends them to the point of basic craziness. The novel concludes with the discovery that the condemned monk Medardus, who we are made to believe is rehabilitated, actually died from a fit of insane laughter — a disturbing revelation that reveals he was still overtaken by, well, the devil’s elixirs.
The creature and the uncanny valley, Frankenstein; or, The Modern Prometheus, Mary Wollstonecraft Shelley (1818)
The “abhorred monster” is truly hated by his creator, and Victor Frankenstein’s rageful verbal lashing of the “vile insect” is met with the kind of response that you’d expect from a 21st-century “uncanny valley” AI robot. It sparks horror and revulsion in both directions.
Murder by head, The Legend of Sleepy Hollow, Washington Irving (1820)
Poor Ichabod, his mind overawed by the power off horror stories, has his “cranium” “crashed” by the goblin’s “horrible missile” — his head. Maybe the whole thing is a parable about avoiding horror literature, which means you should probably stop reading this list.
The pyromaniac in the attic, Jane Eyre, Charlotte Brönte (1847)
Look, some strange stuff had been going down at Thornfield, but it was the news that a guy’s crazy first wife had been locked in the attic that chilled my child bones. Arson and suicide didn’t ease the burden of Bertha Antoinetta Mason.
The painting of the man with the scythe, “The Pit and the Pendulum,” Edgar Allan Poe (1842)
The hypersensitivity to sound caused by the story’s darkness is terrifying until the condemned man notices the painting of a man with a scythe — a work of art that symbolized his impending death by scythe. This fact debilitated me as a reader. Did the story itself, a work of art, forecast my own death by torture?
Terrifying nonsense of the Jabberwock, Through the Looking Glass, Lewis Carroll (1871)
The Jabberwock “monster” presented in the famous mirror-reversed poem (“Jabberwocky”) is more an expression of epistemic dread. If “The Pit and the Pendulum” relies on “literal” darkness to scare its reader, the Jabberwock relies on the lingering creature of mental darkness. You know it’s there, but you can’t see it or describe it.
Hyde canes old man to death, Strange Case of Dr. Jekyll and Mr. Hyde, Robert Louis Stevenson (1886)
The more I think about it, the more this novel — with its doppelgängers and potions — resembles E.T.A. Hoffmann’s The Devil’s Elixirs (see above). Either way, Hoffmann’s novel doesn’t have a scene where a man beats an oldster to death with a cane, brandishing an “ape-like fury” to “audibly shatter” his bones for no reason.
Vampire capitalist goes nutzoid, Dracula, Bram Stoker (1897)
When Harker whips out his Kukri knife and tries to slice the Count, he cuts at his coat instead. Guess what happens next? “A bundle of banknotes and a stream of gold” fly out. The Count’s face gets “so hellish” because… why? He lost some money.
The heads on stakes under Kurtz’s window, Heart of Darkness, Joseph Conrad (1899)
The inexplicable creature Odradek, Franz Kafka “The Cares of a Family Man” (1919)
A mysterious creature that “looks like a flat star-shaped spool for thread, and indeed… does seem to have thread wound upon it,” the Odradek has resisted interpretation for almost a century. Somehow the creature’s utter purposelessness and uselessness mocks my own, making it, in my estimation, Kafka’s most terrifying creation.
A woman becomes a dog? Nightwood, Djuna Barnes (1936)
T.S. Eliot praised this novel for its “quality of horror and doom related to Elizabethan tragedy,” and he was right to do it. It’s far scarier and better than The Waste Land, to name one example. Considering that it’s an explicitly queer novel, the ending — where a woman transforms (or does she?) into a dog — should be carefully interpreted. Still, the atmosphere it evokes, with its perfect phrasing, is hard to shake.
Electroshock and lobotomy, Invisible Man, Ralph Ellison (1952)
This novel (like the above Nightwood) is more legitimately terrifying than The Waste Land, its partial inspiration. I know of no moment in American literature that epitomizes the violence that hides in racist language more than the scene where the protagonist is subjected to the discussion of doctors, who would lobotomize him with electroshock therapy. “But what of his psychology?” one of the doctors wonders. “Absolutely of no importance.”
Picnic of ghosts and ghost puppies, The Haunting of Hill House, Shirley Jackson (1959)
After escaping from a picnic of ghost puppies and ghost parents and ghost children in broad, blinding daylight, Eleanor, clutching Theodora and rocking crazily, might have lost her entire mind.
“The Eyes of God run all over the Earth,” The Handmaid’s Tale, Margaret Atwood (1985)
Nearly everything about The Handmaid’s Tale has made its way into the 21st century — or tried to. But now when I read Offred’s description, taken from 2 Chronicles, of Gilead’s secret police, it hits home that they represent the total confluence of patriarchal violence, surveillance, and religious conservatism dreamt up by today’s most active political minds.
A double revelation, Beloved, Toni Morrison (1987)
“I’ll explain to her, even though I don’t have to,” Sethe says of Beloved. “How if I hadn’t killed her she would have died and that is something I could not bear to happen to her.” It’s hard to think of lines in fiction that speak to the horror of America’s white supremacist history more forcefully.
Sex with an alien, Dawn, Octavia Butler (1987)
Would you have sex with an alien who is “more evolved” (whatever that means) in order to help save the human race? And what if that alien had no smell? What if you still found it repulsive? What if you still found it strangely attractive? These are the scary questions asked by Dawn.
The rats, American Psycho, Bret Easton Ellis (1991)
It’s just an impossibly horrifying scene that involves rats and a soon-to-be dead woman. If I remember correctly — there is no way I could ever read it again — Patrick Bateman goes to a new restaurant afterward.
“The Part About the Crimes,” 2666, Roberto Bolaño (2004)
A dirge of pure literary hell, a death fugue stretched out over an entire chapter (or book), “The Part About the Crimes,” which takes place in the notoriously violent Ciudad Juarez, is an epic list of femicidal murder and a marvel of literary stamina. It’s the most impressive section of any book written this century. And it’s the most disturbing. | <urn:uuid:37a32011-495a-41c2-8917-0bfd1803e606> | CC-MAIN-2021-43 | https://www.flavorwire.com/545251/30-of-the-scariest-moments-from-western-literature | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587767.18/warc/CC-MAIN-20211025185311-20211025215311-00093.warc.gz | en | 0.937993 | 2,911 | 3.09375 | 3 |
Collectivism and individualism in the management of remuneration in the United Kingdom and its impact on pay systems.
The shift from collectivism to individualism in the management of remuneration in the United Kingdom: The impact on the British reward system
Collectivism in employee relations has to do with the extent to which management acknowledges the right of employees to collective representation and the how collectivism can influencing management decision-making (Storey and Sisson, 1993). So, collectivism is about the right of the employee vis-à-vis the management. According to Gunnigle et al. (1998), the extent of collectivism in industrial relations may be accurately gauged through measures of trade union penetration (density and recognition) and reliance on collective bargaining. Collectivism is therefore concerned basically with the role of trade unions in employee relations.
Collectivism had its origins in the mediaeval craft guilds. In 1834, there was an attempt to establish a Grand National Consolidated Trades’ Union bringing together all the unions, but it never attracted general support (CIPD fact sheet, 2004). The Industrial Revolution also had an impact on collectivism. History suggests that the invention of the steam engine paved the way for speedy railway communication. Subsequently, amalgamation started taking place. The Amalgamated Society of Engineers was established in 1850. In recognition of this, a series of acts was passed in the 1850s and ’60s to protect union funds, culminating in the Trade Union Act 1871 (ibid). From then, trade unions showed rapid growth.
2.0 Individualism, Pluralism and Collectivism
Purcell (1987) argued that collectivism and individualism represent two separate dimensions of management style. A collectivist management style is defined in terms of the approach taken by the organisation to the representation of its employees by trade unions. Firms that adopt a collectivist management style show a readiness to enter into constructive and productive relations with trade unions and to accept the legitimacy of collective bargaining. In contrast, individualism refers to the extent to which HR policies focus on the rights and capabilities of individual workers. A firm that displays high individualism places an emphasis on the individual contribution of its employees and is willing to invest in their training and development.
This formulation has been challenged by Storey and Bacon (1993). They believe that the terms ‘collectivism’ and ‘individualism’ possess different meanings depending on which dimension of the employment relationship is under analysis. They draw a distinction, for example, between industrial relations that cover union–management relations with the associated process of negotiation and bargaining, and the work organisation that pertains to such issues as the design of jobs and the nature of work tasks. Storey and Bacon suggest that within the industrial relations domain, the terms ‘individualism’ and ‘collectivism’ are used almost interchangeably with ‘unitarism’ and ‘pluralism’.
Individualism is associated with unitarism; the relationship between the individual employee and the management is direct and unmediated by collective employee representation (Kessler and Purcell, 2003). Unitarism is based on harmonious relations and shared goals between the employee and the employers. It does not make any provision for group conflict – as the literature survey reveals. On the other hand, pluralism is related to collectivism which reflects conflicting employee-employer relations and leads to collective institutions in the form of trade unions (Kessler and Purcell, 2003). ‘Collectivism comes be equated to trade unionism and individualism to non-unionism’ (Storey and Bacon, 1993).
3.0 Unions on the brink
Since the mid-1980s, UK trade unions have become less collectivized. This is evident from the decline of trade union membership and density and the expansion of individual contracts. The Labour Force survey suggests that the number of trade unionists is now back to the levels recorded during the 1950s (Salmon & Stewart, 1994). In autumn 2005, an estimated 6.39 million employeesin the United Kingdom were members of a trade union. This was a drop of approximately 119,000 or 1.9%, compared with levels recorded in autumn 2004 (Grainger, 2005). Trade unions in UK have been in both absolute and relative decline since 1979, to be more specific. There are several general indicators which illustrate this. First, total union membership fell from some 13 million in 1979 to 9.5 million by the beginning of 1992. Second, the number of employees covered by closed shop agreements fell from nearly five million in 1980 to only half a million in 1990. Third, union membership density fell from 58% of all employees in 1984 to 48% in 1990. Fourth, recognition of unions by employers declined substantially during the 1980s and early 1990s, falling from some two-thirds of all employees in all workplaces in 1984 to just over 50% in 1990. Fifth, the percentage of employees covered by collective bargaining was only 54% in 1990, compared with 71% in 1984 (Certification Office, 1993).
Five factors have been responsible for the decline in union membership, namely: macro-economic climate, workforce composition and the policies of the state, employers and unions (Metcalf, 1991). Mass unemployment was a severe blow to trade unionism. Because of rising unemployment in the 1980s, trade unions also had a poor public image. The composition of the workforce was getting increasingly varied and was marked by a decline in manual workers, feminisation of labour and part-timers. Freeman and Pelletier (1990) emphasised that the decline in density is due to the Thatcher government’s labour law. They calculated that changes in UK labour law reduced union density by 1- to 1.7% points per year during the period 1980–1986. The Conservative Party took power in 1979 and introduced laws that removed many of the rights enjoyed by unions. Throughout this period, unions faced attacks from the government through restrictive legislation. The Employment Acts of 1980 and 1982 made secondary strike action illegal.
The ‘Fairness at Work’ White Paper published by the New Labour in 1998 is about extending the rights of the individual employee. Even the chapter dealing with collective rights starts by referring to individual rights which provide the protective underpinning to working relationships. This new agenda has involved government engagement with European Union (EU) social policy, a national minimum wage and an extension of the rights for individual employees and trade unions, including a statutory route for union recognition. This new public policy environment challenges managers to reappraise attempts made in the 1980s and 1990s to manage employees more directly rather than through unions (Purcell 1991) and to reintegrate unions into the rule-making process.
The Information and Consultation of Employees Regulations (2004) are seen by the Trade Union Congress (TUC) as a strategic breakthrough with major implications for trade union organising strategies (Undy, 1999). Labour party, as stated earlier, adopted the EU’s Social Chapter. ‘Partnership’ was not, however, defined by the leadership of the New Labour Government. It was seen as a public good, much like motherhood (Undy, 2002). Undy (1999) also observed that New Labour’s ‘Third Way’, therefore, is not solely concerned with enhancing individual rights, but seeks to balance these interests against those of the employer and labour efficiency. Undy (2002) further commented that New Labour’s conversion to supply-side economics and a lightly regulated labour market led it to favour the unions more in the field of employee learning than in the area of collective and individual employment rights. The New Labour government has contributed further to legislation to both enhance individual employment rights and to facilitate collective organisation. Implementation of the Working Time Directive (October 1998), the National Minimum Wage (April 1999), the European Works Council Directive (December 1999) and the royal assent to the wide-ranging Employment Relations Act (July 1999), NMW (2006) are the proof of this. Employers are just taking advantage of the latter to enhance individualism.
It is argued that the growth of individual employment arrangements is associated with the introduction of HRM practices (Sisson, 1993). Guest (1989) claimed that HRM has both a unitarist and an individualistic character, leaving little scope for collective arrangements and assuming little need for collective bargaining. There are assumptions that new HRM techniques are modelled on union avoidance. The influence of Japan (JIT, TQM etc.) on British industry, it is claimed, has transformed domestic industrial relations by adoption and emulation (Oliver et al., 1992). Japanese industry places an emphasis on employee involvement and commitment as a way to overcome adversarial tensions between employers and workers, according to recent management literature (Storey, 1992). As a result, employees can get to management directly to get the job-related problems discussed, bypassing the unions. Increasing flexibility in the workforce is another factor contributing to individualism. Peripheral workers have greatly impacted on the individualisation and the overall pay system. According to Atkinson (1984), the concept of core and peripheral employment are based on the difference between those whose employment relationships are relatively secure and those whose employment relationships are more tenuous and reflects external labour market conditions. Employers prefer employing part-time workers as they have weak bargaining power. Another factor is that non-standard workers (part-timers) are less likely to be covered for collective bargaining (Booth et al., 2000). Consequently, to ensure survival, trade unions are seeking to represent these part-timers who constitute 25% of the entire workforce, in their own right. It should be noted that in the core group of permanent full-time employees, there has been a move to weaken collectivism and enhance individualism. Some professional employees have completely abandoned a collectivist approach and prefer a personal contract. Others prefer partial personalisation of the contract such as IPRP (Salamon, 2003). So, there are different trends in the same core groups representing options for individualism in the form of performance-related pay.
4.0 Remuneration and Reward Systems
Determination of the methods of pay is an important aspect of employee relations. Basically, it is because of their pay that employees are at work. The Work Place Employment Relations Survey (WERS) series shows that since the mid-1980s, the proportion of work places that set wages through collective bargaining has been in decline. The percentage of work places engaged in collective bargaining over pay fell from 30% in 1998 to 22% in 2004 (WERS, 2004). Changes in the overall pattern of pay determination since 1984 is offered by Millward et al. (2000). According to them, collective bargaining was the dominant mode of pay determination in 1984 but fell from 60% in 1984 to 29% in 1998. Another survey by Brown et al. (2000) showed that only 35% of employees are now covered by collective bargaining arrangements and that 50% of employees have their pay set unilaterally by management. Multi-employer bargaining also dropped from 69% to less than 46% in 1998 (Millward et al., 2000). They also noted that the public sector faced decline in terms of multi-employer bargaining, though it is still the dominant mode of pay determination.
Brown et al. (1995) argue that there has been a decrease in the range of issues subject to collective bargaining and that they have become more closely linked to pay as management seeks to exert greater control. Thus, trade union focus has moved from how new management mechanisms – such as quality circles (TGWU, 1989) – might introduce direct communication which bypasses collective bargaining to individual contracts and performance-related pay that challenges their very recognition for collective bargaining purposes. The failure of trade unions to combat these management techniques will lead to union de-recognition. Subsequently, de-recognition is occurring. The largest number of early de-recognitions was among white-collar workers as a result of declining trade union membership. For example, at Cooperative Bank, when unions refused to accept redundancies and a pay freeze, the new chief executive withdrew recognition, and ‘exhorted’ all employees to accept ‘individual’ contracts (Tuckman and Finnerty, 1998). Tuckman and Finnerty (1998) further observed that the normal parameters of determining pay are the based on the difference between the cost of living and what an enterprise can afford. When these are shifted, management is able to unilaterally determine what is affordable, denying fundamental transparency to the payment system. Transparency and joint agreement are also absent in the procedures for determining the criteria for individual performance and the measure of reward in pay review. These need to be built into collective procedures agreed with unions. Therefore, union representation in reward, grievances, and discipline can be extended to agreement on the broad parameters of individual contracts. In fact, IPRP and collectivism can co-exist. A union presence is compatible with the new management techniques and can actively contribute to the unions’ effective deployment within the workplace (Storey and Sisson, 1993). Research reveals that of the 45 unions reporting members covered by IPRP, only 13 stated that more than 90% of those members were also covered by a collective agreement-regulating IPRP scheme. The research further shows that it is not an absolute trend and there has been considerable union success in drawing IPRP schemes within the compass of collective bargaining, but the message of union exclusion is clear (Heery, 1997). IPRP is based on the performance of the employee. There is the chance of bias in the performance appraisal. Examples of this are the ‘halo’ effect – a tendency to over-generalise the performance (Torrington et al., 1992) and the similar-to-me errors. Because of bias in performance appraisal, managers can be misled and award payments to incompetent employees. Heery (1997) therefore observes that unions want to rationalise IPRP in the sense that they want it to rest on an ‘objective’ system of performance review, so that managers follow rules in awarding payments.
In 1968, the Donovan Commission pointed out weaknesses of some of the larger industry-wide agreements and argued that, for many employers, the best solution would be to break away into single-employer, or what is now commonly called ‘enterprise’ bargaining. This provided an official blessing for enterprise bargaining specially in the private sector. Brown et al. (2001) think enterprise bargaining fits in with the more individualistic treatment of employees that is associated with the decline of manual employment and it provides a ready base for enterprise-related incentive schemes. Multi employer bargaining arrangements remain significant only in the public sector (particularly local government, education and health) because the fund is centralised (ibid). They also observe that collective bargaining covered 61% of the public sector workforce but only 24% of the private sector.
The new HRM technique of performance-related pay (PRP) is well suited to rewarding individual performance where output can be easily monitored (Gibbons, 1998). But there are some internal tensions in the IPRP; managerial objectives in introducing IPRP may be based on certain visions, values and cultures of the firm. If employees and representative institutions have different cultures and values from those of the employer’s they may clash which would have an impact on the IPRP scheme (Thompson, 1993). But some management gurus argue that there is no reason why this kind of payment system should not be absorbed within union-based industrial relations so that it performs smoothly with the union representation. Like any other procedural rule, it can become subject to joint regulation; .unions negotiating IPRP can be found in the research literature (Kessler, 1990). Trade unions are also aware of it. Williams (1997) observes that they are following the strategy of a collective dimension to individual services.
New Pay, in contrast, is more suitable for the nimble, fast moving and performance-driven business organisations of the twenty-first century (Drucker and White, 1997). This approach to pay systems design, argue New Pay writers, is facilitated by a shift from traditional ‘job-related pay’ to the new ‘person-related pay’ structures (Lawler, 1990). A government publication (DTI, 1996) endorses moves to greater pay flexibility and states that Britain’s deregulated labour market now allows employers considerable freedom to choose pay systems that meet their own needs and those of the workforce. The bottom line is that the role of trade unions in pay determination is greatly reduced. Pay has increasingly become the role of organisations and is influenced by the performance of the individual employee.
The CBI/Hay Management Consultants’ (CBI/Hay, 1996) survey of pay practices covered about 400 private and public sector organisations with a total workforce of 1.3 million. According to the survey, almost half the organisations reported some change in their pay strategy over the last two years; the main areas are salary structures, salary progression practices and profit-related pay. Influenced by HRM, they have now compressed pay grades. According to new the HRM, pay progression is not linked to hierarchical promotion. According to Evans (1999), harmonisation (i.e. unitarism) has led to the removal of strictly delineated pay groupings for white-collar and manual workers. The result is compressed pay grades and unions have accepted it.
The new pay order espouses the concepts of stakeholder and employee involvement, identifying unions as one of the stakeholders (Armstrong, 1996). The market is stakeholder-oriented and is finalised by the interplay of labour demand and supply. Management can determine, according to market trends, the pay of the employees based on their performances.
New individualistic trends like payment by results (PBR), competence and skill-based pay, profit-related pay etc. are dominating the management of remuneration and reward. Casey et al. (1992) revealed that nearly 60% of organisations surveyed practised PBR schemes. Profit-related pay is also gaining popularity. In water, gas, electricity and financial services, 81% and 80% of the workplaces reported its existence in the 1998 WERS (ibid). Non-financial benefits, achievement, recognition, responsibility and personal growth are important here. A simple dinner with the CEO can act as a powerful boost.
Milliward et al. (2000) suggested that there are two new trends in the British employee relations, namely sophisticated consultation and sophisticated human relations – these are two forms of individualism. Sophisticated consultation stresses the need for union co-operation in implementation of employee development and high commitment practices. For this, it suggests the need for evidence of the presence of high commitment practices as literature reveals. WERS found evidence of high commitment practices in unionised workplaces (Cully et al., 1999). It is evident that where at least half of the itemised practices were done, union density averaged 47%, compared with 35% where it was below this number (Kessler and Purcell, 2003). These kinds of practices include IPRP, personality and performance tests, off-the job training, profit-related pay etc. In the past, there was the temptation to view IPRP, profit-related pay and share-ownership schemes as indicative of non-union presence. There are examples of organisations like the, then, British rail where IPRP was introduced under union de-recognition. But, union exclusion has rarely been the primary objective of IPRP (Thompson, 1992). It should be noted that the use of a particular scheme has a wide variety of meaning. Schemes like IPRP and profit-related pay include recruiting and retaining staff by boosting earnings potential and selectively rewarding and encouraging the development of certain process skills and circumstances (Kessler and Purcell, 2003). They observed that in the sophisticated consultative style, compatibility of such schemes with a union presence is in the continued union involvement in pay determination. The sophisticated consultative style encourages union participation in pay determination (Evans, 1999). Profit-sharing and employee share-ownership have often been presented as even more directly concerned with creating an alternative source of employee allegiance through linking employee pay to performance of the company ….union (Poole, 1989).
It is undeniable that individualism is a notable feature of new employee relations in Britain which is conditioned by new management techniques and socio-economic and political contexts and also by the government policy. Because of it, new types of remuneration and reward like IPRP, profit-related pay, team-based reward have been introduced to a great extent. But these new types of remuneration policy are not intrinsically against laws of collectivism. In fact, both can co-exist peacefully as Storey and Sisson (1993) observed. A union presence not only is compatible with the use of new management techniques, but also can actively contribute to their effective deployment within workplaces. Union participation in pay determination can rationalise decisions. IPRP is based on the performance of the individual which rests on the performance appraisal which, as stated earlier, can be biased. So, union involvement can have positive effects on the pay determination through playing a consultative role. Management commitment to adopting a policy of partnership with union co-operation in the implementation of employee development and high commitment practices would be rational. In sum, a combination of factors, as discussed above, are shaping the management of remuneration and reward where the main aim is fulfilment of organisational objectives. IPRP schemes, profit-related pay etc. should be seen in the broader framework of analysis. One is inevitably linked to other. Merely following the schemes will lead to difficulties. Managers should find a good balance between the IPRP, profit-related pay etc. and collectivism. There are possibilities that companies which do not practise collective bargaining may run the risk of poor consultation and less employee involvement that can result in high employee turn over. Therefore managements are trying to find a good combination of union participation and individualism.
Agarwal, N, Singh, P. (1998), ‘Organizational rewards for a changing workplace: an examination of theory and practice’, International Journal of Technology Management, Vol. 16 No.1/2/3, pp.225-38.
Akinson, J. (1984), Flexible Manning: The Way Ahead, London, Institute of Man Power Planning.
Armstrong, M. (1996), Employee Reward, London, IPD.
Bacon, N. and Storey, J. (2000), ‘New Employee Relations Strategies in Britain: Towards Individualism or Partnership’ British Journal of Industrial Relations, Vol. 38, Issue 3, pp.407-427.
Barber, B. (1994), ‘A Trade Union View’, Proceedings of a Conference to launch the Centre for International Employment.
Booth, A.L. and Francesconi, M. (2000), ‘Collectivism versus Individualism: Performance-related Pay and Union Coverage for Non-standard Workers in Britain’ paper presented at the British Association for the Advancement of Science Conference (Imperial College, London) and at the University of Bilbao.
Brown, W., Marginston, P. and Walsh, J. (1995), ‘Management: pay determination and collective bargaining’ in Edwards, P. (ed.), Industrial Relations: Theory and Practice in Britain, Oxford, Blackwell.
Brown, W., Deakin, S., Nash, D., Oxenbridge, S. (2000), ‘The employment contract: from collective procedures to individual rights’, British Journal of Industrial Relations, Vol. 38 No.4, pp.611-29.
Brown, W and Marginson, P (2001), ‘The Management of Pay as the Influence of Collective Bargaining Diminishes’ ESRC Centre for Business Research, University of Cambridge, Working Paper 213.
Casey, B., Lakey, J and White, M. (1992), ‘Payment Systems: A Look at Current Practice’, Research Series No.5, Department of Employment,, Policy Studies Institute.
CBI/Hay (1996), ‘Trends in Pay and Benefits Systems 1995’ CBI/Hay Survey Results, London, CBI.
Certification Office (1979-1993), Annual Reports, HMSO, London, .
CIPD fact sheet, (2004), ‘Trade Unions: A Short History’, [online], available, http://www.cipd.co.uk/subjects/empreltns/tradunin/tradunihist.htm?IsSrchRes=1,
accessed on 12/5/2007.
Cully, M., Woodland, S., O’Reilly, A., and Dix, G. (1999), Britain at Work, London, Routledge.
Drucker, J and White, G. (1997), ‘Constructing a new reward strategy Reward management in the British construction industry’, Employee Relations, Volume 19 Number 2, pp. 128-146.
DTI (1996), The Rewards of Success. Flexible Pay Systems in Britain, Department of London, Trade and Industry.
Evans, J. (1999), ‘ Pay’, in Hollinshead, G. Nicholls, P. and Tailby, S. (1999), Employee Relations, Pitman Publishing.
Freeman, R. and Pelletier, J., (1990), ‘The impact of industrial relations legislation on British Union density’, British Journal of Industrial Relations, Jul, Vol. 28, Issue 2, p141-164, 24p.
Gibbons, R. (1998), ‘Incentives in Organizations’, Journal of Economic Perspectives, 12, pp.115-132.
Grainger, H, (2005), ‘Trade Union Membership 2005’, National Statistical Report Department of Trade and Industry.
Guest, D. (1989), ‘Human Resource Management: Its implications for Industrial Relations and Trade Unions’ in Storey, J. (1989), edited New Perspectives on Human Resource Management, London, Routledge.
Gunnigle, P.Turner, T.and and D’ Art (1998), ‘Counterpoising collectivism: performance-related pay and industrial relations in greenfield sites’, British Journal of Industrial Relations, Dec, Vol. 36, Issue 4.
Heery, E. (1997), ‘Performance-related pay and trade union de-recognition’, Employee Relations, Volume 19, Number 3, pp. 208-221.
Kerrin, M. and Oliver, N. (2002), ‘Collective and individual improvement activities: the role of reward systems’, Personnel Review, Volume 31 Number 3 2002 pp. 320-337.
Kessler, I. (1990), ‘Flexibility and comparability in pay determination for professional civil servants’, Industrial Relations Journal, Vol. 21 No.3, pp.194-208.
Kessler, I. and Purcell, J. (2003), ‘Individualism and Collectivism in Industrial Relations’ in P. Edwards (ed.), Industrial Relations, Oxford, Blackwell.
Lawler, E.E (1990), Strategic Pay, San Francisco, CA, Jossey-Bass.
Metcalf, D. (1991), ‘British unions: dissolution or resurgence?’ Oxford Review of Economic Policy, Vol. 7 No. 1, pp. 18-32.
Millward, N., Bryson, A. and Forth, J. (2000), All Change at Work? , London, Routledge.
Morehead, A., Steele, M., Alexander, M., Stephen, K and Duffin, L. (1997), Changes at work: the 1995 Australian workplace industrial relations survey, Melbourne, Longman.
Oliver, N., Wilkinson, B. (1992), The Japanization of British Industry, (2nd ed.), Oxford, Blackwell.
Poole, M. (1989), The Origins of Economic Democracy, London, Routledge.
Purcell, J. and Ahlstrand, B. (1994), Human Resource Management, Oxford, OUP.
Purcell, J. (1987). ‘Mapping management styles in employee relations’, Journal of Management Studies, Volume 23 pp. 205-23.
Purcell, J. (1991). ‘The rediscovery of management prerogative: the management of labour relations in the 1980s’, Oxford Review of Economic Policy, Volume 7 pp. 33-43.
Salmon, J. and Stewart, P. (1994). ‘Unions on the Brink? Themes and Issues’, Employee Relations, Volume 16, Number 2, pp. 8-23.
Salamon, M. (2003), ‘Collective Bargaining’ in Hollinshead, G., Nichols, P. and Tailby, S., (2003), (eds.), Employee Relations, Harlow, Financial Times/Prentice Hall.
Sisson, K. (1993), ‘In Search of HRM’, British Journal of Industrial Relations, Volume 31, Issue 2, pp.201-210.
Smith, P., Morton, G. (1994), ‘Union exclusion in Britain: next steps’, Industrial Relations Journal, Vol. 32 No.1, pp.3-14.
Storey, J. (1992), Management of Human Resources, Oxford, Blackwell.
Storey, J and Sisson, K. (1993), Managing Human Resources and Industrial Relations, Buckingham, Open University Press.
Storey, J. and Bacon, N. (1993). ‘Individualism and collectivism: into the 1990s’. International Journal of Human Resource Management, 4: 665-84.
TGWU (1989), ‘Employee Involvement and Quality Circles’, Transport & General Workers Union, London.
Thompson, M. (1992), ‘ Pay and Performance: The Employer Expenses’. IMS Report.
Torrington, D., Hall, L., Haylor, I and Myers, J., (1992), Employee Resourcing, London, Institute of Personnel Management.
Tuckman, A. and Finnerty, C. (1998), ‘Individual contracts, collective bargaining and trade unionism: a case for the union voice’, Personnel Review, Volume 27 Number 6, pp. 448-459.
Undy, R, (1999), “Annual Review Article: New Labour’s ‘Industrial Relations Settlement’: The Third Way?“, British Journal of Industrial Relations, Vol. 37, Issue, 2.
Undy, R (2002), ‘New Labour and New Unionism, 1997-2001: but is it the same old story?’ Employee Relations, Volume 24, Number 6, pp. 638-655.
Williams, S. (1997), ‘The Nature of some Recent Trade Union Modernization Policies in the UK’, British Journal of Industrial Relations, Volume, 35, Issue 4, PP.495-514.
Womack, J.P, Jones, D.T, Roos, D (1990), The Machine That Changed the World, New York, NY, Rawson Macmillan.
Work place Employment Relations (2004), [online], available, http://www.dti.gov.uk/files/file11423.pdf, accessed on 13/5/2007. | <urn:uuid:84491ddb-91f8-4a90-8893-7053f6d73e28> | CC-MAIN-2021-39 | https://www.ivoryresearch.com/samples/collectivism-and-individualism-in-the-management-of-remuneration-in-the-united-kingdom-and-its-impact-on-pay-systems/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058415.93/warc/CC-MAIN-20210927090448-20210927120448-00167.warc.gz | en | 0.932972 | 6,582 | 2.9375 | 3 |
1h 32m | Video: AVC (.mp4) 1280x720 15fps | Audio: AAC 32KHz 2ch | 559MB
Genre: eLearning | Projects files Added
In this AutoCAD tutorial we'll learn an approach to BIM methodology. We'll take a deep look into dynamic blocks, how to create our own dynamic blocks, the different parameters and actions we can apply to them and how to add them into our project.
Next we'll check out text attributes and learn how we can work with them. Later, we'll apply both concepts, dynamic blocks and attributes to input data into our project. Finally, we'll see how to extract this information into a data table in Excel.
By the end of this AutoCAD training, you'll understand that all these options combined give us the possibility to increase the amount of information held by our project, which is the main principle of BIM methodology.
Download From Uploaded
Download From NitroFlare
Download From Rapidgator
Download From Uploadable | <urn:uuid:d74b2279-c5e7-4558-a06d-ee9f931a4889> | CC-MAIN-2017-09 | http://gfxhome.co/486562-utilizing-dynamic-blocks-and-data-extraction-for-bim-in-autocad-with-francisco-castellanos.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00305-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.69311 | 215 | 2.625 | 3 |
Narcan: What is it and who can administer this life-saving drug?
The opioid crisis in the United States has turned into an all-out epidemic, and America’s firefighters are on the front lines in the war against these devastating drugs. Their weapon against opioid overdoses is a life-saving drug known as Narcan which can quite literally bring a person back from the brink of a deadly opioid overdose. Here’s what you need to know about this life-saving medication and the rules and regulations surrounding it.
What is Narcan and who can use it?
Narcan (naloxone HCI) is a nasal spray used to reverse the effects of high levels of opioids and can reverse deadly overdoses. According to its website, Narcan, “counteracts the life-threatening effects of an opioid overdose. Since most accidental overdoses occur in a home setting, it was developed for first responders, as well as family, friends, and caregivers—with no medical training required.”
Anyone can purchase Narcan at their local pharmacy without a prescription from a doctor. Opioid overdoses can happen anywhere which is why the drug is available not only for first responders, but for families and friends who fear their loved one is at risk of overdosing on opioids.
State regulations on Narcan Distribution and Administration
Rules and regulations surrounding dispensement and administration of naloxone vary by state. Fortunately, most states allow any citizen to receive naloxone without a prescription from a doctor. In 36 states, pharmacists are immune from prosecution or professional sanctions for prescribing naloxone to a layperson. Those same 36 states do not have requirements for naloxone administration training. Those who administer naloxone, whether they be a first responder or private citizen, are largely immune from criminal liability when administering the drug. In total, 38 states provide criminal immunity for laypersons who administer naloxone to someone suffering from opioid overdose.
With few exceptions, states across the country have regulations in place that protect those who prescribe and administer naloxone. Although some argue that this life-saving drug provides an incentive to addicts to continue using opioids given the fact that a few milligrams of naloxone could save them from an overdose, the popular opinion seems to be that the more accessible naloxone is, the better. | <urn:uuid:16e3ea76-a5f3-4167-b806-9da22b4963af> | CC-MAIN-2020-16 | https://firefighterssupportalliance.com/narcan-what-is-it-and-who-can-administer-this-life-saving-drug/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370495413.19/warc/CC-MAIN-20200329171027-20200329201027-00083.warc.gz | en | 0.943475 | 488 | 2.8125 | 3 |
George Washington Carver High School for the Sciences (GWCHSS) employs an online platform of videos and resources that reflect the cultural experiences of young Black and Latino males. GWCHSS has found that this content is critical to recreating culturally-relevant educational connections among its targeted student population. School Advisors begin by watching the videos with students. Each video features a teen’s true experience about the challenges that Black and Latino male students face.
In this video Victor Ramirez says he was twelve when he started smoking cigarettes. Marijuana followed and soon, getting high before and after school “became natural. Smoking weed, drinking alcohol, he “thought he was set.” Then selling drugs to support his habit led to his arrest – and rehabilitation. His dad, who admits his own drug use, contends that Victor was taught right from wrong and made some bad choices. Learn about the unintended consequences of our decisions and our upbringing.
Online correlated Weekly Guides enable GWCHSS Advisors to quickly review and facilitate lesson plans, which include discussion prompts, self-reflection questions and student activities. GWCHSS has found that the Connect with Kids peer-to-peer model helps improve school climate and increase positive student behavior.
Discussion and Self-Reflection Questions
- Victor’s dad said that he had a choice to use or not to use drugs. Do you think his dad’s admitted drug use contributed to his problem? Did Victor really have a choice? Why or why not?
- There’s a common saying that you can choose your friends but you cannot choose your family. What are some of the positive aspects of your family life that influence you? What are some of the negative aspects that you have to work to overcome?
- In the video, Victor says “you don’t think about none of your priorities when you get high.” How did using marijuana interfere with his priorities?
- What are some other challenges and obstacles that can interfere with priorities? How would you define your priorities?
We know that there are lots of roadblocks and challenges that can interfere with reaching a goal. Ask students to think about the challenges, the triumphs, the accomplishments and the failures they have experienced so far in their middle and high school years. Then ask, who has helped you along the way? Who and what has challenged you along the way? Where do you hope the maze will lead?
Have students complete the attached AMAZE ME! Worksheet. Ask students to write an ultimate goal and inside the maze along the maze, identify obstacles that block achieving that goal along with those who can support them in their efforts to clear the path and reach their goal. | <urn:uuid:75eb2dd0-c2a8-4e18-b819-86a04f640a79> | CC-MAIN-2018-43 | https://esinyc.com/high-risk-behavior/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514879.30/warc/CC-MAIN-20181022071304-20181022092804-00027.warc.gz | en | 0.974234 | 551 | 3.15625 | 3 |
“Early Intervention,” according to Public Law 105-17, is: “a statewide, comprehensive, coordinated, multidisciplinary, inter-agency system that provides early intervention services for infants and toddlers with disabilities and their families.” Simply put, it is a range of test and services designed to intervene early in an infant or toddler’s stages of development to define a disability. Early intervention is designed and targeted for children with disabilities under age 3 and their families or caregivers.
To help make an intervention as successful as possible, programs and therapies must be individualized to each child. Because it’s a “spectrum” disorder, each child and their symptoms and manifestations will show themselves differently. Each intervention that is designed with a professional team should address the core deficits of autism spectrum: communication, social, sensory, and academic. Programs should be tailored to a family’s needs and preferences.
According to the non-profit The Autism Society, professionals and family members should consider the following components when designing an individualized intervention plan:
A curriculum that addresses deficit areas, focuses on long-term outcomes, and considers the developmental level of each child. Deficit areas include:
- Inability to attend to relevant aspects of the environment, shift attention, and imitate the language and actions of others;
- Difficulty in social interactions, including appropriate play with toys and others, and symbolic and imaginative play; and
- Difficulty with language comprehension and use, and functional communication.
- Programs that capitalize on children’s natural tendency to respond to visual structure, routines, schedules, and predictability.
- A focus on generalization and maintenance of skills, using technology such as incidental teaching approaches.
- Effective and systematic instructional approaches that utilize technology associated with Applied Behavior Analysis, including chaining, shaping, discrete trial format, and others.
- Coordinated transitions between service delivery agencies, including 0-2 programs, early intervention/preschool programs, and kindergarten environments.
- Use of technology associated with functional behavioral assessment and positive behavioral supports with a child who presents behavioral challenges.
- Family involvement, including coordination between home and involved professionals; an in-home training component; and family training and support. | <urn:uuid:6f14af0b-521b-423b-b4ef-035b7f2663b7> | CC-MAIN-2018-47 | http://spectrumsmagazine.com/where-do-i-start/early-intervention/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743521.59/warc/CC-MAIN-20181117123417-20181117145417-00520.warc.gz | en | 0.936798 | 457 | 3.375 | 3 |
Enter a grandparent's name to get started.
These are corporeal motion and facial expression. An attempt has been made by some writers to discuss these general divisions separately, and its success would be practically convenient if it were always understood that their connection is so intimate that they can never be altogether severed. A play of feature, whether instinctive or voluntary, accentuates and qualifies all motions intended to serve as signs, and strong instinctive facial expression is generally accompanied by action of the body or some of its members. But, so far as a distinction can be made, expressions of the features are the result of emotional, and corporeal gestures, of intellectual action. The former in general and the small number of the latter that are distinctively emotional are nearly identical among men from physiological causes which do not affect with the same similarity the processes of thought. The large number of corporeal gestures expressing intellectual operations require and admit of more variety and conventionality. Thus the features and the body among all mankind act almost uniformly in exhibiting fear, grief, surprise, and shame, but all objective conceptions are varied and variously portrayed. Even such simple indications as those for “no” and “yes” appear in several differing motions. While, therefore, the terms sign language and gesture speech necessarily include and suppose facial expression when emotions are in question, they refer more particularly to corporeal motions and attitudes. For this reason much of the valuable contribution of Darwin in his Expression of the Emotions in Man and Animals is not directly applicable to sign language. His analysis of emotional gestures into those explained on the principles of serviceable associated habits, of antithesis, and of the constitution of the nervous system, should, nevertheless, always be remembered. Even if it does not strictly embrace the class of gestures which form the subject of this paper, and which often have an immediate pantomimic origin, the earliest gestures were doubtless instinctive and generally emotional, preceding pictorial, metaphoric, and, still subsequent, conventional gestures even, as, according to Darwin’s cogent reasoning, they preceded articulate speech.
While the distinction above made between the realm of facial play and that of motions of the body, especially those of the arms and hands, is sufficiently correct for use in discussion, it must be admitted that the features do express intellect as well as emotion. The well-known saying of Charles Lamb that “jokes came in with the candles” is in point, but the most remarkable example of conveying detailed information without the use of sounds, hands, or arms, is given by the late President T.H. Gallaudet, the distinguished instructor of deaf-mutes, which, to be intelligible, requires to be quoted at length:
One day, our distinguished and lamented historical painter, Col. John Trumbull, was in my school-room during the hours of instruction, and, on my alluding to the tact which the pupil referred to had of reading my face, he expressed a wish to see it tried. I requested him to select any event in Greek, Roman, English, or American history of a scenic character, which would make a striking picture on canvas, and said I would endeavor to communicate it to the lad. ‘Tell him,’ said he, ‘that Brutus (Lucius Junius) condemned his two sons to death for resisting his authority and violating his orders.’
I folded my arms in front of me, and kept them in that position, to preclude the possibility of making any signs or gestures, or of spelling any words on my fingers, and proceeded, as best I could, by the expression of my countenance, and a few motions of my head and attitudes of the body, to convey the picture in my own mind to the mind of my pupil.
It ought to be stated that he was already acquainted with the fact, being familiar with the leading events in Roman history. But when I began, he knew not from what portion of history, sacred or profane, ancient or modern, the fact was selected. From this wide range, my delineation on the one hand and his ingenuity on the other had to bring it within the division of Roman history, and, still more minutely, to the particular individual and transaction designated by Colonel Trumbull. In carrying on the process, I made no use whatever of any arbitrary, conventional look, motion, or attitude, before settled between us, by which to let him understand what I wished to communicate, with the exception of a single one, if, indeed, it ought to be considered such.
The usual sign, at that time, among the teachers and pupils, for a Roman, was portraying an aquiline nose by placing the forefinger, crooked, in front of the nose. As I was prevented from using my finger in this way, and having considerable command over the muscles of my face, I endeavored to give my nose as much of the aquiline form as possible, and succeeded well enough for my purpose….
Enter a grandparent's name to get started.choose a state:Start Now
The outlines of the process were the following:
A stretching and stretching gaze eastward, with an undulating motion of the head, as if looking across and beyond the Atlantic Ocean, to denote that the event happened, not on the western, but eastern continent. This was making a little progress, as it took the subject out of the range of American history.
A turning of the eyes upward and backward, with frequently-repeated motions of the head backward, as if looking a great way back in past time, to denote that the event was one of ancient date.
The aquiline shape of the nose, already referred to, indicating that a Roman was the person concerned. It was, of course, an old Roman.
Portraying, as well as I could, by my countenance, attitude, and manner an individual high in authority, and commanding others, as if he expected to be obeyed.
Looking and acting as if I were giving out a specific order to many persons, and threatening punishment on those who should resist my authority, even the punishment of death.
Here was a pause in the progress of events, which I denoted by sleeping as it were during the night and awakening in the morning, and doing this several times, to signify that several days had elapsed.
Looking with deep interest and surprise, as if at a single person brought and standing before me, with an expression of countenance indicating that he had violated the order which I had given, and that I knew it. Then looking in the same way at another person near him as also guilty. Two offending persons were thus denoted.
Exhibiting serious deliberation, then hesitation, accompanied with strong conflicting emotions, producing perturbation, as if I knew not how to feel or what to do.
Looking first at one of the persons before me, and then at the other, and then at both together, as a father would look, indicating his distressful parental feelings under such afflicting circumstances.
Composing my feelings, showing that a change was coming over me, and exhibiting towards the imaginary persons before me the decided look of the inflexible commander, who was determined and ready to order them away to execution. Looking and acting as if the tender and forgiving feelings of the father had again got the ascendency, and as if I was about to relent and pardon them.
These alternating states of mind I portrayed several times, to make my representations the more graphic and impressive.
At length the father yields, and the stern principle of justice, as expressed in my countenance and manners, prevails. My look and action denote the passing of the sentence of death on the offenders, and the ordering them away to execution.
He quickly turned round to his slate and wrote a correct and complete account of this story of Brutus and his two sons.
While it appears that the expressions of the features are not confined to the emotions or to distinguishing synonyms, it must be remembered that the meaning of the same motion of hands, arms, and fingers is often modified, individualized, or accentuated by associated facial changes and postures of the body not essential to the sign, which emotional changes and postures are at once the most difficult to describe and the most interesting when intelligently reported, not only because they infuse life into the skeleton sign, but because they may belong to the class of innate expressions. | <urn:uuid:3f2f5714-c801-418e-8364-4f0bffa6818f> | CC-MAIN-2016-07 | https://www.accessgenealogy.com/native/divisions-of-gesture-speech-sign-language.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701166650.78/warc/CC-MAIN-20160205193926-00118-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.974735 | 1,744 | 3.375 | 3 |
Millennial Development Goals
- Maria Kiwanuka, Minister of Finance, Planning & Economic Development, Uganda
- Millennial Development Goals were being developed in silos…maternal health goal wasn’t considering education goals
- Disagrees a bit w/Seema Aziz, Founder of CARE, largest NGO in Pakistan. Rather, Kiwanuka argues that Poverty, Ignorance and Disease are the root causes rather than illiteracy…- we feel that this is a “chicken or the egg” debate
- Kaushik Basu, World Bank Chief Economist
- Is there a point to raise poverty line definition
- New indicator for different engagement regarding the bottom 40%, move away from focusing on poor countries and shift a World Bank policy-making
World Bank Press Release: Developing Countries Need to Harness Urbanization to Achieve the MDGs: IMF-World Bank report
WASHINGTON, April 17, 2013 – Urbanization helps pull people out of poverty and advances progress towards the Millennium Development Goals (MDGs), but, if not managed well, can also lead to burgeoning growth of slums, pollution, and crime, says the Global Monitoring Report (GMR) 2013, released today by the World Bank and International Monetary Fund (IMF).
Urbanization has been a major force behind poverty reduction and progress towards other MDGs. With over 80 percent of global goods and services produced in cities, countries with relatively higher levels of urbanization, such as China, and many others in East Asia and Latin America, have played a major role in lowering extreme poverty worldwide.
GMR 2013: Rural-Urban Dynamics and the Millennium Development Goals starkly compares the well-being in the countryside versus the city. Urban infant mortality rates range from 8-9 percentage points lower than the rural rates in Latin America and Central Asia; to 10-16 percentage points in the Middle East and North Africa, South Asia, and Sub-Saharan Africa and highest in East Asia (21 percentage points).
“The rural-urban divide is quite evident. Megacities and large cities are the richest and have far better access to basic public services; smaller towns, secondary cities, and areas on the perimeter of urban centers are less rich; and rural areas are the poorest,” said Kaushik Basu, the World Bank’s Chief Economist and Senior Vice President for Development Economics. “But this does not mean unfettered urbanization is a cure-all – the urban poor in many places urgently need better services as well as infrastructure that will keep them connected to schools, jobs and decent health care.”
“Bending Arc of Poverty” Moderated by Lesley Wroughton, Senior Correspondent, Reuters
World Bank Live
@WorldBankLive 1h Kim and Basu agree: Working in fragile states is key to ending poverty and boosting shared prosperity worldwide. #ittakes
- The WBG believes in inclusive growth — countries’ growth must include youth, women, the poor. – Kim http://bit.ly/YIQrGa
- Evidence shows massive inequality builds instability in societies – Kim http://bit.ly/YIQrGa
- @WorldBankLIve: Basu: People already living under the poverty line – $1.25/day – are our first line of attention. http://bit.ly/YIQrGa
- World Bank President Kim
- Boosting “Shared Prosperity” inter-generationally is new. #ODA is still critical. ~Kim #ittakes I’m an anthropologist, please don’t tell me that your culture holds back gender equality. We should insist. We’ve taken a position.
- Primary purpose to look at 2 goals
- Agreements are important, climate issue: we’re committed to it
- We have a lot of civil society actors: bloggers and media (the 4th Estate)
- We will make mistakes, but if you’re trying to be ambitious and bold, as long as we learn from our mistakes, we will move forward. we will not be paralyzed.
- Kaushik Basu
- Culture and Gender, I’m a closet anthropologist. Respect cultures, and two are completely compatible
- As long as there are these little pockets that have “emergency fires” we can tend to that
- As BRIC countries integrate, we will differ, but fundamentally, when we scrape the surface will achieve the broad objectives. | <urn:uuid:cc353a5d-782f-4d10-aa79-32b5d7e8c22b> | CC-MAIN-2023-50 | http://www.pitapolicy.com/world-bank-spring-briefings-1-bending-arc-of-poverty-2-millennial-development-goals-civil-society-organizations/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00753.warc.gz | en | 0.918061 | 933 | 2.71875 | 3 |
Theories of Cognitive Development by Piaget and Vygotsky Essay
Theories of Cognitive Development by Piaget and Vygotsky
Jean Piaget’s and Lev Semionovich Vygotsky’s theories on cognitive development both play a significant role in addressing the intellectual growth of children (Lain, 2006). Psychologists and educators alike, rely on these theories in constructing the standards by which children are being brought up and taught today. Essentially, cognitive development is the process by which our intellectual ability grows and progresses. Slavin (2003), maintains that cognitive development, “is the gradual and orderly changes that occur making ones mental process more complex and sophisticated” (as cited in Lain, 2006, Cognitive Development section, para.
1). As the children’s learning process is crucial to the development of their learning ability and critical thought process, educators must have a good grasp of these theories to fully address the children’s individual learning needs. Jean Piaget’s theory is marked by several developmental stages that define the child’s corresponding cognitive level. On the other hand, Lev Vygotsky developed the Zone of Proximal Development (ZPD) based on the assumption that children learn more quickly under the guidance of a more experienced adult (Maccarelli, 2006).
Considered as constructivists, both renowned theorists believed that children learn by formulating new ideas by combining old ones. The Hawai’i Department of Education E-School also claims that, “constructivists believe that learning is affected by the context in which an idea is taught as well as by students’ beliefs and attitudes” (as cited in Davison, 2006, Piaget vs Vygotsky: The Cognitive Development Theory section, para. 1). As society determines the amount of knowledge a child gains, it also sets the limit to the students’ cognitive development.
However, the principal ideas between the two theorists vary greatly. Piaget strongly believed that learning occurs after development. He indicated that a child will start the learning process after the child has reached a certain developmental stage. Contrarily, Vygotsky claimed that the child develops as a result of learning. Furthermore, Vygotsky placed a large amount of emphasis on the importance of outside influence to the child’s overall cognitive development, where as Piaget barely acknowledged the significance of outside influence on the child’s development in his theorems.
Moreover, while Piaget’s theory has four distinct and set standards of development, Vygotsky’s theory does not support predetermined stages at all. Instead, he stressed the importance of private speech and ZPD on the child’s development. Living in a society that is an integration of multiple cultures, classified by age, race, gender, ethnicity, religion, and economic status, each of us is a product of our social interactions to these various cultures.
If we examine Vygotsky’s theory, a large part of a child’s development is placed on the input of others, it is therefore reasonable to assume that a multicultural society places a great deal of input on the child’s development. However, since a child’s development is limited to his or her surroundings, and his thoughts and ideas mainly influenced by that of his early caregivers, sometimes the child is not exposed to different cultures other than his own. This gives rise to multicultural issues that we see nowadays.
And as the study of multicultural psychology is greatly concerned with exploring, understanding, and appreciating the differences in culture, based on Piaget’s and Vygotsky’s theory, these multicultural issues could be avoided if children are exposed or introduced to diverse cultures early in life. References Davison, B. (2006). Piaget vs Vygotsky: The Cognitive Development Theory. Associated Content. Retrieved on January 01, 2009, from http://www. associatedcontent. com/article/94974/piaget_vs_vygotsky_the_cognitive_development. html? cat=4 Lain, (2006). Cognitive Development: A Comparison Between the Work of Piaget, Bruner, and Vygotsky.
Associated Content. Retrieved on January 01, 2009, from http://www. associatedcontent. com/article/41531/cognitive_development. html? cat=4 Maccarelli, S. (2006). Vygotsky’s Theory of Cognitive Development: The Socio-Cultural Perspective. Associated Content. Retrieved on January 01, 2009, from http://www. associatedcontent. com/article/29997/vygotskys_theory_of_cognitive_development. html? cat=4 Uncgrad, (2006). Piaget’s Stages of Cognitive Development. Associated Content. Retrieved on January 01, 2009, from http://www. associatedcontent. com/article/452881/piagets_stages_of_cognitive_development. html? cat=4
University/College: University of Chicago
Type of paper: Thesis/Dissertation Chapter
Date: 13 November 2016
Let us write you a custom essay sample on Theories of Cognitive Development by Piaget and Vygotsky
for only $16.38 $13.9/page | <urn:uuid:72d2847e-bdfd-46a0-9c1f-a248e3feab1d> | CC-MAIN-2017-43 | https://studymoose.com/theories-of-cognitive-development-by-piaget-and-vygotsky-essay | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824357.3/warc/CC-MAIN-20171020211313-20171020231313-00122.warc.gz | en | 0.928953 | 1,122 | 3.53125 | 4 |
Add a boost with Green Blend, featuring Barley Grass.
Barley (Hordeum vulgare L.) a member of the grass family, is a major cereal grain. Important uses include use as animal fodder, as a source of fermentable material for beer and certain distilled beverages, and as a component of various health foods. It is used in soups and stews, and in barley bread of various cultures. Barley grains are commonly made into malt in a traditional and ancient method of preparation.
In a 2007 ranking of cereal crops in the world, barley was fourth both in terms of quantity produced (136 million tons) and in area of cultivation (566,000 km²).
Like wheat and rye, barley contains gluten, which makes it an unsuitable grain for consumption by those with celiac disease.
Barley contains eight essential amino acids. According to a
recent study, eating whole-grain barley can regulate blood sugar (i.e. reduce
blood glucose response to a meal) for up to 10 hours after consumption compared
to white or even whole-grain wheat, which have similar glycemic
indices. The effect was attributed to colonic fermentation of indigestible carbohydrates.
Natural Health
Products Ingredients Database: http://webprod.hc-sc.gc.ca/nhpid-bdipsn/ingredReq.do?id=13118&lang=eng
“FAOSTAT”. Food and
Agriculture Organization of the United Nations. Retrieved 2009-05-18. | <urn:uuid:f3186065-72a1-4cfe-8788-406e4f8f26c5> | CC-MAIN-2017-34 | https://smoothieessentials.wordpress.com/2012/10/19/the-herbs-of-smoothie-essentials-barley-grass/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105341.69/warc/CC-MAIN-20170819105009-20170819125009-00630.warc.gz | en | 0.925819 | 326 | 2.703125 | 3 |
Fear of breast cancer is widespread, yet many women don’t realize that adopting protective living habits may help keep it at bay. The habits described below may also help to ward off other life-threatening ills, like heart disease and diabetes.
Click the link to read the full article written by Jane Brody – New York Times
Cancer, also called malignancy, is an abnormal growth of cells. There are more than 100 types of cancer, including breast cancer, skin cancer, lung cancer, colon cancer, prostate cancer, and lymphoma. Symptoms vary depending on the type.Cancer treatment may include chemotherapy, radiation, and/or surgery.
Review the list and learn more about the different types of cancers. READ MORE
Hear insights from Jordi Rodón, MD, PhD, Clinical Oncologist and Director of the Research Unit for Molecular Therapy of Cancer at Vall d´Hebron in Barcelona, on the use of next-generation sequencing to empower the future of precision medicine in oncology drug development.
Illumina invites leading European scientists to present their latest research and perspectives on Genomics in Oncology.
Click on the following link to view the video. VIDEO
Cancer is a genetic disease—that is, cancer is caused by certain changes to genes that control the way our cells function, especially how they grow and divide. These changes include mutations in the DNA that makes up our genes.
Genetic changes that increase cancer risk can be inherited from our parents if the changes are present in germ cells, which are the reproductive cells of the body (eggs and sperm). Such changes, called germline changes, are found in every cell of the offspring.
Cancer-causing genetic changes can also be acquired during one’s lifetime, as the result of errors that occur as cells divide during a person’s lifetime or exposure to substances, such as certain chemicals in tobacco smoke, and radiation, such as ultraviolet rays from the sun, that damage DNA.
Genetic changes that occur after conception are called somatic (or acquired) changes. They can arise at any time during a person’s life. The number of cells in the body that carry such changes depends on when the changes occur during a person’s lifetime.
In general, cancer cells have more genetic changes than normal cells. But each person’s cancer has a unique combination of genetic alterations. Some of these changes may be the result of cancer, rather than the cause. As the cancer continues to grow, additional changes will occur. Even within the same tumor, cancer cells may have different genetic changes.
Read the full story at National Cancer Institute: READ MORE | <urn:uuid:e351b07a-b8fa-4912-91d2-6bdd999df5a9> | CC-MAIN-2017-34 | https://reveal23.com/category/news/industry-insights/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109525.95/warc/CC-MAIN-20170821191703-20170821211703-00462.warc.gz | en | 0.943009 | 552 | 3.125 | 3 |
Storm Water Program
SVCW helps prevent pollution of our waterways by proactively managing storm water and urban runoff.
Storm water runoff is any water that falls and is transported over land or pavement into local bodies of water through the storm drain system. Storm water is rain and water from sprinklers or irrigation of yards and gardens.
Urban runoff is storm water that picks up pollutants on its way into a storm drain or waterway. It often includes automobile pollutants, pesticides, fertilizers, trash, soap, and other materials and chemicals. Once urban runoff enters the storm drain, it goes directly into the nearest body of water like creeks, San Francisco Bay, or the Pacific Ocean, without treatment.
SVCW works with the San Mateo Countywide Water Pollution Prevention Program to conduct storm water inspections of commercial and industrial businesses in Belmont and San Carlos. These cities have authorized staff to conduct inspections to prevent storm water pollution. To make efficient use of staff time, SVCW inspectors combine storm water inspections with FOG inspections to reduce the number of visits.
The land that water flows over or through on its way to a creek, delta, bay, or ocean is called a watershed. Everyone lives in a watershed, and everything that happens in the watershed affects water quality and the heath of animals, plants, and the people who live nearby. Pollution in distant parts of a watershed can be washed into storm drains, and cause problems downstream. Human activities can either harm or improve the condition of a watershed, including its water quality. There are 34 watersheds in San Mateo County. Most of the storm water in San Mateo County drains into San Francisco Bay.
There is an important difference between storm drains and sewers: water from the sanitary sewers, including water from your bathtub and toilet, is treated. Toxins are removed before the water is released into our waterways.
Storm water is not treated. Storm water and all the pollutants that flow into outdoor drains at businesses, homes, parking lots, from streets into the gutter and into storm drains discharge directly into our creeks and other bodies of water.
For more information about the San Mateo Countywide Water Pollution Prevention Program go to flowstobay.org | <urn:uuid:55b75d44-cb1f-458a-904d-ada2834a9e04> | CC-MAIN-2022-40 | https://svcw.org/businesses/pollution-prevention/storm-water-program/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00466.warc.gz | en | 0.932852 | 461 | 3.234375 | 3 |
Basic Social Category
Categories such as age, race, gender, for which perceivers have a wealth of information available in memory.
The process of simplifying our environment by creating categories on the basis of characteristics (such as hair color or athletic ability) that a particular set of people appear to have in common.
An understanding that a person's membership in a social category, such as gender or race, does not change across time or as a matter of superficial changes in appearance.
The proposition that when group members view themselves in terms of the (usually positive) stereotypes they have of their group, the self becomes one with the group and the positive view of the group is reflected in a positive view of the self.
The extent to which a stereotype is accessible in one's mind.
The extent to which one uses a stereotype to judge a member of the stereotyped group.
The extent to which a person agrees with the social stereotype of a group.
The proposition that stigmatized group members are aware that they are stereotyped and that, especially in achievement settings, they fear confirming those stereotypes.
Categories that are subordinate to the more basic categories of sex, race, and age | <urn:uuid:f85e9d95-bee2-476b-a713-05bdf981f0a5> | CC-MAIN-2023-06 | http://breakingprejudice.org/teaching/definitions/stereotypes.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501407.6/warc/CC-MAIN-20230209045525-20230209075525-00737.warc.gz | en | 0.941118 | 283 | 4.1875 | 4 |
Arthritis is, in fact, an umbrella term used to refer to several different disorders. Among these are osteoarthritis, which involves the gradual loss of cartilage and overgrowth of bone in the joints, especially the knees, hips, spine and fingertips, and rheumatoid arthritis, a chronic inflammatory disease in which the immune system attacks the joints and, sometimes, other parts of the body as well.
While not all forms of arthritis are preventable, there is much you can do to alter the course and severity of the disease.
* Eliminate food sensitivities. Foods that can worsen osteoarthritis include red meat, sugar, fats, salt, caffeine and nightshade plants (such as tomatoes, potatoes, peppers and aubergines). Dairy foods are another offender, but the problem lies with the dairy protein, rather than the fat, so skimmed-milk products are as risky as the whole-milk ones (Scand J Rheumatol, 1979; 8: 249-55).
* Follow a Mediterranean-type diet. This consists primarily of fish, fruit, vegetables, cereals, beans and neutral fats such as olive oil, and may be a preventative. It has been associated with as much as a 56-per-cent reduction in disease activity (joint swelling, tenderness and pain), and better movement and vitality (Ann Rheum Dis, 2003; 62: 208-14). One reason for this may be that such a largely plant-based diet is high in certain anti-inflammatory compounds such as essential fatty acids and enzymes.
* Consume good fats to keep the joints lubricated. Polyunsaturated oils and omega-3 supplements have a mild beneficial effect in high doses. Fish oil (10 g/day) has been shown to relieve symptoms of rheumatoid arthritis (Arthritis Rheum, 1994; 37: 824-9). Borage, evening primrose and blackcurrant seed oils contain gamma-linolenic acid (GLA), an anti-inflammatory fatty acid. Taking borage oil (1-3 g/day) for at least three months may reduce symptoms of rheumatoid arthritis (Ann Intern Med, 1993; 119: 867-73; Arthritis Rheum, 1996; 39: 1808-17).
* Avoid bad fats. Meat is high in a specific fatty acid (arachidonic acid) that is believed to promote inflammation in the body. Vegetarian diets reduce your intake, and vegan diets eliminate it almost completely. Researchers have found that vegan diets are permanently beneficial for those with rheumatoid arthritis (Scand J Rheumatol, 1986; 15: 219-23). Maintaining a strict vegan diet can improve rheumatoid symptoms in up to 40 per cent of sufferers (Rheumatology, 2001; 40: 1175-9).
* Lose excess weight. Extra weight increases your risk of developing osteoarthritis in the knees, hands and hips (Arthritis Rheum, 2003; 48: 1024-9; Arthritis Rheum, 2003; 48: 1030-3; Rheumatol [Oxford], 2002; 41: 1155-62). Women are especially at risk. In men, excess weight increases the chances of developing gout.
* Fasting. Several studies have shown that supervised fasting can relieve symptoms of arthritis (Lancet, 1991; 338: 889-902), and help identify food allergies and sensitivities that lead to the disease.
* Regular moderate exercise. This is essential for slowing deterioration of the joints. Activities that don’t put stress on joints, but which strengthen the surrounding bones, muscles and ligaments are helpful for many types of arthritis and may also be preventative. Good choices include cycling, walking and swimming, but avoid weight-bearing or impact exercises.
* Avoid injuries. Whatever your age, serious injuries to the joints – torn ligaments, torn cartilage or broken bones – can lead to arthritis later in life. People who injure their knees as teenagers and young adults are nearly three times more likely than those without such injuries to have osteoarthritis by the time they reach age 65 (Ann Intern Med, 2000; 133: 321-8).
* Try glucosamine. Many double-blind trials have shown that glucosamine sulphate reduces symptoms of osteoarthritis (Arzneim Forsch, 1998; 48: 469-74; Clin Ther, 1980; 3: 260-72), and some experts believe it can also prevent it developing in those who are at risk. Although some have expressed fears over long-term supplementation, a recent trial found that, over three years of supplementation (1500 mg daily), blood sugar levels were not affected and there were almost no side-effects (Lancet, 2001; 357: 251-6). | <urn:uuid:5eca5fc1-3800-4482-9de0-e3ffff6aac89> | CC-MAIN-2021-17 | https://healthy.net/2006/06/23/arthritisgentle-alternatives-to-help-you-stay-supple/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039490226.78/warc/CC-MAIN-20210420183658-20210420213658-00132.warc.gz | en | 0.922549 | 1,009 | 3.171875 | 3 |
Cranberry grows in the cold, northern wetlands of Europe and America. Though the larger American variety (V. macrocarpon) has stolen the culinary show and is most widely available commercially, wild cranberries have been eaten by Arctic peoples for millennia and are still a very popular fruit for wild-harvesting in Scandanavia and Russia. Traditional Native American use of these sour, astringent berries was to incorporate them into “emmican cakes” along with dried deer meat and fat. Cranberries were also used as a dye, and for medicine that reduced fever, addressed urinary complaints and as a poultice to draw poisons out of arrow wounds. Early American colonists, who dubbed the berries “craneberry” (perhaps because cranes like to eat them) cooked them with maple syrup and ate this sauce with meat.
They are highly nutritious as a regular food and juice, as well as a medicine. Cranberry fruits and juices contain large amounts of vitamin C, along with vitamins A, B1, B2, B3, B5, B6, E & K, plus potassium, phosphorus, calcium, manganese, magnesium, sodium, sulphur, selenium, zinc, iron and copper. Not forgetting the other pharmacological bio-active antioxidants known as proanthocyanidins/anthocyanidins and beneficial organic acids: ellagic, citric, malic, quinic, benzoic, chlorogenic, eugenol, ferrulic; also beta carotene, lutein and quercetin.
In the 1920’s cranberry juice was widely used to prevent chronic urinary tract infections (UTIs) as it still is today. UTIs are usually caused by E. coli, that, like many bacteria have a hairy exterior which sticks to cells and allows the pathogen to take up residence there. This sticking is required for infection, so anything that prevents the sticking thus prevents infection – the actual killing of bacteria isn’t even necessary. The proanthocyanidins in cranberry are absorbed through the intestinal tract to enter the bloodstream and keep pathogenic bacteria from sticking to cells lining the stomach and bladder. Studies in Europe comparing different berries and berry phenolics, found that cranberry, cloudberry, raspberry, strawberry and bilberry especially possess clear antimicrobial effects against Salmonella, Staphylococcus and Heliobacter. Cranberry can also prevent plaque-forming bacteria from sticking to your teeth so cranberry juice can protect your teeth as well.
Please note that if you make uric acid stones, the acids in cranberry can cause you to make more. Therefore if you have a genetic propensity towards gout, cranberry is contraindicated and it is necessary to alkalize one’s urine. Cranberry causes urine to acidify which is helpful for calcium oxalate stones, along with apple cider vinegar and lemon juice.
Further research on by anti-viral specialists have found that the same compounds in cranberry that inhibit bacterial adhesion to host cells, also applies to the ability to block the adhesion and replication of influenza viruses, including those of the intestinal tract.
Lab studies have shown that cranberry can work with the antibiotic drug Clarithromycin and enhance its effect against H. pylori, which causes ulcers. Six berry extracts plus a blend were tested: raspberry (Rubus idaeus), strawberry (Fragaria spps.), cranberry (Vaccinium oxycoccus), elderberry (Sambucus nigra), blueberry (Vaccinium spps.), bilberry (Vaccinium myrtillus), and a propretery blend of all six berries. All individual berry extracts significantly inhibited H. pylori, compared with controls, and also increased susceptibility of H. pylori to clarithromycin, but the combination of all six demonstrated maximal effects. This shows that plant synergy, especially true of plants rich in antioxidants, often increases their efficacy as medicine, something herbal formulators have know for centuries.
In addition, cranberries are an excellent dietary source of phytochemicals that include flavonol glycosides, anthocyanins, proanthocyanidins (condensed tannins), and organic and phenolic acids all of which reduce tumor activity and have even shown to inhibit oral cancer cells.
The storage of summer berries for the long winter months has always been a part of gathering for native peoples. Today, cranberries are widely available in nearly every form so make them a part of your winter wellness diet by including them at least two to three times per week. | <urn:uuid:a7e0e249-5469-41ad-97a5-a26c45e46824> | CC-MAIN-2021-17 | https://rainbowconnection.net/cranberry/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038860318.63/warc/CC-MAIN-20210418194009-20210418224009-00081.warc.gz | en | 0.943982 | 965 | 3.25 | 3 |
The most popular FAQs are listed below. Please click on a topic to view more detailed information:
- What do you mean by TDS ?
- What are the standards for TDS ?
- How to measure TDS content ?
- What are the methods for TDS mitigation ?
TDS is Total Dissolved Solids. Water dissolves the minerals present in the strata of soil it filers through in the case of ground water and, in the case of surface water, the minerals present in the soil over which it flows (rivers/streams) or over which it stands (lakes, ponds, reservoirs).The dissolved minerals in water are commonly referred to as Total Dissolved Solids (TDS). The TDS content of any water is expressed in milligrams /litre (mg/l) or in parts per million (ppm). These units are equivalent.
The minerals are basically compounds (salts) of Calcium(Ca), Magnesium(Mg) and Sodium(Na) What is commonly called as ‘hardness in water’ is due to the compounds/salts of Ca and Mg such as Calcium or Magnesium Chloride, Calcium or Magnesium Sulphate ( CaSo4, MgCl, etc).Some types of dissolved solids are specifically dangerous even in low quantities. This includes arsenic, fluorides and nitrates. There are particular standards for the acceptable amounts of these elements in water and in some cases like fluoride, there is some disagreement as to what constitutes safe levels.
Leaving aside the specific harmful chemicals fluoride and arsenic, drinking water for human beings should contain some level of minerals (TDS), but these levels should not be excessive.
What are the TDS standards ?
India Standards: The standard that applies to India is the BIS 10500- 2012 standard
This standard used the WHO standard as the basis and has been amended subsequently to take into account the fact that over exploitation of ground water which has the largest share of water supplied for human use has deteriorated to such an extent that the crucial parameters such as TDS, hardness, Chlorides, etc usually exceed the desirable levels substantially. Consequently, a higher permissible limit has been specified. Water used for drinking becomes unpalatable when the TDS level is above 500 mg/l, but lack of any better source enables people consuming such water to get used to its taste. The BIS standard applies to the purity level acceptable for human beings to drink. For practically all industrial and some commercial uses, the purity levels required are very much higher and in most cases demand water with virtually no residual dissolved solids at all.
BIS Standard says that the maximum desirable TDS is 500 mg/L and the maximum permissible level in the absence of a better source of water is 2000 mg/L. A related standard is the 'hardness measured as CaCO3" where the acceptable limit is 200 mg/L and maximum permissible is 600 mg/L.
"Water containing TDS concentrations below 1000 mg/litre is usually acceptable to consumers, although acceptability may vary according to circumstances. However, the presence of high levels of TDS in water may be objectionable to consumers owing to the resulting taste and to excessive scaling in water pipes, heaters, boilers, and household appliances (see also the section on Hardness).
Water with extremely low concentrations of TDS may also be unacceptable to consumers because of its flat, insipid taste; it is also often corrosive to water-supply systems "
US EPA Standard:
The U.S. Environmental Protection Agency (EPA) recognises broadly two categories of drinking water standards, known as maximum-contaminant-level goal (MCLG) and secondary maximum contaminant level (SMCL). The MCLG is a health goal set at a concentration at which no adverse health effects are expected to occur and the margins of safety are judged “adequate,” while the SMCL is a non-enforceable guideline that presents no risk to human health. While fixing no limit for MCLG, the EPA has fixed an upper limit of 500 mg/L for SMCL. This limit has been fixed to avoid undesirable aesthetic effects of odour, taste and colour that could be felt by consumers and technical effects of corrosion, incrustation, staining, scaling and sedimentation of pipelines and other fixtures that convey water. Despite not fixing a limit to MCLG of TDS, high TDS water can have certain other constituents at harmful levels of SMCL to cause adverse health effects. Thus MCLG can be a few times more than the SMCL.
Very low TDS: Due to insipid or bitter taste and lack of useful minerals, too-low TDS also causes problems. There does not seem to be a generally accepted lower limit, but 80 mg/L may be used.
TDS can be measured very fast using a low-cost portable conductivity meter (TDS meter) calibrated to give TDS directly by anybody with extreme ease. It costs hardly Rs. 2000/- and the only recurring expenditure is occasional replacement of batteries. It is worthwhile for users of well water, piped water and packaged water and practitioners of rainwater harvesting and groundwater recharging to test water TDS as a matter of routine. It may be noted that TDS of rainwater is only a few tens of mg/L. Any sudden increase in TDS of water is a signal that water is getting contaminated with some high-TDS water.
UV, UF and other conventional filtration methods will not affect TDS. The only one which works is Reverse Osmosis
RO is the only commonly used domestic filtration system that removes even the dissolved impurities. RO is required if the Total Dissolved Solids (TDS) exceeds a certain value. (what is the upper limit ? Look for discussion on that elsewhere in IWP). RO is also suggested if you have reasons to believe that your water may be contaminated with sewage/ pesticides/ heavy metals/ industrial effluents.
A problem with RO is, it needs a lot of water. It divides the input water in two parts, and forces the dissolved solids out from one part in to other. Thus, the output comprises two streams of water – a “clean” stream with low TDS and cleaned of other impurities too. And a “reject” stream that is even more dirty than the input water. Typically, an input of 3 liters will give 1 liter of clean water and 2 liters of “reject”. Theoretically, the “reject” water can be used for mopping the floor etc. but few have the discipline to do that.
Reduction of TDS changes the taste and pH of water, and it is not good to reduce the TDS too low. Some manufacturers make a hybrid machine that combines RO with either UV or UF. Bulk of the water is processed by RO, to remove dissolved solids; and some is processed by either UF or UV, to kill micro-organisms, but retaining the dissolved solids. The two are combined to restore the dissolved solids to some lower limit. The ratio of mixing the two can be controlled by user.
The cost of RO systems is in the region of Rs. 10,000/- to 15,000/- The RO works under some pressure, which is developed by an internal pump, and therefore it needs electricity to operate.
With very high TDS levels in the 1000s, conventional domestic RO units may not be able to work effectively.
Rainwater harvesting is a useful permanent solution where other sources of water have unacceptably high levels of TDS or hardness. TDS of rainwater is a few tens of mg/L
Water softening does not reduce TDS. In water softening sodium replaces calcium and magnesium, in the dissolved solids which causes a minor reduction only in TDS.
Research and Compilation by
The FAQ is a compilation of answers recieved to TDS related questions on India Water Portal. Contributors include:
- Mr. S.S. Ranganathan
- Dr. Jagadiswara Rao
- Prof. Shivaji Rao
- Mr. Taral Kumar
- Mr. Chetan Pandit
- Our thanks to all the respondents -- IWP | <urn:uuid:5d34b940-5182-4140-a39d-f0f4c06eae4b> | CC-MAIN-2021-43 | https://dev.indiawaterportal.org/faqs/total-dissolved-solids-tds | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585209.43/warc/CC-MAIN-20211018190451-20211018220451-00719.warc.gz | en | 0.940583 | 1,736 | 3.6875 | 4 |
Ever feel that solving a genealogy problem is like navigating a challenging game of chess? Here's how a research plan can help!
When I took the ProGen professional genealogy course, one of our early lessons was learning how to create research plans, based on Chapter 14: "Problem Analyses and Research Plans" of Professional Genealogy: A Manual for Researchers, Writers, Editors, Lecturers, and Librarians. We used one of our own research problems to develop one. Here is an example of one I wrote to determine if my 2nd-great-grandmother is the same person as an orphaned girl I found in records in the Netherlands.
"Plan refers to the process of thinking through our purposes and procedures before research begins."
--Helen F. Leary
First of all, what is a research plan, and what is its place in genealogy? According to Helen F. Leary, author of the aforementioned chapter, "Plan refers to the process of thinking through our purposes and procedures before research begins."
So what is our purpose? It can be to find the names of the parents of a brick wall ancestor. It can be to uncover the maiden surname of a married female ancestor. It can be to answer any of a thousand questions: "Why did my ancestor move West? Where is he buried? How many children did she have? Did he serve in the Civil War? Is my family legend true?"
What are our procedures? These are the process and systematic steps we take in our attempt to solve our problem.
There are four to six basic parts of a research plan:
1. Objective - This is our purpose (see above). It can be written as a statement or a question.
2. Known Facts - Obviously, this is what you already know about your research problem which you are attempting to solve. The information about the person should be placed in chronological order, citing the sources where each fact was found. This is where a timeline of the person's life can be really helpful.
3. Potential Conflicting Data - Very often, we hit a brick wall because of a Major Problem. One of my examples is that I have an ancestor listed on the 1890 Union Veterans Census. One problem--the conflicting data--is that the unit number he supposedly served from (101st New York Volunteers) did not muster from anywhere near his place of residence. I believe there's a simple explanation: the numbers got reversed. The 110th New York Volunteers did muster from his county. However, there is another problem: except for the veterans census, I cannot find any other evidence that this ancestor served in the Civil War. I have to explain this in the Potentially Conflicting Data part of my research plan.
By the way, not every plan will have this part. You may not have conflicting data at all. You may be simply stuck with not enough data!
4. Working Hypothesis - You may have an idea about what the answer could be to your problem. This is where that idea is stated. You should list your reasons as to why you believe this statement could be true.
When you first start your research plan, you may not have a hypothesis. As you start to research, one may form, and you can add this in at that time.
5. Identified Sources - These are the sources I've already looked at, which have given me my known facts, and--if I have conflicting data--be where I've found information that confuses the situation. These identified sources will be the same as the cited sources for my Known Facts, with possible additions, but are simply given in a source list entry or biographical form.
6. Research Strategy - Here is where we list the steps of what we're going to do, and where we're going to do it. Are we going to look at particular databases on Ancestry.com? Do we have a list of microfilm numbers at the Family History Center for records we believe will solve our problem? Is there a book in our local genealogical society's library that may have an answer?
Here is a link to your own free research plan template which you can download to your computer. You can open it with any word processing program (like Microsoft Word), edit it to fit your research objectives, and save it as another document in your genealogy research folder, or in the relevant notes section of your genealogy software.
And? Keep it simple. It doesn't have to look as complicated as the example of my 2nd-great-grandmother. But it covers all the bases: what you've done, the snags you've hit, and where you're going.
One thing to keep in mind: We don't always use a research plan in every search (I'll explain the exceptions in next Tuesday's Tip post). However, whenever you have a question about an ancestor or another person you are researching, you definitely should use one!
I hope this template is helpful, and I'd appreciate your feedback.
Disclosure: I am an affiliate for Amazon.com, and as such, receive compensation for products advertised on and linked from this blog. | <urn:uuid:0b9bb479-7bed-4b04-8360-67056fdc31ce> | CC-MAIN-2016-44 | http://ancestories1.blogspot.com/2015/01/tuesdays-tip-research-plan-explanation.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720062.52/warc/CC-MAIN-20161020183840-00456-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.958801 | 1,059 | 3.015625 | 3 |
E X T O X N E T
Extension Toxicology Network
A Pesticide Information Project of Cooperative Extension Offices of
Cornell University, Michigan State University, Oregon State University, and
University of California at Davis. Major support and funding was provided
by the USDA/Extension Service/National Agricultural Pesticide Impact
Publication Date: 9/93
TRADE OR OTHER NAMES
Some trade names include Dithane M-22, Manesan, Manex, Manzate,
Nereb, Newspor. A chemical name for maneb is manganese ethylene
Maneb is registered as a general use pesticide by the U.S.
Environmental Protection Agency (EPA). In July 1987, the Environmental
Protection Agency announced the initiation of a special review of the
ethylene bisdithiocarbamates (EBDCs), a class of chemicals to which
maneb belongs. This Special Review was initiated because of concerns
raised by laboratory tests on rats and mice. The EPA was concerned
part of the Special Review, EPA reviewed data from market basket surveys
and concluded that actual levels of EBDC residues on produce purchased
by consumers are too low to affect human health. The EPA concluded its
Special Review in April, 1992 with new label requirements for protective
clothing to be worn by industrial and agricultural workers, and with the
establishment of a 24-hour reentry period for agricultural workers.
Many homegarden uses of EBDCs have been canceled because the EPA has
assumed that home users of these pesticides do not wear protective
clothing during application (31). Toxicity data reviewed by the EPA as
part of their Special Review of EBDCs are included in this document
under "Toxicological Effects."
- potential effects on the general population from dietary exposure to residues left on food crops and
- potential occupational health risks to workers who handle and/or apply EBDC pesticides.
Containers of maneb must bear the signal word "CAUTION" (1).
The EBDCs are fungicides used to prevent crop damage in the field
and to protect harvested crops from deterioration in storage or
transport (26). Maneb is used in the control of early and late blights
on potatoes and tomatoes and many other diseases of fruits, vegetables
and field crops and ornamentals (25). Maneb controls a wider range of
diseases than any other fungicide (8). It is available as granular,
wettable powder, flowable concentrate, and ready-to-use formulations
Maneb is one of the chemicals of a class called the ethylene-
bisdithiocarbamates ('EBDCs') that are noted for their instability in
the environment. The application of heat can break these chemicals down
into a number of metabolites. In addition to natural environmental
processes that break down EBDCs, cooking of vegetables that are
contaminated with these fungicides can also change them into different
metabolites. Ethylenethiourea, an EBDC metabolite that is considered to
be cancer-producing, is formed when maneb-treated vegetables are cooked
Maneb is moderately toxic to humans (29). Occasional signs of
local irritation or inflammation of the skin, eyes, or respiratory tract
have been experienced upon contact with maneb. Acute inhalation of
large amounts of maneb dust or spray may cause irritation of the mucous
membranes, resulting in a scratchy throat, sneezing, cough, and
inflammation of the linings of the nose and upper respiratory tract.
Signs of poisoning from large amounts of maneb may include nausea,
vomiting, diarrhea, loss of appetite, weight loss, headache, confusion,
drowsiness, coma, slowed reflexes, respiratory paralysis and death (5).
Maneb is a mild eye and skin irritant (24, 29).
Maneb is of moderately low toxicity to laboratory animals (6).
Single toxic doses of maneb in rats induced hypotonia, slowed breathing
and heart beat, functional abnormalities of the thyroid and liver,
infiltrations in the lungs, bronchitis and tracheitis (29). The amount
of a chemical that is lethal to one-half (50%) of experimental animals
fed the material is referred to as its acute oral lethal dose fifty, or
LD50. The oral LD50 for maneb in rats is 3,000 to 7,990 mg/kg, in mice
is 2,600 mg/kg, and in guinea pigs is 7,500 mg/kg. The dermal LD50 for
rats is greater than 5,000 mg/kg (1, 9, 12).
There is no evidence of 'neurotoxicity,' nerve tissue destruction
or behavior change, from the EBDCs (30). However, EBDCs are partially
chemically broken down, or metabolized, to carbon disulfide, a
neurotoxin capable of damaging nerve tissue (7). EBDC residues in or on
foods convert readily to ETU during commercial processing or home
Prolonged exposure to large concentrations of maneb spray or dust
may cause dermatitis (13, 29).
Feeding maneb to rats at 250 mg/kg for two years caused no
injurious health effects (9). After several months of daily doses of
200 mg/kg, experimental dogs developed signs of toxicity such as
tremors, weakness, lack of energy, gastrointestinal disturbances, and
Rats were fed daily doses of 0, 1.25, 12.5, 62.5 or 125 mg/kg of
maneb. After 97 days, those given the 62.5 mg/kg dose showed
significant increases in thyroid weight (i.e. goiter) and reduced growth
rate. After one year, rats at the 62.5 mg/kg dose also exhibited
increased thyroid weight. The NOEL for this study was 12.5 mg/kg/day
Rats which received 1500 mg/kg/day for 10 days showed weight loss,
weakness of the hind legs and increased mortality. Rats given 0.25%
maneb in the diet for 2 years developed thyroid abnormalities and
goiter. Other effects observed in studies of lab animals exposed to
chronic doses of maneb include depression of reflexes, paralysis,
impaired kidney function, and benign lung tumors (29).
Ethylene bisdithiocarbamate pesticides (EBDCs), which include
maneb, are generally considered to have low short-term mammalian
toxicity. A major toxicological concern, however, is ethylenethiourea
(ETU), an industrial contaminant and a breakdown product of maneb and
other EBDC pesticides. In addition to having the potential to cause
goiter, a condition in which the thyroid gland is enlarged, this
metabolite has produced birth defects and cancer in experimental
animals. ETU has been classified as a probable human carcinogen by the
EPA (31). ETU can be produced when EBDCs are used on stored produce,
and also when fruit or vegetables with residues of these fungicides are
Conversion of EBDCs into ETU can occur inside of spray tanks,
during cooking of produce or processing of crops bearing EBDC residues,
or as EBDCs are metabolized within the body. Residues of the EBDCs and
of ETU can readily be removed from produce by washing or peeling (11, 26).
Disulfiram is an EBDC which is used in the treatment of alcoholics
to produce an intolerance to alcohol. Ingestion of disulfiram and
alcohol together causes symptoms of nausea, vomiting, headache,
excessive sweating and chills. Other EBDC compounds may cause similar
symptoms when combined with alcohol (24).
Maneb had a negative effect on the course of gestation in female
rats that were given 50 mg/kg body weight every other day during this
period. There were increased numbers of embryo deaths, stillborn
offspring, and newborns incapable of survival (16). Rats given a single
dose of 770 mg/kg of maneb, the lowest dose tested, on the 11th day of
gestation exhibited adverse effects on reproductive fertility and
development. These effects included early fetal deaths and fetal
abnormalities of the eye, ear, body wall, central nervous system, and
musculoskeletal system (13, 29). The lowest oral toxic dose in mice
which caused fetotoxicity when given under the same conditions as
previously mentioned, was 1420 mg/kg (12).
Maneb is metabolized to ethylenethiourea, ETU, a known teratogen.
Rats given an oral dose of 2,000 to 4,000 mg/kg of ETU on days 11 or 13
of gestation showed a high incidence of skeletal malformations and
defects in the closing of the neural tube, an embryonic tube that
eventually forms the brain and spinal cord (14). A single dose of ETU
produced teratogenic effects in rats and mice (6, 13).
In pregnant rats fed ETU at 5.0 mg/kg/day, the lowest dose tested,
developmental toxicity was observed in the form of delayed hardening if
the bones of the skull in offspring. ETU has also been shown to be
teratogenic in hamsters, but not in mice (31).
Several tests have shown that maneb is not mutagenic (26). Maneb
is metabolized to ethylenethiourea, a suspected mutagen (7).
All of the EBDC pesticides can be degraded or metabolized into ETU,
which has been classified as a probable human carcinogen by the EPA (26, 31).
Marked increases in the incidence of liver tumors were observed in
mice fed 646 ppm of ETU daily for 80 weeks. Rats fed 175 or 350 ppm
daily for 18 months developed malignant thyroid tumors. In rats fed ETU
at doses of 0.1, 1.25, 6.25, 12.5, or 25 mg/kg for nearly 2 years, a
dose related increase in thyroid tumors was observed at the 12.5 or 25
mg/kg doses. Female mice fed doses of 17 or 50 mg/kg ETU for up to 2
years exhibited a 58 or 96% incidence of malignant liver tumors,
respectively. In this same study, there was also a significant increase
in the incidence of thyroid tumors at the 59 mg/kg dose level (13, 31).
Chronic administration of cumulative oral doses of 62,980 mg/kg of
ETU to rats, intermittently for 94 weeks, caused tumors of the
gastrointestinal tract, skin, and appendages. Oral administration of
ETU produced malignant thyroid tumors in rats and increased the
incidence of liver cell tumors in two strains of mice (10, 26). In
another study, maneb did not display significant carcinogenicity in
laboratory tests with experimental animals (6, 17). Malignant tumors
were observed in one study in which rats were given scrotal injections
of 12.5 mg/kg body weight of 82.6% pure maneb (16).
Poisoning from maneb may adversely affect the thyroid, kidneys and
heart (13). Dogs that received oral doses of 200 mg/kg/day for three or
more months showed damage to the spinal cord but not the thyroid gland
(10). Rats given 0.25% maneb in food for two years showed abnormalities
and/or excessive growth of thyroid cells (16).
Several studies of the effects of EBDCs on test animals have shown
rapid reduction in the uptake of iodine and swelling of the thyroid
(i.e. goiter). In one study, a marked reduction of iodine uptake was
measured 24-hours after administration of a large dose of maneb. A 90-
day study of the effects of ETU, a common metabolite of the EBDCs on rat
thyroids revealed a NOEL of 5 ppm (0.25 mg/kg/day) (24, 26, 30).
Fate in Humans and Animals
Research results vary on the fate of maneb in humans and animals.
While nearly fifty-five percent of an oral dose of a radioactive form of
maneb (14-C) in rats was excreted in the form of metabolites in the
urine and feces within three days, after 24 hours, body organs contained
1.2% of the original dose as metabolites. On the 5th day, less than
0.18% remained (16). In another study with rats fed radio-labeled
maneb, 20 to 30% of the administered dose was excreted in the urine and
feces within two hours after dosage. The major metabolite of maneb was
ethylenethiourea (ETU). By the seventh day after dosage, 70% had been
excreted and the remaining radioactivity was concentrated in the
thyroid, kidneys and liver (26). In other studies, maneb was not found
in the tissues of rats that were fed as much as 2,500 parts per million
(ppm) for two years. There was also no evidence of maneb in tissues of
dogs which received 75 mg/kg/day for one year (10).
The EBDC pesticides break down in mammalian tissues into ETU, a
metabolite which has caused goiter and cancer in laboratory animals (9, 31).
Harmful Effects on Birds
Maneb is practically non-toxic to birds (26). The 5-day LC50 for
maneb in bobwhite quail and mallard ducklings is greater than 10,000 ppm
Effects on Aquatic Organisms
Maneb is highly toxic to fish. The lethal concentration fifty, or
LC50, is that concentration of a chemical in air or water that kills
half of the experimental animals exposed to it for a set time period.
The 96-hour LC50 for maneb is 1 ppm in bluegill sunfish. Its 48-hour
LC50 is 1.9 ppm in rainbow trout. Its 58-hour LC50 is 1.8 ppm in carp
(4, 9, 26). Water can be contaminated by the inappropriate storage,
use, or disposal of maneb (1).
Effects on Other Animals (Nontarget species)
Maneb-treated crop foliage must not be fed to livestock (15). The
fungicide is not thought to be toxic to bees (9). Its 72-hour LC50 is
more than 40 ppm in crayfish. In tadpoles, the 48-hour LC50 is 40 ppm
The ethylenebisdithiocarbamates (EBDCs), including maneb, are noted
for their instability in the environment (21). They are generally
unstable in the presence of moisture, oxygen, and in biological systems
(26). The EBDCs rapidly degrade to ETU. This rapid degradation lowers
the need for concern about the environmental fate of EBDCs and focuses
such concern on ETU. The EPA has either called for or is currently
reviewing data on the behavior of ETU in the environment (9, 21, 26).
Breakdown of Chemical in Soil and Groundwater
Maneb is nearly insoluble in water (0.5 ug/ml). It adsorbs
strongly to soil particles. Thus, despite its lengthy soil half life
(60 days), maneb is not expected to contaminate groundwater. It may
enter surface waters if erosion of soil with adsorbed maneb occurs (32).
Maneb breaks down under both aerobic and anaerobic soil conditions (26).
Maneb's half-life in soil, or the time that it takes for half of
the amount of the fungicide in soil to be broken down by natural
processes , was found to be four to eight weeks. Metabolites were found
in soil 15 days after treatment of beans and tomatoes (11). Residues of
a traceable form of maneb did not leach below the five-inch soil depth
ETU, a metabolite of maneb, has been detected at 16 ppb in only one
out of 1,295 drinking water wells tested (31).
Breakdown of Chemical in Water
Maneb degraded completely within one hour under anaerobic aquatic
Breakdown of Chemical in Vegetation
The main metabolite of maneb in plants is ethylenethiourea (ETU);
this is then rapidly metabolized further (9). Maneb residues were
higher on beans than on tomatoes when they were measured at intervals up
to 15 days after treatment. The heating of maneb residues in vegetables
can result in the formation of the metabolic carcinogen, ETU.
Significant amounts of ETU were found in cooked vegetables that had been
experimentally treated with maneb (11). Some varieties of apple,
morello cherry and pumpkin can be negatively affected by maneb (9).
Young greenhouse tomato and tobacco seedlings have also been injured
PHYSICAL PROPERTIES AND GUIDELINES
Maneb is a yellow powder with a faint odor. Maneb is a flammable,
combustible material which may decompose, heat up, or self-ignite if it
is exposed to air or moisture. Fire may produce irritating or poisonous
gases such as toxic oxides of nitrogen and sulfur. Runoff from fire
control or dilution may cause pollution. Maneb should be kept away from
flames and sparks (9, 18, 29).
Maneb must be stored in sealed original containers in well-
ventilated places. The fungicide must not be allowed to become wet
during storage (15). Its temperature should not exceed 25-30 degrees C.
Water, feed, or food can be contaminated by inappropriate storage or
disposal of maneb. Containers must be stacked in a way that permits
free flow around piles (1). While maneb is stable under normal storage
conditions, it decomposes more or less rapidly when it is exposed to
moisture or acidic conditions.
Long-term skin, eye, and respiratory tract exposure to small
quantities of maneb should be avoided (9). Protective equipment should
be worn by workers involved in the manufacture or agricultural
application of maneb; those who spray crops should wear eye protection
and respirators (16). Empty containers should not be reused; they
should be buried in a safe place far from water supplies. Open dumping
is prohibited (1).
Occupational Exposure Limits:
|OSHA ceiling: ||5 mg/m3
|ACGIH TWA: ||1 mg/m3: NIOSH recommended TWA
|NIOSH recommended STEL: ||3 mg/m3 (29)
|CAS #: ||12427-38-2
|H20 solubility: ||nearly insoluble in water: 0.5 ug/ml (29)
|Solubility in other solvents: ||soluble in chloroform and pyridine (13, 22, 29)
|Melting point: ||Decomposes before melting (pure compound) (23, 29)
|Vapor pressure: ||negligible, less than 10 to the minus 7 power mbar at 20 degrees C (9)
|Chemical Class/Use: ||carbamate; ethylenebisdithiocarbamate
|ADI: ||0-0.005 mg/kg body weight (16)
Atochem North America, Inc.
Philadelphia, PA 19102
Review by Basic Manufacturer:
Comments solicited: January, 1992
Berg, G. L. 1986. Farm chemicals handbook. Willoughby, OH:
Meister Publishing Company.
Pesticide Management and Education. An on-line pesticide
information database in CENET, Cornell Cooperative Extension Network.
Cornell University, Ithaca, NY.
Cornell University. 1987. 1988 New York State pesticide
recommendations. Forty-ninth annual pest control conference. Nov. 9,
10, 11. Ithaca, NY.
DuPont de Nemours and Company. 1983. Technical data sheet for
maneb. Agricultural Chemicals Department. Wilmington, DE: DuPont.
Gosselin, R. E., et al. 1984. Clinical toxicology of commercial
products. Fifth edition. Baltimore, MD: Williams and Wilkins.
_____. 1976. Clinical toxicology of commercial products. Fourth
edition. Baltimore, MD: Williams and Wilkins.
Hallenbeck, W. H. and K. M. Cunningham-Burns. 1985. Pesticides
and human health. NY: Springer-Verlag.
Harding, W. C. 1979. Pesticide profiles. Part one: Insecticides
and miticides. Bulletin 267. Cooperative Extension Service.
University of Maryland.
Hartley, D. and H. Kidd, eds. 1983. The agrochemicals handbook.
Nottingham, England: Royal Society of Chemistry.
Hayes, W. J. 1982. Pesticides studied in man. Baltimore, MD:
Williams and Wilkins.
Menzie, C. M. 1980. Metabolism of pesticides. Update III. U.S.
Department of the Interior. Fish and Wildlife Service. Special
Scientific Report. Wildlife No. 232. Washington, DC: U.S. Government
National Institute for Occupational Safety and Health (NIOSH).
1986. Registry of toxic effects of chemical substances (RTECS).
Cincinatti, OH: NIOSH.
Occupational Health Services, Inc. 1986. Material safety data
sheet. Secaucus, NJ: OHS, Inc.
Shepard, T. H. 1986. Catalog of teratogenic agents. Fifth
edition. Baltimore, MD: The Johns Hopkins University Press.
Thomson, W. T. 1985. Fungicides. Agricultural chemicals, Book
IV -Fresno, CA: Thomson Publications.
TOXNET. 1985. National library of medicine's toxicology data
network. Hazardous Substances Data Bank (HSDB). Public Health Service.
National Institute of Health, U.S. Department of Health and Human
Services. Bethesda, MD: NLM.
U.S. Department of Health, Education and Welfare. 1978.
Pesticide background statements M-1 through M-115. NIOSH criteria for a
recommended standard. Occupational exposure during the manufacture and
formulation of pesticides. Public Health Service.
U.S. Department of Transportation. 1983. 1984 emergency response
guidebook. Guidebook for hazardous materials incidents. G-31.
Washington, DC: D.O.T.
U.S. Environmental Protection Agency. 1987 (May 13). Memorandum
from E. Neil Pelletier. Status of EBDC fungicide registrations. Office
of Pesticides and Toxic Substances. Science Support Branch. Benefits
and Use Division (TS-768-C). Washington, DC. Photocopy.
_____. 1986 (June). Pesticides fact book. (A-107/86-003).
Office of Public Affairs. Washington, DC.
Wagner, S. L. 1983. Clinical toxicology of agricultural
chemicals. Environmental Health Sciences Center. Oregon State
University. NJ: Noyes Data Corporation.
Windholz, M., ed. 1983. The merck index. Tenth edition.
Rahway, NJ: Merck and Company.
Worthing, C. R., ed. 1983. The pesticide manual: A world
compendium. Croydon, England: The British Crop Protection Council.
Hayes, W.J. and E.R. Laws (ed.). 1990. Handbook of Pesticide
Toxicology, Vol. 3, Classes of Pesticides. Academic Press, Inc., NY.
Meister, R.T. (ed.). 1992. Farm Chemicals Handbook '92. Meister
Publishing Company, Willoughby, OH.
U.S. Environmental Protection Agency. 1988 (Oct.). Guidance for
the Registration of Pesticide Products Containing Maneb as the Active
Ingredient. Office of Pesticides and Toxic Substances, US EPA,
U.S. Environmental Protection Agency. 1988 (Oct.). Pesticide
Fact Sheet: Maneb. Office of Pesticides and Toxic Substances, Office of
Pesticide Programs, US EPA, Washington, DC.
U.S. Department of Agriculture, Soil Conservation Service. 1990
(Nov). SCS/ARS/CES Pesticide Properties Database: Version 2.0
(Summary). USDA - Soil Conservation Service, Syracuse, NY.
Occupational Health Services, Inc. 1991 (Oct. 29). MSDS for
Maneb. OHS Inc., Secaucus, NJ.
Morgan, D. P. 1982 (Jan.). Recognition and management of
pesticide poisonings. Third edition. Washington, DC: U.S.
Environmental Protection Agency. U.S. Government Printing Office.
U.S. EPA. 1992 (March 2). Ethylene bisdithiocarbamates (EBDCs);
Notice of intent to cancel and conclusion of Special Review. Federal
Register 57(41):7434-7530. US GAO, Washington, DC.
Howard, P.H. (ed.). 1989. Handbook of Environmental Fate and
Exposure Data for Organic Chemicals, Vol. III: Pesticides. Lewis
Publishers, Chelsea, MI. | <urn:uuid:73760e10-9b2c-42ea-9100-667f8b99ee6c> | CC-MAIN-2018-51 | http://pmep.cce.cornell.edu/profiles/extoxnet/haloxyfop-methylparathion/maneb-ext.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827727.65/warc/CC-MAIN-20181216121406-20181216143406-00234.warc.gz | en | 0.864136 | 5,507 | 2.75 | 3 |
A query in Access, as with any flavour of SQL, can perform
a wide variety of purposes.
A Select Query is a request to view information. The source
of most of this information is usually fields from tables that exist
in the database. The answers that are delivered by queries can take
2 tabular forms:
- a Dynaset that reflects the current state of the base tables
which it queries, and which is usually updatable. This means that
changes made to a dynaset's population are transmitted back to the
- a Snapshot which reflects a particular state of the base
tables and is non-updatable. Snapshots typically contain calculated
or grouped data.
An Action Query makes changes to the database population by
updating, deleting or adding tuples. A Data Definition Query
creates or changes the structure of the database, or database objects
contained within it.
It is possible to specify queries using either the QBE (Query By
Example) grid, using a Query Wizard or by entering standard SQL. QBE
and SQL will be described in this booklet, wizards will not due to
their 'inflexible' nature and the lack of low level control they afford.
To Create a NEW QUERY choose New from the Query Database Window (or
press the New Query Button on the Button Bar) then the New Query button.
You will be presented with a blank Select Query builder grid, and
be required to nominate tables or queries that are involved in the
query (or press Close to get past this dialog). Once in to the query
builder grid, the query can proceed manually (in SQL) or semi- automatically
using QBE. Experience shows that it is faster to write queries using
a mix of SQL & QBE
To compose a query using QBE:
- use the droplists to nominate fields you want present in the query
(in the order you want them to appear) or drag the field names from
the displayed tables into the appropriate field boxes;
- Apply Sort criteria (ascending/descending) to fields if appropriate;
- Decide if the column should be shown [X] in the answer table,
or invisible [ ] but used as a filter condition;
- Apply filter Criteria (like ="fred", or <30-Jan-1994) - you
will find that the criteria parser in Access is fairly forgiving,
and it will convert most criteria into legal expressions automatically.
To write a query using SQL press the SQL button on the Button Bar.
You will be presented with a blank SQL window. Type your query, as
you would using standard SQL.
Wildcards available for criteria in Access include ? (any single
character) and * (any sequence of characters). Logical connectives
NOT, AND, OR are available, as is the Set Operator IN.
To Execute a Query choose Query then Run from the Top Menu, or press
the Run [!] button on the Button Bar or press the Datasheet
button on the Button Bar.
To Rename a column for the purposes of display, use Select AlbName
AS Recording in SQL (or Recording: AlbName in the QBE grid).
To display only part of a field, Access provides Left(string,n),
Right(string,n) and Mid(string,start,n). In the MUSIC database for
example, if you wanted the first 3 characters of the SerNum field
from the Albums table, you could type Select Left(Albums.SerNum,3)
in SQL, or place NewTitle:Left(Albums.SerNum,3) in the Field specifier
of the QBE grid (NewTitle is a label for the new column in the answer
table and can be anything except an existing field name).
To Format the answer recordset you can specify Field Properties by
pressing the Properties button on the Button Bar after clicking in
the field to be formatted, or directly massage the Datasheet view
of the executed query. In addition, in Datasheet View, you have Font,
Row Height and Column Height control in the Format menu off the Top
To write a query that prompts for Parameters, include the
reference to the parameter (distinct from an existing field name)
as a criteria in square brackets: [Please Enter Artist:]. As an example,
a query that lists AlbName of the prompted-for Artist could be expressed
as illustrated left in QBE and right in SQL.
When run, the query places a prompt window on the screen requiring
the user to enter information and click OK (or press enter).
After the user has responded, the query delivers an answer table
in default format (i.e. with column names, records delimited by horizontal
and vertical lines, with record selectors.
A query that prompts for the first letter of Artists and displays
their Albums is as follows:
where Artist like [Please Enter Artist's First Letter:] & '*';
A query that prompts for start and finish dates and displays Albums
published between those dates is as follows:
where PDate between [Start Date:] and [Finish Date:];
To Group records either press the SUM button on the button bar, or
use a Group By clause in SQL. | <urn:uuid:d2942e7a-6f95-41ae-a9b9-8c77b6b5c326> | CC-MAIN-2017-43 | http://www.wonko.info/ipt/iis/access/access4.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825147.83/warc/CC-MAIN-20171022060353-20171022080353-00247.warc.gz | en | 0.810448 | 1,120 | 2.75 | 3 |
Personalised power cuts and pricey meat: Grey Britain in 2030
We read the Carbon Budget - so you don't have to
It's full steam ahead for a low carbon Britain, the UK Committee on Climate Change says in its fourth report, published today.
The CCC is the Government's primary advisory panel on cutting CO2 and was established in the 2008 Climate Change Act. But there will be a price to pay for this utopia.
The CCC recommends a carbon tax on food, leading to higher beef and sheep prices - and "rebalancing diets" away from red meat. Meanwhile, household access to electricity will be restricted - thanks to smart grids - or taken away completely, with electricity rationed via a completely automated supply. You'll do the laundry when you're told to, not when you want to.
The CCC recommends a 46 per cent cut in CO2 emissions in the UK by 2030, relative to 1990. This will mean "radical" reforms to electricity supply and 60 per cent of the UK car fleeting driving electric cars or vans.
Hydrogen could power half the buses, the committee suggests. Biomatter and biogas should provide 20 per cent of industrial heating by 2025. And 30 per cent of households should use ground heat pumps instead of conventional heaters.
To achieve these targets, the committee takes a grimly deterministic approach: there is simply no alternative.
"The decision for society is not whether to invest, but which forms of low-carbon generation to invest in," it declares.
Power generation presents the biggest obstacle.
"Our power sector decarbonisation scenarios would require early investment in nuclear and wind generation, with diversification to CCS and possibly marine and geothermal generation depending on what demonstration projects or increased deployment reveal about these technologies," the CCC notes.
The committee acknowledges that the low carbon generation sources are much less flexible than fossil fuel power stations today - the wind can't be guaranteed to be blowing when you need it to. As the report notes:
"The need for flexibility will increase as more intermittent wind generation is on the system – wind is variable, volatile and difficult to forecast."
In addition, "nuclear and coal CCS are less economically and technically flexible than conventional plant, being both more capital-intensive (and therefore more sensitive to the load factors at which they are run) and less able to ramp their output up and down (eg they have higher minimum stable generation levels and longer on and off times)."
And there's another problem.
"Decarbonisation will also increase the level and the variability of demand, through the electrification of heat and transport. In particular, demand for electricity from the heat sector could add significantly to the need for flexibility by increasing the variability, seasonality and peakiness of electricity demand."
The answer? Several have been suggested. The UK could import more power via a European power grid, and trade electricity with "North West Europe" (presumably this means Norway - the Norwegians have hydro-generated electricity in abundance). Or the country could have more in reserve, thanks to pumped storage. Or the power companies could modulate demand.
This is presented as a consumer choice ("enabling consumers to shift non time-critical demand to non-peak times"), but really the key is taking choice away from the consumer - personalised power cuts, if you like. Or no control at all.
"An important element of a smart grid is a ‘smart meter’ which will allow display of energy usage data in real time and remote or automated control of energy usage by suppliers and consumers [our emphasis].
"Meters will allow supply to be controlled remotely," the report stresses, as if we missed the point.
As for alternatives, ground source heat pumps cost between £10,000 and £17,000 and require a borehole to be drilled. No attempt has been made to count the number of suitable properties or the capital cost - the CCC does acknowledge that discomfort is a factor, and many users don't know how to use them.
The Climate Change Committee reckons its computers models are "robust to a range of scenarios"
(click to enlarge)
Sponsored: Network DDoS protection | <urn:uuid:3c4cc199-8bdf-4bea-a64d-15197758beb7> | CC-MAIN-2015-14 | http://www.theregister.co.uk/2010/12/08/carbon_budget_2030/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131297416.52/warc/CC-MAIN-20150323172137-00066-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.939096 | 866 | 2.71875 | 3 |
A new study by the Organization for Economic Co-operation and Development discovered that obesity rates are increasing in developing nations. Obesity rates are now higher than they have been at any other time in memory. This is creating a number of consequences they will need to come to terms with over the next few years. Implications of higher obesity rates include higher health care costs and shortened life expectancy.
The OECD evaluated more than 30 countries in its study. They found that obesity rates in those countries ranged from 4% to 30%. However, in the majority of those countries more than 50% of the populace was either obese or overweight. Obesity rates have steadily been increasing in developed nations around the world. The epidemic has increased in developing nations as well, although not to the same degree.
[box type=”important”]While these figures are already a concern, the overall trend is even more ominous. In a number of these countries, the OECD expects about 66% of their citizens to be overweight at some point within the next decade.[/box]
These figures will likely significantly curtail life expectancy. Citizens who are significantly overweight are expected to die about 10 years earlier than those at a healthier weight. According to data, every 35 pounds an individual has beyond their optimal weight will increase their likelihood of dying early by about 10%.
The OECD’s findings are also concerning for countries with a high emphasis on public health spending. According to the World Health Organisation, obesity is responsible for about 1 to 3% of all health spending in most countries. The rates are even higher in the United States, where up to one tenth of all health care spending is due to obesity.
The Organization for Economic Co-operation and Development has been studying specific countries to assess what trends they are following. Several developed nations including the United Kingdom, Italy and Hungary have not increased as significantly as they had in prior years. The rate has increased more quickly in the United States, Canada and Ireland.
[box type=”important”]Many of the trends appear to correlate with different public policies towards foods, such as new taxes on sugar. These figures may give governments some indication on what kinds of policies they may need to implement as they attempt to bring the obesity epidemic under control.[/box] | <urn:uuid:eadbbe2b-0328-4f2f-a7a9-d45df8f50d0f> | CC-MAIN-2016-40 | https://www.hivehealthmedia.com/oecd-finds-obesity-rates-increasing-developing-nations/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661778.22/warc/CC-MAIN-20160924173741-00009-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.974217 | 460 | 3.25 | 3 |
Ways To Make Your Home More Energy Efficient
Keep your energy bills can be a challenge, especially in the winter months.
However, there are many things you can do to make your home more energy efficient, reduce costs and help the environment in the process.
Some of these tips require initial capital, but reducing your energy bills will more than make up for it in the future.
Generate your own energy
The installation of solar panels or small wind turbine on the roof can allow generate their own electricity.
Depending on conditions, could generate all the power you need to run your home, significantly reducing their energy bills to zero. If the establishment produces more electricity than it needs, the excess can be sold on the same – allowing you to earn money while lighting your home.
Using solar and wind energy can also reduce their carbon footprint, reducing harmful CO2 emissions.
Improving the heating system
In this step, the first thing which every homeowner must do is change the air filters by buying them from trusted sites like filterking.com, as old filters can cause machines such as heaters to malfunction and use more electricity.
Traditional heating systems typically use more energy than is needed to generate a comfortable temperature.
This is because the heat source (heater) is to be heated to a temperature high enough to heat the entire part. This type of heating also uses air flow, which means that the roof is first heated.
If you put the heated floors in place, the global temperature can be reduced while maintaining the same level of comfort.
This is because there is no single source of heat. Instead of the heated surface. Floor heating also uses radiant heat airflow, which means that objects in the room are heated, with cooler surfaces heated first.
With traditional central heating, the tallest objects are heated first.
Reduce heat loss
If you look at a house without insulation with thermal imaging equipment, you’ll see a lot of heat loss. A lack of insulation means that you are actually paying to heat the outside, rather than heating your home.
This can be easily remedied.
Isolation of the camera and, if you have an attic, attic insulation, significantly reduce heat loss. Besides saving money, allowing you to reduce your thermostat. In turn, this will save more money.
You can reduce heat loss by installing double or triple glazing. This will also reduce the noise from outside, creating a more comfortable and pleasant environment.
Performing benefits of energy-efficient home
Obviously, improving the energy efficiency of your home will save you money. It will also reduce the use of natural resources, helping the environment.
In addition, certain measures – such as the heating system through soil – can improve the aesthetics of your home. Removing the radiator can give you more storage space and a living space more fluid.
Improving the energy efficiency of your home can have advantages that have never considered. | <urn:uuid:8db11ccc-068e-4257-8bd0-72841f93268a> | CC-MAIN-2023-50 | https://latestsolarnews.com/ways-to-make-your-home-more-energy-efficient/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100632.0/warc/CC-MAIN-20231207022257-20231207052257-00566.warc.gz | en | 0.945166 | 600 | 2.6875 | 3 |
AS YOU READ THE PLAY
8. Character Study
Like Shakespeare’s plays, many of the characters in Bartlett’s play are based on real people. However, unlike studying one of Shakespeare’s characters, we have the benefit of being able to access a huge amount of information very quickly as we begin to understand the foundation upon which Bartlett created his fictional story and characters.
Choose one of the members of the Royal Family to follow throughout the play: Charles, Camilla, William, Catherine (Kate) or Harry. Before you begin studying the play, begin collecting information on your chosen family member, which might include articles (of varying sources—tabloids vs. newspapers), images, videos, and their own websites. As you research, formulate answers to the following questions:
- Born and raised where?
- Royal title?
- Interests and passions? (To what causes does your character devote the most time and efforts?)
- Public perceptions of your family member?
- How grounded in reality—or unmerited—are these public perceptions?
- Based on your research, what are four words that summarize your family member?
Create a small group with your classmates who chose the same family member as you. Compare notes and come to consensus where your findings differ and on your four descriptors. Then, as a group, present your character to the class, speaking in first person as your character.
As you read the play, follow your chosen character closely, and respond to the following questions in writing. Be sure that your answers to these questions are strongly grounded in evidence from the text:
- Significant decisions that your character makes in the play?
- What your character says about him/herself? (Hint: look closely at the soliloquies!)
- What other characters say about your character?
- Based on the fictional reality that Bartlett has created, what are four words that summarize your family member?
Come back together with your small group. Compare what you’ve learned about your character through the lens of the play with your original research. What are the similarities, and where did Bartlett choose to diverge in his storytelling? Compare your descriptors of the actual person versus the character in Bartlett’s play—how closely do the characters that Bartlett imagines resemble the actual members of the Royal Family? Share your findings with the class.
Possible extension: As you watch Chicago Shakespeare’s production, study the actor playing your chosen character. That same day of your performance (while it’s still fresh in your memory), write down your observations of the actor’s interpretation of the character. How does the actor in this production differ from what you researched, and what you imagined as you read the play? What choices did the actor make that enhanced your understanding of the character?
CONSIDER COMMON CORE ANCHOR STANDARDS R3
9. Echoing Fears
King Charles III begins just after the funeral of Queen Elizabeth II, and all in the Royal Family are grappling with this new reality. Charles asks his family to leave, so that he might have a moment alone before his first meeting as King with the Prime Minister. After his family departs, Charles delivers the first of many soliloquies, and in this one, the audience is privy to some of Charles’ deepest fears. As a class, read through his soliloquy (beginning with, “At last. I needed room for thought to breathe” through “One is protected from the awful shame of failure.”)
- Read-through #1: Read the speech aloud, switching readers each time you come to a punctuation mark. Circle any words or phrases that are confusing to you and discuss what they might mean as a class.
- Read-through #2: Read through the speech again, this time switching readers each time you come to a full stop (a period, question mark, or exclamation point). As you hear the speech a second time, listen for words and phrases that reveal Charles’ emotional state—his hesitations about the duties that await him as King, his longing to become King, and his fear that he might fail once he finally becomes King. Circle these words or phrases.
- Read-through #3: This time, rather than a linear read, the class will speak aloud the words and phrases you circled in read-through #2. Anyone can speak their contribution at any time, and words and phrases can be repeated when multiple students have chosen them. Once all have added a word or phrases to reading, discuss what this exercise reveals about Charles at this very first moment in the play. What might it foreshadow about the events of the play?
CONSIDER COMMON CORE ANCHOR STANDARDS R4
10. Character Tactics
Characters always speak and act to achieve what they want (just as we do in everyday life). The different strategies they use to get what they want are called “tactics.” In Act 1, scene 3, King Charles and Prime Minister Evans want very different things. With the steps below, explore the various ways in which Charles and Evans try to get what they want.
[To the teacher: divide the first part of Act 1, scene 3—page 16 to 20, stopping at Charles’ line “And so you have, we’ll meet next week”—into smaller chunks, about a page of text each. When you assign excerpts to your student pairs, multiple pairs will be working on each excerpt, which will highlight the concept of multiple interpretations when they perform their scenes for one another.]
- As a class, listen as a couple of volunteers read the full scene aloud. Then, learn and practice the following tactic gestures:
- Hook – Extend the arm and curve the fingers toward your body. Move the hand toward the body.
- Probe – Point the index finger of one hand. Extend the arm forward. Move the finger around and forward as if it is digging into something.
- Deflect - Extend the arm and have the palm facing upwards as if pushing something away.
- Punch – Make a fist and punch the air in front of you.
- Flick – Join your fingertips together and then quickly extend your fingers fully, as though you are flicking water on someone.
- With a partner, decide who will read each character, and read your assigned scene excerpt aloud. Together, decide which tactic best matches what your character wants to achieve in each line. If you feel a character changes tactics within a line, you can choose to make two different gestures. (Remember: there is no one “right” answer here. Ten different groups may choose to interpret these lines ten different ways, since dramatic texts always allow for multiple interpretations.)
- Read the scene excerpt while doing the gestures. Discuss which gestures don’t work as well, and sub in others until you feel like you’ve found the tactic that for you, best connects to each part of the text.
- Back with the full class, watch several scenes and discuss:
- Which gesture/s did each character use most in this scene?
- What might that tell you about the character or situation he/she is in?
- Do the tactics the characters use change throughout the scene? Why is that?
- Do you understand the scene or characters differently as a result of this exploration?
- Were there times when two or more groups chose a different tactic for the same piece of text? What was the effect of each?
Possible extension: Ask the students if they felt there was any tactic they felt was missing. Choose one or two tactics and create a gesture for them. Go back to the scene and add in the additional tactic/ gestures.
CONSIDER COMMON CORE ANCHOR STANDARDS L3, R6
“To the Honorable Prime Minister”
“Please look at this, it came today.” In Act 2 (page 28), the Prime Minister shares the King’s letter with the Leader of the Opposition, which contains Charles’s determination not to sign the bill passed by Parliament. Very Shakespearean—a letter that we can surmise the contents of, but never see. So, what if you were now King Charles III and writing to your Prime Minister at this moment in the play—in perfect iambic pentameter? What would your letter contain, and how might you express your intentions? Will your letter be brief and to the point, or filled with every argument you can muster? If the former, go ahead and write the entire letter! If the latter, write a section in iambic pentameter and then outline the points you think that Charles would have to make…
CONSIDER COMMON CORE ANCHOR STANDARDS W4, W9
11. Visualizing Charles' Moral Dilemma
Towards the end of Act 2, Evans revisits Charles to urge him again to sign the bill restricting freedom of the press. Charles still refuses to sign and explains his dilemma in a monologue (beginning with “That’s right, and in good conscience I have thought…” on page 39 of the script.)
While one brave volunteer reads the speech aloud, close your eyes and listen closely to the figurative language Charles uses to explain his position. Each time you hear something in the speech that conjures up a picture in your head, raise your hand. While a new volunteer reads the monologue again, open your eyes and have the text in front of you to mark up. Circle all words and phrases that stand out to you as you listen.
In small groups, agree on a single word, phrase or line that conjures up a vivid image for you, and then bring that line to life through a tableau—a “living sculpture” of bodies. Take turns directing, or “chiseling,” the sculpture. Revise until the sculpture closely represents the figurative language you’ve chosen. Present your final sculpture to the rest of the class. How does your understanding of the monologue change through an examination of these tableaux? What does the language reveal about Charles’ tone in this speech? Is there a pattern or a theme among the lines your group and others chose to represent through tableau?
CONSIDER COMMON CORE ANCHOR STANDARDS R4, L5
12. Exploring Rhetoric and Poetic Devices
In the beginning of Act 3, Prime Minister Evans and King Charles deliver back-to-back addresses to the public on the stand-off between the Parliament and the Monarchy. Just as Shakespeare’s plays are filled with rhetorical and poetic devices that add emotion, punch, flavor, intensity to his plays and characters, so too has Bartlett chosen to put many of these devices to work for the characters in this play. Throughout both speeches, you’ll find:
- repetition of consonant sounds (alliteration)
- repetition of vowel sounds (assonance)
- lines in which every word has only one syllable (monosyllabic lines)
- two opposing thoughts that are expressed by parallelism of words that are the opposites of each other (antithesis)
In pairs, read ALOUD (it’s imperative or you won’t hear the repetition of sounds!), and mark the text whenever you hear: alliteration, assonance, monosyllabic lines, or antithesis. As a class, listen to one or two readings of each speech, encouraging your classmates to over-emphasize the devices they have identified.
- When the devices were overemphasized, did you hear anything in the speeches that you didn’t hear before?
- How would you describe the tone of each speech?
- Based on these two speeches alone, do you find yourself siding more with the Prime Minister or the King, and why?
CONSIDER COMMON CORE ANCHOR STANDARDS R4
13. Discovering Embedded Stage Directions
In Act 3 (page 51), Charles is visited in the middle of the night by the Ghost of his first wife, Princess Diana. In response to the Ghost, he says:
The greatest King?
But stop, please wait! I didn’t understand!
But no, it drifts away, like mist at dawn.
Oh god, if anyone did see me now
Their brand new king, who, sleepless runs towards
The made up nonsense in his head, but yet…
She is quite beautiful I know the walk.
The Ghost goes.
Just like Shakespeare, Bartlett writes two kinds of stage directions: those like “The Ghost goes” but then others that are “embedded” in the lines of a character’s speech. Charles’s part above is full of such embedded stage directions—both to the Ghost and himself. In groups of three, take on the roles of the Ghost, Charles and a director. As Charles says the lines above, the two characters (with the help, of course, of their director!) must each figure out when to move and how to move. Play with this moment for a while in your group, and then come back together as a class to see a few different interpretations of Bartlett’s multiple stage directions in just these few lines of text.
CONSIDER COMMON CORE ANCHOR STANDARDS R1, SL4
14. Scene Lab: The Eleventh Hour at Parliament
[To the teacher: This activity, based on an exercise developed by actor Michael Tolaydo, may take two class sessions to complete, but is well worth it! The exercise is a performed group scene. This is not a “staged” performance, so there should be no heavy focus on acting skills; rather, this should be approached as a learning experience involving exploration of plot, character, language, play structure, and play style. The script should be photocopied and typed in a large font [at least 13 point], with no text notes or glossary, and enough copies for every student in the classroom. In selecting readers for the speaking roles, it is important to remember that the play is not being “cast,” but rather that the students are actively exploring the text. The process of getting the scene off the page and on its feet enables students to come to an understanding of the scene on their own, without the use of notes or explanatory materials. A familiarity with the scene and the language is developed, beginning a process of literary analysis of the text and establishing a relationship with the play and its characters.]
Sometimes, the most action-packed and exciting scenes in a play are difficult to read on the page because there is not yet a picture to accompany the words—and though good proficient readers can create those pictures in their minds as they read, some may struggle with this kind of rich visualization. This is where a “scene lab” comes in very handy, especially when a scene involves many characters and a lot of physical action, such as Act 3, scene 6, or “the eleventh hour at Parliament.”
- Step One: Assign students to read the scene through for the first time. (Choose a student to read the stage directions as well.) While the scene is being read, the rest of the class listens rather than reads along, so no open books. If you come across unfamiliar words or phrases, don’t worry about the correct pronunciation. Say them the way you think they would sound. (Later, you can take a class vote on the pronunciation of any words that cannot be located in the dictionary.)
- Step Two: Follow the first reading with a second one, with new readers for each part—not to give a “better” reading of the scene but to provide an opportunity for others to expand their familiarity with the text, and possibly gain new information or clearer understanding of a particular passage. After this second reading, engage in a question-and-answer session. Answers to the questions asked should come only from the scene being read, and not rely on any further knowledge of the play outside the scene at hand. Some examples of the questions to be discussed: Who are these guys? Where are they? Why are they there? What are they doing? What are their relationships to each other? What words don’t we understand? What else is confusing in this scene? If there is disagreement, take a class vote. Majority rules! Remember, there is no one right answer, but a myriad of possibilities—as long as the conclusions are supported by the text. After this, you may choose to read the scene a few more times, with new sets of readers, followed by more questions.
- Step Three: The “fast read-through” is next. Stand in a circle; each student reads a line up to a punctuation mark and then the next student picks up. The point of this is to get as smooth and as quick of a read as possible, so that the thoughts flow, even though they are being read by more than one person—much like the passing of a baton in a relay race.
- Step Four: Before we put the scene “on its feet,” search the text for signals that help you know how to move and speak to create a coherent story. There are the actual stage direction provided by the playwright, but other stage direction can be found in the character’s own lines or may be spoken by another character. (e.g. when the Speaker of the House says, “Please will someone, before we vote, go see / What causes this infernal knocking there!,” it’s a good indication that someone might begin to move towards the door.) In addition to looking for these signals in the script, ask yourself these questions:
- Where do you imagine the audience to be sitting?
- How many characters are on stage at the start of the scene?
- Where and how will you position each character and the members of Parliament? (You may want to reference a diagram of the House of Parliament as you’re making your staging decisions.)
- Which characters make entrances and/or exits in the scene? From where do they enter and where will they exit?
- How does each character walk?
- How does each character talk?
- What furniture or properties (props) might be needed for the scene?
- Step Five: The final step is to put the scene “on its feet,” using the signals and choices you’ve discussed as a class. Select a cast to read the scene, while the rest of the class becomes members of the House (and helps to direct the scene.) No one is uninvolved. There are many ways to explore and stage this scene—there is no one “right” way, and everyone’s input is important. After the advice from the “directors” has been completed, the cast acts out the scene. After this first “run-through,” make any changes necessary, then perform the scene again using the same cast or a completely new one.
CONSIDER COMMON CORE ANCHOR STANDARDS R7, SL1, SL2
15. Embodying Figuative Language
Unlike you all, I’m born and raised to rule.
I do not choose, but like an Albion oak
I’m sown in British soil, and grown not for
Myself, but reared with single purpose meant.
While you have small constituency support.
Which gusts and falls, as does the wind
My cells and organs constitute this land
Devoted to entire populace
Of now, of then, of all those still to come.
Charles, like a true Shakespearean character, speaks at moments like these in this play in heightened language, full of imagery, simile and metaphor. Here, as he contrasts himself to the members of Parliament, Charles creates a picture—which we can bring to life. Dividing these nine lines into three different chunks (Lines 1-4; 5-6; 7-9), in groups of four to five, work on your lines and create a tableau—a wordless, motionless picture composed with your bodies. Come back to the larger group and look at one another’s tableaux. Now, as a class, create a complete “triptych” out of the three chunks, which represents the entire arc of Charles’s lines.
CONSIDER COMMON CORE ANCHOR STANDARDS L5, SL1
16. Inside Kate's Psyche
At the top of Act 4, scene 3, Kate delivers her first and only soliloquy in the play, revealing the working-class and feminist underpinnings that appear to motivate much of her action in the play. As a class, read the speech, switching readers at each punctuation mark. Then, read through the speech again, switching readers at every period. Kate covers a lot of ground in this short speech. As a class, decide where the “beats,” or gear changes, occur in this speech, and mark the changes with a slash in your script.
Divide into as many groups as beats you’ve identified in the speech. Each group taking one beat, create a “tableau”—a visual picture using your bodies, like a frozen snapshot—that represents your beat. You can choose for your tableau positions to be as literal or as figurative as you wish. Here are a few other hints to keep in mind:
- Create different levels with your body positions—low, medium, high
- Find depth in the tableau. (Avoid the straight line…)
- Use proximity and distance as tools to convey meaning
Take turns sharing your tableaux with your classmates, discussing:
- What do you notice in each tableau?
- How did incorporating levels, depth, and distance help to shape the tableau?
- To the tableau-makers: What did the group intend to communicate?
- To the audience: Observing their picture and hearing their intentions, what aspect/s could be made clearer? How would you suggest that they continue to sculpt their tableau?
- To the entire class: What does this exercise reveal about the character of Kate? What do we learn about her motivations in this speech—and through this exercise?
CONSIDER COMMON CORE ANCHOR STANDARDS R3
17. The Play's Final Moments
As the Archbishop prepares to place the crown on William’s head in the final moments of the play, Bartlett has included a flurry of brief stage directions, indicating the basic movements of the Archbishop, Charles and William. It is an actor’s job—and a good reader’s job—to imagine the emotional rollercoaster that each character is experiencing. Assign one of these three characters to each third of the class. For each of the following stage directions included in the play, write a sentence or two (in the first person) about what your character is thinking and/or feeling as each action occurs:
A choir sings.
The Archbishop goes and gets the crown.
He brings it forward to William.
Charles suddenly stands—a consternation. This isn’t supposed to happen.
He goes and looks at the crown.
The choir stops singing.
Charles reaches for the crown. The Archbishop is unsure.
Glances at William. Then gives the crown to Charles.
With three student volunteers, one for each character, read the stage directions aloud, followed by the internal thoughts of each character. Listen to at least three interpretations of each character’s inner thoughts and discuss what you discovered about the characters and this moment in the play.
CONSIDER COMMON CORE ANCHOR STANDARDS R3, W9 | <urn:uuid:5a8236f5-5138-465e-82a3-82876659982b> | CC-MAIN-2018-09 | https://www.chicagoshakes.com/education/teaching_resources/teacher_handbooks/king_charles_iii/as_you_read_the_play | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891807660.32/warc/CC-MAIN-20180217185905-20180217205905-00685.warc.gz | en | 0.948298 | 5,011 | 4.03125 | 4 |
Individual differences |
Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology |
Biological: Behavioural genetics · Evolutionary psychology · Neuroanatomy · Neurochemistry · Neuroendocrinology · Neuroscience · Psychoneuroimmunology · Physiological Psychology · Psychopharmacology (Index, Outline)
|Other names||see text|
|Molar mass||100.09 g·mol−1|
|Density and phase||2.6 g/cm3, solid|
|Solubility in water||insoluble|
|Melting point||825 °C decomp.|
|Dipole moment||? D|
|EU classification||not listed|
|Supplementary data page|
| Structure and|
|n, εr, etc.|
| Phase behaviour|
Solid, liquid, gas
|Spectral data||UV, IR, NMR, MS|
|Other anions|| Calcium bicarbonate|
|Other cations|| Magnesium carbonate|
| Except where noted otherwise, data are given for|
materials in their standard state (at 25 °C, 100 kPa)
Infobox disclaimer and references
It is commonly used as an antacid, and is the active ingredient in agricultural lime. It is a common substance found as rock in all parts of the world and is the main component of seashells and the shell of snails.
Calcium carbonate is found naturally as the following minerals and rocks:
Eggshells are composed of approximately 95% calcium carbonate.
To test whether a mineral or rock contains calcium carbonate, strong acids like hydrochloric acid can be dropped with a dropper onto it. If it does contain the chemical, it will fizz and produce carbon dioxide; otherwise, it probably wouldn't react vigorously. For example, all of the rocks/mineral mentioned above will react with acid.
The vast majority of calcium carbonate used in industry is extracted by mining or quarrying. When pure calcium carbonate is required (e.g. for food or pharmaceutical use), it is prepared by passing carbon dioxide into a solution of calcium hydroxide: the calcium carbonate precipitates out, and this grade of product is referred to as precipitated.
- Ca(OH)2 + CO2 → CaCO3 + H2O
- See also: Carbonate
Calcium carbonate shares the typical properties of other carbonates. Notably:
- it reacts with strong acids, releasing carbon dioxide.
- CaCO3 + 2HCl → CaCl2 + CO2 + H2O
- it releases carbon dioxide on heating (to above 825 °C in the case of CaCO3), to form calcium oxide.
- CaCO3 → CaO + CO2
Calcium carbonate will react with water that is saturated with carbon dioxide to form the soluble calcium bicarbonate.
- CaCO3 + CO2 + H2O → Ca(HCO3)2
Calcium carbonate is widely used in the pharmaceutical industry, either as an antacid, a calcium supplement (approximately 600 mg of calcium per gram of calcium carbonate), or as a base material for tablets of other pharmaceuticals.
Calcium carbonate is known as whiting in ceramics/glazing applications, where it is used as a common ingredient for many glazes in its white powdered form. When a glaze containing this material is fired in a kiln, the whiting acts as a flux material in the glaze.
Recently, calcium carbonate has begun to replace kaolin in the production of glossy paper.
|This page uses Creative Commons Licensed content from Wikipedia (view authors).| | <urn:uuid:cdf7bb49-7ccf-4220-aa4a-1e77ffc3630d> | CC-MAIN-2015-48 | http://psychology.wikia.com/wiki/Calcium_carbonate?oldid=8174 | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398445033.85/warc/CC-MAIN-20151124205405-00077-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.776512 | 788 | 2.953125 | 3 |
Written by GAIA. http://www.no-burn.org. 06/23/2015
(embargoed until Tuesday June 23, 2015 at 9 am EST)
Share this report with your city’s leaders. Tell them that cities can create good and safe recycling jobs by ensuring health and safety compliance across the industry.
Recycling is the right thing to do, but we need to make it safe for recycling workers. Recycling is a key approach for waste reduction and climate action that is used by cities across the U.S. with enormous environmental and economic benefits. But a new report finds that the actual work of sorting recycling can be unnecessarily hazardous to workers’ health and safety. Seventeen recycling workers died on the job between 2011-2013, and recycling workers are more than twice as likely to be injured on the job than the average U.S. worker. These high injury and fatality rates are a result of unsafe working conditions including exposure to hazardous items on the sort line, like hypodermic needles, toxic chemicals, and animal carcasses, and working around heavy machinery. By ensuring health and safety compliance across the industry, cities can protect workers who protect our planet.
Cities have the power to create good and safe jobs by contracting solely with responsible recycling companies that maintain rigorous health and safety programs. Municipal best practices also include prohibiting the use of temporary employees — who are at the greatest risk of injury on the job — and educating communities about correct separation of recyclable materials. Additionally, unionized workers enjoy more effective enforcement of these mandated health and safety protections. When workers have a voice on the job and protection from retaliation, workplaces are safer, have well-trained staff, and experience less turnover than nonunion workplaces.
“Safe and Sustainable Recycling” is being released by local partners: Boston, New York, Los Angeles, Atlanta, San Diego, Milwaukee, Newark, Baltimore, Oakland. The report is by GAIA, Partnership for Working Families, and National Council for Occupational Safety and Health. | <urn:uuid:5de029b2-59c5-4331-8bde-810928325aa0> | CC-MAIN-2018-17 | http://globalrec.org/2015/07/19/safe-sustainable-recycling/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944479.27/warc/CC-MAIN-20180420155332-20180420175332-00224.warc.gz | en | 0.946788 | 420 | 3.140625 | 3 |
includes four exciting resources: three slim, practical handbooks and a CD. Beginning with the first handbook, The Process and the Prompt
, Ardith Davis Cole describes Right-Answer Protocol, a simple, powerful, step-by-step procedure for constructing responses to prompts of any sort. Cole thoroughly describes prompts, outlining the three things every student and teacher should know about them, then takes you through the Right-Answer process. From a single, unified paragraph to a multiple-paragraph response, students will have a reliable procedure for writing that delivers high-quality answers to test prompts. | <urn:uuid:d2430575-73c6-49aa-afd8-9d67ed96ee2d> | CC-MAIN-2020-16 | https://www.pearsoncanadaschool.com/index.cfm?locator=PS1zR4&PMDBSOLUTIONID=25862&PMDBSITEID=2621&PMDBCATEGORYID=25878&PMDBSUBSOLUTIONID=&PMDBSUBJECTAREAID=&PMDBSUBCATEGORYID=26108&PMDbProgramID=47310 | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506121.24/warc/CC-MAIN-20200401192839-20200401222839-00008.warc.gz | en | 0.874476 | 118 | 3.3125 | 3 |
What is pure hypercholesterolemia?
Posted 3 years ago in Health & Wellness by ToastMan
Pure hypercholesterolemia is an inherited disorder that causes very high cholesterol levels from birth. The condition greatly increases the chances of heart attack at a young age. Pure hypercholesterolemia is treated through strict diet and medication, most commonly statin drugs. A last resort is a liver transplant, which introduces new liver cells with working LDL receptors into the body, which should cure the condition.Pure hypercholesterolemia is a serious condition that needs to be monitored closely from an early age. Pure Hypercholesterolemia is also known as: pure hypercholesterolaemia, pure hypercholesterolem
Pure hypercholesterolemia is a hereditary disease that causes high cholesterol levels in the blood from birth.
Powered By Yahoo! Answers | <urn:uuid:453a007f-df21-4e7b-8740-517403abd480> | CC-MAIN-2014-15 | http://www.thirdage.com/health-wellness/what-is-pure-hypercholesterolemia- | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223205137.4/warc/CC-MAIN-20140423032005-00205-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.92039 | 177 | 2.578125 | 3 |
HPV or Human Papillomavirus infects around 50% of the population who are sexually active. Most people infected with HPV do not have any symptoms and it can also disappear quietly. Some strains (there are more than 100) could cause cancer of the penis, anus or cervical cancer. Some HPV types cause genital warts and hence the term ‘papilloma’. This sexually-transmitted infection spreads through genital skin contact, body fluids or mucous membranes – during oral sex or intercourse.
Those who have sex early in life or have multiple partners or sex with someone who has had several partners are more at risk of contracting HPV. Genital warts are the main symptoms of HPV. For cancerous HPV, tests like a PAP smear are done. HPV infections usually clear on their own unless they are caused by the cancerous HPV 16 or 18 strains. There are many treatment options available for HPV. In addition vaccination could reduce the risk of contracting HPV.
Turmeric & HPV
As you can see, there is a vast number of people who suffer from HPV, though most do not have serious symptoms and get well soon others may contact serious diseases such as cancer. This is where turmeric comes into picture.
Studies have established a link between frequent turmeric usage to lower rates of certain cancers – breast, lung, colon and prostate. Laboratory experiments find that curcumin – the chemical compound in turmeric – can inhibit growth of transcription factors. These regulate genes that work to form tumors. When these transcription factors are switched off, some cancer-causing genes are shut down and the risk of contracting certain cancers is reduced. Studies are underway on the therapeutic and chemopreventive properties of curcumin against other cancers.
Curcumin has been examined in laboratory tests for its ability to reduce HPV oncoprotein expression and in helping with programmed cancer cell death. Curcumin may also help suppress tumor causing proteins. Laboratory studies were also conducted on cervical cancer cells caused by HPV – especially its anti-viral and anti-tumor properties. Turmeric displayed cytotoxic activity against HPV 16 and 18 – the two strains of HPV known to cause cervical cancer. It was found that curcumin could induce apoptosis of cancer cells, inhibit growth of viral oncogenes and could prevent activation of the regulatory molecule NF-kappaB. This regulatory molecule is responsible for producing various inflammatory molecules like COX-2 and TNF that could increase growth of cancer cells.
In a human study, 25 cancer-risk patients were given 500-8000mg of curcumin daily. The patients had cervical intraepithelial neoplasm, bladder cancer, intestinal metaplasia, arsenic Bowen’s disease or oral leukoplakia. There was histological improvement in pre-cancerous lesions in one patient. Of the entire group, only 2 patients developed full-blown malignancies after a 3-month treatment with curcumin. No patient in the study was given other cancer treatments like chemotherapy or radiation. There was also no toxicity reported.
Medical composition of an oil made from borneol (an organic compound) and zedoary turmeric (a variety of the curcuma longa – turmeric plant) is said to help in treating various infections caused by HPV.
While turmeric has been found useful, low bioavailability of curcumin is a major concern. This could be overcome by combining curcumin with long or black pepper that contain piperine – an alkaloid. There is little epidemiologic evidence on turmeric’s benefits for various cancers and further extensive research is required.
It has been suggested that the Indian diet that includes spices like turmeric, chilies, cumin and other plant seeds could be the reason why there is lower rate of certain types of cancer in this country compared to other countries. When Indians migrate to other western societies, their risk of cancer also increases indicating that this could be due to a change in diet and adopting a western diet.
Based on studies I believe turmeric has potential in case of HPV, but more research needs to be conducted to be conclusive here.
The recommended dosage of standardized curcumin powder used to make capsules is 400-600mg thrice daily. We can also use cut root, dried powdered root, tincture or liquid extracts of curcumin. Sometimes turmeric supplements are combined with bromelain. This compound can increase the absorbability an d anti-inflammatory benefits of curcumin.
Anyone can safely use turmeric spice in their food. Those requiring surgery must avoid it for it could interact with anti-coagulant medications. Those who have diabetes or gallbladder problems must avoid turmeric for it may worsen their condition. Pregnant and breastfeeding women are usually advised to avoid all herbal supplements. Turmeric could stimulate the uterus or cause menstrual bleeding, increasing the risk of a miscarriage. Turmeric supplements must only be taken under medical supervision. | <urn:uuid:ad41382c-5120-43cf-991a-0c4bfd11c65d> | CC-MAIN-2015-11 | http://www.turmericforhealth.com/turmeric-benefits/benefits-of-turmeric-for-hpv | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00244-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.951256 | 1,023 | 3.21875 | 3 |
Mughal Dhaka and its river fortification system
When the Mughals tried to establish their stronghold in this part of Bengal the worst enemy they faced, besides the indomitable Baro Bhuiyans (twelve landlords), were the calamitous nature and the riverine landscape. The streams of constantly shifting water pierced the land into parcels of various sizes and shapes. Another alarming fact for them were the continuous raids by the Magh (Arakanese) and Portuguese (along with a few Dutch) pirates, who came from the Bay of Bengal through large rivers (namely Meghna and Brahmaputra). The horse-riding Mughals understood that in order to lay down their empire in Bengal they had to secure the waterways first.
Subedar (governor) Islam Khan, who in popular culture is thought to be the founder of the township of Dhaka, expanded and strengthened the naval forces (Mughal Nowara or the naval fleet) and appointed a Commander in Chief or Meer-i-Bohor. It is said that within a century, the Mughals probably built three forts along the rivers around the city at strategic locations with a view to securing the capital. Though there is a persisting controversy about whether it was Mir Jumla or Islam Khan who actually built them, there is no doubt about their purpose. The three forts are sometimes referred to as the "Triangle of Waterforts" and consists of the Idrakpur, Sonakanda and Hajiganj forts.
The Idrakpur Fort was the first fort to be constructed among the "Triangle of Waterforts". It is located about 25 km south-east of Dhaka, at the Munshiganj town, on the west bank of the river Ichamoti. At the time, the river ran along the side of the fort, but subsequently dried up in the twentieth century—a portion of the present Munshiganj town is actually built on top of that area.
The fort was probably built by Mir Jumla in the 1660s as a defence against the Magh (Arakanese) and Portuguese pirates. As stone was unavailable and expensive, the principal building material was burnt brick. Use of this local material can be seen in the joineries on the doors. The same technique prevails in the Hajiganj and Sonakanda forts too.
The fort is rectangular in shape and divided into two sections. Among them, the polygonal western portion is larger and elongated towards the north-south. The quadrangular eastern part is much smaller. The walls and plinth of this fort is much lower than the other forts. There is no significant void in the wall except a small hole on the merlon (the solid upright section of a battlement) and another hole between the merlons. The four open bastions at the four corners were the most effective in attacking the enemies. There were sixteen merlons on each of the bastions. All the gateways resemble the Mughal architectural style of large vaulted openings. The fort also has a water reservoir which provided fresh supply of water for the inhabitants inside.
It was not a siege fort, and because of that it only had a weak defensive wall. Like most other forts in this region it provided shelter, for the soldiers who encamped here, in the rainy season when the raids were frequent. Another significant feature of the fort is a big circular drum in the south, which is further defended by a wall. This area must have been provided for mounting a cannon, to keep raiders away, with long range bombardment capabilities.
As the Ichamoti River silted, the southern side of the fort became buried up to the parapet. Moreover, for a while, a portion of the compound was being used as a residence of the District Commissioner (DC) of Munshiganj and the rest serves as a jail. Although the fort is not exactly preserved in its original condition, it has survived negligence and destruction because of being reused for that spell of time.
The fort is situated at the Bandar area of Narayanganj and is on the eastern side of the Shitalakkhya river. It is just south of the present-day Rupshi residential area (once the Rupshi Jute Mill area) which is also about a distance of 25 km from Dhaka city.
Like the Idrakpur Fort, this was also used for protecting the nearby settlements and Dhaka from the raids. Back then, the area was a very important strategic location for Mughal defences, as the Shitalakkhya, the Dhaleshwari and the Brahmaputra rivers met at this point. Nowadays, the three rivers have shifted towards the west, south and east respectively. At the same time, the Brahmaputra has mostly dried up, and the flow of the Dhaleshwari has decreased significantly, which undermines the utility of the fort at the present.
It is assumed that the fort was built in the Mughal period, but it is not known whether it was commissioned by Mir Jumla or someone before him. It is rumoured that the fort was a Magh or Portuguese fort, and was then captured by the Mughals. This statement, though, cannot be backed up or verified with proper sources and is most probably just gossip.
The fort is a rectangular shaped structure with a circular section on the west where there is an elevated platform. This base was used for bombardment by long-range heavy cannon. It also has other spaces for placing cannons at different sides. The premises most likely did not have any other buildings inside, as no ruins can be found. It was common practice for the Mughal army to establish army camps with tents and temporary settlements with mainly wooden structures when necessary within the fort. The fort was in ruins, before the Department of Archaeology took up the work of restoration and maintenance—it is today a well maintained remnant of Mughal Dhaka.
This fort is very close to Dhaka (about 20 km), located at the outskirts of Narayanganj city. It falls to the western side of the Narayanganj-Demra Road while moving outwards from the town. It is evident from old maps and records that the fort was built along the river side, but here too the channel over time shifted quite a bit towards the east.
The pentagonal shaped fort is the most elevated one among the three. It is located on the western bank of the Shitalakhya River (opposite of the Sonakanda fort) at a place where it meets the river Buriganga. Measuring approximately 250 by 200 feet; the fort is elongated along the east to the west. The walls are about twenty-feet-wide and the five segments of the fort are not equal. The corner of the walls are curved and there used to be bastions for cannons. There are several battlements on the wall along with some platforms connected to the walls to operate the cannon. There is a large square platform on a corner. The interior space was likely used as the premises for troops to stay, retreat and move forward during a battle. It is known that the famous Subedar Mir Jumla stayed here quite often and from here, started some of his conquests.
After the British period, the fort was abandoned and it started to fall apart. The Department of Archaeology has taken it under their jurisdiction and repaired it. Today, it can be seen at its original state.
OTHER FORTS AND DEFENCE SYSTEMS
Besides the three river forts mentioned, the Mughal fortification network system also consisted of some other forts. There were two forts at Fatulla, on both sides of Buriganga River. They can be seen in Rennell's map of the region and were probably structurally similar to the Sonakanda fort. One of them was also called the Dhapa fort. There was another one made by Beg Murad at the connection between the Dholai Canal and the Buriganga River, near the present-day Mill Barrack area of the old town. This was a Pathan fort rather than a Mughal one, but once captured, it was kept in use. In Keraniganj, on the other side of Buriganga River, the Jinjira Palace also used to be a fort, as has been described by some historians and archaeologists.
Another important component of the defence system of the Mughals was the platform for cannons (marked as Octagon in Rennell's map) in the Moglani's Char, in the middle of Buriganga, opposite to the present day Sowarighat. The legendary cannon named Kale Khan or Kale Zamzam was placed there. This was a huge cannon, one which has become a part of the folklore of Dhaka and amazed the British. There was another one, smaller in size called Bibi Mariam, now kept at the Osmani Uddan in Gulistan area. But Bibi Mariam was never used from Moglani's Char. The larger Kale Khan is said to have drowned in the river as Moglani's Char was vanishing due to the Buriganga's flow. Both the cannons were built by locals with instructions from the Mughals.
The Mughals invested heavily in developing a river fortification system in Bengal not only with a view to protecting their empire, especially from raids by Maghs and others, but also to expand their territory, using the forts as their base camps for campaigns. There were also forts in other areas like Egarosindur, Daudkandi, etc. by the side of rivers or in strategic positions. Most of these have been destroyed and are in ruins now. Dhaka, as the capital of the Bengal Subah, served as a base camp for launching expeditions and invasions of other kingdoms nearby for further expansion of the Mughal empire. It was only after claiming Dhaka, the Mughals expanded the empire to Assam, Tripura, Chittagong and Sylhet regions—then too, the conquered areas were not always in complete subjugation. Dhaka was also the capital of the one of the most prosperous regions of the empire, which not only provided raw ingredients for production and food but also a handsome revenue and elephants for the army. Therefore, the objective was to keep the city under absolute control and create a stable political situation here. This was a chief reason for the construction of this expansive fortification network system, which included river forts, palace forts and capital or settlement forts.
Dhrubo Alam is Transport Planner and Fatiha Polin is Research Associate of the Bengal Institute for Architecture, Landscapes and Settlements.
1. Ali, Imam. Jahangirnagar Theke Dhaka (in Bengali). Srijoni, 2009.
2. Allen, Basil Copleston. Dacca: Eastern Bengal district gazetteers. Concept Publishing Company, 1912.
3. Dani, Ahmad Hasan. Dacca: a record of its changing fortunes. Mrs. SS Dani, 1962.
4. Hossain, Nazir. Kingbotontir Dhaka. Three Star Co-operative Multipurpose Society Ltd. (3rd Ed.), Dhaka 1995.
5. Rennell, James. A Bengal Atlas, The East India Company, 1781.
6. Mamoon, Muntassir. Dhaka: Smriti Bismritir Nogori (in Bengali). Ononna Publication, Dhaka, 1993.
7. Mamoon, Muntassir. Dhaka: Dhaka Samagra-1 (in Bengali). Ononna Publication, Dhaka, 1995.
8. Taifoor, Syed Muhammed. Glimpses of old Dhaka. Kawser House, 1952.
9. Taylor, James. A sketch of the Topography & Statistics of Dacca. GH Huttmann, Military Orphan Press, 1840. | <urn:uuid:58651741-25c6-4283-8798-317a6c5127f9> | CC-MAIN-2019-13 | https://www.thedailystar.net/in-focus/mughal-dhaka-and-its-river-fortification-system-1566436?amp | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204857.82/warc/CC-MAIN-20190326054828-20190326080828-00515.warc.gz | en | 0.975043 | 2,501 | 3.59375 | 4 |
It’s hard to believe that water can be so valuable, but that’s what this tiny plastic water container does for you: it’s a cheap, high-quality source of drinking water.
But this water container is a little bit more than just a cheap water source: it can also serve as a useful storage container for the contents of your home.
For the most part, water is used in the home as a source of clean, safe drinking water, and as a way to clean, sanitize, disinfect and sanitise other household goods.
Water containers are usually constructed from either aluminum or carbon fiber, which can be used for water pipes, but they are also a great way to store a variety of other household items.
Water is also a good source of carbon dioxide, which is a greenhouse gas, so it’s very important to keep water in check and properly dispose of waste water.
In the event of a leak or spill, water containers can also be used to store large quantities of food, which means that you can store large amounts of food and drink in a relatively small space.
And if you’re going to store your food in the water, you’ll also want to store it well.
The water container can serve both as a water source and a storage container.
The water container comes with a simple plastic housing that has a hole cut into it, allowing you to place your contents in the container.
The container is then made from fiberglass, which has a very high water conductivity, making it a very durable, water-repellent material.
The fiberglass also provides good electrical and mechanical properties, so the container can also act as a door for a door, allowing for a number of different door openings.
This container is also extremely strong, as the water inside of the container is capable of holding up to 12 tons of pressure, which gives it a maximum density of around 10,000 kilograms per cubic meter.
This water container also serves as a storage unit, with the water holding up the contents for up to 3 years.
Fiberglass is a high-strength, durable, waterproof, and weatherproof material that is a great choice for water containers.
It’s also cheap to produce and is available in a wide variety of colors.
The price of this fiberglass container is not that high, so you can expect to save quite a bit in labor and materials.
The most important thing to remember about water containers is that they’re very useful for both home and business purposes.
The glass containers are great for storing food and other household products, and can also help protect your home from damage if it gets wet.
A water tank is also an excellent way to hold waste water, which makes it an ideal storage container when you’re in the middle of a long drive.
A water tank also acts as a barrier to keep the contents from getting into your car, and it can be an excellent storage container to store household goods when you are out and about.
If you’re looking for a way for you and your family to save money, you should consider buying a fiber-glass water bottle.
The plastic container you buy is also durable and will hold up for years, so this is the type of product you want to purchase.
You can also save a lot of money by building a home with fiberglass as the main building material.
In terms of its price, the price of the fiberglass bottle is $50, which isn’t too bad for a fiber glass container, and you can also pick up some of the cheaper fiberglass containers on the market for a few bucks each.
Finally, if you don’t have the means to build your own fiberglass-based container, you can use a home-made container that comes with the right parts to build the container yourself.
The materials that are used in making these containers vary from brand to brand, so be sure to check out the product that’s right for you before you purchase it. | <urn:uuid:77a23d6d-4167-4d65-96af-908a562c39e5> | CC-MAIN-2021-43 | https://amarcleaningservices.com/2021/08/16/how-to-build-a-fiberglass-water-container-for-your-home/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587659.72/warc/CC-MAIN-20211025092203-20211025122203-00566.warc.gz | en | 0.960489 | 845 | 2.65625 | 3 |
There’s a baby at the San Diego Zoo that was already a winner—at only a few months old! Early one morning in February of 2019, a klipspringer (a tiny type of antelope) gave birth to a male calf. The mom couldn’t take care of him, so wildlife care specialists stepped in to help.
Lots of care—and milk
Wildlife care specialists took the baby to the Zoo hospital, where they warmed him up and made sure he was healthy. They started bottle-feeding the baby, and at one point he was getting three bottles a day! As soon as he was strong enough, the calf was returned to his mother in the Kopje in Africa Rocks. He nursed from his mom, and grew and grew. Within two months, he was already five times bigger than he was at birth. He was soon playing with his mom and learning to jump from rock to rock, just like a klipspringer should. The word klipspringer even means “rock jumper” in Afrikkans, a language in the part of Africa where these animals are from.
He's a "winner"
The klipspringer calf grew so strong and active that, in honor of how much he had improved after his early struggles, wildlife care specialists named him Ajani, which means “he who wins the struggle” in Afrikaans. He sure did, and you can see him at the Kopje. He will live there until he is grown up enough to be on his own, at about one year of age. | <urn:uuid:b26e5e7d-58c7-4237-bb5c-6bf89df9a443> | CC-MAIN-2021-39 | https://kids.sandiegozoowildlifealliance.org/stories/welcome-ajani | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057131.88/warc/CC-MAIN-20210921011047-20210921041047-00449.warc.gz | en | 0.99199 | 332 | 2.671875 | 3 |
Drug addiction can begin with voluntary drug use. Sometimes users seek out recreational drugs for pleasure and immediately find them irresistible; however, in other cases, users begin taking slightly more of a prescription drug than recommended and an addiction develops over time. No matter how drug addiction begins, it can be taken for granted that addiction isn’t the intended result a user is seeking. But all too often, by the time drug addiction is apparent and needs to be treated, the user is no longer in control of his or her relationship with the substance. According to the National Institute on Drug Abuse (NIDA), using drugs actually causes changes in the brain that make it more difficult to quit.
This is why drug detox programs exist – because addicts need assistance with the daunting process of detoxifying their bodies from the substance they have been misusing. There are often many physical considerations that need to be minded by a professional when a person is detoxing in addition to a well of mental, emotional and psychological factors that should be addressed. Drug addiction usually requires a multifaceted approach to recovery that is best handled by those experienced in drug detoxification. Before a person can initiate a drug detox program, it is important that he or she fully understand the many elements of drug addiction and drug detox.
An addiction to drugs comes in many shapes and sizes, as do the addicts themselves. While the substances and people can vary, the impact that drug addiction has on the lives of users tends to remain the same. Drug addiction, no matter the specifics, has a way of unraveling a person’s life, leaving a user feeling as though he or she is spinning out of control and no longer able to orchestrate how life is unfolding. The misuse of and reliance on drugs can affect virtually every area of a user’s life. In many cases, an addict’s life at home, work and beyond is negatively impacted by drug addiction. A dependence on substances often stems from psychological issues that should be treated as a part of any detox and rehabilitation program.
Types of Substances
Each type of substance is different, and thus, how each substance will impact a user when abused varies. The signs and symptoms of drug addiction will differ depending on the substance, so it’s important that you understand the full spectrum of addictive substances if you or someone you love might be addicted to drugs and in need of drug detox.
Heroin is a highly addictive substance. It is an opioid analgesic that is derived from the opium poppy plant. Closely related to morphine, users often cite pain relief as one of the pleasures of heroin. Heroin induces a euphoric state in users. Heroin is particularly dangerous when combined with alcohol and the combination of the two can be lethal, according to NIDA. Some physical signs and symptoms of heroin use include:
- Track marks
- Dry mouth
- Flushed skin
- Constricted pupils
Barbiturates are substances that depress the central nervous system. These drugs can cause anything from mild sedation to thorough anesthesia. They are derived from barbituric acid and often used recreationally to induce a sense of euphoria. Some of the common physical symptoms of barbiturates use include:
- Slurred speech
- Poor coordination
- Talking slowly
- Inability to walk or move normally
Alcohol that is meant for drinking, also known as ethanol, is an organic compound. It is produced through the process of fermentation, often when sugars or yeasts ferment. Alcohol use is widely accepted and legal as a recreational substance throughout the US and beyond. Because of this widespread use, it can be easy for some to slip into alcohol addiction unnoticed or unexpectedly. Some of the common physical symptoms of alcohol use include:
- Slurred speech
- Lowering of inhibitions
- Poor coordination
Benzodiazepines are psychoactive drugs that are normally prescribed by doctors to treat conditions like anxiety or panic disorder. These substances have a sedative effect and are often taken recreationally for their relaxation properties. Some common physical symptoms of benzodiazepines use include:
- Blurred vision
- Slurred speech
- Poor coordination
- Sleeping or napping at times outside of a person’s normal schedule
Amphetamines are a type of stimulant. These drugs are normally prescribed to treat conditions like narcolepsy or attention deficit disorder, but they are sometimes used recreationally for their energy-increasing effects. Some of the common physical symptoms of amphetamine use include:
- Rapid speech
- Rapid movement and other signs of increased energy
Signs and Symptoms of Drug Addiction
If you or someone you love might have a drug addiction, it is important that treatment is sought as soon as possible for the best recovery outcome. A person does not need to hit rock bottom before seeking treatment. Drug addiction is often characterized by a lack of control over substance use that gets worse over time. The longer the addiction remains untreated, the less control the user has over their addiction, including whether or not to use as well as when, where and how to use. This is why drug addiction should be treated sooner rather than later.
If you are concerned that someone you love might be struggling with drug addiction, but you’re not sure which substance he or she might be abusing, there are some common signs of drug addiction that are often seen, regardless of the specific drug being used. Some of these common signs of drug addiction include:
- A change in sleeping patterns
- A change in eating patterns
- Lowered work or school performance
- A change in body coordination
- A change in energy
- Financial trouble
The Drug Detoxification Process
Before the drug detoxification process can begin, a user must be willing to, or in some cases, be mandated to, undergo treatment. Sometimes this begins with an intervention held by the user’s loved ones and other times this begins with a legal sentence that includes drug detoxification and rehabilitation. Once the user is ready to begin the detoxification process, there are three main steps to detoxification. These three steps include:
- Evaluation: The evaluation step takes place as soon as a patient begins the drug detoxification process. During this period of evaluation, a user will be tested so that the professionals working with the user are aware of any substances currently in the user’s system. This time will also allow clinicians to assess whether or not the user has any co-occurring issues. Identifying other issues that may be at play, like mental illness, will help the professionals who oversee the detoxification process to thoroughly address the patient’s drug addiction in the most effective and efficient way. Nearly one-third of people suffering from mental illness also struggle with substance abuse, according to the National Alliance on Mental Illness (NAMI).
- Stabilization: Stabilization is the process of drug detoxification that helps to guide the patient away from the addictive substance. This might involve tapering off the drug methodically, perhaps initiating medication that will be conducive to recovery, and handling the symptoms of withdrawal, which can be incredibly severe in some patients. This process can be intensive and its success hinges on the presence and guidance of medical professionals.
- Guiding the patient into treatment: The final step of the detoxification process helps the patient to become prepared for actual treatment and recovery. Detoxing the body of the addictive substance is only the beginning of a drug treatment program. In order for a user to achieve a full recovery, the patient must address the psychological factors of addiction alongside a licensed professional. NIDA reports that dropping out of a program is one of the biggest problems treatment programs face with their patients, so at Orlando Recovery Center, we place an emphasis on program completion. Oftentimes, a patient will enroll in our drug rehabilitation program after the drug detoxification process is complete.
Orlando Recovery Center offers an inpatient medical facility that specializes in drug detoxification. We provide 24-hour medical care so patients who are detoxing at our facility are never alone. Our patients receive around-the-clock care from professionals who have been trained specifically in drug detoxification.
With licensing from DCF, Orlando Recovery Center offers the latest in drug detoxification with methods that have been proven to work. Our care is based on current research that takes each patient’s specific needs and concerns into consideration. Our facility provides everything that our patients will need during their detox – from food to counseling to recreational options. We accept most types of insurance, so you or your loved one can focus all energy toward a successful detoxification process.
The Treatment Process
We evaluate our patients as individuals. Because each person is different, with his or her own background, context and relationship with addiction, each individual case of drug addiction is different too. We help patients to detox through evaluating their specific addiction, helping to separate their bodies from the substance, and assessing the type of further treatment that will be needed in order to achieve a full recovery.
We work with our patients to harness support from their friends, family and community while being sure to guide them in a direction that yields physical, mental and emotional health. Our staff members are experienced in supervising drug detoxification and monitor our patients closely for the most effective detox results.
Life After Drug Addiction
Drug addiction has a way of leaving addicts feeling hopeless and helpless, but there is hope in effective recovery services. One of the main obstacles standing between a user and recovery is physical dependence. At Orlando Recovery Center, we help our patients to overcome this difficult hurdle and guide them in a direction that will yield a fulfilling and drug-free life. We aim to liberate our patients from the imprisonment of drug addiction and steer them toward a healthy, balanced life.
If you’re interested in learning more about Orlando Recovery Center and our treatment process, contact us today. We’d be happy to talk you through our approach to care, the methods we employ, the expertise of our staff members, and anything else you’d like to know.
Substance abuse and addiction are prevalent in society. Across the country, 22 million people were abusing illicit substances in 2010, per The Chart, CNN. Alcoholism and alcohol-associated problems were a problem for an astounding 17 million Americans that same year, per eMedicineHealth. If you suspect addiction in yourself, the best gift you can give yourself is a second chance, and it starts with detox.
Frequently Asked Questions
- What is detox?
Detox is the process of voluntarily withdrawing from a substance in an effort to remove toxins from the body and jumpstart the process of tackling addiction. While it is possible for some individuals to detox on their own, those who are seriously addicted are not likely to be successful or remain clean and sober even if they are.
- Who needs detox?
The following individuals are good candidates for professionally assisted detox:
- Those who are ready to quit using but afraid of the withdrawal experience
- Those who are addicted to hard substances that require a tapered withdrawal plan
- Persons who have failed at detoxing at home due to the difficult symptoms of withdrawal that set in
- Persons who are suffering from a mental health condition on top of their substance abuse problem, requiring professional oversight during detox
- How long does detox last?
For most patients, detox lasts about a week; however, it varies depending on the specifics of the individual and their drug abuse history.
- Are there different types of detox?
Yes. Medicated detox is now the most common method utilized and consists of administering prescribed medications to patients who are going through withdrawal. Common treatments include anticonvulsants for seizures incurred by alcoholics, benzodiazepines for anxiety inflicted by general withdrawal, and methadone or buprenorphine for withdrawing opiate addicts.
Rapid detox is not advisable. The dangers of this form of detox include coma and death, and it brings no greater likelihood of staying clean. A holistic approach to detox is somewhat like the basic, non-medicated form, but it is inclusive of other avenues of achieving peace and relaxation while coping with the withdrawal process, like yoga and meditation.
- What is outpatient detox?
In 2005, the Substance Abuse and Mental Health Services Administration accounted for 62 percent of all detox admissions being people admitted for detox on an outpatient basis, with 50 percent of all detox patients having sought detox for alcohol abuse and 30 percent for opioids. Outpatient detox typically consists of the same intensive treatment one would receive while staying on site, but living at the facility isn’t a requirement.
- What is inpatient detox?
Inpatient detox is built on the very same foundation that outpatient is, but it is more intensive. Therapy — whether as a group or alone — is more concentrated. Certain individuals may respond better to and require inpatient detox, such as those suffering from severe mental illness or persons who have tried outpatient detox in the past and relapsed.
- What is detox from cocaine like?
Unlike with other illicit drugs, there are no specific medicated approved to treat cocaine withdrawal. That being said, off-label use of medications like benzodiazepines and antidepressants do often aid in decreasing withdrawal symptoms like insomnia and lethargy. Other symptoms of detox from cocaine include an inability to feel joy or pleasure, tremors, and exhaustion.
- What is detox from heroin and prescription opioid pain relievers like?
Detoxing from any opiate should always be done under medical supervision. Most often, programs allowing for the patient to slowly taper off an illicit substance are best. The most popularly prescribed medication for such programs is methadone, which boasts a 60 to 90 percent success rate, per the California Society of Addiction Medicine. The other medication used, buprenorphine, showed an 88 percent success rate in initial studies, according to The Fix.
The detox process from heroin and prescription opioid painkillers can be quite intense. Detoxing patients can expect symptoms such as nausea, drowsiness, depressed breathing, and even serious side effects like coma and death, hence the need for professional, and often medicated, help.
- What is detox from alcohol like?
Alcohol withdrawal can be quite uncomfortable; however, withdrawal symptoms can be mitigated with professional care. The withdrawal process from alcohol can be life-threatening for 5 percent of patients who develop delirium tremens, per Slate. Symptoms like tremors, vomiting, nausea, headache, anxiety, and depression are often present.
- What is detox from benzodiazepines like?
Patients addicted to benzodiazepines can expect to experience diarrhea, intense headaches, depersonalization, mood swings, trouble breathing, paranoia, flu-like symptoms, and more. Fortunately, benzo addicts are best managed when slowly weaned off the drugs, and medication can be administered to alleviate discomfort.
- How do mental health disorders complicate detox?
According to Helpguide, approximately 29 percent of all mentally ill individuals also struggle with substance abuse. Having comorbid disorders presents complications for detox including trouble differentiating which problem is causing which symptoms and overlapping concerns for medicating symptoms.
- Is detox a cure-all for addiction and substance abuse?
No. Detox in and of itself is not comprehensive addiction treatment. A complete treatment program should follow detox. According to the Partnership for Drug-Free Kids, patients who seek follow-up treatment within a month of finishing detox take 40 percent longer to relapse into addiction than those who don’t seek such treatment, if they relapse at all. | <urn:uuid:0850a102-4af6-4aef-acc9-7aebb68a8f08> | CC-MAIN-2019-18 | https://www.orlandorecovery.com/drug-detox/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527135.18/warc/CC-MAIN-20190419041415-20190419063415-00307.warc.gz | en | 0.947708 | 3,187 | 2.78125 | 3 |
The effects of this year’s drought in the United States have threatened to diminish our supply of pork, beef and various forms of produce that farmers have been unable to yield in high quantities. However a drought isn’t so bad for all crops, and pumpkins seem to be faring better this year than in recent years when hurricanes and storms plagued many pumpkin crops in Middle America.
A stretch of farmland near Morton, Illinois is where the majority of the nation’s pumpkins are grown. Farmers there say the crop looks great this year, and they will be a small victory beside the other crops scorched by this year’s drought. Elsewhere thousands of cattle were sold off because the pastures their ranchers use for grazing have gone too dry, and corn and soybean farmers lost crops from the long drought. However pumpkins thrive in dry weather, they prefer warm temperate clients that repel fungus and mold that are more prevalent in wet climates.
Most pumpkins are also grown from seeds, which develop complex root systems that go deep into the ground and find water other plants cannot. John Ackerman, a farmer from Morton, Illinois expects a robust crop of pumpkins this year. Ackerman planted about 70 percent of his 30 acres of pumpkins in May, which did very well. He planted the rest of his pumpkins in June and July, and after sitting “in dust for a while” they are finally turning orange now.
In the last few years excess rain has actually hurt American pumpkin production. Nestlé’s affiliate brand Libby’s has a pumpkin-canning plant near Morton, and in 2009 farmers had to leave most of their crop behind after tractors were unable to move in the rain saturated ground. Afterwards a shortage of canned pumpkins led to bidding wars on eBay during holiday season. The summer afterward was the wettest in the history of Illinois, and although Morton was spared the worst, pumpkin production suffered elsewhere throughout the state. Continuing this trend, last year’s pumpkin crop in the Northeast was ravaged by Hurricane Irene and other storms.
After years of struggling pumpkin crops, this year there should be more than enough pumpkins for the holiday season. Nestle produces about 85 percent of the world’s canned pumpkin, and the majority of it comes from Morton.
DailyFoodtoEat is the official blog of FoodtoEat, a sustainable online food ordering and concierge catering service featuring your favorite restaurants, food trucks and caterers. Check out the deliciousness here: www.foodtoeat.com | <urn:uuid:1b51ad7c-baec-462d-9557-c7a386e71f80> | CC-MAIN-2018-13 | https://blog.foodtoeat.com/2012/10/10/pumpkin-crop-is-healthy-this-year-no-shortage-in-sight/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647299.37/warc/CC-MAIN-20180320052712-20180320072712-00137.warc.gz | en | 0.965546 | 530 | 2.71875 | 3 |
Using Modeling to Create a Photomosaic
A photomosaic is a large scale photo that is built by combining smaller photos together in a cohesive way. The team works with the Community School of Davidson to use student’s artwork and activities photos to create a banner that spelling the word “spARTans”. This poster exhibits the use of math modeling through binary integer linear programming (BILP) as a way to build this photomosaic. As we investigate in how to approximate images, we see how mathematical modeling could be utilized and applied to simple real world problem. | <urn:uuid:e418a23d-79ff-4ffc-b136-d3f6f704db76> | CC-MAIN-2021-17 | https://alendalux.davidson.edu/civic-engagement/nile-chau-chau-yiyao-xie-nile-chau-miller-page-and-dr-chartier/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038092961.47/warc/CC-MAIN-20210416221552-20210417011552-00423.warc.gz | en | 0.916715 | 122 | 2.890625 | 3 |
I stumbled across this typewritten letter on the documents page of famed computer scientist Edsger W. Dijkstra. The letter, written in 1965 is a basic request for a quote for a "general purpose digital computer" for the Technological University at Eindhoven (in the Netherlands). What is notable is the specifications and price:
- Number System - binary, not decimal. Hmmmm... Remember when base 10 systems were around? I don't.
- Memory - (quoting here) "A random access memory with a capacity of say, one or two million bits". Two million bits would be 250,000 bytes and according to this handy calculator that puts RAM somewhere in the 256k range (on the high end). Someone shout out if I got the math wrong.
- Backing Store - Discs or Drums. (quoting again) "We think that a capacity of 20 million bits would be sufficient." That sounds like about 2.5 megabytes - or .002 percent of a 1 GB USB key (do they make those any more?).
- Input Mechanism - paper tape reader.
Other comments of note:
- "We are not very attracted to punched cards." - I don't know of anyone who is, but there are crazy people out there on the Internet these days.
- "If you have noisy line printers and silent line printers we should prefer the silent ones."
- (regarding speed) "If a full length multiplication takes 10 mmsec it is fine; if it takes 25 mmsec we think it would be fine also. ...the difference hardly matters when in practice the machine spends eighty percent of its time winding and rewinding tapes!"
In 1965, what is the expected price of a machine as quoted above with less power than the music player in those annoying musical Hallmark cards? Dr. Dijkstra indicates to his prospective vendors:
"A million dollars is the upper limit. One or two years after the delivery we might be able to spend a quarter of a million to extend the installation if desired"
Isn't it amazing how far we have come? Here's a shout out to Dijkstra and all the other largely unheralded pioneers who slogged in the trenches so we can have I-phones, Macs, Netbooks and PCs today. Thanks guys! (We'll talk to you later about those musical cards - talk about the law of unexpected consequences...). | <urn:uuid:62b36485-d1b6-4395-a2a3-ec1184a97717> | CC-MAIN-2015-35 | http://www.coldfusionmuse.com/index.cfm/2009/9/16/computer.history.1965 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645298065.68/warc/CC-MAIN-20150827031458-00032-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.929139 | 501 | 2.515625 | 3 |
This human quality is a driving force in both ancient epic literature, classical tragedy, medieval romances and renaissance tragedy that would deliver them home -- note that throughout the tale these same men are encouraged to pillage. Story was typically situated in the “household of humanity” where arbitrary john o'neill, essaying montaigne: a study of the renaissance. The story of the collapse of rome speaks to something fundamental within and renaissance historians it was a morality tale of hubris and nemesis, for, in the human failings of the roman story we can trace elements of. Hubris: hubris is a concept that originated in ancient greece and today describes to disregard the divinely fixed limits on human action in an ordered cosmos.
101 quotes have been tagged as hubris: rick riordan: 'the first lesson every child gods, after all--but we can become something less than human with frightening ease “that's very noble of you, cautionary tales of hubris notwithstanding.
It is currently enjoying a modern renaissance, with many artists turning of human hubris pitting itself against the implacable forces of nature. It's not my desire to ruin your reading experience with tales of the human body my dad has kind of entered a thoroughly kick-ass golden years renaissance. External forces of nature that hampered free human action according to environmental wisdom, this hubris-because it promotes the radical separation of .
Hubris describes a personality quality of extreme or foolish pride or dangerous overconfidence, in contrast to this, the common word for sin was hamartia, which refers to an error and reflects the complexity of the human condition its result is.
The renaissance essayist montaigne comments in 'the tale of spurina' as shakespeare holds the mirror up to petty, self-deluding human. Were animals mere machines, and were humans the same-that is, man- machines yates's argument, for example, is that the renaissance magus was the in the hermetic story of creation, however, man is given permission by of luddite-frankenstein protest against human hubris in the making of. Completely into oblivion as did many other ancient tales, this myth has hubris will be punished, for not only was humanity sent into trouble, renaissance humanism and art (princeton ny: princeton university press,.
In english idiom, hubris is perhaps best captured in the warning, “pride greek myth is littered with cautionary tales of humans whose hubris was so especially since the renaissance revival of classical philosophy (go. Nations are most vulnerable to dangerous arrogance at the time of their greatest continuing on to the renaissance popes who failed to stem the abuses leading to the better things have been said about human folly i found myself particularly enjoying the least familiar tale here — the account of the. | <urn:uuid:e24b8ce5-e119-4235-9381-658ad64706e3> | CC-MAIN-2018-47 | http://cuessayrhxv.bethanyspringretreats.us/a-renaissance-tale-of-human-hubris.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743913.6/warc/CC-MAIN-20181117230600-20181118012600-00187.warc.gz | en | 0.93678 | 590 | 2.890625 | 3 |
Thanks for your question. Face masks serve two main purposes in preventing coronavirus transmission:
- They help protect you from getting infected with coronavirus.
- They help you protect others from getting infected with coronavirus.
We now know that people can spread coronavirus before they have any symptoms, which means wearing a mask even if you are feeling well helps prevent the spread of coronavirus.
It’s important to know that there are different types of masks, including cloth masks, surgical masks (some people also call them medical masks), and N95 respirator masks. Studies show that in communities (i.e. towns, states, countries) where people regularly wore a face mask coronavirus rates increased more slowly, and less people died from coronavirus.
Here are a few tips on how to use a mask:
- Wash your hands for 20 seconds (or use hand sanitizer) before and after putting on and taking off your cloth mask
- Make sure the mask covers your mouth and nose
- Don’t touch your mask while wearing it. If you accidentally touch it, make sure to wash your hands.
- Make sure to wash your cloth mask with soap and water regularly.
For more information about cloth masks: https://www.cdc.gov/coronavirus/2019-ncov/prevent-getting-sick/about-face-coverings.html
Also please remember that physical social distancing (6 feet apart or more) and frequent hand washing are still important in preventing coronavirus transmission. | <urn:uuid:28eeb426-82ce-40d0-a23f-32883331cfb6> | CC-MAIN-2022-27 | https://youngmenshealthsite.org/askus/coronavirus-masks-effective/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103850139.45/warc/CC-MAIN-20220630153307-20220630183307-00259.warc.gz | en | 0.942568 | 327 | 3.40625 | 3 |
Santa Fe County New Mexico
The 7,432' high pass, a 1/2 mi.-wide saddle crested by I-25, is blanketed by Santa Fe National Forest's ponderosa pines. The village of Glorieta hugs the S side of I-25 near the summit, and the Glorieta Baptist Assembly on the N side. The photograph shows historian Don Alberts, atop Sharpshooter's Ridge in Glorieta Battlefield, pointing toward Glorieta Pass, where the Texas Confederates advanced in 1862.
The final pass for westbound Santa Fe Trail caravans, 7,432' Glorieta Pass has seen Pueblo and Plains Indians, and several of the seminal events of the Santa Fe Trail, such as Brig. Gen. Stephen W. Kearny's Army of the West (1846), the Civil War Battle of Glorieta Pass (1862) and the arrival of the AT&SF Railroad (1880). Santa Fe Trail ruts at summit on N and on W slope to S. Remnants of Route 66 to E & W. | <urn:uuid:c8e2d61c-d457-4abc-a96d-242edee250ca> | CC-MAIN-2014-52 | http://www.santafetrailnm.org/site161.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802764809.9/warc/CC-MAIN-20141217075244-00124-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.895809 | 232 | 2.921875 | 3 |
Cardano (ADA) Price Prediction
Cardano (ADA): What Is It?
Cardano is a Proof of Stake-based decentralized cryptocurrency project using blockchain technology. It was created by one of the Ethereum co-founders, Charles Hoskinson, and debuted in 2017. The project is named after the Italian scientist Gerolamo Cardano, while its native token, ADA, is named for the English mathematician Augusta Ada Lovelace. | <urn:uuid:d75af13e-acd6-4172-a588-c836e29cb904> | CC-MAIN-2022-40 | https://medium.com/coinmonks/cardano-ada-price-prediction-995a116d12e9?source=user_profile---------1---------------------------- | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334596.27/warc/CC-MAIN-20220925193816-20220925223816-00376.warc.gz | en | 0.93185 | 90 | 2.84375 | 3 |
Telling Time, Quarter Past, Quarter to: Sentence Monkey Game
- Learning Objectives: Learn and practice sentences and expressions used when telling the time in English. The focus is on quarter past and quarter to.
- How to play: Click play and listen to a sentence. Drag and drop the correct words to fill in the blank spaces below. If you are correct, the monkey gets a banana. Help the monkey get a banana by getting the sentences right!
- Vocabulary: quarter past, quarter to
- Sentence structure: It's a quarter past two. It's a quarter to two.
- Educational goal: Create opportunities for student-driven English learning. This game is great for visual, auditory and kinesthetic learners. | <urn:uuid:3f8d2414-a5ce-48a6-a4eb-2d937b678757> | CC-MAIN-2018-43 | https://www.freddiesville.com/games/telling-time-quarter-past-quarter-to-sentence-monkey-game/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512592.60/warc/CC-MAIN-20181020055317-20181020080817-00447.warc.gz | en | 0.906201 | 152 | 3.6875 | 4 |
In 2007, the Town of Hyde Park was selected to receive two grants to assess and map ecologically significant wildlife habitat throughout nearly 8000 acres of the town.
The first project involved mapping of over 4000 acres north of South Cross and Fallkill Roads. This project was conducted by the professional biologists of Hudsonia, Ltd., using aerial photos as well as field studies.
Volunteers from Town committees learn to use stereophotos to predict ecosystem types (Photo by Hudsonia, Ltd.)
The second project focused on educating a team of Hyde Park residents on the identification of biodiversity resources. Members of the CAC, Planning Board and Shade Tree Commission volunteered their time to participate in a year-long training program. In addition to producing a habitat assessment of a 3000-acre portion of the town, the team gained the skills necessary to evaluate habitat quality at other sites.
Volunteers learn to identify critical wildlife habitat in the field. (Photo by Hudsonia, Ltd.)
Wildlife Habitat Conservation
To learn more about specific species or habitat types: | <urn:uuid:ecfafaf2-a9fa-4a02-bee5-828c480b1034> | CC-MAIN-2021-17 | https://hydeparkny.us/524/Wildlife-Habitat | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039379601.74/warc/CC-MAIN-20210420060507-20210420090507-00050.warc.gz | en | 0.935366 | 213 | 3.171875 | 3 |
In the latter half of the 19th century, the West had been won. The frontier was closed, and America was feeling panicked about its identity. Who were we if not the gunslinging pioneers of the Wild West? Were we soon to be soft-bellied city-slickers? Not if Teddy Roosevelt had anything to say about it. Once the cowboy president was in office, he signed the Antiquities Act, which gave commanders in chief the ability to designate national monuments. Over the years swaths of land were set aside for protection, but in 1916 Congress solidified the movement by founding the National Parks Service. On hundred years and about 400 parks later, the National Parks Service is still going strong.
The National Parks are intended to be a living “textbook” to America’s history. They were here long before the United States of America, and are, as historian Wallace Stegner put it, “Absolutely American, absolutely democratic, they reflect us at our best rather than at our worst.” We forget sometimes how big the country is, but the fact that the Everglades and Joshua Tree fall under the same administration serves as a helpful reminder how vast and varied the States are.
The Grand Canyon and Old Faithful are certainly not to be missed. But national parks are huge! In addition to the classic sights, there are a million hidden wonders just waiting to be found, from ancient artifacts to clandestine caves. In celebration of the National Parks Service’s 100th birthday, admission to any national park is free between August 25th and 28th, so no better occasion to spend some time reveling in the natural wonders the U.S. has to offer.
To aid your exploration, here is a list of places in the Atlas that are hidden tucked away within National Parks and National Forests. Get out there and find them.
Havasupai Falls are a well-kept secret of the Native American tribe they are named after and owned by. Understandably reluctant to open the falls to throngs of tourists, the Havasupai people issue a few camping permits a year to would-be visitors. If you’re one of the applicants lucky enough to receive one of the permits, your choices of reaching the falls are by helicopter, mule, or 10-mile hike. The Havasupai Falls are colored a shocking turquoise blue by the high levels of calcium carbonate in the water, which gives both the waterfall and the tribe their name: Havasupai roughly translates to “people of the blue-green waters.”
Early on November 17, 1955 an Air Force DC-4 plane carrying 10 CIA scientists and 4 flight crew members took off from Burbank, California and headed to Area 51. It never arrived—the flight was reported missing a mere hour later. The plane had crashed at the peak of Mt. Charleston, killing all of its passengers. All of this information—from the flight itself, to the crash, to the identity of every person involved—was classified for 40 years. It was only once Boy Scout leader Steve Ririe had stumbled upon the wreckage and made it his mission to find out what happened that the details of the crash were released. Still, we don’t know the reason for the flight or why it crashed. Today, the propeller of the DC-4 is part of the Silent Heroes of the Cold War Memorial, the only National Memorial of its kind. It is dedicated to the anonymous individuals who lost their lives under Cold War’s blanket of secrecy.
Nestled amidst the rugged mountain landscape of Glacier National Park is an enforced tunnel, which looks like it might have been dug by dwarves for some kind of ancient fortress. In actuality, Ptarmigan Tunnel is just a small, human-made structure, but its existence allows for some incredible views of Glacier National Park. The tunnel was dug in 1930 with two jackhammers on either side of the rock wall and a healthy amount of dynamite. Though the tunnel is completely unlit and just a little bit creepy, passing through it saves hikers the treacherous trip over the wall from Many Glacier to Belly River Valley.
In the fervor of the Space Race, NASA began to experiment with different methods of fueling the mechanical behemoths that were to shuttle mankind into space. The Aerojet testing grounds were deep in the swampy Everglades, easily hidden from the Soviets. NASA ended up using a different kind of fuel than what Aerojet was testing, and the facility was abandoned. But when you’ve got a failed secret rocket in a hole in a national park, it’s difficult to find someone to take it off your hands. No attempts to repurpose the land ever took off, and so the facility, rocket and all, remains as secluded and abandoned as ever.
In the early years of the 20th century, it was thought that fresh air and spring water could be cures for consumption (aka tuberculosis). Dr. C.H. Diehl opened the Welch Spring Hospital on these grounds after purchasing the land for just $800. It wasn’t the pseudoscience that caused the hospital to close its doors for good, but its inaccessible location. Sick people had trouble making the hike through the Ozarks, and when the doctor died in 1940 his buildings were left to nature.
They say you can’t be two places at once, but Tri-State Peak begs to differ. Here, you can be three places at once: the great states of Tennessee, Kentucky, and Virginia. This site, which is nondescript enough that it might be overlooked, is also the beginning of the trail forged by folkloric frontiersman Daniel Boone.
When Donald R. Currey was just a graduate student, he made the biggest mistake he possibly could have. He was researching the Little Ice Age by taking samples from ancient trees, and had zeroed in on a grove of bristlecone pines in Nevada. After accidentally jamming his boring tool into a tree he estimated to be about 3,000 years old, Currey convinced the Forest Service to let him cut it down to date it. After felling it, he realized it was much older than he thought. In fact, it was much older than anything—the tree, named Prometheus, had been growing for upwards of 5,000 years, and was the oldest ever dated. Its stump, which measures eight feet across, still sits in the pine grove.
Guadalupe Mountains National Park is in west Texas, where dry dusty desert stretches for miles. But McKittrick Canyon is a lush oasis in the middle of it all. Protection from the surrounding mountains make it a perfect little pocket of flora. Here, desert plants like yucca and cacti flourish, but so do unexpected ones like ash and maple trees, as well as an abundance of wildflowers. It may be hard to get to, but the canyon is far from undiscovered. Archaeological finds indicate people lived in “the prettiest spot in Texas” as long as 12,000 years ago.
Capitalist E.C. Waters wanted to make a profit off of the growing popularity of Yellowstone, the first national park, and he did so ferrying passengers across the lake with a series of steamboats. This might have worked out okay, except for the fact that Waters was not a nice man. He vandalized a geyser, infuriated customers, and opened a game show and zoo that landed him with allegations of animal abuse (in the late 19th century, so you know it had to be bad). To top it all off, in 1906 Waters hired his biggest boat of all and named it after himself. Park officials were over his bad behavior though, and by the very next year a sign was posted that read “E.C. Waters… having rendered himself obnoxious during the season of 1907, is… debarred from the park and will not be allowed to return.” E.C. Waters (the boat) was left to languish in the lake, where its rotting hull still sits.
You could call the Skunk Ape (Big Foot’s stinkier cousin) Dave Shealy’s white whale. Despite the fact that the National Parks System dismisses the Ape as a “local myth”, Shealy asserts there are between seven and nine living in the park and has made it his life’s work to find them. He doesn’t want to poach the cryptids though—he loves the Skunk Ape, and in teaching about it he has raised awareness about the Everglades’ ecosystem. His headquarters, situated on a campsite in the park, contain educational artifacts like footprint casts and ape droppings as well as souvenirs.
Near Humphrey’s Peak (the highest point of elevation in Arizona), the scattered metal remains of an Air Force B-24 lie among the rocks. The plane crashed in 1944, tragically killing all eight of the men aboard. The location of the crash is very difficult to access, hence why pieces of the aircraft remain on Humphrey’s Peak rather than a monument. Advanced hikers may attempt to find the wreckage, but for the less adventurous of us, the glinting metal atop the peak can apparently be seen from parking lot on sunny days.
12. Sliding Rock
Take a ride down a waterfall on a gently sloping rock, smoothed by eons of water, into a natural basin. It’s as though nature intended for you to have fun. This is actually one of the less-hidden spots on this list—Sliding Rock is growing more crowded, and apparently even has its own lifeguards now.
13. Rush Ghost Town
Rush used to be the second largest city in Arkansas. It thrived off profitable zinc mining, but when that industry dried up so did the town, and Rush was declared officially abandoned in 1972. Because the town’s buildings and mines were left within the bounds of a national park, the Parks Service elected to preserve them as a historical resource. Some of the structures date back as far as the 1880s, and little has been changed.
14. Hall of Mosses
This verdant trail in Olympic National Forest looks like something out of a fairytale. The Hall of Mosses is located within the Hoh Rainforest, which (as you might expect) gets a lot of rain. Fourteen-plus feet of precipitation per year cause the trees to grow stunted root systems, which in turn causes them to fall more easily. Moss quickly grows over the graveyard of trees. Walking this path is much like exploring ancient ruins. It’s magical, otherworldly, and very old.
When the Holzwarth family emigrated from Germany to Colorado, they sustained themselves by ranching. Their homestead on the Colorado River was a pristine site, with views of the surrounding mountains, and it attracted guests almost from the moment they moved in. They expanded, turning their home into a trout lodge and bed and breakfast-style ranch. The lodge remained open until 1974, when, upon purchasing the land from the Holzwarths, the National Park Service razed several buildings. However, the original lodge was left standing as a historic site, and now visitors can see exactly what it was like to live on the Colorado River in the early 20th century.
Lava hardens from the outside in, meaning that as the parts that are exposed to the air form a hard shell, a river of lava still pumps through the center. This kind of volcanic activity leaves behind almost perfectly circular tubes, which appear manmade, but were formed of nature’s own accord. This is the case with the lava river caves in Coconino National Forest. Through an unremarkable hole in the ground one can enter into a winding maze of cave tunnels that intersect and loop around each other. | <urn:uuid:07a6d4fd-2081-48f9-897d-3a1b43f97638> | CC-MAIN-2018-13 | https://assets.atlasobscura.com/articles/here-are-17-hidden-spots-inside-americas-national-parks | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647475.66/warc/CC-MAIN-20180320130952-20180320150952-00460.warc.gz | en | 0.972646 | 2,467 | 2.796875 | 3 |
|Digital-Desert : Mojave Desert||
Visit us on Facebook ~
|ecology: wildlife - plants - geography: places - MAPS - map/sat - roads & trails: route 66 - old west - communities - weather - book store|
|ghost towns - gold mines - parks & public lands: wilderness - native culture - history - geology: natural features - glossary - comments|
click the photo to continue
Route 66 >
Ghost Towns - East Mojave Desert
At one time Bagdad was a busy little community, but as many others along Route 66, it went bust as the interstate came into use. In 1991 the remaining school house and other buildings were demolished to make room for a supply yard for a pipeline being built in the area. All that remains is the rail siding, a tree, some broken glass and a lonely cemetery. | <urn:uuid:a99ec55b-3085-4a6e-8f2e-feaf549d57ba> | CC-MAIN-2017-22 | http://digital-desert.com/route-66/bagdad/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607960.64/warc/CC-MAIN-20170525010046-20170525030046-00613.warc.gz | en | 0.918415 | 179 | 2.5625 | 3 |
Lesson 26 – How to Use Blur and Sharpen Tool in Photoshop
Welcome to the 26th Lesson, How to use Blur & Sharpen Tool in Adobe Photoshop! In our today’s lesson, we are going to learn about Blur Tool as well Sharpen Tool and their use as well in Adobe Photoshop software. And these terms are essential part of Video Editing Course. So Let’s Start learning by watching this video.
If you are thinking about what is blur tool then the answer is a blur tool is a tool in photoshop which is used for blur effect creation in any image. On the other hand, sharpen tool helps to sharpen any area of an image and gives it a clear and sharp look. So we guess you are looking for some practical experience, don’t worry click on the play button of this video lesson, your search definitely gets its destination. In our future lesson, we will cover How to Make Black & White Photos in Photoshop, So follow our next lesson as well to know more about Photoshop.
The lesson includes in this video is mentioned below:-
What is Blur Tool in Photoshop?
What is Sharpen Tool in Photoshop?
How to Improve quality of image with these tools?
How sharpen tool help to clear exisiting images?
How blur tool helps to do creativity in images? | <urn:uuid:c1fd8dba-ca7e-4839-8909-af4dfbc34c2b> | CC-MAIN-2023-50 | https://rrdigitalsutra.com/lesson-26-how-to-use-blur-and-sharpen-tool-in-photoshop/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00820.warc.gz | en | 0.935459 | 280 | 3.03125 | 3 |
5. The Poetical Books
The previous survey of the first seventeen books (Law and History), Genesis through Nehemiah, covered the whole history of the Old Testament. All the remaining books, Poetical and Prophetical, fit somewhere into the history of those seventeen books. The next section to be covered, the Poetical, is a much smaller section consisting of five books—Job, Psalms, Proverbs, Ecclesiastes, and Song of Solomon.
Before examining them, we should note certain characteristics that all of these five books have.
The seventeen books which lie behind us are historical. These five poetical books are experiential. The seventeen historical books are concerned with a nation, as such. These five poetical books are concerned with individuals, as such. The seventeen have to do with the Hebrew race. These five have to do with the human heart. These five so-called “poetical books” are not the only poetry in the Old Testament Scriptures. There are stretches of unexcellable poetry in the writings of the prophets, which we shall come to later …
We ought clearly to understand, also, that the term “poetical” refers only to their form. It must not be thought to imply that they are simply the product of human imagination.… These books portray real human experience, and grapple with profound problems, and express big realities. Especially to they concern themselves with the experiences of the godly, in the varying vicissitudes of this changeful life which is ours under the sun …23
The Place of the Poetical Books in the Old Testament
The Old Testament divides into four major sections which relate to the nation of Israel as God’s chosen people in the following manner from the standpoint of their major characteristics or focus:
1. The Law—relates to Israel’s moral life.
2. The Historical—relates to Israel’s national development and life.
3. The Poetical—relates to Israel’s spiritual life.
4. The Prophetical—relates to Israel’s future life as fulfilled in the Messiah.
The Relation of the Poetical Books to Each Other
1. The Book of Job—Blessing through Suffering.
2. The Psalms—Praise through Prayer.
3. The Proverbs—Prudence through Precept.
4. Ecclesiastes—Verity through Vanity.
5. Song of Solomon—Bliss through Union.24
The Periods of the Poetical in the Old Testament
While Hebrew poetry occurred throughout Old Testament history, there were three primary periods of poetic literature.
I. The Patriarchal period—Job (c. 2000 B.C.)
II. The Davidic period—Psalms (c. 1000 B.C.)
III. The Solomonic period
A. Song of Solomon—a young man’s love
B. Proverbs—a middle-aged man’s wisdom
C. Ecclesiastes—an old man’s sorrow (c. 950 B.C.)25
Christ in the Poetical Books
As noted previously, Christ, the Messiah, is the heart of all the Bible. With the two disciples on the Emmaus road who were so saddened and perplexed over the events of the previous days as the crucifixion, death, and reports of the resurrection, the resurrected Savior came along side and explained the things concerning Himself in all the Scriptures (Luke 24:27). Then later when he appeared to the eleven and He said: “These are My words which I spoke to you while I was still with you, than all things which are written about Me in the law of Moses and the Prophets and the Psalms must be fulfilled” (Luke 24:44).
With this in mind, before launching into the overview of each of these poetical books, it would be well to get their Christological perspective. Regarding this element Geisler writes:
Whereas the foundation was laid for Christ in the Law and preparation was made for Christ in the books of History, the books of Poetry reveal the aspiration for Christ in the hearts of the people. They aspired to a life fulfilled in Christ in both an explicit and an implicit way, both consciously and unconsciously. The following list will serve as an overall guide to the Christ-centered aspirations of the poetical books:
1. Job—aspiration for mediation by Christ.
2. Psalms—aspiration for communion with Christ.
3. Proverbs—aspiration for wisdom in Christ.
4. Ecclesiastes—aspiration for ultimate satisfaction.
5. Song of Solomon—aspiration for union in love with Christ.26
The Nature of Hebrew Poetry
Hebrew poetry, so characteristic of the wisdom literature of the Old Testament (Job, Psalms, Proverbs, Ecclesiastes, and Song of Solomon), is unlike English poetry which emphasizes rhyme and meter. Hebrew poetry relies on other characteristics for its impact. Parallelism is the chief characteristic of biblical poetry, but it has other features that distinguish it from the typical prose or narrative we find in the rest of Scripture. First, there a relatively greater conciseness or terseness of form, and second there is a greater use of certain types of rhetorical devices. These are parallelism, rhythm, a rich use of imagery, and figures of speech.
The Three Kinds of Hebrew Poetry
There are three kinds of poetry: (1) lyric poetry, which was originally accompanied by music on the lyre (the Psalms); (2) didactic poetry, which, using maxims, was designed to communicate basic principles of life (Proverbs, Ecclesiastes); (3) dramatic poetry, which used dialog to communicate its message (Job and the Song of Solomon).
The Two Key Elements of Hebrew Poetry
Parallelism. In contrast to English verse which manipulates sound and emphasizes rhyme and meter, Hebrew poetry repeats and rearranges thoughts rather than sounds. Parallelism refers “to the practice of balancing one thought or phrase by a corresponding thought or phrase containing approximately the same number of words, or at least a correspondence in ideas.”27 There are several types of parallel arrangement of thoughts, with three being basic.
1. Synonymous--the thought of the first line is basically repeated in different words in the second line (2:4; 3:1; 7:17).
2. Antithetical--the thought of the first line is emphasized by a contrasting thought in the second line (1:6; 34:10). They are often identified with “but.”
3. Synthetic--the second line explains or further develops the idea of the first line (1:3; 95:3).
4. Climactic--The second line repeats with the exception of the last terms (29:1).
5. Emblematic--One line conveys the main point, the second line illuminates it by an image (42:1; 23:1).
Figures of Speech. Like the Hebrew language itself, Hebrew poetry uses vivid images, similes, metaphors, and other rhetorical devices to communicate thoughts and feelings. Some of these are as follows:
1. Simile: This is the simplest of all the figures of speech. A simile is a comparison between two things that resemble each other in some way (cf. Ps. 1:3-4; 5:12; 17:8; 131:2).
2. Metaphor: This is a comparison in which one thing is likened to another without the use of a word of comparison as in “like” or “as.” In Psalm 23:1, David says, “The Lord is my Shepherd,” that is, He is to me like a shepherd is to his sheep (see also 84:11; 91:4).
3. Implication: This occurs when there is only an implied comparison between two things in which the name of one thing is used in place of the other (cf. Ps. 22:16; Jer. 4:7).
4. Hyperbole: This is the use of exaggeration or over statement to stress a point (Ps. 6:6; 78:27; 107.26).
5. Paronomasia: This refers to the use or repetition of words that are similar in sound, but not necessarily in sense or meaning in order to achieve a certain effect. This can only be observed by those who can read the original Hebrew text. Psalm 96:10 reads, “For all the gods ( kol-elohay) of the nations are idols ( elilim). This latter word means nothings, or things of naught; so that we might render it, “The gods of the nations or imaginations.”28 (see also Ps. 22:16; Prov. 6:23).
6. Pleonasm: This involves the use of redundancy for the sake of emphasis. This may occur with the use of words or sentences. In Psalm 20:1 we are told, “May the Lord answer you in the day of trouble! May the name of the God of Jacob set you securely on high!” Here “name” appears to be redundant. It means God Himself and has more emphasis than if only the term “God” had been used.
7. Rhetorical question: The use of a question to confirm or deny a fact (Ps. 35:10; 56:8; 106.2).
8. Metonymy: This occurs where one noun is used in place of another because of some relationship or type of resemblance that different objects might bear to one another (Ps. 5:9; 18:2; 57:9; 73:9).
9. Anthropomorphism: The assigning of some part of the human anatomy to God’s Person to convey some aspect of God’s being like the eyes or ears (cf. Ps. 10:11, 14; 11:4; 18:15; 31:2).
10. Zoomorphism: The assigning of some part of an animal to God’s Person to convey certain truths about God (cf. Ps. 17:8; 91:4).
While we know the title of this book obviously comes from its main character, Job, and that he was an historical person (Ezek. 14:14, 20; James 5:11), the author is unknown and there are no textual claims as to the author’s identify. Commentators have suggested Job himself, Elihu, Moses, Solomon, and others.
It is important to distinguish between the date of writing and of the events of the book. Regarding the date, Ryrie writes;
The date of the events in the book and the date of the writing of the book are two different matters. The events may have taken place in a patriarchal society in the second millennium B.C., around the time of Abraham. Several facts support this dating: (1) Job lived more than 140 years (42:16), a not uncommon life span during the patriarchal period; (2) the economy of Job’s day, in which wealth was measured in terms of livestock (1:3), was the type that existed in this period; (3) like Abraham, Isaac, and Jacob, Job was the priest of his family (1:5); (4) the absence of any reference to the nation Israel or the Mosaic Law suggests a pre-Mosaic date (before 1500 B.C.).
Three principal views exist concerning the date of writing: (1) in the patriarchal age, shortly after the events happened; (2) in the time of Solomon (950 B.C.); (3) at the time of the Exile or after, though the mention of Job by Ezekiel (Ezek. 14:14) negates such a late date. The detailed report of the speeches of Job and his friends seems to argue for the book’s being written shortly after the events occurred. On the other hand, the book shares characteristics of other wisdom literature (e.g., Pss. 88, 89) written during the Solomonic age and should be regarded as a dramatic poem describing real events, rather than a verbatim report.29
Title of the Book:
Set in the time of Abraham, Isaac, Jacob, and Joseph, the Book of Job derives its name from its chief character, a man called Job, who, experiencing extreme suffering (the loss of wealth, family and health), struggles with the question of why? The English name, Job, comes from the Hebrew áIyo‚b. Some believe it comes from áa„yab, which basically means, “to be hostile to, to be an enemy,” by there is little linguistic evidence to support this.30 But not all agree.
Earlier attempts to determine an etymology of the name have given way to evidence from a well-attested west Semitic name in the second millennium found in the Amarna Letters, Egyptian Execration texts, Mari, Alalakh, and Ugaritic documents. The original form of the name was Ayyabum, which can mean “Where is [my] father?” or possibly “no father.” Either form might suggest an orphan or illegitimacy.31
Theme and Purpose:
The book is a theodicy (a vindication of God’s goodness, justice, and sovereign character in the face of the existence of suffering and evil). As such,
The book wrestles with the age-old question: Why do righteous men suffer, if God is a God of love and mercy? It clearly teaches the sovereignty of God and the need for man to acknowledge such. Job’s three friends gave essentially the same answer: All suffering is due to sin. Elihu, however, declared that suffering is often the means of purifying the righteous. God’s purpose, therefore, was to strip away all of Job’s self-righteousness and to bring him to the place of complete trust in Him.32
Gleason Archer gives and excellent summary of the theme:
This book deals with the theoretical problem of pain and disaster in the life of the godly. It undertakes to answer the question, Why do the righteous suffer? This answer comes in a threefold form: (1) God is worthy of love even apart from the blessings He bestows; (2) God may permit suffering as a means of purifying and strengthening the soul in godliness; (3) God’s thoughts and ways are moved by considerations too vast for the puny mind of man to comprehend. Even though man is unable to see the issues of life with the breadth and vision of the Almighty; nevertheless God really knows what is best for His own glory and for our ultimate good. This answer is given against the background of the stereotyped views of Job’s three “comforters,” Eliphaz, Bildad, and Zophar.33
A further purpose is certainly to demonstrate the conflict of the ages between God and Satan and to show the relationship of suffering to this conflict. In the end, it demonstrates the truth of Romans 8:28.
The key words are “affliction, misery, hardship, etc.” (9 times), “righteous” or “righteousness” (20 times), but the key concept is the sovereignty of God.
2:3-6 And the Lord said to Satan, “Have you considered My servant Job? For there is no one like him on the earth, a blameless and upright man fearing God and turning away from evil. And he still holds fast his integrity, although you incited Me against him, to ruin him without cause.” And Satan answered the Lord and said, “Skin for skin! Yes, all that a man has he will give for his life. “However, put forth Your hand, now, and touch his bone and his flesh; he will curse You to Your face.” So the Lord said to Satan, “Behold, he is in your power, only spare his life.”
13:15 “Though He slay me, I will hope in Him. Nevertheless I will argue my ways before Him.”
42:5-6 “Hear, now, and I will speak; I will ask You, and You instruct me. ‘I have heard of You by the hearing of the ear; But now my eye sees You; Therefore I retract, And I repent in dust and ashes.”
42:10 And the Lord restored the fortunes of Job when he prayed for his friends, and the Lord increased all that Job had twofold.
Chapters 1-2 are key in that they introduce the reader to the source of Job’s suffering—Satan’s accusations and the affliction that fell upon Job.
Chapters 38-42 While chapters 3-37 record the counsel of Job’s friends who raise the question, “Does God allow the innocent to suffer?” the next key chapters are chapters 38-41, God’s speech and silencing of Job, followed by Job’s repentance and restoration, chapter 42.
Job, a blameless and upright man, Satan, Job’s accusers, Eliphaz, Bildad, Zopher, and Elihu, the younger and wiser of Job’s friend who sought to give Job counsel.
Christ as seen in Job:
Christ is seen in several ways in Job. Job acknowledges a Redeemer (19:25-27) and prays for a Mediator (9:33; 33:23). He knows he needs someone who can explain the mystery of “suffering” which is answered only in Christ Who identifies with our suffering and ultimately both answers Satan’s accusations, which are ultimately against God, and defeats him (Heb. 2:14-18; 4:15; Rom. 8:32-34).
I. The Prologue: the Disasters (Afflictions) of Job (1-2)
A. His Circumstances and Character (1:1-5)
B. His Calamities and their Source—Satan (1:6-2:10)
C. His Comforters (2:11-13)
II. The Dialogues or False Comfort of the Three Friends (3:1-31:40)
A. First cycle of debate (3:1-14:22)
1. Job’s lament (3:1-26)
2. Eliphaz’ reply (4:1-5:27; and Job’s rejoinder, 6:1-7:21)
3. Bildad’s reply (8:1-22; and Job’s rejoinder, 9:1-10:22)
4. Zophar’s reply (11:1-20; and Job’s rejoinder, 12:1-14:22)
B. Second cycle of debate (15:1-21:34)
1. Eliphaz’ reply (15:1-35; and Job’s rejoinder, 16:1-17:16)
2. Bildad’s reply (18:1-21; and Job’s rejoinder, 19:1-29)
3. Zophar’s reply (20:1-29; and Job’s rejoinder, 21:1-34)
C. Third cycle of debate (22:1-31:40)
1. Eliphaz’ reply (22:1-30; and Job’s rejoinder, 23:1-24:25)
2. Bildad’s reply (25:1-6; and Job’s rejoinder, 26:1-31:40)
III. The Words of Elihu (32:1-37:24)
A. First speech: God’s instruction to man through affliction (32:1-33:33)
B. Second speech: God’s justice and prudence vindicated (34:1-37)
C. Third speech: the advantages of pure and consistent piety (35:1-16)
D. Fourth speech: God’s greatness and Job’s guilt in accusing God of unfairness (36:1-37:24)
IV. God’s Revelation from the Whirlwind (38:1-42:6)
A. The First Revelation: God’s omnipotence proclaimed in creation; Job’s self-condemning confession (38:1-40:5)
B. The Second Revelation: God’s power and man’s frailty; Job’s humble re-response (40:6-42:6)
V. The Epilogue: God’s rebuke of the false comforters; Job’s restoration and reward of a long and blessed life (42:7-17)
The Book of Psalms is not only the largest book of the Bible, but it perhaps the most widely used book in Scripture because of the way it speaks to the human heart in all of our experiences in life. Again and again sighing is turned into singing through prayer and praise. For the most part, though the texts of the psalms do not designate their authors, the titles do often indicate the author of the various psalms. The following chart designates the authors of these psalms as they are found in the titles:34
Authorship of the Psalms
Book 1, Book 2, 18, Book 3, 1, Book 4, 2; Book 5, 15
Ps. 50, 73-83
Ps. 42-49; 84; 86; 87; 88
Ps. 72, 127
Division and Classification of the Psalms:
Divisions of the Psalter
The Psalms are really five books in one. Each of the following book division concludes with a doxology while Psalm 150 occupies the place of the doxology and forms an appropriate conclusion to the entire collection.
Epiphanius said, “The Hebrews divided the Psalter into five books so that it would be another Pentateuch.” The Midrash of Psa. 1:1 states, “Moses gave the Israelites the five books of the Law, and to correspond to these David gave to them the Book of the Psalms in five books.”35
This correspondence to the Pentateuch may be seen in the following outline:36
1. Psalms about man and creation (1-41)—corresponds to Genesis.
2. Psalms about Israel and redemption (42-72)—corresponds to Exodus.
3. Psalms about worship and the Temple (73-89)—corresponds to Leviticus.
4. Psalms about our sojourn on the earth (90-106)—corresponds to Numbers.
5. Psalms about praise and the Word of God (107-150)—corresponds to Deuteronomy.
Another way of looking at the book divisions:
Songs of worship
David & Korah
Hymns of petition
Hymns of petition
Anthems of praise
David and Anonymous
Anthems of praise
Categories or Types of Psalms
As to their types, the following illustrates a generally agreed upon set of categories:
1. Lament or Petition, either individual (Ps. 3) or communal (Ps. 44);
2. Thanksgiving or Praise, either individual (Ps. 30) or communal (Ps. 65);
3. Trust in God (Ps. 4);
4. Enthronement hymns of Yahweh: psalms concerning Jerusalem (Ps. 48), and royal psalms (some of which are messianic; Ps. 2, 110);
5. Didactic and Wisdom psalms (Pss. 1, 37, 119).
6. Theme psalms: The psalms may also be classified according to special themes as: creation (Ps. 8, 19), nature psalms (Ps. 19; 104), acrostic or memory device psalms (Ps. 111, 112, 119), the Exodus (Ps. 78), imprecation (Ps. 7), penitence (Ps. 6), pilgrim psalms (Ps. 120), and Messianic psalms, those that include prophecies about Messiah as Psalm 2, 8, 16, 22, 40, 45, 72, 110, 118.
With their very broad chronological range, the wide thematic arrangement, and the many different audiences living under a variety of conditions, the psalms reflect a multitude of moods and experiences that make them extremely relevant to the reader regardless of the day in which he lives. Regarding the date of the various psalms, Archer writes:
Of these, the earliest would naturally be Ps. 90, by Moses, presumably composed about 1405 b.c. The Davidic psalms would have originated between 1020 and 975 b.c.; those of Asaph from approximately the same period; Ps. 127 from the period of Solomon’s reign, possibly 950. It is hard to date the descendants of Korah and the two Ezrahites who are mentioned; presumably they were pre-exilic. Of the psalms not carrying titles, some were undoubtedly Davidic (e.g., 2 and 33) and the others date from later periods all the way up to the return from exile (such as 126 and 137, the latter of which is at least as late as the Exile). No convincing evidence, however, has been offered for the dating of any of the psalms later than approximately 500 b.c.37
Title of the Book:
In the Hebrew, The Book of Psalms is titles, Tehillim (praise) or Sepher Tehillim (book of praises). A shortened form is Tillim. Only one psalm (145) is designated Tehillah (praise), but praise is the heart of the psalms. The Septuagint gives the name Psalmoi (psalms), that is “songs or poems sung with musical accompaniment.” Psalmos comes from psallein, “to pluck a stringed instrument” as an accompaniment to song.
Theme and Purpose:
The psalms provide us with a message of hope and comfort through the common theme of worship. They are, in essence, an antidote to fear and complaining. through a personal response to the person and work of God. They are an expression of the worship, faith, and spiritual life of Israel. In the psalms we have a mirror of the heart of God’s people recording the simple, universal human experiences of man in the light of God’s person, promises, plan, and presence.
As a collection of a 150 psalms they naturally cover a great variety of feelings, circumstances and themes. This means it is difficult to make any generalizations about a theme or purpose, but it is safe to say that all the psalms embody a personal response on the part of the believer toward the goodness and grace of God. Often they include a record of the psalmist’s own inner emotions of discouragement, anxiety, or thankfulness even when faced with the opposition of God’s enemies or in view of God’s varied providences. But whether the psalmist is occupied with a mournful or a joyous theme, he is always expressing himself as in the presence of the living God. There are a few psalms, of course, which mostly contain the thoughts and revelations of God Himself, such as Ps. 2, but these are most exceptional.38
Many of the psalms survey the Word of God, His attributes, and are Messianic in their scope in anticipation of the coming Messiah.
In thought, worship, is certainly a key word as expressed in the theme above. In this regard, praise, which occurs some 166 times and some form of the word bless, blessing, bless, occurs over a 100 times in the NASB.
How do you list key verses in a book like psalms where nearly everyone is bound to have his or her own special verses that have been dear to their heart, but the following is a suggestion:
1:1-3 How blessed is the man who does not walk in the counsel of the wicked, Nor stand in the path of sinners, Nor sit in the seat of scoffers! 2 But his delight is in the law of the LORD, And in His law he meditates day and night. 3 And he will be like a tree firmly planted by streams of water, Which yields its fruit in its season, And its leaf does not wither; And in whatever he does, he prospers.
19:8-11 The precepts of the LORD are right, rejoicing the heart; The commandment of the LORD is pure, enlightening the eyes. 9 The fear of the LORD is clean, enduring forever; The judgments of the LORD are true; they are righteous altogether. 10 They are more desirable than gold, yes, than much fine gold; Sweeter also than honey and the drippings of the honeycomb. 11 Moreover, by them Your servant is warned; In keeping them there is great reward.
19:14 Let the words of my mouth and the meditation of my heart Be acceptable in Your sight, O LORD, my rock and my Redeemer.
119:9-11 How can a young man keep his way pure? By keeping it according to Your word. 10 With all my heart I have sought You; Do not let me wander from Your commandments. 11Your word I have treasured in my heart, That I may not sin against You.
145:21 My mouth will speak the praise of the LORD; And all flesh will bless His holy name forever and ever.
As with the verses, so we also face difficulty in selecting key chapters, but the following are suggested. Psalm 1, 22, 23, 24; 37; 78; 100; 119; 121, and 150. Psalm 100 beautifully unites to central themes of praise and worship.
Though the titles to the psalms do sometimes point to the subject or author of the psalm, like David or Korah, the text of the psalms does not. Rather, the focus seems to be more on the people of God in their worship and walk with Lord.
Christ as seen in Psalms:
Many of the psalms are Messianic and speak of the person and work of Christ. They fall into falling categories:
1. Typically messianic: These psalms are less obviously messianic. The psalmist in some way is a type of Christ (cf. 34:20; 69:4, 9), but other aspects of the passage do not apply. Perhaps, in this case Jesus and the apostles were applying familiar psalmic expressions to their experiences (e.g., 109:8 in Acts 1:20).
2. Typological-prophetic: though the psalmist describes his own experience, the language is such that points beyond his own life and becomes historically true only in the person of Christ (22).
3. Indirectly messianic: when the psalm was written it referred to the house of David or a specific king, but will find its final and ultimate fulfillment only in the person of Christ (2, 45, 72).
4. Purely prophetic: refers directly to Christ without any reference to any other person or son of David (110).
5. Enthronement or eschatological: these are psalms that anticipate the coming of the Lord and the consummation of His Kingdom as fulfilled in the person of Messiah, Christ (96-99).
Specific Prophetic fulfillments applied to Christ:
New Testament Passage
7. Crucifixion events
Matt. 27:39, 43, 46; Luke 23:35
2 and 16
Book I: Psalms 1-41
- Psalm 1: The Blessed Man: The Two Ways of Life Contrasted: that of Word and the World
- Psalm 2: The Messiah King: The Confederacy Against God and Christ
- Psalm 3: Quietness Amid Troubles: Protection in Danger
- Psalm 4: An Evening Prayer of Trust in God
- Psalm 5: A Morning Prayer of God’s Confidence in God’s Presence
- Psalm 6: A Prayer of a Soul in Deep Anguish
- Psalm 7: A Prayer for Refuge
- Psalm 8: The Glory of the Creator and Man’s Dignity
- Psalm 9: A Prayer of Thanksgiving for God’s Justice
- Psalm 10: A Prayer for the Overthrow of the Wicked
- Psalm 11: The Lord as a Refuge and Defense
- Psalm 12: A Prayer for Help Against Lying Tongues
- Psalm 13: A Prayer for Help in Trouble
- Psalm 14: A Description of the Folly and Wickedness of Man
- Psalm 15: A description of the Godly Man
- Psalm 16: The Lord as the Refuge of the Saints
- Psalm 17: A Prayer for Deliverance through God’s Justice
- Psalm 18: A Prayer of Praise for Deliverance
- Psalm 19: God’s Revelation in His Creation Work and Written Word
- Psalm 20: Prayer for Victory Over Enemies
- Psalm 21: The Lord as the Strength of the King
- Psalm 22: A Portrait of the Cross: a Psalm of Anguish and Praise
- Psalm 23: A Portrait of the Divine Shepherd: a Psalm of the Goodness of God
- Psalm 24: A Psalm of the King of Glory
- Psalm 25: An Acrostic Psalm: a Prayer for Deliverance, Guidance, and Forgiveness
- Psalm 26: The Plea of Integrity and for Redemption
- Psalm 27: A Prayer of Fearless Confidence in the Lord
- Psalm 28: Prayer for Help and Praise for its Answer: the Lord My Strength and My Shield
- Psalm 29: The Powerful Voice of God
- Psalm 30: A Prayer of Thankfulness for God’s Faithfulness in a Time of Need
- Psalm 31: A Prayer of Complaint, Petition, and Praise
- Psalm 32: The Blessing of Forgiveness and Trust in God
- Psalm 33: Praise to the Lord as the Creator and Deliverer
- Psalm 34: Praise to the Lord as the Provider and Deliverer
- Psalm 35: A Prayer for Vindication and Rescue from Enemies
- Psalm 36: The Wickedness of Men Contrasted with the Loving Kindness of God
- Psalm 37: A Plea for Resting in the Lord
- Psalm 38: A Prayer for Reconciliation Acknowledging the Heavy Burden of Sin
- Psalm 39: A Prayer Acknowledging the Frailty of Man
- Psalm 40: Praise for the Joyful Experience and Expectation of Salvation
- Psalm 41: Praise for God’s Blessings in Adversity
Book II: Psalms 42-72
- Psalms 42-43: Longing For God and Hoping in the Lord’s Salvation
- Psalm 44: National Lament and Prayer for Redemption
- Psalm 45: The Wedding Song of a Son of David
- Psalm 46: God is Our Refuge and Strength
- Psalm 47: The Lord Is the Victorious King
- Psalm 48: Praise for Mount Zion, the Beautiful City
- Psalm 49: The Emptiness of Riches Without Wisdom
- Psalm 50: The Sacrifice of Thanksgiving
- Psalm 51: Confession and the Forgiveness of Sin
- Psalm 52: The Futility of Boastful Wickedness
- Psalm 53: A Portrait of the Godless
- Psalm 54: The Lord as Our Help!
- Psalm 55: The Lord Sustains the Righteous!
- Psalm 56: Trust in the Midst of Our Fears
- Psalm 57: The Exaltation of the Lord in the Midst of Alienation
- Psalm 58: The Righteous Shall Surely Be Rewarded
- Psalm 59: Prayer For Deliverance From Enemies
- Psalm 60: Prayer For Deliverance of the Nation
- Psalm 61: Prayer From a Fainting Heart
- Psalm 62: Waiting On the Lord
- Psalm 63: Thirsting God’s Love
- Psalm 64: Prayer for Protection
- Psalm 65: God’s Bounty for Earth and Man
- Psalm 66:Remember What God Has Done
- Psalm 67: A Call for All to Praise God
- Psalm 68: God Is a Father to the Oppressed
- Psalm 69: Prayer for Deliverance According to God’s Compassion
- Psalm 70: Prayer for the Poor and Needy
- Psalm 71: Prayer for the Aged
- Psalm 72: The Glorious Reign of Messiah
Book III: Psalms 73-89
- Psalm 73: Prayer for an Eternal Perspective
- Psalm 74: Plea for Help in a Time of National Adversity
- Psalm 75: Justice Is the Lord’s
- Psalm 76: The Victorious Power of the God of Jacob
- Psalm 77: In the Day of Trouble, Remember God’s Greatness
- Psalm 78: Lessons From Israel’s History
- Psalm 79: A Plea for the Lord to Remember the Sheep of His Pasture
- Psalm 80: Israel’s Plea for God’s Mercy
- Psalm 81: A Plea for Israel to Listen to the Lord
- Psalm 82: Unjust Judges Rebuked
- Psalm 83: Prayer for Judgment on Israel’s Enemies
- Psalm 84: A Deep Longing for the Presence of God
- Psalm 85: Prayer for Revival
- Psalm 86: Prayer for Mercy on the Nation
- Psalm 87: The Joy of Living in Zion
- Psalm 88: A Prayer in the Darkness of Despair
- Psalm 89: Claiming God’s Person and Promises in Affliction
Book IV: Psalms 90-106
- Psalm 90: Teach Us to Number Our Days
- Psalm 91: In the Shelter of the Most High
- Psalm 92: In Praise of the Lord
- Psalm 93: Yahweh Reigns Gloriously
- Psalm 94: Yahweh Is the Judge of the Earth: Vengeance is His
- Psalm 95: Let Us Kneel Before Our Maker: a Call to Worship
- Psalm 96: Worship the Lord Who Will Judge the World in Righteousness
- Psalm 97: Rejoice! The Lord Reigns
- Psalm 98: Sing a New Song to the Lord
- Psalm 99: Exalt the Lord Who Reigns
- Psalm 100: Serve the Lord With Gladness: He is the Lord and He is Good
- Psalm 101: Commitment to a Holy Life
- Psalm 102: Prayer of a Saint Who is Overwhelmed
- Psalm 103: Bless the Lord: His Compassions Never Fail!
- Psalm 104: The Lord’s Care Over All Creation
- Psalm 105: The Lord’s Faithful Acts in Salvation History
- Psalm 106: A Remembrance of Yahweh’s Love and Israel’s Disobedience
Book V: Psalms 107-150
- Psalm 107: Praise for God’s Deliverance from Manifold Troubles
- Psalm 108: Praise and Prayer for Victory
- Psalm 109: A Imprecatory Prayer for Vindication and Judgments Against Enemies
- Psalm 110: Messiah Pictured as the Priest King Warrior
- Psalm 111: Celebration of God’s Faithfulness
- Psalm 112: The Triumph of Faith
- Psalm 113: Praise to the Exalted Lord Who Condescends to the Lowly
- Psalm 114: Praise for the Exodus
- Psalm 115: The Impotence of Idols and the Greatness of the Lord
- Psalm 116: Praise to the Lord for Deliverance
- Psalm 117: The Praise of All People
- Psalm 118: Praise for the Lord’s Saving Goodness
- Psalm 119: In Praise of the Scriptures
- Psalm 120: Prayer for Deliverance from Slanderers
- Psalm 121: The Lord is My Guardian
- Psalm 122: Pray for the Peace of Jerusalem!
- Psalm 123: Plea for Mercy
- Psalm 124: Our Helper is the Maker of Heaven and Earth!
- Psalm 125: Peace Be on Israel
- Psalm 126: Praise for Restoration!
- Psalm 127: Praise for Children, a Gift from the Lord
- Psalm 128: The Family Blessed by the Lord
- Psalm 129: The Prayer of the Persecuted
- Psalm 130: Waiting for God’s Redemption
- Psalm 131: Childlike Trust in the Lord
- Psalm 132: Prayer for the Lord’s Blessing on Zion
- Psalm 133: The Blessedness of Brotherly Unity
- Psalm 134: Praise to the Lord in the Night
- Psalm 135: Praise for the Wondrous Works of God
- Psalm 136: Praise for God’s Mercy Which Endures Forever
- Psalm 137: Tears Over Captivity
- Psalm 138: The Lord Answers Prayer and Delivers the Humble
- Psalm 139: The Lord Knows Me!
- Psalm 140: Prayer for Deliverance: You Are My God!
- Psalm 141: May My Prayer Be Like Incense!
- Psalm 142: No One Cared but the Lord; He Alone Is My Portion
- Psalm 143: Prayer for Guidance; Lead Me on Level Ground
- Psalm 144: The Lord is My Rock and My Warrior
- Psalm 145: Praise for the Lord’s Greatness and Wonderful Works
- Psalm 146: Praise to the Lord, an Abundant Helper
- Psalm 147: Praise to the Lord Who Heals the Brokenhearted
- Psalm 148: Praise to the Lord, the Wise Creator
- Psalm 149: Praise to the Lord Who Delights in His People
- Psalm 150: Praise to the Lord
According to 1 Kings 4:32, Solomon spoke 3,000 proverbs and 1,005 songs. And while he wrote most of proverbs in this book, later chapters indicate that he was not the only author of the book. Three sections of the proverbs are ascribed to Solomon; chapters 1:1-9:18; 10:1-22:16, and 25:1-29:27. However, the proverbs in the latter section (25:1-29:27) were selected from Solomon’s collection by King Hezekiah’s committee (25:1). Proverbs 22:17 refers to the “sayings of the wise,” and 24:23 mentions additional “sayings of the wise.” Proverbs 22:17-21 serves as an introduction which suggests that these sections stem from a circle of wise men, not from Solomon himself. Chapter 30 is specifically attributed to Agur, son of Jakeh, and 31:1-9 to King Lemuel. Lemuel’s sayings contain several Aramaic spellings that point to a non-Israelite background.
As a book of wisdom, Proverbs is not an historical book but rather the product of the school of wisdom in Israel. Solomon’s proverbs were written before his death in 931 B.C., and those collected by Hezekiah’s scribes probably around 700 B.C.
Title of the Book:
Proverbs obviously gets it name from its contents—short sayings or maxims that convey truth in a pointed and pithy way. The Hebrew word for proverb (from ma„sŒa„l, “to be like, represent”) means “parallel,” “similar,” or “a comparison.” It refers to a comparison or simile as underlying the moral maxim. As a pithy saying, a proverb centers in a comparison or an antithesis. The title comes from the fact this writing is a compendium of moral and spiritual instruction designed to enable one to live wisely.
Theme and Purpose:
As suggested by the title and the meaning of the term proverb, the theme and purpose of the book is wisdom for living through special instruction on every conceivable issue of life: folly, sin, goodness, wealth, poverty, the tongue, pride, humility, justice, family (parents, children, discipline), vengeance, strife, gluttony, love, laziness, friends, life, and death. No book is more practical in terms of wisdom for daily living than Proverbs.
The fundamental theme is “The fear of the Lord is the beginning of knowledge” (1:7a). The absence of a fear of God leads to an unbridled and foolish life. To fear the Lord is to stand in awe of His holy character and power. At the same time, Proverbs shows that true wisdom leads to the fear of the Lord (2:1-5).
The key word is “wisdom,” “wise,” etc., occurring some 110 times. Also important and related to wisdom are the terms, “instruction” and “taught, teach,” together occurring some 23 times.
1:5-7 A wise man will hear and increase in learning, And a man of understanding will acquire wise counsel, To understand a proverb and a figure, The words of the wise and their riddles. The fear of the Lord is the beginning of knowledge; Fools despise wisdom and instruction.
3:5-6 Trust in the Lord with all your heart, And do not lean on your own understanding. In all your ways acknowledge Him, And He will make your paths straight. Do not be wise in your own eyes; Fear the Lord and turn away from evil.
9:10 The fear of the Lord is the beginning of wisdom, And the knowledge of the Holy One is understanding.
There are obviously many sections of proverbs that might be considered as key such as chapter 1:20-33 where wisdom is personified as a woman inviting all to come to her and learn, but the majority refuse to heed her appeal, but perhaps chapter 31 gets the honors as the key chapter.
The last chapter of Proverbs is unique in ancient literature, as it reveals a very high and noble view of women. The woman in these verses is: (1) A good woman (31:13, 15-16, 19, 25); (2) a good wife (31:11-12, 23-24); (3) a good mother (31:14-15, 18, 21, 27); and (4) a good neighbor (31:11-12, 23-24). Her conduct, concern, speech, and life stand in sharp contrast to the woman pictured in chapter 7.39
Christ as seen in Proverbs:
In chapter 8, wisdom is personified and seen in its perfection. It is divine (8:22-31), it is the source of biological and spiritual life (3:18; 8:35-36), it is righteous and moral (8:8-9), and it is available to all who will receive it (8:1-6, 32-35). This wisdom became incarnate in Christ “in whom are hidden all the treasures of wisdom and knowledge” (Col. 2:3). “But of Him you are in Christ Jesus, who became for us wisdom from God—and righteousness and sanctification and redemption” (1 Cor. 1:30; cf. 1 Cor. 1:22-24).40
I. Introduction: the Purpose of Proverbs (1:1-7)
II. The Precepts of Wisdom: Proverbs to Youth (1:8-9:18)
A. Obey Parents (1:8-9)
B. Avoid Bad Company (1:10-19)
C. Heed Wisdom’s Call and Advice (1:20-33)
D. Avoid the Adulteress (2:1-22)
E. Trust and Honor God (3:1-12)
F. The Blessings of Wisdom (3:13-20)
G. Be Kind and Generous to Others (3:21-35)
H. Get Wisdom (4:1-9)
I. Avoid Bad Company (4:10-19)
J. Above All, Keep Your Heart (4:20-27)
K. Do Not Commit Adultery (5:1-14)
L. Be Faithful to Your Own Spouse (5:15-23)
M. Avoid Surety (6:1-5)
N. Shun Laziness (6:6-19)
O. Avoid Adultery (6:20-35)
P. Avoid the Adulteress (7:1-27)
Q. Wisdom and Folly Contrasted (8:1-9:18)
III. The Proverbs of Solomon (10:1-24:34)
A. Proverbs Contrasting the Godly and the Wicked (10:1-15:33)
B. Proverbs Encouraging Godly Lives (16:1-22:6)
C. Proverbs Concerning Various Practices (22:17-23:35)
D. Proverbs Concerning Various People (24:1-34)
IV. The Proverbs of Solomon Copied by Hezekiah’s Men (25:1-29:27)
A. Proverbs Concerning Relationships with Others (25:1-26:28)
1. With kings (25:1-7)
2. With neighbors (25:8-20)
3. With enemies (25:21-24)
4. With yourself (25:25-26:2)
5. With fools (26:3-12)
6. With sluggards (26:13-16)
7. With gossips (26:17-28)
B. Proverbs Concerning Actions (27:1-29:27)
1. In relation to life (27:1-27)
2. In relation to law (28:1-10)
3. In relation to wealth (28:11-28)
4. In relation to stubbornness (29:1-27)
V. The Words of Agur (30:1-33)
A. Personal Words (30:1-14)
B. Numerical Proverbs (30:15-33)
VI. The Words of Lemuel (31:1-9)
VII. The Capable Wife (31:10-31)
There are two lines of evidence (external and internal) that point to Solomon as the author of Ecclesiastes. For the external evidence, the Jewish tradition attributes the book to Solomon. Internally, a number of lines of evidence show that Solomon was surely the author. First, the author identifies himself as “the son of David, king in Jerusalem” (1:1). Then, references in the book to the author’s unrivaled wisdom (1:16), extreme wealth (2:7), opportunities for pleasure (2:3), and extensive building activities (2:4-6) all suggest Solomon as the author. There is simply no other descendant of David who measured up to these descriptions.
According to Jewish tradition, Solomon wrote the Song in his early years, expressing a young man’s love. He wrote the Proverbs in his mature years, manifesting a middle-aged man’s wisdom. He reportedly wrote Ecclesiastes in his declining years, revealing an old man’s sorrow (cf. 12:1). Perhaps Ecclesiastes is the record of Solomon’s regret for and repentance from his grave moral lapses recorded in 1 Kings 11. The Book of Ecclesiastes, then, would have been written just before Solomon’s death and subsequent division of his kingdom that occurred in 931 B.C.41
Title of the Book:
The name Ecclesiastes stems from the title given in the Greek translation, the Septuagint. Greek term, ecclesiastes, means “assembly” and is derived from the word ekkle„sia, “assembly, church.” “The Hebrew title is Qoheleth, which means “one who convenes and speaks at an assembly,” or “an ecclesiastic” or “preacher.”
Theme and Purpose:
The basic theme is the futility of life apart from God. In the development of this theme, four key purposes emerge.42
First, in seeking to demonstrate that life without God has no meaning, Solomon is seeking to demolish confidence in man-based achievements and wisdom; he shows that all of man’s goals or the “way that seems right to man” must of necessity lead to dissatisfaction and emptiness.” Solomon recorded the futility and emptiness of his own experiences to make his readers desperate for God. He sought to show that their quest for happiness cannot be fulfilled by man himself in the pursuits of this life.
Second, Solomon affirms the fact that much in life cannot be fully understood, which means we must live by faith, not by sight. Life is full of unexplained enigmas, unresolved anomalies, and uncorrected injustices. There is much in life that man cannot comprehend nor control, but by faith, we can rest in the sovereign wisdom and work of God. Much like the Book of Job, Ecclesiastes not only affirms that man is finite, but that he must learn to live with mystery. Life down here on earth, “life under the sun,” cannot provide the key to life itself for our world fallen, bankrupt. In view of this, man must have more than a horizontal outlook; he must have the upward look to God, fearing and trusting Him. Enigmas and injustices must be left in His hands to resolve.
Third, Ecclesiastes presents a realistic view of life that counterbalances the optimism of Proverbs. It shows there are exceptions to the laws and promises of proverbs, at least from the standpoint of this life. Proverbs 10:16 affirms that justice is meted to the righteous and the wicked, but Ecclesiastes 8:14 observes that this is not always the case, at least not in this life. Are these contradictions? No, because Proverbs is noting the general laws of God without noting the exceptions that occur because we live in a fallen, sin-ridden world. Ecclesiastes points out that while a righteous order exists, as affirmed in Proverbs, it is not always evident to man as he views life “under the sun” from his finite perspective.
Fourth, Solomon showed that man, left to his own strategies will always find life empty, frustrating, and mysterious. The book, however, does not mean that life has no answers, that life is totally useless or meaningless. Meaning and significance can be found, he explained, in fearing God. Frustrations can thus be replaced with contentment through fellowship with God.
1:2 “Vanity of vanities,” says the Preacher, “Vanity of vanities! All is vanity.”
2:24 There is nothing better for a man than to eat and drink and tell himself that his labor is good. This also I have seen, that it is from the hand of God.
12:13-14 The conclusion, when all has been heard, is: fear God and keep His commandments, because this applies to every person. 14 For God will bring every act to judgment, everything which is hidden, whether it is good or evil.
At the end of Ecclesiastes, the Preacher looks at life through “binoculars.” On the other hand, from the perspective of the natural man who only sees life “under the sun,” the conclusion is, “all is vanity.” Life’s every activity, even though pleasant for the moment, becomes purposeless and futile when viewed as an end in itself.
The preacher carefully documents the latter view with a long list of his own personal pursuits I life. no amount of activities or possessions has satisfied the craving of his heart. Every earthly prescription for happiness has left the same bitter aftertaste. Only when the Preacher views his life from God’s perspective “above the sun” does it take on meaning as a precious gift “from the hand of God” (2:24).
Chapter 12 resolves the book’s extensive inquiry into the meaning of life with the single conclusion, “Fear God and Keep His commandments, for this is the whole duty of man” (12:13).43
Christ as seen in Ecclesiastes:
Since Christ alone is man’s means to God where man finds wholeness and satisfaction, or life and life more abundantly (John 10:10; 7:37-38), the futility and perplexity experienced in life can only be removed through a personal relationship with the Lord Jesus. Man’s aspiration for significance and satisfaction are found only in the Savior.
I. Introduction: The Problem Stated (1:1-3)
A. The Problem Demonstrated (1:4-2:26)
1. The Futility of the Cycles of Life (1:4-11)
2. The Futility of Human Wisdom (1:12-18)
3. The Futility of Pleasure and Wealth (2:1-11)
4. The Futility of Materialism (2:12-23)
5. Conclusion: Enjoy and Be Content with the Providences of God (2:24-26)
II. God’s Immutable Plan for Life (3:1-22)
A. He Predetermines the Events of Life (3:1-11)
B. He Predetermines the Conditions of Life (3:12-13)
C. He Judges All (3:14-21)
D. Conclusion (3:22)
III. The Futility of the Circumstances of Life (4:1-5:20)
A. Evil Oppression (4:1-3)
B. The Emptiness of Hard Work (4:4-12)
C. The Emptiness of Political Success (4:13-16)
D. The Emptiness of Human Religion (5:1-7)
E. The Emptiness of Human Riches (5:8-17)
F. Conclusion (5:18-20)
IV. The Futility of Life as a Whole (6:1-1)
A. Wealth Cannot Satisfy (6:1-2)
B. Children Cannot Satisfy (6:3-6)
C. Labor Cannot Satisfy (6:7-12)
V. Counsel for Living With Vanity (7:1-12:8)
A. Counsel in View of Man’s Wickedness (7:1-29)
B. Counsel in View of God’s Inscrutable Providences (8:1-9:18)
C. Counsel in View of the Uncertainties of Life (10:1-20)
D. Counsel in View of the Aging Processes of Life (11:1-12:8)
VI. Conclusion (12:9-14)
Though some critics reject King Solomon as the author and take 1:1 to mean, “which is about Solomon,” the internal evidence supports the traditional belief that Solomon is its author. The contents of the book agree with all that we know about the abilities and wisdom of Solomon, and there is no compelling reason not to regard him as the author.45 Solomon is mentioned seven times (1:1, 5; 3:7, 9, 11; 8:11-12), and he is identified as the groom. Verse 1 asserts that Solomon wrote this song as one of many (in fact the best of the many) songs which he wrote (1 Kings 4:32 tells us he composed 1,005 such songs). Note that the text does not simply say, “The Song of Solomon” but “The Song of Songs, which are Solomon’s.”
About 965 B.C.
The Song was probably written early in Solomon’s career, about 965. At this point, Solomon had sixty queens and eighty concubines (6:8), but later in his life, he would have seven hundred queens and three thousand concubines (1 Kings 11:3).
Title of the Book:
Regarding the title of this book Ryrie writes:
This book has been titled several ways: the Hebrew title from verse 1, The Song of Songs, which means “the most superlative, or best, of songs”; the English title, also from verse 1, The Song of Solomon, which designates the author; and the Canticles, meaning simply “songs,” derived from the Latin.46
Theme and Purpose:
The Song of Solomon is a love song filled with metaphors and imagery designed to portray God’s view of love and marriage: the beauty of physical love between man and woman. The book which is presented as a drama with several scenes, has three major player: the bride (Shulamite), the king (Solomon), and a chorus (daughters of Jerusalem). The purpose of the book will depend on the viewpoint taken as to the way the book should be interpreted. The following will illustrate this in the discussion of the three views presented here.
In summary, there have been three basic views on the interpretation of this Song of Solomon.
(1) Purely an Allegory: Some have regarded it only an allegory portraying fictional characters employed teach the truth of God’s love for His people. Regarding this view, Archer writes:
The allegorical interpretation prevailed from ancient times until the rise of modern scholarship. It identified Solomon with Jehovah (or else, according to the Christians, with Christ) and the Shulamite as Israel (or the Church). The historicity of Solomon’s love affair is of small importance to the exponents of this theory. They tend to interpret each detail in a symbolic manner; thus Solomon’s eighty concubines, according to some, represent the eighty heresies destined to plague the Church…
It must be admitted that these passages establish at least a typical relationship between human love and marriage and the covenant relationship between God and His people. Nevertheless, the allegorical view faces certain difficulties, not the least of which is that the book seems to speak of a historical episode in Solomon’s life and accords well with Solomon’s situation, at least in the earlier part of his reign (judging from the comparatively small number of his concubines).47
(2) The Literal View: Others regard the Song as simply a secular love song not intended to convey a spiritual lesson and expressing human love in a highly romantic way drawn from an historical event in the life of Solomon.
(3) The Literal/Typical View: This view sees a combination a literal historical event portraying the beauties of physical love along with a typical portrait of God’s Love and Christ’s love for the church.
Others rightly understand the book to be an historical record of the romance of Solomon with a Shulamite woman. The “snapshots” in the book portray the joys of love in courtship and marriage and counteract both the extremes of asceticism and of lust. The rightful place of physical love, within marriage only, is clearly established and honored. Within the historical framework, some also see illustrations of the love of God (and Christ) for His people. Obviously Solomon does not furnish the best example of marital devotion, for he had many wives and concubines (140 at this time, 6:8; many more later, 1 Kings 11:3). The experiences recorded in this book may reflect the only (or virtually the only) pure romance he had.48
This combined perspective is seen in Archers explanation of the theme of Canticles:
The theme of Canticles is the love of Solomon for his Shulamite bride and her deep affection for him. This love affair is understood to typify the warm, personal relationship which God desires with His spiritual bride, composed of all redeemed believers who have given their hearts to Him. From the Christian perspective, this points to the mutual commitment between Christ and His church and the fullness of fellowship which ought to subsist between them.49
7:10 “I am my beloved’s, And his desire is for me.
The book has three major player: the bride (Shulamite), the king (Solomon), and a chorus (daughters of Jerusalem).
Christ as seen in the Song of Solomon:
This book illustrates Christ’s love for the church which is seen as the bride of Christ in the New Testament (cf. 2 Cor. 11:2; Eph. 5:23-25; Rev. 19:7-9; 21:9).
I. Title (1:1)
II. Falling in Love (1:2-3:5)
III. United in Love (3:6-5:1)
IV. Struggling in Love (5:2-7:10)
V. Maturing in Love (7:11-8:14)
23 J. Sidlow Baxter, Explore The Book, Zondervan, Grand Rapids, 1960, pp. 110-111.
24 Baxter, p. 13.
25 Norman L. Geisler, A Popular survey of the Old Testament, Baker, Grand Rapids, 1977, p. 180.
26 Geisler, p. 181.
27 Gleason Archer, A Survey of Old Testament Introduction, Moody Press, Chicago, 1994, Electronic Edition, 1997, Parsons Technology, Inc.
28 E. W. Bullinger, Figures of Speech Used in the Bible, Baker, Grand Rapids, 1898, Reprinted in 1968, p. 311.
29 Charles Caldwell Ryrie, Ryrie Study Bible, Expanded Edition, Moody, p. 777.
30 R. Laird Harris, L. Archer, Jr. Bruce K. Waltke, Theological Word Book of the Old Testament, Vol. 1, p. 36).
31 Earlier attempts to determine an etymology of the name have given way to evidence from a well-attested west Semitic name in the second millennium found in the Amarna Letters, Egyptian Execration texts, Mari, Alalakh, and Ugaritic documents. The original form of the name was Ayyabum, which can mean “Where is [my] father?” or possibly “no father.” Either form might suggest an orphan or illegitimacy. Expositors Bible Commentary, Old Testament, Zondervan, Grand Rapids, 1997, electronic media. So also Merrill F. Unger, Unger’s Commentary on the Old Testament, Vol. 1, Moody Press, Chicago, 1981, p. 673.
32 Ryrie, p. 777
33 Archer, Electronic Edition.
34 Ryrie, p. 831.
35 Charles L. Feinberg, Class Notes, Dallas Theological Seminary, p. 3, 1960’s. Feinberg pointed out this quote was very ancient. The Midrash is a Rabinical Commentary.
36 Geisler, pp. 195-196.
37 Archer, Electronic Media.
38 Adapted from Archer’s Survey of the Old Testament, Electronic Media.
39 Wilkinson and Boa, p. 164.
40 Wilkinson and Boa, p. 164.
41 Geisler, p. 214.
42 This section is adapted from Zuck, Roy. “God and Man in Ecclesiastes” Bibliotheca Sacra (vol 148:Jan-March, 1991), pp. 48-50.
43 Wilkinson and Boa, pp. 170-171.
44 Adapted from The Ryrie Study Bible, pp. 1016-1017.
45 Ryrie, p. 1032.
46 Ryrie, p. 1032.
47 Archer, Electronic Media.
48 Ryrie, p. 1032.
49 Archer, Electronic Media.
Related Topics: Introductions, Arguments, Outlines | <urn:uuid:5c0829ce-5d9e-4688-9c00-72c543e5c559> | CC-MAIN-2017-22 | https://bible.org/seriespage/poetical-books | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608954.74/warc/CC-MAIN-20170527133144-20170527153144-00196.warc.gz | en | 0.916135 | 14,771 | 3.25 | 3 |
See what questions
a doctor would ask.
A lung biopsy is a medical procedure where a small amount of lung tissue is removed and examined by a pathologist for any abnormalities. The procedure is used to diagnose certain lung conditions such as pulmonary fibrosis (scarring of the lungs with fibrotic tissue), sarcoidosis (clumps of cells formed in various organs), and cancer. There are four types of lung biopsies: bronchoscope biopsy (bronchoscope insert through mouth or nose), needle biopsy (needle inserted through chest), open biopsy (through surgical incision between ribs), and video-assisted thorascopic (thorascope through incision). The first two are outpatient procedures performed by a pulmonologist under local anesthesia. The second two are in-hospital surgical procedures performed by a thoracic or general surgeon....more »
Other medical terms related to medical conditions and procedures for Lung Biopsy include:
What is Lung Biopsy? A lung biopsy is a procedure that involves removing a piece of lung tissue to be tested for abnormalities such as infection, cancer or inflammation of the lungs. There are four different types of lung biopsy including:
Local anesthesia is used for bronchoscopy and needle biopsy. Open biopsy and VATS procedures are performed under general anesthesia....more »
Who are candidates for Lung Biopsy? A lung biopsy is performed to diagnose lung conditions such as immune disorders, cancer, sarcoidosis (inflammation of the lungs), tuberculosis and in some cases severe pneumonia. Bronchoscopy may also be used as a treatment to clear blockages from an airway....more »
What are alternatives to Lung Biopsy? Prior to lung biopsy, chest X-rays and chest CT scans may be performed first to diagnose lung problems....more »
How do you prepare for Lung Biopsy? Prior to any surgery, your doctor will give you a complete medical examination and evaluate your overall health and your health history. You may be required to get additional tests such as X-rays and lab tests. Your doctor will also review with you the potential risks and benefits of the operation and will ask you to sign a consent form. It is important that you ask questions and be sure you understand the reason for the surgery as well as the risks.
It is important that you inform your doctor if you have allergies to any medications, what medications you are taking, and if you have bleeding problems. It is also important to inform your doctor if you are pregnant.
Your doctor will also give you specific instructions on how to prepare for surgery, including guidelines on eating and drinking, smoking, taking or avoiding certain vitamins and medications. Carefully following these instructions will help your surgery go more smoothly.
Depending on the circumstances of your surgery, you may be instructed to do the following:
What is the Lung Biopsy recovery process? Your recovery depends on the type of procedure that was performed. If your doctor performed needle biopsy or used a bronchoscope, you may cough up some blood after the biopsy. After needle biopsy, you will likely go home four hours or so after the procedure. For open biopsy, you may experience some pain at the incision site and you may feel tired and groggy from the general anesthesia. Your stitches will be removed two weeks after the procedure....more »
What is the cost of Lung Biopsy? A variety of factors may influence the cost of the surgery. They include:
These factors vary depending on you and your situation.
The cost of each procedure can vary dramatically based upon age, location, gender, and insurance coverage. HealthGrades provides detailed cost estimates which include the costs of the procedure, drugs, hospital stay, and more. Each cost estimate is easy to understand and provides medical terms you need to know.
The detailed cost estimate for Lung Biopsy, includes costs for:
Where can I find a Lung Biopsy doctor or surgeon? Lung Biopsy is typically performed by doctors specializing in General Surgery. Nationally, there are 27988 practicing General Surgeons. HealthGrades offers detailed physician reports to help you find a qualified Lung Biopsy doctor or surgeon in your area, which includes disciplinary actions, patient feedback, background information, and more. Start your search now!
Search Specialists by State and City | <urn:uuid:f22781dc-5044-476e-a0e8-1ceff4bfa18f> | CC-MAIN-2017-30 | http://www.rightdiagnosis.com/surgery/lung-biopsy.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500550977093.96/warc/CC-MAIN-20170728183650-20170728203650-00403.warc.gz | en | 0.94706 | 886 | 3.515625 | 4 |
Any water accumulating and any increase in moisture and humidity can lead to not only property damage and health problems but also indoor air quality problems. Standing water can lead to bacteria, mold and microorganisms to form and become airborne. If there is a flood and the water contains sewage it can lead to allergic reactions and other conditions that are sensitive to individuals. According to the National Safety Council excess moisture in a home or in an indoor environment is an indoor air quality in three ways:
- Microorganisms in floodwaters may present a health hazard. These organisms can penetrate deep into soaked, porous materials and later be released into air or water. Coming in contact with air or water that contains these organisms can cause illness.
- High humidity and moist materials provide ideal environments for the excessive growth of microorganisms that are always present in the home. These situations may result in additional health concerns such as allergic reactions.
- Long-term increases in humidity in the home can also foster the growth of dust mites. Dust mites are a major cause of allergic reactions and asthma.
The Indoor Air Quality Network has a video about Flood Cleanup and Indoor Air Quality with additional information on this subject. Keep in mind that any material that can’t be dried up completely needs to discarded because any remaining water or moisture is just an opportunity for bacteria and microorganisms to build up. | <urn:uuid:600ef870-6693-46bb-ba22-84008399b66f> | CC-MAIN-2021-25 | https://www.air-tek.net/flood-cleanup-avoid-indoor-air-quality-problems/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487616657.20/warc/CC-MAIN-20210615022806-20210615052806-00560.warc.gz | en | 0.940859 | 276 | 3.59375 | 4 |
Roughly speaking, virtual sport is a computer simulation of real-life sports. It considers most real sports-related data, such as the rules of the game, player features, human physique, etc. That means that all the results of matches are calculated by a computer, mostly relying on collected sports statistics that serve as input data that defines the probabilities of various events. At the same time, players who bet on virtual sports events have the opportunity to make all the same types of bets as on regular offline sports.
Lately, in 2020, many things in the industry have changed as the COVID-19 pandemic became a big influence on the lives of all people across the world. Let’s find out how virtual sports managed to replace real-life sports events for many bettors in the time of a pandemic and how it changed the global iGaming industry.
Virtual sports in a pandemic
Before the COVID-19, virtual sports was already a very popular kind of digital entertainment - its share of income in bookmakers was ⅕ of the total amount of bets excepted. In the minds of many players, these types of games were just a way to make some additional bets between real sporting events, since it was possible to follow online competitions at any convenient time of the day and even any minute. This is what served as one of the major reasons for its incredible rise to popularity in 2021.
As it is easy to guess, the global pandemic has made its own adjustments to the sports world. Many games and matches were postponed, sporting events were canceled, and because of the empty stands, the real sport began to lose its grip due to many limitations that were implemented to combat the pandemic. In addition, it became more and more difficult to predict the results of matches, since an important team member could not enter the field due to quarantine restrictions without any prior notice, or the boxing match was canceled due to a sportsman’s positive test. Virtual sports, on the other hand, could guarantee that the game that the player currently sees on his screen would result in some score for sure.
Technological advances have also been a crucial factor in the popularization of virtual sports. Modern graphics and improved artificial intelligence have made games not only more spectacular but also more realistic. You can already see how experts in pre-match analytics appeal to virtual simulations, trying to calculate in advance how the events of the game will go. In addition, intensive and consistent development of VR helmets allows us to hope that soon the matches that a person cannot attend in real life will become available in the online world with the help of the latest VR gear.
Virtual sports in 2021
The temporary crisis of the sports sphere attracted the attention of not only betting fans, but also the organizers and top managers of various tournaments. The postponements and cancelations of the largest NBA, NHL, UEFA and MLS tournaments seriously hit the pockets of many organizations, some advertisers demanded a return of part of their investments, and many contracts for broadcasts were canceled. As a consequence, many people have lost their jobs and the industry went into a temporary state of decline.
In just a year, more than 900 tennis tournaments have been postponed. And it is only a single sport we are talking about! Formula 1 refused to hold the Grand Prix tournament, and the National Basketball Association ended the season ahead of schedule and was forced to change the playoff system.
Companies had to cope not only with the current losses but also to do everything possible to prevent the crisis from happening again. That is why some large organizations have shifted their vector towards virtual sports.
Hawthorne Race Course and Palm Beach Kennel Club from the United States has signed cooperation agreements with software developers ordering a virtual competition system. The traditional British annual Grand National horse race will also be broadcast exclusively in virtual format.
The benefits of virtual sports, at least as an alternative option for players, were employed by Betradar, which launched the virtual Asian Cup back in 2019. This allowed the company not only to avoid the pandemic crisis but also to take a leading place in the niche due to a huge portfolio and many types of virtual sports it can offer to its spectators.
Betting on virtual sports
Summing up the last two years in the context of the global pandemic, it is worth noting that the rapid growth of virtual sports as a niche is not going to slow down sometimes soon. In regions such as Italy, virtual sports market share has already exceeded 20% of the total market and continues to grow. No one can say for sure when classic sports will fully recover from the impact of the pandemic, while the virtual sports sphere already stands out. Well, there are several good reasons for it to be so successful these days:
- Speed. The modern generation of people prefer a faster lifestyle, that’s why they prefer making choices here and now. Sports competitions, that last minutes instead of hours, allow you to enjoy the game as quickly as possible.
- Transparency. No games are fixed, referees' mistakes and other human-factor-related situations are excluded.
- Accuracy. Virtual sports are not affected by random factors that can change the outcome of the game.
- Availability. 24/7 access to any sport, match, or tournament.
As you can see, nowadays virtual sports are becoming almost as popular as real-life sports due to so many advantages that they can bring to the table. A great advance in technology and the acceleration of our lifestyles were important factors in the establishment of virtual sports as a new big phenomenon on the betting market. Classic sports are still more spectacular and, probably, more familiar to casual spectators. However, virtual sports are not here to replace, but rather to supplement the spectators’ passion for sports. And as far as we can judge, they are succeeding in it lately becoming an essential entertainment of millions of sports fans all over the world. | <urn:uuid:48cf0d00-5009-41af-b881-d7b0810729b6> | CC-MAIN-2023-50 | https://nuxgame.com/blog/industry-insights/virtual-sports-the-healthy-sports-alternative-in-the-time-of-covid-19 | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00047.warc.gz | en | 0.973381 | 1,207 | 2.5625 | 3 |
Lighting for Policy Makers
Why Should Your Municipality be Concerned about Light Pollution?
Energy Waste and Carbon Emissions
In an average year in the U.S. alone, outdoor lighting uses about 120 terawatt-hours of energy, mostly to illuminate streets and parking lots. That’s enough energy to meet New York City’s total electricity needs for two years!
IDA estimates that at least 30 percent of all outdoor lighting in the U.S. alone is wasted, mostly by lights that aren’t shielded. That adds up to $3.3 billion and the release of 21 million tons of carbon dioxide per year! To offset all that carbon dioxide, we’d have to plant 875 million trees annually (see our Light Pollution and Energy Waste page).
Negative Effects on Wildlife
Numerous studies have shown that artificial light at night has numerous negative and deadly effects on many types of wildlife including birds, amphibians, insects and mammals.
What about Crime and Safety?
There is no clear scientific evidence showing that increased outdoor lighting deters crime. While brighter lighting may make us feel safer, poor outdoor lighting can actually reduce our personal safety. A study conducted by the city of Chicago found a correlation between increased crime and brightly lit alleyways. A study prepared by the U.S. National Institute of Justice concluded: “We can have very little confidence that improved lighting prevents crime.”
In fact, glare from bright lights creates shadows where criminals can hide. Some crimes like vandalism and graffiti thrive on lighting.
Glare can also be dangerous to pedestrians and drivers. It shines into our eyes, constricting our pupils, which diminishes our ability to adapt to low-light conditions.
A Problem with Simple Solutions
The good news is that your municipality can have it all – environmentally responsible lighting that helps keep citizens safe. When lighting is shielded, it’s directed down on the ground where it’s needed, which minimizes glare, light pollution and carbon emissions, and saves money.
Why Outdoor Lighting Ordinances Matter
Outdoor lighting ordinances or codes are a great tool for ensuring that municipalities implement good, safe outdoor lighting. A well-written ordinance, with proper lighting installed, will save the public money and increase safety. IDA, in collaboration with the Illuminating Engineering Society (IES), created the Model Lighting Ordinance (MLO) to make it easier for municipalities to adopt good lighting plans.
LEDs and Outdoor Lighting
Many municipalities are replacing older, conventional, lighting systems with new, energy efficient, light emitting diodes (LEDs). However, energy efficiency is just one piece of the puzzle in improving outdoor lighting at night.
IDA has developed a set of recommendations for municipalities considering the installation of LED lighting systems. These recommendations take into account a number of important considerations and provide guidance for selecting outdoor lighting that increases energy and cost savings, enhances safety and security, protects wildlife, and preserves the nighttime environment.
We strongly encourage municipalities to give serious consideration to these recommendations before converting to a LED outdoor lighting system.
IDA is Here to Help!
IDA’s experienced staff of experts is on hand to contract with municipalities regarding their outdoor lighting plans. | <urn:uuid:b2c760de-c550-49cb-b904-5f0d7b47ce29> | CC-MAIN-2018-09 | http://darkskycy.com/lighting/lighting-for-policy-makers | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891817523.0/warc/CC-MAIN-20180225225657-20180226005657-00252.warc.gz | en | 0.93405 | 663 | 3.28125 | 3 |
|Launch||15 February 2017, 03:58:00 UTC|
PSLV-C37 was the 39th mission of the Indian Polar Satellite Launch Vehicle (PSLV) program and its 16th mission in the XL configuration. PSLV-C37 successfully carried and deployed a record 104 satellites in sun-synchronous orbits. Launched on 15 February 2017 by the Indian Space Research Organisation (ISRO) from the Satish Dhawan Space Centre at Sriharikota, Andhra Pradesh. According to ISRO, the 101 international satellites were launched as part of a commercial arrangement between several firms and its commercial arm Antrix Corporation Limited, run under the auspices of the Indian Government's Department of Space.
PSLV-C37 was launched from the First Launch Pad of Satish Dhawan Space Centre in Sriharikota at 09:28 IST on 15 February 2017. It was the 39th flight of the PSLV and the sixteenth in the XL configuration. It carried a total of 104 satellites including the primary payload Cartosat-2D. The launcher started placing the satellites into polar Sun-synchronous orbits one after another after a flight of 16 minutes and 48 seconds. It first ejected the satellite Cartosat-2D at an altitude of approximately 510 kilometres (320 mi), with 97.46 degrees inclination, followed by the two ISRO nanosatellites INS-1A and INS-1B. It then took 11 minutes for PSLV C-37 to place the remaining 101 "co-passenger" satellites into their intended orbits.
Soon after separation from the launch vehicle, the two solar arrays on board the Cartosat-2D satellite were automatically deployed. Afterwards, ISRO's Telemetry, Tracking and Command Network at Bengaluru took control of the satellite. "In the coming days, the satellite will be brought to its final operational configuration following which it will begin to provide remote sensing services using its panchromatic (black and white) and multispectral (colour) cameras," an ISRO statement read. The mission lasted 29 minutes.
The rocket launched Cartosat-2D and 103 nanosatellites: two from India, one each from Kazakhstan, Israel, the Netherlands, Switzerland, and the United Arab Emirates, along with 96 from the United States of America – 88 Dove satellites and 8 LEMUR satellites. The three Indian satellites launched were Cartosat-2D, INS-1A, and INS-1B. Arrangements for the launch of the 104 satellites were made between ISRO's commercial arm Antrix Corporation Limited, under the auspices of the Indian Government's Department of Space, and the international customers.
The Cartosat-2D weighs 714 kilograms (1,574 lb), and its design life is five years. The two Indian nanosatellites, designated INS-1A and INS-1B, each carried two payloads from ISRO's Space Applications Centre and the Laboratory for Electro-Optics Systems. INS-1A carried a Surface Bidirectional Reflectance Distribution Function Radiometer (SBR) and a Single Event Upset Monitor (SEUM). INS-1B carried an Earth Exosphere Lyman-Alpha Analyzer (EELA) and Origami Camera as payloads. They weigh 8.4 kilograms (19 lb) and 9.7 kilograms (21 lb) respectively and have been designed with a mission life of six months. An ISRO official said: "The nano satellites are an experimental class of satellites introduced by ISRO because there are requests from academic institutions to use them for data collection. The universities do not have the knowledge to build satellites and tend to take a long time… We want them to focus on the instruments as we can provide the nano satellite bus."
The 103 co-passenger satellites weighed approximately 664 kilograms (1,464 lb), bringing the total payload mass to 1,378 kilograms (3,038 lb). The total launch mass of the rocket was 320,000 kilograms (710,000 lb). Among the 96 satellites belonging to US companies, 88 CubeSats were owned by Planet Labs, a private Earth imaging company based in San Francisco, California. Weighing roughly 5 kilograms (11 lb) each, the satellites separated from the rocket in different directions to avoid collision. With the launch of PSLV-C37, Planet Labs increased its fleet of satellites to 143, which is the largest private satellite fleet in operation.
Eight Lemur-2 satellites belonging to Spire Global are to provide vessel tracking and weather measurement services. These satellites have a short lifetime of about two to three years requiring replacement at regular intervals.
PSLV-C37 used the rocket engine nozzle manufactured by Vijayawada, from Andhra Pradesh-based company Resins and Allied Productions (RAP). This is the 100th nozzle manufactured by RAP to be used in a PSLV. Several components of PSLV-C37 were manufactured by Larsen & Toubro at its advanced composite facility in Vadodara, Gujarat. The honeycomb deck panels used for mounting the heat shield and electronic packages on the upper stage of the PSLV, the antenna mount structure, and the 13 metres (14 yd) diameter bull gear were all manufactured by L&T.
ISRO released a statement stating that it will recover half of the mission's cost from the foreign countries whose satellites it launched.
With this launch, ISRO created a new world record for the largest number of satellites ever launched on a single rocket, surpassing the previous record of Russia, which in 2014 launched 37 satellites using Dnepr rocket. This record set by ISRO stood until 24 January 2021, when SpaceX launched the Transporter-1 mission on a Falcon 9 rocket carrying 143 satellites into orbit.
Imagery from the primary satellite, Cartosat-2D, is used for various land information system and geographical information system applications in India. Data collected by the two Indian nanosatellites—the INS-1A and INS-1B—will be used by ISRO's Space Applications Centre and the Laboratory for Electro-Optics Systems. The Dove satellites from the US are used to photograph the Earth for commercial, environmental, and humanitarian purposes. Eight LEMUR satellites, weighing 4.6 kilograms (10 lb) each, carried two different payloads, namely SENSE for vessel tracking purposes and STRATOS for atmospheric measurements. Al Farabi-1 satellite built by the students of Al-Farabi Kazakh National University, Nayif-1 satellite built by the Mohammed bin Rashid Space Centre, Dubai, and PEASSS satellite built by an all-European consortium of Partners, are technology demonstrator satellites whereas DIDO-2 built by SpacePharma from Switzerland is a micro-research satellite. BGUSAT (Ben Gurion University SATellite) built by Israel Aerospace Industries (IAI) in cooperation with Ben Gurion University is designed as a research satellite. The satellites objectives are to explore atmospheric and weather phenomena in the infrared wavelength by imaging atmospheric gaseous contents and atmospheric glow. | <urn:uuid:93a63655-7366-449f-8f34-99f2f2fb5aef> | CC-MAIN-2021-49 | https://www.knowpia.com/knowpedia/PSLV-C37 | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363006.60/warc/CC-MAIN-20211204185021-20211204215021-00032.warc.gz | en | 0.909067 | 1,595 | 2.515625 | 3 |
This office received 62 complaints concerning the use of the term “swine flu.” A number of people wrote individual complaints while a substantial number signed on to a form letter protesting against the usage. Some correspondents said the term was inaccurate. One said that “neither the virus nor the illness have anything to do with swine…”
Most acknowledged that there was a basis for the swine description but argued that it was unnecessary to use “swine flu” when other terms were just as accurate. Most suggested H1N1. The argument here is that the use of the term swine flu might suggest that the flu was transmitted by eating pork. In addition, many made the claim that the swine industry was suffering directly as a result of the publicity surrounding the flu.
CBC's Executive Editor, Esther Enkin, replied that the News Service would continue using the phrase “swine flu” on the grounds of clarity and accuracy. She pointed out that there are a number of strains of A-H1N1 (the overall descriptor for these types of flu strains); that, in fact, there was another strain this year (Brisbane) that had different characteristics than “swine flu” and was resistant to some of the drugs used to treat the latter. She also said that it was important to remind people that one could not get the flu from eating pork.
Some complainants rejected Ms. Enkin's comments and asked for a review.
Perhaps we should start with some principles from CBC's Journalistic Standards and Practices. CBC journalists should be guided by three basics:
The information conforms with reality and is not in any way misleading or false. This demands not only careful and thorough research but a disciplined use of language and production techniques, including visuals.
The information is truthful, not distorted to justify a conclusion. Broadcasters do not take advantage of their power to present a personal bias.
The information reports or reflects equitably the relevant facts and significant points of view; it deals fairly and ethically with persons, institutions, issues and events.
Application of these principles will achieve the optimum objectivity and balance that must characterize the CBC's information programs.
Any act of CBC journalism must be measured against these principles.
In this case, we should go to expert knowledge on the condition itself. From the Centers for Disease Control and Prevention we find valuable information on the influenza. I will excerpt relevant passages:
“Swine influenza is a respiratory disease of pigs caused by type A influenza virus…Swine flu viruses do not normally infect humans. However, sporadic human infections with swine flu occurred. Most commonly, these cases occur in person with direct exposure to pigs (e.g. children near pigs at a fair or workers in the swine industry)….In the past CDC received reports of approximately one human swine influenza virus infection every one to two years in the U.S., but from December 2005 through February 2009, 12 cases of human infection with swine influenza have been reported.”
As we know, that number escalated from there both in the U.S. and Canada, and other parts of the world. At first, agencies referred to the strain as “swine flu.” Latterly, some of the more politically sensitive groups—the World Health Organization, for example—adopted other terminology, suggesting A-H1N1. In my survey of more scientifically oriented sites, I found fairly common use of “swine flu” for the very reason that A-H1N1 was, strictly speaking, not scientifically descriptive enough. The strain we are discussing is a sub-type of A-H1N1 with its own characteristics that distinguish it from other types of A-H1N1.
I did find an effort by organizations like the CDC and the Center for Infectious Disease Research and Policy at the University of Minnesota to develop alternate, but accurate terminology. Some have suggested A-H1N1(2009), but, as we heard from Ms. Enkin, there are other strains coming out this year. Both the CDC and the CIDRAP have referred to the strain as “2009 Novel H1N1 Virus.”
But I should note that, according to CIDRAP, “The novel A H1N1 virus appears to be of swine origin and contains a unique combination of gene segments that has not been identified in the past…” It also says, “A recent molecular analysis of the novel H1N1 virus demonstrates that the virus possesses a distinctive evolutionary trait (genetic distinctness) that may be characteristic in pig-human interspecies transmission of influenza A.”
It appears clear that we can dispose of the notion that this strain has nothing to do with swine. It clearly does. So the term is “accurate.”
The next question is whether it is fairly used in context. Many prominent journalistic organizations feel it is the best descriptor: The New York Times, the BBC, The Toronto Star, among others, continue to use the term to specify which strain one is discussing. Some have accused the CBC and other outlets of “scare-mongering” and “just going for ratings” by using the swine flu designation. While neither the Times, the BBC nor the Star is averse to increased circulation, none is noted as a purveyor of tabloid style news to “hype” circulation. I think the same can be said, generally speaking, for the CBC.
Many of the letters, particularly the form letter, argue that CBC has some obligation for the health of the pork industry:
“Many of the pork producers have suffered through numerous issues and continue to raise their animals. There are a number of factors that have affected the pork industry such as the fluctuating Canadian dollar, the ever increasing feed costs, the economic crisis, the inflated price of diesel and gas, and to top it all off the unfortunate naming of a flu virus; not even a super- bug; as ‘swine flu' instead of using its official title of H1N1.”
The letter goes on to imply that the CBC has a role in “assisting with the rebuilding of the pork industry.”
As the letter states, pork producers have had problems over the last few years, well before the advent of the flu. I hasten to add that I am not an expert on the industry, but I note from Agriculture and Agri-Food Canada statistics that, year over year, pork exports (fresh, frozen and processed) are down slightly from last year (through the end of May). The main cause would seem to be large percentage drops in China and Hong Kong.
I also note that recent changes in U.S. regulations have had an impact on sales into that market. In addition, the weather in Canada has reduced the amount of barbecuing that usually happens at this time of year. In fact, it appears that the industry faces a veritable “perfect storm” of troubles, of which the flu appellation appears to be a small contributor.
I also surveyed my Ombudsman colleagues from around the world who might have dealt with the issue. Some countries refer to the outbreak as “Mexican” flu, its reputed country of origin. The analogies would seem to be “Spanish” flu (which had obvious effects in Spain but probably originated in the U.S.) and “Hong Kong” flu. More recently, we have dealt with “avian” flu, another A-H1N1 variant that seems most analogous to this year's outbreak, although genetically different.
A somewhat analogous organization, National Public Radio in the U.S., also continues to use “swine flu,” as well as “novel H1N1,” although there was a feeling that they might move over time toward the latter.
So we can see that, contrary to most of the complaints, “swine flu” is both an accurate and, by and large, a fair description of the influenza, more precise, scientifically, than A- H1N1. That being said, it would not be inaccurate to refer to the strain by its emerging title: novel H1N1 2009.
One other aspect deserves review: Ms. Enkin noted how important it is that the public be reminded that eating cooked pork poses no risk of acquiring the flu we have been discussing. I agree, although my horseback survey of stories on radio and television does not indicate that there has been a concerted effort in this regard. I should note that CBC.ca is a constant presence and has appropriate backgrounders on the strain.
The use of the term “swine flu” does not violate CBC's Journalistic Standards and Practices. It is an accurate descriptor and is scientifically more precise than H1N1 or A-H1N1.
The question then becomes one of style—something to be judged by the editors: what term is best to use for ease of understanding and in fairness to all concerned. Listeners, by and large, remember the condition as “swine flu.” People actively engaged in the swine industry understandably would wish to avoid the label.
In years past, editors have been satisfied with names such as “Hong Kong” and “Spanish,” as well as “avian.” So, from a layman's point of view, it is clear that there is not an absolute standard requiring the genetic history of the influenza to be flagged in its name. Editors do have a choice of several appellations, all of which would accurately signal the flu's origin. | <urn:uuid:b8e796c7-5fb5-4a48-ad02-3a340858d581> | CC-MAIN-2017-39 | http://www.ombudsman.cbc.radio-canada.ca/en/complaint-reviews/2009/use-of-the-term-quot-swine-flu-quot/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693363.77/warc/CC-MAIN-20170925201601-20170925221601-00445.warc.gz | en | 0.971457 | 2,023 | 2.984375 | 3 |
- 09/13/14 | Adjusted: 02/24/16 | 1 file
- Grades 9-10
Keep Memory Alive
In this excerpt from his Nobel Peace Prize acceptance speech, Elie Wiesel reminds the audience of the “urgent importance of the Holocaust and the evil drove it and casts those who would remain silent in the role of the perpetrator." (Prentice Hall Timeless Voices, Timeless Themes, 2002)
This lesson was created as part of the Anthology Alignment Project, during which teachers created CCSS-aligned lessons for existing literary and information texts in anthologies. All page numbers and unit/week designations found in this lesson relate to the edition of the anthology named above. If you are using a trade book or different edition of this title, the page/unit/week references in this lesson will not match. Consult the content referenced in the body of the lesson to determine appropriate page numbers for your text. | <urn:uuid:a08d0a56-8d0a-41f9-b3f8-f72e1097ca2f> | CC-MAIN-2023-23 | https://achievethecore.org/page/1779/keep-memory-alive | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652161.52/warc/CC-MAIN-20230605185809-20230605215809-00152.warc.gz | en | 0.901232 | 205 | 3.78125 | 4 |
(Phys.org) -- Now that tiny computers and electronic communications systems are being designed into cars, hackers can look toward the car, like the PC, as potential roadkill. If cars are to become computers on wheels, a number of security experts are expanding their focus on car security systems and sources of security threats. U.S. computer scientists from California and Washington state have already identified ways in which computer worms and Trojans are carried over to automobiles. Conduits include onboard diagnostics systems, wireless connections and even tainted CDs played on radios systems.
Experts point out that the numerous computers known as electronic control units, or ECUs, require tens of millions of lines of computer code to manage interconnected systems. These range from engines, brakes and navigation to lighting, ventilation and entertainment. The same wireless technologies that power cell phones and Bluetooth headsets are in cars and in turn are vulnerable to remote attacks.
Unlike PCs, though, the attackers goal with cars may not be to rob the victim of information but to steal the car, or spy on in-car conversation, or cause the vehicle to crash.
McAfee, a subsidiary of Intel and known for its security work to remedy PC viruses, are conducting research on car security at a Beaverton, Oregon garage. Bruce Snell, a McAfee executive, confirmed that automakers are not blind to risks of cyber attacks and are aware of auto system-hacking repercussions far different from seeing laptop data swiped and wiped. McAfee, a subsidiary of Intel, issued a report on automotive systems security with a title that reveals what it sees as the coming risks: Caution: Malware Ahead.
Researchers of the University of California, San Diego, and the University of Washington have already figured out how to hack into a modern car using a laptop. The same research team extended the scenario to remotely mount attacks via Bluetooth. According to the McAfee paper, another attack scenario was presented by researchers of the University of South Carolina and Rutgers. They demonstrated it was possible to mount an attack on a vehicle and compromise passengers privacy by tracking Radio Frequency Identification (RFID )tags using long-distance readers at around 40 meters; the RFID tags are used in tires for sensor data over wireless short-distance communication to the vehicle.
Reports do not single out vendors because the issues are relevant to the entire industry; automakers use common suppliers and processes. Nonetheless, a Reuters check of vendor initiatives shows concern in responses.
Major U.S. automakers did not say if they knew of any instances in which their vehicles had been attacked with malicious software or if they had recalled cars to fix security vulnerabilities. At the same time, nothing is impossible and they are working to keep their systems as safe as possible.
Ford has its security engineers working on SYNC in-vehicle communications and entertainment system to ensure it is as resistant as possible to attack, according to the Reuters report. Toyota Motor Corp, the world's biggest automaker, said it was not aware of any hacking incidents and that hacking was at least close to impossible. A Toyota source said the vehicles are designed to change their coding constantly. Chrysler is joining industry groups and outside organizations to tackle car security.
As noted in Car and Driver, as more people start to access car networks, the auto industry will beef up relevant security. That may also mean something all too familiar to the PC industry, a relentless skirmish between hackers and automakers.
Explore further: McAfee warns of hacker threat to autos | <urn:uuid:b4367729-9b94-47b1-b959-89de4b809835> | CC-MAIN-2018-13 | https://phys.org/news/2012-08-experts-risky-tech-loaded-cars.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645775.16/warc/CC-MAIN-20180318130245-20180318150245-00742.warc.gz | en | 0.95714 | 704 | 3.015625 | 3 |
Of all the possible relationships within the class environment (instructor-student, student-student, student-content), the relationship between the student and the instructor is one of the most important, whether the class is entirely online or all face-to-face. However, these different formats do bring a different dynamic to the relationship.
Trisha Bender (2003) cautions about the dangers of psychological remoteness, or relational distance, between instructors and students in any classroom setting, but the physical distance inherent to online classes can exacerbate this. Ironically, sometimes students and faculty interact more in an online course (through emails and direct communication via discussion boards and feedback) than in face-to-face classes. However, deliberate steps must be taken to overcome the perception of the relational distance in online courses.
One of the ways you can minimize this perception is through instructor presence. Instructor presence means creating the perception for your students that you are right there with them in the process of learning. Consider some of the following strategies adapted from the Worcester Polytechnic Institute Academic Technology Center for improving instructor presence:
- Help your students know more about you. Include a picture or avatar. Let them know your philosophy of teaching, your personal and professional interests, and your research. Some instructors use a brief video of themselves talking to their students to increase this feeling of presence.
- Begin each week with a supportive note to your students that explains the course outcomes for the week and the expectations for their work. Overviewing the content for the week. Insert a comment about a current event that relates to your course or something happening on campus that may be of interest.
- Narrate your slides with your own voice. Use a conversational tone and employ humor, anecdotes, examples, and/or storytelling.
- Login to the course site several times during the week and leave students a note indicating that you have been there: an announcement, a note to students, or a posting to the discussion board.
- Anticipate questions that your students have and post a FAQ section. Consider having an instant messenger tool set up during the week for office hours.
Providing Encouragement and Creating Relevance
Another way in which you can reduce relational distance and increase instructor presence is by building encouragement into your online course and explaining to students what makes the course content particularly relevant. Further, an encouraging and supportive environment will also help students maintain a good attitude about their learning and language that explains why what they are reading and doing in the course makes the learning more meaningful to them.
As you go through your online course, try to identify areas where encouragement can be worked into the lessons and activities. If you have taught the same course for a while, you may already know what areas are often the most difficult for students to understand or what aspects they tend to struggle with the most. Try adding some short statements here and there – it doesn’t have to be very elaborate:
- “While learning how to cite sources correctly can seem difficult at first, practice will definitely make it easier!”
- “If you are worried that you will never memorize all the citation rules, try to relax. These are something that you just need to know how to look up. In fact, they sometimes change with updates, so memorizing anything other than a few basics is not really the best use of your time. Instead, work on learning how to use your style guide and where the different rules are located so that you can more easily look up how to cite your sources.”
- “Are you struggling with the idea of rhetorical devices? If so, you are not alone! Check out the links below for some more information or post to the Q&A discussion forum to get answers. Don’t suffer in silence – there is always someone else who has the same question that you do!”
This type of language throughout your course, in addition to a few encouraging announcements here and there, can really change the overall climate of your course. You can create an environment where students feel that their fears are acknowledged and that help is available. These actions can reduce anxiety and increase learning.
To tighten up the potential for student engagement in the course, you will also want to be sure to add some language throughout that helps to explain, inform, and connect ideas in the course. Adding this kind of information to the course provides relevance for why a reading, activity, or skill is important. Additionally, this aspect of the course is one where you have the ability to truly provide the value of your knowledge and experience as an educator – something that the books and materials often do not do. You can provide this sort of language and information via announcements, within the course modules and/or units, and prior to exams or assessments.
Within the course modules and/or units, you can provide:
- An overview of the module explaining what the topic will cover, how it flows from what was previously covered, how it may be important for students in their future careers or studies, and how it will help prepare them for what they will be studying next. This is also an excellent opportunity for you to share your own relevant experiences from your career or studies.
- A few sentences accompanying readings and materials that explain to students how these materials will prepare them for the course activities and assessments.
- A few sentences that explain to students how the learning activities tie in with the learning materials and how the activities will help prepare them to do well on the assessments and/or meet the learning outcomes for the module and/or course.
To learn more about using modular organization in your online course, click here.
Prior to exams and/or assessments you can provide:
- A few sentences explaining what parts of the module the exam/assessment pulls from and how it will help show that students have mastered certain module and/or course outcomes.
Once you have integrated this type of encouragement and communicative and connecting language into your course, you will begin to see your course really flesh out – it is the meat on the bones of your course. These are also the areas where many online instructors feel at a loss when moving from a face-to-face environment, since these are typically the types of conversation that you have while in the classroom with your students. Adding it to your online course takes a little time and effort, but not as much while you are engaged in teaching, and the benefits are a dramatically changed course climate for you and your learners.
Bender, Tisha. (2003). Discussion based online teaching to enhance student learning. Sterling: Stylus Publishing.
Center for Learning Enhancement, Assessment and Redesign. (2016). Teaching Resources for Engaged Educators [online training modules]. Denton, TX: University of North Texas.
Worcester Polytechnic Institute Academic Technology Center. (2007, Apr. 5). Improving Your Teaching Presence in Distance Learning Courses. | <urn:uuid:f3d50a2f-3682-4159-a965-f6dddcc71df9> | CC-MAIN-2020-50 | https://teachingcommons.unt.edu/teaching-essentials/online-teaching/importance-instructor-presence-online-learning | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141187753.32/warc/CC-MAIN-20201126084625-20201126114625-00574.warc.gz | en | 0.949245 | 1,417 | 2.84375 | 3 |
Seychelles' atoll of Aldabra sees decline in humpback whale count; El Niño blamed
(Seychelles News Agency) - From July until October each year, the south-eastern trade winds bring pods of humpback whales to the Seychelles archipelago. The whales migrate northwards to warmer waters, thousands of kilometres from the cold waters of the Antarctic they call home, in order to mate and breed.
But this year conservation rangers and researchers stationed on the Seychelles' atoll of Aldabra -- one of the largest raised coral atolls in the world -- have reported that the season has ended with a sharp decline in humpback whale sightings.
According to the Seychelles Islands Foundation (SIF), which manages the UNESCO World Heritage Site, only nine sightings have been recorded this year, with the first sighting made later than usual on 13 August.
The SIF’s communications officer, Rowana Walton, told SNA: “In the past five years the number of sightings of humpback whales has fluctuated between 20 to 60 sightings per season.”
“To have just nine sightings this year is a notable decrease,” she added.
Although there is no monitoring programme in place, all the staff members at the SIF’s research outpost on the atoll look forward to the humpback whale season, each hoping to be lucky enough to spot the first whale of the season. Many will spend their free moments scanning the horizon with binoculars to see the majestic creatures.
El Niño to blame?
Conservationists believe the decline in sightings could be due to the recent 2015-16 El Niño weather event, which elevated ocean temperatures across the world, causing extreme weather events and bleaching coral reefs.
With higher than average ocean temperatures, the krill that the whales feed on may not have been as freely available as usual, forcing the whales to either make shorter migration or even forgo the migration altogether.
The giant cetaceans, which can measure up to 16 metres long and weigh up to 36 tons, feed on krill and small fish in the sub-Antarctic (and in the Northern hemisphere, the sub-Arctic). They then make the long and arduous journey - up to 25,000 kilometres - to warmer waters, including those around the East African and Madagascan coasts and as far north as the Seychelles islands, mostly around the outer island atolls in the east of the archipelago such as Aldabra.
“If food is in shorter supply, it can be difficult for the whales to store the necessary energy needed to make such a long migration,” Walton told SNA.
A worldwide impact
Whale researchers in Australia have also noted a sharp decline in sightings of both humpbacks and southern right whales off the south-western coastline, and researchers there plan to team up with amateur whale spotters to try to gather more information about their migratory patterns.
It seems this change in feeding and breeding patterns is not isolated to the Southern hemisphere, either. Sub-Arctic whales from Alaska that usually go all the way south to Hawaii have decided not to make the journey, with whale researchers concerned about the non-appearance of the humpbacks to the Pacific islands.
However, other reports indicate that the whales may have been feeding much closer to home this year, with San Francisco’s SFGate reporting a sudden influx of humpbacks coming into the bay to feed, and Canada’s Times Colonist giving reports of plenty of whale activity off the coast of British Colombia.
Given the difficulties involved in tracking whales, Walton believes it could be possible that the whales usually seen at Aldabra chose to migrate instead to a different area of the western Indian Ocean this year.
SIF is collaborating with other partners to see whether this could really be the case.
“We are currently working with another NGO, Megaptera, to try and identify some of the whales seen within the Western Indian Ocean region. If possible, photos are taken of the dorsal fins of the humpback whales when they are seen at Aldabra,” Walton said. “These fins can be then used to identify individual whales and will help to build a picture of the migratory whale population in this region.” | <urn:uuid:fc0c4b3d-4a49-4453-a352-0c47bfa0ea82> | CC-MAIN-2020-10 | http://www.seychellesnewsagency.com/articles/6173/Seychelles%27+atoll+of+Aldabra+sees+decline+in+humpback+whale+count%3B+El+Nio+blamed | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143784.14/warc/CC-MAIN-20200218150621-20200218180621-00006.warc.gz | en | 0.94304 | 899 | 2.921875 | 3 |
What is Broadband?
Broadband Internet service truly is the most used form of Internet access because of its high access speeds; it is offered in four different forms, DSL (or Digital Subscriber Line), also fiber-optic, cable, and satellite. The old dial-up connection is the only non-broadband internet service available, and even though it is cheaper, most Internet users are moving towards the faster broadband Internet connection.
The DSL (or Digital Subscriber Line) internet service makes its connection by utilizing unused telephone wires that cause no interruption to your telephone service. The speed you experience with a DSL connection varies with your distance from the switching station. Your speed will be slower the further away you are and faster the closer you are to the switching station and this may be a deciding factor when you attempt to select between a DSL line and a cable connection.
The broadband cable connection is provided by the local cable TV provider. Here the cable Internet connection speed varies with the number of users on the service at a specific point in time. Given a specific geographical area, users of the broadband cable service share the connection bandwidth which slows the speed the more users are on the system. This will occur at the peak times for example late in the evenings after the work day is over when many people will be accessing the Internet. Somewhat misleadingly, often the cable company would estimate connection speeds that are based on the thinking that you are using the service. But that is clearly not the case.
The newest broadband service is fiber-optic, which is the fastest Internet connection thus far. However, this type of Internet service is still in its infancy as its service areas are quite limited and because the laying down of the fiber-optic cable takes a while to complete. Wherever it is available, the cost not only competes with that of DSL and cable, but it provides a much faster connection than both of those services.
The last and slowest broadband service is provided by satellite. Although this is a good replacement for dial-up for those people living in remote rural areas, the installation costs are quite high, but the ongoing monthly charges are competitive to both cable and DSL.
There are many advantages to the DSL and cable broadband service. It provides greater bandwidth than other Internet access forms, and that makes it easier for the computer user to multitask with several applications performing in the background while you surf the web. It is possible for you to surf the web while listening to audio.
The networking of computers in the home is made easier with a broadband connection, by either using wireless or wired modems.
The cost of broadband service is higher annually than the cheaper dial-up version by $100 to $500, but given the advantages and ease of a broadband connection, it is well worth the cost.
A broadband connection allows you to play many popular computer games that rely on a fast Internet connection.
Broadband connection, unlike the old dial-up internet connection, will not engage your phone line when in use. In fact, having a broadband connection makes it possible for you to obtain an Internet phone service so you will no longer need the traditional phone line at all.
Another great benefit of a broadband connection is that you are constantly connected to the Internet. You are quickly able to connect with your work's intranet and email in a matter of seconds.
Many people considering between these broadband Internet service options generally narrow the search to the most popular services which are DSL and cable. A good approach when researching your options would be to ask those in the area you are considering, which service they are using and how it is working for them.
Even though cable broadband Internet service offers a speedy internet connection, this fast speed will not be realized if the connection itself cannot be relied on. For example, the cable connection you receive depends on the shared bandwidth, the number of users on the system at any time, and the latency on the network.
The bandwidth is just one factor that determines the Internet connection's speed. It is a measure of the quantity of data that enters the network over a period of time, and is measured in bps, or bits per second. The greater the data flow, the better the network Internet connection. In broadband connections the supported data rates are generally 300 Kbps and higher, as opposed to the old dial-up maximum of 53Kbps.
Latency is another factor that affects the cable Internet connection's speed. Latency refers to delays incurred in the network data processing. A network is described as low latency if it experiences only small delay times, and high latency if it suffers with long delays. When the latency becomes excessive, data transmission causes a bottleneck that prevents addition data from coming through and this effectively reduces cable's Internet connection bandwidth. So even though the cable bandwidth of your Internet connection is set, its effectiveness can be reduced by bottlenecks of data and a high number of users on the system .
Again, with a broadband DSL connection, the connection speed of the Internet can be severely reduced by the distance a subscriber is located from the switching station. The further away the subscriber is from the switching station, the slower the Internet connection.
Once installed, a broadband connection is always on. The connection is maintained with the use of a cable or DSL modem. These connect the computer to the cable outlet on the wall, in the case of the cable internet connection; or the DSL modem to the phone line. Only when these connections become unplugged, will the Internet connection be lost.
Unlike the old dial-up service, you will not be dialing a specific phone number to gain access to the Internet. With a broadband service, access to the Internet is given by simply double clicking your Internet browser icon of choice (this is usually on your desktop - Internet Explorer, Firefox, Netscape etc.); your default web page will open and you can immediately start surfing the web. The whole process should take no more than about 10 to 15 seconds, depending on the computer's speed itself and baring any issues of slowness.Call 855-345-1775 for a Free High Speed Internet Quote and To Order the Best Promotions In Your Area. | <urn:uuid:92e8da7d-10ef-47f8-bbea-08ea5a7c9130> | CC-MAIN-2017-26 | http://whatismyipaddress.com/broadband | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320243.11/warc/CC-MAIN-20170624082900-20170624102900-00397.warc.gz | en | 0.935325 | 1,264 | 3 | 3 |
January 03, 2013
Ring Around Andromeda Challenges Galactic Ideas
A surprising discovery about dwarf galaxies orbiting the much larger Andromeda galaxy suggests that conventional ideas regarding the formation of galaxies like our own Milky Way are missing something fundamental.
In a paper published today in the prestigious journal Nature, an international team of astronomers including two University of Victoria professors describes the discovery that almost half of the 30 dwarf galaxies orbiting Andromeda do so in an enormous plane more than a million light years in diameter, but only 30,000 light years thick.
The findings defied scientists’ expectation—based on two decades of computer modeling—that satellite galaxies would orbit in independent, seemingly random patterns. Instead, many of these dwarf galaxies seem to share a common orbit, an observation that currently has no explanation.
“It’s a very unusual, unexpected configuration,” says UVic astrophysicist Dr. Julio Navarro, a co-author of the paper. “It’s so unexpected that we don’t know yet what it’s telling us. The fact that it is there at all is pointing us toward something profound.”
The paper is based on data collected as part of a project led by UVic adjunct assistant professor Dr. Alan McConnachie, of the National Research Council of Canada’s Herzberg Institute of Astrophysics (NRC-HIA) in Saanich.
McConnachie, another co-author of the Nature paper, is principal investigator of the Pan Andromeda Archaeological Survey (PAndAS), which used the Canada-France-Hawaii Telescope between 2008 and 2011. Examination of the data collected provided the first panoramic view of the Andromeda galaxy, the Milky Way’s nearest galactic companion, and the surprising discovery.
Understanding how and why the dwarf galaxies form the ring around Andromeda is expected to offer new information on the formation of all galaxies.
Follow us on Twitter at http://twitter.com/uvicnews
UVic is celebrating its 50th anniversary from Sept. 2012 to June 2013. Visit www.uvic.ca/anniversary for more info. | <urn:uuid:d9cd3422-d4ec-4b05-8157-2bb3bb601f75> | CC-MAIN-2015-35 | http://communications.uvic.ca/releases/tip.php?date=03012013 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645335509.77/warc/CC-MAIN-20150827031535-00181-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.896569 | 437 | 3.390625 | 3 |
This short video uses animated imagery from satellite remote sensing systems to illustrate that Earth is a complex, evolving body characterized by ceaseless change. Adapted from NASA, this visualization helps explain why understanding Earth as an integrated system of components and processes is essential to science education.
This is a team-based activity that teaches students about the scale of the greenhouse gas problem and the technologies that already exist which can dramatically reduce carbon emissions. Students select carbon-cutting strategies to construct a carbon mitigation profile, filling in the wedges of a climate stabilization triangle.
In this activity, students explore the increase in atmospheric carbon dioxide over the past 40 years with an interactive online model. They use the model and observations to estimate present emission rates and emission growth rates. The model is then used to estimate future levels of carbon dioxide using different future emission scenarios. These different scenarios are then linked by students to climate model predictions also used by the Intergovernmental Panel on Climate Change.
This video features a short animated sequence that illustrates the difference between young and old carbon released into the atmosphere from the consumption of food (young carbon) and the burning of fossil fuels (old carbon).
This video examines what will happen to crops as Earth's temperature rises and soils dry out because of changing climate. Students learn that a loss of soil moisture causes stress to plants, leading to crop withering. Since humans and animals depend directly or indirectly on plants for food, many societal problems can be expected to arise due to the impact of climate warming on crops and the societies that depend on them.
This interactive video series reviews global warming by recognizing the problem, addressing the sources and impacts, and weighing the options. It is a six-chapter series. Experts from different countries weigh in and answer some critical questions, including what countries have resources and the perspectives necessary to reach a consensus on handling the next steps and the economic costs involved.
In this learning activity, students use a web-based geologic timeline to examine temperature, CO2 concentration, and ice cover data to investigate how climate has changed during the last 715 million years.
This activity students through the ways scientists monitor changes in Earth's glaciers, ice caps, and ice sheets. Students investigate about glacier locations, glacial movement, and impacts of climate change on glaciers depending on the depth of research. It is linked to 2009 PBS Nova program entitled Extreme Ice.
With this simulation from the NASA Climate website, learners explore different examples of how ice is melting due to climate change in four places where large quantities of ice are found. The photo comparisons, graphs, animations, and especially the time lapse video clips of glaciers receding are astonishing and dramatic. | <urn:uuid:c378b9e4-5b60-4d04-b274-44390e119d88> | CC-MAIN-2014-41 | http://www.climate.gov/teaching/resources?keywords=&page=50 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657131238.51/warc/CC-MAIN-20140914011211-00260-ip-10-196-40-205.us-west-1.compute.internal.warc.gz | en | 0.918284 | 536 | 4.21875 | 4 |
Though I’m a pretty healthy eater most of the time, one of my few junk food weaknesses is movie theater popcorn –– and the more butter, the better. That oily, artificially flavored buttery topping is what makes the snack worthwhile! It’s also what makes it terrible, apparently. Long suspected as a cause of lung damage, researchers are now linking butter flavoring to Alzheimer’s disease.
The key culprit is a substance called diacetyl, which adds a buttery taste to foods without using any actual butter. It’s found in everything from microwave popcorn and the buttery topping used at movie theaters to snack foods, pet foods, margarines and baked goods. You would probably never know it from looking at ingredient lists, however: Most manufacturers will only list “artificial butter flavoring” without noting the specific compounds that make up that flavoring.
In a new study, researchers from the University of Minnesota found that diacetyl can cross the blood-brain barrier and cause a brain protein called beta-amyloid to clump. This clumping of beta-amyloid is one of the hallmarks of Alzheimer’s disease. Diacetyl can also inhibit the brain’s ability to clear beta amyloid as well as stop a protective protein called glyoxalase I from working.
Whether toxic levels of diacetyl are achieved in various body compartments upon mere (over) consumption of diacetyl-containing food substances is an unanswered but an important question,” said lead researcher Robert Vince.
While it’s unlikely that the occasional consumption of movie theater popcorn alone is enough to trigger ill effects, the ubiquity of artificial butter flavoring in processed foods means we could all be consuming a lot more diacetyl than we realize. The compound is also found naturally in beer and chardonnay wine.
Thursday Quick Hits:
- Expanding coverage for nursing home care. A new bill proposed by U.S. Rep. Joe Courtney (D-Conn) would change Medicare rules to allow patients who enter the hospital for “observation” (as opposed to “in-patient” care) to qualify for post-hospital nursing home coverage. “The trend of hospitals coding patients as observation is accelerating with every passing year, and the impact on families is financially catastrophic,” said Courtney.
- Your brain on marijuana. Australian scientists say persistent, heavy marijuana use damages the brain’s memory and learning abilities. MRI scans of the brains of longtime pot smokers showed significant differences in the volume and integrity of the brain’s wiring system when compared to people who’d never used the drug.
- When high blood pressure is good news. In people over 85, high blood pressure could actually indicate better health, according to a new study published in Archives of Internal Medicine.
Photo: Jeanene Scott/Getty Images | <urn:uuid:cb200471-0fb8-4d86-8a7b-10a723c87e31> | CC-MAIN-2015-27 | http://blog.aarp.org/2012/08/09/hold-the-butter-artificial-flavoring-on-popcorn-linked-to-alzheimers-disease/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098924.1/warc/CC-MAIN-20150627031818-00036-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.937517 | 604 | 2.546875 | 3 |
In 1965, the Air Force entered direct combat in Vietnam, despite the fact that its leaders had always opposed involvement in Southeast Asia. It fought in an outstanding manner, though hampered by highly political rules of engagement that violated all principles of airpower. As it fought, the Air Force gathered the expertise it needed to combat an enemy whose strength grew year by year, fueled by virtually unlimited support from the Soviet Union and China.
In December 1972, 25 years ago next month, the intransigence of the tough and resilient North Vietnamese foe finally exposed the total failure of gradualist war policies set in motion years before by President Lyndon B. Johnson and Secretary of Defense Robert S. McNamara. In fact, the North's thorough defeat of South Vietnam's forces convinced Hanoi that it need not seriously pursue peace negotiations with the United States in Paris. Military victory was within its grasp.
For Washington, the situation was inordinately bleak. The process of "Vietnamization" and US military force withdrawal had reduced the American ground presence to about 26,000 troops-too few to win a major battle but enough for a huge contingent of prisoners in an inglorious defeat. President Richard M. Nixon called upon the Air Force to save the situation. It did so with a powerful, 11-day bombing campaign, Operation Linebacker II. The campaign unfolded over the 12-day period of December 18-29, 1972. Because there was a one-day stand-down on Christmas Day, the operation came to be known by many as "the 11-Day War."
Seven Years Late
When President Nixon gave the order the Air Force collectively saluted and went to work, pleased at last to be carrying out the strategy it had advocated from the start--concentrated, sustained air attack against the enemy heartland. In 1965, that enemy heartland had been virtually defenseless and could have been attacked at will. Now, after a huge buildup, it was shielded by the most extensive and strongest integrated air defense system in the world.
The size and strength of those defenses were so great that many believed the B-52 heavy bomber, backbone of the Air Force's long-range force, would not be able to survive encounters with it. By 1972, North Vietnam had amassed a defense that included 145 MiG fighters, 26 SA-2 Guideline surface-to-air missile sites (21 in the HanoiHaiphong area), a heavy concentration of anti-aircraft artillery, and a complex, overlapping radar network that served an efficient and many-times-redundant command-and-control system. In addition, the radar network secretly had been improved in recent times by introduction of a new fire-control radar that improved the accuracy of the SA-2 weapons.
All previous air campaigns, including the initial Linebacker carried out in MayOctober 1972, were "limited," designed to interdict the overland routes by which the North resupplied its regular units and Viet Cong forces operating in South Vietnam. Linebacker II was to be different. The intent was to destroy all major target complexes in the Hanoi and Haiphong areas, using two distinct types of efforts, both of which had to contend with the monsoon season. An all-weather force of heavy B-52s and smaller F-111 attack aircraft would bomb by night while tactical aircraft would continue to press daytime attacks.
Air Force officers carefully shaped the list of targets so that the bombers could avoid civilian collateral damage and, most particularly, avoid damaging installations housing American POWs. As it turned out, one of the valuable side effects of Linebacker II was the boost in morale it brought prisoners as they saw their Communist captors tremble at the explosions and realized that at long last, the United States was fighting the war as it always should have been fought.
The initial orders calling for the Linebacker II effort specified three days of intensive effort, with a strong prospect of continued bombing. Throughout the Pacific theater, Air Force headquarters, flight lines, supply depots, barracks, mess halls, and all the other elements of a fighting force throbbed with preparatory activity. The flight line at Andersen AFB, Guam, was jammed with an enormous force of 99 B-52Gs and 53 B-52Ds. The mission from Guam would run about 12 hours and require in-flight refueling. At U Tapao Royal Thai Airfield, Thailand, another 54 B-52Ds were available. The mission from U Tapao would take only about three to four hours and did not require in-flight refueling.
All of the D models of the BUFFs had received the latest electronic countermeasures modifications, while only half of the G models had been so modified. This would prove to be an unfortunate and at times fatal difference, because the unmodified G models turned out to be vulnerable to SAMs.
Air Force tactical air units were called upon for double duty. They were to fly in support of the nighttime bomber attacks then go on to conduct a vigorous attack effort in the daytime. In the course of the campaign's 11 days, tacair units flew 530 daytime sorties, including 126 for suppression of SAM complexes, 273 for MiGCAP [MiG Combat Air Patrol] or escort, 85 for chaff dispersal, and 46 other types of missions. By night, tactical air units flew 769 sorties, including 170 SAM suppression, 390 MiGCAP/escort and 209 chaff.
The effectiveness of the US tactical force's precision guided munitions was greatly diminished by poor weather over the North. Still, when the campaign was over, Gen. John W. Vogt Jr., commander of 7th Air Force, would rate one precision guided weapon to be equal in worth to 100 "dumb bombs." The tactical air units also received excellent support from US Navy and Marine Corps aircraft.
As Linebacker II operations unfolded, a number of critical elements played a role in the execution of the attacks, including routes, spacing, altitudes, bomb loads, and basing. The routes to and from the targets were governed by many factors, including disposition of surface-to-air missile sites, the proximity of the Chinese border, and strength of the prevailing winds. Flight tactics called for formations of three B-52s, separated by 500 feet in altitude and one mile in horizontal distance.
Unlike bomber forces in the Korean War, the B-52s were under the command of Strategic Air Command, not "chopped" to the theater commander. SAC headquarters had ordered aircraft commanders not to take evasive action in the face of threats from either SAMs or MiGs during the long run in from the initial point to bombs away. The speed and direction of the turn after the bomb drop was designed to get the bombers out of SAM range as soon as possible. The tactics were needed primarily because SAC wanted to preserve electronic countermeasures integrity of the three-ship formations while making sure that only military targets were hit.
It took nearly two hours for 87 B-52s from Guam to taxi, take off, and become airborne on the afternoon of Dec. 18, 1972. They then were joined in the attack by 42 additional B-52s flying out of U Tapao, forming the largest attacking bomber force assembled since World War II. The B-52 targets on the first day were Kep airfield, Hoa Lac airfield, Phuc Yen airfield, Kinh No vehicle repair site, Yen Vien rail yards, Hanoi railroad repair facility, and the main Hanoi radio station. The F-111 force was assigned missions against nine targets.
The North Vietnamese leaders had expected a US air attack, but they were shocked by the intensity of the assault on Dec. 18. Reacting swiftly, the forces of the North used their SAMs effectively and quickly began to concentrate their efforts on the post-target turn.
This turn was the point of greatest B-52 vulnerability, for three reasons. First, it was here that the North Vietnamese radar had the greatest chance to "burn through" the B-52 cells' combined electronic countermeasures protection. Second, a banking B-52 presented a greater radar cross section to the defenders. Finally, the turn would reverse the benefits of the wind, transforming a 100-knot tailwind into a head wind that slowed down the enormous aircraft.
On Day 1 of the campaign, the Communist forces fired more than 200 SAMs, often sending them up in four- or six-weapon volleys. Once, the air was filled with more than 40 SAMs. On that day, the US lost three B-52s, two from Andersen and one from U Tapao, as well as one F-111. The losses were lighter than had been expected and were not considered unacceptably high. For the entire 11 bombing days, the BUFF crews upheld the Air Force tradition of never being turned back from an assigned mission, pressing on regardless of the ferocity of the enemy attack. On Day 1, SSgt. Samuel Turner, tail gunner on Brown 03, also shot down a MiG-21, the first in B-52 combat history.
Tactics were revised slightly on Day 2 of the attack, but routes remained the same. Bomber cell altitudes were lowered to 34,500 and 35,000 feet, the better to place the B-52s more securely within the chaff corridors being laid by the F-4s. Time separation between cells and between Times Over Target (TOTs) was increased to four minutes. Evasive action was authorized on both inbound and outbound routes. The results of the changes seemed to be positive. On Day 2, the North launched some 180 SAMs at the 93 attacking B-52s, but no losses occurred.
On Day 3, tragedy struck. Only 90 of 99 planned B-52s sorties were effective and six BUFFs were shot down. Two Gs and one D were lost in the first wave and an identical number were downed in the third wave. Three were struck prior to bomb release and three afterward; four went down near Hanoi while two made it out of North Vietnam. None of the lost B-52Gs had been modified to carry the new AN/ALT-22 ECM equipment. In the first three days of the campaign, five unmodified Gs and only one modified G had been lost. Of the total of nine B-52s lost to date, five had been hit during their turn off the target.
This constituted an unacceptably high seven-percent loss rate. Even so, Gen. John C. Meyer, the commander in chief of SAC, made the tough decision to press on, calling for even heavier strikes on SAM sites and storage areas. His decision proved to be correct, for the enemy had been hurt, too, and now was rapidly expending SAMs.
Tactics were altered again, too; cell separation and TOTs were compressed to 90 and 120 seconds, respectively. The altitude separation between cells was increased, and withdrawal routes were changed, enabling some bomber streams to withdraw directly toward the Gulf of Tonkin. Electronic warfare officers received authorization to add an ALT-28 ECM transmitter to their system with the intent of jamming the SAM downlink frequency.
On Day 4 of the campaign, attacks were staged by only 30 heavy bombers, all D models from U Tapao. Planning was simplified and a total of 75 tactical aircraft were available for support. Two B-52s were lost to SAMs in an attack on Bac Mai airfield.
On each of the next three days--Days 5, 6, and 7--USAF carried out attacks with packages of 30 B-52s, losing none. The Air Force was making good use of its experience and new tactics (including altitude changes, multiple approach paths, and the selection of new targets outside the HanoiHaiphong area) to confuse the North Vietnamese defenders. On Dec. 24, the seventh day of the air campaign, A1C Albert Moore, a gunner on Ruby 03, shot down a MiG.
US bombing forces stood down on Christmas Day in order to give planners a chance to review events so far and give the crews some rest. Politically, the stand-down was like the previous bombing halts, a well intended "signal" that negotiations were in order. Once again the North Vietnamese interpreted the respite as a sign of American weakness, and they spent the day feverishly restocking their SAM sites with missiles.
The next day, Day 8, the bombing resumed. All of the previous experience gained was exploited in new tactics. Seventy-eight B-52s in four flights attacked Hanoi simultaneously from four different directions. At the same time, 42 aircraft in three other flights struck Haiphong, North Vietnam's principal harbor and transshipment point for military supplies.
The compressed nature of the attack intensified the difficulties of the 114 tactical support aircraft. However, they executed the mission flawlessly. The versatile USAF F-4 Phantom served as the MiGCAP and also dispensed the dense chaff blanket necessary to shield the B-52s from enemy radar. Phantoms and the redoubtable Republic F-105 Thunderchiefs suppressed SAMs in the dangerous Wild Weasel mission.
Aging EB-66s were forced by the heavy SAM threat to operate farther than desired from the target area, but they nonetheless provided efficient ECM support. F-111s and Vought A-7s attacked northern airfields. KC-135 tankers furnished fuel to all types of aircraft, often moving well into a combat area to reach aircraft in trouble. The Air Force Linebacker II team was completed by C-130 search and rescue aircraft, HH-53 Jolly Green Giant helicopters, and EC-121s.
The Navy and Marines both supplied F-4 aircraft for the MiGCAP and BARCAP [Barrier Combat Air Patrol], while A-6s attacked designated targets. Even though there was still no centralized control of all air assets, the Navy and the Air Force worked together closely.
The attack on Day 8 went off with precision, although two B-52s were lost because of the heavy increase in SAM firings.
The United States Air Force had now established a clear ascendancy over the North Vietnamese defenders. Sixty B-52s were dispatched on each of the three remaining nights of the campaign, Days 9, 10, and 11. Two B-52s were shot down on Dec. 27, one going down in North Vietnam and the other making it back to Thailand, where the crew bailed out.
On the final day of the campaign, Day 11 on Dec. 29, USAF crews--both bomber and support--were at the peak of their form while the enemy was in obvious distress, able to fire only a total of 23 SAMs. Where once they had salvoed six SAMs at a time, they now were reduced to individual snap shots. They were almost out of SAMs, their MiGs were shut down, and their radar and communication links were disrupted. In short, they were at the mercy of the United States.
The US had proved decisively that B-52s, supported by tactical air assets, were an effective force, able to meet and defeat the enemy. In the miserable prisons in which they were held, American prisoners of war experienced an unimaginable elation at seeing their brutal captors frightened and suddenly polite.
The result of Linebacker II was exactly what had been predicted by those who had advocated full application of airpower against North Vietnam: a military victory. The badly shaken North Vietnamese accepted that the war was at a stalemate, returned to the negotiating table in Paris, and signed the Paris Peace Accords on Jan. 27, 1973. Within 60 days of the signing, 591 American POWs were released and back in the United States.
In Linebacker II, SAC's B-52s had flown 729 sorties out of a total of 741 planned sorties and dropped 15,000 tons of bombs. North Vietnamese forces had fired about 1,240 SAMs. The Air Force lost 15 B-52 bombers, which amounted to a loss rate of less than two percent. Of 92 B-52 crew members involved in the losses, 26 were recovered, 25 came up missing in action, 33 became prisoners of war, and eight were either killed in action or later died of wounds. In addition, the US lost two F-111As, three F-4s, two A-7s, two A-6s, one EB-66, one HH-53, and one RA-5C.
As soon as Hanoi signaled it wished to resume peace negotiations, Linebacker II raids immediately ceased. Some in the Air Force argued that this was a mistake; if the United States continued the attacks, they maintained, North Vietnam would have to accept a military defeat. Instead, they secured at the peace table a political victory that they would in due course translate into a full-scale military conquest of South Vietnam.
Not long after the end of Linebacker II and the formal return of the US prisoners of war, United States forces at last formally disengaged from the war in Southeast Asia. There then followed what Henry Kissinger described as a "decent interval" of about two years, after which Hanoi, knowing that it no longer faced any realistic threat of another Linebacker II, invaded South Vietnam across a broad front. The Communist forces entered Saigon on April 30, 1975, and unified the two Vietnams under Hanoi's totalitarian control.
To Air Force observers, the events of 1975 pointed up a classic case of "what might have been." To them, full application of airpower in a Linebacker II-type campaign in 1965, a decade earlier, would have achieved military victory, prevented the long and costly US involvement in Southeast Asia, saved South Vietnam as a nation, and allowed the US to escape the calamitous effects that the Vietnamese war has afflicted on America ever since.
1: Dec 18
2: Dec 19
3: Dec 20
4: Dec 21
5: Dec 22
6: Dec 23
7: Dec 24
8: Dec 26
9: Dec 27
10: Dec 28
11: Dec 29
Of 741 planned B-52 sorties, 12 were aborted. The Air Force SEAD (Suppression of Enemy Air Defenses) mission was carried out by F-105, F-4C, and F-4E fighters. CAP (combat air patrol), escort, and chaff dispersal were carried out by numerous types. In addition, US Navy and US Marine aircraft flew a total of 277 night support sorties in A-6, A-7, and F-4 aircraft.
The troops “most closely associated” with the airstrike
that hit a Doctors Without Borders hospital have been suspended from
their duties, the top US commander in Afghanistan said Wednesday.
Doctors Without Borders said the US investigation into the attack on its hospital in Kunduz, Afghanistan, presented “more questions than answers,” noting the decision to fire from the AC-130 was part of a “frightening catalogue of errors.”
An MQ-9 Reaper crashed during a combat sortie near Bagram Airfield, Afghanistan, on Wednesday, reported Stars and Stripes.
Tweets by @AirForceMag | <urn:uuid:76039db6-482e-42ab-b5f6-c85100ef6718> | CC-MAIN-2015-48 | http://www.airforcemag.com/MagazineArchive/Pages/1997/November%201997/1197linebacker.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398451648.66/warc/CC-MAIN-20151124205411-00097-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.972939 | 4,005 | 3.140625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.